post

How To: Cisco UCS Firmware Upgrade 2.2 to 3.1 with Auto-Install

Recently I had to upgrade our ESXi hosts from Update 2 to Update 3 due to security patch requirements. This requirement stretches across two separate physical environments, one running IBM blades and the other running on Cisco UCS blade chassis in a Flexpod configuration. The upgrade paths for both are slightly different, and they also run on different vCenter platforms. Both of these also have different upgrade paths as one is running VMware SRM and is in linked mode. I’m not going to discuss the IBM upgrades but I did need to upgrade the firmware of the Infrastructure and Servers for Cisco UCSM.

Before you being any upgrade process I highly recommend reading the release notes to make sure that a) an upgrade path exists from your current version, b) you become aware of any known issues in the new version and c) the features you want exist in the new version

UCS Upgrade Prep Work

Check the UCS Release Guides

Check the release notes to make sure all the components and modules are supported. The release notes for UCS Manager can be found on their site. The link is listed further below in the documents section.

Some of the things to check within the release notes are:
* Resolved Caveats

ucs-caveats-precheck

  • UCS Version Upgrade patch

ucs-infra-requirements-precheck

  • UCS Infrastructure Hardware compatibility

ucs-infra-requirements-precheck1

  • Minimum software version for UCS Blade servers

ucs-server-requirements-precheck1

Open a Pre-Emptive Support Call

I opened a call with Cisco TAC to investigate the discrepancy in the firmware versions. The advice was to downgrade the B200 M4 server firmware down to 4.0 (1). However, as I was planning on upgrading anyway I’ve now confirmed that the best option is to upgrade to the planned 3.1 version. As part of this upgrade I will also upgrade all the ESXi hosts on that site the same day. There is a second UCS domain on another site that will be upgraded on another date.

ucs-pre-emptive-support-case

Read More

post

Cisco Data Center User Group Melbourne First Meetup

Last night we hosted the first Cisco Data Center User Group in Melbourne. It was a successful night with a great turn out and excellent interaction and networking between everyone that attended. Everyone was enthusiastic and willing to take part and really mate it a fantastic night.

The user group was formed with the intention to create a space where IT professionals can come together in a relaxed environment to network, have a drink and learn about data center technology. We wanted to have an interactive and social atmosphere and thanks to everyone that attended and took part because that’s exactly what was achieved.

Cisco DCUG Melbourne Members photo

One of the things that I liked most about the meetup was the attendance of people from other community groups. Craig Waters (@cswaters1) from the VMware VMUG community, Brett Johnson (@brettjohnson008) from the vBrownBag community and one of the presenters, Will Robinson, from the NetAppATeam. The support from other communities is great and we really appreciate it.

The night itself began with an introduction from Derek Hennessy (@derekhennessy) and Chris Partsenidis (@cpartsenidis) on how the user group idea was formed. A shout out went to Lauren Friedman (@lauren) from Cisco for her help and support for getting the user group off the ground. We swiftly moved onto the first speaker of the night, Chris Gascoigne (@chrisgascoigne).

Introduction

Chris is a Technical Architect for Cisco ANZ with the Data Center team and has a focus on ACI, Nexus 9000, Automation/Orchestration and DevOps. Chris ran through a few slides on how network engineers can leverage tools such as Puppet, Ansible and Chef to implement the DevOps framework. He then ran through a demo of how to manage a Nexus 9000 switch from a bash shell and deploy Puppet configurations to a switch. Chris also emphasised the need to provide version control, code review and deployment into production. There were a number of questions from the audience as everyone tried to imagine using such tools within their own infrastructure environments. Unfortunately I don’t have a copy of Chris’ slidedeck to make available. A special mention goes out to Chris Partsenidis for performing the important task of being a microphone stand through Chris Gascoigne’s demo.

Following Chris’ presentation we took a break and let everyone digest the content and the food as well as order up another drink for the next session. Will Robinson (@oznetnerd) is a Senior Engineer with a focus on networking and storage and a wealth of experience. Will also has a mighty home lab setup and he gave everyone a run through on using GNS3 within his home lab. He really hit home on rethinking the physical and the logical implementations of networks and gave an example of a complex network he’d designed within GNS3. Everyone was really engaged in Wills presentation and it was like a quick fire buzzer round at a quiz following his presentation. He even managed to jokingly make reference to a layer 8 issue for someone using GNS3

GNS3 Connectivity

I’ve uploaded the slidedecks from the night and in the future we hope to capture the presentations on video and make them available as an archive following the events themselves. All in all it was a great night and we believe we have now started to develop a new community. If you’re interested in learning about technology, having a drink and some grub, and meeting other IT professionals and networking then we’re really looking forward to seeing you at the next meeting on Tuesday July 5th.

