This chapter describes how to configure the Configure Replace feature.

Similar documents
Configuring Session Manager

Configuring Password Encryption

Configuring IP TCP MSS

vpc Configuration Synchronization

Configuring Traffic Storm Control

Configuring EEE. Finding Feature Information. This chapter describes how to configure Energy Efficient Ethernet (EEE) on Cisco NX-OS devices.

Configuring Rate Limits

Configuring Network QoS

Send document comments to

Configuring LDAP. Finding Feature Information

Configuring DNS. Finding Feature Information. Information About DNS Clients. DNS Client Overview

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER

Configuring Layer 2 Switching

Configuring Password Encryption

Configuring User Accounts and RBAC

Working with Configuration Files

Configuring ECMP for Host Routes

Configuring Private VLANs Using NX-OS

Configuring Rate Limits

Configuring 802.1X. Finding Feature Information. Information About 802.1X

Configuring Fabric QoS Mapping

Configuring STP Extensions Using Cisco NX-OS

Configuring Policy-Based Routing

This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices.

B Commands. bandwidth (interface) Send document comments to

Configuring Layer 2 Switching

Configuring Traffic Storm Control

Configuring Port Channels

Configuring MST Using Cisco NX-OS

Configuring TACACS+ About TACACS+

Configuring Cisco Unified FEX Nexus 2348UPQ with Fiber Channel Interfaces

Configuration Replace and Configuration Rollback

Configuration Replace and Configuration Rollback

Configuring Mutation Mapping

Nexus 7000 and 7700 Series Switches Optimized ACL Logging Configuration Example

C Commands. Cisco Nexus 5500 Series NX-OS System Management Command Reference 1

Basic Device Management

Configuring Ethernet OAM

Configuring DHCP Snooping

Configuring Policy-Based Routing

Configuring Layer 3 Virtualization

Configuring Terminal Settings and Sessions

Performing Software Maintenance Upgrades (SMUs)

Configuring Network QoS

Cisco Nexus 1000V Software Upgrade Guide, Release 4.0(4)SV1(3d)

Performing Software Maintenance Upgrades

Configuring a MAC ACL

Configuring SPAN. Finding Feature Information. About SPAN. SPAN Sources

Configuring SSH and Telnet

Configuring Authentication, Authorization, and Accounting

Configuring IP Tunnels

Configuring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections:

Configuring sflow. Information About sflow. sflow Agent. This chapter contains the following sections:

Configuring Terminal Settings and Sessions

Tcl has the following configuration guidelines and limitations:

Cisco NX-OS Interfaces Commands

Configuring Enhanced Virtual Port Channels

Configuring Port Channels

Configuring Static Routing

Configuring Layer 3 Interfaces

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Configuring the Embedded Event Manager

Configuring MAC Address Tables

Scheduling Maintenance Jobs

Configuring RADIUS. Information About RADIUS. RADIUS Network Environments. Send document comments to

Configuring Online Diagnostics

Managing Configurations

Converting from Cisco NX-OS to ACI Boot Mode

Configuring EtherChannels

With 802.1X port-based authentication, the devices in the network have specific roles.

Configuration Replace and Configuration Rollback

Configuring Local SPAN and ERSPAN

Configuring Static and Dynamic NAT Translation

Configuring System MTU

Nexus 9500 Spine Supervisor Failure Recovery

Configuring Static and Dynamic NAT Translation

Configuring GIR (Cisco NX-OS Release 7.1(0)N1(1))

Configuration Management Commands on the Cisco IOS XR Software

Configuring Online Diagnostics

Using the Command-Line Interface

Configuring Layer 3 Interfaces

Configuring User Accounts and RBAC

Configuring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections:

Configuring NetFlow. About NetFlow. This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices.

