Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Post upgrade steps for upgrading to 2023.2 from 2023.1.x

Deploying Zookeeper

  • If you have upgraded to Kyvos 2023.2, you must redeploy the Zookeeper using the Zookeeper configuration page in Kyvos Manager to switch to the latest version of Zookeeper.  This is necessary for cloud deployments (AWS, GCP, and Azure) and on-prem deployments to remove the previous version of Zookeeper.

  • To upgrade to the latest version, switching to managed Zookeeper is mandatory.

  • If you are upgrading both Kyvos Manager and Kyvos using either the single click upgrade or the All components upgrade, you must redeploy Zookeeper after upgrading Kyvos Manager.

Panel
panelIconIdatlassian-note
panelIcon:note:
bgColor#DEEBFF

Note

You must restart  Kyvos services once the redeployment of Zookeeper has been completed.

...

  1. To increase or decrease BI Server or Query Engine nodes, following permissions need to be added in IAM roles:

    Code Block
    {
    
    "Sid": "LaunchTemplateAndTerminateInstances",
    
    "Effect": "Allow",
    
    "Action": [
    
    "ec2:GetLaunchTemplateData",
    
    "ec2:TerminateInstances" ],
    
    "Resource": "*",
    
    "Condition": {
    
    "StringEqualsIgnoreCase": {
    
    "ec2:ResourceTag/UsedBy": "Kyvos"
    
    }
    
    }
    
    },
    
    {
    
    "Sid": "CreateLaunchTemplate",
    
    "Effect": "Allow",
    
    "Action": [
    
    "ec2:RunInstances",
    
    "ec2:CreateLaunchTemplate",
    
    "ec2:DeleteLaunchTemplate"
    
    ],
    
    "Resource": "*"
    
    }
  2. The ‘CreateTags’ permission needs to be removed. Hence, to create a separate policy for creating tags. Replace the following existing policy.

    Code Block
    "Condition":
    { "StringEqualsIgnoreCase":
    { "ec2:ResourceTag/UsedBy": "Kyvos" } },
     "Action": [ "ec2:DeleteTags", "ec2:CreateTags",
    "ec2:DescribeInstanceStatus" ],
    "Resource": "*",
    "Effect": "Allow",
    "Sid": "Ec2tagsPermissionKM" }, 
  3. After replacing the policy mentioned in Step-2, update the following policy.

    Code Block
    {
    
    "Sid": "Ec2tagsPermissionKM",
    "Effect": "Allow",
    "Action": [
    "ec2:DeleteTags",
    "ec2:DescribeInstanceStatus"
    ],
    "Resource": "*",
    "Condition": {
    "StringEqualsIgnoreCase": {
    "ec2:ResourceTag/UsedBy": "Kyvos"
    }
    }
    },
    {
    "Sid": "Ec2tagsPermissionKM2",
    "Effect": "Allow",
    "Action": [
    "ec2:CreateTags"
    ],
    "Resource": "*"
    }

...