Guidelines, and Best Practices for Firmware Upgrades
Before you upgrade the firmware for any endpoint in a Cisco UCS domain, consider the following guidelines, best practices, and limitations:
Components That Support Firmware Upgrade
The various platforms that are supported by Cisco UCS Manager have different components that support firmware upgrade.
-
Fabric Interconnects:
-
Cisco UCS 6664 Fabric Interconnect
-
Cisco UCS X-Series Direct (UCSX-S9108-100G)
-
Cisco UCS 6536
-
Cisco UCS 64108
-
Cisco UCS 6454
-
-
Chassis components:
-
Blade server chassis:
-
I/O Modules/FI-IO Modules
Note
-
I/O Modules are not supported on the Cisco UCS X-Series Direct, which uses the FI-I/O Modules instead.
-
-
Power Supply Unit
-
-
Cisco UCS S3260 chassis:
-
Chassis Management Controller (CMC)
-
Chassis Adapter
-
SAS Expander
-
Board Controller
-
-
-
Server components:
-
Blade and Rack server:
-
Adapter
-
Cisco Integrated Management Controller (CIMC)
-
BIOS
-
Storage Controller
-
Board Controller
-
-
Cisco UCS S3260 storage server node:
-
Cisco Integrated Management Controller (CIMC)
-
BIOS
-
Board Controller
-
Storage Controller
-
-
Firmware Version Terminology
The firmware version terminology used depends upon the type of endpoint, as follows:
Firmware Versions in CIMC, I/O Modules, BIOS, CIMC, and Adapters
Each CIMC, I/O module, BIOS, CIMC, and Cisco adapter has two slots for firmware in flash. Each slot holds a version of firmware. One slot is active and the other is the backup slot. A component boots from whichever slot is designated as active.
The following firmware version terminology is used in Cisco UCS Manager:
- Running Version
-
The running version is the firmware that is active and in use by the endpoint.
- Startup Version
-
The startup version is the firmware that will be used when the endpoint next boots up. Cisco UCS Manager uses the activate operation to change the startup version.
- Backup Version
-
The backup version is the firmware in the other slot and is not in use by the endpoint. This version can be firmware that you have updated to the endpoint but have not yet activated, or it can be an older firmware version that was replaced by a recently activated version. Cisco UCS Manager uses the update operation to replace the image in the backup slot.
If the endpoint cannot boot from the startup version, it boots from the backup version.
Firmware Versions in the Fabric Interconnect and Cisco UCS Manager
You can only activate the fabric interconnect firmware and Cisco UCS Manager on the fabric interconnect. The fabric interconnect and Cisco UCS Manager firmware do not have backup versions, because all the images are stored on the fabric interconnect. As a result, the number of bootable fabric interconnect images is not limited to two, like the server CIMC and adapters. Instead, the number of bootable fabric interconnect images is limited by the available space in the memory of the fabric interconnect and the number of images stored there.
The fabric interconnect and Cisco UCS Manager firmware have running and startup versions of the kernel and system firmware. The kernel and system firmware must run the same versions of firmware.
Firmware- and Software-Related Guidelines for Upgrades
Before you upgrade any endpoint, consider the following guidelines and limitations:
Determine the Appropriate Type of Firmware Upgrade for Each Endpoint
Some endpoints, such as Cisco adapters and the server CIMC, can be upgraded through either a direct firmware upgrade or a firmware package included in a service profile. The configuration of a Cisco UCS domain determines how you upgrade these endpoints. If the service profiles associated with the servers include a host firmware package, upgrade the adapters for those servers through the firmware package.
Upgrades of an adapter through a firmware package in the service profile associated with the server take precedence over direct firmware upgrades. You cannot directly upgrade an endpoint if the service profile associated with the server includes a firmware package. To perform a direct upgrade, you must remove the firmware package from the service profile.
Do Not Activate All Endpoints Simultaneously in Cisco UCS Manager GUI
If you use Cisco UCS Manager GUI to update the firmware, do not select ALL from the Filter drop-down list in the Activate Firmware dialog box to activate all endpoints simultaneously. Many firmware releases and patches have dependencies that require the endpoints to be activated in a specific order for the firmware update to succeed. This order can change depending upon the contents of the release or patch. Activating all endpoints does not guarantee that the updates occur in the required order, and can disrupt communications between the endpoints and the fabric interconnects and Cisco UCS Manager. For information about the dependencies in a specific release or patch, see the release notes provided with that release or patch.
