This guide steps through the requirements and process for upgrading
|D s product|
Upgrading to the latest version of Trifacta via the AWS Marketplace will terminate your existing instance and bring up a new instance with the latest software in its place - for this reason it's critical to follow the instructions here carefully.
|Your Version||Target Version||AMI||Documentation|
|Please see the AWS Marketplace listing for the product. The AMI is accessible from there.||Trifacta Install Guide for AWS Marketplace v5.0|
- This process will require broad permissions on your AWS account. If you do not have Administrator access you may encounter errors when Cloudformation tries to make changes to things like IAM or Security Groups.
- If you have made additional tweaks to the default installation, these changes will likely be lost. Make sure to review and note any changes so you can replicate them if necessary.
- IAM role or policy changes
- Changes on the Trifacta server OS itself
- SSL certificates and configuration
- The IP address of your Trifacta server will change, this will require a DNS update after the upgrade is complete.
Back up your existing Trifacta instance
We'll make two backups: one of the Trifacta software and one of the entire EC2 Instance.
SSH to your current Marketplace instance. Example: ssh -i MyKey.pem centos@TrifactaServer.MyCompany.net
Become Root on the server
on your current Marketplace instance:
D s platform Code Block
service trifacta stop
Run the Trifacta backup script:
When the script is complete, the output identifies the location of the backup. Example:
Store the backup in a safe location. We recommend either S3 or copying it to your local computer via SCP.
To copy the backup to the S3 bucket used by your installation you can use this example:
aws s3 cp /opt/trifacta-backups/trifacta-backup-5.0+126.20171217124021.a8ed455-20180514213601.tgz s3://<my-trifacta-s3-bucket>/trifacta-backups/
If you choose to use SCP note that the AMI does not allow root login, you must copy files you want to the Centos user's home directory and make any permissions changes necessary to allow the Centos user to read them. Once you've done that you can use SCP to copy the files, for example:
scp -i <my-key.pem> centos@<my-server-ip>:./example-file.txt ./
- We recommend that you also take a snapshot of the EBS volume backing your EC2 instance.
- This will not be necessary to restore Trifacta but can be useful if you find that you had additional files or configurations that you need to replicate once your new Trifacta instance is running.
Perform the Cloudformation Stack upgrade
In this section, you will upgrade the Cloudformation Stack which will bring up the latest copy of Trifacta as well as perform any necessary adjustments to your existing resources.
Upgrade the Cloudformation Stack
Visit the Trifacta Marketplace listing page for your product
- Scroll down to under "View Usage Instructions"
- Expand the "View CloudFormation Template" section
- Right click the "Download CloudFormation Template" link and copy it's URL
- Go to CloudFormation in your AWS Console
- Click your Trifacta Stack
- Click "Update"
- Select "Replace Current Template"
Select "Amazon S3 URL" and paste the link to the template in the text box.
Click next and review the parameters, they should be inherited from your existing Stack.
- Wait until the CloudFormation Stack indicates it's upgraded
- Now try to access the Trifacta software via the URL in the "Outputs" tab of CloudFormation.
- When it brings you to a login page, the software has started and we can continue.
Restore your backup onto the new instance
Connect to your new Trifacta instance via SSH.
Note that the IP address has changed.
Become Root on the Trifacta instance
sudo su cd
The Trifacta software will start automatically on boot. Stop it before continuing:
service trifacta stop
Download the latest copy of the restore script to pick up additional fixes that have been made. note: this step is required
curl --output trifacta-restore-from-backup.sh https://raw.githubusercontent.com/trifacta/trifacta-utils/release/6.0/trifacta-restore-from-backup.sh mv trifacta-restore-from-backup.sh /opt/trifacta/bin/setup-utils/trifacta-restore-from-backup.sh chown trifacta:trifacta /opt/trifacta/bin/setup-utils/trifacta-restore-from-backup.sh chmod 775 /opt/trifacta/bin/setup-utils/trifacta-restore-from-backup.sh
Download the backup from your storage location and extract its contents. Example:
mkdir -p /root/trifacta-restore-files cd /root/trifacta-restore-files aws s3 cp s3://<my-trifacta-s3-bucket>/trifacta-backups/<my-backup-file.tgz> . tar xzf <my-backup-file.tgz>
Execute the restore script. Pass in the path to your unzipped backup as a parameter. Example:
/opt/trifacta/bin/setup-utils/trifacta-restore-from-backup.sh -r /root/trifacta-restore-files/trifacta-backup-5.1+126.20171217124021.a8ed455-20180514213601
Start up the product
service trifacta start
Verify that the product is working as expected by running jobs.
