02 Cisco Ucs Director Fundamentals 66
02 Cisco Ucs Director Fundamentals 66
02 Cisco Ucs Director Fundamentals 66
6
First Published: 2018-04-27
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https:/
/www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1721R)
CHAPTER 2 Overview 3
Cisco UCS Director Overview 3
System Overview 4
Infrastructure Configuration and Management 4
Orchestration and Automation 5
Infrastructure as a Service 6
Extensibility of Cisco UCS Director 6
Custom Workflows with Predefined Tasks 7
Generic Tasks for Custom Workflows 7
Custom Tasks for Custom Workflows 8
Northbound APIs and Integrations 8
Cisco UCS Director REST API 8
When to Use Cisco UCS Director REST API 9
Cisco UCS Director PowerShell API 9
When to Use Cisco UCS Director PowerShell API 9
Cisco UCS Director Open Automation 9
When to Use Cisco UCS Director Open Automation 10
CHAPTER 3 Administration 15
Administration of Core Platform Features 15
Users 15
User Groups 16
Managed Service Provider and Customer Organizations 16
Group Budget Policy 16
Resource Limits 16
User Roles 17
Multi-Role Access Profiles 18
Default User Permissions 18
LDAP Integration 19
LDAP Integration Rules and Limitations 20
Branding Cisco UCS Director 21
Branding for Customer Organizations 21
Login Page Branding 22
Infrastructure Organization 28
Sites 28
Pods 28
Accounts 29
Device Discovery 30
Credential Policies 32
Infrastructure Reporting 32
Reports 32
CloudSense Analytics 33
Report Builder for Custom Report Templates 33
Dashboard 34
Summary 34
Inventory Management 34
Audience
This guide is intended primarily for data center administrators who use Cisco UCS Director and who have
responsibilities and expertise in one or more of the following:
• Server administration
• Storage administration
• Network administration
• Network security
• Virtualization and virtual machines
Conventions
Text Type Indication
GUI elements GUI elements such as tab titles, area names, and field labels appear in this font.
Main titles such as window, dialog box, and wizard titles appear in this font.
TUI elements In a Text-based User Interface, text the system displays appears in this font.
string A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
!, # An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
document.
Caution Means reader be careful. In this situation, you might perform an action that could result in equipment
damage or loss of data.
Tip Means the following information will help you solve a problem. The tips information might not be
troubleshooting or even an action, but could be useful information, similar to a Timesaver.
Timesaver Means the described action saves time. You can save time by performing the action described in the
paragraph.
Related Documentation
Cisco UCS Director Documentation Roadmap
For a complete list of Cisco UCS Director documentation, see the Cisco UCS Director Documentation
Roadmap available at the following URL: http://www.cisco.com/en/US/docs/unified_computing/ucs/
ucs-director/doc-roadmap/b_UCSDirectorDocRoadmap.html.
Note The Cisco UCS B-Series Servers Documentation Roadmap includes links to documentation for Cisco
UCS Manager and Cisco UCS Central. The Cisco UCS C-Series Servers Documentation Roadmap includes
links to documentation for Cisco Integrated Management Controller.
Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments
to ucs-director-docfeedback@cisco.com. We appreciate your feedback.
Table 1: New Features and Changed Behavior in Cisco UCS Director, Release 6.6
System Overview
Cisco UCS Director connects all the elements of your data center infrastructure, including the users, and the
physical and virtual infrastructure. You can not only provision, configure, monitor, and automate your data
center management, you can also use the Cisco UCS Director REST API or Open Automation Framework
to extend the out-of-the-box functionality.
infrastructure. This central management capability enables operations teams to configure, administer, manage,
and monitor supported Cisco and non-Cisco physical and virtual compute, network, and storage components.
Cisco UCS Director provides out-of-the-box integration with virtual and physical components, including the
following:
• Hypervisors, such as VMware vSphere, Microsoft Hyper-V, and RedHat KVM
• Compute servers and devices, such as Cisco UCS, HP, and Dell servers
• Network devices, such as Cisco Nexus and Brocade
• Storage components, such as NetApp, EMC, and IBM Storwize
• Hyperconverged storage solutions, such as VMware Virtual SAN (VSAN)
For a complete list of supported infrastructure components and solutions, see the Cisco UCS Director
Compatibility Matrix.
Infrastructure as a Service
Cisco UCS Director delivers Infrastructure as a Service (IaaS) for both virtual and physical infrastructure.
With Cisco UCS Director, you can create an application container template that defines the infrastructure
required for a specific application or how a customer or business unit is expected to use that application.
Cisco UCS Director helps you and your IT team define the rules for your business's infrastructure services.
You first onboard tenants and then define the boundaries of the physical and virtual infrastructure that they
can use, or you can allow your onboarded tenants to define the infrastructure boundaries. You can then create
policies, orchestration workflows, and application container templates in Cisco UCS Director that define the
requirements for a specific type of application that can be used by a tenant, such as a web server, database
server, or generic virtual machine (VM).
You can then publish these templates as a catalog in the End User Portal. Your users can go to the End User
Portal, select the catalog that meets their needs, and make a service request for that particular application or
VM. Their service request triggers the appropriate orchestration workflow to allocate the required infrastructure
and provision the application or VM. If you specified that this type of service request requires approvals,
Cisco UCS Director sends emails to the specified approver(s). Once the service request is approved, Cisco
UCS Director assigns the infrastructure to those users, creating a virtual machine if necessary, and doing the
base configuration such as provisioning the operating system.
You can also configure an orchestration workflow to ask questions before allowing a user to choose a catalog
item. For example, you could configure the workflow to ask the user what type of application they plan to
run and automatically select a catalog for them based on the answers to those questions. The end user in this
case does not have to worry about whether to request a physical server or a VM, what kind of storage they
require, or which operating system to install. Everything is predefined and prepackaged in the catalog.
