Table of Contents
Cisco IMC Supervisor Release Notes, Release 1.0
New and Changed Features in Cisco IMC Supervisor Release 1.0.0.1
E-mail Alerts for all Fault Severities
Management Options from the Top-Level Rack Groups
Adding Back-to-Back Rack Accounts
Upgrading to Cisco IMC Supervisor Release 1.0.0.1
Features in Cisco IMC Supervisor Release 1.0
Server-based Hardware Inventory
Hardware Health Status Reporting
Firmware Inventory and Management
E-mail Alerts for Critical Faults
Support for High-level Power Management Tasks
Resolved Caveats in Release 1.0.0.1
Obtaining Documentation and Submitting a Service Request
Cisco IMC Supervisor Release Notes, Release 1.0
First Published: November 24, 2014
This document describes the features and open issues for Cisco IMC Supervisor Releases 1.0 and later.
Table 1 shows the online change history for this document.
Introduction
Cisco IMC Supervisor is a management system that allows you to manage rack mount servers on a large scale. It allows you to create groups of rack mount servers for monitoring and inventory purposes.
You can use Cisco IMC Supervisor to perform the following tasks for a rack mount server:
- Support for logical grouping of servers and summary views per group
- Collect inventory for the servers
- Provide monitoring capabilities for servers and groups
- Firmware management including firmware download, upgrade, and activation
- Manage standalone server actions including power control, LED control, log collection, KVM launch, CIMC UI launch and e-mail alerts
- Role Based Access Control (RBAC) to restrict access and capabilities.
System Requirements
New and Changed Features in Cisco IMC Supervisor Release 1.0.0.1
The following updates are available in Cisco IMC Supervisor, Release 1.0.0.1:
- E-mail Alerts for all Fault Severities
- Management Options from the Top-Level Rack Groups
- C-Series Platform Validation
- Upgrade Notes
E-mail Alerts for all Fault Severities
Cisco IMC Supervisor now allows you to configure email alerting for faults with all severities. You can specify a valid email address of the recipient to whom an email with a consolidated list of faults matching the severities will be sent.
Management Options from the Top-Level Rack Groups
You can now manage rack servers such as powering on/off, shutting down servers and so on from the top-level group Rack Groups in the left pane.
Upgrade Notes
Pre-requisites
- Download the Cisco IMC Supervisor Release 1.0.0.1 patch from http://www.cisco.com.
- Place the software in the FTP or HTTP server that you plan to use to install the upgrade.
- If NFS mount is used for application storage, disable it before you apply a patch. If you do not, the upgrade will fail.
- Obtain access to a secure shell (SSH) application.
Note We recommend that you take a snapshot of the VM before you begin the upgrade. If you do this, you do not need to back up the existing configuration database through an FTP server.
Upgrading to Cisco IMC Supervisor Release 1.0.0.1
Step 1 Open your SSH application and enter the Cisco IMC Supervisor appliance IP address and port number.
Step 2 Login as shelladmin with password changeme.
Step 3 From the Cisco IMC Supervisor Shell Menu, choose 3) Stop Services.
Step 4 To verify that all services are stopped, choose 2) Display Services Status.
Step 5 (Optional) If desired, you can choose 7) Backup Database to back up the Cisco IMC Supervisor database.
Note You do not need to back up the database if you took a snapshot of the VM before you started.
Step 6 To upgrade to Release 1.0.0.1, choose 16) Apply Patch.
Step 7 When prompted, enter the location of the Release 1.0.0.1 patch. For, example, ftp: // username : password @ hostname | IP_address / software_location_and_name
Step 8 Wait for the download and installation to complete.
Step 9 When prompted, choose 4) Start Services and complete the upgrade process.
Note The patch process is not complete or successful until the Cisco IMC Supervisor services have started, Cisco IMC Supervisor is available, the login screen is displayed, and the admin user can log in to Cisco IMC Supervisor. All services must be started before you attempt to perform other shelladmin procedures, such as apply additional patches, take a database backup, or restore a database from a backup.
Step 10 When the upgrade is complete, choose 11) Show Version in shelladmin to verify the current version of Cisco IMC Supervisor.
