Your browser does not allow storing cookies. We recommend enabling them.


Upgrading Tectia Manager with Sybase Database

To upgrade Tectia Manager that is using the Sybase database, follow the instructions below:

  1. Log in as the root user.

  2. Stop the Management Server:

    # /etc/init.d/ssh-mgmt-server stop
  3. Download the Management Server installation package to a temporary directory of your choice.

  4. To install the latest Management Server software:

    1. On Linux, run command:

      # rpm --upgrade ssh-mgmt-server-<v>-linux-x86.rpm 

      In the command, <v> is the current release version of the Management Server (for example

    2. On Solaris, uncompress the installation package, and run the upgrade commands:

      # cp /cdrom/install/solaris/ssh-mgmt-server-<v>-solaris-8-10-sparc.pkg.Z . 
        # uncompress ssh-mgmt-server-<v>-solaris-8-10-sparc.pkg.Z 
        # pkgrm SSHmgmtse 
        ... answer "yes" to any questions displayed 
        # pkgadd -d ssh-mgmt-server-<v>-solaris-8-10-sparc.pkg all 
        ... answer "yes" to any questions displayed 

    In the commands, <v> is the current release version of the Management Server (for example

  5. Start the Management Server:

    # /etc/init.d/ssh-mgmt-server start

    Always start the modules using the startup script provided here, since running the binaries directly would cause the paths and the environment to be set incorrectly.

  6. Wait for the database update to finish (may take a few minutes) and login to the Management Server.

    In case of problems, check the system syslog for possible error messages. An environment that is running correctly should always have the Management Database process and the Management Server processes (ssh-mgmt-server and ssh-mgmt-engine) running.

    The process listing should have the following processes after a while:

    # ps -def | grep ssh-mgmt
    root     1503     1  0 09:42 ?  00:00:00 ssh-mgmt-server 
    sshmgmt  1504  1503  4 09:42 ?  00:00:10 ssh-mgmt-engine      
    sshmgmt  1530     1  0 09:42 ?  00:00:01 dbeng8 -ga -x none -n ssh-mgmt 

    Check that the following syslog messages appear:

    # tail -f /var/log/messages | grep ssh-mgmt-engine
    ssh-mgmt-engine[1504]: Database update finished.   
    ssh-mgmt-engine[1504]: Tectia Manager restarted
  7. Import the license file for Tectia Manager from the installation file directory. In the Tectia Manager administration interface, select Software → Licenses → Import license and choose the appropriate license for Tectia Manager.

    After the license has been successfully imported, log out and restart the Management Server to activate the new features.

  8. Upgrade the Management Agents to new versions remotely at Software → Management Agent → Install.

    The Management Server installation package includes also the installation packages for the Management Agents for all supported platforms. There is no need to import them separately to the Management Server machine.


    The Management Agents are backwards compatible so much that they can be upgraded. Using other management functionalities with an old Management Agent may cause various problems and is not guaranteed to work. We recommend that you upgrade the Management Agent to the latest version as soon as possible. Using a new Management Agent with an old Management Server is not recommended.

  9. Check that all hosts are correctly upgraded with the new Management Agent version. You can view the Management Agent versions in a graph at Reports → Standard reports → Tectia management system reports → Tectia Management Agent versions.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now