Printable version

Drivers & software

* RECOMMENDED * Online ROM Flash Component for Windows and Linux - HPE MSA 1060/2060/2062 Storage System

By downloading, you agree to the terms and conditions of the Hewlett Packard Enterprise Software License Agreement.
Note:  Some software requires a valid warranty, current Hewlett Packard Enterprise support contract, or a license fee.

Type: Firmware (Entitlement Required) - Storage Controller
Version: IN100P001(10 Nov 2020)
Operating System(s): Microsoft Windows Server 2016
Microsoft Windows Server 2019
Oracle Linux 6 (AMD64/EMT64)
Oracle Linux 7
Red Hat Enterprise Linux 7 Server
Red Hat Enterprise Linux 8 Server
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 15
VMware ESXi 7.0
VMware vSphere 6.7
Multi-part download
File name: cp046159.exe (92 MB)
File name: cp046159.md5 (48 Bytes)
File name: firmware-hpe-msa-2060-IN100P001-1.1.x86_64.md5 (82 Bytes)
File name: firmware-hpe-msa-2060-IN100P001-1.1.x86_64.rpm (91 MB)
File name: READ_ME.TXT (8.8 KB)
This package contains the firmware for HPE MSA 1060/2060/2062 Storage System which includes array controller firmware and approved companion versions of drive enclosure firmware. When installing array controller firmware, the process will also update firmware on attached drive enclosures. This firmware can be installed from any computer running a supported Windows or Linux operating system with an Ethernet connection to the HPE MSA 1060/2060/2062 Storage System.

Prerequisites:

Please review the information from important tab before installing this product.

 


To ensure the integrity of your download, HPE recommends verifying your results with the following SHA-256 Checksum values:

8268db93fa6b27fd5ded75e0ab74b24138a12b033d2387f8fd70865b185c50bc READ_ME.TXT
1d8f93616141d7f41e0a9b7665981bbc2b56f0bcc13ea5f373d5a04f5b5dda7d firmware-hpe-msa-2060-IN100P001-1.1.x86_64.md5
287e07092752239dedde5693540af0b094c3c9e89e0462733a7af75e081ce695 cp046159.md5
d5fbdeaf30e5f45f3e0d75b4752a35c6a0fedd96d50519948a924e573f836cdb firmware-hpe-msa-2060-IN100P001-1.1.x86_64.rpm
68d3e6551f089a9522bf3b32b99be0b71129dae80575f8ad11c8d2a31ab7f98b cp046159.exe

Reboot Requirement:
Reboot is not required after installation for updates to take effect and hardware stability to be maintained.


Installation:

Installation Notes

 

WARNING!: Validate the infrastructure (HBA, switch, etc.) driver and firmware versions being used are the versions listed in SPOCK. Failure to do so could result in loss of access to the LUNs presented from the MSA during the upgrade process.

Select and schedule an appropriate time to perform an online upgrade: To ensure the success of an online upgrade, selecting the appropriate time is essential. Because the online firmware upgrade is performed while host I/Os are being serviced, the I/O load can impact the upgrade process. Selecting a period of low I/O activity will ensure the upgrade completes as quickly as possible, and will avoid disruptions to hosts and applications due to timeouts.
As with any other firmware upgrade it is a recommended best practice to ensure that you have a full backup prior to the upgrade.

Following a firmware upgrade, it is recommended to rescan all HBAs to ensure that all paths have been rediscovered correctly. Please consult your operating system documentation on the best ways to force a rescan and verify the number of paths to each LUN is correct.

 

Please refer to the Release Notes for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.

 

Please refer to the READ_ME.txt file to know about the Installation notes, Important notes and Operating System support for the Linux and Windows Smart Components.

 

Instructions to Validate Windows Smart Component Executable:
To verify the HPE SHA256 Authenticode digital signature, do the following steps:

  • Download cpxxxxxxx.exe to a system running a supported version of Microsoft Windows Server OS. By downloading this file, you are agreeing to the license terms in HPE License Agreement v1.pdf, listed in the 'License' field.
  • Right-click the filename then select Properties.
  • When the Properties window displays, click the Digital Signatures tab.
  • Select the entry in the Signature List where Digest algorithm is SHA256 and click the Details button. 
  • The signature status will display at the top of the Details dialog.
  • If the signature message states that “This digital signature is OK.”, then the firmware package is authenticated as an HPE package.
  • If the message “This digital signature is not OK.” displays, then do the following:     
    • Do not deploy the firmware.       
    • Download firmware a second time and verify the signature again. If the signature is not OK, then contact HPE Technical Support. 

To verify the SHA256 hash value, do the following steps:

  • Use Microsoft Windows CRC/SHA tool to calculate the SHA256 hash value for cpxxxxxxx.exe. 
  • Compare the calculated value with the SHA256 value displayed in the Installation Instruction tab of the HPE Support Center download page.
  • If the values match, then the integrity of the downloaded file has been verified.
  • If the values do not match, do not deploy the file or its contents.
  • Download the file a second time and compare the new hash value. 
  • If the hash values do not match, then do not deploy the downloaded file and contact HPE Technical Support. 

