- Preface
- Cisco UCS Central Overview
- License Management
- Managing Administrative Settings
- Domain Management
- Remote Management
- Firmware Management
- Monitoring Inventory
- Managing Backup and Restore
- Working with Policies
- Service Profiles and Templates
- Server Policies
- Network Policies
- Storage Policies
- Statistics Management
- System Management
- Monitoring Logs
- User Management
- Configuring Server Pools
- Configuring IP Pools
- Configuring IQN Pools
- Configuring UUID Suffix Pools
- UUID Suffix Pools
- Creating a UUID Suffix Pool
- Deleting a UUID Suffix Pool
- Ethernet and Fibre Channel Adapter Policies
- Server BIOS Settings
- BIOS Policy
- Default BIOS Settings
- Creating a BIOS Policy
- Viewing the Actual BIOS Settings for a Server
- Modifying BIOS Defaults
- Deleting a BIOS Policy
- Main BIOS Settings
- Processor BIOS Settings
- Intel Directed I/O BIOS Settings
- RAS Memory BIOS Settings
- Serial Port BIOS Settings
- USB BIOS Settings
- PCI Configuration BIOS Settings
- Boot Options BIOS Settings
- Server Management BIOS Settings
- IPMI Access Profile
- Boot Policy
- Local Disk Configuration Policy
- Power Control Policy
- Scrub Policy
- Serial over LAN Policy
- Server Pool Policy Qualifications
Server Policies
This chapter includes the following sections:
Configuring Server Pools
Server Pools
A server pool contains a set of servers. These servers typically share the same characteristics. Those characteristics can be their location in the chassis, or an attribute such as server type, amount of memory, local storage, type of CPU, or local drive configuration. You can manually assign a server to a server pool, or use server pool policies and server pool policy qualifications to automate the assignment.
If your system implements multitenancy through organizations, you can designate one or more server pools to be used by a specific organization. For example, a pool that includes all servers with two CPUs could be assigned to the Marketing organization, while all servers with 64 GB memory could be assigned to the Finance organization.
A server pool can include servers from any chassis in the system. A given server can belong to multiple server pools.
Creating a Server Pool
The following example shows how to create the server pool named ServPool2, create two servers for the server pool, and commit the transaction:
UCSC# connect resource-mgr UCSC(resource-mgr)# scope org / UCSC(resource-mgr) /org # create server-pool ServPool2 UCSC(resource-mgr) /org/server-pool* # create server 1/1 UCSC(resource-mgr) /org/server-pool* # create server 1/4 UCSC(resource-mgr) /org/server-pool* # commit-buffer UCSC(resource-mgr) /org/server-pool #
Deleting a Server Pool
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect resource-mgr |
Enters resource manager mode. |
Step 2 | UCSC(resource-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(resource-mgr) /org # delete server-pool server-pool-name |
Deletes the specified server pool. |
Step 4 | UCSC(resource-mgr) /org # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to delete the server pool named ServPool2 and commit the transaction:
UCSC# connect resource-mgr UCSC(resource-mgr)# scope org / UCSC(resource-mgr) /org # delete server-pool ServPool2 UCSC(resource-mgr) /org* # commit-buffer UCSC(resource-mgr) /org #
Configuring IP Pools
IP Pools
IP pools are a collection of IP addresses. You can use IP pools in Cisco UCS Central in one of the following ways:
-
For external management of Cisco UCS Manager servers.
-
For iSCSI boot initiators.
-
For both external management and iSCSI boot initiators in Cisco UCS Manager.
Note | The IP pool must not contain any IP addresses that have been assigned as static IP addresses for a server or service profile. |
A fault is raised if the same IP address is assigned to two different Cisco UCS domains. If you want to use the same IP addresses, you can use the scope property to specify whether the IP addresses in the block are public or private:
-
public—The IP addresses in the block can be assigned to one and only one registered Cisco UCS domain.
-
private— The IP addresses in the block can be assigned to multiple Cisco UCS domains.
Cisco UCS Central creates public IP pools by default.
Global IP pools should be used for similar geographic locations. If the IP addressing schemes are different, the same IP pool can not be used for those sites.
Cisco UCS Central supports creating and deleting IPv4 and IPv6 blocks under IP pools. However, iSCSI boot initiators support only IPv4.
Creating an IP Pool
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. | ||
Step 3 | UCSC(policy-mgr) /org # create ip-pool pool-name |
Creates an IP pool with the specified name, and enters organization IP pool mode. | ||
Step 4 | UCSC(policy-mgr) /org/ip-pool # set descr description | (Optional)
Provides a description for the IP pool.
| ||
Step 5 | UCSC(policy-mgr) /org/ip-pool # create block first-ip-addr last-ip-addr gateway-ip-addr subnet-mask |
Creates a block (range) of IP addresses, and enters organization IP pool block mode. You must specify the first and last IP addresses in the address range, the gateway IP address, and subnet mask.
| ||
Step 6 | UCSC(policy-mgr) /org/ip-pool/block # set primdns ip-address secdns ip-address |
Specifies the primary DNS and secondary DNS IP addresses. | ||
Step 7 | UCSC(policy-mgr) /org/ip-pool/block #set scope {private | public} |
Specifies whether the IP addresses is private or public. | ||
Step 8 | UCSC(policy-mgr) /org/ip-pool/block # commit-buffer |
Commits the transaction to the system configuration.
|
The following example shows how to create an IP pool named GPool1, provide a description for the pool, specify a block of IP addresses and a primary and secondary IP address to be used for the pool, set the pool to private, and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # create ip-pool GPool1 UCSC(policy-mgr) /org/ip-pool* # set descr "This is IP pool GPool1" UCSC(policy-mgr) /org/ip-pool* # create block 192.168.100.1 192.168.100.200 192.168.100.10 255.255.255.0 UCSC(policy-mgr) /org/ip-pool/block* # set primdns 192.168.100.1 secdns 192.168.100.20 UCSC(policy-mgr) /org/ip-pool/block* # set scope private UCSC(policy-mgr) /org/ip-pool/block* # commit-buffer UCSC(policy-mgr) /org/ip-pool/block #
Include the IP pool in a service profile and/or template.
Creating an IP Pool with IPv6 Blocks
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr) /org # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type/ as the org-name | ||
Step 3 | UCSC(policy-mgr) /org # create ip-pool global-ip-pool |
Creates a global IP pool with the specified name, and enters the global IP pool mode. | ||
Step 4 | UCSC(policy-mgr) /org/ip-pool # set descr description | (Optional)
Provides a description for the IP pool.
| ||
Step 5 | UCSC(policy-mgr) /org/ip-pool # create ipv6-block first-ip-addr last-ip-addr default-gateway ip address prefix |
Creates a block (range) of IP addresses, and enters organization IP pool block mode. You must specify the first and last IP addresses in the address range, the default gateway IP address, and the prefix.
| ||
Step 6 | UCSC(policy-mgr) /org/ip-pool/ipv6-block # set primdns ip-address secdns ip-address |
Specifies the primary DNS and secondary DNS IP addresses. | ||
Step 7 | UCSC(policy-mgr) /org/ip-pool/ipv6-block #set qualifier word |
Sets the IPv6 block to an existing ID range qualifier name. | ||
Step 8 | UCSC(policy-mgr) /org/ip-pool/ipv6-block # commit-buffer |
Commits the transaction to the system configuration.
|
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org org-name UCSC(policy-mgr) /org # create ip-pool global-ip-pool UCSC(policy-mgr) /org/ip-pool* # set descr "This is global-ip-pool gpool1" UCSC(policy-mgr) /org/ip-pool* # create ipv6-block 2001:db8:111::a1 2001:db8:111::af 2001:db8:111::1 64 UCSC(policy-mgr) /org/ip-pool/ipv6-block* # set primdns 2001:db8:111::FF secdns 2001:db8:111::FE UCSC(policy-mgr) /org/ip-pool/ipv6-block* # set qualifier Q1 UCSC(policy-mgr) /org/ip-pool/ipv6-block* # commit-buffer UCSC(policy-mgr) /org/ip-pool/ipv6-block #
Deleting an IP Pool
If you delete a pool, Cisco UCS Central does not reallocate any addresses from that pool that have been assigned to vNICs or vHBAs in Cisco UCS Manager. All assigned addresses from a deleted pool remain with the vNIC or vHBA to which they are assigned until one of the following occurs:
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. | ||
Step 3 | UCSC(policy-mgr) /org # delete ip-pool pool-name |
Deletes the specified IP pool. | ||
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction to the system configuration.
|
The following example shows how to delete the IP pool named GPool1 and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # delete ip-pool GPool1 UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
Configuring IQN Pools
IQN Pools
An IQN pool is a collection of iSCSI Qualified Names (IQNs) for use as initiator identifiers by iSCSI vNICs in a Cisco UCS domain. IQN pools created in Cisco UCS Central can be shared between Cisco UCS domains.
IQN pool members are of the form prefix:suffix:number, where you can specify the prefix, suffix, and a block (range) of numbers.
An IQN pool can contain more than one IQN block, with different number ranges and different suffixes, but sharing the same prefix.
Creating an IQN Pool
Note | In most cases, the maximum IQN size (prefix + suffix + additional characters) is 223 characters. When using the Cisco UCS NIC M51KR-B adapter, you must limit the IQN size to 128 characters. |
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. | ||
Step 3 | UCSC(policy-mgr) /org # create iqn-pool pool-name |
Creates an IQN pool with the specified name, and enters organization IQN pool mode. This name can be between 1 and 32 alphanumeric characters. You cannot use spaces or any special characters other than - (hyphen), _ (underscore), : (colon), and . (period), and you cannot change this name after the object has been saved. | ||
Step 4 | UCSC(policy-mgr) /org/iqn-pool # set iqn-prefix prefix | Specifies the prefix for the IQN block members. Unless limited by the adapter card, the prefix can contain up to 150 characters. | ||
Step 5 | UCSC(policy-mgr) /org/iqn-pool # set descr description | (Optional)
Provides a description for the IQN pool. Enter up to 256 characters. You can use any characters or spaces except ` (accent mark), \ (backslash), ^ (carat), " (double quote), = (equal sign), > (greater than), < (less than), and ' (single quote).
| ||
Step 6 | UCSC(policy-mgr) /org/iqn-pool # create block suffix from to |
Creates a block (range) of IQNs, and enters organization IQN pool block mode. You must specify the base suffix, the starting suffix number, and the ending suffix number. The resulting IQN pool members are of the form prefix:suffix:number. The suffix can be up to 64 characters.
| ||
Step 7 | UCSC(policy-mgr) /org/iqn-pool/block # commit-buffer |
Commits the transaction to the system configuration.
|
The following example shows how to create an IQN pool named GPool1, provide a description for the pool, specify a prefix and a block of suffixes to be used for the pool, and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # create iqn-pool GPool1 UCSC(policy-mgr) /org/iqn-pool* # set iqn-prefix iqn.alpha.com UCSC(policy-mgr) /org/iqn-pool* # set descr "This is IQN pool GPool1" UCSC(policy-mgr) /org/iqn-pool* # create block beta 3 5 UCSC(policy-mgr) /org/iqn-pool/block* # commit-buffer UCSC(policy-mgr) /org/iqn-pool/block #
Include the IQN suffix pool in a service profile and/or template.
