You can upgrade your Cloud
APM server from V8.1.3 to V8.1.4 on the same system. The advantage with this method is that a second system is not required for the upgrade. Customers with small to medium environments usually choose this method.
About this task
The procedure for upgrading the Cloud
APM server from V8.1.3 to V8.1.4 on the same system involves these general steps:
- Install the Cloud
APM
V8.1.3 interim fix 16 (8.1.3.0-IBM-IPM-SERVER-IF0016) or
later on your V8.1.3 Cloud
APM server.
- Back up your V8.1.3 interim fix 16 or
later server data and configuration files with the backup script that is part of the V8.1.3 interim fix 16 server installation.
- Uninstall your V8.1.3 Cloud
APM server. After the uninstall is finished, delete any
install_dir/wlp-backup* directories; for example:
wlp-backup-02.
- If
your Cloud
APM server is connected to a remote Db2 server, back up the DATAMART, WAREHOUS, and SCR32
databases if these databases were not backed up recently. The backup.sh script
can be used to complete this backup. Then, run commands to update the SCR database on the remote
Db2 server.
- Install the V8.1.4 Cloud
APM server and indicate that you are upgrading. The
installation script restores the server data and configuration files from the V8.1.3 Cloud
APM server backup file.
Procedure
While logged in as the root user on the system where your V8.1.3 Cloud
APM server is installed, complete these steps to upgrade
your server to V8.1.4 on the same system:
Download and extract the V8.1.4 Cloud
APM server installation image
-
Download the V8.1.4 Cloud
APM server installation image from the download site to a staging location of your choosing.
-
If you plan to configure the agent images, the Hybrid Gateway image, or both during the server upgrade, download the images.
-
Extract the server installation files for your offering.
In V8.1.4, two offerings are supported instead of four offerings that were supported in the V8.1.3 release. These offerings are:
- IBM
Cloud Application Performance Management, Advanced Private
- advanced_8.1.4.0.tar
- IBM
Cloud Application Performance Management, Base Private
- base_8.1.4.0.tar
The
IBM
Cloud Application Performance Management, Base Private offering now includes the V8.1.3 IBM Monitoring offering capability and the
IBM
Cloud Application Performance Management, Advanced Private offering now includes the capability of the other three V8.1.3 offerings. You must use the V8.1.4 offering file that matches the offering that was installed on the V8.1.3
Cloud
APM server for the upgrade.
For example, if IBM Monitoring was installed in the V8.1.3 Cloud
APM server, you must use the V8.1.4 IBM
Cloud Application Performance Management, Base Private offering file to complete the upgrade.
Download and install the V8.1.3 patch on your V8.1.3 Cloud
APM server
-
Install the V8.1.3 patch on your V8.1.3 Cloud
APM server:
-
Download the
V8.1.3 interim fix 16 (8.1.3.0-IBM-IPM-SERVER-IF0016) or later patch from IBM Fix Central on the IBM support site.
-
Copy the
8.1.3.0-IBM-IPM-SERVER-IF0016.tar file to your V8.1.3
Cloud
APM server and complete these steps on the V8.1.3
Cloud
APM server.
- Extract the patch
package:
tar xvf 8.1.3.0-IBM-IPM-SERVER-IF0016.tar
- Run the following script to apply the patch:
apmpatch.sh
-
Verify that the default permissions are set correctly. Open a command prompt and enter
umask
.
A value of
0022
is returned if the permissions are set correctly. If any other value is returned, set the permissions by entering the following command:
umask 0022
Back up your V8.1.3 Cloud
APM server and
then uninstall the server
-
Run the following command as user root to back up your V8.1.3 interim fix 16 or later Cloud
APM server installation.
install_dir/ccm/backup.sh [-f ~/backup813.tar]
where
install_dir is the directory where you installed the
V8.1.3 interim fix 16
Cloud
APM server. Include the
-f
option when you want to specify the path and file name for the server backup. For example,
~/backup813.tar saves to
/root/backup813.tar. The
default path is
/opt/ibm/backups/backup_yyyymmdd_hhmmss.tar,
such as
/opt/ibm/backups/backup_20160826_155605.tar.
