BladeSystem ProLiant Firmware Management Best Practices Implementer Guide
BladeSystem ProLiant Firmware Management Best Practices Implementer Guide
Table of contents
Introduction ......................................................................................................................................... 5
Firmware updates ............................................................................................................................ 5
HP BladeSystem................................................................................................................................... 5
Overview ........................................................................................................................................ 5
Quickstart ........................................................................................................................................... 6
Generic BladeSystem firmware update installation order ................................................................... 7
Installation order .......................................................................................................................... 8
General best practices ...................................................................................................................... 9
Recommended firmware deployment strategies ..................................................................................... 10
HP BladeSystem and firmware ......................................................................................................... 10
Firmware management ....................................................................................................................... 11
Developing a firmware management strategy .................................................................................... 11
What options are available for firmware deployment? ....................................................................... 12
Firmware deployment overview ........................................................................................................... 13
Available tools to update HP BladeSystem firmware ............................................................................... 14
HP SUM ........................................................................................................................................ 14
HP SUM Minimum Requirements .................................................................................................. 16
HP SUM Execution Modes ........................................................................................................... 17
VCSU ........................................................................................................................................... 19
Single smart components ................................................................................................................ 21
HP SIM and Version Control Agent .................................................................................................. 22
Virtual SAS Manager...................................................................................................................... 25
Obtaining the latest available HP firmware update tools ......................................................................... 26
Choosing the deployment tool ............................................................................................................. 27
HP BladeSystem Firmware Update Bundles ....................................................................................... 29
HP BladeSystem FDT....................................................................................................................... 31
HP Firmware Maintenance CD ........................................................................................................ 33
Recommended methods to deploy individual firmware types ................................................................... 34
System ROM ................................................................................................................................. 35
iLO2 firmware ............................................................................................................................... 35
NIC firmware ................................................................................................................................ 37
PowerPIC or Power Management Controller firmware ........................................................................ 38
Smart Array Controller firmware ...................................................................................................... 41
SAS and SATA hard drive firmware ................................................................................................. 41
Emulex, QLogic, and Brocade Fibre Channel HBA firmware ............................................................... 43
Tape Blade firmware ...................................................................................................................... 43
OA firmware ................................................................................................................................. 44
Installation order ........................................................................................................................ 45
VC firmware .................................................................................................................................. 45
Installation order ........................................................................................................................ 48
HP StorageWorks MDS600 firmware ............................................................................................... 48
HP StorageWorks 3Gb SAS BL Switch firmware ................................................................................ 49
Firmware deployment scenarios........................................................................................................... 49
Installation scenarios .......................................................................................................................... 52
Scenario 1A: Updating an individual server using the HP BladeSystem Firmware Update Bundles ........... 52
Scenario 1B: Updating a server using the HP BladeSystem FDT ........................................................... 54
Scenario 1C: Updating an individual server using the HP Firmware Maintenance CD ............................ 55
Online updates .......................................................................................................................... 56
*iLO Virtual Media ..................................................................................................................... 57
Offline updates .......................................................................................................................... 58
Scenario 2A: Updating the OA firmware using HP SUM..................................................................... 59
Scenario 2B: Updating the OA firmware using the OA browser interface from a workstation .................. 60
Scenario 2C: Updating the OA firmware using the OA CLI interface and a web server .......................... 60
Obtaining all necessary files ........................................................................................................ 61
Setting Up the Microsoft IIS web server ......................................................................................... 61
Setting up the Apache web server in Linux..................................................................................... 62
Configuring the SSH keys for scripted installations .......................................................................... 64
Uploading the SSH keys to the OAs ............................................................................................. 65
Updating the OA firmware once the web server successfully configures ............................................ 67
Scenario 3A: Updating the VC firmware using VCSU ......................................................................... 68
General requirements ................................................................................................................. 68
Before the upgrade begins .......................................................................................................... 69
Updating the VC firmware ........................................................................................................... 70
Scenario 3B: Updating the VC firmware using the HP SUM ................................................................ 71
General requirements ................................................................................................................. 71
Before the upgrade begins .......................................................................................................... 72
Updating the VC firmware ........................................................................................................... 72
Scenario 3C: Updating the VC firmware in a DMZ (special case using the OA virtual USB support) ........ 74
General requirements ................................................................................................................. 74
Before the upgrade begins .......................................................................................................... 74
Updating the VC firmware from a USB key in the OA ..................................................................... 75
Scenario 4: Updating an enclosure and blades with a previously installed OS ...................................... 76
Installation order ........................................................................................................................ 76
If VC Ethernet firmware is earlier than 1 .34: ................................................................................. 77
Scenario 5: Updating an enclosure and blades without an existing OS installed.................................... 78
Summary ................................................................................................................................... 79
Scenario 6: Scripted installation of firmware updates for multiple enclosures, including the OA, VC, and server
blades .......................................................................................................................................... 79
Obtaining all necessary files ........................................................................................................ 80
Setting up the Microsoft IIS web server .......................................................................................... 81
Setting up the Apache web server in Linux..................................................................................... 82
Configuring the SSH keys for scripted installations .......................................................................... 83
Uploading the SSH keys to the OAs ............................................................................................. 84
Populate the web servers and script directory with all necessary files ................................................ 85
Populating the script directory ...................................................................................................... 85
Populating the web server directory .............................................................................................. 86
Installing necessary RPMs in Linux ................................................................................................ 87
Obtaining a list of all iLO IP addresses by querying the OA for them ................................................ 87
Validating the iLO Advanced License is installed on each blade ....................................................... 88
Finding the version of iLO firmware on each blade ......................................................................... 89
Obtaining the current Virtual Media status for a blade .................................................................... 90
Setting Virtual Media to boot on a blade ....................................................................................... 91
Inserting the virtual media on a blade ........................................................................................... 92
Disconnecting the virtual media on a blade ................................................................................... 93
2
Determining the power state on a blade ........................................................................................ 93
Turning the power off on a blade ................................................................................................. 94
Turning the Power On for a blade ................................................................................................ 95
Creating HP SUM Inputfiles ......................................................................................................... 96
Extracting the VCSU and VC binary firmware files from the VC component ....................................... 97
Putting it all together ................................................................................................................... 97
Update Blade firmware scripts ..................................................................................................... 98
Sample Windows Power Shell script to drive the FDT update process for an entire enclosure at once . 100
Sample L ................................................................................................................................. 108
Update OA firmware scripts ...................................................................................................... 116
Sample Windows Power Shell script to drive the OA firmware update process to a single OA at a time117
Sample Linux script to drive the OA firmware update process to a single OA at a time ..................... 118
Update VC firmware scripts ....................................................................................................... 119
Sample Windows Power Shell script to drive the VC firmware update process to a single VC at a time120
Sample Linux script to drive the VC firmware update process to all the VC modules in a single enclosure at a
time ........................................................................................................................................ 122
Scenario 7: Updating the HP StorageWorks MDS600 firmware ........................................................ 123
Using HP SUM in GUI mode ............................................................................................................. 125
Using the GUI for local host installations ......................................................................................... 125
Selecting the location to check for updates .................................................................................. 125
Directory ................................................................................................................................. 126
Proxy Details ............................................................................................................................ 127
Include components previously downloaded from www.hp.com. .................................................... 127
Download permission ............................................................................................................... 127
Selecting an installation host ...................................................................................................... 128
Selecting components to install ................................................................................................... 130
Multi-session installation ............................................................................................................ 133
Reboot section ......................................................................................................................... 133
Component selection pane ........................................................................................................ 134
Installation options .................................................................................................................... 135
Viewing the installation results.................................................................................................... 137
Using the GUI for multiple-host installations ..................................................................................... 140
Selecting remote hosts or groups .................................................................................................... 140
Managing hosts ....................................................................................................................... 141
Entering credentials for hosts ..................................................................................................... 144
Selecting components to install on multiple hosts .......................................................................... 147
Viewing the installation results for multiple hosts ........................................................................... 149
Using HP SUM in Scripted or Silent mode ........................................................................................... 150
Command line syntax ............................................................................................................... 150
Command line arguments .......................................................................................................... 151
HP SUM return codes ................................................................................................................ 154
Results ..................................................................................................................................... 156
HP SUM special considerations ......................................................................................................... 157
Network ports used by HP SUM..................................................................................................... 157
Trusted platform module support issues ........................................................................................... 159
TPM scenarios .......................................................................................................................... 161
VMware ESX firmware updates ......................................................................................................... 161
VMware ESX/ESXi environments.................................................................................................... 161
HP firmware management services .................................................................................................... 162
HP BladeSystem firmware and Driver Gap analysis .......................................................................... 162
HP BladeSystem firmware and Driver Update process review ............................................................ 163
FAQ ............................................................................................................................................... 163
Driver dependency considerations .............................................................................................. 163
What tools should I use to update the various firmware types? ....................................................... 166
Why must I always upgrade to the latest individual firmware and driver components? ...................... 166
HP SUM questions ........................................................................................................................ 166
How does HP SUM work when applied to an entire chassis; for example, does it update each blade, iLO2,
and so on, sequentially or in parallel? ........................................................................................ 166
What are the advantages and drawbacks to using the HP BladeSystem Firmware Update Bundles versus the
HP BladeSystem FDT? ............................................................................................................... 166
Why is Version Control (included with SIM) not the tool of choice to manage firmware upgrades across the
HP BladeSystem portfolio? ......................................................................................................... 167
What about administrators who have invested time to understand HP SIM and specifically Version Control?
.............................................................................................................................................. 167
Where do I obtain theHP SUM user guide? ................................................................................. 167
How can I leverage the HP SUM pull-from-web functionality when my data center cannot be connected to
the Internet for security reasons? ................................................................................................. 167
It seems the HPSUM GUI interface cannot currently accept input (for example, groups of IP addresses) from
files, but I heard this feature is planned in a future version. Does the HPSUM CLI allow creation of a group
from a file with a list of IP addresses or DNS names when the file is presented to it as a file name that is
given as a CLI command-line parameter? .................................................................................... 167
What is the function of the additional drivers in the BladeSystem Firmware Update Bundle? .............. 168
When using the HP BladeSystem Online Firmware Bundles for Windows and Linux to upgrade an entire
c7000 Enclosure and all of its constituents, including the OAs, server blades, iLO2s, and switch modules:
.............................................................................................................................................. 168
Currently, the server BIOS must be updated prior to the iLO2 because of a potential issue with the Power
PIC. Will HP SUM reorder the installation set to avoid this issue? ................................................... 168
Miscellaneous BladeSystem firmware-related questions ..................................................................... 169
Can SIM use the HP BladeSystem firmware update bundles for Windows and Linux as a VCRM-custom base
line? ....................................................................................................................................... 169
What is the recommended tool for understanding the currently-deployed BladeSystem equipment firmware
revisions? ................................................................................................................................ 169
Can I update my Blades HBA firmware online? ............................................................................ 170
How do I manage my Blade interconnect switch updates? ............................................................. 170
Are there any guidelines for downgrading firmware? ................................................................... 170
Can you upgrade versions of HBA firmware without being concerned about going through an interim
version to facilitate the upgrade? ................................................................................................ 170
Can I roll-back the individual changes on a per-server or per chassis basis? .................................... 170
How often should we upgrade firmware? .................................................................................... 171
How does the firmware version affect our support status with HP? .................................................. 171
How do I add updated components to the HP BladeSystem FDT? ................................................... 171
How do I add updated components to the HP firmware maintenance CD? ...................................... 171
How do virtual environments affect the firmware update process? .................................................. 173
Installed firmware version data collection ........................................................................................... 173
Enclosure-level firmware information ............................................................................................... 173
Blade server-level firmware information ........................................................................................... 175
NIC firmware ........................................................................................................................... 175
Tape firmware ......................................................................................................................... 176
Smart Array controller firmware and SAS/SATA hard drive firmware versions ................................. 177
Troubleshooting ............................................................................................................................... 178
Troubleshooting HP SUM .............................................................................................................. 178
Troubleshooting HP BladeSystem FDT ............................................................................................. 181
Trouble shooting Log Files for individual smart components ............................................................... 182
Troubleshooting PowerPIC firmware update errors ........................................................................... 182
Troubleshooting failed iLO2 firmware updates ................................................................................. 183
For more information ........................................................................................................................ 185
Glossary ......................................................................................................................................... 187
Acronyms and abbreviations ......................................................................................................... 187
4
Introduction
Firmware updates
Updating firmware is crucial for maintaining server systems. Updating the existing firmware is less
expensive than replacing it. Consequently, firmware updates are as important to the OS as software
and driver updates. This document describes the best practices for updating HP c-Class BladeSystem
product firmware, including the following:
Information to help identify a firmware maintenance strategy
Determining which firmware to update
Selecting the appropriate tools to perform firmware updates
Considering the process dependencies
Guiding you in performing firmware updates
HP BladeSystem
Overview
When updating HP BladeSystem c-Class enclosures, consider the following firmware:
BladeSystem OA firmware
BladeSystem VC firmware
Blade Server System ROM
Blade Server iLO 2 firmware
Broadcom, Intel, and NetXen NIC firmware
PowerPIC firmware
Smart Array Controller firmware
SAS and SATA hard drive firmware
Emulex, QLogic, and Brocade Fibre Channel HBA firmware
Tape blade firmware
HP StorageWorks MDS600
HP 3Gb SAS BL Switch Firmware
Note:
EVA firmware, MSA2000 firmware, and BladeSystem Interconnect
Switches are not covered in this document. To update the firmware for
these devices, see the specific product documentation.
5
Quickstart
Table 1 provides a quick jumpstart in performing firmware updates.
The information in the Estimated time for deployment column indicates the time required to update the
firmware, not the time required to obtain the firmware, execute the deployment tools, or gather
information necessary for the firmware update process.
The information in the Does update effect normal server operations? column indicates whether or not
the update process causes a server downtime. Many types of firmware can be staged to the actual
hardware while the server is operating normally. You can update these firmware types and have them
staged for the next time the server is rebooted to activate the firmware.
Table 1. Required information for firmware update
Is firmware staged for next Estimated time for Does update affect
Firmware type Tool to use reboot or immediately deployment normal server
activated? operations?
NetXen NIC firmware HP SUM Immediate, but requires a 10 minutes Yes, must be
reboot updated offline
SAS and SATA hard drive firmware HP SUM Staged 1 minute per drive No
behind Smart Array controllers
SAS and SATA hard drives behind non- No current support 1 minute per drive No
Smart Array controllers
Emulex, QLogic, and Brocade Fibre HP SUM Staged 3 minutes Yes, must be
Channel HBA firmware updated offline
6
Is firmware staged for next Estimated time for Does update affect
Firmware type Tool to use reboot or immediately deployment normal server
activated? operations?
firmware;
otherwise, a
network downtime
of up to 10 minutes
can occur.
HP 3Gb SAS BL switch firmware VSM Immediate 10 minutes Yes, can cause a
temporary
downtime for any
storage being
updated
Important:
MDS600 firmware update requires HP SUM 3.6.0 or later and that ALL
blades in an enclosure that have Smart Array P700Mcontrollers except the
blade doing the update must be turned OFF before the firmware update
process is initiated. MDS600 firmware can only be updated using the
Firmware Maintenance CD in offline mode.
Important:
The HP 3Gb SAS BL switch firmware can only be updated by uploading a
bin file through the VSM product. This firmware is currently delivered as a
binary image file on the HP website and must be downloaded and
manually upgraded because it is not available on any other tool discussed
in this document.
7
OS is not installed
1. Update the OA first by using the HP BladeSystem Online Firmware Bundles for Windows and
Linux.
Use a workstation connected to the same network as the OA.
2. Update the VC firmware with the VCSU from a workstation connected to the same network(s)
as the OA and VC Ethernet modules.
Be sure to update the firmware after all other updates have been applied, after the servers are
rebooted, and after all firmware is activated.
3. Update all server-specific firmware with the HP BladeSystem FDT or HP Firmware Maintenance
CD.
Use the following links to gain access to the latest versions of the quarterly release sets that contain
the firmware and tools described in the table.
HP BladeSystem Online Firmware Update Bundles for Windows 1.70
HP BladeSystem Online Firmware Update Bundles for Linux 1.70
HP FDT for Offline Updates 1.70
HP Firmware Maintenance CD 8.70
Installation order
Use the following installation order if you are using VC Ethernet firmware 1.34 or later, or if you are
not using VC in your blade enclosures.
Server OS is already installed
1. Update the blades and the OA first by using the HP BladeSystem Online Firmware Bundles for
Windows and Linux using a workstation connected to the same network as the OA.
2. Use the HP BladeSystem FDT or HP Firmware Maintenance CD to update any offline-only
firmware.
3. Use the VCSU from a workstation connected to the same network(s) as the OA and VC Ethernet
modules to update the VC firmware after all other updates are applied, servers are rebooted,
and all firmware is activated.
8
Server OS is not installed
1. Update the OA first by using the HP BladeSystem Online Firmware Bundles for Windows and
Linux by using a workstation connected to the same network as the OA.
2. Use the VCSU from a workstation connected to the same network(s) as the OA and VC Ethernet
modules to update the VC firmware after all other updates are applied, servers are rebooted,
and all firmware is activated.
3. Use the HP BladeSystem FDT or HP Firmware Maintenance CD to update all server-specific
firmware.
If the VC Ethernet firmware is earlier than 1.34, follow this installation order (whether or not a
Server OS is installed):
1. Update the VC firmware first by using the VCSU from a workstation connected to the same
network(s) as the OA and VC Ethernet modules.
2. Update the server blades and the OA next using the HP BladeSystem Online Firmware Bundles
for Windows and Linux from a workstation connected to the same network as the OA.
3. Use the HP BladeSystem FDT or HP Firmware Maintenance CD to update any offline-only
firmware.
9
HP does not recommend downgrading or rewriting firmware unless there is a specific reason to
do so. Downgrading firmware may cause incompatibilities between hardware devices if the
downgraded firmware is not compatible with other firmware.
Always reboot the server after server-based driver or firmware upgrades.
10
Table 2 is a partial example of the HP BladeSystem Firmware Compatibility chart.
For the latest revision of the HP BladeSystem Firmware Compatibility Chart, see
http://www.hp.com/go/bladesystemupdates/.
Table 2. Firmware compatibility
Compatibility
Description Version release date with OA File download
release
Firmware management
Developing a firmware management strategy
Before updating any firmware, it is important to develop and document a firmware management
strategy. Consider the following criteria when developing your strategy.
How frequently do I update the firmware?
Updating firmware continuously is not a good use of vital IT resources. HP recommends
standardizing to either a three-month or six-month maintenance window for updating firmware.
In the near future, HP will provide information about how critical each firmware release is. HP SUM
will be able to display this information to help you determine whether or not an update is required,
recommended, or optional.
By viewing these recommendations and considering available downtimes, you can determine the
best time to update your BladeSystem firmware. In some cases, staggering the updates across
multiple enclosures over several weeks is the best practice to follow.
How do I manage critical updates?
Not every firmware update released by HP is critical to a server. Reviewing the available
documentation, such as release notes and customer advisories, can help you determine if a given
firmware release is critical or not. When a critical update is released, it is important to note which
options are available for updating that type of firmware. In some cases, you can update the
firmware, such as iLO firmware, with no downtime to the target servers. In other cases, you must
reboot the server into a special boot environment such as those provided by the offline Firmware
Maintenance CD and BladeSystem FDT ISO. Updates requiring these special boot environments
may have excessive downtime depending on the number of devices that must be updated. For
instance, updating an external array of 70 drives which take about 40 seconds per drive can
require almost an hour of downtime. The amount of downtime must be factored into the server
uptime requirements for daily operations. Analyzing the updates and categorizing them as reboot
11
required, offline boot environment required, ability to be staged, and other consideration (such as
timeframes required) will help in outlining the firmware update strategy.
When do I stage updates?
Because many firmware updates require rebooting, it is sometimes best to install these firmware
updates and wait for a window of downtime before rebooting the server and activating the
updates. Many types of firmware can be staged, such as System ROM, Storage Controller, and
hard drives. When an available downtime occurs for other reasons, such as updating Microsoft or
Linux fixes, application updates, or weekly server reboots, the downtime for the server can be
minimized or eliminated because the firmware has already been written to the hardware. This is
because most firmware loads itself from the hardware into memory when the server boots. When
the server boots, the firmware image on the hardware is not accessed again until the server is
rebooted to reload the image. There are also several infrastructure updates such as the OA, iLO,
and VC (if it is set up in redundant mode) where the firmware can be flashed without any
interruption in service on the servers in the enclosure.
Also consider that many network-based devices such as the OA, VC, and iLO can be updated
without affecting the server operations. In the case of VC, the VC configuration must be set up in
redundant mode to prevent a network downtime. Updating this firmware without affecting the
servers enables you to reduce the maintenance window because these devices are already up to
date. Now you can use the maintenance window for server-based updates that require a reboot
and not for infrastructure updates that extend the downtime.
How can I take advantage of firmware that immediately updates?
Some server-based updates, such as iLOs and tape firmware, can be updated while the server is
still operational without requiring downtime.
12
Figure 1. HP Smart Update technology
With multiple tools comes flexibility, but also the potential for confusion. This section specifies the
recommended tools to use to upgrade firmware components within an HP BladeSystem solution,
and explains which tool is appropriate for which situation.
13
updates. These updates require that no I/O operations are done through the adapters while they
are being updated, and the only way to ensure this is to boot to a special environment.
These terms can be used in combination to designate the type of environment required for firmware
updates to occur, such as local-online or remote-online.
HP SUM
HP SUM, which is the deployment engine within the HP BladeSystem FDT, HP BladeSystem Online
Firmware Bundles for Windows and Linux, HP Firmware Maintenance CD and ProLiant Support Pack
for Windows, is the primary deployment tool that should be used to update firmware on HP
BladeSystem enclosures. HP SUM is designed for maximum flexibility and is shipped within the HP
ProLiant Support Pack for Windows, Firmware Maintenance CD, HP BladeSystem FDT, and HP
BladeSystem Online Firmware Update Bundles for Windows and Linux.
HP SUM provides a GUI and a command-line, scriptable interface for deployment of firmware for
single or one-to-many servers and network-based targets such as iLOs, OAs, and VC Ethernet and
Fibre Channel modules. HP SUM has an integrated hardware and software discovery engine that
discovers the installed hardware, current versions of firmware in use on a target, and software
versions on target servers. This prevents extraneous network traffic by only sending the required
components to a target host. HP SUM also has logic to install updates in the correct order and ensure
all dependencies are met before deployment of a firmware update. It also contains logic to prevent
version-based dependencies from destroying an installation and ensures firmware updates are
handled in a manner that reduces any downtime required for the firmware update process.
HP SUM does not require an agent for remote installations as it copies a small, secure SOAP server to
the target server for the duration of the installation and thus requires Administrative (Windows) and
root (Linux) level access. After the installation is complete, the SOAP server and all remote files
associated with the installation except installation log files are removed. HP SUM copies the log files
from the remote targets back to the system where HP SUM is executed.
The key features of HP SUM include the following:
Dependency checking, which ensures appropriate install order and dependency checking
between components
Hardware, Software and Services discovery
Intelligent deployment deploys only required updates
Simultaneous firmware and software deployment
Improved deployment performance
Local or remote (one-to-many) online deployment
Local offline deployments with the HP FDT and Firmware Maintenance CD
Remote offline deployment, when used with the SmartStart Scripting Toolkit or iLO Virtual Media
GUI or CLI/scriptable with extensive logging
Remote command-line deployment
14
Support for updating firmware on network-based targets, such as the OA, iLO2 through its
Network Management Port, and VC Ethernet and Fibre Channel modules
Reporting of repository content, discovered versions, and recommended installation set per target
as both html and xml
SAS and SATA hard drive firmware behind non- Smart Array No
controllers
Emulex, QLogic, and Brocade Fibre Channel host bus adapter Yes, in offline mode only because of HBA firmware
firmware limitations
Important:
MDS600 firmware update requires HPSUM 3.6.0 or later and that ALL
blades in an enclosure that have Smart Array P700M controllers except the
blade doing the update must be turned OFF before the firmware update
process is initiated. MDS600 firmware can only be updated using the
Firmware Maintenance CD in offline mode.
Note:
The long-term goal is for HP SUM to address all of the firmware
components included in an enclosure including partner switches.
15
The latest HP SUM User Guide is included in the Firmware Maintenance CD User’s Guide. To obtain
a copy of this PDF file, see ftp://ftp.hp.com/pub/c-products/servers/management/smartstart/ and
select the latest version of the FWCDUsersGuidex.xx.pdf.
HP SUM Minimum Requirements
To successfully deploy HP SUM on target systems based on a Microsoft Windows OS, the following
items must be available:
A local administrative system with 512 MB of memory, running a supported Windows OS
Sufficient hard-drive space of at least twice the file size of the components to be deployed
WMI enabled
Note:
When attempting to use the remote deployment functionality of HP
SUM on any edition of Windows Server 2008, you must ensure that the
File and Print Services feature is enabled and that the File and Print
Services exception is enabled in the Windows firewall. Failure to do so
prevents HP SUM from deploying remote Windows target servers.
Note:
HP SUM requires a true administrator login (not an elevated RUN AS
administrator). If you are unable to perform the net use *
\\server\ADMIN$ for Windows target servers, you do not have sufficient
privileges to run HP SUM.
To successfully deploy HP SUM on target systems based on a Linux OS, the following items must be
available:
A local administrative system with 512 MB of memory, running a supported Linux OS
glibc 2.2.4-26 or later
gawk 3.1.0-3 or later
sed 3.02-10 or later
pciutils-2.1 .8-25.i386.rpm or later
To successfully update HP SUM on remote target systems based on a Linux OS, the following items
must be available:
tcl-8.x package
tcl-5.x package
expect-5.x package
To successfully execute HP SUM on any local or remote target systems running a SUSE Enterprise
Linux 11 OS on x86 or x64 architectures, the following library must be available:
compat-libstdc++-296-2.96-1 32.7.2.i386.rpm or another compatibility library that provides the
/usr/lib/libstdc++-libc6.2-2.so.3 file
Without this library, HP SUM does not complete discovery and returns Discovery Failed messages.
16
Note:
Beginning with the Firmware Maintenance CD v8.50, HP SUM no longer
runs on SUSE Enterprise Linux 9.
Note:
To perform remote Linux deployments, a root equivalent user account must
be used.
Note:
SSH support must be enabled and the firewall opened to allow SSH
communications on remote Linux servers or HPSUM cannot deploy updates.
By default, SUSE LINUX Enterprise Server 10 and 11-block SSH support
through the firewall. To enable SSH support if it has been disabled in the
firewall, use the yast2 command to open the necessary ports in the Linux
firewall.
Important:
The HP SUM does not support cross-platform deployments (for example,
deployments from Linux systems to Windows systems).
17
Scenario Description HP SUM command to HP tool to use
use*
Automatic Deployment to one Use this scenario when you: The HP BladeSystem FDT Online:
or more servers in a HP Do not have an OS installed on takes care of this None
BladeSystem enclosure a server blade automatically
Offline:
(use the HP BladeSystem FDT Want an automatic way to HP BladeSystem FDT
with embedded HPSUM to deploy firmware updates
deploy firmware updates to
Do not require log files or user
one or more blades)
interaction with the installation
process
Want to update multiple blades
in an enclosure in a single
operation
For more information about each of these scenarios, other HP SUM command-line parameters, and
HP SUM return codes, see Using HP SUM in GUI mode or Using HP SUM in scripted or silent mode
or review the Firmware CD User’s Guide at ftp://ftp.hp.com/pub/c-
products/servers/management/smartstart/.
18
Note:
For information on updating the 3 Gb SAS BL switch firmware, see Virtual
SAS Manager.
VCSU
HP BladeSystem c-Class VCSU enables you to perform the following tasks.
Upgrade VC Ethernet and VC-FC firmware modules
Perform other maintenance tasks remotely on VC Ethernet and Fibre Channel modules installed in
both the HP BladeSystem c-Class c7000 and c3000 enclosures using a standalone Windows or
Linux-based command-line utility
When the utility initiates a firmware upgrade process, all modules can be updated at the same time,
or the updates can be alternated between left and right modules so that network and SAN
connectivity is not disrupted during the upgrades. The utility displays a progress message indicating
that an update is in progress and the percentage completed. After the module firmware updates are
complete, the utility activates all modules. The VCSU also minimizes any downtime time in the network
fabric and might eliminate it altogether if the VC modules are installed in redundant pairs.
Note:
Currently, the VCSU can only update VC Ethernet and Fibre Channel
modules. The VCSU cannot update other types of firmware in an enclosure.
The latest VC firmware components and binary files for use with VCSU are available in the
Firmware—Blade Infrastructure section on the www.hp.com website.
19
Table 5. Supported modes for updating VC Ethernet or Fibre Channel module
VC Update Scenario Description Update Tool to Use HP Tool to Use
Interactive, graphical Use this scenario when you: HP SUM* HP BladeSystem Online
deployment to VC modules in Are not familiar with command Firmware Bundles for
a single enclosure line tools Windows and Linux
Scripted deployment to VC Use this scenario when you: VCSU HP BladeSystem Online
modules in a single enclosure Are familiar with command line Firmware Bundles for
tools Windows and Linux
Interactive, graphical Use this scenario when you: HP SUM HP BladeSystem Online
deployment to VC modules in Are not familiar with command Firmware Bundles for
multiple enclosures line tools Windows and Linux
Scripted deployment to VC Use this scenario when you: VCSU can update HP BladeSystem Online
modules in multiple Are familiar with command line multiple VCs one-at-a-time Firmware Bundles for
enclosures tools via standard scripting Windows and Linux
Note:
If updating to a version of VC firmware earlier than version 2.10, VCSU
must be used in all circumstances.
Note:
HP SUM 3.5.0 or later is required to support VC firmware updates.
Note:
HP SUM 3.6.2 or later is required to support upgrades to VC firmware
2.12 and later.
For information on how to deploy VC firmware by using VCSU or HP SUM, click the highlighted tool
name or go to Scenario 3A: Updating the VC firmware using VCSU or Scenario 3B: Updating the VC
firmware using the HP SUM.
20
Single smart components
HP provides almost all firmware updates as individual smart components. In most cases, individual
smart components are available for both Windows and Linux environments. Individual smart
components, except VC firmware, have an embedded installer that checks basic dependencies
including supported OS, presence of required hardware, and enforcement of limited advanced
dependencies known for the individual component.
The smart components for VC firmware update must use HP SUM. Individual smart components can
be used in almost any deployment scenario. However, certain limitations exist, such as some firmware
updates needing to be managed offline, and can limit effectiveness. Most smart components support
only local deployment but can be integrated with other deployment tools to support deployment on
remote servers.
Table 6. Firmware smart component capabilities
Firmware types Online Offline Local Remote Is firmware staged for
next reboot or to activate
immediately?
21
Firmware types Online Offline Local Remote Is firmware staged for
next reboot or to activate
immediately?
*Individual components normally require another application like VCSU or HP SUM to deploy them to remote target servers and hosts. In
some instances, components have embedded support to deploy themselves remotely.
Important:
MDS600 firmware update requires HPSUM 3.6.0 or later and that ALL
blades in an enclosure that have Smart Array P700Mcontrollers except the
blade doing the update must be turned OFF before the firmware update
process is initiated. MDS600 firmware can only be updated using the
Firmware Maintenance CD in offline mode.
Note:
Staged firmware means the firmware is written to the chipset, but not
activated until the next reboot. Any firmware that is staged can be
installed together and activated at a later time.
It is not a best practice to use individual components to upgrade HP BladeSystem enclosure firmware.
Use installation tools such as HP SUM and VCSU to deploy components because these tools
understand the dependencies between components and installation limitations. These limitations and
dependencies can include certain components supporting only offline deployment, validating that the
correct driver is installed, ordering VC module updates to minimize any network outages.
22
Currently, SIM uses VCRM and VCA to handle version control in the SIM 5.x and earlier versions. The
VCRM must be installed on a server running Microsoft Windows Server 2003/2008 and must have
internet access to be able to automatically download the latest bundles and PSPs. The VCA must be
running on each target server that is to be managed by SIM. The VCA is available in both Windows
and Linux versions. Using the current version control infrastructure, SIM is able to deploy firmware
updates for a limited number of firmware types as listed in Table 7.