Deleting an IQN Pool
If you delete a pool, Cisco UCS Central does not reallocate any addresses from that pool that have been assigned to vNICs or vHBAs in Cisco UCS Manager. All assigned addresses from a deleted pool remain with the vNIC or vHBA to which they are assigned until one of the following occurs:
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. | ||
Step 3 | UCSC(policy-mgr) /org # delete iqn-pool pool-name |
Deletes the specified IQN pool. | ||
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction to the system configuration.
|
The following example shows how to delete the IQN pool named GPool1 and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # delete iqn-pool GPool1 UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
Configuring UUID Suffix Pools
UUID Suffix Pools
A UUID suffix pool is a collection of SMBIOS UUIDs that are available to be assigned to servers. The first number of digits that constitute the prefix of the UUID are fixed. The remaining digits, the UUID suffix, are variable. A UUID suffix pool ensures that these variable values are unique for each server associated with a service profile which uses that particular pool to avoid conflicts.
If you use UUID suffix pools in service profiles, you do not have to manually configure the UUID of the server associated with the service profile. Assigning global UUID suffix pools from Cisco UCS Central to service profiles in Cisco UCS Central or Cisco UCS Manager allows them to be shared across Cisco UCS domains.
Creating a UUID Suffix Pool
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. | ||
Step 3 | UCSC(policy-mgr) /org # create uuid-suffix-pool pool-name |
Creates a UUID suffix pool with the specified name, and enters organization UUID suffix pool mode. | ||
Step 4 | UCSC(policy-mgr) /org/uuid-suffix-pool # set descr description | (Optional)
Provides a description for the UUID suffix pool.
| ||
Step 5 | UCSC(policy-mgr) /org/uuid-suffix-pool # create block first-uuid last-uuid | Creates a block (range) of UUID suffixes, and enters organization UUID suffix pool block mode. You must specify the first and last UUID suffixes in the block using the form nnnn-nnnnnnnnnnnn, with the UUID suffixes separated by a space.
| ||
Step 6 | UCSC(policy-mgr) /org/uuid-suffix-pool/block # commit-buffer |
Commits the transaction to the system configuration.
|
The following example shows how to create a UUID suffix pool named GPool1, provide a description for the pool, specify a block of UUID suffixes to be used for the pool, and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # create uuid-suffix-pool GPool1 UCSC(policy-mgr) /org/uuid-suffix-pool* # set descr "This is UUID suffix pool GPool1" UCSC(policy-mgr) /org/uuid-suffix-pool* # create block 1000-000000000001 1000-000000000010 UCSC(policy-mgr) /org/uuid-suffix-pool/block* # commit-buffer UCSC(policy-mgr) /org/uuid-suffix-pool/block #
Include the UUID suffix pool in a service profile and/or template.
Deleting a UUID Suffix Pool
If you delete a pool, Cisco UCS Central does not reallocate any addresses from that pool that have been assigned to vNICs or vHBAs in Cisco UCS Manager. All assigned addresses from a deleted pool remain with the vNIC or vHBA to which they are assigned until one of the following occurs:
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. | ||
Step 3 | UCSC(policy-mgr) /org # delete uuid-suffix-pool pool-name |
Deletes the specified UUID suffix pool. | ||
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction to the system configuration.
|
The following example shows how to delete the UUID suffix pool named GPool1 and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # delete uuid-suffix-pool GPool1 UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
Ethernet and Fibre Channel Adapter Policies
These policies govern the host-side behavior of the adapter, including how the adapter handles traffic. For example, you can use these policies to change default settings for the following:
-
Queues
-
Interrupt handling
-
Performance enhancement
-
RSS hash
-
Failover in an cluster configuration with two fabric interconnects
Note | For Fibre Channel adapter policies, the values displayed by Cisco UCS Central may not match those displayed by applications such as QLogic SANsurfer. For example, the following values may result in an apparent mismatch between SANsurfer and Cisco UCS Central:
|
Operating System Specific Adapter Policies
By default, Cisco UCS provides a set of Ethernet adapter policies and Fibre Channel adapter policies. These policies include the recommended settings for each supported server operating system. Operating systems are sensitive to the settings in these policies. Storage vendors typically require non-default adapter settings. You can find the details of these required settings on the support list provided by those vendors.
We recommend that you use the values in these policies for the applicable operating system. Do not modify any of the values in the default policies unless directed to do so by Cisco Technical Support.
However, if you are creating an Ethernet adapter policy for a Windows OS (instead of using the default Windows adapter policy), you must use the following formulas to calculate values that work with Windows:
- Completion Queues = Transmit Queues + Receive Queues
- Interrupt Count = (Completion Queues + 2) rounded up to nearest power of 2
For example, if Transmit Queues = 1 and Receive Queues = 8 then:
- Completion Queues = 1 + 8 = 9
- Interrupt Count = (9 + 2) rounded up to the nearest power of 2 = 16
Configuring an Ethernet Adapter Policy
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . | ||
Step 3 | UCSC(policy-mgr) /org # create eth-policy policy-name |
Creates the specified Ethernet adapter policy and enters organization Ethernet policy mode. | ||
Step 4 | UCSC(policy-mgr) /org/eth-policy # set comp-queue count count | (Optional)
Configures the Ethernet completion queue. | ||
Step 5 | UCSC(policy-mgr) /org/eth-policy # set descr description | (Optional)
Provides a description for the policy.
| ||
Step 6 | UCSC(policy-mgr) /org/eth-policy # set failover timeout timeout-sec | (Optional)
Configures the Ethernet failover. | ||
Step 7 | UCSC(policy-mgr) /org/eth-policy # set interrupt {coalescing-time sec | coalescing-type {idle | min} | count count | mode {intx | msi | msi-x}} | (Optional)
Configures the Ethernet interrupt. | ||
Step 8 | UCSC(policy-mgr) /org/eth-policy # set offload {large-receive | tcp-rx-checksum | tcp-segment | tcp-tx-checksum} {disabled | enabled} | (Optional)
Configures the Ethernet offload. | ||
Step 9 | UCSC(policy-mgr) /org/eth-policy # set recv-queue {count count | ring-size size-num} | (Optional)
Configures the Ethernet receive queue. | ||
Step 10 | UCSC(policy-mgr) /org/eth-policy # set rss receivesidescaling {disabled | enabled} | (Optional)
Configures the RSS. | ||
Step 11 | UCSC(policy-mgr) /org/eth-policy # set trans-queue {count count | ring-size size-num} | (Optional)
Configures the Ethernet transmit queue. | ||
Step 12 | UCSC(policy-mgr) /org/eth-policy # commit-buffer |
Commits the transaction to the system configuration. |
The following example configures an Ethernet adapter policy, and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org* # create eth-policy EthPolicy19 UCSC(policy-mgr) /org/eth-policy* # set comp-queue count 16 UCSC(policy-mgr) /org/eth-policy* # set descr "This is an Ethernet adapter policy example." UCSC(policy-mgr) /org/eth-policy* # set failover timeout 300 UCSC(policy-mgr) /org/eth-policy* # set interrupt count 64 UCSC(policy-mgr) /org/eth-policy* # set offload large-receive disabled UCSC(policy-mgr) /org/eth-policy* # set recv-queue count 32 UCSC(policy-mgr) /org/eth-policy* # set rss receivesidescaling enabled UCSC(policy-mgr) /org/eth-policy* # set trans-queue UCSC(policy-mgr) /org/eth-policy* # commit-buffer UCSC(policy-mgr) /org/eth-policy #
Deleting an Ethernet Adapter Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # delete eth-policy policy-name |
Deletes the specified Ethernet adapter policy. |
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to delete an Ethernet adapter policy, and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # delete eth-policy EthPolicy19 UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
Server BIOS Settings
Cisco UCS provides two methods for making global modifications to the BIOS settings on servers in an Cisco UCS domain. You can create one or more BIOS policies that include a specific grouping of BIOS settings that match the needs of a server or set of servers, or you can use the default BIOS settings for a specific server platform.
Both the BIOS policy and the default BIOS settings for a server platform enable you to fine tune the BIOS settings for a server managed by Cisco UCS Central.
Depending upon the needs of the data center, you can configure BIOS policies for some service profiles and use the BIOS defaults in other service profiles in the same Cisco UCS domain, or you can use only one of them. You can also use Cisco UCS Central to view the actual BIOS settings on a server and determine whether they are meeting current needs.
Note | Cisco UCS Central pushes BIOS configuration changes through a BIOS policy or default BIOS settings to the Cisco Integrated Management Controller (CIMC) buffer. These changes remain in the buffer and do not take effect until the server is rebooted. We recommend that you verify the support for BIOS settings in the server that you want to configure. Some settings, such as Mirroring Mode for RAS Memory, are not supported by all Cisco UCS servers. |
- BIOS Policy
- Default BIOS Settings
- Creating a BIOS Policy
- Viewing the Actual BIOS Settings for a Server
- Modifying BIOS Defaults
- Deleting a BIOS Policy
- Main BIOS Settings
- Processor BIOS Settings
- Intel Directed I/O BIOS Settings
- RAS Memory BIOS Settings
- Serial Port BIOS Settings
- USB BIOS Settings
- PCI Configuration BIOS Settings
- Boot Options BIOS Settings
- Server Management BIOS Settings
BIOS Policy
The BIOS policy is a policy that automates the configuration of BIOS settings for a server or group of servers. You can create global BIOS policies available to all servers in the root organization, or you can create BIOS policies in sub-organizations that are only available to that hierarchy.
To use a BIOS policy, do the following:
-
Create the BIOS policy in Cisco UCS Central.
-
Assign the BIOS policy to one or more service profiles.
-
Associate the service profile with a server.
During service profile association, Cisco UCS Central modifies the BIOS settings on the server to match the configuration in the BIOS policy. If you do not create and assign a BIOS policy to a service profile, the server uses the default BIOS settings for that server platform.
Default BIOS Settings
Cisco UCS Central includes a set of default BIOS settings for each type of server supported by Cisco UCS. The default BIOS settings are available only in the root organization and are global. Only one set of default BIOS settings can exist for each server platform supported by Cisco UCS. You can modify the default BIOS settings, but you cannot create an additional set of default BIOS settings.
Each set of default BIOS settings are designed for a particular type of supported server and are applied to all servers of that specific type which do not have a BIOS policy included in their service profiles.
Unless a Cisco UCS implementation has specific needs that are not met by the server-specific settings, we recommend that you use the default BIOS settings that are designed for each type of server in the Cisco UCS domain.
Cisco UCS Central applies these server platform-specific BIOS settings as follows:
-
The service profile associated with a server does not include a BIOS policy.
-
The BIOS policy is configured with the platform-default option for a specific setting.
