/build/static/layout/Breadcrumb_cap_w.png

Linux Agent Issue after v5.0 Upgrade

Updated my kbox today to version 5.... now my linux agents are acting up. The install/upgrade of the agent removes the runallkbots command from /KACE/bin and there are now a couple of exe's in that directory. Something is clearly awry.

Ideas anyone? Anyone else experience this problem?

TIA,
Rob

0 Comments   [ + ] Show comments

Answers (2)

Posted by: dan@kace.com 15 years ago
Orange Belt
0
Rob,

I do believe that the runallkbots script is no longer in the release as of 5.0. I believe the command to check in is something like:
sudo /Library/KBOXAgent/Home/bin/runkbot 2 0

The 2 stands for the inventory script and the 0 is the version. If you had made several changes to the check-in interval there may be a number of '2' scripts in the kbots directory.

You probably want to open up a support ticket for this by emailing [email=support@kace.com]support@kace.com[/email] if you haven't already.
Posted by: bf_rob 15 years ago
Senior Yellow Belt
0
Dan,

Yeah, you are correct they did change the syntax of the command. The change is not reflected i the documentation however, so im sure this will be an issue till the documentation reflects the change.

As far as the agents acting up.... Its an issue with 64 bit linux. Come to find out, 64 bit linux is not supported. yikes. i went back to using the 4.3 agent for my linux machines and all is well for now.
Rating comments in this legacy AppDeploy message board thread won't reorder them,
so that the conversation will remain readable.

Don't be a Stranger!

Sign up today to participate, stay informed, earn points and establish a reputation for yourself!

Sign up! or login

Share

 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