Cisco Cisco Process Orchestrator 3.1 User Guide

Page of 786
 
13-152
Cisco Process Orchestrator 3.1 User Guide
 
Appendix 13      Using Adapters 
  UCS Software Adapter
Step 4
Enter the information in the remaining tabs as necessary, then click Save to complete the activity 
definition.
Defining the Create UCS Configuration Backup Activity
Step 1
In the Process Editor Toolbox, choose Cisco UCS >Create UCS Configuration Backup, click the 
activity and drag it onto the Workflow pane.
Step 2
Click the General tab and enter the required information.
Step 3
Click the Configuration Backup tab to define the properties specific to the activity, including:
  •
Type—Choose the type of configuration to be backed up from the drop-down list. The following 
configuration types are available:
  –
Full state—Includes a snapshot of the entire system. You can use this file for disaster recovery 
if you need to recreate every configuration on a fabric interconnect or rebuild a fabric 
interconnect.
  –
All configuration—Includes all system and logical configuration information.
  –
System configuration—Includes all system configuration settings such as user names, roles, and 
locales.
  –
Logical configuration— Includes all logical configuration settings such as service profiles, 
LAN configuration settings, SAN configuration settings, pools, and policies.
  •
Preserve identities—Preserve all identities derived from pools, including the MAC addresses, 
WWPN, WWNN, and UUIDs.
  •
Protocol—The protocol to be used when communicating with the remote server. The following 
protocols can be used:
  –
FTP
  –
TFTP
  –
SCP
  –
SFTP
  •
Remote file—The full path to the backup configuration file. This field can contain the filename as 
well as the path. If you omit the filename, the backup procedure assigns a name to the file.
Note
You can insert the timestamp into the file name by referencing the output from the Format 
Date activity. This activity will format the process start time into a data time string and 
expose a Formatted Date property that can be referenced in the Create UCS Configuration 
Backup activity (Remote File field)
  •
User—The runtime user that should be used to log into the remote server. This field does not apply 
if the protocol is TFTP.
Step 4
Enter the information in the remaining tabs as necessary, then click Save to complete the activity 
definition.