The following instructions will guide you through upgrading a Rancher server that was installed on a Kubernetes cluster with Helm. These steps also apply to air gap installs with Helm.
For the instructions to upgrade Rancher installed with Docker, refer to this page.
If you installed Rancher using the RKE Add-on yaml, follow the directions to migrate or upgrade.
Access to kubeconfig
Helm should be run from the same location as your kubeconfig file, or the same location where you run your kubectl commands from.
If you installed Kubernetes with RKE, the config will have been created in the directory you ran
rke up in.
The kubeconfig can also be manually targeted for the intended cluster with the
--kubeconfig tag (see: https://helm.sh/docs/helm/helm/)
Review Known Issues
Review the known upgrade issues in the Rancher documentation for the most noteworthy issues to consider when upgrading Rancher.
Note that upgrades to or from any chart in the rancher-alpha repository aren’t supported.
The upgrade instructions assume you are using Helm 3.
For migration of installs started with Helm 2, refer to the official Helm 2 to 3 migration docs. The Helm 2 upgrade page hereprovides a copy of the older upgrade instructions that used Helm 2, and it is intended to be used if upgrading to Helm 3 is not feasible.
For air gap installs: Populate private registry
-For air gap installs only, collect and populate images for the new Rancher server version. Follow the guide to populate your private registry with the images for the Rancher version that you want to upgrade to.
For upgrades from v2.0-v2.2 with external TLS termination
If you are upgrading Rancher from v2.x to v2.3+, and you are using external TLS termination, you will need to edit the cluster.yml to enable using forwarded host headers.
For upgrades with cert-manager older than 0.8.0
Let’s Encrypt will be blocking cert-manager instances older than 0.8.0 starting November 1st 2019. Upgrade cert-manager to the latest version by following these instructions.
Follow the steps to upgrade Rancher server:
- 1. Back up your Kubernetes cluster that is running Rancher server
- 2. Update the Helm chart repository
- 3. Upgrade Rancher
- 4. Verify the Upgrade
1. Back up Your Kubernetes Cluster that is Running Rancher Server
Take a one-time snapshot of your Kubernetes cluster running Rancher server.
You’ll use the backup as a restoration point if something goes wrong during upgrade.
2. Update the Helm chart repository
Update your local helm repo cache.
helm repo update
Get the repository name that you used to install Rancher.
For information about the repos and their differences, see Helm Chart Repositories.
helm repo list NAME URL stable https://charts.helm.sh/stable rancher-<CHART_REPO> https://releases.rancher.com/server-charts/<CHART_REPO>
Note: If you want to switch to a different Helm chart repository, please follow the steps on how to switch repositories. If you switch repositories, make sure to list the repositories again before continuing onto Step 3 to ensure you have the correct one added.
Fetch the latest chart to install Rancher from the Helm chart repository.
This command will pull down the latest charts and save it in the current directory as a
helm fetch rancher-<CHART_REPO>/rancher
You can fetch the chart for the specific version you are upgrading to by adding in the
--version=tag. For example:
helm fetch rancher-<CHART_REPO>/rancher --version=v2.4.11
3. Upgrade Rancher
This section describes how to upgrade normal (Internet-connected) or air gap installations of Rancher with Helm.
Get the values, which were passed with
--set, from the current Rancher Helm chart that is installed.
helm get values rancher -n cattle-system hostname: rancher.my.org
Note: There will be more values that are listed with this command. This is just an example of one of the values.
If you are also upgrading cert-manager to the latest version from a version older than 0.11.0, follow Option B: Reinstalling Rancher and cert-manager.
Otherwise, follow Option A: Upgrading Rancher.
Option A: Upgrading Rancher
Upgrade Rancher to the latest version with all your settings.
Take all the values from the previous step and append them to the command using
helm upgrade rancher rancher-<CHART_REPO>/rancher \ --namespace cattle-system \ --set hostname=rancher.my.org
Note: The above is an example, there may be more values from the previous step that need to be appended.
Alternatively, it’s possible to export the current values to a file and reference that file during upgrade. For example, to only change the Rancher version:
helm get values rancher -n cattle-system -o yaml > values.yaml helm upgrade rancher rancher-<CHART_REPO>/rancher \ --namespace cattle-system \ -f values.yaml \ --version=2.4.5
Option B: Reinstalling Rancher and cert-manager
If you are currently running the cert-manger whose version is older than v0.11, and want to upgrade both Rancher and cert-manager to a newer version, then you need to reinstall both Rancher and cert-manger due to the API change in cert-manger v0.11.
helm delete rancher -n cattle-system
Uninstall and reinstall
cert-manageraccording to the instructions on the Upgrading Cert-Manager page.