Windows Smart Component Installation Instructions

This is a self extracting executable module. One can execute this module via the command line console or from Windows graphical user interface.

GUI Option

  1. Place the downloaded firmware package in a temporary directory.
  2. Using Windows Explorer, navigate to the directory containing the download.
  3. Double click the executable file.
  4. Follow onscreen instructions. After you are prompted for logon information, enter credentials for an account with management access rights.
  5. Wait for the installation to complete. During installation, each updated module automatically restarts. Upon completion, a confirmation message is displayed.

CLI Option

  1. Place the downloaded firmware package in a temporary directory.
  2. Using Windows command prompt, navigate to the directory containing the download.
  3. Execute the Smart Component by entering the following command:

cpxxxxxxx.exe /target <ip_address> /user <username> /passwd <password> /s
where:

  • CPxxxxxxx.exe is the downloaded Smart Component filename
  • ip_address is the management IPv4/IPv6 address or DNS Management host-name of the array controller
  • username is the username account with management rights
  • password is the password for username

Instead of command line parameters you can use the following DOS environment variables:

  • oa_address: set this variable for the IPv4/IPv6 address or DNS Management host-name of the array controller
  • oa_username : set this variable for the username of array controller
  • oa_password : set this variable for the password of array controller

Wait for the installation to complete. During installation, each updated module automatically restarts. Upon completion, a confirmation message is displayed.

NOTE:

  • When prompted for logon information, enter credentials for an account with management access rights
  • For details on supported command options, see the online help by executing the command cpxxxxxx.exe /h or /?

 

Instructions to Validate Linux Smart Component RPM:
Verify the RPM signature using the following steps:

  • Download the HPE GPG 2048-bit Public Key (hpePublicKey2048_key1.pub), which is available from the HPE SDR web site: https://downloads.linux.hpe.com/keys.html
  • Import the public key while logged in as root by running the following command:

                 # rpm --import /path_to_the_key/file_name_of_the_key
                 example # rpm --import /path_to_the_key/hpePublicKey2048_key1.pub
Verify the RPM:

  • Use the rpm --checksig command to validate and verify the digital signature of the signed file. The output from the command indicates the validity of the signature.

                 # rpm --checksig filename_of_the_rpm
                 example result #  rpm --checksig <File name>.rpm
                 <File name>.rpm: rsa sha1 (md5) pgp md5 OK

  • If your file does not pass verification or you do not have the Hewlett Packard Enterprise Company public key installed, you may see an error.

                 # rpm --checksig filename_of_the_rpm
                 <File name>.rpm: RSA sha1 ((MD5) PGP) md5 NOT OK (MISSING KEYS: (MD5) PGP#26c2b797)

  • In this case then do not install the rpm. This means the file has been modified in some way since being released from Hewlett Packard Enterprise Company

To verify the SHA256 hash value, do the following steps:

  • Use sha256sum tool to calculate the SHA256 hash value for <File name>.rpm. 
  • Compare the calculated value with the SHA256 value displayed in the Installation Instruction tab of the HPE Support Center download page.
  • If the values match, then the integrity of the downloaded file has been verified.
  • If the values do not match, do not deploy the file or its contents.
  • Download the file a second time and compare the new hash value. 
  • If the hash values do not match, then do not deploy the downloaded file and contact HPE Technical Support.

Linux Smart Component Installation Instructions

  • Place the downloaded firmware package in a temporary directory.
  • Open a Linux command console.
  • Install the firmware rpm using the command: rpm -ivh <rpm_filename>. This extracts the contents of the rpm to the '/usr/lib/x86_64-linux-gnu' location. Installing the firmware rpm package (rpm -ivh) does not update the firmware. It merely extracts the rpm content to the local system. Updating the firmware on the local system requires execution of CP046158.scexe with required arguments as described below.
  • cd /usr/lib/x86_64-linux-gnu/scexe-compat
  • ./CP046158.scexe --target <ip_address> --user <username> --passwd <password>. (Please provide credentials for an account with management access rights. ip_address is the management IPv4/IPv6 address or DNS Management host-name of the array controller)
  • Options and Parameters
  • Use the -e (--reflash) or -f (--force) option when flashing a device, even if it is up to date.
  • Use the -g (--downgrade) option when downgrading.
  • For details on supported command options, see the online help by executing the command ./CP046158.scexe or ./CP046158.scexe -h (--help).
  • If the username or password contains a special character, enclose the string in single quotes or enter a backslash (\) before the special character. For example, '!manage' or \!manage
  • Follow onscreen instructions.
  • Wait for the installation to complete. During installation, each updated module automatically restarts. Upon completion, a confirmation message is displayed.
  • The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.
  • To uninstall the rpm, run the command: rpm -e <rpm_package_name>, which is the rpm filename without the '.rpm' extension.