Table 7. Available firmware updates
System ROM X
iLO2 firmware X
PowerPIC firmware
SAS and SATA hard drive firmware behind Smart Array controllers X
OA firmware
VC firmware
HP StorageWorks MDS600
Note:
SIM 5.x cannot be used to update firmware on network based targets such
as the OA, ILO, or VC.
Important:
600 firmware update requires HPSUM 3.6.0 or later and that ALL blades
in an enclosure that have Smart Array P700M controllers except the blade
doing the update must be turned OFF before the firmware update process is
initiated. MDS600 firmware can only be updated using the Firmware
Maintenance CD in offline mode.
23
Because of the reduced coverage of the current SIM 5.x version control firmware update, SIM is not
recommended for maintaining BladeSystem firmware today.
When it becomes available, SIM 6.0 will have significantly improved firmware update capabilities,
including the ability to update network-based targets such as the OA and iLO. SIM is providing this
capability by building on top of the HP Smart Update Technology, specifically HP SUM. Over the next
several releases, additional functionality will be added to HP SIM and HP SUM that will enable
updates to be pulled dynamically from the web, baselines to be set for non-server based targets such
as OAs, iLOs, and VCs, the ability to set maintenance windows, and the ability to mass deploy
updates in enterprise environments.
The SIM 6.0 release also removes the requirement for the VCRM and VCA because SIM will be able
to leverage HP SUM directly without requiring additional infrastructure. While the current version
control architecture will be supported for several more years, the version control architecture will be
transitioned to SIM leveraging HP SUM instead of the VCRM and VCA. With the improved firmware
update capabilities this provides SIM 6.0, SIM can now be recommended as a possible option for
updating and managing firmware for enterprise environments. As Table 8 describes, SIM 6.0 will
have much better firmware coverage than the current SIM 5.x product.
Table 8. SIM 6.0 online/offline firmware updates
System ROM X
iLO2 firmware X
PowerPIC firmware X
SAS and SATA hard drive firmware behind Smart Array controllers X
OA firmware X
VC firmware
HP StorageWorks MDS600
With the updated firmware capabilities of SIM 6.0, all BladeSystem firmware that HP SUM is capable
of updating online will be available for deployment in SIM.
24
Important:
MDS600 firmware update requires HPSUM 3.6.0 or later and that ALL
blades in an enclosure that have Smart Array P700Mcontrollers except the
blade doing the update must be turned OFF before the firmware update
process is initiated. MDS600 firmware can only be updated by using the
Firmware Maintenance CD in offline mode.
Note:
When updating the firmware for the HP StorageWorks 3GB SAS BL Switch,
you must use VSM. Neither HP SUM nor VCSU is capable of updating this
firmware.
The firmware is updated by browsing to OA, opening VSM, uploading a binary image file and
selecting to update the firmware.
Important:
When using the VSM along with full-height blade servers residing in the HP
BladeSystem c3000 Enclosure, the Smart Array P700m must be installed in
mezz position 2. Installing the P700m controller in mezz position 3 of full
height blade servers in the c3000 enclosure is not supported at this time.
This issue will be corrected in a future release of the VSM software.
Important:
When two 3 Gb SAS BL switches are installed in the same row of an
enclosure, make sure that they are running the same firmware version.
Interactive mode Upload bin file through the VSM Not supported
is currently the only method to
upgrade this firmware
25
Follow these steps to update the firmware for the 3G SAS BL switch.
1. Download the firmware image for the 3G SAS BL switch to a workstation with network access
to the c-Class enclosure OA.
Locate the latest firmware image by browsing to www.hp.com and searching for 3G SAS BL
Switch firmware (Image File).
Note:
Firmware versions less than 2.0.0.0 only provide single open
zone support. By default, all blade servers have access to all
storage connected to the switch. This configuration is pre-
configured and cannot be altered. To restrict access to the
storage, use features included in your storage management
software.
Note:
Firmware versions 2.0.0.0 and higher support multi-zone
support. By default, for servers to access storage, switch-port or
drive-bay zone groups must be created. Zone groups provide
user-defined isolation within the switch.
2. Schedule a maintenance window to perform the firmware update, stop all traffic passing
through the switch, and turn off all servers and storage enclosures that connect to the switch.
3. Log in to OA as an administrator, and open the VSM for the 3G SAS BL Switch.
4. In the VSM Systems and Devices tree, choose the SAS switch to update, and then select Update
Firmware from the Available Tasks list.
5. Provide the path to the firmware image file, or press the Browse button to locate the firmware
image on the local machine, a mapped drive, or a network share, and then click OK to begin
the firmware update process.
6. When the firmware update is complete, select Reset Blade Switch under Available Tasks, and
then select Reset Now.
7. For configurations containing more than one 3G SAS BL Switch, repeat the firmware update
process to update the firmware on the other switch modules.
Note:
After updating the firmware, you must delete any temporary
internet files from the browser cache before logging back into OA
or VSM.
26
To obtain firmware updates based on these release sets for HP BladeSystem products, use the
following tools that contain the same release set versions:
HP BladeSystem Firmware Update Bundles
HP BladeSystem FDT
HP Firmware Maintenance CD
Note:
Individual smart components might still be released when critical updates
are required and will be integrated into the next release of the Firmware
Update Bundles, FDT, and Firmware Maintenance CD.
From another perspective, Table 11 identifies the correct tool to use depending on the update
scenario. Table 11 also describes the limitations of each scenario.
Table 11. Tool based on scenario
Scenario Description Limitations
I want to automatically update the Recommended deployment tool to use: Using this method updates all
server firmware offline HP BladeSystem FDT firmware in an enclosure with
the exception of OA and VC
Ethernet and Fibre Channel
Use this scenario when you: modules.
Want an automated way to update a blade
Do not need to update infrastructure Using the HP SUM pull-from-
firmware at the same time web feature to pull the latest
Want to leverage the BladeSystem enclosure updates is not supported in
27
Scenario Description Limitations
ability to load an ISO image to multiple offline environments.
server concurrently
Do not need feedback during the update
process
Do not need log files at the conclusion of the
installation for archival or debug purposes
Need to support devices that are only
updateable off line
Need to simultaneously update firmware on
multiple server blades
I want to update the server firmware Recommended deployment tool to use: Using this method updates all
offline but prefer a graphical HP Firmware Maintenance CD (FWCD) firmware in an enclosure with
installation or manual method the exception of OA and VC
Ethernet and Fibre Channel
Use this scenario when you: modules.
Want to manually update server blade
firmware
Using the HP SUM pull-from-
Do not want to do this under your normal web feature is not supported in
operating environment offline environments.
Need to flash firmware for devices that are
only updateable offline
Do not need to update infrastructure
firmware at the same time
Are not familiar with the OA web
interface
Only need to update a single blade server
within an enclosure
Only need to update firmware for a single
device
I want to update the server firmware Recommend deployment tool to use: Using this method, all firmware
online to a single server network- HP BladeSystem bundle for Windows except the following can be
based host, such as the OA, iLO2 and updated:
HP B lad e Syst em B und le fo r Li nux
VC Ethernet and Fibre Channel NetXen NIC
Modules HP Firmware Maintenance CD (FWCD)
Emulex FC HBA
QLogic FC HBA
Use this scenario when you:
Brocade FC HBA
Want to manually update server blade
firmware These types of firmware must
be updated offline using either
Do not want to do this under your normal
the BladeSystem FDT or the HP
operating environment
Firmware Maintenance CD.
Need to flash firmware for devices that are
only updateable offline
Do not need to update infrastructure
firmware at the same time
Are not familiar with t he OA web
interface
Only need to update a single blade
server within an enclosure
I want to update the server firmware Recommend deployment tool to use: Using this method, all firmware
online to multiple servers and network- HP BladeSystem Bundle for Windows except the following can be
based host such as OA and iLO 2. updated:
HP BladeSystem Bundle for Linux
NetXen NIC
HP Firmware Maintenance CD (FWCD)
Emulex FC HBA
QLogic FC HBA
Use this scenario when you:
Brocade FC HBA
Want to manually update server tabs, OA,
28
Scenario Description Limitations
or iL0 2 firmware
Want the option to script updates to a single These types of firmware must
or to multiple servers and enclosures be updated offline using either
Need to update infrastructure firmware the BladeSystem FDT or the HP
Firmware Maintenance CD.
Are not familiar with the OA web interface
Need to minimize downtime across the
enclosure
Want to stage updates so blades can be
rebooted at a later time to activate the new
firmware
Need to update many servers simultaneously
I want to update the VC firmware Recommended deployment tools to use: If updating from VC firmware
(VCSU versions before 1.34, the VC
firmware must be updated
HP BladeSystem Bundle for Windows
before the OA firmware.
HP BladeSystem Bundle for Linux
29
Note:
HP supports the current and two previous versions of the BladeSystem
Firmware Update Bundles as indicated in the HP BladeSystem Firmware
Compatibility chart.
These BladeSystem Firmware Update Bundles allow you to update the BladeSystem firmware that is
listed in Table 12.
Table 12. BladeSystem firmware update bundles
Firmware types Supported by HP BladeSystem Firmware Update Bundle (Online only,
supports both local and remote deployment)
iLO 2 firmware Yes, both server-based and directly to the iLO Management port
PowerPIC firmware Yes, beginning with bundle 1.60 released in July 2009
SAS and SATA hard drive firmware behind Yes, some older SATA drives might not be supported if they are for
Smart Array controllers offline only deployment
OA firmware Yes
HP StorageWorks MDS600 No
Important:
MDS600 firmware update requires HPSUM 3.6.0 or later and that ALL
blades in an enclosure that have Smart Array P700Mcontrollers except the
blade doing the update must be turned OFF before the firmware update
process is initiated. MDS600 firmware can only be updated using the
Firmware Maintenance CD in offline mode.
Important:
The HP 3Gb SAS BL switch firmware can only be updated by uploading a
bin file through the Virtual S AS Manager (VSM) product. This
firmware is currently delivered as a binary image file on the HP website
and must be downloaded and manually upgraded as it is not available on
any other tools discussed in this document.
30
Note:
Because HP BladeSystem Firmware Update Bundles do not provide the
ability to update all possible firmware types, additional deployment tools
must be used to ensure all firmware is updated within a BladeSystem
enclosure and to align with the HP BladeSystem Compatibility Chart. To
update the firmware that cannot be updated by HP BladeSystem Firmware
Update Bundles, use the BladeSystem FDT or the HP Firmware Maintenance
CD. The latest version can be obtained from
http://www.hp.com/go/bladesystemupdates/.
HP BladeSystem FDT
The HP BladeSystem FDT is an offline-only ISO image containing a collection of HP SUM and
firmware smart components that have been tested together to ensure compatibility. The FDT has been
designed for those servers that do not have an installed OS yet or that want an unattended
method of deploying firmware in an offline environment. As presented in Scenario 6, the FDT
can be scripted for remote deployment to multiple servers using the iLO Advanced Lic ense feature
for scripted virtual media.
Because the FDT requires you to boot to it, the server must be taken offline for the period of time
required to complete the firmware update.
When you boot to the FDT, all feedback is provided through the UID lights. While the update process
is running, the UID light blinks. Upon completion, the UID light is set to one of two states:
If the UID light is off, the update process has completed and the server OS can be installed or the
server restarted to its previous OS.
If the UID light is solid, a firmware update failure has occurred requiring user attention. The user
should either plug in the KVM dongle or use iLO Remote Console support to browse into the
affected server to determine the cause of the failure. The FDT loads the error log into a vi edit for
review.
HP highly recommends that the issue causing the failure be resolved before installing or restarting the
OS to prevent issues that could affect server operation. For more information on how to handle
various firmware update failure scenarios, see Troubleshooting HP BladeSystem FDT.
The FDT was designed with limited user intervention and feedback in mind. To log files or feedback
beyond the UID lights, use other firmware update tools such as the HP Firmware Maintenance CD.
Important:
Prior to iLO firmware version 1.79, using the iLO Remote Console while the
iLO firmware was being updated could corrupt the iLO firmware image
and prevent the server from rebooting after a firmware update operation. It
is strongly recommended that if the iLO Remote Console not be used to
browse into a blade updating firmware if the UID light is blinking to prevent
this condition from occurring.
Note:
Use OA version 2.51 or later to get a list of all major firmware versions
deployed in your enclosure by using the Rack Firmware link on the main
OA web page.
31
Note:
HP supports the current and two previous versions of the BladeSystem FDT.
Table 13 lists the HP BladeSystem FDT used to update the BladeSystem firmware.
SAS and SATA hard drive firmware behind Smart Array controllers Yes
SAS and SATA hard drive firmware behind non-Smart Array controllers No
Emulex, QLogic, and Brocade Fibre Channel host bus adapter firmware Yes
OA firmware No
VC firmware No
HP StorageWorks MDS600 No
Important:
MDS600 firmware update requires HPSUM 3.6.0 or later and that ALL
blades in an enclosure that have Smart Array P700Mcontrollers except the
blade doing the update must be turned OFF before the firmware update
process is initiated. MDS600 firmware can only be updated using the
Firmware Maintenance CD in offline mode.
Important:
The HP 3Gb SAS BL switch firmware can only be updated by uploading a
bin file through the Virtual SAS Manager (VSM) product. This firmware is
currently delivered as a binary image file on the HP website and must be
downloaded and manually upgraded as it is not available on any other
tools discussed in this document.
32
HP Firmware Maintenance CD
The HP ProLiant Firmware Maintenance CD provides a collection of HP SUM and firmware in an ISO
image that can be used either in an offline, interactive mode, or online in either a scripted or
interactive mode. The Firmware Maintenance CD provides firmware for supported HP servers and
options. The Firmware CD contains all the firmware for the BladeSystem enclosures with the exception
of the VC firmware. The VC firmware is not available on the Firmware Maintenance CD because of
its size and limited space on the CD.
In offline mode, the Firmware Maintenance CD boots a small Linux kernel and enables firmware
updates to take place on a single server using the embedded HP SUM software. Because of the
special boot environment, support for remote servers and hosts is not available.
In online mode, you can leverage the autorun utility to launch HP SUM or browse the CD to the
\compaq\swpackages directory and execute it directly.
All firmware smart components are placed in the \compaq\swpackages directory for use by HP SUM.
If you require additional firmware smart components, copy the Firmware Maintenance CD to a USB
key, and then add these additional components to the \compaq\swpackages directory. If HP SUM
supports the type of firmware added, it is automatically picked up the next time HP SUM is executed.
For more information on the firmware update process using the HP Firmware Maintenance CD and
HP SUM, see the Firmware CD User Guide. The latest HP SUM User Guide is included in the
Firmware CD User’s Guide. To obtain a copy of this PDF file, see ftp://ftp.hp.com/pub/c-
products/servers/management/smartstart/ and select the latest version of the
FWCDUsersGuidex.xx.pdf.
Note:
Use OA 2.51 or later to get a list of all major firmware versions deployed
in your enclosure using the Rack Firmware link on the main OA web page.
Note:
HP supports the current and two previous versions of the Firmware
Maintenance CD.
The Firmware Maintenance CD provides the means to update the following BladeSystem firmware.
Table 14 lists the firmware types that are supported by the HP Firmware Maintenance CD.
Table 14. Firmware support
Firmware types Supported by HP Firmware Maintenance CD
33
Firmware types Supported by HP Firmware Maintenance CD
Emulex, QLogic, and Brocade Fibre Channel HBA Yes, offline only
firmware
VC firmware Yes, online only and components must be downloaded from the web and
added to the CD
HP StorageWorks MDS600 Yes, offline only (see important note below for more details of special
requirements to update this firmware type)
HP 3Gb SAS BL switch firmware
No
Important:
MDS600 firmware update requires HPSUM 3.6.0 or later and that ALL
blades in an enclosure that have Smart Array P700Mcontrollers except the
blade doing the update must be turned OFF before the firmware update
process is initiated. MDS600 firmware can only be updated using the
Firmware Maintenance CD in offline mode.
Important:
The HP 3Gb SAS BL switch firmware can only be updated by uploading a
bin file through the Virtual SAS Manager (VSM) product. This firmware is
currently delivered as a binary image file on the HP website and must be
downloaded and manually upgraded as it is not available on any other
tools discussed in this document.
Note:
Because firmware might be able to update only in online or offline mode
for some components, you might need to execute the HP Firmware
Maintenance CD both online and offline to update all the firmware in an
enclosure.
Note:
VC firmware components are not shipped on the HP Firmware
Maintenance CD because of their size (approximately 50 MB per
component). However, if the VC firmware components are downloaded
from www.hp.com, they can be added to the Firmware Maintenance CD
by creating a USB key using the USB Key Utility. The latest version can be
obtained from http://www.hp.com/go/bladesystemupdates.
34
are indicated as a cross-reference to use when planning updates for these individual firmware types
for the various operational modes.
System ROM
System ROM firmware is staged and not immediately activated upon update. This means that the
firmware image is written to the physical ROM chip in the server but will not be activated until the
server is rebooted. While it is recommended that a reboot occur as soon as possible to activate new
firmware, there is no harm in leaving the System ROM image deployed and rebooting the server
during a later maintenance window.
System ROM Firmware can be updated using the version of HP SUM provided in the HP BladeSystem
Firmware Update Bundles for Windows or Linux if an OS has already been installed on the blade.
If an OS has not yet been installed and you want an automated method of installation, use the HP
BladeSystem FDT. HP SUM is embedded within the tool and updates the System ROM if an update is
required during the silent, automated firmware update process provided by the FDT.
If an OS has not been installed and you want an interactive, offline method of installation, use the HP
Firmware Maintenance CD deployment tool. HP SUM is embedded within the tool and enables the
System ROM to be updated interactively.
Table 15. Deployment tools for online/offline modes
Deployment tools to use Online mode Offline mode
Note:
While individual smart components are made available for System ROM
firmware updates, they are not recommended for update scenarios unless
absolutely necessary. If new smart components are released to resolve
critical issues, the components can be added to any of the tools above and
picked up by HP SUM automatically.
Note:
For information on how to add components to an existing tool, see How do
I add updated components to the HP BladeSystem FDT? or How do I add
updated components to the HP Firmware Maintenance CD?
iLO2 firmware
iLO2 firmware is activated immediately upon update of the iLO2 by resetting the iLO2. This reset
disconnects any virtual media devices and remote consoles through the iLO2. This reset normally
takes less than a minute to occur and does not affect the OS or any running applications. The server
does not need to be rebooted to activate the iLO2 firmware.
35
Note:
HP does not recommend that you update the iLO2 firmware with the
Firmware Maintenance CD by using Virtual Media. The reset of the Virtual
Media is similar to pulling the media out of a drive and will result in the
Firmware Maintenance CD installation hanging because the media is no
longer available.
iLO2 firmware can be updated by using the HP BladeSystem Firmware Update Bundles for Windows
or Linux in one of two ways.
If the OS-specific iLO2 driver is installed, update the iLO2 firmware on a server with a running OS.
To deploy iLO2 firmware by this method, first install the OS-specific iLO2 driver using HP SUM and
the driver provided by the HP BladeSystem Firmware Update Bundles for Windows or Linux, or
from the HP (PSP. Then use HP SUM as provided in the BladeSystem Firmware Update Bundles to
update the firmware.
When a workstation or server is connected to the same network as the iLO2 NIC Management Port,
update the firmware directly to the iLO2 NIC Management Port. To deploy iLO2 firmware by this
method, use the HP SUM to add the iLO2 Management Port as a target host and provide the iLO2
credentials when prompted. The iLO firmware update can also be scripted by passing the iLO IP
address or DNS name along with the iLO userid and password on the HP SUM command-line. HP
SUM must be in the -s or --silent mode to work in scriptable mode.
If an OS has not yet been installed and you want an automated method of installation, use the HP
BladeSystem FDT. HP SUM is embedded within the tool and updates the iLO2 firmware if an update
is required during the silent, automated firmware update process provided by the FDT.
If an OS has not been installed and you want an interactive, offline method of installation, use the HP
Firmware Maintenance CD deployment tool. HP SUM is embedded within the tool and enables the
iLO2 firmware to be updated interactively.
Table 16. Deployment tools for online/offline modes
Deployment tool to use Online mode Offline mode
Note:
While individual smart components are made available for iLO2 firmware
upgrades, they are not recommended for upgrade scenarios unless
absolutely necessary. If new smart components are released to resolve
critical issues, the components can be added to any of the tools above and
picked up by HP SUM automatically.
36
Note:
HP SUM cannot update the iLO firmware from the web if the iLO driver is
not already loaded before starting the firmware update process. The iLO
driver must be present and running for HP SUM to detect the installed
version of iLO firmware. Failure to install the iLO driver before starting HP
SUM results in the iLO firmware component being placed in the No Device
Driver Found section and the need to run the HP SUM update again once
the iLO driver has been installed to properly update the iLO firmware.
Note:
New versions of the iLO firmware can be dropped into the
\compaq\swpackages directory and picked up by HP SUM
automatically. In Linux, you must leave the old version of the iLO firmware
in the directory for HP SUM to correctly detect the iLO firmware version.
While the latest iLO firmware component is installed, HP SUM needs the
older component to handle the version detection. Removal of the older
driver in Linux could cause HP SUM to be unable to detect the installed
version of iLO firmware and report that the iLO driver is not loaded. The
older iLO firmware component can be removed in Windows without any
issues.
Note:
For information on how to add components to an existing tool, see How do
I add updated components to the HP BladeSystem FDT? or How do I add
updated components to the HP Firmware Maintenance CD?
NIC firmware
Currently, the Broadcom NIC firmware is the only type of NIC firmware supported by HP. As
firmware for new NIC options is released, HP will also provide additional mechanisms for updating
the Intel and NetXen NIC firmware.
Broadcom and Intel NIC firmware can be updated using the HP BladeSystem Firmware Update
Bundles for Windows or Linux. However, the corresponding OS-specific NIC driver must be
previously installed. You can obtain a NIC driver by using the one available in the HP BladeSystem
Firmware Update Bundles for Windows or Linux or from the HP ProLiant Support Pack (PSP and then
use the HP BladeSystem Firmware Update Bundles to update the firmware.
If an OS has not yet been installed and you want an automated method of installation, use the HP
BladeSystem FDT regardless of the type of NIC firmware being updated. HP SUM is embedded within
the tool and updates the NIC firmware if an update is required during the silent, automated firmware
update process provided by the FDT.
If an OS has not been installed and you want an interactive, offline method of installation, use the HP
Firmware Maintenance CD deployment tool. HP SUM is embedded within the tool and enables the
NIC firmware to be updated interactively.
Table 17. Deployment tools for online/offline modes
Deployment tool to use—Broadcom Online mode Offline mode
and Intel NIC
37
In addition, for the Broadcom NICs, there are some special cases where depending on the
functionality of the adapter, different firmware may be preloaded on the adapter. An example of this
is the HP NC373i Multifunction Gigabit Sever Adapter and the HP NC373m Multifunction Gigabit
Server Adapter. The adapter is released in two forms. One form includes iSCSI support and is
versioned in the 1.x.x range. The same adapter is also available without iSCSI support and has
firmware versioned in the 4.x.x range. The NIC firmware component is intelligent enough to only load
the appropriate firmware on the adapter. Because of the different functionality the different types of
firmware enable, it is important to use the NIC firmware components and HP SUM to deploy the NIC
firmware and not attempt to update the firmware directly to prevent loss of functionality.
For the NetXen NIC firmware, the HP BladeSystem FDT or the HP Firmware Maintenance CD must be
used to update the firmware as the NetXen NIC firmware can only be updated in an offline manner.
Table 18. Deployment tools for online/offline modes
Deployment tool to use—NetXen NIC Online mode Offline mode
Note:
While individual smart components are made available for NIC firmware
updates, HP does not recommend them for update scenarios unless
absolutely necessary. If new smart components are released to resolve
critical issues, the components can be added to any of the tools above and
picked up by HP SUM automatically.
Note:
When downgrading or rewriting NIC firmware, use the GUI method or the
NIC firmware is not updated. This is because the HP SUM downgrade and
rewrite options require that the individual NIC adapters be selected even
after the force option has been enabled. This prevents downgrading
firmware on all adapters by default because some adapters can be de-
featured if their firmware is downgraded to a version that does not support
a given feature.
Note:
For information on how to add components to an existing tool, see How do
I add updated components to the HP BladeSystem FDT? or How do I add
updated components to the HP Firmware Maintenance CD?
Note:
PowerPIC firmware 3.4(C) is required to interface with HP SUM.
Note:
While iLO2 firmware1.70 attempts to update the PowerPIC firmware,
issues occur when the PowerPIC is updated because the iLO2 resets during
its own firmware update. Because of this issue, HP recommends that you do
not use iLO2 firmware 1.70 on any blade server.
Note:
For details on how to troubleshoot PowerPIC firmware, see Troubleshooting
PowerPIC firmware update errors.
Update PowerPIC firmware by using the HP BladeSystem Firmware Update Bundles for Windows or
Linux starting with version 1.0. Make sure that you meet the dependencies listed previously, including
installation of the iLO2 driver. The HP BladeSystem Firmware Update Bundles contain a supported
version of the iLO2 drivers for Windows and Linux. If a driver is not currently installed, you must
install the driver first by using HP SUM. The HP BladeSystem Firmware Update Bundles that are
deployed during this installation ensure that the PowerPIC firmware update succeeds.
If an OS has not yet been installed and you want an automated method of installation, HP
recommends that you use the HP BladeSystem FDT 1.60 or later deployment tool for PowerPIC
firmware updates.
If an OS has not been installed and you want an interactive, offline method of installation, HP
recommends that you use the HP Firmware Maintenance CD 8.60 or later deployment tool. HP SUM
is embedded within the tool and enables the PowerPIC firmware to be updated interactively.
Table 19. Deployment tools for online/offline modes
Deployment tool to use Online mode Offline mode
Note:
While individual smart components are made available for PowerPIC
firmware updates, HP does not recommend them for update scenarios
unless absolutely necessary.
39
Note:
A workaround is required for HP SUM included in the HP Firmware
Maintenance CD 8.60 to correctly install the PowerPIC firmware in offline
mode.
Follow these steps to correctly install the PowerPIC firmware in offline mode:
1. Create a USB key by using the HP USB Key Creator Utility.
2. Edit the master_dependencies.xml file by using Notepad or vi.
3. Change the PowerPIC-Iris Blades.
<component name="PowerPIC-Iris-Blades" type="firmware:QLOGIC" >
<hpsum_prerequisites version="1" >
<is_staged_updated value="No" />
<installation_mode value="both" />
<blade value="n/a" />
<enforce_supported_operating_systems value="no" />
<configuration type="None" >
<filename />
</configuration>
<prerequisite_list relation="AND" >
<prerequisite>
<mode>both</mode>
<product type="firmware:ilo2" id="ILO2" />
<version value="1.78" />
<path></path>
<condition>InstalledBefore</condition>
<compare_type>GTE</compare_type>
<compare_time>Install</compare_time>
<description lang="en">Online ROM Flash Component - HP
Integrated Lights-Out 2</description>
<description lang="ja">Online ROM Flash Component - HP
Integrated Lights-Out 2</description>
</prerequisite>
</prerequisite_list>
<supported_devices>
<supported_devices_remove>
<id value="0E11.B204.103C.3304" />
<id value="0E11.B204.103C.3305" />
</supported_devices_remove>
</supported_devices>
<discovery_prerequisite_list />
<uninstalled_products_list />
<install_instructions />
</hpsum_prerequisites>
</component>
4. Once the file has edited, save it, and then use the Firmware Maintenance CD as normal.
Note:
HP SUM provides the capability to update the PowerPIC firmware by
allowing you to retrieve the latest updates from the HP website. For this
functionality to work correctly when using PowerPIC firmware, you must
install the iLO driver before starting the firmware update process. If you do
not install the iLO driver before starting HP SUM, the PowerPIC firmware
component is placed in the No Device Driver Found section. You are
required to run the HP SUM update again when the iLO driver is installed
to correctly update the PowerPIC firmware.
40
Note:
For information on how to add components to an existing tool, see How do
I add updated components to the HP BladeSystem FDT? or How do I add
updated components to the HP Firmware Maintenance CD?
Note:
The Smart Array Controller driver must be installed in order for the Smart
Array Controller firmware to be updated.
Note:
While individual smart components are made available for Smart Array
Controller firmware updates, they are not recommended for update
scenarios unless absolutely necessary. If new smart components are
released to resolve critical issues, the components can be added to any of
the tools above and picked up by HP SUM automatically.
Note:
For information on how to add components to an existing tool, see How do
I add updated components to the HP BladeSystem FDT? or How do I add
updated components to the HP Firmware Maintenance CD?
41
Note:
None of the current installation tools can update SAS or SATA hard drive
firmware behind non-Smart Array Controllers.
Update SAS and most SATA Hard Drive Firmware by using the version of HP SUM provided in the HP
BladeSystem Firmware Update Bundles for Windows or Linux if an OS is already installed on the
blade.
If an OS has not yet been installed and you want an automated method of installation, use the HP
BladeSystem FDT. HP SUM is embedded within the tool and updates the SAS and SATA hard drive
firmware if an update is required during the silent, automated firmware update process provided by
the FDT.
If an OS has not been installed and you want an interactive, offline method of installation, use the HP
Firmware Maintenance CD deployment tool. HP SUM is embedded within the tool and enables the
SAS and SATA hard drive firmware to be updated interactively.
Table 21. Deployment tools for online/offline modes
Deployment tool to use Online mode Offline mode
Note:
Some older SATA hard drives might require offline mode because they do
not have an online equivalent.
Note:
Currently, HPSUM does not support firmware updates for SAS or SATA
hard drives located behind non-Smart Array controllers. See the web pages
for the individual SAS and SATA hard drive firmware releases for the steps
on how to update these drives.
Note:
The Smart Array Controller driver must be installed to update SAS and
SATA hard drive firmware.
Note:
To update some older SATA drives, make sure that they do not have active
I/O operations. You can only update these older SATA drives by using
either the Firmware Maintenance CD or the FDT ISO.
Note:
While individual smart components are made available for SAS and SATA
hard drive firmware updates, they are not recommended for update
scenarios unless absolutely necessary. If new smart components are
released to resolve critical issues, the components can be added to any of
the tools above and picked up by HP SUM automatically.
Note:
For information on how to add components to an existing tool, see How do
I add updated components to the HP BladeSystem FDT? or How do I add
updated components to the HP Firmware Maintenance CD?
42
Emulex, QLogic, and Brocade Fibre Channel HBA firmware
Emulex, QLogic and Brocade Fibre Channel HBA firmware have dependencies that must be met
before installation. Install the appropriate Emulex, QLogic and Brocade Fibre Channel HBA controller
driver. You must update the HBA firmware while the HBAs are not processing I/O. Because of the
nature of HBA firmware updates, this dependency requires you to update the HBA firmware offline.
If you want an automated method of installation, use the HP BladeSystem FDT. HP SUM is embedded
within the tool and updates the QLogic, Brocade and Emulex HBA firmware if an update is required
during the silent, automated firmware update process provided by the FDT.
For an interactive method of installation, use the HP Firmware Maintenance CD deployment tool. HP
SUM is embedded within the tool and enables the Emulex and QLogic HBA firmware to be updated
interactively. For some HBAs, there are multiple firmware types such as Boot Block and BIOS that must
both be updated.
Table 22. Deployment tools for online/offline modes
Deployment tool to use Online mode Offline mode
Note:
The BladeSystem Firmware Update Bundles cannot be used to update HBA
firmware.
Note:
While individual smart components are made available for QLogic and
Emulex HBA firmware updates, they must be used with HP SUM in an
offline environment with the appropriate driver already loaded as part of
the boot process. HP does not recommend using the smart components
individually unless absolutely necessary. If new smart components are
released to resolve critical issues, the components can be added to any of
the tools above and picked up by HP SUM automatically.
Note:
For information on how to add components to an existing tool, see How do
I add updated components to the HP BladeSystem FDT? or How do I add
updated components to the HP Firmware Maintenance CD?
Note:
While individual smart components are made available for Tape Blade
firmware updates, they are not recommended for update scenarios unless
absolutely necessary. If new smart components are released to resolve
critical issues, the components can be added to any of the tools above and
picked up by HP SUM automatically.
OA firmware
There are many methods to update OA firmware. Many of these methods require knowledge of the
OA Command-Line Interface and various utilities. Because these methods only allow the OA firmware
to be updated and do not take into account the total release set of OA, iLO, System ROM and other
firmware, HP recommends that you do not use these methods. Instead, use the version of HP SUM
provided in the HP BladeSystem Firmware Update Bundles for Windows or Linux.
