Error en Instalación

Hola Saludos a todos

Estoy intentando hacer una instalación , pero me sale el siguiente error. Gracias

INFO [6143451072] root <> Logger suldownloader configured for level: INFO
INFO [6143451072] suldownloader <> SulDownloader 1.2.6 started
INFO [6143451072] suldownloader <> Doing product and supplement update
INFO [6143451072] suldownloader <> Running SDDS3 update
INFO [6143451072] SulDownloaderSDDS3 <> Failed to find config file: /opt/sophos-spl/base/update/var/package_config.xml
INFO [6143451072] SulDownloaderSDDS3 <> Trying SUS request (https://sus.sophosupd.com) without proxy
INFO [6143451072] SulDownloaderSDDS3 <> SUS Request was successful
INFO [6143451072] SulDownloaderSDDS3 <> Suite: 'sdds3.ServerProtectionLinux-Base_2024.1.0.7.0.b0e3bb1825.dat' is available to b
INFO [6143451072] SulDownloaderSDDS3 <> Connecting to update source directly
INFO [6143451072] SulDownloaderSDDS3 <> Performing Sync using https://sdds3.sophosupd.com
INFO [6143451072] suldownloaderdata <> Product verified: ServerProtectionLinux-Base-component
INFO [6143451072] suldownloaderdata <> Product verified: ServerProtectionLinux-Plugin-responseactions
INFO [6143451072] suldownloaderdata <> Product verified: ServerProtectionLinux-Plugin-liveresponse
INFO [ 6143451072] suldownloaderdata <> Product verified: ServerProtectionLinux-Plugin-RuntimeDetections
INFO [6143451072] suldownloaderdata <> Product verified: ServerProtectionLinux-Plugin-EventJournaler
INFO [6143451072] suldownloaderdata <> Product verified: ServerProtectionLinux-Plugin-EDR
INFO [6143451072] suldownloaderdata <> Product verified: ServerProtectionLinux-Plugin-DeviceIsolation
INFO [6143451072] suldownloaderdata <> Product verified: ServerProtectionLinux-Plugin-AV
INFO [6143451072] suldownloaderdata <> Installing product: ServerProtectionLinux-Base-component version: 1.2.7.1.2
ERROR [6143451072] suldownloaderdata <> Installation failed
INFO [6143451072] suldownloaderdata <> Installing product: ServerProtectionLinux-Plugin-responseactions version: 1.0.3.1.1
ERROR [6143451072] suldownloaderdata <> Installation failed
INFO [6143451072] suldownloaderdata <> Installing product: ServerProtectionLinux-Plugin-liveresponse version: 1.7.4.1.2
ERROR [6143451072] suldownloaderdata <> Installation failed
INFO [6143451072] suldownloaderdata <> Installing product: ServerProtectionLinux-Plugin-RuntimeDetections version: 5.8.0.1.942
ERROR [6143451072] suldownloaderdata <> Installation failed
INFO [6143451072] suldownloaderdata <> Installing product: ServerProtectionLinux-Plugin-EventJournaler version: 1.0.8.1.1
ERROR [6143451072] suldownloaderdata <> Installation failed
INFO [6143451072] suldownloaderdata <> Installing product: ServerProtectionLinux-Plugin-EDR version: 1.1.12.1.1
ERROR [6143451072] suldownloaderdata <> Installation failed
INFO [6143451072] suldownloaderdata <> Installing product: ServerProtectionLinux-Plugin-DeviceIsolation version: 1.0.0.1.211
ERROR [6143451072] suldownloaderdata <> Installation failed
INFO [6143451072] suldownloaderdata <> Installing product: ServerProtectionLinux-Plugin-AV version: 1.1.4.1.3
ERROR [6143451072] suldownloaderdata <> Installation failed
WARN [6143451072] suldownloader <> Update failed, with code: 103
INFO [6143451072] suldownloader <> Generating the report file in: /opt/sophos-spl/base/update/var/updatescheduler



Added tags
[edited by: Gladys at 12:27 PM (GMT -8) on 6 Mar 2024]
Parents
  • The thin installer should do checks that the install location is valid before downloading and installing the product.

    Please could you give the full output from the installer?

  • That still seems to be missing the initial pre-install checks, starting from the Central Registration.

    But it does show an error:

    82508   [2024-03-01T15:19:02.044]   DEBUG [3579751360] suldownloaderdata <> Possible reason: Too many levels of symbolic links

    I wonder if something is wrong with your installation directory:

    ls -ld /opt 

  • If you set 

    export OVERRIDE_INSTALLER_CLEANUP=1

    before doing the installation, then the installer will leave behind its temporary directory, in there there should be the base installer log.

    That might tell us what has failed due to symlinks.

  • Hola Douglas

    Lo ejecute de esa forma que me indicas.

    El archivo temporal son los que estan dentro de la carpeta /opt/sophos-spl/tmp  ?

    Gracias

    # export OVERRIDE_INSTALLER_CLEANUP=1; bash -x ./SophosSetup.sh 2>&1 | tee install.log
    + umask 077
    + echo 'This software is governed by the terms and conditions of a licence agreement with Sophos Limited'
    This software is governed by the terms and conditions of a licence agreement with Sophos Limited
    + VERSION=1.3.2.14
    + PRODUCT_NAME='Sophos Protection for Linux'
    + INSTALL_FILE=./SophosSetup.sh
    + EXITCODE_SUCCESS=0
    + EXITCODE_NOT_LINUX=1
    + EXITCODE_NOT_ROOT=2
    + EXITCODE_NO_CENTRAL=3
    + EXITCODE_NOT_ENOUGH_MEM=4
    + EXITCODE_NOT_ENOUGH_SPACE=5
    + EXITCODE_FAILED_REGISTER=6
    + EXITCODE_ALREADY_INSTALLED=7
    + EXITCODE_SAV_INSTALLED=8
    + EXITCODE_NOT_64_BIT=9
    + EXITCODE_DOWNLOAD_FAILED=10
    + EXITCODE_FAILED_TO_UNPACK=11
    + EXITCODE_CANNOT_MAKE_TEMP=12
    + EXITCODE_VERIFY_INSTALLER_FAILED=13
    + EXITCODE_SYMLINKS_FAILED=14
    + EXITCODE_CHMOD_FAILED=15
    + EXITCODE_NOEXEC_TMP=16
    + EXITCODE_DELETE_INSTALLER_ARCHIVE_FAILED=17
    + EXITCODE_BASE_INSTALL_FAILED=18
    + EXITCODE_BAD_INSTALL_PATH=19
    + EXITCODE_INSTALLED_BUT_NO_PATH=20
    + EXIT_FAIL_WRONG_LIBC_VERSION=21
    + EXIT_FAIL_COULD_NOT_FIND_LIBC_VERSION=22
    + EXITCODE_UNEXPECTED_ARGUMENT=23
    + EXITCODE_BAD_GROUP_NAME=24
    + EXITCODE_GROUP_NAME_EXCEEDS_MAX_SIZE=25
    + EXITCODE_DUPLICATE_ARGUMENTS_GIVEN=26
    + EXITCODE_BAD_PRODUCT_SELECTED=27
    + EXITCODE_INVALID_CUSTOM_ID_GIVEN=28
    + EXITCODE_NO_SYSTEMD=29
    + EXITCODE_MISSING_PACKAGE=30
    + EXITCODE_INVALID_CA_PATHS=31
    + EXITCODE_INVALID_MR_UC_GIVEN=32
    + EXITCODE_COMPATIBILITY_CHECKS_FAILED=33
    + EXITCODE_MALFORMED_THININSTALLER=34
    + EXITCODE_REGISTRATION_FAILED=51
    + EXITCODE_AUTHENTICATION_FAILED=52
    + EXITCODE_ALC_POLICY_TRANSLATION_FAILED=53
    + PROXY_CREDENTIALS=
    + MAX_GROUP_NAME_SIZE=1024
    + VALID_PRODUCTS=("antivirus" "mdr" "xdr")
    + REQUEST_NO_PRODUCTS=none
    + BUILD_LIBC_VERSION=2.17
    + DAT_FILES=("supplement/sdds3.ScheduledQueryPack.dat" "supplement/sdds3.ML_MODEL3_LINUX_X86_64.dat" "supplement/sdds3.DataSetA.dat" "supplement/sdds3.LocalRepData.dat" "supplement/sdds3.RuntimeDetectionRules.dat" "supplement/sdds3.SSPLFLAGS.dat")
    + VALID_CENTRAL_CONNECTION=0
    + VALID_SUS_CONNECTION=0
    + VALID_CDN_CONNECTION=0
    + [[ -z '' ]]
    + TMPDIR=/tmp
    + export TMPDIR
    + unset ALLOW_OVERRIDE_MCS_CA
    + CREATED_INSTALL_DIRECTORY=0
    + declare -a INSTALL_OPTIONS_ARGS
    + check_for_duplicate_arguments
    + declare -a checked_arguments
    + FORCE_UNINSTALL_SAV=0
    + FORCE_INSTALL=0
    + UNEXPECTED_ARGUMENT=0
    + HELP_FLAG=0
    + VERSION_FLAG=0
    + [[ 0 == 1 ]]
    + [[ 0 == 1 ]]
    + [[ 0 == 1 ]]
    + [[ '' != 1 ]]
    + pre_install_checks
    + echo -e '\nPerforming pre-installation checks to verify whether SPL can be installed on this machine'
    