You can modify the default BIOS settings provided by Cisco UCS Central. However, any changes to the default BIOS settings apply to all servers of that particular type or platform. If you want to modify the BIOS settings for only certain servers, we recommend that you use a BIOS policy.
Creating a BIOS Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . |
Step 3 | Configure the BIOS settings | |
Step 4 | UCSC(policy-mgr) /org/bios-policy # commit-buffer |
Commits the transaction to the system configuration. |
The following example creates a BIOS policy under the root organization and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr)/ org #create bios-policy biosPolicy3 UCSC(policy-mgr) /org/bios-policy* # set numa-config numa-optimization enabled UCSC(policy-mgr) /org/bios-policy* # commit-buffer UCSC(policy-mgr) /org/bios-policy #
Viewing the Actual BIOS Settings for a Server
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr) # scope org org-name | Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # scope server chassis-id / server-id |
Enters chassis server mode for the specified server. |
Step 4 | UCSC(policy-mgr) /org /chassis/server # scope bios |
Enters BIOS mode for the specified server. |
Step 5 | UCSC(policy-mgr) /org /chassis/server/bios # scope bios-settings |
Enters BIOS settings mode for the specified server. |
Step 6 | UCSC(policy-mgr) /org /chassis/server/bios/bios-settings # show setting |
Displays the BIOS setting. Enter show ? to display a list of allowed values for setting . |
The following example displays a BIOS setting for blade 3 in chassis 1:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr)/org # scope server 1/3 UCSC(policy-mgr)/org /chassis/server # scope bios UCSC(policy-mgr)/org /chassis/server/bios # scope bios-settings UCSC(policy-mgr)/org /chassis/server/bios/bios-settings # show intel-vt-config Intel Vt Config: Vt -- Enabled UCSC(policy-mgr)/org /chassis/server/bios/bios-settings #
Modifying BIOS Defaults
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr)# scope org org-name | Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. | ||
Step 3 | UCSC(policy-mgr) /org # scope system | Enters system mode. | ||
Step 4 | UCSC(policy-mgr) /org /system # scope server-defaults |
Enters server defaults mode. | ||
Step 5 | UCSC(policy-mgr) /org /system/server-defaults # show platform |
(Optional) Displays platform descriptions for all servers. | ||
Step 6 | UCSC(policy-mgr) /org /system/server-defaults # scope platform platform-description |
Enters server defaults mode for the server specified. For the platform-description argument, enter the server description displayed by the show platform command using the following format: "vendor" model revision.
| ||
Step 7 | UCSC(policy-mgr) /org /system/server-defaults/platform # scope bios-settings |
Enters server defaults BIOS settings mode for the server. | ||
Step 8 | Reconfigure the BIOS settings. | | ||
Step 9 | UCSC(policy-mgr) /org /system/server-defaults/platform/bios-settings # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to change the NUMA default BIOS setting for a platform and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org UCSC(policy-mgr)/org# scope system UCSC(policy-mgr)/org /system # scope server-defaults UCSC(policy-mgr)/org /system/server-defaults # show platform Platform: Product Name Vendor Model Revision ------------ ---------- ---------- -------- Cisco B200-M1 Cisco Systems, Inc. N20-B6620-1 0 UCSC(policy-mgr)/org /system/server-defaults # scope platform "Cisco Systems, Inc." N20-B6620-1 0 UCSC(policy-mgr)/org /system/server-defaults/platform # scope bios-settings UCSC(policy-mgr)/org /system/server-defaults/platform/bios-settings # set numa-config numa-optimization disabled UCSC(policy-mgr)/org /system/server-defaults/platform/bios-settings* # commit-buffer UCSC(policy-mgr)/org /system/server-defaults/platform/bios-settings #
Deleting a BIOS Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # delete bios-policy policy-name |
Deletes the specified BIOS policy. |
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to delete a BIOS policy under the root organization and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr)/ org #delete bios-policy biosPolicy3 UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
Main BIOS Settings
The following table lists the main server BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
Name | Description |
---|---|
Reboot on BIOS Settings Change |
When the server is rebooted after you change one or more BIOS settings. If you enable this setting, the server is rebooted according to the maintenance policy in the server's service profile. For example, if the maintenance policy requires user acknowledgment, the server is not rebooted and the BIOS changes are not applied until a user acknowledges the pending activity. If you do not enable this setting, the BIOS changes are not applied until the next time the server is rebooted, whether as a result of another server configuration change or a manual reboot. |
Quiet Boot |
What the BIOS displays during Power On Self-Test (POST). This can be one of the following:
|
Post Error Pause |
What happens when the server encounters a critical error during POST. This can be one of the following: |
Resume Ac On Power Loss |
How the server behaves when power is restored after an unexpected power loss. This can be one of the following:
|
Front Panel Lockout |
Whether the power and reset buttons on the front panel are ignored by the server. This can be one of the following:
|
Processor BIOS Settings
The following table lists the processor BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
Name | Description | ||
---|---|---|---|
Turbo Boost |
Whether the processor uses Intel Turbo Boost Technology, which allows the processor to automatically increase its frequency if it is running below power, temperature, or voltage specifications. This can be one of the following: |
||
Enhanced Intel Speedstep |
Whether the processor uses Enhanced Intel SpeedStep Technology, which allows the system to dynamically adjust processor voltage and core frequency. This technology can result in decreased average power consumption and decreased average heat production. This can be one of the following:
We recommend that you contact your operating system vendor to make sure your operating system supports this feature. |
||
Hyper Threading |
Whether the processor uses Intel Hyper-Threading Technology, which allows multithreaded software applications to execute threads in parallel within each processor. This can be one of the following:
We recommend that you contact your operating system vendor to make sure the operating system supports this feature. |
||
Core Multi Processing |
Sets the state of logical processor cores per CPU in a package. If you disable this setting, Intel Hyper Threading technology is also disabled. This can be one of the following:
We recommend that you contact your operating system vendor to make sure your operating system supports this feature. |
||
Execute Disabled Bit |
Classifies memory areas on the server to specify where the application code can execute. As a result of this classification, the processor disables code execution if a malicious worm attempts to insert code in the buffer. This setting helps to prevent damage, worm propagation, and certain classes of malicious buffer overflow attacks. This can be one of the following:
We recommend that you contact your operating system vendor to make sure your operating system supports this feature. |
||
Virtualization Technology (VT) |
Whether the processor uses Intel Virtualization Technology, which allows a platform to run multiple operating systems and applications in independent partitions. This can be one of the following:
|
||
Hardware Pre-fetcher |
Whether the processor allows the Intel hardware prefetcher to fetch streams of data and instruction from memory into the unified second-level cache when necessary. This can be one of the following:
|
||
Adjacent Cache Line Pre-fetcher |
Whether the processor fetches cache lines in even/odd pairs instead of fetching just the required line. This can be one of the following:
|
||
DCU Streamer Pre-fetch |
Whether the processor uses the DCU IP Prefetch mechanism to analyze historical cache access patterns and preload the most relevant lines in the L1 cache. This can be one of the following:
|
||
DCU IP Pre-fetcher |
Whether the processor uses the DCU IP Prefetch mechanism to analyze historical cache access patterns and preload the most relevant lines in the L1 cache. This can be one of the following: |
||
Direct Cache Access |
Allows processors to increase I/O performance by placing data from I/O devices directly into the processor cache. This setting helps to reduce cache misses. This can be one of the following: |
||
Processor C State |
Whether the system can enter a power savings mode during idle periods. This can be one of the following:
We recommend that you contact your operating system vendor to make sure your operating system supports this feature. |
||
Processor C1E |
Allows the processor to transition to its minimum frequency upon entering C1. This setting does not take effect until after you have rebooted the server. This can be one of the following: |
||
Processor C3 Report |
Whether the processor sends the C3 report to the operating system. This can be one of the following:
On the Cisco UCS B440 Server, the BIOS Setup menu uses enabled and disabled for these options. If you specify acpi-c2 or acpi-c2, the server sets the BIOS value for that option to enabled. |
||
Processor C6 Report |
Whether the processor sends the C6 report to the operating system. This can be one of the following: |
||
Processor C7 Report |
Whether the processor sends the C7 report to the operating system. This can be one of the following: |
||
CPU Performance |
Sets the CPU performance profile for the server. This can be one of the following:
|
||
Max Variable MTRR Setting |
Allows you to select the number of mean time to repair (MTRR) variables. This can be one of the following: |
||
Local X2 APIC |
Allows you to set the type of Application Policy Infrastructure Controller (APIC) architecture. This can be one of the following:
|
||
Power Technology |
Enables you to configure the CPU power management settings for the following options: Power Technology can be one of the following:
|
||
Energy Performance |
Allows you to determine whether system performance or energy efficiency is more important on this server. This can be one of the following:
|
||
Frequency Floor Override |
Whether the CPU is allowed to drop below the maximum non-turbo frequency when idle. This can be one of the following:
|
||
P-STATE Coordination |
Allows you to define how BIOS communicates the P-state support model to the operating system. There are 3 models as defined by the Advanced Configuration and Power Interface (ACPI) specification.
