Describes how to develop a successful plan for your upgrade process.
The key to a successful upgrade process is to plan the process ahead of time. This page helps you develop an upgrade process that fits the needs of your cluster and users.
Upgrade Workflows (Release 6.1 to 6.2) describe these methods in more detail. The method you choose affects the flow of events while upgrading packages on nodes and the duration of the maintenance window.
The offline upgrade process is simpler than a rolling upgrade, and usually completes faster. In an offline upgrade, data-fabric software processes and the jobs that depend on them are stopped on all nodes so that packages can be updated. Offline upgrade is the default upgrade method when other methods cannot be used.
Offline Upgrade Paths without the InstallerYou can perform an offline upgrade from the following core versions:
Offline Upgrade Path with the Installer
| Upgrading From | Security Setting | Installer Behavior |
|---|---|---|
| Release 5.2.x | On | This is a custom security scenario. You cannot use the Installer or Stanzas to perform the upgrade. You must upgrade manually. |
| Off | The Installer does not add security by default during an upgrade. After the upgrade to release 6.1.0, you can turn on security by using the incremental install function. | |
| Release 6.0 or 6.0.1 | On | The Installer leaves the current security settings intact, resulting in a secure MapR 6.1.0 cluster. This upgrade assumes that no custom security settings are implemented. You must upgrade manually if custom security settings are implemented. |
| Off | The Installer does not add security by default during an upgrade. After the upgrade to release 6.1.0, you can turn on security by using the incremental install function. | |
| Release 6.1.0 | On | The Installer leaves the current security settings intact, resulting in a secure MapR 6.2.0 cluster. This upgrade assumes that no custom security settings are implemented. You must upgrade manually if custom security settings are implemented. |
| Off | The Installer does not add security by default during an upgrade. After the upgrade to release 6.2.0, you can turn on security by using the incremental install function. |
In a manual rolling upgrade, you upgrade the data-fabric software one node at a time so that the cluster as a whole remains operational throughout the process. The fileserver service on each node goes offline while packages are upgraded, but its absence is short enough that the cluster does not raise the data-under-replication alarm.
The following restrictions apply to rolling upgrades:
You can perform a manual rolling upgrade from only the following core versions:
Check the JDK Support Matrix to verify that your JDK version is supported by the core version to which you are upgrading. Releases 6.0 and 6.1 require JDK 8. Release 6.2.0 requires JDK 11. For more information, see the JDK Support Matrix.
Security is not enabled by default for upgrades. During an upgrade, the security attributes of your cluster are preserved unless you decide to change them. Note that if you have configured security on a release 5.2.x cluster, you cannot use the Installer or Stanzas to upgrade. You must upgrade manually. For information about custom security, see Customizing Security in HPE Ezmeral Data Fabric.
Before upgrading core software, make sure that you have reviewed the list of known vulnerabilities in Security Vulnerabilities. If a vulnerability applies to your release, contact your HPE support representative for a fix, and apply the fix immediately, if applicable.
Consider the following factors when scheduling the upgrade:
Determine if you need to upgrade data-fabric client nodes. You upgrade data-fabric client nodes after you upgrade the cluster nodes but before enabling new features.
Data Fabric Client Nodes
On each data-fabric client node, upgrade to the client version that is compatible with the operations that you want to perform on the cluster. The following table shows which supported client operations are available based on the client version and the cluster version.
POSIX Client Nodes
On POSIX client nodes, the only supported client operation is filesystem access. As of 5.1, FUSE-based POSIX clients are available, in addition to loopback NFS clients.
POSIX loopback NFS clients can be upgraded or a fresh install can be performed. Additionally, POSIX loopback NFS clients can be migrated to a FUSE-based POSIX Basic client. POSIX loopback NFS clients can not be migrated to FUSE-based Platinum POSIX clients.
See Upgrading the Data Fabric POSIX loopbacknfs Client and Migrating to FUSE-based POSIX Clients for more information.
The following table shows which loopback NFS client versions are supported by which data-fabric clusters. For example, the release 6.0 cluster supports 4.0.2, 4.1, 5.0, 5.1, and 5.2 loopback NFS clients.
| 6.x client | 5.2 client | 5.1 client | 5.0 client | 4.1 client | 4.0.2 client | 4.0.1 client | |
|---|---|---|---|---|---|---|---|
| 6.x cluster | Yes | Yes | Yes | Yes | Yes | Yes | N/A |
| 5.2 cluster | Yes | Yes | Yes | Yes | Yes | Yes | N/A |
| 5.1 cluster | Yes | Yes | Yes (recommended) | Yes | Yes | Yes | N/A |
| 5.0 cluster | Yes | Yes | Yes (recommended) | Yes | Yes | Yes | N/A |
| 4.1 cluster | Yes | Yes | Yes (recommended) | Yes | Yes | Yes | N/A |
| 4.0.2 cluster | Yes | Yes | Yes | Yes | Yes | Yes | N/A |
However, volume mirroring from a higher release version to a lower release version works only when you enable identical set of features on both clusters. For example, you can mirror volumes from a release 6.0 cluster to a release 5.1 cluster only if you do not enable new features that are present on the release 6.0 cluster.
Upgraded volumes are not tagged with any security policies, and have the
enforcementMode setting at its default
(PolicyAceAndDataAce). Determination of access rights is
based on the existing access determination algorithm:
Grant access if Permitted(mode bits) OR Permitted(ACE)
maprcli, extended attribute commands, and other Java, C, and
Hadoop APIs to tag volumes, files, and directories.To plan for the Ecosystem Pack (MEP), see Planning Ecosystem Pack Upgrades.
Go to Preparing to Upgrade Core.