    Performing pre-installation checks to verify whether SPL can be installed on this machine
    ++ id -u
    + [[ 0 -ne 0 ]]
    + verify_system_requirements
    ++ uname -a
    + [[ Linux Logistica230 3.16.6-2-desktop #1 SMP PREEMPT Mon Oct 20 13:47:22 UTC 2014 (feb42ea) x86_64 x86_64 x86_64 GNU/Linux =~ Linux ]]
    ++ uname -m
    + [[ x86_64 = \x\8\6\_\6\4 ]]
    + BIN=bin
    ++ ps -p 1 -o comm=
    + [[ systemd == \s\y\s\t\e\m\d ]]
    + verify_installed_packages
    + required_packages=("bash" "systemctl" "grep" "getent" "groupadd" "useradd" "usermod")
    + for package in '"${required_packages[@]}"'
    ++ which bash
    + [[ -z /bin/bash ]]
    + for package in '"${required_packages[@]}"'
    ++ which systemctl
    + [[ -z /usr/bin/systemctl ]]
    + for package in '"${required_packages[@]}"'
    ++ which grep
    + [[ -z /usr/bin/grep ]]
    + for package in '"${required_packages[@]}"'
    ++ which getent
    + [[ -z /usr/bin/getent ]]
    + for package in '"${required_packages[@]}"'
    ++ which groupadd
    + [[ -z /usr/sbin/groupadd ]]
    + for package in '"${required_packages[@]}"'
    ++ which useradd
    + [[ -z /usr/sbin/useradd ]]
    + for package in '"${required_packages[@]}"'
    ++ which usermod
    + [[ -z /usr/sbin/usermod ]]
    + av_packages=("setcap")
    + for package in '"${av_packages[@]}"'
    ++ which setcap
    + [[ -z /sbin/setcap ]]
    + verify_compatible_glibc_version
    ++ rev
    ++ cut -d ' ' -f 1
    ++ ldd --version
    ++ rev
    ++ grep 'ldd (.*)'
    + system_libc_version=2.19
    ++ printf '%s\n' 2.17 2.19
    ++ sort -V
    ++ head -n 1
    + lowest_version=2.17
    + [[ 2.17 != \2\.\1\7 ]]
    ++ which getcap
    + [[ -z /sbin/getcap ]]
    ++ which setcap
    + [[ -z /sbin/setcap ]]
    ++ grep FANOTIFY
    +++ uname -r
    ++ cat /boot/config-3.16.6-2-desktop
    + fanotify_config='CONFIG_FANOTIFY=y
    CONFIG_FANOTIFY_ACCESS_PERMISSIONS=y'
    + [[ CONFIG_FANOTIFY=y
    CONFIG_FANOTIFY_ACCESS_PERMISSIONS=y =~ CONFIG_FANOTIFY=y ]]
    + [[ CONFIG_FANOTIFY=y
    CONFIG_FANOTIFY_ACCESS_PERMISSIONS=y =~ CONFIG_FANOTIFY_ACCESS_PERMISSIONS=y ]]
    + check_free_storage 2048
    + local space=2048
    + local sophos_install=/opt/sophos-spl
    + [[ /opt/sophos-spl = /* ]]
    + local install_path=/opt
    + [[ ! -d /opt ]]
    ++ df -kP /opt
    ++ sed -e 1d
    ++ awk '{print $4}'
    + local free=18269324
    ++ df -kP /opt
    ++ sed -e 1d
    ++ awk '{print $6}'
    + local mountpoint=/opt
    + local free_mb
    + free_mb=17841
    + [[ 17841 -gt 2048 ]]
    + return 0
    + check_total_mem 930000
    + local neededMemKiloBytes=930000
    ++ grep MemTotal /proc/meminfo
    ++ awk '{print $2}'
    + local totalMemKiloBytes=6124568
    + '[' 6124568 -gt 930000 ']'
    + return 0
    + check_ca_certs
    + [[ -f /etc/ssl/certs/ca-certificates.crt ]]
    + [[ -f /etc/pki/tls/certs/ca-bundle.crt ]]
    + log_debug 'Installation will use system CA path '\''/etc/pki/tls/certs/ca-bundle.crt'\'''
    + [[ -n '' ]]
    ++ sed -n -e '/^URL=/ s/.*\= *//p' ./SophosSetup.sh
    + CENTRAL_URL=https://mcs2-cloudstation-us-west-2.prod.hydra.sophos.com/sophos/management/ep
    + [[ '' != \n\o\n\e ]]
    + [[ -n '' ]]
    ++ sed -n -e '/^MESSAGE_RELAYS=[^$]/ s/.*\= *//p' ./SophosSetup.sh
    + message_relays=
    + IFS=';'
    + read -ra message_relay_array
    + [[ '' != \n\o\n\e ]]
    + [[ -n '' ]]
    ++ sed -n -e '/^UPDATE_CACHES=[^$]/ s/.*\= *//p' ./SophosSetup.sh
    + update_caches=
    + IFS=';'
    + read -ra update_cache_array
    ++ sed -n -e '/^SDDS3_SUS_URL=/ s/.*\= *//p' ./SophosSetup.sh
    + EXTRACTED_SUS_URL=sus.sophosupd.com
    + [[ sus.sophosupd.com != '' ]]
    + [[ sus.sophosupd.com != https://* ]]
    + EXTRACTED_SUS_URL=https://sus.sophosupd.com
    ++ sed -n -e '/^SDDS3_CONTENT_URLS=[^$]/ s/.*\= *//p' ./SophosSetup.sh
    + cdn_urls='sdds3.sophosupd.com;sdds3.sophosupd.net'
    + IFS=';'
    + read -ra cdn_urls_array
    + for cdn_url in '"${cdn_urls_array[@]}"'
    + [[ sdds3.sophosupd.com != https://* ]]
    + cdn_url=https://sdds3.sophosupd.com
    + EXTRACTED_CDN_URLS+=("${cdn_url%%,*}")
    + for cdn_url in '"${cdn_urls_array[@]}"'
    + [[ sdds3.sophosupd.net != https://* ]]
    + cdn_url=https://sdds3.sophosupd.net
    + EXTRACTED_CDN_URLS+=("${cdn_url%%,*}")
    + verify_network_connections '' '' 'https://sdds3.sophosupd.com https://sdds3.sophosupd.net' https://sus.sophosupd.com
    + IFS=' '
    + read -ra MESSAGE_RELAYS
    + IFS=' '
    + read -ra UPDATE_CACHES
    + IFS=' '
    + read -ra cdn_urls_arg
    + sus_url_arg=https://sus.sophosupd.com
    + [[ 0 != 0 ]]
    + local curl_output
    + [[ -n '' ]]
    + [[ -n '' ]]
    + [[ -n '' ]]
    + log_info 'Verifying connections to Sophos Central'
    + echo 'INFO: Verifying connections to Sophos Central'
    INFO: Verifying connections to Sophos Central
    + verify_connection_to_central
    + local proxy=
    + local curl_output
    + [[ -z '' ]]
    ++ curl --tlsv1.2 --noproxy '*' -k -is https://mcs2-cloudstation-us-west-2.prod.hydra.sophos.com/sophos/management/ep -m 60 -v
    + curl_output='* Hostname was NOT found in DNS cache
    *   Trying 34.217.183.67...
    * Connected to mcs2-cloudstation-us-west-2.prod.hydra.sophos.com (34.217.183.67) port 443 (#0)
    * successfully set certificate verify locations:
    *   CAfile: none
      CApath: /etc/ssl/certs/
    * SSLv3, TLS handshake, Client hello (1):
    } [data not shown]
    * SSLv3, TLS handshake, Server hello (2):
    { [data not shown]
    * SSLv3, TLS handshake, CERT (11):
    { [data not shown]
    * SSLv3, TLS handshake, Server key exchange (12):
    { [data not shown]
    * SSLv3, TLS handshake, Server finished (14):
    { [data not shown]
    * SSLv3, TLS handshake, Client key exchange (16):
    } [data not shown]
    * SSLv3, TLS change cipher, Client hello (1):
    } [data not shown]
    * SSLv3, TLS handshake, Finished (20):
    } [data not shown]
    * SSLv3, TLS change cipher, Client hello (1):
    { [data not shown]
    * SSLv3, TLS handshake, Finished (20):
    { [data not shown]
    * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
    * Server certificate:
    *        subject: CN=mcs2-cloudstation-us-west-2.prod.hydra.sophos.com; ST=Oxfordshire; C=GB; O=Sophos Ltd.; OU=SaaS
    *        start date: 2023-12-20 11:53:25 GMT
    *        expire date: 2025-02-01 11:53:25 GMT
    *        issuer: CN=Sophos SHA256 MCS Root CA3; emailAddress=sophosca@sophos.com; ST=Oxfordshire; C=UK; O=Sophos Ltd
    *        SSL certificate verify result: self signed certificate in certificate chain (19), continuing anyway.
    > GET /sophos/management/ep HTTP/1.1
    > User-Agent: curl/7.38.0
    > Host: mcs2-cloudstation-us-west-2.prod.hydra.sophos.com
    > Accept: */*
    >
    < HTTP/1.1 200
    < Date: Mon, 04 Mar 2024 19:45:03 GMT
    < Content-Type: application/xml;charset=ISO-8859-1
    < Content-Length: 168
    < Connection: keep-alive
    < Content-Language: en-US
    * Server - is not blacklisted
    < Server: -
    <
    { [data not shown]
    * Connection #0 to host mcs2-cloudstation-us-west-2.prod.hydra.sophos.com left intact
    HTTP/1.1 200
    Date: Mon, 04 Mar 2024 19:45:03 GMT
    Content-Type: application/xml;charset=ISO-8859-1
    Content-Length: 168
    Connection: keep-alive
    Content-Language: en-US
    Server: -
    