|
||
DRAM Clock Throttling |
Allows you to tune the system settings between the memory bandwidth and power consumption. This can be one of the following:
|
||
Channel Interleaving |
Whether the CPU divides memory blocks and spreads contiguous portions of data across interleaved channels to enable simultaneous read operations. This can be one of the following: |
||
Rank Interleaving |
Whether the CPU interleaves physical ranks of memory so that one rank can be accessed while another is being refreshed. This can be one of the following: |
||
Demand Scrub |
Whether the system corrects single bit memory errors encountered when the CPU or I/O makes a demand read. This can be one of the following: |
||
Patrol Scrub |
Whether the system actively searches for, and corrects, single bit memory errors even in unused portions of the memory on the server. This can be one of the following:
|
||
Altitude |
This can be one of the following: |
||
Altitude |
The approximate number of meters above sea level at which the physical server is installed. This can be one of the following:
|
||
The amount of power available to the server components when they are idle. This can be one of the following:
|
Intel Directed I/O BIOS Settings
The following table lists the Intel Directed I/O BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
Name | Description | ||
---|---|---|---|
VT for Directed IO |
Whether the processor uses Intel Virtualization Technology for Directed I/O (VT-d). This can be one of the following:
|
||
Interrupt Remap |
Whether the processor supports Intel VT-d Interrupt Remapping. This can be one of the following: |
||
Coherency Support |
Whether the processor supports Intel VT-d Coherency. This can be one of the following: |
||
ATS Support |
Whether the processor supports Intel VT-d Address Translation Services (ATS). This can be one of the following: |
||
Pass Through DMA Support |
Whether the processor supports Intel VT-d Pass-through DMA. This can be one of the following: |
RAS Memory BIOS Settings
The following table lists the RAS memory BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
Name | Description |
---|---|
Memory RAS Config |
How the memory reliability, availability, and serviceability (RAS) is configured for the server. This can be one of the following:
|
NUMA |
Whether the BIOS supports NUMA. This can be one of the following:
|
Mirroring Mode |
Memory mirroring enhances system reliability by keeping two identical data images in memory. This option is only available if you choose the mirroring option for Memory RAS Config. It can be one of the following: |
Sparing Mode |
Sparing optimizes reliability by holding memory in reserve so that it can be used in case other DIMMs fail. This option provides some memory redundancy, but does not provide as much redundancy as mirroring. The available sparing modes depend on the current memory population. This option is only available if you choose sparing option for Memory RAS Config. It can be one of the following:
|
LV DDR Mode |
Whether the system prioritizes low voltage or high frequency memory operations. This can be one of the following:
|
DRAM Refresh Rate |
This option controls the refresh interval rate for internal memory. |
Serial Port BIOS Settings
The following table lists the serial port BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
Name | Description |
---|---|
Serial Port A |
Whether serial port A is enabled or disabled. This can be one of the following: |
USB BIOS Settings
The following table lists the USB BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
Name | Description |
---|---|
Make Device Non Bootable |
Whether the server can boot from a USB device. This can be one of the following: |
USB System Idle Power Optimizing Setting |
Whether the USB System Idle Power Optimizing setting is used to reduce USB EHCI idle power consumption. Depending upon the value you choose, this setting can have an impact on performance. This can be one of the following:
|
USB Front Panel Access Lock |
USB front panel lock is configured to enable or disable the front panel access to USB ports. This can be one of the following: |
PCI Configuration BIOS Settings
The following table lists the PCI configuration BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
Name | Description |
---|---|
Max Memory Below 4G |
Whether the BIOS maximizes memory usage below 4GB for an operating system without PAE support, depending on the system configuration. This can be one of the following: |
Memory Mapped IO Above 4Gb Config |
Whether to enable or disable memory mapped I/O of 64-bit PCI devices to 4GB or greater address space. Legacy option ROMs are not able to access addresses above 4GB. PCI devices that are 64-bit compliant but use a legacy option ROM may not function correctly with this setting enabled. This can be one of the following: |
Boot Options BIOS Settings
The following table lists the boot options BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
Name | Description |
---|---|
Boot Option Retry |
Whether the BIOS retries NON-EFI based boot options without waiting for user input. This can be one of the following: |
Intel Entry SAS RAID |
Whether the Intel SAS Entry RAID Module is enabled. This can be one of the following: |
Intel Entry SAS RAID Module |
How the Intel SAS Entry RAID Module is configured. This can be one of the following: |
Onboard SCU Storage Support |
Whether the onboard software RAID controller is available to the server. This can be one of the following: |
Server Management BIOS Settings
The following tables list the server management BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
General Settings
Name | Description |
---|---|
Assert Nmi on Serr |
Whether the BIOS generates a non-maskable interrupt (NMI) and logs an error when a system error (SERR) occurs. This can be one of the following:
|
Assert Nmi on Perr |
Whether the BIOS generates a non-maskable interrupt (NMI) and logs an error when a processor bus parity error (PERR) occurs. This can be one of the following:
|
OS Boot Watchdog Timer |
Whether the BIOS programs the watchdog timer with a predefined timeout value. If the operating system does not complete booting before the timer expires, the CIMC resets the system and an error is logged. This can be one of the following:
This feature requires either operating system support or Intel Management software. |
OS Boot Watchdog Timer Timeout Policy |
What action the system takes if the watchdog timer expires. This can be one of the following:
This option is only available if you enable the OS Boot Watchdog Timer. |
OS Boot Watchdog Timer Timeout |
What timeout value the BIOS uses to configure the watchdog timer. This can be one of the following:
This option is only available if you enable the OS Boot Watchdog Timer. |
Console Redirection Settings
Name | Description | ||
---|---|---|---|
Console Redirection |
Allows a serial port to be used for console redirection during POST and BIOS booting. After the BIOS has booted and the operating system is responsible for the server, console redirection is irrelevant and has no effect. This can be one of the following:
|
||
Flow Control |
Whether a handshake protocol is used for flow control. Request to Send / Clear to Send (RTS/CTS) helps to reduce frame collisions that can be introduced by a hidden terminal problem. This can be one of the following:
|
||
BAUD Rate |
What BAUD rate is used for the serial port transmission speed. If you disable Console Redirection, this option is not available. This can be one of the following:
|
||
Terminal Type |
What type of character formatting is used for console redirection. This can be one of the following:
|
||
Legacy OS Redirect |
Whether redirection from a legacy operating system, such as DOS, is enabled on the serial port. This can be one of the following:
|
IPMI Access Profile
This policy allows you to determine whether IPMI commands can be sent directly to the server, using the IP address. For example, you can send commands to retrieve sensor data from the CIMC. This policy defines the IPMI access, including a username and password that can be authenticated locally on the server, and whether the access is read-only or read-write.
You must include this policy in a service profile and that service profile must be associated with a server for it to take effect.
- Configuring an IPMI Access Profile
- Deleting an IPMI Access Profile
- Adding an Endpoint User to an IPMI Access Profile
- Deleting an Endpoint User from an IPMI Access Profile
Configuring an IPMI Access Profile
Obtain the following:
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . | ||
Step 3 | UCSC(policy-mgr) /org # create ipmi-access-profile profile-name |
Creates the specified IPMI access profile and enters organization IPMI access profile mode. | ||
Step 4 | UCSC(policy-mgr) /org/ipmi-access-profile # create ipmi-user ipmi-user-name |
Creates the specified endpoint user and enters organization IPMI access profile endpoint user mode.
| ||
Step 5 | UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user # set password |
Sets the password for the endpoint user. After entering the set password command, you are prompted to enter and confirm the password. For security purposes, the password that you type does not appear in the CLI. | ||
Step 6 | UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user # set privilege {admin | readonly} |
Specifies whether the endpoint user has administrative or read-only privileges. | ||
Step 7 | UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user # commit-buffer |
Commits the transaction to the system configuration. |
The following example creates an IPMI access profile named ReadOnly, creates an endpoint user named bob, sets the password and the privileges for bob, and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # create ipmi-access-profile ReadOnly UCSC(policy-mgr) /org/ipmi-access-profile* # create ipmi-user bob UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user* # set password Enter a password: Confirm the password: UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user* # set privilege readonly UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user* # commit-buffer UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user #
Include the IPMI profile in a service profile and/or template.
Deleting an IPMI Access Profile
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # delete ipmi-access-profile profile-name |
Deletes the specified IPMI access profile. |
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction to the system configuration. |
The following example deletes the IPMI access profile named ReadOnly and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # delete ipmi-access-profile ReadOnly UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
Adding an Endpoint User to an IPMI Access Profile
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . | ||
Step 3 | UCSC(policy-mgr) /org # scope ipmi-access-profile profile-name |
Enters organization IPMI access profile mode for the specified IPMI access profile. | ||
Step 4 | UCSC(policy-mgr) /org/ipmi-access-profile # create ipmi-user ipmi-user-name |
Creates the specified endpoint user and enters organization IPMI access profile endpoint user mode.
| ||
Step 5 | UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user # set password |
Sets the password for the endpoint user. After entering the set password command, you are prompted to enter and confirm the password. For security purposes, the password that you type does not appear in the CLI. | ||
Step 6 | UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user # set privilege {admin | readonly} |
Specifies whether the endpoint user has administrative or read-only privileges. | ||
Step 7 | UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user # commit-buffer |
Commits the transaction to the system configuration. |
The following example adds an endpoint user named alice to the IPMI access profile named ReadOnly and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org* # scope ipmi-access-profile ReadOnly UCSC(policy-mgr) /org/ipmi-access-profile* # create ipmi-user alice UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user* # set password Enter a password: Confirm the password: UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user* # set privilege readonly UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user* # commit-buffer UCSC(policy-mgr) /org/ipmi-access-profile/ipmi-user #
Deleting an Endpoint User from an IPMI Access Profile
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # scope ipmi-access-profile profile-name |
Enters organization IPMI access profile mode for the specified IPMI access profile. |
Step 4 | UCSC(policy-mgr) /org/ipmi-access-profile # delete ipmi-user epuser-name |
Deletes the specified endpoint user from the IPMI access profile. |
Step 5 | UCSC(policy-mgr) /org/ipmi-access-profile # commit-buffer |
Commits the transaction to the system configuration. |
The following example deletes the endpoint user named alice from the IPMI access profile named ReadOnly and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # scope ipmi-access-profile ReadOnly UCSC(policy-mgr) /org/ipmi-access-profile # delete ipmi-user alice UCSC(policy-mgr) /org/ipmi-access-profile* # commit-buffer UCSC(policy-mgr) /org/ipmi-access-profile #
Boot Policy
The Cisco UCS Manager boot policy overrides the boot order in the BIOS setup menu, and determines the following:
-
Selection of the boot device
-
Location from which the server boots
-
Order in which boot devices are invoked
For example, you can choose to have associated servers boot from a local device, such as a local disk or CD-ROM (VMedia), or you can select a SAN boot or a LAN (PXE) boot.
You must include this policy in a service profile, and that service profile must be associated with a server for it to take effect. If you do not include a boot policy in a service profile, Cisco UCS Manager applies the default boot policy.
Note | Changes to a boot policy might be propagated to all servers created with an updating service profile template that includes that boot policy. Reassociation of the service profile with the server to rewrite the boot order information in the BIOS is automatically triggered. |
Creating a Boot Policy
If you are creating a boot policy that boots the server from a SAN LUN and you require reliable SAN boot operations, you must first remove all local disks from servers associated with a service profile that includes the boot policy.
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . | ||
Step 3 | UCSC(policy-mgr) /org # create boot-policy policy-name [purpose {operational | utility}] |
Creates a boot policy with the specified policy name, and enters organization boot policy mode. When you create the boot policy, specify the operational option. This ensures that the server boots from the operating system installed on the server. The utility options is reserved and should only be used if instructed to do so by a Cisco representative. | ||
Step 4 | UCSC(policy-mgr) /org/boot-policy # set descr description | (Optional)
Provides a description for the boot policy.
| ||
Step 5 | UCSC(policy-mgr) /org/boot-policy # set reboot-on-update {no | yes} |
Specifies whether the servers using this boot policy are automatically rebooted after you make changes to the boot order. | ||
Step 6 | UCSC(policy-mgr) /org/boot-policy # set enforce-vnic-name {no | yes} |
If you choose yes, Cisco UCS Central uses any vNICs or vHBAs defined in the Boot Order. If you choose no, Cisco UCS Central uses the priority specified in the vNIC or vHBA. | ||
Step 7 | UCSC(policy-mgr) /org/boot-policy # commit-buffer |
Commits the transaction to the system configuration. |
The following example creates a boot policy named boot-policy-LAN, provides a description for the boot policy, specifies that servers using this policy will not be automatically rebooted when the boot order is changed, and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org* # create boot-policy boot-policy-LAN purpose operational UCSC(policy-mgr) /org/boot-policy* # set descr "Boot policy that boots from the LAN." UCSC(policy-mgr) /org/boot-policy* # set reboot-on-update no UCSC(policy-mgr) /org/boot-policy* # commit-buffer UCSC(policy-mgr) /org/boot-policy #
Configure one or more of the following boot options for the boot policy and set their boot order:
-
LAN Boot —Boots from a centralized provisioning server. It is frequently used to install operating systems on a server from that server.
