Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Upgrading Contrail Service Orchestration from Release 4.1.1 to Release 5.1.1

 
Summary

Follow this procedure to upgrade from CSO Release 4.1.1 to CSO Release 5.1.1.

The upgrade procedure only supports upgrading CSO Release 4.1.1 medium deployment to CSO Release 5.1.1 HA deployment.

You will require 3 new servers to install CSO 5.1.1 HA solution. For details, refer to Hardware and Software for Contrail Service Orchestration.



Impact of the CSO Upgrade

Table Table 1 describes the impact of the CSO upgrade from Release 4.1.1 to 5.1.1.

Table 1: Impact of the CSO upgrade from Release 4.1.1 to 5.1.1.

Site-to-site tunnels support before the site upgrade

Site-to-site tunnels support after the site upgrade

Old Site WAN IP

New Site WAN IP

Site-to-site Tunnels Support

Comments

Old Site WAN IP

New Site WAN IP

Site-to-site Tunnels Support

Comments

Public

Public

Yes

Old sites can establish site-to-site tunnels with the new sites with public IPs.

Public

Public

Yes

Old sites can establish site-to-site tunnels with the new sites with public IPs.

Public

Private IP(full-cone/restricted NAT)

No

You need to create interfaces on the older sites for destination NAT to connect to the sites with private IP addresses.

Public

Private IP(full-cone/restricted NAT)

Yes

Site-to-site tunnels are established after the site upgrade.

Public

Private IP(symmetric NAT)

No

Symmetric NAT interfaces are not supported.

Public

Private IP(symmetric NAT)

No

Symmetric NAT interfaces are not supported.

Table 2: Impact on sites and tenants post CSO upgrade from Release 4.1.1 to 5.1.1

Scenario

Tenant Public Pool

LANs with Public IPs

Site NAT Pool on WAN

PE Multi-homing

Shared Bearer WAN Links

CSO 4.1.1 tenants and sites on-boarded with CSO 4.1.1

Not supported

Not supported

Not supported

Not supported

Not supported

CSO 4.1.1 tenants for sites on-boarded post upgrade to CSO 5.1.1

Not supported

Not supported

Supported

Supported

Supported

New tenants created post upgrade to CSO 5.1.1

Supported

Supported

Supported

Supported

Supported

Backing up Contrail Service Orchestration 4.1.1 Databases

  1. Download the CSO Release 5.1.1 tar file from the CSO Downloads page to the installervm.
  2. Extract the 4.1.1 patch tar to /deployments/central/file_root/ and save it as upgrade51 and run the below salt command.
    salt '*' state.apply upgrade51 saltenv=central

    python /usr/local/bin/setup_cso51_migration.py

    Select 0 to install the patch script.

  3. Install nfs-client.

    salt '*' state.apply upgrade51.install_nfs_client saltenv=central > nfs_client_status

  4. Backup CSO Release 4.1.1. data using cso_backupnrestore command.

    cso_backupnrestore -b backup -s 411backup

The cso_backupnrestore script included backing up of the following components—

  • Cassandra

  • Elasticsearch

  • ArangoDB

  • MariaDB

  • Etcd

  • Zookeeper

  • Icinga

  • Swift

  • HAProxy certificates

  • CSO 4.1.1 installation configs

Upgrading Contrail Service Orchestration

Before you begin

You must shutdown centrallbvm1, centrallbvm2, centrallbvm3, sblb1, sblb2, VRR1, and VRR2 VMs in CSO 4.1.1 before starting with CSO 5.1.1 upgrade. This is required to replicate these IPs in CSO 5.1.1 setup.

You will re-use the 4 public IPs from CSO 4.1.1 for CSO 5.1.1 deployment.

The 4 public IPs are—

  • CSO 4.1.1 Central VIP (HAPROXY)

  • SBLB VIP

  • VRR1

  • VRR2

The devices in CSO 5.1.1. will use the same SBLB certificate used in CSO 4.1.1.

Note

See Minimum Requirements for Servers and VMs for details on the VMs and associated resources required for CSO 5.1.1 servers.

Make sure you have the required NAT rules in place. For details, refer to Applying NAT Rules

Upgrading CSO 4.1.1 to CSO 5.1.1

  1. You will re-use the 4 public IPs from CSO 4.1.1 for CSO 5.1.1 deployment.
  2. Copy the backup directory of CSO 4.1.1 to CSO 5.1.1.
  3. Provision the VMs in the new servers of CSO 5.1.1. For details, refer to Provisioning VMs on Contrail Service Orchestration Servers.
  4. During the provisioning, select yes for upgrade.
  5. Provide the CSO 4.1.1 settings.yaml complete backup path to be restored.

    For example—/root/backup411/config_backups/.config/settings.yaml

    Make sure CSO 5.1 and CSO 4.1 infra password are same.

  6. Run ./get_vm_details.sh to identify the IP address of the startupserver_1 VM.

    ./get_vm_details.sh

  7. Copy the backup directory of CSO 4.1.1 to CSO 5.1.1 startupserver_1 VM.
  8. Run cso_backupnrestore script from CSO 5.1.1 startupserver_1 VM.

    cso_backupnrestore -b backup -s <backupname>

    For example—cso_backupnrestore -b backup -s 511backup

    The command will create a folder by the name of backupname under /backup directory on the startupserver_1 VM.

  9. Run the following command on CSO 5.1.1 startupserver_1 VM.

    salt '*' state.apply upgrademigration41 saltenv=central

  10. Run the pre_restore_task script.
    python /usr/local/bin/pre_restore_task.py
  11. Restore the data by using cso_backupnrestore script.

    Note the 5.1 backup path from step 10.

    backuppath is 5.1 backup path from above for ex./backups/511backup/2020-01-09T18:47:08/#cso_backupnrestore -b restore -s backuppath -t '*' -c ‘mariadb'

    #cso_backupnrestore -b restore -s backuppath -t '*' -c ‘zookeeper'

    #cso_backupnrestore -b restore -s backuppath -t '*' -c ‘elasticsearch'

    #cso_backupnrestore -b restore -s backuppath -t '*' -c ‘arangodb'

    #cso_backupnrestore -b restore -s backuppath -t '*' -c ‘icinga'

    #cso_backupnrestore -b restore -s backuppath -t '*' -c ‘cassandra'

    #cso_backupnrestore -b restore -s backuppath -t '*' -c ‘swift'

  12. Upgrade to CSO 5.1.1 by running upgrade.sh script.

    For details, refer to Upgrading Contrail Service Orchestration from Release 5.1.0 to Release 5.1.1.
  13. Restore Contrail Analytics Node (CAN).

    ./python.sh upgrade/migration_scripts/common/can_migration.py

After a successful upgrade, CSO is functional and you can log in to the Administrator Portal and the Customer Portal.