Review the following sections in this chapter for information on how to perform an upgrade on the following different types of deployments:
You can use the application upgrade command directly, or the application upgrade prepare and proceed commands in sequence to upgrade a standalone node.
You can run the application upgrade command from the CLI on a standalone node that assumes the Administration, Policy Service, pxGrid, and Monitoring personas. If you choose to run this command directly, we recommend that you copy the upgrade bundle from the remote repository to the Cisco ISE node's local disk before you run the application upgrade command to save time during upgrade.
Alternatively, you can use the application upgrade prepare and application upgrade proceed commands. The application upgrade prepare command downloads the upgrade bundle and extracts it locally. This command copies the upgrade bundle from the remote repository to the Cisco ISE node's local disk. After you have prepared a node for upgrade, run the application upgrade proceed command to complete the upgrade successfully.
We recommend that you run the application upgrade prepare and proceed commands described below.
Ensure that you have read the instructions in the Before You Upgrade chapter.
Use the application upgrade prepare and proceed commands to upgrade a two-node deployment. You do not have to manually deregister the node and register it again. The upgrade software automatically deregisters the node and moves it to the new deployment. When you upgrade a two-node deployment, you should initially upgrade only the Secondary Administration Node (node B). When the secondary node upgrade is complete, you upgrade the primary node (node A). If you have a deployment set up as shown in the following figure, you can proceed with this upgrade procedure.
Perform an on-demand backup (manually) of the configuration and operational data from the Primary Administration Node.
Ensure that the Administration and Monitoring personas are enabled on both the nodes in the deployment.
If the Administration persona is enabled only on the Primary Administration Node, enable the Administration persona on the secondary node because the upgrade process requires the Secondary Administration Node to be upgraded first.
Alternatively, if there is only one Administration node in your two-node deployment, then deregister the secondary node. Both the nodes become standalone nodes. Upgrade both the nodes as standalone nodes and set up the deployment after the upgrade.
If the Monitoring persona is enabled only on one of the nodes, ensure that you enable the Monitoring persona on the other node before you proceed.
You must first upgrade the Secondary Administration Node to the new release. For example, if you have a deployment setup as shown in the following figure, with one Primary Administration Node (node A), one Secondary Administration Node (node B), one Inline Posture Node (IPN) (node C), and four Policy Service Nodes (PSNs) (node D, node E, node F, and node G), one Primary Monitoring Node ( node H), and one Secondary Monitoring Node (node I), you can proceed with the following upgrade procedure.
![]() Note | Do not manually deregister the node before an upgrade. Use the application upgrade prepare and proceed commands to upgrade to the new release. The upgrade process deregisters the node automatically and moves it to the new deployment. If you manually deregister the node before an upgrade, ensure that you have the license file for the Primary Administration Node before beginning the upgrade process. If you do not have the file on hand (if your license was installed by a Cisco partner vendor, for example), contact the Cisco Technical Assistance Center for assistance. |
To upgrade your deployment with minimum possible downtime while providing maximum resiliency and ability to roll back, the upgrade order should be as follows:
Secondary Administration Node (the Primary Administration Node at this point remains at the previous version and can be used for rollback, if upgrade fails.
Primary Monitoring Node
Policy Service Nodes
At this point, verify if the upgrade is successful and also run the network tests to ensure that the new deployment functions as expected. See Verify the Upgrade Process for more information. If the upgrade is successful, proceed to upgrade the following nodes:
Secondary Monitoring Node
Primary Administration Node
Re-run the upgrade verification and network tests after you upgrade the Primary Administration Node.
If you do not have a Secondary Administration Node in the deployment, configure a Policy Service Node to be the Secondary Administration Node before beginning the upgrade process.
Ensure that you have read and complied with the instructions given in the Before You Upgrade chapter.
When you upgrade a complete Cisco ISE deployment, Domain Name System (DNS) server resolution (both forward and reverse lookups) is mandatory; otherwise, the upgrade fails.
Here is an example CLI transcript of a successful secondary Administration node upgrade.
