swa man page on HP-UX

Man page or keyword search:  
man Server   10987 pages
apropos Keyword Search (all sections)
Output format
HP-UX logo
[printable version]

swa(1M)								       swa(1M)

NAME
       swa - HP-UX Software Assistant

SYNOPSIS

       analyzer] stdout_report_type] inventory_source]

       [step_options]

DESCRIPTION
       HP-UX  Software Assistant (SWA) is a tool that consolidates and simpli‐
       fies patch management and security bulletin management  on  HP-UX  sys‐
       tems.  SWA  is  the  HP-recommended utility to use to maintain currency
       with HP-published security bulletins for HP-UX software.

       SWA can perform a number of checks including applicable	security  bul‐
       letins  and  installed patches with critical warnings. Once an analysis
       has been performed, you can use SWA to download any recommended patches
       or patch bundles and create a depot ready for installation.

       The  SWA	 tool  is contained in one bundle, SwAssistant, which includes
       Security Patch Check.  You must install the SwAssistant bundle  to  get
       full  functionality. The contents of the SwAssistant bundle have depen‐
       dencies on Java (TM), Perl (for SPC), and Judy Libraries.

       Advanced users can control the individual steps performed by  and  with
       the command.

       As you use SWA to report on systems and download software, objects will
       be cached on your disk for later use. To recapture disk space, use

       SWA's major functions are briefly outlined below.

       SWA runs as a client-side patch and security analysis tool. An  HP-sup‐
       plied catalog file with known problems and fixes is downloaded from the
       ITRC and compared to the software installed on the system. Depots  used
       for  full-system	 installation, such as the installation depot on an OE
       DVD, may also be analyzed.

       Systems are analyzed for patch  warnings,  critical  defects,  security
       bulletins, missing Quality Pack (QPK) patch bundles, and user-specified
       patches and supersession chains.

       SWA optimizes the automatic selection of patch dependencies by  assess‐
       ing the quality of the dependency, providing the best case scenario for
       the dependency, minimizing changes to the system, and assessing	future
       patch dependency changes.

       SWA  is	able  to  generate a variety of reports based on its analysis.
       Action, Issue, and Detail reports are available.	 A  consolidated  HTML
       report  with  links  to the technical knowledge base is always created.
       The SWA reports provide information for downloading  software  from  HP
       and for actions that need to be taken manually.

       Based  on the analysis, SWA obtains patches from HP and creates a Soft‐
       ware Distributor (SD) depot of software for installation.

       SWA automatically uses MD5 cryptographic hash to verify patch integrity
       before unpacking downloaded patches.

       To recapture disk space used by objects that SWA cached, see

       SWA has the following major modes: report, get, step, and clean.

       The  major modes report and get are comprised of steps, outlined below.
       The step mode allows you to execute one of these steps. The clean  mode
       frees  up disk space by removing caches of files from previous SWA ses‐
       sions.

	      The swa report command is comprised of the following steps,  and
	      executes them in the order listed.
		     Inventory �
		     The  swa  report  command	first does an inventory of the
		     installed	software.  The	 inventory   is	  written   to
		     $HOME/.swa/cache/swa_inventory_n.xml.
		     Catalog �
		     Then,  swa	 report	 downloads an HP-supplied catalog file
		     from the ITRC website that contains known security issues
		     and other defects along with their solutions. The catalog
		     file is saved to $HOME/.swa/cache/swa_catalog.xml.
		     Analyze �
		     The inventory file is then compared with the catalog file
		     to see what issues need to be resolved on the system, and
		     the   resulting   analysis	   file	   is	 written    to
		     $HOME/.swa/cache/swa_analysis.xml.
		     Report �
		     A	summary of recommended actions are written to standard
		     output  and  comprehensive	  results   are	  written   to
		     $HOME/.swa/report/swa_report.html.
		     See swa-report(1M) for more information.

	      The  swa	get  command  is  comprised  of the steps download and
	      depot, and executes them in the order listed.  Prerequisites  to
	      the  swa	get command are the steps inventory, catalog, and ana‐
	      lyze.
		     Download �
		     The swa get command uses the results  file	 generated  by
		     the analysis step of swa report to download the necessary
		     software from HP. Write access to the  swcache  directory
		     is required for this step.	 Depot
		     The  downloaded  software	is  then  packaged in a depot.
		     Superuser privileges are required for this step.
		     See swa-get(1M) for more information.

	      The swa report and swa get commands are made up  of  steps.  The
	      swa report command is comprised of the steps inventory, catalog,
	      analyze, and report. The swa get command	is  comprised  of  the
	      steps download and depot.
		     With  the	swa step command, you can execute one discrete
		     step of the swa report or swa get command, such  as:  swa
		     step inventory.
		     See swa-step(1M) for more information.

	      When  the swa command runs, it produces cache files for its use.
	      Run swa clean to free up disk space after your  swa  session  is
	      complete.
		     The  swa  clean  command  has  modifiers that specify the
		     caches to clean. The modifiers are:  usercache,  swcache,
		     and  all.	The  usercache	holds the files created by swa
		     report, and the swcache holds the patches and patch  bun‐
		     dles downloaded by swa get or swa step download.
		     The swcache directory can be set with the extended option
		     swcache.
		     See swa-clean(1M) for more information.

