Skip to main content
Version: 2.10

Upgrade PXB on Air-gapped Environments

Upgrade Portworx Backup on Airgapped Environments

To upgrade to required version of Portworx Backup:

You need to generate customized values-px-central.yaml for Portworx Backup installation spec (Helm command) because when you initially installed Portworx Backup using Helm, you likely customized several settings (for example, image registry paths, versions, storage class names, proxy configs, and so on). During an upgrade, you must retain these customizations to avoid overwriting your working setup. Helm upgrades are declarative, and if you do not pass your previous configuration again, Helm assumes defaults. To generate the customized values-px-central.yaml:

  1. Access Portworx Central portal.

  2. Enter user credentials and make sure that you go through End-User License Agreement (EULA).

    If you are new to Portworx Central, click on Create account to generate your login credentials. You can also sign in with your organization’s OIDC identity provider, Google or Github account.

  3. Click Sign In to access the Portworx Central portal.

  4. On the home page, under Explore our Products, navigate to the Portworx Backup card. Then click Generate Backup Spec to open the Portworx Backup Install/upgrade page (Spec Details tab).

  5. In the Spec Details provide the following values:

    1. Release Data:

    • Backup Version: select the required version of Portworx Backup from the drop-down list, for example 2.10.0.

    • Namespace: provide the name of the namespace where you want an instance of Portworx Backup to be installed

    • Select your environment: choose On-Premises or Cloud based on your storage environment

    1. Configuration:

    • StorageClass Name: name of the StorageClass, refer tooltip for more details

      note

      Defining the namespace and StorageClass is a one-time configuration step that should be completed during the initial installation. PVCs will be created using Namespace and StorageClass values you define in the SpecGen, and these values cannot be modified later during an upgrade.

      • Enable Rancher RBAC: select this checkbox if you are using Rancher for managing your Kubernetes clusters and want to enable Rancher's Role-Based Access Control (RBAC) for Portworx Backup. This feature can be enabled only if you have LDAP or PingIdentity as your identity provider. For more information, refer to PXB Rancher RBAC and Rancher RBAC.
    • Use your OIDC: Select this option only if your external authorization provider is Auth0 and key in the following fields:

      • Endpoint
      • Client ID
      • Client Secret

      These values can be fetched from the Auth0 web console.

    • Use existing Prometheus: select this checkbox if you have to use your existing Prometheus stack to monitor Portworx Backup and enter the values for the following fields:

      • Prometheus Endpoint: enter details of the endpoint where your Prometheus is installed
      • Alertmanager Endpoint: enter details of the endpoint where your Alertmanager is installed
      • Prometheus secret name: enter secret name of your Prometheus stack
      • Alertmanager secret name: enter secret name of your Alertmanager
      • Custom email template from PX-Backup: select to upload Portworx Backup's custom email template to your pre-configured Alertmanager for email notifications
    • Proxy Configuration: select this checkbox if you have proxy server configured in your environment and enter the values for the following fields:

    • Unathenticated: choose this if you have unathenticated proxy server

      • HTTP Proxy: proxy server URL for http proxy
      • HTTPS Proxy: proxy server URL for https proxy
      • NO PROXY: Comma separated list of hostnames IPs or domains that should bypass the proxy settings
    • Authenticated/CA: choose this option if your cluster is behind a proxy server with authentication or CA

      • Proxy configuration secret: name of the kubernetes proxy configuration secret created in pxb namespace holding the proxy configuration

    1. Use custom registry: select this check box only if you are upgrading PXB on air-gapped environment. For more information, refer to Prepare air-gapped environment.

      • Custom Image Repository Location: path of custom image repository
      • Image Pull Secret(s): create a secret in the following cases:
        • If image pulling from an internal repository requires credentials
        • If you were using docregistry-secret
    2. Database Credentials: This section configures database passwords for the various database components used by Portworx Backup. For guidelines on how to set the database credentials, refer to Password Policy.

      • MySQL Root User Password: root password for MySQL database

      • Postgres User Password: password for PostgreSQL user

      • MongoDB PX-Backup User Password: password for MongoDB PX-Backup user

      • MongoDB Root User Password: root password for MongoDB database

      • MongoDB Replica Set Key: key for MongoDB replica set authentication

      • Encrypt MongoDB: select this checkbox to enable encryption at rest for MongoDB database

      • MongoDB Master Encryption Key: Master encryption key for MongoDB encryption at rest

        caution

        Safeguarding your encryption key is vital to prevent permanent data loss. If the key is lost, you will be unable to access your encrypted data, as it is the only means of decryption. Without it, the data is rendered completely inaccessible and cannot be recovered. Note that encryption keys cannot be rotated after they are set.

  6. Click Next to navigate to Finish tab.

Navigate to the Finish tab at the top to execute few commands to complete the installation.