Cisco Virtualized Infrastructure Manager Installation Guide, 2.4.9

Total Page:16

File Type:pdf, Size:1020Kb

Cisco Virtualized Infrastructure Manager Installation Guide, 2.4.9 Cisco Virtualized Infrastructure Manager Installation Guide, 2.4.9 First Published: 2019-01-09 Last Modified: 2019-05-20 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version. Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2019 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Overview to Cisco Network Function Virtualization Infrastructure 1 Cisco Network Function Virtualization Infrastructure Overview 1 Cisco Virtualized Infrastructure Manager Overview 8 Cisco VIM Features 8 Cisco NFVI Networking Overview 15 UCS C-Series Network Topologies 22 Cisco VIM Management Node Networking 30 IPv6 Support on Management Network 33 UCS C-Series and B-Series -Topologies 33 Cisco NFVI High Availability 35 Cisco NFVI Storage Node Overview 37 Overview to Cisco Virtual Topology System 38 Overview to Cisco NFVIMON 40 Overview to CVIMMON 42 Comparative Analysis 43 Metrics Collection 45 Alerting Rules 47 CVIMMON Web User Interface 53 CVIM-TRAP 54 Overview to Cisco VIM Unified Management 55 Overview to NFVbench 57 Overview to ACI Plugin Integration 58 NCS-5500 as a ToR Option 59 Disk Management in VIM 60 OSD Maintenance 60 Power Management of Computes for C-Series 61 Cisco Virtualized Infrastructure Manager Installation Guide, 2.4.9 iii Contents Physical Cores and Memory Reserved for Cisco VIM Infrastructure 61 Cisco VIM Software Hub 62 Cisco VIM VXLAN EVPN Design 63 VPP Port Mirroring Support 66 CHAPTER 2 Overview to Cisco NFVI Installation 69 Cisco NFVI Installation Overview 69 CHAPTER 3 Preparing for Installation on Servers Without Internet Access 71 Preparing to Install Cisco NFVI on Management Nodes Without Internet Access 71 CHAPTER 4 Preparing for Cisco NFVI Installation 77 Installing the Cisco NFVI Hardware 77 Configuring ToR Switches for C-Series Pods 80 Configuring ToR Switches for UCS B-Series Pods 84 Preparing Cisco IMC and Cisco UCS Manager 87 Installing the Management Node 88 Installing Cisco VIM Software Hub 91 Installing Cisco VIM Software Hub Node 92 Setting up Cisco VIM Software Hub for Cisco VIM Artifact Distribution 93 Installing Cisco VIM Software Hub in Connected Mode 93 Installing Cisco VIM Software Hub in Air-Gapped Mode 94 Installing Pod from Cisco VIM Software Hub Server 97 Day 2 Operations on Cisco VIM Software Hub 97 Setting Up the UCS C-Series Pod 97 Utility Details 100 Setting Up the UCS B-Series Pod 102 Configuring the Out-of-Band Management Switch 104 Support of 3rd Party Compute (HP DL 360 Gen9) 104 CHAPTER 5 Installing Cisco VTS 107 Overview to Cisco VTS Installation in Cisco NFVI 107 Cisco VTS Usernames and Passwords in Cisco NFVI 109 Modes of TOR Configuration with VTS 110 Cisco Virtualized Infrastructure Manager Installation Guide, 2.4.9 iv Contents System Requirements for VTC VM 112 System Requirements for VTSR VM 113 Supported Virtual Machine Managers 113 Supported Platforms 113 Installing Cisco VTS in Cisco NFVI Environment 115 Installing VTC VM - Automatic Configuration Using ISO File 115 Installing VTC VM - Manual Configuration Using Virt-Manager 116 Installing VTC VM - Manual Configuration using VNC 118 Installing the VTSR VMs 119 Creating VTSR VM 119 Bringing up the KVM-based VTSR VM 119 Creating an ISO for IOS VTSR 120 Verifying Cisco VTS Installation in Cisco NFVI 122 Verifying VTSR VM Installation 122 Verifying VTC VM Installation 123 Troubleshooting VTF Registration 123 Configuring Cisco VTS and VTSR After Installation 124 Installing VTS in an HA Configuration 125 Completing VTSR HA Configuration 129 Uninstalling VTC HA 129 Sample Cisco VTS Configurations for Cisco NFVI 129 CHAPTER 6 Installing Cisco VIM 135 Cisco VIM Installation Overview 135 Installing Cisco VIM 136 Cisco VIM Client Details 138 Cisco VIM Configuration Overview 141 Configuring ToR Automatically 141 Setting Up Cisco VIM Data Configuration 142 Setting Up the ToR Configurations for B-series and C-series 142 Support for Custom Configuration 144 Setting Up Cisco VIM OpenStack Configurations 160 SolidFire Integration with Cisco VIM 168 Cisco VIM Configurations for VPP/VLAN Installation 169 Cisco Virtualized Infrastructure Manager Installation Guide, 2.4.9 v Contents Cisco VIM Configurations for Cisco VTS Installation 169 Enabling ACI in Cisco VIM 171 Setting of Memory Oversubscription Usage 174 Disabling Management Node Accessibility to Cloud API Network 175 Enabling NFVbench on Cisco VIM 175 Enabling NFVIMON on Cisco VIM 178 Enabling CVIMMON on Cisco VIM 180 Enabling or Disabling Autobackup of Management Node 182 Enabling Custom Policy for VNF Manager 182 Forwarding ELK logs to External Syslog Server 183 Support of NFS for ELK Snapshot 183 Support for TTY Logging 184 Configuring Additional VIM Administrators 184 Configuring Support for Read-only OpenStack Role 184 VPP Port Mirroring Support 185 Setting up VXLAN/EVPN in Cisco VIM 187 Updating Cisco NFVI Software 189 Upgrading Cisco NFVI Software 190 CHAPTER 7 Installing Cisco VIM Unified Management 193 Installing Cisco VIM Unified Management with Internet Access 194 Installing Cisco VIM Unified Management with Cisco VIM Software Hub 198 Installing Cisco VIM Unified Management with LDAP 199 Installing Cisco VIM Unified Management Without SMTP 200 Installing Cisco VIM Unified Management without Internet Access 201 Cisco VIM Insight Post Bootstrap Validation Checks 204 VIM UM Admin Login for Standalone Setup 208 VIM UM Pod Admin Login for Standalone Setup 208 CHAPTER 8 Installing Cisco VIM through Cisco VIM Unified Management 209 Unified Management Dashboard 209 Pods 210 Pod Users 211 Revoking User 211 Cisco Virtualized Infrastructure Manager Installation Guide, 2.4.9 vi Contents Deleting Users 211 Pod Administrator 212 Adding Pod Admin 212 Revoking Pod Admin 212 Unified Management (UM) Administrator 213 Adding UM Admin 213 Revoking UM Admin 213 Registering New Pod to Insight 214 Configuring OpenStack Installation 215 Post Installation Features for Active Blueprint 306 Monitoring the Pod 306 Cross Launching Horizon 307 NFVI Monitoring 307 Run VMTP 307 Run CloudPulse 308 Run NFVbench 308 Fixed Rate Test 309 POD Management 309 System Update 310 Reconfiguring CIMC Password through Insight 310 Reconfiguring OpenStack Password 311 Reconfiguring OpenStack Services, TLS certs and ELK configurations 311 Reconfiguring Optional Services 312 Pod User Administration 313 Managing Users 313 Managing Roles 314 Managing Root CA Certificate 314 CHAPTER 9 Verifying the Cisco NFVI Installation 317 Displaying Cisco NFVI Node IP Addresses 317 Verifying Cisco VIM Client CLI Availability 318 Displaying Cisco NFVI Logs 319 Accessing OpenStack API Endpoints 319 Assessing Cisco NFVI Health with CloudPulse 320 Cisco Virtualized Infrastructure Manager Installation Guide, 2.4.9 vii Contents Displaying HA Proxy Dashboard and ELK Stack Logs 322 Checking Cisco NFVI
Recommended publications
  • Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(X)
    Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x) First Published: 2019-07-20 Last Modified: 2021-09-22 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS REFERENCED IN THIS DOCUMENTATION ARE SUBJECT TO CHANGE WITHOUT NOTICE. EXCEPT AS MAY OTHERWISE BE AGREED BY CISCO IN WRITING, ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS DOCUMENTATION ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. The Cisco End User License Agreement and any supplemental license terms govern your use of any Cisco software, including this product documentation, and are located at: http://www.cisco.com/go/softwareterms.Cisco product warranty information is available at http://www.cisco.com/go/warranty. US Federal Communications Commission Notices are found here http://www.cisco.com/c/en/us/products/us-fcc-notice.html. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any products and features described herein as in development or available at a future date remain in varying stages of development and will be offered on a when-and if-available basis. Any such product or feature roadmaps are subject to change at the sole discretion of Cisco and Cisco will have no liability for delay in the delivery or failure to deliver any products or feature roadmap items that may be set forth in this document.
    [Show full text]
  • Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(X)
    Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(x) First Published: 2019-07-20 Last Modified: 2020-11-10 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 © 2019–2020 Cisco Systems, Inc. All rights reserved. CONTENTS PREFACE Preface xix Audience xix Document Conventions xix Related Documentation for Cisco Nexus 3000 Series Switches xx Documentation Feedback xx Communications, Services, and Additional Information xx CHAPTER 1 New and Changed Information 1 New and Changed Information 1 CHAPTER 2 Overview 3 Licensing Requirements 3 System Management Features 3 CHAPTER 3 Configuring Switch Profiles 7 Information About Switch Profiles 7 Switch Profile Configuration Modes 8 Configuration Validation 8 Software Upgrades and Downgrades with Switch Profiles 9 Prerequisites for Switch Profiles 10 Guidelines and Limitations for Switch Profiles 10 Configuring Switch Profiles 11 Adding a Switch to a Switch Profile 13 Adding or Modifying Switch Profile Commands 14 Importing a Switch Profile 17 Verifying Commands in a Switch Profile 19 Cisco Nexus 3000 Series NX-OS System Management Configuration Guide, Release 9.3(x) iii Contents Isolating a Peer Switch 19 Deleting a Switch Profile 20 Deleting a Switch from a Switch Profile 20 Displaying the Switch Profile Buffer 21 Synchronizing Configurations After a Switch Reboot 22 Switch Profile Configuration show Commands 23 Supported Switch Profile Commands 23
    [Show full text]
  • Systemd – Easy As 1, 2, 3
    Systemd – Easy as 1, 2, 3 Ben Breard, RHCA Solutions Architect, Red Hat [email protected] Agenda ● Systemd functionality ● Coming to terms ● Learning the basics ● More advanced topics ● Learning the journal ● Available resources 2 Systemd is more than a SysVinit replacement 3 Systemd is a system and service manager 4 Systemd Overview ● Controls “units” rather than just daemons ● Handles dependency between units. ● Tracks processes with service information ● Services are owned by a cgroup. ● Simple to configure “SLAs” based on CPU, Memory, and IO. ● Properly kill daemons ● Minimal boot times ● Debuggability – no early boot messages are lost ● Easy to learn and backwards compatible. 5 Closer look at Units 6 Systemd - Units ● Naming convention is: name.type ● httpd.service, sshd.socket, or dev-hugepages.mount ● Service – Describe a daemon's type, execution, environment, and how it's monitored. ● Socket – Endpoint for interprocess communication. File, network, or Unix sockets. ● Target – Logical grouping of units. Replacement for runlevels. ● Device – Automatically created by the kernel. Can be provided to services as dependents. ● Mounts, automounts, swap – Monitor the mounting/unmounting of file systems. 7 Systemd – Units Continued ● Snapshots – save the state of units – useful for testing ● Timers – Timer-based activation ● Paths – Uses inotify to monitor a path ● Slices – For resource management. ● system.slice – services started by systemd ● user.slice – user processes ● machine.slice – VMs or containers registered with systemd 8 Systemd – Dependency Resolution ● Example: ● Wait for block device ● Check file system for device ● Mount file system ● nfs-lock.service: ● Requires=rpcbind.service network.target ● After=network.target named.service rpcbind.service ● Before=remote-fs-pre.target 9 That's all great .......but 10 Replace Init scripts!? Are you crazy?! 11 We're not crazy, I promise ● SysVinit had a good run, but leaves a lot to be desired.