There are a few requirements for updating OA firmware. You must connect a workstation to the same
network as the OA network port. Also, you must have OA administrator credentials. Other types of
OA credentials do not allow firmware updates. Finally, the OA firmware can only be updated online.
You cannot use tools such as the HP BladeSystem FDT and you cannot boot to the HP Firmware
Maintenance CD.
Execute HP SUM from a workstation or server running any supported version of a Windows or Linux
OS. You can execute HP SUM, select remote installation, add the IP address or DNS name of the OA
network port as a remote host and HP SUM will automatically detect the target is an OA and only
allow the OA firmware to be selectable.
An alternative method of updating the OA firmware is to use the HP Firmware Maintenance CD in
online mode. This requires you to run HP SUM from a workstation or server running a supported
version of Windows or Linux, just like when using the HP BladeSystem Firmware Update Bundles.
Table 24. Deployment tools for online/offline modes
Deployment tool to use Online mode Offline mode
Scripted or Automated Mode HP BladeSystem Online Firmware Bundles for Not Supported
Windows and Linux in silent mode
Note:
Using the HP BladeSystem FDT or the HP Firmware Maintenance CD in
offline mode (booting to the ISO or media) is not supported for updating
OA firmware.
44
Note:
While individual smart components are made available for OA firmware
updates, they are not recommended for update scenarios unless absolutely
necessary. If new smart components are released to resolve critical issues,
the components can be added to any of the tools above and picked up by
HP SUM automatically.
Note:
For information on how to add components to an existing tool, see How do
I add updated components to the HP Firmware Maintenance CD?
Note:
If using VC Ethernet or Fibre Channel modules and the firmware version is
earlier than version 1.34, network outages might occur. HP recommends
that you update the VC firmware to version 1.34 or greater to prevent this
network downtime from occurring when the OA firmware is updated.
Installation order
If the VC Ethernet firmware is version 1.34 or later, or you are not using VC in your blade enclosures,
the following is the recommended installation order.
If an OS has already been installed:
1. Update the blades and the OA first using the HP BladeSystem Online Firmware Bundles for
Windows and Linux using a workstation connected to the same network as the OA.
2. Use the HP BladeSystem FDT or HP Firmware Maintenance CD to update any offline only
firmware.
3. Use the VCSU from a workstation connected to the same network(s) as the OA and VC Ethernet
modules to update the VC firmware after all other updates are applied, servers are rebooted,
and all firmware is activated.
VC firmware
As with the OA firmware, there are many methods to update VC firmware. Many of these methods
require knowledge of the VCM CLI or web browser or require the installation of the VCEM and
45
various other utilities. HP recommends the use of VCSU to update VC firmware as the most direct
path.
VC firmware is provided as .bin files until version 2.10. As of version 2.10, smart components that
contain .bin files and the VCSU have been made available. Currently, there are two smart
components. One of the smart components contains the Ethernet module firmware and 4 GB Fibre
Channel Module firmware updates. The second smart component contains the same Ethernet module
firmware and the 8GB Fibre Channel Module firmware updates. Initially, this was done because of
the size of the firmware images (about 50MB each) that prevented them from being uploaded
completely into the VC. With planned enhancements in the VCSU, eventually, all three modules are
combined into a single component containing the VCSU.
There are a few dependencies for updating VC firmware. You must connect a workstation to the same
network as the VC management port. Also, you must have both the OA and VC administrator
credentials. Because the VCSU uses information from the OA in updating the VC firmware, it requires
both sets of credentials. Finally, the VC firmware can only be updated online. You cannot use tools
such as the HP BladeSystem FDT and you cannot boot to the HP Firmware Maintenance CD.
The VCSU provides a command-line scriptable method to update the VC firmware. It also contains
logic that minimizes any network and fabric outages caused by the update process under certain VC
configurations. In some cases, the VCSU can eliminate all outages during the firmware update
process if correct redundancy has been installed. VCSU must be executed from a Windows or Linux
(requires version 1.40 or later of VCSU) workstation or server.
An alternative method of updating VC firmware is to use the HP BladeSystem Online Firmware
Bundles for Windows and Linux. VC firmware update support was added to the HP SUM beginning
with version 3.5.0. HP SUM can deploy the VC smart components using the VCM interface. The VCM
interface is being deprecated in the VC firmware 3.0.0 release, and HP SUM will be enhanced to use
the VCSU embedded in the smart components to support VC firmware updates. The HP BladeSystem
Online Firmware Bundles for Windows and Linux provide the necessary support starting with version
1.60 and later.
Table 25. Deployment tools for online/offline modes
Deployment tool to use Online mode Offline mode
Scripted or Automated Mode HP BladeSystem Online Firmware Bundles for Not supported
Windows and Linux in silent mode
46
Note:
While the HP Firmware Maintenance CD can be used in online mode to
update VC firmware, there are many manual steps involved. Because of
their size, the VC firmware smart components must be downloaded from
the HP website because they will not fit on the HP Firmware Maintenance
CD ISO. When they are downloaded, the HP Firmware Maintenance CD
must be copied to read-write media and the VC firmware smart components
copied to the \compaq\swpackages directory. When this is finished, HP
SUM can be executed to deploy the VC firmware components. Because the
VC firmware is not shipped on the HP Firmware Maintenance CD, HP does
not recommend this method because it is possible to download VC
firmware that would not be compatible with the HP SUM version on the HP
Firmware Maintenance CD.
Note:
Using the HP BladeSystem FDT or the HP Firmware Maintenance CD in
offline mode (booting to the ISO or media) is not supported for updating
VC firmware.
Note:
While individual smart components are made available for VC firmware
updates, they are not recommended for update scenarios unless absolutely
necessary. If new smart components are released to resolve critical issues,
the components can be added to any of the tools above and picked up by
HP SUM automatically.
Note:
HP SUM 3.5.0 can update VC firmware to version 2.10 only. To update to
VC firmware versions greater than 2.10, HP SUM 3.6.2 or later must be
used.
Important:
If you are using the VCEM software, the VC domains must be placed in
maintenance mode before firmware updates are allowed.
Note:
Versions of HP SUM earlier than 3.6.2 have a known issue if the VC log
contains more than 650 entries. The issue will be seen as a Discovery
Failed message in HP SUM when attempting to update the VC firmware on
those VCs in this condition. Moving to HP SUM 3.6.2 or later or clearing
the VC System Log allows the firmware update to proceed.
Note:
For information on how to add components to an existing tool, see the How
do I add updated components to the HP Firmware Maintenance CD?
Important:
If the VC configuration is not redundant or if the VC firmware version is
earlier than version 1.34, a network fabric downtime of up to 10 minutes
can occur while the firmware is being activated. This affects all servers in
the enclosure and prevents network access until the VC firmware is
activated.
47
Note:
Because of the possibility of NIC fabric downtime during a VC firmware
installation, HP strongly recommends that the VC be updated from a
workstation outside the enclosure to ensure continuous network access to
the firmware update utilities.
Installation order
If the VC Ethernet firmware is version 1.34 or later, or you are not using VC in your blade
enclosures, the following is the recommended installation order.
If an OS has already been installed:
1. Update the blades and the OA first using the HP BladeSystem Online Firmware Bundles for
Windows and Linux using a workstation connected to the same network as the OA.
2. Use the HP BladeSystem FDT or HP Firmware Maintenance CD to update any offline only
firmware.
3. If needing to update VC Ethernet firmware, use the VCSU from a workstation connected to the
same network(s) as the OA and VC Ethernet modules to update the VC firmware after all other
updates are applied, servers are rebooted, and all firmware is activated.
If an operating has not yet been installed:
1. Update the OA first using the HP BladeSystem Online Firmware Bundles for Windows and
Linux using a workstation connected to the same network as the OA.
2. Use the VCSU from a workstation connected to the same network(s) as the OA and VC Ethernet
modules to update the VC firmware after all other updates are applied, servers are rebooted,
and all firmware is activated.
3. Use the HP BladeSystem FDT or HP Firmware Maintenance CD to update all server-specific
firmware.
48
only the offline mode of the Firmware Maintenance CD can be used to update the firmware for the
MDS600 storage enclosure.
The current version of MDS600 firmware is 2.54(B) as of the writing of this document. Most MDS600
storage enclosures should be at that level when shipped from the factory. Until new firmware updates
are made available, administrators do not need to include the MDS600 storage enclosure support in
their firmware update plans.
To update the MDS600 firmware, first power off all blades except the blade that will run the update.
Once the blades are powered off, the Firmware Maintenance CD must be booted offline on one of
the blades within the enclosure. There are a number of ways to boot the Firmware Maintenance CD
offline. To determine the best one to use in your environment, review Scenario 1C: Updating an
individual server using the HP Firmware Maintenance CD for the steps needed to perform the
firmware update.
Table 26. Deployment tools for online/offline modes
Note:
The BladeSystem FDT cannot be used to update the MDS600 storage
enclosure firmware. Because the FDT is a single server firmware-update
tool, there is no way to guarantee any given server executing it is the right
one to update the MDS600. Because there is no guarantee, the Firmware
Maintenance CD must be used in offline mode.
Note:
Because the Firmware Maintenance CD must be used to update the
MDS600 storage enclosure and because the Firmware CD cannot be
executed using iLO Virtual Media if the iLO needs to be updated, the iLO
firmware update component must be deselected if it shows an update is
needed before flashing the MDS600 storage enclosure firmware.
Note:
For information on how to add components to an existing tool, see How do
I add updated components to the HP Firmware Maintenance CD?
49
If the VC firmware version is earlier than version 1.34, update VC firmware before the OA
firmware to prevent a network disconnection.
Starting with VC firmware version 1.34 and later, the VC firmware should be updated after the OA
firmware.
The recommended firmware update strategies as documented in the following sections are intended to
minimize downtime and provide the least intrusive method of updating the OA, VC Ethernet, Fibre
Channel Modules, and servers in a given enclosure(s) that have been daisy-chained together.
Depending on the deployment tool, some of these will scale better to larger environments than others.
In each scenario, at least two options are provided. For more information, see Choosing the
deployment tool.
Table 27 lists the step-by-step instructions for each scenario.
Table 27. Installation scenarios
Scenario Description
2. HP BladeSystem FDT
Updating the OA Recommended deployment tool:
firmware using H P F i r m w a r e M a i n t e n a n c e C D
HP BladeSystem Firmware Update Bundles for Windows or Linux
Updating the OA
Use the OA web interface
firmware using HP
SUM
Updating the OA
firmware using the
OA browser
interface from a
workstation
Scenario 2C:
Updating the OA
firmware using the
OA CLI interface and
a web server
50
Scenario Description
3. Updating Recommended deployment tool:
the VC VCSU
firmware
HP BladeSystem Firmware Update Bundles for Windows or Linux
o using VCSU
o using the HP
SUM
o in a DMZ
HP BladeSystem FDT
HP Firmware Maintenance CD
HP BladeSystem Firmware update Bundles for Windows and Linux
VCSU
51
Scenario Description
HP BladeSystem FDT
HP BladeSystem Firmware Update Bundles for Windows or Linux
8. I want to update The only method available for updating this firmware is to download the binary firmware image
my HP 3 Gb SAS from the HP website and use the HP Virtual SAS Manager (VSM) to upload the firmware to the
BL Switch switch.
firmware
For information on how to update this firmware, see the Virtual SAS Manager (VSM) .
Installation scenarios
Scenario 1A: Updating an individual server using the HP BladeSystem
Firmware Update Bundles
Note:
To update any firmware that requires an offline environment, the HP
BladeSystem Firmware Update Bundles cannot be used to update that
firmware. In the case of the Emulex and QLogic HBA firmware updates, the
HP BladeSystem Firmware Update Bundles must be used in conjunction with
the HP Firmware Maintenance CD or the FDT ISO to fully update all
available firmware on an individual server.
52
The following instructions can be used to update the firmware on an individual server using the HP
BladeSystem Firmware Update Bundles for Windows or Linux.
1. Download the HP BladeSystem Firmware Update Bundles from the hp website. Links to the
latest versions are posted on the BladeSystem Compatibility Chart web pages and can be
accessed through the http://www.hp.com/go/bladesystemupdates URL. The files are
called:
hpblade_fw_bndl-<version>.w2k3.i386.exe for Windows and
hp_blade_fw_bundle-<version>.linux.tar.gz for Linux.
2. To extract the Windows bundles, execute the downloaded file and select a directory for
the extracted files to be placed. In Linux, simply untar/unzip the downloaded file as
follows:
tar zxvf hp_blade_fw_bundle-<version>.linux.tar.gz.
3. Before deploying firmware on a server, perform the following best practices to ensure the
firmware updates are successful.
Test your setup in a lab environment before updating production servers.
For those administrators who do not have access to a test lab, pick one server and
update it. Let the updated server run for a few days, and if everything continues to
work properly, update other servers starting with small groups of similar servers.
Make sure you are within the support window of current or two previous releases. If
problems occur, it is best to be working on the most current release with support.
If you have a problem with a component installing, check the web and the ITRC
forums to see if there is a new component available or if other users are reporting the
same problem.
If you are installing a new server, update the firmware first before installing the OS.
This ensures that any firmware issues with OS installation have been addressed.
Always ensure you have a backup of the server in case the firmware update fails
Always reboot the server after server-based driver or firmware upgrades. Doing so
allows everything to be flushed out, memory cleared, and so on so the new
firmware/driver starts out fresh.
Note:
For more information and enhanced details of each of the HP
SUM screens, see the help support provided within HP SUM that
can be accessed using the ? icon at the top right of all screens
that support user input.
4. Follow the steps shown in Using HP SUM in GUI mode or HP SUM in scriptable or silent
mode.
Note:
Reboot the server once the firmware updates have completed
successfully to activate all the firmware.
53
Scenario 1B: Updating a server using the HP BladeSystem FDT
The following instructions can be used to update the firmware on a server using the HP BladeSystem
FDT.
1. Download the HP BladeSystem FDT from the HP website.
Links to the latest versions are posted on the BladeSystem Compatibility Chart web pages and
can be accessed at http://www.hp.com/go/bladesystemupdates. The file is called:
bb-<version>.iso.
2. Copy the ISO image file to a USB key, and then insert it into the USB port on the front of the
C3000 Enclosure or on the rear of the C7000 Enclosure.
This is the easiest way to update a server blade is to use the HP BladeSystem FDT ISO.
3. Browse to the HP BladeSystem OA web interface, and log in by using the OA administrator
credentials.
4. Click on Device Bays to pull up a summary of all blades in the enclosure.
5. Check the box beside each blade selected to update.
6. Click the DVD tab, and select the Connect to bb*.iso option in the pull-down menu.
In this option, the * signifies the version, date, and pass number of the HP BladeSystem FDT
ISO file that was extracted in Step 2.
7. Check the box beside each blade that needs to be updated again as it will be deselected
during the DVD connection step.
8. Select the Virtual Power tab, and then select the Momentary Press option.
After confirming the popup for power change on the blade(s), the blades should power down if
they were already powered on. They will power on if they had already been powered off. In
the event they are powered off by Step 9, repeat this step again to power on the blade(s).
Note:
The Momentary Press option brings down any OS that is
running on the blade, as long as ACPI support has not been
disabled in the OS.
9. When you boot to the FDT, all feedback is provided through the UID lights. While the
update process is running, the UID light blinks. Upon completion, the UID light is set to one of
two states:
If the UID light is off, the update process is complete, and the server OS can be installed or
the server can be restarted to its previous OS.
If the UID light is solid, a firmware update failure has occurred requiring attention. You can
either plug in the KVM dongle or use iLO Remote Console support to browse into the
affected server to determine the cause of the failure. The FDT loads the error log into a
vi editor window for review.
HP strongly recommends that you resolve the issue causing the failure before installing or restarting
the OS to prevent issues that could affect server operation. For more information on how to
handle various firmware update failure scenarios, see Troubleshooting HP BladeSystem FDT.
Note:
For more information on how to handle various firmware update failure
scenarios, see Troubleshooting HP BladeSystem FDT.
54
Note:
The server automatically reboots after the FDT completes.
Note:
In some rare instances, the HP BladeSystem FDT may not boot with some
third-party external Fibre Channel storage attached. In this event, it may be
necessary to disconnect the external storage for the duration of the update
process and reconnect it afterwards.
Note:
As an alternative, the HP FDT ISO can be burned to a physical CD and
placed in an external CD/DVD drive connected to the KVM dongle for the
individual blade that must be updated.
Note:
If more than 64 GB of memory is included in a blade, FDT 1.60 and earlier
ISOs hang at a blank screen shortly after the FDT starts to boot. To resolve
this issue, use an FDT version later than 1.60, or issue the following
command at the Boot: prompt: . Another workaround is to
remove the extra memory until there is less than 64 GB in the server. The
additional memory can be added back to the server after the FDT
completes updating the firmware.
Note:
For information on how to script updates of the FDT, see Scenario 6: I want
to automate and script the update of multiple enclosures including the OA,
VC, and server blades.
Note:
For information on how to add components to an existing tool, see How do
I add updated components to the HP Firmware Maintenance CD?
Note:
If you need to update VC firmware, the firmware smart components must be
downloaded off the web and added to contents of the HP Firmware
Maintenance CD. For steps on how to do this, see How do I add updated
components to the HP Firmware Maintenance CD.
Note:
OA and VC firmware components can only be updated online.
Note:
Updating Emulex, QLogic, or Brocade HBA Firmware or earlier SATA hard
drive firmware requires the use of the Offline Updates method for the HP
Firmware Maintenance CD.
55
Online updates
For the online method of firmware updates, there are multiple ways to use the HP Firmware
Maintenance CD.
Place the Firmware CD ISO image file onto a USB key, and insert the USB key into the OA USB
ports on the c3000 Enclosure and c7000 Enclosure.
Insert a USB key containing the Firmware CD ISO image created by using the HP USB Key Creator
for Windows utility into the SUV (Serial-USB-Video) cable attached to the physical blade that you
want to update, if the blade server supports the SUV cable connection.
For Windows, the HP USB Key Creator for Windows utility must be downloaded from the HP
website and installed on a workstation. Once installed, the utility places a shortcut in the HP System
Tools in the Programs start menu folder.
Follow the instructions provided with the USB Creator utility.
Note:
The HP USB Key Creator formats the USB key so any files on the key are
lost. Be sure to use a USB key that is at least 1 GB and does not contain
any valuable files.
For Linux, follow these steps to manually create the USB key:
1. Obtain SYSLINUX 3.2 or higher from http://freshmeat.net or http://syslinux.zytor.com and
download to a Linux workstation.
2. Install the SYSLINUX RPM obtained in Step 1.
3. Create a directory for the USB key mountpoint if one does not already exist. (For example,
mkdir /usbkey.)
4. Insert the USB key, and mount it (mount /dev/sda1 /usbkey).
Note:
The device mountpoint can vary depending on whether other
SCSI drives are also installed on the server. Thus, the device
mountpoint can be sdb1, sdc1, and so on).
5. Issue the ./syslinux /usbkey at the command to prompt SYSLINUX write out the boot
partition to the USB key.
Note:
Failure to follow this step could lead to a key that will not boot
the Firmware CD until the SYSLINUX command is successful.
56
cd /cd_mount_point/usb
9. Execute the usbcreator.sh shell script passing in the CD mount point and the USB mount point
to move the Firmware CD files to the USB key.
./usbcreator.sh /cd_mount_point /usbkey
10. Unmount the CD and the USB key.
umount /dev/cdrom
umount /dev/sda1
Note:
This must match the initial mount point in Step 4.
11. Remove the USB key and CD from the workstation used to create the USB key.
12. Insert the physical Firmware CD burned from the Firmware CD ISO image into an external
CD/DVD drive attached to the SUV (Serial-USB-Video) cable for the blade that needs to be
updated if the blade server supports the SUV cable.
Note:
When using the Firmware CD through iLO Virtual Media, it is strongly
recommended that all files be copied locally even when leveraging the iLO
Virtual Media under OS control. Otherwise, when the iLO firmware is
updated if needed, the connection to the iLO Virtual Media will be reset
and connection to the file system will be lost. If this happens during a
deployment scenario, HP SUM could hang after updating the iLO
Firmware.
Note:
HP recommends that you copy the files locally if NIC firmware is to be
updated even if files are being accessed through a Windows network file
share or Linux NFS mountpoint. Failure to copy the files locally can cause
all firmware updates after the NIC firmware update to fail because of loss
of network connectivity related to the update of the NIC firmware.
Once the files are available locally on the server selected to update, change to the
\compaq\swpackages directory or the file share location and follow the steps shown in Using HP
SUM in GUI mode or Using HP SUM in Scripted or Silent mode.
57
Offline updates
The following instructions can be used to update the firmware on an individual server using the HP
Firmware Maintenance CD.
1. Download the HP Firmware Maintenance CD from the HP website. Links to the latest versions
are posted on the BladeSystem Compatibility Chart web pages and can be accessed at
http://www.hp.com/go/bladesystemupdates. The file is called firmware-<version>.zip.
2. To extract the ISO image, open Windows Explorer, double-click on the ZIP file, and then copy
the ISO image to a directory on a USB key or network hard drive.
For Linux users, simply unzip the ZIP file by using the unzip firmware-<version>.zip
command.
3. Update a server blade with the HP Firmware Maintenance CD ISO image by placing it on a
USB key, and then inserting it into the USB port on the front of the C3000 Enclosure or on the
rear of the C7000 Enclosure.
4. Browse to the HP BladeSystem OA web interface, and log in with the OA administrator
credentials.
5. Click Device Bays to pull up a summary of all blades in the enclosure.
6. Check the box beside each blade that you want to update.
7. Click the DVD tab, and select the Connect to FW*.iso option in the pull-down menu where the *
signifies the version, date, and pass number of the HP Firmware Maintenance CD ISO file that
was extracted in Step 2.
8. Check the box beside each blade that you want to update again if the boxes are deselected
during the DVD connection step.
9. Select the Virtual Power tab, and then select the Momentary Press option.
After confirming the popup for power change on the blade(s), the blades should power down if
they are already powered on or power on if they are already powered off. In the event they
are powered off by Step 9, repeat this step again to power on the blade(s).
10. Use the remote console to browse into each blade, and drive the installation process by
following the steps outlined in Using HP SUM in GUI mode.
Some screens, such as the Source Selection and Select Installation Hosts, are displayed in
offline mode.
Note:
The iLO firmware must be deselected if the Firmware CD is
executed in offline mode to prevent errors that might occur when
the iLO Firmware is updated and the iLO virtual media and
remote console is reset. Update the iLO firmware online first by
using the HP BladeSystem Firmware Update Bundles, and then
use the HP Firmware Maintenance CD in offline mode to flash
offline-only firmware, such as the QLogic, Brocade, and Emulex
FC HBA firmware.
Note:
Use the HP BladeSystem FDT for an automated way to perform
these steps. The HP BladeSystem FDT also does not have the
issue with iLO Firmware updates disconnecting the media,
because the FDT copies all of the files from the iLO Virtual Media
to a RAM drive on each server before initiating the firmware
update process.
Note:
Reboot the server once the firmware updates have completed
successfully to activate all software.
58
Note:
In some rare instances, the Firmware Maintenance CD may not
boot with some third-party external Fibre Channel storage
attached. In the event this occurs, it may be necessary to
disconnect the external storage for the duration of the update
process and reconnect it afterwards.
Note:
As an alternative, you can burn the HP Firmware Maintenance
CD to a physical CD and placed in an external CD/DVD drive
connected to the SUV (Serial-USB-Video) cable for the individual
blade that must be updated.
Note:
The firmware update process for both OAs should take between
6-8 minutes. An individual OA firmware update should take
approximately 4-6 minutes.
Note:
If the OA firmware is updated independent of other components
of the OA firmware version being deployed, make sure it aligns
with the currently supported release sets on the BladeSystem
Firmware Compatibility Chart.
Note:
Multiple OA can be updated simultaneously to speed up the
process.
59
Scenario 2B: Updating the OA firmware using the OA browser interface
from a workstation
The OA firmware can also be updated by using the OA browser interface if the HP BladeSystem
Firmware Update Bundles for Windows or Linux cannot be used. Follow these steps to use this
installation approach.
1. Download the HP BladeSystem Firmware Update Bundles from the ―Download and Support‖
section on the HP website at: http://hp.com.
Links to the latest versions are posted on the BladeSystem Compatibility Chart located at
http://www.hp.com/go/bladesystemupdates. The files are named:
hpblade_fw_bndl-<version>.w2k3.i386.exe for Windows and hp_blade_fw_bundle-
<version>.linux.tar.gz for Linux.
2. To extract the Windows bundles, execute the downloaded file, and then select a directory
location to place the extracted files.
In Linux, simply untar/unzip the downloaded file as follows: tar zxvf hp_blade_fw_bundle-
<version>.linux.tar.gz.
3. Find the bp00xxxx.txt file that is extracted from the bundle, and determine the component
number for the OA firmware component.
4. Execute the OA firmware component to extract the firmware .bin file by using the following
commands:
Windows: CP01xxxx.exe (Choose Extract option and select a directory)
Linux: ./CP01xxxx.scexe --unpack=<dir_path> (unpack it to dir_path)
Scenario 2C: Updating the OA firmware using the OA CLI interface and
a web server
The OA firmware can also be updated by using the OA CLI interface and placing the OA firmware
binary image file on a web server. This is useful if the HP BladeSystem Firmware Update Bundles for
Windows or Linux cannot be used. This method requires setting up a web server to host the firmware
binary image file that is extracted from the OA component. While setting up a web server can be a
complex operation, we describe the basics of how to set up both Microsoft Windows IIS and Apache
web servers. This information will help you stage image files for update through the OA browser
interface without the need for physical media. For more complete information about security and
maintenance, see the HP BladeSystem Onboard Administrator Command Line Interface User Guide.
There are multiple sections that must be completed for this support to work. Follow these steps to
ensure the configuration is set up correctly to allow this type of deployment.
60
Obtaining all necessary files
The following files must be obtained to complete this scenario:
OpenSSH for Windows located at:
http://softlayer.dl.sourceforge.net/project/sshwindows/OpenSSH%20for%20Windows%20-
%20Release/3.8p1-1%2020040709%20Build/setupssh381-20040709.zip
A web server for Microsoft Windows Internet Information Server
Obtained from Windows Server 2003/2008 installation CDs
Apache web server located at:
http://www.ecoficial.com/apachemirror/httpd/binaries/win32/apache_2.2.13-win32-x86-
openssl-0.9.8k.msi
HP BladeSystem Firmware Update Bundles for Windows or Linux
o Windows located at:
ftp://ftp.hp.com/pub/softlib2/software1/supportpack-windows/p1116845569\
(Choose highest numbered directory for the latest version)
o Linux located at:
ftp://ftp.hp.com/pub/softlib2/software1/supportpack-linux/p1418640128
(Choose highest numbered directory for the latest version)
After the files are obtained, a web server must be set up. The following sections describe the
fundamentals for installing and setting up a basic Microsoft IIS and Apache web server for Linux.
.img application/octet-stream
.iso application/octet-stream
.bin application/octet-stream
7. Click OK, click Apply, and then click Exit the IIS Manager.
61
8. Download the HP BladeSystem Firmware Update Bundles from http://hp.com.
Links to the latest versions are posted on the BladeSystem Compatibility Chart web pages at
http://www.hp.com/go/bladesystemupdates. The file is called hpblade_fw_bndl-
<version>.w2k3.i386.exe for Windows.
9. To extract the Windows bundles, execute the downloaded file, and then select a directory
location to place the extracted files.
10. Find the bp00xxxx.txt file extracted from the bundle, and determine the component number
for the OA firmware component.
11. Execute the OA firmware component to extract the firmware .bin file contained within it by
using the following commands:
Windows: CP011352 (and then choose the Extract option and extract the
file to the c:\inetpub\wwwroot directory)
12. Create a simple HTML file in the web server root. For IIS, this is typically
c:\inetpub\wwwroot. Use this file to use to test the web server. Use the following example to
create this default file. The file is typically named index.html.
<html>
<head>
<title>OA Firmware</title>
</head>
<body>
<a name="top"></a>
<h1>OA Firmware Binaries</h1>
<h2>Contents</h2>
<p>
<a href="hpoa252.bin">OA Firmware 2.52</a>
<p>
</body>
</html>
13. Once the file is saved into the web server directory root, (c:\inetpub\wwwroot), go to
another workstation, open a browser, and try to load the web page just created on the web
server. (For instance, http://<workstation_IP_address/index.html).
Once the pages are loading, verify the download of the binary file to the workstation is
working properly. This is important because it simulates the same type of interface that the OA
uses to pull the newly created file from the web server.
14. If the file is successfully downloaded, skip Setting up the Apache web server in Linux, and
continue to Configuring the SSH keys for scripted installations.
62
4. Execute the configure command to configure Apache:
./configure --prefix=/usr/local/apache2
The --prefix directory becomes the web server root location. The Apache default location is
/usr/local/apache2 in Linux.
5. Once Apache is configured, run the make command to build the product.
6. After the make is complete, enter the make install command to install Apache.
7. After Apache is installed, modify the httpd.conf file located in the PREFIX/conf directory, in
which PREFIX is normally /usr/local/apache2. The following are the changes that must be
made.
ServerAdmin you@example must be changed to your email address.
ServerName must be set to Port 80, plus the DNS name, or the IP address of this new web
server. For example, a ServerName could be 10.7.78.144:80.
DefaultType text/plain must be modified to be DefaultType application/octet-
stream.
Note:
This is the minimum set of changes needed to enable the basic
web server functionality. HP recommends that you see to the
Apache documentation for full details regarding server
configuration.
8. Next, start the Apache server. The command to start the server is:
PREFIX/bin/apachectl -k start
PREFIX/bin/apachectl -k stop
Note:
If updating an existing Apache server after changing the
httpd.conf file, be sure to stop and restart the web server
first
9. Download the HP BladeSystem Firmware Update Bundles from http://hp.com. Links to the
latest versions are posted on the BladeSystem Compatibility Chart web pages at
http://www.hp.com/go/bladesystemupdates . The file is named:
hp_blade_fw_bundle-<version>.linux.tar.gz for Linux.
10. To extract the Linux bundles, untar/unzip the downloaded file as follows:
tar zxvf hp_blade_fw_bundle-<version>.linux.tar.gz.
Find the bp00xxxx.txt file extracted from the bundle, and determine the OA firmware
component.
11. Execute the OA firmware component to extract the firmware .bin file contained within it by
using the following commands:
Linux ./CP01xxxx --unpack=<dir_path>
(dir_path is the location of the Apache web server files which default to
/usr/local/apache2/htdocs)
63
12. Create a simple HTML file in the web server root. For Apache, this is typically
/usr/local/apache2/htdocs, which is used to test the web server. Use the following
example to create the default file. The file is typically named index.html.
<html>
<head>
<title>OA Firmware</title>
</head>
<body>
<a name="top"></a>
<h1>OA Firmware Binaries</h1>
<h2>Contents</h2>
<p>
<a href="hpoa252.bin">OA Firmware 2.52</a>
<p>
</body>
</html>
13. Once the file is saved into the web server root directory (/usr/.local/apache2/htdocs), go
to another workstation, open a browser, and try to load the newly created web page for
example, http://<workstation_IP_address/index.html). Once the page is loading, verify the
download of the binary file to the workstation works. This simulates the same type of interface
the OA uses to pull the newly created file from the web server.
14. If the file is successfully downloaded, go to the Configuring the SSH keys for scripted
installations.
Note:
The parameter after the -C must be an OA administrator ID and is case-
sensitive. If you are using an OA administrator ID other than Administrator,
substitute it here.
Note:
You can generate an RSA-based key in place of the DSA-based key by
changing out the dsa parameter with rsa. For more details on selecting
the appropriate key for a deployment environment, consult the ssh-
keygen documentation.
64
Note:
If prompted for a pass-phrase, the phrase must be left empty by pressing
Enter. If any pass-phrase is entered, the automated script process will fail as
the pass-phrase will be prompted for when the script is initiated.
Note:
The files will default to the current directory or the directory indicated in the
-f parameter.
Linux:
Private key: /root/.ssh/id_dsa
Public Key: /root/.ssh/id_dsa.pub
Important:
To maintain security, the private key must be on the system where it was
generated and protected. The public key can be sent to other computers
and devices such as the OA without worry of compromising security.
