Determining the upgrade method for a Threat Hunting Repository
In some cases, you may be unable to upgrade the Threat Hunting Repository. For example, infrastructure changes, such as a Kubernetes version change, might make an upgrade impossible. When upgrade of the original Threat Hunting Repository is impossible, you can add a second Threat Hunting Repository instead.
The upgrade method of adding a second Threat Hunting Repository might apply when upgrading from 5.0.3 to 5.2. |
This topic describes how to determine which upgrade method to use for the Threat Hunting Repository.
To determine the upgrade method for the Threat Hunting Repository:
-
Determine what upgrade method to use for the Threat Hunting Repository by completing the following steps:
-
ssh to the server for the Threat Hunting Repository.
-
Execute:
cat /etc/*rel*
-
If you see the following output, follow the Upgrading the Threat Hunting Repository procedure:
For any other results, follow the Adding a second server to upgrade the Threat Hunting Repository procedure.
-