Book Image

Implementing Cisco UCS Solutions

Book Image

Implementing Cisco UCS Solutions

Overview of this book

Cisco Unified Computing System(UCS) provides unique features for the contemporary data centres. Cisco UCS is a unified solution that consolidates computing, network and storage connectivity components along-with centralized management. Cisco UCS reduces TCO and improves scalability and flexibility. Stateless computing blade server's design simplifies the troubleshooting, and Cisco-patented extended memory technology provides higher virtualized servers consolidation results. A hands-on guide to take you through deployment in Cisco UCS. With real-world examples for configuring and deploying Cisco UCS components, this book will prepare you for the practical deployments of Cisco UCS data centre solutions. If you want to learn and enhance your hands-on skills with Cisco UCS solutions, this book is certainly for you. Starting with the description of Cisco UCS equipment options, this hands-on guide then introduces Cisco UCS Emulator which is an excellent resource to practically learn Cisco UCS components' deployment. You will also be introduced to all areas of UCS solutions with practical configuration examples. You will also discover the Cisco UCS Manager, which is the centralized management interface for Cisco UCS. Once you get to know UCS Manager, the book dives deeper into configuring LAN, SAN, identity pools, resource pools, and service profiles for the servers. The book also presents other administration topics including Backup, Restore, user's roles, and high availability cluster configuration. Finally, you will learn about virtualized networking, 3rd party integration tools and testing failure scenarios. You will learn everything you need to know for the rapidly growing Cisco UCS deployments in the real-world.
Table of Contents (19 chapters)
Implementing Cisco UCS Solutions
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface
Index

Preface

Implementing Cisco UCS Solutions is written with a hands-on approach. With actual examples for configuring and deploying Cisco UCS components, this book prepares readers for the real-world deployments of Cisco UCS datacenter solutions.

This book starts with a description of Cisco UCS equipment options and introduces Cisco UCS Emulator, which is an excellent resource for practically learning Cisco UCS components deployment. Subsequent chapters introduce all areas of UCS solutions with practical configuration examples.

You will be introduced to the Cisco UCS Manager, which is the centralized management interface for Cisco UCS. Once the reader establishes elementary acquaintance with UCS Manager, we go deep into configuring LAN, SAN, identity pools, resource pools, and service profiles for the servers. We also present miscellaneous administration topics including backup, restore, user roles, and high-availability cluster configuration. The last few chapters introduce virtualized networking, third-party integration tools, and testing failure scenarios.

If you want to learn and enhance your hands-on skills with Cisco UCS solutions, this book is certainly for you. You will learn everything you need for the rapidly growing Cisco UCS deployments.

What this book covers

Chapter 1, Cisco UCS Physical Architecture and Installing UCS Hardware, covers physical components of UCS solutions including Fabric Interconnects, blade chassis, IOM/FEX modules, mezzanine cards, blade servers, and rack-mount servers. Specifications of different components are provided along with the physical installation and connectivity of all of the components.

Chapter 2, Setting Up Lab Using Cisco UCS Emulator, introduces the UCS Emulator, which is an excellent tool from Cisco to learn UCS even without a physical lab. Different UCS Emulator installation options are discussed, and configuring the UCS Emulator for lab usage is explained.

Chapter 3, Configuring Cisco UCS Using UCS Manager, gives an overview of UCS Manager, which is the core management tool for the UCS platform. Readers get acquainted with the UCS Manager navigation and configuration options using both graphical user interface and command-line interface.

Chapter 4, Configuring LAN Connectivity, explains UCS network connectivity. UCS platform-unique features, including Fabric Interconnect operational modes, pin groups, port channels, virtual PortChannel, and virtual network interface card configuration, are explained along with both northbound and southbound network connectivities from Fabric Interconnects.

Chapter 5, Configuring SAN Connectivity, explains storage connectivity for different SAN protocols supported by the UCS platform. Configuration of protocols including FC, FCoE, and iSCSI is discussed along with an introduction to UCS unique features including FC operational modes, VSANs, and uplink pinning.

