HP Storage Essentials 5.00.
Legal and notice information © Copyright 2002-2006 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
Contents About this guide . . . . . . . . . . . . . . . Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxiii Intended audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Related documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Document conventions and symbols . . . . . . . . . . . . . . . . . . . . . HP technical support . . . . . . . . . . . . .
Setting Default User Names and Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovery from HP SIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovery from HP SE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding an IP Range for Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovery from HP SIM . . . . . . . . .
Step 1 - Verify the Discovery Setting for Switches Is Set to SNMP . . . . . . . . . . . . . . . . . 45 Step 2 - Discover the Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Discovery from HP SIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Discovery from HP SE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Discovery from HP SIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovery from HP SE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovering HP Filers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovery from HP SIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovery from HP SE . .
3 Discovering Applications, Backup Servers and Hosts . . . . . . . . . . . . . . . . . . . . . 93 Step 1 - Discovering Your Hosts and Master Backup Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Step A - Configure the jboss.properties File for Backup Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Step B - Set Up Discovery for Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4 Managing Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 About the Security for the Management Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About Organizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Planning Your Hierarchy. . . . . . .
Removing a Schedule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Managing Product Health . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Enabling Disk Space Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing the Results of Disk Space Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Advanced Settings . . . . . . . . . .
Remote Sites Are Not Removed from the tnsnames.ora File . . . . . . . . . . . . . . . . . . . . . . . . . Managing Performance Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Managing Performance Collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Starting Performance Collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stopping Performance Collectors . . . . . . . . .
About the Access Tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Obtaining Information About Zone Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Obtaining Information About Host Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Obtaining Information About Storage System LUN Masking. . . . . . . . . . . . . . . . . . . . . . About the Path Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Copying Text from the Remote Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using External Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About the External Tools Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setting up External Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About the Navigation Tab . . . .
Activating a Zone Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zones and Zone Sets Are Sometimes Listed Twice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Changing the Amount of Information Collected from the Inactive Zone Database (Cisco Switches) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About the Messages Displayed in the Brocade Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Initiator Ports Cannot Be Used for Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 The Software Is Unable to Map a Host to Volumes in Different Host Storage Domains of the Same Port on HDS 9900V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 A Default LUN Number Is Used Instead of a User-Specified One . . . . . . . . . . . . . . . . 345 Issues Specific to HP Storage Systems . . . . . . . . . . . . . . . . . . . . . . . . . . .
Step 4 - Select a Host Security Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 5 - Select a Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Creating a Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Meta Volume Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . LUN Security . . . . . . . . . . . . . . . . .
Brocade Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Brocade Switch Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Supported Brocade Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filtering Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Viewing Summary Charts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Trending Information for Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Removing Performance Data from a Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setting a Custom Period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About the Monitoring Options .
Providing Event Generation for a Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550 Providing a Custom Command for a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551 17Chargeback Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553 About Chargeback Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setting Up Chargeback Manager . . . . .
Chargeback Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Chargeback Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-mailing a Chargeback Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Managing E-mail Schedules for Chargeback Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Name of the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608 Troubleshooting After Upgrading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609 SMI-S Switches Must Be Removed and Rediscovered After Upgrading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609 Troubleshooting Discovery and Discovery Data Collection/Get Details . . . . . . . . . . . . . . . . . . . . .
Unable to Discover a UNIX Host Because of DNS or Routing Issues . . . . . . . . . . . . . . . . . . . Troubleshooting the Java Plug-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Java Applet Has Data from a Different Version of Management Server Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OutOfMemoryException Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figures 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 xxii Accessing Features from the Tools > Storage Essentials Menu . . . . . . . . . . . . . . . . . . . . . . . . . 2 Accessing Roles in Storage Essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Accessing the Documentation Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 Tables 1 2 3 4 5 6 7 Multipathing Displayed in the Topology (Continued) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 Direct Attached Storage in the Topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 New Window Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 Viewing Asset Records .
8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 xxiv Discovery Settings for McDATA and Connectrix Switches . . . . . . . . . . . . . . . . . . . . . . . . 41 Discovery Requirements for Storage Systems, Tape Libraries and NAS Filers . . . . . . . . . . . 54 (Discovery from HP SIM) Discovering Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
53 Toolbar for Charts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 54 About the Right-Click Menu Options on the Topology Tab359 55 About the Right-Click Menu Options on the Summary Tab361 56 Obtaining Additional Information from a Chart on the Summary Tab363 57 Show Details for Tabs on the Lower Pane of the Topology Tab363 58 Backup Manager Summary Charts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
96 MVC_STORAGEVOLUMEPORTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473 97 MVC_VOLUMEDISKDRIVEVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474 98 MVC_STORAGEPROCESSORSUMMARYVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474 99 MVC_DISKDRIVESUMMARYVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475 100 MVC_DISK_EXTENTVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
About this guide This guide provides information about: • Discovering elements • Managing Security • Configuring HP • Monitoring and managing elements • Provisioning elements • Viewing events from elements • Viewing reports about elements • Viewing performance, capacity and chargeback information • Troubleshooting HP Intended audience This guide is intended for: • Network Engineers • Administrators • Any one that needs to monitor and/or manage their file servers Prerequisites Prerequisites for using this
Document conventions and symbols Document conventions Table 1 Convention Element Medium blue text: Figure 1 Cross-reference links and e-mail addresses Medium blue, underlined text (http://www.hp.
TIP: Provides helpful hints and shortcuts. HP technical support Telephone numbers for worldwide technical support are listed on the HP support web site: http://www.hp.com/support/.
xxvi
1 Overview This chapter describes the following: • ”About This Product” on page 1 • ”Suggested Topics for First-Time Users” on page 4 • ”Product Components” on page 4 • ”About the User Interface on the SE Home Page” on page 6 • ”Installing the Java Plug-in” on page 11 • ”Installing the Software Security Certificate” on page 12 • ”Stopping the Service for the Management Server” on page 14 About This Product IMPORTANT: If you access HP Systems Insight Manager through HTTP over SSL (HTTPS), you must provide
Storage Essentials, you see a submenu listing several features. These features are only in Storage Essentials. Figure 1 Accessing Features from the Tools > Storage Essentials Menu Some features are not directly accessible from the menus in HP Systems Insight Manager. For example, to edit a role, you must access Storage Essentials first. You can access Storage Essentials numerous ways. One way to access Storage Essentials is to select Tools > Storage Essentials > Home.
Documentation Center provides the documentation set for Storage Essentials, including the PDFs, online help, release notes, and support matrix. Figure 3 Accessing the Documentation Center To manage and monitor your elements in Storage Essentials, discover your elements in HP Systems Insight Manager or HP Storage Essentials. This product provides two types of discovery: • Discovery from HP SIM - Lets you perform all of your discovery tasks within the framework of Systems Insight Manager.
Storage Management Terms • CIM - A common data model of an implementation-neutral schema for describing overall management information in a network/enterprise environment. • Web-Based Enterprise Management (WBEM) - An initiative based on a set of management and Internet standard technologies developed to unify the management of enterprise computing environments. • Storage Management Initiative (SMI) - A SNIA standard for implementing data storage management using CIM.
• CIM Extensions - A CIM Extension gathers information from the operating system and host bus adapters. It then makes the information available to the management server. For more information, see the following in the glossary. Refer to the Installation Guide for information on how to install the CIM Extensions. • (Optional) Module for managing Microsoft Exchange Server - Management software for Microsoft Exchange lets the administrator actively manage the data storage requirements for Microsoft Exchange.
• File System Viewer - File System Viewer does a recursive lookup on the file system and stores the information in an embedded database. File System Viewer can scan files very quickly because of its structure in the database and because it uses a multi-threaded process. More than one process can be used at a time to scan the files. Refer to the File Servers Guide for more information. • Event Manager - Event Manager lets you view, clear, sort and filter events from managed elements.
• Left pane - Displays the status light. If you are using HP the Storage Essentials workflow, you can view the buttons for the management server's utilities in the left pane. • Right pane - Displays the output of a feature, such as the topology in System Manager. About the Top Pane The menus and button in the upper-right corner of the Home page (Tools > Storage Essentials > Home) provide the following functionality.
Table 2 Status Light Settings Include infrastructure details NOTE: When the status light is orange or red, you may want to click the text to the left of the light to access discovery logs quickly (Tasks & Logs > View Storage Essentials Log). About the Left Pane The left pane displays the buttons used to access the management server's main utilities.
• Chargeback Manager - Chargeback Manager helps you manage ownership by department, track costs and assemble business reports. You can view data gathered by Chargeback Manager by element, department and enterprise-wide. You can show the data Chargeback Manager gathered to upper-management through reports, which can be e-mailed on a regular schedule. See ”About Chargeback Manager” on page 553 for more information.
Table 3 Feature Performance Manager Capacity Manager Event Manager Provisioning Manager Chargeback Manager Business Tools 10 Overview Description Where to Find More Information Performance Manager provides detailed performance management capabilities enabling you to visualize what you have and how it is performing. ”Viewing Performance Data” on page 491 Capacity Manager provides a graphical representation of an element's storage capacity and utilization in the storage network.
Table 3 Feature Reporting Description Where to Find More Information Reporting provides reports using data collected by the management server. Some of these reports give you enterprise views of your hosts, switches, storage systems or applications while others give you an at-a-glance analysis based on assets, ownerships, chargeback or performance information. ”Running Reports” on page 429 • The type of license you have. Depending on your license, all features may not be available.
This executable installs the Sun JRE on your computer. The Java plug-in for your Web browser is available in the following file: $JRE_HOME/plugin/sparc/ns610/libjava_oji.so where $JRE_HOME is the directory containing the JRE installation. 3. In a terminal window, go to the $HOME/.mozilla/plugins directory. Create a plugins directory if it does not exist. 4. Remove any existing links to the Java plug-in in this directory. 5.
2. When the security alert message appears, click OK. If you do not want the Web browser to warn you about a secure connection at any Web site, select the In the future, do not show this warning option. 3. When you are told there is a problem with the site's security certificate, click the View Certificate button. 4. When you are shown the certificate information, click the Install Certificate button at the bottom of the screen. 5.
1. Go to the %MGR_DIST%\Tools directory. 2. To delete the original certificate, enter the following at the command prompt: %MGR_DIST%\Tools> generateAppiqKeystore.bat del The original certificate is deleted. 3. To create a new certificate containing the DNS name of the management server, enter the following at the command prompt: %MGR_DIST%\Tools> generateAppiqKeystore.bat 4. If the program is unable to detect a DNS name, enter the following at the command prompt: %MGR_DIST%\Tools> generateAppiqKeystore.
2 Discovering Filers, Tape Libraries, Switches and Storage Systems Before you can use the management server, you must make the software aware of the elements on your network. An element is anything on the network that can be detected by the management server, such as a switch. This is done through the discovery process. Discovery obtains a list of discovered elements and information about their management interface and dependencies.
• ”Step 1 - Discover Switches” on page 31 • ”Step 2 - Discover Storage Systems, Filers and Tape Libraries” on page 53 • ”Step 3 (Discovery from HP SE Only) - Build the Topology” on page 75 • ”Step 4 - Discovery Data Collection or Get Details” on page 80 • ”Managing McDATA and EMC Connectrix Switches” on page 85 • ”Assigning a File Extension in Netscape 7” on page 87 • ”Filtering Discovery Groups” on page 88 • ”Moving Elements to Another Discovery Group” on page 88 • ”Placing an Element in Quarantine” on pag
• Multiple entries in SE may result when modifying username and password in HP SIM - If you use Discovery from HP SIM, the user name and passwords for those elements are forwarded HP SE. If you modify a user name for an element in Discovery from HP SIM, the modification is passed to HP SE as a new discovery entry for that element. The entry with the old user name is not removed from HP SE. This is also true for password modification. Unless removed, the invalid entry is included in Discovery from HP SE.
IMPORTANT: Because of subtle differences between discovery from HP SIM and HP SE, HP strongly recommends you do either all of your discovery steps in HP SIM or HP SE. See ”Differences Between HP SE and HP SIM Discovery” on page 16 for more information about the differences between HP SIM and HP SE discovery. Discovery from HP SIM Steps Discovery of switches, storage systems, filers and tape libraries consists of several steps: 1. Discover your switches by using HP Systems Insight Manager.
Details/Discovery Data Collection screens. To find the IP address of the switch, click the link for the switch in one of the following screens: • Run Discovery Data Collection screen (Options > Storage Essentials > Discovery > Run Discovery Data Collection) for Discovery from HP SIM. • Topology screen (Tools > Storage Essentials > Home > Discovery > Topology) for Discovery from HP SE. • Get Details screen (Tools > Storage Essentials > Home > Discovery > Details) for Discovery from HP SE.
NOTE: Before performing any provisioning operations that involve a brocade switch you must perform Discovery Step 3 for any subset of elements that includes this brocade switch. To make the management server aware of elements on your network follow the steps for discovery outlined in one of the following tables: • Discovery from HP SIM - See Table 4 on page 20. • Discovery from HP SE - See Table 5 on page 21.
Use the following table for SE discovery steps. See ”Accessing the Discovery Pages for HP SIM and HP SE” on page 17 if needed. Table 5 HP SE Discovery Steps for Switches, NAS filers, and Storage Systems Step Description 1 If you have several switches and storage systems that use the same password and user name, set that password and user name as the default. See ”Setting Default User Names and Passwords” on page 22 for more information. 2 Discover your switches.
This section describes the following: • ”About Entering Credentials for Elements in HP SIM” on page 22 • ”Setting Default User Names and Passwords” on page 22 • ”Adding an IP Range for Scanning” on page 23 • ”Adding a Single IP Address or DNS Name for Discovery” on page 24 • ”Modifying a Single IP Address Entry for Discovery” on page 26 • ”Removing Elements from the Addresses to Discover List” on page 27 About Entering Credentials for Elements in HP SIM For elements you want to discover and manage in HP SI
user name and password, you would also enter this user name and password. Do not specify the user name and password for the storage system in the individual range because that overrides the default user name and password. To access a Windows-based device, prefix the user name with domain_name\, as shown in the following example. This is required by the Windows login mechanism.
Discovery from HP SE Instead of adding each IP address individually for scanning, the management server can detect a range of IP addresses, automatically populating the list of elements to be discovered. Keep in mind the following: • Include in the scanning, the proxy server that has a direct connection or a SAN connection to the management server, such as the EMC Solutions Enabler. Make sure the proxy service has started.
• The following steps provide general information on how to discover an element. See Table 6 on page 31, Table 9 on page 54, and Table 11 on page 96. • To obtain drive-related statistics, install a proxy host. Ensure the proxy host has at least one LUN rendered by each controller of the array. See ”Obtaining Disk Drive Statistics from Engenio Storage Systems” on page 123 for more information. • (Discovery from HP SE only) The Do Not Authenticate option is for Engenio storage systems.
• If you want to do provisioning on a storage system, type the corresponding password for controller or proxy and make sure the Do Not Authenticate option is not selected. • For all other elements other than storage systems, provide the password if it is necessary for authentication. If the element does not require a password, leave the Password field blank. 7. If you typed a password in the previous step, retype the password in the Verify Password field. 8.
a. Click the Change password button. b. Type the new password in the New Password field. c. Type the password again in the Verify Password field. d. Click OK in the Change Password page. 6. Click OK in the Edit Address for Discovery page. 7. Select the option, Step 2 - Topology: Select the discovered elements and build the topology view. 8. Select the element for which you changed the user name and/or password. 9. Click the Get Topology button.
3. Select Step 1 at the top of the page. 4. Do one of the following: • Select the IP addresses and/or IP ranges you want to remove from the list. Then, click the Delete button. • Click the button corresponding to the elements you want to remove from the Addresses to Discover list. IMPORTANT: The elements associated with these addresses are not removed from the management server. See ”Deleting Elements from the Product” on page 78 for information about how to remove an element from the management server.
IMPORTANT: When you import a file, your previous settings are overwritten. If you are shown an error message when you try to import the discovery settings, verify you are using the right password. If you are using the correct password, there could be a possibility that the file is corrupt. To import discovery settings from a file: 1. Click Tools > Storage Essentials > Home on the HP SIM home page menu. The Storage Essentials home page opens in a separate web browser window.
• System type and then by System name. This option loads the systems being managed by HP Systems Insight Manager into the Contents window. 4. If you did not select Empty File, click Initialize Now to load the hosts file. Otherwise, enter the contents of the hosts file in the Contents section. 5. Click OK to save the hosts file, or click Cancel to cancel any changes you have made.
Step 1 - Discover Switches This section describes the following: • ”SMI-S Switches Must Be Removed and Rediscovered After Upgrading” on page 32 • ”Discovering Brocade Switches” on page 33 • ”Discovering CNT Switches” on page 34 • ”Discovering Cisco Switches” on page 36 • ”Discovering Sun StorEdge and QLogic Switches” on page 38 • ”Changing the SNMP Trap Listener Port for Sun StorEdge Switches” on page 40 • ”Discovering McDATA and EMC Connectrix Switches” on page 41 • ”(Discovery from SE Only) Excluding McDA
Table 6 Discovery Requirements for Switches (continued) Element Discovery Requirements Additional Information Sun StorEdge and QLogic switches (SNMP) Enter the IP address/DNS name of the Sun StorEdge or QLogic switch. You do not need to enter a password if you discover it in HP SE. HP SIM requires a password. See ”Discovering Sun StorEdge and QLogic Switches” on page 38.
2. Rediscover the Cisco, QLogic, or CNT switches in HP SE. See ”Step 1 - Discover Switches” on page 31. 3. Perform Get Details. See ”Step 4 - Discovery Data Collection or Get Details” on page 80. Discovering Brocade Switches IMPORTANT: Verify that the Rapid program on the switch is set to 1. Rapid must be set to 1 so that the management server can communicate with the switch. See ”Verifying Brocade Rapid Program Is Set to 1” on page 34 for more information.
This field can be left blank if one or more of the following conditions are fulfilled: • The element's user name and password are one of the default user names and passwords. • The element does not require authentication. 8. If you typed a password in the previous step, retype the password in the Verify Password field. 9. In the Comment field (optional), type a comment for additional information.
This provider communicates with CNT InVsn Enterprise Manager to obtain information about the switch. The provider requires a certain version of InVsn depending on the switch model. See the following table for more information. Table 7 Required Switch Models and InVsn Versions for Discovery Switch Model InVsn Software Version FC/9000 9.0 or later UMD 9.5 or later IMPORTANT: The InVsn credentials are used by the SMI-S provider.
• IP Address or System name of the primary IP address of the host running the InVsn software you want to discover. See ”Adding an IP Range for Scanning” on page 23 or ”Adding a Single IP Address or DNS Name for Discovery” on page 24 for more information. • Namespace - If the //root/cntfabric namespace for the InVSN software is not already included in the wbemportlist.xml file on the server running HP SIM, add this namespace as described in the HP SIM documentation. • Port number for the InVsn software.
Keep in mind the following for Cisco SNMP switches: • When you discover a Cisco SNMP switch, you do not need to provide a password if you discover it in HP SE. HP SIM requires a password. • You can view zones, zone sets and zone aliases on a Cisco switch; however, you cannot use the management server to create, modify or remove them from a Cisco switch. • The management server gathers information about the Cisco inactive database during Get Details or Discovery Data Collection.
• A password is required on SMI-S switches. Enter the password. Refer to the HP SIM documentation for more details. Discovery from HP SE To discover a Cisco switch: 1. Click Tools > Storage Essentials > Home on the HP SIM home page menu. The Storage Essentials home page opens in a separate web browser window. From the Storage Essentials home page, click Discovery, then click Setup in the upper right pane of the Storage Essentials window. 2. Select Step 1 at the top of the page. 3.
• To manage a fabric of Sun StorEdge and/or QLogic switches, every switch in the fabric must be included in the discovery list. If a switch is not included in the discovery list, it may show up as a generic host system. • No ports are reported for uninstalled blades or GBICs. • The default SNMP trap listener port for all Sun StorEdge switches is 162. To change this port, see ”Changing the SNMP Trap Listener Port for Sun StorEdge Switches” on page 40.
3. Click the IP Addresses tab. 4. Click the Add Address button. 5. In the IP Address/DNS Name field, type the DNS name or primary IP address of the Sun StorEdge or QLogic switch you want to discover. 6. Do one of the following: • For Sun StorEdge and QLogic switches with SNMP connections: In the User Name field, type the user name for the switch. This is the public community SNMP string for the switch.
7. Set the cimom.snmpTrapListenerPort property to the port you want, as shown in the following example: cimom.snmpTrapListenerPort=162 8. When you are done, click Save. 9. Restart the service for the management server for your changes to take effect. While AppStorManager is restarting, users are not able to access the management server. The AppStorManager service must be running for the management server to monitor elements.
before discovering any McDATA switches. If you must change the configuration, see ”(Discovery from HP SE only) Changing the Discovery Settings” on page 50. • After you discover a McDATA or Connectrix switch through a proxy, the IP address displayed next to the name of the switch is actually the IP address of the proxy for the switch in the Discovery, and Get Details screens.
IMPORTANT: EMC customers using the EMC Connectrix Manager (EMC’s rebranded EFCM) cannot use the EMC Fibre Zone Bridge (EMC’s rebranded Bridge Agent) to discover EMC switches using SWAPI. The McDATA SWAPI library is incompatible with EMC’s Fibre Zone Bridge Agent. If the Fibre Zone Bridge Agent is not installed or not needed, you can uninstall the Fibre Zone Bridge Agent and install McDATA’s Bridge Agent.
7. Verify the cimom.useSnmpMcDataProvider property is set to false. cimom.useSnmpMcDataProvider=FALSE 8. When you are done, click Save. 9. Restart the service for the management server for your changes to take effect. While AppStorManager is restarting, users are not able to access the management server. The AppStorManager service must be running for the management server to monitor elements.
• The element's user name and password are one of the default user names and passwords. • The element does not require authentication. 8. If you typed a password in the previous step, retype the password in the Verify Password field. 9. In the Comment field (optional), type a comment for additional information. The information typed into this field is displayed under the Comment column in the Addresses to Discover list (Tools > Storage Essentials > Home > Discovery > Setup). 10.Click OK. 11.
3. Copy the following command: cimom.useSnmpMcDataProvider=false 4. Return to the Advanced page. 5. Paste the copied text into the Custom Properties field. How you paste the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, right-click the field and select Paste. 6. Comment the property out by adding the hash (#) symbol in front of the property: #cimom.useSnmpMcDataProvider=false 7. When you are done, click Save. 8. Restart the service for the management server.
5. In the IP Address/DNS Name field, type the IP address or DNS name of the proxy you want to discover. 6. In the User Name field, type the default user name, which is “public” (the read-only community string). This is the user name of the proxy. To access a Windows-based device, prepend the user name with the Windows domain name, as shown in the following example. domain_name\user_name where • domain_name is the domain name of the machine • user_name is the name of your network account 7.
4. Return to the Advanced page. 5. Paste the copied text into the Custom Properties field. How you paste the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, right-click the field and select Paste. 6. Set the cimom.snmpTrapListenerPort to another port, as shown in the following example: cimom.snmpTrapListenerPort=1234 where 1234 is the new port 7. When you are done making your changes, click Save. 8.
2. Select Step 1 at the top of the page. 3. Click the IP Addresses tab. 4. Click the Add Address button. 5. In the IP Address/DNS Name field, type the IP address or DNS name of the switch you want to discover. 6. In the User Name field, type the user name for accessing the switch. The default user name is “public” (the read-only community string). 7. Leave the Password (Optional) field blank. The password does not matter since the management server is not doing any configurations through SNMP. 8.
7. When you are done making your changes, click Save. 8. Restart the service for the management server for your changes to take effect. While AppStorManager is restarting, users are not able to access the management server. The AppStorManager service must be running for the management server to monitor elements. Step 3 - Set Up the Proxy to Send Traps to the Correct Port IMPORTANT: The management server uses the Windows SNMP trap service when Discovery from HP SIM is used.
• SNMP connection - Enter the IP address of the proxy. The default user name is “public” (the read-only community string). The password does not matter since the management server is not doing any configurations through SNMP. 10.Verify the following on the proxy and the switches accessible from the proxy: • The SNMP agent is enabled. • The read-only community string is configured. 11.Run Discovery. 12.Run Get Details.
3. Copy the cimom.mcdata.exclude property. How you copy the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, select the text and then right-click the selected text. Then, select Copy. 4. Return to the Advanced page (Options > Storage Essentials > Manage Product Health. Then, click Advanced in the Disk Space tree). 5. Paste the copied text into the Custom Properties field. How you paste the text depends on your Web browser.
IMPORTANT: Look at Event Manager for additional information. See ”About Event Manager” on page 409 for more information. Duplicate Logs for Brocade Switches in Same Fabric If you discover more than one Brocade switch in the same fabric, the discovery log displays duplicate listings for the Brocade switches. Each Brocade switch is listed multiple times with the IP address of the other switches and its own.
• ”Discovering HP Filers” on page 71 • ”Discovering NetApp Filers” on page 72 • ”Discovering Sun NAS Devices” on page 73 • ”Discovering HP and IBM Tape Libraries” on page 74 Table 9 Discovery Requirements for Storage Systems, Tape Libraries and NAS Filers Element Discovery Requirements Additional Information 3PAR storage systems Discover the 3PAR storage system directly. See ”Discovering 3PAR Storage Systems” on page 56.
Table 9 Discovery Requirements for Storage Systems, Tape Libraries and NAS Filers (continued) Element Discovery Requirements Additional Information IBM Storage Systems Discover the CIMOM that talks to the IBM storage systems you want to monitor. See ”Discovering IBM Storage Systems” on page 65. Sun StorEdge 3510 Discovered through proxy software called Sun StorEdge™ Configuration Service.
Discovering 3PAR Storage Systems NOTE: You do not need to provide the interop namespace because the management server includes the interop namespace for 3PAR storage systems in its default list. Discovery from HP SIM To discover a 3PAR storage system, provide the following information in HP Systems Insight Manager: • Provide the IP address or system name for the storage system.
management server to discover the Solutions Enabler and the Symmetrix storage systems that it manages. IMPORTANT: Use a nethost file unless you are running a version of the Solutions Enabler earlier than the 5.1 version. You must have the license installed for the Solutions Enabler. The nethost file provides access to the Solutions Enabler API. Sometimes you can access an EMC Symmetrix storage system through several Solutions Enabler servers.
• SERVER • DevMasking • Config Manager • Mapping (SOLUTION_4) Excluding EMC Symmetrix Storage Systems from Discovery When multiple EMC Symmetrix storage systems are managed through a single Solutions Enabler, specific storage systems may be excluded from discovery by using system properties. To exclude one or more Symmetrix storage systems from discovery, you must modify the cimom.symmetrix.exclude property. Set the property cimom.symmetrix.
exclude from discovery. Separate additional serial numbers with a comma, as shown by the following example: cimom.symmetrix.exclude=000183500570,000183500575 where 000183500570 and 000183500575 are serial numbers for Symmetrix storage systems. 7. When you are done, click Save. 8. Restart the service for the management server for your changes to take effect. While AppStorManager is restarting, users are not able to access the management server.
• The management server must have the User Name field populated to discover the Engenio storage system. If your Engenio storage system does not have a user name set, you must enter something in the User Name field, even though the storage system has no user name. • Discover both controllers for the Engenio storage system. Each controller has its own IP address.
8. If you typed a password in the previous step, retype the password in the Verify Password field. 9. In the Comment field (optional), type a comment for additional information. The information typed into this field is displayed under the Comment column in the Addresses to Discover list (Tools > Storage Essentials > Home > Discovery > Setup). 10.Select the Do Not Authenticate option. 11.If you do not plan to use provisioning in the product, select the Do Not Authenticate option. 12.Click OK. 13.
IMPORTANT: First discover the IP address of the server running HiCommand Device Manager. See ”Adding an IP Range for Scanning” on page 23 or ”Adding a Single IP Address or DNS Name for Discovery” on page 24 for more information. Then, select Options > Protocol Settings > System Protocol Settings and select the host you discovered as a target. On the System Protocol Settings page, provide the port number for the server under the WBEM section.
Excluding HDS Storage Systems from Discovery When multiple HDS storage systems are managed through a single HiCommand Device Manager, specific storage systems may be excluded from discovery by using system properties. To exclude one or more HDS storage systems from discovery, you must modify the cimom.hds.exclude property. Set the property cimom.hds.exclude to a comma separated list of serial numbers of the storage systems you want excluded, as shown in the following example: cimom.hds.
While AppStorManager is restarting, users are not able to access the management server. The AppStorManager service must be running for the management server to monitor elements.
(XP arrays only) If you have Command View version 2.0 or later, the default password is administrator. If you have Command View earlier than version 2.0, refer to the documentation that shipped with Command View for the default password. 8. If you typed a password in the previous step, retype the password in the Verify Password field. 9. In the Comment field (optional), type a comment for additional information.
NOTE: You do not need to provide the interop namespace because the management server includes the interop namespace for IBM storage systems in its default list. Discovery from HP SIM IMPORTANT: First discover the host running the IBM CIMOM. See ”Adding an IP Range for Scanning” on page 23 or ”Adding a Single IP Address or DNS Name for Discovery” on page 24 for more information. Then, select Options > Protocol Settings > System Protocol Settings and select the host you discovered as a target.
9. In the Comment field (optional), type a comment for additional information. The information typed into this field is displayed under the Comment column in the Addresses to Discover list (Tools > Storage Essentials > Home > Discovery > Setup). 10.Do not select the Do Not Authenticate option. 11.Click OK. 12.To start discovering elements on the network, click the Start Discovery button on the IP Addresses tab.
IMPORTANT: The management server is unable to display logical volumes configured on Sun StorEdge 3510 storage systems. Any logical volumes as well as the logical drives that comprise them will not appear in the UI. There will be no indication that this happened. Discovery from HP SIM To discover Sun StorEdge 3510 storage systems, provide the following information in HP Insight Manager: • IP address or system name of the system running the Sun StorEdge 3510 SMI-S provider you want to discover.
Discovering Sun StorEdge 6920 Storage Systems Discovery from HP SIM To discover Sun StorEdge 6920 storage systems, provide the following information in HP Insight Manger: • IP address or system name of the Sun StorEdge 6920 you want to discover. See ”Adding an IP Range for Scanning” on page 23 or ”Adding a Single IP Address or DNS Name for Discovery” on page 24 for more information. • User name of the Sun StorEdge 6920 you want to discover. • Password of the Sun StorEdge 6920 you want to discover.
• HP SIM does not allow blank user names. Enter anything for the user name. • Password for the controller or proxy. Refer to the HP SIM documentation for more information on working with HP SIM. Discovery from HP SE To discover Sun StorEdge 6130 storage systems: 1. Click Tools > Storage Essentials > Home on the HP SIM home page menu. The HP SE home page opens in a separate web browser window. Click Discovery > Setup in the upper-right pane of the HP SE home page window. 2.
Discovery from HP SE To discover an Xiotech storage system: 1. Click Tools > Storage Essentials > Home on the HP SIM home page menu. The HP SE home page opens in a separate web browser window. Click Discovery > Setup in the upper-right pane of the HP SE window. 2. Select Step 1 at the top of the page. 3. Click the IP Addresses tab. 4. Click the Add Address button. 5. In the IP Address/DNS Name field, enter the IP address or DNS name for the storage system and its namespace.
2. Select Step 1 at the top of the page. 3. Click the IP Addresses tab. 4. Click the Add Address button. 5. In the IP Address/DNS Name field, type the IP address or DNS name of the HP Filer you want to discover. 6. Enter the User Name of the HP Filer. You must provide a privileged login. 7. Enter the Password used to access the HP Filer. 8. Retype the password in the Verify Password field. 9. In the Comment field (optional), type a comment for additional information.
Discovery from HP SE To discover a NetApp Filer: 1. Click Tools > Storage Essentials > Home > Discovery > Setup. 2. Select Step 1 at the top of the page. 3. Click the IP Addresses tab. 4. Click the Add Address button. 5. In the IP Address/DNS Name field, type the IP address or DNS name of the NetApp Filer you want to discover. 6. Enter the User Name of the NetApp Filer. You must provide a privileged login. 7. Enter the Password used to access the NetApp Filer. 8.
2. Select Step 1 at the top of the page. 3. Click the IP Addresses tab. 4. Click the Add Address button. 5. In the IP Address/DNS Name field, type the IP address or DNS name of the server running the SMI-S provider for the Sun NAS Devices you want to discover. 6. Enter the User Name of the CIMOM/provider for the Sun NAS Devices you want to discover. You must provide a privileged login. 7. Enter the Password used to access the CIMOM/provider for the Sun NAS Devices you want to discover. 8.
For example: 192.168.1.1:root/ibm, where 192.168.1.1 is the IP address of the tape library and root/ibm is its namespace. 6. Enter the User Name of the system running the tape library. 7. Enter the Password of the system running the tape library. 8. Retype the password in the Verify Password field. 9. In the Comment field (optional), type a comment for additional information.
IMPORTANT: You must perform this step to view elements connected in the topology. To obtain enough information to display the topology in System Manager: 1. Click the Discovery menu in the upper-right corner of the Store Essentials home page. 2. Click Topology in the upper-right corner. The discovered elements are selected. 3. Select the File Server SRM option corresponding to host file systems you want to monitor.
• User name and password - You can change the user name and password the management server uses to access a device. Whenever a user name and/or password has changed on a device the management server monitors, the management server must be made aware of the change. For example, assume the password for a host was changed. You would need to updated the management server database with the new password. See ”Modifying a Single IP Address Entry for Discovery” on page 26.
Deleting Elements from the Product The way you delete an element from the product depends on whether you are using discovery from HP SIM or discovery from HP SE. Discovery from HP SIM IMPORTANT: This step removes elements from the discovery list and from the HP SIM database. The deleted element can reappear if the following occurs: • If a scheduled automatic discovery task includes the deleted element, HP SIM will rediscover the deleted element again during the next discovery.
• In System Manager - Right-click an element and select Delete Element from the drop-down menu. Right-click an element and select Delete Element from the drop-down menu. If you are blocking pop-ups and you use the right-click menu to delete an element from System Manager, the Delete window is blocked and you are unable to delete the element. You must disable the popup blocker before you can delete the element. • In Chargeback Manager - Click the button for the element you want to delete. 2.
both access points to completely remove the element. As a result, the QBrocade5 switch will also be removed because it has the same access points as QBrocade2. Figure 5 Deleting Elements from the Management Server 3. Select all of the access points for the element you want to delete. Then, click the Delete button just above the table. For example, assume you want to delete QBrocade2 in the previous figure.
• Get Details/Discovery Data Collection takes some time. You might want to perform this process when the network and the managed elements are not busy. (Discovery from HP SE only)To obtain a picture of device connectivity quickly, click the Get Topology button on the Topology tab. • If you have problems obtaining information from Connectrix and McDATA switches during Get Details/Discovery Data Collection, see the topic, ”Step 2 - Discover Storage Systems, Filers and Tape Libraries” on page 53.
select Include backup details unless you have already discovered hosts running backup applications and installed CIM Extensions on those hosts. See ”Step 1 - Discovering Your Hosts and Master Backup Servers” on page 93 for more information about discovering master backup servers. The Include backup details option gathers the latest information about your backup applications. 3.
• Discovery from HP SIM - Click Options > Storage Essentials > Discovery > View Logs. 2. On the View Logs page, click the “Click here” portion of the following message: Click here if you wish to stop getting details. 3. When you are asked if you are sure you want to stop Get Details/Discovery Data Collection, click OK. The management server stops gathering details. 4. Schedule a time to resume getting details.
7. When you are done, click Save. 8. Restart the service for the management server for your changes to take effect: a. Go to the Services window on the management server. b. Right-click AppStorManager. c. Select Restart from the drop-down menu. While AppStorManager is restarting, users are not able to access the management server. The AppStorManager service must be running for the management server to monitor elements. 9.
6. Make sure the property is not commented out by removing the hash (#) symbol in front of the property. Add the serial numbers corresponding to the HDS storage systems you want the refresh to skip. Separate additional serial numbers with a comma, as shown by the following example: cimom.HdsSkipRefresh=61038,61037 where 61038 and 61037 are serial numbers for HDS storage systems. One of the ways to find the serial number is to double-click the storage system in System Manager.
processor that has not been discovered yet, see the topic, ”Discovering McDATA and EMC Connectrix Switches” on page 41. IMPORTANT: Obtaining details takes some time. You might want to perform this process when the network and the managed elements are not busy. To Get Details/Discovery Data Collection: 1. Do one of the following: • Discovery from HP SE - Start the HP SE home page, click Tools > Storage Essentials > Home. The HP SE home page opens in a separate web browser window.
(Discovery from HP SE Only)Swapping McDATA and EMC Connectrix Switches After replacing switches in the service processor, you must make the management server aware of your changes by removing the old switches from the user interface and then performing Get Details/Discovery Data Collection so the management server can discover the new switches. If you are adding switches to a service processor that has not been discovered yet, see the topic, ”Discovering McDATA and EMC Connectrix Switches” on page 41.
1. Click the download file link or button in the software. 2. Click the Advanced button in the lower-left corner. 3. In the Description of type field, delete the existing text and type a description of the file. 4. In the File extension field, delete the existing text and type the file extension. 5. Click OK. The next time Netscape 7 sees the associated MIME type, it will assign the extension you typed in the File Extension field.
Moving Elements to Another Discovery Group All elements are initially placed in the Default discovery group. You can then move elements from the Default discovery group to other discovery groups. You can use discovery groups to break up Discovery Data Collection for Discovery from HP SIM or Get Details and getting the topology for Discovery from HP SE.
The elements are excluded from discovery until you clear them from quarantine. Removing an Element from Quarantine To remove an element from quarantine: 1. Select the check boxes for the elements you want to remove from quarantine on the Discovery Data Collection page for Discovery from HP SIM or Get Details page for Discovery from HP SE.
your storage systems to obtain the latest information. If you do not select Force Device Manager Refresh, the management server gathers information from the external databases with the assumption the information in the external database is up to date. See the following topics for more information: ”Excluding EMC Symmetrix Storage Systems from Discovery” on page 58 and ”Excluding EMC Symmetrix Storage Systems from Force Device Manager Refresh” on page 83. 5. Click the Get Details button. 6.
• From HP SIM - Select Tools > Storage Essentials > System Manager. • From the HP SE Home page (Tools > Storage Essentials > Home) - Click the button for System Manager in the left pane. Notifying the Software of a New Element When you add a new element to the network, such as a host, perform discovery to make the management server aware of the new element.
3 Discovering Applications, Backup Servers and Hosts IMPORTANT: Information about Systems Insight Manager (SIM), such as discovery instructions, are for SIM version 5.0.
• (Discovery from HP SE only)If your license lets you discover UNIX and/or Linux hosts, the Test button for discovery reports SUCCESS from any UNIX and/or Linux hosts on which the management server can detect a CIM Extension. The CIM Extension must be running. The management server reports “SUCCESS” even if your license restricts you from discovering certain types of hosts. For example, assume your license lets you discover Solaris hosts but not AIX hosts.
1. Confirm that a CIM Extension has been installed on the server that is your NetBackup Master Server. See Table 1-1 on page 2 for information about installing SIM Extensions. 2. Go to the %JBOSS4_DIST%\server\appiq\conf directory. 3. Open the jboss.properties file in a text editor. 4. Currently, NetBackup is supported on Solaris, HP-UX and Linux. Choose the operating system you have installed and follow the instructions provided in the jboss.properties file for that operating system.
Table 10 (Discovery from HP SIM) Discovering Hosts Step Description 1 If you have several hosts that use the same password and user name, set that password and user name as the default. Use the Global Settings (Options > Protocol Settings > Global Settings) feature to set your default passwords. Refer to the documentation that ships with SIM for more information. 2 Discover your host (Options > Discovery > Automatic). One way to detect multiple IP addresses at once is to add an IP range for scanning.
Table 11 Making the Management Server Aware of Hosts (SE Discovery Only) (continued) Step Description 2 To enter an IP address range, click the IP Ranges tab and then the Add Range button. If necessary, enter a user name and password for the devices in the range. During a scan of an IP range, the software uses ping; however, ping is not guaranteed to return a response from all devices.
Discovery from HP SE To make the software aware of the devices on the network: 1. Click Tools > Storage Essentials > Home > Discovery > Setup. 2. If several of the elements in the same domain use the same name and password, click the Set Default User Name and Password link. Provide up to three user names and passwords. The management server tries the default user names and passwords for elements during discovery.
The elements the management server detects during the scan are added to the Addresses to Discover list on the IP Addresses tab. 4. To add a single IP address or DNS name to discover: a. Click the IP Address tab. b. Click the Add Address button. c. In the IP Address/DNS Name field, type the IP address or DNS name of the device you want to discover. d. In the User Name (Optional) field, type the user name.
Step C - (Discovery from HP SE Only)Build the Topology After you discover elements, the management server requires you build a topology view, which is a graphical representation of port-level connectivity information. If you purchased the license for monitoring file servers, make the management server aware of these servers by selecting the File SRM option. The File SRM option appears for hosts that have the CIM Extension and that have operating systems that support File SRM.
If a switch has more than one connection to an element, the number of connections is displayed above the line linking the switch and the element. For example, assume the number two is shown between a switch and a storage system. This means the elements have two connections to each other. To view the port details for the connection, right-click the element and select Show Port Details from the drop-down menu.
To obtain details: 1. Do the following: • Discovery from HP SE - Click Tools > Storage Essentials > Home > Discovery > Details • Discovery from HP SIM - Click Options > Storage Essentials > Discovery > Run Discovery Data Collection. 2. Verify the File SRM option is selected. The File SRM option appears for hosts that have the CIM Extension and an operating system that supports File System Viewer. 3.
