Understanding In-Service Software Upgrades

Table Of Contents

Understanding In-Service Software Upgrades

Information About ISSU

Virtualization Support

Licensing Requirements

Guidelines and Limitations

How an ISSU Works

Configuring ISSU

Determining ISSU Compatibility

Additional References

Related Documents

Standards

MIBs

RFCs

Technical Assistance


Understanding In-Service Software Upgrades


This chapter describes the Cisco NX-OS in-service software upgrades (ISSU) and includes the following sections:

Information About ISSU

In a Nexus 7000 series chassis with dual supervisors, you can use the in-service software upgrade (ISSU) feature to upgrade the system software while the system continues to forward traffic. An ISSU uses the existing features of nonstop forwarding (NSF) with stateful switchover (SSO) to perform the software upgrade with no system downtime.

An ISSU is initiated through the command-line interface (CLI) by an administrator. When initiated, an ISSU updates (as needed) the following components on the system:

Supervisor BIOS, kickstart image, and system image

Module BIOS and image

Connectivity Management Processor (CMP) BIOS and image

In a redundant system with two supervisors, one of the supervisors is active while the other operates in the standby mode. During an ISSU, the new software is loaded onto the standby supervisor while the active supervisor continues to operate using the old software. As part of the upgrade, a switchover occurs between the active and standby supervisors, and the standby supervisor becomes active and begins running the new software. After the switchover, the new software is loaded onto the (formerly active) standby supervisor.

Virtualization Support

An ISSU-based upgrade is a system-wide upgrade that applies the same image and versions across the entire system, including all configured virtual device contexts (VDCs). VDCs are primarily a control-plane and user-interface virtualization and cannot run independent image versions per virtualized resource.


Note For complete information on VDCs, see the Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide, Release 4.1.


Licensing Requirements

The following table shows the licensing requirements for system-level high availability features:

Product
License Requirement

Cisco NX-OS

The ISSU feature requires no license. Any feature not included in a license package is bundled with the Cisco NX-OS system images and is provided at no extra charge to you.

VDC

VDC requires an Advanced Services license.


For a complete explanation of the Cisco NX-OS licensing scheme and how to obtain and apply licenses, see the Cisco NX-OS Licensing Guide.

Guidelines and Limitations

An ISSU has the following limitations and restrictions:

Do not change any configuration settings or network connections during the upgrade. Any changes in the network settings may cause a disruptive upgrade.

In some cases, the software upgrades may be disruptive. These exception scenarios can occur under the following conditions:

A single supervisor system with kickstart or system image changes.

A dual-supervisor system with incompatible system software images.

Configuration mode is blocked during the ISSU to prevent any changes.

Before you perform an ISSU from NX-OS release 5.2(x) to 6.0(x) or an ISSU / ISSD between any two NX-OS 6.0(x) releases, you must first remove QoS policies and ACLs from interfaces that are in the down state. If this is not performed, the installer process will abort the upgrade or downgrade process, and a message similar to the following will be displayed:

Service "ipqosmgr" : Please remove inactive policies using the command "clear 
inactive-config qos" Pre-upgrade check failed. Return code 0x415E0055 (Need to clear 
inactive-if-config from qos manager using the command "conf;clear inactive-config qos" 
or can manually clear the config shown by the command: "show running-config ipqos 
inactive-if-config").

Note The automatic command clear inactive-config qos, that clears inactive configuration, will delete the port channel policies even if one of the ports in a port channel has inactive policies. Guidelines for manual policy removal: During a manual removal, when the interface is part of a port channel, remove the policy map or access list from the port channel or remove the interface from the port channel before performing the ISSU or ISSD. For all other interface types, please remove the policy map or access list from the interface.


For more information about compatible upgrades and downgrades, see the Cisco Nexus 7000 Series NX-OS Release Notes, Release 6.x.

How an ISSU Works

On a Nexus 7000 series with two supervisors, the ISSU process follows these steps:

1. Begins when the administrator uses the install all command

2. Verifies the location and integrity of the new software image files

3. Verifies the operational status and the current software versions of both supervisors and all switching modules to ensure that the system is capable of an ISSU

4. Loads the new software image to the standby supervisor and brings it up to the HA ready state

5. Forces a supervisor switchover

6. Loads the new software image to the (formerly active) standby supervisor and brings it up to the HA ready state

7. Performs a nondisruptive upgrade of each switching module, one at a time

8. Upgrades the Connectivity Management Processor (CMP)

During the upgrade process, the system presents detailed status information on the console, requesting administrator confirmation at key steps.

Configuring ISSU

For ISSU configuration details, see the Cisco Nexus 7000 Series NX-OS Software Upgrade and Downgrade Guide, Release 5.x.

Determining ISSU Compatibility

An ISSU may be disruptive if you have configured features that are not supported on the new software image. To determine ISSU compatibility, use the show incompatibility system command.

This example shows how to determine ISSU compatibility:

switch#  show incompatibility system bootflash:n7000-s1-dk9.4.1.4.bin
The following configurations on active are incompatible with  the system image
1) Service : vpc , Capability : CAP_FEATURE_VPC_ENABLED
Description : vPC feature is enabled
Capability requirement : STRICT
Disable command : Disable vPC using "no feature vpc"
2) Service : copp , Capability : CAP_FEATURE_COPP_DISTRIBUTED_POLICING
Description : Distributed policing for copp is enabled.
Capability requirement : STRICT
Disable command : Disable distributed policing using "no copp distributed-polici
ng enable"

Additional References

For additional information related to implementing ISSU, see the following sections:

Related Documents

Related Topic
Document Title

ISSU configuration

"Software Images" chapter of the Cisco Nexus 7000 Series NX-OS Fundamentals Configuration Guide, Release 6.x

Virtual device context (VDC)

Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide, Release 4.1

Licensing

Cisco NX-OS Licensing Guide


Standards

Standards
Title

No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.


MIBs

MIBs
MIBs Link

CISCO-SYSTEM-EXT-MIB: ciscoHaGroup, cseSwCoresTable, cseHaRestartNotify, cseShutDownNotify, cseFailSwCoreNotify, cseFailSwCoreNotifyExtended

CISCO-PROCESS-MIB

CISCO-RF-MIB

To locate and download MIBs, go to the following URL:

http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml


RFCs

RFCs
Title

No RFCs are supported by this feature


Technical Assistance

Description
Link

Technical Assistance Center (TAC) home page, containing 30,000 pages of searchable technical content, including links to products, technologies, solutions, technical tips, and tools. Registered Cisco.com users can log in from this page to access even more content.

http://www.cisco.com/cisco/web/support/index.html