For example, you can create policies, orchestration workflows and an application container template for an
SAP application that uses a minimum level of infrastructure, requires approvals from a director in the company,
and has a chargeback to the department. When an end user makes a service request in the End User Portal for
that catalog item, Cisco UCS Director does the following:
1 Sends an email to the director, who is the required approver.
2 When the approval is received, creates a VM in the appropriate pod with 4 CPUs, 10GB of memory, and
1TB of storage.
3 Installs an operating system (OS) on the VM.
4 Notifies the end user that the VM is available for them to use.
5 Sets up the chargeback account for the cost of the VM.
With the available APIs from Cisco UCS Director, you can also script custom workflows to pre-install the
SAP application in the VM after the OS is installed.
The dynamic task framework of the Execute Generic API task enables you to define dynamic input information
and fixed set of parameters (such as, Device IP address, user name, and password). It allows you to choose
header variables required for the request and a template file specific to an action or provide the action specific
JSON/XML request content containing @ variables for dynamic values. Thus, you can define the required
structure for a JSON/XML based APIs and consume the same as a normal task in the workflow.
You can use the Rollback Execute Generic API task to define the rollback task for the task defined using the
Execute Generic API task.
For example, you can use the Execute Generic API task to orchestrate a device operations which is currently
not supported by Cisco UCS Director as connector.
You can use the Cisco UCS Director REST API and PowerShell API to implement northbound integrations.
• XML
• Java
For annotated examples of using the Open Automation SDK, see the Cisco UCS Director Open Automation
Cookbook.
For a reference to the Cisco UCS Director Open Automation API, see the Cisco UCS Director API Javadoc.
When this environment is operational and Bare Metal Agent and Cisco UCS Director are correctly configured,
you can build PXE installation tasks into any Cisco UCS Director infrastructure workflow.
You can access Bare Metal Agent through Secure Shell (SSH). You can also perform services on Bare Metal
Agent, such as DHCP configuration and starting and stopping services, through Cisco UCS Director. A single
Cisco UCS Director node can support multiple Bare Metal Agent applications.
For more information about Bare Metal Agent, see the Installation and Configuration Guides.
For more information about the Shell and its commands, see the Cisco UCS Director Shell Guide.
Additional functionality may be available to you if your administrator provides you with the necessary
permissions.
For more information about the End User Portal, see the Cisco UCS Director End User Portal Guide.
pane across physical infrastructure and across Hadoop and Splunk Enterprise software. It supports key Hadoop
distributions, including Cloudera, MapR, and Hortonworks.
Cisco UCS Director Express for Big Data delivers end-to-end automation of Hadoop cluster deployment,
allowing you to spin up and expand clusters on-demand. The physical infrastructure configuration is handled
automatically, with minimal user input. The configuration includes compute, internal storage, network, and
installation of operating system, Java packages, and Hadoop, along with the provisioning of Hadoop services.
This is achieved through Cisco UCS service profiles wherein both the physical infrastructure and Hadoop
configuration are incorporated into a Hadoop cluster deployment profile.
Cisco UCS Director Express for Big Data also delivers end-to-end automation of Splunk cluster deployment,
with minimal user input. This is achieved through Cisco UCS service profiles wherein both the physical
infrastructure and Splunk configuration are incorporated into a Splunk cluster deployment profile.
For more information about Cisco UCS Director Express for Big Data, see the Cisco UCS Director Express
for Big Data Documentation Roadmap.
For more information about Cisco UCS Director SDK, see the Cisco UCS Director API Integration and
Customization Guide.
Users
You can create locally authenticated users for Cisco UCS Director, or you can integrate Cisco UCS Director
with your LDAP server and synchronize the LDAP users and groups with Cisco UCS Director. You can do
the following with your users, whether they are local to Cisco UCS Director or they access Cisco UCS Director
through an LDAP integration:
• Assign user roles and permissions to limit their access and the operations that they can perform
• Enable the Managed Service Provider feature
• Group internal and external customers to control which applications, resources, and tenants they can
view
• Set resource limits on user groups or customer organizations
• Create a password policy to define the minimum password requirements for all users
User Groups
User groups provide a way for you to define logical associations between your users. For example, you could
create user groups for the Development, Sales, and Marketing users within your business. Through the user
group, you can then associate the users in that group with the following:
• One or more virtual data centers (vDCs) that define the infrastructure resources which the users can
access when making service requests
• Resource limits that further control the maximum resources that users in a group can use.
• A cost center for chargeback on the infrastructure resources
Resource Limits
You can configure resource limits for a group, a customer organization, or a tenant, to manage resource
utilization. You can specify limits for the following:
• Virtual resources
• Operating system resources
• Physical resources
Note Configuration of operating system resource and physical resource limits are not supported for public
clouds.
For example, the parent organization, Tenant 1, includes three customer groups: Group A, Group B, and
Group C. If you configure a resource limit of ten for Tenant 1, the cumulative resource limits specified for
all customer groups within Tenant 1 must not exceed ten. The cumulative resource limits include resource
limits applied to customer groups and containers.
Group A includes containers C1 and C2, and has a resource limit of 4 assigned to the customer group. Group
B includes containers C3 and C4, and each of these containers has a resource limit of two. This configuration
means that two is the maximum available resource limit you can configure for Group C and all its containers
(the resource limit for Tenant 1, minus the total resource limits for Group A, Group, B, and containers C1,
C2, C3, and C4).
User Roles
Cisco UCS Director supports the following user roles:
• All Policy Admin
• Billing Admin
• Computing Admin
• Group Admin—An end user with the privilege of adding users. This user can use the End User Portal.
• IS Admin
• MSP Admin
• Network Admin
• Operator
• Service End User—This user can only view and use the End User Portal.
• Storage Admin
• System Admin
These user roles are system-defined and available in Cisco UCS Director by default. You can determine if a
role is available in the system by default, if the Default Role column in the Users page is marked with Yes.
• Create a custom user role in the system, and create user accounts with this role or assign the role to
existing users.
When you create a new user role, you can specify if the role is that of an administrator or an end user.