If you choose the LAN Boot option, continue to Configuring a LAN Boot for a Boot Policy.
-
Storage Boot — Boots from an operating system image on the SAN. You can specify a primary and a secondary SAN boot. If the primary boot fails, the server attempts to boot from the secondary.
We recommend that you use a SAN boot, because it offers the most service profile mobility within the system. If you boot from the SAN, when you move a service profile from one server to another, the new server boots from exactly the same operating system image. Therefore, the new server appears to be exactly the same server to the network.
If you choose the Storage Boot option, continue to Configuring a SAN Boot for a Boot Policy.
-
Virtual Media Boot —Mimics the insertion of a physical CD into a server. It is typically used to manually install operating systems on a server.
If you choose the Virtual Media boot option, continue to Configuring a Virtual Media Boot for a Boot Policy.
LAN Boot
You can configure a boot policy to boot one or more servers from a centralized provisioning server on the LAN. A LAN (or PXE) boot is frequently used to install operating systems on a server from that LAN server.
You can add more than one type of boot device to a LAN boot policy. For example, you could add a local disk or virtual media boot as a secondary boot device.
Configuring a LAN Boot for a Boot Policy
Create a boot policy to contain the LAN boot configuration.
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . |
Step 3 | UCSC(policy-mgr) /org # scope boot-policy policy-name |
Enters organization boot policy mode for the specified boot policy. |
Step 4 | UCSC(policy-mgr) /org/boot-policy # create lan |
Creates a LAN boot for the boot policy and enters organization boot policy LAN mode. |
Step 5 | UCSC(policy-mgr) /org/boot-policy/lan # set order {1 | 2 | 3 | 4} |
Specifies the boot order for the LAN boot. |
Step 6 | UCSC(policy-mgr) /org/boot-policy/lan # create path {primary | secondary} |
Creates a primary or secondary LAN boot path and enters organization boot policy LAN path mode. |
Step 7 | UCSC(policy-mgr) /org/boot-policy/lan/path # set vnic vnic-name |
Specifies the vNIC to use for the LAN path to the boot image. |
Step 8 | UCSC(policy-mgr) /org/boot-policy/lan/path # commit-buffer |
Commits the transaction to the system configuration. |
The following example enters the boot policy named lab2-boot-policy, creates a LAN boot for the policy, sets the boot order to 2, creates primary and secondary paths using the vNICs named vNIC1 and vNIC2 , and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org* # scope boot-policy lab2-boot-policy UCSC(policy-mgr) /org/boot-policy* # create lan UCSC(policy-mgr) /org/boot-policy/lan* # set order 2 UCSC(policy-mgr) /org/boot-policy/lan* # create path primary UCSC(policy-mgr) /org/boot-policy/lan/path* # set vnic vNIC1 UCSC(policy-mgr) /org/boot-policy/lan/path* # exit UCSC(policy-mgr) /org/boot-policy/lan* # create path secondary UCSC(policy-mgr) /org/boot-policy/lan/path* # set vnic vNIC2 UCSC(policy-mgr) /org/boot-policy/lan/path* # commit-buffer UCSC(policy-mgr) /org/boot-policy/lan/path #
Include the boot policy in a service profile and/or template.
SAN Boot
You can configure a boot policy to boot one or more servers from an operating system image on the SAN. The boot policy can include a primary and a secondary SAN boot. If the primary boot fails, the server attempts to boot from the secondary.
We recommend that you use a SAN boot, because it offers the most service profile mobility within the system. If you boot from the SAN when you move a service profile from one server to another, the new server boots from the exact same operating system image. Therefore, the new server appears to be the exact same server to the network.
To use a SAN boot, ensure that the following is configured:
-
The Cisco UCS domain must be able to communicate with the SAN storage device that hosts the operating system image.
-
A boot target LUN on the device where the operating system image is located.
Note | SAN boot is not supported on Gen-3 Emulex adapters on Cisco UCS blade & rack servers. |
Configuring a SAN Boot for a Boot Policy
Note | We recommend that the boot order in a boot policy include either a local disk or a SUN LUN, but not both, to avoid the possibility of the server booting from the wrong storage type. If you configure a local disk and a SUN LUN for the boot order storage type and the operating system or logical volume manager (LVM) is configured incorrectly, the server might boot from the local disk rather than the SAN LUN. For example, on a server with Red Hat Linux installed, where the LVM is configures with default LV names and the boot order is configured with a SUN LUN and a local disk, Linux reports that there are two LVs with the same name and boots from the LV with the lowest SCSI ID, which could be the local disk. |
This procedure continues directly from Creating a Boot Policy.
Create a boot policy to contain the SAN boot configuration.
Note | If you are creating a boot policy that boots the server from a SAN LUN and you require reliable SAN boot operations, we recommend that you first remove all local disks from servers associated with a service profile that includes the boot policy. |
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . |
Step 3 | UCSC(policy-mgr) /org # scope boot-policy policy-name |
Enters organization boot policy mode for the specified boot policy. |
Step 4 | UCSC(policy-mgr) /org/boot-policy # create storage |
Creates a SAN boot for the boot policy and enters organization boot policy storage mode. |
Step 5 | UCSC(policy-mgr) /org/boot-policy/storage # set order {1 | 2 | 3 | 4} |
Sets the boot order for the SAN boot. |
Step 6 | UCSC(policy-mgr) /org/boot-policy/storage # create san-image {primary | secondary} |
Creates a SAN image location, and if the san-image option is specified, enters organization boot policy storage SAN image mode. The use of the terms primary or secondary boot devices does not imply a boot order. The effective order of boot devices within the same device class is determined by PCIe bus scan order. |
Step 7 | UCSC(policy-mgr) /org/boot-policy/storage/san-image # set vhba vhba-name |
Specifies the vHBA to be used for the SAN boot. |
Step 8 | UCSC(policy-mgr) /org/boot-policy/storage/san-image # create path {primary | secondary} |
Creates a primary or secondary SAN boot path and enters organization boot policy SAN path mode. The use of the terms primary or secondary boot devices does not imply a boot order. The effective order of boot devices within the same device class is determined by PCIe bus scan order. |
Step 9 | UCSC(policy-mgr) /org/boot-policy/storage/san-image/path # set {lun lun-id | wwn wwn-num} |
Specifies the LUN or WWN to be used for the SAN path to the boot image. |
Step 10 | UCSC(policy-mgr) /org/boot-policy/storage/san-image/path # commit-buffer |
Commits the transaction to the system configuration. |
The following example enters the boot policy named lab1-boot-policy, creates a SAN boot for the policy, sets the boot order to 1, creates a primary SAN image, uses a vHBA named vHBA2, creates primary path using LUN 967295200, and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org* # scope boot-policy lab1-boot-policy UCSC(policy-mgr) /org/boot-policy* # create storage UCSC(policy-mgr) /org/boot-policy/storage* # set order 1 UCSC(policy-mgr) /org/boot-policy/storage* # create san-image primary UCSC(policy-mgr) /org/boot-policy/storage* # set vhba vHBA2 UCSC(policy-mgr) /org/boot-policy/storage/san-image* # create path primary UCSC(policy-mgr) /org/boot-policy/storage/san-image/path* # set lun 967295200 UCSC(policy-mgr) /org/boot-policy/storage/san-image/path* # commit-buffer UCSC(policy-mgr) /org/boot-policy/storage/san-image/path #
Include the boot policy in a service profile and/or template.
iSCSI Boot
iSCSI boot enables a server to boot its operating system from an iSCSI target machine located remotely over a network.
iSCSI boot is supported on the following Cisco UCS hardware:
-
Cisco UCS blade servers that have the Cisco UCS M51KR-B Broadcom BCM57711 network adapter and use the default MAC address provided by Broadcom.
-
Cisco UCS M81KR Virtual Interface Card
-
Cisco UCS VIC-1240 Virtual Interface Card
-
Cisco UCS VIC-1280 Virtual Interface Card
-
Cisco UCS rack servers that have the Cisco UCS M61KR-B Broadcom BCM57712 network adapter.
-
Cisco UCS P81E Virtual Interface Card
-
Cisco UCS VIC1225 Virtual Interface Card
There are prerequisites that must be met before you configure iSCSI boot. For a list of these prerequisites, see iSCSI Boot Guidelines and Prerequisites.
- Configuring an iSCSI Boot for a Boot Policy
- Creating an iSCSI Adapter Policy
- Deleting an iSCSI Adapter Policy
- Creating an iSCSI Authentication Profile
- Deleting an iSCSI Authentication Profile
Configuring an iSCSI Boot for a Boot Policy
You can add up to two iSCSI vNICs per boot policy. One vNIC acts as the primary iSCSI boot source, and the other acts as the secondary iSCSI boot source.
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . |
Step 3 | UCSC(policy-mgr) /org # scope boot-policy policy-name |
Enters organization boot policy mode for the specified boot policy. |
Step 4 | UCSC(policy-mgr) /org/boot-policy # create iscsi |
Adds an iSCSI boot to the boot policy and enters iSCSI mode. |
Step 5 | UCSC(policy-mgr) /org/boot-policy/iscsi # create path {primary | secondary} |
Specifies the primary and secondary paths that Cisco UCS Central uses to reach the iSCSI target. With iSCSI boot, you set up two paths. Cisco UCS Central uses the primary path first, and if that fails, then it uses the secondary path. |
Step 6 | UCSC(policy-mgr) /org/boot-policy/iscsi/path # set iscsivnicname vnic-name |
Specifies the vNIC to use for the iSCSI path to the boot image. |
Step 7 | UCSC(policy-mgr) /org/boot-policy/iscsi/path # exit |
Exits iSCSI path mode. |
Step 8 | UCSC(policy-mgr) /org/boot-policy/iscsi # set order ordernum |
Specifies the order for the iSCSI boot in the boot order. |
Step 9 | UCSC(policy-mgr) /org/boot-policy/iscsi # commit-buffer |
Commits the transaction to the system configuration. |
The following example enters the boot policy named lab2-boot-policy, creates an iSCSI boot for the policy, creates primary and secondary paths using the vNICs named vNIC1 and vNIC2, sets the boot order to 2, and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org* # scope boot-policy lab2-boot-policy UCSC(policy-mgr) /org/boot-policy # create iscsi UCSC(policy-mgr) /org/boot-policy/iscsi* # create path primary UCSC(policy-mgr) /org/boot-policy/iscsi/path* # set vnic vNIC1 UCSC(policy-mgr) /org/boot-policy/iscsi/path* # exit UCSC(policy-mgr) /org/boot-policy/iscsi* # set order 2 UCSC(policy-mgr) /org/boot-policy/iscsi* # create path secondary UCSC(policy-mgr) /org/boot-policy/iscsi/path* # set vnic vNIC2 UCSC(policy-mgr) /org/boot-policy/iscsi/path* # commit-buffer UCSC(policy-mgr) /org/boot-policy/iscsi/path #
Include the boot policy in a service profile and/or template.
