3.1. Switching of WAPT Edition (Community, Discovery, Enterprise)¶
WAPT Community is no longer supported.
If you want to upgrade from WAPT 1.8.2 Community you can upgrade to WAPT Discovery or WAPT Enterprise.
Please note that WAPT Discovery is limited to 300 clients.
It is always possible to upgrade from a WAPT Community setup to WAPT Discovery or Enterprise.
The WAPT Server will make the appropriate changes.
To upgrade WAPT Discovery to WAPT Enterprise simply upload a valid licence to the WAPT Server from the WAPT Console.
If your Enteprise licence expire, it will fall back on the Discovery Edition.
If you are running WAPT Discovery and you have more that 300 client computers in your inventory, the WAPT Console will stop working and will only give you the option to delete computer entries from the inventory.
The WAPT Console will return to working condition when the inventory returns below the 300 computer limit.
If you are using WAPT WADS, please note that older WADS WinPE and WAPT 2.6 WADS WinPE are not compatible.
You need to recreate the WinPE File using the upload WinPE button in the OS Deployment tab.
If you use WAPT Deploy in a GPO, then you need to update your GPO with the lastest waptdeploy.exe binary.
Warning
For WAPT server, during the postconf be carefull.
It is essential to enter the FQDN name of your server and not its IP address.
For Example :
At last, launch the following script testing-ldap-connectivity.sh (/opt/wapt/waptserver/scripts/testing-ldap-connectivity.sh). Identifying an AD account and an associated group. if the feedback is "ALL GOOD" then the upgrade has been successfully completed and you can launch the wapt console.
You encountered an error with the testing-ldap-connectivity.sh script. Please check the following:
Warning
With version 2.6 of WAPT, Self-Service does NOT need simple bind LDAP authentication anymore. Kerberos (recommended) or LDAP SASL bind over GSSAPI (2nd choice) should be used:
In /etc/krb5.conf, the file should look like this.
If you use the parameter wapt_admin_group_dn in your waptserver.ini, you need to modify wapt_admin_group_dn to wapt_admin_group and write only the common name of your group.
At last, launch the following script testing-ldap-connectivity.sh (/opt/wapt/waptserver/scripts/testing-ldap-connectivity.sh). Identifying an AD account and an associated group. if the feedback is "ALL GOOD" then the upgrade has been successfully completed and you can launch the wapt console.
You encountered an error with the testing-ldap-connectivity.sh script. Please check the following:
Warning
With version 2.6 of WAPT, Self-Service does NOT need simple bind LDAP authentication anymore. Kerberos (recommended) or LDAP SASL bind over GSSAPI (2nd choice) should be used:
In /etc/krb5.conf, the file should look like this.
If you use the parameter wapt_admin_group_dn in your waptserver.ini, you need to modify wapt_admin_group_dn to wapt_admin_group and write only the common name of your group.
3.4. Migrating the WAPT server from Debian 12 to Debian 13: Procedure for updating the PostgreSQL database¶
When you upgrade your waptserver to Debian 13, modify/etc/apt/sources.listto switch to trixie then follow the procedure below.
Debian Trixie now integrates nginx spnego module, which conflicts with the one Wapt was shipping for Debian 12 and earlier.
To avoid upgrade errors, please use the following procedure:
Wapt uses PostgreSQL as a database backend.
PostgreSQL database binary format on disk changes between major version, and it is necessary to run a script to dump and restore de database when doing major upgrades.
When upgrading Debian from one major version to another, PostgreSQL version also changes and it is thus necessary to run the appropriate script to run the right version.
In order to streamline the upgrade process, Debian keeps the old PostgreSQL version running after major os upgrade (from Bookworm to Trixie for example).
So you may still have an old PostgreSQL database running even after major debian upgrade, so be sure to follow these steps to upgrade you PostgreSQL database.
Note
Use the following command to check your current PostgreSQL cluster version: