Upgrading Cumulus Linux
This guide describes the three methods for upgrading Cumulus Linux. Two of these methods optionally support In-Service-System-Upgrade (ISSU), enabling you to perform a hitless (sub-second loss of data plane traffic) upgrade.
To upgrade Cumulus Linux, choose one of the three upgrade methods:
- Install a new Cumulus Linux image with optimized image upgrade, (ISSU support and maintains the current switch configuration)
 - Upgrade only changed packages with package upgrade (ISSU support and maintains the current switch configuration)
 - Install a new Cumulus Linux image with ONIE (no ISSU support and you will need to manually back up and restore your switch configuration)
 
Upgrades with ISSU
ISSU enables you to perform a hitless upgrade of the switch software while the network continues to forward packets. ISSU hitless upgrade minimizes data plane traffic disruption to sub-second levels and automatically translates the switch NVUE configuration to the new version’s schema. During ISSU, the routing control plane is temporarily unavailable; however, the BGP graceful restart capability maintains traffic flow through the switch.
Cumulus Linux supports two methods that can use ISSU:
ISSU requires the use of warm reboot mode. You must configure the switch in half-resource mode to perform a warm reboot. When the switch operates in half-resource mode, performing a warm reboot (using the nv action reboot system mode warm command) results in a hitless upgrade. For more information about reboot modes, refer to Switch Reboot Modes.
To configure the switch in half resource mode:
cumulus@switch:~$ nv set system forwarding resource-mode half
To set the resource-mode back to the default value (full) run the nv unset system forwarding resource-mode command.
Changing the resource mode on the switch requires a switchd restart, which impacts traffic forwarding.
cumulus@switch:~$ sudo nano /etc/cumulus/switchd.d/resource-mode.conf
...
resource_mode = half
Restart the switchd service with the sudo systemctl restart switchd.service command.
Cumulus Linux supports ISSU and warm reboot mode with 802.1X, layer 2 forwarding, layer 3 forwarding with BGP, static routing, and VXLAN routing with EVPN.
The following features are not supported during warm reboot:
- EVPN MLAG or EVPN multihoming.
 - LACP bonds. LACP control plane sessions might time out before warm reboot completes. Use static LAG to keep bonds up with sub-second convergence during a warm reboot.
 
Before You Upgrade
Create a cl-support File
Before and after you upgrade the switch, run the cl-support script to create a cl-support archive file. The file is a compressed archive of useful information for troubleshooting. If you experience any issues during upgrade, you can send this archive file to the Cumulus Linux support team to investigate.
- Create the 
cl-supportarchive file with either the NVUEnv action generate system tech-supportcommand or the Linuxsudo cl-supportcommand: 
cumulus@switch:~$ nv action generate system tech-support
Copy the
cl-supportfile off the switch to a different location.After upgrade is complete, create a new archive file:
cumulus@switch:~$ nv action generate system tech-support
Optimized Image Upgrade
Optimized image upgrade uses two partitions to upgrade the image with just one reboot cycle. With two partitions on the switch, the current image boots from one partition, from which the image upgrade triggers. After detecting the running partition and checking if the second partition is available for installation, optimized upgrade starts to stage the installation in the second partition (copying the image, preparing the partition, unpacking the new image, and tuning and finalizing the new partition for the new image). The subsequent boot occurs from the second partition.
- You can only use optimized image upgrade on a switch with a 30GB SSD or larger to accommodate the second partition required for upgrade. To validate the size of the SSD, run the 
sudo blockdev --getsize64 /dev/sdacommand. As an alternative, run thesudo blkidcommand and confirm theCL-SYSTEM-2partition exists on the switch to support optimized upgrade. - You cannot downgrade a Cumulus Linux 5.15 switch to Cumulus Linux 5.11.0 or earlier with optimized image upgrade; use ONIE instead.
For a list of the releases from which you can upgrade to Cumulus Linux 5.15 with optimized image upgrade, see Release Considerations. 
