The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter includes the following sections:
Cisco UCS uses firmware obtained from and certified by Cisco to support the endpoints in a Cisco UCS instance. Each endpoint is a component in the instance that requires firmware to function. A Cisco UCS instance includes the following firmware endpoints that need to be upgraded when you upgrade the firmware:
Endpoints physically located on servers, such as the BIOS, storage controller (RAID controller), and Cisco Integrated Management Controller (CIMC)
Endpoints physically located on adapters, including NIC and HBA firmware, and Option ROM (where applicable)
I/O modules
Fabric interconnects
Cisco UCS Manager
Note |
In Release 1.3(1) the BMC was renamed to CIMC Controller. After you upgrade to this release, Cisco UCS Manager no longer uses the term BMC. Because this document is aimed at Release 1.3(1), the term CIMC is sometimes used rather than BMC. |
Cisco maintains a set of best practices for managing firmware images and updates in this document and in the following technical note: Unified Computing System Firmware Management Best Practices.
This document uses the following definitions for managing firmware:
Changes the firmware running on an endpoint to another image, such as a release or patch. Upgrade includes both update and activation.
Copies the firmware image to the backup partition on an endpoint.
Sets the firmware in the backup partition as the active firmware version on the endpoint. Activation can require or cause the reboot of an endpoint.
Cisco delivers all firmware updates or packages to Cisco UCS components in images. These images can be the following:
Component image, which contains the firmware for one component
Package, which is a collection of component images
Cisco also provides release notes with each image, which you can obtain from the same website from which you obtained the image.
Cisco UCS Manager provides mechanisms to download both component images and packages to the fabric interconnect.
Every firmware image has a header, which includes the following:
Cisco UCS Manager provides you with two views of the catalog of firmware images and their contents that have been downloaded to the fabric interconnect:
This view provides you with a read-only representation of the packages that have been downloaded onto the fabric interconnect. This view is sorted by image, not by the contents of the image. For packages, you can use this view to see which component images are (were) in each downloaded package.
The images view lists the component images available on the system. You cannot use this view to see packages. The information available about each component image includes the name of the component, the image size, the image version, and the vendor and model of the component.
You can use this view to identify the firmware updates available for each component. You can also use this view to delete obsolete and unneeded images. Cisco UCS Manager deletes a package after all images in the package have been deleted.
Tip |
Cisco UCS Manager stores the images in bootflash on the fabric interconnect. In a cluster system, space usage in bootflash on both fabric interconnects is the same, because all images are synchronized between them. If Cisco UCS Manager reports that the bootflash is out of space, delete obsolete images to free up space. |
Cisco UCS firmware is upgraded through a combination of the following methods:
Direct upgrade at the endpoints. For a cluster configuration with two fabric interconnects, a direct upgrade can be minimally disruptive to data traffic. However, it requires that the Cisco UCS instance does not include firmware policies for those endpoints that you upgrade directly. You cannot avoid disruption to traffic in a Cisco UCS instance with only one fabric interconnection.
Upgrades to server endpoints through service profiles that include a host firmware package, a management firmware package, or both. This method is disruptive to data traffic and should be performed during a maintenance window.
Note |
Direct upgrade is not available for all endpoints, including the server BIOS, storage controller, HBA firmware, and HBA option ROM. You must upgrade those endpoints through the host firmware package included in the service profile associated with the server. |
Before you upgrade the firmware for any endpoint in a Cisco UCS instance, consider the following guidelines and cautions:
Some endpoints, such as adapters and the server CIMC, can be upgraded through either a direct firmware upgrade or a firmware package included in a service profile. The configuration of a Cisco UCS instance determines how you upgrade these endpoints. If the service profiles associated with the servers include a host firmware package, upgrade the adapters for those servers through the firmware package. In the same way, if the service profiles associated with the servers include a management firmware package, upgrade the CIMC for those servers through the firmware package.
Upgrades of a CIMC through a management firmware package or an adapter through a firmware package in the service profile associated with the server take precedence over direct firmware upgrades. You cannot directly upgrade an endpoint if the service profile associated with the server includes a firmware package. To perform a direct upgrade, you must remove the firmware package from the service profile.
For a cluster configuration with two fabric interconnects, you can take advantage of the failover between the fabric interconnects and perform a direct firmware upgrade of the endpoints without disrupting data traffic. However, you cannot avoid disrupting data traffic for those endpoints which must be upgraded through a host or management firmware package.
For a standalone configuration with a single fabric interconnect, you can minimize the disruption to data traffic when you perform a direct firmware upgrade of the endpoints. However, you must reboot the fabric interconnect to complete the upgrade and, therefore, cannot avoid disrupting traffic.
If you use Cisco UCS Manager GUI to update the firmware, do not select ALL from the Filter drop-down list in the Activate Firmware dialog box to activate all endpoints simultaneously. Many firmware releases and patches have dependencies that require the endpoints to be activated in a specific order for the firmware update to succeed. This order can change depending upon the contents of the release or patch. Activating all endpoints does not guarantee that the updates occur in the required order and can disrupt communications between the endpoints and the fabric interconnects and Cisco UCS Manager. For information about the dependencies in a specific release or patch, see the release notes provided with that release or patch.
During a direct upgrade, you should configure Set Startup Version Only for an adapter. With this setting, the activated firmware moves into the pending-next-boot state, and the server is not immediately rebooted. The activated firmware does not become the running version of firmware on the adapter until the server is rebooted. You cannot configure Set Startup Version Only for an adapter in the host firmware package.
If a server is not associated with a service profile, the activated firmware moves into the pending-next-boot state. Cisco UCS Manager does not reboot the endpoints or activate the firmware until the server is associated with a service profile. If necessary, you can manually reboot an unassociated server to activate the firmware.
