Este contenido no está disponible en el idioma seleccionado.
Chapter 2. Upgrading using Helm charts
You must follow a specific upgrade path for RHACS depending on the release of RHACS that you are running. You must also back up your Central database before updating the Helm chart and performing the upgrade.
If you have installed RHACS by using Helm charts, to upgrade to the latest version of RHACS perform the following steps:
- Back up the Central database.
- Optionally, optimize Central’s database and Persistent Volume Claims (PVC).
-
Optionally, generate a
values-private.yamlconfiguration file containing root certificates for the central-services Helm chart. - Update the Helm chart.
-
Run the
helm upgradecommand.
- To ensure optimal functionality, use the same version for your secured-cluster-services Helm chart and central-services Helm chart.
- To upgrade to RHACS 4.8, which includes an upgrade to PostgreSQL 15, you must free up disk space. Before beginning the upgrade, ensure you have free disk space that is at least double the size of your existing database.
2.1. Backing up the Central database Copiar enlaceEnlace copiado en el portapapeles!
You can back up the Central database and use that backup for rolling back from a failed upgrade or data restoration in the case of an infrastructure disaster.
Prerequisites
-
You must have an API token with
readpermission for all resources of Red Hat Advanced Cluster Security for Kubernetes. The Analyst system role hasreadpermissions for all resources. -
You have installed the
roxctlCLI. -
You have configured the
ROX_API_TOKENand theROX_CENTRAL_ADDRESSenvironment variables.
Procedure
Run the backup command:
roxctl -e "$ROX_CENTRAL_ADDRESS" central backup
$ roxctl -e "$ROX_CENTRAL_ADDRESS" central backupCopy to Clipboard Copied! Toggle word wrap Toggle overflow
2.2. Optimizing Central database and PVC Copiar enlaceEnlace copiado en el portapapeles!
When you upgrade to Red Hat Advanced Cluster Security for Kubernetes (RHACS) 4.0, RHACS creates a PostgreSQL instance called central-db with a default Persistent Volume Claims (PVC). Optionally, you can customize central-db or PVC configuration.
Red Hat recommends the following minimum memory and CPU requests:
2.3. Generating root certificates file Copiar enlaceEnlace copiado en el portapapeles!
If you do not have access to your values-private.yaml configuration file that you have used to install Red Hat Advanced Cluster Security for Kubernetes (RHACS), use the following instruction to generate the values-private.yaml configuration file containing root certificates.
Skip the instruction here, if you have access to your values-private.yaml configuration file.
The generated values-private.yaml file has sensitive configuration options. Ensure that you store this file securely.
Procedure
-
Download the
create_certificate_values_file.shscript. Make the
create_certificate_values_file.shscript executable:chmod +x create_certificate_values_file.sh
$ chmod +x create_certificate_values_file.shCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run the
create_certificate_values_file.shscript file:create_certificate_values_file.sh values-private.yaml
$ create_certificate_values_file.sh values-private.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
2.4. Updating the Helm chart repository Copiar enlaceEnlace copiado en el portapapeles!
You must always update Helm charts before upgrading to a new version of Red Hat Advanced Cluster Security for Kubernetes.
Prerequisites
- You must have already added the Red Hat Advanced Cluster Security for Kubernetes Helm chart repository.
- You must be using Helm version 3.8.3 or newer.
Procedure
Update Red Hat Advanced Cluster Security for Kubernetes charts repository.
helm repo update
$ helm repo updateCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Verification
Run the following command to verify the added chart repository:
helm search repo -l rhacs/
$ helm search repo -l rhacs/Copy to Clipboard Copied! Toggle word wrap Toggle overflow
2.6. Preparing the custom resource definition for upgrade Copiar enlaceEnlace copiado en el portapapeles!
If upgrading from version 4.6 or 4.7, you must prepare the SecurityPolicy custom resource definition (CRD) to avoid upgrade errors.
If you use Kubernetes, enter kubectl instead of oc.
Procedure
Apply Helm-specific labels and annotations to the CRD by running the following commands:
oc annotate crd/securitypolicies.config.stackrox.io meta.helm.sh/release-name=stackrox-central-services
$ oc annotate crd/securitypolicies.config.stackrox.io meta.helm.sh/release-name=stackrox-central-servicesCopy to Clipboard Copied! Toggle word wrap Toggle overflow Adjust the value of the
release-nameas needed. The default value isstackrox-central-services.oc annotate crd/securitypolicies.config.stackrox.io meta.helm.sh/release-namespace=stackrox
$ oc annotate crd/securitypolicies.config.stackrox.io meta.helm.sh/release-namespace=stackroxCopy to Clipboard Copied! Toggle word wrap Toggle overflow Adjust the value of the
release-namespaceas needed. The default value isstackrox.oc label crd/securitypolicies.config.stackrox.io app.kubernetes.io/managed-by=Helm
$ oc label crd/securitypolicies.config.stackrox.io app.kubernetes.io/managed-by=HelmCopy to Clipboard Copied! Toggle word wrap Toggle overflow
2.7. Running the Helm upgrade command Copiar enlaceEnlace copiado en el portapapeles!
You can use the helm upgrade command to update Red Hat Advanced Cluster Security for Kubernetes (RHACS).
Prerequisites
-
You must have access to the
values-private.yamlconfiguration file that you have used to install Red Hat Advanced Cluster Security for Kubernetes (RHACS). Otherwise, you must generate thevalues-private.yamlconfiguration file containing root certificates before proceeding with these commands.
Procedure
Run the helm upgrade command and specify the configuration files by using the
-foption:Copy to Clipboard Copied! Toggle word wrap Toggle overflow helm upgrade -n stackrox stackrox-secured-cluster-services \ rhacs/secured-cluster-services --version <current-rhacs-version> \ -f values-private.yaml
$ helm upgrade -n stackrox stackrox-secured-cluster-services \ rhacs/secured-cluster-services --version <current-rhacs-version> \ -f values-private.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
You might use the --reuse-values option to preserve the previously configured Helm values during the upgrade. If you do that, you must turn off central-db creation before you upgrade to the next version.
See the following command example:
2.8. Rolling back a Helm upgrade Copiar enlaceEnlace copiado en el portapapeles!
You can roll back to an earlier version of Central if the upgrade to a new version is unsuccessful.
If you use Kubernetes, enter kubectl instead of oc.
Procedure
Run the following
helm upgradecommand:helm upgrade -n stackrox \ stackrox-central-services rhacs/central-services \ --version <previous_rhacs_74_version> \ --set central.db.enabled=false
$ helm upgrade -n stackrox \ stackrox-central-services rhacs/central-services \ --version <previous_rhacs_74_version> \ --set central.db.enabled=falseCopy to Clipboard Copied! Toggle word wrap Toggle overflow where:
<previous_rhacs_version>- Specifies the previously installed RHACS version.
Delete the
central-dbpersistent volume claim (PVC):oc -n stackrox delete pvc central-db
$ oc -n stackrox delete pvc central-dbCopy to Clipboard Copied! Toggle word wrap Toggle overflow