Working with Cisco UCS Manager

Cisco UCS Domains and Cisco UCS Central

Cisco UCS Central provides centralized management capabilities to multiple Cisco UCS domains across one or more data centers. Cisco UCS Central works with Cisco UCS Manager to provide a scalable management solution for a growing Cisco UCS environment.

Cisco UCS Central does not reduce or change any local management capabilities of Cisco UCS Manager, such as its API. This allows you to continue using Cisco UCS Manager the same way you did before Cisco UCS Central. This also allows all existing third party integrations to continue to operate without change.

Registering Cisco UCS Domains

You can use a Fully Qualified Domain Name (FQDN) or IP address to register Cisco UCS domains in Cisco UCS Central.

To manage Cisco UCS Manager through Cisco UCS Central, you must register the Cisco UCS domains in Cisco UCS Central. You can register a Cisco UCS domain as a part of a domain group or as an ungrouped domain. When you have a domain group, all registered domains in the domain group can share common policies and other configurations.


Note

During the initial registration process with Cisco UCS Central, all of the active Cisco UCS Manager GUI sessions are terminated.


Before registering a domain in Cisco UCS Central, do the following:

  • Configure an NTP server and the correct time zone in both Cisco UCS Manager and Cisco UCS Central to ensure that they are in sync. If the time and date in the Cisco UCS domain and Cisco UCS Central are out of sync, the registration might fail.

  • Obtain the hostname or IP address of Cisco UCS Central. You cannot use the same hostname for both Cisco UCS Central and Cisco UCS Manager. For standalone mode, use individual VM IP address.

  • Obtain the shared secret that you configured when you deployed Cisco UCS Central.


Note

  • Cisco recommends that you always register Cisco UCS domains using Cisco UCS Central's Fully Qualified Domain Name (FQDN). If domains are registered with FQDN, any change in the Cisco UCS Central IP address is transparent to the domain.

  • If Cisco UCS Central is deployed on RHEL 7.2 KVM, the first time you register a Cisco UCS domain, you must regenerate the certificate using the set regenerate yes command.

  • If the registered Cisco UCS domains have a latency of greater than 300ms for a round trip from Cisco UCS Central, there might be some performance implications for the Cisco UCS domains.

  • When you unregister a Cisco UCS domain from Cisco UCS Central the global service profiles become local service profiles in Cisco UCS Manager.

    For more information about Changing Cisco UCS Central's IP address, see Changing Cisco UCS Central IP Address.



Warning

You must upgrade to Cisco UCS Manager Release 2.1(2) or greater before registering with Cisco UCS Central. If you try to register earlier versions of Cisco UCS Manager, the registration will fail.


Registering a Cisco UCS Domain with the CLI

You can register a Cisco UCS Manager domain to any Cisco UCS Central system. However you can only register the Cisco UCS Manager domain to one Cisco UCS Central system at a time.

Procedure

  Command or Action Purpose
Step 1

UCSC# connect resource-mgr

Enters resource manager mode.

Step 2

UCSC(resource-mgr) # scope system

Enters into the system.

Step 3

UCSC(resource-mgr) /system # create policy-control-ep UCSM domain IP address admin

Creates a policy control for the UCSM domain.
Note 

You must be logged in as an admin to register a domain.

Step 4

UCSC(resource-mgr) /system # Domain Admin Password: password

Specifies the password.
Step 5

UCSC(resource-mgr) /system/policy-control-ep # set srcaddrfmt ipv4 { hostname | ipv4 | ipv6 }

Sets the address format for the domain.

Step 6

UCSC(resource-mgr) /system/policy-control-ep # commit-buffer

Commits the transaction to the system and registers the Cisco UCS Manager domain to Cisco UCS Central.

Step 7

UCSC(resource-mgr) /system/policy-control-ep # show detail

Displays the status of the Cisco UCS Manager domain.

Example

The following example shows how to register a Cisco UCS Manager domain with Cisco UCS Central:

UCSC# connect resource-mgr
UCSC(resource-mgr)# scope system
UCSC(resource-mgr) /system # create policy-control-ep 10.193.01.01 admin
UCSC(resource-mgr) /system #  Domain Admin Password: 
UCSC(resource-mgr) /system/policy-control-ep* #
UCSC(resource-mgr) /system/policy-control-ep # set srcaddrfmt ipv4
UCSC(resource-mgr) /system/policy-control-ep # commit-buffer
UCSC(resource-mgr) /system/policy-control-ep # show detail
hostname or ip address: 10.193.190.130
Registration Status: Registered
Cleanup Mode: Localize Global
Current Task:
 

Unregistering a Cisco UCS Domain with the CLI


Caution

If you want to unregister any registered Cisco UCS domain in a production system, contact Cisco Technical Support.


When you unregister a Cisco UCS domain from Cisco UCS Central:

  • You can no longer manage the service profiles, policies and other configuration for the Cisco UCS Domain from Cisco UCS Central

  • All global service profiles and policies become local and continue to operate as local entities. When you re-register the domain, the service profiles and polices still remain local.

Procedure

  Command or Action Purpose
Step 1

UCSC# connect resource-mgr

Enters resource manager mode.

Step 2

UCSC(resource-mgr) # scope system

Enters into the system.

Step 3

UCSC(resource-mgr) /system # scope policy-control-ep UCSM domain IP address

Creates a policy control for the UCSM domain.

Step 4

UCSC(resource-mgr) /system/policy-control-ep # set actionevent unregister

Prepares to unregister the domain.

Step 5

UCSC(resource-mgr) /system/policy-control-ep # commit-buffer

Commits the transaction to the system and unregisters the Cisco UCS Manager domain from Cisco UCS Central.

Example

The following example shows how to unregister a Cisco UCS Manager domain with Cisco UCS Central:

UCSC# connect resource-mgr
UCSC(resource-mgr)# scope system
UCSC(resource-mgr) /system # scope policy-control-ep 10.193.01.01 admin
UCSC(resource-mgr) /system/policy-control-ep # set actionevent unregister
UCSC(resource-mgr) /system/policy-control-ep # commit-buffer
UCSC(resource-mgr) /system/policy-control-ep # show detail
hostname or ip address: 10.193.190.130
Registration Status: Failed
Cleanup Mode: Localize Global
Current Task:
 

Domains and Domain Groups

When you register a Cisco UCS Manager instance in Cisco UCS Central, that instance becomes an ungrouped domain in Cisco UCS Central. You must assign this domain to a domain group to start managing this domain using global policies in Cisco UCS Central.

Cisco UCS Central creates a hierarchy of Cisco UCS domain groups for managing multiple Cisco UCS domains.

  • Domain Group— A group that contains multiple Cisco UCS domains. You can group similar Cisco UCS domains under one domain group for simpler management.

  • Ungrouped Domains—When a new Cisco UCS domain is registered in Cisco UCS Central, it is added to the ungrouped domains. You can assign the ungrouped domain to any domain group.

If you have created a domain group policy, and a new registered Cisco UCS domain meets the qualifiers defined in the policy, it is automatically be placed under the domain group specified in the policy. If not, it is placed in the ungrouped domains category until the domain group is assigned to a domain group.

You can only assign each Cisco UCS domain to one domain group. You can assign or reassign membership of the Cisco UCS domains at any time. When you assign a Cisco UCS domain to a domain group, the Cisco UCS domain automatically inherits all management policies specified for the domain group.

Before adding a Cisco UCS domain to a domain group, make sure to change the policy resolution controls to local in the Cisco UCS domain. This avoids accidentally overwriting service profiles and maintenance policies specific to that Cisco UCS domain. Even when you have enabled auto discovery for the Cisco UCS domains, enabling local policy resolution protects the Cisco UCS domain from accidentally overwriting policies.

Creating a Domain Group

Procedure

  Command or Action Purpose
Step 1

UCSC# connect policy-mgr

Enters policy manager mode.

Step 2

UCSC(policy-mgr)# scope domain-group

Enters the domain group root mode.

Step 3

UCSC(policy-mgr) /domain-group # create domain-group 12

Creates the specified domain group.

Step 4

UCSC(policy-mgr) /domain-group* # commit-buffer

Commits the transaction to the system.