Determine Available Bootflash and Workspace Partition
The bootflash partition is dedicated solely to firmware images managed by Cisco UCS Manager. To initiate upgrade or downgrade, at least 20 percent of the bootflash partition must be available. When the bootflash partition exceeds 70 percent, faults are raised, but Auto Install proceeds. When the bootflash partition exceeds 80 percent, faults are raised and Auto Install does not proceed.
The workspace partition on the fabric interconnect stores tech support files, core files, and the debug plugin. To initiate upgrade or downgrade, at least 20 percent of the workspace partition must be available.
Determine the Impact of Activation for Adapters and I/O Modules
During a direct upgrade, you should configure Set Startup Version Only for an adapter. With this setting, the activated firmware moves into the pending-next-boot state, and the server is not immediately rebooted. The activated firmware does not become the running version of firmware on the adapter until the server is rebooted. You cannot configure Set Startup Version Only for an adapter in the host firmware package.
If a server is not associated with a service profile, the activated firmware remains in the pending-next-boot state. Cisco UCS Manager does not reboot the endpoints or activate the firmware until the server is associated with a service profile. If necessary, you can manually reboot or reset an unassociated server to activate the firmware.
When you configure Set Startup Version Only for an I/O module, the I/O module is rebooted when the fabric interconnect in its data patch is rebooted. If you do not configure Set Startup Version Only for an I/O module, the I/O module reboots and disrupts traffic. In addition, if Cisco UCS Manager detects a protocol and firmware version mismatch between the fabric interconnect and the I/O module, Cisco UCS Manager automatically updates the I/O module with the firmware version that matches the firmware in the fabric interconnect and then activates the firmware and reboots the I/O module again.Disable Call Home before Upgrading to Avoid Unnecessary Alerts (Optional)
When you upgrade a Cisco UCS domain, Cisco UCS Manager restarts the components to complete the upgrade process. This restart causes events that are identical to the service disruptions and component failures that trigger Call Home alerts to be sent. If you do not disable Call Home before you begin the upgrade, alerts will be generated by the upgrade-related component, restarts and notifications will be sent out based on your Call Home configuration.
Fabric Interconnect Traffic Evacuation
Upgrading the subordinate fabric interconnect in a system disrupts the traffic that is active on the fabric interconnect. This traffic fails over to the primary fabric interconnect.
![]() Important |
|
You can perform fabric evacuation as follows during the manual upgrade process:
-
Stop all the traffic that is active through a fabric interconnect by configuring Admin Evac Mode as On.
-
For vNICs configured with failover, verify that the traffic has failed over by using Cisco UCS Manager or tools such as vCenter.
-
Upgrade the subordinate fabric interconnect.
-
Restart all the stopped traffic flows by configuring Admin Evac Mode as Off.
-
Change the cluster lead to the subordinate fabric interconnect.
-
Repeat steps 1 to 4 and upgrade the other fabric interconnect.
Fabric Evacuation with Auto Install
Starting with Cisco UCS Manager Release 3.1(3), you can use fabric evacuation during Auto Install. While initiating Auto Install, when you enable fabric evacuation and then begin Auto Install, the following sequence of events occur:
-
The subordinate fabric interconnect (FI-B) is evacuated and activated.
-
Failover occurs and the primary fabric interconnect (FI-A) becomes the subordinate fabric interconnect. FI-B now becomes the cluster lead.
-
FI-A is now evacuated and activated.
If you use fabric evacuation with Auto Install, and fabric evacuation was enabled on the fabric interconnect before Auto Install, fabric evacuation is disabled after Auto Install is complete.
Ensure that you do not initiate Auto Install with fabric evacuation enabled on the primary fabric interconnect. If fabric evacuation was manually enabled on the primary fabric interconnect before Auto Install, it must be manually disabled before initiating Auto Install.
![]() Note |
|
Configuring Fabric Interconnect Traffic Evacuation
You can use the steps detailed here, or click Play on this video (http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-manager/videos/3-1/enable_and_disable_fi_traffic_evacuation.html) to watch how to enable and disable fabric interconnect traffic evacuation.
