This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Firewall sending many "new firmware" notifications today

Hi,

a SFOS 19.0.1 Firewall is sending notifications via mail and system log about new firmware today. They are much too frequent.

Probably something has gone bad while you were pushing the firmware to new machines.

When I logged on the notification popup was definitely about 19.5. MR1  - not 19.0.2. I dismissed the message and ticked: do not show again. That was at about 14:00 today.

In the firmware menu there is only the update to 19.0.2 shown.

manual search brings "No upgrades available"



This thread was automatically locked due to age.
  • Hello LHerzog,

    Thank you for contacting the Sophos Community.

    I received two, but with 1-minute difference. 

    I believe one would be for 19.5 and the other for 19.0 MR2 

    Since you are in 19.0 MR1 and 19.0 MR2 is already showing, when pressing it probably won't show 19.5

    Is this the only Firewall you have on 19.0 MR1 where you notice this?

    Regards,


     
    Emmanuel (EmmoSophos)
    Technical Team Lead, Global Community Support
    Sophos Support VideosProduct Documentation  |  @SophosSupport  | Sign up for SMS Alerts
    If a post solves your question use the 'Verify Answer' link.
  • Hi  

    we're still receiving the notifications frquently. See list below. Have never seen that for new firmware versions before.

    Today a new popup appeared for 19.0.2

    I dismissed it with checkbox set.

    2023-02-23 09:15:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 08:45:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 08:00:28,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 07:30:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 07:15:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 07:00:28,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 06:45:28,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 06:30:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 05:00:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 04:45:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 02:30:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 02:15:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 01:00:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-23 00:45:28,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 23:45:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 23:30:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 23:00:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 22:45:28,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 22:00:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 21:45:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 20:45:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 20:30:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 20:00:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 19:45:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 18:45:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 17:45:28,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 16:00:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 15:44:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 14:44:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 14:29:28,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 14:14:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 13:59:28,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 13:29:27,Up2Date,Successful,,New firmware is available for installation. ,17513,
    2023-02-22 13:14:28,Up2Date,Successful,,New firmware is available for installation. ,17513,

    An other machine with 19.0.1 only sent one notification. That was it.

    SYSTEM
    2023-02-22 15:03:27
    Up2Date
    Successful
    New firmware is available for installation.

    So it seems like this is the only cluster we have with that issue.

    What can we do except upgrading?

  • one thing that might be relevant, but I don't think so:

    CSC is currently in debug mode for a support case about heartbeat issues.

  • getting 19.5.1 popup again...

  • Check the U2D.log on the firewall. I assume, somehow your firewall is cycling between both releases (19.0 MR2 and V19.5 GA). 

    __________________________________________________________________________________________________________________

  • your firewall is cycling between both releases (19.0 MR2 and V19.5 GA). 

    that is probably true. got the 19.0.2 popup again

    Whe nI clicked Don't upgrade yet at the same time I got the new version notification again. Logged out of webadmin and back again.

    Then the other popup appeared again with the other version

    can check this tomorrow.

  • Hello LHErzog,

    Thank you for the follow up and the information.

    Would you mind sharing the Case ID where you enable Access ID so we can take a look at this?

    Regards,


     
    Emmanuel (EmmoSophos)
    Technical Team Lead, Global Community Support
    Sophos Support VideosProduct Documentation  |  @SophosSupport  | Sign up for SMS Alerts
    If a post solves your question use the 'Verify Answer' link.
  • Still receiving many notifications.

