Solved

Upgrade PHP on Plesk 9.5.4

Posted on 2011-02-18
8
2,299 Views
Last Modified: 2013-11-08
I need to upgrade PHP and I am running Plesk 9.5.4.

I have already tried wget -q -O - http://www.atomicorp.com/installers/atomic.sh | sh

However I get this error:
Installing the Atomic GPG key: OK
Yum was not detected. Attempting to resolve..

if it helps for added information I am on network solutions VPS service
0
Comment
Question by:cheesenips
  • 3
  • 2
  • 2
8 Comments
 
LVL 18

Expert Comment

by:TobiasHolm
Comment Utility
What dist are you using? Looks like the sh script uses 'yum' to install packages. Maybe your system doesn't use yum?

Regards, Tobias
0
 

Author Comment

by:cheesenips
Comment Utility
I don't know what you mean by dist.

The VPS service from network solutions uses Virtuozzo and Plesk
0
 
LVL 12

Expert Comment

by:upanwar
Comment Utility
dist means which Linux you are using. Like Redhat, fedora or ubuntu.

Give the output of /etc/redhat-release
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 

Author Comment

by:cheesenips
Comment Utility
The operation system is fedora-core-6-x86_64
0
 
LVL 12

Expert Comment

by:upanwar
Comment Utility
As per the error /usr/bin/yum  is not available in your system, you have to install yum-arch and its dependent package to fix this issue.
0
 
LVL 18

Accepted Solution

by:
TobiasHolm earned 500 total points
Comment Utility
Install YUM by downloading and installing the corresponding RPM files via SSH, or you can have Network Solutions do it for you via Signature Support services.

Ref: http://forums.networksolutions.com/vps-f133-package-manager-on-vps-no-yum-t7135.html

Regards, Tobias
0
 

Author Closing Comment

by:cheesenips
Comment Utility
This answer works but isn't really an answer because it is saying call someone else to fix it. However because of a lack of a better answer I will choose it.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Learn how to match and substitute tagged data using PHP regular expressions. Demonstrated on Windows 7, but also applies to other operating systems. Demonstrated technique applies to PHP (all versions) and Firefox, but very similar techniques will w…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now