• Modify existing user roles, including default roles, to change menu settings and read/write permissions
for users associated with that role.
The procedure to modify menu settings and permissions for a role is the same as the procedure to add
a user role.
Note The Manage Profiles feature enables you to add, log into, edit, or delete a user access profile.
• Write—An admin user with Write permission has the ability to read, write, and modify a file. This
permission includes the ability to delete or rename files.
• Read/Write—An admin user with Read/Write permission has the ability to read and write a file.
LDAP Integration
You can use LDAP integration to synchronize the LDAP server’s groups and users with Cisco UCS Director.
LDAP authentication enables synchronized users to authenticate with the LDAP server. You can synchronize
LDAP users and groups automatically or manually. While adding an LDAP account, you can specify a
frequency at which the LDAP account is synchronized automatically with Cisco UCS Director. Optionally,
you can manually trigger the LDAP synchronization by using the LDAPSyncTask system task.
After you configure an LDAP account and after the synchronization process is run, either manually or
automatically, the recently added LDAP information is displayed in Cisco UCS Director. This information
is displayed in a tree view that depicts the hierarchical structure of all organizational units (OUs), groups, and
users that have been added to the system. You can view this information by choosing Administration >
LDAP Integration. You can select and expand an OU in the left pane to view all the groups within it. If you
select a group in this left pane, you can view a list of users that are associated with that group. If an OU has
several sub OUs within it, then you can click the Organization tab in the right pane to view detailed
information. In addition, the Groups and Users tabs in the right pane display groups and users respectively
that are synchronized within the selected OU.
In addition to running a system task, Cisco UCS Director also provides an additional option for you to
synchronize the LDAP directory with the system:
• Cleanup LDAP Users system task—This system task determines if the synchronized users in the system
are deleted from the LDAP directories or not. If there are user records that have been deleted from the
LDAP directories, then after this system task is run, these user accounts are marked as disabled in the
system. As an administrator, you can unassign resources of these disabled user accounts. By default,
this task is in the enabled state. After the second system restart, this system task is changed to the disabled
state. This applies to both, a standalone and multi-node setup.
In a multi-node setup, this system task runs only on the primary node, even if there is a service node
configured.
Important Users that do not belong to a group or to a domain user’s group display in LDAP as Users with No Group.
These users are added under the domain user’s group in Cisco UCS Director.
You can add LDAP users with the same name in different LDAP server accounts. The domain name is
appended to the login user name to differentiate multiple user records. For example: abc@vxedomain.com.
This rule is applicable to user groups as well.
Appending the domain name to the user name to login to the system is only applicable to LDAP users. It
does not apply to local users. All local users can login to the system with the user names.
When a single LDAP account is added, and a user logs in by specifying only the user name, Cisco UCS
Director first determines if the user is a local user or is an LDAP user. If the user is identified as a local
user and as an external LDAP user, then at the login stage, if the user name matches the local user name,
then the local user is authenticated into Cisco UCS Director. Alternatively, if the user name matches that
of the external user, then the LDAP user is authenticated into Cisco UCS Director.
• A user can be part of multiple user groups. However, the group that is mentioned first in the list of groups
that the user is part of is set as the default primary group for the user. If the user is not part of any group,
then the default primary group is set as Domain Users.
Note You can view information on all the groups that a user is part of only after the
LDAPSyncTask system task is run.
• When an LDAP group is synchronized, all users that are in the group are first added to the system. Also,
if users in the specified LDAP group are associated with other groups that are in the same OU or in a
different OU, then those groups are also retrieved and added to the system.
• The LDAP synchronization process will retrieve the specified LDAP groups for the system, along with
nested groups, if any.
• Prior to this release, a user was part of only one group. After an upgrade to the current release, and only
after the LDAPSyncTask system task is run, the Manage Profiles dialog box displays the other groups
that the user is part of. This is applicable only when the other groups match the group filters that you
specified while configuring the LDAP server.
information, see the Cisco UCS Director Administration Guide. In addition, multiple access profiles are
also automatically created for the user.
Note You can view this information only when the groups match the filter you specified while
configuring the LDAP server, and when the groups have been assimilated into the
system.
• Cisco UCS Director now displays the User Principal Name (UPN) for each user that is added into the
system. This is applicable for users that have been added into the system in prior releases. Users can log
in to the system using their login name or their user principal name. Logging in using the user principal
name along with the profile name is not supported.
• If a chosen LDAP user already exists in Cisco UCS Director and the source type is External, then that
user is ignored at synchronization. The user’s name, description, email, and other attributes are not
updated again.
• If a user account is created in two different LDAP directories, then the user details of the LDAP directory
that was synchronized first are displayed. The user details from the other LDAP directory are not
displayed.
• After multiple LDAP directories are synchronized, the LDAP external users must log in to Cisco UCS
Director by specifying the complete domain name along with their user name. For example:
vxedomain.com\username. However, this rule does not apply if there is only one LDAP server directory
added to Cisco UCS Director.
Note After an LDAP synchronization process, verify that the user is assigned to the correct group.
The following table elaborates the branding behavior in Cisco UCS Director.
Branding set at Branding set at MSP Administrator Group Administrator End User
MSP Organization Customer
Level Organization Level
Yes Yes Branding details set Branding details set Branding details set
at the MSP at the customer at the customer
organization level organization level is organization level to
are displayed. displayed. which this user
belongs to is
displayed.
Yes No Branding details set Branding details set Branding details set
at the MSP at the MSP at the MSP
organization level organization level to organization level to
are displayed. which this customer which the customer
organization organization
belongs to is belongs to is
displayed. displayed.
Note The group or customer organization login page must first be configured (enabled) for branding.
For each of the processes that you decide to automate with orchestration workflows, you can choose to
implement the processes in any of the following ways:
• Use the out-of-the-box workflows provided with Cisco UCS Director
• Modify the out-of-the-box workflows with one or more of the tasks provided with Cisco UCS Director
• Create your own custom tasks and use them to customize the out-of-the-box workflows
• Create your own custom workflows with custom tasks and the out-of-the-box tasks
For more information about automation and orchestration in Cisco UCS Director, see the Cisco UCS Director
Orchestration Guide.
