Upgrading the on-premises gateway on Podman containers
To prepare for the upgrade
- Review the system requirements and download the container images and utility files.
- Back up the /<IIGateway_INSTALL_DIR>/hii/podman-compose.yaml file.
- (Required if you are upgrading to a version 25.3.x or later from a version earlier than 25.2.00) Back up the database:
- Create a temporary directory, dump:
mkdir /tmp/dump - Back up the database in the temporary directory:
podman exec -it swp-arangodb sh -c "arangodump --server.authentication false --all-databases true --overwrite true --dump-data true --output-directory /tmp/dump; tar -cvf /tmp/dump.tgz /tmp/dump" - Copy the backed up files from the container to a temporary directory on the on-premises gateway host:
podman cp swp-arangodb:/tmp/dump.tgz /tmp/
- Create a temporary directory, dump:
- Navigate to the /<IIGateway_INSTALL_DIR> directory and run the following command to archive the hii directory.tar -cvf hii.tar hii
- If you have customized the nginx.conf file before the upgrade, perform the following steps:
- Navigate to the /<IIGateway_INSTALL_DIR>/hii/conf directory.
- Back up the nginx.conf file to a temporary directory.
- If you are using BMC Helix IT Operations Management on premises and authentication is enabled for the on-premises gateway before the upgrade, perform the following tasks:
- Create the iig_auth directory under the <userHome> directory if it doesn't exist.
- Check whether the <userHome>/iig_auth directory contains the external.conf file. If the file is not present, copy it from the /<IIGateway_INSTALL_DIR>/hii/conf/authproxy directory to the iig_auth directory.
- If you are using the BMC Helix IT Operations Management on premises and you are enabling authentication for the on-premises gateway for the first time after upgrade, register the OAuth client. For more information, see Setting-up-authentication-for-the-on-premises-gateway.
Depending upon whether you are a Helix subscriber or you are using BMC Helix Operations Management on premises, start the upgrade process by performing one of the following tasks:
Task 1 (If you are a Helix subscriber): To upgrade the on-premises gateway on Podman containers
- Go to the server where you want to upgrade the on-premises gateway.
- Copy the following files that you have downloaded to the /<IIGateway_INSTALL_DIR> directory:
- Utility file: hii-bmc-<buildNumber>.zip
- Container images:
On-premises gateway version File name Description Download required? 25.3.01 bmc-hii-docker-images-<buildNumber>.tgz Container images for deploying the on-premises gateway Yes bmc-hii-tp-docker-images-<buildNumber>.tgz Container images for monitoring the on-premises gateway node and container health by using dashboards
Yes, if you want to monitor the on-premises gateway
Even if you don't obtain and load these images, you can continue monitoring the on-premises gateway instances by using events.
25.3.00 bmc-hii-docker-images-<buildNumber>.tgz Container images for deploying the on-premises gateway Yes bmc-hii-tp-docker-images-<buildNumber>.tgz Container images for Grafana
Yes
- Perform the following steps to update the container images:
Stop the podman-compose service:
podman compose -f podman-compose.yaml downNavigate to the <IIGateway_INSTALL_DIR> directory, and depending on the on-premises gateway version to which you are upgrading, perform the following steps:
Version Steps 25.3.01
podman load --input bmc-hii-docker-images-<buildNumber>.tgz Load the container images to deploy the on-premises gateway:- (Optional) Perform the following steps if you want to monitor the on-premises gateway node and container health by using dashboards:
Untar the container images:
tar -zxvf bmc-hii-tp-docker-images-<buildNumber>.tgzLoad the container images:
find ./bmc-hii-tp-docker-images-<VERSION> -type f -name "*.tgz" -exec podman load --input "{}" \;
25.3.00
podman load --input bmc-hii-docker-images-<buildNumber>.tgz Load the container images to deploy the on-premises gateway:- Untar the container images for Grafana:
tar -zxvf bmc-hii-tp-docker-images-<buildNumber>.tgz - Load the container images for Grafana:
podman load --input bmc-hii-tp-docker-images-<buildNumber>/hii-grafana.tgz
- Navigate to the /<IIGateway_INSTALL_DIR>/hii/defaults directory and delete the following files if they exist:
- docker-compose.yaml_Rsso
- podman-compose.yaml_Rsso
- nginx.conf_Rsso
Delete the data from the following location:
sudo rm -rf /opt/bmc/hii/data/*- Extract hii-bmc-<buildNumber>.zip and overwrite the existing files in the <IIGateway_INSTALL_DIR>/hii directory.