Example

The following example shows how to create a domain group:

UCSC# connect policy-mgr
UCSC(policy-mgr)# scope domain-group
UCSC(policy-mgr) /domain-group # create domain-group 12
UCSC(policy-mgr) /domain-group* # commit-buffer
UCSC(policy-mgr) /domain-group # 

Deleting a Domain Group

Procedure

  Command or Action Purpose
Step 1

UCSC# connect policy-mgr

Enters policy manager mode.

Step 2

UCSC(policy-mgr)# scope domain-group

Enters the domain group root mode.

Step 3

UCSC(policy-mgr) /domain-group # delete domain-group 12

Deletes the specified domain group.

Step 4

UCSC(policy-mgr) /domain-group* # commit-buffer

Commits the transaction to the system.

Example

The following example shows how to delete a domain group:

UCSC# connect policy-mgr
UCSC(policy-mgr)# scope domain-group
UCSC(policy-mgr) /domain-group # delete domain-group 12
UCSC(policy-mgr) /domain-group* # commit-buffer
UCSC(policy-mgr) /domain-group # 

Assigning a Domain Group Membership

Procedure

  Command or Action Purpose
Step 1

UCSC# connect resource-mgr

Enters resource manager mode.

Step 2

UCSC(resource-mgr) # scope domain-mgmt

Enters the UCS domains.

Step 3

UCSC(resource-mgr) /domain-mgmt # show ucs-membership IP Address

Displays the membership information for the registered domains.

Step 4

UCSC(resource-mgr) /domain-mgmt # scope ucs-membership IP Address

Enters the Cisco UCS domain specified in the IP address.

Step 5

UCSC(resource-mgr) /domain-mgmt/ucs-membership # set domain-group  Domain Group Name

Specifies the domain group for the IP address.

Step 6

UCSC(resource-mgr) /domain-mgmt/ucs-membership # commit-buffer

Commits the transaction to the system.

Example

The following example shows how to assign membership to a Cisco UCS domain:

UCSC# connect resource-mgr
UCSC(resource-mgr)# scope domain-mgmt
UCSC(resource-mgr) /domain-mgmt # show ucs-membership 
UCS-Domain Group Membership:
   Mgmt IP         Qualification Type Domain Group DN
   --------------- ------------------ ---------------
   10.193.01.01    Manual             domaingroup-root 
UCSC(resource-mgr) /domain-mgmt # scope ucs-membership 10.193.01.01
UCSC(resource-mgr) /domain-mgmt/ucs-membership # set domain-group DG-test 
UCSC(resource-mgr) /domain-mgmt/ucs-membership # 

Domain Group Qualification Policy

Domain group qualification policy enables you to automatically place new Cisco UCS domains under domain groups. You can create qualifiers based on Owner, Site and IP Address of various Cisco UCS domains based on your management requirements. When you register a new Cisco UCS domain, Cisco UCS Central analyses the domain based on the pre defined qualifiers in the domain group qualification policy and places the domain under a specific domain group for management.

Creating a Domain Group Policy

Procedure

  Command or Action Purpose
Step 1

UCSC# connect policy-mgr

Enters policy manager mode.

Step 2

UCSC(policy-mgr) # scope org org-name

Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name .

Step 3

UCSC(policy-mgr) /org # create domain-group-policy domain-group-name

Creates domain group under selected domain group.

Step 4

UCSC(policy-mgr) /org/domain-group-policy # set qualifier qualifier

(Optional)

Specifies domain group to use for qualifying the domain group.

Step 5

UCSC(policy-mgr) /org//domain-group-policy # commit-buffer

Commits the transaction to the system configuration.

Example

This following example shows how to create a qualifier:

UCSC# connect policy-mgr
UCSC(policy-mgr) # scope org
UCSC(policy-mgr) /org # create domain-group-policy dm-gsp1
UCSC(policy-mgr) /org/domain-group-policy* # set qualifier DMGroup1
UCSC(policy-mgr) /org/domain-group-policy* # commit-buffer
UCSC(policy-mgr) /org/domain-group-policy #

Deleting a Domain Group Policy

Procedure

  Command or Action Purpose
Step 1

UCSC# connect policy-mgr

Enters policy manager mode.

Step 2

UCSC(policy-mgr) # scope org org-name

Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name .

Step 3

UCSC(policy-mgr) /org # delete domain-group domain-group-name

Deletes the specified domain group.