    [Show full text]
  • SRD Configuration Guide October 21, 2008
    Cisco Persistent Storage Device for Cisco IOS Release 12.2(33)SRD Configuration Guide October 21, 2008 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
    [Show full text]
  • In the United States Bankruptcy Court for the District of Delaware
    Case 21-10457-LSS Doc 237 Filed 05/13/21 Page 1 of 2 IN THE UNITED STATES BANKRUPTCY COURT FOR THE DISTRICT OF DELAWARE Chapter 11 In re: Case No. 21-10457 (LSS) MOBITV, INC., et al., Jointly Administered Debtors.1 Related Docket Nos. 73 and 164 NOTICE OF FILING OF SUCCESSFUL BIDDER ASSET PURCHASE AGREEMENT PLEASE TAKE NOTICE that, on April 7, 2021, the United States Bankruptcy Court for the District of Delaware (the “Bankruptcy Court”) entered the Order (A) Approving Bidding Procedures for the Sale of Substantially All Assets of the Debtors; (B) Approving Procedures for the Assumption and Assignment of Executory Contracts and Unexpired Leases; (C) Scheduling the Auction and Sale Hearing; and (D) Granting Related Relief [Docket No. 164] (the “Bidding Procedures Order”).2 PLEASE TAKE FURTHER NOTICE that, pursuant to the Bidding Procedures Order, the Debtors conducted an auction on May 11-12, 2021 for substantially all of the Debtors’ assets (the “Assets”). At the conclusion of the auction, the Debtors, in consultation with their advisors and the Consultation Parties, selected the bid submitted by TiVo Corporation (the “Successful Bidder”) as the Successful Bid. PLEASE TAKE FURTHER NOTICE that, on May 12, 2021, the Debtors filed the Notice of Auction Results [Docket No. 234] with the Bankruptcy Court. PLEASE TAKE FURTHER NOTICE that attached hereto as Exhibit A is the Asset Purchase Agreement dated May 12, 2021 (the “Successful Bidder APA”) between the Debtors and the Successful Bidder. PLEASE TAKE FURTHER NOTICE that a hearing is scheduled for May 21, 2021 at 2:00 p.m.
    [Show full text]
  • Cisco Nexus 9000 Series NX-OS Fundamentals Configuration Guide, Release 6.X First Published: 2013-11-20 Last Modified: 2014-09-26
    Cisco Nexus 9000 Series NX-OS Fundamentals Configuration Guide, Release 6.x First Published: 2013-11-20 Last Modified: 2014-09-26 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Cisco Nexus 5000 Series Switches At-A-Glance
    Cisco Nexus 5000 Series Switches At-A-Glance Switches to Simplify Data Center Transformation Cisco Nexus 5000 Series Switches simplify cable • End-to-end FCoE: FCoE is an open standards–based Cisco Nexus® 5000 Series Switches, part of the unified fabric management, allowing hosts to connect to any network protocol that encapsulates Fibre Channel over Ethernet, component of the Cisco® Data Center Business Advantage through a unified Ethernet interface and enabling faster eliminating the need for separate switches, cabling, (DCBA) architectural framework, deliver an innovative rollout of new applications and services. adapters, and transceivers for each class of traffic.This architecture to simplify data center transformation by Main Features feature dramatically decreases power consumption enabling a high-performance, standards-based, and reduces both capital expenditures (CapEx) and • High-performance, low-latency 10 Gigabit Ethernet, multi-protocol, multi-purpose, Ethernet-based fabric. operating expenses (OpEx) for businesses. delivered by a cut-through switching architecture, for They help consolidate separate LAN, SAN, and server cluster 10 Gigabit Ethernet server access in next-generation • Multi-hop FCoE: Cisco Unified Fabric unites data network environments into a single Ethernet fabric. Backed data centers center and storage networks to deliver a single by a broad system of industry-leading technology partners, • Fibre Channel over Ethernet (FCoE)–capable switches high-performance, highly available and scalable Cisco Nexus 5000
    [Show full text]
  • TR-4350: Flexpod Express with Microsoft Windows Server 2012 R2
    Technical Report FlexPod Express with Microsoft Windows Server 2012 R2 Hyper-V: Large Configuration Implementation Guide Glenn Sizemore, Arvind Ramakrishnan, Karthick Radhakrishnan, NetApp Jeffrey Fultz, Cisco Systems October 2014 | TR-4350 TABLE OF CONTENTS 1 Overview ................................................................................................................................................ 5 2 Audience ................................................................................................................................................ 5 3 Architecture ........................................................................................................................................... 5 3.1 Large Configuration .......................................................................................................................................... 5 4 Hardware Details ................................................................................................................................... 6 4.1 Large Configuration ........................................................................................................................................6 5 Software Details .................................................................................................................................... 6 6 Configuration Guidelines ..................................................................................................................... 7 7 FlexPod Express Cabling Information .............................................................................................