• ”Monitoring Microsoft SQL Server” on page 108 • ”Monitoring Sybase Adaptive Server Enterprise” on page 112 • ”Monitoring Microsoft Exchange” on page 115 Monitoring Oracle To monitor and manage Oracle, you must do the following: • ”Step A - Create the APPIQ_USER Account for Oracle” on page 103 • ”Step B - Provide the TNS Listener Port” on page 105 • ”Step C - Set up Discovery for Oracle 10g” on page 105 After you complete these steps, you must discover Oracle,and perform Discovery Data Collection or Get D
auto-mounted), and go to the /DBIQ/Oracle/unix directory by typing the following: # cd /cdrom/cdrom0/DBIQ/Oracle/unix where /cdrom/cdrom0 is the name of the CD-ROM drive • To run the script on Microsoft Windows, go to the DBIQ\Oracle\win directory on the CIM Extensions CD-ROM. IMPORTANT: You must complete the following steps. 2. Verify you have the password to the SYS user account. You are prompted for the password for this user account when you run the script. 3. Run the CreateOracleAct.
you removed the APPIQ_USER account for Oracle, discover and perform Discovery Data Collection/Get Details for the host if you want to continue monitoring it. • If you receive a message about not being able to drop a user that is currently connected while you are removing the APPIQ_USER account for Oracle, re-run the script for removing APPIQ_USER. To remove the APPIQ_USER account for that Oracle instance: 1. If you plan to remove the management software for Oracle from a Solaris host, do the following: a.
IMPORTANT: Monitoring Oracle 10g and Oracle clusters require an additional step. If you are not monitoring Oracle 10g and Oracle clusters, see ”Step 3 - Discovering Applications” on page 116. Step C - Set up Discovery for Oracle 10g NOTE: If you are discovering an Oracle cluster, see ”Discovering Oracle Clusters” on page 106. To monitor Oracle 10g, provide additional information as described in the following steps: 1.
Discovering Oracle Clusters Perform the following steps for each node in the cluster: 1. Install the CIM Extension on each node in the cluster. See the Installation Guide for information on how to install the CIM Extensions. 2. Create the appiq_user account on each node in the cluster. See ”Step A - Create the APPIQ_USER Account for Oracle” on page 103. 3. Do one of the following: • Discovery from HP SE - Click Tools > Storage Essentials > Home > Discovery > Setup.
The port can be found in the following code: LISTENER = (DESCRIPTION_LIST = (DESCRIPTION = (ADDRESS_LIST = (ADDRESS = (PROTOCOL = TCP)(HOST = localhost)(PORT = 1521)) (ADDRESS = (PROTOCOL = IPC)(KEY = EXTPROC0)) ) ) ) f. Select ORACLE from the Database Type menu. g. Click OK. 5. Repeat Steps 4 and 5 for each node in the cluster.
• Create APPIQ_USER account on SQL Server database you want to monitor. • You should have already installed the database for the management server. • Make sure you have all the necessary information before you begin the installation. Read through the following steps before you begin. To create the APPIQ_USER account for SQL Server: 1. To run the script on Microsoft Windows, go to the DBIQ\sqlserver\win directory on the CIM Extensions CD-ROM. IMPORTANT: You must complete the following steps. 2.
IMPORTANT: You must provide the host name in the Host IP/DNS Name field. You cannot use localhost or parenthesis. If you have name resolutions issues, your server may be discovered; however, your applications will not be discovered. You can addressed the name resolution issues by adding entries within the hosts file on the management server for the systems in question.
• Host IP/DNS Name: 192.168.2.10 • Database Server: SQLTEST • Port Number: 1433 • Database Type: SQLSERVER 6. In the Port Number field, type the port that SQL is using. If you do not provide a port number, the management server assumes the SQL server is using port 1433 (default). To determine the correct SQL Port Number that the SQL Server is using, follow these steps: a. Open SQL Server Enterprise Manager. b.
5. Type the password for the server administrator account. The account for APPIQ_USER is removed. The management server can no longer monitor the SQL Server databases on this host. Deleting SQL Server Information If you do not want the management server to monitor a SQL Server instance, you can remove its information, as described in the following steps: 1. Do one of the following: • Discovery from HP SE - Select Tools > Storage Essentials > Home > Discovery > Setup.
• Obtain the Sybase server name before you run the script • Create APPIQ_USER account on Sybase Database you want to monitor. • You should have already installed the database for the management server. • Make sure you have all the necessary information before you begin the installation. Read through the following steps before you begin. To create the APPIQ_USER account for the Sybase server: 1.
Removing the APPIQ_USER Account for Sybase IMPORTANT: Before you remove the APPIQ_USER account for the Sybase databases on a host, make sure no processes are running APPIQ_USER for that Sybase database. The management server uses APPIQ_USER to obtain information about a Sybase database. (Discovery from HP SE) One of the ways to make sure APPIQ_USER is not being used is to temporarily remove the host running Sybase (Discovery > Topology).
desktop. Refer to the documentation for HP Systems Insight Manager. Select a target, and then, click Run Now. 2. Click the Create button for the Database Information table. 3. In the Host IP/DNS Name field, type the IP address or DNS name of the host running Sybase. 4. You can leave the Management IP/DNS Name field blank. This field is for Oracle clusters.
• Discover the application. Adding Microsoft Exchange Domain Controller Access To obtain information about your Microsoft Exchange servers, you must provide the user name and password for at least a primary domain controller, in addition to a DNS name, as described in the following steps. IMPORTANT: The hosts should recognize the management server by name, as a reverse look-up is required by operating system security as well as Microsoft Exchange.
• Discovery from HP SE - Select Tools > Storage Essentials > Home > Discovery > Setup. Then, click the Applications tab. • Discovery from HP SIM - Select Options > Protocol Settings > Storage Essentials > Global Application Discovery Settings. 2. Click the button, corresponding to the domain controller you want to remove. 3. Perform Get Details/Discovery Data Collection for your changes to take effect.
Discovery is complete when the software displays the DISCOVERY COMPLETED message in the Log Messages field. Keep in mind the following: • If DNS records for your Microsoft Exchange Servers are outdated or missing, the discovery of Microsoft Exchange may fail because Microsoft Exchange is dependant on Active Directory, which is dependant on DNS. Since Active Directory is dependant on DNS, Active Directory replication and Active Directory lookups may fail or contain errors if DNS records are not accurate.
• Discovery Data Collection/Get Details takes some time. You might want to perform this process when the network and the managed elements are not busy. • (Discovery from HP SE) To obtain a picture of device connectivity quickly, click the Get Topology button on the Topology tab. • If you want to enable File SRM for a host, make sure the File SRM option is selected.
IMPORTANT: If the management server cannot communicate with an application, it labels the application as “Discovered”. The management server could find the application, but it could not obtain additional information about it. 5. Refer to the topic, “Adding a Discovery Schedule” in the User Guide for information about automating the gathering of Discovery Data Collection. If you run into problems with discovery, see ”Troubleshooting” on page 599. Discovery from HP SE To obtain details: 1.
IMPORTANT: The hosts should recognize the management server by name, as a reverse look-up is required by operating system security as well as the Oracle Transparent Name Substrate (TNS). To change this port number or to add ports: 1. Select Options > Protocol Settings > Storage Essentials > Global Application Discovery Settings. 2. To assign a new port, click the Create for the Oracle Information table. 3. Type the new port number and click OK. 4.
4. Under the Backup Domain Controller section, perform the following steps: a. In the Host Name field, type the fully qualified DNS name for the domain controller. b. In the User Name field, type the user name for accessing the Microsoft Exchange server. c. In the Domain Password field, type the corresponding password for accessing the Microsoft Exchange server. d. In the Verify Password field, retype the password for verification. 5. Click the OK button. 6. Update the database with element changes.
Obtaining Disk Drive Statistics from Engenio Storage Systems IMPORTANT: Depending on your license, the ability to obtain disk drives statistics from Engenio storage systems may not be available. See the “List of Features” to determine if you have access to the additional statistics. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
2. Click the Advanced button in the lower-left corner. 3. In the Description of type field, delete the existing text and type a description of the file. 4. In the File extension field, delete the existing text and type the file extension. 5. Click OK. The next time Netscape 7 sees the associated MIME type, it will assign the extension you typed in the File Extension field. For example, in the following figure, the zip extension was assigned to a MIME type of application/unknown.
4 Managing Security IMPORTANT: Depending on your license, role-based security may not be available. See the “List of Features” to determine if you have access to role-based security. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
IMPORTANT: Roles only apply to features and elements in HP Storage Essentials. For example, assume you assigned a user to the Help Desk role in Storage Essentials. That user will have “view only” privileges only in Storage Essentials.
• Users with access to Global Reporter can view all the elements throughout the enterprise, including those on the server running Global Reporter. Grant access to Global Reporter only to those, who should be allowed to view all elements. You may want to disable this functionality for some users. • If the System Configuration option is selected for a role, all users assigned to that role will have administration capabilities, as shown in the following list.
• Element Control - Lets you view and modify the record for the element (Asset Management tab). Provisioning cannot be performed. • View - Lets you only view element properties. For example, if a user belongs to a role that only lets you view the element properties on storage systems, that user would not be allowed to perform provisioning on storage systems because their role does not have the Full Control option selected for storage systems.
BostonWebHost_Windows and BostonWebHost_Solaris. BostonWebHosts is a parent because it contains two organizations. Figure 6 Parent-Child Hierarchy for Organizations If a child contains organizations, it is also a parent. Let's assume you add two organizations called BostonWebMarketing and BostonWebProduction to BostonWebHost_Windows. BostonWebHost_Windows would become a parent because it now contains two organizations. It would also be a child because it is contained in BostonWebHosts.
Figure 7 Children in Multiple Organizations When you remove an element from an organization, users belonging to that organization or to one of its parents can no longer access that element if it is not a member of any other organization. For example, assume an element named MyHost was not only a member of BostonWebHost_Solaris, but also had mistakenly became a member of BostonWebHost_Windows.
• Reports only display elements assigned to the user's organization, including child organizations. For example, if you attempt to view a Host Summary report and you do not have permission to access hosts through your organization, you are not given information about the hosts in the report. This is also true for e-mailing reports. Let's assume again you do not have permission to access hosts. The reports you e-mail will not contain information about hosts, including the host specific reports.
Managing User Accounts This section discusses the following topics: • ”Adding Users” on page 132 • ”Editing a User Account” on page 133 • ”Deleting Users” on page 133 • ”Modifying Your User Profile” on page 134 • ”Modifying Your User Preferences” on page 134 • ”Viewing the Properties of a Role” on page 136 • ”Viewing the Properties of an Organization” on page 136 Adding Users To access the management server, users must enter a user name and password.
e. In the Select Systems list box, select the systems you want the user to be able to manage. Select CMS (Central Management Server) if you want to access information about the server running HP Systems Insight Manager. f. Click OK. 7. Access Storage Essentials through one of the menu options, such as Options > Storage Essentials > Email Settings. 8. In the upper-right corner, select Security > Users. Notice that the users you created in HP Systems Insight Manager are put in the SIMViewOnly Role.
9. Change or remove information from the Notes field if necessary. 10.To change the organizations to which the user belongs, select or deselect the organizations from the table in the user interface. The Everything organization is the default organization that lets users access all current and future elements. 11.Click OK. Deleting Users IMPORTANT: You cannot delete the admin account. To delete a user account: 1.
• E-mail address • Phone number 3. When you are done with your modifications, click the Save Changes button. Modifying Your User Preferences Use the User Preference tab to modify your user preferences for System Manager, Element Topology, and Event Manager. The User Preference tab controls what is displayed for your user account. To access the User Preferences tab: 1. Click the name of your account in the upper-left corner of Storage Essentials. Figure 9 Accessing the User Preferences Tab 2.
Table 14 Changing User Preferences for Event Manager (continued) If you want... Do the following... Change the severities to be included Select a severity level you want displayed in Event Manager from the Severities to be Included drop-down menu. See the topic, ”Selecting a Severity Level” on page 421. If you want to customize the filter for the severity levels, click the Custom button. See the topic, ”Customizing the Severity Level Filter” on page 422 for more information.
• Access to the - Determines which components in the management server the user can access, where is the name of your product. To learn how to edit a role, see the topic, ”Editing Roles” on page 138. Viewing the Properties of an Organization You can quickly determine which elements a user can access by viewing the properties of the user's organization: 1. Access Storage Essentials through one of the menu options, such as Options > Storage Essentials > Email Settings. 2.
3. Click the New Role button. 4. In the Role Name field, type a name for the role. For example: Quality Assurance. The name can contain spaces, but it cannot be longer than 256 characters. 5. In the Description field, type a description for the role. For example: Role for those in quality assurance. You cannot type more than 1024 characters in the Description field. 6.
The name can contain spaces, but it cannot be longer than 256 characters. 5. To edit the description of the role, change the description in the Description field. You cannot type more than 1024 characters in the Description field. 6. To change the access level, change the options selected in the table. • Full Control - Lets you view and modify the record for the element (Asset Management tab) and perform provisioning.
• ”Filtering Organizations” on page 143 Adding an Organization You can create new organizations to restrict access to certain elements. For example, assume you do not want the help desk to have access to elements belonging to a certain group. You could create an organization that does not allow access to those elements. Once you assign users to that organization, they would only be able to access the elements you specified.
8. To add organizations, do one of the following: • Select all organizations - Select the Organizations (top-level node). The selected organizations appear in the Organization Members pane. • Select individual organizations - Expand the Organizations node. Then, select the organization. The selected organization appears in the Organization Members pane.
• Depending on your license, role-based security may not be available. See the “List of Features” to determine if you have access to role-based security. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). • The Name and Description fields in the Edit Organization window do not accept special characters, except spaces and the following characters: $, -, .
To delete an organization: 1. Click Security > Organizations. 2. Click the button corresponding to the organization you want to remove. The software removes the organization. Removing Members from an Organization When you remove an element from an organization, users belonging to that organization or to one of its parents can no longer access that element if it is not a member of any other organization.
3. Click the Edit ( ) button corresponding with the organization you want to edit. 4. In the Edit Organization window, click the Add or Remove Members button. 5. Select the elements and/or organizations you want to remove in the right panel and then click the Remove from Organization button. 6. Click OK. Filtering Organizations The management server provides a filtering feature that lets you designate which organizations are active in your view.
Links are displays for the organizations if you belong to a role that has System Configuration capability. To learn more about the contents of an organization, click its link. 3. Click OK. You can now only obtain information about elements in the active organizations. The active organizations are listed in the link next to the filter button, as shown in the following figure.
1. If you are changing the SIM_MANAGER password and HP SIM and HP SE are using the same Oracle database, you must complete the following steps.: a. Log onto the server running HP Systems Insight Manager. b. Stop the AppStorManager service if it is started. c. Enter the following at the command prompt: C:\> mxpassword -m -x MxDBUserPassword=mynewPass where mynewPass is your new password for the database. d. Stop the HP Systems Insight Manager service so that it cannot access the database.
5 Managing Licenses To learn more about licensing, see the following topics: • ”About the License” on page 147 • ”Importing a License File” on page 150 • ”Viewing Cumulative Licenses” on page 151 • ”Viewing a Specific License” on page 151 • ”Deleting a License” on page 152 About the License The management server restricts the number elements it manages through its license. It is important you keep your license up to date with the requirements of your network.
Table 15 License Requirements (continued) Type of Restriction Description Unit of Measurement Managed Exchange Instances The management server determines licensing for Microsoft Exchange instances by counting the number of instance of Microsoft Exchange it manages.
IMPORTANT: The management server updates the Current Usage Summary table every 24 hours after the first update. Elements the management server has discovered before the update are not reflected in the Current Usage Summary table. The time for the update is determined when the management server was first started. For example, the first update of the Current Usage Summary table occurs six hours after the management server was first started. The following updates occur every 24 hours.
Assume you have the same configuration as the first example with two Windows 2000 hosts that are directly attached to storage systems with no Fibre Channel (FC) connections with a total of 0 FC ports, as shown in the following figure: Figure 13 An Example of Direct Attached Storage The software calculates four MAPs (see the figure), since we assume one MAP for each host even though it has no Fibre Channel ports. The storage systems are counted since they are supported by the management server.
4. Select the license file. 5. Click OK. Viewing Cumulative Licenses Use view cumulative license feature to view the complete number of elements the management server supports at the current time. The software adds up the number of licensed components from the licenses and takes into account the expiration date. See Table 15 on page 147 for more information about the licensing capacities displayed. IMPORTANT: You cannot modify the license file since it is encrypted.
The MALs are split into three properties, LICENSE_FSRM_SIZE_TB, LICENSE_MAL_DATABASE, LICENSE_MAL_EXCHANGE. See the following list for the properties used for tracking MAPs and MALs: • LICENSE_FSRM_SIZE_TB - The amount of space in Terabytes you are allowed for File System Viewer. • LICENSE_MAL_DATABASE - The number of database application instances the management server is allowed to monitor, such as Oracle and Sybase Adaptive Server Enterprise.
6 Configuring the Management Server This chapter contains the following topics: • ”Trap Generation” on page 153 • ”Setting Up E-mail Notification” on page 154 • ”Managing Getting Discovery Details” on page 155 • ”Managing Product Health” on page 157 • ”Managing Logging” on page 160 • ”Managing the Display of Events” on page 165 • ”Managing File System Viewer” on page 168 • ”Managing Backup Collection” on page 172 • ”Managing Reports” on page 174 • ”Managing Performance Collection” on page 192 Trap Generat
outgoingSnmpTrapVersion=v2 5. Return to the Advanced page (Options > Storage Essentials > Manage Product Health. Then, click Advanced in the Disk Space tree). 6. Paste the copied text into the Custom Properties field. How you paste the text depends on your Web browser. 7. Make sure the property is not commented out by removing the hash (#) symbol in front of the property. 8. When you are done, click Save. 9. Restart the service for the management server for your changes to take effect.
2. In the Subject field, type a subject to distinguish from notification of a real event, for example: Testing E-mail Notification 3. In the Message field, type a message, for example: I'm just testing e-mail notification. 4. Click the Send Test Message button. Managing Getting Discovery Details You can schedule the management server to obtain discovery details at a specified interval.
• Include infrastructure details - During include infrastructure details, the management server gathers detailed information about the SAN infrastructure and the process can be network intensive. • Include backup details - To obtain the latest backup information, schedule include backup details to run nightly after you run your backup jobs. It is recommended you do not schedule include infrastructure details topology details and include backup details the same time.
1. Click Options > Storage Essentials > Discovery > Schedule Discovery Data Collection in HP Systems Insight Manager. 2. Click the button corresponding to the discovery schedule you want to disable. 3. Deselect the Enable option. 4. Click Next. 5. Verify that the correct discovery groups are selected. 6. Click Finish. The schedule is disabled. Editing a Schedule To edit a schedule: 1. Click Options > Storage Essentials > Discovery > Schedule Discovery Data Collection in HP Systems Insight Manager. 2.
2. Discover the management server and include it in Get Details. The Product Health menu option in Storage Essentials helps you to monitor and manage the management server. Product Health lets do the following: • Disk Space Monitoring - This feature keeps track of the management server’s use of disk space. See ”Enabling Disk Space Monitoring” on page 158.
5. In the Repeat Interval field, type an interval. Select one of the following units from the drop-down menu: • Second(s) • Minute(s) • Hour(s) • Day(s) • Week(s) 6. Click Save Changes. 7. To view the results of the monitoring, click the Result tab periodically. Viewing the Results of Disk Space Monitoring To make sure your management server does not run out of space, you should check the results for disk space monitoring.
Modifying Java Memory Settings Do not modify the Java memory settings on Advanced page (Options > Storage Essentials > Manage Product Health > Advanced) unless instructed to do so by technical support. Incorrectly changing these settings could adversely impact the performance of the software. Customizing Properties The management server lets you modify its properties. These properties control a variety of functionality, such as the ability to specify the number of time-outs for switches.
Accessing the Log Files You can obtain information about the software's and CIMOM's transactions in the log files, which are in the %MGR_DIST%\logs directory. CIMOM is a component in the CIM management infrastructure that handles the interaction between management applications and providers. The log files may contain information that is difficult to understand. The following listing provides the logs files that would be the most useful to you. It is not a complete list of all the logs.
Downloading the User Audit Log You can determine who has been accessing your machine by viewing the user audit log. To access the user audit log: 1. Click Options > Storage Essentials > Manage Product Health in HP Systems Insight Manager. 2. Click Download User Audit Log. 3. Save the zip file. 4. Unzip the zip file. 5. Open the text file in a text editor. If you are using NotePad, you may need to select Format > Word Wrap.
2. Go to the %MGR_DIST%\logs directory by entering the following at the command prompt. c:\>cd %MGR_DIST%\logs 3. Enter the following at the command prompt window: %MGR_DIST%\logs>tail -f appiq.log where appiq.log is the log file you want displayed in the command prompt window. The tail.exe utility checks the file for updates and appends them to text in the command prompt window. Tail.exe is a program distributed under the GNU General Public License. See http://www.gnu.org for more information.
Table 17 Logging Levels (continued) Log Level Option Description Use When You Detailed tracing of HDS provider Provides detailed logging of the providers used to gather information from HDS storage systems. Are having difficulty obtaining information from HDS storage systems. Detailed tracing of HOST/SERVER provider Provides detailed logging of the providers used to gather information from hosts/servers. Are having difficulty obtaining information from host/servers.
• Day(s) • Week(s) NOTE: The minimal interval you can schedule is one day. If you select Hour(s), Minute(s) or Second(s), you must enter an interval that equals more than a day. For example, if you select Hour(s), you must enter 24 or more. Just as if you select Minute(s), you must enter 1440. 6. Click the Enable option. 7. Click the Save Schedule button. 8. To view the results of the scanning, click the Result tab periodically.