Once the public key is generated, copy it to the web server root directory (c:\inetpub\wwwroot for
IIS and /usr/local/apache2/htdocs for Apache) so you can pull it with the OAs that are
configured to support the automated scripting as described in Uploading the SSH Keys to the OAs.
Uploading the SSH keys to the OAs
The SSH key can be uploaded into the OA so scripts can be executed from the workstation location
where the SSH public keys are generated without the need to enter a password for each script.
Figure 2 shows the OA screen where the SSH keys are uploaded.
65
Figure 2. SSH Administration OA screen
66
Updating the OA firmware once the web server successfully configures
To update the OA from its CLI interface once the web server is properly configured, follow these
steps.
1. Create a script with the following command in it:
Windows:
C:\Program Files\OpenSSh\bin\ssh [email protected] update image
http://16.89.1.88/hpoa252.bin
where:
“Administrator” is the OA administrator account to be used
“16.89.1.3” is the Active OA IP address
“http://<web_server_address/<file_to_download>” should match the web server and file
created above.
Linux:
ssh [email protected] update image http://16.89.1.88/hpoa252.bin
where:
“Administrator” is the OA administrator account to be used
“16.89.1.3” is the Active OA IP address
“http://<web_server_address/<file_to_download>” should match the web server and file
created above.
2. During the process, the SSH command reports the link is terminated because the firmware
process is initiated. Wait for 3-5 minutes before attempting to reconnect to the OA to allow
time for the firmware update process to complete. Once the SSH interface is re-enabled by the
OA after the firmware update is complete, issue the following command to pull the System Log
from the OA.
Windows:
C:\Program Files\OpenSSh\bin\ssh [email protected] show
syslog enclosure
Linux:
ssh [email protected] show syslog enclosure
The returned data contains output, such as the following example Search for entries similar to this
output to validate that the firmware update is successful.
Sep 17 11:07:13 OA: Administrator logged out of the Onboard Administrator
Sep 17 11:07:22 OA: Administrator logged out of the Onboard Administrator
Sep 17 11:10:05 OA_Flash: Firmware image flashed from 2.51 to 2.52
Sep 17 11:10:11 OA: Onboard Administrator is rebooting
Sep 17 11:10:58 Kernel: Network link is up at 100Mbps - Half Duplex
Sep 17 11:10:59 OA: Got IP address = 16.89.1.3
Sep 17 11:10:59 OA: Time zone changed to CDT+5
Sep 17 11:11:03 OA: LCD Status is: OK.
Sep 17 11:11:03 OA: A USB Key was inserted into the Onboard Administrator.
Sep 17 11:11:05 Enclosure-Link: Service started
Sep 17 11:11:06 OA: Onboard Administrator booted successfully
Note:
For details on any error messages returned by a failed update operation
and the steps to recover, see the HP BladeSystem Onboard Administrator
User Guide.
67
Scenario 3A: Updating the VC firmware using VCSU
General requirements
There are a number of general requirements that must be met to update VC firmware.
Install Microsoft Windows XP (Service Pack 1 or 2), Windows Server 2003, Windows Server
2008, or Windows Vista OSs on the client.
Upload Administrative or Power User privileges on the client system to install and run the utility
when upgrading from VC 4 Gb FC module 1.31 or earlier.
Install a valid HP VC firmware package. Download the firmware from the HP website
(http://www.hp.com). Click Software and Driver Downloads, and then search for VC Firmware.
Do not close the console application when a firmware update is in progress. If the application is
closed before the update completes, the module firmware might not update properly, causing the
module firmware to be inoperative.
Have an OA user account with Administrative privileges and access to all OAs and interconnect
bays available for use. If the enclosure is imported into a VC domain, a VC user account with
domain privileges is also required.
Ensure Ethernet network connectivity between the client system and the enclosure OA. To validate
this connectivity, open a web browser to the enclosure OA before running the utility.
Ensure Ethernet network connectivity between the client system and the interconnect modules in the
enclosure.
Add the VCSU application to the list of exceptions for any host-based firewall on the client.
Know that no firewalls can exist between the client system and the remote enclosure OA. If a
firewall exists, and it is blocking ports, the utility cannot open a connection with the remote modules
to perform the update.
Install OA firmware 1.30 or later on the target enclosure. HP recommends OA firmware 2.25 and
later.
Run only one instance of the VCSU to access a single enclosure on one single client at one time.
Know that during firmware update operations, the modules are unavailable for use. Any attempt to
reset or remove the modules during the update process could result in a corrupted firmware image.
In addition, do not reset the OA of the target enclosure or update its firmware while VC modules
are being updated. Doing so can interfere with the firmware update process and cause it to fail.
During the firmware update process, connectivity through the modules, which might be hosted to
servers in the enclosure, can be temporarily interrupted.
Use a single client to update modules in a specific remote enclosure during a firmware update
session. Using multiple clients to interface remotely with the same enclosure can interrupt the
firmware update process and prevent it from completing successfully.
Reset the affected module and restart the firmware update process if the firmware update client is
interrupted or loses network connectivity during the update.
Know that if you use VCEM, the VC domains must be placed in Maintenance Mode, or the
firmware updates are blocked.
68
Before the upgrade begins
Before using VCSU to update VC firmware, perform the following pre-installation checks to ensure the
health of the VC domains.
1. Back up the current VC configuration as follows:
o Log in to VCM through a supported browser by browsing to the IP address or
DNS name of the VCM and providing administrator credentials.
o Select Tools/Backup Restore Domain Configuration from top menu.
o Select Backup Configuration, and then click OK.
o Save the file to your system in case it is needed for recovery at a later time.
o Log out of VCM, and close your browser.
2. Run a health check by using the VCSU on the VC domain.
Item Description
Parameters
USER Name of the OA user with privileges to access all enclosure interconnect bays
Note:
In a multi-enclosure environment or when redundant OA modules are
present, this must be the IP address of the active OA in the primary
enclosure.
Example
List the state of modules in an enclosure:
vcutil -a healthcheck -i 192.168.0.100 -u Administrator -p password
After these checks have been performed and completed successfully, you can use VCSU to upgrade
the firmware.
Important:
If you are using the VCEM to manage your VC domains, you must place
them in Maintenance mode before using the VCSU utility.
To update VC firmware by using VCSU, the VC firmware component must be downloaded from the
web by following the steps above.
1. Download the HP BladeSystem Firmware Update Bundles from the hp website. Links to the
latest versions are posted on the BladeSystem Compatibility Chart web pages located at
http://www.hp.com/go/bladesystemupdates. The file is named hpblade_fw_bndl-
<version>.w2k3.i386.exe for Windows.
2. To extract the Windows bundles, execute the downloaded file, and select a location directory
to place the extracted files.
69
3. Find the bp00xxxx.txt file that is extracted from the bundle, and determine the VC firmware
component numbers.
4. Execute the VC firmware components to extract the firmware .bin file by using the following
commands:
Windows: CP01xxxx (and then choose the Extract option and a directory to
unpack it to
Once the firmware is downloaded and extracted, use the VCSU and the firmware identified for
update to execute from either a local Windows or Linux (requires VCSU 1.40 or later) workstation.
Because of the way VCSU works, the OA and VC credentials are required for the update process.
The OA credentials must administrator equivalent credentials so the VC can access specific data in
the OA to perform the VC firmware upgrade.
Updating the VC firmware
To update the VC firmware, use these steps:
1. Issue the following command from a console or MS-DOS Command prompt.
vcutil -a update -i <Primary OA IP> -u <OA Admin account> -p <OA
password>
-l <path to firmware image>
Note:
VC firmware updates can take from approximately 10 minutes to
as long as one hour, depending on the number and type of
modules in the enclosure. Do not restart modules or close the
window while the update process is in progress, or the firmware
update will fail.
5. After the VC firmware update process is complete, validate that all VC modules are successfully
updated.
Note:
To recover from a failed VC firmware update process, start over
with the pre-installation steps, and then restart the VC firmware
update process. If it fails a second time, contact HP Support.
70
Important:
If the VC configuration is not redundant or if the VC firmware
version is earlier than version 1.34, a network fabric downtime
of up to 10 minutes can occur while the firmware is being
activated. This affects all servers in the enclosure and prevents
network access until the VC firmware is activated.
Note:
Because of the possibility of NIC fabric downtime during a VC
firmware installation, HP strongly recommends that you update
the VC from a workstation outside the enclosure to ensure
continuous network access to the firmware update utilities.
71
Before the upgrade begins
Before using HP SUM to update VC firmware, perform the following checks to ensure the health of the
VC domains.
The first check is to back up the current VC configuration. To back up the current VC configuration,
use the following steps:
1. Log in to VCM through a supported browser by browsing to the IP address or DNS name of the
VCM and providing administrator credentials.
2. Select Tools/Backup Restore Domain Configuration from top menu.
3. Select Backup Configuration, and then click OK.
4. Save the file to your system in case it is needed for recovery at a later time.
5. Log out of VCM, and close your browser.
Another pre-installation check is to run a health check with the VCSU on the VC domain.
Item Description
Parameters
USER Name of the OA user with privileges to access all enclosure interconnect bays
Example
List the state of modules in an enclosure:
vcutil -a healthcheck -i 192.168.0.100 -u Administrator -p password
The last pre-installation check is for VCEM to set all VC domains into maintenance mode. Failure to do
this prevents the firmware update process from occurring.
Updating the VC firmware
Once these prerequisites have been completed, you can use the following instructions to update the
VC firmware on an individual or multiple enclosures by using the HP BladeSystem Firmware Update
Bundles for Windows or Linux.
1. Download the HP BladeSystem Firmware Update Bundles from http://hp.com.
Links to the latest versions are posted on the BladeSystem Compatibility Chart web pages
located at http://www.hp.com/go/bladesystemupdates. The files are names
hpblade_fw_bndl-<version>.w2k3.i386.exe for Windows and hp_blade_fw_bundle-
<version>.linux.tar.gz for Linux
2. To extract the Windows bundles, execute the downloaded file, and then select a directory for
the extracted files to be placed.
In Linux, simply untar/unzip the downloaded file as follows: tar zxvf hp_blade_fw_bundle-
<version>.linux.tar.gz.
Follow the steps described in Using HP SUM in GUI mode or Using HP SUM in Scripted or Silent
mode. Ensure the target device IP address or DNS name is the information for the active VCM
Interface NIC port. During the VC firmware update process, all VC modules including the Ethernet, 4
GB Fibre Channel and 8 GB Fibre Channel modules are updated. After the firmware is updated,
users may experience a brief network downtime as the VC resets the Ethernet modules. If the VC is set
72
up in a redundant fashion, there is no network downtime unless the VC firmware version is later than
1.34. If the VC firmware version is later than 1.34 or the VC is not configured redundantly, a network
fabric downtime of up to 10 minutes can occur. However, in most cases, the network is back up in
about one minute.
Note:
Because of the potential network downtime, updating the VC should only
be done when a maintenance window is available that allows for this
downtime.
Note:
Using the standby VC IP address instead of the active IP VC address causes
HP SUM to fail discovery for that target VC.
Note:
The firmware update process for all VC modules can take up to one hour,
and although the network downtime only occurs once, all firmware images
are uploaded to the VC modules. Older modules usually take longer to
flash than newer modules.
Important:
If the VC configuration is not redundant or if the VC firmware version is
later than 1.34, a network fabric downtime of up to 10 minutes can occur
while the firmware is activated. This affects all servers in the enclosure and
prevents network access until the VC firmware is activated.
Note:
Because of the possibility of NIC fabric downtime during a VC firmware
installation, HP strongly recommends that the VC be updated from a
workstation outside the enclosure to ensure continuous network access to
the firmware update utilities.
Note:
If HP SUM determines that only the VC Ethernet firmware must be updated,
HP SUM may select the component with Fibre Channel firmware that does
not match the installed configuration. This is caused by the way the VC
smart components are packaged.
Today, there are two smart components for VC firmware updates. The first
component contains the VC-Ethernet firmware and the 4-GB VC-FC
firmware. The second component contains the same VC-Ethernet firmware
and the 8-GB VC-FC firmware. Because HP SUM can use the VC-Ethernet
firmware from either component to update the VC Ethernet modules, it may
at times pick one that contains the other type of VC-FC firmware. This is not
an error as only the correct firmware is updated.
73
Scenario 3C: Updating the VC firmware in a DMZ (special case using
the OA virtual USB support)
This section contains information on how to update the VC firmware in the case when the VC module
may be hooked into the Internet and the user does not want to risk exposure of their internal network
with the external. In this section, the general requirements and prerequisites for installation should still
be validated. Once these are done, the binary firmware files for VC can be copied to a USB key and
inserted in the OA USB ports. From there, it is possible to update the VC firmware without exposing
the firmware image to the Internet.
General requirements
There are a number of general requirements that must be met to update VC firmware.
1. Have a valid HP VC firmware package must be available to install. Download the firmware
from the HP website (http://www.hp.com). Click Software and Driver Downloads, and then
search for Virtual Connect Firmware.
2. Have an OA user account with Administrative privileges and access to all OAs and
interconnect bays. If the enclosure is imported into a VC domain, you must also have a VC user
account with domain privileges.
3. Make sure you have Ethernet network connectivity between a client system and the active OA.
4. Ensure you have OA firmware 2.4x or higher because it is required on the target enclosure.
5. Know that during firmware update operations, the modules are unavailable for use. Any
attempt to reset or remove the modules during the update process could result in a corrupted
firmware image. In addition, do not reset the OA of the target enclosure or update its firmware
while VC modules are being updated. Doing so can interfere with the firmware update process
and cause it to fail. During the firmware update process, connectivity through the modules,
which might be hosted to servers in the enclosure, can be temporarily interrupted.
Item Description
Parameters
USER Name of the OA user with privileges to access all enclosure interconnect bays
74
Example
List the state of modules in an enclosure:
vcutil -a healthcheck -i 192.168.0.100 -u Administrator -p password
Note:
If you are using the VCEM to manage your VC domains, you must place
them in Maintenance mode before attempting to update the VC firmware.
This example provides a list of ISOs, bins, and configuration files and their paths available on the
USB key.
Example:
Firmware Image Files Image Version
--------------------------------------- -------------
usb://d1/hpoa252.bin 2.52
usb://d1/vcfw212.bin 2.12
75
Note:
If the c3000 with the KVM option module or the c7000 OA with
KVM support is used, it is possible to select the OA CLI from the
Enclosure KVM menu.
8. Identify the path to the image file that is needed to update the VC firmware.
9. Log into the VCM either through the OA browser interface or through the OA CLI on the KVM
console by using connect interconnect 1 or 2, based on which module is running VCM.
10. Use the VCM GUI or CLI to perform the VC firmware update from the web URL discovered in
Step 7 and concatenated with the OA IP address as follows.
http://,active-oa-ip-address>media/usbkey/d1/<VI-filename>
11. After the firmware update is complete, remove the USB key from the OA USB port.
Important:
If the VC configuration is not redundant or if the VC firmware
version is earlier than 1.34, a network fabric downtime of up to
10 minutes can occur while the firmware is activated. This affects
all servers in the enclosure and prevents network access until the
VC firmware is activated.
Note:
Because of the possibility of NIC fabric downtime during a VC
firmware installation, HP strongly recommends that the VC be
updated from a workstation outside the enclosure to ensure
continuous network access to the firmware update utilities.
76
If an OS is already installed, follow these steps.
1. Update the blades and the OA by using the HP BladeSystem Online Firmware Bundles for
Windows and Linux from a workstation connected to the same network as the OA.
2. Use the HP BladeSystem FDT or HP Firmware Maintenance CD to update any offline only
firmware.
3. Use the VCSU from a workstation connected to the same networks as the OA and VC Ethernet
modules to update the VC firmware after all other updates have been applied, servers
rebooted, and all firmware activated.
Note:
The assumption in this scenario is that an OS has already been installed on
the blades. For information on how to install firmware on blades without an
OS, see Scenario 5: Updating an enclosure and blades without an existing
OS installed.
In almost all cases, the HP BladeSystem Firmware Update Bundles can be used to update firmware on
the blades using HP SUM. With the exception of NIC firmware updates, all other online server-based
firmware can be updated without interfering with normal server operations. A reboot is required after
all updates have been installed on a server. This stages all the firmware that updates the underlying
hardware but does not activate it until the server is rebooted. This reboot can occur in later
maintenance windows after the firmware has been staged to complete the firmware update process.
The OA and iLO firmware can also be updated without affecting the operation of the servers
themselves. Depending on how VC modules are configured and the version of VC firmware in use,
the VC firmware update may also be possible without affecting any servers in the enclosure.
If a blade contains hardware requiring offline mode firmware updates, such as Emulex, Brocade, or
QLogic adapters or NetXen NICs, the server must be taken offline and updated by using either the HP
BladeSystem FDT (preferred) or the HP Firmware Maintenance CD.
These deployment tools should be the second step in updating enclosure firmware after the HP
BladeSystem Firmware Update Bundles have updated the majority of firmware online. There are a
couple of reasons for the order of these steps.
The primary reason is to minimize the amount of downtime required to perform firmware updates. The
fewer updates that need to be performed offline, the quicker the server can return to its normal
production mode.
The second reason is that it prevents some situations where the firmware cannot be updated in the
offline environment. Examples of this include the restriction from updating iLO firmware if the iLO
Virtual Media is in use as it is when using the HP Firmware Maintenance CD and for updating
firmware that takes significant time to update such as the VC and OA firmware.
77
If possible, the OA and blades should be updated together. If this is not possible, update the blades
first, and then focus on the OA firmware. It is possible to update the OA firmware concurrently with
the server blades in an online mode without any interruption to the network or server usage. HP
recommends updating the OA firmware with the server blades to minimize the time it takes to update
firmware in the enclosure and to ensure when the blades are rebooted, the OA firmware is quickly
updated to match the requirements of the HP BladeSystem Compatibility Chart. Using HP SUM as
provided in the HP BladeSystem Firmware Update Bundles to deploy the OA firmware allows any
dependencies between the OA firmware and other components to be comprehended during the
installation process.
Finally, the VC and other networking infrastructure should be updated. These devices take large
amounts of time to update and can cause networking and server outages so planning must be done to
accommodate large update windows (approximately 1-2 hours for all updates).
The following points summarize the important findings.
If the VC Ethernet firmware is 1.34 or later, these are the recommended steps to update the
firmware in the enclosure.
1. Update the blades and the OA by using the HP BladeSystem Online Firmware Bundles for
Windows and Linux by using the instructions in Scenarios 1A and 2A.
2. Use the HP BladeSystem FDT or HP Firmware Maintenance CD to update any offline only
firmware by using the instructions in Scenarios 1B and 1C:
3. Use the VCSU to update the VC firmware after all other updates have been applied, servers
rebooted, and all firmware is activated by using the instructions in Scenario 3A.
If the VC Ethernet firmware is earlier than 1.34, these are the recommended steps to update the
firmware in the enclosure.
1. Use the VCSU to update the VC firmware as described in Scenario 3A.
2. Update the blades and the OA first using the HP BladeSystem Online Firmware Bundles for
Windows and Linux by using the instructions in Scenarios 1A and 2A.
3. Use the HP BladeSystem FDT or HP Firmware Maintenance CD to update any offline only
firmware by using the instructions in Scenarios 1B and 1C.
Note:
You can use the BladeSystem Firmware Update Bundles to allow the VC,
iLO, and OA firmware to update remotely when using these bundles from a
Windows or Linux workstation.
78
Because an enclosure may not have a supported level of firmware on the OA, VC, and blades,
especially if they have sat on a shelf for a while before deployment, HP typically recommends the OA
firmware be updated first. These recommendations are being made because out-of-date OA and VC
firmware can cause issues that prevent blade servers from even powering on. Thus, using the
BladeSystem Firmware Update Bundles to update the OA firmware should be the first step in updating
the enclosure firmware. The second step should be to update the VC firmware in the firmware update
strategy for enclosures without an existing OS installed. HP strongly recommends that the VC firmware
be updated if it is earlier than version 1.34 to prevent network outages when the OA firmware is later
updated.
The next step in the strategy is to update the blade servers by using the HP BladeSystem FDT or the HP
Firmware Maintenance CD.
Note:
HP recommends updating the OA and VC firmware first, which is directly
opposite the recommendation for enclosures when an OS is already
installed on the blades. Because the recommendations are inverted, there
has been a lot of confusion in the field as to the installation order
recommended by BladeSystem development.
Summary
If the VC Ethernet firmware is 1.34 or later, HP recommends the following steps to update the
firmware in the enclosure.
1. Update the OA by using the HP BladeSystem Online Firmware Bundles for Windows and Linux
by using the instructions in Scenario 2A.
2. Use the VCSU to update the VC firmware after all other updates have been applied, servers
rebooted, and all firmware activated by using the instructions in Scenario 3A.
3. Use the HP BladeSystem Firmware FDT or HP Firmware Maintenance CD to update all server-
specific firmware by using the instructions in Scenarios 1B and 1C.
If the VC Ethernet firmware is earlier than 1.34, HP recommends the following steps be taken to
update the firmware in the enclosure.
1. Use the VCSU to update the VC firmware by using the instructions in Scenario 3A.
2. Update the OA by using the HP BladeSystem Online Firmware Bundles for Windows and Linux
by using the instructions in Scenario 2A.
3. Use the HP BladeSystem FDT or HP Firmware Maintenance CD to update all server-specific
firmware by using the instructions in Scenarios 1B and 1C.
79
If the VC Ethernet firmware is 1.34 or later, HP recommends the following steps to update the
firmware in multiple enclosures.
1. Use the BladeSystem Firmware Update Bundles and the included HPSUM tool to update the
OA firmware using the inputfile method.
2. Use the HP BladeSystem Firmware Deployment.
3. Use the VCSU to update the VC firmware Tool ISO image to update all server-specific
firmware.
If the VC Ethernet firmware is earlier than 1.34, HP recommends these steps to update the firmware in
multiple enclosures.
1. Use the VCSU to update the VC firmware.
2. Use the BladeSystem Firmware Update Bundles and the HPSUM tool to update the OA
firmware by using the inputfile method.
3. Use the HP BladeSystem FDT ISO image to update all server-specific firmware.
Note:
The following instructions focus on the effort needed to update, assuming
the VC firmware is at least at 1.34 or later. If the VC firmware is earlier
than 1.34, the setup is still the same but in the installation sequence, the
steps for the VC firmware update and the OA firmware update should be
reversed.
Because there is not a single tool available for updating all firmware in the BladeSystem infrastructure
at once, this must be handled as a multi-step process. A summary of the process involved follows.
1. Obtain all necessary files.
2. Set up either Microsoft IIS or Apache web servers.
3. Install OpenSSH (Windows only), and generate the SSH keys needed to automate the OA
communications process without the constant need to re-enter passwords.
4. Populate the web server and script directory with all necessary files.
5. Validate the iLO Advanced License is installed on each blade.
6. Update the iLO license for multiple servers to the iLO Advanced License if needed.
7. Obtain the iLO firmware version to confirm iLO firmware is at least at 1.50 or later, which is
necessary to support the automation process.
8. Script the deployment of the OA firmware update process by using the BladeSystem Firmware
Update Bundles and HP SUM.
9. Script the deployment of the VC firmware update process by using the BladeSystem Firmware
Update Bundles and VCSU.
10. Script the deployment of the HP FDT ISO image through the iLO Virtual Media support.
80
o Microsoft Windows Internet Information Server (obtained from Windows Server 2003/2008
installation CDs)
or
o Apache web server located at:
http://www.ecoficial.com/apachemirror/httpd/binaries/win32/apache_2.2.13-win32-x86-
openssl-0.9.8k.msi
HP BladeSystem Firmware Update Bundles for Windows or Linux
o Windows located (choose highest numbered directory for the latest version) located at
ftp://ftp.hp.com/pub/softlib2/software1/supportpack-windows/p1116845569\
o Linux located (choose highest numbered directory for the latest version) located at
ftp://ftp.hp.com/pub/softlib2/software1/supportpack-linux/p1418640128
HP BladeSystem FDT ISO (choose highest numbered directory for the latest version) located at
ftp://ftp.hp.com/pub/softlib2/software1/cd/p1255591055
Perl RPM for Linux only
For more information, see the Linux distribution CD/DVDs to obtain the Perl RPM. Perl is required
for the Linux RIBCL scripts to work.
Perl-IO-Socket-SSL RPM for Linux only
See the Linux distribution CD/DVDs to obtain this RPM. The Perl SSL socket support is required for
the Linux RIBCL scripts to work.
Perl-Net-SSLeay RPM for Linux only
See the Linux distribution CD/DVDs to obtain this RPM. The Perl network interface with SSL is
required for the Linux RIBCL scripts to work.
Expect RPM for Linux only
See the Linux distribution CD/DVDs to obtain the expect RPM. Expect is required for HPSUM to be
able to remotely deploy the OA and VC firmware in Linux
After the files have been obtained, you must set up a web server. The basics for installing and setting
up a basic Microsoft IIS and Apache web server for Linux follow.
Setting up the Microsoft IIS web server
The web server should be a system that houses the files and serves them for the OA and other
devices, if configured. The web server setup is a one-time operation. After it has been set up, files can
be added to the web server so that updates can be easily handled when new versions of the various
deployment tools are released.
To install Microsoft IIS, follow these steps:
1. Use the Add or Remove Programs Option in Control Panel (Windows Server 2003) or add the
role of web server (IIS) (Windows Server 2008) to install IIS.
2. Visit the Microsoft Update site to ensure all fixes are installed prior to enabling IIS to prevent
possible security breaches.
3. Once the web server is setup, locate and click the Internet Information Services (IIS) Manager
option in the Start menu to launch the web configuration manager.
4. Click Web Sites, click Default Web Sites, click Properties, and then click Home Directory to
locate the web server root file system.
For IIS, this is typically c:\inetpub\wwwroot. Once the home directory is determined, ensure
the Write option is not checked to prevent unauthorized writing to the web server.
5. Next, click the HTTP Headers tab, and then click MIME Types.
6. In the MIME Types dialog, add three new MIME types as shown if they do not already exist.
81
Extension MIME Type
.img application/octet-stream
.iso application/octet-stream
.bin application/octet-stream
7. Click OK, click Apply, and then click Exit to exit the IIS Manager.
8. Skip the next section about setting up an Apache server and continue with the Configuring the
SSH keys for scripted installations section that follows.
The --prefix directory becomes the web server root location. The default location for Apache is
/usr/local/apache2 in Linux.
1. Once Apache is configured, run the make command to build the product.
2. After the make is complete, use the make install command to install Apache.
3. After Apache is installed, you have to modify the httpd.conf file located in the PREFIX/conf
directory, when PREFIX is typically /usr/local/apache2. The changes that need to be made
are as follows:
ServerAdmin you@example must be changed to your email address
ServerName must be set to Port 80 plus the DNS name or the IP address of this new web
server. For example, a ServerName could be 10.7.78.144:80
DefaultType text/plain must be modified to DefaultType application/octet-
stream.
Note:
This is a minimum set of changes to enable the basic web server
functionality. It is recommended that the user see the Apache
documentation for full details regarding server configuration.
82
4. Next, the Apache server needs to be started. The command to start the server is:
PREFIX/bin/apachectl -k start
PREFIX/bin/apachectl -k stop
Note:
If updating an existing Apache server after changing the
httpd.conf file, be sure to stop and restart the web server first.
5. Continue to the next section to configure the SSH keys needed for scripted installation.
Note:
If the Windows system is an x64-based version, the directory location will
be C:\Program Files (x86)\OpenSSH\bin.
2. Linux:
ssh-keygen -t dsa -C Administrator
Note:
The parameter after the -C must be an OA administrator ID and is case-
sensitive. If you are using an OA administrator ID other than Administrator,
it must be substituted here.
Note:
An RSA-based key can be generated in place of the DSA-based key above
by changing out the dsa parameter with rsa. Consult the ssh-keygen
documentation for more details on which key is appropriate to the
environment in which it is being deployed.
Note:
If prompted for a pass-phrase, the phrase must be left empty by pressing
Enter. If any pass-phrase is entered, the automated script process fails as
the pass-phrase is prompted for when the script is initiated.
83
The resulting keys are placed in the following file locations:
3. Windows:
Private key: C:\Program Files\OpenSSH\bin\id_dsa
Public key: C:\Program Files\OpenSSH\bin\id_dsa.pub
Note:
If the Windows system is an x64-based version, the directory location will
be C:\Program Files (x86)\OpenSSH\bin.
Note:
The files will default to the current directory or the directory indicated in the
-f parameter.
4. Linux:
Private key: /root/.ssh/id_dsa
Public Key: /root/.ssh/id_dsa.pub
Important:
To maintain security, the private key must be on the system where it was
generated and protected. The public key can be sent to other computers
and devices such as the OA without worry of compromising security.
Once the public key has been generated, it can be copied to the root directory of the web server
(c:\inetpub\wwwroot for IIS and /usr/local/apache2/htdocs for Apache) so it can be
pulled by the OAs that are configured to support the automated scripting.
Uploading the SSH keys to the OAs
The following describes how to upload the SSH key into the OA so scripts can be executed from the
workstation where the SSH public keys were generated without the need to enter a password for each
script. Figure 3 shows the OA screen where the SSH keys are uploaded.
84
Figure 3. OA screen where the SSH keys are uploaded
Populate the web servers and script directory with all necessary files
Once the web servers and SSH configuration is properly configured, it is now time to populate the
web server and local script directories necessary to execute the scripts with all files needed to update
the servers.
Populating the script directory
The script directory must be populated with all sample scripts you will use, plus HP SUM, VCSU, and
the VC, and OA firmware components files from the HP BladeSystem Firmware Update Bundles. The
following steps show how to put all of these files into a location on the workstation that you will use to
85
update the servers. The script directory in this scenario is named c:\scripts in Windows and
/scripts in Linux.
86
3. Go to another workstation, open a browser, and try to load the web page that was just created
on the web server, (for example, http://<workstation_IP_address/index.html). Once
the page is loading, verify the download of the binary file to the workstation works. This is
important as this is simulating the same type of interface the OA uses to pull the file from the
newly created web server.
Now that the file system has been populated and the web server verified, write a few RIBCL XML files
and SSH scripts. The following sections show the RIBCL XML files and an SSH script to obtain all the
iLO addresses based off just the OA IP address and userid. All SSH commands are based on having
the SSH key support as previously noted.
Important:
All RIBCL scripts require a LOGIN element. However, the data placed in
this field, as long as it is not invalid XML data, is not used for the
installation. These elements are overridden by the external scripts that HP
writes around these functions.
87
C:\scripts>ssh -l Administrator 16.89.1.3 show server list
-----------------------------------------------------------------------------
WARNING: This is a private system. Do not attempt to login unless you are an
authorized user. Any authorized or unauthorized access and use may be moni-
tored and can result in criminal or civil prosecution under applicable law.
-----------------------------------------------------------------------------
Firmware Version: 2.52
Built: 07/13/2009 @ 14:01
OA Bay Number: 1
OA Role: Active
Note:
The login name and password within the RIBCL XML file is not used. It is
there because iLO requires an entry in this field. Set the Password field to
DoesNotMatter to show it doesn’t matter what you put in these fields, as
long as it is valid XML data.
The XML file below is named Get_ILO_Firmware_Version.xml in the scripts created later. It is the
same as the command to retrieve the iLO firmware version information below, but for clarity purposes,
a separate XML file is created.
<!-- FDT RIBCL Sample Script for HP Lights-Out Products -->
<!-- Copyright (c) 2009 Hewlett-Packard Development Company, L.P. -->
<RIBCL VERSION="2.0">
<LOGIN USER_LOGIN="Administrator" PASSWORD="DoesNotMatter">
<RIB_INFO MODE="read">
<GET_FW_VERSION/>
</RIB_INFO>
</LOGIN>
</RIBCL>
88
When we create a script later, the output from issuing this XML file against the iLO is similar to the
output example follows.
<?xml version="1.0"?>
<RIBCL VERSION="2.22">
<RESPONSE
STATUS="0x0000"
MESSAGE='No error'
/>
<GET_FW_VERSION
FIRMWARE_VERSION = "1.78"
FIRMWARE_DATE = "Jun 10 2009"
MANAGEMENT_PROCESSOR = "iLO2"
LICENSE_TYPE = "iLO 2 Standard Blade Edition"
/>
</RIBCL>
This output means the blade does not have an iLO Advanced license. Because of this, the blade is
unable to support scriptable virtual media and must use the OA GUI (as described in Scenario 1B:
Updating a server using the HP BladeSystem FDT.) to update an enclosure through the OA Virtual
Media pass-through feature. Output similar to the following example means the blade is supported for
scriptable virtual media.