When you configure Set Startup Version Only for an I/O module, the I/O module is rebooted when the fabric interconnect in its data path is rebooted. If you do not configure Set Startup Version Only for an I/O module, the I/O module reboots and disrupts traffic. In addition, if Cisco UCS Manager detects a protocol and firmware version mismatch between it and the I/O module, Cisco UCS Manager automatically updates the I/O module with the firmware version that matches its own and then activates the firmware and reboots the I/O module again.
An upgrade from an earlier Cisco UCS firmware release to release 1.3(1i) or higher has the following impact on the Protect Configuration property of the local disk configuration policy the first time servers are associated with service profiles after the upgrade:
After you upgrade the Cisco UCS instance, the initial server association proceeds without configuration errors whether or not the local disk configuration policy matches the server hardware. Even if you enable the Protect Configuration property, Cisco UCS does not protect the user data on the server if there are configuration mismatches between the local disk configuration policy on the previous service profile and the policy in the new service profile.
Note |
If you enable the Protect Configuration property and the local disk configuration policy encounters mismatches between the previous service profile and the new service profile, all subsequent service profile associations with the server are blocked. |
Any servers that are already associated with service profiles do not reboot after the upgrade. Cisco UCS Manager does not report any configuration errors if there is a mismatch between the local disk configuration policy and the server hardware.
When a service profile is disassociated from a server and a new service profile associated, the setting for the Protect Configuration property in the new service profile takes precedence and overwrites the setting in the previous service profile.
The firmware on the Cisco UCS 82598KR-CI 10-Gigabit Ethernet Adapter (N20-AI0002) is burned into the hardware at manufacture. You cannot upgrade the firmware on this adapter.
The firmware versions on an endpoint depend upon the type of endpoint. The endpoints physically located on a fabric interconnect have different versions than those physically located on a server or I/O module.
Each CIMC, I/O module, and adapter has two slots for firmware in flash. Each slot holds a version of firmware. One slot is active and the other is the backup slot. A component boots from whichever slot is designated as active.
The following firmware version terminology is used in Cisco UCS Manager:
The running version is the firmware that is active and in use by the endpoint.
The startup version is the firmware that will be used when the endpoint next boots up. Cisco UCS Manager uses the activate operation to change the startup version.
The backup version is the firmware in the other slot and is not in use by the endpoint. This version can be firmware that you have updated to the endpoint but have not yet activated, or it can be an older firmware version that was replaced by a recent activate. Cisco UCS Manager uses the update operation to replace the image in the backup slot.
If the endpoint cannot boot from the startup version, it boots from the backup version.
You can only activate the fabric interconnect firmware and Cisco UCS Manager on the fabric interconnect. The fabric interconnect and Cisco UCS Manager firmware do not have backup versions, because all the images are stored on the fabric interconnect. As a result, the number of bootable fabric interconnect images is not limited to two, like the server CIMC and adapters. Instead, the number of bootable fabric interconnect images is limited by the available space in the memory of the fabric interconnect and the number of images stored there.
The fabric interconnect and Cisco UCS Manager firmware have running and startup versions of the kernel and system firmware. The kernel and system firmware must run the same versions of firmware.
If you follow the correct procedure and apply the upgrades in the correct order, a direct firmware upgrade and the activation of the new firmware version on the endpoints is minimally disruptive to traffic in a Cisco UCS instance.
You can directly upgrade the firmware on the following endpoints:
The adapter and board controller firmware can also be upgraded through the host firmware package in the service profile. If you use a host firmware package to upgrade this firmware, you can reduce the number of times a server needs to be rebooted during the firmware upgrade process.
Note |
Upgrades of a CIMC through a management firmware package or an adapter through a firmware package in the service profile associated with the server take precedence over direct firmware upgrades. You cannot directly upgrade an endpoint if the service profile associated with the server includes a firmware package. To perform a direct upgrade, you must remove the firmware package from the service profile. |
Cisco UCS Manager separates the direct upgrade process into two stages to ensure that you can push the firmware to an endpoint while the system is running without affecting uptime on the server or other endpoints.
During this stage, the system copies the selected firmware version from the primary fabric interconnect to the backup partition in the endpoint and verifies that the firmware image is not corrupt. The update process always overwrites the firmware in the backup slot.
The update stage applies only to the following endpoints:
You can set the update as Startup Version Only to avoid rebooting the endpoint immediately. This allows you to perform the update at any time and then activate and reboot during a maintenance period.
During this stage, the system sets the specified image version (normally the backup version) as the startup version and, if you do not specify Set Startup Version Only, immediately reboots the endpoint. When the endpoint is rebooted, the backup partition becomes the active partition, and the active partition becomes the backup partition. The firmware in the new active partition becomes the startup version and the running version.
The following endpoints only require activation because the specified firmware image already exists on the endpoint:
When the firmware is activated, the endpoint is rebooted and the new firmware becomes the active kernel version and system version. If the endpoint cannot boot from the startup firmware, it defaults to the backup version and raises a fault.
Caution |
When you configure Set Startup Version Only for an I/O module, the I/O module is rebooted when the fabric interconnect in its data path is rebooted. If you do not configure Set Startup Version Only for an I/O module, the I/O module reboots and disrupts traffic. In addition, if Cisco UCS Manager detects a protocol and firmware version mismatch between it and the I/O module, Cisco UCS Manager automatically updates the I/O module with the firmware version that matches its own and then activates the firmware and reboots the I/O module again. |
If you upgrade firmware by individual components in a Cisco UCS instance, we recommend that you activate the updates in the required order for quicker activation and to avoid potential issues with conflicting firmware versions.
Adapter (interface card)—If you plan to upgrade the adapters directly, perform this step first. However, if you prefer, you can omit this step and upgrade the adapters as part of the last step, in a host firmware package.
BMC—If you upgrade the adapters in the host firmware package, perform this step first.
I/O module.
Cisco UCS Manager.
Fabric interconnect.
Host firmware package—Must be the last step in the upgrade process. We recommend that you upgrade the board controller firmware during this step to avoid an addiitional reboot of the server. You must upgrade the BIOS and storage controller firmware in a host firmware package.
Adapter (interface card)—If you plan to upgrade the adapters directly, perform this step first. However, if you prefer, you can omit this step and upgrade the adapters as part of the last step, in a host firmware package.
BMC—If you upgrade the adapters in the host firmware package, perform this step first.
I/O module.
Fabric interconnect.
Cisco UCS Manager.
Host firmware package—Must be the last step in the upgrade process. We recommend that you upgrade the board controller firmware during this step to avoid an addiitional reboot of the server. You must upgrade the BIOS and storage controller firmware in a host firmware package.
When you perform a direct firmware upgrade on an endpoint, you can disrupt traffic or cause an outage in one or more of the endpoints in the Cisco UCS instance.
When you upgrade the firmware for a fabric interconnect, you cause the following outage impacts and disruptions:
A firmware upgrade to Cisco UCS Manager causes the following disruptions:
When you upgrade the firmware for an I/O module, you cause the following outage impacts and disruptions:
For a standalone configuration with a single fabric interconnect, data traffic is disrupted when the I/O module reboots. For a cluster configuration with two fabric interconnects, data traffic fails over to the other I/O module and the fabric interconnect in its data path.
If you activate the new firmware as the startup version only, the I/O module reboots when the corresponding fabric interconnect is rebooted
If you activate the new firmware as the running and startup version, the I/O module reboots immediately.
An I/O module can take up to ten minutes to become available after a firmware upgrade.
When you upgrade the firmware for a CIMC in a server, you impact only the CIMC and internal processes. You do not interrupt server traffic. This firmware upgrade causes the following outage impacts and disruptions to the CIMC:
If you activate the firmware for an adapter and do not configure the Set Startup Version Only option, you cause the following outage impacts and disruptions:
You can use service profiles to upgrade the server and adapter firmware, including the BIOS on the server, by defining the following policies and including them in the service profile associated with a server:
Note |
You cannot upgrade the firmware on an I/O module, fabric interconnect, or Cisco UCS Manager through service profiles. You must upgrade the firmware on those endpoints directly. |
This policy enables you to specify a set of firmware versions that make up the host firmware package (also known as the host firmware pack). The host firmware includes the following firmware for server and adapter endpoints:
Adapter Firmware Packages
Storage Controller Firmware Packages
Fibre Channel Adapters Firmware Packages
BIOS Firmware Packages
HBA Option ROM Packages
Board Controller Packages
Tip |
You can include more than one type of firmware in the same host firmware package. For example, a host firmware package can include both BIOS firmware and storage controller firmware or adapter firmware for two different models of adapters. However, you can only have one firmware version with the same type, vendor, and model number. The system recognizes which firmware version is required for an endpoint and ignores all other firmware versions. |
The firmware package is pushed to all servers associated with service profiles that include this policy.
This policy ensures that the host firmware is identical on all servers associated with service profiles which use the same policy. Therefore, if you move the service profile from one server to another, the firmware versions are maintained. Also, if you change the firmware version for an endpoint in the firmware package, new versions are applied to all the affected service profiles immediately, which could cause server reboots.
You must include this policy in a service profile, and that service profile must be associated with a server for it to take effect.
This policy is not dependent upon any other policies. However, you must ensure that the appropriate firmware has been downloaded to the fabric interconnect. If the firmware image is not available when Cisco UCS Manager is associating a server with a service profile, Cisco UCS Manager ignores the firmware upgrade and completes the association.
This policy enables you to specify a set of firmware versions that make up the management firmware package (also known as a management firmware pack). The management firmware package includes the Cisco Integrated Management Controller (CIMC) on the server. You do not need to use this package if you upgrade the CIMC directly.
The firmware package is pushed to all servers associated with service profiles that include this policy. This policy ensures that the CIMC firmware is identical on all servers associated with service profiles which use the same policy. Therefore, if you move the service profile from one server to another, the firmware versions are maintained.
You must include this policy in a service profile, and that service profile must be associated with a server for it to take effect.
This policy is not dependent upon any other policies. However, you must ensure that the appropriate firmware has been downloaded to the fabric interconnect.
You can use the host and management firmware package policies in service profiles to upgrade server and adapter firmware.
Caution |
If you modify a host firmware package by adding an endpoint or changing firmware versions for an existing endpoint, Cisco UCS Manager upgrades the endpoints and reboots all servers associated with that firmware package as soon as the changes are saved, disrupting data traffic to and from the servers. |
For a new service profile, this upgrade takes place over the following stages:
During this stage, you create the host and/or management firmware packages and include them in the appropriate firmware policies.
During this stage, you include the firmware packages in a service profile, and then associate the service profile with a server. The system pushes the selected firmware versions to the endpoints. For a host firmware package, the server is rebooted to ensure that the endpoints are running the versions specified in the firmware package.
If the service profile is already associated with a server, Cisco UCS Manager upgrades the firmware as soon as you save the changes to the host firmware packages. For a host firmware package, Cisco UCS Manager reboots the server as soon as the change is saved.
You downgrade firmware in a Cisco UCS instance in the same way that you upgrade firmware. The package or version that you select when you update the firmware determines whether you are performing an upgrade or a downgrade.
Completing the Prerequisites for Upgrading the Firmware
All endpoints in a Cisco UCS instance must be fully functional and all processes must be complete before you begin a firmware upgrade or downgrade on those endpoints. You cannot upgrade or downgrade an endpoint that is not in a functional state. For example, the firmware on a server that has not been discovered cannot be upgraded or downgraded. An incomplete process, such as an FSM that has failed after the maximum number of retries, can cause the upgrade or downgrade on an endpoint to fail. If an FSM is in progress, Cisco UCS Manager queues up the update and activation and runs them when the FSM has completed successfully.
Colored boxes around components on the Equipment tab may indicate that an endpoint on that component cannot be upgraded or downgraded. Verify the status of that component before you attempt to upgrade the endpoints.
Note |
The Installed Firmware tab in Cisco UCS Manager GUI does not provide sufficient information to complete these prerequisites. |
Before you upgrade or downgrade firmware in a Cisco UCS instance, complete the following prerequisites:
Back up the configuration into an All Configuration backup file.
For a cluster configuration, verify that the high availability status of the fabric interconnects shows that both are up and running.
For a standalone configuration, verify that the Overall Status of the fabric interconnect is Operable.
Verify that all servers, I/O modules, and adapters are fully functional. An inoperable server cannot be upgraded.
Verify that all servers have been discovered. They do not need to be powered on or associated with a service profile.
This procedure assumes that you do not have an existing backup operation for an All Configuration backup file.
Obtain the backup server IP address and authentication credentials.
The high availability status is the same for both fabric interconnects in a cluster configuration.
Step 1 | In the Navigation pane, click the Equipment tab. | ||||||
Step 2 | On the Equipment tab, expand . | ||||||
Step 3 | Click on the chassis for which you want to verify the status of the I/O modules. | ||||||
Step 4 | In the Work pane, click the IO Modules tab. | ||||||
Step 5 |
For each I/O module, verify that the following columns display the following values:
If the values are different, run a show tech-support command and contact Cisco Technical Support. Do not proceed with the firmware upgrade. |
||||||
Step 6 | Repeat Steps 3 through 5 to verify the status of the I/O modules in each chassis. |
If a server is inoperable, you can proceed with the upgrade for other servers in the Cisco UCS instance. However, you cannot upgrade the inoperable server.
Step 1 | In the Navigation pane, click the Equipment tab. | ||||||
Step 2 | On the Equipment tab, click Equipment. | ||||||
Step 3 | In the Work pane, click the Servers tab to display a list of all servers in all chassis. | ||||||
Step 4 |
For each server, verify that the following columns display the following values:
|
||||||
Step 5 |
If you need to verify that a server has been discovered, do the following:
|
Step 1 | In the Navigation pane, click the Equipment tab. | ||||||
Step 2 | On the Equipment tab, expand . | ||||||
Step 3 | Click the server for which you want to verify the status of the adapters. | ||||||
Step 4 | In the Work pane, click the Inventory tab. | ||||||
Step 5 | In the Inventory tab, click the Interface Cards subtab. | ||||||
Step 6 |
For each adapter, verify that the following columns display the following values:
If the fields show a different value and the adapter is inoperable, you can proceed with the upgrade for other adapters on the servers in the Cisco UCS instance. However, you cannot upgrade the inoperable adapter. |
Downloading and Managing Firmware Packages
Step 1 | In a web browser, navigate to http://www.cisco.com. |
Step 2 | Under Support, click Download Software. |
Step 3 | Click Unified Computing. |
Step 4 | Enter your Cisco.com username and password to log in. |
Step 5 |
Click Cisco Unified Computing System. If you prefer to download an image for a single component, expand the node for that component and click the link to the appropriate image. |
Step 6 | Click Unified Computing System (UCS) Complete Software Bundle. |
Step 7 |
Under the Latest Releases folder, click the link for the latest release of Cisco UCS. Images for earlier releases are archived under the All Releases link. |
Step 8 | Click the Release Notes link to download the latest version of the Release Notes. |
Step 9 | Click one of the following buttons and follow the instructions provided: |
Step 10 | Follow the prompts to complete your download of the image. |
Step 11 | Read the release notes before upgrading the Cisco UCS instance. |
Download the firmware image to the fabric interconnect.
You can use the same procedure to download a single firmware image to the fabric interconnect.
Note |
In a cluster setup, the firmware package is downloaded to both fabric interconnects, regardless of which fabric interconnect is used to initiate the download. Cisco UCS Manager maintains all packages and images in both fabric interconnects in sync. If one fabric interconnect is down, the download still finishes successfully. The images are synced to the other fabric interconnect when it comes back online. |
Obtain the firmware packages or images from Cisco.
Step 1 | In the Navigation pane, click the Equipment tab. | ||||||||||||||||||
Step 2 | Click the Equipment node. | ||||||||||||||||||
Step 3 | In the Work pane, click the Firmware Management tab. | ||||||||||||||||||
Step 4 | Click the Installed Firmware tab. | ||||||||||||||||||
Step 5 | Click Download Firmware. | ||||||||||||||||||
Step 6 |
In the Download Firmware dialog box, complete the following fields:
Cisco UCS Manager GUI begins downloading the firmware bundle to the fabric interconnect. |
||||||||||||||||||
Step 7 | Click OK. | ||||||||||||||||||
Step 8 |
(Optional) Monitor the status of the image download on the Download Tasks tab.
|
Update the firmware on the endpoints.
You can cancel an image download only while it is in progress. After the image has downloaded, deleting the download task does not delete the image that was downloaded.
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | Expand the Equipment node. |
Step 3 | In the Work pane, select the Firmware Management tab. |
Step 4 | On the Download Tasks tab, right-click the task you want to cancel and select Delete. |
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Admin tab, click the Equipment node. |
Step 3 | In the Work pane, click the Firmware Management tab. |
Step 4 | On the Packages subtab, click the + icon next to a package to view its contents. |
Step 5 | To take a snapshot of the package contents, do the following: |
If an image download fails, check whether the bootflash on the fabric interconnect or fabric interconnects in the Cisco UCS has sufficient available space.
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, expand . |
Step 3 | Click the fabric interconnect on which you want to check the available space. |
Step 4 | In the Work pane, click the General tab. |
Step 5 |
Expand the Local Storage Information area. When you download a firmware image bundle, a fabric interconnect needs at least twice as much available space as the size of the firmware image bundle. If the bootflash does not have sufficient space, delete the obsolete firmware, core files, and other unneeded objects from the fabric interconnect. |
Use this procedure if you want to delete only a single image from a package. If you prefer you can also delete the entire package.
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, click the Equipment node. |
Step 3 | In the Work pane, click the Firmware Management tab. |
Step 4 | On the Firmware Management tab, click the Packages tab. |
Step 5 |
In the table, click the package that you want to delete. You can use the Shift key or Ctrl key to select multiple entries. |
Step 6 | Right-click the highlighted package or packages and choose Delete. |
Step 7 | If Cisco UCS Manager GUI displays a confirmation dialog box, click Yes. |
Cisco UCS Manager deletes the selected package or packages and all images contained within each package.
Use this procedure if you want to delete only a single image from a package. If you prefer you can also delete the entire package.
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, click the Equipment node. |
Step 3 | In the Work pane, click the Firmware Management tab. |
Step 4 | On the Firmware Management tab, click the Images tab. |
Step 5 |
In the table, click the image that you want to delete. You can use the Shift key or Ctrl key to select multiple entries. |
Step 6 | Right-click the highlighted image or images and choose Delete. |
Step 7 | If Cisco UCS Manager GUI displays a confirmation dialog box, click Yes. |
Directly Updating Firmware at Endpoints
You can use this procedure to update the firmware on the following endpoints:
Caution |
Do not remove the hardware that contains the endpoint or perform any maintenance on it until the update process has completed. If the hardware is removed or otherwise unavailable due to maintenance, the firmware update fails. This failure may corrupt the backup partition. You cannot update the firmware on an endpoint with a corrupted backup partition. |
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, click the Equipment node. |
Step 3 | In the Work pane, click the Firmware Management tab. |
Step 4 |
On the Installed Firmware subtab, click Update Firmware. Cisco UCS Manager GUI opens the Update Firmware dialog box and verifies the firmware versions for all endpoints in the Cisco UCS instance. This step may take a few minutes, depending upon the number of chassis and servers. |
Step 5 |
In the Update Firmware dialog box, do the following:
Cisco UCS Manager copies the selected firmware image to the backup memory partition and verifies that the image is not corrupt. The image remains as the backup version until you explicitly activate it. Cisco UCS Manager begins all updates at the same time. However, some updates may complete at different times. The update is complete when the Update Firmware dialog box displays ready in the Update Status column for all updated endpoints. |
Step 6 |
(Optional)To monitor the progress of the update to a specific endpoint, right-click on the endpoint and choose Show Navigator. Cisco UCS Manager displays the progress in the Update Status area on the General tab. If the navigator has an FSM tab, you can also monitor the progress there. An entry in the Retry # field may not indicate that the update has failed. The retry count also includes retries that occur when Cisco UCS Manager retrieves the update status. |
Activate the firmware.
Caution |
Do not remove the hardware that contains the endpoint or perform any maintenance on it until the update process has completed. If the hardware is removed or otherwise unavailable due to maintenance, the firmware update fails. This failure may corrupt the backup partition. You cannot update the firmware on an endpoint with a corrupted backup partition. |
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, expand . |
Step 3 | Expand the node for the server which includes the adapter you want to update. |
Step 4 | Expand Interface Cards and select the interface card for the adapter you want to upgrade. |
Step 5 | In the General tab, click Update Firmware. |
Step 6 |
In the Update Firmware dialog box, do the following:
Cisco UCS Manager copies the selected firmware package to the backup memory slot, where it remains until you explicitly activate it. |
Step 7 |
(Optional) Monitor the status of the update in the Update Status area. The update process can take several minutes. Do not activate the firmware until the selected firmware package displays in the Backup Version field in the Firmware area of the General tab. |
Activate the firmware.
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, expand . |
Step 3 | Expand the node for the server that includes the adapter for which you want to activate the updated firmware. |
Step 4 | Expand Interface Cards and select the interface card for the adapter. |
Step 5 | In the General tab, click Activate Firmware. |
Step 6 |
In the Activate Firmware dialog box, do the following:
|
Caution |
Do not remove the hardware that contains the endpoint or perform any maintenance on it until the update process has completed. If the hardware is removed or otherwise unavailable due to maintenance, the firmware update fails. This failure may corrupt the backup partition. You cannot update the firmware on an endpoint with a corrupted backup partition. |
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, expand . |
Step 3 | Expand the node for the server for which you want to update the CIMC. |
Step 4 | In the General tab, click the Inventory tab. |
Step 5 | Click the CIMC tab. |
Step 6 | In the Actions area, click Update Firmware. |
Step 7 |
In the Update Firmware dialog box, do the following:
Cisco UCS Manager copies the selected firmware package to the backup memory slot, where it remains until you explicitly activate it. |
Step 8 |
(Optional) Monitor the status of the update in the Update Status area. The update process can take several minutes. Do not activate the firmware until the selected firmware package displays in the Backup Version field in the Firmware area of the General tab. |
Activate the firmware.
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, expand . |
Step 3 | Expand the node for the server that includes the CIMC for which you want to activate the updated firmware. |
Step 4 | On the General tab, click the Inventory tab. |
Step 5 | Click the CIMC tab. |
Step 6 | In the Actions area, click Activate Firmware. |
Step 7 |
In the Activate Firmware dialog box, do the following:
|
Caution |
Do not remove the hardware that contains the endpoint or perform any maintenance on it until the update process has completed. If the hardware is removed or otherwise unavailable due to maintenance, the firmware update fails. This failure may corrupt the backup partition. You cannot update the firmware on an endpoint with a corrupted backup partition. |
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, expand . |
Step 3 | Click the I/O module that you want to update. |
Step 4 | In the General tab, click Update Firmware. |
Step 5 |
In the Update Firmware dialog box, do the following:
Cisco UCS Manager copies the selected firmware package to the backup memory slot, where it remains until you explicitly activate it. |
Step 6 |
(Optional) Monitor the status of the update in the Update Status area. The update process can take several minutes. Do not activate the firmware until the selected firmware package displays in the Backup Version field in the Firmware area of the General tab. |
Activate the firmware.
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, expand . |
Step 3 | Select the IO Module node that includes the I/O module for which you want to activate the updated firmware. |
Step 4 | In the General tab, click Activate Firmware. |
Step 5 |
In the Activate Firmware dialog box, do the following:
|
Only certain servers, such as the Cisco UCS B440 High Performance blade server, have board controller firmware. The board controller firmware controls the algorithms for functions such as lighting the front panel LEDs on the server.
Note |
This activation procedure causes the server to reboot immediately. To reduce the number of times a server needs to be rebooted during the upgrade process, we recommend that you upgrade the board controller firmware through the host firmware package in the service profile. |
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, click the Equipment node. |
Step 3 | In the Work pane, click the Firmware Management tab. |
Step 4 |
On the Installed Firmware subtab, click Activate Firmware. Cisco UCS Manager GUI opens the Update Firmware dialog box and verifies the firmware versions for all endpoints in the Cisco UCS instance. This step may take a few minutes, depending upon the number of chassis and servers. |
Step 5 |
From the Filter drop-down list on the menu bar of the Activate Firmware dialog box, select Board Controller. Cisco UCS Manager GUI displays all servers that have board controllers in the Activate Firmware dialog box. |
Step 6 | From the drop-down list in the Startup Version column, select the version to which you want to update the software. |
Step 7 | If you want to activate the firmware regardless of any possible incompatibilities or currently executing tasks, check the Ignore Compatibility Check check box. |
Step 8 |
Click OK. Cisco UCS Manager disconnects all active sessions, logs out all users, and then activates the software. When the upgrade is complete, you are prompted to log back in. |
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, click the Equipment node. |
Step 3 | In the Work pane, click the Firmware Management tab. |
Step 4 |
On the Installed Firmware subtab, click Activate Firmware. Cisco UCS Manager GUI opens the Update Firmware dialog box and verifies the firmware versions for all endpoints in the Cisco UCS instance. This step may take a few minutes, depending upon the number of chassis and servers. |
Step 5 |
On the UCS Manager row of the Activate Firmware dialog box, do the following:
Cisco UCS Manager makes the selected version the startup version and schedules the activation to occur when the fabric interconnects are upgraded. |
Determine which fabric interconnect in the cluster is the subordinate fabric interconnect.
Step 1 | In the Navigation pane, click the Equipment tab. | ||||||
Step 2 | On the Equipment tab, click the Equipment node. | ||||||
Step 3 | In the Work pane, click the Firmware Management tab. | ||||||
Step 4 |
On the Installed Firmware subtab, click Activate Firmware. Cisco UCS Manager GUI opens the Update Firmware dialog box and verifies the firmware versions for all endpoints in the Cisco UCS instance. This step may take a few minutes, depending upon the number of chassis and servers. |
||||||
Step 5 | From the Filter drop-down list on the menu bar, choose Fabric Interconnects. | ||||||
Step 6 | On the menu bar, check the Ignore Compatibility Check check box. | ||||||
Step 7 | On the row of the Activate Firmware dialog box for the subordinate fabric interconnect, do the following: | ||||||
Step 8 |
Click Apply. Cisco UCS Manager updates and activates the firmware, and then reboots the fabric interconnect and any I/O module in the data path to that fabric interconnect, disrupting data traffic to and from that fabric interconnect. However, assuming the Cisco UCS instance is configured to permit traffic and port failover, data traffic fails over to the primary fabric interconnect and is not disrupted. |
||||||
Step 9 |
Verify the high availability status of the subordinate fabric interconnect. If the High Availability Status area for the fabric interconnect does not show the following values, contact Cisco Technical Support immediately. Do not continue to update the primary fabric interconnect.
|
If the high availability status of the subordinate fabric interconnect contains the required values, update and activate the primary fabric interconnect.
This procedure continues directly from Activating the Firmware on a Subordinate Fabric Interconnect and assumes you are on the Firmware Management tab.
Activate the subordinate fabric interconnect.
Step 1 |
On the Installed Firmware subtab, click Activate Firmware. Cisco UCS Manager GUI opens the Update Firmware dialog box and verifies the firmware versions for all endpoints in the Cisco UCS instance. This step may take a few minutes, depending upon the number of chassis and servers. |
||||||
Step 2 | From the Filter drop-down list on the menu bar, choose Fabric Interconnects. | ||||||
Step 3 | On the menu bar, check the Ignore Compatibility Check check box. | ||||||
Step 4 | On the row of the Activate Firmware dialog box for the subordinate fabric interconnect, do the following: | ||||||
Step 5 |
Click Apply. Cisco UCS Manager updates and activates the firmware, and then reboots the fabric interconnect and any I/O module in the data path to that fabric interconnect, disrupting data traffic to and from that fabric interconnect. However, assuming the Cisco UCS instance is configured to permit traffic and port failover, data traffic fails over to the other fabric interconnect, which becomes the primary. When it comes back up, this fabric interconnect is the subordinate fabric interconnect. |
||||||
Step 6 |
Verify the high availability status of the fabric interconnect. If the High Availability Status area for the fabric interconnect does not show the following values, contact Cisco Technical Support immediately.
|
For a standalone configuration with a single fabric interconnect, you can minimize the disruption to data traffic when you perform a direct firmware upgrade of the endpoints. However, you must reboot the fabric interconnect to complete the upgrade and, therefore, cannot avoid disrupting traffic.
Tip |
If you ever need to recover the password to the admin account that was created when you configured the fabric interconnects for the Cisco UCS instance, you must know the running kernel version and the running system version. If you do not plan to create additional accounts, we recommend that you save the path to these firmware versions in a text file so that you can access them if required. |
Step 1 | In the Navigation pane, click the Equipment tab. | ||||||||||
Step 2 | On the Equipment tab, click the Equipment node. | ||||||||||
Step 3 | Expand the Fabric Interconnects node and click the standalone fabric interconnect. | ||||||||||
Step 4 | On the General tab, click Activate Firmware. | ||||||||||
Step 5 |
In the Activate Firmware dialog box, complete the following fields:
|
||||||||||
Step 6 | Click OK. |
Cisco UCS Manager activates the firmware, and then reboots the fabric interconnect and any I/O module in the data path to that fabric interconnect. For a standalone fabric interconnect, this disrupts all data traffic in the Cisco UCS instance.
Updating Firmware through Service Profiles
This policy enables you to specify a set of firmware versions that make up the host firmware package (also known as the host firmware pack). The host firmware includes the following firmware for server and adapter endpoints:
Adapter Firmware Packages
Storage Controller Firmware Packages
Fibre Channel Adapters Firmware Packages
BIOS Firmware Packages
HBA Option ROM Packages
Board Controller Packages
Tip |
You can include more than one type of firmware in the same host firmware package. For example, a host firmware package can include both BIOS firmware and storage controller firmware or adapter firmware for two different models of adapters. However, you can only have one firmware version with the same type, vendor, and model number. The system recognizes which firmware version is required for an endpoint and ignores all other firmware versions. |
The firmware package is pushed to all servers associated with service profiles that include this policy.
This policy ensures that the host firmware is identical on all servers associated with service profiles which use the same policy. Therefore, if you move the service profile from one server to another, the firmware versions are maintained. Also, if you change the firmware version for an endpoint in the firmware package, new versions are applied to all the affected service profiles immediately, which could cause server reboots.
You must include this policy in a service profile, and that service profile must be associated with a server for it to take effect.
This policy is not dependent upon any other policies. However, you must ensure that the appropriate firmware has been downloaded to the fabric interconnect. If the firmware image is not available when Cisco UCS Manager is associating a server with a service profile, Cisco UCS Manager ignores the firmware upgrade and completes the association.
Ensure that the appropriate firmware has been downloaded to the fabric interconnect.
Step 1 | In the Navigation pane, click the Servers tab. | ||
Step 2 | On the Servers tab, expand . | ||
Step 3 |
Expand the node for the organization where you want to create the policy. If the system does not include multi-tenancy, expand the root node. |
||
Step 4 | Right-click Host Firmware Packages and select Create Package. | ||
Step 5 |
In the Create Host Firmware Package dialog box, enter a unique name and description for the package. This name can be between 1 and 16 alphanumeric characters. You cannot use spaces or any special characters, and you cannot change this name after the object has been saved. |
||
Step 6 |
Click the down arrows to expand one or more of the following sections on the left of the dialog box:
|
||
Step 7 |
In each section for the endpoint to which you want to include firmware in the package, do the following:
|
||
Step 8 | When you have added all the desired firmware to the package, click OK. |
Include the policy in a service profile and/or template.
If the policy is included in one or more service profiles associated with a server, Cisco UCS Manager updates and activates the firmware in the server and adapter with the new versions and reboots the server as soon as you save the host firmware package policy.
Ensure that the appropriate firmware has been downloaded to the fabric interconnect.
Step 1 | In the Navigation pane, click the Servers tab. |
Step 2 | On the Servers tab, expand . |
Step 3 |
Expand the node for the organization that includes the policy you want to update. If the system does not include multi-tenancy, expand the root node. |
Step 4 | Expand Host Firmware Packages and select the policy you want to update. |
Step 5 | In the table on the right, delete the existing entries for the firmware you want to update: |
Step 6 |
On the General tab, click the down arrows to expand one or more of the following sections on the left: |
Step 7 |
In each section for the endpoint to which you want to include firmware in the package:
|
Step 8 | Click Save Changes. |
This policy enables you to specify a set of firmware versions that make up the management firmware package (also known as a management firmware pack). The management firmware package includes the Cisco Integrated Management Controller (CIMC) on the server. You do not need to use this package if you upgrade the CIMC directly.
The firmware package is pushed to all servers associated with service profiles that include this policy. This policy ensures that the CIMC firmware is identical on all servers associated with service profiles which use the same policy. Therefore, if you move the service profile from one server to another, the firmware versions are maintained.
You must include this policy in a service profile, and that service profile must be associated with a server for it to take effect.
This policy is not dependent upon any other policies. However, you must ensure that the appropriate firmware has been downloaded to the fabric interconnect.
Ensure that the appropriate firmware has been downloaded to the fabric interconnect.
Step 1 | In the Navigation pane, click the Servers tab. |
Step 2 | On the Servers tab, expand . |
Step 3 |
Expand the node for the organization where you want to create the policy. If the system does not include multi-tenancy, expand the root node. |
Step 4 | Right-click Management Firmware Packages and select Create Package. |
Step 5 |
In the Create Management Firmware Package dialog box, enter a unique name and description for the package. This name can be between 1 and 16 alphanumeric characters. You cannot use spaces or any special characters, and you cannot change this name after the object has been saved. |
Step 6 |
In the CIMC Firmware Packages section on the left of the dialog box, do the following:
|
Step 7 | If you need to include CIMC firmware for servers with different model numbers (PIDs) in this management firmware package, repeat Step 6. |
Step 8 | When you have added the desired firmware to the package, click OK. |
Include the policy in a service profile and/or template.
If the policy is included in a one or more service profiles associated with a server, as soon as you save the management firmware package policy, Cisco UCS Manager updates and activates the CIMC firmware in the server with the new version.
Ensure that the appropriate firmware has been downloaded to the fabric interconnect.
Step 1 | In the Navigation pane, click the Servers tab. |
Step 2 | On the Servers tab, expand . |
Step 3 |
Expand the node for the organization that includes the policy you want to update. If the system does not include multi-tenancy, expand the root node. |
Step 4 | Expand Management Firmware Packages and select the policy you want to update. |
Step 5 | In the table on the right, delete the existing entry for the firmware you want to update: |
Step 6 |
In the CIMC Firmware Packages section on the left:
|
Step 7 | If you need to include CIMC firmware for servers with different model numbers (PIDs) in this management firmware package, repeat Step 6. |
Step 8 |
Click Save Changes. Cisco UCS Manager verifies the model numbers and vendor against all servers associated with service profiles that include this policy. If the model numbers and vendor match a firmware version in the policy, Cisco UCS Manager updates the firmware. |
If the service profile is associated with a server, Cisco UCS Manager updates and activates the firmware in the server with the new versions and reboots the server as soon as you save the changes to the service profile.
Step 1 | In the Navigation pane, click the Servers tab. |
Step 2 | On the Servers tab, expand . |
Step 3 |
Expand the node for the organization that includes the service profile that you want to update. If the system does not include multi-tenancy, expand the root node. |
Step 4 | Click the service profile to which you want to add the firmware packages. |
Step 5 | In the Work pane, click the Policies tab. |
Step 6 | Click the down arrows to expand the Firmware Policies section. |
Step 7 | To add a host firmware package, select the desired policy from the Host Firmware drop-down list. |
Step 8 | To add a management firmware package, select the desired policy from the Management Firmware drop-down list. |
Step 9 | Click Save Changes. |
Step 1 | In the Navigation pane, click the Equipment tab. |
Step 2 | On the Equipment tab, click the Equipment node. |
Step 3 | In the Work pane, click the Firmware Management tab. |
Step 4 | On the Installed Firmware tab, review the firmware versions listed for each component. |
Managing the Capability Catalog
The capability catalog is a set of tunable parameters, strings, and rules. Cisco UCS Manager uses the catalog to update the display and configurability of components such as newly qualified DIMMs and disk drives for servers.
The catalog is divided by hardware components, such as the chassis, CPU, local disk, and I/O module. You can use the catalog to view the list of providers available for that component. There is one provider per hardware component. Each provider is identified by the vendor, model (PID), and revision. For each provider, you can also view details of the equipment manufacture and the form factor.
The contents of the capability catalog include the following:
Each Cisco UCS Manager release contains a baseline catalog. When appropriate, Cisco releases an update to the capability catalog and makes it available on the same site where you download firmware images. The catalog update is compatible with Cisco UCS, Release 1.3(1) and above.
As soon as you download a capability catalog update, Cisco UCS Manager immediately updates to the new baseline catalog. You do not have to perform any further tasks. Updates to the capability catalog do not require you to reboot any component in the Cisco UCS instance, or reinstall Cisco UCS Manager.
Step 1 | In a web browser, navigate to http://www.cisco.com. |
Step 2 | Under Support, click Download Software. |
Step 3 | Click Unified Computing. |
Step 4 | Enter your Cisco.com username and password to log in. |
Step 5 | Click Cisco Unified Computing System. |
Step 6 | Click Unified Computing System (UCS) Manager Capability Catalog. |
Step 7 |
Under the Latest Releases folder, click the link for the latest release of the capability catalog. Images for earlier releases are archived under the All Releases link. |
Step 8 | Click one of the following buttons and follow the instructions provided: |
Step 9 | Follow the prompts to complete your download of the catalog update. |
Update the capability catalog.
You cannot perform a partial update to the capability catalog. When you update the capability catalog, all components included in the catalog image are updated.
Obtain the capability catalog update from Cisco.com.
Step 1 | In the Navigation pane, click the Admin tab. | ||||||||||||||
Step 2 | On the Admin tab, expand All. | ||||||||||||||
Step 3 | Click the Capability Catalog node. | ||||||||||||||
Step 4 | In the Work pane, click the Catalog Update Tasks tab. | ||||||||||||||
Step 5 | Click Update Catalog. | ||||||||||||||
Step 6 |
In the Update Catalog dialog box, complete the following fields:
|
||||||||||||||
Step 7 | Click OK. |
Cisco UCS Manager downloads the image and immediately updates the capability catalog. You do not need to reboot any hardware components or perform any other tasks for the update to take effect.
Step 1 | In the Navigation pane, click the Admin tab. |
Step 2 | On the Admin tab, expand All. |
Step 3 | Click the Capability Catalog node. |
Step 4 |
In the Work pane, click the Catalog Update Tasks tab. The current version of the capability catalog is located on the upper right of that tab. |
Step 5 |
On Cisco.com, determine the latest release of the capability catalog available. For more information about the location of capability catalog updates, see Obtaining Capability Catalog Updates from Cisco. |
Step 6 | If a more recent version of the capability catalog is available on Cisco.com, update the capability catalog with that version. |
Step 1 | In the Navigation pane, click the Admin tab. |
Step 2 | On the Admin tab, expand . |
Step 3 | In the Work pane, click the tab for the provider you want to view. |
Step 4 |
To view the details of a provider, do the following:
|