Upgrading an MLAG pair requires additional steps. If you are using MLAG to dual connect two Cumulus Linux switches in your environment, follow the steps in Upgrade Switches in an MLAG Pair below to ensure a smooth upgrade.
Download the Cumulus Linux image with the
nv action fetch system image <remote-url>command:cumulus@switch:~$ nv action fetch system image http://10.0.1.251/cumulus-linux-5.15.0-mlx-amd64.binThe
nv action fetch system image <remote-url>command copies the image to the/var/imagesdirectory on the switch. If you copy the image manually to the switch instead of using thenv action fetch system image <remote-url>command, make sure to copy the image to the/var/imagesdirectory.Install the image on the second partition:
cumulus@switch:~$ nv action install system image files cumulus-linux-5.15.0-mlx-amd64.binUse the
forceoption to force install the image:cumulus@switch:~$ nv action install system image files cumulus-linux-5.15.0-mlx-amd64.bin forceSet the boot partition:
cumulus@switch:~$ nv action boot-next system image otherReboot the switch. If you configured the switch resource mode to half for ISSU, reboot with warm mode for a hitless upgrade:
    cumulus@switch:~$ nv action reboot system mode warm
If you are not using ISSU, reboot with a cold reboot:
    cumulus@switch:~$ nv action reboot system
If the upgrade fails or you want to go back to the Cumulus Linux release from which you upgraded, run the nv action boot-next system image other rollback command. The switch boots back to the previous release image and restores the switch configuration.
After you perform a rollback, you can repeat steps 1 through 4 above to perform a switch upgrade again.
- To rename a Cumulus Linux image on the switch, run the 
nv action rename system image files <image> <new-image-name>command. - To delete a Cumulus Linux image from the switch, run the 
nv action delete system image files <image>command. 
To show information about a cumulus image:
cumulus@switch:~$ nv show system image
               operational              
-------------  -------------------------
current        2                        
next           2                        
partition1                              
  build-id     5.13.0.0026
  description  Cumulus Linux 5.13.0     
  disk         /dev/sda5                
  release      5.13.0                   
partition2                              
  build-id     5.15.0.0018
  description  Cumulus Linux 5.15.0     
  disk         /dev/sda6                
  release      5.15.0 
- To list the available Cumulus Linux image files, run the 
nv show system image filescommand. - To show information about a specific Cumulus Linux image file, run the 
nv show system image files <image-filename>command. 
Download the Cumulus Linux image to the switch.
Install the image on the second partition:
cumulus@switch:~$ cl-image-upgrade -u cumulus-linux-5.15.0-mlx-amd64.bin
To check the current boot partition status, run the cl-image-upgrade -s command:
cumulus@switch:~$ cl-image-upgrade -s  
Current system partition is 1 on /dev/sda5 
Current system partition has 5.11.0 "Cumulus Linux 5.11.0" 5.11.0.0012
Other system partition is 2 on /dev/sda6 
...
To activate the other partition at next boot, run the cl-image-upgrade -a command:
cumulus@switch:~$ cl-image-upgrade -a 
- Reboot the switch. If you configured the switch resource mode to half for ISSU, reboot with warm mode for a hitless upgrade:
 
    cumulus@switch:~$ sudo csmgrctl -wf
If you are not using ISSU, reboot with a cold reboot:
    cumulus@switch:~$ sudo reboot
Package Upgrade
Cumulus Linux completely embraces the Linux and Debian upgrade workflow, where you use an installer to install a base image, then perform any upgrades within that release train with package upgrade. Any packages that change after the base install get upgraded in place from the repository. All switch configuration files remain untouched, or in rare cases merged during the package upgrade.
When you use package upgrade to upgrade the switch, configuration data stays in place during the upgrade. If the new release updates a previously changed configuration file, the upgrade process prompts you to either specify the version you want to use or evaluate the differences.
