Included in the results is one of the JAMF KB articles: Preventing the jamf binary from Updating, but it only discusses how to set that using defaults, which it doesn't sound like you did. Hmm. Mystery.
I forgot what ends up setting that value in the plist, but it shouldn't be getting in there on its own I don't think. Somehow that value is being applied to the plist, so you may need to do some digging to see if it was previously set on those machines from a past admin (if it wasn't you) or maybe they were once on an older revision?
As for detecting it, you could build an EA, assuming the older binary on the Macs isn't also preventing them from submitting inventory of course.
#!/bin/bash
do_not_upgrade_val=$(defaults read /Library/Preferences/com.jamfsoftware.jamf.plist do_not_upgrade_jamf 2>/dev/null)
if [ "$do_not_upgrade_val" ]; thenecho"<result>Do Not Upgrade Set</result>"elseecho"<result>Not Set</result>"fi
I was avoiding the EA route, but I think I found something. I found a new (to me) smart group criteria called 'jamf binary version'. I set it to not current and found way more machines than I should have. I'm off to see how that gets set. I certainly didn't do it and I'm the only one the would.
Included in the results is one of the JAMF KB articles: Preventing the jamf binary from Updating, but it only discusses how to set that using defaults, which it doesn't sound like you did. Hmm. Mystery.
We are aware of this issue, and have it filed under PI-000365.
It’s listed as fixed, so it should not be an issue going forward.
With PI-000365 we were seeing that the do_not_upgrade_jamf flag was unexpectedly being set to true on some machines and, as of 9.8, if the binary doesn’t match the JSS version policies won’t run.
This usually meant that we’d see what appeared to be random behavior in which certain computers just stopped running policies, and the underlying cause was PI-000365 (and that do_not_upgrade_jamf flag being set to true).
A couple of ways to detect machines that had this happen have already been listed in this thread, so there’s no need for me to repeat them a second time.
Once the affected computers are identified, we can run the following command either on the affected computer directly or using an SSH session:
After it’s set correctly again, the binary should upgrade the next time those computers check in (or you can just force a check in by running a Recon) and they should start working normally again.
If, after that, the binary is still not upgraded on some computers, please get in touch with your Technical Account Manager to dig into it a bit more and find out what’s going on.
Silly idea @lisacherie but if as @amanda.wulff says, a recon ( with extension attributes) will run even if policies won't, couldn't you just have the EA which the jamf binary runs as root just run the defaults command and fix the issue, then next check in it would upgrade itself (assuming the issue isn't preventing recons from being run)?
as of 9.8, if the binary doesn’t match the JSS version policies won’t run.
This really got in the way of fixing the issue. I currently have ~900 machines in my "JAMF Binary not Current" group. I had a policy created that would fix this as it came up. Of course, now that policy isn't running. And I don't have any current IP address for all of these systems.I am getting to just doing a network scan Recon to reenroll everything.
So my thought is:
1. Delete all of these non-current Macs from our JSS 2. Run a Recon that skips IPs in the JSS database 3. Repeat the Recon at various times during the day to catch Macs that aren't logged in.
At this point it doesn't seem like there is any other option available, aside from a purely manual process of going to every Mac and seeing if it is current.
Howdy, all! I created an EA as @mm2270 outlined for everyone and then scoped a new policy to those with "Do Not Upgrade Set." The policy contained a modified plist file that I created from removing the line containing "do_not_upgrade_jamf" from the /Library/Preferences/com.jamfsoftware.jamf.plist file. Once modified, I created a DMG of this file using Composer. I made sure FUT and FEU was checked when uploading it to Casper Admin and used this in the policy. This did the trick for me!
We use 3 different kinds of cookies. You can choose which cookies you want to accept. We need basic cookies to make this site work, therefore these are the minimum you can select. Learn more about our cookies.