Step 4

UCSC(policy-mgr) /org* #commit-buffer

Commits the transaction to the system configuration.

Example

The following example shows how to delete a domain group called dm-gsp1, and commits the transaction to the system:

UCSC# connect policy-mgr
UCSC(policy-mgr) # scope org 
UCSC(policy-mgr) /org # delete domain-group dm-gsp1
UCSC(policy-mgr) /org* # commit-buffer
UCSC(policy-mgr) /org #

Creating a Registration Policy

Procedure

  Command or Action Purpose
Step 1

UCSC# connect policy-mgr

Enters policy manager mode.

Step 2

UCSC(policy-mgr) # scope org org-name

Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name .

Step 3

UCSC(policy-mgr) /org # create registration-policy policy-name

Creates a registration policy.

Step 4

UCSC(policy-mgr) /org/registration-policy # set descr description

Provides a description for the registration policy.

Note 
If your description includes spaces, special characters, or punctuation, you must begin and end your description with quotation marks. The quotation mark will not appear in the description field of any show command output.
Step 5

UCSC(policy-mgr) /org/registration-policy # create address-qual minimum-ip-address maximum-ip-address

Creates an address qualifier for the registration policy.

Step 6

UCSC(policy-mgr) /org/registration-policy # create owner-qual

Creates an owner qualifier for the registration policy.

Step 7

UCSC(policy-mgr) /org/registration-policy # create site-qual

Creates a site qualifier for the registration policy.

Step 8

UCSC(policy-mgr) /org/registration-policy # commit-buffer

Commits the transaction to the system configuration.

Example

The following example shows how to create a registration policy:

UCSC# connect policy-mgr
UCSC(policy-mgr) # scope org /
UCSC(policy-mgr)/org # create registration-policy RegPol1
UCSC(policy-mgr)/org/registration-policy* # create address-qual 0.0.0.0 1.1.1.1
UCSC(policy-mgr)/org/registration-policy/address-qual* # exit
UCSC(policy-mgr)/org/registration-policy* # create owner-qual TestOwner
UCSC(policy-mgr)/org/registration-policy/owner-qual* # exit
UCSC(policy-mgr)/org/registration-policy* # create site-qual TestSite
UCSC(policy-mgr)/org/registration-policy/site-qual* # commit-buffer
UCSC(policy-mgr)/org/registration-policy/site-qual #

Policies in Cisco UCS Central and Cisco UCS Domains

You can create and manage global policies in Cisco UCS Central and include them in service profiles or service profile templates for one or more Cisco UCS domains. The service profiles and service profile templates that include global policies can be either of the following:

  • Local service profiles or service profile templates that are created and managed by Cisco UCS Manager in one Cisco UCS domain. You can only associate local service profiles with servers in that domain. When you include a global policy in a local service profile, Cisco UCS Manager makes a local read-only copy of that policy.

  • Global service profiles or service profile templates that are created and managed by Cisco UCS Central. You can associate global service profiles with servers in one or more registered Cisco UCS domains.

You can only make changes to global policies in Cisco UCS Central. Those changes affect all service profiles and service profile templates that include the global policy. All global policies are read-only in Cisco UCS Manager.

You can configure all operational policies under a domain group using IPv6 addresses. These policies are located in the Operations Management tab of the Cisco UCS Central GUI.

This feature helps the Cisco UCS Manager to use an IPv6 address while importing these policies from Cisco UCS Central.

Policy Resolution between Cisco UCS Manager and Cisco UCS Central

Policy Resolution Control

For each Cisco UCS domain that you register with Cisco UCS Central, you can choose which application will manage certain policies and configuration settings. This policy resolution does not have to be the same for every Cisco UCS domain that you register with the same Cisco UCS Central.

You have the following options for resolving these policies and configuration settings:

  • Local—The policy or configuration is determined and managed by Cisco UCS Manager.

  • Global—The policy or configuration is determined and managed by Cisco UCS Central.

The following table contains a list of the policies and configuration settings that you can choose to have managed by either Cisco UCS Manager or Cisco UCS Central:


Note

The policy resolution options in Cisco UCS Central are not supported on all versions of Cisco UCS Manager. If your Cisco UCS Manager version is earlier than the earliest supported release, the policy resolution screen may display the value as global even if it is not applicable.


