How to Upgrade Fedora Copr Persistent VMs (Amazon AWS)¶
This document describes the process of upgrading persistent VM instance(s)
(e.g., copr-fe-dev.aws.fedoraproject.org
) to a new Fedora version by
creating a completely new VM to replace the old one.
Requirements¶
Access to the team’s Amazon AWS account and proper configuration of that account according to the README.md.
Permissions to run playbooks on batcave01.
Since we do not modify the public IPs (neither v4 nor v6), no DNS modifications should be required. However, familiarize yourself with the DNS SOP in case of any issues.
Pre-upgrade¶
The goal is to complete as much pre-upgrade work as possible while focusing on minimizing the outage window and only performing essential tasks that cannot be done post-upgrade.
Avoid conducting the pre-upgrade too far in advance of the actual upgrade. Ideally, perform this phase a couple of hours or a day before.
Announce the outage¶
See a specific document Fedora Copr outage announcements, namely the “planned” outage state.
Preparation¶
Ensure you have the helper playbook repository cloned locally and navigate to the clone directory.
Review the dev.yml
, prod.yml
, and all.yml
configurations in the
./group_vars
directory. Pay particular attention to the old_instance_id
,
old_network_id
, and data volume IDs as these MUST match the EC2 reality.
In the following moments, you will run several playbooks on your machine.
During execution, explicitly specify two Ansible variables, copr_instance
(set to either dev
or prod
) and server_id
(set to either
frontend
, backend
, distgit
, or keygen
). For example:
$ opts=( -e copr_instance=dev -e server_id=keygen )
$ ansible-playbook play-vm-migration-01-new-box.yml "${opts[@]}"
Identify the AMI (golden images) you want to use for the new VM instances.
Typically, upgrade to Fedora N+2
(e.g., migrating infrastructure from Fedora
37 to Fedora 39). Visit the Cloud Base Images download page, locate the
Intel and AMD x86_64 systems section, and click the button next to
Fedora Cloud 39 AWS (ensure JavaScript is enabled for this page!).
Note the ami-*
ID in the US East (N. Virginia) region (for example
ami-0746fc234df9c1ee0
). Specify this ami-*
ID in
group_vars/all.yml
, and ensure both group_vars/{dev,prod}.yml
correctly
reference it.
Double-check other machine parameters such as instance types, names, tags, IP addresses, root volume sizes, etc. Usually, the pre-filled defaults suffice, but verification is recommended.
Use the ec2instances.info comparator to find the cheapest available instance type that meets our needs whenever more power is required.
Warning
The group_vars/
directory serves as the primary source of truth for the
Fedora Copr instances. Update the configuration in this directory whenever
you ad-hoc modify some EC2 instance parameters in the future!
Key pair named Ansible Key
must be used. This allows us
to initially run the playbooks from batcave01
box against the newly
spawned VM. The playbooks assure that, subsequently, Fedora Copr team members
can SSH using their own keys, uploaded to FAS.
Backup the Current Let’s Encrypt Certificates¶
We will copy and paste the certificate files used on the old set of VMs onto the
new VMs. These certificates will remain in use until automatically renewed by
the certbot daemon. The process begins by copying the certificate files to the
batcave01
through the execution of playbooks with the -t certbot
option.
For instance:
$ sudo rbac-playbook -l copr-keygen.aws.fedoraproject.org groups/copr-keygen.yml -t certbot
Do this for all the instances!
Launch new instances¶
As simple as:
$ ansible-playbook play-vm-migration-01-new-box.yml "${opts[@]}"
You’ll see an output like:
ok: [localhost] => {
"msg": [
"ElasticIP: not specified",
"Instance ID: i-04ba36eb360187572",
"Network ID: eni-048189f432f068270",
"Unused Public IP: 100.24.62.79",
"Private IP: 172.30.2.94"
]
}
Now fix the corresponding new_instance_id
and new_network_id
options in
group_vars/{dev,prod}.yml
according to the output.
Note the Private IP addresses¶
Most of the communication within Copr stack happens on public interfaces via
hostnames with one exception. Communication between backend
and keygen
is done on a private network behind a firewall through IP addresses that change
when spawning a fresh instances.
So once you know the Backend’s private IP, please do a private IP change in ansible.git.
Don’t start the services after the first playbook run¶
Set the services_disabled: true
for your instance in
inventory/group_vars/copr_*_dev_aws
for devel, or
inventory/group_vars/copr_*_aws
for production.
Pre-prepare the new VM — backend only!¶
Note
Running the playbook against the new copr-backend server before shutting down the old one is possible. This minimizes the outage duration with non-working DNF repositories on the backend, which is highly desirable.
However, to prevent any issues with Ansible, the following prerequisites are necessary:
A temporary volume attached to the new box that provides an ext4 filesystem with the
copr-repo
label.An existing temporary hostname (having an existing DNS record) to execute the playbook against it.
The volume, DNS record, and corresponding Elastic IP for this purpose have
already been prepared by the play-vm-migration-01-new-box.yml
playbook
mentioned above.
Note
The following inventory configuration should already be prepared for you in the “commented-out” form.
Ensure that the copr-be-dev-temp.aws.fedoraproject.org
is specified in the
inventory in the following groups:
copr_back_dev_aws
staging
cloud_aws
Similarly, use copr-be-temp.aws.fedoraproject.org
in:
copr_back_aws
cloud_aws
For both cases, set the birthday=yes
variable for the temporary hostname:
[copr_back_dev_aws]
copr-be-dev.aws.fedoraproject.org
copr-be-dev-temp.aws.fedoraproject.org birthday=yes
On Batcave, execute the playbook against the temporary hostname:
$ sudo rbac-playbook -l copr-be-dev-temp.aws.fedoraproject.org groups/copr-backend.yml
$ sudo rbac-playbook -l copr-be-temp.aws.fedoraproject.org groups/copr-backend.yml
Once the playbook finishes successfully, remember to revert the inventory changes we did here (commenting out again).
Outage window¶
When initiating this section, aim for time efficiency as the services will be down and inaccessible to users.
Let users know¶
See Fedora Copr outage announcements again, ad “ongoning” issue.
Move IPs and Volumes to the New Instances¶
Warning
Prepare to follow the instructions provided during the playbook run. You’ll need to perform manual steps such as DB backups, consistency checks, etc.
Migrate the data volumes and IP addresses to the new machine. For the Backend
case, a separate playbook is created. This playbook makes the
results directory
unavailable temporarily, affecting every Copr consumer! Ensure that that the
lighttpd
service is running on the new server once the playbook finishes,
and that it hosts the correct results:
$ ansible-playbook play-vm-migration-02-migrate-backend-box.yml "${opts[@]}"
For the rest of the systems (Frontend, DistGit, Keygen), use:
$ ansible-playbook play-vm-migration-02-migrate-non-backend-box.yml "${opts[@]}"
Provision the new instances¶
In the fedora-infra ansible repository, edit the inventory/inventory
file
and set the birthday=yes
variable for your updated host, for example:
[copr_front_dev_aws]
copr.stg.fedoraproject.org birthday=yes
This is necessary to instruct the first playbook run on batcave01
to sign
the new host certificates (avoiding later manipulation with known_hosts
).
On batcave01
, execute the playbook to provision the instance (ignore the
playbook for upgrading Copr packages). For the dev instance, refer to
https://docs.pagure.org/copr.copr/how_to_release_copr.html#upgrade-dev-machines
and for production, refer to
https://docs.pagure.org/copr.copr/how_to_release_copr.html#upgrade-production-machines
It’s possible that the playbook fails, but it typically isn’t crucial now. If
provisioning at least reaches the end of the base
role, revert the
birthday=yes
commit and proceed with the next steps.
Get it working¶
Rerun the playbook from the previous section again, with dropped configuration:
services_disabled: false
It should proceed with mounting data volumes but will likely not succeed. Now,
you’ll need to debug and address the issues. If necessary, modify and rerun the
playbook multiple times (ensuring lighttpd
running on the new backend all
the time).
Note
Frontend - You’ll likely need to manually upgrade the PostgreSQL database once you migrate to the new Fedora (new PG major version). Refer to Upgrade the database.
Post-upgrade¶
By this point, every Copr service should be operational.
Rename the instance names¶
Remove the -new
name suffix from the new instances and add a -old
suffix
to the old instances. This playbook should be executed only once for all the
infra instances:
$ opts=( -e copr_instance=dev ) # or prod
$ ansible-playbook play-vm-migration-03-rename-instances.yml "${opts[@]}"
Terminate the old instances¶
Once you no longer require the old VMs, you can terminate them using the Amazon
web UI. You can do this immediately after the upgrade or wait a couple of days
(e.g. to keep the DB /backups
for a while just in case of any problems).
The old VMs are protected against accidental termination. To disable this
option, click Actions
, navigate to Instance settings
and then to
Change termination protection
.
Final steps¶
See a specific document Fedora Copr outage announcements, the “resolved” section.