Important: Events are only removed or marked “cleared” when their automatic delay time is completed. See the topics, ”Configuring the Clearing of Events” on page 167 and ”Configuring the Deletion of Events” on page 167. Assume you set the clearing and deletion frequency to every 15 minutes with the initial time at 11:00 a.m. So every 15 minutes the management server checks for events marked for deletion and for clearing, and it updated the user interface accordingly.
4. In the Repeat Interval field, type an interval. Select one of the following units from the drop-down menu: • Second(s) • Minute(s) • Hour(s) • Day(s) • Week(s) NOTE: The higher the interval, the more demand there is on the management server. 5. Select the Enable option. 6. Click the Save Changes button. Configuring the Clearing of Events Depending on the severity of an event, the management server may mark the event as “clear” after 60 minutes.
• If you want to change the delay time in clearing an event, select one of the following units of measurement from the combo box and type the number in the adjacent field: • Minutes • Hours • Days • Weeks 3. Click the Save Changes button. Configuring the Deletion of Events The management server automatically deletes events after two weeks by default. You can specify for each severity level different time periods for deleting events.
Managing Collectors for File System Viewer IMPORTANT: All collectors are stopped during Get Details and Discovery Data Collection. This means that during Get Details and Discovery Data Collection data, such as for File System Viewer, is not updated. The management server uses File SRM data collectors to obtain information from a file server. File System Viewer provides information about a file server, such as the number of its directories.
Table 19 About the Collectors for File System Viewer (continued) Column Heading Edit Action Description To edit the schedule for running a collector, click the Edit ( ) button. Then set the date and time. See ”Setting Data Collection Properties” on page 169 for more information. Displays one of the following buttons: • Stop - Stops gathering information for which the collector is responsible.
7. If you want more than one process to be used for gathering information, change the number in the Thread field. For example, if you type 2 in the Thread field, two processes are used to collect the information. The more processes you assign to collecting information, the faster the information is collected. If you assign a large number of processes, you may slow down the management server. 8. Click the calendar icon, . 9. Enter the time in the time field.
The advantage of enabling the File Scan Checker is that once it is enabled, no manual intervention is required to keep data collection on the file server working. See the steps in this section on how to enable and schedule the File Scan Checker. Figure 15 About the File System Viewer Scan Checker To enable the File System Viewer scan checker and set its schedule: 1. Click Reports > Storage Essentials > Data Collection > File SRM Data in HP Systems Insight Manager. 2. Click the Scan Status tab. 3.
Performing a Test File System Viewer Scan If you have changed your network configuration and you are not sure the management server can still scan the server running File System Viewer, you can perform a test File System Viewer scan. During this scan, the management server verifies that it can access the server and perform a high level File System Viewer scan. IMPORTANT: This feature only works with CIM Extensions builds 4.0 and later. To perform a test File System Viewer scan: 1.
• Click the Stop button to stop the collector. Scheduling Backup Collection for Master Servers You can configure the management server to obtain information about your master backup servers at a set interval. Keep in mind the following: • Make sure these collectors run at least daily so the latest backup information is displayed in Backup Manager. • All collectors are stopped during Discovery Data Collection/Get Details.
7. Change the interval in minutes in the Minutes field. This property determines how often the management server gathers information from the master server. 8. Click OK. The management server gathers information about image details. Viewing the Status of Backup Collection The management server keeps track of the collections it has completed on the discovered master servers on the Status tab. The Status tab displays when the collection started and ended on a master server, in addition to its status.
views are refreshed, as described in ”Refreshing the Report Cache” on page 184. The overall report architecture is displayed in the following figure. Figure 16 Report Views and Report Cache Refresh Suggestion to Schedule the Report Cache Refresh: The report cache (report views) is a snapshot data of management server schema to a point in time. The report cache refresh is time and resource consuming.
The management server has two types of views for its reports. During a report cache refresh these views are updated. You can check the status of these views as described in this section: • MVIEWCORE_STATUS - This table keeps track of the refresh status of the core views. The core views are the views starting with mvc, mvca and mvcs as shown in Table 72 on page 456. To obtain detailed information of MVIEWCORE_STATUS, see Table 122 on page 489.
6. Enter the following at the command prompt: order by 2; Managing Collectors for Reports The management server uses statistics collectors to gather information for reports. To view a report you must have its corresponding collector running. IMPORTANT: All collectors are stopped during Get Details/Discovery Data Collection. This means that during Get Details/Discovery Data Collection data, such as for reports is not updated.
Starting Collectors IMPORTANT: After you click OK, the collector starts immediately if the date and time you set has not passed. If the set time has passed, the collector starts two minutes after you click OK. To start a collector: 1. Click Reports > Storage Essentials > Report Configuration in HP Systems Insight Manager. Then, click the Data Collection tab. 2. Click the Start button corresponding to the collector you want to start. 3. Click the calendar icon, . 4.
Setting the Date and Time for Report Collectors IMPORTANT: After you click OK, the collector starts immediately if the date and time you set has not passed. If the set time has passed, the collector starts two minutes after you click OK. To set the date and time, do the following: 1. Click Reports > Storage Essentials > Report Configuration in HP Systems Insight Manager. Then, click the Data Collection tab. 2. Click the Stop button corresponding to the collector you want to stop. 3.
IMPORTANT: If you change the date in the field to a date that does not exist in a month, the software automatically calculates the date to the next month. For example, if you enter 2003-11-31, the software assumes the date is 2003-12-01. Figure 17 Selecting the Date and Time from the Calendar In the previous figure, the calendar sets the date and time at 1:56 p.m. February 13, 2003. Viewing Scheduled E-mail Deliveries for Reports The Scheduled Deliveries tab displays all e-mail schedules for reports.
Table 21 Viewing System Wide E-mail Schedules (continued) Column Name Description Format The format of the report sent: • PDF • Microsoft EXCEL • XML Scheduled By Edit Delete The user who scheduled the report. Click the button to edit a schedule. See ”Editing an E-mail Schedule for a Report” on page 439 for information about the options displayed in this window. Click the button to remove the corresponding schedule.
If you are e-mailing reports in bulk, you might want to let users know the e-mail is being sent by an automated process. You might also want to provide an e-mail address for users to provide feedback, for example: This e-mail and its attached report are generated automatically. If you would like to change how often the report is sent to you or you want to be taken off the list, please contact username@companyname.com. 7.
Data aging statistics are displayed in the table. IMPORTANT: Perform the following steps ONLY if customer support has instructed you to modify one of the collectors on the page: 3. Click the Edit ( ) button. 4. In the Time field, type the time in 24-hour format with the hour and minutes separate by a colon, for example, 22:15. Today’s date is highlighted in pink. Click Set. The date and time appear in the Next Scheduled Run field in the yyyy-mm-dd hh:min format.
2. Click the Report Cleanup tab at the top of the screen. 3. Click the calendar icon, . 4. In the Time field, type the time in 24-hour format with the hour and minutes separate by a colon, for example, 22:15. Click the date on which you want to run the next report cleanup.Today’s date is highlighted in pink. Click Set. The date and time appear in the Next Scheduled Run field in the yyyy-mm-dd hh:min format.
1. Click Reports > Storage Essentials > Report Configuration in HP Systems Insight Manager. 2. Click the Report Cache tab at the top of the screen. 3. Click Refresh Now. Scheduling a Report Cache Refresh The management server lets you schedule the refreshing of the report cache. Keep in mind the following: • The higher the frequency of the report cache interval, the more stress you put on the management server.
6. Click the Enable option. 7. Click the Save Changes button. Setting Up Global Reporter IMPORTANT: Depending on your license, Global Reporter may not be available. See the “List of Features” to determine if you have access to Global Reporter. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). Global Reporter lets you gather data for global reports from multiple management servers.
information in the database that can be used for local and global reports. The management server in New York is referred to as a Global Reporter server because it has Global Reporter enabled. Figure 18 An Example of Global Reporting Table 22 Description of “An Example of Global Reporting” Item Description 1 Management server for the SAN in Tokyo. 2 Database containing the local materialized views for the management server in Tokyo. 3 Management Server for the SAN in New York City.
Table 22 Description of “An Example of Global Reporting” (continued) Item Description 4 Database for the Management Server in New York City. It contains the local materialized views for New York City, in addition to the global views containing local data from Tokyo, London, and New York. 5 Management server for the SAN in London 6 Database containing the local materialized views for the Management Server in London.
verify that management server on the remote server is running. If the site cannot be contacted, remove the obsolete site from the list by clicking the button. • Security - Users, whose role allows them access to view global reporting, can view all the elements throughout the enterprise. Grant access to viewing global reports only to those, who should be allowed to view all elements.
• If you want data from the Global Reporter server included in global reports, add the local management server. Enter “localhost” as an IP Address/DNS name for your local management server. 6. Click OK. 7. When you are done, click OK. The management server verifies it can contact the site and it checks the version of the management server the site is running. The management server then adds the site to its list for global reporting. 8. Repeat steps 4 and 5 for each site you want to add. 9.
The text should now appear as follows: LISTENER = (DESCRIPTION_LIST = (DESCRIPTION = (ADDRESS_LIST = (ADDRESS = (PROTOCOL = TCP)(HOST = localhost)(PORT = 1521)) (ADDRESS = (PROTOCOL = TCP)(HOST = 192.168.10.1)(PORT = 1521)) ) ) ) f. Save the file and exit. g. Start the listener service for Oracle: Go to the Services window to start the OracleOraHome92TNSListener service. h. Start AppStorManager. 14.
6. If you changed the IP address of the remote server, you must edit the listener.ora file on that remote server as described in the following steps: a. Log onto the remote site. b. Stop the service for the management server running at the remote site. c. Stop the listener service for Oracle (OracleOraHome92TNSListener) at the remote site. d. Stop OracleServiceAppIQ at the remote site. e. Open the following file in a text editor on the computer at the remote site: %ORA_HOME%\network\admin\listener.ora f.
• ”Stopping Performance Collectors” on page 195 • ”Setting the Date and Time for Performance Collectors” on page 195 • ”Viewing Data Aging Statistics for Performance” on page 196 Managing Performance Collectors The management server uses performance collectors to gather information for Capacity Manager and Performance Manager charts, as well as for monitoring. Use Data Collection page for Performance collectors to stop and start collectors as well as schedule when they run.
Table 23 About Performance Collectors Column Heading Description Element The name of the element from which this collector gathers information. Element Type The type of element from which the collector gathers information. Statistics The statistics that the collector is responsible for providing information. Next Scheduled Run Displays the date and time when the collector is scheduled to run. Interval The interval in minutes the collector runs. Running? Gives the status of the collector.
5. Type a repeat interval and then select a unit of measurement from the drop-down menu. The repeat interval determines how often the collectors gather the data. 6. If you are asked to provide a proxy host, do the following: a. Select a proxy host by clicking the Browse button. b. Select a proxy host from the drop-down menu and then click OK. c. Click OK again to set the time for starting the collector. d.
- Displays the previous month - Displays the next month - Displays the same month in the following year 6. When you are done, click the Set button. The management server displays the date and time. IMPORTANT: If you change the date in the field to a date that does not exist in a month, the software automatically calculates the date to the next month. For example, if you enter 2003-11-31, the software assumes the date is 2003-12-01.
IMPORTANT: Perform the following steps ONLY if customer support has instructed you to modify one of the collectors on the page: 3. Click the Edit ( ) button. 4. In the Time field, type the time in 24-hour format with the hour and minutes separate by a colon, for example, 22:15. Click the date on which you want to run the collector to run the next time.Today’s date is highlighted in pink. Click Set. The date and time appear in the Next Scheduled Run field in the yyyy-mm-dd hh:min format.
7 Database Maintenance and Management This chapter contains the following topics: • ”Database Maintenance Window” on page 199 • ”Overview of Backups” on page 200 • ”Database Mode” on page 201 • ”Architectural Overview of RMAN Backups” on page 202 • ”Performing an RMAN Hot Backup” on page 204 • ”Scheduling RMAN Hot Backups of the Database” on page 204 • ”Viewing Results from RMAN Backup” on page 205 • ”About the Database Admin Utility” on page 206 • ”Database Password” on page 215 • ”Troubleshooting Listene
8. Start the service for the management server. 9. If database is in archive mode, take a current RMAN backup by clicking the Backup Now button on the Options > Storage Essentials > Manage Product Health > Disk Space > RMAN Backup in HP Systems Insight Manager. See ”Performing an RMAN Hot Backup” on page 204 and ”Architectural Overview of RMAN Backups” on page 202. On successful completion of RMAN backup, the backup is saved to the following directory: %ORA_HOME%\rman\current 10.
Table 24 Description of Backups (continued) Backup Type Description Files Backed Up Database Mode RMAN Cold backup Done through the Database Admin Utility. Same files as an RMAN HOT backup. If the management server is set to no-archive mode, users can perform an RMAN cold backup. See ”Setting the Archive Mode” on page 212. Backup Destination and Operation for RMAN: The management server has three backup points available for RMAN backups.
• Scheduled RMAN backup jobs do not run. If you change the database mode to no archive during an RMAN backup, the RMAN backup will error out. • If the database fails as a result of a corrupt data file, the database can only be restored to the last export backup available. This requires recreating the database along with the import. When you change the database to archive mode, you reset the logs SCN, set the archive parameter in the database parameter file and enable the RMAN backup scheduler.
Backup Now button on day 8, the backup is saved in the CURRENT folder because the backup is recording the current state of the database.
2. In the management server, click Options > Storage Essentials > Manage Product Health in HP Systems Insight Manager. 3. Select RMAN Backup in the Product Health tree. 4. Click the Backup Now button. The database is backed up. Performing an RMAN Hot Backup You can perform an RMAN hot backup instantly. The backup is referred to as being “hot” because the management server is still running.
1. Verified you have enabled database archive mode and RMAN backup as described in ”Setting the Archive Mode” on page 212. 2. Click Options > Storage Essentials > Manage Product Health in HP Systems Insight Manager. 3. Select RMAN Backup in the Product Health tree. 4. Click the calendar icon, . 5. In the Time field, type the time in 24-hour format with the hour and minutes separate by a colon, for example, 22:15. Click the date on which you want to run the next backup of the database.
3. Click the Results tab in the RMAN Backup window. The following information is displayed: • Data/Time of the backup • Status of the backup • Backup folder About the Database Admin Utility The Database Admin Utility lets you easily manage your database from restoring it from a cold backup to resetting the temp tablespace. This tool provides flexible importing and exporting features, which let you save time.
• CIMOM If any of these components are in use, the Database Admin Utility will not work. If you are shown an error message when you start the Database Admin Utility, stop the AppStorManager service. Then, click the Refresh button. Checking the Database and Listener Status To find the database and listener status: 1. Access the Database Admin Utility as described in ”Accessing the Database Admin Utility” on page 206. 2. Click Check Database Status in the left pane. 3.
IMPORTANT: If HP SIM and Storage Essential are using the same Oracle database, you must not only use the Database Admin Utility to change the password, but you must also use the mxpassword command to change the password as described in the following steps. You must provide the same SIM_MANAGER password for the mxpassword command and the Database Admin Utility.
IMPORTANT: The export database feature should not be used for backing up the server. If you are interested in backing up the database for disaster recovery, use the Database Server Backup feature. See ”About the Database Admin Utility” on page 206 for more information. To export the database: 1. Access the Database Admin Utility as described in ”Accessing the Database Admin Utility” on page 206. 2.
• Import SE Schema—specifies to import the Storage Essentials data from your database file. • Import HPSIM Schema—specifies to import the HP System Insight Manager data from your database file. 3. Click Import Database in the left pane. 4. Click the Browse button. Select a database file with a .zip extension to import. Then, click the Open button. The file name is displayed in the Database Admin Utility. 5. Type the password of the SYSTEM account. Then, click OK.
5. Click the Re-initialize Database button. Resetting the Temp and Undo Tablespace The temporary and undo tablespace may grow large due to high database activity. You should regularly reset the temp and undo tablespace to its initial value, as described in this section. To reset the tablespace: 1. Access the Database Admin Utility as described in ”Accessing the Database Admin Utility” on page 206. 2. Click Reset Temp Tablespace in the left pane. 3. Type the SYS password in the SYS Password field. 4.
6. Click Run Cold Backup. Setting the Archive Mode By default the management server database runs in no-archive mode, which requires you to backup the database manually by using a cold RMAN backup. A cold RMAN backup is an RMAN backup without the management server running. If you want to take an RMAN hot backup of the database, switch the database to archive mode. An RMAN hot backup is with the database running while the backup is occurring.
RMAN Restore The Database Admin Utility lets you restore the management server database from a previously scheduled (hot) RMAN backup, which are stored in the following directories by default: backup1, backup2, and current. You may not have a previously scheduled (hot) RMAN backup if you selected Disable Database Archive Mode and RMAN Backup. To restore the database: 1. Access the Database Admin Utility as described in ”Accessing the Database Admin Utility” on page 206. 2.
To run a cold backup: 1. Access the Database Admin Utility as described in ”Accessing the Database Admin Utility” on page 206. 2. Click Run Cold Backup in the left pane. 3. Click the Browse button to select a file path. 4. In the File Name field, provide a directory path (may automatically be populated in some Web browsers), but do not provide a file name. IMPORTANT: The management server saves the backup in a directory called COLDBACKUP in the path you specified.
Warning Messages During Reinitializing the Database When you use dbAdmin.bat to re-initialize the database, warning messages resembling the following appear in the command prompt window that pops up when the dbAdmin.bat file is double-clicked. You can ignore these messages. Connected. Creating FSRM Creating FSRM Connected. Warning: View Warning: View Warning: View DATA tablespace INDX tablespace created with compilation errors. created with compilation errors. created with compilation errors.
For example: If the management server is managing two Oracle and two Sybase database applications, ask the database administrator to change the password for APPIQ_USER on all the Oracle and Sybase managed databases to a single password. Then, change the password for APPIQ_USER on the management server as described in ”Changing the Password for the Managed Database Account” on page 122.
8 Viewing Element Topology and Properties This chapter describes the following: • ”About System Manager” on page 217 • ”Accessing System Manager” on page 219 • ”About Cisco Switches and VSANs in System Manager” on page 219 • ”About the User Interface” on page 219 • ”Viewing Storage Elements” on page 237 • ”Setting Up Custom Commands” on page 258 • ”Using External Tools” on page 268 • ”About the Navigation Tab” on page 270 • ”Viewing Element Properties” on page 275 • ”Viewing Element Topology” on page 279 •
• Access - Provides information about zone entries, persistent bindings, and storage system LUN masking. You can also manage zone, zone aliases, and zone sets from this tab. See ”About the Access Tab” on page 225 for more information. • Path - Provides information about an element's path. See ”About the Path Tab” on page 230 for more information. When you right-click an element in the topology or in the List, Access, or Path tab, a drop-down menu appears.
• Provisioning Manager - The Provisioning Manager tab lets you manage zones, zone sets, and zone aliases, in addition to pools, volumes, LUNs and LUN mappings. See the topics, ”About the Provisioning Tab” on page 289 and ”About Provisioning Manager” on page 297 for more information. • Events - The Events tab lets you view events for an element. See the topics, ”About Event Manager” on page 409 and ”About the Events Tab” on page 289 for more information.
NOTE: If a TE port belongs to multiple VSANs, the management server mentions only the primary VSAN.
Table 28 Icon Description of Toolbar in System Manager (continued) Description Magnifies the view Decreases the magnification Lets you set the magnification to a percentage of the default magnification Opens a smaller pane, which provides a global view of the topology. This lets you position the main view to a certain section of the topology. For more information, see ”Using the Global View” on page 242. Fits the topology to the window, so you can see the entire topology.
Table 28 Icon Description of Toolbar in System Manager (continued) Description Saves the current topology, so that when you return to System Manager, the saved layout is restored. This option can be especially useful if you have moved elements in the topology and you want to keep their current location. This button is not accessible from the Topology tab. When you click the button, you are asked if you want the layout to apply to all users.
Table 28 Description of Toolbar in System Manager (continued) Icon Description This button calculates the topology path and host capacity for direct attached storage. To view direct attached storage in System Manager, click this button. Direct attached storage is indicated by dotted lines. Displays the backup topology. This feature is enabled by default in System Manager. The backup topology is also displayed in Backup Manager.
About the List Tab The List tab provides information about the elements by type and by fabric and domain. To find the fabrics in a domain, expand the domain node. You can see the elements in each fabric by expanding the fabric node, as shown in the following figure. Figure 20 Expanding the Fabric Node The “unknown” Fabric lists elements that have a Fibre Channel port connected to an undiscovered Fabric or the Fibre Channel port remains not connected.
When you expand the element type node, all elements of that type are listed. If you select the element type node, all elements of that type are selected in the topology. For example, assume you want to determine the number of applications that the management server monitors. When you expand the Applications node, the applications are listed. When you select the Applications node, the applications are highlighted in the topology, as shown in the following figure.
