<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE upgrade failure in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-failure/m-p/4538939#M572412</link>
    <description>&lt;P&gt;I agree with your plan:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Remove the failed-upgrade PSN from the old deployment, install fresh the new release, and join to the new deployment.&lt;/LI&gt;
&lt;LI&gt;For ise01, you have the option to either also install fresh the new release or to upgrade, and then join to the new deployment. It's usually faster and cleaner to install fresh.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If not already done, read&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-7/upgrade_guide/Upgrade_Journey/Cisco_ISE_2_7_Upgrade_Journey.html" target="_self"&gt;Cisco Identity Services Engine Upgrade Journey, Release 2.7&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 26 Jan 2022 05:26:41 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2022-01-26T05:26:41Z</dc:date>
    <item>
      <title>ISE upgrade failure</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-failure/m-p/4537492#M572389</link>
      <description>&lt;P&gt;Hi all!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I got a fun one today &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was updating our ISE cluster with two admin nodes and two PSN nodes. The primary admin node and one of the PSN nodes was updated from 2.4 to 2.7.9.356 but the update halted when the remaining PSN node had low disk space. The picture attached displays the current status. So Radius live logs shows that both admin nodes are working and clients can authenticate with no issues, at the moment at least.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what to do now? Can I somehow clear up some space on the remaining PSN node and try again or should I simply remove it from the old cluster and reinstall in to the new deployment. But do I need to reinstall the admin node from the old deployment also? Or can I somehow update it even when the old PSN node is removed? I think it's possible to update the old admin node through CLI and then connect it to the new cluster as well, never tried it though.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does I risk some kind of split brain? A&lt;SPAN&gt;nd what happens if the primary node fails and the secondary is in another deployment?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Br&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Lars&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jan 2022 21:34:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-failure/m-p/4537492#M572389</guid>
      <dc:creator>torstensson</dc:creator>
      <dc:date>2022-01-24T21:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade failure</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-failure/m-p/4538939#M572412</link>
      <description>&lt;P&gt;I agree with your plan:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Remove the failed-upgrade PSN from the old deployment, install fresh the new release, and join to the new deployment.&lt;/LI&gt;
&lt;LI&gt;For ise01, you have the option to either also install fresh the new release or to upgrade, and then join to the new deployment. It's usually faster and cleaner to install fresh.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If not already done, read&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-7/upgrade_guide/Upgrade_Journey/Cisco_ISE_2_7_Upgrade_Journey.html" target="_self"&gt;Cisco Identity Services Engine Upgrade Journey, Release 2.7&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jan 2022 05:26:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-failure/m-p/4538939#M572412</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2022-01-26T05:26:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade failure</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-failure/m-p/4540799#M572440</link>
      <description>&lt;P&gt;Split brain: not an issue until you make a configuration change. The new PAN and the old PAN are independent and do not fight over master role or configuration precedence.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;HR /&gt;&lt;P&gt;&amp;gt; A&lt;SPAN&gt;nd what happens if the primary node fails and the secondary is in another deployment?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any PAN is suitable to take over the whole deployment assuming its version is fresh (matches PSN) and its configuration is fresh . To take over you have to register the PSNs to the new PAN . But this is tiring.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Just make sure you have a good backup from the new PAN. After a failure, you can just reinstall the PAN and restore the configuration.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Even better if you have two PANs. In case of a failure you just promote the secondary PAN.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 22:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-failure/m-p/4540799#M572440</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2022-01-27T22:20:42Z</dc:date>
    </item>
  </channel>
</rss>

