Skip to content

Upgrade Third-Party Dependencies

This page outlines the process for upgrading third-party dependencies for Terraform-based infrastructure deployments.

Third-party dependencies refer to the software that is installed by the Terraform scripts to support the deployment of kdb Insights Enterprise.

When to upgrade

Each release of kdb Insights Enterprise includes a Third-party Dependencies section in the release notes. This section lists the specific versions of the third-party infrastructure components that have been tested and verified for compatibility with that specific kdb Insights Enterprise release and provides links to download the required files.

To ensure continued stability, compatibility, and support, it is recommended that you update these dependencies in conjunction with the corresponding upgrade of kdb Insights Enterprise.

Upgrade the cert-manager

  1. Using the download links in the kdb Insights Enterprise release notes, get the latest version of the cert-manager helm chart for the specific release of kdb Insights Enterprise.

  2. Switch to your local kxi-terraform directory.

  3. Open the Terraform variables.tf file for your cloud provider, for example, AWS (Amazon Web Services), ACS (Azure Cloud Services), or GCP (Google Cloud Platform), and update the cert-manager helm chart version variable to the new version.

    vi terraform/k8s_config_aws/variables.tf
    variable "cert_manager_helm_version" {
    ....
    default = "1.16.3"
    }      
    
    vi terraform/k8s_config_azure/variables.tf
    variable "cert_manager_helm_version" {
    ....
    default = "1.16.3"
    }
    

    ```bash vi terraform/k8s_config_gcp/variables.tf variable "cert_manager_helm_version" { .... default = "1.19.1" }

    ```

  4. Run the manage-cluster.sh script.

    ./scripts/manage-cluster.sh
    
    .\scripts\manage-cluster.bat
    
  5. Run the terraform init command.

    ./scripts/terraform.sh init config
    
    .\scripts\terraform.bat init config
    
  6. Run the terraform plan command.

    ./scripts/terraform.sh plan config
    
    .\scripts\terraform.bat plan config
    
  7. Run the terraform apply command.

    ./scripts/terraform.sh apply config
    
    .\scripts\terraform.bat apply config
    
  8. Verify the cert-manager helm chart version.

    helm ls -n cert-manager
    

Upgrade the ingress-nginx

  1. Using the download links in the kdb Insights Enterprise release notes, get the latest version of the ngress-nginx helm chart for the specific release of kdb Insights Enterprise

  2. Switch to your local kxi-terraform directory.

  3. Open the Terraform variables.tf file for your cloud provider (for example, AWS, ACS, or GCP), and update the cert-manager helm chart version variable to the new version.

    vi terraform/k8s_config_aws/variables.tf
    variable "ingress_nginx_helm_version" {
    ....
    default = "4.11.5"
    }  
    
    vi terraform/k8s_config_azure/variables.tf
    variable "ingress_nginx_helm_version" {
    ....
    default = "4.11.5"
    }
    

    ```bash vi terraform/k8s_config_gcp/variables.tf variable "ingress_nginx_helm_version" { .... default = "4.11.5" }

    ```

  4. Run the manage-cluster.sh script.

    ./scripts/manage-cluster.sh
    
    .\scripts\manage-cluster.bat
    
  5. Run the terraform init command.

    ./scripts/terraform.sh init config
    
    .\scripts\terraform.bat init config
    
  6. Run the terraform plan command.

    ./scripts/terraform.sh plan config
    
    .\scripts\terraform.bat plan config
    
  7. Run the terraform apply command.

    ./scripts/terraform.sh apply config
    
    .\scripts\terraform.bat apply config
    
  8. Verify the cert-manager helm chart version.

    helm ls -n cert-manager