- Update the hii/conf/nginx.conf file for the port number:
- Open the hii/conf/nginx.conf file with a text editor.
Comment the following line:
listen 443 sslUncomment the following line:
# listen 7443 ssl
- If you have customized the podman-compose.yaml file before the upgrade, copy the customizations to the corresponding sections in the podman-compose.yaml and and podman-compose-monitoring-services.yaml files in the /<IIGateway_INSTALL_DIR>/hii directory.
- If you plan to upgrade to the on-premises gateway for which authentication is enabled after the upgrade, configure the protocol to be used (defaults to HTTP) for authorization between the on-premises gateway and the Identity Management System (IMS), which is part of the BMC Helix platform:
- Navigate to the /<IIGateway_INSTALL_DIR>/hii directory.
- Open the podman-compose.yaml file by using a text editor.
- Locate the mediator > environment section and search for the USE_HTTPS_IMS_URL parameter.
Set the parameter to one of the following values:
- true: The HTTPS protocol is used for communication.
- false (default): The HTTP protocol is used for communication.
- Locate the backup > environment section and add the USE_HTTPS_IMS_URL parameter if it does not exist.
Set the parameter to one of the following values:
- true: The HTTPS protocol is used for communication.
- false (default): The HTTP protocol is used for communication.
- Save and close the file.
- If authentication is disabled for the on-premises gateway before the upgrade and you don't want to enable it after the upgrade, perform the following steps; otherwise, skip to step 10:
- If you have customized and backed up the nginx.conf file, as described in Before you begin, copy the customizations done in the file to the nginx_noauth.conf file in the <IIGateway_INSTALL_DIR>/hii/defaults directory.
- Navigate to the /<IIGateway_INSTALL_DIR>/hii/scripts directory.
- Run the gateway_deployment.sh script:./gateway_deployment.sh
- Enter podman when prompted for the deployment method.
- Enter n to deploy the on-premises gateway with authentication disabled.
The on-premises gateway is upgraded, and authentication is disabled. - Perform one of the following tasks:
- (Version 25.3.01 and later only) Go to step 13 if you want to monitor the on-premises gateway node and container health by using dashboards.
- Go to step 14 to verify that all containers are running.
- If authentication is disabled for the on-premises gateway before the upgrade, and you want to enable it for the first time after the upgrade, perform the following steps; otherwise, skip to step 11:
- Navigate to the /<IIGateway_INSTALL_DIR>/hii/scripts directory.
Run the gateway_deployment.sh script:
./gateway_deployment.sh- Enter podman when prompted for the deployment method.
- Enter y to upgrade to the on-premises gateway with authentication enabled.
- Enter the following information:
Access key and access secret key: Access key and secret key required to access the BMC Helix applications.
For instructions about how to generate the access key and secret key, see Setting up access keys for programmatic access.- Tenant Id: BMC Helix tenant ID.
Copy the tenant ID from the access key (key:<access key>::<secret key>,tenant id: <tenant ID>). - Tenant URL: BMC Helix tenant URL.
For example, https://swp-2021-1840-disceks1.abc.com . - Host name: Name of the server where you want to deploy the on-premises gateway.
The on-premises gateway is upgraded, and authentication is enabled. Also, the cred.json, external.config, and nginx.conf configuration files are backed up in the /<userHome>/iig_auth directory.
- Perform one of the following tasks:
- (Version 25.3.01 and later only) Go to step 13 if you want to monitor the on-premises gateway node and container health by using dashboards.
- Go to step 14 to verify that all containers are running.
- If authentication is enabled for the on-premises gateway before the upgrade and you want to keep it enabled after the upgrade, perform the following steps:
- (Skip this step if you don't want to update the OAuth client and register it again) To register the OAuth client, perform the following steps:
- Delete the <userHome>/iig_auth directory.
- Replace the /<IIGateway_INSTALL_DIR>/hii/scripts/cred.json file with the cred.json file extracted from /<IIGateway_INSTALL_DIR>/hii in step 6.
- Navigate to the /<IIGateway_INSTALL_DIR>/hii/scripts directory.
Run the gateway_deployment.sh script:
./gateway_deployment.sh- Enter podman when prompted for the deployment method.
- Enter y to upgrade to the on-premises gateway with authentication enabled.