P.S. Thanks to Chris for the photo of the attendees

post

Cisco Data Centre User Group – Melbourne

cisco next gen data center user group

Next month we’re starting a new user group for Cisco Data Center in Melbourne. This user group is being run by Cisco Champions, myself and Chris Partsenidis. Chris and I met up after the recent Cisco Live in Melbourne and got chatting about how there’s no real community around Cisco technology so we reached out to Lauren Friedman (@lauren). Lauren was super helpful and has supported the creation of Cisco Data Center User Group. This is something that Lauren is working on from a global perspective and we’re delighted to be laying the groundwork in Australia.

This user group is centered around Cisco Next-Generation Data Centers and is for anyone that uses Cisco technology or that of the extended ecosystem. Our meetup is a fantastic opportunity to get to know others in the community over some snacks and beers in a relaxed and social environment. While the group is supported by Cisco, don’t expect sales pitches. We’ll focus on enabling a local community for Cisco Data Center users to share experiences, network and to learn more about both technology and careers. We openly invite submissions for topics and presentations from any members.

Some of the topics we’re looking to cover in the coming months are:

  • Cisco HyperFlex
  • DevOps
  • Cisco Nexus Switching
  • Big Data Analytics
  • Data Center Storage
  • CCNA DC and beyond
  • Cisco ACI and Nexus 9000
  • Operations and Data Center Management
  • HomeLab setup
  • Exam Preparation and certification
  • Automation and Orchestration
  • We’re open to requests from the community for topics of interest

The user group will catch up on the first Tuesday of every month at The Crafty Squire at 127 Russell Street in Melbourne CBD. We’ll be located upstairs in Porter Place. Our first meeting will run be Tuesday June 7th and all meetings will take place between 5:30 and 7:30PM.

Crafty Squire Porter Place

More details about the regular meet ups can be found over at Cisco Data Center User Group page on Meetup.com. This page will be updated regularly with the meeting agendas and speakers. We look forward to seeing you there, please don’t be shy and come along to say hello. Welcome to the community.

post

Cisco Live Session Review

I gave a recap of Cisco Live Melbourne in another post and had intended on providing a detailed look at each of the sessions I attended as part of that post but it became a bit long-winded so I’ve broken it out into separate posts. I’ve broken the sessions down by each day.

cisco_live_mel_image

Day 1:

TECCOM-2001 –  Cisco Unified Computing System

As someone that is working towards CCNA and CCNP in Cisco Data Center this extra technical seminar really was invaluable and opened my eyes up to a lot of areas that were unknown to me. This breakout session was an 8-hour, full-on overview of Cisco UCS, the components that comprise the solution and how it all works together. It wasn’t a deep-dive session however so if you’ve a really good working knowledge of UCS and know what’s under the covers quite well then this session wouldn’t really be for you. In saying that however I think there’s always opportunities to learn something new.

Cisco-UCS-b-series-overview

The session was broken down into 6 parts.

  • UCS Overview
  • Networking
  • Storage Best Practices
  • UCS Operational Best Practices
  • UCS does Security Admin
  • UCS Performance Manager

Some of the main takeaways from the session were around the recent Gen 3 releases for the UCS hardware including the Fabric Interconnects and IOMs. They also discussed the new features for UCS Manager 3.1 code base release.  Some of the new features of UCSM and the hardware are listed below:

UCS Manager 3.1

  • Single code base (covers UCS mini, M-Series and UCS traditional)
  • HTML 5 GUI
  • End-to-end 40GbE and 16Gb FC with 3rd Gen FI’s
  • M series cartridges with Intel Xeon E3 v4 Processors
  • UCS mini support for Second Chassis
  • New nVidia M6 and M60 GPUs
  • New PCIe Base Storage Accelerators

UCS Management Portfolio

Next Gen Fabric Interconnects:

FI6332:

  • 32 x 40GbE QSFP+
  • 2.56Tbps switching performance
  • IRU & 4 Fans

FI6332-16UP:

  • 24x40GbE QSFP+ & 16xUP Ports (1/10GbE or 4/8/16Gb FC)
  • 2.43Tbps switching performance

IOM 2304:

  • 8 x 40GbE server links & 4 x 40GbE QSFP+ uplinks
  • 960Gbps switching performance
  • Modular IOM for UCS 5108

Two other notes from this section of the technical session were that the FI6300s requires UCS Manager 3.1(1) and the M-Series is not support on the FI6300’s yet. There was also an overview of the UCS Mini upgrades, the Cloud Scale and Composable Infrastructure (Cisco C3260) and the M-Series. I’ve not had any experience or knowledge of the M-Series modular systems before and I need to do far more reading to understand this much better.

