Ignore if you verified that the alarm has been tripped due to an integrity check and was expected. To eliminate the alarm, it needs to update the database. Refer to the part named "Updating the Tripwire database" of "Avaya Aura® Application Enablement Services Administration and Maintenance Guide" for more details.
1. Access the AES via putty, and su to a root user.
2. Move to the directory /var/lib/tripwire/report
3. Run the following command ‘ tripwire -m u --twrfile /var/lib/tripwire/report/<filename> ‘
4. If you want to test that the alarm is no longer visible, you can run an integrity check ‘ tripwire --check ‘
Steps to update TW database:
- Stop the Tripwire service
· #service tripwire stop
- Delete the Tripwire key files
· #rm /etc/tripwire/tw.cfg
· #rm /etc/tripwire/tw.pol
· #rm /etc/tripwire/*.key
- Delete the Tripwire database file
· #rm /var/lib/tripwire/*.twd
- Configure Tripwire
- #/etc/tripwire/cmds/twinstall.sh
-
-
-
-
- Enter your new pass phrases (key, local & site) when prompted. After entering passphrase the first time, note it down as it will be needed again.
- Create a new Tripwire database
· #tripwire --init (ignore 'No such file' or directory errors)
- Start the Tripwire service
· #service tripwire start
FYI: These alarms can also be seen when A2R is used for SAL onboarding. This process is normal and expected during onboarding. When an asset is onboarded it can now alarm, send test alarms and can also be used for health checks which can be performed via the support site.