<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SimpliVity VCSA security patching considerations in HPE SimpliVity</title>
    <link>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7201575#M4475</link>
    <description>&lt;P&gt;Thanks Kipp&lt;/P&gt;&lt;P&gt;Do you know what the published status will be for SimpliVity 4.1.1U1?&lt;/P&gt;&lt;P&gt;Will it be "&lt;SPAN&gt;C&lt;/SPAN&gt; &lt;SPAN&gt;= Compatible Version but not explicitly verified" or are HPE saying customer must update to 4.1.2 or higher to protect themselves against this vulnerability?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 27 Nov 2023 11:30:50 GMT</pubDate>
    <dc:creator>jlangmead</dc:creator>
    <dc:date>2023-11-27T11:30:50Z</dc:date>
    <item>
      <title>SimpliVity VCSA security patching considerations</title>
      <link>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7200973#M4454</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I would please like to check I have the correct interpreation of what patching is supported for VCSA's within a SimpliVity environment.&lt;/P&gt;&lt;P&gt;I have 2 x 7.0 U2d VCSAs running in enhanced link mode and need to upgrade these to the very latest 7.x version. This is currently 7.0 u3o on the VMware download portal.&lt;/P&gt;&lt;P&gt;My understanding is this is acceptable for me to do as SimpliVity is supported on 7.0U3n [as detailed in the latest interoperability guide] for my current simpliVity version and firmware level, plus I have the 'option' to apply unlisted patches [eg 7.0 U3o] so long as I don't update to an unlisted mayor or minor VCSA version. There is a clause that states I need to accept this latest patch hasn't yet been qualified by HPE&lt;/P&gt;&lt;P&gt;I'm referring the statement on page 43 of the InterOperability guide&lt;/P&gt;&lt;P&gt;So I'm just asking for confirmation that I have interpreted this statement correctly for my environment and that have vCenter in Enhagnced link mode doesn't impact my ability to update.&lt;/P&gt;&lt;P&gt;many thanks&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Mon, 20 Nov 2023 03:47:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7200973#M4454</guid>
      <dc:creator>jlangmead</dc:creator>
      <dc:date>2023-11-20T03:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: SimpliVity VCSA security patching considerations</title>
      <link>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7200979#M4455</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;this is also my understanding. We are running 4.2 on 7 U3o without any problems.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Nov 2023 13:00:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7200979#M4455</guid>
      <dc:creator>l_lang</dc:creator>
      <dc:date>2023-11-17T13:00:31Z</dc:date>
    </item>
    <item>
      <title>Re: SimpliVity VCSA security patching considerations</title>
      <link>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7200980#M4456</link>
      <description>&lt;P&gt;That's great thanks -&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate you sharing your experiences.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Nov 2023 13:19:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7200980#M4456</guid>
      <dc:creator>jlangmead</dc:creator>
      <dc:date>2023-11-17T13:19:02Z</dc:date>
    </item>
    <item>
      <title>Re: SimpliVity VCSA security patching considerations</title>
      <link>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7200999#M4460</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;Good day.&amp;nbsp;&lt;BR /&gt;You should be good to proceed with the vCSA patch as long as per what we have in the Interop guide mentioned.&amp;nbsp;&lt;BR /&gt;There should be no issues with that and also please make sure that you follow the best practices of what VMware follows before performing any upgrades on the vCSA.&amp;nbsp;&lt;BR /&gt;Also one last thing, please make sure that the OVC version is on 4.2 or atleast on supported versions before you proceed with the above upgrades.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Neet&lt;/P&gt;</description>
      <pubDate>Fri, 17 Nov 2023 16:25:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7200999#M4460</guid>
      <dc:creator>NeetSat</dc:creator>
      <dc:date>2023-11-17T16:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: SimpliVity VCSA security patching considerations</title>
      <link>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7201019#M4461</link>
      <description>&lt;P&gt;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/2125258"&gt;@NeetSat&lt;/a&gt;&amp;nbsp;HI Neet&lt;/P&gt;
&lt;P&gt;Thanks for the confirmation - the OVC version is currently 4.1.1 U1 which is showing as compatible within the Interoperability Guide.&lt;/P&gt;
&lt;P&gt;There is a plan to upgrade to VMware 8.x (once this is supported by SimpliVity) so we want to refrain on any updates to the OVCs until that time.&lt;/P&gt;
&lt;P&gt;kind regards&lt;/P&gt;</description>
      <pubDate>Mon, 20 Nov 2023 03:55:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7201019#M4461</guid>
      <dc:creator>jlangmead</dc:creator>
      <dc:date>2023-11-20T03:55:53Z</dc:date>
    </item>
    <item>
      <title>Re: SimpliVity VCSA security patching considerations</title>
      <link>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7201195#M4464</link>
      <description>&lt;P&gt;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/2125258"&gt;@NeetSat&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please can you ellaborate on the recommendation to go to OVC 4.2? How strong a recommendation is that?&lt;/P&gt;&lt;P&gt;We're on 4.1.1 U1 currently with no plans to update the OVC version prior to adding this patch as it is still shoing with a 'C' entry in the Interoperability Guide - but as you hjave gone to the trouble of suggesting an update to 4.2 I didn't want to ignore that recommnendation with first asking the reason behind this. Are we safe to remain on 4.1.1U1 as per the guide?&lt;/P&gt;&lt;P&gt;kind regards&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 08:19:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7201195#M4464</guid>
      <dc:creator>jlangmead</dc:creator>
      <dc:date>2023-11-21T08:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: SimpliVity VCSA security patching considerations</title>
      <link>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7201519#M4474</link>
      <description>&lt;P&gt;There is a new Customer Notice for this issue:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Notice: HPE SimpliVity - VMware vCenter Server Appliance 7.0 U3o Now Supported on Active OmniStack Releases&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00135862en_us" target="_blank"&gt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00135862en_us&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;/Kipp&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 03:17:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7201519#M4474</guid>
      <dc:creator>Kipp_Glover</dc:creator>
      <dc:date>2023-11-27T03:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: SimpliVity VCSA security patching considerations</title>
      <link>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7201575#M4475</link>
      <description>&lt;P&gt;Thanks Kipp&lt;/P&gt;&lt;P&gt;Do you know what the published status will be for SimpliVity 4.1.1U1?&lt;/P&gt;&lt;P&gt;Will it be "&lt;SPAN&gt;C&lt;/SPAN&gt; &lt;SPAN&gt;= Compatible Version but not explicitly verified" or are HPE saying customer must update to 4.1.2 or higher to protect themselves against this vulnerability?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 11:30:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7201575#M4475</guid>
      <dc:creator>jlangmead</dc:creator>
      <dc:date>2023-11-27T11:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: SimpliVity VCSA security patching considerations</title>
      <link>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7201619#M4476</link>
      <description>&lt;P&gt;There will be an updated Interop Guide posted at the end of this week.&amp;nbsp; &amp;nbsp;It will show the OmniStack version 4.1.1U1 as&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;C &lt;/STRONG&gt;= Compatible Version but not explicitly verified&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;with VCSA 7.0 U3o&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 19:35:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-simplivity/simplivity-vcsa-security-patching-considerations/m-p/7201619#M4476</guid>
      <dc:creator>Kipp_Glover</dc:creator>
      <dc:date>2023-11-27T19:35:40Z</dc:date>
    </item>
  </channel>
</rss>