    <?xml version="1.0" encoding="UTF-8" standalone="yes"?>
    <ns:server schemaVersion="1.0" preferredProtocolVersion="1.0" xmlns:ns="http://www.sophos.com/xml/mcs/server"/>'
    + curl_exitcode=0
    + [[ 0 == 0 ]]
    + VALID_CENTRAL_CONNECTION=1
    + log_info 'Server can connect to Sophos Central directly'
    + echo 'INFO: Server can connect to Sophos Central directly'
    INFO: Server can connect to Sophos Central directly
    + [[ -n '' ]]
    + [[ 1 == 0 ]]
    + log_info 'Verifying connections to Sophos Update Service (SUS) server'
    + echo 'INFO: Verifying connections to Sophos Update Service (SUS) server'
    INFO: Verifying connections to Sophos Update Service (SUS) server
    + [[ -n '' ]]
    + [[ -n https://sus.sophosupd.com ]]
    + SUS_URL=https://sus.sophosupd.com
    + log_debug 'Using SUS URL from Central'
    + [[ -n '' ]]
    + verify_connection_to_sus
    + local proxy=
    + local curl_output
    + [[ -z '' ]]
    ++ curl --tlsv1.2 --noproxy '*' -is https://sus.sophosupd.com -m 60 -v
    + curl_output='* Rebuilt URL to: https://sus.sophosupd.com/
    * Hostname was NOT found in DNS cache
    *   Trying 3.141.240.252...
    * Connected to sus.sophosupd.com (3.141.240.252) port 443 (#0)
    * successfully set certificate verify locations:
    *   CAfile: none
      CApath: /etc/ssl/certs/
    * SSLv3, TLS handshake, Client hello (1):
    } [data not shown]
    * SSLv3, TLS handshake, Server hello (2):
    { [data not shown]
    * SSLv3, TLS handshake, CERT (11):
    { [data not shown]
    * SSLv3, TLS handshake, Server key exchange (12):
    { [data not shown]
    * SSLv3, TLS handshake, Server finished (14):
    { [data not shown]
    * SSLv3, TLS handshake, Client key exchange (16):
    } [data not shown]
    * SSLv3, TLS change cipher, Client hello (1):
    } [data not shown]
    * SSLv3, TLS handshake, Finished (20):
    } [data not shown]
    * SSLv3, TLS change cipher, Client hello (1):
    { [data not shown]
    * SSLv3, TLS handshake, Finished (20):
    { [data not shown]
    * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
    * Server certificate:
    *        subject: CN=sus.sophosupd.com
    *        start date: 2023-07-24 00:00:00 GMT
    *        expire date: 2024-08-22 23:59:59 GMT
    *        subjectAltName: sus.sophosupd.com matched
    *        issuer: C=US; O=Amazon; CN=Amazon RSA 2048 M01
    *        SSL certificate verify ok.
    > GET / HTTP/1.1
    > User-Agent: curl/7.38.0
    > Host: sus.sophosupd.com
    > Accept: */*
    >
    < HTTP/1.1 200 OK
    < Date: Mon, 04 Mar 2024 19:45:03 GMT
    < Content-Type: application/json
    < Content-Length: 6
    < Connection: keep-alive
    * Server gunicorn is not blacklisted
    < Server: gunicorn
    < x-request-id: Root=1-65e624bf-272a4e2f5ae12ce1272cc774
    <
    { [data not shown]
    * Connection #0 to host sus.sophosupd.com left intact
    HTTP/1.1 200 OK
    Date: Mon, 04 Mar 2024 19:45:03 GMT
    Content-Type: application/json
    Content-Length: 6
    Connection: keep-alive
    Server: gunicorn
    x-request-id: Root=1-65e624bf-272a4e2f5ae12ce1272cc774
    