<?xml version="1.0"?>
<RIBCL VERSION="2.22">
<RESPONSE
STATUS="0x0000"
MESSAGE='No error'
/>
<GET_FW_VERSION
FIRMWARE_VERSION = "1.79"
FIRMWARE_DATE = "Aug 26 2009"
MANAGEMENT_PROCESSOR = "iLO2"
LICENSE_TYPE = "iLO 2 Advanced"
/>
</RIBCL>
Note:
The login name and password within the RIBCL XML file is not used. It is
there because iLO requires an entry in this field. Set the Password field to
DoesNotMatter to show it doesn’t matter what you put in these fields, as
long as it is valid XML data.
The XML file that follows is named Get_ILO_Firmware_Version.xml in the scripts created later. It is
the same command to retrieve the iLO license version information, but for clarity purposes, a separate
XML file is created.
<!-- FDT RIBCL Sample Script for HP Lights-Out Products -->
<!-- Copyright (c) 2009 Hewlett-Packard Development Company, L.P. -->
89
<RIBCL VERSION="2.0">
<LOGIN USER_LOGIN="Administrator" PASSWORD="DoesNotMatter">
<RIB_INFO MODE="read">
<GET_FW_VERSION/>
</RIB_INFO>
</LOGIN>
</RIBCL>
The iLO firmware version is returned in the FIRMWARE_VERSION tag in the output.
Obtaining the current Virtual Media status for a blade
The GET_VM_STATUS RIBCL command returns the Virtual Media drive status. This command must
display within a RIB_INFO element as shown.
Note:
The login name and password within the RIBCL XML file is not used. It is
there because iLO requires an entry in this field. Set the Password field to
DoesNotMatter to show it doesn’t matter what you put in these fields, as
long as it is valid XML data.
The following XML file is named Get_VM_Status.xml in the scripts created later.
<!-- FDT RIBCL Sample Script for HP Lights-Out Products -->
<!-- Copyright (c) 2009 Hewlett-Packard Development Company, L.P. -->
<!-- Description: This is a sample XML script to obtain the virtual -->
<!-- media status -->
<RIBCL VERSION="2.0">
<LOGIN USER_LOGIN="Administrator" PASSWORD="DoesNotMatter">
<RIB_INFO MODE="read">
<GET_VM_STATUS DEVICE="CDROM"/>
</RIB_INFO>
</LOGIN>
</RIBCL>
The returned information from this command shows something similar to the following:
<?xml version="1.0"?>
<RIBCL VERSION="2.22">
<RESPONSE
STATUS="0x0000"
MESSAGE='No error'
/>
<GET_VM_STATUS>
90
VM_APPLET="DISCONNECTED"
DEVICE="CDROM"
BOOT_OPTION="BOOT_ALWAYS"
WRITE_PROTECT="YES"
IMAGE_INSERTED="YES"
IMAGE_URL=http://192.168.1.77/BB160.2009_0726.26.iso
/>
</RIBCL>
Note:
Even though the VM_APPLET entry reads DISCONNECTED, this references
what the Virtual Media applet reflects when viewed through the iLO web
browser.
As can be seen from the previous results, the IMAGE_INSERTED should read YES and should also
point to the expected web server URL Address:
IMAGE_URL=http://192.168.1.77/BB160FDT.iso
Another point to observe is the BOOT_OPTION=BOOT_ALWAYS option. This ensures that despite any
customization of the Boot order in the Rom Based Setup Utility (RBSU), the server boots to the CDROM
drive first upon the next reboot, and then returns to the defaults as set in the RBSU settings. For the
FDT, the BOOT_OPTION should always be set to BOOT_ALWAYS instead of BOOT_ONCE as the BOOT_ONCE
option did not work in several versions of iLO2 firmware. Because the FDT ejects the ISO image once
it has completed the firmware update process, the BOOT_OPTION will be ignored on subsequent boots
because the image is no longer available to the server during boot.
Setting Virtual Media to boot on a blade
This RIBCL XML file allows you to set the virtual media that has been inserted to be the boot option for
the given server the next time the server is powered on. One thing to note is the
―BOOT_OPTION="BOOT_ALWAYS" option. This ensures that despite any customization of the Boot order
in the Rom Based Setup Utility (RBSU), the server boots to the CDROM drive first upon the next reboot,
and then returns to the defaults as set in the RBSU settings. For the FDT, the BOOT_OPTION should
always be set to BOOT_ALWAYS instead of BOOT_ONCE as the BOOT_ONCE option did not work in
several versions of iLO2 firmware. Because the FDT ejects the ISO image once it has completed the
firmware update process, the BOOT_OPTION is ignored on subsequent boots because the image is no
longer available to the server during boot.
The XML files contain the same format and data, regardless of whether or not you plan to execute
them from a Windows or Linux system.
Note:
The login name and password within the RIBCL XML file is not used. It is
there because iLO requires an entry in this field. Set the Password field to
DoesNotMatter to show it doesn’t matter what you put in these fields, as
long as it is valid XML data.
The following XML file is named Set_Virtual_Media_Status.xml in the scripts created later.
<!-- FDT RIBCL Sample Script for HP Lights-Out Products -->
<!-- Copyright (c) 2009 Hewlett-Packard Development Company, L.P. -->
<!-- Description: This is a sample XML script to set the boot option for a
virtual -->
<!-- media image on a given server -->
91
<RIBCL VERSION="2.0">
<LOGIN USER_LOGIN="Administrator" PASSWORD="DoesNotMatter">
<RIB_INFO MODE="write">
<SET_VM_STATUS DEVICE="CDROM">
<VM_BOOT_OPTION value="BOOT_ALWAYS"/>
<VM_WRITE_PROTECT value="Y"/>
</SET_VM_STATUS>
</RIB_INFO>
</LOGIN>
</RIBCL>
The return status that no error occurred indicates the blade has successfully shut down and rebooted.
Inserting the virtual media on a blade
This RIBCL XML file allows us to insert virtual media for a given iLO. This allows the mounting of the
BladeSystem FDT ISO from the web server that was previously created. This is required for launching
the ISO image when the server is rebooted later in the scripts. The XML files contain the same format
and data, regardless of whether or not you plan to execute them from a Windows or Linux system.
In this command, it is important that the IMAGE_URL be the same as the URL created on the web server
and validated with the index.html file. This allows the iLO to mount the ISO image of the FDT from the
web server and boot it in the scripts later.
Note:
The login name and password within the RIBCL XML file is not used. It is
there because iLO requires an entry in this field. Set the Password field to
DoesNotMatter to show it doesn’t matter what you put in these fields, as
long as it is valid XML data.
The following XML file is named Insert_Virtual_Media.xml in the scripts created later.
<!-- FDT RIBCL Sample Script for HP Lights-Out Products -->
<!-- Copyright (c) 2009 Hewlett-Packard Development Company, L.P. -->
<RIBCL VERSION="2.0">
<LOGIN USER_LOGIN="Administrator" PASSWORD="DoesNotMatter">
<RIB_INFO MODE="write">
<INSERT_VIRTUAL_MEDIA DEVICE="CDROM" IMAGE_URL=""/>
</RIB_INFO>
</LOGIN>
</RIBCL>
92
If this script is used independent of the script provided later in this scenario, the IMAGE_URL=”” should
be set to a valid URL. An example of a valid IMAGE_URL value is:
IMAGE_URL="http://16.89.2.132/BB161.2009_0903.14.iso"
The output from this command is similar to the following example. The status of 0x0000 indicates the
virtual media was successfully inserted.
<<?xml version="1.0"?>
<RIBCL VERSION="2.22">
<RESPONSE
STATUS="0x0000"
MESSAGE='No error'
/>
</RIBCL>
Note:
The login name and password within the RIBCL XML file is not used. It is
there because iLO requires an entry in this field. Set the Password field to
DoesNotMatter to show it doesn’t matter what you put in these fields, as
long as it is valid XML data.
The following XML file is named Eject_Virtual_Media.xml in the scripts created later.
<!-- FDT RIBCL Sample Script for HP Lights-Out Products -->
<!-- Copyright (c) 2009 Hewlett-Packard Development Company, L.P. -->
<RIBCL VERSION="2.0">
<LOGIN USER_LOGIN="Administrator" PASSWORD="DoesNotMatter">
<RIB_INFO MODE="write">
<EJECT_VIRTUAL_MEDIA DEVICE="CDROM"/>
</RIB_INFO>
</LOGIN>
</RIBCL>
The following XML file is named Get_Host_Power_Status.xml in the scripts created later.
<!-- FDT RIBCL Sample Script for HP Lights-Out Products -->
<!-- Copyright (c) 2009 Hewlett-Packard Development Company, L.P. -->
This example returns the status that the host power as OFF. The only difference between the previous
status and what would be returned if the power was on is the HOST_POWER would be set to ON.
Turning the power off on a blade
This RIBCL XML file allows you to turn off the power on a given server through the iLO. This is
equivalent to a Momentary Press when the server is notified that the OS must shut down gracefully.
This command only turns the power off. A second command must be issued to turn the power on after
the successful completion of this command. The XML files contain the same format and data
regardless of whether or not you plan to execute them from a Windows or Linux system.
Note:
The login name and password within the RIBCL XML file is not used. It is
there because iLO requires an entry in this field. Set the Password field to
DoesNotMatter to show it doesn’t matter what you put in these fields, as
long as it is valid XML data.
94
The following XML file is named Power_Off_Server.xml in the scripts created later.
<!-- FDT RIBCL Sample Script for HP Lights-Out Products -->
<!-- Copyright (c) 2009 Hewlett-Packard Development Company, L.P. -->
<!-- Description: This is a sample XML script to turn off the power -->
<!-- on the host server
-->
<!-- This script will use the ACPI Power Button function to -->
<!-- attempt to gracefully shutdown the host operating system -->
<!-- (if your OS supports and is configured for graceful -->
<!-- shutdown) before it powers off the server. -->
<RIBCL VERSION="2.0">
<LOGIN USER_LOGIN="Administrator" PASSWORD="DoesNotMatter">
<SERVER_INFO MODE="write">
<SET_HOST_POWER HOST_POWER="No"/>
</SERVER_INFO>
</LOGIN>
</RIBCL>
The return status that no error occurred indicates the power is now off on the blade the command was
issued against.
Turning the Power On for a blade
This RIBCL XML file allows us to turn on the power on a given server through the iLO. This command
only turns the power on. The server power must be off for this command to do anything. Issuing this
command against a server that is already on has no effect. The XML files contain the same format and
data, regardless of whether we plan to execute them from a Windows or Linux system.
Note:
The login name and password within the RIBCL XML file is not used. It is
there because iLO requires an entry in this field. Set the Password field to
DoesNotMatter to show it doesn’t matter what you put in these fields, as
long as it is valid XML data.
The following XML file is named Power_On_Server.xml in the scripts created later.
<!-- FDT RIBCL Sample Script for HP Lights-Out Products -->
<!-- Copyright (c) 2009 Hewlett-Packard Development Company, L.P. -->
95
The output from this command is similar to the following example.
<?xml version="1.0"?>
<RIBCL VERSION="2.22">
<RESPONSE
STATUS="0x0000"
MESSAGE='No error'
/>
</RIBCL>
The return status that no error occurred indicates the power is now on for the blade the command was
issued against.
Creating HP SUM Inputfiles
To update the OA firmware, HP recommends that HPSUM inputfiles be created. This new inputfile
mode is in beta format within HP SUM today and will be officially supported in the HPSUM 3.7.0
release. This ability allows network administrators to leverage the capability within HP SUM to script
multiple targets or groups within a single operation. Currently, there is a limit of 29 total targets for an
installation with HP SUM, although this number will soon be increased. The inputfile functionality can
be leveraged to streamline even further the updates for workgroup-sized groups of servers and
targets. The input file for the script can exist on a secure server or even a personal computer as long
as HP SUM is executed from this chosen platform. Using a secure server or a management console to
protect the credentials is essential to ensure administrator and root passwords are not exposed.
To create an inputfile, use Notepad or vi and the following file format.
Note:
All sections headers and trailers [END] must match.
Note:
Failure to use the SILENT=YES option causes the GUI mode to be used, but
the information provided allows a user to skip screens when information
has already been provided. The DRYRUN=YES option can be used to do
dry runs of installations to ensure the scripts are working without actually
deploying the firmware updates that may be needed on each target.
Note:
Remove the DRYRUN=YES option to actually perform the updates.
[TARGETS]
HOST = BL465C-01
HOST = 192.168.1.2
[END]
Example 2:
DRYRUN = YES
SILENT = YES
[TARGETS]
HOST=BL685cG6
UID = Bigboss2
PWD = password
[END]
96
In Example 1, two targets are passed for update. The targets do not necessarily have to be OAs as
they can be any target supported by HP SUM. In the second example, a host is passed along with the
userid and password to use for the hosts in the SCRIPSUM2 group.
Important:
The credentials can be left out of the file for greater security and passed on
the command-line to HPSUM. The only limitation of this is that the userid
and credentials must be the same on all
Once the file has been created, to use it with HP SUM simply add it as the --inputfile
<filename> parameter to a normal HP SUM command-line. For instance, if the name of the inputfile
is hpsum.in, the command-line syntax is hpsum --inputfile hpsum.in. Full paths can be added to
the inputfile location in the event it is not stored in the same location as the HP SUM executables.
At this point, if more than five enclosures are updated, HP recommends that the OAs IP addresses or
DNS names be added to an inputfile. This allows greater scripting flexibility and reuse of the inputfile
in future updates. If five or fewer enclosures are to be updated, the OA IP addresses can be passed
on the HPSUM command-line. Passing multiple target OAs to HPSUM allow for HPSUM to update the
OA firmware in parallel.
Extracting the VCSU and VC binary firmware files from the VC component
As discussed in Populate the web servers and script directory with all necessary files in Step 3, the VC
firmware component numbers are documented. In this step, extract these components to obtain the
VCSU and the binary firmware files needed by the VCSU to update the VC firmware.
To extract these components, use the following commands, substituting the virtual connect firmware
component numbers in each command. The commands must be executed twice to extract both
firmware components if needed. If the virtual connect enclosure either does not use or has only has
one type of VC Fiber Channel modules, only the component that provides the given type of VC Fiber
Channel module firmware needs to be extracted.
Execute the VC firmware components to extract out the firmware .bin file contained within it by using
the following commands:
4. Windows: CP01xxxx (and then choose the Extract option and a directory to unpack it to
5. Linux: ./CP01xxxx --unpack=<dir_path> (dir_path is where to unpack it to)
For the purposes of our scripts, the dir_path should be c:\scripts or /scripts.
Once the files have been extracted, it’s time to put everything together.
To help with these steps a set of scripts are being provided starting with the 1.70 version of the FDT to
support this functionality. Before presenting the scripts, a brief understanding of the requirements and
process must be discussed.
The following scripts are working samples by using the configuration that has been FDT to an
enclosure of blades simultaneously using the SSH interface of the OA to return the list of iLO2 IP
addresses to attach the FDT ISO image via iLO2 Virtual Media feature. Because the iLO2 Virtual
Media feature can only be scripted when the iLO Advanced License is installed, this is a firm
requirement for this process. In addition, these scripts were only tested with the latest BladeSystem
Compatibility Chart versions. Though they should work with earlier versions of iLO firmware, there is
a chance, especially if the iLO firmware is earlier than version 1.60 that these scripts may not work.
A check is in the script to validate the iLO firmware is at least at 1.60 or later.
Update Blade firmware scripts
For the Update Blade Firmware scripts, the initial assumption is the blades that are being updated
have been powered off and may not have an OS installed. Because this isn’t always the case, the
script attempts to issue a gentle shutdown by simulating a power button press to any running OS.
Because of the security policies for Microsoft Windows and SUSE Linux Enterprise Server, either a
user must be logged into the server or the security settings must be changed to allow for a server to be
powered off without needing to provide the administrator or root-equivalent password.
The following steps show how to change the setting to allow the server to be powered down remotely.
In some instances, administrators may not want to implement these changes because of security
concerns, since these changes will allow anyone with access to the iLO credentials to power off a
server. For those administrators who choose not to implement these changes, the scripts will notify
them of any servers that are still powered on. These servers must then be manually powered down
before the FDT can be used to upgrade the firmware.
For those administrators who want to change the default settings and allow a remote user with iLO
credentials to gracefully power down a server, the following changes must be made.
Note:
In a default installation, Red Hat Enterprise Linux server does not require a
user to enter the root-equivalent password to shutdown the server. If the
default configuration is altered, the following steps in the Linux section must
be followed to re-enable the ability to remotely shutdown the server through
iLO.
Windows
To allow a Microsoft Windows-based system to be shutdown without having to logon, follow these
steps.
1. Click Start, and then select Administrative Tools.
2. Double click Local Security Policy.
3. Under the Local Policies option in the left window pane, click Security Options.
98
4. In the right window pane, scroll down and double-click the option Shutdown: Allow system to
be shut down without having to log on.
5. In the dialog box that opens, change Disabled to Enabled, click Apply, and then click OK.
Linux
To allow a Linux based server with ACPI configured (which is normally the default), an event must be
registered in the /etc/acpi/events directory. In this directory, a file must be created, which we will
call power_off.conf. A sample power_off.conf script is shown.
event=button/power.*
action=/sbin/poweroff
If there are any additional scripts in the /etc/acpi/events directory, they must be renamed so they
do not end in the .conf extension.
Note:
The Linux server must be rebooted so the ACPI daemon will find and
register the event as specified in the above file. The Microsoft Windows
changes do not require a server reboot to take effect.
Note:
The UpdateBladeFirmware scripts should not be executed from a server
within the enclosure being updated as the servers will be powered off so
the FDT can be executed.
Follow these steps so that the scripts will perform the following operations.
1. Obtain the list of iLO2 IP addresses from the OA for the servers in the targeted enclosure.
2. Verify each iLO2 has iLO firmware 1.60 or later, and that an Advanced License is installed
3. Disconnect any iLO Virtual Media that may still be attached.
4. Attach the ISO image from the web site created in the previous steps and defined in the
WEB_URL parameter at the top of the script.
5. Set the iLO2 to BOOT_ALWAYS from the ISO image.
6. Issue a power down command to attempt to gracefully shutdown any OS that may be running
on a blade.
7. Once all blades are powered down, the scripts will power up each blade and exit.
The FDT will boot on each blade, update any firmware, eject the ISO image from the iLO virtual
media and reboot the server unless an error occurs during the firmware update process. The UID
lights can be used as discussed in the single server FDT scenario described in Scenario 1B: Updating
a server using the HP BladeSystem FDT.
To execute these scripts, use the following commands.
Windows
UpdateBladeFirmware.cmd <OA_IP_Address> <ILO_ADMIN_ID> <ILO_PASSWORD>
Ex. UpdateBladeFirmware.cmd 16.89.1.3 Administrator AdminPassword
Linux
./UpdateBladeFirmware.sh <OA_IP_Address> <ILO_ADMIN_ID> <ILO_PASSWORD>
Ex. ./UpdateBladeFirmware.sh 16.89.1.3 Administrator AdminPassword
99
Sample Windows Power Shell script to drive the FDT update process for an entire enclosure at once
UpdateBladeFirmware.ps1
##################################################################
#
# FDT Sample Script for Updating HP BladeSystem firmware
#
# Copyright(c) 2009 Hewlett-Packard Development Company, L.P.
#
##################################################################
#Change the WEB_URL to be the URL of the ISO image on the web server
#Please see the Firmware Best Practices Implementer's Guide for
#more information on how to configure the Firmware Update environment
$WEB_URL='"http://16.89.2.132/BB161.2009_0903.14.iso"'
$OAIP=$1
$USERNAME=$2
$PASSWORD= $3
$IPSTOUSE="ipaddrs.txt"
$TMPOA="tmpoa.txt"
$TMP="tmp.txt"
$OUTPUT="output.txt"
$ERR="error.txt"
$TMPRIBCL="ribcl.xml"
function AttachVirtualMedia
{
$opts=$i
$IP=$i
$RC=0
ConnectVirtualMedia $IP
$RC=$?
if($RC -ne $true) {
print -foreground red "ERROR: Unable to connect virtual media on ILO2 IP
Address" $IP.
return $RC
}
CheckVirtualMediaState $IP
$RC = $?
if($RC -eq $true){
print -foreground green "Virtual media successfully connected on ILO2 IP
Address" $IP.
}
else{
print -foreground red "ERROR: Unable to connect virtual media on ILO2 IP
Address" $IP.
}
return $RC
}
function CheckILOReturnCodes
{
$ILORC=0
100
cat $OUTPUT | select-string "STATUS" -context 0, 1 >$ERR
$var=cat error.txt
for($j=1; $j -le $var.length; $j++)
{ if($var[$j].length -gt 0)
{
if(($var[$j].Contains("STATUS") -eq $true) -and
($var[$j].Contains("0x0000") -ne $true))
{
print -foreground red "ILO Returned error Status:"$var[$j]
"Message:"$var[$j+1]
$j=$j+1
}
else{
print -foreground green "ILO did not returned any error"
}
}
}
del $ERR >$null 2>&1
return $ILORC
}
function CheckVirtualMediaState
{
$opts=$i
$IP=$i
$RC=0
CheckILOReturnCodes $IP
$RC=$?
if($RC -ne $true)
{
print -foreground red "ILO IP address" $IP "returned an error and cannot
continue."
return $RC
}
elseif((cat $OUTPUT | select-string 'image_inserted="yes"') -and (cat $OUTPUT
| select-string 'VM_APPLET="CONNECTED"'))
{
print -foreground yellow "A CD ISO image is inserted"
$VMRC=1
}
else{
print -foreground yellow "A CD ISO image is not inserted"
$VMRC=0
}
function ConnectVirtualMedia
{
$opts=$i
$IP=$i
$CONNECTRC=0
CheckILOReturnCodes $IP
101
$CONNECTRC=$?
function DetachVirtualMedia
{
$opts=$i
$IP=$i
$RC=0
print -foreground yellow "Now disconnecting any existing virtual media from
ILO2 IP address" $IP
CheckVirtualMediaState $IP
$RC=$?
if($RC -eq $true)
{
print "Ejecting virtual media connection."
EjectVirtualMediaConnection $IP
$RC=$?
if($RC -ne $true)
{
print -foreground red "ERROR: Unable to eject virtual media on ILO2 IP
Address" $IP
return $RC
}
else{
print -foreground green "ILO virtual media successfully ejected for ILO2
IP Address" $IP
}
}
else{
print -foreground yellow "No ILO virtual media available to eject for ILO2
IP Address" $IP
}
return $RC
}
function EjectVirtualMediaConnection
{
$opts=$i
$IP=$i
$RC=0
CheckILOReturnCodes $IP
$RC=$?
return $RC
}
function GetServerILOList
{
102
del $TMPOA >$null 2>&1
del $IPSTOUSE >$null 2>&1
function GetServerPowerState
{
$opts=$i
$IP=$i
$RC=0
print -foreground yellow "Now detecting power state for server with ILO2 IP
address" $IP
CheckILOReturnCodes $IP
$RC=$?
if($RC -ne $true){
print -foreground red "ERROR: Unable to detect current power state of
server with ILO2 IP Address" $IP
return $RC
}
function PowerOffServer
{
$opts=$i
$IP=$i
$RC=0
CheckILOReturnCodes $IP
$RC=$?
if($RC -ne $true){
print -foreground red "ERROR: Server cannot be rebooted because an error
was returned."
}
else{
print -foreground green "Server was successfully rebooted."
}
return $RC
}
function PowerOnServer
{
$opts=$i
$IP=$i
$RC=0
CheckILOReturnCodes $IP
$RC=$?
if($RC -ne $true){
print -foreground red "ERROR: Server cannot be powered on because an
error was returned."
}
else{
print -foreground green "Server was successfully powered on."
}
return $RC
}
function SetVirtualMediaToBootOnce
{
$opts=$i
$IP=$i
$RC=0
print -foreground yellow "Now setting iLO to boot to Virtual Media for ILO2
IP address" $IP
CheckILOReturnCodes $IP
$RC=$?
if($RC -ne $true){
print -foreground red "ERROR: Unable to set boot once parameter for ILO2
IP Address" $IP.
}
else{
print -foreground green "iLO at IP address '$IP' has successfully been
set to boot virtual media."
}
return $RC
}
function usage
{
print ".\UpdateBladeFirmware.ps1 <OA ipaddress> <iLO username> <iLO
password>"
104
return 0
}
function ValidateAdvancedLicense
{
$opts=$i
$IP=$i
$RC=0
CheckILOReturnCodes $IP
$RC=$?
if($RC -ne $true){
print -foreground red "ERROR: Server cannot be used because an error was
returned."
return $RC
}
$VERSION= cat $OUTPUT | where{$_ -match "FIRMWARE_VERSION"} |
%{$_.Split("=")[1];} | %{$_ -replace '"',"$s"}
$INTVERSION= $VERSION / 0.01
if($INTVERSION -gt 159)
{
print -foreground green "Supported version of iLO2 Firmware found."
if(cat $OUTPUT | where{$_ -match "iLO 2 Advanced"})
{
print -foreground green "iLO2 Advanced License has been detected."
$IP >> $IPSTOUSE
}
else{
print -foreground red "ERROR: iLO2 Base License has been detected."
print -foreground red "Server cannot be used to script FDT deployment."
}
}
else{
print -foreground red "ERROR: Version of iLO2 firmware installed
(Version'$VERSION'<1.60) is too old and must be updated."
print -foreground red "Server cannot be used to script FDT deployment."
}
#Main function
#Check to make sure three parameters are passed
# $1 = OA IP address
# $2 = ILO Username
# $3 = ILO Password
$args
if($args.count -ne 3)
{
usage
return 0
}
$OAIP=$args[0]
$USERNAME=$args[1]
$PASSWORD=$args[2]
$FINALRC=0
105
#Obtain the list of ILOs from the OA
GetServerILOList
print ""
print -foreground cyan "Validating iLO2 firmware version and Advance License for
IP address" $IP
print ""
$i=0
$temp=cat tmp.txt
foreach($i in $temp)
{
ValidateAdvancedLicense $IP
if($RC -ne $true)
{
$FINALRC=-1
}
del $TMP >$null 2>&1
del $temp >$null 2>&1
print ""
print ""
}
print ""
print -foreground cyan "Connecting to the HP Firmware Deployment Tool (FDT) ISO
image"
print -foreground cyan "and setting the iLO VM Status to boot from it"
print ""
print ""
$i=0
$iptouse=cat ipaddrs.txt
foreach($i in $iptouse)
{
AttachVirtualMedia $IP
if($RC -ne $true)
{
$FINALRC=-1
}
SetVirtualMediaToBootOnce $IP
if($RC -ne $true)
{
$FINALRC=-1
}
print ""
print ""
}
#Get the Power State of the target servers and shutdown running ones.
print ""
print -foreground cyan "Verifying the servers are powered off. If they are not,"
print -foreground cyan "send a gentle power down command"
106
print ""
$i=0
foreach($i in $iptouse)
{
PowerOffServer
print ""
}
print -foreground green "Blade firmware update script has successfully launched
the HP "
print -foreground green "Firmware Deployment Tool (FDT) on all supported HP
blade servers"
print -foreground green "The FDT will execute, eject the virtual media ISO image
and"
print -foreground green "reboot once all firmware is updated."
$TMPOA="tmpoa.txt"
$TMP="tmp.txt"
$OUTPUT="output.txt"
$ERR="error.txt"
$TMPRIBCL="ribcl.xml"
del $IPSTOUSE >$null 2>&1
del $TMPOA >$null 2>&1
del $TMP >$null 2>&1
del $OUTPUT >$null 2>&1
del $ERR >$null 2>&1
del $TMPRIBCL >$null 2>&1
return $FINALRC
Sample Linux script to drive the FDT update process for an entire enclosure at once
UpdateBladeFirmware.sh
#!/bin/bash
#
# FDT Sample Script for Updating HP BladeSystem firmware
# Copyright (c) 2009 Hewlett-Packard Development Company, L.P.
#
#Change the WEB_URL to be the URL of the ISO image on the web server
#Please see the Firmware Best Practices Implementer's Guide for
#more information on how to configure the Firmware Update environment
WEB_URL="http://16.89.2.132/BB160.2009_0726.26.iso"
OAIP=$1
USERNAME=$2
108
PASSWORD=$3
IPSTOUSE=./ipaddrs.txt
TMPOA=./tmpoa.txt
TMP=./tmp.txt
OUTPUT=./output.txt
ERROR=./error.txt
TMPRIBCL=./ribcl.xml
# Color definitions.
GREEN="_[1;32m"
BLUE="_[1;34m"
RED="_[1;31m"
HILITE="_[1;39m"
NORMAL="_[0;39m"
function AttachVirtualMedia ()
{
opts=$1
IP=$1
RC=0
rm -f ${IP}.log 1>/dev/null 2>&1
echo "${HILITE}Now connecting virtual media to ILO2 IP address ${IP}${NORMAL}"
DetachVirtualMedia $IP
RC=$?
if [ ! $RC -eq 0 ]
then
return $RC
fi
ConnectVirtualMedia $IP
RC=$?
if [ ! $RC -eq 0 ]
then
echo " ${RED}ERROR: Unable to connect virtual media on ILO2 IP Address
${IP}.${NORMAL}"
return $RC
fi
CheckVirtualMediaState $IP
RC=$?
if [ $RC -eq 1 ]
then
echo " ${GREEN}Virtual media successfully connected on ILO2 IP Address
${IP}.${NORMAL}"
RC=0
else
echo " ${RED}ERROR: Unable to connect virtual media on ILO2 IP Address
${IP}.${NORMAL}"
RC=1
fi
return $RC
}
function CheckILOReturnCodes ()
{
ILORC=0
grep -A 1 "STATUS=" ${OUTPUT} | grep -v "^\-\-$" > $ERROR
while read STATUS REST
do
OLDIFS=$IFS
IFS=$(echo -en "\n\b")
read MESSAGE REST
if [ $STATUS != "STATUS=\"0x0000\"" ]
then
echo " ${RED}ERROR: ILO returned an error: '$STATUS' :
'$MESSAGE'${NORMAL}"
ILORC=1
IFS=$OLDIFS
return $ILORC
fi
109
IFS=$OLDIFS
done < $ERROR
rm -f $ERROR 1>/dev/null 2>&1
return $ILORC
}
function CheckVirtualMediaState()
{
opts=$1
IP=$1
RC=0
echo "${HILITE}Now checking virtual media status on ILO2 IP address
${IP}${NORMAL}"
sed "/<LOGIN/s/Administrator/${USERNAME}/" Get_VM_Status.xml | sed
"s/DoesNotMatter/${PASSWORD}/" > ${TMPRIBCL}
/usr/bin/perl locfg.pl -l ${OUTPUT} -s ${IP} -f ${TMPRIBCL}
CheckILOReturnCodes
RC=$?
if [ ! $RC -eq 0 ]
then
echo " ${RED}ERROR: ILO IP address $IP returned an error and cannot
continue.${NORMAL}"
return $RC
fi
if [ `grep -ic "image_inserted=\"yes\"" ${OUTPUT}` -eq 1 -o `grep -ic
"VM_APPLET=\"CONNECTED\"" ${OUTPUT}` -eq 1 ]
then
echo " A CD ISO image is inserted"
VMRC=1
else
echo " A CD ISO Image is not inserted."
VMRC=0
fi
rm -f ${OUTPUT} 1>/dev/null 2>&1
return $VMRC
}
function ConnectVirtualMedia ()
{
opts=$1
IP=$1
CONNECTRC=0
sed "/<LOGIN/s/Administrator/${USERNAME}/" Insert_Virtual_Media.xml | sed
"s/DoesNotMatter/${PASSWORD}/" | sed "s,IMAGE_URL=\"\",IMAGE_URL=\"${WEB_URL}\","
> ${TMPRIBCL}
/usr/bin/perl locfg.pl -l ${OUTPUT} -s ${IP} -f ${TMPRIBCL}
CheckILOReturnCodes
CONNECTRC=$?
if [ ! $CONNECTRC -eq 0 ]
then
echo " ${RED}ERROR: ILO IP address $IP returned an error while connecting
virtual media\n and cannot continue.${NORMAL}"
return $CONNECTRC
fi
rm -f ${OUTPUT} 1>/dev/null 2>&1
return $CONNECTRC
}
function DetachVirtualMedia ()
{
opts=$1
IP=$1
RC=0
rm -f ${IP}.log 1>/dev/null 2>&1
echo "${HILITE}Now disconnecting any existing virtual media from ILO2 IP
address ${IP}${NORMAL}"
110
CheckVirtualMediaState $IP
RC=$?
if [ $RC -eq 1 ]
then
echo " Ejecting virtual media connection."
