4 Upgrading SCP
You can upgrade SCP from a source release to a target release using procedures outlined in this chapter.
4.1 Supported Upgrade Paths
The following table lists the supported upgrade paths for SCP:
Table 4-1 SCP Supported Upgrade Paths
Source Release | Target Release |
---|---|
24.2.x | 24.3.0 |
24.1.x | 24.3.0 |
Note:
- The upgrade of an IPv6 setup with a source release of 23.x.y is not supported for upgrading to 24.x.y.
- SCP must be upgraded before upgrading cnDBTier.
4.2 Upgrade Strategy
RollingUpdate
. The rolling update strategy is a gradual process
that allows you to update your Kubernetes system with only a minor effect on performance
and no downtime. The advantage of the rolling update strategy is that the update is
applied Pod-by-Pod, so the greater system can remain active.
The following configuration parameters define the upgrade strategy:
- The
upgradeStrategy
parameter indicates the update strategy in SCP. - The
maxUnavailable
parameter determines the number of pods that are unavailable during the update. - The
maxSurge
parameter determines the number of pods that can be created above the desired amount of pods during an upgrade.
Table 4-2 Predefined Upgrade Strategy Value
Microservice | Upgrade Value (maxUnavailable) | Upgrade Value (maxSurge) |
---|---|---|
scp-worker | 25% | 25% |
scp-nrfproxy | 25% | 25% |
scp-mediation | 25% | 25% |
4.3 Preupgrade Tasks
Note:
- The
releaseVersion
value in theocscp_values.yaml
file can not be changed. - While performing an upgrade from an older release to a
newer release, you must align the
ocscp_values.yaml
file of the new release as per theocscp_values.yaml
file of the older release. Ensure that you do not change any Helm parameter values. During the upgrade, modifications are allowed for the following parameters:scpProfileInfo.plmnList
,scpProfileInfo.customInfo.mateScpInfoList
,scpProfileInfo.customInfo.mateSiteInfo
, and TLS configuration. Other parameters should not be modified during the upgrade process. Do not enable any new feature during the upgrade. Anyocscp_values.yaml
parameter must not be changed while upgrading unless explicitly specified in this guide. For information about enabling any new feature through Helm parameters, see Oracle Communications Cloud Native Core, Service Communication Proxy User Guide. - Install or upgrade the network policies, if applicable. For more information, see Configuring Network Policies for SCP
- Ensure that the Service Account, Role, and Rolebinding are as per the current release. For more information, see Creating Service Account, Role, and Rolebinding.
4.4 Upgrade Tasks
Note:
- SCP might raise alerts while performing an upgrade. To clear any alert, see "Alerts" in Oracle Communications Cloud Native Core, Service Communication Proxy User Guide.
- SCP uses the
upgraderollbackevents
resource to retrieve the list of upgrade and rollback events. For more information, see Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.
- Ensure that no SCP pod is in the failed state.
- Complete the tasks as described in Preupgrade Tasks.
Caution:
No configuration should be performed during upgrade.Note:
- If there are less than or equal to 32 SCP-worker pods, the timeout value during the Helm upgrade must be set to 30 minutes.
- If there are more than 32 SCP-worker pods, the timeout value during the Helm upgrade must be changed to 60 minutes.
Helm Upgrade
Upgrading an existing deployment replaces the running containers and pods with target release containers and pods. If there is no change in the pod configuration, then it is not replaced. Unless there is a change in the service configuration of a microservice, the service endpoints remain unchanged. For example, ClusterIP.
4.5 Postupgrade Tasks
Note:
- To upgrade cnDBTier with resources recommended for SCP, customize the
ocscp_dbtier_24.3.0_custom_values_24.3.0.yaml
file in theocscp_csar_24_3_0_0_0.zip
folder with the required deployment parameters. cnDBTier parameters will vary depending on whether the deployment is on a single site, two site, or three site. For more information, see cnDBTier Customization Parameters.For more information about cnDBTier upgrade, see Oracle Communications Cloud Native Core, cnDBTier Installation, Upgrade, and Fault Recovery Guide.
- To automate the lifecycle management of the certificates
through OCCM, you can migrate the lifecycle of certificates and key
management from manual to OCCM. For more information, see "Introducing OCCM in an Existing NF Deployment" section in Oracle Communications Cloud Native Core, Certificate Management User
Guide.
Note:
SCP application does not manage the LCM of the certificate and key.