End User License Agreements:
HPE Software License Agreement v1
Hewlett-Packard End User License Agreement


Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


Important:

Important Notes

WARNING!: Validate the infrastructure (HBA, switch, etc.) driver and firmware versions being used are the versions listed in SPOCK. Failure to do so could result in loss of access to the LUNs presented from the MSA during the upgrade process.

 

NOTE: Firmware upgrade must be performed from a supported Windows or Linux client (using the corresponding Windows or Linux Smart Component) that has network connectivity to the array being upgraded.

 

WARNING!: Do not power cycle or restart devices during a firmware update. If the update is interrupted or there is a power failure, the module could become inoperative. If this occurs, contact technical support. The module may need to be returned to the factory for reprogramming.

 

CAUTION: Before upgrading firmware, ensure that the storage system configuration is stable and is not being reconfigured or changed in any way. If changes are in progress, monitor them and wait until they are completed before proceeding with the upgrade.

 

IMPORTANT: HTTPS or Telnet service must be enabled on the arrays being updated and the corresponding connection must not be blocked by any firewall on the host system where the Smart Component is being executed.

 

NOTE: Allow approximately 15 minutes for the firmware to load and for the automatic restart to complete on the controller you are connected to. Depending on the environment, it may take as long as one hour to complete. Wait for the progress messages to specify that the update has completed. Smart component flash process will update both controllers and report on the progress.

Windows Smart Component firmware flash progress messages are logged to %systemdrive%\CPQSYSTEM\log\MSA-Date~Time~ControllerSerialNumber.log and Windows Smart Component firmware flashing summary is logged to %systemdrive%\CPQSYSTEM\log\cpqsetup.log.

Linux Smart Component firmware flash progress messages are logged to /var/cpq/MSA-Date~Time~ControllerSerialNumber.log and Linux Smart Component firmware flashing summary is logged to /var/cpq/Component.log. A final completion message will be displayed. 

The Smart Component will manage the SFTP, Disk Group background scrub enable/disable, Disk background scrub enable and Partner Firmware Update (PFU) enable/disable settings.

 

NOTE: This firmware Smart Component will not inter-operate with Smart Update Manager (SUM) or with the Service Pack for ProLiant (SPP).


Notes:

WARNING!: Validate the infrastructure (HBA, switch, etc.) driver and firmware versions being used are the versions listed in SPOCK.  Failure to do so could result in loss of access to the LUNs presented from the MSA during the upgrade process.

For up-to-date, detailed operating system support information and known restrictions, see the HPE Storage Single Point Of Connectivity Knowledge (SPOCK) website at http://www.hpe.com/storage/spock.

Please refer to the Release Notes for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.

IN100P001 build includes the following components:

Component Version
Storage Controller Code INS100R02-01 
Storage Controller Loader Code  28.019
Management Controller Code IXM100R001-02 
Management Controller Loader Code 1.40.31641
CPLD Code 2.5
Expander Controller Code 5321

Expansion Modules:

  • 5321

Important Firmware Notes

  • Windows Server 2016 and 2019 management integration:
    • Hewlett Packard Enterprise recommends that you update the Windows cache by using the cmdlet, Update-StorageProviderCache -DiscoveryLevel Full -Name <storageProviderName> manually, after attempting any storage provision operations that use the MSA management interface.
    • Hewlett Packard Enterprise recommends that you use the MSA management interface (Storage Management Utility or Command Line Interface) to modify volume mappings, delete volumes, or modify volume names. Manually update Windows cache by using the cmdlet, Update-StorageProviderCache -DiscoveryLevel Full -Name <storageProviderName>.
  • System Center VMM integration:
    • Running operations concurrently is supported up to the limit of four concurrent operations. This includes creating objects (e.g., LUNs, clones, snapshots) and registering objects to hosts or four node clusters.
  • Windows Server 2016 and 2019 management and System Center VMM integration:
    • Hewlett Packard Enterprise recommends that you disable Windows Indication subscription, if SCVMM or Windows Server 2016 and 2019 manages only MSAs and not any other arrays. To disable the Indication subscription, modify the registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Storage Management\EnableIndications value from 1 to 0 and restart Windows Standards Based Storage Management Service.
    • If you want to enable the Indication subscription at Windows Server 2016 and 2019, Hewlett Packard Enterprise recommends that you configure the Indication based on the instructions provided at  https://techcommunity.microsoft.com/t5/storage-at-microsoft/using-indications-with-the-windows-standards-based-storage/ba-p/424736
  • The MSA 1060/2060/2062 contains an embedded SMI-S provider for use by SMI-S client applications. The embedded provider is designed to support MSA 1060/2060/2062 configurations with up to 24 hard drives and up to 250 mapping paths. A mapping path is defined as an MSA 1060/2060/2062 volume presented through an MSA 1060/2060/2062 target port to a host initiator.
  • Smart Array SAS HBAs are not supported with SMI-S based applications that include System Center VMM and Windows Server 2016 and 2019 Integrations.