Procedure
Step 1 |
In the Navigation pane, click Equipment. |
Step 2 |
Expand . |
Step 3 |
In the Work pane, click the General tab. |
Step 4 |
In the Actions area of the General tab, click Configure Evacuation. |
Step 5 |
To configure evacuation of the traffic through the specified fabric interconnect, click one of the following radio buttons in the Admin Evac Mode field:
|
Step 6 |
(Optional) To evacuate the traffic through a fabric interconnect irrespective of its current evacuation state, check the Force check box. |
Step 7 |
Click Apply.
|
Step 8 |
Click OK to confirm fabric interconnect traffic evacuation and continue. |
Secure Firmware Update
Cisco UCS Manager, Release 3.1(2) introduces secure firmware update, which enables you to update the adapter firmware securely for third-party Intel network and storage adapters. Only server administrators can upgrade or downgrade firmware for the adapters. OS administrators with root privileges are not allowed to downgrade the adapter firmware.
The following Cisco UCS servers support secure firmware update:
Secure Firmware Update Supported Network Adapters and Storage Disks
Supported Storage Disks on Cisco Blade Servers
The following Intel NVMe storage disks support secure firmware update on Cisco UCS B200 M5 Server and Cisco UCS B480 M5 Server.
NVMe Storage Disks |
---|
UCSC-NVMEHW-H800 |
UCSC-NVMEHW-H1600 |
UCSC-NVMEHW-H3200 |
UCSC-NVMEHW-H6400 |
UCSC-NVMEHW-H7680 |
Supported Network Adapters and Storage Disks on Cisco Rack Servers
The following NVMe storage disks support secure firmware update on Cisco UCS C220 M5 Server, Cisco UCS C240 M5 Server, and Cisco UCS C480 M5 Server servers:
NVMe Storage Disks |
---|
UCSC-NVMEHW-H800 |
UCSC-NVMEHW-H1600 |
UCSC-NVMEHW-H3200 |
UCSC-NVMEHW-H6400 |
UCSC-NVMEHW-H7680 |
UCSC-NVME-H16003 to UCSC-F-H16003 |
UCSC-NVME-H32003 |
UCSC-NVME-H38401 |
UCSC-NVME-H64003 |
UCSC-NVME-H76801 |
Guidelines for Secure Firmware Support on Cisco UCS Servers
Cisco UCS Manager Release 3.1(2) introduces support for secure firmware update. For Cisco UCS M5 servers, secure firmware update is introduced in Cisco UCS Manager Release 3.2(2).
![]() Important |
Ensure that CIMC is running Version 2.0(13) or later and Cisco UCS Manager is running Release 3.1(2) or later releases. Secure firmware update cannot be done when the CIMC is running a version earlier than 2.0(13) and Cisco UCS Manager is running a release earlier than Release 3.1(2). |
Guidelines for Blade Servers
For secure firmware update on , B200 M5, and B480 M5 servers, do the following:
-
Install the UCSB-LSTOR-PT storage controller and insert the NVMe disks on a Cisco UCS B200 M5 or B480 M5 server.
-
Reacknowledge the server. Refer to the Reacknowledging a Blade Server section in the Cisco UCS Manager Infrastructure Management Guide, Release 3.2.
Note
Ensure that server discovery does not fail and the NVMe disks are identified by CIMC and BIOS. After the server is associated to the service profile with the default host firmware package, Auto Install is triggered. NVMe disks can be updated with the latest firmware during Auto Install.
Cisco UCS Manager, Release 3.2(1) supports NVMe boot.
Guidelines for Rack Servers
For secure firmware update on Cisco UCS C460, C240, C220 M5 servers and C480 M5 servers, do the following:
-
Reacknowledge the Cisco UCS servers. Refer to the Reacknowledging a Rack Server section in the Cisco UCS Manager Infrastructure Management Guide, Release 3.2.
Note
Ensure that server discovery does not fail and the NVMe disks are identified by CIMC and BIOS. After the server is associated to the service profile with the default host firmware package, Auto Install is triggered. NVMe disks can be updated with the latest firmware during Auto Install.
Cisco UCS Manager, Release 3.2(1) supports NVMe boot.
Cautions, and Guidelines for Upgrading with Auto Install
Before you use Auto Install to upgrade the firmware for any endpoint in a Cisco UCS domain, consider the following cautions, guidelines, and limitations:
![]() Note |
These guidelines are specific to Auto Install and are in addition to those listed in Guidelines, and Best Practices for Firmware Upgrades. |
State of the Endpoints
Before you begin an upgrade, all affected endpoints must be as follows:
-
For a cluster configuration, verify that the high availability status of the fabric interconnects shows that both are up and running.
