The Rollup Patch installer is a cumulative patch, and is a step closer to the "continuous deployment" method of updating. The patch installer is intended to be used independent of Technical bulletins, though some Technical Bulletins may depend upon the Rollup Patch already having been applied, and some of the code we supplied in Technical bulletins originally may be superseded in a given version of the Rollup Patch. Generally, we recommend applying the rollup patch first, then looking at the Technical bulletins and applying them as needed. The rollup only includes code, not data or configuration, and does no scripted updates, so for some things you will still need the Technical Bulletins, as they can apply scripted updates and make configuration changes.
The rollup patch installer does make database schema updates, so you will need to have a valid postgres user password for the database (see Prerequisites, below). It is not necessary to run the patch installer on a database-server-only installation of GroundWork.
Since it is a cumulative patch, you need only install the latest version - there is no need to install each version of it sequentially. The Rollup Patch Installer is also reversible - it makes a backup of everything it changes, and you can use a simple process to reverse the updates it makes.
If you install two or more sequential rollups and need to roll them back, simply apply the rollback scripts in the reverse order of the rollup patches.
|If you installed patch 4111, there is an extra step. See below.|
If you have several GroundWork servers in a parent-child configuration, you may run the rollup on any server in any order. Note that it will interrupt monitoring briefly when you apply or roll back.
|You MUST have the postgres user password available before running this patch!|
The installer will stop GroundWork services, ask for the db user password, then patch and restart the groundwork services.
Hopefully you will not need to roll the changes back. If you have any issue after the patch, please let GroundWork Support know as soon as you can. We do extensively test each change, and we do integration and system tests on each Rollup, but we recognize you may need to get back to where you were.
Note that no configuration files will be altered or rolled back, that is up to you to control. Also, when you install a patch, the previous patch state is saved in a directory under /usr/local/groundwork/backup-gwNNNN, where NNNN is the prior patch level. That's the directory you will use to roll back with this procedure.
You will once again need to provide the postgres user password.
Because this rollup patch does affect configuration files, in some cases you must make additions or edits in order to benefit from the new features and fixes in the patch. The following is a list of such edits you may want to make, depending upon how you use GroundWork, and whether you make use of a particular feature.
These parameters denote the acceptable size of the search window in time, and affect how much data is cached.
If you select a bigger period in NocBoard than you have set here, performance will suffer. Make sure the window size is right for your installation.
Changes to this file are effective after you restart GroundWork Services.
Adding the ldap mapping enable parameter and the "|" or function on the roles container search term extends the places that GroundWork will look for users and role mappings. This can add significant redundancy to your authentication/authorization setup with LDAP or AD.
File to edit:
You can add the mapping of LDAP only groups to GW portal only groups, for example: "aga", "another aga", "ago", "agu", below.
Notice that a space in an LDAP group name requires the replacement of that space with the string "\u0020"
Changes to these files are effective after you restart GroundWork Services.
You may use a notation for ldap mapping that sets GROUPNAME=GROUPNAME (where the ldap group and the GW role are identically spelled).
If you have installed patch 4111, which was briefly available, it contains a flaw that must be addressed with a command to correct table ownership. This is only necessary if you installed patch 4111. You can do this step at any time including before or after applying 4114 or 4118.
The symptom this is necessary comes to you as failure to do backups and a similar error when you try to do a build instance:
So to fix in place, as root, and with the knowledge of the postgres user password at hand, type these two lines
You will be prompted for the postgres user password.
The details of what issues and features are changed in this version of the rollup patch are detailed https://kb.groundworkopensource.com/display/DOC721/GWME-7.2.1-00+Rollup+Patch+Details