Obtaining Information About Zone Entries To view the zone entries in a domain, expand domain > Fabric name > Zone Set nodes. Click the Zone Set node to see the members of the zone set highlighted in the right pane, as shown in the following figure. Figure 23 Members of a Zone Set The icon is displayed next to the name of the active zone set. The the inactive zone sets. icon is displayed next to To view members of a zone, do one or more of the following: • Expand the node of the zone in the tree.
• Click the node of the zone in the tree. The software highlights the zone members in the right pane. Figure 24 Displaying Zone Members To view the relationship of the zone member to the switch, click the zone member in the tree. The software highlights the zone member and its switch. Figure 25 Zone Member to Switch Storage Essentials 5.00.
To view information about a zone member's port, expand the zone member node, as shown in the following figure. Notice that when you select the zone member node in the tree, it appears highlighted in the right pane. Figure 26 Obtaining Information About a Zone Member's Adapter Obtaining Information About Host Bindings To view the elements that have host bindings, click the Host Bindings node in the tree.
When you click the HBA node, the host and the element to which it has the binding are highlighted. A green line between the two elements indicates they have a binding. Figure 28 Displaying Host Bindings To view information about the ports on an HBA card, expand the HBA node in the tree, as shown in the following figure: Figure 29 HBA Port Properties Obtaining Information About Storage System LUN Masking To obtain information about a storage system LUN masking, expand the fabric node.
under the node, and the storage system is highlighted in the right pane, as shown in the following figure. Figure 30 WWN Properties The software displays properties of the WWN. If the LUN has a LUN masking, expand the LUN node to obtain information about the LUN masking. Figure 31 WWN Properties To view a LUN masking, expand a LUN node.
About the Path Tab The Path tab provides information about an element's path. By clicking a host's node, you can determine the host's path in the application. When you click a host node in the tree, the elements in the host's path appear highlighted in the right pane, as shown in the following figure. Figure 32 Obtaining Path Information Storage Essentials 5.00.
You can also determine the elements in a hosts path by expanding the Application Path and Path nodes under the host node in the tree. Figure 33 Path Information Visible in the Tree When you right-click an element in the List tab, a drop-down menu is displayed. The options displayed depend on the type of element you clicked. See ”About the Right-Click Menu Options” on page 231 for an explanation of the options in the drop-down menu.
NOTE: Table 30 Right-click menu options are not available to undiscovered fabrics. Drop-Down Menu Options Accessible from the Topology* Menu Option Description Go to Navigation Details This menu option redirects you to the Navigation page. If the element is labeled “Discovered,” you are shown the Properties page. Elements are labeled “Discovered” when the management server has discovered the element, but it cannot obtain additional information about it. See ”About the Navigation Tab” on page 270.
Table 30 Drop-Down Menu Options Accessible from the Topology* (continued) Menu Option Description External Tools Provides several ways to access an element: • Telnet - Lets you access a host or a switch through the telnet utility. The Telnet feature is only accessible to Web browsers on Microsoft Windows operating systems. • Browse - Lets you access the main Web page for a host or a switch. • Set Up External Tools - Lets you add URLs for accessing the management tools for the storage system.
Table 30 Drop-Down Menu Options Accessible from the Topology* (continued) Menu Option Description Provision Provides provisioning tools for switches and storage systems: Switches - Lets you activate and deactivate zone sets, in addition to managing the following: • Zone Aliases (Not applicable to McDATA switches) • Zones • Zone Sets (The delete zone set option is disabled for active zone sets).
Table 30 Drop-Down Menu Options Accessible from the Topology* (continued) Menu Option Description Delete Element Removes an element and its discovery instance from the system. It also removes other elements discovered through the removed element. See ”Deleting Elements from the Product” on page 78.
Manager tab lets you set up and manage zone provisioning. Provisioning Manager may not be available in your kit. To determine if you can access Provisioning Manager, access the Feature List, which is accessible from the Documentation Center. • Delete This Fabric - Deletes a fabric. When you are asked if you want to delete the fabric, click Yes if you do not mind waiting for the management server to recalculate the topology.
Table 31 Drop-Down Menu Options on the Access Tab (continued) Task To Perform Task, Right-Click... 1Create a zone alias A zone alias with a blue folder under the fabric node. 1Delete a zone alias A zone alias under the Zone Aliases node. 1Modify a zone alias 1Show zone alias details Provision Storage Pool Provision Volume A storage system under the Storage System LUN Access node.
• ”Using the Global View” on page 242 • ”Printing Elements in System Manager” on page 242 • ”Updating Element Data” on page 244 • ”Viewing Ports” on page 245 • ”Showing the Impact of an Element” on page 245 • ”Showing the Impact of an Element” on page 245 • ”Assigning a Business Cost to a Application” on page 247 • ”Expanding the Topology Pane” on page 249 • ”Filtering Fabrics” on page 249 • ”Viewing Event Status in the Topology” on page 249 • ”Custom Name for Switch Truncated in Topology” on page 252 • ”Ma
Adding Information for “Discovered” Hosts The software labels a host as “Discovered” when it cannot obtain additional information about a host it has discovered. To learn why the software was unable to obtain information about the element, see ”Troubleshooting Discovery and Discovery Data Collection/Get Details” on page 609. If you have more than one “Discovered” host, it can be difficult to differentiate them.
Arranging Elements in the Topology To improve usability, arrange the topology so it suits your environment. For example, if you plan to filter various fabrics, you might want to arrange the topology so that elements are arranged by fabric. This way when you filter the fabrics, large gaps do not appear in the topology. You can arrange elements individually or in groups, as described in the following sections.
A square encloses the elements, as shown in the following figure. If you want to redo the square, just click outside of the square and retry. Figure 34 Enclosing the Elements 3. To move the elements within the square, click within the square. Holding down the mouse button, drag the elements to the new location.
Closing Topology Windows Whenever you select a new topology view, the software creates a pane for that view. To lessen the number of panes open, do the following: 1. Right-click the tab of one of the views. 2. Select one of the following from the drop-down menu: • Close - Closes the current topology pane in System Manager. • Close All - Closes all of the topology panes in System Manager. • Close All But Current - Closes all of the topology panes in System Manager, except the current one.
• Paper height - Displays the height of the paper. You can modify the measurement in this field when you select the Custom option in the Paper format drop-down menu. • Top margin - Type a measurement for the top margin. • Bottom margin - Type a measurement for the bottom margin. • Left margin - Type a measurement for the left margin. • Right margin - Type a measurement for the right margin. • Orientation - Click an orientation for the printout. 5.
• Width - Determines the width of the printout. If the width entered does not fit on the page, the printout wraps around to another page. • Height - Determines the height of the printout. If the height entered does not fit on the page, the printout wraps around to another page. • Resolution (pixel/unit) - Lets you change the resolution so that the printout spans several pages. • Page - Lets you expand the printout so it prints on several pages without modifying the graphic. 7.
Viewing Ports When looking at an element on the network, such as a switch, it can be difficult to determine how the ports are used. System Manager provides a view that lets you determine the use of each port for all elements in the network. To view the ports: 1. Do one of the following: • Access System Manager - Click Tools > Storage Essentials > System Manager in HP Systems Insight Manager.
are highlighted in yellow. This means that if any of these highlighted elements are removed from the network, klu2e may have difficulty functioning. Figure 36 Showing the Impact of an Application However, the show impact feature not only shows the other elements on which an element is dependent, but it also displays the other elements dependent on it. For example, assume you right-clicked a switch and selected Show Impact from the drop-down menu.
Table 32 Show Impact Results If you select "Show Impact" for Highlighted Elements An Application (virtual or real) Elements required by the application, such as its host and a switch. A Host • Elements dependent on the host, such as its applications. • Elements required by the host, such as switches. A Switch Elements dependent on the switch, such as hosts and storage systems Storage System Elements dependent on the storage system, such as hosts.
example, a storage system would have a value of $60 if two $30 applications are in its path, as shown in the following figure. Figure 37 Determining Business Cost To assign a business cost to a application: 1. Do one of the following: • Right-click an application in System Manager, and then select Set Business Cost from the drop-down menu. • Double-click an application in System Manager. Click the Properties tab. Then click the Change button next to the Business Cost field.
Expanding the Topology Pane To increase screen space for viewing the topology, hide the List, Access, and Path tabs by clicking the arrow pointing left on the border between the pane containing the tabs and the main pane in System Manager. Figure 38 Expanding the Topology Pane To display these tabs, click the arrow pointing right on the border for the left pane. Filtering Fabrics To view a specified fabric in the topology, do the following: 1.
five minutes have a triangle displayed next to them. The color of the triangle corresponds to the severity of the event. NOTE: Table 33 Icon The Event Status button ( ) is disabled in Capacity Manager and Performance Manager. Legend for Severity Level Icons Description The event has a critical impact. The event has a major impact. The event has a minor impact. The event is providing a warning. The event is providing information. The severity of the event is not known.
Table 34 Descriptions of the Severity Levels Presented in the Severity Menu (continued) Severity Level Description Major Denotes elements that have a major severity level. It also displays icons for the critical severity level. For example, one or more physical fabric objects (device port, switch, or fabric) have disappeared. Minor Denotes elements that have a minor severity level.
Custom Name for Switch Truncated in Topology If a custom name for a switch is long, its name may appear truncated in the topology. The full name appears once the cursor is positioned over the switch with the custom name.
4. In the IP Address field, type an IP address for the group. 5. In the DNS Name field, type the DNS name for the group. 6. In the Version field, type a version number for the group. 7. In the Operating System field, type the operating system for the hosts in the group. 8. Select the hosts you want to be a part of the group and click the button with the greater than sign (>). The hosts are added to the group. You can sort the hosts by: • Name - To sort hosts by name, click the Hosts column heading.
Grouping "Discovered" Storage Systems If you have several "Discovered" storage systems, you might want to group them together so the management server sees them as one element in the topology. The management server labels a storage system as "Discovered" when it has found the storage system, but it cannot obtain additional information about it. Grouped elements preserve space in the topology since only one "Discovered" element is displayed to represent the group.
7. To remove storage systems from the group, click the button with the less than sign (<). 8. Click OK. The management server no longer displays the grouped elements in the topology individually. A storage system icon with the group name on the bottom represents the group. The group cannot be monitored or managed. Ungrouping "Discovered" Storage Systems You might want to ungroup "Discovered" storage systems, if one of the storage systems in the group is going to change.
Deleting Fabrics When you delete a fabric, the elements in the fabric are not removed. After you delete the fabric, the management server recalculates the entire topology. The recalculation may take some time, especially if you have a large topology. To delete a fabric: 1. Access System Manager (Tools > Storage Essentials > System Manager in HP Systems Insight Manager). 2. Click the List tab. 3. Right-click a fabric name. 4. Select the Delete This Fabric option from the drop-down menu. 5.
additional information about the element, it marks it as generic with a question mark over the element. For example, assume you have a switch with 10 "discovered" elements. The management server detected these elements by looking at the ports on the switch and determined the type of element connected. "Discovered" elements appear with a question mark above their icon in the topology. The question mark indicates the management server has detected the element, but it cannot obtain additional information.
Discovered Element > Expand Generic Hosts for the Switch after you have saved the topology. To display hidden generic hosts connected to a switch: 1. Right-click a switch with a "+" icon. This "+" icon indicates the switch has hidden generic hosts. 2. Select Discovered Element > Expand Generic Hosts for the Switch from the drop-down menu. The hidden elements for the switch appear in the upper-right corner of the topology.
Setting Up Custom Commands This section describes the following: • ”About Custom Commands” on page 259 • ”Adding a Custom Command” on page 259 • ”Editing a Custom Command” on page 262 • ”Deleting a Custom Command” on page 262 • ”Software Environment Variables for Scripting” on page 262 • ”Using the Remote Console” on page 266 About Custom Commands Custom commands let you run a command you created on the management server.
Adding a Custom Command Use the custom command functionality in the software to run a command you created on the management server. The command could point to an executable or a script. For example, assume you have already created a script that backs up a storage system. You could run that script from System Manager, as described in the following steps. Keep in mind the following: • The custom command always runs on the management server unless you are running the telnet utility.
6. In the Description field, type a description, for example, This command activates a script that backs up an element. 7. In the Command Line field type a command, which will run on the management server. This could be a command required to start a script, for example the following: myscript.bat The remote console automatically becomes inactive once the command finishes.
name displayed on the Properties tab, accessible by double-clicking the switch in System Manager and clicking the Properties tab. • Storage Systems - (Optional) If you want the command to be visible in the drop-down menu when a storage system from a particular vendor is right-clicked, type the name of the vendor in the Vendor Name field.
• (Management Servers on Windows Only) If you leave the Remote Console (cmd /k) open after running a script, users can traverse the directory structure of the management server. The software provides the following environment variables for you to put in your scripts. For example, assume you have a script that backups a host. You could use the variables to obtain information about the host. The software gathers information about the element you right-clicked.
Table 36 Variables for Only Storage Systems, Switches, and Hosts* Variable Value APPIQ_ELEMENT_IP_ADDRESS The IP address of the element. APPIQ_ELEMENT_DNS_NAME The DNS name of the element. APPIQ_ELEMENT_MODEL The model of the element. APPIQ_ELEMENT_VERSION The version of the element. *If an application resides on the host, the variables in this table provide information about the application. See the last table for variables that return information about the host.
The following table lists variables that can be used to gather information for applications and hosts. Use the variables with the "APPIQ_HOST" prefix when you are using variables from the first table to gather information about the application. For example, if you are running a script containing APPIQ_ELEMENT_STATUS on a host, it would obtain information about the status of the application.
Table 39 Variables for Only Applications (continued) Variable APPIQ_HOST_DOMAIN Value The domain of the host on which the application resides.
Keeping the Remote Console Active NOTE: This section is for only management servers running on Microsoft Windows. Keep in mind the following: • The remote console become inactive when the custom command finishes its execution. To use the menus and buttons in the remote console, the remote console must be kept active. • If you leave the Remote Console (cmd /k) open after running a script, users can traverse the directory structure of the management server.
Table 40 Buttons on the Remote Console Button Description Stop Stops a command. Once a command has been executed the console becomes inactive. Help Provides the following information about the remote console: • Clearing the remote console - Type CLS in the Commands field of the remote console. • Copying text to the Commands field - Place the cursor at the end of the line in the window below the Commands field, as shown in the following figure. Then, press ENTER.
Using External Tools This section describes the following: • ”About the External Tools Feature” on page 269 • Set Up External Tools - Lets you add a URL for accessing management software, such as Hitachi HiCommand Device Manager and EMC ControlCenter™ Navisphere. See ”Setting up External Tools” on page 269. About the External Tools Feature The management server ships with an external tools feature that lets you: • Browse the Element - Access a host or a switch through its main Web page.
When you right-click the element and select External Tools, the external tool is listed. To delete the URL for an external tool, click the corresponding window. button in the External Tools About the Navigation Tab The Navigation tab not only provides information about an element, but it also illustrates how the element relates to other elements in its path. For example, the Navigation page displays logical and physical components, such as ports, zone sets, zones and zone aliases.
• If you see a message that zone aliases are not supported on a Brocade switch, perform Discovery Data Collection/Get Details. The management server does not gather provisioning information from a fabric until Discovery Data Collection/Get Details is performed. Figure 41 Obtaining Information About a Host You can learn more about a component, by clicking it in the Navigation page.
hosts are dependent. You would click Hosts in the page. You are shown information about the dependent hosts, as in the following figure: Figure 42 Details of a Host Connected to a Switch The following table provides an overview of the information presented for each type of element. Table 42 Information Available from the Navigation Page Element Dependencies Front Physical Back Physical Logical Physical Applications *Hosts Storage Essentials 5.00.
Table 42 Information Available from the Navigation Page (continued) Element Dependencies Front Physical Back Physical Logical Physical Switches Storage Systems *The management server displays cxfs for SGI IRIX computers if it detects cxfs on the cluster.
2. Double-click a switch in the right pane. 3. Click the Ports button under the Physical column in the Navigation tab, as shown in the following figure. Figure 43 Finding the Status of a Port 4. Under the Name column in the Ports table, click the port that you want to obtain the status. 5. On the Properties page, the status of the port is displayed in the right column. The status of the port can be online, off line or unknown.
Accessing the Navigation Tab To access the Navigation tab: 1. Access the management server. 2. To access the Navigation tab, do one of the following: • Click an element in Application Viewer. • Double-click an element in Capacity Manager, Performance Manager or System Manager. • Click one of the following elements in Backup Manager and then click Navigation in the lower-right corner. • Backup Client • Backup Library • Host • Master backup server • Master backup media 3. Click the Navigation tab.
• *Version (Generic Hosts Only) - Type a version number for the generic host. • *Operating System (Generic Hosts Only) - Type an operating system for a generic host. • Vendor - The vendor name. • Tape Library option - Select this option if the element is a tape library. See ”Adding a Generic Tape Library” on page 278. • View element properties - The element properties viewed on the type of device. The properties provided vary according to the element.
Viewing Fabric Properties You can view the following properties of a fabric: • Assign a Custom Name - To make it easier to identify the element, assign the element a Custom Name. See ”Assigning a Custom Name” on page 277. This option is not available to all elements. • Vendor - The vendor name. • Created - The first time the software contacted this element. • Discovery Status - The status of the discovery of the element, for example "Contacted.
IMPORTANT: Do not assign a custom name during Get Topology or Discovery Data Collection/Get Details. You can determine if the management server is getting the topology or all element details by looking at label near the status button. NOTE: Since all users query the same database, this name is displayed to others using the software. As a result, you might want to make them aware of the name. 1.
• The name is case sensitive, for example, “Element1” and “element1” are different elements. 3. In the Vendor field, type the vendor of the tape drive. 4. Select the Tape Library option. 5. Click the Save button. Viewing Element Topology This section describes the following: • ”About the Topology Tab” on page 279 • ”About the New Window Option” on page 285 • ”Printing the Topology” on page 286 About the Topology Tab The Topology tab provides a graphical representation of an element's path.
in the following figure. According to the following figure, the server can access three storage systems: Engenio, EMC, and HDS. Figure 44 Topology of a Server Storage Essentials 5.00.
The topology extends the length of the screen. The second portion of the topology is provided by the following figure. Figure 45 Topology of a Server (Continued) Multipathing Multipathing is the process of providing a server more than one path to a storage system, so that in the case of an emergency, the server will have continuous access to the storage system. Multipathing can be done many ways. For example, you can provide redundant switches for a host to access a storage system.
• Microsoft Windows 2003 hosts with Service Pack 1 and IBM TotalStorage DS6800 arrays do not stitch properly as a result of the Subsystem Device Driver (SDD) appearing on the same disk. The multipathing page returns the Windows SDD path as something similar to "600507630efe01a80000000000001104:c0t0d0p3". This makes it difficult to match it up to your SDD path names. The following figure displays how the software detects multipathing for a server running VERITAS Volume Manager.
Figure 47 Multipathing Displayed in the Topology (Continued) Keep in mind the following: • If you do not see all of the elements in the path displayed, verify they have been discovered and details have been obtained from them. See ”Discovering Filers, Tape Libraries, Switches and Storage Systems” on page 15. • See ”Known Device Issues” on page 628 for multipathing issues regarding certain devices. • The management server displays only the active path for an RDAC host.
Once the button is enabled, the management server displays the link between the storage system port and the port to the host as a dotted line, as shown in the following figure: Figure 48 Direct Attached Storage in the Topology In this figure, Slot A Port 1 belongs to the storage system and Adapter 1 Port 0 belongs to the host. The dotted line indicates the storage system is directly attached to the host.
Table 44 About the Toolbar in the Topology Tab Icon Description Prints the topology. See the topic, ”Printing the Topology” on page 286 for more information. Magnifies the view Decreases the magnification Lets you set the magnification to a percentage of the default magnification Opens a smaller pane, which provides a global view of the topology. This lets you position the main view to a certain section of the topology. For more information, see ”Using the Global View” on page 242.
Figure 49 New Window Option Printing the Topology The software lets you print the topology. This option is extremely helpful when you want to show someone the layout of the network, such as in a presentation. To print the topology: 1. Access the management server. 2. Access the Topology tab by doing one of the following: • Selecting an element in Application Viewer, and then clicking the Topology tab. • Double-clicking an element in Capacity Manager or System Manager, and then clicking the Topology tab. 3.
IMPORTANT: Before you change the margins, decide on a unit of measurement. • Paper format - Select the paper size from the drop-down menu. • Unit - Select cm (centimeters) or inch for the margins. • Paper width - Displays the width of the paper. You can modify the measurement in this field when you select the Custom option in the Paper format drop-down menu. • Paper height - Displays the height of the paper.
• Start x - Determines the horizontal placement of the printout. Anything more than zero expands the printout to another page. • Start y - Determines the vertical placement of the printout. • Width - Determines the width of the printout. If the width entered does not fit on the page, the printout wraps around to another page. • Height - Determines the height of the printout. If the height entered does not fit on the page, the printout wraps around to another page.
NOTE: You can view the properties of a volume by clicking its link. 7. If applicable, choose a disk partition by clicking the Disk Partitions tab or the Next button and then selecting a disk partition. 8. Click Finish. About the Provisioning Tab The provisioning tab provides different functionality depending on the type of element you double-clicked in System Manager or clicked in the Provisioning pages.