In a case where you choose certain policies to be resolved locally using the Policy Resolution Control feature in Cisco UCS Central, or when a Cisco UCS Domain is unregistered from Cisco UCS Central, the global settings/unnamed policies (such as QoS Settings, Discovery policies) stay as previously configured. You must manually change the policy details to the desired state.


Caution

Unregistering a Cisco UCS Domain has serious implications. You must not unregister the Cisco UCS Domain unless you choose to permanently not manage it from Cisco UCS Central.
Name

Earliest Supported Release

Description

Infrastructure & Catalog Firmware

2.1(2)

Determines whether the Capability Catalog and infrastructure firmware policy are defined locally in Cisco UCS Manager or come from Cisco UCS Central.

Time Zone Management

2.1(2)

Determines whether the time zone and NTP server settings are defined locally in Cisco UCS Manager or comes from Cisco UCS Central.

Communication Services

2.1(2)

Determines whether HTTP, CIM XML, Telnet, SNMP, web session limits, and Management Interfaces Monitoring Policy settings are defined locally in Cisco UCS Manager or in Cisco UCS Central.

Global Fault Policy

2.1(2)

Determines whether the Global Fault Policy is defined locally in Cisco UCS Manager or in Cisco UCS Central.

User Management

2.1(2)

Determines whether authentication and native domains, LDAP, RADIUS, TACACS+, trusted points, locales, and user roles are defined locally in Cisco UCS Manager or in Cisco UCS Central.

DNS Management

2.1(2)

Determines whether DNS servers are defined locally in Cisco UCS Manager or in Cisco UCS Central.

Backup & Export Policies

2.1(2)

Determines whether the Full State Backup Policy and All Configuration Export Policy are defined locally in Cisco UCS Manager or in Cisco UCS Central.

Monitoring

2.1(2)

Determines whether Call Home, Syslog, and TFTP Core Exporter settings are defined locally in Cisco UCS Manager or in Cisco UCS Central.

SEL Policy

2.1(2)

Determines whether the SEL Policy is defined locally in Cisco UCS Manager or in Cisco UCS Central.

Power Allocation Policy

2.1(2)

Determines whether the Power Allocation Policy is defined locally in Cisco UCS Manager or in Cisco UCS Central.

Power Policy

2.1(2)

Determines whether the Power Policy is defined locally in Cisco UCS Manager or in Cisco UCS Central.

Equipment Policy

2.2(7)

Determines whether the Equipment Policy is defined locally in Cisco UCS Manager or in Cisco UCS Central.

Port Configuration

2.2(7)

Determines whether port configuration is defined locally in Cisco UCS Manager or in Cisco UCS Central.

Quality of Service (QoS) Configuration

2.2(7)

Determines whether QoS configuration is defined locally in Cisco UCS Manager or in Cisco UCS Central.

Policies

To assign a policy or a Management IP pool/policy to a domain profile, click on the policy and then click on the drop-down list to select the policy you want to assign to a profile. You can assign the following policies to a domain:

  • QoS System Class - Defines a configurable set of system classes that you can include in a QoS Policy.

  • Port Auto-Discovery Policy- Determines whether Server Port Auto-Discovery enabled or disabled in Cisco UCS Central.

  • Hardware Change Discovery Policy- Determines if a hardware replacement deep discovery is triggered automatically, or after user acknowledgement from Cisco UCS Central.

  • KMIP Certification Policy - KMIP Certification Policy enables using Self-Encrypting Drives (SEDs) through key management servers. This policy aims to generate a certificate that will be used by CIMC to communicate with KMIP server to get the key. You can configure this policy to a domain if it is created in a global scope.

Management IP

You can assign the following pools/policies from the Management IP pool:
  • Inband Policy - Policy to configure the Inband IP address on a server directly, or through an Inband policy.

  • Outband Pool - Sets the Management IP Pool created for Outband network management.


Note

The Management IP tab in the Domain Configuration Settings window is enabled only when the registered Cisco UCS Domain is Cisco UCS Manager 3.1(3) and later. For all earlier Cisco UCS Manager releases, the Management IP tab is hidden.


Consequences of Policy Resolution Changes

When you register a Cisco UCS domain, you configure policies for local or global resolution. The behavior that occurs when the Cisco UCS domain is registered or when that registration or configuration changes, depends upon several factors, including whether a domain group has been assigned or not.