Tasks
A task is the atomic unit of work in Cisco UCS Director Orchestrator. A task is a single action or operation
with inputs and outputs (except in rare cases where the task operation does not require inputs or outputs). A
task cannot be decomposed into smaller operations (exception: a compound task is made up of atomic tasks.
But for now, think of a task as an indivisible unit of orchestration work).
Cisco UCS Director has a task library containing hundreds of predefined tasks that cover most of the actions
an administrator must perform using Orchestration. In cases where there is no suitable predefined task, you
can create custom tasks; see the Cisco UCS Director Custom Task Getting Started Guide.
Some examples of predefined tasks are:
• SSH Command task - Execute a command in a secure shell (SSH) session.
• Collect Inventory Task - Gathers information about available devices.
• Create New User - Add a user to the system.
• New VM Provision - Create a new VM (hypervisor-specific).
Workflows
A workflow is a series of tasks arranged to automate a complex operation. The simplest possible workflow
contains a single task, but workflows can contain any number of tasks.
Workflows are the heart of the Cisco UCS Director Orchestrator; they enable you to automate processes of
any level of complexity on your physical and virtual infrastructure.
You build workflows using the Workflow Designer, a drag-and-drop interface. In the Workflow Designer,
you arrange tasks in sequence and define inputs and outputs to those tasks. Outputs from earlier tasks are
available to use as inputs to any subsequent task.
Looping and conditional branching can be implemented using special flow-of-control tasks.
Service Requests
Service Requests are closely related to workflows. You create service requests by running workflows; a service
request is generated every time you execute a workflow in Cisco UCS Director. A service request is a process
under the control of Cisco UCS Director.
You can schedule a workflow for later execution, and Cisco UCS Director stores details of completed service
requests. Thus a service request can have one of several states depending on its execution status: it can be
scheduled, running, blocked (for example, awaiting an approval), completed, or failed (a service request can
fail when one of its component tasks fails to execute properly).
Approvals
An approval is a "gate" task that requires the intervention of a Cisco UCS Director user to allow a workflow
to run to completion. This user is typically an administrator who has go-or-no-go authority over the workflow
process.
You can create custom approvals that allow users to enter input values when they approve a workflow. For
example, you can create a custom approval to enable an IT administrator to approve provisioning of a VM,
then specify the memory size of the VM before the workflow creates the VM.
Rollback
Workflows can be "rolled back" to a state identical or similar to the state before the workflow was executed.
You can do this, for example, to remove virtual components that were created in error.
The term "rollback" often implies that a process is transactional, especially in systems using relational
technology. However, it is important know that workflows are not transactional in a relational database sense.
Instead, rollbacks work like this:
• Each task consists of two scripts. One script performs the work that the task was designed for. The other
is a rollback script designed to "undo" the task. For example, if a task creates a VM, the rollback script
deletes the VM.
• When you run a workflow, the scripts of the tasks in that workflow are executed in the order indicated
by the workflow.
• When you roll back a workflow, the task rollback scripts are run in the reverse of the order they are run
during normal workflow execution.
• A request to roll back a workflow creates a new service request, unconnected to the original service
request.
• State information can be saved and used to roll back a task. For example, if you run a task to resize a
VM, the pretask size can be saved to enable a rollback. This state persistence is a feature of the API that
is used to write tasks; see the Cisco UCS Director Custom Task documentation for details.
• Tasks are atomic; workflows are not. You can roll back a workflow starting with any task in the workflow,
but you cannot partially roll back a task.
• It is possible for a workflow to partially succeed; that is, for some but not all of its tasks to execute.
Similarly, it is possible for a rollback to completely or partially fail; that is, that some or all of the rollback
scripts could fail to execute.
• It is possible for a task to be written with a defective rollback script, or without a rollback script altogether.
(Omitting the rollback script is not recommended.)
For more information about how to configure and manage the supported infrastructure components through
Cisco UCS Director, see the Cisco UCS Director Management Guides for your physical and virtual compute,
network, and storage resources.
Infrastructure Organization
Before you add any supported infrastructure to Cisco UCS Director, we recommend that you carefully consider
how you want to organize your physical and virtual compute, network, and storage devices and resources.
You can organize your infrastructure components into combinations of the following logical groupings:
• Accounts that represent the physical and virtual infrastructure components
• Pods that include one or more accounts
• Sites that include one or more pods
This hierarchy can reflect the physical organization and locations of your data center. However, you can also
use the logical groupings in Cisco UCS Director to create an organization that maps to how the resources of
your data center are used, the types of tenants that you support, or your customers.
Sites
A site is a logical grouping of one or more pods that represents a division of the resources in your data center.
Sites are optional in Cisco UCS Director. However, if you choose to implement them, you can create sites
that represent one or more of the following:
• A location within your data center. For example, if your data center is spread across multiple physical
locations, you could create a site for each location, such as the U.S., India, and China.
• An internal customer who uses one or more tenants in a multi-tenant data center. For example, you could
create a site for each of Finance, Sales, and Support.
• An external customer whose resources you want to segregate and keep separate from other customers.
You can view details of the sites on the Converged tab in Cisco UCS Director. For more information about
how to create a site, see the Cisco UCS Director Administration Guide.
Pods
A pod is a logical grouping of physical and virtual components, including one or more physical or virtual
accounts, such as a Cisco UCS Manager account for computing, a network account, or a cloud account. Each
pod is a module of network, compute, storage, and application components that work together to deliver
services for your data center and users. The pod is a repeatable pattern, and its components maximize the
modularity, scalability, and manageability of data centers.