Reinstall Rancher to the latest version with all your settings. Take all the values from the step 1 and append them to the command using
--set key=value. Note: There will be many more options from the step 1 that need to be appended.
helm install rancher rancher-<CHART_REPO>/rancher \ --namespace cattle-system \ --set hostname=rancher.my.org
Render the Rancher template using the same chosen options that were used when installing Rancher. Use the reference table below to replace each placeholder. Rancher needs to be configured to use the private registry in order to provision any Rancher launched Kubernetes clusters or Rancher tools.
Based on the choice you made during installation, complete one of the procedures below.
||The version number of the output tarball.|
||The DNS name you pointed at your load balancer.|
||The DNS name for your private registry.|
||Cert-manager version running on k8s cluster.|
Option A: Default Self-signed Certificate
helm template ./rancher-<VERSION>.tgz --output-dir . \ --name rancher \ --namespace cattle-system \ --set hostname=<RANCHER.YOURDOMAIN.COM> \ --set certmanager.version=<CERTMANAGER_VERSION> \ --set rancherImage=<REGISTRY.YOURDOMAIN.COM:PORT>/rancher/rancher \ --set systemDefaultRegistry=<REGISTRY.YOURDOMAIN.COM:PORT> \ # Available as of v2.2.0, set a default private registry to be used in Rancher --set useBundledSystemChart=true # Available as of v2.3.0, use the packaged Rancher system charts
Option B: Certificates from Files using Kubernetes Secrets
helm template ./rancher-<VERSION>.tgz --output-dir . \ --name rancher \ --namespace cattle-system \ --set hostname=<RANCHER.YOURDOMAIN.COM> \ --set rancherImage=<REGISTRY.YOURDOMAIN.COM:PORT>/rancher/rancher \ --set ingress.tls.source=secret \ --set systemDefaultRegistry=<REGISTRY.YOURDOMAIN.COM:PORT> \ # Available as of v2.2.0, set a default private registry to be used in Rancher --set useBundledSystemChart=true # Available as of v2.3.0, use the packaged Rancher system charts
If you are using a Private CA signed cert, add
--set privateCA=true following
helm template ./rancher-<VERSION>.tgz --output-dir . \ --name rancher \ --namespace cattle-system \ --set hostname=<RANCHER.YOURDOMAIN.COM> \ --set rancherImage=<REGISTRY.YOURDOMAIN.COM:PORT>/rancher/rancher \ --set ingress.tls.source=secret \ --set privateCA=true \ --set systemDefaultRegistry=<REGISTRY.YOURDOMAIN.COM:PORT> \ # Available as of v2.2.0, set a default private registry to be used in Rancher --set useBundledSystemChart=true # Available as of v2.3.0, use the packaged Rancher system charts
Apply the Rendered Templates
Copy the rendered manifest directories to a system with access to the Rancher server cluster and apply the rendered templates.
kubectl to apply the rendered manifests.
kubectl -n cattle-system apply -R -f ./rancher
4. Verify the Upgrade
Log into Rancher to confirm that the upgrade succeeded.
Having network issues following upgrade?
Known Upgrade Issues
The following table lists some of the most noteworthy issues to be considered when upgrading Rancher. A more complete list of known issues for each Rancher version can be found in the release notes on GitHub and on the Rancher forums.
|Upgrading to v2.4.6 or v2.4.7||These Rancher versions had an issue where the
|Upgrading to v2.3.0+||Any user provisioned cluster will be automatically updated upon any edit as tolerations were added to the images used for Kubernetes provisioning.|
|Upgrading to v2.2.0-v2.2.x||Rancher introduced the system charts repository which contains all the catalog items required for features such as monitoring, logging, alerting and global DNS. To be able to use these features in an air gap install, you will need to mirror the
|Upgrading from v2.0.13 or earlier||If your cluster’s certificates have expired, you will need to perform additional steps to rotate the certificates.|
|Upgrading from v2.0.7 or earlier||Rancher introduced the
RKE Add-on Installs
Important: RKE add-on install is only supported up to Rancher v2.0.8
Please use the Rancher helm chart to install Rancher on a Kubernetes cluster. For details, see the Kubernetes Install.
If you are currently using the RKE add-on install method, see Migrating from a RKE add-on install for details on how to move to using the helm chart.