The second part of the session covered MAC pinning and the differences between the IOMs and Mezz cards. (For those that don’t know the IOMs are pass-through and the Mezz are PCIe cards). Once aspect they covered which I hadn’t heard about before was around UDLD (Uni-Directional Link Detection) which monitors the physical connectivity of cables. UDLD is point-to-point and uses echoing from FIs out to neighbouring switches to check availability. It’s complementary to Spanning Tree and is also faster at link detection. UDLD can be set in two modes, default and aggressive. In Default mode UDLD will notify and let spanning tree manage pulling the link down and in Aggressive mode UDLD will bring down link.

The Storage Best Practices looked at the two modes that FIs can be configured to and also the capabilities of both settings. If you’re familiar with UCS then there’s a fair change you’ll know this already. The focus was on FC protocol access via the FIs and how the switching mode changes how the FIs handle traffic.

FC End-Host Mode (NPV mode):

  • Switch sees FI as server with loads of HBAs attached
  • Connects FI to northbound NPIV enabled FC switch (Cisco/Brocade)
  • FCIDs distributed from northbound switch
  • DomainIDs, FC switching, FC zoning responsibilities are on northbound switch

FC Switching Mode:

  • Connects to Northbound FC switch and normal FC switch (Cisco Only)
  • DomainIDs, FC Switching, FCNS handled locally
  • UCS Direct connect storage enabled
  • UCS local zoning feature possible

The session also touched on the storage heavy C3260 can be connect to FIs as an appliance port. It’s also possible via UCSM to create LUN policies for external/local storage access. This can be used to carve up the storage pool of the C3260 into usable storage. Once thing I didn’t know what that a LUN needs to have an ID of 0 or 1 in order for boot from SAN to work. It just won’t work otherwise. Top tip right there. During the storage section there was some talk about Cisco’s new HyperFlex platform but most of the details were being withheld until the breakout session on Hyper-Converged Infrastructure later in the week.

The UCS Operational Best Practice session covered off primarily how UCS objects are structured and how they play a part in pools and and policies. For those already familiar with UCS there was nothing new to understand here. However, one small tidbit I walked away with was around pool exhaustion and how UCS recursively looks up to parent organisation until root and even up to the global level if UCS central is deployed or linked. One other note I took about sub-organisations were that they can go to a maximum of 5 levels deep. Most of the valuable information from this session was around the enhancements in latest version of UCSM updates. These were broken down into improvements in firmware upgrade procedures, maintenance policies and monitoring. Most of these enhancements are listed here:

Firmware upgrade improvements:

  • Baseline policy for upgrade checks – it checks everything is OK after upgrade
  • Fabric evacuation – can be used to test fabric fail-over
  • Server firmware auto-sync
  • Fault suppression (great for upgrades)
  • Fabric High Availability checks
  • Automatic UCSM Backup during AutoInstall

Maintenance:

  • On Next boot policy added
  • Per Fabric Chassis acknowledge
  • Reset IOM to Fabric default
  • UCSM adapter redundant groups
  • Smart call home enhancements

Monitoring:

  • UCS Health Monitoring
  • I2C statistics and improvements
  • UCSM policy to monitor – FI/IOM
  • Locator LED for disks
  • DIMM backlisting and error reporting (this is a great feature and will help immensely with troubleshooting)

Fabric evacuation can be used to test fabric fail-over before firmware upgrade to ensure bonding of NICs works correctly and ESXi hosts fail-over correctly to second vNIC. There’s  also a new tab for health also beside the FSM tab in UCSM.

The last two sections of the session I have to admit were not really for me. I don’t know whether it was just because it was late in the day, my mind was elsewhere or that I was just generally tired but I couldn’t focus. The sections on Security within UCSM and UCS Performance Manager may well have been interesting on another day but they just didn’t do anything for me. The information was somewhat basic and I really felt that UCS Performance Manager was really more of a technical sales pitch. I feel the session would have been better served with looking at more high-level over-arching tools for management such as UCS Director rather than a monitoring tool which the vast majority of people are not going to use anyway.

Overall though this entire technical session was a great learning experience. The presenters were very approachable and I took the opportunity to quiz Chris Dunk in particular about the HyperFlex solution. While I may not attend another UCS technical session again in the future I would definitely consider stumping up the extra cash needed for other technical session which may be more relevant to me then. There’s a lot of options available.

After the sessions were completed I headed down to the World of Solutions opening and wandered around for a bit. As I entered I was offered an array of free drink. Under other circumstances I would have jumped at the chance but I’m currently on a 1-year alcohol sabbatical so I instead floated around the food stand that had the fresh oysters. The World of Solutions was pumping. I didn’t really get into any deep conversations but I did take note of which vendors were present and who I wanted to interrogate more later in the week. I left well before the end of the reception so I could get home early. The next day was planned to be a big day anyway.

 

Read More

post

Cisco Live Recap

cisco_live_mel_imageLast week I had the opportunity to attend Cisco Live in Melbourne and it was awesome. This is the second year I’ve attended Cisco Live but this year I was there as an Attendee so I had access to the breakout sessions. Previously I only had an Explorer Plus pass which was good for the keynote access, partner theatre sessions  and the World of Solutions. While that was fun experience getting access to the breakout session was what I really wanted, and they didn’t disappoint. I’m privileged in that my ticket to Cisco Live was covered by my employer that sees the value in such events and we were also able to leverage Cisco Learning credits. If you wish to attend and have these credits available to you this is a great return on investment and one I’d recommend over a regular 5-day training course.

This year Cisco Live was once again held at Melbourne Convention Centre and it’s a brilliant facility that has a great layout, is large enough to cater for the ever-growing number of attendees and is easy to access via public transport. The breakout sessions are full on and a number of people had mentioned beforehand that going to Cisco Live was like drinking from a firehose. They weren’t wrong. Cisco tee up the sessions and you try to cram as much as you can into your grey matter. I also chose to sign up for an extra day technical seminar which was an 8 hour session on Cisco UCS. There were a number of streams that could be chosen but my focus is on UCS. This was an added extra on top of the regular attendee ticket. During the remainder of the week I tried to cram in as many other breakout sessions as I could and catch a few of the partner sessions as well as have some downtime to network a bit.

clmel-convention-center

Read More

post

Cisco HyperFlex – Welcome to the HCI Party!

Cisco has finally decided to bring the vodka to spike the punch at the Hyper-Converged Infrastructure party. And it tastes pretty damn good. There have been rumours for a while now that Cisco was working with Springpath and as a major third round investor it’s not surprising to hear about their entrance into the HCI arena. The Register’s Chris Mellor reported about Something bubbling up at Springpath back in early December.  So what is the offspring of Cisco and Springpath called? Cisco HyperFlex!!

hyperflex systems

The Play:

Hyper-converged systems so far have delivered on simplicity and scale but there’s been a massive gap in  the lack of network integration in existing solutions. Yes you can use top of rack fast switches. In some cases customers use Cumulus on whitebox top-of-rack switches for software defined networking but networking is not a built in feature of the two leading hyper-converged solutions, Nutanix and Simplivity.

HyperFlex joins the comprehensive DC portfolio along with UCS, MDS and Nexus. It means that Cisco now has a play in traditional component based infrastructure, converge infrastructure and now hyper-converged infrastructure. Cisco is adding HyperFlex to provide it with another string to its software defined infrastructure. It will now have:

  • UCS – compute (service profiles, APIs etc.)
  • ACI – for software defined network
  • HyperFlex- software defined storage, compute and network

hyperflex systems overview

On the initial release Cisco HyperFlex will support file storage and VMware. There are a number of other storage types, such as block and object, and hypervisors on the roadmap.  There’s also going to be container support. Given that Springpath was hypervisor agnostic I’d expect a quick ramp up from Cisco and fast feature release cycle.