The following table describes the policy resolution behavior you can expect for each type of policy.

Policies and Configuration Policy Source Behavior in Cisco UCS Manager on Registration with Cisco UCS Central Behavior in Cisco UCS Manager when Registration Changed
Cisco UCS Central Cisco UCS Manager

Domain Group Unassigned

Domain Group Assigned

Unassigned from Domain Group

Deregistered from Cisco UCS Central

Call Home

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

SNMP configuration

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

HTTP

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Telnet

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

CIM XML

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Management interfaces monitoring policy

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Power allocation policy

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Power policy (also known as the PSU policy)

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

SEL policy

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Authentication Domains

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

LDAP

Domain group root

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

LDAP provider groups and group maps

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

TACACS, including provider groups

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

RADIUS, including provider groups

N/A

Cisco UCS Manager only

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

SSH (Read-only)

Domain group root

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

DNS

Domain group root

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Time zone

Domain group root

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Web Sessions

Domain group root

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Fault

Domain group root

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Core Export

Domain group root

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Syslog

Domain group root

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Global Backup/Export Policy

Domain group root

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Default Authentication

Domain group root

Assigned domain group

Local

Local/Remote

Retains last known policy state

Converted to a local policy

Console Authentication

Domain group root

Assigned domain group

Local

Can be local or remote

Retains last known policy state

Converted to a local policy

Roles

Domain group root

Assigned domain group

Local

Local/Combine (Remote replacing Local)

Deletes remote policies

Converted to a local policy

Locales - Org Locales

Domain group root

Assigned domain group

Local

Local/Combine (Remote replacing Local)

Deletes remote policies

Converted to a local policy

Trust Points

Domain group root

Assigned domain group

Local

Local/Combine (Remote replacing Local)

Deletes remote policies

Converted to a local policy

Firmware Download Policy

Domain group root

N/A

N/A

N/A

N/A

N/A

ID Soaking Policy

Domain group root

N/A

N/A

N/A

N/A

N/A

Locales - Domain Group Locales

Domain group root

N/A

N/A

N/A

N/A

N/A

Infrastructure Firmware Packs

N/A

Assigned domain group

Local

Local/Remote (if Remote exists)

Retains last known policy state

Converted to a local policy

Catalog

N/A

Assigned domain group

Local

Local/Remote (if Remote exists)

Retains last known policy state

Converted to a local policy

Maintenance Policy

Schedule

Host Firmware Packs

N/A

Assigned domain group

See Consequences of Service Profile Changes on Policy Resolution

See Consequences of Service Profile Changes on Policy Resolution

Deletes remote policies

Converted to a local policy

Maintenance Policy

Schedule

Host Firmware Packs

N/A

Assigned domain group

See Consequences of Service Profile Changes on Policy Resolution

See Consequences of Service Profile Changes on Policy Resolution

Deletes remote policies

Converted to a local policy

Maintenance Policy

Schedule

Host Firmware Packs

N/A

Assigned domain group

See Consequences of Service Profile Changes on Policy Resolution

See Consequences of Service Profile Changes on Policy Resolution

Deletes remote policies

Converted to a local policy

Consequences of Service Profile Changes on Policy Resolution

For certain policies, the policy resolution behavior is also affected by whether or not one or more service profiles that include that policy have been updated.

The following table describes the policy resolution behavior you can expect for those policies.

Policy Behavior in Cisco UCS Manager on Registration with Cisco UCS Central Domain Group Assigned after Registration with Cisco UCS Central

Domain Group Unassigned / Domain Group Assigned

Service Profile not Modified

Service Profile Modified

Maintenance Policy

Note 

If you are using a global maintenance policy in a local service profile, all pending activities must be acknowledged on the Cisco UCS Central Pending Activities page.

Local

Local, but any "default" policies are updated on domain group assignment

Local/Remote (if resolved to "default" post registration)

Schedule

Local

Local, but any "default" policies are updated on domain group assignment

Local/Remote (if resolved to "default" post registration)

Host Firmware Packages

Local

Local, but any "default" policies are updated on domain group assignment

Local/Remote (if resolved to "default" post registration)