{"id":1230,"date":"2013-07-10T13:34:38","date_gmt":"2013-07-10T11:34:38","guid":{"rendered":"http:\/\/www.oradba.ch\/?p=1230"},"modified":"2013-07-10T23:48:35","modified_gmt":"2013-07-10T21:48:35","slug":"error-installing-audit-vault-agent-12-1-1-on-aix","status":"publish","type":"post","link":"https:\/\/www.oradba.ch\/wordpress\/2013\/07\/error-installing-audit-vault-agent-12-1-1-on-aix\/","title":{"rendered":"Error installing Audit Vault Agent 12.1.1 on AIX"},"content":{"rendered":"<h3>The Problem<\/h3>\n<p>During the setup of the current audit vault agent 12.1.1 on AIX, I&#8217;ve run into issues. Depending on the configuration of the AIX environment, the agent can not be installed at all.<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\">\navagent@host:\/u00\/app\/avagent\/ [avagent] java -jar agent.jar -d \/u00\/app\/avagent\/product\/avagent\n\/u00\/app\/avagent\/product\/avagent\/bin\/agentctl[56]: LOGNAME: is read only\nError while executing command: [sh, \/u00\/app\/avagent\/product\/avagent\/bin\/agentctl, fixperms]\navagent@host:\/u00\/app\/avagent\/ [avagent] \n<\/pre>\n<p>The problem is in the for loop on line 56 of agentctl where it tries to unset environment variables. Specifically, the environment variable LOGNAME can not be reset. On our AIX LOGNAME has been defined as read only in \/etc\/profile.<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\" data-enlighter-lineoffset=\"49\" data-enlighter-linenumbers=\"on\">\n# Unset all env vars\n#\nfor var in &lt;code&gt;{{EJS0}}&lt;\/code&gt;; do\n  $ECHO $var | $EGREP &quot;$passthru&quot; &gt; \/dev\/null\n\n  # If no match, i.e. not a passthru then unset\n  if [ $? -eq 1 ]; then\n    unset $var\n  fi\ndone\n<\/pre>\n<h3>The Solutions<\/h3>\n<h4>Change OS default profile<\/h4>\n<p>One solution would be to change the default profile on the OS. For this just open \/etc\/profile and comment out line 37. But I assume for most of us it is not an option to change the default profile.<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\" data-enlighter-lineoffset=\"32\" data-enlighter-linenumbers=\"on\">\n# System wide profile.  All variables set here may be overridden by\n# a user&#039;s personal .profile file in their $HOME directory.  However,\n# all commands here will be executed at login regardless.\n\ntrap &quot;&quot; 1 2 3 \n#readonly LOGNAME\n<\/pre>\n<h4>Change the audit agent<\/h4>\n<p>The alternate solution is to update the agent.jar and fix agentctl. Get the current agent.jar from the audit vault server and extract the agentclt script.<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\">\njar -xf agent.jar bin\/agentctl\n<\/pre>\n<p>Update the agentctl and add LOGNAME the the list of pass through variable on line 46.<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\" data-enlighter-lineoffset=\"43\" data-enlighter-linenumbers=\"on\">\n# Passthrough env vars\n# Note: we passthru any vars with &quot;-&quot; invalid character\n#\npassthru=&#039;^TZ$|^LANG$|^LC_|^JAVA_HOME$|^PATH$|^PS1$|^LOGNAME$|-&#039;\n<\/pre>\n<p>Put the updated agentctl script back to the agent.jar and run a regular installation.<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\">\njar -uf agent.jar bin\/agentctl\n<\/pre>\n<h3>The Bugfix<\/h3>\n<p>The problem was reported to Oracle and can be tracked using the bug number <a href=\"https:\/\/support.oracle.com\/epmos\/faces\/BugDisplay?id=17058352\">17058352<\/a>. <\/p>\n<p>By the way if you&#8217;re using multiline shell prompts agentctl will fail on the same code on any OS. Here you may simple workaround by setting a single line prompt.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Problem During the setup of the current audit vault agent 12.1.1 on AIX, I&#8217;ve run into issues. Depending on the configuration of the AIX environment, the agent can not be installed at all. avagent@host:\/u00\/app\/avagent\/ [avagent] java -jar agent.jar -d \/u00\/app\/avagent\/product\/avagent \/u00\/app\/avagent\/product\/avagent\/bin\/agentctl[56]: LOGNAME: is read only Error while executing command: [sh, \/u00\/app\/avagent\/product\/avagent\/bin\/agentctl, fixperms] avagent@host:\/u00\/app\/avagent\/ [avagent] [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Error installing Audit Vault Agent 12.1.1 on AIX http:\/\/wp.me\/p1aErb-jQ #trivadis #avdf","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[64,85,11],"tags":[86,87,141,18],"class_list":["post-1230","post","type-post","status-publish","format-standard","hentry","category-audit-vault","category-audit-vault-and-database-firewall","category-security","tag-aix","tag-audit-vault-agent","tag-avdf","tag-trivadiscontent"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1aErb-jQ","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1456,"url":"https:\/\/www.oradba.ch\/wordpress\/2013\/09\/update-agent-jar-on-audit-vault-server\/","url_meta":{"origin":1230,"position":0},"title":"Update agent.jar on audit vault server","author":"Stefan","date":"19. September 2013","format":false,"excerpt":"As I wrote in my post Error installing Audit Vault Agent 12.1.1 on AIX, there is a Audit Vault Agent bug 17058352 on AIX. Unfortunately it hasn't yet been