• Clear Events - See ”Clearing Events” on page 415. • Unclear Events - See ”Unclearing Events” on page 415. • Delete Events - See ”Deleting Events” on page 417. • Sort Events - See ”Sorting Events” on page 417. • Select a Severity for Filtering - See ”About Filtering Events” on page 420 and ”Selecting a Severity Level” on page 421. • Customize the Severity Level Filter - See ”Customizing the Severity Level Filter” on page 422 and ”About Filtering Events” on page 420.
• ”Adding Custom Information” on page 562 Figure 50 Viewing Asset Records To set up chargeback, expand the Chargeback Manager node and click Asset-based or Storage-based. To learn more about each type of Chargeback Manager, see ”Setting Up Asset-Based Chargeback Manager” on page 564 and ”Setting Up Storage-Based Chargeback Manager” on page 567. This section describes the fields on the Asset Management tab.
• Asset Type - The asset type assigned to the element. • Asset Tag - The asset tag assigned to the element. • Asset Category - The asset category assigned to the element. • Geographic Location - The location of the element, for example, Boston, Massachusetts. • (Storage Systems Only) Storage Tier Classification - Select the storage tier you want to assign the storage system. Storage tiers for storage-based information can have any name. By default, they are the following: • No Tier is the default setting.
About the Monitoring Tab You can easily access performance information about an element by doing the following: 1. Double clicking the element in System Manager or Application Viewer. 2. Click the Monitoring tab. The element appears highlighted in Performance Manager. 3. Select one of the monitoring options in the lower pane to view specific performance data about the element. 4. See ”Viewing Performance Data” on page 491 for more information about Performance Manager.
5. Look under the File System Type column. The system type, such as CXFS, is listed. Additional information about the storage volume is provided: • Name of the storage volume • Description of a storage volume • Drive Type To find the information in Capacity Manager: 1. Access Capacity Manager as described in ”Accessing Capacity Manager” on page 517. 2. Select the host you want to determine is a member of a file system. 3. Scroll to the bottom of the page. 4.
296 Viewing Element Topology and Properties
9 Provisioning Manager IMPORTANT: Depending on your license, Provisioning Manager may not be available. See the “List of Features” to determine if you have access to Provisioning Manager. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
About Provisioning Brocade Switches After Upgrading After you upgrade the management server, perform Discovery Data Collection/Get Details for any subset of elements that includes the Brocade switch before performing any provisioning operations that involve that Brocade switch. See ”Step 4 - Discovery Data Collection or Get Details” on page 80 for details.
in one zone and the rest appear in another zone. Members of a zone can only communicate with other members in the zone. If two elements are not within the same zone, they cannot communicate. Zones are usually created for a particular task, such as controlling access between devices or groups. You might create zones based on an application or an operating system.
aware of those elements in the additional zones. When you activate Zone Set Two, users would still have access to the elements in Finance zone because it is also a member of Zone Two. NOTE: Create zone aliases to easily keep track of your zones. Instead of remembering a port's name, you can assign a meaningful name. As a best practice, a zone should contain either zone aliases or ports, but not both.
Use the following table as a guideline for setting up zoning. Table 45 Setting Up Zoning Step Description Where to Find 1 (Optional) Create a zone alias. Zone aliases are used to give meaningful names to switch ports, HBA ports, or storage system ports. ”Creating Zone Aliases” on page 303 2 Create zones. Zoning is the primary tool to constrain groups of SAN members. A zone defines a logical SAN that contains limited element membership.
Table 46 Zoning Support Switch Type Active Zones Inactive Zones Aliases Zone/Zone Set Provisioning Port Statistics *McDATA SNMP to switches Y N N N Y Cisco SNMP Y N Y N Y Cisco SMI-S Y Y Y Y Y CNT SMI-S Y Y N N Y **QLogic SNMP Y*** N N N Y **QLogic SMI-S Y Y Y Y Y *Also applies to EMC Connectrix switches. **Also applies to Sun StorEdge SNMP switches.
• Only one client at a time can provision on a McDATA or Connectrix fabric. Since each fabric has a separate lock, you can perform simultaneous provisioning on two different fabrics. For example, you could perform provisioning by using the user interface and the CLI at the same time on two different fabrics. Simultaneous provisioning on the same fabric is not supported. • The management server does not support enabled default zones on McDATA or Connectrix switches.
6. In the Zone Alias Name field, type a name for the zone alias. Naming Conventions for Brocade Switches: • The name must contain 1 to 64 characters. • The name must begin with a letter. Any character other than the first character can be a letter, a number (0 to 9), or an underscore (_). • The name is case sensitive. For example, “ZoneAlias1” and “zonealias1” are different zone aliases. • You cannot create a zone alias with the same name as an existing zone, zone alias or zone set.
NOTE: To select all of the ports, select the check box next to the Port heading. 8. Click OK. Deleting Zone Aliases You cannot delete a zone alias if it is the only member in a zone. To delete a zone alias: 1. Click Tools > Storage Essentials > Provisioning Manager in HP Systems Insight Manager. 2. In the right pane, click the SAN Zoning tab. 3. In the right pane, click the Provision button corresponding to the fabric in which you want to delete a zone alias. 4. Click Step 1 Zone Alias. 5.
To create a zone: 1. Click Tools > Storage Essentials > Provisioning Manager in HP Systems Insight Manager. 2. In the right pane, click the SAN Zoning tab. 3. In the right pane, click the Provision button corresponding to the fabric in which you want to create a zone. 4. Click Step 2 Zone. 5. Click the New Zone button. 6. In the Zone Name field, type a name for the zone. Naming Conventions for Brocade Switches: • The name must contain 1 to 64 characters. • The name must begin with a letter.
9. Click OK. Adding and Removing Zone Members IMPORTANT: A zone must have at least one member. To add and remove zone members: 1. Click Tools > Storage Essentials > Provisioning Manager in HP Systems Insight Manager. 2. In the right pane, click the SAN Zoning tab. 3. In the right pane, click the Provision button corresponding to the fabric in which you want to modify a zone. 4. Click Step 2 Zone. 5. Click the Edit button ( ). 6.
3. In the right pane, click the Provision button corresponding to the fabric in which you want to access information about a zone set. 4. Click Step 3 Zone. This page lists information about zone sets under the following columns: • Name - Click the name of the zone set to view its properties. • Zones - Click the name of the zone to view its properties. • Active - To make a zone set active, select its corresponding Active option.
• A zone set name cannot contain spaces. • Valid characters are a-a, AA, 0-9, caret (^), dash (-), underscore (_), and dollar sign ($). • All names must be unique and may not differ by case. For example, myzoneset and MyZoneSet are both valid individually, but the are not considered to be unique. 7. If you want to make the zone set active, select the option Activate this Zone. Keep in mind the following: • Only one zone set can be active at a time.
Deleting Zone Sets The software does not display all elements in a zone set, such as quick loop and fabric assist elements. When you delete a zone set, all elements, including quick loop and fabric assist, which are not viewable in the software, are deleted. Only the zone set is deleted, not the zones contained in the zone set. For example, assume Zone A is contained in two zone sets: one named Zone_Set_One and another named Zone_Set_Two.
3. In the right pane, click the Provision button corresponding to the fabric in which you want to copy a zone set. 4. Click Step 3 Zone Set. 5. Click the corresponding button for the zone set you want to copy. 6. Enter the name of the new zone set. If you are copying an active zone set, make sure you do not enter the name of a pre-existing inactive zone set.
• 2005-05-17 is the date you made the zone active. The date is formatted as year-month-day. In the example, the date is May 17, 2005. • 13-41-05 is the time the copy was made. The time is formatted as hour-minute-second, and it uses the 24-hour notation. In the example, the time is 1:41:05 p.m. The name of the backup zone set must follow the following naming conventions for McDATA and Connectrix switches: • The name can have a maximum of 64 characters.
If a user activates ZoneSetB, the existing information in ZoneSetB is copied to the switch and activated. The Zoning Library, however, still contains the older information.
1. ClickOptions > Storage Essentials > Manage Product Health. Then, click Advanced in the Disk Space tree. 2. Click Show Default Properties at the bottom of the page. 3. Copy the following command. How you copy the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, select the text and then right-click the selected text. Then, select Copy. cimom.cisco.displayZoneDatabase=primary 4. Return to the Advanced page (Options > Storage Essentials > Manage Product Health.
wwn: 10:0:0:60:69:12:1a:5, cnt: 1, ipclnts: 0 total number of api event proxy servers: 0 total number of api event proxy servers: 0 total number of api event proxy servers: 1 proxy server 0 Did: 16776194 wwn: 10:0:0:60:69:10:56:fb, cnt: 1, ipclnts: 0 total number of api event proxy servers: 1 proxy server 0 Did: 16776194 wwn: 10:0:0:60:69:10:56:fb, cnt: 1, ipclnts: 0 wwn: 10:0:0:60:69:12:1a:5, cnt: 1, ipclnts: 0 The Brocade Console is accessible by typing the user name and password for the switch in a Telne
type of storage system. To learn how host security groups are created on your storage systems, see ”Rules for Creating Host Security Groups” on page 329. To learn which storage systems are supported, see Table 47 on page 316 and Table 48 on page 317.
See the following table for information regarding support for volumes and host security groups.
7Volume groups are not represented in the provisioning or properties of IBM DS type storage systems. The HSGs are based on a host connection, which does not give any indication as to which volume groups each of them belongs. Volume group can have many host connections, but only one host connection can be part of a volume group. See the following topics for more information about how storage provisioning works on your storage system.
Table 49 Setting Up Storage Partitioning (continued) Step Description Where to Find 2 Create a volume. ”Creating a Storage Volume” on page 324 A volume is a virtual disk. Volumes are created in sizes that are desirable for being shown as a LUN. On CLARiiON storage systems, a volume is owned by one of the storage processors. Creating a volume also creates a LUN for this volume and each port of the storage processor that owns this volume.
1. Click the button corresponding to the volume you want to modify. 2. Type the cache read ahead multiplier (0 to 65535 bytes) in the Cache read-ahead multiplier field. A cache read ahead multiplier copies additional data blocks into the cache while it is reading and copying host-requested data blocks from disk to cache. To disable this option, type 0. 3. (Optional) Select Read Caching. When this option is enabled, the host's operations are stored in controller cache memory. 4.
Creating a Storage Pool (Engenio, CLARiiON, Sun 6130 and Sun 35xx) A storage pool is a group of disks associated together through a RAID configuration. The pool’s capabilities define the level of protection for the associated volumes and LUNs. Create at least one storage pool before provisioning a volume. To create a storage pool: 1. Click Tools > Storage Essentials > Provisioning Manager in HP Systems Insight Manager. 2. In the right pane, click the Storage Systems tab. 3.
• Volumes - Click the name of the volume to view its properties. If the storage system has a large number of volumes, you are shown a Load Volumes button instead of the name of a volume. Click the Load Volumes to view the volumes for a storage pool. To view the volumes for all storage pools, click the Load All Volumes button. • Capabilities - Click the RAID level or name to view its properties. • *Mainframe -Displays whether the storage pools have volumes that are on a mainframe.
• ”Modifying the Cache Settings (Engenio and Sun 6130 Only)” on page 328 Accessing Information About Volumes IMPORTANT: Some storage vendors require a password to access the storage system. If the same password is not entered, an authentication error message is displayed. Refer to Discovery Data Collection/Get Details to determine the user account that was used to access the storage system during discovery.
• **Segment Size - Displays the amount of space assigned to a volume in megabytes (MB). • **Read ahead - Displays the cache read ahead multiplier. • **Edit - Click the button corresponding to the volume you want to edit. See the topic, ”Modifying the Cache Settings (Engenio and Sun 6130)” on page 319 for more information. • Delete - Click the button corresponding to the volume you want to delete. See the topic, ”Deleting a Storage Volume” on page 327 for more information.
Volumes are shipped already created on HDS and Symmetrix storage systems. When you create a volume in the management server on these storage systems, you are defining the volume as being allocated. Keep in mind the following: • Some vendor's tools for HDS might round off the volume size, so that a 6.87-GB volume appears as 7 GB (7168 MB) in the tool. The management server displays the size of the volume without rounding.
a. Click Tools > Storage Essentials > Provisioning Manager in HP Systems Insight Manager. b. In the right pane, click the Storage Systems tab. c. In the right pane, click the Provision button corresponding to the storage system in which you want to access information about volumes. d. Click Step 2 Volume. e. If you want to create LUSE volumes on an HDS storage system, click the Unmapped Volumes folder in the left pane.
those volumes you delete are not being used. See ”Deleting a Storage Volume” on page 327 for more information. • If you do not see a storage pool, verify that you have obtained all element details from the storage system. See ”Step 1 - Discover Switches” on page 31 for more information. 6. Click Next. 7. Select a volume capability. The volume capabilities listed depend on the type of storage system.
• Some storage vendors require a password to access the storage system. If the same password is not entered, an authentication error message is displayed. Refer to Discovery > Details to determine the user account that was used to access the storage system during discovery. • If you remove volumes from host storage groups that are command devices or are pair volumes on HDS storage systems, later modification of the pair volumes may be disabled. To delete a storage volume: 1.
3. In the right pane, click the Provision button corresponding to the storage system in which you want to access information about volumes. 4. Click Step 2 Volume. 5. Click the Edit button ( ) corresponding to the volume you want to modify. 6. Type the cache read ahead multiplier (0 to 65535 bytes) in the Cache read-ahead multiplier field. A cache read ahead multiplier copies additional data blocks into the cache while it is reading and copying host-requested data blocks from disk to cache.
Table 50 Allowed Initiators in Host Security Groups Storage System Allowed Initiators in HSGs Symmetrix one initiator for host security masking Xiotech 1 initiator NOTE: For the “Volume Creation and LUN Security” option in Path Provisioning, the All Ports node is not shown because volumes cannot be placed inside HSGs for All Ports. Each storage system treats host security groups differently. See the following sections for more information.
• You can have multiple volumes and initiators in the HSG. • If you create a volume on a host and you have no multipathing on the host, make sure the volume is on the preferred path. You can make sure the volume is on the preferred path by using SANtricity. • The ID for a host security group changes when you rename the host security group.
some HDS storage systems, an additional “nickname” attribute is available to be set on the HSG and its value is stored on the device itself. The management server uses the “name” attribute instead of the “nickname” attribute because not all HDS storage systems support setting the “nickname” attribute. HP MSA and EVA Storage Systems • You can have one initiator per host security group • You can have 0 to multiple volumes in a host security group. • A host security group spans all ports on the array.
• The initiators used in a host security group must be registered with the array. • Any given HSG is assigned to only one storage port.
NOTE: The following two features are only available when accessed from Provisioning Manager. • View all host security groups - Click the All category in the tree. All the host security groups appear in the right pane. • View only host security groups assigned to a certain port - Click a port in the tree. The host security group assigned to the port appears in the right pane.
be set on the HSG and its value is stored on the device itself. The management server uses the “name” attribute instead of the “nickname” attribute because not all HDS storage systems support setting the “nickname” attribute. • You cannot use the management server to add a host to a “Host Group”. For example, you cannot have nested host groups. • In releases previous to build 4.0, host security groups were only supported for HDS storage systems.
• / • * • ? • \ • \\ • \t • \n • \b 2. (Displayed if applicable) Select the port you want associated with the host security group. This port should contain your LUNs. NOTE: Each type of storage system handles ports for HSGs differently. See ”Rules for Creating Host Security Groups” on page 329. 3. (HDS storage system) Click the Options button to the right of the Host Mode field. Select a host mode resembling the port settings for your environment and then click OK.
1. To add a volume to the host security group, click the Add button in the upper-right corner of the window. 2. Select a volume. Then, do one of the following: • If you want the unit number to be selected automatically by the server, leave the Auto-Select option selected. • If you want to choose a unit number, deselect the Auto-Select option and enter the unit number in the Unit Number field at the top of the window.
NOTE: Each type of storage system handles ports for HSGs differently. See ”Rules for Creating Host Security Groups” on page 329. 3. (Only HDS storage system) Click the Options button to the right of the Host Mode field. Select a host mode resembling the port settings for your environment and then click OK. If your host mode is not listed, type it in the Host Mode field. 4. (Only HDS storage systems) If your storage system supports a second host mode, type the second host mode in the Second Host Mode field.
• If you want to choose a unit number, deselect the Auto-Select option and enter the unit number in the Unit Number field at the top of the window. Then, click Add. Click Close to exit the window. NOTE: Keep in mind that for Engenio storage systems LUN numbers cannot be duplicated, and that the management server can use an existing LUN number if the access mode is “No Access” for the created LUN. CAUTION: Removing an HBA can cause hosts that are using it to lose access to their storage.
2. Copy smi.ProvisioningIbmEss.hostConnectionProfile. How you copy the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, select the text and then right-click the selected text. Then, select Copy. 3. Return to the Advanced page (Options > Storage Essentials > Manage Product Health. Then, click Advanced in the Disk Space tree). 4. Paste the copied text into the Custom Properties field. How you paste the text depends on your Web browser.
• ”Issues Specific to HP Storage Systems” on page 345 • ”Issues Specific to Engenio Storage Systems” on page 345 Issues Specific to CLARiiON Storage Systems The following issues are specific to CLARiiON® storage systems: • ”Make the Management Server a Privileged User for CLARiiON” on page 341 • ”EMC Navisphere CLI Is Required” on page 341 Make the Management Server a Privileged User for CLARiiON Before you can provision a CLARiiON storage system, you must configure it to recognize the management server a
• ”“Process Has an Exclusive Lock” Message” on page 342 • ”Some EMC Volumes, Their LUNs and LUN Maskings Are Hidden” on page 343 About Provisioning on EMC Symmetrix Storage Systems EMC ships its Symmetrix storage system with volumes already created. When the software first discovers an EMC Symmetrix storage system, it assumes the devices on the Symmetrix storage system are volumes. This software refers to the term “device” to define a piece of hardware in the storage network.
If a provisioning failure has caused the Symmetrix storage system to remain locked, you are alerted to this situation in Event Manager and on the Properties tab. You may receive a message resembling the following: Unable to end device masking session. Symmetrix '000001835005700' may be locked.
Unable to Provision When HDS CruiseControl Is Enabled When HDS CruiseControl is enabled on an HDS array, such as an HDS Lightning 9980V, you are unable to do provisioning. You might also receive the following error message: An error was encountered during this operation. Some of the operation may have been applied to the storage subsystem. A refresh of the storage subsystem is recommended. "The LDEV is HIHSM reserved; cannot be used in a LUSE". To use the Provisioning tool, disable HDS CruiseControl.
example, assume you want the management server to wait an hour. You would assign 3600000 to cimom.provider.hds.ProvisioningTimeout, since 3600000 milliseconds is one hour. cimom.provider.hds.ProvisioningTimeout=3600000 7. When you are done, click Save. 8. Restart the service for the management server for your changes to take effect. While AppStorManager is restarting, users are not able to access the management server. The AppStorManager service must be running for the management server to monitor elements.
Issues Specific to Engenio Storage Systems This section describes the following for Engenio: • ”Creating and Deleting Storage Pools” on page 346 • ”Creating and Deleting Storage Volumes” on page 346 • ”Creating a LUN” on page 346 Creating and Deleting Storage Pools For Engenio, a storage pool is the same as a volume group. Create at least one storage pool before provisioning a volume.
ports on two controllers), one for each port on each controller. The creation of a LUN maps the volume to all the available ports on an Engenio storage system. Storage Essentials 5.00.
348 Provisioning Manager
10 Managing Backups IMPORTANT: Depending on your license, Backup Manager may not be available. See the “List of Features” to determine if you have access to Backup Manager. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
• Master Server Application - A backup application serving as the master in a backup hierarchy is referred to as a Master Server Application. A Master Server Application is responsible for managing other media servers. • Master Host - The managed host that has the backup application running as the Master Server Application is referred to as the master host. The IP address of the master host must be specified in Step 1 of Discovery before the Master Server Application can be discovered.
IMPORTANT: Make sure you have at least 500 MB if you are using the host as a master backup server in a large environment, for example 300 clients, 25,000 jobs and 500,000 images. 3. Schedule backup collection for your master servers as described in ”Scheduling Backup Collection for Master Servers” on page 174 Accessing Backup Manager To access Backup Manager, click Tools > Storage Essentials > Backup Manager or click Tools > Storage Essentials > Home. Then, click Backup Manager in the left pane.
Backup Manager displays the following information for each job the master server performed: • Job ID - The identifier assigned to the job. • Client - The name of the client • Backup Policy • Schedule • Status - The status of the backup, successful, partial, or failed. • Start Time - Displays the starting time and date of the backup. • End Time - Displays the ending time and date of the backup. • Duration - The amount of time in seconds it took for the backup of the backup.
The Backup tab gives an at-a-glance view of the backup coverage for the selected element. You can choose the period for the coverage and review the jobs and corresponding policy for the backup jobs executed for that period. Click a cell to review detailed information in the right pane. A splitter bar is placed between the left and right pane so you can resize the work area. If the selected cell represents an executed job, the right pane displays job details.