-
For a non-cluster configuration, verify that the Overall Status of the fabric interconnect is Operable.
-
For all endpoints to be upgraded, verify that they are in an Operable state.
-
For all servers to be upgraded, verify that all the servers have been discovered and that discovery did not fail. Install Server Firmware will fail if any server endpoints cannot be upgraded.
-
For each server to be upgraded, check the running firmware version on the storage controller and local disks, and verify that they are in the Ready state.
Recommendations for the Default Host Firmware Policy
After you upgrade Cisco UCS Manager, a new host firmware policy named "default" is created, and is assigned to all service profiles that did not already include a host firmware policy. The default host firmware policy is blank. It does not contain any firmware entries for any components. This default policy is also configured for an immediate reboot rather than waiting for user acknowledgment before rebooting the servers.
During the upgrade of server firmware, you can modify the default host firmware policy to add firmware for the blade and rack-mount servers in the Cisco UCS domain. To complete the upgrade, all servers must be rebooted.
Every service profile that is assigned to the default host firmware policy reboots the associated server according to the maintenance policy included in the service profile. If the maintenance policy is set to immediate reboot, you cannot cancel the upgrade or prevent the servers from rebooting after you complete the configuration in the Install Server Firmware wizard. We recommend that you verify the maintenance policy associated with these service profiles to ensure that they are set for a timed reboot or for user acknowledgment.
Time, Date, and Time Zone on Fabric Interconnects Must Be Identical
To ensure that the fabric interconnects in a cluster configuration are in sync, you must ensure that they are configured for the same date, time, and time zone. We recommend that you configure an NTP server and the correct time zone in both fabric interconnects. If the date, time or time zone in the fabric interconnects are out of sync, the Auto Install might fail.
Cannot Upgrade Infrastructure and Server Firmware Simultaneously
You cannot upgrade the infrastructure firmware at the same time as you upgrade server firmware. We recommend that you upgrade the infrastructure firmware first and then upgrade the server firmware. Do not begin the server firmware upgrade until the infrastructure firmware upgrade is completed.
Required Privileges
Users must have the following privileges to upgrade endpoints with Auto Install:
Privileges | Upgrade Tasks User Can Perform |
---|---|
admin |
|
Service profile compute (ls-compute) |
Run Install Server Firmware |
Service profile server policy (ls-server-policy) |
Add, delete, and modify host firmware packages |
Service profile config policy (ls-config-policy) |
Add, delete, and modify host firmware packages |
Impact of Host Firmware Packages on Install Server Firmware
Because Install Server Firmware uses host firmware packages to upgrade the servers, you do not have to upgrade all servers in a Cisco UCS domain to the same firmware versions. However, all servers which have associated service profiles that include the host firmware packages you selected when you configured Install Server Firmware are upgraded to the firmware versions in the specified software bundles.
Effect of Using Install Server Firmware on Servers Whose Service Profiles Do Not Include a Host Firmware Package
If you use Install Server Firmware to upgrade server endpoints on servers that have associated service profiles without host firmware packages, Install Server Firmware uses the default host firmware package to upgrade the servers. You can only update the default host firmware package through Install Server Firmware.
If you want to upgrade the CIMC or adapters in a server with an associated service profile that has previously been updated through the default host firmware package in Install Server Firmware, you must use one of the following methods:
-
Use Install Server Firmware to modify the default host firmware package and then upgrade the server through Install Server Firmware.
-
Create a new host firmware package policy, assign it to the service profile associated with the server, and then upgrade the server through that host firmware package policy.
-
Disassociate the service profile from the server and then directly upgrade the server endpoints.
Upgrading Server Firmware on Newly Added Servers
If you add a server to a Cisco UCS domain after you run Install Server Firmware, the firmware on the new server is not automatically upgraded by Install Server Firmware. If you want to upgrade the firmware on a newly added server to the firmware version used when you last ran Install Server Firmware, you must manually upgrade the endpoints to upgrade the firmware on that server. Install Server Firmware requires a change in firmware version each time. You cannot rerun Install Server Firmware to upgrade servers to the same firmware version.
![]() Note |
After you finish the upgrade, you can use the Firmware Auto Sync Server policy in Cisco UCS Manager to automatically update newly discovered servers. |