When you create a pod, consider what you want it to represent. For example, you can create a pod to represent
the following:
• A single converged infrastructure stack, such as FlexPod, Vblock, or VSPEX
• A grouping of resources assigned to a specific customer or tenant
• The resources within a specific range of IP addresses
For systems that include Cisco UCS Central, we recommend that you create a pod for each Cisco UCS domain
or domain group.
If needed, you can group pods into sites. However, a pod can only belong to one site.
You can view details of the pods and their components on the Converged tab in Cisco UCS Director. For
information about how to create pods, see the Cisco UCS Director Administration Guide.
Accounts
Each account in Cisco UCS Director represents a physical or virtual infrastructure component. These accounts
contain the information about the component that Cisco UCS Director requires to discover and manage the
component, such as IP address, login name and password, port, and protocol.
For more information about the specific type of account you need to create, see the Cisco UCS Director
Management Guides for your physical and virtual compute, network, and storage resources.
Note The following is a representative sample of the types of accounts that you can create in Cisco UCS Director.
It is not an exhaustive list.
Virtual Accounts
A virtual account represents a supported hypervisor or cloud service. For example, you can create a virtual
account for one or more of the following:
• VMware vSphere
• Microsoft Hyper-V
• RedHat KVM
• Rackspace Cloud
• Amazon Web Services EC2
Physical Accounts
A physical account represents a supported compute or storage device or domain. Physical accounts are identified
by the element manager of the component, such as the following:
• UCSM account for Cisco UCS servers managed by Cisco UCS Manager
• HP OA account or HP iLO account for HP servers
• NetApp OnCommand account or NetApp ONTAP account for NetApp storage arrays
• EMC VNX account, EMC VNXe account, or EMC VMAX accounts for EMC storage arrays
Rack Accounts
A rack account represents a supported rack server that is not managed by a physical account or a multi-domain
manager account, such as a Cisco C-Series server or a Cisco E-Series server. There is only one type of rack
account.
Device Discovery
With Cisco UCS Director, you can perform device discovery manually or use the Device Discovery guided
setup wizard. Some discovery steps are the same whether you do them manually or use the guided setup
wizard. However, if you choose to use the wizard, you must use credential policies.
The protocol that Cisco UCS Director uses to communicate with the device and retrieve the inventory during
discovery depends upon the type of device. For example, Cisco UCS Director uses XML to communicate
with Cisco UCS Manager and CLI to communicate with Cisco Nexus devices.
During discovery and the retrieval of inventory, Cisco UCS Director creates at least one system task that polls
the device at regular intervals and retrieves the inventory. The polling time for these system tasks is different
for each device type. However, you can customize that interval to meet your data center's needs. For some
devices, Cisco UCS Director creates additional system tasks to retrieve other information, such as faults and
statistics.
3 Cisco UCS Director tests the connection to the device, using the credentials and other information that
you provided in the account to authenticate.
4 If the connection test and authentication are successful, Cisco UCS Director does the following:
• Adds the device to its inventory and to the selected pod.
• Discovers the basic configuration and infrastructure elements associated with that device. For example,
with a Cisco UCS Manager account, Cisco UCS Director discovers all infrastructure elements related
to that account, including the chassis, servers, fabric interconnects, service profiles, and pools.
• Creates system tasks with default values for the device to poll for inventory and, if appropriate, other
information at regular intervals.
This discovery process and inventory collection cycle takes several minutes to complete.
You need to repeat this manual process for all devices that you want Cisco UCS Director to manage.
2 You choose a pod and start discovery on the Discover and Assign screen.
3 Cisco UCS Director tests the connection to all devices that can be accessed through the information added
on the Policy screen.
4 If the connection test is successful, Cisco UCS Director does the following:
• Adds all the devices in the IP address list and range to its inventory.
• Discovers the basic configuration and infrastructure elements associated with all the devices. For
example, with a Cisco UCS Manager account, Cisco UCS Director discovers all infrastructure
elements related to that account, including the chassis, servers, fabric interconnects, service profiles,
and pools.
• Creates system tasks with default values for the devices to poll for inventory and, if appropriate,
other information at regular intervals.
This discovery process and inventory collection cycle takes several minutes to complete.
5 You choose the pod and the discovered devices that you want to add to it.
6 Cisco UCS Director adds all of the selected devices to the pod.
Credential Policies
Credential policies contain the login, port, and protocol information to log into a supported physical or virtual
compute, network, or storage device or management application. Each credential policy represents a specific
type of account. With a credential policy, when the password for a device login ID changes, you only need
to change the password in the credential policies for those devices. You do not need to update the accounts
for every individual device that Cisco UCS Director manages.
Infrastructure Reporting
Cisco UCS Director provides a wide variety of reporting information out of the box. In addition, you can
create custom report templates to build your own reports for the parameters that are relevant to your needs.
Additional information about reporting is available in the Cisco UCS Director Administration Guide and in
the appropriate Cisco UCS Director Management Guides.
Reports
Cisco UCS Director can help you monitor virtual infrastructure and system resources. It displays a wide
variety of reports that provide insight into how the system is performing
Following are the types of reports:
• Tabular reports for system information, including overview, host nodes, new VMs, and deleted VMs.
• Bar and pie graph comparisons, including VMs active versus inactive, and CPU provisioned versus
capacity.
• Trend graphs about system resources, including CPU trends, memory trends, and VM additions and
deletions.
• Other reports include Top 5 reports at the group, VDC, host node, and VM levels. The Top 5 reports
focus on groups with the highest number of VMs, groups with the greatest CPU usage, VDCs with the
highest number of VMs, and host nodes with the greatest CPU usage.
• Map reports, displaying the system resource information in the form of heat maps or color-coded maps.
Additional trend reports are available for certain accounts (for example: KVM accounts). Trend reports display
data over a selected time frame.
CloudSense Analytics
CloudSense Analytics in Cisco UCS Director provide visibility into the infrastructure resources utilization,
critical performance metrics across the IT infrastructure stack, and capacity in real time. CloudSense
significantly improves capacity trending, forecasting, reporting, and planning of virtual and cloud infrastructures.
