Upgrade Autonomous Identity

Autonomous Identity 2020.10.2 provides upgrade commands to update your core software to the latest version while migrating your data.

The upgrade assumes the following:

  • Database Systems are the Same. If your current database is Apache Cassandra, you cannot upgrade to a MongoDB-based system. You will need to run a clean installation with the new version.

  • Host IPs should be the Same. Host IP addresses must be the same for existing components. You must update the ~/autoid-config/hosts file by adding the IP addresses for the Elasticsearch entries. See the instructions below.

  • Registry Key Required. To download the deployment images for the upgrade, you still need a registry key to log into the ForgeRock Google Cloud Registry (gcr.io). The registry key is only available to ForgeRock Autonomous Identity customers. For specific instructions on obtaining the registry key, see How To Configure Service Credentials (Push Auth, Docker) in Backstage.

  • Additional CSV Files Requires. The upgraded system requires the app_attributes.csv and ent_attributes.csv for attribute filtering on the Applications page. Copy these files to the /data/input directory. For more information on these files, see Data Preparation.

  • Upgrade Paths. The upgrade paths are summarized as follows:

    • 2020.10.x -> 2020.10.2

    • 2020.6.4 -> 2020.10.2

Upgrade from 2020.10.x to 2020.10.2

  1. On the deployer machine, back up the 2020.10.0 or 2020.10.1 ~/autoid-config directory or move it to another location.

    $ mv ~/autoid-config ~/backup-2020.10.1
  2. Create a new ~/autoid-config directory.

    $ mkdir ~/autoid-config
  3. Copy your autoid_registry_key.json, ansible.cfg, and vault.yml files from your backup directory to ~/autoid-config. If your vault.yml file is encrypted, copy the .autoid_vault_password file to ~/autoid-config.

  4. Remove your known_files.

    $ rm ~/.ssh/known_hosts
  5. Copy your original SSH key into the new directory.

    $ cp ~/.ssh/id_rsa ~/autoid-config
  6. Change the permission on the SSH key.

    $ chmod 400 ~/autoid-config/id_rsa
  7. Check if you can successfully SSH to the target server.

    $ ssh autoid@<Target-IP-Address>
  8. Enter exit to end your SSH session.

  9. On the deployer node, change to the ~/autoid-config directory.

    $ cd ~/autoid-config
  10. Log in to the ForgeRock Google Cloud Registry (gcr.io) using the registry key. The registry key is only available to ForgeRock Autonomous Identity customers. For specific instructions on obtaining the registry key, see How To Configure Service Credentials (Push Auth, Docker) in Backstage.

    $ docker login -u _json_key -p "$(cat autoid_registry_key.json)" https://gcr.io/forgerock-autoid

    You should see:

    Login Succeeded
  11. Run the create-template command to generate the deployer.sh script wrapper and configuration files. Note that the command sets the configuration directory on the target node to /config. The --user parameter eliminates the need to use sudo while editing the hosts file and other configuration files.

    $ docker run --user=`id -u` -v ~/autoid-config:/config -it gcr.io/forgerock-autoid/deployer:2020.10.2 create-template
  12. Make the script executable.

    $ chmod +x deployer.sh
  13. Copy your ~/autoid-config/vars.yml, ~/autoid-config/hosts, and ~/autoid-config/vault.yml files from your backup directory to the deployer machine.

    Important

    You must keep your configuration settings consistent from one system to another.

  14. Download the images. This step downloads software dependencies needed for the deployment and places them in the autoid-packages directory. Make sure you are in the ~/autoid-config directory.

    $ ./deployer.sh download-images
  15. Run the upgrade.

    $ ./deployer.sh debug patch_log4j

Upgrade from 2020.6.4 to 2020.10.2

Upgrade to version from 2020.6.4 to 2020.10.2

  1. On the deployer machine, back up the 2020.6.4 ~/autoid-config directory or move it to another location.

    $ mv ~/autoid-config ~/backup-2020.6
  2. Create a new ~/autoid-config directory.