If your existing V8.1.3 server is configured with a
non-default user name for the
Cloud
APM user
interface administrator account, you must run the following
backup.sh script as
user root:
install_dir/ccm/backup.sh [-f ~/backup813.tar]
-u uiadmin_username -p uiadmin_password
For
example, if the
Cloud
APM UI administrator user
name is
uiadmin
and the non-default password for this user is
uiadminpwd
, enter the following command:
install_dir/ccm/backup.sh -u uiadmin -p uiadminpwd
Note:
- If you do not want the password to be visible by other users, you can use environment variables
to provide the password and the user name by entering the following
commands:
export APMADMIN_USERNAME=uiadmin
export APMADMIN_PASSWORD=uiadminpwd
Then,
run the backup.sh script as user root by entering the following
command:install_dir/ccm/backup.sh [-f ~/backup813.tar]
The Cloud
APM UI administrator's user name and
password is read from the backup during the restore phase.
- If your Cloud
APM server is connected
to a remote Db2 server, you can ignore the warning
to run the backup script on the remote Db2 server
server.
Output messages inform you of the backup progress, backup path, and file name upon
completion.
-
Uninstall your V8.1.3 Cloud
APM server:
-
Run the following command in the /opt/ibm/ccm directory (or /custom_path/ccm if you installed the server in a different path):
-
Review the list of installed Cloud
APM offerings and enter the number that uninstalls all the offerings (the whole product) or enter q (quit) to cancel the uninstall operation.
If your Cloud
APM server connects to a
remote Db2 server, back up databases and update
the SCR database
-
If your Cloud
APM server is connected to a remote
Db2 server, complete these steps as root user:
-
As Db2 instance user
db2apm
on the system where Db2 is installed, back up the
DATAMART, WAREHOUS, and SCR32 databases.
If the database administrator who is managing the remote Db2 server does not have procedures for backing up the
database, run the Cloud
APM server backup script:
- Copy /tools/backup.sh from the V8.1.4 Cloud
APM server installation image to the remote Db2 server.
- As user root and Db2 instance user
db2apm
, enter the following commands on the remote Db2 server:
chmod 755 backup.sh
./backup.sh [-f ~/backup814.tar]
If your Db2 server is running on AIX, you must run the
backup.sh script in the bash shell. If the bash shell is not installed on your
Db2 server, download the rpm for bash from the
AIX Toolbox for Linux Applications.
-
Copy the setup-dbconfig-platform_64.bin script from the
packages/SCR directory of the V8.1.4 Cloud
APM server installation image to the remote Db2 server system.
-
If you are not already logged in as
db2apm
, enter:
-
Run the setup_dbconfig-platform_64.bin script to set up
the SCR32 database where platform is either AIX or Linux.
Run the script as the same
Db2 instance
user
db2apm
who ran the script during the creation of the V8.1.3. SCR database. Do
not run the script as user root.
/path/setup-dbconfig-linux_64.bin -i console
Follow the console prompts:
- When you are prompted to choose a locale, enter 2 to select English.
- Enter 1 to accept the license agreement.
- Enter the absolute path to the installation folder or press Enter to accept the default path.
The default path is the setup-dbconfig installation path for V8.1.3. Do not
change this path, unless the path is incorrect. In this procedure, this path is referred to as
/opt/ibm/db2/tbsmdb.
The
Cloud
APM SCR database configuration tools
installed by the setup_dbconfig-platform_64.bin script
should not be installed into the same directory as the Tivoli Business Service Manager database
configuration tools if the databases for both products reside on the same remote Db2 server.
- Enter 1 to select
IBM Cloud Application Performance
Management(APM)
as the product that uses the database.
- Enter 1 to select
Simple
as the type of installation to
run.