You can generate the following reports with CloudSense:
• Billing Report for a Customer
• EMC Storage Inventory Report
• NetApp Storage Inventory Report
• NetApp Storage Savings Per Group
• NetApp Storage Savings Report
• Network Impact Assessment Report
• Organizational Usage of Virtual Computing Infrastructure
• PNSC Account Summary Report
• Physical Infrastructure Inventory Report for a Group
• Storage Dedupe Status Report
• Storage Inventory Report For A Group
• Thin Provisioned Space Report
• UCS Data Center Inventory Report
• VM Activity Report by Group
• VMware Host Performance Summary
• Virtual Infrastructure and Assets Report
Note This is a complete list of reports available in the system. However, the number of reports available in the
system for a user depends on the user role. By default, the CloudSense option is not visible to MSP
administrators. The system administrator needs to enable this option for MSP administrators. Once this
is done, then when an MSP administrator logs in, only reports relevant to customer organizations are
displayed.
After you have created a report template, you can use it to generate a report in either PDF or HTML formats.
You can view custom reports in Cisco UCS Director or you can email reports, either to yourself and to other
users in your organization. You can review and archive these reports outside Cisco UCS Director.
In addition to creating a template, you can edit, clone, and delete custom report templates.
Note You cannot generate daily and hourly trend cost reports using the report builder. You can generate trend
reports only for weekly and monthly duration. While generating trend reports for a month, the data is
caculated from the first day of the month till the current date. For example, if you are generating a trend
report on 5th March, this report includes data from March 1st, to March 5th.
Dashboard
In Cisco UCS Director, you can enable the Dashboard option in the user interface. On the Dashboard screen,
you can add important, or frequently accessed report widgets. If you have enabled the Dashboard option,
then this is the first window that you see when you log in to the user interface. After enabling the Dashboard,
you can create additional dashboards, and delete them when you no longer need them.
Summary
The Summary screen allows you to manage system inventory. It gives you access to a wide array of tabular,
graphical, and map reports, and also helps in managing inventory lifecycle actions.
Each report is displayed as a widget. Reports can be hidden through customization.
Inventory Management
You can monitor the system inventory using the Dashboard. The Dashboard displays the entire system level
infrastructure information for administrative management.
Cisco UCS Director tenants are essentially customers that share the compute, network, and storage resources
that is configured for ACI in Cisco UCS Director.
You can assign more than one vDC to a user group. This configuration enables you to set different approvers
and/or different resources for VMs, based upon the type of application that the end user requests. If you assign
multiple vDCs to a user group or customer organization, you can allow your users to choose the vDC where
the VM should be created.
Note You cannot configure tenant onboarding with vDCs if your system includes an integration between Cisco
UCS Director and Cisco Application Policy Infrastructure Controller (APIC).
For more information about tenant onboarding with vDCs, see the Cisco UCS Director Administration Guide.
Note There is a default VDC in Cisco UCS Director, and all discovered VMs are part of this default VDC.
Discovered VMs are VMs that are created outside of Cisco UCS Director or were already created on
VMware vCenter before Cisco UCS Director was installed. Cisco UCS Director automatically discovers
such VMs and adds them to the default VDC.
A VM that is provisioned using a service request can be associated with a specific VDC. When you create a
service request, you can choose the VDC on which this VM is provisioned. You can view a list of the VDCs
that are available for a particular group and choose the required VDC when provisioning VMs.
• Cost model—Cost and chargeback policy for all VMs provisioned from the vDC resources.
• ISO image mapping policy—ISO images available for VMs provisioned from the vDC resources.
• End user self-service policy—Actions or tasks that a user can perform on VMs provisioned from the
vDC resources.
Computing Policies
Computing policies determine the compute resources that can be used during provisioning to satisfy group
or workload requirements.
As an administrator, you can define advanced policies by mixing and matching various conditions in the
computing policy.
Note We recommend that you thoroughly understand all the fields in the computing policy. Some combinations
of conditions can result in no host machines being available during self-service provisioning.
Network Policies
The network policy includes resources such as network settings, DHCP or static IP, and the option to add
multiple vNICs for VMs provisioned using this policy.
Storage Policies
A storage policy defines resources such as the datastore scope, type of storage to use, minimum conditions
for capacity, latency, and so on.
The storage policy also provides options to configure additional disk policies for multiple disks, and to provide
datastore choices for use during a service request creation.
Note Cisco UCS Director supports datastore choice during a service request creation for VM provisioning. You
can enable or disable datastore choices for the end user during service request creation. The datastores
listed depend upon the scope conditions specified in the storage policy that is associated with the VDC
during the service request creation.
To use the datastore selection feature while creating a service request, the template for VM provisioning
must have the disk type assigned as System. This is applicable for templates with single or multiple disks.
policy for VMware, then you can specify this policy when you create a VMware vDC. You cannot view or
assign policies that have been created for other account types.
In addition to creating an end user self-service policy, Cisco UCS Director allows you to perform the following
tasks:
• View—Displays a summary of the policy.
• Edit—Opens the End User Policy screen from which you can modify the description or the end user
self-service options.
• Clone—Opens the End User Policy screen through which you can create an additional policy using the
parameters defined in an existing end user self-service policy.
• Delete—Deletes the policy from the system. You cannot delete a policy that has a VDC assigned to it.
Important The tasks that a user can perform on a VDC are defined by the role that the user is mapped to and by the
end user self-service policy assigned to the VDC. If you have upgraded to the current release, then the
permissions to perform VM management tasks are retained in any pre-existing end user self-service policy.
However, the permissions defined in the user role to which the user belongs takes precedence.
Resource Limits
If you want to ensure that a user group or customer organization does not exceed specific compute, network,
or storage resource thresholds, you can add resource limits to the user group that apply across all vDCs assigned
to that group. If you use resource limits, even if one or more vDCs assigned to the user group have resources
available, Cisco UCS Director will reject service requests that exceed the resource limits.