    200 OK'
    + curl_exitcode=0
    + [[ 0 == 0 ]]
    + VALID_SUS_CONNECTION=1
    + log_info 'Server can connect to the SUS server (https://sus.sophosupd.com) directly'
    + echo 'INFO: Server can connect to the SUS server (https://sus.sophosupd.com) directly'
    INFO: Server can connect to the SUS server (https://sus.sophosupd.com) directly
    + [[ -n '' ]]
    + [[ 1 == 0 ]]
    + log_info 'Verifying connections to the CDN server'
    + echo 'INFO: Verifying connections to the CDN server'
    INFO: Verifying connections to the CDN server
    + [[ -n '' ]]
    + [[ 2 != 0 ]]
    + CDN_URLS=("${cdn_urls_arg[@]}")
    + log_debug 'Using CDN URLs from Central'
    + [[ -n '' ]]
    + CDN_URL=
    + for url in '"${CDN_URLS[@]}"'
    + curl --tlsv1.2 --noproxy '*' -is https://sdds3.sophosupd.com -m 60
    + CDN_URL=https://sdds3.sophosupd.com
    + log_info 'Server can connect to CDN address (https://sdds3.sophosupd.com) directly'
    + echo 'INFO: Server can connect to CDN address (https://sdds3.sophosupd.com) directly'
    INFO: Server can connect to CDN address (https://sdds3.sophosupd.com) directly
    + break
    + [[ -z https://sdds3.sophosupd.com ]]
    + [[ -n https://sdds3.sophosupd.com ]]
    + verify_connection_to_cdn https://sdds3.sophosupd.com
    + local cdn_url=https://sdds3.sophosupd.com
    + local proxy=
    + [[ -z '' ]]
    + successful_downloads=0
    + for supplement in '"${DAT_FILES[@]}"'
    + wget --no-proxy -q --delete-after https://sdds3.sophosupd.com/supplement/sdds3.ScheduledQueryPack.dat -T 12 -t 1
    + successful_downloads=1
    + log_debug 'Connection verified to CDN server, server is able to download sdds3.ScheduledQueryPack.dat supplement from https://sdds3.sophosupd.com directly'
    + [[ -n '' ]]
    + for supplement in '"${DAT_FILES[@]}"'
    + wget --no-proxy -q --delete-after https://sdds3.sophosupd.com/supplement/sdds3.ML_MODEL3_LINUX_X86_64.dat -T 12 -t 1
    + successful_downloads=2
    + log_debug 'Connection verified to CDN server, server is able to download sdds3.ML_MODEL3_LINUX_X86_64.dat supplement from https://sdds3.sophosupd.com directly'
    + [[ -n '' ]]
    + for supplement in '"${DAT_FILES[@]}"'
    + wget --no-proxy -q --delete-after https://sdds3.sophosupd.com/supplement/sdds3.DataSetA.dat -T 12 -t 1
    + successful_downloads=3
    + log_debug 'Connection verified to CDN server, server is able to download sdds3.DataSetA.dat supplement from https://sdds3.sophosupd.com directly'
    + [[ -n '' ]]
    + for supplement in '"${DAT_FILES[@]}"'
    + wget --no-proxy -q --delete-after https://sdds3.sophosupd.com/supplement/sdds3.LocalRepData.dat -T 12 -t 1
    + successful_downloads=4
    + log_debug 'Connection verified to CDN server, server is able to download sdds3.LocalRepData.dat supplement from https://sdds3.sophosupd.com directly'
    + [[ -n '' ]]
    + for supplement in '"${DAT_FILES[@]}"'
    + wget --no-proxy -q --delete-after https://sdds3.sophosupd.com/supplement/sdds3.RuntimeDetectionRules.dat -T 12 -t 1
    + successful_downloads=5
    + log_debug 'Connection verified to CDN server, server is able to download sdds3.RuntimeDetectionRules.dat supplement from https://sdds3.sophosupd.com directly'
    + [[ -n '' ]]
    + for supplement in '"${DAT_FILES[@]}"'
    + wget --no-proxy -q --delete-after https://sdds3.sophosupd.com/supplement/sdds3.SSPLFLAGS.dat -T 12 -t 1
    + successful_downloads=6
    + log_debug 'Connection verified to CDN server, server is able to download sdds3.SSPLFLAGS.dat supplement from https://sdds3.sophosupd.com directly'
    + [[ -n '' ]]
    + [[ 6 -eq 6 ]]
    + VALID_CDN_CONNECTION=1
    + log_info 'Connection verified to CDN server, server was able to download all SPL packages directly'
    + echo 'INFO: Connection verified to CDN server, server was able to download all SPL packages directly'
    INFO: Connection verified to CDN server, server was able to download all SPL packages directly
    + [[ -n '' ]]
    + [[ 1 == 0 ]]
    + [[ -n '' ]]
    + [[ -n '' ]]
    + echo 'SPL can be installed on this system based on the pre-installation checks'
    SPL can be installed on this system based on the pre-installation checks
    + echo
    
