Upgrade C Version To 9

0 views
Skip to first unread message

Cameron Fluet

unread,
Aug 5, 2024, 1:17:43 PM8/5/24
to progivaspluc
Youcan find your device's Android version number, security update level, and Google Play system level in your Settings app. You'll get notifications when updates are available for you. You can also check for updates.

If an update starts downloading and doesn't finish, your device will automatically try again over the next few days.

When it tries again, you'll get a notification. Open the notification and tap the update action.


Doing an uninstall of 2.4 and doing a fresh install of 2.5 is an option but in my organization that is currently a long process and would rather just be able to pick the version to update too rather than be forced to the latest version.


You could download the major version (2.4 / 2.5 / 2.6) that you want to target via My Esri. You could then download the patch level. I would recommend patching to the highest level for the version you are using.


Thanks George, this is essentially the process we currently have to use but with my organization a user needs administrative credentials for a new install like this which can take weeks but we can do in app updates without admin credentials.


That is why we were hoping there would be the option for selecting which version you want to update to in app rather than having to do a complete uninstall and reinstall. Seems like something Esri would offer. Should I submit this to the ideas page as an enhancement request?


After installing subscription Quicken on the new computer, all you need to do is make a Quicken Backup (File menu) of the data file on the old computer (using a thumbdrive to move it) and restore it on the new computer/Quicken (File menu).


With respect to restarting doing downloads, it is the financial institution that decides how far back the initial download goes, the user has no means of changing that. You undoubtedly will get some duplicates. The easiest way to clean them up is to sort the register by "Date entered" which puts all of the new stuff at the bottom of the register. You can then delete the duplicates leaving only the new ones that you have not previously entered manually.


My PC crashed. I wasn't able to repair Win 10 and had to reinstall it. This forced me to reinstall Quicken 2016. When I try to launch it, I get a blank registration screen. This is a known issue that doesn't have a solution. It seems that my only option is to upgrade to Quicken Classic subscription. I have a copy of my latest QDF file saved by Quicken 2016. The question is, will I be able to open it in the latest version without doing backup and restore?


I found an old hard drive that used to run Win10 on the same PC. I upgraded the drive a few years ago. The old drive had a good copy of QUICKEN.INI in C:\ProgramData\Intuit\Quicken\Config. I copied the file to the same location on the new hard drive and that did the trick. I'm able to run the new install of Quicken 2016 without getting a blank registration screen. Phew, crisis averted.


I'm currently planning to upgrade my Palo Alto Networks firewall from version 9.0 to 10.1. As this is a critical operation, I want to ensure a smooth transition without any disruptions to our network and security policies. Before proceeding with the upgrade, I'd like to seek advice and insights from the community on the best practices to follow. Are there any critical points, potential challenges, or known issues that I should be aware of before initiating the upgrade process? Any tips or recommendations regarding pre-upgrade preparations, backup procedures, and post-upgrade verification would be greatly appreciated.


Hello there.

I would be glad to give you some pointers, and others may chime in as well.

Are you using HA in your environment? If so, then please make sure you failover to your secondary, and upgrade the primary FW (not the other way around). This is so that, after the primary reboots.. if anything did occur, you can failback to your old 9.0 software that is on your backup box. this is one recommendation.



You only need to put in the base software (meaning, you will upgrade 9.0 to 9.1.0, there is no need to put in a higher 9.0.x prior to going to 9.1.0.



If 9.1.0 on your primary is good, then upgrade 9.1.0 on the other FW. Do NOT try and upgrade fully from 9.0 to 10.1.x (you really should go to 10.2.x, not sure why you are limiting yourself to 10.1.x.. the 10.2.4-hotfixes are good/stable. I run them in my production network. Anyways... again, do not try to quickly upgrade one side of your HA to 10.1.x, as you will have sync issues.


For each version, I would be saving a named snapshot file from the primary, and after you upgrade the secondary, I would import the primary FW config onto your secondary box (to ensure 100% accurate configuration).. granted you will need to reconfig the HA settings back, so they do not overlap.


Also, keep in mind that as your upgrade, your FW is going to go into "autocommit mode", where the firewall is in a "NOT READY" state, as seen by the task bar of your FW. Let the FW do its stuff. Autocommit and NOT READY have been seen for 20 min+.



Take your time, and all will be fine.


Proactively has a PANW TAC case created 48 hours before, so that they can assign an engineer during the times you are doing your upgrades. This is a best practice recommendation from PANW TAC directly.


If possible, and it is hard.. but try to stay more current with your PANW software upgrades... meaning, upgrade every 6 months, so 2 upgrades per year, so that you do not fall too far behind. Easier said than done, I understand... just a recommendation.


Something to be mindful of when you're upgrading from this old of a major release, is that you'll have new signatures that you just haven't had active before the upgrade. So new vulnerability signatures and app-id signatures that you previously just haven't been exposed to will become active.


This can cause issues with traffic if you start identifying traffic differently post upgrade due to a new signature activation, and obviously the same thing for vulnerability signatures that haven't been active previously. Just something to be mindful of post-upgrade and something you may want to proactively keep an eye on the next little bit after the upgrade to ensure you don't encounter any issues.


I might be mistaken but I dont think you can run mismatching versions in a VC in any circumstance, so you'd need to upgrade both members for them to form a VC again.

So you'd need to upgrade and reboot both members (and while ISSU is a thing, unless you really need to, I wouldnt really recommend that for upgrades typically, and especially with such big version leaps you'll probably want to be careful and test beforehand).



As for the "3 versions", while that is not a thing anymore, it is referring to main releases (so the "13" in 13.2X51-D26.2 for example could then upgrade to a 16.x version).

So your 18.2R3.4 could safely upgrade to anything up to a 21.x release following the "3 releases" logic. While it is no longer a requirement, there is always a question of how much changed and how big is the risk of things breaking, so I would highly recommend testing the upgrade path in a lab environment to be sure, especially if you are jumping ahead more than 2-3 main releases.



So in conclusion, while technically it might no longer be a thing, and it was never a hard law, I would recommend being very careful with version leaps that go over 3 main releases ahead in version and to be sure to test these beforehand. The (relatively) safe path is to upgrade to the last subrelease (typically x.4R3 or so) in your current train and then jump to the main release you want (20.4R3-S1, though I've heard S2 is coming out in a week or so, so depending on your need you might want to wait and take that one).


This path will take more time of course but if you're upgrading production it's probably better to be safe when doing these big version leaps.



Having said that, I think the risk is probably less pronounced with EX-series switches, due to a lesser complexity of features being available than in the MX routers for example, so the risk is probably relatively smaller there.


As mentioned in the official GitLab Maintenance Policy, generally you should be able to easily and safely upgrade between patch versions and minor versions within the same major version. HOWEVER, upgrading from a major version to the next major version requires more attention.


To show all available versions (if new versions have been released between the time you installed the plugin, you need to update the plugin to show the new ones, with asdf plugin-update all or asdf plugin-update erlang)


To show the current versions of all plugins, or asdf current erlang to just show the current set erlang version. If done from a directory that has a local version specified it will show the local version that is set, anywhere else it will show the global one


I'm doing overall upgrade planning on our infrastructure and saw SQL Server 2014 SP3 will get out of mainstream support in july 2019 identified which systems still run this version, Backup Exec server being one of them. Even if the extended maintenance support continues, MS will definitely limit their efforts for 2014 in favour of 2016 and newer. Thus I'd like to get all our DB instances upgraded in time - where possible to the same versions on the whole infastructure so that we have to keep an eye on less software version to keep patched and maintained.

3a8082e126
Reply all
Reply to author
Forward
0 new messages