ise74/admin# application upgrade proceed Initiating Application Upgrade... % Warning: Do not use Ctrl-C or close this terminal window until upgrade completes. -Checking VM for minimum hardware requirements STEP 1: Stopping ISE application... STEP 2: Verifying files in bundle... -Internal hash verification passed for bundle STEP 3: Validating data before upgrade... STEP 4: De-registering node from current deployment. STEP 5: Taking backup of the configuration data... STEP 6: Running ISE configuration DB schema upgrade... - Running db sanity check to fix index corruption, if any... ISE Database schema upgrade completed. STEP 7: Running ISE configuration data upgrade... - Data upgrade step 1/73, NSFUpgradeService(1.2.1.127)... Done in 0 seconds. - Data upgrade step 2/73, NetworkAccessUpgrade(1.2.1.127)... Done in 0 seconds. - Data upgrade step 3/73, GuestUpgradeService(1.2.1.146)... Done in 0 seconds. - Data upgrade step 4/73, NetworkAccessUpgrade(1.2.1.148)... Done in 3 seconds. - Data upgrade step 5/73, NetworkAccessUpgrade(1.2.1.150)... Done in 3 seconds. - Data upgrade step 6/73, NSFUpgradeService(1.2.1.181)... Done in 0 seconds. - Data upgrade step 7/73, NSFUpgradeService(1.3.0.100)... Done in 0 seconds. - Data upgrade step 8/73, RegisterPostureTypes(1.3.0.170)... Done in 0 seconds. - Data upgrade step 9/73, ProfilerUpgradeService(1.3.0.187)... Done in 5 seconds. - Data upgrade step 10/73, GuestUpgradeService(1.3.0.194)... Done in 1 seconds. - Data upgrade step 11/73, NetworkAccessUpgrade(1.3.0.200)... Done in 0 seconds. - Data upgrade step 12/73, GuestUpgradeService(1.3.0.208)... Done in 2 seconds. - Data upgrade step 13/73, GuestUpgradeService(1.3.0.220)... Done in 0 seconds. - Data upgrade step 14/73, RBACUpgradeService(1.3.0.228)... Done in 24 seconds. - Data upgrade step 15/73, NetworkAccessUpgrade(1.3.0.230)... Done in 3 seconds. - Data upgrade step 16/73, GuestUpgradeService(1.3.0.250)... Done in 0 seconds. - Data upgrade step 17/73, NetworkAccessUpgrade(1.3.0.250)... Done in 0 seconds. - Data upgrade step 18/73, RBACUpgradeService(1.3.0.334)... Done in 18 seconds. - Data upgrade step 19/73, RBACUpgradeService(1.3.0.335)... Done in 18 seconds. - Data upgrade step 20/73, ProfilerUpgradeService(1.3.0.360)... ...Done in 221 seconds. - Data upgrade step 21/73, ProfilerUpgradeService(1.3.0.380)... Done in 4 seconds. - Data upgrade step 22/73, NSFUpgradeService(1.3.0.401)... Done in 0 seconds. - Data upgrade step 23/73, NSFUpgradeService(1.3.0.406)... Done in 0 seconds. - Data upgrade step 24/73, NSFUpgradeService(1.3.0.410)... Done in 1 seconds. - Data upgrade step 25/73, RBACUpgradeService(1.3.0.423)... Done in 0 seconds. - Data upgrade step 26/73, NetworkAccessUpgrade(1.3.0.424)... Done in 0 seconds. - Data upgrade step 27/73, RBACUpgradeService(1.3.0.433)... Done in 2 seconds. - Data upgrade step 28/73, EgressUpgradeService(1.3.0.437)... Done in 0 seconds. - Data upgrade step 29/73, NSFUpgradeService(1.3.0.438)... Done in 0 seconds. - Data upgrade step 30/73, NSFUpgradeService(1.3.0.439)... Done in 0 seconds. - Data upgrade step 31/73, CdaRegistration(1.3.0.446)... Done in 2 seconds. - Data upgrade step 32/73, RBACUpgradeService(1.3.0.452)... Done in 26 seconds. - Data upgrade step 33/73, NetworkAccessUpgrade(1.3.0.458)... Done in 0 seconds. - Data upgrade step 34/73, NSFUpgradeService(1.3.0.461)... Done in 0 seconds. - Data upgrade step 35/73, CertMgmtUpgradeService(1.3.0.462)... Done in 2 seconds. - Data upgrade step 36/73, NetworkAccessUpgrade(1.3.0.476)... Done in 0 seconds. - Data upgrade step 37/73, TokenUpgradeService(1.3.0.500)... Done in 1 seconds. - Data upgrade step 38/73, NSFUpgradeService(1.3.0.508)... Done in 0 seconds. - Data upgrade step 39/73, RBACUpgradeService(1.3.0.509)... Done in 26 seconds. - Data upgrade step 40/73, NSFUpgradeService(1.3.0.526)... Done in 0 seconds. - Data upgrade step 41/73, NSFUpgradeService(1.3.0.531)... Done in 0 seconds. - Data upgrade step 42/73, MDMUpgradeService(1.3.0.536)... Done in 0 seconds. - Data upgrade step 43/73, NSFUpgradeService(1.3.0.554)... Done in 0 seconds. - Data upgrade step 44/73, NetworkAccessUpgrade(1.3.0.561)... Done in 2 seconds. - Data upgrade step 45/73, CertMgmtUpgradeService(1.3.0.615)... Done in 0 seconds. - Data upgrade step 46/73, CertMgmtUpgradeService(1.3.0.616)... Done in 22 seconds. - Data upgrade step 47/73, CertMgmtUpgradeService(1.3.0.617)... Done in 2 seconds. - Data upgrade step 48/73, OcspServiceUpgradeRegistration(1.3.0.617)... Done in 0 seconds. - Data upgrade step 49/73, NSFUpgradeService(1.3.0.630)... Done in 0 seconds. - Data upgrade step 50/73, NSFUpgradeService(1.3.0.631)... Done in 0 seconds. - Data upgrade step 51/73, CertMgmtUpgradeService(1.3.0.634)... Done in 0 seconds. - Data upgrade step 