    + verify_install_directory
    + [[ -z '' ]]
    + export SOPHOS_INSTALL=/opt/sophos-spl
    + SOPHOS_INSTALL=/opt/sophos-spl
    + return
    + make_tmp_dir
    + '[' -z '' ']'
    ++ sophos_mktempdir SophosCentralInstall
    +++ which mktemp
    ++ _mktemp=/usr/bin/mktemp
    ++ '[' -x /usr/bin/mktemp ']'
    ++ _tmpdirTemplate=/tmp/SophosCentralInstall_XXXXXXX
    +++ /usr/bin/mktemp -d /tmp/SophosCentralInstall_XXXXXXX
    ++ _tmpdir=/tmp/SophosCentralInstall_7VYz8Rs
    ++ '[' 0 = 0 ']'
    ++ '[' '!' -d /tmp/SophosCentralInstall_7VYz8Rs ']'
    ++ echo /tmp/SophosCentralInstall_7VYz8Rs
    + SOPHOS_TEMP_DIRECTORY=/tmp/SophosCentralInstall_7VYz8Rs
    + mkdir -p /tmp/SophosCentralInstall_7VYz8Rs
    + echo 'exit 0'
    + chmod +x /tmp/SophosCentralInstall_7VYz8Rs/exectest
    + /tmp/SophosCentralInstall_7VYz8Rs/exectest
    + test_installation_executable
    + [[ -d /opt/sophos-spl ]]
    + umask 066
    + mkdir -p /opt/sophos-spl
    + umask 077
    + echo 'exit 0'
    + chmod +x /opt/sophos-spl/exectest
    + /opt/sophos-spl/exectest
    + rm -r /opt/sophos-spl
    + [[ -n '' ]]
    + echo 'Installing to /opt/sophos-spl'
    Installing to /opt/sophos-spl
    ++ which sweep
    + SWEEP=
    + '[' -x '' ']'
    + check_SAV_installed /usr/local/bin/sweep
    + local path=/usr/local/bin/sweep
    ++ readlink /usr/local/bin/sweep
    ++ sed 's/bin\/savscan//g'
    + local sav_instdir=
    + [[ '' == '' ]]
    + return
    + check_SAV_installed /usr/bin/sweep
    + local path=/usr/bin/sweep
    ++ readlink /usr/bin/sweep
    ++ sed 's/bin\/savscan//g'
    + local sav_instdir=
    + [[ '' == '' ]]
    + return
    + '[' -n '' ']'
    ++ awk '/^__MIDDLE_BIT__/ {print NR + 1; exit 0; }' ./SophosSetup.sh
    + MIDDLEBIT=1219
    ++ awk '/^__UPDATE_CACHE_CERTS__/ {print NR + 1; exit 0; }' ./SophosSetup.sh
    + UC_CERTS=
    ++ awk '/^__ARCHIVE_BELOW__/ {print NR + 1; exit 0; }' ./SophosSetup.sh
    + ARCHIVE=1228
    + [[ -z 1219 ]]
    + [[ -n '' ]]
    + MIDDLEBIT_SIZE=8
    + CREDENTIALS_FILE_PATH=/tmp/SophosCentralInstall_7VYz8Rs/credentials.txt
    + tail -n+1219 ./SophosSetup.sh
    + head -8
    ++ uname -m
    + [[ x86_64 = \x\8\6\_\6\4 ]]
    + sed -n -e '/^__ARCHIVE_BELOW__$/,/^__ARM64_ARCHIVE_BELOW__$/{ /^__ARCHIVE_BELOW__$/d; /^__ARM64_ARCHIVE_BELOW__$/d; p; }' ./SophosSetup.sh
    + truncate -s -1 /tmp/SophosCentralInstall_7VYz8Rs/installer.tar.gz
    + [[ '' == \n\o\n\e ]]
    + [[ -n '' ]]
    + [[ '' == \n\o\n\e ]]
    + [[ -n '' ]]
    + cd /tmp/SophosCentralInstall_7VYz8Rs
    + '[' -z '' ']'
    ++ grep CUSTOMER_TOKEN= credentials.txt
    ++ sed s/CUSTOMER_TOKEN=//
    + CUSTOMER_TOKEN=4e517576-18ea-4f0d-b2de-308f8539fec0
    + CUSTOMER_TOKEN_ARGUMENT='--customer-token 4e517576-18ea-4f0d-b2de-308f8539fec0'
    + '[' -z '' ']'
    ++ grep -v CUSTOMER_TOKEN= credentials.txt
    ++ sed s/TOKEN=//
    ++ grep TOKEN=
    + CLOUD_TOKEN=e2c71b4f178afbc55b9f2d1fdb04fb23e31538015c58a764e1615750941656e7
    + '[' -z '' ']'
    ++ grep URL= credentials.txt
    ++ sed s/URL=//
    + CLOUD_URL='https://mcs2-cloudstation-us-west-2.prod.hydra.sophos.com/sophos/management/ep
    SDDS3_SUS_sus.sophosupd.com'
    ++ grep MESSAGE_RELAYS= credentials.txt
    ++ sed s/MESSAGE_RELAYS=//
    + MESSAGE_RELAYS=
    + [[ -n '' ]]
    + INSTALL_OPTIONS_FILE=/tmp/SophosCentralInstall_7VYz8Rs/install_options
    ++ grep UPDATE_CACHES= credentials.txt
    ++ sed s/UPDATE_CACHES=//
    + UPDATE_CACHES=
    + [[ -n '' ]]
    ++ grep PRODUCTS= credentials.txt
    ++ sed s/PRODUCTS=//
    + INSTALLER_PRODUCTS=all
    + '[' -n all ']'
    + '[' -z '' ']'
    + '[' all '!=' all ']'
    + REGISTER_CENTRAL=/opt/sophos-spl/base/bin/registerCentral
    + EXISTING_SSPL_PATH=
    + '[' 0 -eq 1 ']'
    + is_sspl_installed
    + systemctl list-unit-files
    + grep -q sophos-spl
    + '[' -d /opt/sophos-spl ']'
    + tar -zxf installer.tar.gz
    + rm -f installer.tar.gz
    + export LD_LIBRARY_PATH=installer/bin64:installer/bin32
    + LD_LIBRARY_PATH=installer/bin64:installer/bin32
    + echo 'Installation process for Sophos Protection for Linux started'
    Installation process for Sophos Protection for Linux started
    + MCS_TOKEN=e2c71b4f178afbc55b9f2d1fdb04fb23e31538015c58a764e1615750941656e7
    + MCS_URL='https://mcs2-cloudstation-us-west-2.prod.hydra.sophos.com/sophos/management/ep
    SDDS3_SUS_sus.sophosupd.com'
    + umask 066
    + mkdir -p /opt/sophos-spl/base/etc/sophosspl
    + CREATED_INSTALL_DIRECTORY=1
    + umask 077
    + [[ -n '' ]]
    + cat
    + [[ -n '' ]]
    ++ hostname -f
    + echo -n Logistica230
    + export SOPHOS_HOSTNAME_F=/tmp/SophosCentralInstall_7VYz8Rs/SOPHOS_HOSTNAME_F
    + SOPHOS_HOSTNAME_F=/tmp/SophosCentralInstall_7VYz8Rs/SOPHOS_HOSTNAME_F
    + FORCE_UNINSTALL_SAV=0
    + bin/installer credentials.txt e2c71b4f178afbc55b9f2d1fdb04fb23e31538015c58a764e1615750941656e7 https://mcs2-cloudstation-us-west-2.prod.hydra.sophos.com/sophos/management/ep SDDS3_SUS_sus.sophosupd.com --customer-token 4e517576-18ea-4f0d-b2de-308f8539fec0 ''
    Attempting to connect to Sophos Central
    Successfully verified connection to Sophos Central
    + handle_register_errorcodes 0
    + errcode=0
    + [[ 0 -eq 0 ]]
    + echo 'Successfully registered with Sophos Central'
    Successfully registered with Sophos Central
    + mkdir -p /opt/sophos-spl/base/update/rootcerts
    + mkdir -p /opt/sophos-spl/base/update/var/updatescheduler
    + mkdir -p /opt/sophos-spl/var/sophosspl
    + mkdir -p /opt/sophos-spl/base/update/cache
    + mkdir -p /opt/sophos-spl/var/lock
    + mkdir -p /opt/sophos-spl/var/lock-sophosspl
    + CERT=bin/../rootca.crt
    + [[ -n '' ]]
    + [[ -f bin/../rootca.crt ]]
    + cp bin/../rootca.crt /opt/sophos-spl/base/update/rootcerts/rootca.crt
    + CERT=bin/../rootca384.crt
    + [[ -n '' ]]
    + [[ -f bin/../rootca384.crt ]]
    + cp bin/../rootca384.crt /opt/sophos-spl/base/update/rootcerts/rootca384.crt
    + [[ -n '' ]]
    + [[ -n '' ]]
    + [[ -n '' ]]
    + [[ -n '' ]]
    + [[ -n '' ]]
    + [[ -n '' ]]
    + [[ -n '' ]]
    + [[ -n '' ]]
    + cp mcs.config /opt/sophos-spl/base/etc
    + cp mcsPolicy.config /opt/sophos-spl/base/etc/sophosspl/mcs.config
    + cp mcs_policy.config /opt/sophos-spl/base/etc/sophosspl/mcs_policy.config
    + [[ -n '' ]]
    + [[ -n '' ]]
    + [[ -n '' ]]
    + INSTALL_OPTIONS_FILE=/tmp/SophosCentralInstall_7VYz8Rs/install_options
    + bin/SulDownloader update_config.json /opt/sophos-spl/base/update/var/updatescheduler/update_report.json
