Upgrading Maestro Environment from R82 to R82.10 - VSNext mode

This section describes the steps for upgrading a Maestro environment (the Maestro Orchestrators and the Security Groups) with Zero Downtime - as a Multi-Version Cluster (MVC).

This procedure supports only this upgrade path for Maestro Security Groups:

Source Version and Mode

Target Version and Mode

Comment

R82 in the VSNext mode

R82.10 in the VSNext mode

For a Maestro Security Group R82 in the Gateway mode, you must follow:

Upgrading Maestro Environment to R82.10 - Gateway mode / Traditional VSX mode.

Important:

Important Notes for Maestro Orchestrators:

  • We recommend to schedule a maintenance window for all Orchestrators on all sites.

  • The major software version on the Orchestrators must be equal to or higher than the major software version on the managed Security Group (PMTR-86785).

  • To prevent traffic outage in an environment with two Orchestrators on a Single Site, make sure each Uplink interface and each Management interface are configured as a Bond interface.

    Example:

    • Bond interface magg1 with the subordinate interfaces eth1-Mgmt1 on Orch1_1 and eth2-Mgmt1 on Orch1_2.

    • Bond interface bond2 with subordinate interfaces eth1-05 on Orch1_1 and eth2-05 on Orch1_2.

  • This procedure keeps the current configuration on the Orchestrators.

  • Upgrade all Orchestrators and only then upgrade the Security Groups.

  • Upgrade one Orchestrator at a time.

  • In a Maestro Dual Site environment:

Important Notes for Security Groups:

  • Before you upgrade the Security Groups, you must upgrade the Management Server that manages the Security Groups.

    See the R82.10 Installation and Upgrade Guide.

  • This procedure applies to Security Groups in the Gateway mode and the VSNext / Traditional VSX mode.

    In the VSNext / Traditional VSX mode, you must run all the commands in the context of VS0:

    • To change the context in Gaia gClish, run: set virtual-system 0

    • To change the context in the Expert mode, run: vsenv 0

  • During the upgrade process, it is:

    • Forbidden to change the configuration of the Security Group and its Security Group Members.

  • To prevent down time, do not upgrade all the Security Group Members in a specific Security Group at the same time.

  • In this upgrade procedure, you divide all Security Group Members in a specific Security Group into two or more logical groups.

    In the procedure below, we use two logical groups denoted below as "A" and "B".

    You upgrade one logical group of the Security Group Members at one time.

    The other logical group(s) of the Security Group Members continues to handle traffic.

    Each logical group should contain the same number of Security Group Members - as close as possible.

  • In a Dual Site environment:

    • We recommend to upgrade all Security Group Members in each Security Group on one Site and then upgrade all Security Group Members in the same Security Group on the next Site.

      Do this on one Security Group at a time.

    • To prevent a fail-over between Sites during the upgrade, we recommend these steps for each Security Group:

Required software packages:

Download the required software packages from sk183506:

  1. The required CPUSE Deployment Agent.

  2. The required Take of the Jumbo Hotfix Accumulator for the current version.

  3. The R82.10 Upgrade Package for Scalable Platforms.

Workflow:

  1. On the Management Server - Upgrade to the required version that can manage an R82.10 Security Group (see sk113113).

  2. On the Orchestrator - Upgrade to R82.10.

  3. On the Management Server - Change the software version in the object of each Virtual Gateway.

  4. On the Management Server - Prepare the policy package for the object of each Virtual Gateway.

  5. On the Security Group - Install the required CPUSE Deployment Agent package for the Security Group.

  6. On the Security Group - Install the required Jumbo Hotfix Accumulator for the current version (using two logical groups of Security Group Members).

  7. On the Security Group - Upgrade to R82.10 (using two logical groups of Security Group Members).

  8. On the Security Group - Make sure the upgrade was successful.

Procedure: