Pre-upgrade Check
The system automatically checks a cluster before its upgrade. If the cluster does not meet the pre-upgrade check conditions, the upgrade cannot continue. To avoid risks, you can perform pre-upgrade check according to the check items and solutions described in this section.
No. |
Check Item |
Description |
---|---|---|
1 |
|
|
2 |
Check whether the target cluster is under upgrade management. |
|
3 |
|
|
4 |
Check whether the current HelmRelease record contains discarded Kubernetes APIs that are not supported by the target cluster version. If yes, the Helm chart may be unavailable after the upgrade. |
|
5 |
Check whether your master nodes can be accessed using SSH. |
|
6 |
Check whether the Protocol & Port of the worker node security groups is set to ICMP: All and whether the security group with the source IP address set to the master node security group is deleted. |
|
7 |
Check whether nodes need to be migrated. |
|
8 |
Check whether there are discarded resources in the clusters. |
|
9 |
Read the version compatibility differences and ensure that they are not affected. The patch upgrade does not involve version compatibility differences. |
|
10 |
Check whether cce-agent on the current node is of the latest version. |
|
11 |
Check whether the node's CPU usage is above 90%. |
|
12 |
|
|
13 |
|
|
14 |
|
|
15 |
Check whether the owner and owner group of the files in the /var/paas directory used by the CCE are both paas. |
|
16 |
Check whether the kubelet on the node is running properly. |
|
17 |
Check whether the node's memory usage is above 90%. |
|
18 |
Check whether the clock synchronization server ntpd or chronyd of the node is running properly. |
|
19 |
Check whether the OS kernel version of the node is supported by CCE. |
|
20 |
Check and make sure that the master nodes in your cluster have more than 2 CPU cores. |
|
21 |
Check whether the Python commands are available on a node. |
|
22 |
|
|
23 |
Check whether the nodes in the cluster are ready. |
|
24 |
Check whether journald of a node is normal. |
|
25 |
Check whether the containerd.sock file is on the node. This file affects the startup of container runtime in the Euler OS. |
|
26 |
This check item is not typical and implies that an internal error was found during the pre-upgrade check. |
|
27 |
Check whether there are inaccessible mount points on the node. |
|
28 |
Check whether the taint needed for cluster upgrade exists on the node. |
|
29 |
Check whether there are any compatibility restrictions on the current Everest add-on. |
|
30 |
Check whether there are compatibility limitations between the current and target cce-controller-hpa add-on versions. |
|
31 |
Check whether the current cluster version and the target version support enhanced CPU policy. |
|
32 |
Check whether the container runtime and network components on the worker nodes are healthy. |
|
33 |
Check whether cluster components such as the Kubernetes component, container runtime component, and network component are running properly before the upgrade. |
|
34 |
Check whether the resources of Kubernetes components, such as etcd and kube-controller-manager, exceed the upper limit. |
|
35 |
The system scans the audit logs of the past day to check whether the user calls the deprecated APIs of the target Kubernetes version.
NOTE:
Due to the limited time range of audit logs, this check item is only an auxiliary method. APIs to be deprecated may have been used in the cluster, but their usage is not included in the audit logs of the past day. Check the API usage carefully. |
|
36 |
Check whether NetworkManager of a node is normal. |
|
37 |
Check the ID file format. |
|
38 |
When you upgrade a cluster to v1.19 or later, the system checks whether the following configuration files have been modified on the backend: |
|
39 |
Check whether the configuration files of key components exist on the node. |
|
40 |
Check whether the current CoreDNS key configuration Corefile is different from the Helm release record. The difference may be overwritten during the add-on upgrade, affecting domain name resolution in the cluster. |
|
41 |
Check whether the sudo commands and sudo-related files of the node are working. |
|
42 |
Whether some key commands that the node upgrade depends on are working |
|
43 |
Check whether the docker/containerd.sock file is directly mounted to the pods on a node. During an upgrade, Docker or containerd restarts and the sock file on the host changes, but the sock file mounted to pods does not change accordingly. As a result, your services cannot access Docker or containerd due to sock file inconsistency. After the pods are rebuilt, the sock file is mounted to the pods again, and the issue is resolved accordingly. |
|
44 |
Check whether the certificate used by an HTTPS load balancer has been modified on ELB. |
|
45 |
Check whether the default mount directory and soft link on the node have been manually mounted or modified. |
|
46 |
Check whether user paas is allowed to log in to a node. |
|
47 |
Check whether the load balancer associated with a Service is allocated with a private IPv4 address. |
|
48 |
Check the historical upgrade records of the cluster and confirm that the current version of the cluster meets the requirements for upgrading to the target version. |
|
49 |
Check whether the CIDR block of the cluster management plane is the same as that configured on the backbone network. |
|
50 |
The GPU add-on is involved in the upgrade, which may affect the GPU driver installation during the creation of a GPU node. |
|
51 |
Check whether the default system parameter settings on your nodes are modified. |
|
52 |
Check whether there are residual package version data in the current cluster. |
|
53 |
Check whether the commands required for the upgrade are available on the node. |
|
54 |
Check whether swap has been enabled on cluster nodes. |
|
55 |
Check whether there are compatibility issues that may occur during nginx-ingress upgrade. |
|
56 |
If so, check whether their configurations are correct. |
|
57 |
Check whether the flavor of the master nodes in the cluster is the same as the actual flavor of these nodes. |
|
58 |
Check whether the number of available IP addresses in the cluster subnet supports rolling upgrade. |
|
59 |
Check whether an alarm is generated when a cluster is upgraded to v1.27 or later. Do not use Docker in clusters of versions later than 1.27 because CCE is going to stop the support for Docker. |
|
60 |
Check whether an alarm is generated when a cluster is upgraded to v1.27 or later. Do not use Docker in clusters of versions later than 1.27 because CCE is going to stop the support for Docker. |
|
61 |
Check the number of images on your node. If there are more than 1000 images, it takes a long time for Docker to start, affecting the standard Docker output and functions such as Nginx. |
|
62 |
Check whether the OpenKruise add-on is compatible before upgrading a cluster. |
|
63 |
Check whether the target version supports secret encryption. If it does not, clusters that have this feature enabled cannot be upgraded to the target version. |
|
64 |
Make sure that the GPU add-on and Ubuntu nodes are compatible before using them in a cluster. If the Ubuntu kernel is 5.15.0-113-generic, the driver of the GPU add-on must be 535.161.08 or later. |
|
65 |
An unfinished drainage task is detected in the cluster, which may resume after the upgrade. If this happens, running pods will be evicted, which could impact your services. |
|
66 |
Check the number of image layers on your node. If there are more than 5000 layers, it will take a long time for Docker or containerd to start, affecting the stdout of Docker or containerd. |
|
67 |
Check whether your cluster is eligible for a rolling upgrade. The result shows that the rolling upgrade is not supported. |
|
68 |
Check whether the number of certificates on your node is greater than 1000. During an upgrade, certificate files will be processed in batches. An excessive number of certificate files will lead to a slow node upgrade and result in pod eviction from the node. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot