- Preface
- Introduction
- UCS Central Implementation: Approaches and Challenges
- Small Cisco UCS Central Environment
- Medium Cisco UCS Central Environment
- Large Cisco UCS Central Environment
- Sizing and Scaling Considerations
- Domain Groups
- Registration
- Migrating Brownfield to Greenfield
- Organization
- Understanding Policy Differences in Cisco UCS Manager and Cisco UCS Central
- Configuration
- Deploying Global VLANs and VSANs
- Pools
- Authentication
- Firmware Management
- Backup and Import
- High Availability
- General Best Practices
- UCS Central Internal Processes Defined
- UCS Central Communications - Required Ports
- Creating a Testing & Development Environment
- Online Resources
Small Cisco UCS Central Environment
Small Environments
![]() Note | Ensure that you do not unintentionally override the LDAP settings with a subdomain group policy. |
Small Greenfield Deployments
-
Creating and enforcing consistent operational policies
-
Achieving maximum global service profile mobility for all registered UCS domains
-
Ensuring the best possible implementation with the lowest possible administrative and operational overhead
Small Brownfield Deployments
When you register existing, deployed UCS domains with Cisco UCS Central, Cisco UCS Central presents you with options for architecting and operating. However, you may not have a compelling reason to change the existing local, logical configuration to global objects. You could keep the existing configuration intact, and build anything new as a global configuration. As older localized domains reach end-of-life and are retired, you can replace them with globalized UCS domains.
Conversely, if you need a global configuration, you can build an entire global configuration that mirrors the local configuration. Utilize future maintenance windows to gracefully power-down servers, remove existing local service profiles, and replace them with their global service profile counterparts. Plan for this scenario.
Make sure that you test in a lab before attempting to deploy in production. You can accomplish this by installing Cisco UCS Central in your lab, and then download, install, and register UCS emulators to the lab. This allows you to model the existing production configuration and test the migration process.
Domain Group Structure
For some of the UCS domains registered to UCS, a simple domain group structure is more than sufficient. The best way to analyze this is to look in . The displayed policies (local or global) are those operational policies that are defined in a Cisco UCS Central domain group, or subdomain group. As you survey the list, you can analyze and determine the best method for constructing your domain groups for your overall architecture. Every operational policy in the list is a policy that is set at the domain group level, or sublevel, within Cisco UCS Central. Therefore, you can control these policies globally, and create a valid hierarchy from root to discreet subdomain groups.
- Infrastructure and Catalog Firmware for Small Environments
- Time Zone Management for Small Environments
- Communication Services for Small Environments
- Backup and Export Policies for Small Environments
- Global Equipment Policies
Infrastructure and Catalog Firmware for Small Environments
Infrastructure and catalog firmware can affect your domain group hierarchy. If you choose global control, and someone modifies it, then it generates a user acknowledgement on all of the UCS domains (FIs) registered to that domain group. This prompts the upgrade of those UCS domains. While this is not disruptive, many users do not wish to acknowledge actions on a UCS domain unless they are immediately ready to upgrade. They also do not want to see it on more than a single UCS domain at a time. Therefore, exercise discretion and consider the following:
-
Place each UCS domain into its own subdomain group to segment it.
-
Define the domain group policy at the lowest-level subdomain group, so that only a single UCS domain is pending for acknowledgment or upgrade.
Another option is to define the operational policy as local within Cisco UCS Manager, and then change each domain to global when upgrading. This method leverages the benefits of Cisco UCS Central firmware download and control, but only affects a single UCS domain at a time. Also, you can configure all remaining operational policies singularly and higher in the hierarchy. This reduces the number of policies that you have to manage.

1 |
Datacenter. Global policies reside here |
2 |
Infrastructure and Catalog Firmware. Global policies could also reside here |
Time Zone Management for Small Environments
We recommend that you include this policy in Cisco UCS Central during registration. Place this policy high up in the domain group hierarchy, especially if the UCS domains are in the same time zone. Some clients point to the same NTP server source, but need different time zones configured for the respective UCS domains. In this case, you can use separate domain groups, or subdomain groups, to account for the changes. Regardless, allow Cisco UCS Central to define the proper time zone and NTP server settings to ensure consistency and accuracy for time and time zone in your architecture.
Communication Services for Small Environments
It is ideal to manage the following communication services with global policy management:
-
Communication services (for example, SNMP configuration)
-
Global fault policy
-
User management (for example, LDAP configuration)
-
DNS management
-
Monitoring (for example, Call Home and Syslog Configuration)
-
SEL policy
-
Power allocation policy (for example, manual blade or chassis cap)
-
Power policy (for example, N+1, or grid)
Global management allows you to set the policy correctly once in Cisco UCS Central. Then all of your registered UCS domains adopt that policy.
![]() Note | Cisco UCS Central manages the configuration of policies such as SNMP. The UCS domain sends the SNMP traps directly from the resource manager directly to the configured trap manager or destination. |
Backup and Export Policies for Small Environments
Cisco UCS Central helps in scheduling and maintaining proper backups for registered UCS domains. Administrators can create custom schedules so that UCS domain backups occur at a convenient date and time. This affords greater flexibility over what is natively available within Cisco UCS Manager.
Another distinction of backups managed by Cisco UCS Central is that you can use the Remote Copy offline feature. This ensures the safety of backup files by copying them from the local server and storing them on a remote server. The best practice is to create daily backups for each UCS domain.
Configure Cisco UCS Central to back up a UCS domain, and store those backup files in the remote database. You can define the number of backup files to keep (typically 3-5 copies), before subsequent backups overwrite them. This allows a mechanism to limit the amount of space used within the Cisco UCS Central database and disk, and prevents uncontrolled growth.