    $ mkdir ~/autoid-config
  3. Copy your autoid_registry_key.json, ansible.cfg, vault.yml, and SSH keys. files from your backup directory to ~/autoid-config. If your vault.yml file is encrypted, copy the .autoid_vault_password file to ~/autoid-config.

  4. Remove your known_files.

    $ rm ~/.ssh/known_hosts
  5. Copy your original SSH key into the new directory.

    $ cp ~/.ssh/id_rsa ~/autoid-config
  6. Change the permission on the SSH key.

    $ chmod 400 ~/autoid-config/id_rsa
  7. Check if you can successfully SSH to the target server.

    $ ssh autoid@<Target-IP-Address>
    Last login: Tue Jan 20 18:19:14 2022
  8. Enter exit to end your SSH session.

  9. On the deployer node, change to the ~/autoid-config directory.

    $ cd ~/autoid-config
  10. Log in to the ForgeRock Google Cloud Registry (gcr.io) using the registry key. The registry key is only available to ForgeRock Autonomous Identity customers. For specific instructions on obtaining the registry key, see How To Configure Service Credentials (Push Auth, Docker) in Backstage.

    $ docker login -u _json_key -p "$(cat autoid_registry_key.json)" https://gcr.io/forgerock-autoid
  11. Run the create-template command to generate the deployer.sh script wrapper and configuration files. Note that the command sets the configuration directory on the target node to /config. The --user parameter eliminates the need to use sudo while editing the hosts file and other configuration files.

    $ docker run --user=`id -u` -v ~/autoid-config:/config -it gcr.io/forgerock-autoid/deployer:2020.10.2 create-template
  12. Make the script executable.

    $ chmod +x deployer.sh
  13. Copy your ~/autoid-config/vars.yml, ~/autoid-config/hosts, and ~/autoid-config/vault.yml files from your backup directory to the deployer machine.

    Important

    You must keep your configuration settings consistent from one system to another.

  14. SSH to the target server.

  15. Stop the stack.

    $ docker stack rm configuration-service consul-server nginx openldap selfservice swagger-ui ui api consul-client
  16. Delete the contents from the consul data. This step is required as the new consul server in the upgrade is not able to load the previous snapshots, because of a version incompatibility.

    $ mv /opt/autoid/mounts/consul-data/* <backup-directory>
  17. Exit your SSH session.

  18. Download the images. This step downloads software dependencies needed for the deployment and places them in the autoid-packages directory. Make sure you are in the ~/autoid-config directory.

    $ ./deployer.sh download-images
  19. Run the upgrade.

    $ ./deployer.sh upgrade
  20. Log out and then log in. SSH to the target server.

  21. Take a backup of the /data/conf or move it to another directory. The directory stores the 2020.6 configuration files.

    $ mv /data/conf <backup-directory>
  22. Create an analytics template. This step creates a template from the new analytics image.

    $ analytics create-template
  23. Edit the /data/conf/analytics_init_config.yml file if you made changes to this file in your previous deployment.

  24. Apply the analytics template.

    $ analytics apply-template
  25. Run the analytics upgrade job.

    $ analytics upgrade
  26. Edit the analytics_config file to set up the ingestion process. The change is required to account for the applications and entitlements tables.

      etl: false
      reports: false
    ingestion:
      drop_if_create: true
      tables: app_attributes,ent_attributes
      catalog_step: false
      staging: false
      connector:
         type: csv
      connector-oim:
         type: oim
         timeout: 15
         batchsize: 1000
         change reconciliation:
         ...
        
  27. Run the analytics ingest job.

    $ analytics ingest
  28. Run the analytics publish job.

    $ analytics publish
  29. Run the create-assignment-index job.

    $ analytics create-assignment-index

    You have successfully upgrade from 2020.6.x to 2020.10.2!

Access the Dashboard

Access the Autonomous Identity console UI:

  1. Open a browser, and point it to https://autoid-ui.forgerock.com/ (or your customized URL: https://myid-ui.abc.com).

  2. Log in as a test user: bob.rodgers@forgerock.com. Enter the password: Welcome123.

Read a different version of :