Upgrading ElasticXL Environment from R82 to R82.10 - Gateway mode
This section describes the steps for upgrading an ElasticXL environment with Zero Downtime - as a Multi-Version Cluster (MVC).
This procedure supports only this upgrade path for an ElasticXL Security Group:
|
Source Version and Mode |
Target Version and Mode |
|---|---|
|
R82 in the Gateway mode |
R82.10 in the Gateway mode |
|
|
Important:
|
|
|
Important Notes for Security Groups:
|
Required software packages:
Download the required software packages from sk183506:
-
The required CPUSE Deployment Agent.
-
The required Take of the Jumbo Hotfix Accumulator for the current version.
-
The R82.10 Upgrade Package for Scalable Platforms.
Workflow:
-
On the Management Server - Upgrade to the required version that can manage an R82.10 Security Group (see sk113113).
-
On the Security Group - Install the required CPUSE Deployment Agent package for the Security Group.
-
On the Security Group - Install the required Jumbo Hotfix Accumulator for the current version (using two logical groups of Security Group Members).
-
On the Security Group - Upgrade to R82.10 (one of the two logical groups of Security Group Members).
-
On the Management Server - Change the software version in the object of the Security Group.
-
On the Management Server - Install the policy on the Security Group.
-
On the Security Group - Upgrade to R82.10 (the other of the two logical groups of Security Group Members).
-
On the Security Group - Make sure the upgrade was successful.
Procedure:
Upgrade the Security Management Server / Multi-Domain Security Management Server to the required version that can manage an R82.10 Security Group.
See the R82.10 Release Notes or sk113113.
|
|
Note - The SMO Image Cloning feature automatically clones all the required software packages to the Security Group Members during their boot. When you install or remove software packages gradually on Security Group Members, it is necessary to disable this feature, so that after a reboot the updated Security Group Members do not clone the software packages from the existing non-updated Security Group Members. Note - Enable the SMO Image Cloning feature only before you need to add a new Security Group Member and disable it immediately after it joins the Security Group. |
|
Step |
Instructions |
|
|---|---|---|
|
A |
Connect to the command line on the Security Group. |
|
|
B |
If your default shell is the Expert mode, then go to Gaia gClish:
|
|
|
C |
Examine the state of the SMO Image Cloning feature:
|
|
|
D |
Disable the SMO Image Cloning feature, if it is enabled:
|
|
|
E |
Examine the state of the SMO Image Cloning feature again:
|
|
|
Important - You must do this step even if you upgrade again after a rollback procedure on the Security Group. |
|
Step |
Instructions |
||
|---|---|---|---|
|
A |
Transfer the required CPUSE Deployment Agent package (from sk92449) to the Security Group (into some directory, for example |
||
|
B |
Connect to the command line on the Security Group. |
||
|
C |
If your default shell is the Expert mode, then go to Gaia gClish:
|
||
|
D |
Upgrade the CPUSE Deployment Agent:
Example:
|
||
|
E |
Make sure all Security Group Members have the same build of the CPUSE Deployment Agent:
|
|
|
Important:
|
|
Step |
Instructions |
|---|---|
|
A |
See the required Jumbo Hotfix Accumulator in sk183506. |
|
B |
Follow the Jumbo Hotfix Accumulator installation instructions in the R82 Scalable Platforms Administration Guide > Chapter "Common Procedures for Scalable Platforms" > Section "Installing and Uninstalling a Hotfix on Security Group Members". |
|
Step |
Instructions |
||
|---|---|---|---|
|
A |
Make sure you have the applicable CPUSE Offline package: R82.10 Upgrade Package for Scalable Platforms |
||
|
B |
Transfer the CPUSE Offline package to the Security Group (into some directory, for example |
||
|
C |
Connect to the command line on the Security Group. |
||
|
D |
If your default shell is the Expert mode (
|
||
|
E |
If you enabled MDPS (sk138672) on the Security Group, then go to the Management Plane:
|
||
|
F |
Import the CPUSE Offline package from the hard disk:
Example:
|
||
|
G |
Show the imported CPUSE packages:
|
||
|
H |
Make sure the imported CPUSE package can be installed on this Security Group:
Example: |
|
Step |
Instructions |
||||||
|---|---|---|---|---|---|---|---|
|
A |
Connect in one of these ways:
|
||||||
|
B |
Go to the context of one of the Security Group Members in the Logical Group "A":
Example:
|
||||||
|
C |
If your default shell is Gaia gClish (
|
||||||
|
D |
Set the Security Group Members in the Logical Group "A" to the state "
Syntax:
Example:
|
||||||
|
E |
Examine the state of the Security Group Members:
The state of the Security Group Members must be:
|
You are still working in the Expert mode in the Logical Group "A".
