These instructions are aimed at resolving a problem involving a possible delay when applying the anti-virus databases after an update. We strongly recommend applying these settings.
You must follow these instructions on Central Node servers with component version 6.0.2.
Depending on how the application is deployed and used, you must follow these instructions on the following Central Node servers:
You can use a script to perform the steps of the instructions. In this case, the application is configured automatically and you do not need to follow the instructions below. The script is provided by Technical Support upon request.
To configure the application:
mkdir -p /opt/kaspersky/ks_check_klava_patch
cat <<EOF > /opt/kaspersky/ks_check_klava_patch/ks_check_klava_patch.sh
#!/bin/bash
KATA_SCANNER_ID=\$(docker ps -f name=kata_scanner -q)
if [[ -z \${KATA_SCANNER_ID} ]]; then
echo "kata_scanner not found - exit"
exit 0
fi
CHECK_KLAVA_SRC="/opt/kaspersky/apt-scan-server/libexec/check_klava"
CHECK_KLAVA_TGT="/opt/kaspersky/apt-updater/libexec/bases_test/check_klava"
echo "before"
docker exec \${KATA_SCANNER_ID} bash -c "ls -l \$(dirname \${CHECK_KLAVA_TGT})"
docker exec \${KATA_SCANNER_ID} bash -c "[ -h \${CHECK_KLAVA_TGT} ] || ln -s -f \${CHECK_KLAVA_SRC} \${CHECK_KLAVA_TGT}"
echo "after"
docker exec \${KATA_SCANNER_ID} bash -c "ls -l \$(dirname \${CHECK_KLAVA_TGT})"
EOF
cat <<EOF >/etc/cron.d/ks_check_klava_patch
SHELL=/bin/bash
PATH=/sbin:/bin:/usr/sbin:/usr/bin
* * * * * root flock -w 3 /tmp/ks_check_klava_patch.lock /bin/bash /opt/kaspersky/ks_check_klava_patch/ks_check_klava_patch.sh 2>&1 > /tmp/ks_check_klava_patch.log
EOF
The application component administrator menu is displayed.
This opens the Technical Support Mode confirmation window.
sudo -i
.To run the script, execute the following commands:
chmod +x <script name>.sh
./<script name>.sh
The commands must be executed for each script.
tail -f /tmp/ks_check_klava_patch.log
The application is configured.
Page top