- Enter 2 to instruct the installer not to create the database schema,
including the tables, table spaces, and views.
- Enter the following database configuration details when you are prompted:
- Database Name (maximum 8 characters) (DEFAULT: SCR32): SCR32
- Database host name or IP address (DEFAULT): hostname_or_IP_address
- Database Port (DEFAULT: 50000): port
- Database Path (Default: <default>): default_path
- Create an encrypted database (only applicable on Db2 for Cloud V10.5 fix pack 3 or later). Press
Enter and accept the default selection that is displayed.
-
Upgrade the database schema and Java UDF routines in the Db2 SCR database.
Enter:
cd install_path/tbsmdb/tools/XMLtoolkit/bin
./scr_restore.sh -U db2apm -P passw0rd -n
where
install_path is the path that you entered when you set up
setup-dbconfig.
If you do not want the password visible on the command line,
you can omit the -
P flag and the script prompts for the password. For
example:
./scr_restore.sh -n
Enter the database password:
-
Enter the following command as the
db2apm
user for each database to adjust the
buffer pool after you determine the size of your environment.
db2 connect to WAREHOUS
db2 alter bufferpool IBMDEFAULTBP IMMEDIATE size WAREHOUS_PAGE_COUNT
db2 disconnect WAREHOUS
db2 connect to DATAMART
db2 alter bufferpool IBMDEFAULTBP IMMEDIATE size DATAMART_PAGE_COUNT
db2 disconnect DATAMART
db2 connect to SCR32
db2 alter bufferpool IBMDEFAULTBP IMMEDIATE size 5000
db2 alter bufferpool TBSMCFG16KBP IMMEDIATE size 1000
db2 alter bufferpool TBSM4KBP IMMEDIATE size 1000
db2 alter bufferpool TBSM32KBP IMMEDIATE size 1000
db2 alter bufferpool TBSMSCR16KBP IMMEDIATE size SCR32_PAGE_COUNT
db2 disconnect SCR32
where:
- WAREHOUS_PAGE_COUNT is the page count (8 K page size) for the WAREHOUS
database IBMDEFAULTBP bufferpool: 50000 for small; 100000 for medium; or 200000 for large
- DATAMART_PAGE_COUNT is the page count (8 K page size) for the DATAMART
database IBMDEFAULTBP bufferpool: 100000 for small; 200000 for medium; or 300000 for large
- SCR32_PAGE_COUNT is the page count (16 K page size) for the SCR32 database
TBSMSCR16KBP bufferpool: 30000 for small; 50000 for large; or 100000 for large
Estimate the size of your environment (small, medium, or large) from the server requirements
table in
Cloud APM server hardware requirements.
Install the V8.1.4 Cloud
APM server
-
Install the new version of the Cloud
APM server and
restore the data and configuration from the backup. Complete these sub-steps as the root user.
-
If the computer system or virtual machine where you are installing the Cloud
APM server with a local Db2 server is using LDAP to authenticate the root user or
Db2 users for your Cloud
APM server, you must create local Db2 users before installing the V8.1.4. Cloud
APM server. Complete steps 1 to 7 in Installing on a system using an external directory service.
- If your
V8.1.3 Cloud
APM server has a local Db2 server with custom passwords set for Db2 users
itmuser
and
db2apm
, you must change the values of the database passwords in Cloud
APM 8.1.4.0 install.properties
before running install.sh
:
db2apm.password=my_custom_password
itmuser.password=my_custom_password
-
When you are upgrading your Cloud
APM server from
V8.1.3 to V8.1.4, you must install V8.1.4 in the same directory where the V8.1.3 server was
previously installed. This installation path was either the default /opt/ibm
directory or a directory that you chose. Run the
./install.sh
command to start the
installation script.
-
When you are asked if you want to upgrade from an existing installation of the Cloud
APM server, enter 1 (Yes).
-
When you are asked if you want to migrate the server data and configuration automatically or
manually, enter 2 for manual migration.