NOTE: Before you can e-mail a report, you must make the management server aware of an e-mail server. See ”Setting Up E-mail Notification” on page 154. 6. To learn more about scheduling the e-mailing of reports, see ”Adding an E-mail Schedule for a Report” on page 436. Determining if You Have Enough Media to Run a Backup If you are performing many and/or large backups, you probably want to make sure you have enough media to run a backup.
• Available • Allocated • Frozen • Suspended You can also set up a policy that will notify you when the number of available media for a storage pool is running low. For example, you could create a policy that sends you an e-mail when the number of available media for a storage pool is less than two. See ”Creating a Utilization or Backup Policy” on page 533.
The following table provides a brief description of the buttons and menus in the main toolbar in Backup Manager. This toolbar appears at the top of the screen in Backup Manager. Table 52 About the Toolbar in Backup Manager Icon Description Saves the current topology or summary page, so that when you return to Backup Manager, the saved layout or summary is restored. This option can be especially useful if you have moved elements in the topology and you want to keep their current location.
Table 52 About the Toolbar in Backup Manager (continued) Icon Description * Lets you move the entire topology at once. Click the Pan button ( ) and then click any place in the topology. Drag the mouse to a new location. Opens a new window containing the topology. This feature lets you view different domains of the topology at once. * See ”About the New Window Option” on page 286 for more information Lets you change the topology layout. See ”Changing the Topology Settings” on page 358.
Table 53 Toolbar for Charts (continued) Icon Description To switch the X and Y axes in a chart, enable the Invert Chart option. Information appearing on the X axis appears on the Y axis and vice versa. To change the chart displayed, select another chart from the Title drop-down menu. See ”About the Summary Backup Charts” on page 364 for more information. To change the period displayed in the chart, select a period from the Period drop-down menu.
NOTE: To restore the layout to the default setting, click the Default button. To change the layout settings: 1. Access Backup Manager as described in ”Accessing Backup Manager” on page 351. 2. Click the Display Layout Settings Dialog button ( ). 3. Select one of the following directions: • Horizontal • Vertical 4. Select one of the following alignments: • Left • Right • Center 5. Change the horizontal spacing by typing a new number in the Horizontal Spacing field. 6.
Table 54 About the Right-Click Menu Options on the Topology Tab (continued) Right-Click Menu Option Description Show Policies Displays policies for the selected element. See ”About the Policies Tab” on page 294. Show Collectors Displays report collectors for the selected element. See ”About the Collectors Tab” on page 293. Show Chargeback Displays chargeback for the selected element. See ”About the Monitoring Tab” on page 294.
Table 54 About the Right-Click Menu Options on the Topology Tab (continued) Right-Click Menu Option Description Add Virtual Application Lets you add a virtual application so you can monitor it. A virtual application is a placeholder you create for an application. For example, you could create a virtual application for an application that was created just for your company. See ”Creating a Virtual Application” on page 289.
Table 55 About the Right-Click Menu Options on the Summary Tab (continued) Right-Click Menu Option Description Show Details Displays additional information about the data point you right-clicked. See Table 56 on page 363. The following table explains what is displayed when you click the Show Details right-click menu option on the Summary tab.
NOTE: When additional information is not available for a data point, Show Details is disabled. Table 56 Obtaining Additional Information from a Chart on the Summary Tab Right-click a bar in the following chart and select Show Details... To view the Jobs tab with the following... Service Level Agreement Clients that were backed up. The failures are displayed first. To obtain details about a job, select the job in the Job tab and then expand the View the Details pane on the far right.
About the Summary Backup Charts Backup Manager displays six summary backup charts on the Summary tab by default, and it offers many of other charts. To learn how to display these other charts and/or modify the default charts, see ”Modifying Summary Backup Charts” on page 371. Table 58 Backup Manager Summary Charts View Available to Backup Elements Description Servers Backup Applications This chart displays the servers Backup Manager monitors.
Table 58 Backup Manager Summary Charts (continued) View Available to Backup Elements Description Backup Volume • Backup Applications This chart displays the backup volume of all backup applications in gigabytes. This chart can also display the backup volume of a master server. • Master Server Window Utilization • Backup Applications • Master Server This chart displays the number of hours it takes for all backup jobs on a server to run.
Table 58 Backup Manager Summary Charts (continued) View Available to Backup Elements Description Servers with Fewest Available Media • Backup Applications This chart displays the top five master servers with the lowest number of media in the Available state. The chart displays the following: • Master Server • Allocated • Frozen • Suspended • Available See ”Glossary” on page 633 for a definition of these terms.
Table 58 Backup Manager Summary Charts (continued) View Available to Backup Elements Description Media Master Server This chart displays the media attached to a backup server. The chart displays the following: • Media ID - The media identifier. • Media Pool - The media pool to which the media belongs. • Usage Count - How often the media is used in the specified time. • Retention - How long its retention. • State - Lets you know whether the media is full, available, or active.
Table 58 Backup Manager Summary Charts (continued) View Available to Backup Elements Description Media Utilization Master Server This chart displays the following for the media available to the master server: • Available Media - The number of available media. • Allocated* - The number of allocated media. • Frozen* - The number of frozen media. • Suspended* - The number of suspended media. *See ”Glossary” on page 633 for a definition of these terms.
Table 59 About the Tabs in the Lower Pane of Backup Manager (continued) Tab Element Type Description Servers • Master Servers This chart displays the servers Backup Manager monitors. The chart displays the following for each server: • Media Servers • Volume - The size of the volume backed up in kilobytes. • Jobs - The number of backup jobs that have run in the specified time. • Failed - The number of failed jobs within the specified time.
Table 59 About the Tabs in the Lower Pane of Backup Manager (continued) Tab Element Type Description Jobs • Master Servers This chart displays the jobs assigned to a backup server. The chart displays the following: • Media Servers • Job ID - The identifier for the job. • Client - The DNS name of the computer on which the job is taking place. • Backup Policy - The name of the backup policy. • Schedule - The name of the schedule for the job. • Status - The status of the job.
Table 59 About the Tabs in the Lower Pane of Backup Manager (continued) Tab Element Type Description Media Pool • Master Servers This chart displays the media pools containing the select element. The chart displays the following information: • Media Servers • Tape Libraries • Media Pool - The media pool to which the media belongs. • Master Server - The name of the master server in the media pool. • Library - The name of the library in the media pool.
When you look at the Summary Settings page, you will notice that a grid is displayed with a description of a chart in the grid, as shown in the following figure. The grid on the Summary Settings page corresponds to the grid on the Summary tab in Backup Manager. To change a chart, select a grid on the Summary Settings page and change the settings as described in the steps in this section. The top four grids on the Summary Settings page correspond to the top four charts on the Summary tab.
5. From the Backup Element menu select one of the following: • Backup Applications - The chart includes the results from all backup applications. • A specific backup element - The chart includes the results from only the backup application you selected. 6. Select the type of chart you want from the View drop-down menu. To learn more about the charts, see Table 58 on page 364. 7. Select one of the periods from the Period drop-down menu. 8. Click OK. The Summary page is updated with your changes.
374 Managing Backups
11 Path Provisioning IMPORTANT: Depending on your license, Path Provisioning may not be available. See the “List of Features” to determine if you have access to Path Provisioning. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
the array show that the masking to the host initiator took place, but the volume is still not mapped to a storage port. • Other parts of the product, such as: • Application Viewer • Capacity Manager • Performance Manager • Backup Manager • Provisioning Manager • System Manager Keep in mind the following: • Path Provisioning runs within a Java applet.
How Path Provisioning Works When you select a storage system in Path Provisioning, the management server displays all the information relevant for provisioning with respect to the storage system selected.
How to Use Path Provisioning All the provisioning tasks are centralized on one screen. You select the provisioning actions you want to take by selecting a system action from the System Action combo-box in the upper-left corner. The following options are available: • Volume Creations + LUN Security + Zone Operation- First you create a meta volume. Second, you map a meta volume to a Fibre Channel port and host HBAs (HSG). Third, you create a zone.
Table 61 Overview for Path Provisioning (continued) Step Description Where to Find Additional Information 4 Execute the job. The job does not run See ”Executing Provisioning Jobs” on page 400. until the Execute Job ( ) button is clicked. Once this button is clicked the job is saved in the management server database.
2. In the right pane, click Start Here on the Path Provisioning tab. 3. Select the following from the System Action combo-box: Volume Creation + LUN Security + Zone Operation Step 1 - Select Storage System 1. Wait for the management server to load the storage systems into the Storage System panel. 2. Select a storage system on which you want to create the metavolume. NOTE: The S heading in the Storage Systems pane means that only a single selection is allowed.
Step 2 - Select a Host 1. Wait for all data to be loaded. You can tell if all data has been loaded when you see the following messages: • Loading host data finished. • Loading volume data finished. • Loading HSG data finished. • Loading zone data finished. The Step 2 button appears disabled until data has been loaded 2. Select a host that is reachable. Keep in mind the following: • To create a provisioning job for multipathing, click the button above the Host pane. Then, select the option for multipathing.
• Unmapped – The volume is not exposed to the storage port. The management server puts all unmapped volumes in this category when it first discovers an array. • Free Extents – Available free extents that can be used to create a meta volume. You can create meta volumes on EMC Symmetrix and LUSE on HDS storage systems. To create a meta volume or LUSE, select multiple free extents under the Free Extents node in the Volume pane.
management server assumes you want to select a pre-existing zone or create one manually when you deselect the Automatically Configure Zoning option. • To reuse a zone - Select a zone in the Zone pane and then click Step 5. Expand a fabric node to view its zones. • To create a zone - Select a fabric in the zone pane, click the the following topic for more information. If you see the Table 62 button, type a zone name. See icon, the fabric cannot be reached.
• The name can have a maximum of 64 characters. • The first character of a zone name must be a letter (A-Z, AZ). • A zone name cannot contain spaces. • Valid characters are a-a, AA, 0-9, caret (^), dash (-), underscore (_), and dollar sign ($). • All names must be unique and may not differ by case. For example, myzone and MyZone are considered to be the same zone. 4. Click OK. The new zone is added to the Zone pane. 5. Click the Create Job button. The job is added to the bottom pane. 6.
NOTE: The S heading in the Storage Systems pane means that only a single selection is allowed. 6. Click the Step 1 button underneath the pane. Information about the selected storage system, such as its model and IP address is displayed below the Storage System pane. 7. In the Volume pane, select multiple free extents under the Free Extents node in the Volume pane. The meta volume containing the selected free extents is created when the job runs.
• If you want the job to execute at a later time, schedule the job as described in the topic, ”Scheduling Provisioning Jobs” on page 399. LUN Security Keep in mind the following: • If you have options still selected from a previous job, just clear the options you do not want in your next job. For example, assume you just mapped a volume to a port. Now you want to map the a different volume on the same host to another port. Just clear the Volume and LUN panes. To clear a pane, click the button.
Information about the selected storage system, such as its model and IP address is displayed below the Storage System pane. The Host pane becomes populated. Notice in the following pane that some hosts have a red X over their icon. This means the host is not accessible. Figure 56 Selecting a Storage System Step 2 - Select a Host 1. Wait for all data to be loaded. You can tell if all data has been loaded when you see the following messages: • Loading host data finished. • Loading volume data finished.
• To create a provisioning job for multipathing, click the button above the Host pane. Then, select the option for multipathing. When you select this option, you must select the same host for both paths. See ”Host Customize Dialog” on page 404 for more information. • To automatically create a zone if a zone does not meet a preset criteria, click the button above the Zone pane. Then, select the option, Automatically create new zone if no existing zone containing HBA and storage system ports is detected.
Step 3 - Select a Volume To select a volume: 1. In the Volume pane select mapped and unmapped volumes. You can select multiple volumes on Windows computers by pressing the Ctrl key as you select the volumes. • Mapped - There are two types of mapped volumes: • Masked - The volume is exposed to the storage port and to the host. • Unmasked - The volume is exposed to the storage port, but not to the host. • Unmapped – The volume is not exposed to the storage port.
4. Do one of the following: • If you want the job to execute now, click the Execute Job ( ) button • If you want the job to execute at a later time, schedule the job as described in the topic, ”Scheduling Provisioning Jobs” on page 399. Zone Operation Keep in mind the following: • If you have options still selected from a previous job, just clear the options you do not want in your next job. For example, assume you created a zone.
Information about the selected storage system, such as its model and IP address is displayed below the Storage System pane. The Host pane becomes populated. Notice in the following pane that some hosts have a red X over their icon. This means the host is not accessible. Figure 57 Selecting a Storage System Step 2 - Select a Host 1. Wait for all data to be loaded. You can tell if all data has been loaded when you see the following messages: • Loading host data finished. • Loading HSG data finished.
• To automatically create a zone if a zone does not meet a preset criteria, click the button above the Zone pane. Then, select the option, Automatically create new zone if no existing zone containing HBA and storage system ports is detected. Select one of the options listed. See ”Zone Customize Dialog” on page 405 for more information about setting the criteria. After you set the criteria, select a host and click Step 2.
If you see the Table 63 icon, the fabric cannot be reached. Zone Icons Icon Description Its location on the page determines its use: • Displayed above Zone pane - Button for creating zones. • In Zone pane - Icon for a zone. Zone Alias Port IMPORTANT: (McDATA switches only) Path Provisioning looks for the names of the active zone set and of the active zones and all of their saved counterparts in the zoning library in EFC Manager. The provisioning job only occurs if those names match.
4. Click OK. The new zone is added to the Zone pane. 5. Click the Create Job button. The job is added to the bottom pane. 6. Do one of the following: • If you want the job to execute now, click the Execute Job ( ) button • If you want the job to execute at a later time, schedule the job as described in the topic, ”Scheduling Provisioning Jobs” on page 399.
Information about the selected storage system, such as its model and IP address is displayed below the Storage System pane. The Host pane becomes populated. Notice in the following pane that some hosts have a red X over their icon. This means the host is not accessible. Figure 58 Selecting a Storage System Step 2 - Select a Volume To select a volume: 1. In the Volume pane select mapped and unmapped volumes.
keyboard and selecting free LDEVS. When you select free extents, they must of the same type. For example, on Symmetrix, you cannot select a mirrored volume and a BCV (business continuous volume) to create a meta volume. When you first discover a storage system, no free extents are displayed. This is because the management server puts all unmapped volumes into the “unmapped” category for the list of volumes by default. To move a volume to the free extent node, delete the unmapped volume.
• Symmetrix storage systems: LUN numbers must be between 1 and 8190. You can enter a LUN number for a volume by placing the cursor under the LUN Number column, as shown in the following figure. Click OK when you are done. The window displayed in the following figure is displayed if your storage system requires you to provide a LUN number. Figure 59 Specifying a LUN Number Adding a Host IMPORTANT: Make sure the added host is physically connected to the network before the scheduled job runs.
Creating a Host Security Group You cannot assign the host mode for an IBM storage system in the user interface. You must modify an internal property to set the host mode. See ”Setting the Host Mode for IBM Storage Systems” on page 340 for more information. Keep in mind the following: • Each storage system handles host security groups differently. See ”General Provisioning Issues” on page 340.
• \ • \\ • \t • \n • \b 8. (HDS) Select the host mode for the host security group. 9. (HDS) Provide a second host mode if applicable. 10.(HDS) Click the Create Host Security Group button. 11.For non-HDS storage systems, click OK. The host security group is created in the LUN pane. Scheduling Provisioning Jobs Keep in mind the following: • You must have already created a provisioning job. See ”About Path Provisioning” on page 375 for more information. • You cannot delete a job once it has started.
If you are unable to click the Create Job button, verify all required Step buttons have been clicked. If you are still unable to click the Create Job button, verify if the Host Customize Dialog ( ) is selected for multipathing. If the Host Customize Dialog is set for multipathing, select the second path from the Path combo box and repeat the provisioning steps, except the steps for selecting a system action, storage system and host. See ”Host Customize Dialog” on page 404. 2.
The management server can detect when the required volume and/or zone has already been created. For example, assume you created a job to create a volume. The next few jobs use this volume. These jobs will determine if the volume has been created, before creating the volume. You can schedule a job to start now or at a pre-determined time in the future: • To start a job now - Click the Execute Job button ( ) button before the job is scheduled.
Deleting Multiple Jobs IMPORTANT: You cannot delete a job once it has started. A job has started if it has a state of “started.” To delete jobs, select the jobs in the M column and then click the have been removed, as shown in the following figure. icon until all jobs You can deselect jobs by clicking the check marks or by clicking the Clear Selection ( the Provision Jobs pane.
Using Multipathing with Path Provisioning You can use provisioning with multipathing. Set the Host Customize Dialog to the multipathing option. Then, repeat the provisioning steps for each path, as described in the following steps: 1. Select one of the following system actions: • Volume Creation + LUN Security + Zoning - First you create a meta volume. Second, you map a meta volume to a Fibre Channel port and host HBAs (HSG). Third, you create a zone.
Storage System Customize Dialog The Storage System Customize Dialog lets you specify the type of storage systems displayed in the Storage System pane. Select one of the following: • Show all available storage systems - All storage systems are displayed. • Show storage system with available raw storage - Only storage systems with available raw storage are displayed. • Show storage system with available unmapped storage - Only storage systems with available unmapped storage are displayed.
• *Most unused ports (the number of LUNs assigned) - Assigns a volume to a FA port based on how often a port is used. Unused ports have a better chance of having a volume assigned to them as compared to frequently used ports. This option helps you spread out the traffic. • *Linked port if there is any - A linked port is more likely to be assigned a volume. The management server looks for any storage system port that is zoned to the selected host bus adapter.
IMPORTANT: (McDATA switches only) Path Provisioning looks for the names of the active zone set and of the active zones and all of their saved counterparts in the zoning library in EFC Manager. The provisioning job only occurs if those names match. About the Use Switch Port Zoning Mode Option By default Path Provisioning creates zones through Worldwide Names, which means it looks for a port on a host and a port on a storage system to create the zone. Zoning through WWNs is not dependent upon the switch.
• To create a zone - Select a fabric in the zone pane, click the the following topic for more information. If you see the Table 64 button, type a zone name. See icon, the fabric cannot be reached. Zone Icons Icon Description Its location on the page determines its use: • Displayed above Zone pane - Button for creating zones. • In Zone pane - Icon for a zone. Zone Alias Port To create a zone: 1. Select a fabric in the zone pane. 2. Click the button located above the Zone pane. 3.
408 Path Provisioning
12 Event Management This chapter describes the following: • ”About Event Manager” on page 409 • ”Viewing Event Details” on page 413 • ”Clearing Events” on page 415 • ”Configuring the Clearing of Events” on page 415 • ”Configuring the Deletion of Events” on page 416 • ”Deleting Events” on page 417 • ”Sorting Events” on page 417 • ”Changing the CLARiiON Event Polling Interval” on page 417 • ”Brocade Events” on page 418 • ”Filtering Events” on page 420 • ”Enabling the Rank Column in Event Manager” on page 427
NOTE: The name for the management server is displayed for . Access Event Manager by doing one of the following: • To view events from all elements the management server monitors, click Tools > Storage Essentials > Home. Click Event Manager ( ) in the left pane. • To view events from a specific element: To view events for a specific element: • Double-click the element in Capacity Manager, Performance Manager or System Manager and then click the Events tab.
Event Manager does not support events from all discovered elements. See the following table for more information about which elements Event Manager supports.
1Not 2 all events that show up in the webtool appears in Event Manager. Not all events that show up in EFCM will appear in Event Manager. 3Need 4 to configure the switch or proxy to send traps to the management server. Also applies to Sun StorEdge switches. 5Also applies to EMC Connectrix switches. 6 To receive events from NetApp filers, you must add the management server address as an SNMP trap host on the NetApp filer.
• The management server does not receive SNMP v1 traps from Sun StorEdge switches that have the SNMPv1 agent. • If you want the management server to be able to receive events from a NetApp Filer, you must add the IP address of the management server CIMOM to the NetApp configuration. The management server CIMOM runs on the same computer running the management server by default. • Event Manager displays events from all elements regardless of the user’s organization.
1. Access Event Manager as described in ”About Event Manager” on page 409. 2. Do one of the following in Event Manager: • Right-click an event, and select Event Details from the drop down menu, as shown in the following figure: Figure 62 Right-clicking Event Details • In Event Manager click the event summary, as shown in the following figure. Figure 63 Accessing Event Details The event details are displayed.
NOTE: Events listed in Event Manager may not be attributed to the correct source until Discovery Data Collection/Get Details has completed. Clearing Events You might want to mark an event as “cleared” if you have already reviewed it. Use one of the following techniques to mark an event as “cleared”: • Click the Clear this Event button in the Event Details pane, which is accessible by clicking the summary text link.
Table 67 Default Settings for Clearing Events (continued) Severity Level Default Time Delay to Clear the Event (Hours) Minor 1 Major Never Critical Never To change the default time delay to clear an event, do the following: 1. Access the Events page by clicking Configuration > Events. 2. Do one of the following: • If you never want an event of the specified severity level marked as “cleared,” select the Never option next to the severity level.
3. Click the Save Changes button. Deleting Events To delete an event: 1. (Optional) Select the events you want to delete in Event Manager. 2. Click the Delete button at the top of the screen. 3. Select one of the following options in the Select Events to Delete window: • Delete selected events - All selected elements are deleted. • Delete all events - All elements are deleted, regardless of your filter settings.
