Upgrading the on-premises gateway by using Podman containers
This topic describes how to upgrade the BMC Helix Intelligent Integrations on-premises gateway by using Podman containers.
Before you begin
- Review the system requirements and download the container images and utility files.
- Back up the connector configurations, see Backing-up-and-restoring-connector-configurations.
To upgrade the on-premises gateway by using Podman containers
- Go to the server where you want to upgrade the on-premises gateway.
- Copy the following files that you have downloaded to the /<IIGateway_INSTALL_DIR> directory:
- Container images: bmc-hii-docker-images-<buildNumber>.tgz
- Utility file: hii-bmc-<buildNumber>.zip
- Update the container images:
Stop the podman-compose service.
podman-compose downDelete and purge the existing container images from the local repository.
podman image prune -a- When prompted to purge all containers, enter Y.
Load the container images.
podman load --input <IIGateway_INSTALL_DIR>/bmc-hii-docker-images-<buildNo>.tgz
Obtain the database version.
cat podman-compose.yaml | grep image | grep arango- Navigate to the /opt/bmc/hii/defaults directory and delete the following files if they exist:
- docker-compose.yaml_Rsso
- podman-compose.yaml_Rsso
- nginx.conf_Rsso
- Unzip hii-bmc-<buildNumber>.zip and overwrite the existing files in the <IIGateway_INSTALL_DIR>/hii directory.
- Upgrade the database:
Open the /<IIGateway_INSTALL_DIR>/hii/podman-compose.yaml file with a text editor and search for the following line:
# - --database.auto-upgradeUncomment the line.
- --database.auto-upgradeStart the podman-compose service.
podman-compose -f podman-compose.yaml up -dOpen the /<IIGateway_INSTALL_DIR>/hii/podman-compose.yaml file with a text editor and search for the following line:
- --database.auto-upgradeComment the line.
# - --database.auto-upgradeStop the podman-compose service.
podman-compose -f podman-compose.yaml down
Change permissions on the /<IIGateway_INSTALL_DIR>/hii/logs directory:
chmod 777 /<IIGateway_INSTALL_DIR>/hii/logs- (Applicable if you are upgrading to version 24.3.00) Perform the following steps to disable the authentication:
Change permissions on the /<IIGateway_INSTALL_DIR>/hii/scripts/iig_noauth.sh file:
chmod +x /<IIGateway_INSTALL_DIR>/hii/scripts/iig_noauth.shNavigate to the /<IIGateway_INSTALL_DIR>/hii/scripts directory and run the following command:
./iig_noauth.sh -noauth
- (Applicable if you are upgrading to version 24.3.01) Depending on whether you want to enable or disable the authentication, perform one of the following tasks:
- To enable the authentication:
- Navigate to the /<IIGateway_INSTALL_DIR>/hii/scripts directory and open the cred.json file with a text editor.
- Update the values of the following parameters:
access_key and access_secret_key: Access key and secret key required to access the BMC Helix applications.
For instructions about how to generate the access key and secret key, see Setting up access keys for programmatic access.
The keys are generated in the following format: key:<access key>::<secret key>,tenant id: <tenant ID>. Enter <access key> and <secret key> as the values of the access_key and access_secret_key parameters.- tenant_id: Tenant ID
Copy the tenant ID from the access key (key:<access key>::<secret key>,tenant id: <tenant ID>) - tenant_url: Tenant URL
- host_name: Name of the server where the on-premises gateway is installed.
Change permissions on the /<IIGateway_INSTALL_DIR>/hii/scripts/iig_auth.sh file:
chmod +x /<IIGateway_INSTALL_DIR>/hii/scripts/iig_auth.shNavigate to the /<IIGateway_INSTALL_DIR>/hii/scripts directory and run the following command:
./iig_auth.sh -auth- After the script file is successfully executed, cred.json and external.conf files are backed up in the /<userhome>/iig_auth folder.
- To disable the authentication:
Change permissions on the <IIGateway_INSTALL_DIR>/hii/scripts/iig_auth.sh file:
chmod +x /<IIGateway_INSTALL_DIR>/hii/scripts/iig_auth.shNavigate to the /<IIGateway_INSTALL_DIR>/hii/scripts directory and run the following command:
./iig_auth.sh -noauth
- To enable the authentication:
- Update the SSL configuration:
- Open the hii/conf/nginx.conf file with a text editor.
In the following SSL configuration, replace <iihostname> with the fully qualified domain name of the server where you are upgrading the on-premises gateway.
ssl_certificate /etc/nginx/certs/<iihostname>.crt; #certificate path
ssl_certificate_key /etc/nginx/certs/<iihostname>.key; #certificate keyComment the following line:
listen 443 sslUncomment the following line:
# listen 7443 sslRestart the podman-compose service by using one of the following set of commands:
podman-compose -f podman-compose.yaml down
podman-compose -f podman-compose.yaml up -d
Access the BMC Helix Intelligent Integrations UI by using the following URL:
https://<hostName>:7443/swpui
<hostName> is the fully-qualified domain name of the server where the on-premises gateway is deployed.
For example, https://swp-2021-1840-disceks1.abc.com:443/swpui.
After you upgrade
Update the collector URL in the third-party product if the following conditions are satisfied:
- You have upgraded to version 24.3 or later from a version earlier than 24.1 and SSL was not configured before upgrade.
- You are collecting data from a third-party product via the webhook mechanism.
Perform the following tasks to update the collector URL:
- Access the BMC Helix Intelligent Integrations UI by using the following URL:
https://<hostName>:7443/swpui - On the SOURCES panel, click Configure Mediator
for the source connection that you created and then expand the <thirdPartyProduct Datatype> panel.
- On the COLLECTOR CONFIGURATION tab, click copy
to copy the existing, auto-generated collector URL and save the URL in a temporary file.
For example, https://hostA:7443/hii/api/mediator/v3/push/9mn-6c97-4c2e-8pc5-12c0asdf. - Configure the third-party product again to forward data to BMC Helix Intelligent Integrations.
For the sample instructions to update the collector URL in the third-party product, see To configure a connection with Entuity for collecting incidents data.