Appendix - this content may be applicable to you depending on your specific configuration
Upgrade from Release 5.1 or earlier
Photon scaling factor has been removed
Applies if: You modified the Photon scaling properties in your pre-upgrade environment.
In Release 6.0, the Photon scaling factor parameter (
photon.loadScalingFactor) has been removed. As part of this change, the following parameters are automatically set to new values as part of the upgrade. The new values are listed below:
"webapp.client.loadLimit": 10485760, "webapp.client.maxResultsBytes": 41943040,
NOTE: If you had not modified either of the above values previously, then no action is required. If you had changed these values before upgrading, the settings are set to the new default values above.
Update Data Service properties
Applies if: You modified the Data Service classpath in your pre-upgrade environment.
After you have upgraded, the Data Service fails to start.
In Release 6.0.0, some configuration files related to the Data Service were relocated, so the classpath values pointing to these files need to be updated.
D s config method t
data-service.classpathsetting. Change the class path value to point to the correct directory:
webapp.connectivity.kerberosDelegateConfigPathsetting. If you are enabling Kerberos-based SSO for relational connections, please add the following value to the path:
For more information, see Enable SSO for Relational Connections.
- Save the file.
SSO signout updates
Applies if: You have enabled SSO for AD/LDAP and have noticed that logout is not working.
After upgrading to this release, signing out of the
|D s webapp|
NOTE: Beginning in Release 6.0, a platform-native method of SSO is available. This new method is recommended.
Some properties related to the reverse proxy must be updated. Please complete the following:
- Login to the
D s item item node
Edit the following file:
Add the following rule for the
- Modify the redirection for
/unauthorized. Remove the rewrite rule:
- Save the file and restart the platform.
Troubleshooting - disambiguating email accounts
Applies if: Applies to all upgrades to Release 6.0.1 and later.
In Release 6.0.1, the
|D s platform|
| <Id> | <Email> | other columns | | 1 | firstname.lastname@example.org | * | | 2 | FOOBAR@trifacta.com | * | | 3 | FooBar@trifacta.com | * |
Beginning in Release 6.0.2, all email addresses (userIds) are case-insensitive, so the above distinctions are no longer permitted in the platform.
As of Release 6.0.2, all email addresses are converted to lower-case. As part of the upgrade to Release 6.0.2, any email addresses that are case-insensitive matches (
FOOBAR) are disambiguated. After upgrade the People table might look like the following:
| <Id> | <Email> | other columns | | 1 | email@example.com_duplicate_1 | * | | 2 | firstname.lastname@example.org_duplicate_2 | * | | 3 | email@example.com | * |
- The email address with the highest Id value in the People table is assumed to be the original user account.
The format for email addresses is:
<row_id>is the row in the table where the duplicate was detected.
After all migrations have completed, you should review the migration logs. Search the logs for the following:
A set of users without duplicates has the following entry:
== 20181107131647-all-emails-for-people-to-lower-case: migrating ======= == 20181107131647-all-emails-for-people-to-lower-case: migrated (0.201s)
Entries like the following indicate that duplicate addresses were found for separate accounts. The new
duplicate Ids are listed as part of the message:
== 20181107131647-all-emails-for-people-to-lower-case: migrating ======= warn: List of duplicated emails: firstname.lastname@example.org_duplicate_1, email@example.com_duplicate_2 == 20181107131647-all-emails-for-people-to-lower-case: migrated (0.201s)
NOTE: The above log entry indicates that there are duplicated user accounts.
Change ownership on all flows in secondary accounts to the primary account.
Delete secondary accounts.
You can access complete product documentation online and in PDF format. From within the product, select Help menu > Product Docs.