Upgrading an MLAG pair requires additional steps. If you are using MLAG to dual connect two Cumulus Linux switches in your environment, follow the steps in Upgrade Switches in an MLAG Pair below to ensure a smooth upgrade.
- You cannot upgrade the switch to a new release train. For example, you cannot use package upgrade to upgrade the switch from 4.x to 5.x.
 - Package upgrade always updates to the latest available release in the Cumulus Linux repository.
 - The package upgrade command might restart or stop services as part of the upgrade process.
 - The package upgrade command might disrupt core services by changing core service dependency packages.
 - After you upgrade, account UIDs and GIDs created by packages might be different on different switches, depending on the configuration and package installation history.
 - Cumulus Linux does not support the Linux 
sudo -E apt-get dist-upgradecommand. Be sure to usesudo -E apt-get upgradewhen upgrading packages. - To package upgrade to Cumulus Linux 5.15, you need 0.8GB of free disk space. Before you upgrade, run the NVUE 
nv show system disk usagecommand or the Linuxsudo df -hcommand to show how much disk space you are currently using on the switch. 
For a list of the releases from which you can upgrade to Cumulus Linux 5.15, see Release Considerations.
To upgrade the switch with package upgrade:
Fetch the latest update metadata from the repository and review potential upgrade issues (in some cases, upgrading new packages might also upgrade additional existing packages due to dependencies).
cumulus@switch:~$ sudo nv action upgrade system packages to latest use-vrf default dry-runBy default, the NVUE
sudo nv action upgrade system packagescommand runs in the management VRF. To run the command in a non-management VRF such asdefault, you must use theuse-vrf <vrf-id>option.Upgrade all the packages to the latest distribution.
cumulus@switch:~$ sudo nv action upgrade system packages to latest use-vrf defaultBy default, the NVUE
sudo nv action upgrade system packagescommand runs in the management VRF. To run the command in a non-management VRF such asdefault, you must use theuse-vrf <vrf-id>option.If you see errors for expired GPG keys that prevent you from upgrading packages, follow the steps in Upgrading Expired GPG Keys.
After the upgrade completes, check if you need to reboot the switch, then reboot the switch if required:
    cumulus@switch:~$ nv show system reboot required
    yes
If you configured the switch resource mode to half for ISSU, reboot with warm mode for a hitless upgrade:
    cumulus@switch:~$ nv action reboot system mode warm
If you are not using ISSU, reboot with a cold reboot:
    cumulus@switch:~$ nv action reboot system
- Verify correct operation with the old configurations on the new version.
 
Fetch the latest update metadata from the repository.
cumulus@switch:~$ sudo -E apt-get updateReview potential upgrade issues (in some cases, upgrading new packages might also upgrade additional existing packages due to dependencies).
cumulus@switch:~$ sudo -E apt-get upgrade --dry-runUpgrade all the packages to the latest distribution.
cumulus@switch:~$ sudo -E apt-get upgradeIf you do not need to reboot the switch after the upgrade completes, the upgrade ends, restarts all upgraded services, and logs messages in the
/var/log/syslogfile similar to the ones shown below. In the examples below, the process only upgrades thefrrpackage.Policy: Service frr.service action stop postponed Policy: Service frr.service action start postponed Policy: Restarting services: frr.service Policy: Finished restarting services Policy: Removed /usr/sbin/policy-rc.d Policy: Upgrade is finishedIf the upgrade process encounters changed configuration files that have new versions in the release to which you are upgrading, you see a message similar to this:
Configuration file '/etc/frr/daemons' ==> Modified (by you or by a script) since installation. ==> Package distributor has shipped an updated version. What would you like to do about it ? Your options are: Y or I : install the package maintainer's version N or O : keep your currently-installed version D : show the differences between the versions Z : start a shell to examine the situation The default action is to keep your current version. *** daemons (Y/I/N/O/D/Z) [default=N] ?- To see the differences between the currently installed version and the new version, type 
D. - To keep the currently installed version, type 
N. The new package version installs with the suffix.dpkg-dist(for example,/etc/frr/daemons.dpkg-dist). When the upgrade completes and before you reboot, merge your changes with the changes from the newly installed file. - To install the new version, type 
I. Your currently installed version has the suffix.dpkg-old. - Cumulus Linux includes 
/etc/apt/sources.listin thecumulus-archive-keyringpackage. During upgrade, you must select if you want the new version from the package or the existing file. 