-
When you are asked for the backup file location, enter the path and file name that you created
in Step 6 (such as
/opt/ibm/backups/backup_20160826_155605.tar).
-
When you are asked whether you accept the license agreement, enter 1 to
accept the agreement and continue, or enter 2 to decline.
-
After you are asked whether you want to configure your agent
installation images and Hybrid Gateway
installation image (if used) to connect to the server, enter either 1 (yes)
to configure the images now or 2 (no) to defer configuration of the agent and
Hybrid Gateway images.
If you entered
1 (yes), you are prompted
to confirm the following information:
- The path to the directory on the server where the agent images and Hybrid Gateway (if used) are stored.
The
agent images and Hybrid Gateway images can
be mounted on an NFS partition but must be accessible using the file system.
- Enter
the path to the directory for the configured agent installation images or accept the default
install_dir/ccm/depot
directory.
- If you accepted the default directory for storing the configured agent and
Hybrid Gateway images, the installer creates
the directory install_dir/ccm/depot for storing the configured agent and Hybrid Gateway images. However, if you chose to
change the directory, or if the installer fails to create the directory, or the directory is not
writable, you are prompted to specify the output directory.
If you entered 2 (no), this step is skipped.
-
When you are prompted to enter the host name and IP address of the
server that will be used in a web browser to log into the Cloud APM console, accept the default values or enter your own
values.
This is the address that users enter to start the
Cloud APM console from their web browsers, for example:
https://myserver:9443 or http://myserver:8080
. You can change the IP address and
host name later. See
Changing the server IP address and host name.
-
If your Cloud
APM server is connected to a remote
Db2 server, respond to the prompts to connect to
the remote Db2 database:
Enter configuration parameters to establish connection to the existing DB2 database.
Enter the hostname/IP address to the DB2 host or accept the default [10.46.40.100]:
Enter the port number of the DB2 instance
or accept the default [50000]:
Enter the password for the user "itmuser":
Enter the remote DB2 instance name or accept the default [db2apm]:
Enter the password for the instance user "db2apm":
If
you get a message
that the Db2 database names
must match, accept the default values to use the V8.1.3
names:
Enter the name of Metric Cache database or accept the default [WAREHOUS]:
Enter the name of Topology database or accept the default [SCR32]:
Enter the name of Datamart database or accept the default [DATAMART]:
Note: After this step is completed, do not restore the remote Db2 server.
If
the installer detects any agent configuration packages in install_dir/ccm/depot from a previous
installation of the Cloud
APM server, it warns you that
it renamed the old packages and created new agent packages. The old packages are named install_dir/ccm/depot.old.
If the installer
detects a keyfiles directory in install_dir from a previous installation of the
Cloud
APM server, it warns you that it renamed the old
keyfiles directory and created a new directory. The old
keyfiles directory is named install_dir/keyfiles.old.
A prerequisite scan of your environment starts and takes a few moments to complete. If any
requirements are missing, a message directs you to a log file with the reason for the failure, such
as insufficient disk space. You must address the failure and start the installation again. A
soft
prerequisite such as low available memory does not stop the installation but you must
enter 1 to continue installing or 2 to stop.
If the Hybrid Gateway is
installed, migrate your configuration
-
Migrate your Hybrid Gateway
configuration:
- To migrate the Hybrid Gateway
immediately after a restore, run these commands on the Cloud
APM server as the root user:
- Copy the restored config.properties file to the ccm
directory:
cp install_dir/ccm/properties/config.properties.restored install_dir/ccm/properties/config.properties
- Update the date and time of the config.properties file so that any Hybrid
Gateways already running will reload their
configuration:
touch config.properties
- Copy the updated config.properties file to the Central Configuration
Services
component:
cp install_dir/ccm/properties/config.properties install_dir/wlp/usr/servers/min/dropins/CentralConfigurationServer.war/common/config.properties
- If any configurations were done on the upgraded system after the restore, complete these
steps:
- Copy these two lines from theinstall_dir/ccm/properties/config.properties.restored
file:
com.ibm.tivoli.ccm.encryption\:key=
com.ibm.tivoli.ccm.gaian.connect\:gaianReq=
- Replace the same lines in install_dir/ccm/properties/config.properties with the lines that you just copied.