    I checked the u2d log today:

    DEBUG     2023-02-27 08:35:29Z [29750]: --serial = C42xxxxxxxxxx9CF
    DEBUG     2023-02-27 08:35:29Z [29750]: --deviceid = 6d848b4dxxxxxxxxxxxxxxxxxxxxx53c8d03
    DEBUG     2023-02-27 08:35:29Z [29750]: --fwversion = 19.0.1.365
    DEBUG     2023-02-27 08:35:29Z [29750]: --productcode = CN
    DEBUG     2023-02-27 08:35:29Z [29750]: --model = XG430
    DEBUG     2023-02-27 08:35:29Z [29750]: --vendor = WP02
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_ips_version = 18.20.18
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_ips_cv = 19.0
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_ips_type = ips_app
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_atp_version = 1.0.0458
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_atp_cv = 1.00
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_savi_version = 1.0.18534
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_savi_cv = 1.00
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_avira_version = 1.0.421087
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_avira_cv = 4.00
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_apfw_version = 11.0.020
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_apfw_cv = 1.00
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_sslvpn_version = 1.0.009
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_sslvpn_cv = 1.02
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_ipsec_version = 2.2.090
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_ipsec_cv = 1.00
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_geoip_version = 2.0.019
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_geoip_cv = 1.00
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_clientauth_version = 1.0.0020
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_clientauth_cv = 2.00
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_redfw_version = 3.0.008
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_redfw_cv = 2.00
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_odt_version = 1.0.006
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_odt_cv = 1.00
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_sasi_version = 1.0.257
    DEBUG     2023-02-27 08:35:29Z [29750]: --pkg_sasi_cv = 1.00
    DEBUG     2023-02-27 08:35:29Z [29750]: --oem = Sophos
    DEBUG     2023-02-27 08:35:29Z [29750]: --central_mgmt = 1.0
    DEBUG     2023-02-27 08:35:29Z [29750]: --server = u2d.sophos.com
    DEBUG     2023-02-27 08:35:29Z [29750]: --port = 443
    DEBUG     2023-02-27 08:35:29Z [29750]: Added new server : Host - u2d.sophos.com, Port - 443
    DEBUG     2023-02-27 08:35:29Z [29750]: --u2d_proto = 2.00
    DEBUG     2023-02-27 08:35:29Z [29750]: Final query string is :
    ?&serialkey=C42xxxxxxxxxx9CF&deviceid=6d848b4dxxxxxxxxxxxxxxxxxxxxx53c8d03&fwversion=19.0.1.365&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.20.18&pkg_ips_type=ips_app&pkg_ips_cv=19.0&pkg_atp_version=1.0.0458&pkg_atp_cv=1.00&pkg_savi_version=1.0.18534&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.421087&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.019&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0020&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.020&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.008&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.009&pkg_sslvpn_cv=1.02&pkg_ipsec_version=2.2.090&pkg_ipsec_cv=1.00&central_mgmt=1.0&pkg_odt_version=1.0.006&pkg_odt_cv=1.00&pkg_sasi_version=1.0.257&pkg_sasi_cv=1.00&u2d_proto=2.00
    DEBUG     2023-02-27 08:35:29Z [29750]: Response code : 200
    DEBUG     2023-02-27 08:35:29Z [29750]: Response body :
    <Up2Date>
      <Package u2dtype="firmware" requiresMandatoryUpdate="1">
        <File name="HW-19.0.2_MR-2.SF300-472.sig">
          <location>https://xg-up2date-firmwares.sophosupd.com/HW/HW-19.0.2_MR-2.SF300-472.sig</location>
          <version>SFOS 19.0.2 MR2-Build472</version>
          <fwversion>19.0.2.472</fwversion>
          <appmodel>XG430</appmodel>
          <appvendor>WP02</appvendor>
          <productcode>CN</productcode>
          <size>456856451</size>
          <md5sum>c50f2d24793899ff5cec8700c72beb4a</md5sum>
          <release>MR</release>
          <releasenotes>https://xg-up2date-firmwares.sophosupd.com/CHANGELOG/19.0.2.472.releasenotes</releasenotes>
          <message>Sophos Firewall MR Release</message>
          <releasedate>2023-01-23</releasedate>
        </File>
      </Package>
    </Up2Date>
    
