Sign In
Forgot Password

Don’t have an account? Create One.

Veritas Appliance firmware update tool (article 100046032)

Tool

Abstract

Veritas Appliance firmware update tool

Description

Description

 

The Veritas Appliance firmware update tool is a replacement for the Manage > Software > Firmware command. Starting with NetBackup Appliance release 3.1.1 and Access release 7.4.2, Flex release 2.0 this tool is the recommended method for firmware updates.

 

The Firmware update tool packaged in two forms:

1.       An RPM 

 Firmware update RPMs are currently available for the following appliance platforms and their associated software versions:

 

New products supported:

  • Flex 4.0                                   – VRTSflex-firmware-2.0.0-31.el8.x86_64.rpm
  • Access 8.2                             – VRTS_SURE-2.0.0-31.x86_64.rpm
  • NBA 5.3                                  – VRTS_SURE-2.0.0-31.x86_64.rpm

 

MR Releases supported:

  • Flex 4.1                                   – VRTSflex-firmware-2.0.0-31.el8.x86_64.rpm
  • Access 8.1.100                     – VRTS_SURE-2.0.0-31.x86_64.rpm
  • NBA 5.3.0.1-MR1                  – VRTS_SURE-2.0.0-31.x86_64.rpm
  • NBA 5.1.1-MR4                     – VRTS_SURE-2.0.0-31.x86_64.rpm

 

Existing products supported:

  • Flex 3.2                                   – VRTSflex-firmware-2.0.0-31.el8.x86_64.rpm
  • Flex 3.0                                   – VRTSflex-firmware-2.0.0-31.el8.x86_64.rpm
  • Access 8.1                             – VRTS_SURE-2.0.0-31.x86_64.rpm
  • Access 8.0                             – VRTS_SURE-2.0.0-31.x86_64.rpm
  • NBA 5.1.1                               – VRTS_SURE-2.0.0-31.x86_64.rpm

 

Support retired for:

  • Flex 2.1/2.1.x                         – VRTSflex-firmware-1.1.1-29.el7.x86_64.rpm
  • Flex 2.0.x                                – sure-1.1.1-25-20220928015633.iso
  • Access 7.4.3                          – VRTS_SURE-1.1.1-29.x86_64.rpm
  • Access 7.4.2                          – VRTSaccess-app-EEB-ET3994233-7.4.2-25.x86_64.rpm
  • NBA 5.0                                  – VRTS_SURE-1.1.1-29.x86_64.rpm
  • NBA 4.1                                  – VRTS_SURE-1.1.1-29.x86_64.rpm
  • NBA 5.0.0.1-MR5                  – VRTS_SURE-1.1.1-29.x86_64.rpm
  • NBA 4.1.0.1-MR5                  – VRTS_SURE-1.1.1-29.x86_64.rpm
  • NBA 4.0.0.0                           – NBAPP_EEB_ET4024288-4.0.0.0-25.x86_64.rpm
  • NBA 3.3.0.0                           – NBAPP_EEB_ET4011834-3.3.0.0-25-x86_64.rpm
  • NBA 3.2.0.0                           – NBAPP_EEB_ET3987003-3.2.0.0-25.x86_64.rpm
  • NBA 3.1.2.0                           – NBAPP_EEB_ET3987548-3.1.2.0-13.x86_64.rpm
  • NBA 3.1.1                              – NBAPP_EEB_ET3987546-3.1.1.0-10.x86_64.rpm

 

On appliance, install Appliance OS release (e.g. NetBackup Appliance OS 5.0 / Access OS 8.0 ) before installing the firmware update RPM. Attempting to install Firmware Update RPM before updating appliance OS will give installation error and will not allow Firmware Update.

 

The RPM installs the Veritas Standalone firmware Update and Recovery Environment. This is a standalone operating system which is booted by the appliance to deploy the firmware updates in a controlled and isolated environment. Upon completion of the firmware updates, the appliance automatically reboots back into the primary application operating system.

 

Note:

  • Uninstalling the firmware update RPM does not revert the firmware changes.
  • If an earlier version of this RPM is already installed, you must uninstall the previous RPM first before installing the updated version.
  • If SURE 13 version fixes grub.cfg overwrite issue only, no payload change, so if SURE 12 already installed version 13 installation is not required.

 

2.       An ISO

The firmware update is packaged as a standalone operating system (ISO) till Flex 2.0.x. FLEX product uses ISO form of firmware update tool. Firmware update ISO is currently available for the following appliance platforms and their associated software versions:

 

  • Flex Appliance 2.0.1   – sure-1.1.1-25-20220928015633.iso
  • Flex Appliance 2.0       – sure-1.1.1-25-20220928015633.iso

 

The Steps for firmware update using ISO:

  • Make sure IPMI configured for appliance (if not please refer The Appliance Hardware Installation Guide)
  • Download firmware update tool iso from Veritas Download Center
  • Open IPMI console -> Launch virtual console
  • Login to appliance (Flex) from console.
  • Attach firmware update tool iso to virtual media/CDROM
  • Reboot appliance from appliance (Flex) console.
  • On bios post hit F6 -> select boot device Virtual CDROM
  • Appliance will boot with firmware update tool, upgrade Firmware versions and reboot setup in appliance OS.

           Note:

  • Please connect to Veritas Support for further FW upgrade support/help
  • Before running firmware tool upgrade, please confirm alliance OS (upgrade) is not in transient state.

 

 The ISO installs the Veritas Standalone firmware Update and Recovery Environment. This is a standalone operating system which is boots and updates the firmware in a controlled and isolated environment. Upon completion of the firmware updates, the appliance can be rebooted back into the primary application operating system.

 

Note:

  • The BIOS and the BMC updates occur in the final stage of the firmware update process. During this stage of the installation, the process may appear to stall or hang while applying those updates. If this occurs, you can restart the IPMI console without affecting the installation.