Creating an iSCSI Adapter Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # create iscsi-policy policy-name |
Creates the iSCSI adapter policy. |
Step 4 | UCSC(policy-mgr) /org/iscsi-policy # set descr description | (Optional)
Provides a description for the iSCSI adapter policy. |
Step 5 | UCSC(policy-mgr) /org/iscsi-policy # set iscsi-protocol-item connection-timeout timeout-secs | The number of seconds until Cisco UCS Central assumes that the initial login has failed and the iSCSI adapter is unavailable. Enter an integer between 0 and 255. If you enter 0, Cisco UCS Central uses the value set in the adapter firmware (default: 15 seconds). |
Step 6 | UCSC(policy-mgr) /org/iscsi-policy # set iscsi-protocol-item dhcp-timeout timeout-secs | The number of seconds to wait before the initiator assumes that the DHCP server in unavailable. Enter an integer between 60 and 300 (default: 60 seconds). |
Step 7 | UCSC(policy-mgr) /org/iscsi-policy # set iscsi-protocol-item lun-busy-retry-count num | The number of times to retry the connection in case of a failure during iSCSI LUN discovery. Enter an integer between 0 and 60. If you enter 0, Cisco UCS Central uses the value set in the adapter firmware (default: 15 seconds). |
Step 8 | UCSC(policy-mgr) /org/iscsi-policy # set iscsi-protocol-item tcp-time-stamp {no | yes} |
Specifies whether to apply a TCP timestamp. With this setting, transmitted packets are given a time stamp of when the packet was sent so that the packet's round-trip time can be calculated, when needed. This setting applies only to Cisco UCS M51KR-B Broadcom BCM57711 adapters. |
Step 9 | UCSC(policy-mgr) /org/iscsi-policy # set iscsi-protocol-item hbamode {no | yes} |
Specifies whether to enable HBA mode. This option should only be enabled for servers with the Cisco UCS NIC M51KR-B adapter running the Windows operating system. |
Step 10 | UCSC(policy-mgr) /org/iscsi-policy # set iscsi-protocol-item boottotarget {no | yes} |
Specifies whether to boot from the iSCSI target. This option only applies to servers with the Cisco UCS NIC M51KR-B adapter. It should be disabled until you have installed an operating system on the server. |
Step 11 | UCSC(policy-mgr) /org/iscsi-policy # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to create an iSCSI adapter policy called iscsiboot, set the connection timeout, DHCP timeout, and LUN busy retry count, apply a TCP timestamp, and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCS-AUCSC(policy-mgr)UCS-A /org # create iscsi-policy iscsiboot UCSC(policy-mgr) /org/iscsi-policy* # set iscsi-protocol-item connection-timeout 60 UCSC(policy-mgr) /org/iscsi-policy* # set iscsi-protocol-item dhcp-timeout 200 UCSC(policy-mgr) /org/iscsi-policy* # set iscsi-protocol-item lun-busy-retry-count 5 UCSC(policy-mgr) /org/iscsi-policy* # set iscsi-protocol-item tcp-time-stamp yes UCSC(policy-mgr) /org/iscsi-policy* # set iscsi-protocol-item hbamode yes UCSC(policy-mgr) /org/iscsi-policy* # set iscsi-protocol-item boottotarget yes UCSC(policy-mgr) /org/iscsi-policy* # commit-buffer UCSC(policy-mgr) /org/iscsi-policy #
Include the adapter policy in a service profile and/or template.
Deleting an iSCSI Adapter Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # delete iscsi-policy policy-name |
Deletes the iSCSI adapter policy. |
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to delete an iSCSI adapter policy named iscsi-adapter-pol and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # delete iscsi-policy iscsi-adapter-pol UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
Creating an iSCSI Authentication Profile
If you use authentication for iSCSI boot, you need to create an authentication profile for both the initiator and target.
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # create auth-profile profile-name |
Creates an authentication profile with the specified name. The name can be up to 16 alphanumeric characters. |
Step 4 | UCSC(policy-mgr) /org/auth-profile # set user-id id-name | Creates a log in for authentication. |
Step 5 | UCSC(policy-mgr) /org/auth-profile # set password | Creates a password for authentication. |
Step 6 | UCSC(policy-mgr) /org/auth-profile # commit-buffer |
Commits the transaction to the system configuration. |
Step 7 | UCSC(policy-mgr) /org/auth-profile # exit | Exits the current mode. |
Step 8 | Repeat steps 3 through 7 to create an authentication profile for the target. | |
Step 9 | UCSC(policy-mgr) /org/auth-profile # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to create an authentication profile for an initiator and target and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org UCSC(policy-mgr) /org # create auth-profile InitAuth UCSC(policy-mgr) /org/auth-profile* # set user-id init UCSC(policy-mgr) /org/auth-profile* # set password Enter a password: Confirm the password: UCSC(policy-mgr) /org/auth-profile* # commit-buffer UCSC(policy-mgr) /org/auth-profile # exit UCSC(policy-mgr) /org # create auth-profile TargetAuth UCSC(policy-mgr) /org/auth-profile* # set user-id target UCSC(policy-mgr) /org/auth-profile* # set password Enter a password: Confirm the password: UCSC(policy-mgr) /org/auth-profile* # commit-buffer UCSC(policy-mgr) /org/auth-profile # exit
Create an Ethernet vNIC to be used as the overlay vNIC for the iSCSI device, and then create an iSCSI vNIC.
Deleting an iSCSI Authentication Profile
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # delete auth-profile profile-name |
Deletes the specified iSCSI authentication profile. |
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to delete an iSCSI authentication profile and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org UCSC(policy-mgr) /org # delete auth-profile InitAuth UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
Virtual Media Boot
You can configure a boot policy to boot one or more servers from a virtual media device that is accessible from the server. A virtual media device mimics the insertion of a physical CD/DVD disk (read-only) or floppy disk (read-write) into a server. This type of server boot is typically used to manually install operating systems on a server.
Configuring a Virtual Media Boot for a Boot Policy
Note | Virtual Media requires the USB to be enabled. If you modify the BIOS settings that affect the USB functionality, you also affect the Virtual Media. Therefore, we recommend that you leave the following USB BIOS defaults for best performance: |
Create a boot policy to contain the virtual media boot configuration.
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . |
Step 3 | UCSC(policy-mgr) /org # scope boot-policy policy-name |
Enters organization boot policy mode for the specified boot policy. |
Step 4 | UCSC(policy-mgr) /org/boot-policy # create virtual-media {read-only | read-write} |
Creates a virtual media boot for the boot policy, specifies whether the virtual media is has read-only or read-write privileges, and enters organization boot policy virtual media mode. |
Step 5 | UCSC(policy-mgr) /org/boot-policy/virtual-media # set order {1 | 2 | 3 | 4} |
Sets the boot order for the virtual-media boot. |
Step 6 | UCSC(policy-mgr) /org/boot-policy/virtual-media # commit-buffer |
Commits the transaction to the system configuration. |
The following example enters the boot policy named lab3-boot-policy, creates a virtual media boot with read-only privileges for the policy, sets the boot order to 3, and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org* # scope boot-policy lab3-boot-policy UCSC(policy-mgr) /org/boot-policy* # create virtual-media read-only UCSC(policy-mgr) /org/boot-policy/virtual-media* # set order 3 UCSC(policy-mgr) /org/boot-policy/virtual-media* # commit-buffer
Include the boot policy in a service profile and/or template.
Deleting a Boot Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # delete boot-policy policy-name |
Deletes the specified boot policy. |
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to delete a boot policy and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # delete boot-policy boot-policy-LAN UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
Local Disk Configuration Policy
This policy configures any optional SAS local drives that have been installed on a server through the onboard RAID controller of the local drive. This policy enables you to set a local disk mode for all servers that are associated with a service profile that includes the local disk configuration policy.
The local disk modes include the following:
-
No Local Storage—For a diskless server or a SAN only configuration. If you select this option, you cannot associate any service profile which uses this policy with a server that has a local disk.
-
RAID 0 Striped—Data is striped across all disks in the array, providing fast throughput. There is no data redundancy, and all data is lost if any disk fails.
-
RAID 1 Mirrored—Data is written to two disks, providing complete data redundancy if one disk fails. The maximum array size is equal to the available space on the smaller of the two drives.
-
Any Configuration—For a server configuration that carries forward the local disk configuration without any changes.
-
No RAID—For a server configuration that removes the RAID and leaves the disk MBR and payload unaltered.
If you choose No RAID and you apply this policy to a server that already has an operating system with RAID storage configured, the system does not remove the disk contents. Therefore, there may be no visible differences on the server after you apply the No RAID mode. This can lead to a mismatch between the RAID configuration in the policy and the actual disk configuration shown in the tab for the server.
To make sure that any previous RAID configuration information is removed from a disk, apply a scrub policy that removes all disk information after you apply the No RAID configuration mode.
-
RAID 5 Striped Parity—Data is striped across all disks in the array. Part of the capacity of each disk stores parity information that can be used to reconstruct data if a disk fails. RAID 5 provides good data throughput for applications with high read request rates.
-
RAID 6 Striped Dual Parity—Data is striped across all disks in the array and two parity disks are used to provide protection against the failure of up to two physical disks. In each row of data blocks, two sets of parity data are stored.
-
RAID 10 Mirrored and Striped—RAID 10 uses mirrored pairs of disks to provide complete data redundancy and high throughput rates.
-
RAID 50 Striped Parity and Striped —Data is striped across multiple striped parity disk sets to provide high throughput and multiple disk failure tolerance.
-
RAID 60 Striped Dual Parity and Striped —Data is striped across multiple striped dual parity disk sets to provide high throughput and greater disk failure tolerance.
You must include this policy in a service profile and that service profile must be associated with a server for the policy to take effect.
- Guidelines for all Local Disk Configuration Policies
- Guidelines for Local Disk Configuration Policies Configured for RAID
- Creating a Local Disk Configuration Policy
- Viewing a Local Disk Configuration Policy
- Deleting a Local Disk Configuration Policy
Guidelines for all Local Disk Configuration Policies
Before you create a local disk configuration policy, consider the following guidelines:
No Mixed HDDs and SSDs
Do not include HDDs and SSDs in a single server or RAID configuration.
Do Not Assign a Service Profile with the Default Local Disk Configuration Policy from a B200 M1 or M2 to a B200 M3
Due to the differences in the RAID/JBOD support provided by the storage controllers of B200 M1 and M2 servers and those of the B200 M3 server, you cannot assign or re-assign a service profile that includes the default local disk configuration policy from a B200M1 or M2 server to a B200 M3 server. The default local disk configuration policy includes those with Any Configuration or JBOD configuration.
JBOD Mode Support
Note | Only B200 M1, B200 M2, B200 M3, B250 M1, B250 M2 and B22 M3 blade servers support the JBOD mode for local disks. |
Guidelines for Local Disk Configuration Policies Configured for RAID
Configure RAID Settings in Local Disk Configuration Policy for Servers with MegaRAID Storage Controllers
If a blade server or integrated rack-mount server has a MegaRAID controller, you must configure RAID settings for the drives in the Local Disk Configuration policy included in the service profile for that server. You can do this either by configuring the local disk configuration policy in the service profile using one of the defined RAID modes for that server, or you can use the Any Configuration mode with the LSI Utilities toolset to create the RAID volumes.