Chapter 6, Creating Identity and Resource Pools, introduces identity and resource pools which include UUID, MAC addresses, WWN, and server pools. Identity and resource pools are used for abstracting unique identities and resources for devices such as vNICs; vHBAs and server pools can assign servers in groups based on similar server characteristics.

Chapter 7, Creating and Managing Service Profiles, shows how to create service profiles that provide necessary identities, resources, and configuration to the stateless servers. Readers first learn how to create policies which provide server configuration, and then learn various service profile configuration options.

Chapter 8, Managing UCS through Routine and Advanced Management, introduces the most common and advanced management tasks performed with UCS, from startup and shutdown to logging, upgrading firmware, licensing, and role-based access. These routine management tasks are crucial to understand in order to effectively administer Cisco UCS.

Chapter 9, Virtual Networking in Cisco UCS, explains the integration of Cisco UCS and the virtualization of hypervisor mostly with VMware vSphere and Cisco Nexus 1000v Distributed Virtual Switch.

Chapter 10, Configuring Backup, Restore, and High Availability, covers UCS backup and restore options. This chapter also provides details of high-availability configuration for UCS Fabric Interconnects.

Chapter 11, Cisco UCS Failure Scenarios Testing, discusses various failure scenarios that provide necessary knowledge for UCS troubleshooting for identifying and resolving issues.

Chapter 12, Third-party Application Integration, covers third-party applications including VMware vCenter extension, goUCS automation toolkit, EMC UIM, and so on.

What you need for this book

In order to create a lab without physical equipment and to practice procedures provided in this book, you will need the following:

  • A UCS Emulator virtual machine that provides UCS Manager application and emulated hardware.

  • A hypervisor that can run the UCS Emulator VM. Options include VM Player, VM Workstation, VM Fusion, vSphere, and HyperV.

  • A client machine with an Internet-Explorer- or Mozilla-compatible browser for accessing the UCS Manager application.

Who this book is for

This book is intended for the professionals responsible for Cisco UCS deployments which include systems, network, and storage administrators. Readers should have basic knowledge of the server's architecture, network, and storage technologies. Although not necessary, familiarity with virtualization technologies is also recommended because a majority of real-world UCS deployments run virtualized loads. Even though UCS Fabric Interconnects running the UCS manager software are based on the Nexus platform, knowledge of Nexus OS is not necessary, because a majority of the management tasks are handled in the graphical user interface with very few exceptions using the CLI.

Conventions

In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.

Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "All uplink ports are configured as 802.1q trunks."

Any command-line input or output is written as follows:

# show cluster state
A: UP, PRIMARY
B: UP, SUBORDINATE
HA READY

New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Click on the Equipment tab in the Navigation pane."

Note

Warnings or important notes appear in a box like this.

Tip

Tips and tricks appear like this.

Reader feedback

Feedback from our readers is always welcome. Let us know what you think about this book—what you liked or may have disliked. Reader feedback is important for us to develop titles that you really get the most out of.

To send us general feedback, simply send an e-mail to , and mention the book title via the subject of your message.

If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, see our author guide on www.packtpub.com/authors.

Customer support

Now that you are the proud owner of a Packt book, we have a number of things to help you to get the most from your purchase.

Errata

Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you find a mistake in one of our books—maybe a mistake in the text or the code—we would be grateful if you would report this to us. By doing so, you can save other readers from frustration and help us improve subsequent versions of this book. If you find any errata, please report them by visiting http://www.packtpub.com/submit-errata, selecting your book, clicking on the errata submission form link, and entering the details of your errata. Once your errata are verified, your submission will be accepted and the errata will be uploaded on our website, or added to any list of existing errata, under the Errata section of that title. Any existing errata can be viewed by selecting your title from http://www.packtpub.com/support.

Piracy

Piracy of copyright material on the Internet is an ongoing problem across all media. At Packt, we take the protection of our copyright and licenses very seriously. If you come across any illegal copies of our works, in any form, on the Internet, please provide us with the location address or website name immediately so that we can pursue a remedy.

Please contact us at with a link to the suspected pirated material.

We appreciate your help in protecting our authors, and our ability to bring you valuable content.

Questions

You can contact us at if you are having a problem with any aspect of the book, and we will do our best to address it.