Configuring FCoE NPV. Information About FCoE NPV. This chapter contains the following sections:

VDC Virtual Device Context. Prepared By Rajeev Srikant

IVR Zones and Zonesets

Configuring NTP. Information About NTP. This chapter contains the following sections:

Configuring DHCP. Finding Feature Information

Using the Command-Line Interface

Configuring the Scheduler

OTV Loopback Join Interface

Configuring WCCPv2. Information About WCCPv2. Send document comments to CHAPTER

Nexus 7000 Series Switch Problem with Remote User Authentication via SSH with a TACACS account

Software Package Management Commands

Configuring Queuing and Flow Control

Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x

Monitoring QoS Statistics

Configuration Replace and Configuration Rollback

Configuring System Message Logging

Transcription:

This chapter describes how to configure the feature. Finding Feature Information, page 1 Information About, page 1 Configuring the, page 2 Workflow for operation, page 3 Verifying the Operation, page 4 Configuration Examples for the, page 5 Finding Feature Information Your software release might not support all the features documented in this module. For the latest caveats and feature information, see the Bug Search Tool at https://tools.cisco.com/bugsearch/ and the release notes for your software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the New and Changed Information chapter. Information About The (CR) feature enables the Nexus switch to replace the running-configuration with the user provided configuration without reloading the device. Device reload may be required only when a configuration itself requires a reload. The user provided configuration is running-configuration taken from a NXOS device. CR replaces the entire running-configuration with new configuration provided by the user. In case of failure in CR the original configuration is restored in the switch. Benefits of Allows the user to replace the current running configuration file with the user-provided configuration file without having to reload the switch or manually undo CLI changes to the running configuration. This helps to reduce the system downtime. Allows the user to revert to any saved Cisco NX-OS configuration state. 1

Configuring the Simplifies the configuration changes by allowing the user to apply a complete configuration file to the device, where only the commands that need to be added or removed are affected. The other configurations that are not modified remain unaffected. Prerequisites for You need to provide the valid running-configuration taken from the Nexus device. It should not be a partial configuration. The user-configuration file must be converted to a checkpoint file. The checkpoint file is an ascii-file which contains the extra configurations added by the backend in addition to the configurations displayed in the show running-configuration. Guidelines and Limitations of The CR feature has the following configuration guidelines and limitations: The running configuration file that you provide should be taken using copy running file. The configuration file must be regenerated whenever there is change in the software version. It is recommended not to do any of the configuration changes from any other session when CR is in progress. This is to avoid CR failure. CR request is serialized; only after the first request is complete the next request is processed. CR does not work if the FEX module is not online. CR fails if it contains module-specific configuration and if the module is not online. CR is supported only for configure terminal mode commands. Configure profile, configure maintenance mode, configure job and any other modes are not supported. User configuration file must be show run and not show run vdc-all. Configurations taken in one VDC is not applicable to the other VDC. CR is not supported on an admin VDC. CR is supported only on the default and non-default VDCs. You can perform a parallel CR between different VDCs. For example, user1 can execute CR on VDC1, and user2 can execute CR on VDC2 at the same time, and they will not impact each other. To perform parallel CR for more than one VDC; go to the VDC where CR needs to be performed (using the vdc <vdc-name> command) and execute the configure replace <file-name> command. CR is not supported for breakout interface configurations. The running configuration file that you provide should be taken using copy running file. Configuring the Procedure Step 1 Execute the configure-replace. 2