If you do not configure your RAID LUNs before installing the OS, disk discovery failures might occur during the installation and you might see error messages such as “No Device Found.”
Server May Not Boot After RAID1 Cluster Migration if Any Configuration Mode Specified in Service Profile
After RAID1 clusters are migrated, you need to associate a service profile with the server. If the local disk configuration policy in the service profile is configured with Any Configuration mode rather than RAID1, the RAID LUN remains in "inactive" state during and after association. As a result, the server cannot boot.
To avoid this issue, ensure that the service profile you associate with the server contains the identical local disk configuration policy as the original service profile before the migration and does not include the Any Configuration mode.
Do Not Use JBOD Mode on Servers with MegaRAID Storage Controllers
Do not configure or use JBOD mode or JBOD operations on any blade server or integrated rack-mount server with a MegaRAID storage controllers. JBOD mode and operations are not intended for nor are they fully functional on these servers.
Maximum of One RAID Volume and One RAID Controller in Integrated Rack-Mount Servers
A rack-mount server that has been integrated with Cisco UCS Manager and is registered with Cisco UCS Central can have a maximum of one RAID volume irrespective of how many hard drives are present on the server.
All the local hard drives in an integrated rack-mount server must be connected to only one RAID Controller. Integration with Cisco UCS Manager does not support the connection of local hard drives to multiple RAID Controllers in a single rack-mount server. We therefore recommend that you request a single RAID Controller configuration when you order rack-mount servers to be integrated with Cisco UCS Manager.
In addition, do not use third party tools to create multiple RAID LUNs on rack-mount servers. Cisco UCS Manager does not support that configuration.
Maximum of One RAID Volume and One RAID Controller in Blade Servers
A blade server can have a maximum of one RAID volume irrespective of how many drives are present in the server. All the local hard drives must be connected to only one RAID controller. For example, a B200 M3 server has an LSI controller and an Intel Patsburg controller, but only the LSI controller can be used as a RAID controller.
In addition, do not use third party tools to create multiple RAID LUNs on blade servers. Cisco UCS Central does not support that configuration.
Number of Disks Selected in Mirrored RAID Should Not Exceed Two
If the number of disks selected in the Mirrored RAID exceed two, RAID 1 is created as a RAID 10 LUN. This issue can occur with the Cisco UCS B440 M1 and B440 M2 servers.
License Required for Certain RAID Configuration Options on Some Servers
Some Cisco UCS servers require a license for certain RAID configuration options. When Cisco UCS Central associates a service profile containing this local disk policy with a server, Cisco UCS Central verifies that the selected RAID option is properly licensed. If there are issues, Cisco UCS Central displays a configuration error during the service profile association.
For RAID license information for a specific Cisco UCS server, see the Hardware Installation Guide for that server.
B420 M3 Server Does Not Support All Configuration Modes
The B420 M3 server does not support the following configuration modes in a local disk configuration policy:
In addition, the B420 M3 does not support JBOD modes or operations.
Single-Disk RAID 0 Configurations Not Supported on Some Blade Servers
A single-disk RAID 0 configuration is not supported in the following blade servers:
Creating a Local Disk Configuration Policy
Command or Action | Purpose | |||||
---|---|---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||||
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . | ||||
Step 3 | UCSC(policy-mgr) /org # create local-disk-config-policy policy-name |
Creates a local disk configuration policy and enters local disk configuration policy mode. | ||||
Step 4 | UCSC(policy-mgr) /org/local-disk-config-policy # set descr description | (Optional)
Provides a description for the local disk configuration policy. | ||||
Step 5 | UCSC(policy-mgr) /org/local-disk-config-policy # set mode {any-configuration | no-local-storage | no-raid | raid-0-striped | raid-1-mirrored | raid-5-striped-parity | raid-6-striped-dual-parity | raid-10-mirrored-and-striped} |
Specifies the mode for the local disk configuration policy. | ||||
Step 6 | UCSC(policy-mgr) /org/local-disk-config-policy # set protect {yes | no} |
Specifies whether the server retains the configuration in the local disk configuration policy even if the server is disassociated from the service profile.
When a service profile is disassociated from a server and a new service profile associated, the setting for the Protect Configuration property in the new service profile takes precedence and overwrites the setting in the previous service profile.
| ||||
Step 7 | UCSC(policy-mgr) /org/local-disk-config-policy # commit-buffer |
Commits the transaction to the system configuration. |
The following example configures a local disk configuration policy and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # create local-disk-config-policy DiskPolicy7 UCSC(policy-mgr) /org/local-disk-config-policy* # set mode raid-1-mirrored UCSC(policy-mgr) /org/local-disk-config-policy* # set protect yes UCSC(policy-mgr) /org/local-disk-config-policy* # commit-buffer UCSC(policy-mgr) /org/local-disk-config-policy #
Viewing a Local Disk Configuration Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . |
Step 3 | UCSC(policy-mgr) /org # show local-disk-config-policy policy-name |
Displays the local disk policy. If you have not configured a local disk policy, the local disk configuration (created by the create local-disk-config command) displays. Displays the local disk definition (set by the create local-disk-config command). If the serial over LAN definition is not set, and if a policy is set (using the set local-disk-config-policy command), then the policy will be displayed. |
The following example shows how to display local disk policy information for a local disk configuration policy called DiskPolicy7:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # show local-disk-config-policy DiskPolicy7 Local Disk Config Policy: Name: DiskPolicy7 Mode: Raid 1 Mirrored Description: Protect Configuration: Yes
Deleting a Local Disk Configuration Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # delete local-disk-config-policy policy-name |
Deletes the specified local disk configuration policy. |
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction to the system configuration. |
The following example deletes the local disk configuration policy named DiskPolicy7 and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # delete local-disk-config-policy DiskPolicy7 UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
Power Control Policy
Cisco UCS uses the priority set in the power control policy, along with the blade type and configuration, to calculate the initial power allocation for each blade within a chassis. During normal operation, the active blades within a chassis can borrow power from idle blades within the same chassis. If all blades are active and reach the power cap, service profiles with higher priority power control policies take precedence over service profiles with lower priority power control policies.
Priority is ranked on a scale of 1-10, where 1 indicates the highest priority and 10 indicates lowest priority. The default priority is 5.
For mission-critical application a special priority called no-cap is also available. Setting the priority to no-cap prevents Cisco UCS from leveraging unused power from a particular server. With this setting, the server is allocated the maximum amount of power possible for that type of server.
Note | You must include this policy in a service profile and that service profile must be associated with a server for it to take effect. |
Creating a Power Control Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # create power-control-policy policy-name |
Creates a power control policy and enters power control policy mode. |
Step 4 | UCSC(policy-mgr) /org/power-control-policy # set priority {priority-num | no-cap} |
Specifies the priority for the power control policy. |
Step 5 | UCSC(policy-mgr) /org/power-control-policy # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to create a power control policy and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # create power-control-policy PCP-1 UCSC(policy-mgr) /org/power-control-policy* # set priority 1 UCSC(policy-mgr) /org/power-control-policy* # commit-buffer UCSC(policy-mgr) /org/power-control-policy #
Deleting a Power-Control-Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # delete power-control-policy policy-name |
Deletes the specified power control policy. |
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to delete a power control policy and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # delete power-control-policy PCP-1 UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
Scrub Policy
This policy determines what happens to local data and to the BIOS settings on a server during the discovery process, when the server is reacknowledged, or when the server is disassociated from a service profile.
Note | Local disk scrub policies only apply to hard drives that are managed by Cisco UCS Manager and do not apply to other devices such as USB drives. |
Depending upon how you configure a scrub policy, the following can occur at those times:
Disk scrub
One of the following occurs to the data on any local drives on disassociation:
BIOS Settings Scrub
One of the following occurs to the BIOS settings when a service profile containing the scrub policy is disassociated from a server:
FlexFlash Scrub
FlexFlash Scrub enables you to pair new or degraded SD cards, resolve FlexFlash metadata configuration failures, and migrate older SD cards with 4 partitions to single partition SD cards. One of the following occurs to the SD card when a service profile containing the scrub policy is disassociated from a server, or when the server is reacknowledged:
-
If enabled, the HV partition on the SD card is formatted using the PNUOS formatting utility. If two SD cards are present, the cards are RAID-1 paired, and the HV partitions in both cards are marked as valid. The card in slot 1 is marked as primary, and the card in slot 2 is marked as secondary.
-
If disabled, preserves the existing SD card settings.
Note |
|
Creating a Scrub Policy
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . | ||
Step 3 | UCSC(policy-mgr) /org # create scrub-policy policy-name |
Creates a scrub policy with the specified policy name, and enters organization scrub policy mode. | ||
Step 4 | UCSC(policy-mgr) /org/scrub-policy # set descr description | (Optional)
Provides a description for the scrub policy.
| ||
Step 5 | UCSC(policy-mgr) /org/scrub-policy # set disk-scrub {no | yes} |
| ||
Step 6 | UCSC(policy-mgr) /org/scrub-policy # set bios-settings-scrub {no | yes} |
| ||
Step 7 | UCSC(policy-mgr) /org/scrub-policy # commit-buffer |
Commits the transaction to the system configuration. |
The following example creates a scrub policy named ScrubPolicy2, enables disk scrubbing on servers using the scrub policy, and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # create scrub-policy ScrubPolicy2 UCSC(policy-mgr) /org/scrub-policy* # set descr "Scrub disk but not BIOS." UCSC(policy-mgr) /org/scrub-policy* # set disk-scrub yes UCSC(policy-mgr) /org/scrub-policy* # set bios-settings-scrub no UCSC(policy-mgr) /org/scrub-policy* # commit-buffer UCSC(policy-mgr) /org/scrub-policy #
Deleting a Scrub Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # delete scrub-policy policy-name |
Deletes the specified scrub policy. |
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction to the system configuration. |
The following example deletes the scrub policy named ScrubPolicy2 and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # delete scrub-policy ScrubPolicy2 UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
Serial over LAN Policy
This policy sets the configuration for the serial over LAN connection for all servers associated with service profiles that use the policy. By default, the serial over LAN connection is disabled.
If you implement a serial over LAN policy, we recommend that you also create an IPMI profile.
You must include this policy in a service profile and that service profile must be associated with a server for it to take effect.