    DEBUG     2023-02-27 08:35:29Z [29750]: Response length : 768
    DEBUG     2023-02-27 08:35:29Z [29750]: Received requiresMandatoryUpdate = 1
    DEBUG     2023-02-27 08:35:29Z [29750]: Received name : HW-19.0.2_MR-2.SF300-472.sig
    DEBUG     2023-02-27 08:35:29Z [29750]: Received location : https://xg-up2date-firmwares.sophosupd.com/HW/HW-19.0.2_MR-2.SF300-472.sig
    DEBUG     2023-02-27 08:35:29Z [29750]: Received version : SFOS 19.0.2 MR2-Build472
    DEBUG     2023-02-27 08:35:29Z [29750]: Received fwversion : 19.0.2.472
    DEBUG     2023-02-27 08:35:29Z [29750]: Received appmodel : XG430
    DEBUG     2023-02-27 08:35:29Z [29750]: Received appvendor : WP02
    DEBUG     2023-02-27 08:35:29Z [29750]: Received productcode : CN
    DEBUG     2023-02-27 08:35:29Z [29750]: Received size : 456856451
    DEBUG     2023-02-27 08:35:29Z [29750]: Received md5sum : c50f2d24793899ff5cec8700c72beb4a
    DEBUG     2023-02-27 08:35:29Z [29750]: Received release : MR
    DEBUG     2023-02-27 08:35:29Z [29750]: Received releasenotes : https://xg-up2date-firmwares.sophosupd.com/CHANGELOG/19.0.2.472.releasenotes
    DEBUG     2023-02-27 08:35:29Z [29750]: Received message : Sophos Firewall MR Release
    DEBUG     2023-02-27 08:35:29Z [29750]: Received releasedate : 2023-01-23
    

    Then I received new firmware notification:

    2023-02-27 08:35:27
    Up2Date
    Successful
    New firmware is available for installation.

    Next log entries:

    DEBUG     2023-02-27 08:50:30Z [6053]: --serial = C42xxxxxxxxxx9CF
    DEBUG     2023-02-27 08:50:30Z [6053]: --deviceid = 6d848b4dxxxxxxxxxxxxxxxxxxxxx53c8d03
    DEBUG     2023-02-27 08:50:30Z [6053]: --fwversion = 19.0.1.365
    DEBUG     2023-02-27 08:50:30Z [6053]: --productcode = CN
    DEBUG     2023-02-27 08:50:30Z [6053]: --model = XG430
    DEBUG     2023-02-27 08:50:30Z [6053]: --vendor = WP02
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_ips_version = 18.20.18
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_ips_cv = 19.0
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_ips_type = ips_app
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_atp_version = 1.0.0458
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_atp_cv = 1.00
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_savi_version = 1.0.18534
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_savi_cv = 1.00
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_avira_version = 1.0.421087
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_avira_cv = 4.00
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_apfw_version = 11.0.020
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_apfw_cv = 1.00
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_sslvpn_version = 1.0.009
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_sslvpn_cv = 1.02
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_ipsec_version = 2.2.090
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_ipsec_cv = 1.00
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_geoip_version = 2.0.019
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_geoip_cv = 1.00
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_clientauth_version = 1.0.0020
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_clientauth_cv = 2.00
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_redfw_version = 3.0.008
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_redfw_cv = 2.00
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_odt_version = 1.0.006
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_odt_cv = 1.00
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_sasi_version = 1.0.257
    DEBUG     2023-02-27 08:50:30Z [6053]: --pkg_sasi_cv = 1.00
    DEBUG     2023-02-27 08:50:30Z [6053]: --oem = Sophos
    DEBUG     2023-02-27 08:50:30Z [6053]: --central_mgmt = 1.0
    DEBUG     2023-02-27 08:50:30Z [6053]: --server = u2d.sophos.com
    DEBUG     2023-02-27 08:50:30Z [6053]: --port = 443
    DEBUG     2023-02-27 08:50:30Z [6053]: Added new server : Host - u2d.sophos.com, Port - 443
    DEBUG     2023-02-27 08:50:30Z [6053]: --u2d_proto = 2.00
    DEBUG     2023-02-27 08:50:30Z [6053]: Final query string is :
    ?&serialkey=C42xxxxxxxxxx9CF&deviceid=6d848b4dxxxxxxxxxxxxxxxxxxxxx53c8d03&fwversion=19.0.1.365&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.20.18&pkg_ips_type=ips_app&pkg_ips_cv=19.0&pkg_atp_version=1.0.0458&pkg_atp_cv=1.00&pkg_savi_version=1.0.18534&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.421087&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.019&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0020&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.020&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.008&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.009&pkg_sslvpn_cv=1.02&pkg_ipsec_version=2.2.090&pkg_ipsec_cv=1.00&central_mgmt=1.0&pkg_odt_version=1.0.006&pkg_odt_cv=1.00&pkg_sasi_version=1.0.257&pkg_sasi_cv=1.00&u2d_proto=2.00
    DEBUG     2023-02-27 08:50:30Z [6053]: Response code : 200
    DEBUG     2023-02-27 08:50:30Z [6053]: Response body :
    <Up2Date>
      <Package u2dtype="firmware" requiresMandatoryUpdate="1">
        <File name="HW-19.0.2_MR-2.SF300-472.sig">
          <location>https://xg-up2date-firmwares.sophosupd.com/HW/HW-19.0.2_MR-2.SF300-472.sig</location>
          <version>SFOS 19.0.2 MR2-Build472</version>
          <fwversion>19.0.2.472</fwversion>
          <appmodel>XG430</appmodel>
          <appvendor>WP02</appvendor>
          <productcode>CN</productcode>
          <size>456856451</size>
          <md5sum>c50f2d24793899ff5cec8700c72beb4a</md5sum>
          <release>MR</release>
          <releasenotes>https://xg-up2date-firmwares.sophosupd.com/CHANGELOG/19.0.2.472.releasenotes</releasenotes>
          <message>Sophos Firewall MR Release</message>
          <releasedate>2023-01-23</releasedate>
        </File>
      </Package>
    </Up2Date>
    
