Cisco Data Center Network Manager Guide

Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) First Published: 2020-07-02 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version. Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2020 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Overview 1 Introduction 1 Installation Options 2 Deployment Options 2 Upgrading Cisco DCNM 3 System Requirements 3 CHAPTER 2 Guidelines and Limitations 11 Guidelines and Limitations 11 CHAPTER 3 Prerequisites 13 Prerequisites for DCNM Open Virtual Appliance 13 Prerequisites for DCNM ISO Virtual Appliance 14 Prerequisites for Cisco DCNM Virtual Appliance HA 14 Deploying Cisco DCNM Virtual Appliances in HA mode 14 Availability of Virtual IP Addresses 15 Installing an NTP Server 15 CHAPTER 4 Installing the Cisco DCNM 17 Installing DCNM on Open Virtual Appliance 17 Downloading the Open Virtual Appliance File 17 Deploying the Open Virtual Appliance as an OVF Template 18 Installing the Cisco DCNM OVA in Standalone Mode 22 Installing the Cisco DCNM OVA in Native HA mode 26 Installing DCNM on ISO Virtual Appliance 33 Downloading the ISO Virtual Appliance File 33 Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) iii Contents Installing the DCNM ISO Virtual Appliance on UCS (Bare Metal) 34 Installing the DCNM ISO Virtual Appliance on KVM 41 Installing the DCNM ISO Virtual Appliance on Windows Hyper-V 42 Creating Virtual Switches 42 Creating Virtual Machines 44 Installing DCNM ISO Virtual Appliance 48 Installing Cisco DCNM ISO in Standalone Mode 51 Installing the Cisco DCNM ISO in Native HA mode 55 Convert Standalone Setup to Native-HA Setup 63 Installing Cisco DCNM Compute Node 67 CHAPTER 5 Upgrading Cisco DCNM 73 Upgrading Cisco DCNM 73 Performance Manager Data Management before Upgrading to Release 11.4(1) 73 Dropping Performance Manager Data in Cisco DCNM SAN OVA/ISO Deployment 74 Upgrading ISO or OVA through Inline Upgrade 77 Inline Upgrade for DCNM Virtual Appliance in Standalone Mode 77 Inline Upgrade for DCNM Virtual Appliance in Native HA Mode 79 Inline Upgrade for DCNM Compute Nodes 83 CHAPTER 6 Upgrading the Cisco DCNM Classic LAN Deployment 85 Overview 85 Migration of Fabrics 86 Supported Switch Roles in LAN Fabric Post Upgrade 88 Classic LAN Templates in LAN Fabric 88 Upgrading from the Classic LAN Deployment to the LAN Fabric Deployment 92 LAN Classic Fabric Template Functionalities 95 CHAPTER 7 Deployment Best Practices 97 Best Practices for Deploying Cisco DCNM and Computes 97 Guidelines to Use the Best Practices 98 Deployments for Redundancy in Cisco DCNM 98 IP Address Configurations in Cisco DCNM 99 Scenario 1: All 3 Ethernet Interfaces are in Different Subnets 99 Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) iv Contents Scenario 2: eth2 Interface in Different Subnet 102 Physical Connectivity of Cisco DCNM and Compute Nodes 104 CHAPTER 8 Disaster Recovery (Backup and Restore) 109 Backup and Restore Cisco DCNM and Application Data on Standalone DCNM setup 109 Backup and Restore Cisco DCNM and Application Data on Native HA setup 110 Recovering Cisco DCNM Single HA Node 111 CHAPTER 9 Certificates 115 Certificate Management 115 Best practices for Certificate Management 116 Display Installed Certificates 116 Installing a CA Signed Certificate 118 Installing a CA Signed Certificate on Cisco DCNM Standalone Setup 118 Installing a CA Signed Certificate on Cisco DCNM Native HA setup 119 Exporting certificate from Active Node to Standby Node 121 Restoring the certificates after an upgrade 122 Restoring Certificates on Cisco DCNM Standalone setup after Upgrade 124 Restoring Certificates on Cisco DCNM Native HA setup after Upgrade 124 Recovering and Restoring Previously Installed CA Signed Certificates 125 Verifying the installed certificate 126 CHAPTER 10 Running Cisco DCNM Behind a Firewall 129 Running Cisco DCNM Behind a Firewall 129 Configuring Custom Firewalls 131 CHAPTER 11 Secure Client Communications for Cisco DCNM Servers 135 Secure Client Communications for Cisco DCNM Servers 135 Enabling SSL/HTTPS on Cisco DCNM in HA Environment on Virtual Appliance 135 CHAPTER 12 Managing Applications in a High-Availability Environment 137 Information About Application Level HA in the Cisco DCNM Open Virtual Appliance 137 Automatic Failover 138 Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) v Contents Manually Triggered Failovers 138 Native HA Failover and Troubleshooting 138 Application High Availability Details 140 Data Center Network Management 140 RabbitMQ 142 Repositories 143 CHAPTER 13 Managing Utility Services After DCNM Deployment 145 Editing Network Properties Post DCNM Installation 145 Modifying Network Properties on DCNM in Standalone Mode 146 Modifying Network Properties on DCNM in Native HA Mode 148 Changing the DCNM Server Password Post DCNM Installation 155 Changing the DCNM Database Password on Standalone Setup 156 Changing the DCNM Database Password on Native HA Setup 156 Convert Standalone Setup to Native-HA Setup 157 Utility Services Details 161 Network Management 162 Orchestration 162 Device Power On Auto Provisioning 162 Managing Applications and Utility Services 163 Verifying the Application and Utility Services Status after Deployment 163 Stopping, Starting, and Resetting Utility Services 164 Updating the SFTP Server Address for IPv6 165 CHAPTER 14 Tetration Agent With DCNM Validation 167 Tetration Agent With DCNM Validation 167 CHAPTER 15 Installing Software Maintenance Update 171 Installing Software Maintenance Update on Cisco DCNM 11.4(1) to use Network Insights for Resources Application 171 Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) vi CHAPTER 1 Overview Cisco Data Center Network Manager (DCNM) is a management system for Cisco NXOS-based storage fabrics. In addition to provisioning, monitoring, and troubleshooting the data center network infrastructure, the Cisco DCNM provides a comprehensive feature-set that meets the routing, switching, and storage administration needs of data centers. It streamlines the provisioning for the Programmable Fabric and monitors the SAN components. Cisco DCNM provides a high level of visibility and control through a single web-based management console for Cisco Nexus Series Switches, Cisco MDS, and Cisco Unified Computing System (UCS) products. Cisco DCNM also includes Cisco DCNM-SAN client and Device Manager functionality. This section contains the following sections: • Introduction, on page 1 • Installation Options, on page 2 • Deployment Options, on page 2 • Upgrading Cisco DCNM, on page 3 • System Requirements, on page 3 Introduction Cisco DCNM provides an alternative to the command-line interface (CLI) for switch configuration commands. Cisco DCNM includes these management applications: Cisco DCNM Web UI Cisco DCNM Web UI allows operators to monitor and obtain reports for Cisco MDS and Nexus events, performance, and inventory from a remote location using a web browser. Licensing and discovery are part of the Cisco DCNM Web UI. Performance Manager Performance Manager presents detailed traffic analysis by capturing data with SNMP. This data is compiled into various graphs and charts that can be viewed on the Cisco DCNM Web UI. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 1 Overview Installation Options Installation Options Cisco DCNM software images are packaged with the Cisco DCNM installer, signature certificate, and signature verification script. Unzip the desired Cisco DCNM installer image ZIP file to a directory. Verify the image signature by following the steps in the README file. The installer from this package installs the Cisco DCNM software. DCNM Open Virtual Appliance (OVA) Installer This installer is available as an Open Virtual Appliance file (.ova). The installer contains a pre-installed OS, DCNM, and other applications needed for programmable fabric. DCNM ISO Virtual Appliance (ISO) Installer This installer is available as an ISO image file (.iso). The installer is a bundle of OS, DCNM, and other applications needed for dynamic fabric automation. Deployment Options You can deploy the Cisco DCNM installer in one of the following modes: Standalone Server All types of installers are packaged along with PostgreSQL database. The default installation steps for the respective installers result in this mode of deployment. Note We recommend that you deploy Cisco DCNM in Native HA Mode. High Availability for Virtual Appliances You can deploy the DCNM Virtual appliances, both OVA and ISO, in High Availability mode to have resilience in case of application or OS failures. DCNM Computes Compute nodes are scale out application hosting nodes that run resource-intensive services to provide services to the larger Fabric. When compute nodes are added, all services that are containers, run only on these nodes. This includes Config Compliance, Endpoint Locator, and Virtual Machine Manager. DCNM in Clustered Mode In a clustered mode, the Cisco DCNM Server with more compute nodes provides an architecture to expand resources, as you deploy more applications. The DCNM Servers do not run containerized applications. All applications that work in unclustered mode works in the clustered mode, also. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 2 Overview Upgrading Cisco DCNM DCNM in Unclustered Mode In unclustered mode, the Cisco DCNM runs some of its internal services as containers. Cisco DCNM leverages resources from the Standby node for running some containers applications. The Cisco DCNM Active and Standby nodes work together to extend resources to the overall functionality and deployment of DCNM and its applications. However, it has limited resources to run some of the advanced applications and to extend the system to deploy more applications delivered through the Cisco AppCenter. Upgrading Cisco DCNM Before Cisco DCNM Release 11.0(1), DCNM OVA, and ISO supported SAN functionality. From Cisco DCNM Release 11.3(1), you can install Cisco DCNM for SAN Deployment on both OVA and ISO virtual appliances. The following table summarizes the type of upgrade that you must follow to upgrade to Release 11.4(1). Table 1: Type of Upgrade for LAN Fabric, and IP for Media (IPFM) deployments Current Release Number Upgrade type to upgrade to Release 11.4(1) 11.3(1) Inline Upgrade 11.2(1) Inline Upgrade 11.1(1) Inline Upgrade 11.0(1) 11.0(1) → 11.2(1) → 11.4(1) 11.0(1) → 11.1(1) → 11.4(1) → represents an Inline Upgrade System Requirements Note We recommend that you do not upgrade any underlying third-party software separately. All the necessary software components will be updated during the inline upgrade procedure. Upgrading the components outside of DCNM upgrade will cause performance issues. This section describes the various system requirements for proper functioning of your Cisco DCNM, Release 11.4(1). Note If you are deploying Network Insights applications on the Cisco DCNM Compute cluster, refer to the app-specific Release Notes for additional CPU/memory requirements for the Computes. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 3 Overview System Requirements Java Requirements The Cisco DCNM Server is distributed with JRE 11.0.6 into the following directory: DCNM_root_directory/java/jdk11 Server Requirements Cisco DCNM, Release 11.4(1), supports the Cisco DCNM Server on these 64-bit operating systems: • IP for Media, and LAN Fabric Deployments: • Open Virtual Appliance (OVA) with an integrated CentOS Linux release 7.8 • ISO Virtual Appliance (ISO) with an integrated CentOS Linux release 7.8 Database Requirements Cisco DCNM Release 11.4(1) supports the following databases: • PostgreSQL 9.6.16 - For OVA/ISO deployments Note The ISO/OVA installation only supports the embedded PostgreSQL database. Hypervisors Cisco DCNM supports the ISO installation on a bare-metal server (no hypervisor) on the following server platforms: Server Product ID (PID) Recommended minimum memory, drive capacity, and CPU count 12 Cisco UCS C240M4 UCSC-C240-M4S 32G / 500G 16 vCPUs Cisco UCS C240M4 UCSC-C240-M4L 32G / 500G 16 vCPUs Cisco UCS C240 M5S UCSC-C240-M5SX 32G / 500G 16 vCPUs Cisco UCS C220 M5L UCSC-C220-M5L 32G / 500G 16 vCPUs 1 2 Note Install the Cisco DCNM Compute node with 16 vCPUs, 64G RAM, and 500GB hard disk. If you are deploying Network Insights applications on the Cisco DCNM Compute cluster, refer to the app-specific Release Notes for additional CPU/memory requirements for the Computes. Cisco DCNM can work on an alternative computing hardware with appropriate specifications, despite Cisco is only testing on Cisco UCS. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 4 Overview System Requirements Supported Hypervisors From Release 11.4(1), Cisco DCNM supports the running of the Cisco DCNM Server on the following hypervisors: Hypervisor supported Data Center Manager server application Supported deployments ESXi 7.0 vCenter 7.0 All Note VMM visualization on vCenter 7.0 is not supported with Cisco DCNM 11.4(1). ESXi 6.7 P01 vCenter 6.7 P01 All ESXi 6.5 vCenter 6.5 All ESXi 6.0 vCenter 6.0 All RedHat 7.6 KVM with QEMU version 1.5.3 Virtual Machine Manager (comes LAN Fabric with RHEL 7.6) Hyper-V on Windows Server 2019 Hyper-V Manager (comes with Windows Server 2019) LAN Fabric This is supported with Native HA mode, and not in Cluster mode. VMware Snapshot Support for Cisco DCNM Snapshots capture the entire state of the virtual machine at the time you take the snapshot. You can take a snapshot when a virtual machine is powered on, powered off. The following table shows snapshot support for your deployment. VMware vSphere Hypervisor (ESXi) 6.0 6.5 6.7 6.7 P01 7.0 VMware vCenter Server 6.0 6.5 6.7 6.7 P01 For DCNM3 3 Note Virtual Machine Manager import for compute visibility with vCenter 7.0 is not supported vCenter server is mandatory to deploy the Cisco DCNM OVA Installer. To take a snapshot on the VM, perform the following steps: 1. Right-click the virtual machine the inventory and select Snapshots > Take Snapshot. 2. In the Take Snapshot dialog box, enter a Name and description for the snapshot. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 5 Overview System Requirements 3. Click OK to save the snapshot. The following snapshots are available for VMs. • When VM is powered off. • When VM is powered on, and active. Note Cisco DCNM supports snapshots when VM is either powered on or powered off. DCNM doesn’t support snapshots when the Virtual Machine memory option is selected. Note that the Snapshot the Virtual Machine's memory check box must not be selected, as shown in the following figure. However, it is grayed out when the VM is powered off. You can restore VM to the state in a Snapshot. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 6 Overview System Requirements Right-click on the Virtual Machine and select Manage Snapshot. Select the snapshot to restore, and click Done. Server Resource (CPU/Memory) Requirements Note If you install Cisco DCNM on a virtual machine, you must reserve resources equal to the server resource requirements to ensure a baseline with the physical machines. Deployment Deployment Type LAN Fabric Note • OVA Small (Lab or POC) Large (Production) Huge (Production) CPU: 8 vCPUs CPU: 16 Not vCPUs Applicable RAM: 24 GB • ISO RAM: 32 GB • Hyper-V DISK: 500 GB DISK: 500 GB on Windows Compute ComputeHuge CPU: 16 vCPUs CPU: 32vCPUs RAM: 64 GB RAM: 128GB DISK: 500 GB DISK: 2TB for Network Insights Applications For Huge and Compute deployments, you can add extra disk. The size of the disk can range from a minimum of 32GB to a maximum of 1.5TB. Allocate sufficient disk space to the root partition to complete DCNM installation and for stable continuous operation of the DCNM applications. Refer to the applications’ User guides for disk space requirements. You can mount another disk where the /tmp directory can be mounted during the installation or upgrade. You can also add additional disk space and the disk file system using appmgr system scan-disks-and-extend-fs command. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 7 Overview System Requirements Cisco DCNM LAN Fabric Deployment Without Network Insights (NI) Note For information about various system requirements for proper functioning of Cisco DCNM LAN Fabric deployment, see System Requirements. Refer to Network Insights User guide for sizing information for Cisco DCNM LAN Deployment with Network Insights (NI). To see the verified scale limits for Cisco DCNM 11.4(1) for managing LAN Fabric deployments, see Verified Scale Limits for Cisco DCNM LAN Fabric Deployment. Table 2: Upto 80 Switches Node CPU Deployment Mode CPU Memory Storage Network DCNM OVA/ISO 16 vCPUs 32G 500G HDD 3xNIC — — — — Computes NA Table 3: 81–350 Switches Node CPU Deployment Mode CPU Memory Storage Network DCNM OVA/ISO 16 vCPUs 32G 500G HDD 3xNIC Computes x 34 OVA/ISO 16 vCPUs 64G 500G HDD 3xNIC 4 Cisco DCNM must be deployed with Compute cluster nodes to use NI applications. Supported Web Browsers Cisco DCNM supports the following web browsers: • Google Chrome Version 83.0.4103.97 • Mozilla Firefox Version 77.0.1 (64-bit) • Microsoft Edge Version 83.0.478.45 Other Supported Software The following table lists the other software that is supported by Cisco DCNM, Release 11.4(1). Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 8 Overview System Requirements Table 4: Other Supported Software Component Security Features • ACS versions 4.0, 5.1, 5.5, and 5.8 • ISE version 2.6 • Telnet Disabled: SSH Version 1, SSH Version 2, Global Enforce SNMP Privacy Encryption. • Web Client Encryption: HTTPS with TLS 1, 1.1 and 1.2 OVA\ISO Installers CentOS 7.8/Linux Kernel 3.10.x Also, Cisco DCNM supports call-home events, fabric change events, and events that are forwarded by traps and email. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 9 Overview System Requirements Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 10 CHAPTER 2 Guidelines and Limitations • Guidelines and Limitations, on page 11 Guidelines and Limitations The guidelines and limitations for installing and upgrading Cisco DCNM are as follows: General Guidelines and Limitations • Adhere to the following password requirements. If you do not comply with the requirements, the DCNM application might not function properly: • It must be at least 8 characters long and contain at least one alphabet and one numeral. • It can contain a combination of alphabets, numerals, and special characters. • All special characters, except %$^=;.*\'" <SPACE> is allowed in the password. • After upgrade, you can login to the DCNM server using the new sysadmin password. However, you must use the old DCNM password to login to the Web UI. • The new Administrative password that is entered is used in the following scenarios. • —accessing the DCNM appliance via its console. • —accessing the appliance via SSH • —for applications running on the appliance, for example, Postgres DBMS • Do not interrupt the boot process (such as pressing the Ctrl+ALT + DELETE keys) when installing DCNM. If you interrupt, you must restart the installation process. • Ensure that you configure the timezone after installation or upgrade, before performing any other operations on the Cisco DCNM Appliance. Use the NTP server for configuring timezones. • To check the status of the running Postgres database in Native HA setup, use following command: dcnm# su - postgres -c dcnm# pg_ctl -D /usr/local/cisco/dcm/db/data status Do not use the systemctl command. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 11 Guidelines and Limitations Guidelines and Limitations • Do not begin the password with Hash (#) symbol. Cisco DCNM considers the password as an encrypted text if it begins with # symbol. Fresh Installation • For Virtual Appliances (OVA/ISO), the installer installs the Operating system and Cisco DCNM components. • The DCNM OVA cannot be deployed by connecting the vSphere client directly to the ESXi server. Upgrade • You can choose to discard the old performance manager (PM) data and continue to upgrade to DCNM Release 11.4(1). For instructions about how to drop performance manager data, see Performance Manager Data Management before Upgrading to Release 11.4(1), on page 73. If you choose to retain the old PM data while you upgrade to Release 11.4(1), we recommend that you contact Cisco TAC for further assistance. • Ensure that you do not perform inline upgrade from an SSH session. The session may timeout and result in an incomplete upgrade. • Disable Telemetry in the earlier release before you upgrade. • Disable Telemetry before you deploy Compute Nodes. You can enable Telemetry after deploying compute nodes. For DCNM in Native HA mode, Telemetry is supported with 3 compute nodes only. • If you need to run Network Insights applications, you must install 3 compute nodes. • Disable Telemetry before modifying Interface settings. You can enable Telemetry after modifying the settings. • During a backup and restore process, the compute nodes are also included in the backup. After you deploy the new compute, you can restore the backup on the compute node. If there was no backup, disconnect the 3 compute nodes, and erase the data on all the compute nodes. On the Cisco DCNM Web Client UI, navigate to Application > Compute. Select the + icon to join the compute nodes. • To erase data on the compute node, logon to the compute node through an SSH session and erase the data using the rm -rf /var/afw/vols/data command. Note You must run the above command separately on all compute nodes to erase data. • Before starting NIR application after upgrade, on the DCNM Web UI, choose Application > Preferences. Modify the network settings as required. If you do not modify the network settings after upgrade before you enable the Telemetry on the Fabrics, the configuration will not complete. You must stop the NIR app, modify the network settings and start the app again, to resolve the issue. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 12 CHAPTER 3 Prerequisites This chapter provides release-specific prerequisites information for your deployment of Cisco Data Center Network Manager. • Prerequisites for DCNM Open Virtual Appliance, on page 13 • Prerequisites for DCNM ISO Virtual Appliance, on page 14 • Prerequisites for Cisco DCNM Virtual Appliance HA, on page 14 Prerequisites for DCNM Open Virtual Appliance Before you install the Cisco DCNM Open Virtual Appliance, you will need to meet following software and database requirements: • Ensure that you've installed Visual C++ Redistributable Packages for Visual Studio 2013 64 bit before installing or upgrading to Cisco DCNM Release 11.4(1). • VMware vCenter Server that is running on a Windows server (or alternatively, running as a virtual appliance). • VMware ESXi host imported into vCenter. • Three port groups on the ESXi host─DCNM Management Network, Enhanced Fabric Management Network, and InBand interface for EPL and Telemetry features. • Determine the number of switches in your Cisco Programmable Fabric that will be managed by the Cisco DCNM Open Virtual Appliance. • Ensure that no anti-virus software (such as McAfee) is running on the host where the VMware vCenter web client is launched for the DCNM OVA installation. If the anti-virus software is running, the DCNM installation might fail. • The DCNM Open Virtual Appliance is compatible to be deployed in ESXi host as well. For deploying in the ESXi host, VMware vSphere Client application is mandatory. Note For more information about the CPU and memory requirements, see the Server Resource Requirements section of the Cisco DCNM Release Notes, Release . Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 13 Prerequisites Prerequisites for DCNM ISO Virtual Appliance Prerequisites for DCNM ISO Virtual Appliance Ensure that you do not add an additional Active or Standby node to an existing Active-Standby Native HA DCNM Appliance. The installation fails. Ensure that you've installed Visual C++ Redistributable Packages for Visual Studio 2013 64 bit before installing or upgrading to Cisco DCNM Release 11.4(1). You have to set up the host or the hypervisor before you install the Cisco DCNM ISO Virtual Appliance. Based on the requirement, set up the setup Host machine or Hypervisor based on CPU and Memory requirement. Note For more information about the CPU and memory requirements, see the Server Resource Requirements section of the Cisco DCNM Release Notes, Release . You can set up one of the following hosts to install the DCNM ISO Virtual Appliance. VMware ESXi The host machine is installed with ESXi and two port groups are created—one for EFM network and the other for DCNM Management network. Enhanced Fabric In-Band network is optional. Kernel-based Virtual Machine (KVM) The host machine is installed with Red Hat Enterprise Linux (RHEL) 5.x or 6.x or 7.x, with KVM libraries and Graphical User Interface (GUI) access. The GUI allows you to access the Virtual Machine Manager, to deploy and manage the Cisco DCNM Virtual Appliances. Two networks are created—EFM network and DCNM Management network. Typically, the DCNM management network is bridged to gain access from other subnets. Refer the KVM documentation on how to create different types of networks. Note KVM on other platforms like CentOS or Ubuntu will not be supported as it increases the compatibility matrix. Prerequisites for Cisco DCNM Virtual Appliance HA This section contains the following topics that describe the prerequisites for obtaining a high-availability (HA) environment. Deploying Cisco DCNM Virtual Appliances in HA mode You must deploy two standalone Virtual Appliance (OVA and ISO). When you deploy both Virtual Appliances, you must meet the following criteria: • The eth0 of the active OVA must be in the same subnet as eth0 of the standby Virtual Appliance. The eth1 of the active Virtual Appliance must be in the same subnet as eth1 of the standby OVA. The eth2 of the active virtual appliance must be in the same subnet as the eth2 of the standby appliance. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 14 Prerequisites Availability of Virtual IP Addresses • Both Virtual Appliances must be deployed with the same administrative password. This process ensures that both Virtual Appliances are duplicates of each other. • If you try to add an additional Active or Standby node to an existing Active-Standby Native HA DCNM Appliance, the installation fails. Availability of Virtual IP Addresses Two free IP addresses are needed to set up the server eth0 and eth1 interfaces. However, eth2 IP address is optional. The first IP address will be used in the management access network; it should be in the same subnet as the management access (eth0) interface of the OVAs. The second IP address should be in the same subnet as enhanced fabric management (eth1) interfaces (switch/POAP management network). If you choose to configure inband management (eth2) for the DCNM Server, you must reserve another IP Address. For Native HA setup, the eth2 interface on Primary and Secondary servers must be in same subnet. Installing an NTP Server For most of the HA functionality to work, you must synchronize the time on both OVAs by using an NTP server. The installation would typically be in the management access network (eth0) interfaces. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 15 Prerequisites Installing an NTP Server Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 16 CHAPTER 4 Installing the Cisco DCNM This chapter contains the following sections: Note Beginning with Release 11.4(1), along with Computes, you can install Cisco DCNM in Standalone and Native HA mode on Cisco Applications Services Engine. For more information, see Cisco Application Services Engine Installation Guide For Cisco DCNM. • Installing DCNM on Open Virtual Appliance, on page 17 • Installing DCNM on ISO Virtual Appliance, on page 33 • Convert Standalone Setup to Native-HA Setup, on page 63 • Installing Cisco DCNM Compute Node, on page 67 Installing DCNM on Open Virtual Appliance This chapter contains the following sections: Downloading the Open Virtual Appliance File The first step to install the Open Virtual Appliance is to download the dcnm.ova file. Point to that dcnm.ova file on your computer when deploying the OVF template. Note If you plan to use HA application functions, you must deploy the dcnm.ova file twice. Procedure Step 1 Go to the following site: http://software.cisco.com/download/ . A list of the latest release software for Cisco DCNM available for download is displayed. Step 2 In the Latest Releases list, choose Release 11.4(1). Step 3 Locate the DCNM Open Virtual Appliance Installer and click the Download icon. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 17 Installing the Cisco DCNM Deploying the Open Virtual Appliance as an OVF Template Step 4 Save the dcnm.ova file to your directory that is easy to find when you start to deploy the OVF template. Deploying the Open Virtual Appliance as an OVF Template After you download the Open Virtual Appliance file, you must deploy the OVF template from the vSphere Client application or the vCenter Server. Note Deploy two OVAs for the HA setup. Procedure Step 1 Open the vCenter Server application and connect to the vCenter Server with your vCenter user credentials. Note ESXi host must be added to the vCenter Server application. Depending on the version of the VMware vsphere web HTML5 interface may not work properly when deploying Huge or Compute OVA, as it does not allow users to specify extra disk size. Therefore, we recommend that you use Flex interface for deploying VMs. If you're deploying OVF template using the ESXi 6.7, the installation fails if you use Internet Explorer browser with HTML5. Ensure that you one of the following options to successfully deploy OVF template with ESXi and 6.7: • Mozilla Firefox browser, with HTML 5 support Use flex interface if HTML 5 is not supported • Mozilla Firefox browser, with flex\flash support • Google Chrome browser, with HTML 5 support Use flex interface if HTML 5 is not supported Step 2 Navigate to Home > Inventory > Hosts and Clusters and choose the host on which the OVF template is deployed. Step 3 On the correct Host, right-click and select Deploy OVF Template. You can also choose Actions > Deploy OVF Template. Deploy OVF Template Wizard opens. Step 4 On the Select template screen, navigate to the location where you have downloaded the OVA image. You can choose the OVA file by one of the following methods: • Select the URL radio button. Enter the path of the location of the image file. • Select Local File radio button. Click Browse. Navigate to the directory where the image is stored. Click OK. Click Next. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 18 Installing the Cisco DCNM Deploying the Open Virtual Appliance as an OVF Template Step 5 Verify the OVA template details and click Next. Step 6 On the End User License Agreement screen, read the license agreement. Click Accept and click Next. Step 7 On the Select name and location screen, enter the following information: • In the Name field, enter an appropriate name for the OVF. Note Ensure that the VM name is unique within the Inventory. • In the Browse tab, select Datacenter as the deployment location under the appropriate ESXi host. Click Next. Step 8 On the Select configuration screen, select the configuration from the drop-down list. • Choose Small (Lab or POC) to configure the virtual machine with 8 vCPUs, 24GB RAM. Choose Small for proof-of-concept and other small-scale environments with fewer than 50 switches that are not expected to grow with time. • Choose Large (Production) to configure the virtual machine with 16 vCPUs, 32GB RAM. We recommend that you use a Large deployment configuration when you are managing more than 50 devices to leverage better RAM, heap memory, and CPUs. For setups that could grow, choose Large. • Choose Compute to configure the virtual machine with 16 vCPUs, 64GB RAM. You must have DCNM deployed in Compute mode to use applications in your deployment. • Choose Huge to configure the virtual machine with 32 vCPUs, 128GB RAM. This configuration is recommended if you deploy DCNM for SAN Management and use SAN Insights feature. • Choose ComputeHuge to configure the virtual machine with 32vCPUs and 128GB RAM with 2TB disk. This configuration is recommended if you use Cisco Network Insights applications. Click Next. Step 9 On Select a resource screen, select the host on which you want to deploy the OVA template. Click Next. Step 10 On Select storage screen, based on the Datastore and Available space choose the disk format and the destination storage for the virtual machine file. a) Select the virtual disk format from the drop-down list. The available disk formats are: Note Choose one of the thick provision types if you have enough storage capacity as required by the virtual appliance and want to set a specific allocation of space for the virtual disks. • Thick Provision Lazy Zeroed: The space that is required for the virtual disk is allocated when the virtual disk is created. The data that remains on the physical device is not erased when the virtual disk is created but is zeroed out on demand later on first write from the virtual disk. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 19 Installing the Cisco DCNM Deploying the Open Virtual Appliance as an OVF Template • Thin Provision: The disk space available is less than 100 GB. The initial disk consumption is 3GB and increases as the size of the database increases with the number of devices being managed. • Thick Provision Eager Zeroed: The space that is required for the virtual disk is allocated when the virtual disk is created. Unlike the Lazy Zeroed option, the data that remains on the physical device is erased when the virtual disk is created. Note With 500G, the DCNM installation will appear to be stuck with option Thick Provision Eager Zeroed. However, it takes longer time to complete. b) Select the VM storage policy from the drop-down list. By default, no policy is selected. c) Check the Show datastores from Storage DRS clusters to view the clusters datastores. d) Select the destination storage for the virtual machine, available in the datastore. Click Next. Step 11 On the Select Networks screen, map the networks that are used in the OVF template to networks in your inventory. • dcnm-mgmt network This network provides connectivity (SSH, SCP, HTTP, HTTPS) to the Cisco DCNM Open Virtual Appliance. Associate this network with the portgroup that corresponds to the subnet that is associated with the DCNM Management network. • enhanced-fabric-mgmt This network provides enhanced fabric management of Nexus switches. You must associate this network with the port group that corresponds to management network of leaf and spine switches. • enhanced-fabric-inband This network provides in-band connection to the fabric. You must associate this network with port group that corresponds to a fabric in-band connection. Note If you do not configure enhanced-fabric-inband network, Endpoint Locator and Telemetry features are not operational. However, you can edit the network properties after installation, if required, using the appmgr update network-properties command. For more information, see Editing Network Properties Post DCNM Installation, on page 145. From the Destination Network drop-down list, choose to associate the network mapping with the port group that corresponds to the subnet that is associated with the corresponding network. If you are deploying more than one DCNM Open Virtual Appliance for HA functionality, you must meet the following criteria: • Both OVAs must have their management access (eth0), enhanced fabric management (eth1) and inband management (eth2) interfaces in the same subnet. • Each OVA must have their eth0-eth1 and eth2 interfaces in different subnets. • Both OVAs must be deployed with the same administrative password. This is to ensure that both OVAs are duplicates of each other for application access. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 20 Installing the Cisco DCNM Deploying the Open Virtual Appliance as an OVF Template All special characters, except %$^=;.*\'" <SPACE> is allowed in the password. Click Next. Step 12 On Customize template screen, enter the Management Properties information. Enter the IP Address (for the outside management address for DCNM), Subnet Mask, and Default Gateway. Note During Native HA installation and upgrade, ensure that you provide appropriate Management Properties for both Active and Standby appliances. Ensure that add valid values for the Management Network properties. Properties with invalid values will not be assigned. The VM will not power on until you enter valid values. From Release 11.3(1), for Huge and Compute configurations, you can add extra disk space on the VM. You can add from 32GB up to 1.5TB of disk space. In the Extra Disk Size field, enter the extra disk size that will be created on the VM. Click Next. Step 13 On Ready to Complete screen, review the deployment settings. Click Back to go to the previous screens and modify the configuration. Click Finish to deploy the OVF template. You can see the deployment status in the Recent Tasks area on the vSphere Client. Note Step 14 If this deployment is a part of the upgrade process, do not Power on the VM. Edit and provide the 11.0(1) or 11.1(1) or 11.2(1) MAC address and power on the VM. After the installation is complete, right click on the installed VM and select Power > Power On. Note Before you power on the VM, ensure that you have reserved appropriate resources for the VM, such as CPU and memory, based on the chosen deployment configuration. You can see the status in the Recent Tasks area. Step 15 Navigate to the Summary tab and click Settings icon and select Launch Web Console. A message indicating that the DCNM appliance is configuring appears on the screen. *************************************************************** Please point your web browser to https://<IP-address>:<port-number> to complete the application *************************************************************** Copy and paste the URL to the browser to complete the installation, using the Web Installer. What to do next You can choose to install DCNM in Standalone mode or Native HA mode. For more information, see Installing the Cisco DCNM OVA in Standalone Mode, on page 22 or Installing the Cisco DCNM OVA in Native HA mode, on page 26. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 21 Installing the Cisco DCNM Installing the Cisco DCNM OVA in Standalone Mode Installing the Cisco DCNM OVA in Standalone Mode Paste the URL displayed on the Console tab and hit Enter key. A welcome message appears. To complete the installation of Cisco DCNM from the web installer, perform the following procedure. Procedure Step 1 On the Welcome to Cisco DCNM screen, click Get Started. Caution Step 2 If the system configuration does not meet minimum resource requirements, SYSTEM RESOURCE ERROR is displayed on the Web Installer, and the installation will be aborted. Modify the system requirements, and launch the Web Installer to complete the installation. On the Cisco DCNM Installer tab, select Fresh Installation – Standalone radio button. Click Next. Step 3 On the Install Mode tab, choose your DCNM deployment type. From the Installation mode drop-down list, choose LAN Fabric installation mode for the DCNM Appliance. Check the Enable Clustered Mode check box, if you want to deploy Cisco DCNM in Cluster mode. The Compute nodes will be displayed on the Cisco DCNM Web UI > Applications > Compute. The applications will run on the Compute nodes. You can add the compute nodes to a Cluster, later. If Enable Clustered Mode is selected, applications such as, Config Compliance, EPL, and NIA, and NIR won’t work until you install the compute nodes. Note Click Next. Step 4 On the Administration tab, enter information about passwords. • In the Administrator Password field, enter the password that is used to connect to the applications in the Cisco DCNM. All special characters, except %$^=;.*\'" <SPACE> is allowed in the password. Enter the password again in the Repeat Administrator Password field. • In the Database Password field, enter the password for the PostgreSQL database. All special characters, except %$^=;.*\'" <SPACE> is allowed in the password. Enter the password again in the Repeat Database Password field. Note If Database Password field is left blank, it shall consider the Administrator password as the PostgreSQL password. Select the Show passwords in clear text check box to view the password that you have entered. Click Next. Step 5 On the System Settings, configure the settings for the DCNM Appliance. • In the Fully Qualified Hostname field, enter the hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Hostnames with only digits is not supported. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 22 Installing the Cisco DCNM Installing the Cisco DCNM OVA in Standalone Mode • In the DNS Server Address List field, enter the DNS IP address. You can also configure the DNS server using an IPv6 address. From Release 11.3(1), you can configure more than one DNS server. Note If you’re using Network Insights applications, ensure that the DNS server is valid and reachable. • In the NTP Server Address List field, enter the IP address of the NTP server. The value must be an IP or IPv6 address or RFC 1123 compliant name. From Release 11.3(1), you can configure more than one NTP server. • From the Timezone drop-down list, select the timezone in which you are deploying the DCNM. Click Next. Step 6 On the Network Settings tab, configure the network parameters used to reach the DCNM Web UI. Figure 1: Cisco DCNM Management Network Interfaces a) In the Management Network area, verify if the auto-populated addresses for Management IPv4 Address and Management Network Default IPv4 Gateway are correct. Modify, if necessary. Note Beginning with Cisco DCNM Release 11.2(1), you can also use an IPv6 address for the Management Network. (Optional) Enter a valid IPv6 address along with the prefix to configure the Management IPv6 Address and the Management Network Default IPv6 Gateway. b) In the Out-of-Band Network area, enter the IPv4 address and Gateway IPv4 Address. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Out-of-band management provides a connection to the device management ports (Typically mgmt0). Note If the out-of-band network is not configured, you cannot configure Cisco DCNM in Cluster mode. c) (Optional) In the In-Band Network area, enter the IPv4 address and Gateway IPv4 Address for the in-band network. This field is mandatory if you have selected the Enable Cluster mode in Step Step 3, on page 22. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 23 Installing the Cisco DCNM Installing the Cisco DCNM OVA in Standalone Mode If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. The In-Band Network provides reachability to the devices via the front-panel ports. If you do not configure in-band network, Endpoint Locator and Telemetry features are not operational. Note However, you can edit the network properties after installation, if required, using the appmgr update network-properties command. For more information, see Editing Network Properties Post DCNM Installation, on page 145. Click Next. Step 7 On the Applications tab, configure the Device Connector and Internal Applications Services Network, and Cluster mode settings. Device Connector is enabled by default. Note The Device connector is an embedded management controller that enables the capabilities of Cisco Intersight, a cloud-based management platform. a) (Optional) In the Proxy Server field, enter the IP address for the proxy server. The proxy server must be of RFC1123-compliant name. Note By default, port 80 is used for proxy server. Use <proxy-server-ip>:<port> to use proxy server is a different port. If the proxy server must require authentication, enter relevant username and password in the Proxy Server Username and Proxy Server Password fields. b) In the Internal Application Services Network area, in the IPv4 Subnet field, enter the IP subnet to access the applications that run internally to DCNM. All the applications use the IP Address from this subnet. c) In the Clustered mode configuration area, configure the network settings to deploy the DCNM instance in Clustered mode. In Clustered mode, applications run on separate compute nodes. The Cluster Mode configuration area appears only if you have selected the Enable Clustered Mode check box in Step Step 3, on page 22. Note In Clustered mode, the Cisco DCNM Applications run on separate DCNM Compute Nodes. • In the Out-of-Band IPv4 Network Address Pool, enter the address pool from the Out-of-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the Out-of-Band IPv6 Network Address Pool field. • In the In-Band IPv4 Network Address Pool, enter the address pool from the In-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the In-Band IPv6 Network Address Pool field. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 24 Installing the Cisco DCNM Installing the Cisco DCNM OVA in Standalone Mode The address must be a smaller prefix of available IP addresses from the eth1 subnet. For example: Use 10.1.1.240/28 if the eth1 subnet was configured as 10.1.1.0/24 during installation. This subnet must be a minimum of /28 (16 addresses) and maximum of /24 (256 addresses). It should also be longer than the east-west pool. This subnet is assigned to containers, to communicate with the switches. Click Next. Step 8 On the Summary tab, review the configuration details. Click Previous to go to the previous tabs and modify the configuration. Click Start Installation to complete the Cisco DCNM Installation for the chosen deployment mode. A progress bar appears showing the completed percentage, description of the operation, and the elapsed time during the installation. After the progress bar shows 100%, click Continue. A success message appears with the URL to access DCNM Web UI. *************************************************************** Your Cisco Data Center Network Manager software has been installed. DCNM Web UI is available at https://<<IP Address>> You will be redirected there in 60 seconds. Thank you *************************************************************** Note If the Cisco DCNM is running behind a firewall, ensure that you open the port 2443 to launch Cisco DCNM Web UI. Note If you try to access the DCNM Web UI using the Management IP address while the installation is still in progress, an error message appears on the console. *************************************** *Preparing Appliance* *************************************** What to do next Log on to the DCNM Web UI with appropriate credentials. Click the Settings icon and choose About DCNM. You can view and verify the Installation type that you have deployed. If you have configured inband management (eth2) IP addresses for device management, login to standalone server and configure the inband network reachability from eth2 of the server to the switches by using the following commands: dcnm# appmgr update network-properties add route ipv4 eth2 <ipv4-network-ip-address/prefix> For example: If you have four switches with all fabric links connected through 10.0.0.x/30 subnet, and if all switches are configured with the loopback interface for inband reachability in subnet 40.1.1.0/24, use the following commands: dcnm# dcnm# dcnm# dcnm# appmgr appmgr appmgr appmgr update update update update network-properties network-properties network-properties network-properties session start add route ipv4 eth2 10.0.0.0/24 add route ipv4 eth2 40.1.1.0/24 session apply Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 25 Installing the Cisco DCNM Installing the Cisco DCNM OVA in Native HA mode Installing the Cisco DCNM OVA in Native HA mode The native HA is supported on DCNM appliances with ISO or OVA installation only. By default, an embedded PostgreSQL database engine with the Cisco DCNM. The native HA feature allows two Cisco DCNM appliances to run as active and standby applications, with their embedded databases synchronized in real time. Therefore, when the active DCNM is not functioning, the standby DCNM takes over with the same database data and resume the operation. Perform the following task to set up Native HA for DCNM. Procedure Step 1 Deploy two DCNM Virtual Appliances (either OVA or ISO). For example, let us indicate them as dcnm1 and dcnm2. Step 2 Configure dcnm1 as the Primary node. Paste the URL displayed on the Console tab of dcnm1 and press Enter key. A welcome message appears. a) On the Welcome to Cisco DCNM screen, click Get Started. Caution If the system configuration does not meet minimum resource requirements, SYSTEM RESOURCE ERROR is displayed on the Web Installer, and the installation will be aborted. Modify the system requirements, and launch the Web Installer to complete the installation. b) On the Cisco DCNM Installer tab, select Fresh Installation - HA Primary radio button, to install dcnm1 as Primary node. Click Next. c) On the Install Mode tab, choose your DCNM deployment type. From the Installation mode drop-down list, choose LAN Fabric installation mode for the DCNM Appliance. Check the Enable Clustered Mode check box, if you want to deploy Cisco DCNM in Cluster mode. The Compute nodes will be displayed on the Cisco DCNM Web UI > Applications > Compute. The applications will run on the Compute nodes. You can add the compute nodes to a Cluster, later. Note If Enable Clustered Mode is selected, applications such as, Config Compliance, EPL, and NIA, and NIR won’t work until you install the compute nodes. Click Next. d) On the Administration tab, enter information about passwords. • In the Administrator Password field, enter the password that is used to connect to the applications in the Cisco DCNM. All special characters, except %$^=;.*\'" <SPACE> is allowed in the password. Enter the password again in the Repeat Administrator Password field. • In the Database Password field, enter the password for the PostgreSQL database. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 26 Installing the Cisco DCNM Installing the Cisco DCNM OVA in Native HA mode All special characters, except %$^=;.*\'" <SPACE> is allowed in the password. Enter the password again in the Repeat Database Password field. Note If the Database Password field is left blank, it shall consider the Administrator password as the PostgreSQL password. Select the Show passwords in clear text check box to view the password that you have entered. Click Next. e) On the System Settings, configure the settings for the DCNM Appliance. • In the Fully Qualified Hostname field, enter the hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Hostnames with only digits is not supported. • In the DNS Server Address List field, enter the DNS IP address. Beginning with Release 11.2(1), you can also configure the DNS server using an IPv6 address. From Release 11.3(1), you can configure more than one DNS server. Note If you’re using Network Insights applications, ensure that the DNS server is valid and reachable. • In the NTP Server Address List field, enter the IP address of the NTP server. The value must be an IP or IPv6 address or RFC 1123 compliant name. From Release 11.3(1), you can configure more than one NTP server. • From the Timezone drop-down list, select the timezone in which you are deploying the DCNM. Click Next. f) On the Network Settings tab, configure the network parameters used to reach the DCNM Web UI. Figure 2: Cisco DCNM Management Network Interfaces 1. In the Management Network area, verify if the auto-populated addresses for Management IPv4 Address and Management Network Default IPv4 Gateway are correct. Modify, if necessary. Note Beginning with Cisco DCNM Release 11.2(1), you can also use an IPv6 address for the Management Network. (Optionally) Enter a valid IPv6 address along with the prefix to configure the Management IPv6 Address and the Management Network Default IPv6 Gateway. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 27 Installing the Cisco DCNM Installing the Cisco DCNM OVA in Native HA mode 2. In the Out-of-Band Network area, enter the IPv4 address and Gateway IPv4 Address. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Out-of-band management provides a connection to the device management ports (Typically mgmt0). If the out-of-band network is not configured, you cannot configure Cisco DCNM in Cluster mode. Note 3. In the In-Band Network area, enter the IPv4 address and Gateway IPv4 Address for the in-band network. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. The In-Band Network provides reachability to the devices via the front-panel ports. If you do not configure in-band network, Endpoint Locator and Telemetry features are not operational. Note However, you can edit the network properties after installation, if required, using the appmgr update network-properties command. For more information, see Editing Network Properties Post DCNM Installation, on page 145. Click Next. g) On the Applications tab, configure the Device Connector and Internal Applications Services Network. Device Connector is enabled by default. Note The Device connector is an embedded management controller that enables the capabilities of Cisco Intersight, a cloud-based management platform. 1. In the Proxy Server field, enter the IP address for the proxy server. The proxy server must be of RFC1123-compliant name. Note By default, port 80 is used for proxy server. Use <proxy-server-ip>:<port> to use proxy server is a different port. If the proxy server must require authentication, enter relevant username and password in the Proxy Server Username and Proxy Server Password fields. 2. In the Internal Application Services Network area, in the IPv4 Subnet field, enter the IP subnet to access the applications that run internally to DCNM. All the applications use the IP Address from this subnet. By default, the The Cluster Mode configuration area appears only if you have selected the Enable Clustered Mode check box in Step 2.c, on page 26. Note In Clustered mode, the Cisco DCNM Applications run on separate DCNM Compute Nodes. 3. In the Clustered mode configuration area, configure the network settings to deploy the DCNM instance in Clustered mode. In Clustered mode, applications run on separate compute nodes. • In the Out-of-Band IPv4 Network Address Pool, enter the address pool from the Out-of-Band IPv4 network to be used in the Clustered Mode. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 28 Installing the Cisco DCNM Installing the Cisco DCNM OVA in Native HA mode Optionally, you can also enter an IPv6 address pool in the Out-of-Band IPv6 Network Address Pool field. • In the In-Band IPv4 Network Address Pool, enter the address pool from the In-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the In-Band IPv6 Network Address Pool field. The address must be a smaller prefix of available IP addresses from the eth1 subnet. For example: Use 10.1.1.240/28 if the eth1 subnet was configured as 10.1.1.0/24 during installation. This subnet must be a minimum of /28 (16 addresses) and maximum of /24 (256 addresses). It should also be longer than the east-west pool. This subnet is assigned to containers, to communicate with the switches. h) On the HA Settings tab, a confirmation message appears. You are installing the primary DCNM HA node. Please note that HA setup information will need to be provided when the secondary DCNM HA node is installed. Click Next. i) On the Summary tab, review the configuration details. Click Previous to go to the previous tabs and modify the configuration. Click Start Installation to complete the Cisco DCNM Installation for the chosen deployment mode. A progress bar appears to show the completed percentage, description of the operation, and the elapsed time during the installation. After the progress bar shows 100%, click Continue. A warning message appears stating that the setup is not complete until you install the Secondary node. WARNING: DCNM HA SETUP IS NOT COMPLETE! Your Cisco Data Center Network Manager software has been installed on this HA primary node. However, the system will be ready to be used only after installation of the secondary node has been completed. Thank you. Step 3 Configure dcnm2 as the Secondary node. Paste the URL displayed on the Console tab of dcnm2 and hit Enter. A welcome message appears. a) On the Welcome to Cisco DCNM screen, click Get Started. Caution If the system configuration does not meet minimum resource requirements, SYSTEM RESOURCE ERROR is displayed on the Web Installer, and the installation will be aborted. Modify the system requirements, and launch the Web Installer to complete the installation. b) On the Cisco DCNM Installer screen, select Fresh Installation - HA Secondary radio button, to install dcnm2 as Secondary node. Click Continue. c) On the Install Mode tab, from the drop-down list, choose the same installation mode that you selected for the Primary node. Note The HA installation fails if you do not choose the same installation mode as Primary node. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 29 Installing the Cisco DCNM Installing the Cisco DCNM OVA in Native HA mode Check the Enable Clustered Mode check box, if you have configured the Cisco DCNM Primary in Clustered mode. Click Next. d) On the Administration tab, enter information about passwords. All the passwords must be same as the passwords that you provided while configuring the Primary node. Note e) On the System Settings, configure the settings for the DCNM Appliance. • In the Fully Qualified Hostname field, enter the hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Hostnames with only digits is not supported. • In the DNS Server Address List field, enter the DNS IP address. Beginning with Release 11.2(1), you can also configure the DNS server using an IPv6 address. From Release 11.3(1), you can configure more than one DNS server. Note If you’re using Network Insights applications, ensure that the DNS server is valid and reachable. • In the NTP Server Address List field, enter the IP address of the NTP server. The value must be an IP or IPv6 address or RFC 1123 compliant name. From Release 11.3(1), you can configure more than one NTP server. • From the Timezone drop-down list, select the timezone in which you are deploying the DCNM. Click Next. f) On the Network Settings tab, configure the network parameters used to reach the DCNM Web UI. Figure 3: Cisco DCNM Management Network Interfaces 1. In the Management Network area, verify if the auto-populated addresses for Management IPv4 Address and Management Network Default IPv4 Gateway are correct. Modify, if necessary. Note Ensure that the IP address belongs to the same Management Network configured on the Primary node. (Optionally) Enter a valid IPv6 address along with the prefix to configure the Management IPv6 Address and the Management Network Default IPv6 Gateway. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 30 Installing the Cisco DCNM Installing the Cisco DCNM OVA in Native HA mode 2. In the Out-of-Band Network area, enter the IPv4 address and Gateway IPv4 Address. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Ensure that the IP addresses belong to the same Out-of-Band network configured on the Primary node. Note Out-of-band management provides a connection to the device management ports (Typically mgmt0). If the out-of-band network is not configured, you cannot configure Cisco DCNM in Cluster mode. Note 3. In the In-Band Network area, enter the IPv4 address and Gateway IPv4 Address for the in-band network. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Ensure that the IP addresses belong to the same In-Band network configured on the Primary node. Note The In-Band Network provides reachability to the devices via the front-panel ports. If you do not configure in-band network, Endpoint Locator and Telemetry features are not operational. Note Click Next. g) On the Applications tab, configure the Internal Applications Services Network, and Cluster mode settings. 1. In the Internal Application Services Network area, in the IPv4 Subnet field, enter the IP subnet to access the applications that run internally to DCNM. 2. In the Clustered mode configuration area, configure the network settings to deploy the DCNM instance in Clustered mode. In Clustered mode, applications run on separate compute nodes. • In the Out-of-Band IPv4 Network Address Pool, enter the address pool from the Out-of-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the Out-of-Band IPv6 Network Address Pool field. • In the In-Band IPv4 Network Address Pool, enter the address pool from the In-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the In-Band IPv6 Network Address Pool field. Ensure that the IP addresses belong to the same pool as configured on the Primary node. h) On the HA Settings tab, configure the system settings for the Secondary node. • In the Management IPv4 Address of Primary DCNM node field, enter the appropriate IP Address to access the DCNM UI. • In the VIP Fully qualified Host Name field, enter hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Host names with only digits is not supported. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 31 Installing the Cisco DCNM Installing the Cisco DCNM OVA in Native HA mode • In the Management Network VIP address field, enter the IP address used as VIP in the management network. Optionally, you can also enter an IPv6 VIP address in the Management Network VIPv6 address field. If you have configured the Management network using IPv6 address, ensure that you configure the Management Network VIPv6 Address. Note • In the Out-of-Band Network VIP Address field, enter the IP address used as VIP in the Out-of-Band network. Optionally, you can also enter an IPv6 VIP address in the Out-of-Band Network VIPv6 Address field. • In the In-Band Network VIP Address field, enter the IP address used as VIP in the Out-of-Band network. Optionally, you can also enter an IPv6 VIP address in the In-Band Network VIPv6 Address field. This field is mandatory if you have provided an IP address for In-Band network in the Network Settings tab. Note • In the HA Ping Feature IPv4 Address field, enter the HA ping IP address and enable this feature, if necessary. The configured IPv4 address must respond to the ICMP echo pings. Note HA_PING_ADDRESS, must be different from the DCNM Active and Standby addresses. You must configure the HA ping IPv4 Address to avoid the Split Brain scenario. This IP address must belong to Enhanced Fabric management network. Click Next. i) On the Summary tab, review the configuration details. Click Previous to go to the previous tabs and modify the configuration. Click Start Installation to complete the Cisco DCNM OVA Installation for the chosen deployment mode. A progress bar appears to show the completed percentage, description of the operation, and the elapsed time during the installation. After the progress bar shows 100%, click Continue. A success message appears with the URL to access DCNM Web UI. *************************************************************** Your Cisco Data Center Network Manager software has been installed. DCNM Web UI is available at https://<<IP Address>> You will be redirected there in 60 seconds. Thank you *************************************************************** Note If the Cisco DCNM is running behind a firewall, ensure that you open the port 2443 to launch Cisco DCNM Web UI. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 32 Installing the Cisco DCNM Installing DCNM on ISO Virtual Appliance What to do next Log on to the DCNM Web UI with appropriate credentials. Click the Settings icon and choose About DCNM. You can view and verify the Installation type that you have deployed. If you have configured inband management (eth2) IP addresses for device management, login to standalone server and configure the inband network reachability from eth2 of the server to the switches by using the following commands: dcnm# appmgr update network-properties add route ipv4 eth2 <ipv4-network-ip-address/prefix> For example: If you have four switches with all fabric links connected through 10.0.0.x/30 subnet, and if all switches are configured with the loopback interface for inband reachability in subnet 40.1.1.0/24, use the following commands: dcnm# dcnm# dcnm# dcnm# appmgr appmgr appmgr appmgr update update update update network-properties network-properties network-properties network-properties session start add route ipv4 eth2 10.0.0.0/24 add route ipv4 eth2 40.1.1.0/24 session apply Installing DCNM on ISO Virtual Appliance This chapter contains the following sections: Note The screenshots in this section may change in your setup based on how you are booting the ISO; you will either see the blue (BIOS) screen or the black (UEFI) screen. Downloading the ISO Virtual Appliance File The first step to installing the ISO Virtual Appliance is to download the dcnm.iso file. You must point to that dcnm.iso file on your computer when preparing the server for installing DCNM. Note If you plan to use HA application functions, you must deploy the dcnm.iso file twice. Procedure Step 1 Go to the following site: http://software.cisco.com/download/ . Step 2 In the Select a Product search box, enter Cisco Data Center Network Manager. Click on Search icon. Step 3 Click on Data Center Network Manager from the search results. A list of the latest release software for Cisco DCNM available for download is displayed. Step 4 In the Latest Releases list, choose Release . Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 33 Installing the Cisco DCNM Installing the DCNM ISO Virtual Appliance on UCS (Bare Metal) Step 5 Locate the DCNM ISO Virtual Appliance Installer and click the Download icon. Step 6 Locate the DCNM VM templates at DCNM Virtual Appliance definition files for VMWare (.ovf) and KVM (domain XMLs) environment and click Download. Step 7 Save the dcnm.iso file to your directory that will be easy to find when you being the installation. What to do next You can choose to install DCNM On KVM or Baremetal servers. Refer to Installing the DCNM ISO Virtual Appliance on KVM, on page 41 or Installing the DCNM ISO Virtual Appliance on UCS (Bare Metal), on page 34 for more information. Installing the DCNM ISO Virtual Appliance on UCS (Bare Metal) From Release 11.3(1), you can install Cisco DCNM ISO using an additional mode where the physical interfaces are bound together for a port channel or ethernet channel configured as a trunk with the management traffic, out-of-band traffic, and in-band traffic separated in different VLANs. Ensure that the switch is configured correctly for bundled interface mode. The following shows a sample switch configuration for bundled interface mode: vlan 100 vlan 101 vlan 102 interface port-channel1 switchport switchport mode trunk interface Ethernet101/1/1 switchport mode trunk channel-group 1 no shutdown interface Ethernet101/1/2 switchport mode trunk channel-group 1 no shutdown interface Ethernet101/1/3 switchport mode trunk channel-group 1 no shutdown interface Ethernet101/1/4 switchport mode trunk channel-group 1 no shutdown Perform the following tasks to install the DCNM ISO virtual appliance on UCS. Procedure Step 1 Step 2 Launch Cisco Integrated Management Controller (CIMC). Click the Launch KVM button. You can either launch Java-based KVM or HTML-based KVM. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 34 Installing the Cisco DCNM Installing the DCNM ISO Virtual Appliance on UCS (Bare Metal) Step 3 Click the URL displayed on the window to continue loading the KVM client application. Step 4 On the Menu bar, click Virtual Media > Activate Virtual Devices. Step 5 Click Virtual Media and choose one of the following mediums to browse and upload DCNM ISO images from the following: • Map CD/DVD • Map Removable Disk • Map Floppy Disk Navigate to the location where the ISO image is located and load the ISO image. Step 6 Select Power > Reset System (warm boot) and Ok to continue and restart the UCS box. Step 7 Press F6 interrupt the reboot process when the server starts to select a boot device. The boot selection menu appears. For more information about using the UCS KVM Console window, see the Cisco UCS Server Configuration Utility, Release 3.1 User Guide at the following URL: https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/sw/ucsscu/user/guide/31/UCS_SCU/ booting.html#wp1078073 Step 8 Use the arrow keys to select Cisco Virtual CD/DVD and press Enter. The server boots with the DCNM ISO image from the mapped location. Note The following image highlights UEFI installation. However, you can also choose Cisco vKVM-Mapped vDVD1.22 for BIOS installation. ISO can be booted in both modes, BIOS, and UEFI. UEFI is mandatory for a system with minimum of 2TB disks. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 35 Installing the Cisco DCNM Installing the DCNM ISO Virtual Appliance on UCS (Bare Metal) For Cisco UCS with the disk size of 2TB or higher and with 4K sector size drivers, the UEFI boot option is required. For more information, see UEFI Boot Mode. Step 9 Select Install Cisco Data Center Network Manager using the up or down arrow keys. Press Enter. The option shown in the following image appears when the ISO image is booted with UEFI. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 36 Installing the Cisco DCNM Installing the DCNM ISO Virtual Appliance on UCS (Bare Metal) Step 10 On the Cisco Management Network Management screen, select the mode to configure the network. Enter 1 to configure the Cisco DCNM network interfaces from the available physical interfaces. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 37 Installing the Cisco DCNM Installing the DCNM ISO Virtual Appliance on UCS (Bare Metal) Enter 2 to configure the Cisco DCNM network interfaces from the available physical interfaces that are bundled together to form a single port-channel, configured as a trunk. Step 11 If you entered 1, to install Cisco DCNM ISO in un-bundled interface mode, select the interface for the networks. The list of available interfaces is displayed on the screen. Choose the Management Interface (eth0) and Out-of-Band interface (eth1) from the Network Interface List. You can also configure the in-band interface (eth2) if necessary. Note If you do not configure In-Band interface, Endpoint Locator and Telemetry features are not operational. However, you can edit the network properties after installation, if required, using the appmgr update network-properties command. For more information, see Editing Network Properties Post DCNM Installation, on page 145. Step 12 If you entered 2, to install Cisco DCNM ISO in bundled interface mode, perform the following tasks: a) Select interface from the list to form a bundle. Note A minimum of one physical interface must be a part of the bundle. Enter q after you enter all the interface that must be added to the bundle. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 38 Installing the Cisco DCNM Installing the DCNM ISO Virtual Appliance on UCS (Bare Metal) b) Enter the VLAN IDs to be used for Management Network, Out-Of-Band Network and In-band Network Select interface from the list to form a bundle. Verify and confirm if the correct VLAN IDs are assigned. Note The VLAN IDs for Management Network and Out-Of-Band Network can be the same when Management Network and Out-Of-Band Network use the same subnet (that is, when eth0/eth1 are in the same subnet) Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 39 Installing the Cisco DCNM Installing the DCNM ISO Virtual Appliance on UCS (Bare Metal) Step 13 Review the selected interfaces. Press y to confirm and continue with the installation. Step 14 Configure the Management Network for Cisco DCNM. Enter the IP address, Subnet Mask, and Gateway. Press y to continue with the installation. After the installation is complete, the system reboots and a message indicating that the DCNM appliance is configuring appears on the screen. *************************************************************** Please point your web browser to http://<IP-address>:<port-number> to complete the application *************************************************************** Copy and paste the URL to the browser to complete the installation using the Web Installer. What to do next You can choose to install DCNM in Standalone mode or Native HA mode. For more information, see Installing Cisco DCNM ISO in Standalone Mode, on page 51 or Installing the Cisco DCNM ISO in Native HA mode, on page 55. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 40 Installing the Cisco DCNM Installing the DCNM ISO Virtual Appliance on KVM Installing the DCNM ISO Virtual Appliance on KVM Perform the following tasks to install the ISO virtual appliance on KVM. Procedure Step 1 Unzip and extract and locate the dcnm-kvm-vm.xml file. Step 2 Upload this file on the RHEL server that is running KVM to the same location as the ISO. Step 3 Connect to the RHEL server running KVM via SCP File transfer terminal. Step 4 Upload the and dcnm-kvm-vm.xml to the RHEL server. Step 5 Close the file transfer session. Step 6 Connect to the RHEL server running KVM via SSH terminal. Step 7 Navigate to the location where both the ISO and domain XMLs is downloaded. Step 8 Create the VM (or Domains, as they are known in the KVM terminology) using the virsh command. need info on dcnm-kvm-vm-huge.xml sudo virsh define [{dcnm-kvm-vm-huge.xml | dcnm-kvm-vm-compute.xml | dcnm-kvm-vm-large.xml | dcnm-kvm-vm-small.xml}] Step 9 Enable a VNC server and open the required firewall ports. Step 10 Close the SSH session. Step 11 Connect to the RHEL server running KVM via a VNC terminal. Step 12 Navigate to Applications > System Tools > Virtual Machine Manager (VMM). A VM is created in the Virtual Machine Manager. Step 13 From Virtual Machine Manager, edit the VM by selecting the VM in the listing. Click Edit > Virtual Machine Details > Show virtual hardware details. Step 14 In the Virtual Hardware Details, navigate to Add Hardware > Storage. Step 15 Create a hard disk with Device type withe the following specifications: • device type: IDE disk • cache-mode: default • storage format: raw We recommend that you use storage size of 500GB. Step 16 Select IDE CDROM on the edit window of the Virtual Machine and click Connect. Step 17 Navigate to dcnm-va.iso and click OK. Step 18 Select both the NICs and assign appropriate networks that are created. Step 19 Power on the Virtual Machine. Note Before you power on the VM, ensure that you have reserved appropriate resources for the VM, such as CPU and memory, based on the chosen deployment configuration. The operating system is installed. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 41 Installing the Cisco DCNM Installing the DCNM ISO Virtual Appliance on Windows Hyper-V Step 20 On the Cisco Management Network Management screen, select the interface for the networks. The list of available interfaces is displayed on the screen. Choose the Management Interface (eth0) and Out-of-Band interface (eth1) from the Network Interface List. You can also configure in-band interface (eth2) if necessary. Note If you do not configure in-band interface (eth2), Endpoint Locator and Telemetry features are not operational. However, you can edit the network properties after installation, if required, using the appmgr update network-properties command. For more information, see Editing Network Properties Post DCNM Installation, on page 145. Step 21 Press y to confirm and continue with the installation. Step 22 Configure the Management Network. Enter the IP address, Subnet Mask, and Gateway. Press y to continue with the installation. After the installation is complete, the system reboots and a message indicating that the DCNM appliance is configuring appears on the screen. *************************************************************** Please point your web browser to http://<IP-address>:<port-number> to complete the application *************************************************************** Copy and paste the URL to the browser to complete the installation using the Web Installer. What to do next You can choose to install DCNM in Standalone mode or Native HA mode. Refer to Installing Cisco DCNM ISO in Standalone Mode, on page 51 or Installing the Cisco DCNM ISO in Native HA mode, on page 55 for more information. Installing the DCNM ISO Virtual Appliance on Windows Hyper-V Hyper-V Manager provides management access to your virtualization platform. You can install DCNM ISO virtual appliance using Hyper-V manager. Launch the Windows Server Manager using appropriate credentials. To launch the Hyper-V Manager, from the Menu bar, choose Tools > Hyper-V Manager. Note DCNM ISO Virtual Appliance on Windows Hyper-V doesn’t support Clustered mode. To install Cisco DCNM ISO Virtual Appliance on Windows Hyper-V, perform the following tasks: Creating Virtual Switches Cisco DCNM requires three virtual switches for network interfaces: • dcnm-mgmt network (eth0) interface Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 42 Installing the Cisco DCNM Creating Virtual Switches • enhanced-fabric-mgmt (eth1) interface • enhanced-fabric-inband (eth2) interface To create Virtual Switches on the Hyper-V Manager, perform the following steps: Procedure Step 1 On the Action pane, click Virtual Switch Manager. The Virtual Switch Manager for the Windows Hyper-V window appears. Step 2 On the left pane, under Virtual Switches, click New virtual network switch to create a virtual switch. Step 3 Create the virtual switch for DCNM Management network. a) Select External and click Create Virtual Switch. b) In the Name field, enter the enter an appropriate name for the eth0 interface. Note Ensure that the virtual switch name is unique within the Inventory. c) From the External network drop-down list, select the appropriate physical interface available on the server. d) Click Apply. Step 4 Create the virtual switch for Enhanced Fabric Management interface. a) Select External and click Create Virtual Switch. b) In the Name field, enter the enter an appropriate name for the eth1 interface. Note Ensure that the virtual switch name is unique within the Inventory. c) From the External network drop-down list, select the appropriate physical interface available on the server. d) Click Apply. Step 5 Create the virtual switch for Enhanced Fabric Inband interface. a) Select External and click Create Virtual Switch. b) In the Name field, enter the enter an appropriate name for the eth2 interface. Note Ensure that the virtual switch name is unique within the Inventory. c) From the External network drop-down list, select the appropriate physical interface available on the server. d) Click Apply. All the interfaces appear under the Virtual Switches in the left pane, as shown in the following figure. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 43 Installing the Cisco DCNM Creating Virtual Machines What to do next Create the Virtual Machines to mount the ISO. Refer to Creating Virtual Machines, on page 44 for more information. Creating Virtual Machines To create virtual machines for either Standalone, or Primary and Secondary nodes for Native HA setup, perform the following procedure: Before you begin If you’re installing Cisco DCNM in Native HA Mode, you must create two virtual machines; one for Primary node, and one for Secondary node. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 44 Installing the Cisco DCNM Creating Virtual Machines Procedure Step 1 In the Actions pane, from the New drop-down list, select Virtual Machine. The New Virtual Machine Wizard appears. Step 2 In the Before You Begin screen, click Next. Step 3 In the Specify Name and Location screen, enter the name for the Active DCNM node. Click Next. Step 4 In the Specify Generation screen, select Generation 2. This virtual machine supports new virtualization features, has UEFI-based firmware, and requires 64-bit operating system. Click Next. Step 5 In the Assign Memory screen, in the Startup memory field, enter 32768 MB to configure the virtual machine with 32GB memory. To verify recommended configurations, refer to System Requirements. Click Next. Step 6 In the Configuration Networking screen, from the Connection drop-down list, select the interface for this VM. Select eth0 (Management Network interface). Click Next. Step 7 In the Connect Virtual Hard Disk screen, create a virtual hard disk. a) Select Create a virtual hard disk. b) Enter appropriate Name, Location, and Size of the hard disk. Note The default name for the virtual hard disk is derived from the virtual machine name that you provided in the Specify Name and Location screen. The size of the hard disk must be minimum of 500GB. Click Next. Step 8 In the Installation Options screen, select Install as operating system from a bootable image file. In the Image file (.iso) field, click Browse. Navigate to the directory and select the DCNM 11.4(1) ISO image. Click Next. Step 9 In the Summary screen, review the configuration details. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 45 Installing the Cisco DCNM Creating Virtual Machines Click Finish to create the DCNM Active node. The newly created virtual machine appears in the Virtual Machines block on the Hyper-V Manager. Step 10 Right click on the virtual machine and select Settings. The Settings screen for DCNM node appears. Step 11 On the left pane, in the Hardware block, click Add Hardware. Step 12 In the main pane, select Network Adapter and click Add. Step 13 In the Network Adapter screen, create network adapter for the virtual switch. • From the Virtual Switch drop-down list, select the eth1 virtual switch. Click Apply. • From the Virtual Switch drop-down list, select the eth2 virtual switch. Click Apply. All the three Network Adapters are displayed in the left pane, under the Hardware section. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 46 Installing the Cisco DCNM Creating Virtual Machines Step 14 In the left pane, select Security. In the main pane, from the template drop-down list, select Microsoft UEFI Certificate Authority. Note This template is a mandatory if you’ve selected the Generation 2 hyper-V virtual machines. Click Apply. Step 15 In the Settings screen, click Processor. In the main pane, in the Number of virtual processors field, enter 32, to choose 32vCPUs. Click Apply. Click OK to confirm the settings for the DCNM node. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 47 Installing the Cisco DCNM Installing DCNM ISO Virtual Appliance What to do next Install the Cisco DCNM ISO on the Windows Hyper-V. Refer to Installing DCNM ISO Virtual Appliance, on page 48 for more information. Installing DCNM ISO Virtual Appliance To configure the DCNM ISO virtual appliance for either Standalone, or Primary and Secondary nodes for Native HA setup, perform the following procedure: Before you begin Ensure that the Virtual Machine is configured correctly with proper security settings. Procedure Step 1 From the Virtual Machines block, right click n the Active node and select Connect. Step 2 In the Virtual Machine Connection screen, from the Menu bar, select Media > DVD Drive to verify the image selected. Click Start. The DCNM Server boots. Step 3 Select Install Cisco Data Center Network Manager using the up or down arrow keys. Press Enter to install the Cisco DCNM Active node. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 48 Installing the Cisco DCNM Installing DCNM ISO Virtual Appliance Step 4 On the Cisco Management Network Management screen, select the interface for the networks. The list of available interfaces is displayed on the screen. Choose the Management Interface (eth0) and Out-of-Band interface (eth1) from the Network Interface List. You can also configure the In-band interface (eth2) if necessary. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 49 Installing the Cisco DCNM Installing DCNM ISO Virtual Appliance Review the selected interfaces. Press y to confirm and continue with the installation. Step 5 Configure the Management Network for Cisco DCNM. Enter the IP address, Subnet Mask, and Gateway. Verify the values and press y to continue with the installation. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 50 Installing the Cisco DCNM Installing Cisco DCNM ISO in Standalone Mode After the installation is complete, the system reboots and a message indicating that the DCNM appliance is configuring appears on the screen. *************************************************************** Please point your web browser to http://<IP-address>:<port-number> to complete the application *************************************************************** Copy and paste the URL to the browser to complete the installation using the Web Installer. What to do next You can choose to install DCNM in Standalone mode or Native HA mode. For more information, see Installing Cisco DCNM ISO in Standalone Mode, on page 51 or Installing the Cisco DCNM ISO in Native HA mode, on page 55. Installing Cisco DCNM ISO in Standalone Mode Paste the URL displayed on the Console tab and hit Enter key. A welcome message appears. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 51 Installing the Cisco DCNM Installing Cisco DCNM ISO in Standalone Mode To complete the installation of Cisco DCNM from the web installer, perform the following procedure. Procedure Step 1 On the Welcome to Cisco DCNM screen, click Get Started. Caution Step 2 If the system configuration does not meet minimum resource requirements, SYSTEM RESOURCE ERROR is displayed on the Web Installer, and the installation will be aborted. Modify the system requirements, and launch the Web Installer to complete the installation. On the Cisco DCNM Installer tab, select Fresh Installation – Standalone radio button. Click Next. Step 3 On the Install Mode tab, choose your DCNM deployment type. From the Installation mode drop-down list, choose LAN Fabric installation mode for the DCNM Appliance. Check the Enable Clustered Mode check box, if you want to deploy Cisco DCNM in Cluster mode. The Compute nodes will be displayed on the Cisco DCNM Web UI > Applications > Compute. The applications will run on the Compute nodes. You can add the compute nodes to a Cluster, later. If Enable Clustered Mode is selected, applications such as, Config Compliance, EPL, and NIA, and NIR won’t work until you install the compute nodes. Note Click Next. Step 4 On the Administration tab, enter information about passwords. • In the Administrator Password field, enter the password that is used to connect to the applications in the Cisco DCNM. All special characters, except %$^=;.*\'" <SPACE> is allowed in the password. Enter the password again in the Repeat Administrator Password field. • In the Database Password field, enter the password for the PostgreSQL database. All special characters, except %$^=;.*\'" <SPACE> is allowed in the password. Enter the password again in the Repeat Database Password field. Note If Database Password field is left blank, it shall consider the Administrator password as the PostgreSQL password. Select the Show passwords in clear text check box to view the password that you have entered. Click Next. Step 5 On the System Settings, configure the settings for the DCNM Appliance. • In the Fully Qualified Hostname field, enter the hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Hostnames with only digits is not supported. • In the DNS Server Address List field, enter the DNS IP address. You can also configure the DNS server using an IPv6 address. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 52 Installing the Cisco DCNM Installing Cisco DCNM ISO in Standalone Mode From Release 11.3(1), you can configure more than one DNS server. Note If you’re using Network Insights applications, ensure that the DNS server is valid and reachable. • In the NTP Server Address List field, enter the IP address of the NTP server. The value must be an IP or IPv6 address or RFC 1123 compliant name. From Release 11.3(1), you can configure more than one NTP server. • From the Timezone drop-down list, select the timezone in which you are deploying the DCNM. Click Next. Step 6 On the Network Settings tab, configure the network parameters used to reach the DCNM Web UI. Figure 4: Cisco DCNM Management Network Interfaces a) In the Management Network area, verify if the auto-populated addresses for Management IPv4 Address and Management Network Default IPv4 Gateway are correct. Modify, if necessary. Note Beginning with Cisco DCNM Release 11.2(1), you can also use an IPv6 address for the Management Network. (Optional) Enter a valid IPv6 address along with the prefix to configure the Management IPv6 Address and the Management Network Default IPv6 Gateway. b) In the Out-of-Band Network area, enter the IPv4 address and Gateway IPv4 Address. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Out-of-band management provides a connection to the device management ports (Typically mgmt0). Note If the out-of-band network is not configured, you cannot configure Cisco DCNM in Cluster mode. c) (Optional) In the In-Band Network area, enter the IPv4 address and Gateway IPv4 Address for the in-band network. This field is mandatory if you have selected the Enable Cluster mode in Step Step 3, on page 52. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. The In-Band Network provides reachability to the devices via the front-panel ports. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 53 Installing the Cisco DCNM Installing Cisco DCNM ISO in Standalone Mode If you do not configure in-band network, Endpoint Locator and Telemetry features are not operational. Note However, you can edit the network properties after installation, if required, using the appmgr update network-properties command. For more information, see Editing Network Properties Post DCNM Installation, on page 145. Click Next. Step 7 On the Applications tab, configure the Device Connector and Internal Applications Services Network, and Cluster mode settings. Device Connector is enabled by default. Note The Device connector is an embedded management controller that enables the capabilities of Cisco Intersight, a cloud-based management platform. a) (Optional) In the Proxy Server field, enter the IP address for the proxy server. The proxy server must be of RFC1123-compliant name. Note By default, port 80 is used for proxy server. Use <proxy-server-ip>:<port> to use proxy server is a different port. If the proxy server must require authentication, enter relevant username and password in the Proxy Server Username and Proxy Server Password fields. b) In the Internal Application Services Network area, in the IPv4 Subnet field, enter the IP subnet to access the applications that run internally to DCNM. All the applications use the IP Address from this subnet. c) In the Clustered mode configuration area, configure the network settings to deploy the DCNM instance in Clustered mode. In Clustered mode, applications run on separate compute nodes. The Cluster Mode configuration area appears only if you have selected the Enable Clustered Mode check box in Step Step 3, on page 52. Note In Clustered mode, the Cisco DCNM Applications run on separate DCNM Compute Nodes. • In the Out-of-Band IPv4 Network Address Pool, enter the address pool from the Out-of-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the Out-of-Band IPv6 Network Address Pool field. • In the In-Band IPv4 Network Address Pool, enter the address pool from the In-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the In-Band IPv6 Network Address Pool field. The address must be a smaller prefix of available IP addresses from the eth1 subnet. For example: Use 10.1.1.240/28 if the eth1 subnet was configured as 10.1.1.0/24 during installation. This subnet must be a minimum of /28 (16 addresses) and maximum of /24 (256 addresses). It should also be longer than the east-west pool. This subnet is assigned to containers, to communicate with the switches. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 54 Installing the Cisco DCNM Installing the Cisco DCNM ISO in Native HA mode Click Next. Step 8 On the Summary tab, review the configuration details. Click Previous to go to the previous tabs and modify the configuration. Click Start Installation to complete the Cisco DCNM Installation for the chosen deployment mode. A progress bar appears showing the completed percentage, description of the operation, and the elapsed time during the installation. After the progress bar shows 100%, click Continue. A success message appears with the URL to access DCNM Web UI. *************************************************************** Your Cisco Data Center Network Manager software has been installed. DCNM Web UI is available at https://<<IP Address>> You will be redirected there in 60 seconds. Thank you *************************************************************** Note If the Cisco DCNM is running behind a firewall, ensure that you open the port 2443 to launch Cisco DCNM Web UI. Note If you try to access the DCNM Web UI using the Management IP address while the installation is still in progress, an error message appears on the console. *************************************** *Preparing Appliance* *************************************** What to do next Log on to the DCNM Web UI with appropriate credentials. Click the Settings icon and choose About DCNM. You can view and verify the Installation type that you have deployed. If you have configured inband management (eth2) IP addresses for device management, login to standalone server and configure the inband network reachability from eth2 of the server to the switches by using the following commands: dcnm# appmgr update network-properties add route ipv4 eth2 <ipv4-network-ip-address/prefix> For example: If you have four switches with all fabric links connected through 10.0.0.x/30 subnet, and if all switches are configured with the loopback interface for inband reachability in subnet 40.1.1.0/24, use the following commands: dcnm# dcnm# dcnm# dcnm# appmgr appmgr appmgr appmgr update update update update network-properties network-properties network-properties network-properties session start add route ipv4 eth2 10.0.0.0/24 add route ipv4 eth2 40.1.1.0/24 session apply Installing the Cisco DCNM ISO in Native HA mode The native HA is supported on DCNM appliances with ISO or OVA installation only. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 55 Installing the Cisco DCNM Installing the Cisco DCNM ISO in Native HA mode By default, an embedded PostgreSQL database engine with the Cisco DCNM. The native HA feature allows two Cisco DCNM appliances to run as active and standby applications, with their embedded databases synchronized in real time. Therefore, when the active DCNM is not functioning, the standby DCNM takes over with the same database data and resume the operation. Perform the following task to set up Native HA for DCNM. Procedure Step 1 Deploy two DCNM Virtual Appliances (either OVA or ISO). For example, let us indicate them as dcnm1 and dcnm2. Step 2 Configure dcnm1 as the Primary node. Paste the URL displayed on the Console tab of dcnm1 and press Enter key. A welcome message appears. a) On the Welcome to Cisco DCNM screen, click Get Started. Caution If the system configuration does not meet minimum resource requirements, SYSTEM RESOURCE ERROR is displayed on the Web Installer, and the installation will be aborted. Modify the system requirements, and launch the Web Installer to complete the installation. b) On the Cisco DCNM Installer tab, select Fresh Installation - HA Primary radio button, to install dcnm1 as Primary node. Click Next. c) On the Install Mode tab, choose your DCNM deployment type. From the Installation mode drop-down list, choose LAN Fabric installation mode for the DCNM Appliance. Check the Enable Clustered Mode check box, if you want to deploy Cisco DCNM in Cluster mode. The Compute nodes will be displayed on the Cisco DCNM Web UI > Applications > Compute. The applications will run on the Compute nodes. You can add the compute nodes to a Cluster, later. Note If Enable Clustered Mode is selected, applications such as, Config Compliance, EPL, and NIA, and NIR won’t work until you install the compute nodes. Click Next. d) On the Administration tab, enter information about passwords. • In the Administrator Password field, enter the password that is used to connect to the applications in the Cisco DCNM. All special characters, except %$^=;.*\'" <SPACE> is allowed in the password. Enter the password again in the Repeat Administrator Password field. • In the Database Password field, enter the password for the PostgreSQL database. All special characters, except %$^=;.*\'" <SPACE> is allowed in the password. Enter the password again in the Repeat Database Password field. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 56 Installing the Cisco DCNM Installing the Cisco DCNM ISO in Native HA mode Note If the Database Password field is left blank, it shall consider the Administrator password as the PostgreSQL password. Select the Show passwords in clear text check box to view the password that you have entered. Click Next. e) On the System Settings, configure the settings for the DCNM Appliance. • In the Fully Qualified Hostname field, enter the hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Hostnames with only digits is not supported. • In the DNS Server Address List field, enter the DNS IP address. Beginning with Release 11.2(1), you can also configure the DNS server using an IPv6 address. From Release 11.3(1), you can configure more than one DNS server. Note If you’re using Network Insights applications, ensure that the DNS server is valid and reachable. • In the NTP Server Address List field, enter the IP address of the NTP server. The value must be an IP or IPv6 address or RFC 1123 compliant name. From Release 11.3(1), you can configure more than one NTP server. • From the Timezone drop-down list, select the timezone in which you are deploying the DCNM. Click Next. f) On the Network Settings tab, configure the network parameters used to reach the DCNM Web UI. Figure 5: Cisco DCNM Management Network Interfaces 1. In the Management Network area, verify if the auto-populated addresses for Management IPv4 Address and Management Network Default IPv4 Gateway are correct. Modify, if necessary. Note Beginning with Cisco DCNM Release 11.2(1), you can also use an IPv6 address for the Management Network. (Optionally) Enter a valid IPv6 address along with the prefix to configure the Management IPv6 Address and the Management Network Default IPv6 Gateway. 2. In the Out-of-Band Network area, enter the IPv4 address and Gateway IPv4 Address. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 57 Installing the Cisco DCNM Installing the Cisco DCNM ISO in Native HA mode If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Out-of-band management provides a connection to the device management ports (Typically mgmt0). If the out-of-band network is not configured, you cannot configure Cisco DCNM in Cluster mode. Note 3. In the In-Band Network area, enter the IPv4 address and Gateway IPv4 Address for the in-band network. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. The In-Band Network provides reachability to the devices via the front-panel ports. If you do not configure in-band network, Endpoint Locator and Telemetry features are not operational. Note However, you can edit the network properties after installation, if required, using the appmgr update network-properties command. For more information, see Editing Network Properties Post DCNM Installation, on page 145. Click Next. g) On the Applications tab, configure the Device Connector and Internal Applications Services Network. Device Connector is enabled by default. Note The Device connector is an embedded management controller that enables the capabilities of Cisco Intersight, a cloud-based management platform. 1. In the Proxy Server field, enter the IP address for the proxy server. The proxy server must be of RFC1123-compliant name. Note By default, port 80 is used for proxy server. Use <proxy-server-ip>:<port> to use proxy server is a different port. If the proxy server must require authentication, enter relevant username and password in the Proxy Server Username and Proxy Server Password fields. 2. In the Internal Application Services Network area, in the IPv4 Subnet field, enter the IP subnet to access the applications that run internally to DCNM. All the applications use the IP Address from this subnet. By default, the The Cluster Mode configuration area appears only if you have selected the Enable Clustered Mode check box in Step 2.c, on page 56. Note In Clustered mode, the Cisco DCNM Applications run on separate DCNM Compute Nodes. 3. In the Clustered mode configuration area, configure the network settings to deploy the DCNM instance in Clustered mode. In Clustered mode, applications run on separate compute nodes. • In the Out-of-Band IPv4 Network Address Pool, enter the address pool from the Out-of-Band IPv4 network to be used in the Clustered Mode. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 58 Installing the Cisco DCNM Installing the Cisco DCNM ISO in Native HA mode Optionally, you can also enter an IPv6 address pool in the Out-of-Band IPv6 Network Address Pool field. • In the In-Band IPv4 Network Address Pool, enter the address pool from the In-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the In-Band IPv6 Network Address Pool field. The address must be a smaller prefix of available IP addresses from the eth1 subnet. For example: Use 10.1.1.240/28 if the eth1 subnet was configured as 10.1.1.0/24 during installation. This subnet must be a minimum of /28 (16 addresses) and maximum of /24 (256 addresses). It should also be longer than the east-west pool. This subnet is assigned to containers, to communicate with the switches. h) On the HA Settings tab, a confirmation message appears. You are installing the primary DCNM HA node. Please note that HA setup information will need to be provided when the secondary DCNM HA node is installed. Click Next. i) On the Summary tab, review the configuration details. Click Previous to go to the previous tabs and modify the configuration. Click Start Installation to complete the Cisco DCNM Installation for the chosen deployment mode. A progress bar appears to show the completed percentage, description of the operation, and the elapsed time during the installation. After the progress bar shows 100%, click Continue. A warning message appears stating that the setup is not complete until you install the Secondary node. WARNING: DCNM HA SETUP IS NOT COMPLETE! Your Cisco Data Center Network Manager software has been installed on this HA primary node. However, the system will be ready to be used only after installation of the secondary node has been completed. Thank you. Step 3 Configure dcnm2 as the Secondary node. Paste the URL displayed on the Console tab of dcnm2 and hit Enter. A welcome message appears. a) On the Welcome to Cisco DCNM screen, click Get Started. Caution If the system configuration does not meet minimum resource requirements, SYSTEM RESOURCE ERROR is displayed on the Web Installer, and the installation will be aborted. Modify the system requirements, and launch the Web Installer to complete the installation. b) On the Cisco DCNM Installer screen, select Fresh Installation - HA Secondary radio button, to install dcnm2 as Secondary node. Click Continue. c) On the Install Mode tab, from the drop-down list, choose the same installation mode that you selected for the Primary node. Note The HA installation fails if you do not choose the same installation mode as Primary node. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 59 Installing the Cisco DCNM Installing the Cisco DCNM ISO in Native HA mode Check the Enable Clustered Mode check box, if you have configured the Cisco DCNM Primary in Clustered mode. Click Next. d) On the Administration tab, enter information about passwords. All the passwords must be same as the passwords that you provided while configuring the Primary node. Note e) On the System Settings, configure the settings for the DCNM Appliance. • In the Fully Qualified Hostname field, enter the hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Hostnames with only digits is not supported. • In the DNS Server Address List field, enter the DNS IP address. Beginning with Release 11.2(1), you can also configure the DNS server using an IPv6 address. From Release 11.3(1), you can configure more than one DNS server. Note If you’re using Network Insights applications, ensure that the DNS server is valid and reachable. • In the NTP Server Address List field, enter the IP address of the NTP server. The value must be an IP or IPv6 address or RFC 1123 compliant name. From Release 11.3(1), you can configure more than one NTP server. • From the Timezone drop-down list, select the timezone in which you are deploying the DCNM. Click Next. f) On the Network Settings tab, configure the network parameters used to reach the DCNM Web UI. Figure 6: Cisco DCNM Management Network Interfaces 1. In the Management Network area, verify if the auto-populated addresses for Management IPv4 Address and Management Network Default IPv4 Gateway are correct. Modify, if necessary. Note Ensure that the IP address belongs to the same Management Network configured on the Primary node. (Optionally) Enter a valid IPv6 address along with the prefix to configure the Management IPv6 Address and the Management Network Default IPv6 Gateway. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 60 Installing the Cisco DCNM Installing the Cisco DCNM ISO in Native HA mode 2. In the Out-of-Band Network area, enter the IPv4 address and Gateway IPv4 Address. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Ensure that the IP addresses belong to the same Out-of-Band network configured on the Primary node. Note Out-of-band management provides a connection to the device management ports (Typically mgmt0). If the out-of-band network is not configured, you cannot configure Cisco DCNM in Cluster mode. Note 3. In the In-Band Network area, enter the IPv4 address and Gateway IPv4 Address for the in-band network. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Ensure that the IP addresses belong to the same In-Band network configured on the Primary node. Note The In-Band Network provides reachability to the devices via the front-panel ports. If you do not configure in-band network, Endpoint Locator and Telemetry features are not operational. Note Click Next. g) On the Applications tab, configure the Internal Applications Services Network, and Cluster mode settings. 1. In the Internal Application Services Network area, in the IPv4 Subnet field, enter the IP subnet to access the applications that run internally to DCNM. 2. In the Clustered mode configuration area, configure the network settings to deploy the DCNM instance in Clustered mode. In Clustered mode, applications run on separate compute nodes. • In the Out-of-Band IPv4 Network Address Pool, enter the address pool from the Out-of-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the Out-of-Band IPv6 Network Address Pool field. • In the In-Band IPv4 Network Address Pool, enter the address pool from the In-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the In-Band IPv6 Network Address Pool field. Ensure that the IP addresses belong to the same pool as configured on the Primary node. h) On the HA Settings tab, configure the system settings for the Secondary node. • In the Management IPv4 Address of Primary DCNM node field, enter the appropriate IP Address to access the DCNM UI. • In the VIP Fully qualified Host Name field, enter hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Host names with only digits is not supported. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 61 Installing the Cisco DCNM Installing the Cisco DCNM ISO in Native HA mode • In the Management Network VIP address field, enter the IP address used as VIP in the management network. Optionally, you can also enter an IPv6 VIP address in the Management Network VIPv6 address field. If you have configured the Management network using IPv6 address, ensure that you configure the Management Network VIPv6 Address. Note • In the Out-of-Band Network VIP Address field, enter the IP address used as VIP in the Out-of-Band network. Optionally, you can also enter an IPv6 VIP address in the Out-of-Band Network VIPv6 Address field. • In the In-Band Network VIP Address field, enter the IP address used as VIP in the Out-of-Band network. Optionally, you can also enter an IPv6 VIP address in the In-Band Network VIPv6 Address field. This field is mandatory if you have provided an IP address for In-Band network in the Network Settings tab. Note • In the HA Ping Feature IPv4 Address field, enter the HA ping IP address and enable this feature, if necessary. The configured IPv4 address must respond to the ICMP echo pings. Note HA_PING_ADDRESS, must be different from the DCNM Active and Standby addresses. You must configure the HA ping IPv4 Address to avoid the Split Brain scenario. This IP address must belong to Enhanced Fabric management network. Click Next. i) On the Summary tab, review the configuration details. Click Previous to go to the previous tabs and modify the configuration. Click Start Installation to complete the Cisco DCNM OVA Installation for the chosen deployment mode. A progress bar appears to show the completed percentage, description of the operation, and the elapsed time during the installation. After the progress bar shows 100%, click Continue. A success message appears with the URL to access DCNM Web UI. *************************************************************** Your Cisco Data Center Network Manager software has been installed. DCNM Web UI is available at https://<<IP Address>> You will be redirected there in 60 seconds. Thank you *************************************************************** Note If the Cisco DCNM is running behind a firewall, ensure that you open the port 2443 to launch Cisco DCNM Web UI. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 62 Installing the Cisco DCNM Convert Standalone Setup to Native-HA Setup What to do next Log on to the DCNM Web UI with appropriate credentials. Click the Settings icon and choose About DCNM. You can view and verify the Installation type that you have deployed. If you have configured inband management (eth2) IP addresses for device management, login to standalone server and configure the inband network reachability from eth2 of the server to the switches by using the following commands: dcnm# appmgr update network-properties add route ipv4 eth2 <ipv4-network-ip-address/prefix> For example: If you have four switches with all fabric links connected through 10.0.0.x/30 subnet, and if all switches are configured with the loopback interface for inband reachability in subnet 40.1.1.0/24, use the following commands: dcnm# dcnm# dcnm# dcnm# appmgr appmgr appmgr appmgr update update update update network-properties network-properties network-properties network-properties session start add route ipv4 eth2 10.0.0.0/24 add route ipv4 eth2 40.1.1.0/24 session apply Convert Standalone Setup to Native-HA Setup To convert an existing Cisco DCNM Standalone setup to a Native HA setup, perform the following steps: Before you begin Ensure that the Standalone setup is active and operational, by using the appmgr show version command. dcnm# appmgr show version Cisco Data Center Network Manager Version: 11.4(1) Install mode: LAN Fabric Standalone node. HA not enabled. dcnm# Procedure Step 1 On the Standalone setup, launch SSH and enable root user access by using the appmgr root-access permit command: dcnm# appmgr root-access permit Step 2 Deploy a new DCNM as secondary node. Choose Fresh installation - HA Secondary For example, let us indicate the existing setup as dcnm1 and the new DCNM as secondary node as dcnm2. Caution Step 3 If the system configuration does not meet minimum resource requirements, SYSTEM RESOURCE ERROR is displayed on the Web Installer, and the installation will be aborted. Modify the system requirements, and launch the Web Installer to complete the installation. Configure dcnm2 as the Secondary node. Paste the URL displayed on the Console tab of dcnm2 and hit Enter. A welcome message appears. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 63 Installing the Cisco DCNM Convert Standalone Setup to Native-HA Setup a) On the Welcome to Cisco DCNM screen, click Get Started. Caution If the system configuration does not meet minimum resource requirements, SYSTEM RESOURCE ERROR is displayed on the Web Installer, and the installation will be aborted. Modify the system requirements, and launch the Web Installer to complete the installation. b) On the Cisco DCNM Installer screen, select Fresh Installation - HA Secondary radio button, to install dcnm2 as Secondary node. Click Continue. c) On the Install Mode tab, from the drop-down list, choose the same installation mode that you selected for the Primary node. The HA installation fails if you do not choose the same installation mode as Primary node. Note Check the Enable Clustered Mode check box, if you have configured the Cisco DCNM Primary in Clustered mode. Click Next. d) On the Administration tab, enter information about passwords. All the passwords must be same as the passwords that you provided while configuring the Primary node. Note e) On the System Settings, configure the settings for the DCNM Appliance. • In the Fully Qualified Hostname field, enter the hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Hostnames with only digits is not supported. • In the DNS Server Address List field, enter the DNS IP address. Beginning with Release 11.2(1), you can also configure the DNS server using an IPv6 address. From Release 11.3(1), you can configure more than one DNS server. Note If you’re using Network Insights applications, ensure that the DNS server is valid and reachable. • In the NTP Server Address List field, enter the IP address of the NTP server. The value must be an IP or IPv6 address or RFC 1123 compliant name. From Release 11.3(1), you can configure more than one NTP server. • From the Timezone drop-down list, select the timezone in which you are deploying the DCNM. Click Next. f) On the Network Settings tab, configure the network parameters used to reach the DCNM Web UI. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 64 Installing the Cisco DCNM Convert Standalone Setup to Native-HA Setup Figure 7: Cisco DCNM Management Network Interfaces 1. In the Management Network area, verify if the auto-populated addresses for Management IPv4 Address and Management Network Default IPv4 Gateway are correct. Modify, if necessary. Note Ensure that the IP address belongs to the same Management Network configured on the Primary node. (Optionally) Enter a valid IPv6 address along with the prefix to configure the Management IPv6 Address and the Management Network Default IPv6 Gateway. 2. In the Out-of-Band Network area, enter the IPv4 address and Gateway IPv4 Address. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Note Ensure that the IP addresses belong to the same Out-of-Band network configured on the Primary node. Out-of-band management provides a connection to the device management ports (Typically mgmt0). Note If the out-of-band network is not configured, you cannot configure Cisco DCNM in Cluster mode. 3. In the In-Band Network area, enter the IPv4 address and Gateway IPv4 Address for the in-band network. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Note Ensure that the IP addresses belong to the same In-Band network configured on the Primary node. The In-Band Network provides reachability to the devices via the front-panel ports. Note If you do not configure in-band network, Endpoint Locator and Telemetry features are not operational. Click Next. g) On the Applications tab, configure the Internal Applications Services Network, and Cluster mode settings. 1. In the Internal Application Services Network area, in the IPv4 Subnet field, enter the IP subnet to access the applications that run internally to DCNM. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 65 Installing the Cisco DCNM Convert Standalone Setup to Native-HA Setup 2. In the Clustered mode configuration area, configure the network settings to deploy the DCNM instance in Clustered mode. In Clustered mode, applications run on separate compute nodes. • In the Out-of-Band IPv4 Network Address Pool, enter the address pool from the Out-of-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the Out-of-Band IPv6 Network Address Pool field. • In the In-Band IPv4 Network Address Pool, enter the address pool from the In-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the In-Band IPv6 Network Address Pool field. Ensure that the IP addresses belong to the same pool as configured on the Primary node. h) On the HA Settings tab, configure the system settings for the Secondary node. • In the Management IPv4 Address of Primary DCNM node field, enter the appropriate IP Address to access the DCNM UI. • In the VIP Fully qualified Host Name field, enter hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Host names with only digits is not supported. • In the Management Network VIP address field, enter the IP address used as VIP in the management network. Optionally, you can also enter an IPv6 VIP address in the Management Network VIPv6 address field. Note If you have configured the Management network using IPv6 address, ensure that you configure the Management Network VIPv6 Address. • In the Out-of-Band Network VIP Address field, enter the IP address used as VIP in the Out-of-Band network. Optionally, you can also enter an IPv6 VIP address in the Out-of-Band Network VIPv6 Address field. • In the In-Band Network VIP Address field, enter the IP address used as VIP in the Out-of-Band network. Optionally, you can also enter an IPv6 VIP address in the In-Band Network VIPv6 Address field. Note This field is mandatory if you have provided an IP address for In-Band network in the Network Settings tab. • In the HA Ping Feature IPv4 Address field, enter the HA ping IP address and enable this feature, if necessary. Note The configured IPv4 address must respond to the ICMP echo pings. HA_PING_ADDRESS, must be different from the DCNM Active and Standby addresses. You must configure the HA ping IPv4 Address to avoid the Split Brain scenario. This IP address must belong to Enhanced Fabric management network. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 66 Installing the Cisco DCNM Installing Cisco DCNM Compute Node Click Next. i) On the Summary tab, review the configuration details. Click Previous to go to the previous tabs and modify the configuration. Click Start Installation to complete the Cisco DCNM OVA Installation for the chosen deployment mode. A progress bar appears to show the completed percentage, description of the operation, and the elapsed time during the installation. After the progress bar shows 100%, click Continue. A success message appears with the URL to access DCNM Web UI. *************************************************************** Your Cisco Data Center Network Manager software has been installed. DCNM Web UI is available at https://<<IP Address>> You will be redirected there in 60 seconds. Thank you *************************************************************** Note If the Cisco DCNM is running behind a firewall, ensure that you open the port 2443 to launch Cisco DCNM Web UI. What to do next Verify the HA role by using the appmgr show ha-role command. On the Active node (old standalone node): dcnm1# appmgr show ha-role Native HA enabled. Deployed role: Active Current role: Active On the Standby node (newly deployed node): dcnm2# appmgr show ha-role Native HA enabled. Deployed role: Standby Current role: Standby Installing Cisco DCNM Compute Node Paste the URL displayed on the Console tab and hit Enter key. A welcome message appears. You can install compute nodes on both Cisco DCNM OVA and ISO deployments. Note Compute nodes allows users to scale DCNM, as application load can be shared across all the compute nodes, instead of the usual 1 or 2 (if you have HA) nodes. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 67 Installing the Cisco DCNM Installing Cisco DCNM Compute Node Note If Enable Clustered Mode was selected during DCNM installation, applications such as, Configuration Compliance, EPL, NIA, and NIR won’t work until you install the compute nodes. When NIR/NIA applications is enabled at higher scale, that is, with 250 switches and 10000 Hardware telemetry flows, DCNM Computes nodes must be connected on all eth0, eth1, and eth2 interfaces using a 10Gig link. To complete the installation of Cisco DCNM Compute Node from the web installer, perform the following procedure. Before you begin Ensure that you have 16 vCPUs, 64GB RAM, and 500GB hard disc to install compute nodes. By default, the ComputeHuge configuration has 32vCPUs and 128GB RAM with 2TB disk. This configuration is recommended if you use Cisco Network Insights applications. Procedure Step 1 On the Welcome to Cisco DCNM screen, click Get Started. Step 2 On the Cisco DCNM Installer screen, select the Fresh Installation – Standalone radio button. Click Continue. Step 3 On the Install Mode tab, choose Compute to deploy this DCNM instance as a compute node. Compute option appears in the drop-down list only if you have chosen Compute or ComputeHuge while configuring the OVF template or ISO hypervisors. Note Click Next. Step 4 On the Administration tab, enter information about passwords. • In the Administrator Password field, enter the password that is used to connect to the applications in the Cisco DCNM. All special characters, except %$^=;.*\'" <SPACE> is allowed in the password. Enter the password again in the Repeat Administrator Password field. Select the Show passwords in clear text check box to view the password that you have entered. Click Next. Step 5 On the System Settings, configure the settings for the DCNM Appliance. • In the Fully Qualified Hostname field, enter the hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Hostnames with only digits is not supported. • In the DNS Server Address List field, enter the DNS IP address. Beginning with Release 11.2(1), you can also configure the DNS server using an IPv6 address. From Release 11.3(1), you can configure more than one DNS server. Note If you’re using Network Insights applications, ensure that the DNS server is valid and reachable. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 68 Installing the Cisco DCNM Installing Cisco DCNM Compute Node • In the NTP Server Address List field, enter the IP address of the NTP server. The value must be an IP or IPv6 address or RFC 1123 compliant name. From Release 11.3(1), you can configure more than one NTP server. • From the Timezone drop-down list, select the timezone in which you are deploying the DCNM. Click Next. Step 6 On the Network Settings tab, configure the network parameters used to reach the DCNM Web UI. Figure 8: Cisco DCNM Management Network Interfaces a) In the Management Network area, verify if the auto-populated addresses for Management IPv4 Address and Management Network Default IPv4 Gateway are correct. Modify, if necessary. Note Beginning with Cisco DCNM Release 11.2(1), you can also use an IPv6 address for the Management Network. (Optionally) Enter a valid IPv6 address along with the prefix to configure the Management IPv6 Address and the Management Network Default IPv6 Gateway. b) In the Out-of-Band Network area, enter the IPv4 address and Gateway IPv4 Address. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Out-of-band management provides a connection to the device management ports (Typically mgmt0). Note If the out-of-band network is not configured, you cannot configure Cisco DCNM in Cluster mode. c) In the In-Band Network area, enter the IPv4 address and Gateway IPv4 Address for the in-band network. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. The In-Band Network provides reachability to the devices via the front-panel ports. Note If you do not configure in-band network, Endpoint Locator and Telemetry features are not operational. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 69 Installing the Cisco DCNM Installing Cisco DCNM Compute Node However, you can edit the network properties after installation, if required, using the appmgr update network-properties command. For more information, see Editing Network Properties Post DCNM Installation, on page 145. Click Next. Step 7 In the Internal Application Services Network area, in the IPv4 Subnet field, enter the IP subnet to access the applications that run internally to DCNM. All the applications use the IP Address from this subnet. Click Next. Step 8 On the Summary tab, review the configuration details. Click Previous to go to the previous tabs and modify the configuration. Click Start Installation to complete the Cisco DCNM Installation for the chosen deployment mode. A progress bar appears to show the completed percentage, description of the operation, and the elapsed time during the installation. After the progress bar shows 100%, click Continue. A success message appears with the URL to access DCNM Compute Node. *************************************************************** Your Cisco DCNM Compute Node has been installed. Click on the following link to go to DCNM GUI's Application page: DCNM GUI's Applications You will be redirected there in 60 seconds. Thank you *************************************************************** What to do next Log on to the DCNM Web UI with appropriate credentials. The Applications tab displays all the services running on the DCNM deployment that you have installed. Click Compute tab to view the new Compute in Discovered state on the Cisco DCNM Web UI. To add the compute nodes to a cluster, see Adding Computes to a Cluster Node in your deployment-specific Cisco DCNM Configuration Guide for more information. Note If you did not enable clustered mode while installing DCNM, use the appmgr afw config-cluster command to enable the compute cluster. For instructions, refer to Enabling the Compute Cluster in the Cisco DCNM LAN Fabric Configuration Guide. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 70 Installing the Cisco DCNM Installing Cisco DCNM Compute Node When a compute node goes through a unscheduled powercycle and restarts, the Elasticsearch container will not start. It is possible that some filesystems are corrupted. To resolve this issue. reboot the Compute node in safe mode by using fsck -y command. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 71 Installing the Cisco DCNM Installing Cisco DCNM Compute Node Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 72 CHAPTER 5 Upgrading Cisco DCNM This chapter provides information about upgrading Cisco DCNM, and contains the following section: • Upgrading Cisco DCNM, on page 73 • Performance Manager Data Management before Upgrading to Release 11.4(1), on page 73 • Upgrading ISO or OVA through Inline Upgrade, on page 77 Upgrading Cisco DCNM Before Cisco DCNM Release 11.0(1), DCNM OVA, and ISO supported SAN functionality. From Cisco DCNM Release 11.3(1), you can install Cisco DCNM for SAN Deployment on both OVA and ISO virtual appliances. The following table summarizes the type of upgrade that you must follow to upgrade to Release 11.4(1). Table 5: Type of Upgrade for LAN Fabric, and IP for Media (IPFM) deployments Current Release Number Upgrade type to upgrade to Release 11.4(1) 11.3(1) Inline Upgrade 11.2(1) Inline Upgrade 11.1(1) Inline Upgrade 11.0(1) 11.0(1) → 11.2(1) → 11.4(1) 11.0(1) → 11.1(1) → 11.4(1) → represents an Inline Upgrade Performance Manager Data Management before Upgrading to Release 11.4(1) While you upgrade Cisco DCNM to Release 11.4(1), all the necessary software components are upgraded when you upgrade the Cisco DCNM. However, the Elasticsearch versions in the previous releases is not Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 73 Upgrading Cisco DCNM Dropping Performance Manager Data in Cisco DCNM SAN OVA/ISO Deployment compatible with Elasticsearch version in Release 11.4(1), and therefore, the upgrade will not succeed without additional actions. You can choose to discard the old performance manager (PM) data and continue to upgrade to DCNM Release 11.4(1). For instructions about how to drop performance manager data, see Dropping Performance Manager Data. If you choose to retain the old PM data while you upgrade to Release 11.4(1), we recommend that you contact Cisco TAC for further assistance. DroppingPerformanceManagerDatainCiscoDCNMSANOVA/ISODeployment This section provides instructions about how to drop the performance manager data in from DCNM Release 11.3(1) or earlier, as a pre-requisite to upgrade to DCNM 11.4(1). Note If you choose to conserve the Performance Manager data when you upgrade to Release 11.4(1), we recommend that you contact Cisco TAC for further assistance. To drop the Performance Manager (PM) data, perform the following steps: Before you begin • Ensure that the DCNM appliance is operational. (for standalone upgrade) • If you have a Federation setup, ensure that all the nodes in the DCNM Federation setup are operational. (for Federation setup) Procedure Step 1 Launch the SSH session and run the following command to view the PMDB indices. Identify the PMDB indices in the performance manager database. For example: dcnm-root-11-3# curl http://127.0.0.1:33500/_cat/indices?pretty | grep pmdb % Total % Received % Xferd 100 2448 100 2448 0 0 green open pmdb_cpumemdata 1.4mb 760.2kb green open pmdb_ethintfratedata 2.4mb 1.2mb Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 4523 0 --:--:-- --:--:-- --:--:-- 4524 rb-CJf-NR0my8M3mO-7QkA 5 1 7286 P18gMKdPTkCODv0TomYAdw 5 1 9283 You will see indices prefixed with "pmdb_" Step 2 On the Cisco DCNM Web UI, choose Administration > Performance Setup > LAN Collections. Uncheck all the check boxes and click Apply to disable all switches and collections. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 74 0 0 Upgrading Cisco DCNM Dropping Performance Manager Data in Cisco DCNM SAN OVA/ISO Deployment Step 3 Choose Administration > DCNM Server > Server Status. Step 4 Against the Performance Collector service, click the stop icon in the Actions column to stop the data collection. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 75 Upgrading Cisco DCNM Dropping Performance Manager Data in Cisco DCNM SAN OVA/ISO Deployment Step 5 Click the delete icon to clean the Performance Manager database. This action deletes the stale entries in the performance manager database. Step 6 Click on the reinitialize icon to reindex the Elasticsearch database schema. This operation cleans the performance manager data in the Elasticsearch database and restarts the performance manager. It may take a few minutes to complete. Step 7 Click Continue. The status of the Performance Collector service shows Stopped. Step 8 Ensure that you’ve deleted all the PMDB entries using the following command: • For upgrading from Release 11.1(1) curl https://127.0.0.1:33500/_cat/indices?pretty | grep pmdb • For upgrading from Release 11.2(1) curl https://127.0.0.1:33500/_cat/indices?pretty | grep pmdb • For upgrading from Release 11.3(1) curl http://127.0.0.1:33500/_cat/indices?pretty | grep pmdb For example: dcnm-root-11-3# curl http://127.0.0.1:33500/_cat/indices?pretty | grep pmdb % Total 100 Step 9 2244 % Received % Xferd 100 2244 0 0 Average Dload 3638 Speed Time Time Time Current Upload Total Spent Left Speed 0 --:--:-- --:--:-- --:--:-- 3636 Proceed to upgrade the DCNM to Release 11.4(1). Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 76 Upgrading Cisco DCNM Upgrading ISO or OVA through Inline Upgrade Upgrading ISO or OVA through Inline Upgrade Inline upgrade allows you to upgrade DCNM by imposing the new DCNM version to the existing DCNM. After the inline upgrade, ensure that you clear your browser cache before launching the DCNM application. When you install Cisco DCNM, a self-signed certificate is installed, by default. However, after upgrading to the latest Cisco DCNM Release, you must restore the certificates. Note Restoring certificates is a disruptive mechanism; it requires you to stop and restart applications. Restore the certificates only when the upgraded system is stable, that is, you must be able to login to Cisco DCNM Web UI. To restore certificates after upgrade, see Restoring the certificates after an upgrade, on page 122. This section contains the procedure to upgrade the DCNM using the Inline Upgrade method. Note For Classic LAN Deployment upgrade, the deployment is automatically converted to LAN Fabric deployment mode when you upgrade to DCNM Release 11.4(1). Inline Upgrade for DCNM Virtual Appliance in Standalone Mode Inline upgrade allows you to upgrade DCNM by imposing the new DCNM version to the existing DCNM. After the inline upgrade, ensure that you clear your browser cache before launching the DCNM application. Perform the following task to upgrade the DCNM virtual appliance in standalone mode. Before you begin If the Cisco DCNM setup is in clustered mode, ensure that you stop the Network Insights - Resources (NIR) 2.x application. On the Cisco DCNM Web UI, choose Applications > Catalog. On the NIR app, click Stop icon to stop the application. Click Delete to remove the application from the Catalog. Procedure Step 1 Log on to the Cisco DCNM appliance console. Caution If the system requirements does not meet the minimum resource requirements, everytime you logon to DCNM via the console or SSH, SYSTEM RESOURCE ERROR is displayed. Modify the system requirements logon to DCNM via Console/SSH. • For OVA Installation: On the OVF template deployed for the host, right click and select Settings > Launch Web Console. • For ISO Installation: Select the KVM console or UCS (Bare Metal) console. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 77 Upgrading Cisco DCNM Inline Upgrade for DCNM Virtual Appliance in Standalone Mode Caution Do not perform an Inline Upgrade from an SSH Session. The session may timeout and result in an incomplete upgrade. OR Run the following command to create a screen session. dcnm# screen This creates a session which allows you to execute the commands. The commands continue to run even when the window is not visible or if you get disconnected. Step 2 Take a backup of the application data using the appmgr backup command. dcnm# appmgr backup Copy the backup file to a safe location outside the DCNM server. Step 3 Logon to the /root/ directory, by using the su command. dcnm# su Enter password: <<enter-password>> Note Ensure that you have access to the /root/ folder before you mount the ISO to the directory. Step 4 Unzip the dcnm-va.11.4.1.iso.zip file and upload the DCNM 11.4(1) ISO file to the /root/ folder in the DCNM setup that you want to upgrade. Step 5 Create folder that is named iso using the mkdir /mnt/iso command. dcnm# mkdir /mnt/iso Step 6 Mount the DCNM 11.4(1) ISO file on the standalone setup in the /mnt/iso folder. mount -o loop <DCNM 11.4(1) image> /mnt/iso dcnm# mount -o loop dcnm-va.11.4.1.iso /mnt/iso Step 7 Navigate to /mnt/iso/packaged-files/scripts/ and run the ./inline-upgrade.sh script. dcnm# cd /mnt/iso/packaged-files/scripts/ dcnm# ./inline-upgrade.sh Do you want to continue and perform the inline upgrade to 11.4(1)? [y/n]: y Note Step 8 The prompt to enter a new sysadmin password appears while you’re upgrading from Cisco DCNM Release 11.1(1) or Release 11.2(1) only. Provide the new sysadmin user password at the prompt: Note The prompt to enter a new sysadmin password appears while you’re upgrading from Cisco DCNM Release 11.1(1) or Release 11.2(1) only. Enter the password for the new sysadmin user: <<sysadmin_password>> Enter it again for verification: <<sysadmin_password>> After the upgrade is complete, the appliance reboots. After reboot, the SSH \root access is disabled by default. Use sysadmin user. Step 9 Ensure that the DCNM application is functional, by using the appmgr status all command. dcnm# appmgr status all Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 78 Upgrading Cisco DCNM Inline Upgrade for DCNM Virtual Appliance in Native HA Mode Step 10 To verify that you have successfully installed the Cisco DCNM Release 11.4(1), use the appmgr show version command. dcnm# appmgr show version Cisco Data Center Network Manager Version: 11.4(1) Install mode: LAN Fabric Standalone node. HA not enabled. What to do next Logon to the DCNM Web UI with appropriate credentials. Note In Release 11.3(1), the sysadmin and the root user's password are not identical. When you upgrade to 11.4(1), the sysadmin and root user passwords are preserved. However, when you perform backup and restore on DCNM Release 11.4(1) after upgrade, the sysadmin user inherits the password from the root user, and therefore both the users will have the same password. You can change the password for both the users after restore is complete. Click Settings icon and choose About DCNM. You can view and verify the Installation type that you have deployed. To gracefully onboard Cisco DCNM Release 11.1(1), Release 11.2(1), Release 11.3(1) managed VXLAN BGP EVPN fabric(s) comprising Cisco Nexus 9000 switches post upgrade to Cisco DCNM Release 11.4(1), see Post DCNM 11.4(1) Upgrade for VXLAN BGP EVPN, External, and MSD Fabrics. Inline Upgrade for DCNM Virtual Appliance in Native HA Mode Inline upgrade allows you to upgrade DCNM by imposing the new DCNM version to the existing DCNM. After the inline upgrade, ensure that you clear your browser cache before launching the DCNM application. Perform the following task to upgrade the DCNM virtual appliance in Native HA mode. Before you begin • Ensure that both the Cisco DCNM 11.1(1), Cisco DCNM 11.2(1), or Cisco DCNM 11.3(1) Active and Standby peers are up and running. • Before upgrading Cisco DCNM in Clustered mode, stop the Network Insights - Resources (NIR) 2.x application. On the Cisco DCNM Web UI, choose Applications > Catalog. On the NIR app, click Stop icon to stop the application. Click Delete to remove the application from the Catalog. Note Inline upgrade of Cisco DCNM in Clustered mode is supported from Release 11.2(1). Release 11.1(1) doesn’t support inline upgrade for DCNM in clustered mode. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 79 Upgrading Cisco DCNM Inline Upgrade for DCNM Virtual Appliance in Native HA Mode • Check and ensure that the Active and Standby servers are operational, using the appmgr show ha-role command. Example: On the Active node: dcnm1# appmgr show ha-role Native HA enabled. Deployed role: Active Current role: Active On the Standby node: dcnm2# appmgr show ha-role Native HA enabled. Deployed role: Standby Current role: Standby Procedure Step 1 Unzip the dcnm-va.11.4.1.iso.zip file and upload the DCNM 11.4(1) ISO file to the /root/ folder in both Active and Standby node of the DCNM setup that you want to upgrade. Note Step 2 For example, let us indicate Active and Standby appliances as dcnm1 and dcnm2 respectively. Log on to the Cisco DCNM appliance console. Caution If the system requirements does not meet the minimum resource requirements, everytime you logon to DCNM via the console or SSH, SYSTEM RESOURCE ERROR is displayed. Modify the system requirements logon to DCNM via Console/SSH. • For OVA Installation: On the OVF template that is deployed for the host, right click and select Settings > Launch Web Console. • For ISO Installation: Select the KVM console or UCS (Bare Metal) console. Caution Do not perform an Inline Upgrade from an SSH Session. The session may timeout and result in an incomplete upgrade. OR Run the following command to create a screen session. dcnm1# screen dcnm2# screen This creates a session which allows you to execute the commands. The commands continue to run even when the window is not visible or if you get disconnected. Step 3 Take a backup of the application data using the appmgr backup command on both Active and Standby appliances. dcnm1# appmgr backup dcnm2# appmgr backup Copy the backup file to a safe location outside the DCNM server. Step 4 On the Active node, perform the inline upgrade. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 80 Upgrading Cisco DCNM Inline Upgrade for DCNM Virtual Appliance in Native HA Mode a) Create a folder named iso using the mkdir /mnt/iso command. dcnm1# mkdir /mnt/iso b) Mount the DCNM 11.4(1) ISO file on the Active node in the /mnt/iso folder. dcnm1# mount -o loop dcnm-va.11.4.1.iso /mnt/iso c) Navigate to /mnt/iso/packaged-files/scripts/ location and run the ./inline-upgrade.sh script. dcnm1# cd /mnt/iso/packaged-files/scripts/ dcnm1# ./inline-upgrade.sh Note If some services are still running, you will receive a prompt that the services will be stopped. When prompted, press y to continue. dcnm1# Do you want to continue and perform the inline upgrade to 11.4(1)? [y/n]: y Note The prompt to enter a new sysadmin password appears while you’re upgrading from Cisco DCNM Release 11.1(1) or Release 11.2(1) only. d) Provide the new sysadmin user password at the prompt: Note The prompt to enter a new sysadmin password appears while you’re upgrading from Cisco DCNM Release 11.1(1) or Release 11.2(1) only. Enter the password for the new sysadmin user: <<sysadmin_password>> Enter it again for verification: <<sysadmin_password>> After the upgrade is complete, the appliance reboots. After reboot, the SSH \root access is disabled by default. Use sysadmin user. e) Ensure the DCNM application is functional, by using the appmgr status all command. dcnm1# appmgr status all Note Ensure that all the services are up and running on the Cisco DCNM Active node before proceeding to upgrade Standby node. f) Verify the role of the Active node, by using appmgr show ha-role command. Current role must show as Active. dcnm1# appmgr show ha-role Native HA enabled. Deployed role: Active Current role: Active Warning We recommend that you do not continue to upgrade the Standby node, unless the Active node Current role is Active. Step 5 On the Standby node, perform the inline upgrade. a) Create folder named iso using the mkdir /mnt/iso command. dcnm2# mkdir /mnt/iso b) Mount the DCNM 11.4(1) ISO file on the Standby node in the /mnt/iso folder. dcnm2# dcnm2# mount -o loop dcnm-va.11.4.1.iso /mnt/iso c) Navigate to /mnt/iso/packaged-files/scripts/ location and run the ./inline-upgrade.sh script. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 81 Upgrading Cisco DCNM Inline Upgrade for DCNM Virtual Appliance in Native HA Mode dcnm2# cd /mnt/iso/packaged-files/scripts/ dcnm2# ./inline-upgrade.sh --standby Note If some services are still running, you will receive a prompt that the services will be stopped. When prompted, press y and continue. dcnm2# Do you want to continue and perform the inline upgrade to 11.4(1)? [y/n]: y Note The prompt to enter a new sysadmin password appears while you’re upgrading from Cisco DCNM Release 11.1(1) or Release 11.2(1) only. d) Provide the new sysadmin user password at the prompt: Note The prompt to enter a new sysadmin password appears while you’re upgrading from Cisco DCNM Release 11.1(1) or Release 11.2(1) only. Enter the password for the new sysadmin user: <<sysadmin_password>> Enter it again for verification: <<sysadmin_password>> After the upgrade is complete, the appliance reboots. After reboot, the SSH \root access is disabled by default. Use sysadmin user. After the upgrade is complete, the appliance reboots. Verify the role of the appliance, using the following command: dcnm2# appmgr show ha-role Native HA enabled. Deployed role: Standby Current role: Standby What to do next Log on to the DCNM Web UI with appropriate credentials. Note In Release 11.3(1), the sysadmin and the root user's password are not identical. When you upgrade to 11.4(1), the sysadmin and root user passwords are preserved. However, when you perform backup and restore on DCNM Release 11.4(1) after upgrade, the sysadmin user inherits the password from the root user, and therefore both the users will have the same password. You can change the password for both the users after restore is complete. Click Settings icon and choose About DCNM. You can view and verify the Installation type that you have deployed. Verify the role of both the appliances using the appmgr show ha-role dcnm1# appmgr show ha-role Native HA enabled. Deployed role: Active Current role: Active dcnm2# appmgr show ha-role Native HA enabled. Deployed role: Standby Current role: Standby Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 82 Upgrading Cisco DCNM Inline Upgrade for DCNM Compute Nodes Verify the status of all applications using the appmgr status all command. To gracefully onboard Cisco DCNM Release 11.1(1), Release 11.2(1), or Release 11.3(1) managed VXLAN BGP EVPN fabric(s) comprising Cisco Nexus 9000 switches post upgrade to Cisco DCNM Release 11.4(1), see Post DCNM 11.4(1) Upgrade for VXLAN BGP EVPN, External, and MSD Fabrics. Inline Upgrade for DCNM Compute Nodes You can upgrade the DCNM compute nodes from Release 11.2(1) or Release 11.3(1) to Release 11.4(1) using the inline upgrade. Inline upgrade allows you to upgrade the compute node by imposing the new DCNM version to the existing compute node. Note You can upgrade the Compute nodes on Cisco Application Services Engine for Cisco DCNM Release 11.3(1) to Release 11.4(1) using the inline upgrade procedure. For more information, refer to Cisco Application Services Engine Installation Guide For Cisco DCNM. Perform the following task to upgrade the DCNM compute node in both Standalone and Native HA modes. Before you begin Cisco DCNM Servers in either Standalone node or Native HA mode must be upgraded to Release 11.4(1), before upgrading the DCNM compute nodes. Procedure Step 1 Log on to the Cisco DCNM Compute console. Caution Don’t perform an Inline Upgrade from an SSH Session. The session may timeout and result in an incomplete upgrade. Caution If the system requirements does not meet the minimum resource requirements, everytime you logon to DCNM via the console or SSH, SYSTEM RESOURCE ERROR is displayed. Modify the system requirements logon to DCNM via Console/SSH. OR Run the following command to create a screen session on the compute node. dcnm-compute# screen This creates a session which allows you to execute the commands. The commands continue to run even when the window isn’t visible or if you get disconnected. Step 2 Unzip the dcnm-va.11.4.1.iso.zip file and upload the DCNM 11.4(1) ISO file to the /root/ folder in all the compute nodes. Step 3 Create folder that is named iso using the mkdir /mnt/iso command, on all the computes. dcnm-compute# mkdir /mnt/iso Step 4 Mount the DCNM 11.4(1) ISO file on the compute node in the /mnt/iso folder. mount -o loop <DCNM 11.4(1) image> /mnt/iso Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 83 Upgrading Cisco DCNM Inline Upgrade for DCNM Compute Nodes dcnm-compute# mount -o loop dcnm-va.11.4.1.iso /mnt/iso Mount the ISO on all the compute nodes. Step 5 Navigate to /mnt/iso/packaged-files/scripts/ and run the ./inline-upgrade.sh script. dcnm-compute# cd /mnt/iso/packaged-files/scripts/ dcnm-compute# ./inline-upgrade.sh Do you want to continue and perform the inline upgrade to 11.4(1)? [y/n]: y Step 6 Note If some services are still running, a prompt to stop the services appears. When prompted, press y to continue. Note The prompt to enter a new sysadmin password appears while you’re upgrading from Cisco DCNM Release 11.1(1) or Release 11.2(1) only. Provide the new sysadmin user password at the prompt: Enter the password for the new sysadmin user:<<sysadmin_password>> Enter it again for verification:<<sysadmin_password>> After the upgrade is complete, the compute node reboots. After reboot, the SSH \root access is disabled by default. Use sysadmin user. Step 7 Verify that you have successfully upgraded to Cisco DCNM Release 11.4(1), using the appmgr show version command. dcnm-compute# appmgr show version Cisco Data Center Network Manager Version: 11.4(1) Install mode: Compute What to do next You must upgrade all the three compute nodes in the cluster. After the Upgrade process is complete, each compute node will reboot and join the cluster automatically. On the Cisco DCNM Web UI, choose Applications > Compute to verify if the compute node appears as Joined. To gracefully onboard Cisco DCNM Release 11.1(1), Release 11.2(1), Release 11.3(1) managed VXLAN BGP EVPN fabric(s) comprising Cisco Nexus 9000 switches post upgrade to Cisco DCNM Release 11.4(1), see Post DCNM 11.4(1) Upgrade for VXLAN BGP EVPN, External, and MSD Fabrics . Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 84 CHAPTER 6 Upgrading the Cisco DCNM Classic LAN Deployment • Overview, on page 85 • Migration of Fabrics, on page 86 • Supported Switch Roles in LAN Fabric Post Upgrade, on page 88 • Classic LAN Templates in LAN Fabric, on page 88 • Upgrading from the Classic LAN Deployment to the LAN Fabric Deployment, on page 92 • LAN Classic Fabric Template Functionalities, on page 95 Overview From Cisco DCNM Release 11.4(1), the Classic LAN deployment is unsupported. If you are planning to upgrade your Classic LAN deployment to DCNM Release 11.4(1), the only available upgrade option is to the DCNM Release 11.4(1) LAN Fabric deployment, and it is done automatically during the DCNM inline upgrade process. In the LAN Fabric deployment, there are two new fabric templates that you can use to manage your switches. For more information, see Managing Switches Using Classic LAN Templates. The following table summarizes upgrades for your Classic LAN deployment to the Cisco DCNM Release 11.4(1): Table 6: Classic LAN Upgrade From Classic LAN deployment in DCNM Release To LAN Fabric deployment in DCNM Release Upgrade 11.3(1) 11.4(1) Inline upgrade 11.2(1) 11.4(1) Inline upgrade 11.1(1) 11.4(1) Inline upgrade When you perform the inline upgrade from older releases to Cisco DCNM Release 11.4(1), automatic conversion to LAN Fabric mode using LAN_Classic and Fabric_Group fabric templates is done. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 85 Upgrading the Cisco DCNM Classic LAN Deployment Migration of Fabrics Note We recommend that you to familiarize yourself with the Cisco DCNM LAN Fabric functionalities before proceeding with the upgrade. For information, see Cisco DCNM LAN Fabric Configuration Guide, Release 11.4(1). Prerequisites • Review the Cisco DCNM 11.4(1) LAN Fabric System Requirements to ensure that your existing deployment meets those criteria. See System Requirements. • Review the Cisco DCNM LAN Fabric Verified Scalability section to ensure your existing deployment needs are met. See Verified Scalability Guide for Cisco DCNM. Guidelines and Limitations • In the Classic LAN deployment, if you are managing switches using the in-band interfaces, upgrading to the LAN Fabric deployment is not supported. You need to change to managing switches using the management (mgmt0) interfaces, and then upgrade. The support for in-band interface management is expected to be available in a future release. • VDC Auto-Provisioning (VOAP) for Cisco Nexus 7000 Series switches is not supported in the LAN Fabric installation mode. • The following configurations are not migrated from Classic LAN to the LAN Fabric Deployment: • Config archive jobs. Post upgrade, you should configure the fabric backups from the fabric settings. • CLI jobs. • POAP DHCP configuration. Post upgrade, you should configure the Fabric Settings for POAP. Migration of Fabrics The DCNM upgrade from Classic LAN automatically creates fabric instances in LAN Fabric to match the Classic LAN switch and container groups. The inline upgrade to the LAN Fabric mode preserves only two levels of hierarchy if nested grouping is present. All intermediate and/or empty groups are automatically removed. For reference, see the following image: Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 86 Upgrading the Cisco DCNM Classic LAN Deployment Migration of Fabrics The summary of the migration behavior is as follows: • Only switch groups that hold switches will be migrated over to a fabric instance using the LAN_Classic fabric template. In this example, SG1, LAB1, LAB2, and Default_LAN are migrated. • Only two levels of hierarchy is maintained during the upgrade. Any intermediate groups are deleted, and the lowest level switch groups are promoted to the top of the hierarchy. In this example: • SJC_Bldg1 is the top-level container group that has valid switch groups in Classic LAN. Therefore, a fabric instance for SJC_Bldg1 is created in LAN Fabric, and it uses the Fabric_Group template. • Fabric instances for LAB1 and LAB2are created using the LAN_Classic fabric template in LAN Fabric. These fabric instances are made member fabrics of SJC_Bldg1. • The intermediate SJCFloor1 and SJCFloor2 containers are not carried over to LAN Fabric. • Container groups that do not have any valid switch groups are not migrated. In this example, Floor1 and SJC_Bldg2 are not migrated. • Switch groups will be migrated to standalone fabric instances using the LAN_Classic fabric template. In this example, Default_LAN is migrated to LAN Fabric with the LAN_Classic fabric template. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 87 Upgrading the Cisco DCNM Classic LAN Deployment Supported Switch Roles in LAN Fabric Post Upgrade • After migration, the devices will be placed in the Migration Mode in fabrics associated with the LAN_Classic fabric template. The fabric will be in the Fabric Monitor Mode. For more information about the next steps, see Upgrading from the Classic LAN Deployment to the LAN FabricDeployment Supported Switch Roles in LAN Fabric Post Upgrade Some of the switch roles supported in the Classic LAN installation mode are not available in LAN Fabric. The following table shows the switch roles in Classic LAN and their equivalents in LAN Fabric: Classic LAN (Pre-Upgrade) LAN Fabric (Post Upgrade) Border PE Border Edge Edge Router FEX Access Host Admin VDC Note that these roles are automatically mapped to their equivalent roles in LAN Fabric after the upgrade. The following switch roles remain the same in LAN Fabric after the upgrade: • Spine • Leaf • Border Spine • Border • Border Gateway • Edge Router • Core Router • Access • Aggregation Classic LAN Templates in LAN Fabric The templates of templateType = CLI are converted to templateType = POLICY. These templates are displayed in Control > Template Library. If needed, PTIs can be created from the View/Edit Policies window. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 88 Upgrading the Cisco DCNM Classic LAN Deployment Classic LAN Templates in LAN Fabric Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 89 Upgrading the Cisco DCNM Classic LAN Deployment Classic LAN Templates in LAN Fabric Note If policies that are updated automatically need to be reviewed, a backup of the original file is saved with a .bak extension in the following directory on DCNM: /usr/local/cisco/dcm/dcnm/data/templates/. Some of the template language constructs that are available in Classic LAN are not supported in LAN Fabric installation. For example: • Custom prompt handling • Command execution logic • Derived/Inherited templates Note The templates need to be edited appropriately to work with LAN Fabric. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 90 Upgrading the Cisco DCNM Classic LAN Deployment Classic LAN Templates in LAN Fabric Unsupported Template Language Content The following Classic LAN template language features are not supported in the LAN Fabric installation mode. Note that the existing templates using this content are not supported. They need to be reviewed and/or edited to create compatible templates. 1. Interactive command handling: Include prompt and response as part of the template content for handling interactive commands. For example: ##template variables string srcFile; string srcDir; string password; string vrf; ## ##template content copy scp://[email protected]/$$srcFile$$ bootflash: vrf $$vrf$$ <prompt:'(yes/no)?', response:'yes'> <prompt:'(y/n)?[n]', response:'y'> <prompt:'password:', response:'$$password$$'> 2. Dynamic decision Config template provides a special internal variable LAST_CMD_RESPONSE. For example: ##template content show vlan id $$vlan_id$$ if($$LAST_CMD_RESPONSE$$ contains "not found"){ vlan $$vlan_id$$ } else{ } 3. Template referencing In this case, templates are referenced from another template. Derived Template: ##template properties [snip] imports = baseTemplate1,baseTemplate2; ## For more information about templates, see Cisco DCNM Classic LAN Configuration Guide, Release 11.3(1) and Cisco DCNM LAN Fabric Configuration Guide, Release 11.4(1). Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 91 Upgrading the Cisco DCNM Classic LAN Deployment Upgrading from the Classic LAN Deployment to the LAN Fabric Deployment Upgrading from the Classic LAN Deployment to the LAN Fabric Deployment Procedure Step 1 Make sure that all switches are reachable from Cisco DCNM before the upgrade. Note Step 2 If nested switch groups are in DCNM 11.3(1) and telemetry is enabled on them, you need to disable telemetry on those switch groups before upgrade. Follow the inline upgrade procedure to upgrade to the LAN Fabric deployment. For information, see Upgrading ISO or OVA through Inline Upgrade. Step 3 Post upgrade, the DCNM installation type will be automatically changed to LAN Fabric and appropriate fabric instances are created. For information about the fabric, see Migration of Fabrics. Step 4 The switches are placed in the Migration Mode. Navigate to each LAN_Classic fabric and click Save & Deploy. Note The fabrics are in the Monitor Mode by default. An error message is seen because of this mode, and it can be ignored. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 92 Upgrading the Cisco DCNM Classic LAN Deployment Upgrading from the Classic LAN Deployment to the LAN Fabric Deployment Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 93 Upgrading the Cisco DCNM Classic LAN Deployment Upgrading from the Classic LAN Deployment to the LAN Fabric Deployment Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 94 Upgrading the Cisco DCNM Classic LAN Deployment LAN Classic Fabric Template Functionalities This step ensures that the minimum configuration intent is captured for the switches. The switches continue to remain in the Migration Mode till any connectivity issue and errors are resolved. To move the switches out of this mode, subsequent Save & Deploy operations are needed. LAN Classic Fabric Template Functionalities The following features in the LAN_Classic template provide the same support as they do for the External_Fabric_11_1 template: The following features are supported: • Configuration compliance • Backup or restore of fabric/switch Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 95 Upgrading the Cisco DCNM Classic LAN Deployment LAN Classic Fabric Template Functionalities • Network Insights • Performance monitoring • VMM • Topology view • Kubernetes visualization • RBAC For more information, refer to the feature specific sections. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 96 CHAPTER 7 Deployment Best Practices • Best Practices for Deploying Cisco DCNM and Computes, on page 97 Best Practices for Deploying Cisco DCNM and Computes This chapter describes the document best practices to deploy Cisco DCNM OVA and ISO in clustered and unclustered modes. The following sections explain the recommended design for configurations of IP addresses and relevant IP pools during the Cisco DCNM installation. The Cisco DCNM OVA or the ISO installation consists of 3 network interfaces: • dcnm-mgmt network (eth0) interface This network provides connectivity (SSH, SCP, HTTP, HTTPS) to the Cisco DCNM. • enhanced-fabric-mgmt (eth1) interface This network provides enhanced fabric management of Cisco Nexus switches through the out-of-band or mgmt0 interface. • enhanced-fabric-inband (eth2) interface This network provides in-band connection to the fabric through the front-panel ports. This network interface is used for applications such as Endpoint Locator (EPL) and Network Insights Resources (NIR). The following figure shows the network diagram for the Cisco DCNM management interfaces. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 97 Deployment Best Practices Guidelines to Use the Best Practices Guidelines to Use the Best Practices The following are the guidelines to remember while you use the best practices for deploying DCNM and Computes. • The IP addresses specified in this document are sample addresses. Ensure that your setup reflects the IP addresses used in the production network. • Ensure that the eth2 interface subnet is different from the subnet that is associated with the eth0 interface and the eth1 interface. • As eth0 and eth1 interfaces are both on the same subnet, the DHCP returns the same IP address, two responses but same for both queries. • Cisco DCNM Native HA consists of two Cisco DCNM appliances, that run as Active and Standby applications. The embedded databases of both Active and Standby appliances are synchronized in real time. The eth0, eth1, and eth2 interfaces of the Cisco DCNM and Compute nodes, in a clustered mode, must be Layer-2 adjacent. • For information about Cluster Mode in your Cisco DCNM Deployment, refer to Applications chapter in the Cisco DCNM Configuration Guide for your deployment type. Deployments for Redundancy in Cisco DCNM This section describes the recommended deployments for redundancy of DCNM operations. As a general assumption, the DCNM and the compute nodes are installed as Virtual Machines. During Cisco DCNM ISO installation on Virtual Appliance on UCS (Bare Metal), all DCNMs and computes have their own individual servers. Deployment 1: Minimum Redundancy Configuration The recommended configuration for minimum redundancy in a Cisco DCNM Cluster mode installation is as follows: • DCNM Active Node and Compute Node 1 in Server 1 • DCNM Standby Node and Compute Node 2 in Server 2 • Compute Node 3 in Server 3 • Compute VMs deployed on an exclusive disk • No oversubscription of memory or CPU of the physical servers Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 98 Deployment Best Practices IP Address Configurations in Cisco DCNM Figure 9: Cisco DCNM Cluster Mode: Physical Server to VM Mapping Deployment 2: Maximum Redundancy Configuration The recommended configuration for maximum redundancy in a DCNM Cluster mode installation is as follows: • DCNM Active Node(Active) in Server 1 • DCNM Standby Node in Server 2 • Compute Node 1 in Server 3 • Compute Node 2 in Server 4 • Compute Node 3 in Server 5 Figure 10: Cisco DCNM Cluster Mode: Physical Server to VM Mapping IP Address Configurations in Cisco DCNM This section describes the best practices and recommended deployments for IP address configurations of all interfaces of the Cisco DCNM and Compute nodes. Scenario 1: All 3 Ethernet Interfaces are in Different Subnets In this scenario, consider all three Ethernet interfaces of DCNM on different subnets. For example: Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 99 Deployment Best Practices Scenario 1: All 3 Ethernet Interfaces are in Different Subnets • eth0 – 172.28.8.0/24 • eth1 – 10.0.8.0/24 • eth2 – 192.168.8.0/24 The possible deployments are as follows: • Cisco DCNM Unclustered mode, on page 100 • Cisco DCNM Clustered Mode, on page 101 Cisco DCNM Unclustered mode Figure 11: Cisco DCNM Standalone Deployment without Compute Cluster Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 100 Deployment Best Practices Scenario 1: All 3 Ethernet Interfaces are in Different Subnets Figure 12: Cisco DCNM HA Deployment without Compute Cluster Cisco DCNM Clustered Mode Figure 13: Cisco DCNM Standalone Deployment with Compute Cluster Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 101 Deployment Best Practices Scenario 2: eth2 Interface in Different Subnet Figure 14: Cisco DCNM HA Deployment with Compute Cluster Scenario 2: eth2 Interface in Different Subnet In this scenario, consider that the eth0 and eth1 interfaces are in the same subnet, and eth2 interfaces of DCNMs and Computes are in a different subnet. For example: • eth0 – 172.28.8.0/24 • eth1 – 172.28.8.0/24 • eth2 – 192.168.8.0/24 The possible deployments are as follows: • Cisco DCNM Unclustered Mode, on page 103 • Cisco DCNM Clustered Mode, on page 104 Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 102 Deployment Best Practices Scenario 2: eth2 Interface in Different Subnet Cisco DCNM Unclustered Mode Figure 15: Cisco DCNM Standalone deployment (No HA) without Compute Cluster Figure 16: Cisco DCNM Native HA deployment without Compute Cluster Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 103 Deployment Best Practices Physical Connectivity of Cisco DCNM and Compute Nodes Cisco DCNM Clustered Mode Figure 17: Cisco DCNM Standalone Deployment with Compute Cluster Figure 18: Cisco DCNM Native HA Deployment with Compute Cluster Physical Connectivity of Cisco DCNM and Compute Nodes This section describes the physical connectivity of the Cisco DCNM and Compute nodes in both Virtual Machines and Bare Metal installations. Virtual Machines The following image shows the physical connectivity of DCNM and compute nodes supported in a 3 server redundancy configuration. The physical servers must be connected to a vPC pair of switches via port-channels. This provides adequate fault-tolerance, if a single link fails or a single switch fails. The vPC pair of switches is considered as the infra vPC pair that provides management connectivity to the physical servers. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 104 Deployment Best Practices Physical Connectivity of Cisco DCNM and Compute Nodes Figure 19: Cisco DCNM VM Physical Connectivity with 3 servers The following image shows the physical connectivity of Cisco DCNM and Compute nodes supported in an VM installation in a 5 server redundancy configuration. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 105 Deployment Best Practices Physical Connectivity of Cisco DCNM and Compute Nodes Figure 20: Cisco DCNM VM Physical Connectivity with 5 servers Bare Metal Installation For installing Cisco DCNM on Bare Metal, 5 servers are required. The following image shows the physical connectivity of Cisco DCNM and Compute nodes. Note that, there are 3 physical interfaces on each server that map to the eth0, eth1, and eth2 interfaces, respectively. If the physical server consists of a managed network adapter such as the Cisco UCS VIC 1455 Virtual Interface Card, you can have a port-channel connectivity from the servers to the switches, similar to the Virtual Machines. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 106 Deployment Best Practices Physical Connectivity of Cisco DCNM and Compute Nodes Figure 21: Cisco DCNM and Compute Bare Metal Physical Connectivity Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 107 Deployment Best Practices Physical Connectivity of Cisco DCNM and Compute Nodes Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 108 CHAPTER 8 Disaster Recovery (Backup and Restore) This chapter contains the following sections: • Backup and Restore Cisco DCNM and Application Data on Standalone DCNM setup, on page 109 • Backup and Restore Cisco DCNM and Application Data on Native HA setup, on page 110 • Recovering Cisco DCNM Single HA Node, on page 111 Backup and Restore Cisco DCNM and Application Data on Standalone DCNM setup You can take a backup of Cisco DCNM application data for analytics and troubleshooting. Note In Release 11.3(1), the sysadmin and the root user's password are not identical. When you upgrade to 11.4(1), the sysadmin and root user passwords are preserved. However, when you perform backup and restore on DCNM Release 11.4(1) after upgrade, the sysadmin user inherits the password from the root user, and therefore both the users will have the same password. You can change the password for both the users after restore is complete. Perform the following task to take a backup of Cisco DCNM and Application data. Procedure Step 1 Logon to the Cisco DCNM appliance using SSH. Step 2 Take a backup of the application data using the appmgr backup command. dcnm# appmgr backup From Release 11.4(1), Cisco DCNM allows you to configure a cron job that allows saves the backup to a remote scp server. Use appmgr backup schedule command to configure a scheduled backup. dcnm# appmgr backup schedule [day] <hh<hh>:<mm> [destination <user>@<host>:[<dir>]] Copy the backup file to a safe location and shut down the DCNM Appliance. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 109 Disaster Recovery (Backup and Restore) Backup and Restore Cisco DCNM and Application Data on Native HA setup Step 3 Right click on the installed VM and select Power > Power Off. Step 4 Deploy the new DCNM appliance. Step 5 After the VM is powered on, click on Console tab. A message indicating that the DCNM appliance is configuring appears on the screen. Copy and paste the URL to the browser to continue with restore process. Step 6 On the DCNM Web Installer UI, click Get Started. Step 7 On the Cisco DCNM Installer screen, select radio button. Select the backup file that was generated in Step Step 2, on page 109. Continue to deploy the DCNM. Step 8 On the Summary tab, review the configuration details. Click Previous to go to the previous tabs and modify the configuration. Click Start Installation complete Cisco DCNM Virtual Appliance Installation for the chosen deployment mode. A progress bar appears showing the completed percentage, description of the operation, and the elapsed time during the installation. After the progress bar shows 100%, click Continue. Step 9 After the data is restored, check the status using the appmgr status all command. Backup and Restore Cisco DCNM and Application Data on Native HA setup You can take a backup of Cisco DCNM application data for analytics and troubleshooting. Note In Release 11.3(1), the sysadmin and the root user's password are not identical. When you upgrade to 11.4(1), the sysadmin and root user passwords are preserved. However, when you perform backup and restore on DCNM Release 11.4(1) after upgrade, the sysadmin user inherits the password from the root user, and therefore both the users will have the same password. You can change the password for both the users after restore is complete. Perform the following task to take perform backup and restore of data in a Native HA setup. Before you begin Ensure that the Active node is operating and functional. Procedure Step 1 Check if the Active node is operational. Otherwise, trigger a failover. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 110 Disaster Recovery (Backup and Restore) Recovering Cisco DCNM Single HA Node Step 2 Logon to the Cisco DCNM appliance using SSH. Step 3 Take a backup of the application data using the appmgr backup command on both Active and Standby appliances. dcnm1# appmgr backup dcnm2 appmgr backup From Release 11.4(1), Cisco DCNM allows you to configure a cron job that allows saves the backup to a remote scp server. Use appmgr backup schedule command to configure a scheduled backup. dcnm# appmgr backup schedule [day] <hh<hh>:<mm> [destination <user>@<host>:[<dir>]] Copy the backup file of both active and standby appliances to a safe location and shut down the DCNM Appliance. Step 4 Right click on the installed VM and select Power > Power Off. Step 5 Deploy the new DCNM appliance in Native HA mode. Step 6 For both the Active and Standby appliances, after the VM is powered on, click on Console tab. A message indicating that the DCNM appliance is configuring appears on the screen. Copy and paste the URL to the browser to continue with restore process. Step 7 On the DCNM Web Installer UI, click Get Started. Step 8 On the Cisco DCNM Installer screen, select radio button. Select the backup file that was generated in Step Step 3, on page 111. The values for parameters are read from the backup file, and auto-populated. Modify the values, if required. Continue to deploy the DCNM. Step 9 On the Summary tab, review the configuration details. Click Previous to go to the previous tabs and modify the configuration. Click Start Installation complete Cisco DCNM Virtual Appliance Installation for the chosen deployment mode. A progress bar appears showing the completed percentage, description of the operation, and the elapsed time during the installation. After the progress bar shows 100%, click Continue. Step 10 After the data is restored, check the status using the appmgr status all command. Recovering Cisco DCNM Single HA Node This section details the scenarios and provides instructions to recover Cisco DCNM Single HA node. The following table details all the recovery procedures when one or both the nodes fail in a Cisco DCNM Native HA set up. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 111 Disaster Recovery (Backup and Restore) Recovering Cisco DCNM Single HA Node Failure type Node/Database Primary Secondary Recovery procedure to recover backup backup available available Primary node is lost. Primary Node — — Secondary node is now Primary (due to fail over). 1. Convert Secondary node to Primary node. 2. Configure new Secondary node. Primary and Secondary server Primary database is lost. Secondary database node is now Primary (due to fail over) — — The Active Secondary node will restart and sync to the Standby Primary node. Active Secondary node is lost. Secondary node — Primary node is now active due to fail over. No Configure new Secondary node. Active Secondary node is lost. Secondary node — Primary node is not active due to fail over. Yes Configure new Secondary node, using the Web Installer. Choose Fresh installation with backup file for restore. Select Restore secondary DCNM node only in HA settings screen. Secondary standby node is lost. Secondary node — No Configure new Secondary node. Secondary standby node lost Secondary node — Yes Configure new Secondary node, using the Web Installer. Choose Fresh installation with backup file for restore. Select Restore secondary DCNM node only in HA settings screen. Primary node is active. Secondary standby database lost. Secondary database — Primary node will restart to sync with Secondary node. — Converting Secondary node to Primary node To convert the secondary node to Primary node, perform the following steps: 1. Log on to the DCNM server via SSH on the Secondary node. 2. Stop all the applications on the Secondary node by using the appmgr stop all command. 3. Navigate to the ha-setup.properties file. 4. Set the node ID to 1 to configure the secondary node as the primary node. NODE_ID 1 After you change the node ID for the secondary node to 1, reboot the server. The old Secondary will restart as the new Primary Node. Consider the lost Primary as lost secondary node, and configure the new secondary node. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 112 Disaster Recovery (Backup and Restore) Recovering Cisco DCNM Single HA Node Configuring Secondary node To configure the secondary node, perform the following steps: 1. Install a standalone Cisco DCNM. Use the same configuration settings as the lost secondary node. Note If the Primary node was lost, and the old secondary node was converted to primary node, configure the new standalone node with the lost primary configuration. 2. Log on to the new DCNM standalone server via SSH, and stop all applications, using the appmgr stop all command. 3. Provide access to the /root directory on the new node, using the appmgr root-access permit. 4. Log on to the primary node via SSH, and stop all applications, using the appmgr stop all command. 5. Provide access to the /root directory on the Primary node, using the appmgr root-access permit. 6. On the Primary node, edit the /root/.DO_NOT_DELETE file. Set the NATIVE_HA_STATUS parameter to NOT_TRIGGERED on the primary node. 7. Configure the Primary node as Active, using the appmgr setup native-ha active command. 8. Configure the Secondary node as Standby, using the appmgr setup native-ha secondary command. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 113 Disaster Recovery (Backup and Restore) Recovering Cisco DCNM Single HA Node Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 114 CHAPTER 9 Certificates • Certificate Management, on page 115 Certificate Management Note This section to applicable only for DCNM OVA/ISO deployments. From Release 11.2(1), Cisco DCNM allows new methods and new CLIs for installing, restoring after upgrade, and verifying certificates on the system. You can export certificates from the Active node to the Standby node, to ensure that both peers on the Native HA setup have the same certificates. In a Cisco DCNM Native HA setup, after you install a CA certificate on the Active node and start the services, the certificates are automatically synchronized with the Standby node. If you need the same internal certificate on both Active and Standby nodes, you must export the certificate from the Active node to the Standby node. This ensures that both the peers on the Cisco Native HA setup have the same certificates. Note From Release 11.3(1), you must use sysadmin role for certificate management. Cisco DCNM stores two certificates: • Self-signed certificate, for internal communication between the Cisco DCNM Server and various applications • CA (Certificate Authority) Signed certificate, for communicating with the external world, such as Web UI. Note Until you install a CA Signed certificate, Cisco DCNM retains a self-signed certificate for the communicating with the external network. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 115 Certificates Best practices for Certificate Management Best practices for Certificate Management The following are the guidelines and best practices for Certificate Management in Cisco DCNM. • Cisco DCNM provides CLI based utilities to display, install, restore, and export or import of certificates. These CLIs are available through SSH console, and only a sysadmin user can accomplish these tasks. • When you install Cisco DCNM, a self-signed certificate is installed, by default. This certificate is used to communicate with the external world. After Cisco DCNM installation, you must install a CA-Signed certificate on the system. • On Cisco DCNM Native HA setup, we recommend that you install a CA-Signed certificate on the DCNM Active Node. The CA-Signed certificate will synchronize with the Standby node automatically. However, if you want to keep the same internal and CA-Signed certificate on both Active node and Standby node, you must export the certificates from Active node and import it to the Standby node. Both the Active node and Standby node will have the same set of certificates. Note Compute nodes in a cluster deployment do not require any action, as the compute nodes use internally managed certificates. • Generate a CSR on Cisco DCNM with a CN (common name). Provide a VIP FQDN (Virtual IP Address FQDN) as CN to install a CA Signed certificate. The FQDN is the fully qualified domain name for the management subnet VIP (VIP of eth0) interface that is used to access Cisco DCNM Web UI. • If the CA Signed certificate was installed prior to upgrading the Cisco DCNM, then you must restore the CA Signed certificate after you upgrade the Cisco DCNM. Note You need not take a backup of certificates when you perform inline upgrade or backup and restore. Display Installed Certificates You can view the details of the installed certificate by using the following command: appmgr afw show-cert-details In the following sample output for the appmgr afw show-cert-details command, CERTIFICATE 1 represents the certificate offered to the external network and to the Web browsers. CERTIFICATE 2 represents the internally used certificate. dcnm# appmgr afw show-cert-details ****CERTIFICATE 1**** [Certificate available to web gateway. This certificate is offered to webclients]: --------------Web gateway certificate--------------------------------------Certificate: Data: Version: 3 (0x2) Serial Number: 4202 (0x106a) Signature Algorithm: sha256WithRSAEncryption Issuer: C=IN, ST=KA, L=BGL, O=xyz, OU=ABC, CN=<FQDN/IP> Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 116 Certificates Display Installed Certificates Validity Not Before: Jun 4 13:55:25 2019 GMT Not After : Jun 3 13:55:25 2020 GMT Subject: C=IN, ST=KA9, L=BGL9, O=XYZ123, OU=ABC123, CN=<FQDN/IP> Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:bb:52:1e:7f:24:d7:2e:24:62:5a:83:cc:e4:88: --------------Certificate output is truncated to first 15 lines-------------****CERTIFICATE 2**** [Certificate available in keystore(jks). CA signed certificate is installed here till DCNM version 11.1.x] If you have upgraded from DCNM version 11.1.x to later version please see installation guide to restore CA signed certificate to upgraded version. --------------Keystore certificate------------------------------------------alias = sme, storepass = <<storepass-pwd>> Alias name: sme Creation date: Oct 14, 2018 Entry type: PrivateKeyEntry Certificate chain length: 2 Certificate[1]: Owner: CN=localhost, OU=Data Center, O=Cisco Systems Inc, L=San Jose, ST=CA, C=US Issuer: CN=dcnmca, OU=Data Center, O=Cisco Systems Inc, L=San Jose, ST=CA, C=US Serial number: 62044620 Valid from: Sun Oct 14 20:39:39 PDT 2018 until: Fri Oct 13 20:39:39 PDT 2023 Certificate fingerprints: MD5: E5:F8:AD:17:4D:43:2A:C9:EE:35:5F:BE:D8:22:7D:9C SHA1: 38:66:F1:CD:10:61:27:E7:43:85:10:41:3D:A3:4B:5C:C9:CC:17:5E SHA256: E0:87:D8:34:71:18:FE:8C:AB:18:0B:D7:85:B1:91:A8:4B:75:A3:91:BA:90:83:46:72:87:FE:FE:FE:04:F0:E1 Signature algorithm name: SHA256withRSA Subject Public Key Algorithm: 2048-bit RSA key --------------Certificate output is truncated to first 15 lines-------------dcnm# Note <<storepass-pwd>> is the password string generated while installing DCNM Server. This string is located in the <install dir>/dcm/fm/conf/serverstore.properties directory. Fetch the dcnm.fmserver.token value for the storepass-pwd. The Web UI refers to the CERTIFICATE 1 after installation. If CERTIFICATE 1 is not available, you must stop and restart all applications, using the following commands: Note Ensure that you follow the same sequence of commands on the Cisco DCNM to troubleshoot this scenario. On the Cisco DCNM Standalone appliance, run the following commands to stop and start all Cisco DCNM applications to troubleshoot CERTIFICATE 1: dcnm# appmgr stop all /* stop all the applications running on Cisco DCNM */ dcnm# appmgr start all /* start all the applications running on Cisco DCNM */ On the Cisco DCNM Native HA appliance, run the following commands to stop and start all Cisco DCNM applications to troubleshoot CERTIFICATE 1: For example, let us indicate the Active node as dcnm1, and Standby node dcnm2. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 117 Certificates Installing a CA Signed Certificate Stop the applications running on the both the nodes. dcnm2# appmgr stop all /* stop all the applications running on Cisco DCNM Standby Node */ dcnm1# appmgr stop all /* stop all the applications running on Cisco DCNM Active Node */ Start the applications on both nodes. dcnm1# appmgr start all /* start all the applications running on Cisco DCNM Active Node*/ dcnm2# appmgr start all /* start all the applications running on Cisco DCNM Standby Node*/ Note Ensure that you clear the browser cache before you launch the Cisco DCNM Web UI, using the Management IP Address. The CERTIFICATE 1 is displayed in the Security settings on the browser. Installing a CA Signed Certificate We recommend that you install a CA Signed certificate as a standard security practice. The CA Signed certificates are recognized, and verified by the browser. You can also verify the CA Signed certificate manually. Note The Certificate Authority can be an Enterprise Signing Authority, also. Installing a CA Signed Certificate on Cisco DCNM Standalone Setup To install a CA Signed certificate on the Cisco DCNM, perform the following steps. Procedure Step 1 Step 2 Logon to the DCNM server via SSH terminal. Generate a CSR on the Cisco DCNM server using the appmgr afw gen-csr command: Note CSR is unique to a Cisco DCNM, and only a corresponding CSR signed certificate must be installed on a given Cisco DCNM. dcnm# appmgr afw gen-csr Generating CSR.... .. ... ----Country Name (2 letter code) [XX]:US State or Province Name (full name) []:CA Locality Name (eg, city) [Default City]:San Jose Organization Name (eg, company) [Default Company Ltd]:Cisco Organizational Unit Name (eg, section) []:DCBG Common Name (eg, your name or your server's hostname) []:dcnmhost.cisco.com Email Address []:[email protected] Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []: /* This field is not mandatory */ An optional company name []: /* This field is not mandatory */ ... Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 118 Certificates Installing a CA Signed Certificate on Cisco DCNM Native HA setup A CSR file dcnmweb.csr is created in the /var/tmp/ directory. ********** CA certificate installation not completed yet. Please do followings. ********** CSR is generated and placed at /var/tmp/dcnmweb.csr. Please download or copy the content to your certificate signing server. Step 3 Send this CSR to your Certificate signing server. Note Step 4 The CA Signing server is local to your organization. Get the certificate signed by your Certificate Authority. The Certificate Authority (CA) returns 3 certificates, namely, Primary, Intermediate (also known as Issuing/Subordinate), and Root certificates. Combine all the three certificates into one .pem file to import to DCNM. Step 5 Copy the new CA Signed certificate to Cisco DCNM server. Ensure that the certificate is located at /var/tmp directory on the Cisco DCNM Server. Step 6 Install the CA Signed certificate on the Cisco DCNM by using the following commands: Note We recommend that you run the following commands in the same sequence as shown below. dcnm# appmgr stop all /* Stop all applications running on Cisco DCNM dcnm# appmgr afw install-CA-signed-cert <CA-signed certificate directory> /* CA-signed certificate with full or relative path */ Making the signed certificate available to web gateway.... CA signed certificate CA-signed-cert.pem is installed. Please start all applications as followings: On standalone setup execute: 'appmgr start all' Step 7 Restart all applications with the new certificate on Cisco DCNM using the appmgr start all command. dcnm# appmgr start all Step 8 Verify the newly installed CA Signed certificate using the appmgr afw show-cert-details command. The system is now armed with the CA Signed certificate, which is verified at the browser. Note CSR is unique to a Cisco DCNM, and only a corresponding CSR signed certificate must be installed on a given Cisco DCNM. Installing a CA Signed Certificate on Cisco DCNM Native HA setup To install a CA Signed certificate on the Cisco DCNM, perform the following steps. Note We recommend that you run the following commands in the same sequence as shown below. Procedure Step 1 On the Active node, logon to the DCNM server via SSH terminal. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 119 Certificates Installing a CA Signed Certificate on Cisco DCNM Native HA setup Note Step 2 For example, let us indicate the Cisco DCNM Active and Standby appliances as dcnm1 and dcnm2 respectively. Generate a CSR on the Cisco DCNM server using the appmgr afw gen-csr command: Note CSR is unique to a Cisco DCNM, and only a corresponding CSR signed certificate must be installed on a given Cisco DCNM. dcnm1# appmgr afw gen-csr Generating CSR.... .. ... ----Country Name (2 letter code) [XX]:US State or Province Name (full name) []:CA Locality Name (eg, city) [Default City]:San Jose Organization Name (eg, company) [Default Company Ltd]:Cisco Organizational Unit Name (eg, section) []:DCBG Common Name (eg, your name or your server's hostname) []:dcnmhost.cisco.com /* Provide a VIP FQDN name of the eth0 interface*/ Email Address []:[email protected] Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []: /* This field is not mandatory */ An optional company name []: /* This field is not mandatory */ ... Note For generating CSR on the Active node, we recommend that you provide a VIP FQDN name of eth0 interface, when for prompted for Common Name. This FQDN must be the web server address that you enter on the browser to launch the Cisco DCNM Web UI. A CSR file dcnmweb.csr is created in the /var/tmp/ directory. ********** CA certificate installation not completed yet. Please do followings. ********** CSR is generated and placed at /var/tmp/dcnmweb.csr. Please download or copy the content to your certificate signing server. Step 3 Send this CSR to your Certificate signing server. Note The CA Signing server is local to your organization. The CA Signing server can be the CA certificate signing authority in your organizations, or your local CA to your organization. Step 4 Get the certificate signed by your Certificate Authority. Step 5 Copy the new CA Signed certificate to Cisco DCNM server. Ensure that the certificate is located at /var/tmp directory on the Cisco DCNM Server. Step 6 On the Standby node, logon to the DCNM server via SSH terminal. Step 7 Stop all the applications on the Standby node using the appmgr stop all command. dcnm2# appmgr stop all /* Stop all applications running on Cisco DCNM Standby Node dcnm2# Step 8 On the Active node, stop all the applications by using the appmgr stop all command. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 120 Certificates Exporting certificate from Active Node to Standby Node dcnm1# appmgr stop all /* Stop all applications running on Cisco DCNM Active Node dcnm2# Step 9 On the Active node, install the CA Signed certificate on the Cisco DCNM by using the appmgr afw install-CA-signed-cert command. dcnm1# appmgr afw install-CA-signed-cert <CA-signed certificate directory> /* CA-signed certificate with full or relative path */ Making the signed certificate available to web gateway.... CA signed certificate CA-signed-cert.pem is installed. Please start all applications as followings: On standalone setup execute: 'appmgr start all' Step 10 On the Active node, restart all applications with the new certificate on Cisco DCNM using the appmgr start all command. dcnm1# appmgr start all /* Start all applications running on Cisco DCNM Active Node Ensure that all services on Cisco DCNM Active node is operational before you proceed further. Note Step 11 Logon to the Cisco DCNM Web UI and check if the Certificate details are correct. On the Standby node, restart all applications with the new certificate on Cisco DCNM using the appmgr start all command. dcnm2# appmgr start all /* Start all applications running on Cisco DCNM Standby Node This will ensure that the Standby node makes a fresh peer relationship with the Active Node. Therefore, the newly installed CA Signed certificate on the Active node will be synchronized on the Standby node. Step 12 Verify the newly installed CA Signed certificate using the appmgr afw show-cert-details command, on both Active and Standby nodes. The system is now armed with the CA Signed certificate, which is verified at the browser. Note If the Certificates information is not displayed, we recommend that you wait for a few minutes. The Secondary node takes a while to synchronize with the Active node. If you want to retain the same internal and CA Signed certificate on both peers on a Native HA setup, first install the certificates on the Active node. After installing certificates on the Active node, export the certificates from Active node and import the same certificates to the Standby node. Exporting certificate from Active Node to Standby Node The following procedure applies to the Cisco DCNM Native HA setup only. The CA Signed certificate installed on the Active node is always synced to the Standby node. However, the internal certificate differs on both Active and Standby nodes. If you want to keep the same set of certificates on both peers, you must perform the procedure described in this section. Note You may choose not to export any certificates, because the internal certificates are internal to the system. These certificates can differ on Active and Standby nodes without having any functional impact. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 121 Certificates Restoring the certificates after an upgrade To export the CA Signed certificate from Active node and import the certificate to the Standby node, perform the following procedure. Procedure Step 1 On the Active node, logon to the DCNM server via SSH terminal. Step 2 Create a certificate bundle, by using the appmgr afw export-import-cert-ha-peer export command. dcnm1# appmgr afw export-import-cert-ha-peer export Step 3 Copy the certificate bundle to the Standby node. Note Step 4 Ensure that you copy the certificate on the Standby node to the location as specified on the SSH terminal. On the Standby node, stop all the applications by using the appmgr stop all command. dcnm2# appmgr stop all /* Stop all applications running on Cisco DCNM Standby Node dcnm2# Step 5 Import the certificates to the Standby node by using the appmgr afw export-import-cert-ha-peer import command. The certificates bundle is imported and installed on the Standby node. Step 6 Step 7 On the Standby node, restart all applications with the new certificate on Cisco DCNM using the appmgr start all command. dcnm2# appmgr start all /* Start all applications running on Cisco DCNM Standby Node This ensures that the new imported certificate are effective when applications are started on the Standby node. Step 8 On the Standby node, verify the newly imported CA Signed certificate using the appmgr afw show-cert-details command. The system is now armed with same certificates on both Active and Standby nodes. Restoring the certificates after an upgrade This mechanism applies to Cisco DCNM Upgrade procedure using the inline upgrade process only. This procedure is not required for the backup and restore of data on the same version of the Cisco DCNM appliance. Note that certificate restore is a disruptive mechanism; it requires you to stop and restart applications. Restore must performed only when the upgraded system is stable, that is, you must be able to login to Cisco DCNM Web UI. On a Cisco DCNM Native HA setup, both the Active and Standby nodes must have established peer relationship. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 122 Certificates Restoring the certificates after an upgrade Note A certificate needs to be restored only in following situations: • if a CA signed certificate was installed on the system before upgrade, and, • if you're upgrading from a version prior to 11.2(1) to version 11.2(1) or later. After upgrading the Cisco DCNM, you must always verify the certificate before restoring to check if CERTIFICATE 1 is the CA signed certificate. You must restore the certificates, if otherwise. Verify the certificates using the appmgr afw show-cert-details as shown in the sample output below. dcnm# appmgr afw show-cert-details ****CERTIFICATE 1**** [Certificate available to web gateway. This certificate is offered to webclients]: --------------Web gateway certificate-------------------------------Certificate: Data: Version: 3 (0x2) Serial Number: 1575924977762797464 (0x15decf6aec378798) Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=CA, L=San Jose, O=Enterprise CA inc, OU=Data Center, CN=dcnm1.ca.com Validity Not Before: Dec 9 20:56:17 2019 GMT Not After : Dec 9 20:56:17 2024 GMT Subject: C=US, ST=CA, L=San Jose, O= Enterprise CA inc, OU=Data Center, CN=dcnm1.ca.com Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:cf:6e:cd:c6:a9:30:08:df:92:98:38:49:9c:2a: --------------Certificate output is truncated to first 15 lines-------------****CERTIFICATE 2**** [Certificate available in keystore(jks). CA signed certificate is installed here till DCNM version 11.1.x] If you have upgraded from DCNM version 11.1.x to later version please see installation guide to restore CA signed certificate to upgraded version. --------------Keystore certificate------------------------------------------Alias name: sme Creation date: Oct 14, 2018 Entry type: PrivateKeyEntry Certificate chain length: 2 Certificate[1]: Owner: CN=localhost, OU=Data Center, O=Cisco Systems Inc, L=San Jose, ST=CA, C=US Issuer: CN=dcnmca, OU=Data Center, O=Cisco Systems Inc, L=San Jose, ST=CA, C=US Serial number: 62044620 Valid from: Sun Oct 14 20:39:39 PDT 2018 until: Fri Oct 13 20:39:39 PDT 2023 Certificate fingerprints: SHA1: 38:66:F1:CD:10:61:27:E7:43:85:10:41:3D:A3:4B:5C:C9:CC:17:5E SHA256: E0:87:D8:34:71:18:FE:8C:AB:18:0B:D7:85:B1:91:A8:4B:75:A3:91:BA:90:83:46:72:87:FE:FE:FE:04:F0:E1 Signature algorithm name: SHA256withRSA Subject Public Key Algorithm: 2048-bit RSA key Version: 3 --------------Certificate output is truncated to first 15 lines-----dcnm# Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 123 Certificates Restoring Certificates on Cisco DCNM Standalone setup after Upgrade Restoring Certificates on Cisco DCNM Standalone setup after Upgrade To restore the certificates after you upgrade the Cisco DCNM Standalone deployment to Release , perform the following: Procedure Step 1 Note When you upgrade to Release , a backup of the CA Signed certificate is created. After you have successfully upgraded the Cisco DCNM Standalone appliance, logon to the DCNM server via SSH. Step 2 Stop all the applications using the following command: appmgr stop all Step 3 Restore the certificate by using the following command: appmgr afw restore-CA-signed-cert Step 4 Enter yes to confirm to restore the previously installed certificate. Step 5 Start all the applications using the following command: appmgr start all Step 6 Verify the newly installed CA Signed certificate using the appmgr afw show-cert-details command. The system is now armed with the CA Signed certificate, which is verified at the browser. Restoring Certificates on Cisco DCNM Native HA setup after Upgrade In a Cisco DCNM Native HA setup, the certificate is installed on both the Active and Standby nodes. You must restore the certificate only on the Active node. The certificate will synchronize with the Standby node automatically. To restore the certificates after you upgrade the Cisco DCNM Standalone deployment to Release , perform the following: Procedure Step 1 Logon to the Cisco DCNM server via SSH. Note Step 2 For example, let us indicate Active and Standby appliances as dcnm1 and dcnm2 respectively. On the Standby node, stop all the applications using the appmgr stop all command. dcnm2# appmgr stop all /* Stop all applications running on Cisco DCNM Standby Node Step 3 On the Active node, stop all the applications using the appmgr stop all command. dcnm1# appmgr stop all /* Stop all applications running on Cisco DCNM Active Node Step 4 Restore the certificate on the Active node by using the appmgr afw restore-CA-signed-cert command. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 124 Certificates Recovering and Restoring Previously Installed CA Signed Certificates dcnm1# appmgr afw restore-CA-signed-cert Step 5 Enter yes to confirm to restore the previously installed certificate. Step 6 On the Active node, start all the applications using the appmgr start all command. dcnm1# appmgr start all /* Start all applications running on Cisco DCNM Active Node Ensure that all services on Cisco DCNM Active node is operational before you proceed further. Note Step 7 Logon to the Cisco DCNM Web UI and check if the Certificate details are correct. On the Standby node, start all the applications using the appmgr start all command. dcnm2# appmgr start all /* Start all applications running on Cisco DCNM Standby Node Wait for some time, while the Standby node synchronizes with the Active node. Step 8 Verify the newly installed CA Signed certificate using the appmgr afw show-cert-details command, on both Active and Standby nodes. The system is now armed with the CA Signed certificate, which is verified at the browser. Recovering and Restoring Previously Installed CA Signed Certificates Installing, restoring, managing CA signed certificate is a time-consuming process as a third-party signing server is involved. This may also lead to omissions or mistakes which can result in installing wrong certificates. In such a scenario, we recommend that you restore the certificates that were installed prior to the latest install or upgrade. To recover and restore the previously installed CA signed certificates, perform the following steps. Procedure Step 1 Logon to the DCNM server via SSH terminal. Step 2 Navigate to the /var/lib/dcnm/afw/apigateway/ directory. dcnm# cd /var/lib/dcnm/afw/apigateway/ dcnm# ls -ltr /* View the contents of the folder total 128 -rw------- 1 root root 1844 Nov 18 13:14 dcnmweb.key.2019-11-20T132939-08:00 -rw-r--r-- 1 root root 1532 Nov 18 13:14 dcnmweb.crt.2019-11-20T132939-08:00 -rw------- 1 root root 1844 Nov 20 10:15 dcnmweb.key.2019-11-20T132950-08:00 -rw-r--r-- 1 root root 1532 Nov 20 10:15 dcnmweb.crt.2019-11-20T132950-08:00 -rw------- 1 root root 1844 Dec 22 13:59 dcnmweb.key -rw-r--r-- 1 root root 1532 Dec 22 13:59 dcnmweb.crt . .. ... dcnmweb.key and dcnmweb.crt are the key and certificate files that are installed on the system, currently. Similar filenames, with timestamp suffix, help you in identifying the key and certificate pairs installed prior to the recent upgrade or restore. Step 3 Stop all applications running on Cisco DCNM using appmgr stop all command. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 125 Certificates Verifying the installed certificate Step 4 Take a backup of dcnmweb.key and dcnmweb.crt files. Step 5 Identify the older key and certificate pair that you want to restore. Step 6 Copy the key and certificate pair as dcnmweb.key and dcnmweb.crt (without timestamp suffix). Step 7 Start all applications running on Cisco DCNM using appmgr start all command. Step 8 Verify the details of the certificate using the appmgr afw show-cert-details command. CERTIFICATE 1 is the CA signed certificate. Note If the CA signed certificate is not visible to Cisco DCNM Web UI, or if the DCNM Server sends any failure message, you must reboot the system. Verifying the installed certificate While the installed certificate can be verified using the appmgr afw show-cert-details command, the web browser verifies if the certificate is effective or not. Cisco DCNM supports all standard browsers (Chrome, IE, Safari, Firefox). However, each browser display the certificate information differently. We recommend that you refer to the browser specific information on that browser provider website. The following snippet is a sample from the Chrome Browser, Version 74.0.3729.169, to verify the certificate. 1. Enter URL https://<dcnm-ip-address> or https://<FQDN> in the address bar on the browser. Press the Return key. 2. Based on the type of certificate, the icon on the left of the URL field shows a lock icon [ icon [ ]. Click on the icon. 3. On the card, click Certificate field. The information in the certificate is displayed. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 126 ] or an alert Certificates Verifying the installed certificate The information that is displayed must match with the details as displayed on CERTIFICATE 1 when you view the certificate details using the appmgr afw show-cert-details. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 127 Certificates Verifying the installed certificate Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 128 CHAPTER 10 Running Cisco DCNM Behind a Firewall This chapter provides information about running Cisco DCNM behind a firewall. • Running Cisco DCNM Behind a Firewall, on page 129 • Configuring Custom Firewalls, on page 131 Running Cisco DCNM Behind a Firewall Generally, an Enterprise (external world) and Data center is separated by a firewall, i.e., DCNM is configured behind a firewall. The Cisco DCNM Web Client and SSH connectivity must pass-through that firewall. Also, a firewall can be placed between the DCNM Server and DCNM-managed devices. All Cisco DCNM Native HA nodes must be on the same side of the firewall. The internal DCNM Native HA ports are not listed, as it is not recommended to configure a firewall in between the Native HA nodes. Note When you add or discover LAN devices in DCNM, java is used as a part of the discovery process. If firewall blocks the process then it uses TCP connection port 7 as a discovery process. Ensure that the cdp.discoverPingDisable server property is set to true. Choose Web UI > Administration > DCNM Server > Server Properties to set the server property. Any standard port where the Ingress traffic enters from clients cannot be modified unless you disable the local firewall. The following table lists all ports that are used for communication between Cisco DCNM Web Client, SSH Client, and Cisco DCNM Server. Port Number Protocol Service Name Direction of Communication Remarks 22 TCP SSH Client to DCNM Server SSH access to external world is optional. 443 TCP HTTPS Client to DCNM Server This is needed to reach DCNM Web Server. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 129 Running Cisco DCNM Behind a Firewall Running Cisco DCNM Behind a Firewall Port Number Protocol Service Name Direction of Communication Remarks 2443 TCP HTTPS Client to DCNM Server Required during installation, to reach the server. DCNM closes this port after installation completes. The following table lists all ports that are used for communication between Cisco DCNM Server and other services. Note The services can be hosted on either side of the firewall. Port Number Protocol Service Name Direction of Communication Remarks 49 TCP/UDP TACACS+ DCNM Server to DNS Server ACS Server can be either side of the firewall. 53 TCP/UDP DNS DCNM Server to DNS Server DNS Server can be either side of the firewall. 123 UDP NTP DCNM Server to NTP Server NTP Server can be either side of the firewall. 5000 TCP Docker Registry Incoming to DCNM Docker Registry Server Service on DCNM Server listening to requests from DCNM compute nodes. 5432 TCP Postgres DCNM Server to Default installation Postgres DB Server of DCNM does not need this port. This is needed only when Postgres is installed external to the DCNM host machine. The following table lists all ports that are used for communication between DCNM Server and managed devices: Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 130 Running Cisco DCNM Behind a Firewall Configuring Custom Firewalls Port Number Protocol Service Name Direction of Communication Remarks 22 TCP SSH Both Direction DCNM Server to Device – To manage devices. Device to DCNM Server – SCP (POAP). 67 UDP DHCP Device to DCNM Server 69 TCP TFTP Device to DCNM Server Required for POAP 161 TCP/UDP SNMP Server to DCNM Device DCNM configured via server.properties to use TCP uses TCP port 161, instead of UDP port 161. 514 UDP Syslog Device to DCNM Server 2162 UDP SNMP_TRAP Device to DCNM Server 33000-33499 TCP gRPC Device to DCNM Server LAN Telemetry Streaming Configuring Custom Firewalls Note This is applicable for DCNM OVA/ISO deployments only. Cisco DCNM Server deploys a set of IPTables rules, known as DCNM Local Firewall. These rules open TCP/UDP ports that are required for Cisco DCNM operations. You can’t manipulate the built-in Local Firewall without accessing the OS interface, through SSH, and change the rules. Don’t change the Firewall rules, as it may become vulnerable to attacks, or impact the normal functioning of DCNM. To cater to a given deployment or a network, Cisco DCNM allows you to configure your own firewall rules, from Release 11.3(1), using CLIs. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 131 Running Cisco DCNM Behind a Firewall Configuring Custom Firewalls Note These rules can be broad or granular, and supersedes the built-in Local Firewall rules. Therefore, configure these rules carefully, during a maintenance period. You don’t need to stop or restart DCNM server or applications to configure custom firewalls. Caution IPTable prioritizes the rules in the order that they are configured. Therefore, more granular rules must be installed in the beginning. To ensure that the order of the rules is as required, you can create all rules in a text editor, and then execute the CLIs in the desired order. If rules need to be adjusted, you can flush all rules and configure the rules in the desired order. You can perform the following operations on the Custom Firewalls. Note Run all the commands on the Cisco DCNM server using SSH. Custom Firewall CLI View the custom firewall CLI chain help and examples using the appmgr user-firewall command. dcnm# appmgr user-firewall dcnm# appmgr user-firewall – h Configure Rules for Custom Firewall Configure the custom firewall rules using the appmgr user-firewall {add | del} command. appmgr user-firewall {add | del} proto {tcp | udp} port {<port><port range n1:n2>} [{in | out} <interface name>] [srcip <ip-address> [/<mask>]] [dstip <ip-address> [/<mask>]] action {permit | deny} Note The custom firewall rules supersede the local Firewall rules. Therefore, be cautious and ensure that the functionalities aren’t broken. Example: Sample Custom Firewall Rules • dcnm# appmgr user-firewall add proto tcp port 7777 action deny This rule drops all TCP port 7777 traffic on all interfaces. • dcnm# appmgr user-firewall add proto tcp port 443 in eth1 action deny This rule drops all TCP port 443 incoming traffic on interface eth1. • dcnm# appmgr user-firewall add proto tcp port 7000:7050 srcip 1.2.3.4 action deny This rule drops TCP port range 10000-10099 traffic coming from IP address 1.2.3.4. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 132 Running Cisco DCNM Behind a Firewall Configuring Custom Firewalls Preserving Custom Firewall Rules Preserve the custom firewall rules across reboots, using the appmgr user-firewall commit command. Note Each time you modify the rules, you must execute this command to preserve the rules across reboots. Installing Custom Firewall Rules on Native HA Standby Node In a Cisco DCNM Native HA setup, when you execute the appmgr user-firewall commit on the Active node, the rules are synchronized to the Standby node automatically. However, the new rules are operational only after a system reboot. To apply the rules immediately, install the custom firewall rules on Standby node using the appmgr user-firewall user-policy-install command. Deleting Custom Firewalls Delete all the custom firewalls using the appmgr user-firewall flush-all command. To delete the custom firewalls permanently, use the appmgr user-firewall commit command. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 133 Running Cisco DCNM Behind a Firewall Configuring Custom Firewalls Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 134 CHAPTER 11 Secure Client Communications for Cisco DCNM Servers • Secure Client Communications for Cisco DCNM Servers, on page 135 Secure Client Communications for Cisco DCNM Servers This section describes how to configure HTTPS on Cisco Data Center Network Manager Servers. Note You must enable SSL/HTTPS on the Cisco DCNM before you add a CA signed SSL certificate. Therefore, perform the procedure in the below mentioned order. This section includes the following topics: Enabling SSL/HTTPS on Cisco DCNM in HA Environment on Virtual Appliance To enable SSL/HTTPS on a Virtual Appliance for Cisco DCNM in HA mode, perform the following: Procedure Step 1 Configure the primary server with a self signed SSL certificate. Note In a CA signed certificate, each server has their own certificate generated. Ensure that the certificate is signed by the signing certificate chain which is common for both the servers. Step 2 On the secondary server, locate the keystore. Step 3 Rename the keystore located at <DCNM_install_root>/dcm/wildfly-10.1.0.Final/standalone/configuration/fmserver.jks to <DCNM_install_root>/dcm/wildfly-10.1.0.Final/standalone/configuration/fmserver.jks.old Step 4 Copy the file fmserver.jks generated in primary server to secondary server into folders Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 135 Secure Client Communications for Cisco DCNM Servers Enabling SSL/HTTPS on Cisco DCNM in HA Environment on Virtual Appliance <dcnm-home> /dcm/wildfly-10.1.0.Final/standalone/configuration/ <dcnm-home>/dcm/fm/conf/cert/ What to do next If you have created a self-signed certificate or imported an SSL certificate to the keystore, you must copy the new fmserver.jks located at /usr/local/cisco/dcm/wildfly-10.1.0.Final/standalone/configuration to /etc/elasticsearch. If you do not copy the fmserver.jks file to the elasticsearch directory, you will not be able to get the Alarms and Policies. As the elasticsearch database will be stabilizing, you cannot configure any Alarm Policy on the Cisco DCNM Web UI Monitor > Alarms > Alarm Policies. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 136 CHAPTER 12 Managing Applications in a High-Availability Environment This chapter describes how to configure a high-availability (HA) environment in your Cisco DCNM Open Virtual Appliance deployment for your Cisco Programmable Fabric solution. It also includes details about the HA functionality for each of the applications bundled within the Cisco DCNM Open Virtual Appliance. Note Ensure that the NTP server is synchronized between active and standby peers is essential for proper HA functioning in DCNM This chapter contains the following sections: • Information About Application Level HA in the Cisco DCNM Open Virtual Appliance, on page 137 • Native HA Failover and Troubleshooting, on page 138 • Application High Availability Details, on page 140 Information About Application Level HA in the Cisco DCNM Open Virtual Appliance To achieve HA for applications that are run on the Cisco DCNM Open Virtual Appliance, you can run two virtual appliances. You can run one in Active mode and the other in Standby mode. Note This document refers to these appliances as OVA-A and OVA-B, respectively. In this scenario: 1. All applications run on both appliances. The application data is either constantly synchronized or applications share a common database as applicable. 2. Only one of the applications running on the two appliances serves the client requests. Initially this would be the applications running on OVA-A. The application continues to do so until one of the following happens: Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 137 Managing Applications in a High-Availability Environment Automatic Failover • The application on OVA-A crashes. • The operating system on OVA-A crashes. • OVA-A is powered off for some reason. 3. At this point, the application running on the other appliance (OVA-B) takes over. For DHCP, when the first node fails, the second node starts serving the IP addresses. 