The on-premises gateway is upgraded, and authentication is enabled. The external.config, and nginx.conf configuration files are restored from the /<userHome>/iig_auth directory. - If you have customized and backed up the nginx.conf file, as described in Before you begin, copy the customizations done in the file to the nginx.conf file in the <IIGateway_INSTALL_DIR>/hii/conf directory.
Locate the location /hii/api/mediator/v3/push section and copy the following lines to the nginx.conf file in the <IIGateway_INSTALL_DIR>/hii/conf directory after this section:#to get the standby status of node in HA setup.
location /hii/api/mediator/v3/standbyStatus {
add_header X-Frame-Options "SAMEORIGIN" always;
add_header X-Content-Type-Options: "nosniff" always;
add_header Referrer-Policy: "strict-origin-when-cross-origin" always;
add_header permissions-policy: "geolocation=(), camera=(), microphone=()" always;
add_header Cache-Control "no-store, no-cache, must-revalidate, proxy-revalidate" always;
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
add_header Content-Security-Policy: "default-src 'self' iddsqa1-uno.ade-labs.bmc.com:*;connect-src 'self' https://*.ontideway.com https://*.bmc.com https://*.onbmc.com https://*.aptrinsic.com col.eum-appdynamics.com iddsqa1-uno.ade-labs.bmc.com:*;font-src 'self' https://fonts.gstatic.com data: fonts.gstagic.com;img-src 'self' https://web-sdk.aptrinsic.com data: https://storage.googleapis.com https://docs.bmc.com;script-src 'self' 'nonce-gainsight' 'nonce-MjRkMTY2NjYtZWMxMC00YzIwLWFiZmMtNWM0OGRmMWEzMjY0' 'nonce-kQYIGaqXM3' *.aptrinsic.com cdn.appdynamics.com https://documents.bmc.com cdn.appdynamics.com 'nonce-Mzg5MmY4MjgtOWE1OC00OWNiLTkxZDctYjIzZWE4MWI4NzY0';style-src 'self' https://*.aptrinsic.com undefined https: 'unsafe-inline';worker-src blob: ;frame-src 'self' https://www.youtube.com;base-uri 'self';form-action 'self';frame-ancestors 'self';object-src 'none';script-src-attr 'none';upgrade-insecure-requests" always;
proxy_pass http://swp-mediator:9000;
}- Perform one of the following tasks:
- (Version 25.3.01 and later only) Go to step 13 if you want to monitor the on-premises gateway node and container health by using dashboards.
- Go to step 14 to verify that all containers are running..
- (Skip this step if you don't want to update the OAuth client and register it again) To register the OAuth client, perform the following steps:
- (Optional, Version 25.3.01 and later only) Perform the following steps to monitor the on-premises gateway node and container health by using dashboards:
- Navigate to the /<IIGateway_INSTALL_DIR>/hii/scripts directory.
- Run the gateway_monitoring_services_deployment.sh script:
./gateway_monitoring_services_deployment.sh Enter podman when prompted for the deployment method.
After the deployment starts, if you see the following warning, ignore it:
Found orphan containers (swp-arangodb, swp-mediator, swp-fluentd, swp-ui, kafka-1, swp-nginx, swp-backup, zookeeper-1)
for this project. If you removed or renamed this service in your compose file, you can run this command
with the --remove-orphans flag to clean it up.
- Verify that all containers are running.
podman ps -a
If any of the containers are in a restarting state due to permission issues, set the user context for that container. For more information, see Troubleshooting-the-BMC-Helix-Intelligent-Integrations-issues. - (Required if you are upgrading to a version 25.3.x or later from a version earlier than 25.2.00) Restore the database from the backup by using the following commands:
- Copy the backed up files from the local host to the container:podman cp /tmp/dump.tgz swp-arangodb:/tmp/
- Restore the database:
podman exec -it swp-arangodb sh -c "tar -xvf /tmp/dump.tgz -C /tmp/; arangorestore --server.authentication false --all-databases --create-database --input-directory /tmp/tmp/dump"
Access the BMC Helix Intelligent Integrations UI by using the following URL: https://<hostName>:7443/swpui
<hostName> is the fully-qualified domain name of the server where the on-premises gateway is deployed.
For example, https://ii-gateway-2021.abc.com:443/swpui.(Optional) If the upgrade is successful, delete and purge the existing container images:
podman image prune -a
When prompted, enter y to purge the images from the repository.Proceed to Task 2 to continue with the upgrade process.
