Home News Hyland Onbase 8.2 Upgrade , Client Side

Hyland Onbase 8.2 Upgrade , Client Side

by Roger Lund

 

We recently upgrade our Hyland Onbase server to a new version, 8.2.

This required a touch to be done to each device, as the following software needed to be loaded.

 

  1. The Hyland Code Access Security
  2. The Visual C ++ run-time components
  3. And .net 2.0 sp1

 

To install these the user needed Admin rights, & I didn’t think it would be a good use of time to sit at each device, and wait for .net 2.0 sp1 to install. This and we had over 50 devices to hit.

 

 

Here was my solution

 

I copied all the files to a share, lets call the server test, and the share onbase

We run spybot corporate on all of our devices , therefore I had to shut that down first, and I introduced ping’s to pause the bat file, to allow the computers to load before starting the install.

I used taskkill to kill spybot more than once, for the same process, because of the variation of computer speeds in our environment.

I had to copy the Code Access Security to the desktop to get it to see the XML file correctly, from which in pulls the production server name.

Therefore, I developed a login script that did the following.

 

Here we go

net use Z: \testonbase$
Z:

taskkill /f /im Tea*
ping 127.0.0.1
ping 127.0.0.1
ping 127.0.0.1
taskkill /f /im Tea*
ping 127.0.0.1
ping 127.0.0.1
ping 127.0.0.1
vcredist_x86.exe
taskkill /f /im Tea*
NetFx20SP1_x86.exe /qb /norestart
ping 127.0.0.1
ping 127.0.0.1
ping 127.0.0.1
ping 127.0.0.1
ping 127.0.0.1
ping 127.0.0.1
mkdir "C:Documents and Settings%username%Desktoponbase"
copy "Hyland Code Access Security.msi" "C:Documents and Settings%username%DesktoponbaseHyland Code Access Security.msi"
copy settings.xml "C:Documents and Settings%username%Desktoponbasesettings.xml"
"C:Documents and Settings%username%DesktoponbaseHyland Code Access Security.msi" /passive
ping 127.0.0.1
ping 127.0.0.1
ping 127.0.0.1
rmdir /S /Q "C:Documents and Settings%username%Desktoponbase

net use Z: /delete  /Y
logoff

Therefore, with this script all you had to do was login to the device and walk away.

 

I hope someone can get some use from this.

You may also like