EjectVirtualMediaConnection $IP
RC=$?
if [ ! $RC -eq 0 ]
then
echo " ${RED}ERROR: Unable to eject virtual media on ILO2 IP Address
${IP}.${NORMAL}"
return $RC
else
echo " ${GREEN}ILO virtual media successfully ejected for ILO2 IP address
${IP}.${NORMAL}"
fi
else
echo " No iLO virtual media available to eject for ILO2 IP address ${IP}."
fi
return $RC
}
function EjectVirtualMediaConnection ()
{
opts=$1
IP=$1
RC=0
echo "${HILITE}Ejecting Virtual Media currently connected to ILO2 IP address
${IP}${NORMAL}"
sed "/<LOGIN/s/Administrator/${USERNAME}/" Eject_Virtual_Media.xml | sed
"s/DoesNotMatter/${PASSWORD}/" > ${TMPRIBCL}
/usr/bin/perl locfg.pl -l ./${OUTPUT} -s ${IP} -f ${TMPRIBCL}
CheckILOReturnCodes
RC=$?
return $RC
}
function GetServerILOList()
{
rm -f ${TMPOA} 1>/dev/null 2>&1
rm -f ${IPSTOUSE} 1>/dev/null 2>&1
ssh -l $USERNAME ${OAIP} show server list 1> ${TMPOA} 2>/dev/null
RC=$?
if [ $RC == 0 ]
then
grep -P '[0-9]{1,3}(\.[0-9]{1,3}){3}' ${TMPOA} | awk '{ print $3 }' >
${OUTPUT}
grep -v "^$" ${OUTPUT} > ${TMP}
rm -f ${OUTPUT} 1>/dev/null 2>&1
else
echo " ${RED}ERROR: Error $RC attempting to connect to OA at address $IP.
Installation aborted.${NORMAL}"
return $RC
fi
}
function GetServerPowerState ()
{
opts=$1
IP=$1
RC=0
rm -f ${IP}.log 1>/dev/null 2>&1
echo "${HILITE}Now detecting power state for server with ILO2 IP address
${IP}${NORMAL}"
sed "/<LOGIN/s/Administrator/${USERNAME}/" Get_Host_Power_Status.xml | sed
"s/DoesNotMatter/${PASSWORD}/" > ${TMPRIBCL}
/usr/bin/perl locfg.pl -l ./${OUTPUT} -s ${IP} -f ${TMPRIBCL}
111
CheckILOReturnCodes
RC=$?
if [ ! $RC -eq 0 ]
then
echo " ${RED}ERROR: Unable to detect current power state of server with ILO2
IP Address ${IP}.${NORMAL}"
return $RC
fi
POWER=1
if [ `grep -ic "HOST_POWER=\"OFF\"" ${OUTPUT}` -eq 1 ]
then
POWER=0
fi
if [ $POWER -eq 1 ]
then
echo " ${RED}Server power is ON for server with ILO2 IP address
${IP}.${NORMAL}"
fi
rm -f ${OUTPUT} 1>/dev/null 2>&1
rm -f ${TMP} 1>/dev/null 2>&1
return $POWER
}
function PowerOffServer()
{
opts=$1
IP=$1
RC=0
echo "${HILITE}Rebooting server with ILO IP address ${IP}${NORMAL}"
sed "/<LOGIN/s/Administrator/${USERNAME}/" Power_Off_Server.xml | sed
"s/DoesNotMatter/${PASSWORD}/" > ${TMPRIBCL}
/usr/bin/perl locfg.pl -l ./${OUTPUT} -s ${IP} -f ${TMPRIBCL}
CheckILOReturnCodes
RC=$?
if [ ! $RC -eq 0 ]
then
echo " ${RED}ERROR: Server cannot be rebooted because an error was
returned.${NORMAL}"
else
echo " ${GREEN}Server was successfully rebooted.${NORMAL}"
fi
return $RC
}
function PowerOnServer ()
{
opts=$1
IP=$1
RC=0
echo "${HILITE}Powering on server with ILO IP address ${IP}${NORMAL}"
sed "/<LOGIN/s/Administrator/${USERNAME}/" Power_On_Server.xml | sed
"s/DoesNotMatter/${PASSWORD}/" > ${TMPRIBCL}
/usr/bin/perl locfg.pl -l ./${OUTPUT} -s ${IP} -f ${TMPRIBCL}
CheckILOReturnCodes
RC=$?
if [ ! $RC -eq 0 ]
then
echo " ${RED}ERROR: Server cannot be powered on because an error was
returned.${NORMAL}"
else
echo " ${GREEN}Server was successfully powered on.${NORMAL}"
fi
return $RC
}
function SetVirtualMediaToBootOnce ()
{
opts=$1
112
IP=$1
RC=0
rm -f ${IP}.log 1>/dev/null 2>&1
echo "${HILITE}Now setting iLO to boot to Virtual Media for ILO2 IP address
${IP}${NORMAL}"
sed "/<LOGIN/s/Administrator/${USERNAME}/" Set_Virtual_Media_Status.xml | sed
"s/DoesNotMatter/${PASSWORD}/" > ${TMPRIBCL}
/usr/bin/perl locfg.pl -l ./${OUTPUT} -s ${IP} -f ${TMPRIBCL}
CheckILOReturnCodes
RC=$?
if [ ! $RC -eq 0 ]
then
echo " ${RED}ERROR: Unable to set boot once parameter for ILO2 IP Address
${IP}.${NORMAL}"
else
echo " ${GREEN}iLO at IP address ${IP} has successfully been set to boot
virtual media.${NORMAL}"
fi
return $RC
}
function usage()
{
echo "${HILITE}Usage: ./UpdateBladeFirmware1.sh <OA ipaddress> <iLO username>
<iLO password>${NORMAL}"
exit 0
}
function ValidateAdvancedLicense()
{
opts=$1
IP=$1
RC=0
rm -f ${IP}.log 1>/dev/null 2>&1
echo "${HILITE}Now validating ILO2 IP address ${IP}${NORMAL}"
sed "/<LOGIN/s/Administrator/${USERNAME}/" License.xml | sed
"s/DoesNotMatter/${PASSWORD}/" > ${TMPRIBCL}
/usr/bin/perl locfg.pl -l ./${OUTPUT} -s ${IP} -f ${TMPRIBCL}
CheckILOReturnCodes
RC=$?
if [ ! $RC -eq 0 ]
then
echo " ${RED}ERROR: Server cannot be used because an error was
returned.${NORMAL}"
return $RC
fi
VERSION=`grep "FIRMWARE_VERSION" $OUTPUT | awk -F= '{ print $2 }' | sed
's/"//g' | sed 's/ //g'`
INTVERSION=`echo $VERSION '*100' | bc -l | awk -F'.' '{ print $1 }'`
if [ $INTVERSION -gt 159 ]
then
echo " ${GREEN}Supported version of iLO2 Firmware found.${NORMAL}"
if [ `grep -ic "LICENSE_TYPE = \"iLO 2 Advanced\"" ${OUTPUT}` -eq 1 ]
then
echo " ${GREEN}iLO2 Advanced License has been detected.${NORMAL}"
echo ${IP} >> ${IPSTOUSE}
else
echo " ${RED}ERROR: iLO2 Base License has been detected."
echo " Server cannot be used to script FDT deployment. ${NORMAL}"
RC=1
fi
else
echo " ${RED}ERROR: Version of iLO2 firmware installed (Version $VERSION <
1.60) is too old and must be updated."
echo " Server cannot be used to script FDT deployment.${NORMAL}"
RC=1
fi
113
rm -f ${IP}.log 1>/dev/null 2>&1
rm -f ${TMPRIBCL} 1>/dev/null 2>&1
rm -f ${OUTPUT} 1>/dev/null 2>&1
rm -f ${VERSION}
return $RC
}
#Main function
#Check to make sure three parameters are passed
# $1 = OA IP address
# $2 = ILO Username
# $3 = ILO Password
if [ "$3" == "" ]
then
usage
exit 0
fi
FINALRC=0
echo ""
echo "${BLUE}Connecting to the HP Firmware Deployment Tool (FDT) ISO image"
echo " and setting the iLO VM Status to boot from it${NORMAL}"
echo ""
echo ""
while read IPADDRESS REST
do
AttachVirtualMedia $IPADDRESS
if [ ! $RC -eq 0 ]
then
FINALRC=-1
fi
SetVirtualMediaToBootOnce $IPADDRESS
if [ ! $RC -eq 0 ]
114
then
FINALRC=-1
fi
echo ""
echo ""
done < ${IPSTOUSE}
#Get the Power State of the target servers and shutdown running ones.
echo ""
echo "${BLUE}Verifying the servers are powered off. If they are not, send a
\"gentle\""
echo " power down command${NORMAL}"
echo ""
while read IPADDRESS REST
do
PowerOffServer $IPADDRESS
echo ""
done < ${IPSTOUSE}
echo "${GREEN}Blade firmware update script has successfully launched the HP "
echo " Firmware Deployment Tool (FDT) on all supported HP blade servers"
echo " The FDT will execute, eject the virtual media ISO image and"
echo " reboot once all firmware is updated.${NORMAL}"
TMPOA=./tmpoa.txt
TMP=./tmp.txt
OUTPUT=./output.txt
ERROR=./error.txt
TMPRIBCL=./ribcl.xml
rm -f ${IPSTOUSE} 1>/dev/null 2>&1
rm -f ${TMPOA} 1>/dev/null 2>&1
rm -f ${TMP} 1>/dev/null 2>&1
rm -f ${OUTPUT} 1>/dev/null 2>&1
rm -f ${ERROR} 1>/dev/null 2>&1
rm -f ${TMPRIBCL} 1>/dev/null 2>&1
exit $FINALRC
116
To execute the scripts below, use the following commands.
Windows
UpdateOAFirmware.cmd <OA_IP_Address> <OA_ADMIN_ID> <OA_PASSWORD>
Ex. UpdateOAFirmware.cmd 16.89.1.3 Administrator AdminPassword
Linux
./UpdateOAFirmware.sh <OA_IP_Address> <OA_ADMIN_ID> <OA_PASSWORD>
Ex. ./UpdateOAFirmware.sh 16.89.1.3 Administrator AdminPassword
Sample Windows Power Shell script to drive the OA firmware update process to a single OA at a time
UpdateOAFirmware.ps1
##################################################################
#
#FDT Sample Scripts for Updating HP Onboard Administrator firmware
#
#Copyright(c)2009 Hewlett-Packard Development Company, L.P.
#
##################################################################
function usage
{
print "Usage:.\UpdateOAFirmware.ps1 <OA ipaddress> <OA username> <OA password>"
return 0
}
#Main Function
#Check to make sure three parameters are passed
#$1 = OA IP adress
#$2 = OA Username
#$3 = OA Password
$args
if($args.count -ne 3){
usage
}
$1=$args[0]
$2=$args[1]
$3=$args[2]
else
{
117
print " Firmware Update for OA at is now starting and will take"
print " approximately 4 to 8 minutes to complete. No output will"
print " be provided until the firmware update process is completed"
.\hpsum -s -target $1 -user $2 -passwd $3 -f:rom
}
$RC=$?
switch ($RC) {
-3 { print -foreground red "The installation of the OA firmware component
returned an error. Please"
print -foreground red "see the C:\cpqsystem\hp\log\'IP' directory for
details of the"
print -foreground red "returned error." }
-1 { print -foreground red "An HPSUM error occured. Please review the logs in
the C:\cpqsystem\hp\log\'IP'"
print -foreground red "directory for more details on the cause of the
error." }
* { print -foreground red "An HPSUM error occurred. Please review the logs in
the C:\cpqsystem\hp\log\'IP'"
print -foreground red "directory for more details on the cause of the
error." }
}
Sample Linux script to drive the OA firmware update process to a single OA at a time
UpdateOAFirmware.sh
#!/bin/bash
#
# FDT Sample Script for Updating HP Onboard Administrator firmware
# Copyright (c) 2009 Hewlett-Packard Development Company, L.P.
#
# Color definitions.
GREEN="_[1;32m"
BLUE="_[1;34m"
RED="_[1;31m"
HILITE="_[1;39m"
NORMAL="_[0;39m"
function usage()
{
echo "${HILITE}Usage: ./UpdateOAFirmware.sh <OA ipaddress> <OA username> <OA
password>${NORMAL}"
exit 0
}
#Main function
#Check to make sure three parameters are passed
# $1 = OA IP address
# $2 = OA Username
118
# $3 = OA Password
if [ "$3" == "" ]
then
usage
exit 0
fi
echo "${HILITE}Firmware Update for OA at ${IP} is now starting and will take"
echo " approximately 4 to 8 minutes to complete. No output will be provided"
echo " until the firmware update process is completed.${NORMAL}"
./hpsum -s -target $1 -user $2 -passwd $3 -f:rom
RC=$?
case $RC in
-3) echo "${RED}The installation of the OA firmware component returned an
error. Please see the "
echo " /var/hp/log/${IP}/hpsum_details.txt directory for details of the
returned error.${NORMAL}"
;;
-2) echo "${RED}Bad parameter passed to the UpdateOAFirmware script. Please
check your parameters and attempt"
echo " the OA firmware update again.${NORMAL}"
;;
-1) echo "${RED}An HPSUM error occurred. Please review the logs in the
/var/hp/log/${IP}"
echo " directory for more details on the cause of the error.${NORMAL}"
;;
0|1) echo "${GREEN}The OA firmware was successfully installed.${NORMAL}"
;;
3) echo "${BLUE}The OA firmware is already up to date and does not need to be
updated.${NORMAL}"
;;
*) echo "${RED}An HPSUM error occurred. Please review the logs in the
/var/hp/log/${IP}"
echo " directory for more details on the cause of the error.${NORMAL}"
;;
esac
exit $RC
119
Bundles for Windows and specifically the VCSU and the VC firmware binaries included in the VC
firmware component contained in the Firmware Update Bundles are available in the directory where
the script is executed.
For Linux, the script is written to leverage HPSUM. The requirements for deploying the VC firmware
update in Linux include the HP BladeSystem Firmware Update Bundles for Linux and specifically HP
SUM and the VC firmware component included in the Firmware Update bundles are in the directory
where the script is executed. In addition, the ―expect‖ RPM must be installed on the workstation
running the script for HP SUM to be able to perform remote deployments in Linux.
To execute the scripts below, use the following commands.
Windows
UpdateVCFirmware.cmd <OA_IP_Address> <OA_ADMIN_ID> <OA_PASSWORD>
Ex. UpdateVCFirmware.cmd 16.89.1.3 Administrator AdminPassword
Linux
./UpdateVCFirmware.sh <VC_IP_Address> <VC_ADMIN_ID> <VC_PASSWORD>
Ex. ./UpdateVCFirmware.sh 16.89.1.3 Administrator AdminPassword
Important:
The VC modules must be updated through the primary OA connection for
Windows. For Linux, the IP address must be to the Active VC Ethernet
module as reported by the VCM link in the OA web browser interface.
Sample Windows Power Shell script to drive the VC firmware update process to a single VC at a time
UpdateVCFirmware.ps1
####################################################################
#
# FDT Sample Script for updating HP Virtual Connect firmware
# Copyright (c) 2009 Hewlett-Packard Development Company, L.P.
#
####################################################################
function usage
{
print "Usage: .\UpdateVCFirmware.sh <VC ipaddress> <VC username> <VC
password>"
return 0
}
#Main function
#Check to make sure three parameters are passed
# $1 = VC IP address
# $2 = VC Username
# $3 = VC Password
$args
if($args.count -ne 3){
usage
}
$1=$args[0]
$2=$args[1]
120
$3=$args[2]
if($args.count -ne 3)
{
usage
}
else
{
print -foreground green "Firmware update for Virtual Connect at $IP is now
starting and will"
print -foreground green "take approximately 10 to 60 minutes to complete. No
output will be"
print -foreground green "provided until the firmware update process is
completed"
.\hpsum -s target $1 -user $2 -passwd $3 -f:rom
}
$RC=$?
switch ($RC) {
-3 { print -foreground red "The installation of the Virtual Connect firmware
component returned an error. Please"
print -foreground red "see the C:\cpqsystem\hp\log\'IP' directory for
details of the"
print -foreground red "returned error." }
-1 { print -foreground red "An HPSUM error occured. Please review the logs in
the C:\cpqsystem\hp\log\'IP'"
print -foreground red "directory for more details on the cause of the
error." }
3 { print -foreground blue "The VC firmware is already up to date and does not
need to be updated."}
* { print -foreground red "An HPSUM error occurred. Please review the logs in
the C:\cpqsystem\hp\log\'IP'"
print -foreground red "directory for more details on the cause of the
error." }
}
Script to be added later
121
Sample Linux script to drive the VC firmware update process to all the VC modules in a single
enclosure at a time
UpdateVCFirmware.sh
#!/bin/bash
#
# FDT Sample Script for updating HP Virtual Connect firmware
# Copyright (c) 2009 Hewlett-Packard Development Company, L.P.
#
# Color definitions.
GREEN="_[1;32m"
BLUE="_[1;34m"
RED="_[1;31m"
HILITE="_[1;39m"
NORMAL="_[0;39m"
function usage()
{
echo "${HILITE}Usage: ./UpdateVCFirmware.sh <VC ipaddress> <VC username> <VC
password>${NORMAL}"
exit 0
}
#Main function
#Check to make sure three parameters are passed
# $1 = VC IP address
# $2 = VC Username
# $3 = VC Password
if [ "$3" == "" ]
then
usage
exit 0
fi
echo "${HILITE}Firmware Update for Virtual Connect at ${IP} is now starting and
will take"
echo " approximately 10 to 60 minutes to complete. No output will be
provided"
echo " until the firmware update process is completed.${NORMAL}"
./hpsum -s -target $1 -user $2 -passwd $3 -f:rom
RC=$?
case $RC in
-3) echo "${RED}The installation of the Virtual Connect firmware component
returned an error. Please see the "
122
echo " /var/hp/log/${IP}/hpsum_details.txt directory for details of the
returned error.${NORMAL}"
;;
-2) echo "${RED}Bad parameter passed to the UpdateVCFirmware script. Please
check your parameters and attempt"
echo " the OA firmware update again.${NORMAL}"
;;
-1) echo "${RED}An HPSUM error occurred. Please review the logs in the
/var/hp/log/${IP}"
echo " directory for more details on the cause of the error.${NORMAL}"
;;
0|1) echo "${GREEN}The VC firmware was successfully installed.${NORMAL}"
;;
3) echo "${BLUE}The VC firmware is already up to date and does not need to be
updated.${NORMAL}"
;;
*) echo "${RED}An HPSUM error occurred. Please review the logs in the
/var/hp/log/${IP}"
echo " directory for more details on the cause of the error.${NORMAL}"
;;
esac
exit $RC
Use the following instructions to update the MDS600 firmware on an individual server using the HP
Firmware Maintenance CD
1. Download the HP Firmware Maintenance CD from the HP website.
Links to the latest versions are posted on the BladeSystem Compatibility Chart web pages are
located at http://www.hp.com/go/bladesystemupdates. The file is named firmware-
<version>.zip.
2. To extract the ISO image, open Windows Explorer and double-click on the ZIP file, and copy
the ISO image to a directory on a USB key or network hard drive.
For Linux users, simply unzip the ZIP file using the unzip firmware-<version>.zip
command.
3. Download the MDS600 firmware from the HP website.
The latest version can be found by issuing a search for MDS600 on the www.hp.com website.
4. The next step is to create a USB key from the contents of the Firmware CD ISO.
123
5. For Windows, the HP USB Key Creator for Windows utility must be downloaded from the HP
website and installed on a workstation. Once installed, the utility will place a shortcut in 'HP
System Tools' in the Programs start menu folder.
To make your drive key bootable and copy the contents of the CD:
1. Place your HP USB drive key in an available USB port.
2. Select the HP USB Key Utility shortcut in the HP System Tools folder.
3. Complete each step presented by the application.
Note:
The HP USB Key Creator formats the USB key so any files on the
key are lost. Be sure to use a USB key that is at least 1 GB in
size and does not contain any valuable files.
For Linux, the USB key can be created manually using the following steps:
1. Obtain SYSLINUX 3.2 or higher from http://freshmeat.com or http://syslinux.zytor.com and
download to a Linux workstation.
2. Install the SYSLINUX RPM obtained in Step 1.
3. Make a directory for the USB key mountpoint if one does not already exist. (For example,
mkdir /usbkey).
4. Insert the USB key and mount it (mount /dev/sda1 /usbkey).
Note:
The device mountpoint can vary depending on whether or not
other SCSI drives are also installed on the server. Thus, the
device mountpoint can be sdb1, sdc1, and so on).
5. Issue the command ./syslinux /usbkey to have SYSLINUX write out the boot partition to the
USB key.
Caution:
Failure to follow this step could lead to a key that will not boot
the Firmware CD until the SYSLINUX command is successful.
or
124
10. Unmount the CD and the USB key.
umount /dev/cdrom
umount /dev/sda1
Note:
This must match the initial mount point in Step 4.
11. Remove the USB key and CD from the workstation used to create the USB key.
Follow these steps to remove the USB key and CD from the workstation.
1. Copy the CP01xxxx.scexe file downloaded in Step 3 to the \compaq\swpackages directory
on the USB key.
2. Power off all servers with Smart Array P700m controllers connected to the MDS600s that will
be updated.
3. Insert the USB key into the SUV (Serial-USB-Video) cable and boot the server to be used to
perform the update.
4. Once the HP Firmware Maintenance CD boots, choose the appropriate keyboard language
and screen language to use and accept the End User License Agreement (EULA) to proceed.
5. Click the Firmware Update tab, then the Install Firmware link to launch HP SUM.
6. On the HP SUM Select Items to Install screen, deselect all other firmware updates besides the
MDS600.
7. Click Install for the firmware update process to start.
HP SUM shows the relative progress during installation and the Installation Results once the
installation has completed for review.
8. Click Exit, and then click Yes to exit HP SUM.
9. Click Exit and Yes to reboot the server after successful installation of the MDS600 firmware.
10. Remove the USB key from the server and power back on all blades that were powered off.
Note:
For offline deployments, the Source Selections screen does not appear.
125
Figure 4. HP SUM Source Selections screen
The Source Selections screen allows you to specify where to get components for updating the targets
by using one or more of the following methods:
Directory
This option allows you to select the directory where the components you want to deploy are
located. It can be located on a locally accessible file system. The default location is the directory from
where HP SUM is executed.
1. To change the directory value, click the Browse button to launch a select-directory menu.
2. To set the field back to its initial value, click the Default button.
3. Check ftp.hp.com.
This option allows you to get firmware and software components located on the HP FTP site
(ftp://ftp.hp.com). The HP FTP site contains the latest versions of the firmware and software
components available from HP. The components, which are applicable (denoted with an HP.com
icon) are available for selection on the Select Items to be Installed screen. When using this method,
both firmware and software components are available for selection depending on the options set on
the Set Bundle Filter screen when ProLiant Support Packs are included in the components to be
deployed.
To limit the appearance of available firmware components, use the /romonly command line
argument; for software components, use the /softwareonly command line argument. The
components are not downloaded from the HP FTP site to a target until the Install button is actually
selected unless the component is needed to discover supported devices. If components are needed for
discovery, you are prompted to allow this action. If components are already up-to-date, the
components are not seen.
126
The Check ftp.hp.com checkbox is cleared by default.
1. Select the Check ftp.hp.com checkbox to pull updates from the web.
2. Select the Use Proxy Server checkbox to use a proxy server and enable the proxy details
group box.
Proxy Details
1. Enter the proxy information in the Proxy Details group box to be used to access the HP FTP site.
2. Click the Detect Proxy button to auto-detect the proxy information.
If you use a proxy server in accessing the HP FTP site, the proxy information is saved and pre-
populated on the next deployment.
Note:
HP SUM does not support FTP over HTTP proxy. FTP
downloaded from HTTP proxy fails. Components from the HP
FTP site is only presented for selection on the Select Items to
Install screen if their versions are newer than what is already
on the system. If a system has all of the latest versions of
firmware and software, no components from www.hp.com
presented on the Select Items to be Installed screen.
127
Figure 5. Download Permission screen
The Download Permission screen lists the available updates found on the HP FTP site. You can select
or clear the updates you are allowing to download.
The Download Permission screen includes the following buttons:
Button Function
Cancel Exits the Download Permission screen and returns to the source Selections screen
Note:
Emulex HBAs, QLogic HBAs, and offline-only components cannot be
retrieved from the HP website and can only be installed offline. These
components do not appear on the web components list.
128
Figure 6. Select Installation Host(s) screen
The Select Installation Host(s) screen enables you to choose a host for component installation. By
default, the first time you run HP SUM on a particular system, the only host available is the
local host. However, you can also select remote hosts as your targets. For more information
about using the graphical interface for multiple remote deployments, see Using the GUI for
multiple-host installations.
The following columns are included in the Select Installation Host(s) screen:
Column Function
Last Used Enables you to sort the list by the most recently used hosts
When the Remote Host or Group option in the Select Installation Host(s) screen is selected, you can
sort your view of the host list by selecting Only Hosts, Only Groups, or Both.
129
The Select Installation Host(s) screen also includes the following buttons:
Button Function
Next Proceeds to the next step in the installation process. The local or remote system then checks for
items that are already installed.
Click Next to continue selecting an installation host. For multiple remote deployments, enter the
credentials for the host. When the credentials are successfully entered, the discovery process occurs.
Selecting components to install
When the discovery process is complete, the Select Items to be Installed screen appears (see
Figure 7). The Select Items to be Installed screen displays information about which components are
available for installation on your system and enables you to select or deselect components to
install.
130
The Select Items to be Installed screen includes the following sections:
Sections Function
Product Lists the system on which the selected items are installed
Optional Actions Indicates whether or not the component configuration is optional or required but has already
been updated
Reboot section Enables you to specify reboot settings and determine when reboots occur
When updating installation for some NIC components, select the devices to be updated in the
window that appears. If the NIC firmware listed for the device does not have a version, you
cannot add that firmware to the device using HP SUM.
When multiple hardware devices such as hard drives or array controllers exist in a single
server, HP SUM lists each device only once. If the devices have different firmware versions, then the
versions are listed from earliest to latest in a range. When multiple instances of the firmware
are available for installation, the instances are listed from latest to earliest. If necessary, all
hardware device firmware is flashed to the selected version.
The Select Items to be Installed screen also includes the following buttons:
Button Function
Default Restores the selections in the production installation pane to the default view, which is
based on the existing configuration of the local system
Add Supplemental Enables you to deploy additional components from a removable device. The additional
components must be located on the device root. This button is available only for offline
deployments.
The component selection pane in the Select Items to be Installed screen is divided into sections, which
might vary depending upon your system. The Select Items to be Installed screen sections include
the following headings:
User
This function allows you to deselect the components in this section. The components that are checked
as Deselected By User are not installed.
131
Installation not needed
The components in this section do not need to be updated, although they can be. To update the
components, select the components, and then click Installation Options.
Excluded by filtering
The components in this section are excluded through the filtering options. You can use the Select
Bundle Filter option or one of the command line arguments, such as /romonly o r /softwareonly,
to change the exclusion on a single target. For multiple targets, you must repeat the command for
each additional target. The Select Bundle Filter option screen is only available when there are
bundles, such as ProLiant Support Packs, included in the same location as the components
selected for download.
Updates to be installed
The components in this section can be installed on your system.
Optional updates
The components in this section are not selected for installation by default, even if the product is
not already installed or is installed but not up-to-date. To include the component in the installation set,
you must select the component.
132
Multi-session installation
Multi-session installation appears on the Source Selections screen under certain dependency
combinations between components selected for installation. The following criteria must be met
for the multi-session installation to be successful.
1. To install Component B, the product must already be installed and active. Component B
depends on the product in Component A.
2. To become active, Component A must reboot after the installation.
3. To succeed with installation, there must not be an already-installed version of the product in
component A, or at least not one of the correct versions to satisfy the dependency.
HP SUM detects when all of the conditions are met, and a notification to reboot appears to continue
the installation. All installable components appear in the original update list. However, only the
components shown before the notification appears are installed. You must reboot to complete the
installation, and then restart HP SUM to continue the installation process.
The Status field of the Select Items to be Installed screen displays information about whether or not the
installation is ready to proceed.
X components are not ready for installation due to failed dependencies ( x is the
x Critical Action number of components). The installation cannot proceed until the dependencies are met
or until the component is deselected for installation.
Reboot section
The reboot section of the Select Items to be Installed screen allows you to specify the preferred reboot
behavior.
If Always is selected, the system is always rebooted, unless there is a component installation failure.
When If Needed is selected, the system is rebooted if needed by at least one componen t, unless
there is a component installation failure.
133
Follow these steps to change the delay before reboot or the reboot message.
1. Press Reboot Options. The Set Reboot Options screen appears.
2. Make any changes, and click OK.
Note:
In Linux, the Reboot Delay time is automatically converted from seconds to
minutes. For Linux, any value under a full minute (59 seconds or less) is
rounded to the next minute.
Column Function
Product Specifies the name of the component, version number, and new component version number. To
view the component version history, click the New version number
The following is a list of the Component Selection panel icons and icon descriptions.
No device driver installed The firmware devices supported by the components in this section are
detected on the system but require a device driver. Install the device
driver.
Deselected by user The component has not been selected for installation.
Failed dependencies
The component has a dependency that has not been met. To
determine the nature of the failed dependency, click View Failed
Dependencies.
If a failed dependency occurs, you must resolve it before proceeding with the installation. Depending
on the issue, you must locate software or firmware components in the Firmware Maintenance
CD or HP website at www.hp.com. Figure 8 shows the Failed Dependencies screen.
134
Figure 8. Failed Dependencies screen
Installation options
You can specify firmware upgrade behavior for installable components by selecting one or more
options from the Additional Options field. Depending on the component type, one of the
following screens appears.
135
Caution:
Updating the firmware while a shared device is in use can lead to data
loss. Before enabling the Allow Shared Devices option, be sure any other
servers sharing the selected devices are offline.
136
Note:
HP SUM does not support Allow Downgrades or Allow Rewrites for
the HP VC Ethernet and Fibre Channel Modules for c-Class BladeSystem
firmware component.
Changing the options for firmware upgrade behavior can change the firmware upgrade results. In
this example, the array controller is an HP Smart Array 6402 controller.
If the existing array controller has firmware version 3.00 installed, updating the firmware produces
the results described in the following table.
If the existing array controller has firmware version 3.10 installed, updating the firmware produces
results as described in the following table.
Note:
When updating installation for NIC components, select the devices to be
updated in the window that appears.
After you have selected all the components that you want to install, click Install to proceed with the
installation. The Installation Results screen appears.
Viewing the installation results
When the installation is complete, the Installation Results screen appears (see Figure 9).
137
Figure 9. Installation Results screen
Column Function
Product Specifies the name of the installed component. To see the component version history, click
the Version number.
Additional Enables you to view the installation log for each component, and prompts a reboot if
needed
The following is a list of the Installation Results screen Status column icons.
Update returned an error An update error has occurred. See the HP SUM log file for details.
Installation failed The component is not installed. To see additional details, click View
Installation Log.
138
Figure 10 shows the Installation Log results screen.
Button Function
Reboot Now Reboots the server (This button is available for local installations only.)
Note:
After updating hard drives in external enclosures such as MSA20,
you must power cycle the external enclosures. The Reboot button in HP
SUM only reboots the server but never power cycles an external enclosure.
There are installation logs named hpsum_log.txt and hpsum_detail_log.txt that contain information
about the installation activity for each host being updated. The hpsum_log.txt log contains a
139
brief summary of the installation activity. The hpsum_detail_log.txt log contains all of the
installation details, including errors, for each component installed.
The log files are found in the following locations:
The Windows OS files are located in subdirectories named according to the IP address of each host
in the \CPQSYSTEM\hp\log subdirectory on the boot partition of the local host. However, the
directory containing the local host information is named local host instead of being named after
the IP address.