fixed in the latest bundle patch for Oracle Audit Vault and Database Firewall. If you haven't changed your default profile in\u2026","rel":"","context":"In &quot;Audit Vault and Database Firewall&quot;","block_context":{"text":"Audit Vault and Database Firewall","link":"https:\/\/www.oradba.ch\/wordpress\/category\/audit\/audit-vault-and-database-firewall\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1545,"url":"https:\/\/www.oradba.ch\/wordpress\/2013\/10\/avcli-doubles-audit-trails-bug-or-feature\/","url_meta":{"origin":1230,"position":1},"title":"AVCLI doubles audit trails, bug or feature?","author":"Stefan","date":"22. October 2013","format":false,"excerpt":"I've start using the AV command line interface to administer AVDF. I use the tool fairly often to start, stop and monitor the audit trails. But recently I ran in a small issue after a typo. I just want to start the audit trail on the ADUMP directory of a\u2026","rel":"","context":"In &quot;Audit Vault and Database Firewall&quot;","block_context":{"text":"Audit Vault and Database Firewall","link":"https:\/\/www.oradba.ch\/wordpress\/category\/audit\/audit-vault-and-database-firewall\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1527,"url":"https:\/\/www.oradba.ch\/wordpress\/2013\/10\/avcli-audit-vault-command-line-interface\/","url_meta":{"origin":1230,"position":2},"title":"AVCLI Audit Vault command line interface","author":"Stefan","date":"18. October 2013","format":false,"excerpt":"When I started to deal with Oracle Audit Vault and Database Firewall (AVDF), I have always worked with the Web console. Since a few weeks I regularly use the AVCLI and start to like it. It is a simple java based command line utility, from which you can access Audit\u2026","rel":"","context":"In &quot;Audit Vault and Database Firewall&quot;","block_context":{"text":"Audit Vault and Database Firewall","link":"https:\/\/www.oradba.ch\/wordpress\/category\/audit\/audit-vault-and-database-firewall\/"},"img":{"alt_text":"AVCLI_Download","src":"https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/AVCLI_Download-300x212.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1600,"url":"https:\/\/www.oradba.ch\/wordpress\/2013\/12\/audit-vault-and-database-firewall-12-1-1-bundle-patch-2\/","url_meta":{"origin":1230,"position":3},"title":"Audit Vault and Database Firewall 12.1.1 Bundle Patch 2","author":"Stefan","date":"13. December 2013","format":false,"excerpt":"This week Oracle has sent a small Christmas gift for its AVDF customers. They Released the second bundle patch for Audit Vault and Database Firewall 12.1.1. In contrast to the BP1 there is no full installation image available. New installations will have to start with the full installation image from\u2026","rel":"","context":"In \"AVDF\"","block_context":{"text":"AVDF","link":"https:\/\/www.oradba.ch\/wordpress\/tag\/avdf\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1396,"url":"https:\/\/www.oradba.ch\/wordpress\/2013\/08\/audit-vault-and-database-firewall-12-1-1-bundle-patch-1\/","url_meta":{"origin":1230,"position":4},"title":"Audit Vault and Database Firewall 12.1.1 Bundle Patch 1","author":"Stefan","date":"14. August 2013","format":false,"excerpt":"Oracle just released the new bundle patch for Audit Vault and Database Firewall 12.1.1. The patch can be downloaded on metaling as RPM patch set for existing installations or as full installation images for new installations. According the readme, the BP1 contains the July 2013 PSU 11.2.0.3.7 for the database\u2026","rel":"","context":"In &quot;Audit Vault and Database Firewall&quot;","block_context":{"text":"Audit Vault and Database Firewall","link":"https:\/\/www.oradba.ch\/wordpress\/category\/audit\/audit-vault-and-database-firewall\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2125,"url":"https:\/\/www.oradba.ch\/wordpress\/2016\/07\/using-kerberos-in-oracle-standard-edition\/","url_meta":{"origin":1230,"position":5},"title":"Using Kerberos in Oracle Standard Edition","author":"Stefan","date":"6. July 2016","format":false,"excerpt":"Since the release of Oracle 12cR1 mid 2013 the network encryption and strong authentication services has been removed from the Oracle Advanced Security Option. Both feature are now available for any licensed editions. Corresponding section in the Oracle Licensing Guide for 11g R2 and 12c R1 has been updated. Network\u2026","rel":"","context":"In &quot;11gR2&quot;","block_context":{"text":"11gR2","link":"https:\/\/www.oradba.ch\/wordpress\/category\/oracle-database\/11gr2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts\/1230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/comments?post=1230"}],"version-history":[{"count":18,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts\/1230\/revisions"}],"predecessor-version":[{"id":1457,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts\/1230\/revisions\/1457"}],"wp:attachment":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/media?parent=1230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/categories?post=1230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/tags?post=1230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}