Supported Devices and Features:

Support for the following MSA devices:-

  • HPE MSA 2060 16Gb FC LFF Storage
  • HPE MSA 2060 16Gb FC SFF Storage
  • HPE MSA 2060 10GbE iSCSI LFF Storage
  • HPE MSA 2060 10GbE iSCSI SFF Storage
  • HPE MSA 2060 12Gb SAS LFF Storage
  • HPE MSA 2060 12Gb SAS SFF Storage
  • HPE MSA 2062 16Gb FC LFF Storage
  • HPE MSA 2062 16Gb FC SFF Storage
  • HPE MSA 2062 10GbE iSCSI LFF Storage
  • HPE MSA 2062 10GbE iSCSI SFF Storage
  • HPE MSA 2062 12Gb SAS LFF Storage
  • HPE MSA 2062 12Gb SAS SFF Storage
  • HPE MSA 1060 16Gb FC SFF Storage
  • HPE MSA 1060 10GBT iSCSI SFF Storage
  • HPE MSA 1060 12Gb SAS SFF Storage
  • HPE MSA 2060 2U 12d LFF Drive Enclosure
  • HPE MSA 2060 2U 24d SFF Drive Enclosure

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


The following feature was fixed in controller firmware IN100P001:

  • Vendor and Model Description show incorrect values for Small Form Factor (SFF) enclosures in the Command Line Interface (CLI) and Storage Management Utility (SMU).

Please refer to the Release Notes for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.

Important Notes

WARNING!: Validate the infrastructure (HBA, switch, etc.) driver and firmware versions being used are the versions listed in SPOCK. Failure to do so could result in loss of access to the LUNs presented from the MSA during the upgrade process.

 

NOTE: Firmware upgrade must be performed from a supported Windows or Linux client (using the corresponding Windows or Linux Smart Component) that has network connectivity to the array being upgraded.

 

WARNING!: Do not power cycle or restart devices during a firmware update. If the update is interrupted or there is a power failure, the module could become inoperative. If this occurs, contact technical support. The module may need to be returned to the factory for reprogramming.

 

CAUTION: Before upgrading firmware, ensure that the storage system configuration is stable and is not being reconfigured or changed in any way. If changes are in progress, monitor them and wait until they are completed before proceeding with the upgrade.

 

IMPORTANT: HTTPS or Telnet service must be enabled on the arrays being updated and the corresponding connection must not be blocked by any firewall on the host system where the Smart Component is being executed.

 

NOTE: Allow approximately 15 minutes for the firmware to load and for the automatic restart to complete on the controller you are connected to. Depending on the environment, it may take as long as one hour to complete. Wait for the progress messages to specify that the update has completed. Smart component flash process will update both controllers and report on the progress.

Windows Smart Component firmware flash progress messages are logged to %systemdrive%\CPQSYSTEM\log\MSA-Date~Time~ControllerSerialNumber.log and Windows Smart Component firmware flashing summary is logged to %systemdrive%\CPQSYSTEM\log\cpqsetup.log.

Linux Smart Component firmware flash progress messages are logged to /var/cpq/MSA-Date~Time~ControllerSerialNumber.log and Linux Smart Component firmware flashing summary is logged to /var/cpq/Component.log. A final completion message will be displayed. 

The Smart Component will manage the SFTP, Disk Group background scrub enable/disable, Disk background scrub enable and Partner Firmware Update (PFU) enable/disable settings.

 

NOTE: This firmware Smart Component will not inter-operate with Smart Update Manager (SUM) or with the Service Pack for ProLiant (SPP).

Version:IN100P001(A) (2 Mar 2021)
Fixes

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


The following feature was fixed in controller firmware IN100P001:

  • Vendor and Model Description show incorrect values for Small Form Factor (SFF) enclosures in the Command Line Interface (CLI) and Storage Management Utility (SMU).

Please refer to the Release Notes for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.

 

The following issues were fixed in Smart Component Flash Engine:

  •  Fix the issue of flashing failure when LDAP user-group contains space in user-group name.
  •  Fix to attempt re-flash in order to resolve invalid bundle version cases.
     
Enhancements

The following enhancement was added in Smart Component Flash Engine:

  • Enhancement to include rescan command before starting the firmware flashing.

Version:IN100P001 (10 Nov 2020)
Fixes

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


The following feature was fixed in controller firmware IN100P001:

  • Vendor and Model Description show incorrect values for Small Form Factor (SFF) enclosures in the Command Line Interface (CLI) and Storage Management Utility (SMU).

Please refer to the Release Notes for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.