The Linux OS files are located in subdirectories named according to the IP address of each host in
the /var/hp/log subdirectory of the local host. The directory containing the local host information is
named local host instead of being named after the IP address. A new file contains detailed
information on the execution of HP SUM.
o The file name for Windows OSs is
C:\cpqsystem\hp\log\hpsum_execution_log_<date>_<ti me>. log.
o The file name for Linux OSs is: /var/hp/log/hpsum_execution_log_<date>_<time>.log.
Note:
Local hosts cannot be included in a list with remote hosts or in a group.
When selecting an iLO or iLO2 as a host, only the iLO firmware can be
updated. The server host must also be selected to update all other
firmware and software components on the same physical server. The
iLO firmware can be updated by either selecting the iLO or the server host.
Figure 11 shows the Select Installation Host(s) screen for Remote Host or Group options.
140
Figure 11. Select Installation Host(s) screen for Remote Host or Group options
Managing hosts
To add, edit, or delete hosts, click the Manage Hosts button. The Manage Hosts screen appears.
Hosts include servers, OAs, iLO, and iLO 2.
141
Note:
Local hosts cannot be included in a list with remote hosts or in a group.
When selecting an iLO or iLO2 as a host, only the iLO firmware can be
updated. The server host must be selected to update all other firmware and
software components. The iLO firmware can be updated by either selecting
the iLO or the server host.
142
Follow these steps to add a host.
1. Click Add Host. The New Host dialog box appears.
Note:
When adding hosts by using either IP address option, you can
select from the IP format options IPv4 or IPv6. The IPv4 format is
the default option because it is the current Internet protocol. The
IPv6 format is the next generation Internet protocol.
3. Enter an optional user-defined description given to the host you want to add.
4. Click OK.
The new host is added to the list on the Select Installation Host(s) screen.
143
Follow these steps to edit an existing host.
1. On the Manage Hosts screen, click the Edit Host button.
The Edit Host dialog box appears.
144
Figure 13. Enter Credentials for Host screen
To enter the credentials for the host, choose one of the following:
1. Select Enter Username and Password, and then enter the username and password.
2. Select Use Current Credentials to use the currently logged-in user credentials.
If an active update process is detected on the remote host, you can select Skip host or Restart update.
Skip host causes the host to be ignored for the rest of the update process, and Restart update
causes any existing or in-progress installation to be terminated.
To continue, click OK.
When you select a group or multiple hosts, the Enter Credentials for Group screen appears as shown
in Figure 14.
145
Figure 14. Enter Credentials for Group screen
The screen separates the remaining hosts that still require credentials from the completed hosts.
Each pane is divided into the following columns:
Column Function
The following is a list of the Enter Credentials for Group screen icons and icon descriptions.
Needs Credentials The credentials for the host have not been entered.
Credentials Failed The credentials entered for the host have failed.
Unable to access host The host cannot be accessed using the credentials
entered, or the host cannot be found on the network.
146
Follow these steps to enter the credentials for the host:
1. In the left pane, select the host from the list of hosts requiring credentials.
2. If all credentials are the same, click Select All to select all the hosts on the list.
3. To enter the required credentials and move the selected host to the Completed Hosts pane,
press the Enter button.
4. To continue, click Next.
Note:
If a TPM is detected and enabled, an HP SUM pop-up warning
message appears after the Discovery Progress screen. You must
read the message and determine how to proceed.
Button Function
View Host Enables you to view additional information about a host after you select it
Install Installs all selected components on all remote hosts. The Install button is grayed-out when a
dependency failure occurs
147
The server host pane of the Select Items to be Installed screen displays the summary information for
each server host that is available for installation. The host pane also features a drilldown of
individual hosts.
The following is a list of the Server Host(s) pane columns.
Column Function
Host Specifies the name of the system, number of updates available, and the estimated time for the
installation
The following are the Server Host(s) pane icons and icon descriptions.
Host Skipped Due to The host is skipped due to an existing HP SUM session.
Existing HPSUM Session
Action Required The host is not ready for installation. Click View Host for additional information.
Discovery Failed The host is not ready for installation. The detection of installed hardware,
software, and firmware has failed.
Note:
The default reboot behavior after updates are installed might also appear
in the Status column.
148
2. Click Install on the Select Items to be Installed screen to update all hosts.
Column Function
Status Specifies the overall installation status of the components on the remote host
The following are the Installation Results screen icons and icon descriptions.
Installation canceled by user The installation was canceled and cannot continue the process.
Button Function
View Host Enables you to view the installation results for the selected host
To view single-host installation results, double-click the host or select the host, and click View Host, as
shown in Figure 16.
149
Figure 16. Zoom into Single Host screen
The HP SUM with OA requires a user ID and password to log in. The user ID must be an
administrator-equivalent ID and not an operator or user equivalent level ID.
Note:
All arguments and information enclosed in brackets are optional.
150
On Windows OSs, use a slash (/) before each argument.
On Linux OSs, use a hyphen (-) before each argument.
If no command line arguments are executed on the command line, the component GUI appears.
Command line arguments
HP SUM recognizes the command line arguments listed in Table 28. These arguments pre-
populate the GUI in the Select Items to be Installed screen. If you specify the host or group, the Select
Items to be Installed screen does not appear.
You cannot use some arguments together, such as /romonly and /softwareonly.
Table 28. Command line arguments
/m[utual]
If the device you want to flash is in a shared storage environment, then this
argument informs the firmware flash engine to flash the firmware. If the device to
be flashed is in a shared storage environment, and the /m option is not passed, then
the component installation fails. (Applies to firmware only.)
/r[eboot]
If the following conditions are met, this argument causes the server (or host server in a
remote installation) to reboot:
The /reboot option is selected or given as a command line argument.
All components selected for installation are successfully installe d.
At least one of the installed components requires a reboot to complete its installation.
151
Command line argument Description
/reboot _delay This argument delays the reboot of the server for the length of time specified by the
timeout_in_secon timeout_i n_seconds variable. You must use this argument with the
ds
/reboot option, or the argument is ignored. Acceptable values are between 15
and 3,600. The default timeout value is 15 seconds for Microsoft Windows
and 60 seconds for Linux. In Linux, the Reboot Delay time is converted from
seconds to minutes. For Linux, any value under a full minute ( 59 seconds or less)
rounds to the next minute.
/reboot _always
If the following conditions are met, then this argument forces the server to reboot:
The /reboot_always option is selected or given as a command line argument.
All components selected for installation are successfully installed.
/s[ilent]
This argument causes the installation to run silently with no GUI or console
output. All data writes to the log file. Any generated prompts use the default option
and continue the installation without user input. If a component requires input
before installation (such as configuration information), then the component
installation fails, and an error message writes to the log file. Failed dependencies are
not reported to the user when using the
/s[ ilent] argument. To check for failed dependencies, remove the
/s[ ilent] argument, reissue the command line, and then the HP SUM GUI
appears.
/c[ omponent]
This argument specifies the components to install. Components to install can be
<component to install>
or specified with or without the /c[ omponent] argument. If using the /c[ omponent]
<component1_to_install> argument, only one component can be specified with the argument. However, multiple
<component2_to_install> /c arguments and components can be specified on the same line. If the /c[ omponent]
argument is not used, multiple components can be specified at the same time, but
the components must be separated by a blank and listed after all the arguments on the
command line. The components are installed in the order provided unless
dependencies between components require installation in a different order. If so,
the utility changes the installation order based on the component
dependencies to ensure the successful installation of as many components as
possible. Multiple components and bundles can be specified on the same
command line. When mixing components and bundles on the command line,
the filter switches control what components and bundles are installed.
/group "group_name"
This argument specifies an already defined group name in the HP SUM GUI.
/b[ undle]
This argument specifies the bundles to install. Bundles to install can be
<bundlename> or <bundle
1_to_install> specified with or without the /b[ undle] argument. If using the /b[ undle] argument,
<bundle2_to_install> only one bundle can be specified with the argument. However, multiple /b
arguments and bundles can be specified on the same line. If the /b[ undle]
argument is not used, multiple bundles can be specified at the same time, but the
bundles need to be separated by a blank and listed after all the arguments on the
command line. Multiple components and bundles can be specified on the same
command line. When mixing components and bundles on the command line, the
filter switches control what components and bundles are installed.
/allow_update_to_bun dle
This argument is a filter switch and enables the user to install newer versions of
components defined in a PSP or firmware bundle. This argument enables these
components to replace the earlier versions of the same component that might
have shipped with the bundles.
152
Command line argument Description
/allow_non_bundle_co
This argument is a filter switch and enables the user to install components that are
mponents
not included in the bundle but reside in the directory with the components in the
bundle.
/use_latest
This argument is a filter switch for use with bundles. The argument enables you to
use the latest version of the bundle when multiple versions of bundles are listed on the
command line. If there are no bundles specified on the command line, and
multiple bundles are in the directory, the /use_latest argument allows HP SUM to
use the bundle with the latest version for installation.
/use_location
This argument specifies a directory or file share that contains the PSP and components
file_share
for use with HP SUM. The file_share format must be a mapped file share and not
in Universal Naming Convention (UNC) format. If you do not specify this argument, the
directory containing hpsum.exe or HP SUM is used by default. This populates the
Directory box on the Source Selection screen. The logged-in account must have
access to this location. The /user and /passwd arguments do not have any
effect when attempting to access the file share. You can use those arguments
only when connecting to a target system.
/use_web
This argument specifies that the check box for Check ftp.hp.com on the Source Selection
screen is to be selected. This allows components to be retrieved from hp.com and to be
used in the list of possible updates
/use_d[ownloaded]
This argument specifies that the check box for Include components previously
downloaded from hp.com on the Source Selection screen is to be selected. This
allows those previously downloaded components to be included in the list of
possible updates.
/tpmbypass or
These arguments specify that if a TPM is enabled, the warning message must be
/ignore_tpm
ignored and component installation is allowed to continue.
/use_snmp
This argument specifies that components, which use SNMP protocol, are
available to be selected for installation. These components are available for
selection by default. When the /use_snmp argument is used, and the
/use_wmi argument is not, the WMI components are optional.
/use_wmi
This argument specifies that components, which use WMI protocol, are
available to be selected for installation. These components are optional by
default and will not be installed unless this argument is used. When the
/use_wmi argument is used, and the /use_snmp argument is not, the SNMP
components are optional.
/romonly
This argument is a filter switch and allows the user to see only the firmware
components needed for installation. When using this filter switch, you must exit,
and then restart HP SUM to return to an unfiltered state. Do not use the /romonly
argument with the /softwareonly argument.
/softwareonly
This argument is a filter switch and allows the user to see only the software
components needed for installation. When using this filter switch, you must exit,
and then restart HP SUM to return to an unfiltered state. Do not use the
/softwareonly argument with the /romonly argument.
/dryrun
This argument simulates the installation for a test run. Nothing is installed.
/continue_on_error
This argument causes the installation to continue and ignore errors. Valid
<error>
values are <error>=ServerNotFound and <error>=BadPassword. The
ServerNotFound option can be used to bypass inactive or unavailable remote hosts
when deploying firmware or software to multiple remote hosts at the same time.
153
Command line argument Description
/override_existing_c
This argument defines the behavior when a remote target has an existing HP SUM
onnection
session in progress. This argument overrides the session in progress and
reinitializes the installation framework on the remote host.
/express_install
This argument starts express install (for local host only). The HP SUM performs
discovery, install, or exit without user interaction. The user can cancel or terminate
HP SUM.
/user <username> or
This argument enables you to log in to HP BladeSystem c-Class OA with your user ID.
/username <username>
/passwd <password>
This argument enables you to use the password for the user ID specified in the /user
parameter. The password is used to log in to remote hosts and HP BladeSystem c-
Class OAs.
/current_credential
This argument enables the credentials of the local host to be used as the
credentials to access the targets instead of providing the username and password
explicitly for each target. The assumption is that the current credentials are valid
for the targets being accessed. (Applies to Windows OSs only.)
/target "netAddress"
This argument is the IP address or the DNS name of a HP BladeSystem c-Class OA
or remote host. When two OAs are in an enclosure, this argument should be
the active OA. When specifying the IP address, you can use either the IPv4 or
IPv6 format.
/logdir "path"
This argument enables you to redirect the output from HP SUM or the HP
BladeSystem c-Class OA flash utility to a different directory than the default
location. For Windows® components, the default location is
%SYSTEMDRIVE%\CPQSYSTEM \hp\log<netAddress> and the redirected
location is <path>\hp\log\<netAddress>. For Linux components, the
default location is /var/hp/log/<netAddress> and the redirected location
is <path>/hp/log/<netAddress>.
SUCCESS_NO_REBOOT
0 0 0 The installation was successful
and no reboot is required
SUCCESS_REBOOT
1 1 1 The installation was successful,
but reboot is required
SUCCESS_NOT_REQUIRED
3 3 3 The component was current or
not required.
154
Return code Value Linux Windows Text
FAILURE_GENERAL
-1 255 255 A general failure occurred. See
error log for details
FAILURE_BAD_PARM
-2 254 254 A bad input parameter was
encountered
FAILURE_COMPONENT_FAILED
-3 253 253 The installation of the component
failed.
HP SUM allows targets, credentials and other information to drive the installation process through
various command-line parameters. Extensive work has been done to ensure HP SUM has command-
line equivalents for all GUI-based operations. With the exception of a few items around proxy
authentication for the pulling of updates from ftp.hp.com, this has been accomplished
HP SUM inputfile
In addition, you can use the new inputfile mode in beta format within HP SUM. Though not yet
officially supported, inputfile mode allows network administrators to leverage within HP SUM to script
multiple targets within a single operation. Currently, the limit for HP SUM is 29 total targets for an
installation, although this number will soon increase. The inputfile functionality is leveraged to further
streamline the updates for work groups of servers and targets. The script input file exists on a secure
server or even a personal computer, as long as HP SUM is executed from this chosen platform. Using
a secure server or a management console to protect the credentials is essential to ensure administrator
and root passwords are not exposed.
To create an inputfile, simply use Notepad or vi editor and the following file format.
Note:
All sections headers and trailers [END] must match.
Note:
Failure to use the SILENT=YES option triggers the use of the GUI mode,
which allows a user to skip screens when the information has already been
provided.
Note:
The DRYRUN=YES option performs dry run installations to ensure that the
scripts work without actually deploying the firmware updates that might be
needed on each target. Remove the DRYRUN=YES option to actually
perform the updates.
[TARGETS]
HOST = BL465C-01
HOST = 192.168.1.2
UID = Bigboss1
PWD = password
[END]
[TARGETS]
HOST = 161.188.162.111
UID = Bigboss2
PWD = password
[END]
155
Once the file has been created, use it with HP SUM by simply adding it as the -inputfile <filename>
parameter to a normal HP SUM command line. For instance, if the name of the inputfile is hpsum.in,
the command-line syntax is hpsum --inputfile hpsum.in.
Note:
Full paths can be added to the inputfile location if it is not stored in the
same location as the HP SUM executables.
Once HP SUM is executed in silent or scripted mode, it runs to completion. However, the HP SUM will
not run to completion if the credentials are bad for any server in the inputfile or on the command-line
through the /target option, or if any server in the installation set cannot be contacted. If any server
password is invalid, HP SUM stops the installation to prevent it from locking out the administrator
password. In addition, the return codes are consolidated so that if any server in the installation set
fails, an error code is returned.
Note:
HP SUM has a parameter that allows an installation to continue if there is a
bad password or a server is not responding. The
continue_on_error parameter allows the BadPassword and
ServerNotFound options to continue with the installation on the
available servers, and the password works. An error is logged in the
subdirectory for the failing servers. The final HP SUM return code still
reflects that an error occurred, but it allows a user to continue with the
installation for certain targets even when all targets are not available.
Example 1
This command line input deploys the latest PSP and firmware components:
hpsum /use_latest /allow_non_bundle_components /silent
Results
All software components from the current directory, including PSP and firmware components that the
HP SUM determines need to be installed, are installed.
Example 2
Either of the following command-line inputs can deploy the firmware components only from the
BladeSystem Firmware Update Bundle and force all components to be installed on a local system:
hpsum /f:bundle /romonly BP000537.xml
hpsum /b BP000537.xml /f:bundle /romonly /silent
Example 3
The following command line can deploy the firmware components only from the BladeSystem
Firmware Update Bundle to targets Target 1 and Server 1:
hpsum /f:bundle /romonly BP000537.xml /target Target1 /target Target2 /user
Administrator /passwd AdminPassword
156
The Target 1 and Server 1 can be any of the following components:
1. An OA
2. A VC Ethernet module
3. An iLO Management NIC port
4. A server that runs the same OS as the system that initiated HPSUM. Both of the targets have the
administrator user ID and the AdminPassword password.
Ports Description
Ports 445 and 137/138/139 These ports are needed to connect to the remote ADMIN$ share on target servers. These
(Port 137 is used only if you are are the standard ports Windows servers use to connect to the remote file shares. If you
using NetBIOS naming service.) can connect remotely to a remote Windows file share on the target server, then you have
the right ports open.
Ports 60000–60028 Random ports are used in this range to pass messages back and forth between the local
and remote systems through the SSL. These ports are used on the system that is running HP
SUM to send data to the target server.
Several internal processes within HP SUM automatically use the port from 60000 when
no other application uses it. If there is a port conflict, the manager uses the next available
port. There is no guarantee that the upper limit is 60028 because it depends on how
many target devices are selected for installation.
Ports 61000–61028 These ports are used from the target server back to the system that is running HP SUM.
The same mechanism is used by the remote access code as the 60000 ports, with the first
trial port as 61000. When a conflict occurs, there is no guarantee that the upper limit is
61028. For the case of ipv4-only and one NIC, the lowest available port is used by HP
SUM to pass information between processes on the local workstation and the location
where the HP SUM is executed. The next available port receives messages from remote
servers.
Port 62286 This port is the default for some internal communications. This port listens on the remote
side if there is no conflict. If a conflict occurs, the next available port is used.
157
Ports Description
Ports 80 or 63000–63005 The logs are passed to the target and retrieved through an internal secure web server that
uses port 80 if it is available. If it is not available, the server uses a random port between
63000 and 63005. This support allows updates of the iLO and VC firmware without the
need to access the host server. It also allows the servers to run VMware or other
virtualization platforms to update the iLO firmware without requiring a server reboot or a
migration of the virtual machines to other servers.
Note:
HP SUM attempts to determine if a server running HP SUM
also hosts a web server. In some cases, HP SUM cannot
detect an existing web server and attempts to use port 80. If
this occurs, installations that are using HP SUM will fail. If
failure occurs, you can move HP SUM to another server or
workstation that is not already running a web server. You can
also disable the web server until HP SUM installations are
complete.
Port Description
Port 22 This port is establishes a connection to the remote Linux server via SSH
Ports 60000–60028 Random ports in this range can pass messages back and forth between the local and
remote systems through SSL. These ports are used on the system running HP SUM to send
data to the target server.
Several internal processes within HP SUM automatically use the port from 60000 when
no other application uses it. If there is a port conflict, the manager uses the next available
one. There is no guarantee that the upper limit is 60028 as it is dependent on how many
target devices are selected for installation.
Ports 61000–61028 The target server and the system running the HP SUM both use these ports to pass
information. Both the remote access code and the 60000 ports use the same mechanism,
with the first trial port as 61000. There is no guarantee that the upper limit is 61028
when a conflict occurs. For the case of ipv4 and one NIC, HP SUM uses the lowest
available port to pass information between processes on the local workstation that
executes HP SUM. The next available port receives messages from remote servers.
Port 62286 This port is the default for some internal communications. It listens on the remote side if
there is no conflict. If a conflict occurs, the next available port is used.
Ports 80 or 63000–63005 The logs are passed to the target and retrieved through an internal secure web server that
uses port 80 if it is available or a random port between 63000 and 63005, if it is not.
This support allows iLO and VC firmware updates without having to access the host
server. It also allows servers running VMware or other virtualization platforms to update
their iLO without having to reboot their server or to migrate their virtual machines to other
servers.
Note:
HP SUM attempts to determine if a server running HP SUM
also hosts a web server.In some cases, HP SUM cannot
detect an existing web server and attempts to use port 80. If
this occurs, installations that use HP SUM will fail. If failure
occurs, move HP SUM to another server or workstation that is
not already running a web server. You can also disable the
web server until HP SUM installations are complete.
158
Trusted platform module support issues
When used with BitLocker, the Trusted Platform Module measures a system state and, upon detection
of a changed ROM image, restricts access to the Windows file system if you cannot provide the
recovery key. HP SUM detects a TPM that is enabled in your system. If a TPM is detected in your
system or with any remote server selected as a target, newer models of ProLiant, HP SUM utilities for
iLO, Smart Array, NIC, and BIOS warn users prior to a firmware update. If you do not temporarily
disable BitLocker and cancel the firmware update, you will need the BitLocker recovery key to access
the user data upon reboot.
Note:
Updating the iLO firmware across the network could trigger a TPM event on
the next server reboot, even if the iLO firmware was updated weeks before.
It is best to reboot the server immediately after updating the iLO firmware
when TPM is enabled to prevent a future issue from occurring.
To allow firmware updates without having to type in the TPM password on each server, the BitLocker
Drive Encryption must be temporarily disabled. Disabling the BitLocker Drive Encryption keeps the
hard drive data encrypted. However, BitLocker uses a plain text decryption key that is stored on the
hard drive to read the information. After the firmware updates are complete, you can re-enable the
BitLocker Drive Encryption Once the BitLocker Drive Encryption is re-enabled, the plain text key is
removed and BitLocker secures the drive again.
Important:
Temporarily disabling BitLocker Drive Encryption can compromise drive
security and should only be attempted in a totally secure environment. For
those administrators unable to provide a totally secure environment, HP
recommends you provide the boot password and leave BitLocker Drive
Encryption enabled throughout the firmware update process. Doing so
requires the /tpmbypass parameter for HP SUM or the firmware update
will be blocked.
159
Follow these steps to temporarily disable BitLocker support to allow firmware updates.
1. Click Start, type gpedit.msc in the Search Text box, and press Enter.
2. Once the Local Group Policy Editor has started, click Local Computer Policy.
3. Click Computer Configuration.
4. Click Administrative Templates.
5. Click Windows Components.
6. Click BitLocker Drive Encryption.
7. When the BitLocker settings are displayed, double-click Control Panel Setup: Enable Advanced
startup options.
8. When the dialog box is displayed, click Disable.
9. Close all the windows, and start the firmware update.
You can also temporarily disable BitLocker in a script by using the following command:
cscript manage-bde.wsf -protectors -disable c:
Once the firmware update process is complete, you can re-enable the BitLocker Drive Encryption
support by following the previous Steps 1 through 7, then clicking Enabled in Step 8, and then closing
all of the windows. If you are scripting the installation, use the following command to re-enable
BitLocker Drive Encryption after completing the firmware deployment.
cscript manage-bde.wsf -protectors -enable c:
160
TPM scenarios
Scenario Result
If the TPM is detected and enabled, the A pop-up warning message appears. After selecting OK, is selected, you
installation is not silent, and a system ROM may continue. The installation is not cancelled by the detection.
must be updated.
If the TPM is detected and enabled, the No pop-up warning appears. A new log file is generated
installation is silent, the /tpmbypass switch is (%systemdrive%\cpqsystem\log\cpqstub.log). Because the
not given, and any firmware updated must be installation is silent, the installation is terminated and not allowed to
applied to the server. continue.
If the TPM is detected and enabled with Option A pop-up warning message appears. After selecting OK, you may continue.
ROM Measuring, the installation is not silent, The installation is not cancelled by the detection.
and a system ROM must be updated.
If the TPM is detected and enabled with Option No pop-up warning appears. A new log file is generated
ROM Measuring, the installation is silent; the (%systemdrive%\cpqsystem\log\cpqstub.log). Because the
/tpmbypass switch is not given, and any installation is silent, the installation is terminated and not allowed to
firmware updated must be applied to the continue.
server.
If the TPM is detected and enabled, the The installation is allowed as if TPM were not detected.
installation is silent, and the /tpmbypass
switch is supplied.
Note:
All other scenarios will not hinder the normal installation procedure.
161
3. Update the VC firmware with the VCSU after all other updates are applied, after the servers
are rebooted, and after all firmware is activated by using the instructions in Scenario 3A:
Updating the VC firmware using VCSU.
If the VC Ethernet firmware is later than version 1.34, HP recommends that you perform the
following tasks to update the enclosure firmware.
4. Update the VC firmware with VCSU as described in Scenario 3A: Updating the VC firmware
using VCSU.
5. Update the OA using the HP BladeSystem Online Firmware Bundles for Windows and Linux by
using the instructions in Scenario 2A: Updating the OA firmware using HP SUM.
6. Update all server-based firmware with the HP BladeSystem FDT or HP Firmware Maintenance
CD by using the instructions in Scenario 1B: Updating a server using the HP BladeSystem FDT
and Scenario 1C: Updating an individual server using the HP Firmware Maintenance CD.
7. Perform automated, scripted installations by moving the VMs to other servers outside the
enclosure selected for update and by using the information in Scenario 6: Scripted installation
of firmware updates for multiple enclosures, including the OA, VC, and server blades.
HP provides individual firmware smart components for online upgrading of the System ROM and iLO
firmware in VMware environments. These smart components apply critical fixes, but because online
smart components are not available for all firmware in VMware environments, HP recommends using
the HP BladeSystem FDT or HP Firmware Maintenance CD update firmware for VMware servers.
These services are designed for administrators who want to ensure their bladed environment has the
most appropriate firmware and driver levels and wish to develop an effective approach to firmware
and driver maintenance.
162
3. Presenting a detailed report with a graphical view of where firmware gaps exist, tables
summarizing specific firmware and driver gaps that require your attention, and an action plan
with specific recommendations and best practices for your update procedure.
These firmware management services are available as part of the HP Proactive Select portfolio of
services. For more information, see www.hp.com/services/proactiveselect.
FAQ
The following sections provide typical questions and answers about specific details regarding
firmware updates. Over time, some of the answers may change, so be sure to see the most recent
edition date of this document for the most current information regarding firmware deployment best
practices.
HP recommends the following firmware update processes as discussed in the answers.
Note:
Firmware updates for the HP StorageWorks MDS600 and the HP 3Gb SAS
BL Switch must be done independent of all other firmware updates. These
updates can be done either before or after the rest of the changes
previously listed in the installation order.
Note:
The MDS600 requires that all servers with Smart Array P700m controllers
be powered down, except for the one executing the firmware update. The
3 Gb SAS BL Switch must be updated with the Virtual SAS Manager (VSM)
web browser interface.
163
Firmware types Known driver dependencies
Linux:
Linux:
Linux:
164
Firmware types Known driver dependencies
Linux:
iLO2 firmware 1.78 or later
Any version of the hp_ilo RPM or hpilo driver*
Linux:
cpq_cciss RPM 2.4.48-12 or later
Note:
Later driver versions may be
required to support newer Smart
Array controllers. The version
listed is the minimum needed to
support firmware updates.
SAS and SATA hard drive firmware behind Smart Array Windows:
controllers hpcisss2.sys driver 5.8.0.0 or later
Linux:
cpq_cciss RPM 2.4.48-12 or later
Note:
Later driver versions may be
required to support newer Smart
Array controllers. The version
listed is the minimum needed to
support firmware updates.
Tape blade firmware For SCSI attached tape drives, the following drivers must be
loaded. For USB-attached tape drives, the support is
already in the OS.
Windows:
hpcisss2.sys driver 5.8.0.0 or later
Linux:
cpq_cciss RPM 2.4.48-12 or later
165
Firmware types Known driver dependencies
Note:
Later driver versions may be
required to support newer Smart
Array controllers. The version
listed is the minimum needed to
support firmware updates.
OA firmware None
VC firmware None
HP SUM questions
This section contains questions that are directly related to HP SUM and its use in the firmware
environment.
How does HP SUM work when applied to an entire chassis; for example, does it update each blade,
iLO2, and so on, sequentially or in parallel?
When HP SUM in executed, the updates are parallel across each target regardless of whether or not
the targets are blades, iLOs, OAs, or VC. However, it executes sequentially within a blade, iLO, VC,
or OA. In other words, all targets are updated in parallel, but only one piece of firmware is updated
at one time on each of the targets that HP SUM is updating.
What are the advantages and drawbacks to using the HP BladeSystem Firmware Update Bundles
versus the HP BladeSystem FDT?
The advantage to the FDT is that it can update firmware for the QLogic, Brocade, and Emulex FC
HBAs. The disadvantage is that it cannot update OA or VC firmware. The advantage of the
BladeSystem Firmware Update Bundles is that it can update the firmware on the OA, VC, and other
network-based targets that the FDT cannot update. Another advantage of the BladeSystem Firmware
Update Bundles is the ability to update multiple targets simultaneously up to the current HP SUM limit
of 29 concurrent targets.
166
Why is Version Control (included with SIM) not the tool of choice to manage firmware upgrades
across the HP BladeSystem portfolio?
The current Version Control Agent (VCA) requires the target to be a server, and requires the
installation of the Version Control Agent on each server. In addition, Version Control only supports a
limited set of firmware updates on a server. Also, Version Control requires that a Windows-based
server host the Version Control Repository Manager (VCRM), which acts as a host for providing the
firmware updates to remote servers. In many Linux-only IT departments, this restriction prevents the use
of Version Control.
Another advantage to using HP SUM is that it can work with non-server-based targets, such as the OA
and VC, which the VCA cannot update. The SIM version control infrastructure is re-architected to
leverage HP SUM as the deployment mechanism to remove the requirement of an agent on each
target and allows SIM to support firmware deployment to network-based devices such as the OA and
VC. The first release of this new architecture is planned ith the SIM 6.0 release.
Currently, Version Control cannot update any offline firmware, which means the Emulex, QLogic, and
Brocade Fiber Channel HBA firmware, the NetXen NIC firmware, and the MDS600 firmware cannot
be updated by using SIM or the VCA.
What about administrators who have invested time to understand HP SIM and specifically Version
Control?
The HP SUM technology will be incorporated into SIM starting in the SIM 6.0 release as a new
method of deploying software and firmware. This will still allow administrators who have invested in
the VCRM to leverage that investment but will allow users to update firmware on non-server-based
target devices. The VCRM catalog will continue to be updated for at least one year after HP SUM
provides equivalent functionality compared to what is available today. Currently, the HP SUM-
equivalent functionality to all features of Version Control will not be completed for several releases.
Plenty of advance notice will be given to administrators to allow them to plan and implement any
changes needed to support the new SIM version control infrastructure. In most cases, the only change
needed will be to remove the Version Control Agent from the servers after validating the new SIM
version control infrastructure works in their environment. Version Control Repository Manager (VCRM)
servers can still be leveraged, but are not required to support this new version-control infrastructure.
Where do I obtain theHP SUM user guide?
The latest HP SUM User’s Guide is always provided in the Firmware CD User’s Guide. To obtain a
copy of this PDF file, visit the FTP site located at ftp://ftp.hp.com/pub/c-
products/servers/management/smartstart/, and choose the latest version of the
FWCDUsersGuidex.xx.pdf file.
How can I leverage the HP SUM pull-from-web functionality when my data center cannot be connected
to the Internet for security reasons?
In this case, the only way to leverage the functionality is to execute HP SUM from a workstation that is
dual-homed on a network with Internet access and to a management network. HP SUM can be
executed on a Windows XP, Vista, or Windows 7 workstation. The HP SUM remote deployment
capabilities can update remote servers, OAs, VC modules, and iLOs. When leveraging the
workstation, none of the servers are connected directly to the Internet. In this configuration, HP SUM
pulls updates through the network connected to the Internet and deploys them on the management
network.
It seems the HPSUM GUI interface cannot currently accept input (for example, groups of IP addresses)
from files, but I heard this feature is planned in a future version. Does the HPSUM CLI allow creation of
a group from a file with a list of IP addresses or DNS names when the file is presented to it as a file
name that is given as a CLI command-line parameter?
HP SUM can accept an input file for the IP addresses and user credentials. The use current
credentials option can be used with the CLI for Windows only (it’s not clear text across the
167
network) as current credentials are not available for Linux users. For more information on how to use
this in your firmware deployments, see HP SUM special considerations.
What is the function of the additional drivers in the BladeSystem Firmware Update Bundle?