    [Show full text]
  • Cisco Nexus 9300 Switch Datasheet CONTENT
    Cisco Nexus 9300 Switch Datasheet CONTENT Content ................................................................................................................................................ 1 Overview .............................................................................................................................................. 2 Appearance .......................................................................................................................................... 2 Nexus 9300 switches characteristics ..................................................................................................... 3 Cisco NX-OS Software Overview ........................................................................................................... 7 Specification of Nexus 9300 series switches ......................................................................................... 9 Base model ordering information ....................................................................................................... 12 Sources ............................................................................................................................................... 12 Contact Us Tel: +1-626-239-8066 (USA) +852-3050-1066 / +852-3174-6166 / +852-9795-4940 (Hong Kong) Fax: +852-3050-1066 (Hong Kong) Email: [email protected] (Sales Inquiries) [email protected] (CCIE Technical Support) ROUTER SWITCH LIMITED 1 OVERVIEW The Cisco Nexus® 9000 Series Switches include both modular and fixed-port switches
    [Show full text]
  • Cisco Nexus 9000 Series NX-OS Software Upgrade and Downgrade Guide, Release 9.3(X)
    Cisco Nexus 9000 Series NX-OS Software Upgrade and Downgrade Guide, Release 9.3(x) First Published: 2021-01-18 Last Modified: 2021-09-23 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Cisco Nexus 9000 Series NX-OS Fundamentals Configuration Guide, Release 7.X
    Cisco Nexus 9000 Series NX-OS Fundamentals Configuration Guide, Release 7.x First Published: 2015-02-01 Last Modified: 2021-09-14 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS REFERENCED IN THIS DOCUMENTATION ARE SUBJECT TO CHANGE WITHOUT NOTICE. EXCEPT AS MAY OTHERWISE BE AGREED BY CISCO IN WRITING, ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS DOCUMENTATION ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. The Cisco End User License Agreement and any supplemental license terms govern your use of any Cisco software, including this product documentation, and are located at: http://www.cisco.com/go/softwareterms.Cisco product warranty information is available at http://www.cisco.com/go/warranty. US Federal Communications Commission Notices are found here http://www.cisco.com/c/en/us/products/us-fcc-notice.html. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any products and features described herein as in development or available at a future date remain in varying stages of development and will be offered on a when-and if-available basis. Any such product or feature roadmaps are subject to change at the sole discretion of Cisco and Cisco will have no liability for delay in the delivery or failure to deliver any products or feature roadmap items that may be set forth in this document.
    [Show full text]
  • Continuous Integration with Jenkins
    Automated Deployment … of Debian & Ubuntu Michael Prokop About Me Debian Developer Project lead of Grml.org ounder of Grml-Forensic.org #nvolved in A#$ initramf"-tools$ etc. Member in Debian orensic Team Author of &ook $$Open Source Projektmanagement) #T *on"ultant Disclaimer" Deployment focuses on Linux (everal tools mentioned$ but there exist even more :. We'll cover some sections in more detail than others %here's no one-size-fits-all solution – identify what works for you Sy"tems Management Provisioning 4 Documentation &oot"trapping #nfrastructure 'rche"tration 4 Development Dev'ps Automation 6isualization/Trends *onfiguration 4Metric" + Logs Management Monitoring + *loud Service Updates Deployment Systems Management Remote Acce"" ipmi, HP i+'$ IBM RSA,... irm3are Management 9Vendor Tools Provisioning / Bootstrapping :ully) A(utomatic) I(n"tallation) Debian, Ubuntu$ Cent'( + Scientific +inu, http://fai-project.org/ ;uju Ubuntu <Charms= https-44juju.ubuntu.com/ grml-debootstrap netscript=http://example.org/net"cript.sh http-44grml.org4 d-i preseeding auto url>http-44debian.org/releases4\ "queeze/example-preseed.txt http-443iki.debian.org/DebianInstaller/Preseed Kickstart Cobbler Foreman AutoYa(%$ openQRM, (pace3alk,... Orche"tration / Automation Fabric (Python) % cat fabfile.py from fabric.api import run def host_type(): run('uname -s') % fab -H host1, host2,host3 host_type Capistrano (Ruby) % cat Capfile role :hosts, "host1", "host2", "host3" task :host_type, :roles => :hosts do run "uname -s" end % cap host_type 7undeck apt-dater % cat .config/apt-dater/hosts.conf [example.org] [email protected];mika@ mail.example.org;... *ontrolTier, Func$ MCollective$... *luster((8$ dsh, TakTuk,... *obbler$ Foreman$ openQRM, Spacewalk,... *onfiguration Management Puppet Environment" :production4"taging/development.
    [Show full text]