4. The existing connections to OVA-A are dropped and the new connections are routed to OVA-B. This scenario demonstrates why one of the nodes (OVA-A) is initially referred to as the Active node and OVA-B is referred as the Standby node. Automatic Failover The application-level and virtual machine (VM)-level and switchover process is as follows. • If any of the applications managed by the load-balancing software (DCNM/AMQP) goes down on OVA-A, the Active node that handles the client requests detects the failure and redirects subsequent requests to the Standby node (OVA-B). This process provides an application-level switchover. • If the Active node (OVA-A) fails or is powered-off for some reason, the Standby node (OVA-B) detects the failure and enables the VIP address for Cisco DCNM/AMQP on OVA-B. It also sends a gratuitous ARP to the local switch to indicate the new MAC address that is associated with the IP address. For applications not using VIP, the DHCPD running on OVA-B detects the failure of DHCPD on OVA-A and activates itself; whereas LDAP running on OVA-B continues running as LDAP is deployed Active-Active. Consequently, a VM-level failover is accomplished for all four applications (DCNM/AMQP/DHCP/LDAP). Manually Triggered Failovers An application-level failover can also be triggered manually. For instance, you might want to run AMQP on OVA-B and the rest of the applications on OVA-A. In that case, you can log in to the SSH terminal of OVA-A and stop AMQP by using the appmgr stop amqp command. This failover triggers the same process that is described in the Automatic Failover, on page 138; subsequent requests to the AMQP Virtual IP address are redirected to OVA-B. Native HA Failover and Troubleshooting Due to the nature of Native HA, the role of the host might alternate from Active to Standby or from Standby to Active. The following sections provide information on troubleshooting in different use cases. Native HA Failover from Active Host to Standby Host Perform the following steps when the Native HA failover occurs from Active to Standby host: 1. Log on to DCNM Web UI, and navigate to Administrator > Native HA. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 138 Managing Applications in a High-Availability Environment Native HA Failover and Troubleshooting 2. Verify the status of HA. If the DCNM HA status is not in OK mode, you cannot perform Failover operation. Click Failover. The Cisco DCNM server will shutdown and the DCNM Standby appliance will be operational. 3. Refresh the Cisco DCNM Web UI. After the DCNM server is operational, you can log on to the DCNM Web UI. Note We recommend that you do not run appmgr stop all or appmgr stop ha-apps commands on the Active host to trigger failover. If Cisco DCNM HA status is not in OK mode, a failover may cause loss of data, as the Standby DCNM appliance is not synchronized with the Active appliance before failover. Issue with DCNM Application Framework If DCNM Web UI is not accessible, and a failover operation is necessary, execute one of the following commands under Linux console: appmgr failover—This command triggers the HA heartbeat failover. Or reboot -h now—This command triggers the Linux host to reboot, which causes a failover. However, we recommend that you use DCNM Web UI to perform failover, as all other methods carry a risk of data loss when both HA peers are not in sync. Stop and Restart DCNM To completely stop DCNM and restart it, perform the following: 1. On the Standby appliance, stop all the applications by using the appmgr stop all command. 2. Check if all the applications have stopped, using the appmgr status all command. 3. On the Active appliance, stop all the applications using the appmgr stop all command. 4. Verify if all the applications are stopped using the appmgr status all command. 5. On the deployed Active host, start all the applications using the appmgr start all command. Verify if all the applications are running. Log on to the DCNM Web UI to check if it is operational. 6. On the deployed Standby host, start all the applications using the appmgr start all command. On the Web UI, navigate to Administration > Native HA and ensure that the HA status displays OK. Restart Standby Host Perform this procedure to restart only the Standby host: 1. On the Standby host, stop all the applications using the appmgr stop all command. 2. Verify if all the applications have stopped using the appmgr status all command. 3. Start all the applications using the appmgr start all. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 139 Managing Applications in a High-Availability Environment Application High Availability Details On the Web UI, navigate to Administration > Native HA and ensure that the HA status displays OK. Application High Availability Details This section describes all of the Cisco Programmable Fabric HA applications. Cisco DCNM Open Virtual Appliance has two interfaces: one that connects to the Open Virtual Appliance management network and one that connects to the enhanced Programmable Fabric network. Virtual IP addresses are defined for both interfaces. • From the Open Virtual Appliance management network, the DCNM-REST API, DCNM interface, and AMQP are accessed through the VIP address • From the enhanced fabric management network, LDAP and DHCP are accessed directly. Only three Virtual IPs are defined: • DCNM REST API (on dcnm management network) • DCNM REST API (on enhanced fabric management network • AMQP (on dcnm management network) Note Although DCNM Open Virtual Appliance in HA sets up a VIP, the VIP is intended to be used for the access of DCNM, REST API. For GUI access, we still recommend that you use the individual IP addresses of the DCNM HA peers and use the same to launch DCNM SAN Java clients, etc. See the following table for a complete list of Programmable Fabric applications and their corresponding HA mechanisms. Programmable Fabric Application HA Mechanism Use of Virtual IPs Comments Data Center Network Manager DCNM Clustering/Federation Yes Two VIPs defined, one on each network RabbitMQ RabbitMQ Mirrored Queues Yes One VIP defined on the OVA management network Repositories — — External repositories have to be used Data Center Network Management The data center network management function is provided by the Cisco Data Center Network Manager (DCNM) server. Cisco DCNM provides the setup, visualization, management, and monitoring of the data center infrastructure. Cisco DCNM can be accessed from your browser at http://[host/ip]. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 140 Managing Applications in a High-Availability Environment Data Center Network Management Note For more information about Cisco DCNM, see http://cisco.com/go/dcnm . HA Implementation Cisco DCNMs that run on both OVAs are configured in clustering and federated modes for HA. Cisco DCNM federation is the HA mechanism for SAN devices. Groups of SAN devices can be managed by each node in the DCNM federated setup. All the devices can be managed using a single client interface. You can enable automatic failover in the Cisco DCNM UI by choosing: Admin > Federation. If you enable an automatic failover and the Cisco DCNM that is running on OVA-A fails, the automatic failover moves only the fabrics and shallow-discovered LANs that are managed by OVA-A to OVA-B automatically. DCNM Virtual IP Usage An Open Virtual Appliance HA setup has two VIP addresses (one for each network) for the Cisco DCNM at the default HTTP port. These VIPs can be used for accessing the DCNM RESTful services on the Open Virtual Appliance management network and the enhanced fabric management network. For example, external systems such as Cisco UCS Director can point to the VIP in the Open Virtual Appliance management network and the request gets directed to the active Cisco DCNM. Similarly, the switches in an enhanced fabric management network access the VIP address on the enhanced fabric management network during the POAP process. You can still directly connect to Cisco DCNM real IP addresses and use them as you would in a DCNM in a cluster/federated set up. Note Cisco recommends that you must use VIP addresses only for accessing DCNM REST API. To access the Cisco DCNM Web or SAN client, you must connect using the IP address of the server. Licenses For Cisco DCNM, we recommend that you have licenses on the first instance and a spare matching license on the second instance. Application Failovers Enable an automatic failover option in the Cisco DCNM UI when an Open Virtual Appliance HA pair is set up by choosing: Administration > DCNM Server > Native HA. This process ensures that if the DCNM that is running on OVA-A fails, all the fabrics and shallow-discovered LANs managed by DCNM-A are managed by DCNM-B automatically after a given time interval (usually about 5 minutes after the failure of DCNM on OVA-A). The Cisco DCNM VIP address still resides on OVA-A. The Representational State Transfer Web Services (REST) calls initially hit the VIP addresses on OVA-A and get redirected to the Cisco DCNM that is running on OVA-B. Application Failbacks When the Cisco DCNM on OVA-A comes up, the VIP address automatically redirects the REST requests to DCNM-A. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 141 Managing Applications in a High-Availability Environment RabbitMQ Virtual-IP Failovers The VIP address that is configured for Cisco DCNM REST API on OVA-A can fail due to two reasons: • The load-balancing software running on OVA-A fails. • OVA-A fails. The VIP address of Cisco DCNM automatically migrates to OVA-B. The only difference is which DCNM will be used after the failover. • If a load-balancing software failure occurs, the VIP address on OVA-B directs the requests to DCNM-A. • If an OVA-A failure occurs, the VIP address on OVA-B directs the requests to DCNM-B. The automatic failover ensures that the ownership of all of the fabrics and shallow-discovered LANs managed by DCNM-A automatically change to DCNM-B. Virtual-IP Failbacks When OVA-A is brought up and Cisco DCNM is running, the VIP addresses keep running on the Standby node. The failback of Virtual IP addresses from OVA-B to OVA-A occurs only in the following sequence. 1. OVA-A comes up. 2. Cisco DCNM runs on OVA-A. 3. OVA-B goes down or the load-balancing software fails on OVA-B. RabbitMQ RabbitMQ is the message broker that provides the Advanced Messaging Queuing Protocol (AMQP). Note You need to stop and restart AMQP on both DCNM's server in HA within 30 seconds, otherwise AMQP may not start.For more information about RabbitMQ, go to https://www.rabbitmq.com/documentation.html. HA Implementation Enabling the HA on the Open Virtual Appliance creates a VIP address in the Open Virtual Appliance management network. Orchestration systems such as vCloud Director, set their AMQP broker to the VIP address. Enabling the HA on the Open Virtual Appliance also configures the RabbitMQ broker that runs on each node to be a duplicate of the broker that is running on the other node. Both OVAs act as “disk nodes” of a RabbitMQ cluster, which means that all the persistent messages stored in durable queues are replicated. The RabbitMQ policy ensures that all the queues are automatically replicated to all the nodes. Application Failovers If RabbitMQ-A fails, the VIP address on OVA-A redirects the subsequent AMQP requests to RabbitMQ-B. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 142 Managing Applications in a High-Availability Environment Repositories Application Failbacks When RabbitMQ-A comes up, the VIP address automatically starts directing the AMQP requests to RabbitMQ-A. Virtual-IP Failovers The VIP address configured for the AMQP broker on OVA-A can fail due to two reasons: • The load-balancing software running on OVA-A fails. • OVA-A fails. In both cases, the VIP address of the AMQP automatically migrates to OVA-B. The only difference is which AMQP broker will be used after the failover. • In a load-balancing software failure, the VIP address on OVA-B directs the requests to RabbitMQ-A. • In an OVA-A failure, the VIP address on OVA-B directs the requests to RabbitMQ-B. Virtual-IP Failbacks When OVA-A is brought up and AMQP-A is running, the VIP addresses keep running on the OVA-B (directing the requests to AMQP-A). The failback of the RabbitMQ VIP from OVA-B to OVA-A occurs only in the following sequence. 1. OVA-A comes up. 2. RabbitMQ runs on OVA-A. 3. OVA-B goes down or the load-balancing software fails on OVA-B. Repositories All repositories must be remote. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 143 Managing Applications in a High-Availability Environment Repositories Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 144 CHAPTER 13 Managing Utility Services After DCNM Deployment This chapter describes how to verify and manage all of the utility services that provide DC3 (Programmable Fabric) central point of management functions after the DCNM is deployed. Table 7: Cisco DCNM Utility Services Category Application Username Password Protocol Implemented Network Management Data Center Network Manager admin User choice 5 Network Management 5 User choice refers to the administration password entered by the user during the deployment. This chapter contains the following sections: • Editing Network Properties Post DCNM Installation, on page 145 • Convert Standalone Setup to Native-HA Setup, on page 157 • Utility Services Details, on page 161 • Managing Applications and Utility Services , on page 163 • Updating the SFTP Server Address for IPv6, on page 165 Editing Network Properties Post DCNM Installation The Cisco DCNM OVA or the ISO installation consists of 3 network interfaces: • dcnm-mgmt network (eth0) interface This network provides connectivity (SSH, SCP, HTTP, HTTPS) to the Cisco DCNM Open Virtual Appliance. Associate this network with the port group that corresponds to the subnet that is associated with the DCNM Management network. • enhanced-fabric-mgmt (eth1) interface This network provides enhanced fabric management of Nexus switches. Associate this network with the port group that corresponds to management network of leaf and spine switches. • enhanced-fabric-inband (eth2) interface Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 145 Managing Utility Services After DCNM Deployment Modifying Network Properties on DCNM in Standalone Mode This network provides in-band connection to fabric. Associate this network with the port group that corresponds to a fabric in-band connection. The following figure shows the network diagram for the Cisco DCNM Management interfaces. During Cisco DCNM installation for your deployment type, you can configure these interfaces. However, from Cisco DCNM Release 11.2(1), you can edit and modify the network settings post installation. Note We recommend that you use appmgr commands to update network properties. Do not restart network interfaces manually. You can modify the parameters as explained in the following sections: Modifying Network Properties on DCNM in Standalone Mode Note Execute the following commands on the DCNM Appliance console to avoid a premature session timeout. To change the Network Properties on Cisco DCNM Standalone setup, perform the following steps: Procedure Step 1 Initiate a session on the console, using the following command: appmgr update network-properties session start Step 2 Update the Network Properties using the following command: appmgr update network-properties set ipv4 {eth0|eth1|eth2}<ipv4-address> <network-mask> <gateway> Step 3 View and verify the changes by using the following command: appmgr update network-properties session show {config | changes | diffs} Step 4 After you validate the changes, apply the configuration using the following command: appmgr update network-properties session apply Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 146 Managing Utility Services After DCNM Deployment Modifying Network Properties on DCNM in Standalone Mode Wait for a few minutes before you can logon to the Cisco DCNM Web UI using the eth0 Management Network IP address. Sample Command Output for Modifying Network Parameters in the Cisco DCNM Standalone Setup The following sample example shows how to modify the network parameters post installation for a Cisco DCNM Standalone setup. dcnm# appmgr update network-properties session start dcnm# appmgr update network-properties set ipv4 eth0 172.28.10.244 255.255.255.0 172.28.10.1 dcnm# appmgr update network-properties set ipv4 eth1 100.0.0.244 255.0.0.0 dcnm# appmgr update network-properties set ipv4 eth2 2.0.0.251 255.0.0.0 2.0.0.1 ***************************************************************** WARNING: fabric/poap configuration may need to be changed manually after changes are applied. ***************************************************************** dcnm# appmgr update network-properties session show changes eth0 IPv4 addr 172.28.10.246/255.255.255.0 -> 172.28.10.244/255.255.255.0 eth1 IPv4 addr 1.0.0.246/255.0.0.0 -> 100.0.0.244/255.0.0.0 eth2 IPv4 addr 10.0.0.246/255.0.0.0 -> 2.0.0.251/255.0.0.0 2.0.0.1 dcnm# appmgr update network-properties session apply ********************************************************************* WARNING Applications of both nodes of the DCNM HA system need to be stopped for the changes to be applied properly. PLEASE STOP ALL APPLICATIONS MANUALLY ********************************************************************* Have applications been stopped? [y/n]: y Applying changes DELETE 1 Node left the swarm. Server configuration file loaded: /usr/local/cisco/dcm/fm//conf/server.properties log4j:WARN No appenders could be found for logger (fms.db). log4j:WARN Please initialize the log4j system properly. log4j:WARN See http://logging.apache.org/log4j/1.2/faq.html#noconfig for more info. UPDATE 1 UPDATE 1 DELETE 1 server signaled INFO : [ipv6_wait_tentative] Waiting for interface eth0 IPv6 address(es) to leave the 'tentative' state INFO : [ipv6_wait_tentative] Waiting for interface eth0 IPv6 address(es) to leave the 'tentative' state ********************************************************************** Please run 'appmgr start afw; appmgr start all' to restart your nodes. ********************************************************************** dcnm# appmgr start afw; appmgr start all Started AFW Server Processes Started AFW Agent Processes Started AFW Server Processes Started AFW Agent Processes Started applications managed by heartbeat.. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 147 Managing Utility Services After DCNM Deployment Modifying Network Properties on DCNM in Native HA Mode Check the status using 'appmgr status all' Starting High-Availability services: INFO: Done. Resource is stopped Warning: PID file not written; -detached was passed. AMQP User Check Started AFW Server Processes Started AFW Agent Processes dcnm# Modifying Network Properties on DCNM in Native HA Mode Note Execute the following commands on the DCNM Appliance console to avoid a premature session timeout. Ensure that you execute the commands in the same order as mentioned in the following steps. Note Native HA nodes must be considered as a single entity. When you change the Active node eth1 IP address, you must also change the Standby node eth1 IP address. When you change the eth0 IP address in any node, you must change the eth2 IP address for that node. To change the Network Properties on Cisco DCNM Native HA setup, perform the following steps: Procedure Step 1 Stop the DCNM Applications on the Standby node by using the following command: appmgr stop all Wait until all the applications stop on the Standby node before you go proceed. Step 2 Stop the DCNM Applications on the Active node by using the following command: appmgr stop all Step 3 Initiate a session on the Cisco DCNM console of both the Active and Standby nodes by using the following command: appmgr update network-properties session start Step 4 On the Active node, modify the network interface parameters by using the following commands: a) Configure the IP address for eth0, eth1, and eth2 address by using the following command: appmgr update network-properties set ipv4 {eth0|eth1|eth2}<ipv4-address> <network-mask> <gateway> Enter the new IPv4 or IPv6 address for the interface, along with the subnet mask and gateway IP addresses. b) Configure the VIP IP address by using the following command: appmgr update network-properties set ipv4 {vip0|vip1|vip2}<ipv4-address> <network-mask> Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 148 Managing Utility Services After DCNM Deployment Modifying Network Properties on DCNM in Native HA Mode Enter the vip0 address for eth0 interface. Enter the vip1 address for eth1 interface. Enter the vip2 address for eth2 interface. c) Configure the peer IP address by using the following command: appmgr update network-properties set ipv4 {peer0|peer1|peer2}<ipv4-address> Enter the eth0 address of the Standby node as peer0 address for Active node. Enter the eth1 address of the Standby node as peer1 address for Active node. Enter the eth2 address of the Standby node as peer2 address for Active node. d) View and validate the changes that you have made to the network parameters by using the following command: appmgr update network-properties session show{config | changes | diffs} Step 5 On the Standby node, modify the network interface parameters using the commands described in procedure in Step Step 4, on page 148. Step 6 After you validate the changes, apply the configuration on the Active node by using the following command: appmgr update network-properties session apply Wait until the prompt returns, to confirm that the network parameters are updated. Step 7 After you validate the changes, apply the configuration on the Standby node by using the following command: appmgr update network-properties session apply Step 8 Start all the applications on the Active node by using the following command: appmgr start all Note Step 9 Wait until all the applications are running successfully on the Active node, before proceeding to the next step. Start all the applications on the Standby node by using the following command: appmgr start all Step 10 Establish peer trust key on the Active node by using the following command: appmgr update ssh-peer-trust Step 11 Establish peer trust key on the Standby node by using the following command: appmgr update ssh-peer-trust Sample Command Output for Modifying Network Parameters in the Cisco DCNM Native HA Setup The following sample example shows how to modify the network parameters post installation for a Cisco DCNM Native HA setup. Note For example, let us indicate Active and Standby appliances as dcnm1 and dcnm2 respectively. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 149 Managing Utility Services After DCNM Deployment Modifying Network Properties on DCNM in Native HA Mode [root@dcnm2 ~]# appmgr stop all Stopping AFW Applications... Stopping AFW Server Processes Stopping AFW Agent Processes Stopped Application Framework... Stopping High-Availability services: Done. Stopping and halting node rabbit@dcnm-dcnm2 ... Note: Forwarding request to 'systemctl enable rabbitmq-server.service'. Stopping AFW Applications... Stopping AFW Server Processes Stopping AFW Agent Processes Stopped Application Framework... [root@dcnm2 ~]# [root@dcnm1 ~]# appmgr stop all Stopping AFW Applications... Stopping AFW Server Processes Stopping AFW Agent Processes Stopped Application Framework... Stopping High-Availability services: Done. Stopping and halting node rabbit@dcnm1 ... Note: Forwarding request to 'systemctl enable rabbitmq-server.service'. Stopping AFW Applications... Stopping AFW Server Processes Stopping AFW Agent Processes Stopped Application Framework... [root@dcnm-1 ~]# [root@dcnm1 ~]# appmgr update network-properties session start [root@dcnm1 ~]# [root@dcnm2 ~]# appmgr update network-properties session start [root@dcnm2 ~]# [root@dcnm1 ~]# appmgr update network-properties set ipv4 eth0 172.28.10.244 255.255.255.0 172.28.10.1 [root@dcnm1 ~]# appmgr update network-properties set ipv4 eth1 1.0.0.244 255.0.0.0 1.0.0.1 ***************************************************************** WARNING: fabric/poap configuration may need to be changed manually after changes are applied. ***************************************************************** [root@dcnm1 ~]# appmgr update network-properties set ipv4 eth2 2.0.0.244 255.0.0.0 2.0.0.1 [root@dcnm1 ~]# appmgr update network-properties set ipv4 peer0 172.29.10.238 [root@dcnm1 ~]# appmgr update network-properties set ipv4 peer1 1.0.0.238 [root@dcnm1 ~]# appmgr update network-properties set ipv4 peer2 2.0.0.238 [root@dcnm1 ~]# appmgr update network-properties set ipv4 vip0 172.28.10.239 255.255.255.0 [root@dcnm1 ~]# appmgr update network-properties set ipv4 vip1 1.0.0.239 255.0.0.0 [root@dcnm1 ~]# appmgr update network-properties set ipv4 vip2 2.0.0.239 255.0.0.0 [root@dcnm1 ~]# appmgr update network-properties set hostname local dcnm3.cisco.com [root@dcnm1 ~]# appmgr update network-properties set hostname peer dcnm4.cisco.com [root@dcnm1 ~]# appmgr update network-properties set hostname vip dcnm5.cisco.com [root@dcnm1 ~]# [root@dcnm2 ~]# appmgr update network-properties set ipv4 eth0 172.28.10.238 255.255.255.0 172.28.10.1 [root@dcnm2 ~]# appmgr update network-properties set ipv4 eth1 1.0.0.238 255.0.0.0 1.0.0.1 ***************************************************************** WARNING: fabric/poap configuration may need to be changed manually after changes are applied. ***************************************************************** [root@dcnm2 ~]# appmgr update network-properties set ipv4 eth2 2.0.0.238 255.0.0.0 2.0.0.1 [root@dcnm2 ~]# appmgr update network-properties set ipv4 peer0 172.29.10.244 [root@dcnm2 ~]# appmgr update network-properties set ipv4 peer1 1.0.0.244 Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 150 Managing Utility Services After DCNM Deployment Modifying Network Properties on DCNM in Native HA Mode [root@dcnm2 [root@dcnm2 [root@dcnm2 [root@dcnm2 [root@dcnm2 [root@dcnm2 [root@dcnm2 [root@dcnm2 ~]# ~]# ~]# ~]# ~]# ~]# ~]# ~]# appmgr appmgr appmgr appmgr appmgr appmgr appmgr update update update update update update update network-properties network-properties network-properties network-properties network-properties network-properties network-properties set set set set set set set ipv4 peer2 2.0.0.244 ipv4 vip0 172.28.10.239 255.255.255.0 ipv4 vip1 1.0.0.239 255.0.0.0 ipv4 vip2 2.0.0.239 255.0.0.0 hostname local dcnm3.cisco.com hostname peer dcnm4.cisco.com hostname vip dcnm5.cisco.com [root@dcnm2 ~]# [root@dcnm1 ~]# appmgr update network-properties session show changes eth0 IPv4 addr 172.28.10.246/255.255.255.0 -> 172.28.10.244/255.255.255.0 eth1 IPv4 addr 1.0.0.246/255.0.0.0 -> 1.0.0.244/255.0.0.0 eth1 IPv4 GW -> 1.0.0.1 eth2 IPv4 addr / -> 2.0.0.244/255.0.0.0 eth2 IPv4 GW -> 2.0.0.1 Hostname dcnm1.cisco.com -> dcnm3.cisco.com eth0 VIP 172.28.10.248/24 -> 172.28.10.239/24 eth1 VIP 1.0.0.248/8 -> 1.0.0.239/8 eth2 VIP / -> 2.0.0.239/8 Peer eth0 IP 172.28.10.247 -> 172.29.10.238 Peer eth1 IP 1.0.0.247 -> 1.0.0.238 Peer eth2 IP -> 2.0.0.238 Peer hostname dcnm2.cisco.com -> dcnm4.cisco.com VIP hostname dcnm6.cisco.com -> dcnm5.cisco.com [root@dcnm1 ~]# appmgr update network-properties session show config ======= Current configuration ====== Hostname dcnm1.cisco.com NTP Server 1.ntp.esl.cisco.com DNS Server 171.70.168.183,1.0.0.246 eth0 IPv4 addr 172.28.10.246/255.255.255.0 eth0 IPv4 GW 172.28.10.1 eth0 IPv6 addr eth0 IPv6 GW eth1 IPv4 addr 1.0.0.246/255.0.0.0 eth1 IPv4 GW eth1 IPv6 addr eth1 IPv6 GW eth2 IPv4 addr / eth2 IPv4 GW eth2 IPv6 addr eth2 IPv6 GW Peer hostname dcnm2.cisco.com Peer eth0 IP 172.28.10.247 Peer eth1 IP 1.0.0.247 Peer eth2 IP Peer eth0 IPv6 Peer eth1 IPv6 eth0 VIP 172.28.10.248/24 eth1 VIP 1.0.0.248/8 eth2 VIP / eth0 VIPv6 / eth1 VIPv6 / VIP hostname dcnm6.cisco.com ====== Session configuration ====== Hostname dcnm3.cisco.com NTP Server 1.ntp.esl.cisco.com DNS Server 171.70.168.183,1.0.0.246 eth0 IPv4 addr 172.28.10.244/255.255.255.0 eth0 IPv4 GW 172.28.10.1 eth0 IPv6 addr eth0 IPv6 GW Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 151 Managing Utility Services After DCNM Deployment Modifying Network Properties on DCNM in Native HA Mode eth1 IPv4 addr 1.0.0.244/255.0.0.0 eth1 IPv4 GW 1.0.0.1 eth1 IPv6 addr eth1 IPv6 GW eth2 IPv4 addr 2.0.0.244/255.0.0.0 eth2 IPv4 GW 2.0.0.1 eth2 IPv6 addr eth2 IPv6 GW Peer hostname dcnm4.cisco.com Peer eth0 IP 172.29.10.238 Peer eth1 IP 1.0.0.238 Peer eth2 IP 2.0.0.238 Peer eth0 IPv6 Peer eth1 IPv6 eth0 VIP 172.28.10.239/24 eth1 VIP 1.0.0.239/8 eth2 VIP 2.0.0.239/8 eth0 VIPv6 / eth1 VIPv6 / VIP hostname dcnm5.cisco.com [root@dcnm1 ~]# [root@dcnm2 ~]# appmgr update network-properties session show changes eth0 IPv4 addr 172.28.10.247/255.255.255.0 -> 172.28.10.238/255.255.255.0 eth1 IPv4 addr 1.0.0.247/255.0.0.0 -> 1.0.0.238/255.0.0.0 eth1 IPv4 GW -> 1.0.0.1 eth2 IPv4 addr / -> 2.0.0.238/255.0.0.0 eth2 IPv4 GW -> 2.0.0.1 Hostname dcnm2.cisco.com -> dcnm4.cisco.com eth0 VIP 172.28.10.248/24 -> 172.28.10.239/24 eth1 VIP 1.0.0.248/8 -> 1.0.0.239/8 eth2 VIP / -> 2.0.0.239/8 Peer eth0 IP 172.28.10.246 -> 172.29.10.244 Peer eth1 IP 1.0.0.246 -> 1.0.0.244 Peer eth2 IP -> 2.0.0.244 Peer hostname dcnm1.cisco.com -> dcnm3.cisco.com VIP hostname dcnm6.cisco.com -> dcnm5.cisco.com [root@dcnm2 ~]# appmgr update network-properties session show configuration ======= Current configuration ====== Hostname dcnm2.cisco.com NTP Server 1.ntp.esl.cisco.com DNS Server 171.70.168.183,1.0.0.247 eth0 IPv4 addr 172.28.10.247/255.255.255.0 eth0 IPv4 GW 172.28.10.1 eth0 IPv6 addr eth0 IPv6 GW eth1 IPv4 addr 1.0.0.247/255.0.0.0 eth1 IPv4 GW eth1 IPv6 addr eth1 IPv6 GW eth2 IPv4 addr / eth2 IPv4 GW eth2 IPv6 addr eth2 IPv6 GW Peer hostname dcnm1.cisco.com Peer eth0 IP 172.28.10.246 Peer eth1 IP 1.0.0.246 Peer eth2 IP Peer eth0 IPv6 Peer eth1 IPv6 eth0 VIP 172.28.10.248/24 eth1 VIP 1.0.0.248/8 eth2 VIP / eth0 VIPv6 / Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 152 Managing Utility Services After DCNM Deployment Modifying Network Properties on DCNM in Native HA Mode eth1 VIPv6 / VIP hostname dcnm6.cisco.com ====== Session configuration ====== Hostname dcnm4.cisco.com NTP Server 1.ntp.esl.cisco.com DNS Server 171.70.168.183,1.0.0.247 eth0 IPv4 addr 172.28.10.238/255.255.255.0 eth0 IPv4 GW 172.28.10.1 eth0 IPv6 addr eth0 IPv6 GW eth1 IPv4 addr 1.0.0.238/255.0.0.0 eth1 IPv4 GW 1.0.0.1 eth1 IPv6 addr eth1 IPv6 GW eth2 IPv4 addr 2.0.0.238/255.0.0.0 eth2 IPv4 GW 2.0.0.1 eth2 IPv6 addr eth2 IPv6 GW Peer hostname dcnm3.cisco.com Peer eth0 IP 172.29.10.244 Peer eth1 IP 1.0.0.244 Peer eth2 IP 2.0.0.244 Peer eth0 IPv6 Peer eth1 IPv6 eth0 VIP 172.28.10.239/24 eth1 VIP 1.0.0.239/8 eth2 VIP 2.0.0.239/8 eth0 VIPv6 / eth1 VIPv6 / VIP hostname dcnm5.cisco.com [root@dcnm2 ~]# [root@dcnm1 ~]# appmgr update network-properties session apply ********************************************************************* WARNING Applications of both nodes of the DCNM HA system need to be stopped for the changes to be applied properly. PLEASE STOP ALL APPLICATIONS MANUALLY ********************************************************************* Have applications been stopped? [y/n]: y Applying changes DELETE 1 Node left the swarm. Server configuration file loaded: /usr/local/cisco/dcm/fm//conf/server.properties log4j:WARN No appenders could be found for logger (fms.db). log4j:WARN Please initialize the log4j system properly. log4j:WARN See http://logging.apache.org/log4j/1.2/faq.html#noconfig for more info. UPDATE 1 UPDATE 1 DELETE 1 server signaled INFO : [ipv6_wait_tentative] Waiting for interface eth0 IPv6 address(es) to leave the 'tentative' state INFO : [ipv6_wait_tentative] Waiting for interface eth0 IPv6 address(es) to leave the 'tentative' state ********************************************************************** Please run 'appmgr start afw; appmgr start all' to restart your nodes. ********************************************************************** ********************************************************************* Please run 'appmgr update ssh-peer-trust' on the peer node. ********************************************************************* [root@dcnm1 ~]# Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 153 Managing Utility Services After DCNM Deployment Modifying Network Properties on DCNM in Native HA Mode [root@dcnm2 ~]# appmgr update network-properties session apply ********************************************************************* WARNING Applications of both nodes of the DCNM HA system need to be stopped for the changes to be applied properly. PLEASE STOP ALL APPLICATIONS MANUALLY ********************************************************************* Have applications been stopped? [y/n]: y Applying changes DELETE 1 Node left the swarm. Server configuration file loaded: /usr/local/cisco/dcm/fm//conf/server.properties log4j:WARN No appenders could be found for logger (fms.db). log4j:WARN Please initialize the log4j system properly. log4j:WARN See http://logging.apache.org/log4j/1.2/faq.html#noconfig for more info. UPDATE 1 UPDATE 1 DELETE 1 afwnetplugin:0.1 server signaled ********************************************************************** Please run 'appmgr start afw; appmgr start all' to restart your nodes. ********************************************************************** ********************************************************************* Please run 'appmgr update ssh-peer-trust' on the peer node. ********************************************************************* [root@dcnm2 ~]# Step 7 [root@dcnm1 ~]# appmgr start afw; appmgr start all Started AFW Server Processes Started AFW Agent Processes Started AFW Server Processes Started AFW Agent Processes Started applications managed by heartbeat.. Check the status using 'appmgr status all' Starting High-Availability services: INFO: Resource is stopped Done. Warning: PID file not written; -detached was passed. AMQP User Check Started AFW Server Processes Started AFW Agent Processes [root@dcnm1 ~]# Waiting for dcnm1 to become active again. [root@dcnm2 ~]# appmgr start afw; appmgr start all Started AFW Server Processes Started AFW Agent Processes Started AFW Server Processes Started AFW Agent Processes Started applications managed by heartbeat.. Check the status using 'appmgr status all' Starting High-Availability services: INFO: Resource is stopped Done. Warning: PID file not written; -detached was passed. AMQP User Check Started AFW Server Processes Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 154 Managing Utility Services After DCNM Deployment Changing the DCNM Server Password Post DCNM Installation Started AFW Agent Processes [root@dcnm2 ~]# [root@dcnm1 ~]# appmgr update ssh-peer-trust /usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub" Number of key(s) added: 1 Now try logging into the machine, with: "ssh -o 'StrictHostKeyChecking=no' '172.28.10.245'" and check to make sure that only the key(s) you wanted were added. /usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub" Number of key(s) added: 1 Now try logging into the machine, with: "ssh -o 'StrictHostKeyChecking=no' '100.0.0.245'" and check to make sure that only the key(s) you wanted were added. /usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub" Number of key(s) added: 1 Now try logging into the machine, with: "ssh -o 'StrictHostKeyChecking=no' 'dcnm2.cisco.com'" and check to make sure that only the key(s) you wanted were added. [root@dcnm1 ~]# [root@dcnm2 ~]# appmgr update ssh-peer-trust /usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub" Number of key(s) added: 1 Now try logging into the machine, with: "ssh -o 'StrictHostKeyChecking=no' '172.28.10.244'" and check to make sure that only the key(s) you wanted were added. /usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub" Number of key(s) added: 1 Now try logging into the machine, with: "ssh -o 'StrictHostKeyChecking=no' '100.0.0.244'" and check to make sure that only the key(s) you wanted were added. /usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub" Number of key(s) added: 1 Now try logging into the machine, with: "ssh -o 'StrictHostKeyChecking=no' 'dcnm1.cisco.com'" and check to make sure that only the key(s) you wanted were added. [root@dcnm2 ~]# Changing the DCNM Server Password Post DCNM Installation The password to access Cisco DCNM Web UI is configured while installing the Cisco DCNM for your deployment type. However, you can modify this password post installation also, if required. To change the password post installation, perform the following steps: Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 155 Managing Utility Services After DCNM Deployment Changing the DCNM Database Password on Standalone Setup Procedure Step 1 Stop the applications using the appmgr stop all command. Wait until all the applications stop running. Step 2 Change the password for the management interface by using the appmgr change_pwd ssh {root|poap|sysadmin}[password command. Ensure that the new password adheres to the following password requirements. If you do not comply with the requirements, the DCNM application might not function properly: • It must be at least 8 characters long and contain at least one alphabet and one numeral. • It can contain a combination of alphabets, numerals, and special characters. • Do not use any of these special characters in the DCNM password: <SPACE> " & $ % ' ^ = < > ; : ` \ | / , .