52/73, RBACUpgradeService(1.3.0.650)... Done in 8 seconds. - Data upgrade step 53/73, CertMgmtUpgradeService(1.3.0.653)... Done in 0 seconds. - Data upgrade step 54/73, NodeGroupUpgradeService(1.3.0.655)... Done in 1 seconds. - Data upgrade step 55/73, RBACUpgradeService(1.3.0.670)... Done in 4 seconds. - Data upgrade step 56/73, ProfilerUpgradeService(1.3.0.670)... Done in 0 seconds. - Data upgrade step 57/73, ProfilerUpgradeService(1.3.0.675)... .....Done in 315 seconds. - Data upgrade step 58/73, NSFUpgradeService(1.3.0.676)... Done in 0 seconds. - Data upgrade step 59/73, AuthzUpgradeService(1.3.0.676)... Done in 11 seconds. - Data upgrade step 60/73, GuestAccessUpgradeService(1.3.0.676)... ..........Done in 660 seconds. - Data upgrade step 61/73, NSFUpgradeService(1.3.0.694)... Done in 0 seconds. - Data upgrade step 62/73, ProvisioningRegistration(1.3.0.700)... Done in 0 seconds. - Data upgrade step 63/73, RegisterPostureTypes(1.3.0.705)... Done in 0 seconds. - Data upgrade step 64/73, CertMgmtUpgradeService(1.3.0.727)... Done in 0 seconds. - Data upgrade step 65/73, CertMgmtUpgradeService(1.3.0.808)... Done in 1 seconds. - Data upgrade step 66/73, NSFUpgradeService(1.3.0.810)... Done in 1 seconds. - Data upgrade step 67/73, RBACUpgradeService(1.3.0.834)... Done in 31 seconds. - Data upgrade step 68/73, ProfilerUpgradeService(1.3.0.844)... Done in 0 seconds. - Data upgrade step 69/73, GuestAccessUpgradeService(1.3.0.855)... ........Done in 517 seconds. - Data upgrade step 70/73, NSFUpgradeService(1.3.0.858)... Done in 3 seconds. - Data upgrade step 71/73, NSFUpgradeService(1.3.0.861)... Done in 0 seconds. - Data upgrade step 72/73, GuestAccessUpgradeService(1.3.0.862)... Done in 0 seconds. - Data upgrade step 73/73, ProvisioningUpgradeService(1.3.105.181)... Done in 55 seconds. STEP 8: Running ISE configuration data upgrade for node specific data... STEP 9: Making this node PRIMARY of the new deployment. When other nodes are upgraded it will be added to this deployment. STEP 10: Running ISE M&T DB upgrade... ISE Database Mnt schema upgrade completed. Gathering Config schema(CEPM) stats ..... Gathering Operational schema(MNT) stats .... Stopping ISE Database processes... % NOTICE: The appliance will reboot twice to upgrade software and ADE-OS. During this time progress of the upgrade is visible on console. It could take up to 30 minutes for this to complete. Rebooting to do Identity Service Engine upgrade...
Here is an example CLI transcript of a successful PSN node upgrade.
ise/admin# application upgrade ise-upgradebundle-1.2.x-to-1.3.0.876.x86_64.tar.gz sftp Save the current ADE-OS running configuration? (yes/no) [yes] ? yes Generating configuration... Saved the ADE-OS running configuration to startup successfully Getting bundle to local machine... G md5: 8810b57c8531c2a2b20e871014e970f0 sha256: 576d0c859866cfc424711c4a0d395e55cb87c32566de8bb074bcb57cba8ff891 % Please confirm above crypto hash matches what is posted on Cisco download site. % Continue? Y/N [Y] ? Y Unbundling Application Package... Initiating Application Upgrade... % Warning: Do not use Ctrl-C or close this terminal window until upgrade completes. STEP 1: Stopping ISE application... STEP 2: Verifying files in bundle... -Internal hash verification passed for bundle STEP 3: Validating data before upgrade... STEP 4: De-registering node from current deployment. STEP 5: Taking backup of the configuration data... STEP 6: Registering this node to primary of new deployment... STEP 7: Downloading configuration data from primary of new deployment... STEP 8: Importing configuration data... STEP 9: Running ISE configuration data upgrade for node specific data... STEP 10: Running ISE M&T DB upgrade... ISE Database Mnt schema upgrade completed. No gather stats needed as this is not PAP or MNT node Stopping ISE Database processes... % NOTICE: The appliance will reboot twice to upgrade software and ADE-OS. During this time progress of the upgrade is visible on console. It could take up to 30 minutes for this to complete. Rebooting to do Identity Service Engine upgrade...
To verify if an upgrade is successful, do one of the following:
Check the ade.log file for the upgrade process. To display the ade.log file, enter the following command from the Cisco ISE CLI: show logging system ade/ADE.log
Enter the show application status ise command to verify that all the services are running.
We recommend that you run some network tests to ensure that the deployment functions as expected and that users are able to authenticate and access resources on your network.
If upgrade fails because of configuration database issues, the changes are rolled back automatically. Refer to Chapter 4, "Recovering from Cisco ISE Upgrade Failures" for more information.