|
Step |
Instructions |
|||
|---|---|---|---|---|
|
A |
Go from the Expert mode to Gaia gClish:
|
|||
|
B |
Upgrade the Security Group Members in the Logical Group "A":
Example: |
|||
|
C |
Go from Gaia gClish to the Expert mode:
|
|||
|
D |
Monitor the Security Group Members in the Logical Group "A" until they boot:
The state of the Security Group Members must be:
|
|
Step |
Instructions |
||||
|---|---|---|---|---|---|
|
A |
Connect with SmartConsole to the Management Server that manages this Security Group. |
||||
|
B |
From the left navigation panel, click Gateways & Servers. |
||||
|
C |
Double-click the Security Gateway object for this Security Group. |
||||
|
D |
In the left tree, click General. |
||||
|
E |
In the Version field, select R82.10. |
||||
|
F |
Click OK. |
||||
|
G |
Publish the session. |
||||
|
H |
Install the Access Control policy on this Security Gateway object.
|
||||
|
I |
On the Security Group (in the Expert mode), examine the state of the Security Group Members:
The state of the Security Group Members must be:
|
You are still working in the Expert mode in the Logical Group "A".
|
Step |
Instructions |
||||||
|---|---|---|---|---|---|---|---|
|
A |
Set the Security Group Members in the Logical Group "A" to the state "
Syntax:
Example:
|
||||||
|
B |
Examine the state of the Security Group Members:
The state of the Security Group Members must be:
|
|
|
Note - Because of the Multi-Version Cluster (MVC) mechanism design, the upgraded Security Group Members also process the traffic. |
|
|
Important - In the Multi-Version Cluster mode, it is not necessary to choose all of the remaining Security Group Members that you did not upgrade yet. You can repeat the previous steps for different logical groups of Security Group Members until you upgrade all Security Group Members in the Security Group. |
|
Step |
Instructions |
||||||
|---|---|---|---|---|---|---|---|
|
A |
Connect in one of these ways:
|
||||||
|
B |
Go to the context of one of the Security Group Members in the Logical Group "A":
Example:
|
||||||
|
C |
If your default shell is Gaia gClish (
|
||||||
|
D |
Set the Security Group Members in the Logical Group "A" to the state "
Syntax:
Example:
|
|
|
Note - At this time, the Security Group runs only with the upgraded Security Group Members. You can perform the required tests on your network to make sure the new version works as expected. If there are any issues:
|
You are still working in the Expert mode in the Logical Group "B".
|
Step |
Instructions |
|||
|---|---|---|---|---|
|
A |
Go to the context of one of the Security Group Members in the Logical Group "B":
Example:
|
|||
|
B |
Go from the Expert mode to Gaia gClish:
|
|||
|
C |
Upgrade the Security Group Members in the Logical Group "B":
Example: |
|||
|
D |
Go from Gaia gClish to the Expert mode:
|
|||
|
E |
Monitor the Security Group Members in the Logical Group "B" until they boot:
The state of the Security Group Members must be:
|
You are still working in the Expert mode in the Logical Group "B".
|
Step |
Instructions |
||||||
|---|---|---|---|---|---|---|---|
|
A |
Set the Security Group Members in the Logical Group "B" to the state "
Syntax:
Example:
|
|
Step |
Instructions |
|
|---|---|---|
|
A |
Connect to the command line on the Security Group. |
|
|
B |
If your default shell is Gaia gClish (
|
|
|
C |
Examine the state of the Security Group Members:
Each Security Group Member must have the state "ACTIVE". |
|
|
D |
Run this command (see hcp):
|