Task 1 (If you are using BMC Helix IT Operations Management on premises): To upgrade the on-premises gateway on Podman containers
- Go to the server where you want to upgrade the on-premises gateway.
- Copy the following files that you have downloaded to the /<IIGateway_INSTALL_DIR> directory:
- Utility file: hii-bmc-<buildNumber>.zip
- Container images:
On-premises gateway version File name Description Download required? 25.3.00 bmc-hii-docker-images-<buildNumber>.tgz Container images for deploying the on-premises gateway Yes bmc-hii-tp-docker-images-<buildNumber>.tgz Container images for Grafana
- Perform the following steps to update the container images:
Stop the podman-compose service:
podman compose -f podman-compose.yaml downNavigate to the <IIGateway_INSTALL_DIR> directory, and load the container images:
- Load the container images for the on-premises gateway:
podman load --input bmc-hii-docker-images-<buildNumber>.tgz - Untar the container images for Grafana:
tar -zxvf bmc-hii-tp-docker-images-<buildNumber>.tgz - Load the container images for Grafana:
podman load --input bmc-hii-tp-docker-images-<buildNumber>/hii-grafana.tgz
- Load the container images for the on-premises gateway:
- Navigate to the /opt/bmc/hii/defaults directory and delete the following files if they exist:
- docker-compose.yaml_Rsso
- podman-compose.yaml_Rsso
- nginx.conf_Rsso
Delete the data from the following location:
sudo rm -rf /opt/bmc/hii/data/*- Extract hii-bmc-<buildNumber>.zip and overwrite the existing files in the <IIGateway_INSTALL_DIR>/hii directory.
- Update the hii/conf/nginx.conf file for the port number:
- Open the hii/conf/nginx.conf file with a text editor.
Comment the following line:
listen 443 sslUncomment the following line:
# listen 7443 ssl
- If you have customized the podman-compose.yaml file before the upgrade, copy the customizations to the podman-compose.yaml file in the /<IIGateway_INSTALL_DIR>/hii directory.
- If you plan to deploy the on-premises gateway for which authentication is enabled after the deployment, configure the protocol to be used (defaults to HTTP) for authorization between the on-premises gateway and the Identity Management System (IMS), which is part of the BMC Helix platform:
- Navigate to the /<IIGateway_INSTALL_DIR>/hii directory.
- Open the podman-compose.yaml file by using a text editor.
- Locate the mediator > environment section and search for the USE_HTTPS_IMS_URL parameter.
Set the parameter to one of the following values:
- true: The HTTPS protocol is used for communication.
- false (default): The HTTP protocol is used for communication.
Locate the backup > environment section and add the USE_HTTPS_IMS_URL parameter if it does not exist.
Set the parameter to one of the following values:
- true: The HTTPS protocol is used for communication.
- false (default): The HTTP protocol is used for communication.
- Save and close the file.
- If authentication is disabled for the on-premises gateway before the upgrade and you don't want to enable it after the upgrade, perform the following steps; otherwise, skip to step 11:
- If you have backed up the nginx.conf file, as described in Before you begin, copy the customizations done in the file to the nginx_noauth.conf file in the <IIGateway_INSTALL_DIR>/hii/defaults directory.
- Navigate to the /<IIGateway_INSTALL_DIR>/hii/scripts directory.
Run the gateway_deployment.sh script:
./gateway_deployment.sh- Enter docker when prompted for the deployment method.
- Enter n to deploy the on-premises gateway with authentication disabled.
The on-premises gateway is upgraded, and authentication is disabled. - Go to step 13 to verify that all containers are running.
- If authentication is disabled for the on-premises gateway before the upgrade, and you want to enable it for the first time after the upgrade, perform the following steps; otherwise, skip to step 12:
- Perform the following steps to update the BMC Helix SSO configuration for Auth Proxy:
- Navigate to the <IIGATEWAY_INSTALL_DIR>/hii/conf/authproxy directory and open the external.conf file with a text editor.
- Update the file:
- Search for the rsso_external_url and rsso_internal_url parameters and replace {RSSO_URL} with the OpenID Connect Issuer URL.
- Search for the client_id parameter and replace {RSSO_CLIENT_ID} with the Client ID that you saved in a file while registering the OAuth client.
- Search for the client_secret parameter and replace {RSSO_CLIENT_SECRET} with the Client Secret that you saved in a file while registering the OAuth client.