Version:IN100R003(A) (2 Mar 2021)
Fixes

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


The following issues were fixed in Smart Component Flash Engine:

  • Fix the issue of flashing failure when LDAP user-group contains space in user-group name.
  • Fix to attempt re-flash in order to resolve invalid bundle version cases.
Enhancements

The following enhancement was added in Smart Component Flash Engine:

  • Enhancement to include rescan command before starting the firmware flashing.

Version:IN100R003 (30 Oct 2020)
Fixes

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


Initial release

Enhancements

Initial release


Type: Firmware (Entitlement Required) - Storage Controller
Version: IN100P001(10 Nov 2020)
Operating System(s):
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Oracle Linux 6 (AMD64/EMT64)
Oracle Linux 7
Red Hat Enterprise Linux 7 Server
Red Hat Enterprise Linux 8 Server
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 15
VMware ESXi 7.0
VMware vSphere 6.7

Description

This package contains the firmware for HPE MSA 1060/2060/2062 Storage System which includes array controller firmware and approved companion versions of drive enclosure firmware. When installing array controller firmware, the process will also update firmware on attached drive enclosures. This firmware can be installed from any computer running a supported Windows or Linux operating system with an Ethernet connection to the HPE MSA 1060/2060/2062 Storage System.

Installation Instructions

Prerequisites:

Please review the information from important tab before installing this product.

 


To ensure the integrity of your download, HPE recommends verifying your results with the following SHA-256 Checksum values:

8268db93fa6b27fd5ded75e0ab74b24138a12b033d2387f8fd70865b185c50bc READ_ME.TXT
1d8f93616141d7f41e0a9b7665981bbc2b56f0bcc13ea5f373d5a04f5b5dda7d firmware-hpe-msa-2060-IN100P001-1.1.x86_64.md5
287e07092752239dedde5693540af0b094c3c9e89e0462733a7af75e081ce695 cp046159.md5
d5fbdeaf30e5f45f3e0d75b4752a35c6a0fedd96d50519948a924e573f836cdb firmware-hpe-msa-2060-IN100P001-1.1.x86_64.rpm
68d3e6551f089a9522bf3b32b99be0b71129dae80575f8ad11c8d2a31ab7f98b cp046159.exe

Reboot Requirement:
Reboot is not required after installation for updates to take effect and hardware stability to be maintained.


Installation:

Installation Notes

 

WARNING!: Validate the infrastructure (HBA, switch, etc.) driver and firmware versions being used are the versions listed in SPOCK. Failure to do so could result in loss of access to the LUNs presented from the MSA during the upgrade process.

Select and schedule an appropriate time to perform an online upgrade: To ensure the success of an online upgrade, selecting the appropriate time is essential. Because the online firmware upgrade is performed while host I/Os are being serviced, the I/O load can impact the upgrade process. Selecting a period of low I/O activity will ensure the upgrade completes as quickly as possible, and will avoid disruptions to hosts and applications due to timeouts.
As with any other firmware upgrade it is a recommended best practice to ensure that you have a full backup prior to the upgrade.

Following a firmware upgrade, it is recommended to rescan all HBAs to ensure that all paths have been rediscovered correctly. Please consult your operating system documentation on the best ways to force a rescan and verify the number of paths to each LUN is correct.

 

Please refer to the Release Notes for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.

 

Please refer to the READ_ME.txt file to know about the Installation notes, Important notes and Operating System support for the Linux and Windows Smart Components.

 

Instructions to Validate Windows Smart Component Executable:
To verify the HPE SHA256 Authenticode digital signature, do the following steps:

  • Download cpxxxxxxx.exe to a system running a supported version of Microsoft Windows Server OS. By downloading this file, you are agreeing to the license terms in HPE License Agreement v1.pdf, listed in the 'License' field.
  • Right-click the filename then select Properties.
  • When the Properties window displays, click the Digital Signatures tab.
  • Select the entry in the Signature List where Digest algorithm is SHA256 and click the Details button. 
  • The signature status will display at the top of the Details dialog.
  • If the signature message states that “This digital signature is OK.”, then the firmware package is authenticated as an HPE package.
  • If the message “This digital signature is not OK.” displays, then do the following:     
    • Do not deploy the firmware.       
    • Download firmware a second time and verify the signature again. If the signature is not OK, then contact HPE Technical Support. 

To verify the SHA256 hash value, do the following steps:

  • Use Microsoft Windows CRC/SHA tool to calculate the SHA256 hash value for cpxxxxxxx.exe. 
  • Compare the calculated value with the SHA256 value displayed in the Installation Instruction tab of the HPE Support Center download page.
  • If the values match, then the integrity of the downloaded file has been verified.
  • If the values do not match, do not deploy the file or its contents.
  • Download the file a second time and compare the new hash value. 
  • If the hash values do not match, then do not deploy the downloaded file and contact HPE Technical Support. 

Windows Smart Component Installation Instructions

This is a self extracting executable module. One can execute this module via the command line console or from Windows graphical user interface.

