Before running a rolling upgrade, some steps must be completed first.
Verify that HTTPS certificates are valid
The HTTPS certificates on the VMs must be valid for more than 30 days, and must remain valid during the upgrade for the whole deployment. For example, your upgrade will fail if your certificate is valid for 32 days and it takes more than 1 day to upgrade all of the VMs for all node types.
Using your own certificates
If using your own generated certificates, check its expiry date using:
openssl x509 -in <certificate file> -enddate -noout
If the certificates are expiring, you must first upload the new certificates using rvtconfig upload-config
before upgrading.
Using VM generated certificates
If you did not provide certificates to the VMs, the VM will generate its own certificates which are valid for 5 years. So if the current VMs have been deployed less than 5 years ago then there is nothing further to do. If it has been over 5 years, then please contact your Metaswitch Customer Care representative.
Verify all VMs are healthy
All the VMs in the deployment need to be healthy. To check this, run the common health checks for the VMs by following: Verify the state of the nodes and processes.
Disable SNMP on SGC VMs if SNMPv3 is enabled
Omitting this step on the SGC VMs when SNMPv3 is configured will result in Initconf failing to converge on the uplevel VMs. |
SNMP is only required to be disabled on the SGC VMs when:
-
Performing a rolling upgrade or rollback of the SGC; and
-
SNMPv3 is enabled (even if SGC notifications are disabled); and
-
the downlevel VM version is 4.0.0-23-1.0.0 or older; and
-
the uplevel VM version is 4.0.0-24-1.0.0 or newer.
The complete process for doing this is documented in Reconfiguring the SGC’s SNMP subsystem.
Upload the CSAR EFIX patches to the SIMPL VM
If not already done, transfer the CSAR EFIX patches onto the SIMPL VM. For each CSAR EFIX patch, run:
csar efix <node type>/<version> <path to CSAR EFIX>
<path to CSAR EFIX>
is the full path to the CSAR EFIX patch.
<node type>/<version>
is the downlevel unpacked CSAR located at ~/.local/share/csar/
.
If you are not sure of the exact version string to use, run csar list to view the list of installed
CSARs.
|
This will apply the efix patch to the the downlevel CSAR.
The new patched CSAR is now the uplevel CSAR referenced in the following steps. |
Don’t apply the same CSAR EFIX patch to the same CSAR target more than once.
If a previous attempt to run the csar efix command failed, be sure to remove the created CSAR before re-attempting, as the csar efix command requires a clean target directory to work with.
|
Upload the uplevel SDF to SIMPL VM
If the CSAR EFIX patch uplevel SDF was not created on the SIMPL VM, transfer the previously written CSAR EFIX patch uplevel SDF onto the SIMPL VM.
Ensure the version in the each node type’s vnfcs section of the uplevel SDF is set to <downlevel-version>-<patch-version> .
For example: 4.0.0-14-1.0.0-patch123 , where 4.0.0-14-1.0.0 is the downlevel version and patch123 is the patch version.
|
Upload uplevel RVT configuration
Upload the uplevel configuration for all of the node types to the CDS. This is required for the rolling upgrade using CSAR EFIX patch to complete.
As configuration is stored against a specific version, you need to re-upload the uplevel configuration even if it is identical to the downlevel configuration. |
The uplevel version for a CSAR EFIX patch is the format <downlevel-version>-<patch-version>
.
For example: 4.0.0-14-1.0.0-patch123
, where 4.0.0-14-1.0.0
is the downlevel version and patch123
is the patch version.
When performing a rolling upgrade some elements of the uplevel configuration must remain identical to those in the downlevel configuration. These elements (and the remedy if that configuration change was made and the cluster upgrade process started) are described in the following table:
Node Type |
Disallowed Configuration Change |
Remedy |
All |
The |
Rollback the affected VM(s) to restore the original configuration, then correct the uplevel configuration and re-run the upgrade. |
All |
The ordering of the VM instances in the SDF may not be altered. |
Rollback the affected VM(s) to restore the original configuration, then correct the uplevel configuration and re-run the upgrade. |
SGC |
All SGC-related configuration. |
Follow the instructions in Reconfiguring the SGC to either restore the original SGC configuration or to apply the updated configuration. Alternatively, rollback the affected VM(s) to restore the original configuration, then correct the uplevel configuration and re-run the upgrade. |
SGC |
SNMP notification targets if SNMP was previously enabled for the SGC. |
Reconfiguring the SGC’s SNMP subsystem to reconfigure SNMP. Alternatively, rollback the affected VM(s) to restore the original configuration, then correct the uplevel configuration and re-run the upgrade. |
SGC |
The SGC SNMP configuration cannot be disabled if it was previously enabled. |
Reconfiguring the SGC’s SNMP subsystem to reconfigure SNMP. Alternatively, rollback the affected VM(s) to restore the original configuration, then correct the uplevel configuration and re-run the upgrade. |
See Example configuration YAML files for example configuration files.