Translation Notice
Please note that this content includes text that has been machine-translated from English. Veritas does not guarantee the accuracy regarding the completeness of the translation. You may also refer to the English Version of this knowledge base article for up-to-date information.
Veritas Appliance firmware update tool (article 100046032)
Abstract
Description
Description
The Veritas Appliance firmware update tool is a replacement for the Manage > Software > Firmware
command. Starting with NetBackup Appliance release 3.1.1 and Access release 7.4.2, Flex release 2.0 this tool is the recommended method for firmware updates.
The Firmware update tool packaged in two forms:
1. An RPM
Firmware update RPMs are currently available for the following appliance platforms and their associated software versions:
New products supported:
- Access 8.1 – Release 27
- Flex 3.0 – Release 27
- NBA 5.1.1 – Release 27
MR Releases supported:
- Access 8.0.200 – Release 27
- Flex 2.1.4 – Release 27
- NBA 5.0.0.1-MR3 – Release 27
- NBA 4.1.0.1-MR5 – Release 27
Support for Flex 3.1.x will be provided in upcoming Release 28 (ETA Late May/Early June 2023).
Do not install Release 27 on Flex 3.1.x.
Existing products supported:
- Access 8.0 – Release 27
- Access 7.4.3 – Release 27
- Flex 2.1.1 – Release 27
- Flex 2.1 – Release 27
- NBA 5.0 – Release 27
- NBA 4.1 – Release 27
Support retired for:
- Access 7.4.2 – Release 25
- Flex 2.0.x – Release 25
- NBA 4.0 – Release 25
- NBA 3.3.0.1 – Release 25
- NBA 3.2 – Release 25
- NBA 3.1.2 – Release 13
- NBA 3.1.1 – Release 10
On appliance, install Appliance OS release (e.g. NBA 5.0 / Access 8.0 ) before installing the firmware update RPM. Attempting to install Firmware Update RPM before updating appliance OS will give installation error and will not allow Firmware Update.
The RPM installs the Veritas Standalone firmware Update and Recovery Environment. This is a standalone operating system which is booted by the appliance to deploy the firmware updates in a controlled and isolated environment. Upon completion of the firmware updates, the appliance automatically reboots back into the primary application operating system.
Note:
- Uninstalling the firmware update RPM does not revert the firmware changes.
- If an earlier version of this RPM is already installed, you must uninstall the previous RPM first before installing the updated version.
- If SURE 13 version fixes grub.cfg overwrite issue only, no payload change, so if SURE 12 already installed version 13 installation is not required.
2. An ISO
The firmware update is packaged as a standalone operating system (ISO) till Flex 2.0.x. FLEX product uses ISO form of firmware update tool. Firmware update ISO is currently available for the following appliance platforms and their associated software versions:
- Flex Appliance 2.0.1 – Release 25
- Flex Appliance 2.0 – Release 25
The Steps for firmware update using ISO:
- Make sure IPMI configured for appliance (if not please refer The Appliance Hardware Installation Guide)
- Download firmware update tool iso from Veritas Download Center
- Open IPMI console -> Launch virtual console
- Login to appliance (Flex) from console.
- Attach firmware update tool iso to virtual media/CDROM
- Reboot appliance from appliance (Flex) console.
- On bios post hit F6 -> select boot device Virtual CDROM
- Appliance will boot with firmware update tool, upgrade Firmware versions and reboot setup in appliance OS.
Note:
- Please connect to Veritas Support for further FW upgrade support/help
- Before running firmware tool upgrade, please confirm alliance OS (upgrade) is not in transient state.
The ISO installs the Veritas Standalone firmware Update and Recovery Environment. This is a standalone operating system which is boots and updates the firmware in a controlled and isolated environment. Upon completion of the firmware updates, the appliance can be rebooted back into the primary application operating system.
Note:
- The BIOS and the BMC updates occur in the final stage of the firmware update process. During this stage of the installation, the process may appear to stall or hang while applying those updates. If this occurs, you can restart the IPMI console without affecting the installation.
Known Issues:
- Seagate Controller some times do not respond to version check post upgrade. Final report may show as "Upgrade Failed". Please Check the controller version from the available means.
- Even after successful BIOS upgrade, the Correctable Threshold may fail the first time as the hexadecimal input ‘1F4’ is not recognized by the older BIOS (older than 02.01.3013). The older BIOS used hex ‘F4’, limited by the 8 bits. Intel has fixed this issue in the BIOS 02.01.3013. This is a known and expected behavior. So please re-confirm the BIOS version, in case upgrading BIOS older than 02.01.3013.
Read me
Description
Required appliance reboot after EEB installation
After the EEB installation has completed successfully, you must reboot the appliance. The appliance firmware update begins automatically during the reboot. While the firmware update is in progress, users are unable to access or log in to the appliance through the appliance shell menu or the appliance web console. The firmware update process can be viewed by using the IPMI console or a physical console connection on the appliance.
The final stage of the firmware update includes updating the system BIOS. The BIOS update will disconnect all active IPMI console sessions. When the firmware and BIOS update processes have completed, the appliance reboots into the normal appliance application OS.
Note: When installing this EEB on appliance nodes in a High Availability (HA) setup, update one node at a time. Start with the partner node where the MSDP services are offline. After the EEB installation, the firmware update, and the BIOS update have all completed successfully, perform a switchover so that the updated partner node takes over running the MSDP services. Then, update the other compute node. After the EEB installation, the firmware update, and the BIOS update have all completed successfully, perform a switchover to return the HA setup back to its normal operations.
Estimated time for firmware update
-
NetBackup Appliance models 5230/5240/5250:
-
Storage components (JBOD,HDD) are up-to-date (no upgrade require) ~30 min
-
Storage components (JBOD,HDD) need upgrade ~2 hours
-
-
NetBackup Appliance model 5330/5340/5350:
-
Storage components (RBOD,HDD) are up-to-date (no upgrade require) ~30 min
-
Storage components (RBOD,HDD) need upgrade ~3 hours
-
After the firmware update has completed and the system is booted back into the normal appliance operating system, the firmware report and debug logs can be found in the following locations:
- Final report:
- NBA / Access:
/log/sure/sure_final_update_report.txt
- Flex:
/var/log/sure/sure_final_update_report.txt
- NBA / Access:
- Detailed debug logs:
- NBA / Access:
/log/sure/sure.log
- Flex:
/var/log/sure/sure.log
- NBA / Access:
Uninstalling the EEB
To uninstall the EEB, use the Manage > Software > Rollback
command.
Re-running the firmware update
If you want to run the firmware update EEB again, you must uninstall (roll back) the EEB and then re-install the EEB.
* Please refer to the Appliance Firmware Release Notes pdf for a list of the latest hardware components for each SURE version.
Related articles
How to install EEBs,HotFixes and Maintenance Releases on NetBackup Appliances
Update files
|
File name | Description | Version | Platform | Size |
---|
Applies to the following product releases
Knowledge base
How to install EEBs, HotFixes, Security Patches and Maintenance Releases on NetBackup Appliances
2023-03-22Description This article describes how to install an Emergency Engineering Binary (EEB), a HotFix, security patch or Maintenance Release on NetBackup 52x0 and 53x0 appliances. You should perform this procedure from a computer that has connectivit...
How to update Veritas Appliance firmware
2022-01-19Description The Veritas Appliance firmware update tool is a replacement for the Manage Software Firmware command. Starting with NetBackup Appliance release 3.2, this tool replaces the built in Firmware command . The built in firmware command will...