When the upgrade is complete, you can search for the files with the
sudo find / -mount -type f -name '*.dpkg-*'command.If you see errors for expired GPG keys that prevent you from upgrading packages, follow the steps in Upgrading Expired GPG Keys.
- To see the differences between the currently installed version and the new version, type 
 Reboot the switch if the upgrade messages indicate that you need to perform a system restart.
cumulus@switch:~$ sudo -E apt-get upgrade ... upgrade messages here ... *** Caution: Service restart prior to reboot could cause unpredictable behavior *** System reboot required ***
If you configured the switch resource mode to half for ISSU, reboot with warm mode for a hitless upgrade:
cumulus@switch:~$ sudo csmgrctl -wf
If you are not using ISSU, reboot with a cold reboot:
cumulus@switch:~$ sudo reboot
- Verify correct operation with the old configurations on the new version.
 
Offline Package Upgrade
Cumulus Linux uses NVIDIA’s production APT repository by default, with the configuration defined in /etc/apt/sources.list. This allows the switch to directly access and install updates or packages from the internet. For networks without internet access, NVIDIA also provides a docker container that can host an APT repository locally, enabling your switch to retrieve packages from a server within your environment. To obtain the docker container, download it from the NVIDIA Enterprise support portal.
You can run the docker container on your own server, or use Docker with Cumulus Linux to run it on a switch. If you run the container on a switch, run it with the --network=host option, and update firewall rules to allow incoming connections.
To launch the docker container and configure your switch for offline package upgrade:
- Copy the docker container tarball to your server. Load the image with the 
sudo docker load -i /path/to/tarball/cumulus-linux-apt-mirror-5.15.0.tarcommand: 
user@server:~$ docker load -i ./cumulus-linux-apt-mirror-5.15.0.tar 
36f5f951f60a: Loading layer [==================================================>]  77.89MB/77.89MB
2351dd6bd33d: Loading layer [==================================================>]  118.7MB/118.7MB
00cc4f38365c: Loading layer [==================================================>]  3.584kB/3.584kB
15db5544fc22: Loading layer [==================================================>]  4.608kB/4.608kB
ce6adb617595: Loading layer [==================================================>]   2.56kB/2.56kB
1fc99835d6cd: Loading layer [==================================================>]   5.12kB/5.12kB
ef322fe0300d: Loading layer [==================================================>]  7.168kB/7.168kB
22fcae930038: Loading layer [==================================================>]  3.072kB/3.072kB
049771462316: Loading layer [==================================================>]   5.12kB/5.12kB
ba266af6a60c: Loading layer [==================================================>]  4.096kB/4.096kB
76333a9a644a: Loading layer [==================================================>]  5.632kB/5.632kB
599cafa33123: Loading layer [==================================================>]  9.216kB/9.216kB
346269b5a88b: Loading layer [==================================================>]  8.195MB/8.195MB
0abaedd440c4: Loading layer [==================================================>]   3.27GB/3.27GB
Loaded image: cumulus-linux-apt-mirror:5.15.0
- Run the docker container, publishing ports for HTTP (8080:80) and HTTPS (8443:8443), defining volumes to mount for your own CA or server certificates.
 
Use the following container paths to supply certificates:
/etc/nginx/certs/tls.crt- used for the TLS server certificate presented on port 8443./etc/nginx/certs/tls.key- the private key for the TLS server certificate./etc/nginx/ca/ca.crt- used for a private CA certificate./etc/nginx/ca/ca.key- the private CA key used to sign the server certificate.