- Copy config.properties to the Central Configuration Services
component:
cp install_dir/ccm/properties/config.properties install_dir/wlp/usr/servers/min/dropins/CentralConfigurationServer.war/common/config.properties
To verify that the config.properties file in
install_dir/wlp/usr/servers/min/dropins/CentralConfigurationServer.war/common/ was replaced, check
that the modified date and time are current.
Results
The installer upgrades to the new version of the Cloud
APM server and restores the data and configuration from the
server backup. This upgrade procedure can take up to 1 hour or longer depending on the size of your
backup.
What to do next
- If you are using
the default out of the box certificates for accessing the Cloud APM console, you must complete the steps in this technote
V8.1.4 Application Performance Management UI certificates are expiring in upgraded
environments to update the default certificates to prevent them from expiring in April
2019.
- Before you use the Cloud APM console that you upgraded, clear your web browser cache
and restart your browser. Clearing the cache avoids display issues that new capabilities in this
update introduced to some of the user interfaces.
- Hybrid Gateway users:
During the upgrade, the server restore script adds the V8.1.4 encryption key and
gaiandb
credential to the restored config.properties file. The Hybrid Gateway then downloads the
config.properties
file and attempts to use the new encryption key to decrypt the ITM
password. Since this key was not used to encrypt the password, the decryption attempt fails and the
connection with the Tivoli®
Enterprise Portal Server fails. The workaround
for this problem follows:
- After a restore, the install_dir/ccm/properties directory contains config.properties and
config.properties.restored.
- To recover the Hybrid Gateway
immediately after a restore, run these commands on the Cloud
APM server as the root
user:
cp install_dir/ccm/properties/config.properties.restored install_dir/ccm/properties/config.properties
Update
the date and time of the config.properties file so that any Hybrid Gateways
already running will reload their
configuration:# touch config.properties
cp install_dir/ccm/properties/config.properties install_dir/wlp/usr/servers/min/dropins/CentralConfigurationServer.war/common/config.properties
- If you want to use the old agent configuration
packages from a previous installation for agent installations, complete these steps:
- Go to the install_dir/ccm
directory.
- Delete the agentconfig file.
- Change the name of the agentconfig.old file to
agentconfig.
- If you configured
HTTPS communication between the Cloud
APM server and
agents in your V8.1.3 Cloud
APM server, you must change
clientAuthentication to true. Copy the
<ssl>
xml element that contains the
enabledCiphers attribute from the
install_dir/wlp/usr/servers/min/server.xml file to the
install_dir/wlp/usr/servers/min/user-exit.xml file if it
does not already exist in the user-exit.xml file. Then add this
clientAuthentication="true"
line after the enabledCiphers line in the
user-exit.xml file. Remove the <ssl>
xml element from
the server.xml file. The following code example shows you where to add the
clientAuthentication="true"
line in the
user-exit.xml.<ssl
id="defaultSSLConfig"
sslProtocol="TLSv1.2"
enabledCiphers="TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256"
clientAuthentication="true"
serverKeyAlias="server_key"
clientKeyAlias="IBM_Tivoli_Monitoring_Certificate"
keyStoreRef="defaultKeyStore"/>
- If you configured HTTPS
communication between the Cloud
APM server and agents in
your V8.1.3 Cloud
APM server and used the default
certificates, change the communication protocol that the Cloud
APM server agents use to HTTPS. For instructions, see Configuring the communications
protocol for server agents.