GUI Option

  1. Place the downloaded firmware package in a temporary directory.
  2. Using Windows Explorer, navigate to the directory containing the download.
  3. Double click the executable file.
  4. Follow onscreen instructions. After you are prompted for logon information, enter credentials for an account with management access rights.
  5. Wait for the installation to complete. During installation, each updated module automatically restarts. Upon completion, a confirmation message is displayed.

CLI Option

  1. Place the downloaded firmware package in a temporary directory.
  2. Using Windows command prompt, navigate to the directory containing the download.
  3. Execute the Smart Component by entering the following command:

cpxxxxxxx.exe /target <ip_address> /user <username> /passwd <password> /s
where:

  • CPxxxxxxx.exe is the downloaded Smart Component filename
  • ip_address is the management IPv4/IPv6 address or DNS Management host-name of the array controller
  • username is the username account with management rights
  • password is the password for username

Instead of command line parameters you can use the following DOS environment variables:

  • oa_address: set this variable for the IPv4/IPv6 address or DNS Management host-name of the array controller
  • oa_username : set this variable for the username of array controller
  • oa_password : set this variable for the password of array controller

Wait for the installation to complete. During installation, each updated module automatically restarts. Upon completion, a confirmation message is displayed.

NOTE:

  • When prompted for logon information, enter credentials for an account with management access rights
  • For details on supported command options, see the online help by executing the command cpxxxxxx.exe /h or /?

 

Instructions to Validate Linux Smart Component RPM:
Verify the RPM signature using the following steps:

  • Download the HPE GPG 2048-bit Public Key (hpePublicKey2048_key1.pub), which is available from the HPE SDR web site: https://downloads.linux.hpe.com/keys.html
  • Import the public key while logged in as root by running the following command:

                 # rpm --import /path_to_the_key/file_name_of_the_key
                 example # rpm --import /path_to_the_key/hpePublicKey2048_key1.pub
Verify the RPM:

  • Use the rpm --checksig command to validate and verify the digital signature of the signed file. The output from the command indicates the validity of the signature.

                 # rpm --checksig filename_of_the_rpm
                 example result #  rpm --checksig <File name>.rpm
                 <File name>.rpm: rsa sha1 (md5) pgp md5 OK

  • If your file does not pass verification or you do not have the Hewlett Packard Enterprise Company public key installed, you may see an error.

                 # rpm --checksig filename_of_the_rpm
                 <File name>.rpm: RSA sha1 ((MD5) PGP) md5 NOT OK (MISSING KEYS: (MD5) PGP#26c2b797)

  • In this case then do not install the rpm. This means the file has been modified in some way since being released from Hewlett Packard Enterprise Company

To verify the SHA256 hash value, do the following steps:

  • Use sha256sum tool to calculate the SHA256 hash value for <File name>.rpm. 
  • Compare the calculated value with the SHA256 value displayed in the Installation Instruction tab of the HPE Support Center download page.
  • If the values match, then the integrity of the downloaded file has been verified.
  • If the values do not match, do not deploy the file or its contents.
  • Download the file a second time and compare the new hash value. 
  • If the hash values do not match, then do not deploy the downloaded file and contact HPE Technical Support.

Linux Smart Component Installation Instructions

  • Place the downloaded firmware package in a temporary directory.
  • Open a Linux command console.
  • Install the firmware rpm using the command: rpm -ivh <rpm_filename>. This extracts the contents of the rpm to the '/usr/lib/x86_64-linux-gnu' location. Installing the firmware rpm package (rpm -ivh) does not update the firmware. It merely extracts the rpm content to the local system. Updating the firmware on the local system requires execution of CP046158.scexe with required arguments as described below.
  • cd /usr/lib/x86_64-linux-gnu/scexe-compat
  • ./CP046158.scexe --target <ip_address> --user <username> --passwd <password>. (Please provide credentials for an account with management access rights. ip_address is the management IPv4/IPv6 address or DNS Management host-name of the array controller)
  • Options and Parameters
  • Use the -e (--reflash) or -f (--force) option when flashing a device, even if it is up to date.
  • Use the -g (--downgrade) option when downgrading.
  • For details on supported command options, see the online help by executing the command ./CP046158.scexe or ./CP046158.scexe -h (--help).
  • If the username or password contains a special character, enclose the string in single quotes or enter a backslash (\) before the special character. For example, '!manage' or \!manage
  • Follow onscreen instructions.
  • Wait for the installation to complete. During installation, each updated module automatically restarts. Upon completion, a confirmation message is displayed.
  • The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.
  • To uninstall the rpm, run the command: rpm -e <rpm_package_name>, which is the rpm filename without the '.rpm' extension.

Release Notes

End User License Agreements:
HPE Software License Agreement v1
Hewlett-Packard End User License Agreement


Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


Important:

Important Notes

WARNING!: Validate the infrastructure (HBA, switch, etc.) driver and firmware versions being used are the versions listed in SPOCK. Failure to do so could result in loss of access to the LUNs presented from the MSA during the upgrade process.