The following example runs the container, defining volumes to mount for a CA certificate:
user@server:~$ docker run -d --name repo -p 8080:80 -p 8443:8443 -v /local/certpath/ca.crt:/etc/nginx/ca/ca.crt:ro -v /local/certpath/ca.key:/etc/nginx/ca/ca.key:ro cumulus-linux-apt-mirror:5.15.0
If you do not specify your own CA or server certificate, a self-signed certificate is used. To run the container with a self-signed certificate, define the following environment variables in your docker run command:
REPO_HOST=<hostname>- defines the hostname used to connect to the repository and is added to the Common Name (CN) and Subject Alternative Name (SAN) fields in the self-signed certificates.REPO_IP=<ip-address>- defines the IP used to connect to the respository if you do not use a hostname and is also added to the SAN.FORCE_REISSUE=[0 | 1]- set to 1 to force reissuing the server certificate when the container starts, applying the configuration defined in the other variables.
The following example runs the container with a self-signed certificate:
user@server:~$ sudo docker run -d --name repo -p 8080:80 -p 8443:8443 -e REPO_HOST=hostname.domain -e REPO_IP=10.1.100.1 -e FORCE_REISSUE=1 cumulus-linux-apt-mirror:5.15.0
- Import the certificate used for the repository container on the switches you want to upgrade. If you are using a self-signed certificated, you can retrieve it from the container with the curl command: 
curl -fsSL http://10.1.1.100:8080/ca.crt. 
- Continue with a Package Upgrade on your switch.
 
ONIE Image Upgrade
ONIE is an open source project (equivalent to PXE on servers) that enables the installation of network operating systems (NOS) on a switch. ONIE upgrade enables you to choose the exact release to which you want to upgrade and is the only method available to upgrade your switch to a new release train (for example, from 4.4 to 5.15).
- Installing a Cumulus Linux image with ONIE is destructive; any configuration files on the switch are not saved; copy them to a different server before you start the Cumulus Linux image install.
 - You must move configuration data to the new network operating system using ZTP or automation while the operating system is first booted, or soon afterwards using out-of-band management. Moving a configuration file can cause issues.
 - Merge conflicts with configuration file changes in the new release sometimes go undetected.
 - If configuration files do not restore correctly, you cannot 
sshto the switch from in-band management. Use out-of-band connectivity (eth0 or the console). - You must reinstall and reconfigure third-party applications after upgrade.
 
To upgrade the switch with ONIE:
- Back up the configurations off the switch.
 
If you manage your switch configuration with NVUE, use the following procedure to up the configuration.
As Cumulus Linux supports more features and functionality, NVUE syntax might change between releases and the content of snippets and flexible snippets might become invalid. Before you back up and restore configuration across different Cumulus Linux releases, make sure to review the What's New for new NVUE syntax and other configuration file changes.
- Any certificates or CRLs imported to the system with NVUE are not backed up during an ONIE image upgrade. You must reimport the certificates after the new image is installed.
 - If you reinstall Cumulus Linux with an embedded 
startup.yamlfile usingonie-install -t, Cumulus Linux preserves your NVUE startup configuration and translates the contents automatically to NVUE syntax required by the new release. This method still requires reimporting certificates and CRLs after the image install. - If NVUE introduces new syntax for a feature that a snippet configures, you must remove the snippet before upgrading.
 
To back up the configuration file:
Save the configuration to the
/etc/nvue.d/startup.yamlfile with thenv config savecommand:cumulus@switch:~$ nv config save savedCopy the
/etc/nvue.d/startup.yamlfile off the switch to a different location.
For information about the NVUE object model and commands, see NVIDIA User Experience - NVUE.
If you do not use NVUE to manage your switch configuration, reference this section to back up your configuration files.