    + INSTALL_OPTIONS_FILE=/tmp/SophosCentralInstall_7VYz8Rs/install_options
    + bin/SulDownloader update_config.json /opt/sophos-spl/base/update/var/updatescheduler/update_report.json
    [19:47:07] Timeout getting product status
    [19:47:30] Installation failed
    [19:48:17] Installation failed
    [19:48:39] Installation failed
    [19:49:06] Installation failed
    [19:49:27] Installation failed
    [19:49:55] Installation failed
    [19:50:16] Installation failed
    [19:50:47] Installation failed
    + inst_ret=103
    + handle_installer_errorcodes 103
    + errcode=103
    + [[ 103 -eq 0 ]]
    + [[ 103 -eq 103 ]]
    + failure 18 'Failed to install at least one of the packages, see logs for details'
    + code=18
    + removeinstall=1
    + [[ -n '' ]]
    + [[ 1 == 0 ]]
    + echo 'Failed to install at least one of the packages, see logs for details'
    Failed to install at least one of the packages, see logs for details
    + [[ -s /opt/sophos-spl/logs/base/suldownloader.log ]]
    + echo '-- Output from suldownloader log:'
    -- Output from suldownloader log:
    + cat /opt/sophos-spl/logs/base/suldownloader.log
    0       [2024-03-04T19:45:13.345]    INFO [6674812864] root <> Logger suldownloader co       nfigured for level: INFO
    0       [2024-03-04T19:45:13.345]    INFO [6674812864] suldownloader <> SulDownloader        1.2.6 started
    3       [2024-03-04T19:45:13.348]    INFO [6674812864] suldownloader <> Doing product        and supplement update
    3       [2024-03-04T19:45:13.348]    INFO [6674812864] suldownloader <> Running SDDS3        update
    6       [2024-03-04T19:45:13.351]    INFO [6674812864] SulDownloaderSDDS3 <> Failed to        find config file: /opt/sophos-spl/base/update/var/package_config.xml
    6       [2024-03-04T19:45:13.351]    INFO [6674812864] SulDownloaderSDDS3 <> Trying SU       S request (https://sus.sophosupd.com) without proxy
    417     [2024-03-04T19:45:13.762]    INFO [6674812864] SulDownloaderSDDS3 <> SUS Reque       st was successful
    417     [2024-03-04T19:45:13.762]    INFO [6674812864] SulDownloaderSDDS3 <> Suite: 's       dds3.ServerProtectionLinux-Base_2024.1.0.7.0.b0e3bb1825.dat' is available to be downlo       aded.
    418     [2024-03-04T19:45:13.762]    INFO [6674812864] SulDownloaderSDDS3 <> Connectin       g to update source directly
    418     [2024-03-04T19:45:13.763]    INFO [6674812864] SulDownloaderSDDS3 <> Performin       g Sync using https://sdds3.sophosupd.com
    91040   [2024-03-04T19:46:44.385]    INFO [6674812864] suldownloaderdata <> Product ve       rified: ServerProtectionLinux-Base-component
    91570   [2024-03-04T19:46:44.914]    INFO [6674812864] suldownloaderdata <> Product ve       rified: ServerProtectionLinux-Plugin-responseactions
    92838   [2024-03-04T19:46:46.183]    INFO [6674812864] suldownloaderdata <> Product ve       rified: ServerProtectionLinux-Plugin-liveresponse
    99254   [2024-03-04T19:46:52.599]    INFO [6674812864] suldownloaderdata <> Product ve       rified: ServerProtectionLinux-Plugin-RuntimeDetections
    99554   [2024-03-04T19:46:52.899]    INFO [6674812864] suldownloaderdata <> Product ve       rified: ServerProtectionLinux-Plugin-EventJournaler
    103865  [2024-03-04T19:46:57.210]    INFO [6674812864] suldownloaderdata <> Product ve       rified: ServerProtectionLinux-Plugin-EDR
    104066  [2024-03-04T19:46:57.411]    INFO [6674812864] suldownloaderdata <> Product ve       rified: ServerProtectionLinux-Plugin-DeviceIsolation
    112049  [2024-03-04T19:47:05.393]    INFO [6674812864] suldownloaderdata <> Product ve       rified: ServerProtectionLinux-Plugin-AV
    114100  [2024-03-04T19:47:07.445]   ERROR [6674812864] suldownloader <> Timeout gettin       g product status
    114292  [2024-03-04T19:47:07.637]    INFO [6674812864] suldownloaderdata <> Installing        product: ServerProtectionLinux-Base-component version: 1.2.7.1.2
    136787  [2024-03-04T19:47:30.132]   ERROR [6674812864] suldownloaderdata <> Installati       on failed
    136809  [2024-03-04T19:47:30.153]    INFO [6674812864] suldownloaderdata <> Installing        product: ServerProtectionLinux-Plugin-responseactions version: 1.0.3.1.1
    184342  [2024-03-04T19:48:17.687]   ERROR [6674812864] suldownloaderdata <> Installati       on failed
    184343  [2024-03-04T19:48:17.687]    INFO [6674812864] suldownloaderdata <> Installing        product: ServerProtectionLinux-Plugin-liveresponse version: 1.7.4.1.2
    205874  [2024-03-04T19:48:39.219]   ERROR [6674812864] suldownloaderdata <> Installati       on failed
    205874  [2024-03-04T19:48:39.219]    INFO [6674812864] suldownloaderdata <> Installing        product: ServerProtectionLinux-Plugin-RuntimeDetections version: 5.8.0.1.942
    233128  [2024-03-04T19:49:06.473]   ERROR [6674812864] suldownloaderdata <> Installati       on failed
    233129  [2024-03-04T19:49:06.474]    INFO [6674812864] suldownloaderdata <> Installing        product: ServerProtectionLinux-Plugin-EventJournaler version: 1.0.8.1.1
    254450  [2024-03-04T19:49:27.794]   ERROR [6674812864] suldownloaderdata <> Installati       on failed
    254450  [2024-03-04T19:49:27.795]    INFO [6674812864] suldownloaderdata <> Installing        product: ServerProtectionLinux-Plugin-EDR version: 1.1.12.1.1
    281948  [2024-03-04T19:49:55.293]   ERROR [6674812864] suldownloaderdata <> Installati       on failed
    281948  [2024-03-04T19:49:55.293]    INFO [6674812864] suldownloaderdata <> Installing        product: ServerProtectionLinux-Plugin-DeviceIsolation version: 1.0.0.1.211
    303474  [2024-03-04T19:50:16.819]   ERROR [6674812864] suldownloaderdata <> Installati       on failed
    303474  [2024-03-04T19:50:16.819]    INFO [6674812864] suldownloaderdata <> Installing        product: ServerProtectionLinux-Plugin-AV version: 1.1.4.1.3
    334158  [2024-03-04T19:50:47.503]   ERROR [6674812864] suldownloaderdata <> Installati       on failed
    334302  [2024-03-04T19:50:47.646]    WARN [6674812864] suldownloader <> Update failed,        with code: 103
    334302  [2024-03-04T19:50:47.646]    INFO [6674812864] suldownloader <> Generating the        report file in: /opt/sophos-spl/base/update/var/updatescheduler
    + [[ 1 -eq 1 ]]
    + is_sspl_installed
    + systemctl list-unit-files
    + grep -q sophos-spl
    + cleanup_and_exit 18
    + code=18
    + [[ 18 -eq 0 ]]
    + exit 18
    

