Skip to main content
NetApp Knowledge Base

CONTAP-191783: Incorrect user triggers MAV request when performing cluster image validation for ONTAP upgrade

Views:
61
Visibility:
Public
Votes:
0
Category:
ontap-9
Specialty:
core
Last Updated:
4/2/2025, 3:27:06 PM

Issue

While logged into the CLI with local account 'admin' and performing the command cluster image validate, a request is created in MAV for a different user created account.
cluster1::> whoami
(security login whoami)
User: admin
Role: admin
cluster1::>image validate -version 9.12.1
(cluster image validate)
It can take several minutes to complete validation...
WARNING: There are additional manual upgrade validation checks that must be performed after these automated validation checks have completed successfully.
Refer to the Upgrade Advisor Plan or the "What should I verify before I upgrade with or without Upgrade Advisor" section in the "Upgrade ONTAP" documentation for the remaining manual validation checks that need to be performed before update.
Upgrade ONTAP documentation available at:
https://docs.netapp.com/us-en/ontap/...ade/index.html
The list of checks are available at:
https:/docs.netapp.com/us-en/ontap/upgrade/task_what_to_check_before_upgrade.html
Failing to do so can result in an update failure or an I/O disruption.
Please use Interoperability Matrix Tool (IMT
http://mysupport.netapp.com/matrix)
to verify host system supportability configuration information.
Validation checks started successfully. Run the "cluster image show-update-progress" command to check validation status.
cluster1::> security multi-admin-verify request show
Pending
Index Operation Query State Approvers Requestor
----- ---------------------- -------------------- -------- --------- ---------
1 set -privilege diagnostic
pending 1 admin2

 

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.