As with other Linux distributions, the /etc directory is the primary location for all configuration data in Cumulus Linux. The following list contains the files you need to back up and migrate to a new release. Make sure you examine any changed files. Make the following files and directories part of a backup strategy.
Network Configuration Files:
| File Name and Location | Description | Cumulus Linux Documentation | Debian Documentation | 
|---|---|---|---|
/etc/frr/ | Routing application (responsible for BGP and OSPF) | FRRouting | N/A | 
/etc/hostname | Configuration file for the hostname of the switch | Quick Start Guide | https://wiki.debian.org/HowTo/ChangeHostname | 
/etc/network/ | Network configuration files, most notably /etc/network/interfaces and /etc/network/interfaces.d/ | Switch Port Attributes | N/A | 
/etc/resolv.conf | DNS resolution | Not unique to Cumulus Linux: wiki.debian.org/NetworkConfiguration | https://www.debian.org/doc/manuals/debian-reference/ch05.en.html | 
/etc/hosts | Configuration file for the hostname of the switch | Quick Start Guide | https://wiki.debian.org/HowTo/ChangeHostname | 
/etc/cumulus/acl/* | Netfilter configuration | Access Control List Configuration | N/A | 
/etc/cumulus/control-plane/policers.conf | Configuration for control plane policers | Access Control List Configuration | N/A | 
/etc/cumulus/datapath/qos/qos_features.conf | QoS configuration Note: In Cumulus Linux 5.0 and later, default ECN configuration parameters start with default_ecn_red_conf instead of default_ecn_conf. | Quality of Service | N/A | 
/etc/mlx/datapath/qos/qos_infra.conf | QoS configuration | Quality of Service | N/A | 
/etc/mlx/datapath/tcam_profile.conf | Configuration for the forwarding table profiles | Forwarding Table Size and Profiles | N/A | 
/etc/cumulus/datapath/traffic.conf | Configuration for the forwarding table profiles | Forwarding Table Size and Profiles | N/A | 
/etc/cumulus/ports.conf | Breakout cable configuration file | Switch Port Attributes | N/A; read the guide on breakout cables | 
/etc/cumulus/switchd.conf | switchd configuration | Configuring switchd | N/A; read the guide on switchd configuration | 
Commonly Used Files:
| File Name and Location | Description | Cumulus Linux Documentation | Debian Documentation | 
|---|---|---|---|
/etc/motd | Message of the day | Not unique to Cumulus Linux | wiki.debian.org/motd | 
/etc/passwd | User account information | Not unique to Cumulus Linux | https://www.debian.org/doc/manuals/debian-reference/ch04.en.html | 
/etc/shadow | Secure user account information | Not unique to Cumulus Linux | https://www.debian.org/doc/manuals/debian-reference/ch04.en.html | 
/etc/group | Defines user groups on the switch | Not unique to Cumulus Linux | https://www.debian.org/doc/manuals/debian-reference/ch04.en.html | 
/etc/init/lldpd.conf | Link Layer Discover Protocol (LLDP) daemon configuration | Link Layer Discovery Protocol | https://packages.debian.org/buster/lldpd | 
/etc/lldpd.d/ | Configuration directory for lldpd | Link Layer Discovery Protocol | https://packages.debian.org/buster/lldpd | 
/etc/nsswitch.conf | Name Service Switch (NSS) configuration file | TACACS | N/A | 
/etc/ssh/ | SSH configuration files | SSH for Remote Access | https://wiki.debian.org/SSH | 
/etc/sudoers, /etc/sudoers.d | Best practice is to place changes in /etc/sudoers.d/ instead of /etc/sudoers; changes in the /etc/sudoers.d/ directory are not lost during upgrade | Using sudo to Delegate Privileges | 
- If you are using the root user account, consider including 
/root/. - If you have custom user accounts, consider including 
/home/<username>/. 