 

NOTE: Firmware upgrade must be performed from a supported Windows or Linux client (using the corresponding Windows or Linux Smart Component) that has network connectivity to the array being upgraded.

 

WARNING!: Do not power cycle or restart devices during a firmware update. If the update is interrupted or there is a power failure, the module could become inoperative. If this occurs, contact technical support. The module may need to be returned to the factory for reprogramming.

 

CAUTION: Before upgrading firmware, ensure that the storage system configuration is stable and is not being reconfigured or changed in any way. If changes are in progress, monitor them and wait until they are completed before proceeding with the upgrade.

 

IMPORTANT: HTTPS or Telnet service must be enabled on the arrays being updated and the corresponding connection must not be blocked by any firewall on the host system where the Smart Component is being executed.

 

NOTE: Allow approximately 15 minutes for the firmware to load and for the automatic restart to complete on the controller you are connected to. Depending on the environment, it may take as long as one hour to complete. Wait for the progress messages to specify that the update has completed. Smart component flash process will update both controllers and report on the progress.

Windows Smart Component firmware flash progress messages are logged to %systemdrive%\CPQSYSTEM\log\MSA-Date~Time~ControllerSerialNumber.log and Windows Smart Component firmware flashing summary is logged to %systemdrive%\CPQSYSTEM\log\cpqsetup.log.

Linux Smart Component firmware flash progress messages are logged to /var/cpq/MSA-Date~Time~ControllerSerialNumber.log and Linux Smart Component firmware flashing summary is logged to /var/cpq/Component.log. A final completion message will be displayed. 

The Smart Component will manage the SFTP, Disk Group background scrub enable/disable, Disk background scrub enable and Partner Firmware Update (PFU) enable/disable settings.

 

NOTE: This firmware Smart Component will not inter-operate with Smart Update Manager (SUM) or with the Service Pack for ProLiant (SPP).


Notes:

WARNING!: Validate the infrastructure (HBA, switch, etc.) driver and firmware versions being used are the versions listed in SPOCK.  Failure to do so could result in loss of access to the LUNs presented from the MSA during the upgrade process.

For up-to-date, detailed operating system support information and known restrictions, see the HPE Storage Single Point Of Connectivity Knowledge (SPOCK) website at http://www.hpe.com/storage/spock.

Please refer to the Release Notes for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.

IN100P001 build includes the following components:

Component Version
Storage Controller Code INS100R02-01 
Storage Controller Loader Code  28.019
Management Controller Code IXM100R001-02 
Management Controller Loader Code 1.40.31641
CPLD Code 2.5
Expander Controller Code 5321

Expansion Modules:

  • 5321

Important Firmware Notes

  • Windows Server 2016 and 2019 management integration:
    • Hewlett Packard Enterprise recommends that you update the Windows cache by using the cmdlet, Update-StorageProviderCache -DiscoveryLevel Full -Name <storageProviderName> manually, after attempting any storage provision operations that use the MSA management interface.
    • Hewlett Packard Enterprise recommends that you use the MSA management interface (Storage Management Utility or Command Line Interface) to modify volume mappings, delete volumes, or modify volume names. Manually update Windows cache by using the cmdlet, Update-StorageProviderCache -DiscoveryLevel Full -Name <storageProviderName>.
  • System Center VMM integration:
    • Running operations concurrently is supported up to the limit of four concurrent operations. This includes creating objects (e.g., LUNs, clones, snapshots) and registering objects to hosts or four node clusters.
  • Windows Server 2016 and 2019 management and System Center VMM integration:
    • Hewlett Packard Enterprise recommends that you disable Windows Indication subscription, if SCVMM or Windows Server 2016 and 2019 manages only MSAs and not any other arrays. To disable the Indication subscription, modify the registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Storage Management\EnableIndications value from 1 to 0 and restart Windows Standards Based Storage Management Service.
    • If you want to enable the Indication subscription at Windows Server 2016 and 2019, Hewlett Packard Enterprise recommends that you configure the Indication based on the instructions provided at  https://techcommunity.microsoft.com/t5/storage-at-microsoft/using-indications-with-the-windows-standards-based-storage/ba-p/424736
  • The MSA 1060/2060/2062 contains an embedded SMI-S provider for use by SMI-S client applications. The embedded provider is designed to support MSA 1060/2060/2062 configurations with up to 24 hard drives and up to 250 mapping paths. A mapping path is defined as an MSA 1060/2060/2062 volume presented through an MSA 1060/2060/2062 target port to a host initiator.
  • Smart Array SAS HBAs are not supported with SMI-S based applications that include System Center VMM and Windows Server 2016 and 2019 Integrations.

