Hot fix C2I004 addresses the issue(s) in SAS Risk Governance Framework 7.3 as documented
in the Issue(s) Addressed section of the hot fix download page:
https://tshf.sas.com/techsup/download/hotfix/HF2/C2I.html#C2I004
C2I004 is a "container" hot fix that contains the following "member" hot fixes which will update the software components
as needed.
G2Z001 updates SAS Risk Governance Framework Administrative Tools 7.3
C2K003 updates SAS Risk Governance Framework Mid-Tier 7.3
C2J004 updates SAS Risk Governance Framework Server 7.3
Before applying this hot fix, follow the instructions in SAS Note 35968 to
generate a SAS Deployment Registry report, then verify that the appropriate product releases are installed on your system. The
release number information in the Registry report should match the 'member' release number information provided above for the
software components installed on each machine in your deployment.
The hot fix downloaded, C2I004pt.zip, includes the updates required for all components listed above on all applicable operating systems. To apply this hot fix on multiple machines, you can either save C2I004pt.zip on each machine or save it in a network location that is accessible to all machines.
Do NOT extract the contents of C2I004pt.zip. The hot fix installation process will extract the contents as needed.
The hot fix will be applied using the SAS Deployment Manager. By default, the SAS Deployment Manager will search in the <SASHOME>/InstallMisc/HotFixes/New directory for hot fixes to be applied, but will also prompt for a location if you have downloaded hot fixes to a different directory.
After downloading C2I004pt.zip, follow the instructions for applying hot fixes in the SAS Deployment Wizard and SAS Deployment Manager 9.4: User's Guide.
Please review the CONFIGURATION Important Note above concerning proper selection of the "Configure SAS Hot Fix" option in the SAS Deployment Manager.
The hot fix installation process generates the log file
<!SASHOME>/InstallMisc/InstallLogs/IT_date-and-time-stamp.logfor example, IT_2011-10-31-13.18.21.log. Each attempt to apply a hot fix results in the creation of a new log file giving detailed information regarding the installation process.
Postexec log files are created after the installation is completed and identifies the files that were added, backed up, changed and removed. These log files include the 'member' hot fix id in the name of the file and are also written to the <!SASHOME>/InstallMisc/InstallLogs directory. There is one postexec log for each 'member' hot fix applied (member hot fixes are listed at the top of these instructions).
The content of this hot fix is listed in the hot fix manifest.
SAS Security Updates are applied during the initial installation of your software. In order to maintain the latest level of security offered by SAS, security updates should be applied and/or re-applied after any changes to your software, including installation of hot fixes. The current SAS Security Updates for all releases of SAS are available at https://tshf.sas.com/techsup/download/hotfix/HF2/SAS_Security_Updates.html. Please re-apply security updates in accordance with the SAS Security Updates and Hot Fixes document available on the SAS Security Updates web page.
For each product installed, click the link to be redirected to post-installation instructions.
G2Z001 updates SAS Risk Governance Framework Administrative Tools 7.3
C2K003 updates SAS Risk Governance Framework Mid-Tier 7.3
C2J004 updates SAS Risk Governance Framework Server 7.3
G2Z001 updates SAS Risk Governance Framework Administrative Tools 7.3
NONE
C2K003 updates SAS Risk Governance Framework Mid-Tier 7.3
This hot fix requires post-installation steps that will update the web application deployed to your application server.
For more information about how to rebuild and redeploy Web Applications, see the SASĀ® 9.4 Intelligence Platform, Middle-Tier Administration Guide, Chapter 8 Administering SAS Web Applications.
NOTE: In order for this step to execute correctly, the Metadata Server must be running.
Select the appropriate product as the Web Application to Rebuild
Redeploy the updated wars to the web application server.
A new configdata option has been added:
monitor.cpb3.preventDateEntry=true
When this option is set to "true", you must select a date from a calendar widget instead of
entering the date manually. The default is false.
C2J004 updates SAS Risk Governance Framework Server 7.3
Installation and Configuration
1) Copy the following files from <SASHOME> to <SASCONFIGDIR>
<SASHOME>/SASFoundation/9.4/misc/rskmgtsvr/control/grid_properties.txt2) Delete the "grid_host_port.map" file in the following directory:
<SASHOME>/SASFoundation/9.4/misc/rskmgtsvr/control/grid_host.map
<SASHOME>/SASFoundation/9.4/misc/rskmgtsvr/control/grid_port.map
<SASHOME>/SASFoundation/9.4/ucmacros/rskmgtsvr/rskmgt_get_grid_props.sas
<SASHOME>/SASFoundation/9.4/ucmacros/rskmgtsvr/rskmgt_add_cust_fields.sas
<SASHOME>/SASFoundation/9.4/ucmacros/rskmgtsvr/rskmgt_add_hist_cust_fields.sas
to
<SASCONFIGDIR>/AppData/SASRiskGovernanceFramework/Source/misc/control/grid_properties.txt
<SASCONFIGDIR>/AppData/SASRiskGovernanceFramework/Source/misc/control/grid_host.map
<SASCONFIGDIR>/AppData/SASRiskGovernanceFramework/Source/misc/control/grid_port.map
<SASCONFIGDIR>/AppData/SASRiskGovernanceFramework/Source/ucmacros/rskmgt_get_grid_props.sas
<SASCONFIGDIR>/AppData/SASRiskGovernanceFramework/Source/ucmacros/rskmgt_add_cust_fields.sas
<SASCONFIGDIR>/AppData/SASRiskGovernanceFramework/Source/ucmacros/rskmgt_add_hist_cust_fields.sas
<SASCONFIGDIR>/AppData/SASRiskGovernanceFramework/Source/misc/control3) Delete the "grid_properties.sas7bdat" dataset if it exist. This file should be located here:
<SASCONFIGDIR>/AppData/SASRiskGovernanceFramework/Libraries/rgfcntl4) Run one of the load ETL jobs in SAS Management Console --> Schedule Manager, verify the RGFLASR server libname is being assigned and the LASR data sources are being loaded.
This completes the installation of hot fix C2I004 on Linux for x64.
Copyright 2019 SAS Institute Inc. All Rights Reserved.