       The analysis that performs relies on the integrity of the inventory  to
       determine  the  appropriate  patches  to	 install on the system.	 It is
       important that all protocols used to transmit the  inventory  data  are
       integrity  protected  and  that the host used to generate the inventory
       data is accurately represented.	For example, use of for	 gathering  an
       inventory  of a remote system uses a clear-text, unauthenticated proto‐
       col that does not protect the integrity	of  the	 data.	 Using	Secure
       Shell  to gather an inventory of a remote system uses an integrity pro‐
       tected (and encrypted) protocol.	 Even when  using  Secure  Shell,  the
       analysis	 still	relies	on the source of the data (the remote host) to
       accurately represent the software contents installed on that system.

       Software download relies on the	integrity  of  the  analysis  file  to
       ensure  the  integrity  of patches before unpacking them.  The analysis
       file gets MD5 checksum information directly from the  catalog.	There‐
       fore it is important that all transmissions of the catalog and/or anal‐
       ysis file are integrity protected and  that  file  permissions  do  not
       allow unnecessary modification.

       Depot creation relies on the integrity of the patches within the direc‐
       tory.  Therefore, after	unpacking the patches, it  is  important  that
       all subsequent transmissions of the patches are integrity protected and
       that file permissions do not allow unauthorized modification.   Deploy‐
       ing  software  using Software Distributor (e.g., using the command) has
       security properties that are documented in  the	"Software  Distributor
       Administration Guide".

   Return Values
       returns the following values:

	      Success
	      Error
	      Warning

   Examples
       These  example commands assume your default configuration file contains
       your ITRC login information.  The syntax will be:

       To display usage information:

       To display usage and list all extended options:

       To inventory the local system, analyze it against an HP-supplied	 cata‐
       log  (of	 known	software and issues) for newer Quality Pack patch bun‐
       dles, security issues, and critical patch warnings, and then generate a
       default stdout "action" report:

       To create a report for security issues (SEC) for a remote system inven‐
       tory gathered with Secure Shell, and running in to avoid being prompted
       for user input:

       To create a detailed report for remotesystem, limited in scope to Qual‐
       ity Pack patch bundle analysis (QPK) and patches with critical warnings
       (PCW).  This  example  uses  the	 networking  protocol,	which  is  not
       integrity protected:

       To do the same task as the previous example, using the extended	option
       equivalents  (which  can be specified on the command line, in a user or
       system configuration file, or in an extended options file):

       To generate a report and place the analysis results in the ~/firstanal‐
       ysis.xml file (for later use by

       To generate a report, updating the catalog of HP software if it is more
       than 48 hours old:

       To generate a report using a specified catalog of HP  software  without
       updating that catalog:

       To generate a report always updating the catalog of HP software:

       To  get	patches	 from  HP that are recommended in the default analysis
       file (i.e., from the previous command) and place the results  into  the
       new depot mydepot:

       To  add newly recommended patches into the existing depot mydepot, only
       downloading patches from HP that are neither in mydepot nor  previously
       downloaded:

       To  preview which patches need to be downloaded from HP and added to an
       existing depot without actually doing the work, and with increased ver‐
       bosity:

       To  remove  all	cached inventory, catalog, and analysis information in
       the default location:

       To remove all cached downloaded software in the default location:

       To preview the removal of all cached downloaded software in the default
       location:

       To remove all cached inventory, catalog, analysis, and downloaded soft‐
       ware in specified locations:

AUTHOR
       was developed by Hewlett-Packard Development Company, L.P.

FILES
       The per-user Software Assistant configuration  file.  This  file	 takes
       precedence over the system-wide SWA configuration file.

       An HP-supplied catalog file from the ITRC website that
	      contains	known  security	 issues	 and  other defects along with
	      their solutions. This file is downloaded with  the  command  swa
	      report or swa step catalog.

       The analysis of the inventory file and the catalog file
	      created with swa report or swa step analyze.

       The inventory of installed software created by swa
	      inventory or swa step inventory.

       Use this file to specify issues for analyzers to ignore. It is
	      possible	to use more than one ignore file by using the extended
	      option ignore_file.

       The comprehensive report written by swa report and
	      swa step report.

       Default alternative log file if you don't have permissions
	      to write to /var/opt/swa/swa.log.

       The system-wide SWA configuration file.

       An example configuration file outlining the usage of each
	      extended option.

       Script to configure HP SIM 5.2 and later for SWA. Only
	      required if SWA is installed when HP SIM is  installed  but  not
	      running. HP SIM must be running when configHPSIM is run.

       Manpages.

       The default directory for downloading software before it
	      is  packaged  in	a  depot.  This	 directory can be set with the
	      extended option swcache. Note that this directory can consume  a
	      significant amount of disk space.

       Directory that holds all clients' files generated from SWA
	      within HP SIM. Files are kept in user and job-specific subdirec‐
	      tories. This directory might require significant space  to  sup‐
	      port clients' analysis, catalog, inventory, and report files.

       User-specific directory used by SWA when running under
	      HP SIM.

       Default log file.

       Lists all files downloaded from HP to the swcache. It is
	      located in the swcache directory.

       Lists special installation instructions and dependencies
	      for  the patches in the depot. It is located in the depot direc‐
	      tory.

       Lists all files downloaded from HP stored within the
	      a directory specified by the extended option.

       Lists special installation instructions and other dependencies for  the
       patches in the depot.
	      Located in the root directory of the target depot.

       Lists issue IDs to be ignored (e.g., they are completed or not applica‐
       ble).  Supports comments
	      and regular expressions.	See regexp(5).

SEE ALSO
       swa-report(1M), swa-get(1M),  swa-step(1M),  swa-clean(1M),  and	 secu‐
       rity_patch_check(1M).

								       swa(1M)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net