Table Of Contents
Understanding In-Service Software Upgrades
Determining ISSU Compatibility
Understanding In-Service Software Upgrades
This chapter describes the Cisco NX-OS in-service software upgrades (ISSU) and includes the following sections:
•Determining ISSU Compatibility
Information About ISSU
In a Nexus 7000 series chassis with dual supervisors, you can use the in-service software upgrade (ISSU) feature to upgrade the system software while the system continues to forward traffic. An ISSU uses the existing features of nonstop forwarding (NSF) with stateful switchover (SSO) to perform the software upgrade with no system downtime.
An ISSU is initiated through the command-line interface (CLI) by an administrator. When initiated, an ISSU updates (as needed) the following components on the system:
•Supervisor BIOS, kickstart image, and system image
•Module BIOS and image
•Connectivity Management Processor (CMP) BIOS and image
In a redundant system with two supervisors, one of the supervisors is active while the other operates in the standby mode. During an ISSU, the new software is loaded onto the standby supervisor while the active supervisor continues to operate using the old software. As part of the upgrade, a switchover occurs between the active and standby supervisors, and the standby supervisor becomes active and begins running the new software. After the switchover, the new software is loaded onto the (formerly active) standby supervisor.
Virtualization Support
An ISSU-based upgrade is a system-wide upgrade that applies the same image and versions across the entire system, including all configured virtual device contexts (VDCs). VDCs are primarily a control-plane and user-interface virtualization and cannot run independent image versions per virtualized resource.
Note For complete information on VDCs, see the Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide, Release 4.1.
Licensing Requirements
The following table shows the licensing requirements for system-level high availability features:
For a complete explanation of the Cisco NX-OS licensing scheme and how to obtain and apply licenses, see the Cisco Nexus 7000 Series NX-OS Licensing Guide, Release 4.1.
Guidelines and Limitations
An ISSU has the following limitations and restrictions:
•Do not change any configuration settings or network connections during the upgrade. Any changes in the network settings may cause a disruptive upgrade.
•In some cases, the software upgrades may be disruptive. These exception scenarios can occur under the following conditions:
–A single supervisor system with kickstart or system image changes.
–A dual-supervisor system with incompatible system software images.
•Configuration mode is blocked during the ISSU to prevent any changes.
For more information about compatible upgrades and downgrades, see the Cisco Nexus 7000 Series NX-OS Release Notes, Release 4.1.
How an ISSU Works
On a Nexus 7000 series with two supervisors, the ISSU process follows these steps:
1. Begins when the administrator uses the install all command
2. Verifies the location and integrity of the new software image files
3. Verifies the operational status and the current software versions of both supervisors and all switching modules to ensure that the system is capable of an ISSU
4. Loads the new software image to the standby supervisor and brings it up to the HA ready state
5. Forces a supervisor switchover
6. Loads the new software image to the (formerly active) standby supervisor and brings it up to the HA ready state
7. Performs a nondisruptive upgrade of each switching module, one at a time
8. Upgrades the Connectivity Management Processor (CMP)
During the upgrade process, the system presents detailed status information on the console, requesting administrator confirmation at key steps.
Configuring ISSU
For ISSU configuration details, see the Cisco Nexus 7000 Series NX-OS Software Upgrade and Downgrade Guide, Release 4.1.
Determining ISSU Compatibility
An ISSU may be disruptive if you have configured features that are not supported on the new software image. To determine ISSU compatibility, use the show incompatibility system command.
This example shows how to determine ISSU compatibility:
switch# show incompatibility system bootflash:n7000-s1-dk9.4.1.4.binThe following configurations on active are incompatible with the system image1) Service : vpc , Capability : CAP_FEATURE_VPC_ENABLEDDescription : vPC feature is enabledCapability requirement : STRICTDisable command : Disable vPC using "no feature vpc"2) Service : copp , Capability : CAP_FEATURE_COPP_DISTRIBUTED_POLICINGDescription : Distributed policing for copp is enabled.Capability requirement : STRICTDisable command : Disable distributed policing using "no copp distributed-policing enable"Additional References
For additional information related to implementing ISSU, see the following sections:
•MIBs
•RFCs
Related Documents
Standards
Standards TitleNo new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
—
MIBs
MIBs MIBs Link•CISCO-SYSTEM-EXT-MIB: ciscoHaGroup, cseSwCoresTable, cseHaRestartNotify, cseShutDownNotify, cseFailSwCoreNotify, cseFailSwCoreNotifyExtended
•CISCO-PROCESS-MIB
•CISCO-RF-MIB
To locate and download MIBs, go to the following URL:
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
RFCs
Technical Assistance