For example, if you have a data center that includes the following resources:
• ESXi cluster with 10 hosts
• Compute resources that total 1,000 GHz
• Network resources with all the required network portgroups, IP subnets, and VLANs
• Storage resources of 100 datastores
• User groups for Finance, Sales, and Development
• Resource limits for the Finance user group of 300GHz compute and 20 datastores.
• Three vDCs assigned to the Finance user group, each with 100 GHz compute and 10 datastores
With this configuration, users in the Finance group can log into the End User Portal and view their available
resource limits, the vDCs that are associated with their user group, and other information about their available
resources, and deployed applications. If they have deployed applications across all 20 datastores in their
resource limits, they cannot make any further service requests without first requesting an additional resource
allocation.
As you can see from the following illustration, the combination of user groups, vDCs, policies, and resource
limits determine the boundaries of the compute, network, and storage infrastructure that is available to each
of the Finance and Sales organizations for application provisioning.
7 Create one or more service classes within that service offering to define the requirements for a particular
type of infrastructure resource required for the service offering. If you use resource tags, you can associate
a service class with a particular resource tag.
8 Define a tenant profile to associate one or more service offerings with the resource group.
9 Develop the orchestration workflow required to deliver the service offering to the user as part of a service
request.
Note Resource groups support tenant onboarding only for systems that include Cisco Application Centric
Infrastructure (ACI) and Cisco Application Policy Infrastructure Controller (APIC).
For more information about tenant onboarding with resource groups, including specific examples, see the
Cisco UCS Director APIC Management Guide.
Resource Tags
Resource tags are an optional component that allow you to assign a label to a physical or virtual infrastructure
resource or to a category of infrastructure resources. Each resource tag is a name-value pair that identifies the
resource or category of resources in a way that is meaningful to your data center.
When you tag an object, you can also define applicability rules that determine how the tags are filtered and
displayed. You can also organize your resource tags into tag libraries, which allow you to determine how you
want to categorize the resources that have that tag applied. For example, you can create one or more tag
libraries based on the following criteria:
• Resource type
• Capacity
• Quality
• Capability
You can use resource tags to identify specific resources that should be used by a tenant or to identify resources
that are appropriate for a specific tier of service. For example, you can create a tag with a name of tier and a
value of gold. The resources that you associate this tag are then identified as appropriate for the gold tier of
service, whether they are compute, storage, or network infrastructure devices.
Once you have tagged a set of resources, you can associate those resources with resource groups. The resource
tags enable you to easily identify how the infrastructure resources should be grouped. They also define the
boundaries of the infrastructure resources that are available to a particular resource group.
Resource Groups
You can use a resource group to select the appropriate resources for a tenant based on the requirements of an
application. Additional concepts, such as a service offering, tenant profile, application profile, and resource
group, are all required. Using these resource group concepts, you can onboard tenants and deploy applications
based on a dynamic selection of resources. You can share resources in a resource group across tenants or you
can dedicate them to a specific tenant.
A resource group is a pool of resources. Each group can contain physical infrastructure resources, virtual
infrastructure resources, or a combination of physical and virtual infrastructure resources. Resource groups
enable you to onboard tenants into Cisco UCS Director with minimum intervention.
As an infrastructure administrator or system administrator, you can add physical or virtual accounts to a
resource group one at a time. Also, you can assign a pod to a resource group where all the accounts in the pod
are added to the resource group.
When an account is added to a resource group, the resource group by default announces all the capabilities
and capacities for objects for that account as resource group entity capacities and capabilities. With Cisco
UCS Director, you can selectively disable certain capacities or capabilities from the resource group.
Service Offerings
A service offering defines the resources required to provision an application. Each service offering must
include one or more service classes that represents the capacity and capability needed for the following resource
layers:
• Virtual Compute
• Virtual Storage
• Virtual Network
• Physical Compute
• Physical Storage
• Physical Network
• Layer 4 to Layer 7 Services
When you define a service offering, you can specify the usage of resource groups as one of the following:
Based on the capacity, capability, and resource tags defined in the service offering, the resource groups are
filtered and the matching resource groups are selected for further processing in the tenant onboarding and
application deployment.
Tenant Profiles
Tenant profiles represent the pairing of one or more service offerings with one or more resource groups. Each
tenant profile defines the characteristic of infrastructure requirements and application requirements.
You can create a tenant profile to meet each possible combination of customer and application. You can
associate a tenant profile with multiple service offerings and choose a resource group for each service offering.
A tenant profile can be shared by more than one tenant.
Application Categories
Application categories are an optional configuration that enable you to define the type of workload for a VM.
If you do not use application categories, Cisco UCS Director assumes that all VMs provisioned for your users
are generic VMs and configures them to handle CPU-intensive workloads. Whether you choose to use the
default application categories or to create your own, you can provide your users with a pre-defined set of
workloads that match their application needs.
The workload options for application categories include the following:
• CPU intensive
• Network I/O intensive
• Disk I/O intensive
• Memory intensive
• Any combination of the above
After you create your application categories, you can go to the desired cloud account and assign the vDC
policies to the application categories. This assignment determines the boundaries of the infrastructure where
the application can be provisioned. You can also use application categories to allocate clusters based on the
type of application. For example, Cluster 1 is allocated for Web applications and Cluster 2 is allocated for
database applications.
When an application category is chosen by a user, Cisco UCS Director uses the vDC assignment to determine
which location, within the boundary of the vDC, best meets the application's workload needs. For example,
if the user chooses a CPU-intensive application category, Cisco UCS Director provisions the application in
the available infrastructure with the least CPU utilization.
For more information about application categories, see the Cisco UCS Director Administration Guide.