- Locate the proxies section, and replace {TENANT_URL} with the BMC Helix tenant URL. For example, https://swp-2021-1840-disceks1.abc.com.
- Save the file.
- Perform the following steps to update the neo.feature.flags.auth-enabled parameter:
- Navigate to the /<IIGateway_INSTALL_DIR>/hii/conf directory.
- Open the swp.conf file with a text editor.
- Set the value of the neo.feature.flags.auth-enabled parameter to true.
- Save the file.
Start the podman-compose service:
podman compose -f podman-compose.yaml up -d- Go to step 13 to verify that that all containers are running.
- Perform the following steps to update the BMC Helix SSO configuration for Auth Proxy:
- If authentication is enabled for the on-premises gateway before the upgrade and you want to continue with authentication after the upgrade, perform the following steps:
- Perform the following steps to update the neo.feature.flags.auth-enabled parameter:
- Navigate to the /<IIGateway_INSTALL_DIR>/hii/conf directory.
- Open the swp.conf file with a text editor.
- Set the value of the neo.feature.flags.auth-enabled parameter to true.
- Save the file.
- If you have customized and backed up the nginx.conf file, as described in Before you begin, copy the customizations done in the file to the nginx.conf file in the <IIGateway_INSTALL_DIR>/hii/conf directory..
- Copy the external.conf file from the <userHome>/iig_auth directory to the /<IIGateway_INSTALL_DIR>/hii/conf/authproxy directory.
Start the podman-compose service:
podman compose -f podman-compose.yaml up -d- Go to step 13 to verify that all containers are running.
- Perform the following steps to update the neo.feature.flags.auth-enabled parameter:
- Verify that all containers are running.
podman ps -a
If any of the containers are in a restarting state due to permission issues, set the user context for that container. For more information, see Troubleshooting-the-BMC-Helix-Intelligent-Integrations-issues. - (Required if you are upgrading to a version 25.3.x or later from a version earlier than 25.2.00) Restore the database from the backup by using the following commands:
- Copy the backed up files from the local host to the container:podman cp /tmp/dump.tgz swp-arangodb:/tmp/
- Restore the database:
podman exec -it swp-arangodb sh -c "tar -xvf /tmp/dump.tgz -C /tmp/; arangorestore --server.authentication false --all-databases --create-database --input-directory /tmp/tmp/dump"
Access the BMC Helix Intelligent Integrations UI by using the following URL: https://<hostName>:7443/swpui
<hostName> is the fully-qualified domain name of the server where the on-premises gateway is deployed.
For example, https://ii-gateway-2021.abc.com:443/swpui.
(Optional) If the upgrade is successful, delete and purge the existing container images:
podman image prune -aWhen prompted, enter y to purge the previous version images from the repository.
Proceed to Task 2 to continue with the upgrade process.
Task 2: To import SSL certificates into on-premises gateway
- Obtain the SSL certificates from the BMC Helix platform deployment which the on-premises gateway is part of and save them in the <IIGateway_INSTALL_DIR>hii/conf directory.
Copy the cacerts file present in the swp-mediator container at /opt/java/lib/security to the /<IIGateway_INSTALL_DIR>/hii/conf/certs directory by using the following command:
podman cp swp-mediator:/opt/java/lib/security/cacerts /<IIGateway_INSTALL_DIR>hii/conf/certs/cacerts_mediator(If authentication is enabled for the on-premises gateway) Copy the cacerts file present in the swp-authproxy container at /opt/java/openjdk/lib/security to the /<IIGateway_INSTALL_DIR>/hii/conf/certs directory by using the following command:
podman cp swp-authproxy:/opt/java/openjdk/lib/security/cacerts /<IIGateway_INSTALL_DIR>hii/conf/certs/cacerts_authproxy- Navigate to the /<IIGateway_INSTALL_DIR> /hii/conf/certs folder.
- Import the certificates into the copied files by using the keytool utility.
Import the certificates into the cacerts_mediator file by using the following command:
keytool -importcert -file <certificate_name> -keystore cacerts_mediator -alias <alias_name>Replace the certificate_name with the certificate name that you obtained from the BMC Helix platform deployment.
(If authentication is enabled for the on-premises gateway) Import the certificates into the cacerts_authproxy file by using the following command:
keytool -importcert -file <certificate_name> -keystore cacerts_authproxy -alias <alias_name>Replace the certificate_name with the certificate name that you obtained from the BMC Helix platform deployment.