    DEBUG     2023-02-27 08:50:30Z [6053]: Response length : 768
    DEBUG     2023-02-27 08:50:30Z [6053]: Received requiresMandatoryUpdate = 1
    DEBUG     2023-02-27 08:50:30Z [6053]: Received name : HW-19.0.2_MR-2.SF300-472.sig
    DEBUG     2023-02-27 08:50:30Z [6053]: Received location : https://xg-up2date-firmwares.sophosupd.com/HW/HW-19.0.2_MR-2.SF300-472.sig
    DEBUG     2023-02-27 08:50:30Z [6053]: Received version : SFOS 19.0.2 MR2-Build472
    DEBUG     2023-02-27 08:50:30Z [6053]: Received fwversion : 19.0.2.472
    DEBUG     2023-02-27 08:50:30Z [6053]: Received appmodel : XG430
    DEBUG     2023-02-27 08:50:30Z [6053]: Received appvendor : WP02
    DEBUG     2023-02-27 08:50:30Z [6053]: Received productcode : CN
    DEBUG     2023-02-27 08:50:30Z [6053]: Received size : 456856451
    DEBUG     2023-02-27 08:50:30Z [6053]: Received md5sum : c50f2d24793899ff5cec8700c72beb4a
    DEBUG     2023-02-27 08:50:30Z [6053]: Received release : MR
    DEBUG     2023-02-27 08:50:30Z [6053]: Received releasenotes : https://xg-up2date-firmwares.sophosupd.com/CHANGELOG/19.0.2.472.releasenotes
    DEBUG     2023-02-27 08:50:30Z [6053]: Received message : Sophos Firewall MR Release
    DEBUG     2023-02-27 08:50:30Z [6053]: Received releasedate : 2023-01-23
    

    Then I received new firmware notification again:

    2023-02-27 08:50:27
    Up2Date
    Successful
    New firmware is available for installation.
  • Something is off with this appliance. Because generally speaking: A new update is always showing in u2d.log but it should only present the Notification once in Logviewer and also the notification system. Somehow your system is not suppressing the message. 