Application Containers
Application containers are a templatized approach to provisioning applications for end users. When you want
to configure Cisco UCS Director to allow users to provision applications, you must create one or more
application containers with the appropriate policies, workflows, and templates. The application container
determines how the application is provisioned for the end user. It can define some or all of the following:
• Physical server or virtual machine
• Amount of reserved storage
• Maximum available CPU
• Maximum available memory
• Version of operating system
• Range of VLANs
• Gateway or firewall, if desired
• Load balancer, if desired
• Required approvals, if desired
• Costs associated with the application container, if desired
Cisco UCS Director supports multiple types of application containers. The type of application container that
you need to implement depends upon your deployment configuration. The steps required to configure the
application container depend upon which type you plan to implement.
For more information about application containers, see the Cisco UCS Director Application Container Guide.
Note This container type is available in Cisco UCS Director only if the VACS modules are
installed. For more information, see the Cisco Virtual Application Cloud Segmentation
Services Configuration Guide.
Multi-Tier Application
A multi-tier application typically requires multiple VMs. The number of VMs depends upon several factors,
such as the application complexity and the users. For example, you could have a three tier application with a
VM for each of the web server, application server, and database server.
If required by your application architecture, a tier can include multiple networks.
Firewall
You can add a firewall as an internal or external gateway to the application. The gateway redirects and creates
a tunnel through the firewall to the application. If you use a firewall, the user does not need to know the IP
address of any of the application VMs. Instead, the user logs in through the IP address of the gateway and is
redirected to the application or database VM. You can also create rules that define the type of traffic that is
permitted through the gateway.
You define the firewall that you want to use in a tiered application gateway policy. This policy is then included
in the application container template. You can add one of the following types of firewalls:
• Linux VM—This default option provisions the appropriate firewalls and NAT rules on the VM.
• Cisco ASA—This physical gateway allows one-way (inside to outside) connections without an explicit
configuration for each internal system and application.
• Cisco ASAv—This virtual gateway is typically cloned from a VM template during the application
provisioning. It allows one-way (inside to outside) connections without an explicit configuration for
each internal system and application.
Load Balancer
You can include a load balancer for a multi-tier application. The load balancer manages communication and
workloads between the servers. For example, a load balancer can identify and redirect a user to one of several
application servers to ensure that none of the application servers are overloaded.
For information about supported load balancers, see the Cisco UCS Director Compatibility Matrix.
Note The process for creating an Application Centric Infrastructure Controller (APIC) managed container is
different.
The figure illustrates the creation of the general application container template within Cisco UCS Director.
Catalogs
Catalogs are collections of predefined workflows and application containers that enable a user to request and
provision applications, VMs, or bare metal servers. You can choose to make a catalog available to end-users
for self-service provisioning through the End User Portal, only to administrators for provisioning through
Cisco UCS Director, or both.
When you publish a catalog, you can choose one of the following types.
• Standard—For provisioning VMs with an operating system image from a specified cloud account
• Advanced—For publishing orchestration workflows as catalogs
• Service Container—For publishing application containers as catalogs
Catalog Organization
The End User Portal organizes the catalogs in folders by name. A set of default folders, named for the catalog
types, are automatically created and sorted alphabetically. However, you do not have to use these default
folders. When you create a catalog, you can place it in a default folder or into a custom folder with a name
that you choose. For example, if you create a Standard Catalog to provision a Windows 2012 operating system
for a VM, you can allow Cisco UCS Director to place it in the Standard folder, or you can create a custom
folder with a name that identifies the operating system, such as VM-Windows2012OS.
Catalog folders created by administrators in Cisco UCS Director display in the End User Portal.
In the Catalog pane, you can use the Move Up and Move Down icons to change the organization of the
catalog folders.
Note You can also use the Manage Folder icon to choose a folder and move it in relation to existing folders.
While creating a catalog in Cisco UCS Director, an administrator can specify a user group or a specific
users that can view the catalog. If you are a user in the selected group, then your view is populated with
the appropriate catalogs.
Self-Service Provisioning
You can provision virtual machines (VMs) or applications through self-service provisioning. To provision a
VM or an application using self-service provisioning, you must first create a service request. This action
initiates a VM-creation workflow that includes the following:
• Budget validation
• Dynamic resource allocation
• Approval
• Provisioning
• Lifecycle setup
• Notification about the status of service requests
Service Requests
You can use the self-service provisioning feature to create a service request to provision virtual machines
(VMs), services, or applications. The service request process produces a provisioning workflow for VM
creation that includes the following actions:
• Budget validation
• Dynamic resource allocation
• Approvals
• Provisioning
• Lifecycle setup and notification
Note If you change the number of CPU Cores or memory allocation while in the Deployment Configuration
screen, the total cost is automatically updated and displayed.
To provision a VM or execute an orchestration workflow, you must first create a service request. If desired,
you can require approval from one or two administrators or designated users before the VM is provisioned
or the workflow executed. VMs can be immediately approved or scheduled to be approved within a maximum
of 90 days from the original request.
Optional service request workflow steps include Budget Watch and Check Resource Limits:
• Budget Watch—An administrator has to enable budgeting for a group. This step determines if a sufficient
budget is available for provisioning a new VM in that group.
• Check Resource Limits—Resource limits for a group must be enabled by an administrator. This step
determines if sufficient resources are available for provisioning a new VM in that group.
Any user who has been assigned the Read-Group Service Request permission can view the progress of a
service request.
Name Description
Overview
Request Type The type of request (in this case, creating a VM).
Ownership
Initiating User The user who has initiated the service request.
Duration Hours The amount of time that the VM is active. If this time
is defined, the VM is deleted after the specified time.
Catalog Information
VDC Owner Email The email ID provided by the administrator when
creating a VDC.
Approving Users The user (if defined) who must approve the service
request for VM provisioning.
Name Description
Catalog Name The catalog item name from which the VM is
provisioned.
Service Request Cost The cost (projected) of provisioning the VM. This
cost is determined based on the Cost Model that is
defined for the catalog item.
You can view the status of each workflow step. Details such as warning or error messages and the time of the
request are also displayed. The workflow steps are color-coded to indicate their status:
Note Approvers may look under the Approvals tab to see their assigned service requests.