- Open the /<IIGateway_INSTALL_DIR> /hii/podman -compose.yaml file with a text editor:
- Update the file:
Search for the mediator section and add the following line to the volumes section:
- ./conf/certs/cacerts_mediator:/opt/java/lib/security/cacerts(If authentication is enabled for the on-premises gateway) Search for the authproxy section and add the following line to the volumes section:
- ./conf/certs/cacerts_authproxy:/opt/java/openjdk/lib/security/cacerts
- Save and close the file.
Restart the podman service by using the following commands:
podman-compose -f podman-compose.yaml down
podman-compose -f podman-compose.yaml up -d
Task 3: To edit the connector in BMC Helix Intelligent Integrations
If there are any updates in the connector configuration during upgrade, the existing connector instances are not updated automatically after upgrade. You need to either create a new connector instance or stop the existing data stream and create a new data stream.
For the list of updates in various connectors in version 25.1, see 25-1-enhancements-and-patches. For information about editing an existing connector for data streams, see Editing-and-deleting-integrations and Starting-or-stopping-data-streams.
Task 4: To update the collector URL in the third-party products
If you have switched authentication for the on-premises gateway during upgrade, perform the following steps to update the collector URL in the third-party product (for example, Entuity) from which you are collecting data:
- Access the BMC Helix Intelligent Integrations UI by using the following URL:
https://<hostName>:443/swpui
<hostName> is the fully-qualified domain name of the server where the on-premises gateway is deployed. - On the SOURCES panel, click Configure Mediator for the source connection that you created and then expand the < thirdPartyProduct Datatype> panel .
- On the COLLECTOR CONFIGURATION tab, click copy
For example, https://hostA/hii/api/mediator/v3/push/9mn-6c97-4c2e-8pc5-12c0asdf?token=API-KEY . to copy the existing, auto-generated collector URL and save the URL in a temporary file. - Depending on whether authentication is enabled or disabled for the on-premises gateway, perform the following steps:
- If authentication is enabled, perform the following steps:
Log on to BMC Helix Portal and generate an access key.
For instructions about how to generate the access key, see Setting up access keys for programmatic access.- Copy the generated access key and save it in a temporary file.
The key is generated in the format:<accessKey>::<secretKey>::<tenantID>.
For example, Y40OSC49QZA11Q8A1H9H6::MnVLk69TNyCEponsthHJ1Hj1uKcjTB::385261281. - Change the format of the access key to <tenantID>::<accessKey>::<secretKey>.
For example, 385261281::Y40OSC49QZA11Q8A1H9H6::MnVLk69TNyCEponsthHJ1Hj1uKcjTB. - In a temporary file, modify the auto-generated collector URL by replacing API-KEY with the access key that you formatted in the previous step.
For example, https://host.ab.com/hii/api/mediator/v3/push/9mn-6c97-4c2e-8pc5-12c0asdfd?token=385261281::Y40OSC49QZA11Q8A1H9H6::MnVLk69TNyCEponsthHJ1Hj1uKcjTB .
- If authentication is disabled, perform the following steps:
- Save the URL in a temporary file.
- Remove the following string from the collector URL: ?token=API-KEY
The updated collector URL looks like the following example:
https://hostA/hii/api/mediator/v3/push/9mn-6c97-4c2e-8pc5-12c0asdf
- If authentication is enabled, perform the following steps:
Task 5: To configure the third-party products
Configure the third-party products again to forward data to BMC Helix Intelligent Integrations.
For the sample instructions to update the collector URL in a third-party product, see To configure a connection with Entuity for collecting incidents data.
To roll back the on-premises gateway upgrade
Stop the podman-compose service:
podman-compose -f podman-compose.yaml downRename the /<IIGateway_INSTALL_DIR>/hii directory:
mv hii hii_upgradeYou might need the hii_upgrade directory for debugging.
- If you have enabled authentication during the upgrade, navigate to the <userHome> directory and delete the iig_auth directory and any other directories or files created in this directory during the upgrade.
Extract the backed up hii.tar:
tar -xvf /<IIGateway_INSTALL_DIR>/hii.tar -C /<IIGateway_INSTALL_DIR>/- Start the podman-compose service:podman-compose -f podman-compose.yaml up -d
- Access the BMC Helix Intelligent Integrations UI by using the following URL: https://<hostName>:443/swpui
<hostName> is the fully-qualified domain name of the server where the on-premises gateway is deployed.
For example, https://swp-2021-1840-disceks1.abc.com:443/swpui.