Workflow for operation switch# configure replace file-name Executes the configure-replace so that the user provided configuration is replaced. Step 2 (Optional) Verify the Configure-Replace status: switch# show config-replace status Step 3 Provides the status of configure-replace operation including in-progress, success, failure. (Optional) Verify the Configure-Replace configuration: switch# show config-replace log exec Step 4 Provides the log for all the configurations executed, and the configurations that failed. (Optional) Display the Configure-Replace configuration failures: switch(config)#show config-replace log verify Displays the configurations that are failed, in case of failure. In case of success it will not display any configurations. Workflow for operation The following steps describe the recommended workflow for CR: Benefits of Configuration Replace 1 You can generate a configuration file by first applying the configurations on a Cisco Nexus series switch and then use the copy run file output as the configuration file. This file should be the file where you can make configuration modification as required and use this generated/updated configuration file to perform configuration replace. 2 The configuration file must be regenerated whenever there is change in software version. The CR operation on configuration file generated across software version is not recommended and CR might fail or succeed. 3 You can view and verify the patch file before it gets applied by executing configure replace <file> show-patchcommand. 4 You can run configure replace <file> verbose to see the commands that get executed with CR on console. 5 CR will do pre-check which includes semantic validation of configuration, and in case of error CR exits. The user can use show config-replace verify command to see exact configurations that failed. 6 CR is atomic, in case of failure, the CR exits on the first failure and restores the switch to original configuration. You can use show config-replace execcommand to get the error display. 3

Verifying the Operation 7 Once patch is applied, CR triggers verification where it compares the running-configuration matches with user configuration file, if there is mismatch it restores the switch. You can use show config-replace verify command to see mismatched configurations. 8 It is recommended not to modify any configuration through other session when CR in progress. Verifying the Operation The following commands are used to verify the status of the configure replace operation. Show rollback status The show rollback status or the show config-replace status command provides the status of configure-replace operation including in-progress, success, failure. Procedure Step 1 show rollback status switch# show rollback status /show config-replace status Last operation : Rollback to file Details: Rollback type: atomic replace_tmp_28081 Start Time: Wed Jan 25 06:39:28 2017 End Time: Wed Jan 25 06:39:47 2017 Operation Status: Success The show rollback status or the show config-replace status command provides the status of configure-replace operation including in-progress, success, failure. rollback log exec Step 2 show rollback log exec The show switch(config)# show rollback log exec / show config-replace log exec or the show config-replace Operation : Rollback to Checkpoint File log exec Checkpoint file name :.replace_tmp_28081 Scheme : tmp command Rollback done By : admin provides the log Rollback mode : atomic Verbose : enabled for all the Start Time : Wed, 06:39:34 25 Jan 2017 configurations -------------------------------------------------------------------------------- executed, and the time: Wed, 06:39:47 25 Jan 2017 configurations Status: SUCCESS End Time : Wed, 06:39:47 25 Jan 2017 that failed. Rollback Status : Success Executing Patch: ---------------- `config t ` `no role name abc` 4

Configuration Examples for the Step 3 show rollback log verify The show rollback log verify or the switch(config)# show rollback log verify /show config-replace log verify show Operation : Rollback to Checkpoint File config-replac Checkpoint file name :.replace_tmp_28081 Scheme : tmp log verify Rollback done By : admin command Rollback mode : atomic Verbose : enabled displays the Start Time : Wed, 06:39:34 25 Jan 2017 configuration End Time : Wed, 06:39:47 25 Jan 2017 Status : Success that are failed case of failure Verification patch contains the following commands: case of succes ---------------------------------------------------!! will not displa! No changes any -------------------------------------------------------------------------------- time: Wed, 06:39:47 25 Jan 2017 configuration Status: SUCCESS Configuration Examples for the The following commands are used to verify the status of the configure replace operation. Viewing the Configure-Replace patch content and Executing the Configure-Replace Prior to CR user can view the changes that will be applied to running-configuration as part of rollback operation. Procedure Step 1 configure replace bootflash:file show-patch Step 2 switch(config)# configure replace bootflash:file show-patch Collecting Running-Config Converting to checkpoint file #Generating Rollback Patch!! no role name abc configure replace bootflash:file verbose switch(config)# configure replace bootflash:file verbose Collecting Running-Config Generating Rollback patch for switch profile Rollback Patch is Empty Note: Applying config parallelly may fail Rollback verification Collecting Running-Config #Generating Rollback Patch Executing Rollback Patch 5

Configuration Examples for the ======================================================== `config t ` `no role name abc` ======================================================== Generating Running-config for verification Generating Patch for verification Rollback completed successfully. 6