Fortinet black logo

Administration Guide

Determining the upgrade method for a Threat Hunting Repository

Determining the upgrade method for a Threat Hunting Repository

In some cases, you may be unable to upgrade the Threat Hunting Repository. For example, infrastructure changes, such as a Kubernetes version change, might make an upgrade impossible. When upgrade of the original Threat Hunting Repository is impossible, you can add a second Threat Hunting Repository instead.

Note

The upgrade method of adding a second Threat Hunting Repository might apply when upgrading from 5.0.3 to 5.2.

This topic describes how to determine which upgrade method to use for the Threat Hunting Repository.

To determine the upgrade method for the Threat Hunting Repository:
  1. Determine what upgrade method to use for the Threat Hunting Repository by completing the following steps:

    1. ssh to the server for the Threat Hunting Repository.

    2. Execute: cat /etc/*rel*

    3. If you see the following output, follow the Upgrading the Threat Hunting Repository procedure:

      For any other results, follow the Adding a second server to upgrade the Threat Hunting Repository procedure.

Determining the upgrade method for a Threat Hunting Repository

In some cases, you may be unable to upgrade the Threat Hunting Repository. For example, infrastructure changes, such as a Kubernetes version change, might make an upgrade impossible. When upgrade of the original Threat Hunting Repository is impossible, you can add a second Threat Hunting Repository instead.

Note

The upgrade method of adding a second Threat Hunting Repository might apply when upgrading from 5.0.3 to 5.2.

This topic describes how to determine which upgrade method to use for the Threat Hunting Repository.

To determine the upgrade method for the Threat Hunting Repository:
  1. Determine what upgrade method to use for the Threat Hunting Repository by completing the following steps:

    1. ssh to the server for the Threat Hunting Repository.

    2. Execute: cat /etc/*rel*

    3. If you see the following output, follow the Upgrading the Threat Hunting Repository procedure:

      For any other results, follow the Adding a second server to upgrade the Threat Hunting Repository procedure.