* Step 3 Start the application using the appmgr start all command. Changing the DCNM Database Password on Standalone Setup To change the Postgres database password on Cisco DCNM Standalone setup, perform the following steps: Procedure Step 1 Stop all the applications using the appmgr stop all command. Ensure that all the applications have stopped using the appmgr status all command. Step 2 Change the Postgres password by using the appmgr change_pwd db command. Provide the new password at the prompt. Step 3 Start the application using the appmgr start all command. Ensure that all the applications have started using the appmgr status all command. Example dcnm# appmgr stop all dcnm# appmgr change_pwd db <<new-password>> dcnm# appmgr start all Changing the DCNM Database Password on Native HA Setup To change the Postgres database password on Cisco DCNM Native HA setup, perform the following steps: Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 156 Managing Utility Services After DCNM Deployment Convert Standalone Setup to Native-HA Setup Procedure Step 1 Stop all the applications on the Standby appliance using the appmgr stop all command. Ensure that all the applications have stopped using the appmgr status all command. Step 2 Stop all the applications on the Active appliance using the appmgr stop all command. Ensure that all the applications have stopped using the appmgr status all command. Step 3 Change the Postgres password by using the appmgr change_pwd db command on both Active and Standby nodes. Ensure that you provide the same password at the prompt. Step 4 Start the applications on the Active appliance, using the appmgr start all command. Ensure that all the applications have stopped using the appmgr status all command. Step 5 Start the applications on the Standby appliance, using the appmgr start all command. Ensure that all the applications have stopped using the appmgr status all command. Example Let us consider Active and standby as dcnm1 and dcnm2, respectively. dcnm1# appmgr stop all dcnm2# appmgr stop all dcnm1# appmgr change_pwd db <<new-password>> dcnm2# appmgr change_pwd db <<new-password>> dcnm1# appmgr start all dcnm2# appmgr start all Convert Standalone Setup to Native-HA Setup To convert an existing Cisco DCNM Standalone setup to a Native HA setup, perform the following steps: Before you begin Ensure that the Standalone setup is active and operational, by using the appmgr show version command. dcnm# appmgr show version Cisco Data Center Network Manager Version: 11.4(1) Install mode: LAN Fabric Standalone node. HA not enabled. dcnm# Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 157 Managing Utility Services After DCNM Deployment Convert Standalone Setup to Native-HA Setup Procedure Step 1 On the Standalone setup, launch SSH and enable root user access by using the appmgr root-access permit command: dcnm# appmgr root-access permit Step 2 Deploy a new DCNM as secondary node. Choose Fresh installation - HA Secondary For example, let us indicate the existing setup as dcnm1 and the new DCNM as secondary node as dcnm2. If the system configuration does not meet minimum resource requirements, SYSTEM RESOURCE ERROR is displayed on the Web Installer, and the installation will be aborted. Modify the system requirements, and launch the Web Installer to complete the installation. Caution Step 3 Configure dcnm2 as the Secondary node. Paste the URL displayed on the Console tab of dcnm2 and hit Enter. A welcome message appears. a) On the Welcome to Cisco DCNM screen, click Get Started. Caution If the system configuration does not meet minimum resource requirements, SYSTEM RESOURCE ERROR is displayed on the Web Installer, and the installation will be aborted. Modify the system requirements, and launch the Web Installer to complete the installation. b) On the Cisco DCNM Installer screen, select Fresh Installation - HA Secondary radio button, to install dcnm2 as Secondary node. Click Continue. c) On the Install Mode tab, from the drop-down list, choose the same installation mode that you selected for the Primary node. The HA installation fails if you do not choose the same installation mode as Primary node. Note Check the Enable Clustered Mode check box, if you have configured the Cisco DCNM Primary in Clustered mode. Click Next. d) On the Administration tab, enter information about passwords. All the passwords must be same as the passwords that you provided while configuring the Primary node. Note e) On the System Settings, configure the settings for the DCNM Appliance. • In the Fully Qualified Hostname field, enter the hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Hostnames with only digits is not supported. • In the DNS Server Address List field, enter the DNS IP address. Beginning with Release 11.2(1), you can also configure the DNS server using an IPv6 address. From Release 11.3(1), you can configure more than one DNS server. Note If you’re using Network Insights applications, ensure that the DNS server is valid and reachable. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 158 Managing Utility Services After DCNM Deployment Convert Standalone Setup to Native-HA Setup • In the NTP Server Address List field, enter the IP address of the NTP server. The value must be an IP or IPv6 address or RFC 1123 compliant name. From Release 11.3(1), you can configure more than one NTP server. • From the Timezone drop-down list, select the timezone in which you are deploying the DCNM. Click Next. f) On the Network Settings tab, configure the network parameters used to reach the DCNM Web UI. Figure 22: Cisco DCNM Management Network Interfaces 1. In the Management Network area, verify if the auto-populated addresses for Management IPv4 Address and Management Network Default IPv4 Gateway are correct. Modify, if necessary. Note Ensure that the IP address belongs to the same Management Network configured on the Primary node. (Optionally) Enter a valid IPv6 address along with the prefix to configure the Management IPv6 Address and the Management Network Default IPv6 Gateway. 2. In the Out-of-Band Network area, enter the IPv4 address and Gateway IPv4 Address. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Note Ensure that the IP addresses belong to the same Out-of-Band network configured on the Primary node. Out-of-band management provides a connection to the device management ports (Typically mgmt0). Note If the out-of-band network is not configured, you cannot configure Cisco DCNM in Cluster mode. 3. In the In-Band Network area, enter the IPv4 address and Gateway IPv4 Address for the in-band network. If DCNM is on the IPv6 network, configure the network by entering relevant IPv6 Address for IPv6 address and Gateway IPv6 Address. Note Ensure that the IP addresses belong to the same In-Band network configured on the Primary node. The In-Band Network provides reachability to the devices via the front-panel ports. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 159 Managing Utility Services After DCNM Deployment Convert Standalone Setup to Native-HA Setup If you do not configure in-band network, Endpoint Locator and Telemetry features are not operational. Note Click Next. g) On the Applications tab, configure the Internal Applications Services Network, and Cluster mode settings. 1. In the Internal Application Services Network area, in the IPv4 Subnet field, enter the IP subnet to access the applications that run internally to DCNM. 2. In the Clustered mode configuration area, configure the network settings to deploy the DCNM instance in Clustered mode. In Clustered mode, applications run on separate compute nodes. • In the Out-of-Band IPv4 Network Address Pool, enter the address pool from the Out-of-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the Out-of-Band IPv6 Network Address Pool field. • In the In-Band IPv4 Network Address Pool, enter the address pool from the In-Band IPv4 network to be used in the Clustered Mode. Optionally, you can also enter an IPv6 address pool in the In-Band IPv6 Network Address Pool field. Ensure that the IP addresses belong to the same pool as configured on the Primary node. h) On the HA Settings tab, configure the system settings for the Secondary node. • In the Management IPv4 Address of Primary DCNM node field, enter the appropriate IP Address to access the DCNM UI. • In the VIP Fully qualified Host Name field, enter hostname that is a fully qualified domain name (FQDN) as per RFC1123, section 2.1. Host names with only digits is not supported. • In the Management Network VIP address field, enter the IP address used as VIP in the management network. Optionally, you can also enter an IPv6 VIP address in the Management Network VIPv6 address field. Note If you have configured the Management network using IPv6 address, ensure that you configure the Management Network VIPv6 Address. • In the Out-of-Band Network VIP Address field, enter the IP address used as VIP in the Out-of-Band network. Optionally, you can also enter an IPv6 VIP address in the Out-of-Band Network VIPv6 Address field. • In the In-Band Network VIP Address field, enter the IP address used as VIP in the Out-of-Band network. Optionally, you can also enter an IPv6 VIP address in the In-Band Network VIPv6 Address field. Note This field is mandatory if you have provided an IP address for In-Band network in the Network Settings tab. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 160 Managing Utility Services After DCNM Deployment Utility Services Details • In the HA Ping Feature IPv4 Address field, enter the HA ping IP address and enable this feature, if necessary. The configured IPv4 address must respond to the ICMP echo pings. Note HA_PING_ADDRESS, must be different from the DCNM Active and Standby addresses. You must configure the HA ping IPv4 Address to avoid the Split Brain scenario. This IP address must belong to Enhanced Fabric management network. Click Next. i) On the Summary tab, review the configuration details. Click Previous to go to the previous tabs and modify the configuration. Click Start Installation to complete the Cisco DCNM OVA Installation for the chosen deployment mode. A progress bar appears to show the completed percentage, description of the operation, and the elapsed time during the installation. After the progress bar shows 100%, click Continue. A success message appears with the URL to access DCNM Web UI. *************************************************************** Your Cisco Data Center Network Manager software has been installed. DCNM Web UI is available at https://<<IP Address>> You will be redirected there in 60 seconds. Thank you *************************************************************** Note If the Cisco DCNM is running behind a firewall, ensure that you open the port 2443 to launch Cisco DCNM Web UI. What to do next Verify the HA role by using the appmgr show ha-role command. On the Active node (old standalone node): dcnm1# appmgr show ha-role Native HA enabled. Deployed role: Active Current role: Active On the Standby node (newly deployed node): dcnm2# appmgr show ha-role Native HA enabled. Deployed role: Standby Current role: Standby Utility Services Details This section describes the details of all the utility services within the functions they provide in Cisco DCNM. The functions are as follows: Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 161 Managing Utility Services After DCNM Deployment Network Management Network Management The data center network management function is provided by the Cisco Data Center Network Manager (DCNM) server. Cisco DCNM provides the setup, visualization, management, and monitoring of the data center infrastructure. Cisco DCNM can be accessed from your browser: http://<<hostname/IP address>>. Note For more information about Cisco DCNM, see http://cisco.com/go/dcnm. Orchestration RabbitMQ Rabbit MQ is the message broker that provides the Advanced Messaging Queuing Protocol (AMQP). The RabbitMQ message broker sends events from the vCloud Director/vShield Manager to the Python script for parsing. You can configure this protocol by using certain CLI commands from the Secure Shell (SSH) console of the firmware. Note You need to stop and restart AMQP on both DCNM's server in HA within 30 seconds, otherwise AMQP may not start. For more information about RabbitMQ, go to https://www.rabbitmq.com/documentation.html. After upgrade, enable RabbitMQ management service stop the service and start the services using the following commands: dcnm# appmgr stop amqp dcnm# appmgr start amqp If AMQP is not running. the memory space must be exhausted that is indicated in the file /var/log/rabbitmq/erl_crash.dump. Device Power On Auto Provisioning Power On Auto Provisioning (POAP) occurs when a switch boots without any startup configuration. It is accomplished by two components that were installed: • DHCP Server The DHCP server parcels out IP addresses to switches in the fabric and points to the location of the POAP database, which provides the Python script and associates the devices with images and configurations. During the Cisco DCNM installation, you define the IP Address for the inside fabric management address or OOB management network and the subnets associated with the Cisco Programmable Fabric management. • Repositories The TFTP server hosts boot scripts that are used for POAP. The SCP server downloads the database files, configuration files, and the software images. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 162 Managing Utility Services After DCNM Deployment Managing Applications and Utility Services Managing Applications and Utility Services You can manage the applications and utility services for Cisco Programmable Fabric in the Cisco DCNM through commands in an SSH terminal. Enter the appmgr command from the SSH terminal by using the following credentials: • Username: root • Password: Administrative password provided during deployment Note For your reference, context sensitive help is available for the appmgr command. Use the appmgr command to display help. Use the appmgr tech_support command to produce a dump of the log files. You can then provide this information to the TAC team for troubleshooting and analysis of your setup. Note This section does not describe commands for Network Services using Cisco Prime Network Services Controller. This section includes the following: Verifying the Application and Utility Services Status after Deployment After you deploy the OVA/ISO file, you can determine the status of various applications and utility services that were deployed in the file. You can use the appmgr status command in an SSH session to perform this procedure. Note Context-sensitive help is available for the appmgr status command. Use the appmgr status ? command to display help. Procedure Step 1 Open up an SSH session: a) Enter the ssh root DCNM network IP address command. b) Enter the administrative password to login. Step 2 Check the status by using the following command: appmgr status all Example: DCNM Status PID USER === ===== PR === NI VIRT RES == ==== === SHR === S = %CPU %MEM TIME+ ==== ===== ====== COMMAND ======= Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 163 Managing Utility Services After DCNM Deployment Stopping, Starting, and Resetting Utility Services 1891 root 20 02635m 815m LDAP Status PID USER === ===== 1470 ldap PR === 20 AMQP Status PID USER === ===== 1504 root PR === 20 TFTP Status PID USER === ===== 1493 root PR === 20 15m S 0.0 21.3 NI VIRT RES SHR S == ==== === === = 0 692m 12m 4508 S NI VIRT RES == ==== === 0 52068 772 1:32.09 java %CPU %MEM TIME+ COMMAND ==== ===== ====== ======= 0.0 0.3 0:00.02 slapd SHR S %CPU %MEM TIME+ COMMAND === = ==== ===== ====== ======= 268 S 0.0 0.0 0:00.00 rabbitmq NI VIRT RES SHR S == ==== === === = 0 22088 1012 780 S %CPU %MEM TIME+ COMMAND ==== ===== ====== ======= 0.0 0.0 0:00.00 xinetd DHCP Status PID USER PR NI VIRT RES SHR S === ===== === == ==== === === = 1668 dhcpd 20 0 46356 3724 408 S 0.0 %CPU %MEM TIME+ COMMAND ==== ===== ====== ======= 0.0 0:05.23 dhcp Stopping, Starting, and Resetting Utility Services Use the following CLI commands for stopping, starting, and resetting utility services: • To stop an application, use the appmgr stop command. dcnm# appmgr stop dhcp Shutting down dhcpd: [ OK ] • To start an application, use the appmgr start command. dcnm# appmgr start amqp Starting vsftpd for amqp: [ OK ] • To restart an application use the appmgr restart command. # appmgr restart tftp Restarting TFTP... Stopping xinetd: [ Starting xinetd: [ Note OK OK ] ] From Cisco DCNM Release 7.1.x, when you stop an application by using the appmgr stop app_name command, the application will not start during successive reboots. For example, if DHCP is stopped by using the appmgr stop dhcp command, and the OS is rebooted, the DHCP application will still be down after the OS is up and running. To start again, use the command appmgr start dhcp. The DHCP application will be started after reboots also. This is to ensure that when an environment uses an application that is not packaged as part of the virtual appliance (like CPNR instead of DHCP), the application locally packaged with the virtual appliance will not interfere with its function after any OS reboots. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 164 Managing Utility Services After DCNM Deployment Updating the SFTP Server Address for IPv6 Note When a DCNM appliance (ISO/OVA) is deployed, the Cisco SMIS component will not get started by default. However, this component can be managed using the appmgr CLI: appmgr start/stop dcnm-smis appmgr start/stop dcnm will start or stop only the DCNM web component. Updating the SFTP Server Address for IPv6 After deploying the DCNM OVA/ISO successfully with EFM IPv4 and IPv6, by default the SFTP address is pointed to IPv4 only. You need to change the IPv6 address manually in the following two places: • In the DCNM Web Client, choose Administration > Server Properties and then update the below fields to IPv6 and click the Apply Changes button. #_____________________________________________________________________ # GENERAL>xFTP CREDENTIAL # # xFTP server's ip address for copying switch files: server.FileServerAddress • Log in to the DCNM through ssh and update the SFTP address with IPv6 manually in the server.properties file (/usr/local/cisco/dcm/fm/conf/server.properties). # xFTP server's ip address for copying switch files: server.FileServerAddress=2001:420:5446:2006::224:19 Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 165 Managing Utility Services After DCNM Deployment Updating the SFTP Server Address for IPv6 Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 166 CHAPTER 14 Tetration Agent With DCNM Validation A tetration software agent is a small software application running on a host system. Its core functionality is to monitor and collect network flow information. It also collects other host information such as network interfaces and active processes running on the system. The information collected by the agent is exported to a set of collectors running within the Tetration cluster for further analytical processing. • Tetration Agent With DCNM Validation, on page 167 Tetration Agent With DCNM Validation Using the installer script is the recommended method for deploying deep visibility enforcement agents on Linux platforms. Before you begin If the installed agent is to be connected to a Tetration cluster, the ACTIVATION_KEY and HTTPS_PROXY parameters will be required. If the installer script is used, it will automatically populate the ACTIVATION_KEY, while you need to insert the HTTPS_PROXY information directly into the script. If manual deployment is used, manually insert both ACTIVATION_KEY and HTTPS_PROXY parameters yourself. For more information, see User Configuration for Tetration SaaS. Procedure Step 1 Log into the Cisco TetrationOS Software Web UI with your credentials. Step 2 Choose Agent Config from the Settings menu to display the Agent Config window. Step 3 Navigate to the Software Agent Download tab. Step 4 Choose Linux in the Select Platform section. Step 5 Choose Deep Visibility or Enforcement in the Select Agent Type section. Step 6 Click the Download Installer button and save the file to a local disk. Step 7 Log into your DCNM with the root privileges. Copy the installer shell script and execute the script. Note The installer script will not proceed if the agent was already installed. The installer script command syntax is as follows: Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 167 Tetration Agent With DCNM Validation Tetration Agent With DCNM Validation $ tetration_linux_installer.sh [-skip-pre-check] [-noInstall] [-logFile=filename] [-proxy=proxy_string>] [-skip-ipv6-check] [-help] [-version] [-sensor-version=version_info] [-ls] [-file=filename] [-save=filename] [-new] Step 8 -skip-pre-check Skips pre-installation checks. -noInstall The sensor package is not downloaded and installed on the system. -logFile filename Writes the log to the file specified by filename . -proxy proxy_string Sets the value of HTTPS_PROXY. Use this if a proxy server is needed to communicate with the cluster. The string should be formatted as http://proxy:port -skip-ipv6-check Skips IPv6 verification. -help Prints this help information. -version Prints the current script’s version. -sensorVersion version_info Downloads a particular sensor version; default is the latest version. An example of the version_info entry is –sensor-version=3.1.1.53.devel -ls Lists all available sensor versions for your system (does not list pre-3.1 packages). This is a listing only; does not download any package. -file filename Let’s you specify a local zip file to use to install the sensor instead of downloading from the cluster. -save filename Downloads the installer zip file from the Tetration cluster, saving it locally with filename as its name. -new Uninstalls/removes all copies of the Tetration agent if it was already installed on this local machine. Run the following command to verify if the agent is installed. sudo rpm -q tet-sensor An entry appears as follows: $ sudo rpm -q tet-sensor tet-sensor-3.1.1.50-1.el6.x86_64 Note There are five nodes in a DCNM native HA cluster deployment, namely, DCNM Primary, DCNM Secondary, and three Compute Nodes. Install the tetration agent on each of these nodes for full visibility of the DCNM cluster. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 168 Tetration Agent With DCNM Validation Tetration Agent With DCNM Validation Figure 23: Tetration Agent with DCNM Clusters Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 169 Tetration Agent With DCNM Validation Tetration Agent With DCNM Validation Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 170 CHAPTER 15 Installing Software Maintenance Update • Installing Software Maintenance Update on Cisco DCNM 11.4(1) to use Network Insights for Resources Application, on page 171 Installing SoftwareMaintenance UpdateonCiscoDCNM11.4(1) to use Network Insights for Resources Application After installing Cisco DCNM, you can download and install various applications from the Cisco App Center. In Cisco DCNM 11.4(1) LAN Fabric installation, to use Network Insights for Resources (NIR) Release 2.2.2 or later, install the latest software maintenance update. For a Cisco DCNM Native HA clustered deployment, apply the update on the Active and Standby nodes only. You need not update the Compute nodes. To download, add, start, stop, and delete applications from the Cisco DCNM Web UI, choose Applications > Catalog > Browse App Center. Refer to Installing and Deploying Applications for instructions. Note Cisco DCNM allows you to upload the NIR 2.2.2 application without the maintenance update. However, you cannot start the application. An error appears asking you to install the maintenance update (patch) before using the NIR 2.2.2 application. Note Only a root user must install the maintenance update (patch) on the Cisco DCNM 11.4(1). To apply the maintenance update to use NIR 2.2.2 application with Cisco DCNM LAN Fabric installation in Native HA mode, perform the following steps: Before you begin • Ensure that both the Cisco DCNM 11.4.1(1) Active and Standby peers are up and running. • Check and ensure that the Active and Standby servers are operational, using the appmgr show ha-role command. Example: On the Active node: Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 171 Installing Software Maintenance Update Installing Software Maintenance Update on Cisco DCNM 11.4(1) to use Network Insights for Resources Application dcnm1# appmgr show ha-role Native HA enabled. Deployed role: Active Current role: Active On the Standby node: dcnm2# appmgr show ha-role Native HA enabled. Deployed role: Standby Current role: Standby Procedure Step 1 Download the maintenance update (patch). a) Go to the following site: http://software.cisco.com/download/. A list of the latest release software for Cisco DCNM available for download is displayed. b) In the Latest Releases list, choose Release 11.4(1). c) Locate DCNM 11.4(1) LAN Fabric maintenance update for Network Insights for Resources (NIR 2.2.2+) and click Download icon. d) Save the dcnm-va.11.4.1-p1.iso.zip file to your directory that is easy to find when you start to apply the maintenance update (patch). Step 2 Unzip the dcnm-va.11.4.1-p1.iso.zip file and upload the file to the /root/ folder in both Active and Standby node of the DCNM setup. Note Step 3 For example, let us indicate Active and Standby appliances as dcnm1 and dcnm2 respectively. Log on to the Cisco DCNM appliance using SSH as a sysadmin user. Run the su command to enable root user. dcnm1# su Enter the root password: [root@dcnm1]# dcnm2# su Enter the root password: [root@dcnm2]# Step 4 Run the following command to create a screen session. [root@dcnm1]# screen [root@dcnm2]# screen This creates a session which allows you to execute the commands. The commands continue to run even when the window is not visible or if you get disconnected. Step 5 On the Active node, apply the patch. a) Create a folder named iso using the mkdir /mnt/iso command. [root@dcnm1]# mkdir -p /mnt/iso b) Mount the DCNM 11.4(1) patch file on the Active node in the /mnt/iso folder. [root@dcnm1]# mount dcnm-va.11.4.1-p1.iso /mnt/iso Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 172 Installing Software Maintenance Update Installing Software Maintenance Update on Cisco DCNM 11.4(1) to use Network Insights for Resources Application c) Navigate to /scripts/ directory. [root@dcnm1]# cd /mnt/iso/packaged-files/scripts/ d) Run the ./inline-upgrade.sh script. [root@dcnm1]# ./inline-upgrade.sh ============================================================ ============ Inline Upgrade to DCNM 11.4(1)-p1 ============= ============================================================ Upgrading from version: 11.4(1) Upgrading from install option: LAN Fabric System type: HA Compute only: No Do you want to continue and perform the inline upgrade to 11.4(1)-p1? [y/n]: y ==== Sat Jul 25 15:48:12 PDT 2020 - Task confirmRootPassword started ==== ==== Sat Jul 25 15:48:12 PDT 2020 - Task confirmRootPassword finished ==== ==== Sat Jul 25 15:48:12 PDT 2020 - Task checkAfwStatus started ==== ==== Sat Jul 25 15:48:12 PDT 2020 - Task checkAfwStatus finished ==== ==== Sat Jul 25 15:48:12 PDT 2020 - Task backupLocalDB started ==== ==== Sat Jul 25 15:48:12 PDT 2020 - Taking DB backup ==== Collecting DB dump... ==== Sat Jul 25 15:48:14 PDT 2020 - Task backupLocalDB finished ==== ==== Sat Jul 25 15:48:14 PDT 2020 - Task updateCompliance started ==== Uploading image Deploying new image {"ResponseType":0,"Response":""} {"ResponseType":0,"Response":""} {"ResponseType":0,"Response":""} {"ResponseType":0,"Response":""} {"ResponseType":0,"Response":""} {"ResponseType":0,"Response":""} Deleting old image ==== Sat Jul 25 15:52:06 PDT 2020 - Task updateCompliance finished ==== ==== Sat Jul 25 15:52:06 PDT 2020 - Task updatePackagedFiles started ==== ==== Sat Jul 25 15:52:06 PDT 2020 - Updating packaged-files ==== ==== Sat Jul 25 15:52:06 PDT 2020 - Task updatePackagedFiles finished ==== ==== Sat Jul 25 15:52:06 PDT 2020 - Task updatePatchList started ==== ==== Sat Jul 25 15:52:06 PDT 2020 - Task updatePatchList finished ==== ==== Sat Jul 25 15:52:06 PDT 2020 - Task updateTelemetryInfra started ==== Preparing... ######################################## Updating / installing... telemetry-infra-1.0-2 ######################################## Cleaning up / removing... telemetry-infra-1.0-1 ######################################## Created symlink from /etc/systemd/system/telemetry-infra.service to /usr/lib/ systemd/system/telemetry-infra.service. Created symlink from /etc/systemd/system/multi-user.target.wants/ telemetry-infra.service to /usr/lib/systemd/system/telemetry-infra.service. Restarting Telemetry Infra ... Stopped Telemetry Infra... Started Telemetry Infra... Check the status using 'appmgr status telemetry-infra' ==== Sat Jul 25 15:52:08 PDT 2020 - Task updateTelemetryInfra finished ==== ==== Sat Jul 25 15:52:08 PDT 2020 - Task restartFMServer started ==== ==== Sat Jul 25 15:53:14 PDT 2020 - Task restartFMServer finished ==== ==== Sat Jul 25 15:53:14 PDT 2020 - Task completeUpgrade started ==== *********************************************************************************** Inline upgrade of this Active DCNM node is complete. Please wait until this node is Active again before upgrading the Standby node. *********************************************************************************** Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 173 Installing Software Maintenance Update Installing Software Maintenance Update on Cisco DCNM 11.4(1) to use Network Insights for Resources Application ==== Sat Jul 25 15:53:14 PDT 2020 - Task completeUpgrade finished ==== Note After the patch is applied successfully, the DCNM process restarts. This results in a momentary loss of access to the DCNM Web UI. e) Ensure the DCNM application is functional, by using the appmgr status all command. [root@dcnm1]# appmgr status all Note Step 6 Ensure that all the services are up and running on the Cisco DCNM Active node before proceeding to apply patch on the Standby node. On the Standby node, apply the patch. a) Create a folder named iso using the mkdir /mnt/iso command. [root@dcnm2]# mkdir -p /mnt/iso b) Mount the DCNM 11.4(1) patch file on the Active node in the /mnt/iso folder. [root@dcnm2]# mount dcnm-va.11.4.1-p1.iso /mnt/iso c) Navigate to /scripts/ directory. [root@dcnm2]# cd /mnt/iso/packaged-files/scripts/ d) Run the ./inline-upgrade.sh script. [root@dcnm2]# ./inline-upgrade.sh --standby ============================================================ ============ Inline Upgrade to DCNM 11.4(1)-p1 ============= ============================================================ Upgrading from version: 11.4(1) Upgrading from install option: LAN Fabric System type: HA Compute only: No Do you want to continue and perform ==== Sat Jul 25 15:54:53 PDT 2020 ==== Sat Jul 25 15:54:53 PDT 2020 ==== Sat Jul 25 15:54:53 PDT 2020 ==== Sat Jul 25 15:54:53 PDT 2020 ==== Sat Jul 25 15:54:53 PDT 2020 ==== Sat Jul 25 15:54:53 PDT 2020 Collecting DB dump... ==== Sat Jul 25 15:54:54 PDT 2020 ==== Sat Jul 25 15:54:54 PDT 2020 ==== Sat Jul 25 15:54:54 PDT 2020 ==== Sat Jul 25 15:54:54 PDT 2020 ==== Sat Jul 25 15:54:54 PDT 2020 ==== Sat Jul 25 15:54:54 PDT 2020 ==== Sat Jul 25 15:54:54 PDT 2020 ==== Sat Jul 25 15:54:54 PDT 2020 ==== Sat Jul 25 15:54:54 PDT 2020 Preparing... Updating / installing... telemetry-infra-1.0-2 Cleaning up / removing... telemetry-infra-1.0-1 ==== Sat Jul 25 15:54:55 PDT 2020 ==== Sat Jul 25 15:54:55 PDT 2020 - the inline upgrade to 11.4(1)-p1? [y/n]: y Task confirmRootPassword started ==== Task confirmRootPassword finished ==== Task checkAfwStatus started ==== Task checkAfwStatus finished ==== Task backupLocalDB started ==== Taking DB backup ==== Task backupLocalDB finished ==== Task updateCompliance started ==== Task updateCompliance finished ==== Task updatePackagedFiles started ==== Updating packaged-files ==== Task updatePackagedFiles finished ==== Task updatePatchList started ==== Task updatePatchList finished ==== Task updateTelemetryInfra started ==== ######################################## ######################################## ######################################## Task updateTelemetryInfra finished ==== Task restartFMServer started ==== Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 174 Installing Software Maintenance Update Installing Software Maintenance Update on Cisco DCNM 11.4(1) to use Network Insights for Resources Application ==== Sat Jul 25 15:54:55 PDT 2020 - Task restartFMServer finished ==== ==== Sat Jul 25 15:54:55 PDT 2020 - Task completeUpgrade started ==== *********************************************************************************** Inline upgrade of the HA DCNM system is complete. *********************************************************************************** ==== Sat Jul 25 15:54:55 PDT 2020 - Task completeUpgrade finished ==== [root@dcnm2]# appmgr show ha-role Native HA enabled. Deployed role: Standby e) Ensure the DCNM application is functional, by using the appmgr status all command. [root@dcnm1]# appmgr status all Step 7 Terminate the screen session, by using the exit command. [root@dcnm1]# exit [root@dcnm2]# exit Step 8 Unmount the dcnm-va.11.4.1-p1.iso file in both Active and Standby node of the DCNM setup, by using the umount /mnt/iso command. Note You must terminate the screen session before unmounting the patch file. [root@dcnm1]# umount /mnt/iso [root@dcnm2]# umount /mnt/iso What to do next Log on to the DCNM Web UI with appropriate credentials. Choose Applications > Catalog. Verify the version of the Compliance application. It must show the version as 4.0.1 after successfully installing the maintenance update on Cisco DCNM 11.4(1). Note If you try to install the maintenance update again, a note appears stating that the patch is already applied on the Cisco DCNM. You can now start the NIR 2.2.2 application on the Cisco DCNM Web UI. Refer to Installing and Deploying Applications for instructions. To use the DCNM tracker feature after installing the maintenance update, install and start the tracker on all the NX-OS switches. Launch the Cisco DCNM Web UI, and choose Control > Fabric Builder. For more information, refer to DCNM Tracker. Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 175 Installing Software Maintenance Update Installing Software Maintenance Update on Cisco DCNM 11.4(1) to use Network Insights for Resources Application Cisco DCNM Installation and Upgrade Guide for LAN Fabric Deployment, Release 11.4(1) 176
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
Download PDF
advertisement