Never Migrate Files:
| File Name and Location | Description | 
|---|---|
/etc/mlx/ | Per-platform hardware configuration directory, created on first boot. Do not copy. | 
/etc/default/clagd | Created and managed by ifupdown2. Do not copy. | 
/etc/default/grub | Grub init table. Do not modify manually. | 
/etc/default/hwclock | Platform hardware-specific file. Created during first boot. Do not copy. | 
/etc/init | Platform initialization files. Do not copy. | 
/etc/init.d/ | Platform initialization files. Do not copy. | 
/etc/fstab | Static information on filesystem. Do not copy. | 
/etc/image-release | System version data. Do not copy. | 
/etc/os-release | System version data. Do not copy. | 
/etc/lsb-release | System version data. Do not copy. | 
/etc/lvm/archive | Filesystem files. Do not copy. | 
/etc/lvm/backup | Filesystem files. Do not copy. | 
/etc/modules | Created during first boot. Do not copy. | 
/etc/modules-load.d/ | Created during first boot. Do not copy. | 
/etc/sensors.d | Platform-specific sensor data. Created during first boot. Do not copy. | 
/root/.ansible | Ansible tmp files. Do not copy. | 
/home/cumulus/.ansible | Ansible tmp files. Do not copy. | 
To show a list of files changed from the previous Cumulus Linux install, run the sudo dpkg --verify command.
To show a list of generated /etc/default/isc-* files changed from the previous Cumulus Linux install, run the egrep -v '^$|^#|=""$' /etc/default/isc-dhcp-* command.
Download the Cumulus Linux image.
Install the Cumulus Linux image with the
onie-install -a -i <image-location>command, which boots the switch into ONIE. The following example command installs the image from a web server, defines the current NVUE startup configuration to back up and restore in the new image, then reboots the switch. There are additional ways to install the Cumulus Linux image, such as using FTP, a local file, or a USB drive. For more information, see Installing a New Cumulus Linux Image with ONIE.cumulus@switch:~$ sudo onie-install -a -i http://10.0.1.251/cumulus-linux-5.15.0-mlx-amd64.bin && sudo rebootRestore certificates and the configuration files to the new release:
a. Reimport all certificates and/or CRLs that were configured in the previous release with the
nv action import system securitycommand, ensuring you use the samecertificate-idthat was originally assigned to each certificate.b. Copy the
/etc/nvue.d/startup.yamlfile from the back up process to the switch.c. If required, convert the
startup.yamlfile to the format of the currently running release on the switch. Refer to Commands to translate a revision or yaml configuration file.d. Run the
nv config replacecommand, then run thenv config applycommand. In the following examplestartup.yamlis in the/home/cumulusdirectory on the switch:cumulus@switch:~$ nv config replace /home/cumulus/startup.yaml cumulus@switch:~$ nv config apply
If you pre-stage your NVUE startup.yaml during an ONIE image installation from Cumulus Linux with the onie-install -t option, certificates and CRLs configured on the switch are not backed up or automatically restored. After the switch boots with the new image, features that rely on certificates (such as NVUE API, gNMI, OTEL, etc.) remain unavailable until the certificates are reimported. When reimporting certificates and CRLs with the nv action import system security command, use the same certificate-id that was originally assigned to each certificate in the prior release.
- Verify correct operation with the old configurations on the new release.
 - Reinstall third party applications and associated configurations.
 
Upgrade Switches in an MLAG Pair
If you are using MLAG to dual connect two switches in your environment, follow the steps below to upgrade the switches.
You must upgrade both switches in the MLAG pair to the same release of Cumulus Linux.
Only during the upgrade process does Cumulus Linux supports different software versions between MLAG peer switches. After you upgrade the first MLAG switch in the pair, run the clagctl showtimers command to monitor the init-delay timer. When the timer expires, make the upgraded MLAG switch the primary, then upgrade the peer to the same version of Cumulus Linux.
NVIDIA has not tested running different versions of Cumulus Linux on MLAG peer switches outside of the upgrade time period; you might see unexpected results.