  • Adicional a esto, el plugin de cada servicio, veo que indica esto en todos,

    Failed to start runtimedetections: Timeout out connecting to watchdog: No incoming data on ZMQ socket

    /opt/sophos-spl/tmp /tmp/SophosCentralInstall_7VYz8Rs
    /tmp/SophosCentralInstall_7VYz8Rs
    
    + EXIT_FAIL_CREATE_DIRECTORY=10
    + EXIT_FAIL_FIND_GROUPADD=11
    + EXIT_FAIL_ADD_GROUP=12
    + EXIT_FAIL_FIND_USERADD=13
    + EXIT_FAIL_ADDUSER=14
    + EXIT_FAIL_FIND_GETENT=15
    + EXIT_FAIL_WDCTL_FAILED_TO_COPY=16
    + EXIT_FAIL_WDCTL_FAILED_TO_START=17
    + EXIT_FAIL_VERSIONEDCOPY=20
    + EXIT_FAIL_SERVICE=40
    + EXIT_FAIL_SET_CAPABILITIES=50
    + EXIT_FAIL_SUPPLEMENT_INSTALL=60
    ++ pwd
    + STARTINGDIR=/tmp/SophosCentralInstall_7VYz8Rs
    + SCRIPTDIR=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections
    + [[ /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections == \/\o\p\t\/\s\o\p\h\o\s\-\s\p\l\/\b\a\s\e\/\u\p\d\a\t\e\/\c\a\c\h\e\/\s\d\d\s\3\p\r\i\m\a\r\y\/\S\e\r\v\e\r\P\r\o\t\e\c\t\i\o\n\L\i\n\u\x\-\P\l\u\g\i\n\-\R\u\n\t\i\m\e\D\e\t\e\c\t\i\o\n\s\/\i\n\s\t\a\l\l\.\s\h ]]
    ++ cd /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections
    ++ pwd
    + ABS_SCRIPTDIR=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections
    + [[ -n '' ]]
    + DIST=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections
    + [[ -n /opt/sophos-spl ]]
    + [[ -n '' ]]
    + PLUGIN_NAME=runtimedetections
    + [[ -n '' ]]
    + PRODUCT_LINE_ID=ServerProtectionLinux-Plugin-RuntimeDetections
    + export DIST
    + export SOPHOS_INSTALL
    + USER_NAME=sophos-spl-user
    + GROUP_NAME=sophos-spl-group
    + source /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/cleanupinstall.sh
    ++ [[ -n /opt/sophos-spl ]]
    + source /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/checkAndRunExtraUpgrade.sh
    ++ VERSION=
    ++ [[ -n /opt/sophos-spl ]]
    + is_already_installed
    + [[ -d /opt/sophos-spl/plugins/runtimedetections/bin/ ]]
    + check_for_upgrade /opt/sophos-spl/plugins/runtimedetections/VERSION.ini ServerProtectionLinux-Plugin-RuntimeDetections /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections
    + VERSIONINI=/opt/sophos-spl/plugins/runtimedetections/VERSION.ini
    + PRODUCT_LINE_ID=ServerProtectionLinux-Plugin-RuntimeDetections
    + DIST=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections
    + [[ ! -f /opt/sophos-spl/plugins/runtimedetections/VERSION.ini ]]
    + return 0
    + find /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/files/plugins -type f -print0
    + xargs -0 /opt/sophos-spl/base/bin/versionedcopy
    + generate_manifest_diff /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections ServerProtectionLinux-Plugin-RuntimeDetections
    + local WORKING_DIST=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections
    + local PRODUCT_RIGID_NAME=ServerProtectionLinux-Plugin-RuntimeDetections
    + local BASE_MANIFEST_DIFF=/opt/sophos-spl/base/bin/manifestdiff
    + [[ -f /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/files/base/bin/manifestdiff ]]
    + MANIFEST_DIFF=/opt/sophos-spl/base/bin/manifestdiff
    ++ find /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/ -name '*manifest.dat'
    + for CID_MANIFEST_FILE in '$(find "$WORKING_DIST"/ -name '\''*manifest.dat'\'')'
    + local NEW_MANIFEST=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/rdrules-manifest.dat
    ++ basename /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/rdrules-manifest.dat
    + local BASE_NAME=rdrules-manifest.dat
    + local OLD_MANIFEST_DIR=/opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections
    + local OLD_MANIFEST=/opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections/rdrules-manifest.dat
    + /opt/sophos-spl/base/bin/manifestdiff --old=/opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections/rdrules-manifest.dat --new=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/rdrules-manifest.dat --added=/opt/sophos-spl/tmp/ServerProtectionLinux-Plugin-RuntimeDetections/addedFiles_rdrules-manifest.dat --removed=/opt/sophos-spl/tmp/ServerProtectionLinux-Plugin-RuntimeDetections/removedFiles_rdrules-manifest.dat --diff=/opt/sophos-spl/tmp/ServerProtectionLinux-Plugin-RuntimeDetections/changedFiles_rdrules-manifest.dat
    + for CID_MANIFEST_FILE in '$(find "$WORKING_DIST"/ -name '\''*manifest.dat'\'')'
    + local NEW_MANIFEST=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/manifest.dat
    ++ basename /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/manifest.dat
    + local BASE_NAME=manifest.dat
    + local OLD_MANIFEST_DIR=/opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections
    + local OLD_MANIFEST=/opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections/manifest.dat
    + /opt/sophos-spl/base/bin/manifestdiff --old=/opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections/manifest.dat --new=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/manifest.dat --added=/opt/sophos-spl/tmp/ServerProtectionLinux-Plugin-RuntimeDetections/addedFiles_manifest.dat --removed=/opt/sophos-spl/tmp/ServerProtectionLinux-Plugin-RuntimeDetections/removedFiles_manifest.dat --diff=/opt/sophos-spl/tmp/ServerProtectionLinux-Plugin-RuntimeDetections/changedFiles_manifest.dat
    + return 0
    + ln -snf /opt/sophos-spl/plugins/runtimedetections/bin/uninstall.sh /opt/sophos-spl/base/update/var/installedproducts/ServerProtectionLinux-Plugin-RuntimeDetections.sh
    + ln -snf /opt/sophos-spl/plugins/runtimedetections/VERSION.ini /opt/sophos-spl/base/update/var/installedproductversions/ServerProtectionLinux-Plugin-RuntimeDetections.ini
    + TEMP_REG_FILE=/opt/sophos-spl/tmp/runtimedetections.json
    + sed 's;SOPHOS_INSTALL_VALUE;/opt/sophos-spl;g' /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/files/base/pluginRegistry/runtimedetections.json
    + /opt/sophos-spl/bin/wdctl copyPluginRegistration /opt/sophos-spl/tmp/runtimedetections.json
    + rm -f /opt/sophos-spl/tmp/runtimedetections.json
    + '[' '!' -d /opt/sophos-spl/plugins/runtimedetections/log ']'
    + mkdir /opt/sophos-spl/plugins/runtimedetections/log
    + '[' '!' -f /opt/sophos-spl/plugins/runtimedetections/log/runtimedetections.log ']'
    + touch /opt/sophos-spl/plugins/runtimedetections/log/runtimedetections.log
    + '[' '!' -d /opt/sophos-spl/plugins/runtimedetections/var/lib ']'
    + '[' '!' -d /opt/sophos-spl/plugins/runtimedetections/var/run ']'
    + mkdir /opt/sophos-spl/plugins/runtimedetections/var/run
    + '[' '!' -d /opt/sophos-spl/plugins/runtimedetections/etc/content_rules ']'
    + mkdir -p /opt/sophos-spl/plugins/runtimedetections/etc/content_rules
    + '[' '!' -d /opt/sophos-spl/plugins/runtimedetections/etc/content_rules/bpf ']'
    + mkdir -p /opt/sophos-spl/plugins/runtimedetections/etc/content_rules/bpf
    + software_changed /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections ServerProtectionLinux-Plugin-RuntimeDetections
    + local WORKING_DIST=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections
    + local PRODUCT_RIGID_NAME=ServerProtectionLinux-Plugin-RuntimeDetections
    ++ find /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/ -name '*manifest.dat'
    + for CID_MANIFEST_FILE in '$(find "$WORKING_DIST/" -name "*manifest.dat")'
    + local NEW_MANIFEST=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/rdrules-manifest.dat
    ++ basename /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/rdrules-manifest.dat
    + local BASE_NAME=rdrules-manifest.dat
    + '[' -s /opt/sophos-spl/tmp/ServerProtectionLinux-Plugin-RuntimeDetections/addedFiles_rdrules-manifest.dat ']'
    + return 0
    + perform_cleanup /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections ServerProtectionLinux-Plugin-RuntimeDetections
    + local WORKING_DIST=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections
    + local PRODUCT_RIGID_NAME=ServerProtectionLinux-Plugin-RuntimeDetections
    + pushd /opt/sophos-spl/tmp/
    ++ ls -d ServerProtectionLinux-Base-component/ ServerProtectionLinux-Plugin-RuntimeDetections/ ServerProtectionLinux-Plugin-liveresponse/ ServerProtectionLinux-Plugin-responseactions/
    + local 'DATA_FOLDERS=ServerProtectionLinux-Base-component/
    ServerProtectionLinux-Plugin-RuntimeDetections/
    ServerProtectionLinux-Plugin-liveresponse/
    ServerProtectionLinux-Plugin-responseactions/'
    + popd
    + FILES_OR_DIRECTORIES_DELETED=
    ++ find /opt/sophos-spl/tmp/ServerProtectionLinux-Plugin-RuntimeDetections -name 'removedFiles*'
    + for FILES_TO_REMOVE_DATA_FILE in '$(find "${SOPHOS_INSTALL}/tmp/${PRODUCT_RIGID_NAME}" -name "removedFiles*")'
    ++ cat /opt/sophos-spl/tmp/ServerProtectionLinux-Plugin-RuntimeDetections/removedFiles_rdrules-manifest.dat
    ++ xargs -ri expr '{}' : '[^/]*/\(.*\)'
    ++ xargs -ri echo '/opt/sophos-spl/{}'
    + for FILES_TO_REMOVE_DATA_FILE in '$(find "${SOPHOS_INSTALL}/tmp/${PRODUCT_RIGID_NAME}" -name "removedFiles*")'
    ++ cat /opt/sophos-spl/tmp/ServerProtectionLinux-Plugin-RuntimeDetections/removedFiles_manifest.dat
    ++ xargs -ri expr '{}' : '[^/]*/\(.*\)'
    ++ xargs -ri echo '/opt/sophos-spl/{}'
    + [[ -f /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/filestodelete.dat ]]
    ++ cat /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/filestodelete.dat
    + for SPECIFIC_FILE_TO_DELETE in '$(cat "${WORKING_DIST}/filestodelete.dat")'
    + [[ plugins/runtimedetections/var/lib/sophos != */* ]]
    ++ 'can_delete /opt/sophos-spl/plugins/runtimedetections/var/lib/sophos' /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections
    /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/cleanupinstall.sh: line 219: can_delete /opt/sophos-spl/plugins/runtimedetections/var/lib/sophos: No such file or directory
    + [[ '' == 1 ]]
    + for SPECIFIC_FILE_TO_DELETE in '$(cat "${WORKING_DIST}/filestodelete.dat")'
    + [[ capsule8* != */* ]]
    ++ find /opt/sophos-spl -name 'capsule8*'
    + for dirname in base plugins bin
    + find /opt/sophos-spl/base -xtype l -delete
    + for dirname in base plugins bin
    + find /opt/sophos-spl/plugins -xtype l -delete
    + for dirname in base plugins bin
    + find /opt/sophos-spl/bin -xtype l -delete
    + [[ ! -z '' ]]
    + CONTENT_DEST=/opt/sophos-spl/plugins/runtimedetections/etc/content_rules/rules.yaml
    + CONTENT_NEW=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/runtimedetections-content.yaml
    + cp /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/runtimedetections-content.yaml /opt/sophos-spl/plugins/runtimedetections/etc/content_rules/rules.yaml
    + DEFAULT_INSTALL_PATH=/opt/sophos-spl
    ++ sed 's:["\\/]:\\\0:g'
    ++ echo /opt/sophos-spl
    + SED_INSTALL_PATH='\/opt\/sophos-spl'
    + '[' /opt/sophos-spl '!=' /opt/sophos-spl ']'
    + CONTENT_BPF_DEST=/opt/sophos-spl/plugins/runtimedetections/etc/content_rules/bpf
    + CONTENT_BPF_NEW=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/bpf
    + rm -f '/opt/sophos-spl/plugins/runtimedetections/etc/content_rules/bpf/*'
    + [[ -d /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/bpf ]]
    + cp /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/bpf/test.bpf.c /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/bpf/test.bpf.o /opt/sophos-spl/plugins/runtimedetections/etc/content_rules/bpf/
    + pushd /opt/sophos-spl/plugins/runtimedetections
    + chmod 0750 .
    + chown root:sophos-spl-group .
    + chmod -R 0710 ./bin/
    + chown -R root:sophos-spl-group ./bin/
    + xargs chmod 0750
    + find ./etc -type d
    + xargs chmod 0640
    + find ./etc -type f
    + chown -R root:sophos-spl-group ./etc/
    + chmod 0700 ./log/
    + chmod -f 0600 ./log/runtimedetections.log
    + chown -R sophos-spl-user:sophos-spl-group ./log/
    + chmod 0750 ./var/
    + chown root:sophos-spl-group ./var/
    + xargs chmod 0750
    + find ./var/lib/ -type d
    + xargs chmod 0640
    + find ./var/lib/ -type f
    + chown -R root:sophos-spl-group ./var/lib/
    + chmod 0750 ./var/run/
    + chmod -f 0640 './var/run/*'
    + chown -R sophos-spl-user:sophos-spl-group ./var/run
    + chmod 0640 ./VERSION.ini ./VERSION.ini.0
    + chown root:sophos-spl-group ./VERSION.ini ./VERSION.ini.0
    + sed -i 's/SOPHOS_INSTALL/\/opt\/sophos-spl/g' ./etc/analytics.yaml
    + sed -i 's/SOPHOS_INSTALL/\/opt\/sophos-spl/g' ./etc/sensor.yaml
    + popd
    + copy_manifests /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections ServerProtectionLinux-Plugin-RuntimeDetections
    + local WORKING_DIST=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections
    + local PRODUCT_RIGID_NAME=ServerProtectionLinux-Plugin-RuntimeDetections
    ++ find /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/ -name '*manifest.dat'
    + for CID_MANIFEST_FILE in '$(find "$WORKING_DIST"/ -name "*manifest.dat")'
    + local NEW_MANIFEST=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/rdrules-manifest.dat
    ++ basename /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/rdrules-manifest.dat
    + local BASE_NAME=rdrules-manifest.dat
    + local OLD_MANIFEST_DIR=/opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections
    + mkdir -p /opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections
    + cp /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/content_rules/rdrules-manifest.dat /opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections
    + chmod 600 /opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections/rdrules-manifest.dat
    + for CID_MANIFEST_FILE in '$(find "$WORKING_DIST"/ -name "*manifest.dat")'
    + local NEW_MANIFEST=/opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/manifest.dat
    ++ basename /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/manifest.dat
    + local BASE_NAME=manifest.dat
    + local OLD_MANIFEST_DIR=/opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections
    + mkdir -p /opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections
    + cp /opt/sophos-spl/base/update/cache/sdds3primary/ServerProtectionLinux-Plugin-RuntimeDetections/manifest.dat /opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections
    + chmod 600 /opt/sophos-spl/base/update/ServerProtectionLinux-Plugin-RuntimeDetections/manifest.dat
    + /opt/sophos-spl/bin/wdctl start runtimedetections --quiet
    Failed to start runtimedetections: Timeout out connecting to watchdog: No incoming data on ZMQ socket
    + failure 17 'Failed to start plugin runtimedetections'
    + local CODE=17
    + shift
    + echo 'Failed to start plugin runtimedetections'
    Failed to start plugin runtimedetections
    + exit 17
    