The Potential:

Like pretty much every other hyper-converged solution Cisco sees its expected use-cases to be:

  • VDI
  • Server virtualisation
  • Test and development
  • Large remote branch offices

UCS Manager is already familiar to multiple thousands of customers worldwide and the server and network deployment settings in HyperFlex come from pre-configured Service Profiles. Service Profiles are well and truly familiar to anyone that has worked with Cisco UCS.  Given that customer base and the familiarity with existing management tools there’s massive potential for Cisco HyperFlex here. There are some well developed existing incumbents in the hyper-converged market with Nutanix leading the way and HyperFlex will allow Cisco to gain a foothold in that rapidly growing market.

The Deep-dive: Read More

post

UCS Director 5.4 – Post upgrade NetApp storage connection issue

After a recent upgrade to UCS Director 5.4 I noticed that my storage connections were showing a status of failed on the dashboard. I went to Administration -> Physical Accounts -> Physical Accounts. All of my NetApp controllers were offline.
Netapp connection fail UCS Director
I went to edit settings and re-entered my password to make sure that it had been picked up correctly.


Netapp UCSD Edit settingsAll the settings were fine so I saved them and tested the connection to the controllers again.
NetApp UCSD Test Connection

The connection failed with the following error:

500 Connection has been shutdown: javax.net.ssl.SSLHandsakeException:

Server chose SSLv3, but that protocol version is not enabled or not supported by the client.

Read More

post

How To: UCS Director 5.4 Patch 1 update

After the recent upgrade to 5.4 I decided to bite the bullet and upgrade to 5.4.1. Go to the download software portal for Cisco. Download the 5.4.1.zip patch file. I had a number of issue with the download as the checksum didn’t match. I had to take a number of attempts to get the file in-tact. I believe the issue was the ISA that acts as our internet proxy. Death to the ISA!!!!

Once the file has been downloaded copy it to your FTP server. Now it’s time to apply the patch. log onto UCS Director via either the console or SSH using the shelladmin account. Select option 3 to stop all the services.

UCSD upgrade step 1

Read More

post

How To: Cisco UCS Director – 5.3 to 5.4 Upgrade

Cisco announced their release of UCS Director 5.4 back in November. As I’m currently running 5.3 and ran into an issue with a workflow Cisco support recommended upgrading to 5.4. I had a look over the Cisco UCS Director 5.4 Release Notes and there’s a new version of Java and the CentOS operating system are newer in the latest version. Due to this the upgrade procedure for 5.4 is different from previous version. In earlier versions it was possible to upload a patch via shelladmin and it would upgrade the software and database schema in place. 5.4 however requires new appliances to be deployed and a migration of database files etc. to be done between the 5.3 and 5.4 versions.

I really think that Cisco needs to look at using a HTML 5 console in the future as this upgrade path is overly complicated. Considering a lot of companies want you to be on the latest version when opening support calls, including Cisco, it would make sense for them to make it easier to perform the required upgrades.

The primary changes that have caused the modification to the upgrade path are:

  • CentOS version 5.4 to version 6.6
  • Java version 1.6 to version 1.8

Another thing to note is that version 5.54 requires 12GB RAM.

Cisco recommend standing up  the new appliances beside your current UCS Director and Bare-Metal Appliances and performing a migration. In my case there’s a few firewall rule etc already been created for the existing environment so I wanted to keep the same IP addresses and machine names. I changed the IP addresses of the current appliances to be something else within the same subnet and gave the new appliances temporary names but the existing IP addresses. Once everything had been migrated and the changes confirmed I was able to rename the appliances to be the existing ones and removed the older appliances from the infrastructure. Before commencing the upgrade I also had a sold read over the UCS Director Upgrade 5.4 Guide and the UCS Director Bare-Metal Agent 5.4 Upgrade Guide

Read More

post

Cisco Champion 2016

CiscoChampion Header

Last Saturday I awoke to find an email from Cisco Champions Program welcoming me into the Cisco Champions community for 2016. I feel humbled, honoured and excited to be selected to be part of this community. This is my first time being nominated as a Cisco Champion and for me personally it shows that I’m progressing in the direction I wished in my career.

When I began this blog a couple of years ago mainly as a drop zone for documenting technical issues I ran into I couldn’t have dreamed that I would have ended up making a contribution to the greater IT community.

For 2016 I want to continue my level of participation in the community via this blog and hopefully expand to participating in podcasts. On a local level I want to contribute more in the virtualization, data center and automation communities. And from a personal level I want to interact with the other Cisco Champions and expand my knowledge of Cisco solutions and services.

Well done to all the other Cisco Champions, particularly the other novices. It’s going to be a blast. I’m looking forward to attend CLMEL later this year as a Cisco Champion.