    Could you look into the applog.log and the csc.log in this time frame? 

    __________________________________________________________________________________________________________________

  • I opened a new case csc is already in debug but at least with firmware patterns, I do not find anything useful.

    06240966

    2023-02-27 14:51:27
    Up2Date
    Successful
    New firmware is available for installation.

    applog shows this

    Feb 27 13:51:17Z appliance key is C4207xxxxxxxK9CF
    Feb 27 13:51:18Z opcode:poll_for_SSO SSOD Service Status: UNTOUCHED SSO Status: disconnected
    Feb 27 13:51:18Z opcode:poll_for_SSO Status - SSO status is DISCONNECTED .....
    Feb 27 13:51:18Z opcode:poll_for_SSO - firmwareupgrade flag Feb 27 13:51:18Z opcode:poll_for_SSO - backup flag
    Feb 27 13:51:18Z opcode:poll_for_SSO - SSO poll success
    Feb 27 13:51:42Z  opcode:hbtrust_synchronize - starting
    Feb 27 13:51:44Z  hbtrust_tap_mode opcode - query tap mode interfaces from database
    Feb 27 13:51:45Z heartbeat_ipset: sets restored
    Feb 27 13:51:45Z  function:hbtrust_response - starting
    Feb 27 13:51:45Z  function:hbtrust_response - returned with SUCCESS; hb_availability [ 1 ]; request->{cloud_hb_availability} [ 1 ]
    Feb 27 13:51:45Z  function:hbtrust_response - successfully synchronized
    Feb 27 13:51:45Z  function:hbtrust_response - call c_rehash on /conf/sysfiles/heartbeatd/ca-certificates
    Feb 27 13:51:45Z  opcode:hbrust_synchronize - successful
    Feb 27 13:51:48Z appliance key is C4207xxxxxxxK9CF
    Feb 27 13:51:49Z opcode:poll_for_SSO SSOD Service Status: UNTOUCHED SSO Status: disconnected
    Feb 27 13:51:49Z opcode:poll_for_SSO Status - SSO status is DISCONNECTED .....
    Feb 27 13:51:49Z opcode:poll_for_SSO - firmwareupgrade flag Feb 27 13:51:49Z opcode:poll_for_SSO - backup flag
    Feb 27 13:51:49Z opcode:poll_for_SSO - SSO poll success

    ...

    Feb 27 13:52:29Z apiInterface:: Deleting Entity and Event for legacy mode base operation
    Feb 27 13:52:30Z Request type = 1
    Feb 27 13:52:30Z apiInterface:versionsupported: true.
    Feb 27 13:52:30Z apiInterface:request mode -> 2705.
    Feb 27 13:52:30Z apiInterface:Current ver :::'1900.1'
    Feb 27 13:52:30Z apiInterface:entityjson::::::::HASH(0x9769750)
    Feb 27 13:52:30Z Info:: Transaction will not be rolled back for opcode get_firm_list. If any operation fails, request is part of multiple request :
    Feb 27 13:52:30Z   Current firmware is HW-19.0.2_MR-2.SF300-472.sig skip_firmware is HW-19.0.2_MR-2.SF300-472.sig
     Feb 27 13:52:30Z  upgrade is skipped by user,pop-up will not be shown
     Feb 27 13:52:30Z apiInterface:: Deleting Entity and Event for legacy mode base operation
    Feb 27 13:52:30Z Request type = 1
    Feb 27 13:52:30Z apiInterface:versionsupported: true.
    Feb 27 13:52:30Z apiInterface:request mode -> 557.
    Feb 27 13:52:30Z apiInterface:Current ver :::'1900.1'
    Feb 27 13:52:30Z apiInterface:entityjson::::::::system::systemgraph=HASH(0xa0e0660)
    Feb 27 13:52:30Z Info:: Transaction will not be rolled back for opcode garner:get_xml. If any operation fails, request is part of multiple request :
    Feb 27 13:52:30Z
    Feb 27 13:52:30Z
    Feb 27 13:52:30Z