- If you configured HTTPS communication
between the Cloud
APM server and agents in your V8.1.3
Cloud
APM server and did not use the default
certificates, complete these steps:
- Encode the (xor) server keystore password that you used when you created certificates for
the V8.1.3 Cloud
APM server:
/opt/ibm/wlp/bin/securityUtility encode
- Copy the
<keyStore>
xml
element from the
install_dir/ibm/wlp/usr/servers/min/server.xml to the
install_dir/wlp/usr/servers/min/user-exit.xml file if it
does not already exist in the user-exit.xml file. Then in the
user-exit.xml file, replace the value of the password attribute with the newly
encoded password from the step 1.
Remove the <keyStore>
xml element from the server.xml
file.
- Go to the install_dir
directory.
- Delete the keyfiles directory.
- Change the name of the keyfiles.old directory to
keyfiles.
- Update the certificates that are used by the monitoring agents to connect to the Cloud
APM server to use the new keystore. For instructions, see
Configuring certificates between the server and agents for HTTPS communication.
- Update the communication protocol and certificates that are used by the Cloud
APM server agents. For instructions, see Configuring the communications
protocol for server agents.
- If the system where you installed the Cloud
APM server is using LDAP to authenticate the root user or
Db2 users, and you updated the passwords for the
itmuser
and the Db2 instances
users when following the procedure referenced in step 9.a,
then complete step 9 in the
Installing on a system using an external directory service topic.
- Reconfigure and
reinstall the reports by completing the steps in Configuring the reports installation image and Installing reports.
- If you change the host
name or IP address of the Cloud
APM server and Db2 is installed locally and previously integrated with
other products (such as Tivoli Common
Reporting), complete these
steps:
- Complete steps 6, 7, and 8 in Enabling single sign-on between Cloud APM and Tivoli Common Reporting.
- Uncatalog the old server node and databases for Tivoli Common
Reporting:
db2 list db|node directory
(db2 list db2 directory
or db2 list node
directory)db2 uncatalog node node_alias
db2 uncatalog db db_alias
- Recatalog the server node and databases for Tivoli Common
Reporting by completing the steps in Configuring an ODBC connection.
- Review the WAREHOUS
database settings that were applied by the restore process.
update database config for warehous using DFT_DEGREE any
update database config for warehous using LOGBUFSZ 1024
update database config for warehous using LOCKLIST AUTOMATIC
update database config for warehous using SORTHEAP AUTOMATIC
update database config for warehous using SHEAPTHRES_SHR AUTOMATIC
update database config for warehous using NUM_IOCLEANERS AUTOMATIC
update database config for warehous using NUM_IOSERVERS AUTOMATIC
update database config for warehous using LOGFILSIZ 4096
update database config for warehous using LOGPRIMARY 10
update database config for warehous using DBHEAP AUTOMATIC
update database config for warehous using LOGSECOND 40
update database config for warehous using AVG_APPLS AUTOMATIC
update database config for warehous using logarchmeth1 OFF
update database config for warehous using logarchmeth2 OFF
update database config for warehous using DATABASE_MEMORY 250000 AUTOMATIC
Because
Cloud
APM does not support pruning of database
logs, the logarchmeth1
and logarchmeth2
settings are set to
OFF
. If you back up your Warehouse database and you support log pruning in your
environment, modify these settings.
- Most V8.1.3 Cloud APM agents are compatible with the
V8.1.4 Cloud APM server. However, you must upgrade the following agents after you upgrade the Cloud
APM server to version 8.1.4.0:
- If you are using the Synthetic Playback agent, you must upgrade the agent by using the latest
agent package on Passport Advantage. To view the Passport Advantage part numbers for the agent
packages, see: Part numbers. Then, you must
apply the latest Cloud APM 8.1.4.0 server interim fix that is available from Fix Central.
- The Monitoring Agent for WebSphere Applications must be upgraded by using the latest agent
package on Passport Advantage. To view the Passport Advantage part numbers for the agent packages,
see: Part numbers.
- The Monitoring Agent for MongoDB must be upgraded by using the latest agent package on Passport
Advantage. To view the Passport Advantage part numbers for the agent packages, see: Part numbers.