 

Known Issues:

  • Seagate Controller some times do not respond to version check post upgrade. Final report may show as "Upgrade Failed". Please Check the controller version from the available means.
  • Even after successful BIOS upgrade, the Correctable Threshold may fail the first time as the hexadecimal input ‘1F4’ is not recognized by the older BIOS (older than 02.01.3013). The older BIOS used hex ‘F4’, limited by the 8 bits. Intel has fixed this issue in the BIOS 02.01.3013. This is a known and expected behavior. So please re-confirm the BIOS version, in case upgrading BIOS older than 02.01.3013.

 

Description

 

Verification prior to installation of  Firmware Update Tool

 

     1.         Check Minimal Required Firmware Version

 Following table shows expected Minimal Firmware Version for listed hardware component :

Component Type

Vendor

Model

Target Firmware Version

Minimal Required Firmware Version

BIOS 

Intel

S2600WF0

SE5C620.86B.02.01.0015

SE5C620.86B.02.01.0010

  Please check if current firmware version of the component shown in the table is equal to or greater than the Minimal Required Firmware Version.

[ Current Firmware Version >= Minimal Required Firmware Version ]

 

     2.        Check if your system have standard hardware configuration

 In case of non-standard hardware configuration OR any additional hardware components are connected to an appliance, Firmware Update Tool may misbehave which can lead to firmware upgrade failure.

 

Required appliance reboot after EEB installation

 

After the EEB installation has completed successfully, you must reboot the appliance. The appliance firmware update begins automatically during the reboot. While the firmware update is in progress, users are unable to access or log in to the appliance through the appliance shell menu or the appliance web console. The firmware update process can be viewed by using the IPMI console or a physical console connection on the appliance.

 

The final stage of the firmware update includes updating the system BIOS. The BIOS update will disconnect all active IPMI console sessions. When the firmware and BIOS update processes have completed, the appliance reboots into the normal appliance application OS.

 

Note: When installing this EEB on appliance nodes in a High Availability (HA) setup, update one node at a time. Start with the partner node where the MSDP services are offline. After the EEB installation, the firmware update, and the BIOS update have all completed successfully, perform a switchover so that the updated partner node takes over running the MSDP services. Then, update the other compute node. After the EEB installation, the firmware update, and the BIOS update have all completed successfully, perform a switchover to return the HA setup back to its normal operations.

 

Estimated time for firmware update

 

  • NetBackup Appliance models 5230/5240/5250:

    • Storage components (JBOD,HDD) are up-to-date (no upgrade require) ~30 min

    • Storage components (JBOD,HDD) need upgrade ~2 hours

  • NetBackup Appliance model 5330/5340/5350:

    • Storage components (RBOD,HDD) are up-to-date (no upgrade require) ~30 min

    • Storage components (RBOD,HDD) need upgrade ~3 hours

 

Note: For BIOS8 FW updates SURE v30 UEFI models will reboot twice, which increases the SURE execution time. Multi-reboot logs will be appended in respective log file.

 

In case of current Storage component version is lower than GN260R008-03, SURE will upgrades the Storage component firmware version via hop-upgrade method.
·      1st hop : Any version lower than GN260R008-03 then upgrade it to GN260R008-03
·      2nd hop : GN260R008-03 upgrade to GN280R009-02 / GN280R010-01
This will add around 120 minutes extra in total SURE execution time.
 

After the firmware update has completed and the system is booted back into the normal appliance operating system, the firmware report and debug logs can be found in the following locations:

  • Final report:
    • NBA / Access:
      • /log/sure/sure_final_update_report.txt
    • Flex:
      • /var/log/sure/sure_final_update_report.txt
  • Detailed debug logs:
    • NBA / Access:
      • /log/sure/sure.log
    • Flex:
      • /var/log/sure/sure.log
 

Uninstalling the EEB

 

To uninstall the EEB, use the Manage > Software > Rollback command.

 

Re-running the firmware update

 

If you want to run the firmware update EEB again, you must uninstall (roll back) the EEB and then re-install the EEB.

 

* Please refer to the Appliance Firmware Release Notes pdf for a list of the latest hardware components for each SURE version. 

 

Known Hardware Limitations

 

Storage Controller:

The Seagate storage controller firmware upgrade may fail sometimes because one of the controller/ both controllers goes down during/after firmware upgrade:

·      Login to one of the controller

·      Firmware Upgrade Tool might show failure in case of successful upgrade (If the controller goes down after upgrade). Check firmware versions, if the firmware versions seems upgraded you can skip further steps, if not keep following the steps.

·      Check firmware versions of controllers, both controllers should have same versions.

            # show versions

·      Check health of the controllers

            #check firmware-upgrade-health

            #show system

                   - check for "other MC status= operational" and "PFU status=idle". Apart from those two parameters, NO error should be seen For Ex: drive failures, sideplane failures etc.

            # show unwritable-cache 

                   - It should be zero for both controllers. If not, clear the cache with command “clear cache”.

·      If all checks are fine, you can run SURE tool again. If not, please connect to Veritas support.

 

Related articles

 

How to install EEBs,HotFixes and Maintenance Releases on NetBackup Appliances

Applies to the following product releases

Update files

File name Description Version Platform Size

Knowledge base

11
2023-03-22

Description This article describes how to install an Emergency Engineering Binary (EEB), a HotFix, security patch or Maintenance Release on NetBackup 52x0 and 53x0 appliances. You should perform this procedure from a computer that has connectivit...

7
2022-01-19

Description The Veritas Appliance firmware update tool is a replacement for the Manage Software Firmware command. Starting with NetBackup Appliance release 3.2, this tool replaces the built in Firmware command . The built in firmware command will...