Verify the switch is in the secondary role:
cumulus@switch:~$ nv show mlagShut down the core uplink layer 3 interfaces. The following example shuts down swp1:
cumulus@switch:~$ nv set interface swp1 link state down cumulus@switch:~$ nv config applyShut down the peer link:
cumulus@switch:~$ nv set interface peerlink link state down cumulus@switch:~$ nv config applyUpgrade the switch:
- To upgrade the switch with optimized image upgrade, see Optimized Image Upgrade.
 - To boot the switch into ONIE, see ONIE Image Install.
 - To upgrade the switch with package upgrade instead of booting into ONIE, see Package Upgrade.
 
If you installed a new image on the switch, restore the configuration files to the new release. If you performed an upgrade with
apt, bring the uplink and peer link interfaces you shut down in steps 2 and 3 up:cumulus@switch:~$ nv set interface swp1 link state up cumulus@switch:~$ nv set interface peerlink link state up cumulus@switch:~$ nv config apply cumulus@switch:~$ nv config saveVerify STP convergence across both switches with the Linux
mstpctl showallcommand. NVUE does not provide an equivalent command.cumulus@switch:~$ mstpctl showallVerify core uplinks and peer links are UP:
cumulus@switch:~$ nv show interfaceVerify MLAG convergence:
cumulus@switch:~$ nv show mlagMake this secondary switch the primary:
cumulus@switch:~$ nv set mlag priority 2084Verify the other switch is now in the secondary role.
Repeat steps 2-8 on the new secondary switch.
Remove the priority 2048 and restore the priority back to 32768 on the current primary switch:
cumulus@switch:~$ nv set mlag priority 32768
Verify the switch is in the secondary role:
cumulus@switch:~$ clagctl statusShut down the core uplink layer 3 interfaces:
cumulus@switch:~$ sudo ip link set <switch-port> downShut down the peer link:
cumulus@switch:~$ sudo ip link set peerlink downUpgrade the switch:
- To upgrade the switch with optimized image upgrade, see Optimized Image Upgrade.
 - To boot the switch into ONIE, see ONIE Image Upgrade.
 - To upgrade the switch with package upgrade instead of booting into ONIE, see Package Upgrade.
 
If you installed a new image on the switch, restore the configuration files to the new release.
Verify STP convergence across both switches:
cumulus@switch:~$ mstpctl showallVerify that core uplinks and peer links are UP:
cumulus@switch:~$ ip addr showVerify MLAG convergence:
cumulus@switch:~$ clagctl statusMake this secondary switch the primary:
cumulus@switch:~$ clagctl priority 2048Verify the other switch is now in the secondary role.
Repeat steps 2-9 on the new secondary switch.
Remove the priority 2048 and restore the priority back to 32768 on the current primary switch:
cumulus@switch:~$ clagctl priority 32768
Considerations
- The 
/etc/os-releaseand/etc/lsb-releasefiles update to the currently installed Cumulus Linux release when you upgrade the switch using either package upgrade or Cumulus Linux image install. For example, if you perform a package upgrade and the latest Cumulus Linux release on the repository is 5.15, these two files display the release as 5.15 after the upgrade. - The 
/etc/image-releasefile updates only when you run a Cumulus Linux image install. Therefore, if you run a Cumulus Linux image install of Cumulus Linux 5.13, followed by a package upgrade to 5.15, the/etc/image-releasefile continues to display Cumulus Linux 5.13, which is the originally installed base image. - To downgrade a switch with Secure Boot enabled, see Downgrade a Secure Boot Switch.
 - If you install any third party applications on a Cumulus Linux switch, configuration data is typically installed in the 
/etcdirectory, but it is not guaranteed. It is your responsibility to understand the behavior and configuration file information of any third party packages installed on the switch. After you upgrade using a full Cumulus Linux image install, you need to reinstall any third party packages. Package upgrade does not replace or remove third-party applications.