Supported Devices and Features:

Support for the following MSA devices:-

  • HPE MSA 2060 16Gb FC LFF Storage
  • HPE MSA 2060 16Gb FC SFF Storage
  • HPE MSA 2060 10GbE iSCSI LFF Storage
  • HPE MSA 2060 10GbE iSCSI SFF Storage
  • HPE MSA 2060 12Gb SAS LFF Storage
  • HPE MSA 2060 12Gb SAS SFF Storage
  • HPE MSA 2062 16Gb FC LFF Storage
  • HPE MSA 2062 16Gb FC SFF Storage
  • HPE MSA 2062 10GbE iSCSI LFF Storage
  • HPE MSA 2062 10GbE iSCSI SFF Storage
  • HPE MSA 2062 12Gb SAS LFF Storage
  • HPE MSA 2062 12Gb SAS SFF Storage
  • HPE MSA 1060 16Gb FC SFF Storage
  • HPE MSA 1060 10GBT iSCSI SFF Storage
  • HPE MSA 1060 12Gb SAS SFF Storage
  • HPE MSA 2060 2U 12d LFF Drive Enclosure
  • HPE MSA 2060 2U 24d SFF Drive Enclosure

Fixes

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


The following feature was fixed in controller firmware IN100P001:

  • Vendor and Model Description show incorrect values for Small Form Factor (SFF) enclosures in the Command Line Interface (CLI) and Storage Management Utility (SMU).

Please refer to the Release Notes for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.

Important

Important Notes

WARNING!: Validate the infrastructure (HBA, switch, etc.) driver and firmware versions being used are the versions listed in SPOCK. Failure to do so could result in loss of access to the LUNs presented from the MSA during the upgrade process.

 

NOTE: Firmware upgrade must be performed from a supported Windows or Linux client (using the corresponding Windows or Linux Smart Component) that has network connectivity to the array being upgraded.

 

WARNING!: Do not power cycle or restart devices during a firmware update. If the update is interrupted or there is a power failure, the module could become inoperative. If this occurs, contact technical support. The module may need to be returned to the factory for reprogramming.

 

CAUTION: Before upgrading firmware, ensure that the storage system configuration is stable and is not being reconfigured or changed in any way. If changes are in progress, monitor them and wait until they are completed before proceeding with the upgrade.

 

IMPORTANT: HTTPS or Telnet service must be enabled on the arrays being updated and the corresponding connection must not be blocked by any firewall on the host system where the Smart Component is being executed.

 

NOTE: Allow approximately 15 minutes for the firmware to load and for the automatic restart to complete on the controller you are connected to. Depending on the environment, it may take as long as one hour to complete. Wait for the progress messages to specify that the update has completed. Smart component flash process will update both controllers and report on the progress.

Windows Smart Component firmware flash progress messages are logged to %systemdrive%\CPQSYSTEM\log\MSA-Date~Time~ControllerSerialNumber.log and Windows Smart Component firmware flashing summary is logged to %systemdrive%\CPQSYSTEM\log\cpqsetup.log.

Linux Smart Component firmware flash progress messages are logged to /var/cpq/MSA-Date~Time~ControllerSerialNumber.log and Linux Smart Component firmware flashing summary is logged to /var/cpq/Component.log. A final completion message will be displayed. 

The Smart Component will manage the SFTP, Disk Group background scrub enable/disable, Disk background scrub enable and Partner Firmware Update (PFU) enable/disable settings.

 

NOTE: This firmware Smart Component will not inter-operate with Smart Update Manager (SUM) or with the Service Pack for ProLiant (SPP).

Revision History

Version:IN100P001(A) (2 Mar 2021)
Fixes

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


The following feature was fixed in controller firmware IN100P001:

  • Vendor and Model Description show incorrect values for Small Form Factor (SFF) enclosures in the Command Line Interface (CLI) and Storage Management Utility (SMU).

Please refer to the Release Notes for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.

 

The following issues were fixed in Smart Component Flash Engine:

  •  Fix the issue of flashing failure when LDAP user-group contains space in user-group name.
  •  Fix to attempt re-flash in order to resolve invalid bundle version cases.
     
Enhancements

The following enhancement was added in Smart Component Flash Engine:

  • Enhancement to include rescan command before starting the firmware flashing.

Version:IN100P001 (10 Nov 2020)
Fixes

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


The following feature was fixed in controller firmware IN100P001:

  • Vendor and Model Description show incorrect values for Small Form Factor (SFF) enclosures in the Command Line Interface (CLI) and Storage Management Utility (SMU).

Please refer to the Release Notes for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.


Version:IN100R003(A) (2 Mar 2021)
Fixes

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


The following issues were fixed in Smart Component Flash Engine:

  • Fix the issue of flashing failure when LDAP user-group contains space in user-group name.
  • Fix to attempt re-flash in order to resolve invalid bundle version cases.
Enhancements

The following enhancement was added in Smart Component Flash Engine:

  • Enhancement to include rescan command before starting the firmware flashing.

Version:IN100R003 (30 Oct 2020)
Fixes

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


Initial release

Enhancements

Initial release


Legal Disclaimer: Products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models.