  • I see in an earlier message you posted, the OS reported back on your system is: openSUSE-13.2

    Please find the list of supported operating systems at the link below. 
    - Sophos Protection Linux Supported Platforms

    I see the following where version 13 is not listed:

    • SUSE Linux Enterprise Server 12
    • SUSE Linux Enterprise Server 15

    Can you try this installation on a system running OpenSUSE 15 instead? Please keep in mind the additional requirements.

    Kushal Lakhan
    Team Lead, Global Community Support
    Connect with Sophos Support, get alerted, and be informed.
    If a post solves your question, please use the "Verify Answer" button.
    The New Home of Sophos Support Videos!  Visit Sophos Techvids
  • No, I mean the temporary directory created in /tmp

    For this installation the directory was /tmp/SophosCentralInstall_7VYz8Rs

    The plugins are failing to install because base has failed to install. So we need to work out what has gone wrong with base.

    I think at this point it would be best to raise a case with Sophos Support so that this can get investigated properly.

    As Qoosh says, we do not test on OpenSUSE, so it may be there is some incompatibility of SPL with OpenSUSE 13. It may be better to start with SLES 15, and then it is more likely to work. Your kernel is 10 years out of date, so likely to be vulnerable to many issues fixed in more recent kernels.

  • Tengo varios equipos con version 15 y van bien de momento el lio es con esa version 13, gracias

Reply Children
No Data