For installation instructions, see Cisco IMC Supervisor Installation and Upgrade Guide.
Note To view the status of services, choose 2) Display Services Status.
Features in Cisco IMC Supervisor Release 1.0
The following features are available in Cisco IMC Supervisor, Release 1.0:
- Server-based Hardware Inventory
- Hardware Health Status Reporting
- KVM Access for Servers
- Firmware Inventory and Management
- E-mail Alerts for Critical Faults
- Support for High-level Power Management Tasks
Server-based Hardware Inventory
Cisco IMC Supervisor provides a detailed inventory of the rack mount servers that are managed. It includes the following information:
Hardware Health Status Reporting
Cisco IMC Supervisor included an effective fault reporting mechanism. For each rack-mount server, you can view a detailed a list of faults that have been recorded. Following information is displayed in the graphical user interface (GUI) for each fault:
KVM Access for Servers
With Cisco IMC Supervisor, you can launch the KVM console for rack-mount servers. The KVM console is an interface accessible from Cisco IMC Supervisor that emulates a direct keyboard, video, and mouse (KVM) connection to the server. The KVM console allows you to connect to the server from a remote location. Instead of using CD/DVD or floppy drives physically connected to the server, the KVM console uses virtual media, which are actual disk drives or disk image files that are mapped to virtual CD/DVD or floppy drives.
Firmware Inventory and Management
Cisco IMC Supervisor allows you to manage the firmware versions on the rack-mount servers. Effective firmware management for the rack mount servers involves the following:
You can configure a firmware upgrade profile for the servers that defines the download option for the firmware files. You can choose between downloading the.iso files from a specified HTTP server, or you can download it to a network path. When required, you can delete a firmware upgrade profile from Cisco IMC Supervisor.
You must specify a profile, and select the servers which need the firmware upgrade. When required, you can delete a firmware image from Cisco IMC Supervisor.
New and Changed Documentation
In addition to these Release Notes, the following Cisco IMC Supervisor documentation was created for Release 1.0 and later.
Caveats
This section includes the following topics:
Resolved Caveats in Release 1.0.0.1
Tip Release note information is sometimes updated after these Release Notes are published. Use the Cisco Bug Search Tool to see the most up-to-date release note information for any caveat listed here.
Resolved Caveats in Release 1.0.0.1
For a list of resolved caveats in Cisco IMC Supervisor, Release 1.0.0.1, login to the Cisco Bug Search Tool and complete the following:
Open Caveats in Release 1.0
Table 2 lists the open issues that may impact your testing of the features and enhancements in Cisco IMC Supervisor, Release 1.0.
KVM Console launch action from Inventory and Fault Status -> Rack Groups -> Rack Servers will fail to launch for M4 servers.
Cisco UCS M4 servers running firmware versions 2.0(3d) exhibit this behavior of not being able to launch KVM console.
Directly logging into the CIMC web UI will allow the KVM launch.
Firmware upgrade profiles that select "Local HTTP Server" option and require cisco.com accounts, will not be able to select M4 and E series images from cisco.com.
Firmware upgrade failure in a few of the cases shows the overall status message inappropriately as "STR" or "NULL--""
While mapping the customized user roles to the login users, the Role field is not displayed in the login users report page.
During the Firmware Configuration Profile Creation - Cisco username and password would be cached. Changing the existing configuration profile would always point to the cached username and password.
Create a new configuration profile. CSCur84900
Change of Locator LED status from OFF to ON or from ON to OFF will not reflect in the Summary page in Cisco IMC Supervisor right after the Locator LED operation.
Run the inventory for the Cisco IMC server from Cisco IMC Supervisor to get the right status of Locator LED.
New does not clear the existing data on Firmware/Discovery Configuration Profile.
Either clear the data on the form manually, or create a new configuration profile.
Sometimes, an Email alert is triggered with an empty list even though there is no critical fault generated.
Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments to ucs-director-docfeedback@cisco.com. We appreciate your feedback.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, see What’s New in Cisco Product Documentation at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html.
Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service.
This document is to be used in conjunction with the documents listed in the “Documentation Feedback” section.Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.