The additional drivers facilitate the application of the firmware updates. They are provided as a
convenience and can be deleted if needed Also, if you do not wish to upset the currently installed
software baselines, HP SUM provides an option either through the GUI or silent/scripted installation
that you can select so that the additional drivers are not used. On the Source Selection screen in the
GUI, simply select the Firmware Only option at the bottom of the screen. For silent/script installations,
you can provide the /rom_only command-line parameter when initiating HP SUM from the console
window. This feature is only available in HP SUM 3.6.0 and later.
What is the purpose of the dryrun scripting option?
Its primary purpose is to test scripts called from the CLI approach to HP SUM. The dryrun feature in HP
SUM is activated by using the /dryrun or --dryrun switch, which causes HP SUM to bypass the
actual calling of the firmware smart components during installation and return SUCCESS. This mode is
useful for validating when the targets are available, that credentials are valid, and that all of the
network interfaces and ports are available for a successful firmware deployment.
When using the HP BladeSystem Online Firmware Bundles for Windows and Linux to upgrade an
entire c7000 Enclosure and all of its constituents, including the OAs, server blades, iLO2s, and switch
modules:
Can I simply give the HPSUM tool the OA IP address?
Is the tool able to upgrade all of the components inside the chassis because the OA can
automatically identify the addresses of the iLO2 and modules?
Do I have to manually add IP addresses of the blades, iLO2s, modules, and so on, into the HPSUM
GUI interface, thereby creating my own group, which is, in effect, the enclosure and all of its
contents?
Must I always manually add the host OS IP address that upgrades the blade server BIOS because
the OA cannot identify what it is?
You need to provide the IP addresses/DNS names for all servers that you want updated, along with
the address/DNS name of the OA. On the servers, HPSUM updates the System ROM, iLO/iLO2
firmware, Smart Array Controllers, SAS/SATA hard drives, NICs, and any of the base drivers (iLO,
Smart Array, or NIC) from the HP BladeSystem Online Firmware Bundles for Windows and Linux. In
addition, HPSUM updates the OA firmware through the OA NIC interface. It can be somewhat time-
consuming the first time that you enter the data, but once entered, HP SUM remembers the data
between utility runs. While no passwords are saved, the targets and groups are saved for future
updates
Currently, the server BIOS must be updated prior to the iLO2 because of a potential issue with the
Power PIC. Will HP SUM reorder the installation set to avoid this issue?
There is not an issue with the installation order of the PowerPIC firmware and server BIOS updates.
This was an early concern when the PowerPIC firmware was first released. The current requirements
for updating the PowerPIC firmware including the following:
The PMC firmware must be 0.7 or later. Version 0.5 does not need to be flashed and cannot be
flashed by using any existing smart components or tools. Many older BL460c G1, BL465c G1,
BL480c G1, and BL685c G1 servers are 0.5 and do not need to be updated. Be aware that the
only difference between the 0.5 and 3.4 versions of PowerPIC firmware is the response time to
power capping commands. Version 0.5 normally responds to power adjustment commands within
a couple of seconds. Version 3.4 normally responds within milliseconds. Response time does not
affect the operation of the servers or the overall power requirements of a given blade.
168
The stepping level of the processors on some BL460c G1 and BL480c G1 servers must be G or
later.
iLO2 firmware 1.78 or later must be installed before the PowerPIC firmware can be updated.
An iLO2 driver must be loaded.
System ROM must have dynamic power capping support. All ROMs released in 2009 or later meet
this requirement.
OA firmware must be 2.41 or later for dynamic power capping to function properly.
All versions prior to PMC firmware 3.4 have known issues, so HP strongly recommends that you
update to 3.4 or later.
Note:
You need PowerPIC firmware 3.4(C) to interface with HP SUM.
169
Can we upgrade each component directly to the latest version or do we need intermediate revision
steps.
Almost all components can be upgraded to the latest firmware revision without issue. The only
component that requires an interim revision is for OA firmware updates from 1.x f/w revisions to 2.x
versions. For more information, see the following support documents:
Customer Advisory: HP OA- Upgrading Firmware From Version 1.x to Version 2.25 (or Later) Will
Not Be Successful
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?locale=en_US&objectID=c0
1597033
Link to earlier versions of the OA firmware:
http://h20000.www2.hp.com/bizsupport/TechSupport/SoftwareDescription.jsp?lang=en&cc=us&
prodTypeId=3709945&prodSeriesId=3808910&swItem=MTX-
c1b90e546c3f476193c43cf0d9&prodNameId=3808911&swEnvOID=4006&swLang=13&taskId
=135&mode=5
Can I update my Blades HBA firmware online?
If you have QLogic, Brocade, or Emulex FC HBAs in your servers, you must boot offline (by using the
HP BladeSystem FDT or the Firmware Maintenance CD) to update the firmware. This is required
because these vendors have not yet provided online firmware flash tools. HP is working with the
individual firmware vendors and hopes to have online firmware updates for these Fiber Channel
HBAs in the future.
How do I manage my Blade interconnect switch updates?
You must use the vendor tools to update the blade switch interconnect modules. In the future, HP SUM
will be enhanced to support blade switch interconnects.
Are there any guidelines for downgrading firmware?
There are several limitations about downgrading firmware. If necessary, firmware downgrades should
only be attempted on a component-by-component basis. None of the current installation tools have the
necessary logic to preclude issues from occurring when downgrading firmware. Downgrades are
discouraged unless absolutely necessary.
Best Practice:
Do not downgrade more than one firmware version or risk incompatibilities
between the downgraded firmware and other hardware.
Can you upgrade versions of HBA firmware without being concerned about going through an interim
version to facilitate the upgrade?
There are no generational skipping requirements for Fibre Channel HBAs. You can upgrade from one
firmware and boot bios version to another without any intermediate steps.
Can I roll-back the individual changes on a per-server or per chassis basis?
There is no uninstall/reverse functionality, although it is possible to force older components to
overwrite newer ones if a reference set of the presently installed versions is created.
Note:
HP strongly discourages downgrading firmware unless absolutely
necessary.
170
How often should we upgrade firmware?
Normally, update cycles should be set at approximately 6-month intervals. HP strongly recommends
upgrading within the 9-month support window, which includes the currently released Quarterly
Release Set plus two earlier versions to ensure vital updates and enhancements are installed. The
result is optimal performance and availability of HP BladeSystem enclosures and servers.
How does the firmware version affect our support status with HP?
HP Support requires that when support is needed for a server, the serve must be aligned with one of
the columns on the BladeSystem Firmware Compatibility Chart; otherwise, an administrator is
requested to update the server before additional support is provided. Doing so ensures that all known
issues are addressed and possibly resolved and that the enclosure and blades are at a known support
state before HP Support attempts to resolve the problem.
How do I add updated components to the HP BladeSystem FDT?
Today, the only want to update the FDT is to use UltraISO or another ISO editing tool that supports
SLES10 SP2 (or in the SLES11) boot environments.
How do I add updated components to the HP firmware maintenance CD?
The following information will guide you in adding components to the HP Firmware Maintenance CD.
Using a USB Key
1. Insert a USB key containing the Firmware CD ISO image created.
If the blade server supports the SUV cable, use the HP USB Key Creator for Windows utility in
the SUV (Serial-USB-Video) cable attached to the blade that is selected for update.
2. For Windows, download the HP USB Key Creator for Windows utility from the HP website and
install it on a workstation.
Once installed, the utility places a shortcut in the Programs start menu folder of the HP System
Tools.
Follow these steps to make your drive key bootable and copy the contents of the CD.
1. Place your HP USB drive key in an available USB port.
2. Select the HP USB Key Utility shortcut in the HP System Tools folder.
3. Complete each step presented by the application.
Note:
The HP USB Key Creator formats the USB key so that any files on
the key are lost. Be sure to use a USB key that is at least 1 GB
and does not contain any valuable files.
For Linux, you can manually create the USB key by following these steps.
1. Obtain SYSLINUX 3.2 or higher from http://freshmeat.com or http://syslinux.zytor.com from
and download to a Linux workstation.
2. Install the SYSLINUX RPM obtained in Step 1.
3. Create a directory for the USB key mountpoint if one does not already exist. (For example,
mkdir /usbkey.)
4. Insert the USB key and mount it (mount /dev/sda1 /usbkey).
171
Note:
The device mountpoint can vary depending on whether other
SCSI drives are also installed on the server. Thus, the device
mountpoint can be sdb1, sdc1, etc).
5. Issue the command ./syslinux /usbkey to have SYSLINUX write out the boot partition to the
USB key.
Caution:
Failure to follow this step could lead to a key that will not boot
the Firmware CD until the SYSLINUX command is successful.
or
mount -t iso9660 firmware-<version>.iso /cd_mount_point -o loop
9. Execute the usbcreator.sh shell script passing in the CD mount point and the USB mount point
to move the Firmware CD files to the USB key.
./usbcreator.sh /cd_mount_point /usbkey
10. If additional components must be added to the USB, copy them into the /compaq/swpackages
(Linux) or the \compaq\swpackages (Windows) directory and HP SUM picks them up
automatically if the HP SUM version being used can support the type of components added.
11. .Unmount the CD and the USB key.
umount /dev/cdrom
umount /dev/sda1
Note:
This must match the initial mount point in Step 4.
12. Remove the USB key and CD from the workstation used to create the USB key.
172
How do virtual environments affect the firmware update process?
Unfortunately, none of HP current firmware update tools work in virtualized environments. The
problem is the Virtual Machines abstract the physical hardware and firmware updates deal with
physical hardware. VM’s have limited ability to access underlying hardware through vendor-specific
APIs. Because of the physical hardware abstraction, it is necessary for the user to either shut down or
move all of the VMs to another server and reboot the server into another boot environment, such as
the ones provided by the HP BladeSystem FDT and the HP Firmware Maintenance CD. These boot
environments provide access to the physical hardware so the firmware can be updated. Once the
update process has been completed, the virtual machine environment can be restored to its initial
configuration by either restarting the VMs or moving them back to the recently updated server.
In this command, Administrator is the OA administrator account and 16.89.1.3 is the address of the
active OA module. The output from the command returns a similar output as the following example.
The highlighted element contains the version of OA firmware currently installed (2.52).
Onboard Administrator #1 information:
Product Name : BladeSystem c3000 Onboard Administrator
Part Number : 448589-B21
Spare Part No.: 441832-001
Serial Number : P3059X39VUE073
UUID : 18P3059X39VUE073
Manufacturer : HP
Firmware Ver. : 2.52 Jul 13 2009
Hw Board Type : 1
Hw Version : X3
The ssh command can be used to retrieve the installed versions of iLO, System ROM, and PowerPIC
firmware by using the OA show server info all command. The highlighted areas reflect the
System ROM version, the iLO firmware version and the PowerPIC firmware version in sequence.
ssh -l Administrator 16.89.1.3 show server info all
173
Product Name: ProLiant BL280c G6
Part Number: [Unknown]
System Board Spare Part Number: 531337-001
Serial Number: 2UX91700UU
UUID: 37373035-3738-5532-5839-313730305555
Server Name: WIN-P2L0THRBZYQ
Asset Tag: [Unknown]
ROM Version: I22 08/14/2009
Embedded Ethernet
NIC 1 MAC Address: 00:24:81:D2:89:5A
NIC 2 MAC Address: 00:24:81:D2:89:5B
In some cases, the Power Management controller firmware version shows Not Available. This is
usually an indication that the Power Management controller is not functioning correctly. If this
happens, try powering off the blade, removing it from the enclosure, and re-inserting it. If the problem
still occurs, contact HP Technical Support to report the problem.
Management Processor Information:
Type: iLO2
Name: ILOTWT750009P
Firmware Version: 1.79 Aug 28 2009
IP Address: 16.89.1.78
MAC Address: 00:1E:0B:92:30:66
Power Management Controller Version: Not Available
To find the version of installed firmware for the VC, use the show firmware command by using
OpenSSH for Windows or the ssh RPM for Linux as shown in the example that follows. The password
must be provided, unless SSH credentials are established with the VCM.
C:\>ssh -l Administrator 16.83.61.67 show firmware
Password:
=============================================================================
ID Enclosure Bay Type Firmware Version Status
=============================================================================
enc0:1 HPSUMEnclosure 1 VC-ENET 2.12 2009-08-06T16:45:57Z OK
-----------------------------------------------------------------------------
enc0:2 HPSUMEnclosure 2 Unknown
Incompatible
-----------------------------------------------------------------------------
enc0:3 HPSUMEnclosure 3 VC-ENET 2.12 2009-08-06T16:45:57Z OK
-----------------------------------------------------------------------------
enc0:4 HPSUMEnclosure 4 Unknown OK
-----------------------------------------------------------------------------
enc0:5 HPSUMEnclosure 5 VC-FC 1.32 7.12.2.04
OK
In this example, the VC Ethernet modules in Bay 1 and Bay 3 are 2.12 of VC firmware, and the VC
Fiber Channel module in Bay 5 is 1.32.
174
Blade server-level firmware information
As with the Enclosure-Level firmware information, there is not a single tool that provides all firmware
version information within a blade. However, by leveraging data reported by the individual smart
components, most of the installed firmware versions can be obtained without too much effort. The only
exception is the installed firmware version for the Emulex, Brocade, and QLogic Fiber Channel HBAs.
Currently, the firmware version for the HBAs can only be obtained in Linux without the use of external
applications such as SANSurfer, CommandView, and others.
This section covers how to obtain the installed firmware versions for the following firmware types:
NIC firmware
To determine the versions of NIC firmware installed in a given server, the NIC firmware smart
component must be available. The NIC firmware component provides its own firmware version
information for each type of firmware available for each NIC found in the server. The component can
be executed in discovery mode and provides a file name to generate the special discovery output file.
The NIC firmware component can be executed in discovery mode by using the following command.
CP010605.scexe /d CP010605_nic.xml
Where:
CP010605.scexe is the name of the NIC firmware component
/d is the discovery option
CP010605_nic.xml is the output file name to write the discovered firmware information
Note:
The /d option must be /d and must immediately be followed with a file
name. Otherwise, the firmware component launches the NIC firmware
installers instead of identifying the available NIC firmware.
The resulting output file shows the information in the following example. In this example, the output
has been pruned to show only necessary details.
…
<alt_name value="HP NC-Series Broadcom Online Firmware Upgrade Utility
for Linux" />
<version value="2.1.8" />
<takes_effect value="reboot" />
<devices>
<device>
<device_id value="eth0" />
…
<macaddress value="001A4BB28938" />
<product_id value="HP NC373i Multifunction Gigabit Server
Adapter" />
…
<fw_item>
<type value="Bootcode" />
…
<version value="1.9.6" />
<active_version value="1.9.6" />
…
</fw_item>
<fw_item>
<type value="PXE" />
…
<version value="n/a" />
<active_version value="n/a" />
…
</fw_item>
175
<fw_item>
<type value="iSCSI" />
…
<version value="1.2.3" />
<active_version value="1.2.2" />
…
</fw_item>
</device>
</devices>
…
The first version field located near the top of the returned XML file (2.1.8 in the example) indicates the
version of the component being used and does not indicate the individual firmware types.
Each NIC has its own <device> entry. The entry also includes product name and MAC address of the
adapter that is being reported, plus multiple firmware items ( fw_item) entries that indicate the
installed firmware version for each type of firmware available on the NIC. For each type of firmware,
the <version> field indicates the version of firmware that is deployed if the firmware update is
initiated with this component. The <active_version> field indicates the currently installed version of
this firmware.
In the previous example, the Bootcode shows the installed version in the <active_version> field as
1.9.6 and the version available in the component as also being 1.9.6. In the PXE item, the n/a
indicates this NIC has PXE support disabled and, therefore, cannot be updated. In the last firmware
item for iSCSI support, the installed version of firmware is 1.2.2 and the component updates it to
1.2.3 if an update was attempted with the CP010605.scexe component used to generate the
discovered data.
Note:
The same discovery file format is also available using the Windows smart
components.
Tape firmware
To determine the version of tape firmware installed on a given tape drive, the tape firmware smart
component must be available. The tape firmware component provides its own firmware version
information for each tape drive found in a server. The component can be executed in discovery mode
and provides a file name to generate the special discovery output file. The tape firmware component
can be executed in discovery mode by using the following command.
CP010445.scexe -s -d CP010445_tape.xml
Where:
CP010445.scexe is the name of the tape firmware component
-s is the silent option
-d is the discovery option
CP010445_tape.xml is the output filename to write the discovered firmware information
The CP010445_tape.xml file option must be passed immediately after the -d option for this to work.
This file can then be parsed to obtain the drive type and firmware as highlighted in the following
sample tape firmware discovery output file called CP010445_tape.xml in our example.
<?xml version="1.0" encoding="UTF-8" standalone="no" ?>
<hp_rom_discovery version="2.0.0.0">
<type value="TAPE"/>
<alt_name value="HP TAPE Firmware for Drive x, Drive y, and Drive z for
Windows"/>
176
<version value="2.0.3"/>
<takes_effect value="immediate"/>
<devices>
<device>
<device_id value="0x80050300"/>
<product_id value="Ultrium 4-SCSI"/>
<busnumber value="0"/>
<devicenumber value="0"/>
<funcnumber value="0"/>
<fw_item>
<type value=""/>
<firmware_id value=""/>
<version value="11.825000"/>
<active_version value="11.825000"/>
<action value="upgrade"/>
<duration value="0"/>
<message value=""/>
<shared value="no"/>
</fw_item>
</device>
</devices>
</hp_rom_discovery>
In this example, the Ultrium 4 SCSI tape drive in the server is 11.825000 of the firmware that is
available for that type of drive.
Note:
The same discovery file format is also available by using the Windows
smart components.
Smart Array controller firmware and SAS/SATA hard drive firmware versions
The HP Array Configuration Utility Command-Line Interface program (hpacucli) can pull controller
and hard-drive firmware information. The latest version of the hpacucli utility is found in the latest HP
ProLiant Support Pack version. Once installed, the binary file and its support libraries are placed in
the C:\Program Files\Compaq\Hpacucli\Bin” or “C:\Program Files
(x86)\Compaq\Hpacucli\bin directory, depending on the architecture of the system on which it was
originally installed. The files in the directory can be scraped and added to a script that is executed on
each server. Doing so pulls out the installed firmware version for the Smart Array Controllers and hard
drives located behind these controllers in a given server. The following is an example of the command
to show the details for
177
Drive Type: Data Drive
Interface Type: SAS
Size: 36 GB
Rotational Speed: 10000
Firmware Revision: HPD7
Serial Number: 3LC04GYB00007543CG6U
Model: HP DG036A8B53
…
In this example, which has been reduced to show only the relevant parts, the Smart Array firmware
5.26 and of the drives shown, one is HP model number DG036A8B5B and has firmware HPD4, and
the other is HP model number DG036A8B53 and has firmware HPD7 installed. Multiple controllers
and drives can be reported in a single call to hpacucli.
Note:
The same functionality also exists for Linux with the HP array configuration
utility command-line interface RPM provided in the ProLiant Support Packs
for Linux.
Troubleshooting
Troubleshooting HP SUM
When using HPSUM, the logs files are located at the following locations:
Windows (for both firmware and drivers)
%SYSTEMDRIVE%\cpqsystem\hp\log\<ip_address>\hpsum_detail_log.txt
Linux
/var/hp/log/<ip_address>/hpsum_detail_log.txt
Note:
Using the offline environments provided by the Firmware Maintenance CD
and the HP BladeSystem FDT result in the log files being written to the Linux
location.
HP SUM also creates trace logs of its installation that can be used to debug problems. These trace
files are located in the following places:
Windows Server 2003/XP/Vista:
%TEMP%\hp_sum\
Linux:
/tmp/hp_sum
HP SUM creates a separate trace log for each target server. These are captured in subdirectories
under the trace log directories noted in this example. The directories start with Target_0, Target_1,
and so on. These directories contain the target specific trace information. No passwords or sensitive
data is stored in this trace logs.
178
How to debug Discovery failures
If you receive an HPSUM Connection Error or Discovery Failed messages, there are several
troubleshooting tips.
1. Ensure your workstation does not have an existing connection to the ADMIN$ share on the
target IP address. If it does, it prevents HP SUM from connecting to the remote server share,
because Windows only allows one connection from a client to a server share. This can be
checked by entering net use‖ at a command prompt. If there is an existing share to the target
IP address \admin$ share, delete it and try the installation again.
2. Ensure the target IP address server admin$ share is accessible. To accomplish this, validate the
target server can be accessed by entering net use x:
\\<ip_address_or_dns_name>\admin$ for the target server IP address or DNS name. Once
the connection is validated, ensure it gets deleted by entering net use x: /d at a command
prompt.
3. Ensure that the user id for connecting to the target IP address server is part of the administrators
group. If it isn’t, HP SUM blocks installation to the target.
4. Ensure WMI is enabled and running on all Windows target servers
5. For Linux, ensure the SSH port is not blocked.
In some rare cases, external storage enclosures may cause HP SUM to hang or report discovery
failed. To resolve this problem, disconnect the external storage until the firmware updates are
complete.
For Linux, ensure the target server can be contacted through SSH and that the scp command is
available to securely send files to the target server.
Ensure the firewall ports on any routers in the network, as discussed in HP SUM Special
Considerations.
The Symantec End Point Protection product (SEP) blocks HP SUM ability to communicate with remote
targets if the Network Threat Analysis feature is enabled. The only workaround so far is to disable this
feature while HP SUM is in use on the workstation.
Examine the OpMan.trace, IPScout.trace, OSScout.trace, discagent.trace, and
discmanager.trace files to determine the cause of the failure. These files provide the following
information.
HPSUM Trace files Function provided
OpMan.trace Provides operations trace of the overall installation process.
IPScout.trace
Provides the information on whether the remote target could be contacted
and the type of target found (iLO, server, VC, OA, etc.)
OSScout.trace
Provides the details on the connection setup plus is responsible for
cleaning up after an installation and initiating a reboot, if needed and
selected by the user, on the target system
discagent.trace
Provides the actual details of the execution of the discovery agent on
either the local system during a local installation or the remote target
server. If a discovery tool fails, it is normally reported here and surfaced
as a ―Discovery Failed‖ message.
discmanager.trace
Provides the interaction between the Operations Manager and the remote
discovery client. Any failure in network communications is normally
reported in this file and surfaced as a ―Discovery Failed‖ message.
179
Installation failures
1. When remote installations fail, try running HP SUM locally on the failing server if possible. This
removes the network connectivity from the situation and allows more information to be seen
while the installation occurs.
2. The HPSUM remote session logs are saved on the target server. For Windows, these are
located in the C:\Windows\hpsum_<date_time_codex>\HPSumServerW32.log file. For Linux,
these files are located in the /tmp/hpsum_<date_time_codex>HPSumServer.log file.
3. Examine the OpMan.trace, IPScout.trace, OSScout.trace, InstallClient.log, and
InstallManager.log trace files to determine the cause of the failure. These files provide the
following information.
HPSUM Trace files Function provided
OpMan.trace
Provides operations trace of the overall installation process.
IPScout.trace
Provides the information on whether the remote target could be contacted
and the type of target found (iLO, server, VC, OA, etc.)
OSScout.trace
Provides the details on the connection setup plus is responsible for
cleaning up after an installation and initiating a reboot, if needed and
selected by the user, on the target system
InstallClient.log
Provides the actual details of the execution of the individual components
including the command line parameters used to launch the components
and the component return code before it is converted to HPSUM return
codes.
InstallManager.log
Provides the interaction between the Operations Manager and the remote
installation client. Any failure in network communications is normally
reported in this file and surfaced as a ―Installation Failed‖ message for the
affected component and potentially all components that follow the failing
component.
It is possible to look in the OpMan.trace file to see which component was winnowed from the
installation set and which ones were added. Normally, components are winnowed for the following
reasons:
If they don’t support installation on the given OS
If the hardware they are designed for is not discovered to be present in the server
If the component is not for the type of target selected
If the component does not report itself capable of being deployed to a given target
If the component cannot be deployed in either the online or offline environment
If HP SUM detects components that don’t match the online or offline mode
If the component is for a particular class (p-class/c-class) of BladeSystem enclosure and the
component does not find that class of enclosure
A sample of the output trace in the OpMan.trace is provided in the following example that shows
how to determine if a component is prevented from being shown on the Select Items to Install screen
in HP SUM or is being deployed from the silent, console mode. In the example, the binary image files
0.bin and 1.bin (which represented iLO firmware files), components cp011301.exe and
cp011500.exe and the HP BladeSystem Firmware Update Bundle for Windows represented by
bundle file bp000648.xml are added to the installation set. All the other components are removed for
various reasons.
180
InstallSet.cpp[212]: Winnow--Adding FileName 0.bin
InstallSet.cpp[212]: Winnow--Adding FileName 1.bin
InstallSet.cpp[222]: Winnow--Removing FileName 2.bin
InstallSet.cpp[212]: Winnow--Adding FileName cp011301.exe
InstallSet.cpp[222]: Winnow--Removing FileName cp011321.exe
InstallSet.cpp[222]: Winnow--Removing FileName cp011489.exe
InstallSet.cpp[222]: Winnow--Removing FileName cp011497.exe
InstallSet.cpp[212]: Winnow--Adding FileName cp011500.exe
InstallSet.cpp[222]: Winnow--Removing FileName cp011504.exe
InstallSet.cpp[222]: Winnow--Removing FileName cp011505.exe
InstallSet.cpp[222]: Winnow--Removing FileName cp011550.exe
InstallSet.cpp[222]: Winnow--Removing FileName cp011560.exe
InstallSet.cpp[242]: Target 0: Added Bundle bp000648.xml
Some components, such as the Emulex, Brocade, QLogic HBAs, the Tape firmware, and Broadcom
NIC firmware components require additional parameters. Executing these components without the -s
option displays the additional parameters these components require to successfully install in the FDT
boot environment.
Once the component installation is complete, the echo $? command can be provided at the prompt
to find the final return status for the component. In addition, the /var/cpq/Component.log file can
be edited with vi to see the details written to the log during the component installation. Be aware that
the /var/cpq/Component.log file is overwritten each time a component is executed.
More advanced users can insert a USB key into the SUV (Serial, USB, and Video) cable connected to
the front of a given blade. If additional components are placed in the / directory on the USB key,
HPSUM can automatically pick these up. To execute HPSUM, use the ./hpsum -s option as
previously mentioned.
181
Trouble shooting Log Files for individual smart components
When using an individual smart component to install firmware or software, the log file is written in the
following locations:
Windows (both firmware and drivers)
%SYSTEMDRIVE%\cpqsystem\log\cpqsetup.log
Linux:
o Drivers: /var/log/hppldu.log
o Firmware: /var/cpq/Component.log
Note:
All logs are cumulative for Windows (all) and Linux PSP software. Linux
firmware components overwrite the Component.log file each time.
Error Action
The software is not supported for installation on this system. The SMART component is corrupt.
Unable to load the FIRMWARE.INI file. No firmware is Download the component again from hp.com and reinstall.
found for this system.
This system does not have a Power Management Controller. The server does not support the Power Management
Controller. On certain servers, the Power Management
Controller is optional based on the specific Power Supply
solution that is being used.
Ensure the proper option kit is installed.
The software is installed and up-to-date. The installation The Power Microcontroller firmware is already up-to-date
process does not need to continue; however, you may still and no further update is required.
install the software.
Unable to communicate with the iLO management Ensure that Integrated Lights-Out 2 (iLO 2) is not being
processor! flashed or reset because of a recent firmware upgrade flash
process. Make sure the HP iLO Channel Interface driver is
installed and functioning properly.
You may be able to correct this problem by cycling power.
Unable to communicate with the Power Management
You must physically disconnect all power, not just press the
Controller.
power button. If this is a blade server, you must remove and
reinsert the blade.
You must install the iLO Channel Interface driver to use this
component.
The Power Management Controller on this system does not Certain versions of ProLiant BL460c and ProLiant BL480c
support firmware updates series servers do not support update of the Power
Microcontroller.
Unable to communicate with the Power Management You may be able to correct this problem by cycling power.
Controller. You must physically disconnect all power, not just press the
182
Error Action
The Power Management Controller requires disaster power button. If this is a blade server, you must remove and
recovery. reinsert the blade.
Could not unlock the Power Management Controller! 1. Remove auxiliary power from the system.
Unable to flash the Power Management Controller! On all ProLiant G5 series blades and certain ProLiant
BL460c and ProLiant BL480c series blade, this requires
physically removing the blade from the enclosure or
removing all power from the enclosure.
2. On a ProLiant G6 series blade, use the RESET SERVER
<BAY NUMBER> command from the OA.
Be aware that resetting a bay will reset all blades in the bay
including both servers in a dual server blade configuration.
It may be necessary to reseat and attempt the Power
Management Controller Firmware update process multiple
times before proceeding to the next step.
If the previous recovery attempts do not resolve the issue, contact HP Technical Support for further
assistance at http://www.hp.com/support.
In some instances, after an iLO or PowerPIC firmware update, a server shows a red X in the OA web
interface, and the server is unable to power on. There are several possible causes of this condition.
The following items list three possible ways to recover from this scenario once it has been confirmed
that all iLO, System ROM, OA, and Power Management Controller firmware is updated.
183
When a blade is first inserted into an enclosure, the Power Management Controller calculates the
amount of power need to power on the server. This value is then requested from the OA. With Power
Management Controller 0.7 firmware, the value is incorrectly calculated, which causes the request to
the OA to be maxed out. This usually occurs at around 500 watts instead of the normal range of 100-
200 watts for a given blade server. When too many servers request the maxed-out value, the OA
becomes over-allocated and prevents some blades from powering on. Even after the power
management controller is updated, there are instances when the incorrect values in NVRAM for the
blade server persist.
Reset the blade
1. Remove the blade and re-insert it.
2. If this does not work, reset the NVRAM.
Note:
Resetting the configuration causes any RBSU settings to be reset to defaults.
After following this set of instructions, it may be necessary to reset the RBSU
settings after updating the PowerPIC firmware to the latest version.
If clearing the NVRAM does not clear the problem, it may be necessary to reset the iLO.
Reset the iLO
1. Power off blade.
2. Remove blade from enclosure.
3. Open blade cover and put a jumper on the two pins (J102) close to the system maintenance
switch.
4. Re-insert blade into enclosure.
5. Allow blade to power up, and If system powers on and iLO2 is dead, turn power system back
off.
6. Remove blade from enclosure.
7. Open blade cover, and flip the System Maintenance Switch 1 to On.
8. Re-insert blade into enclosure.
9. Allow blade to power up, and start FDT to flash the iLO2 firmware.
184
10. Power-off the blade after the firmware updates are complete.
11. Remove blade from enclosure.
12. Open blade cover, and flip the System Maintenance Switch 1 to Off.
13. Remove jumper from J102.
14. Re-insert blade into enclosure.
15. Allow blade to power up and go through normal boot process.
Note:
Resetting the iLO causes all iLO settings to reset to defaults. After following
this set of instructions, it is necessary to reset their iLO configuration
settings, after updating the iLO firmware to the latest version if the user has
changed the iLO default settings.
185
o Linux:
ftp://ftp.hp.com/pub/softlib2/software1/supportpack-linux/p1418640128
(Choose highest numbered directory for the latest version)
The HP Integrated Lights-Out Management Processor Scripting and Command-Line Resource Guide
http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00294268/c00294268.pdf
Customer Advisory: (Revision) ProLiant Servers - Servers with Equal to or Greater Than 64 GB of
Memory May Stop Responding While Booting SmartStart 8.25 (or Earlier), Firmware Maintenance
CD 8.50 (or Earlier), or HP BladeSystem FDT CD 1.60
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=
c01554945&jumpid=reg_R1002_USEN
About the latest management software and driver updates and known issues, see the HP
BladeSystem Chart Release Notes at:
http://h18004.www1.hp.com/products/blades/components/matrix/
For best practices, see the HP BladeSystem Chart Getting Started Guide
http://h18004.www1.hp.com/products/blades/components/matrix/
186
Glossary
Acronyms and abbreviations
Term Definition
FC Fibre Channel
OA Onboard Administrator
OS operating system
VC Virtual Connect
VM virtual machine
187
Technology for better business outcomes
© Copyright 2010 Hewlett-Packard Development Company, L.P. The information
contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as
constituting an additional warranty. HP shall not be liable for technical or editorial
errors or omissions contained herein.
Microsoft, Microsoft Windows, Windows XP, and Windows Vista are U.S.
registered trademarks of Microsoft Corporation.