Upgrading iPrint appliance 4.2 to 5.0 or 3.4

We are running iPrint appliance 4.2.13 with all the patches. I was trying to migrate to 5.0 or even 23.4 by following the guide to migrate the hard drive over but the nd drive on 4.2 is only 40GB and the recommended is 50 for the newer versions. Expand option on 4.2 is grayed out. We are running this on vmware 8.0.2. 

Parents
  • Suggested Answer

    0  

    Deploy a new 23.4 and then use the iprintconfig.zip  from 4.2.13 appliance method to migrate from 4.2.13.

      • Copy the iprintconfig.zip to the new server
        • When prompted to go to the https://<address>:9443 page:
          • enable SSH
          • log in at the terminal session as root, and type:
            • rcsshd start
          • connect to the server using WinSCP
          • browse to the /vastorage directory.
          • create a folder named:
            • backup
          • copy the iprintconfig.zip file to the /vastorage/backup directory using WinSCP
      • Go to https://<address>:9443
        • Because the iprintconfig.zip is copied to the /vastorage/backup directory, a message will read:
          • Previous appliance configuration detected

            Go on with migration. Once migrated, you can upgrade to 24.4 thru product upgrade menu.
  • 0 in reply to   

    So I went through and did this but now when I try to print it is saying submission failed.

  • 0   in reply to 

    install the latest support plug in:

    zypper in -f supportutils-plugin-iprint

    The type:

    iPrintInfo -b

    authenticate using admin.iprintappliance user

    This will create a txt file on current directory with all config and logs and probably the error will show there.

    as you're coming from an old version, verify if your Root CA is not using sha1 algorithm. for that, type at console:

    keytool -list -v -keystore /vastorage/conf/certs/keystore -storepass "changeit" > /tmp/jetty.txt

    this will put the info over the CA into the jetty.xt file. Check if it is using the SHA1 signature algorithm, then follow this document to recreate it:

    https://portal.microfocus.com/s/article/KM000021381?language=en_US 

     assume that your new appliance has been deployed using the same hostname and ip address as the old 4.2.13 as this is a requirement when migrating the appliance.

  • 0 in reply to   

    So our root CA is a wildcard cert that we purchase and not the default one that comes with the appliance, does that matter? 

  • 0   in reply to 

    Yes it matters.  The external ca is only used in browser/console communication.  Internal secure communication still uses the self-signed certs. But check as well that your external root ca and intermediate ca do not use sha1 as well as certs from gooddady and digicert are being sent to customers with old ca using sha1

  • 0 in reply to   

    This is what happnes when I try to run the command to check the sha1 but when I connected with filezilla it says the fingerprint is sha25

Reply Children