Configuring a Serial over LAN Policy
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. | ||
Step 3 | UCSC(policy-mgr) /org # create sol-policy policy-name |
Creates a serial over LAN policy and enters organization serial over LAN policy mode. | ||
Step 4 | UCSC(policy-mgr) /org/sol-policy # set descr description | (Optional)
Provides a description for the policy.
| ||
Step 5 | UCSC(policy-mgr) /org/sol-policy # set speed {115200 | 19200 | 38400 | 57600 | 9600} |
Specifies the serial baud rate. | ||
Step 6 | UCSC(policy-mgr) /org/sol-policy # {disable | enable} |
Disables or enables the serial over LAN policy. By default, the serial over LAN policy is disabled; you must enable it before it can be applied. | ||
Step 7 | UCSC(policy-mgr) /org/sol-policy # commit-buffer |
Commits the transaction to the system configuration. |
The following example creates a serial over LAN policy named Sol9600, provides a description for the policy, sets the speed to 9,600 baud, enables the policy, and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # create sol-policy Sol9600 UCSC(policy-mgr) /org/sol-policy* # set descr "Sets serial over LAN policy to 9600 baud." UCSC(policy-mgr) /org/sol-policy* # set speed 9600 UCSC(policy-mgr) /org/sol-policy* # enable UCSC(policy-mgr) /org/sol-policy* # commit-buffer UCSC(policy-mgr) /org/sol-policy #
Viewing a Serial over LAN Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . |
Step 3 | UCSC(policy-mgr) /org # show sol-policy policy-name |
Displays the serial over LAN definition (set by the create sol-config command). If the serial over LAN definition is not set, and if a policy is set (using the set sol-policy command), then the policy will be displayed. |
The following example shows how to display serial over LAN information for a serial over LAN policy called Sol9600:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # show sol-policy Sol9600 SOL Policy: Full Name: Sol9600 SOL State: Enable Speed: 9600 Description:
Server Pool Policy Qualifications
This policy qualifies servers based on the inventory of a server conducted during the discovery process. The qualifications are individual rules that you configure in the policy to determine whether a server meets the selection criteria. For example, you can create a rule that specifies the minimum memory capacity for servers in a data center pool.
Qualifications are used in other policies to place servers, not just by the server pool policies. For example, if a server meets the criteria in a qualification policy, it can be added to one or more server pools or have a service profile automatically associated with it.
You can use the server pool policy qualifications to qualify servers according to the following criteria:
-
Adapter type
-
Chassis location
-
Memory type and configuration
-
Power group
-
CPU cores, type, and configuration
-
Storage configuration and capacity
-
Server model
Depending upon the implementation, you might need to configure several policies with server pool policy qualifications including the following:
- Creating a Server Pool Qualification Policy
- Creating a Domain Qualification for a Policy Qualification
- Creating an Adapter Qualification for a Policy Qualification
- Deleting a Server Pool Policy Qualification
- vNIC/vHBA Placement Policies
Creating a Server Pool Qualification Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # create server-qual server-qual-name |
Creates a server pool qualification with the specified name, and enters organization server qualification mode. |
Step 4 | UCSC(policy-mgr) /org/server-qual # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to create a server pool qualification named ServPoolQual22 and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org* # create server-qual ServPoolQual22 UCSC(policy-mgr) /org/server-qual* # commit-buffer UCSC(policy-mgr) /org/server-qual #
Creating a Domain Qualification for a Policy Qualification
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # scope server-qual server-qual-name |
Enters server qualification mode for the specified server pool policy qualification. |
Step 4 | UCSC(policy-mgr) /org/server-qual # create domain-qual domain-qual-name |
Creates the specified domain qualification and enters domain qualification mode. |
Step 5 | UCSC(policy-mgr) /org/server-qual/domain-qual # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to add a domain qualification to a server pool policy qualification and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # scope server-qual ServPoolQual22 UCSC(policy-mgr) /org/server-qual # create domain-qual TestDomain UCSC(policy-mgr) /org/server-qual/domain-qual* # commit-buffer UCSC(policy-mgr) /org/server-qual/domain-qual #
Creating an Adapter Qualification for a Policy Qualification
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr) # scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. |
Step 3 | UCSC(policy-mgr) /org # scope server-qual server-qual-name |
Enters server qualification mode for the specified server pool policy qualification. |
Step 4 | UCSC(policy-mgr) /org/server-qual # create adapter |
Creates the specified adapter qualification and enters adapter qualification mode. |
Step 5 | UCSC(policy-mgr) /org/server-qual/adapter # create cap-qual adapter-type |
Creates an adapter capacity qualification for the specified adapter type and enters organization server qualification adapter capacity qualification mode. The adapter-type argument can be any of the following values:
|
Step 6 | UCSC(policy-mgr) /org/server-qual/adapter/cap-qual # set maximum {max-cap | unspecified} |
Specifies the maximum capacity for the selected adapter type. |
Step 7 | UCSC(policy-mgr) /org/server-qual/adapter/cap-qual # set pid-regex regex |
Specifies the regular expression that the PID must match. |
Step 8 | UCSC(policy-mgr) /org/server-qual/adapter/cap-qual # commit-buffer |
Commits the transaction to the system configuration. |
The following example shows how to add a domain qualification to a server pool policy qualification and commit the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # scope server-qual ServPoolQual22 UCSC(policy-mgr) /org/server-qual # create adapter TestAdapter UCSC(policy-mgr) /org/server-qual/adapter* # create cap-qual non-virtualized-eth-if UCSC(policy-mgr) /org/server-qual/adapter/cap-qual* # set maximum unspecified UCSC(policy-mgr) /org/server-qual/adapter/cap-qual* # commit-buffer UCSC(policy-mgr) /org/server-qual/adapter/cap-qual #
Deleting a Server Pool Policy Qualification
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . |
Step 3 | UCSC(policy-mgr) /org # delete server-qual server-qual-name |
Deletes the specified server pool qualification. |
Step 4 | UCSC(policy-mgr) /org/server-qual # commit-buffer |
Commits the transaction to the system configuration. |
The following example deletes the server pool qualification named ServPoolQual22 and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org* # delete server-qual ServPoolQual22 UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #
vNIC/vHBA Placement Policies
vNIC/vHBA placement policies are used to determine the following:
-
How the virtual network interface connections (vCons) are mapped to the physical adapters on a server.
-
What types of vNICs or vHBAs can be assigned to each vCon.
Each vNIC/vHBA placement policy contains four vCons that are virtual representations of the physical adapters. When a vNIC/vHBA placement policy is assigned to a service profile, and the service profile is associated with a server, the vCons in the vNIC/vHBA placement policy are assigned to the physical adapters and the vNICs and vHBAs are assigned to those vCons.
For blade or rack servers that contain one adapter, Cisco UCS assigns all vCons to that adapter. For servers that contain four adapters, Cisco UCS assigns vCon1 to Adapter1, vCon2 to Adapter2, vCon3 to Adapter3, and vCon4 to Adapter4.
For blade or rack servers that contain two or three adapters, Cisco UCS assigns the vCons based on the type of server and the selected virtual slot mapping scheme, which can be Round Robin or Linear Ordered. For details about the available mapping schemes, see vCon to Adapter Placement.
After Cisco UCS assigns the vCons, it assigns the vNICs and vHBAs based on the Selection Preference for each vCon. This can be one of the following:
- —All configured vNICs and vHBAs can be assigned to the vCon, whether they are explicitly assigned to it, unassigned, or dynamic. This is the default.
- —vNICs and vHBAs must be explicitly assigned to the vCon. You can assign them explicitly through the service profile or the properties of the vNIC or vHBA.
- —Dynamic vNICs and vHBAs cannot be assigned to the vCon. The vCon can be used for all static vNICs and vHBAs, whether they are unassigned or explicitly assigned to it.
- —Unassigned vNICs and vHBAs cannot be assigned to the vCon. The vCon can be used for dynamic vNICs and vHBAs and for static vNICs and vHBAs that are explicitly assigned to it.
If you do not include a vNIC/vHBA placement policy in the service profile, Cisco UCS Central defaults to the Round Robin vCon mapping scheme and the All vNIC/vHBA selection preference, distributing the vNICs and vHBAs between the adapters based on the capabilities and relative capacities of each adapter.
Configuring a vNIC/vHBA Placement Policy
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. | ||
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name. | ||
Step 3 | UCSC(policy-mgr) /org # create vcon-policy policy-name |
Creates the specified vNIC/vHBA placement profile and enters organization vcon policy mode. | ||
Step 4 | UCSC(policy-mgr) /org/vcon-policy # set descr description | (Optional)
Provides a description for the vNIC/vHBA Placement Profile. Enter up to 256 characters. You can use any characters or spaces except ` (accent mark), \ (backslash), ^ (carat), " (double quote), = (equal sign), > (greater than), < (less than), or ' (single quote).
| ||
Step 5 | UCSC(policy-mgr) /org/vcon-policy # set mapping-scheme {round-robin | linear-ordered} | (Optional) For blade or rack servers that contain one adapter, Cisco UCS Central assign all vCons to that adapter. For servers that contain four adapters, Cisco UCS Central assign vCon1 to Adapter1, vCon2 to Adapter2, vCon3 to Adapter3, and vCon4 to Adapter4. For blade or rack servers that contain two or three adapters, Cisco UCS Central assigns vCons based on the selected virtual slot mapping scheme. This can be one of the following:
In N20-B6620 and N20-B6625-2 blade servers, the two adapters are numbered left to right while vCons are numbered right to left. If one of these blade servers has a single adapter, Cisco UCS Central assigns all vCons to that adapter. If the server has two adapters, the vCon assignment depends upon the virtual slot mapping scheme: | ||
Step 6 | UCSC(policy-mgr) /org/vcon-policy # set vcon {1 | 2 | 3 | 4} selection {all | assigned-only | exclude-dynamic | exclude-unassigned} |
Specifies the selection preference for the specified vCon. The options are:
| ||
Step 7 | UCSC(policy-mgr) /org/vcon-policy # commit-buffer |
Commits the transaction. |
The following example creates a vNIC/vHBA placement policy named Adapter1All, sets the vCon mapping scheme to Linear Ordered, specifies that only assigned vNICs and vHBAs can be placed on adapter 1, and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope org / UCSC(policy-mgr) /org # create vcon-policy Adapter1 UCSC(policy-mgr) /org/vcon-policy* # set descr "This profile places all vNICs and vHBAs on adapter 1." UCSC(policy-mgr) /org/vcon-policy* # set mapping-scheme linear-ordered UCSC(policy-mgr) /org/vcon-policy* # set vcon 1 selection assigned-only UCSC(policy-mgr) /org/vcon-policy* # commit-buffer UCSC(policy-mgr) /org/vcon-policy* # UCSC(policy-mgr) /org #
Deleting a vNIC/vHBA Placement Policy
Command or Action | Purpose | |
---|---|---|
Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
Step 2 | UCSC(policy-mgr)# scope org org-name |
Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . |
Step 3 | UCSC(policy-mgr) /org # delete vcon-policy policy-name |
Deletes the specified vNIC/vHBA placement profile. |
Step 4 | UCSC(policy-mgr) /org # commit-buffer |
Commits the transaction. |
The following example deletes the vNIC/vHBA placement profile named Adapter1All and commits the transaction:
UCSC# connect policy-mgr UCSC(policy-mgr)scope org / UCSC(policy-mgr) /org # delete vcon-policy Adapter1All UCSC(policy-mgr) /org* # commit-buffer UCSC(policy-mgr) /org #