IMPORTANT: Do not set a very long time interval. The management server does not become aware of events occurring on CLARiiON storage system until it polls the storage system. For example, assume you set the polling interval to every two days. A serious issue could occur on the first day, but you would not know about it until the second day because you set a long time interval. To change the polling interval: 1. Click Options > Storage Essentials > Manage Product Health.
NOTE: Events regarding firmware downloads are removed from the following table since the management server cannot be made aware of those events. Table 68 Brocade Switch Events *Code Event Severity Level *Name Description 0 Minor EV_OBJ_CHANGED A physical fabric object (switch port or fabric) has changed state. 1 Major EV_OBJ_DELETE One or more physical fabric objects (device port, switch, or fabric) have disappeared.
Table 68 Brocade Switch Events (continued) *Code Event Severity Level 12 Major *Name EV_PLATFORM_CHANGE Description The platform database has changed. *This information does not appear in the event description, but it appears here for additional information. Supported Brocade Events The Event Manager displays the following events from Brocade switches: • RSCN events: Events about the state of the switch, such as it being offline.
You could do the following: • Set the severity level to critical and major by clicking the Custom button next to the Show Severity field. • Type WickedWitch in the Summary Text or Element Name field. Once you set all of your filters, you would click the Apply Filters button. Selecting a Severity Level You can filter the events, so you only view events that are of a specified severity level. For example, you can specify that Event Manager displays only events with a Critical severity level.
Table 69 Severity Levels (continued) Severity Level Description Critical Provides a message to indicate a major problem. For example, for a Brocade switch a device connected to the switch has gone off line. All Displays all events, regardless of severity level. All But Clear Displays all events, except for those marked cleared.
NOTE: The Show Element Type drop-down menu is not available if you accessed Event Manager by double-clicking an element in Capacity Manager, Performance Manager or System Manager and then clicking the Events tab. Table 70 Element Types Element Type Description Applications Lists only events from applications, such as Microsoft Exchange and Oracle. Host Lists only events from hosts. Switch Lists only events from switches. Storage System Lists only events from storage systems.
5. Click the Apply Filters button. Event Manager displays the events that meet the criteria selected in the Event Filters pane. Filtering Events by Summary Text or Element Name You can filter events by summary text or element name. For example, assume you are having problems with a host named WickedWitch. You could specify that only events from WickedWitch are displayed in Event Manager.
interest to an administrator who is concerned with primarily important and critical SAN events. The administrator can filter out these “informational” events. • Increased system performance - Storage Essentials can generate a large number of events that appear in HP SIM. Certain events can be filtered out in order to limit the communication traffic. Events can be filtered based on the following: • Event severity - Use the tag to filter out events by severity.
• INFORMATIONAL • WARNING 7. To filter events by element type, use the tag. For example, to prevent events from hosts from being forwarded to HP SIM, enter the following between the tags: HOST You can filter out the following element types: • HOST • SWITCH • STORAGE_SYSTEM • TAPE_LIBRARY 8. To filter events by name, use the tag.
3. Copy the calculateBusinessCost property. How you copy the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, select the text and then right-click the selected text. Then, select Copy. 4. Return to the Advanced page (Options > Storage Essentials > Manage Product Health. Then, click Advanced in the Disk Space tree). 5. Paste the copied text into the Custom Properties field. How you paste the text depends on your Web browser.
428 Event Management
13 Running Reports IMPORTANT: Depending on your license, Reporting may not be available. See the “List of Features” to determine if you have access to Reporting. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
• Excel - The software displays the report in Microsoft Excel, providing you have a copy of Microsoft Excel already installed. • XML - The software displays the report in the XML format. It also provides some reports with pie charts. The displays a graphic. icon next to the report name indicates the report The software provides reports for the following: • Global - These global-wide reports provides data gathered from multiple management servers.
• Recent - Lists the last 10 reports viewed. This option is not displayed when you first access Reporting. Troubleshooting Reporting • Reporting does not provide reports for NetApp filers. • Reports in general contain no data or incomplete/incorrect data while the report cache is being refreshed. See ”Refreshing a Report” on page 433. • Some reports display data trends for several days in the future. For example, assume you run a report to gather information from the last three days.
Accessing Reporting To access Reporting, click Reports > Storage Essentials > Manage Reports or click Tools > Storage Essentials > Home. Then, click Reporting in the left pane. Viewing Reports Collectors gather information for reports. If you stop a collector, its reports are not updated. You might want to verify a collector is running if you are having difficulty viewing a report or you believe the report is not displaying the latest information.
1. Access the Collectors page by doing one of the following: • Clicking an element in Application Viewer, and then clicking the Collectors tab. • Double-clicking an element in System Manager, and then clicking the Collectors tab. • Clicking an element in Chargeback Manager, and then clicking the Collectors tab. 2. To change a collector's start time, modify the time and date entered in the Next Scheduled Run field.
• PDF - The software displays the report in Adobe Acrobat, a good option if you need to print the report. The software assumes you already have Adobe Acrobat Reader installed on your computer. To obtain a copy of Adobe Acrobat Reader, go to http://www.adobe.com. • Excel - The software displays the report in Microsoft Excel, providing you have a copy of Microsoft Excel already installed. • XML - The software display the report in the XML format.
Filtering Data in Global Reports IMPORTANT: Depending on your license, Global Reporter may not be available. See the “List of Features” to determine if you have access to global reports. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). If your license lets you access global reports but you cannot access them, contact your system administrator to make sure your role lets you view and/or set up global reports.
To send a report by e-mail: 1. Access Reporting as described in ”Accessing Reporting” on page 431. 2. Expand the tree in the middle pane, and click the report you want to send by e-mail. 3. Click the E-mail Report button. You are told the E-mail server is not enabled if you have not set up e-mail notification. You must set up e-mail notification before you can send e-mail a report. See ”Setting Up E-mail Notification” on page 154. 4. In the top field, type the recipient's e-mail address.
outdated data. It would make more sense to schedule your report cache refresh at 7 a.m. and then schedule to send your reports soon afterwards. See ”Scheduling a Report Cache Refresh” on page 186. • The management server service must be running for users to receive e-mail notification. • Only the e-mail schedules created by the current user are listed. To view the e-mail schedules for all reports, click Reports > Storage Essentials > Report Configuration in HP Systems Insight Manager.
10.(Backup Manager reports only) From the Report Period drop-down menu, select the period of time you want displayed in the report. 11.In the Time to Run field, type the time you want to send the report. This time must be entered in the 24-hour format. For example, if you want a report sent at 2:15 p.m., you would type 14:15 in the Time to Run field. 12.Select one of the following options to determine how frequently you want to send the report.
about elements in OnlyHosts. Information about elements in other organizations would not be displayed. Figure 65 Selecting Organizations Used in This Report 15.Click Finish. The schedule is created. Editing an E-mail Schedule for a Report IMPORTANT: Only the e-mail schedules created by the current user are listed. To view the e-mail schedules for all reports, click Reports > Storage Essentials > Report Configuration in HP Systems Insight Manager. Then, click the Scheduled Deliveries tab.
The software verifies the address entered has a correct form. To send multiple addresses, separate each address with a comma (,), for example: john.example@appiq.com,jerry.example@appiq.com 7. In the Subject field, change the subject of the e-mail. 8. In the Message field, change a message describing the report. If you are e-mailing reports in bulk, you might want to let users know the e-mail is being sent by an automated process.
14.Select the organizations containing the elements you want used in the report. If you find all organizations selected, deselect the organizations containing the elements you do not want displayed in the report. Organizations you belong to and their children are displayed. Only elements belonging to selected organizations are displayed in the report you send. For example, assume you selected OnlyHosts, as shown in the following figure.
3. When the report is displayed in the right pane, click the Scheduled Deliveries tab in the right pane. 4. Click the button corresponding to the e-mail schedule you want to remove. Viewing E-mail Schedules for a Report IMPORTANT: Only the e-mail schedules created by the current user are listed. To view the e-mail schedules for all reports, click Reports > Storage Essentials > Data Collection > System Data in HP Systems Insight Manager. Then, click the Scheduled Deliveries tab.
• ”Designing Custom Reports” on page 445 • ”Integrating Custom Reports” on page 454 • ”Detailed Schema Information” on page 456 • ”Views from Previous Releases” on page 489 IMPORTANT: You must install Report Designer before you can create custom reports. Obtain a copy of Report Designer from your sales professional. Follow the installation instructions that accompany it. About Creating Custom Reports To create customized reports, you need a program for creating reports, such as Report Designer.
obtaining the latest data. The default refresh time is every six hours. The current and deprecated materialized views are provided at the end of this chapter. Configuring Report Designer to Work with the Management Server IMPORTANT: The steps in this section are for configuring Report Designer version 6.0. You can use data from the management server to create your custom reports.
where HostIP/DNS is the host IP address or DNS name of the host running the management server If Report Designer is running on the same computer as the management server, you can use localhost for the DNS name, as shown in the following example: jdbc:oracle:thin:@localhost:1521:APPIQ e. Type the following in the User Name field: Report_User This is the user name that is used to access the schema view in the management server database. This user has read privileges only for the schema views. f.
3. Click the Standard Report icon and then click Create. Figure 68 Choosing a Standard Report 4. Select the data you want in your report by selecting the corresponding materialized views (tables) displayed in the Data tab. Use the Report Categories table in ”About Creating Custom Reports” on page 443 as a guideline. For example, in the following figure, the MV_APPLICATIONVW table has been selected. System application data will be made available to the report, according to the Report Categories table.
want all data displayed in the report. When you are done, click Next. To find a definition of the listings in a table, see ”Detailed Schema Information” on page 456. Figure 69 Adding Tables for a Standard Report 5. When you are asked if Report Designer will create a new query, click OK. 6. If you selected more than one materialized views (tables) in the Data tab, you need to link common search criteria, such as the DEVICE_ID in one table to the DEVICE_ID of another table.
Refer to the online help for Report Designer for more information. When you are done, click Next. Figure 70 Linking Common Data in Tables for a Standard Report 7. Enter search criteria that will be used to generate the report. For example, let's assume you want the report to display information only about Oracle applications.
criteria that tells Report Designer to display data from Oracle applications. When you are done, click Next. Figure 71 Creating Search Criteria for Standard Reports 8. Select the data you want displayed in the report. Click the data source in the left and then click the arrow pointing right. Its report field appears in the Report fields pane. When you are done, click Next. The order of the report fields in the Report fields pane determines their sequence in the report.
the text in the AutoLabel column in the Report fields pane. To find a definition of the listings in a table, see ”Detailed Schema Information” on page 456. Figure 72 Deciding Which Data Should Appear in the Report 9. Select the fields in the left pane in the order you want them sorted in your report. Then, click the arrow pointing right. When you are done, click Next.
For example, in the following figure, information in the report will first be sorted by an application name. Let's assume you then selected APPLICATIONID. Applications would first be sorted by application name and then by their application ID. Figure 73 Sorting Information in the Report Storage Essentials 5.00.
10.Use the Style tab to determine the layout of the report. When you are done, click Finish.
The report template is displayed. You will not see any data reported, only placeholders, as shown in the following figure. Figure 75 Report Template Displayed 11.To view the report with its data, click the View tab. 12.The database for the management server must be running on the management server to be able to view active data in the report. Verify that the OracleOraHome92TNSListener service is running on the management server.
15.Refer to the online help for Report Designer for information on how to designer the reports. Figure 76 Clicking the View Tab Integrating Custom Reports After you are satisfied with your custom report, you must integrate it with the management server so that other users can access the report. You must first deploy the custom report to the management server. Then, you must integrate the report so that it is accessible from Reporting. Custom reports appear with their own icon in the reports tree.
2. Create a node for your custom reports. This node appears in the tree in Reporting. a. Create the directory %JBOSS4_DIST%\server\appiq\reports\customTreeNodes if it doesn't already exist b. Create an XML file in that directory for your tree node, for example, custom.xml. The management server uses this file to determine where to put the node for custom reports in the tree. c. Use a text editor, such as Notepad, to open the XML file you created in the previous step.
• SUPPORTS_ORGANIZATION_FILTERS if this property is set to true, the report supports organization filtering. If this property is set to false, the Organization Filters tab does not appear. If you leave omit SUPPORTS_ORGANIZATION_FILTERS the management server assumes you want to the report to support organization filtering. • TREE_NODE NAME is the name of the tree node you want the report to appear under.
Table 72 Description of the Report Views (continued) Materialized View Description (Tables) MVCA_BU_MEDIASUMMARY Provides summary information about the media. See Table 119 on page 486. MVCA_BU_JOBSUMMARY Provides summary information about jobs. See Table 120 on page 487. MVCA_BU_LIBRARYSUMMARY Provides summary information about libraries. See Table 121 on page 488. MVC_HOSTSUMMARYVW Provides summary information about hosts. See Table 73 on page 459.
Table 72 Description of the Report Views (continued) Materialized View Description (Tables) MVCA_FSRM_TOPNFILES MVCA_FSRM_AGEDFILEDETAILS Provides information about the age properties of files in File System Viewer. See Table 114 on page 484. MVCA_FSRM_LARGEDIRINFO MVC_STORAGEPOOLSUMMARYVW Provides summary information about storage pools. See Table 78 on page 462. MVC_STORAGESYSTEMSUMMARYVW Provides summary information about a storage system. See Table 77 on page 462.
Table 72 Description of the Report Views (continued) Materialized View Description (Tables) MVC_ZONEVW Provides information about zones. See Table 83 on page 467. MVC_PATHVW Provides path information. See Table 84 on page 468. MVC_SUBPATHVW Provides subpath information. See Table 85 on page 468. MVC_MULTIPATHVW Provides multipath information. See Table 86 on page 469. MVC_SWITCHCONFIGVW Provides switch configuration information. See Table 93 on page 472.
Table 73 MVC_HOSTSUMMARYVW (continued) Column Name Type Description STATUS NUMBER(38) Operation status (provide map here) IP VARCHAR2(16) Host IP DNS VARCHAR2(50) Host DNS Name Model VARCHAR2(256) Host Model Version VARCHAR2(256) Host Version number OS VARCHAR2(24) Host Operating System TOTALPHYSICALMEM NUMBER(38) Total physical memory NUMBERPROCESSOR Number Number of processors SUPPORTFLAG NUMBER(38) Support flag (unused now) BASETABLENAME CHAR(4) Name of the base table fo
Table 74 MVC_CARDSUMMARYVW (continued) Column Name DriverVersion BASETABLENAME Table 75 Type VARCHAR2(256) CHAR(4) Description Driver version Name of the base table for optional values MVC_HOSTVOLUMESUMMARYVW (logical volumes) Column Name Type Description LogicalVolumeID NUMBER(38) Storage Volume ID LogicalVolumeName VARCHAR2(256) Name of the logical volume DomainID NUMBER(38) Domain ID Description VARCHAR2(1204) Description HostID NUMBER(38) Container Host ID DeviceID VARCHAR2(254
MVC_STORAGESYSTEMSUMMARYVW Table 77 Column Name Type Description StorageSystemID NUMBER(38) Storage system ID StorageSystemName VARCHAR2(256) Storage system Name DomainID NUMBER(38) Domain ID Vendor VARCHAR2(254) Vendor Description VARCHAR2(1024) Description of the Storage System Status NUMBER(38) Operational Status (provide map here) IP VARCHAR2(16) Not used Model VARCHAR2(254) Model SerialNumber VARCHAR2(254) Serial Number Version VARCHAR2(254) Version StorageSystemStatu
Table 78 MVC_STORGAEPOOLSUMMARYVW (continued) Column Name Type Description TotalAvailableSpace NUMBER(38) Total available space in bytes CIMPoolID VARCHAR2(254) Reserved PoolType NUMBER(38) Pool Type (provide map here) StorageCapabilityInternalName VARCHAR2(254) Internal Name of the capability NoSinglePTOfFailure NUMBER(1) No single point of failure indication DefaultNoSinglePtOfFailure NUMBER(1) Default no single point of failure indication MinDataRedundancy NUMBER(18) Minimum data
Table 79 MVC_STORAGEVOLUMESUMMARYVW (continued) Column Name Type Description StorageCapabilityID NUMBER(38) Storage Capability ID VolumeDeviceID VARCHAR2(254) Device ID AccessType VARCHAR2(254) Volume access type Blocksize NUMBER(38) Size per block in bytes NumberOfBlocks NUMBER(38) Total number of blocks in the volume ConsumableBlocks NUMBER(38) Total number of consumable blocks SeqAccess NUMBER(1) Sequential access Availability VARCHAR2(254) Availability indication StatusInfo
Table 80 MVC_SWITCHSUMMARYVW (continued) Column Name Type Description Version VARCHAR2(254) Switch’s hardware version LoginName VARCHAR2(254) Login name for this Switch LoginPwd VARCHAR2(254) Login password for this Switch HardZoningCapability VARCHAR2(254) SoftZoningCapability VARCHAR2(254) ZoningInstalled NUMBER(1) MaxModuleNumber NUMBER(38) CurrentZoningEnforcement VARCHAR2(254) SwitchDomainID NUMBER(38) SwitchStatus VARCHAR2(254) SwitchState VARCHAR2(254) IPGateway VARCHAR
Table 81 MVC_PORTSUMMARYVW (continued) Column Name Type Description Description VARCHAR2(1024) Description Status NUMBER(38) Operational status (provide map) WWN VARCHAR2(32) Port WWN ContainerID NUMBER(38) Container ID of this port TargetPort NUMBER(38) Target Port ID (Never populated) Connected_To_WWN VARCHAR2(32) WWN of connected port Device_ID VARCHAR2(254) Port Device ID PortState VARCHAR2(254) PortStatus VARCHAR2(254) Physical_State VARCHAR2(254) Port_ID NUMBER(38) Po
Table 82 MVC_ZONESUMMARYVW (continued) Column Name Type ZoneType VARCHAR2(254) ProtocolType VARCHAR2(254) ReadOnly NUMBER(1) FabricID NUMBER(38) Fabric ID FabricWWN VARCHAR2(254) Fabric WWN FabricCName VARCHAR2(256) ZoneCapID NUMBER(38) Zone capability ID ZoneCapabilitiesName VARCHAR2(254) Name of the zone capabilities ZC_MaxName_length NUMBER(18) Name length limit MaxZoneSets NUMBER(18) Number of maximum zone sets MaxZones NUMBER(18) MaxZoneMembers NUMBER(18) MaxZonePerZon
Table 83 MVC_ZONEVW (continued) Column Name Type ZoneAlias VARCHAR2(256) Table 84 Description MVC_PATHVW Column Name Type Description PathID NUMBER(38) Path ID HostID NUMBER(38) Host ID on this path LogicalVolumeID NUMBER(38) Logical Volume ID DiskPartitionID NUMBER(38) Disk Partition ID if raw partition is present IsMounted VARCHAR2(5) (TRUE, FALSE) ContainerPathID NUMBER(38) Currently not in use ApplicationID NUMBER(38) Application ID for the application file ApplicationFi
MVC_SUBPATHVW (continued) Table 85 Column Name Type Description StorageVolumeID NUMBER(38) StorageSystemID NUMBER(38) LUN NUMBER(38) IsLocal VARCHAR2(6) FabricID NUMBER(38) MultipathDeviceID NUMBER(38) PathSwitchID NUMBER(38) MVC_MULTIPATHVW Table 86 Column Name Type Description PathID NUMBER(38) Path ID MultiPathDiskExtentID NUMBER(38) ID of multipath disk extent VolumeManagerVolumeID NUMBER(38) Volume Manager Volume ID VxvmDiskPartitionID NUMBER(38) ID of volume manager
Table 87 MVC_EVENTSVW (continued) Column Name Type Type NUMBER(38) SubType NUMBER(38) Probable_Cause_Description VARCHAR2(4000) Recommanded_Actions VARCHAR2(254) Correlated_Indications VARCHAR2(254) Type_Description VARCHAR2(254) Element_type NUMBER(38) Name VARCHAR2(256) Vendor VARCHAR2(254) Model VARCHAR2(254) Table 88 Description MVC_ORGANIZATIONVW Column Name Type Description ORGID NUMBER(38) ID from Organization table ORGNAME VARCHAR2(256) Organization name ORGDESCRI
Table 90 MVC_HOSTCAPACITYVW Column Name Type Description HostID NUMBER(38) Host ID VolumeID NUMBER(38) Logical Volume ID TimeStamp TIMESTAMP Time of data collection Total NUMBER(38) Total capacity in megabytes Used NUMBER(38) Used capacity in megabytes Free NUMBER(38) Free capacity in megabytes Table 91 MVC_STORAGESYSTEMCONFIGVW Column Name Type Description StorageSystemID NUMBER(38) Storage System ID CollectionTime TIMESTAMP(6) Configuration statistics collection time Mask
Table 92 MVC_STORAGEPOOLCONFIGVW (continued) Column Name Type Description CollectionTime TIMESTAMP (6) Configuration stats collection time MaskedMB NUMBER Masked Storage in megabytes ExportedMB NUMBER Storage exposed in megabytes UnexportedMB NUMBER Volume unexposed in megabytes AvailableMB NUMBER Available storage left on storage pool ProvisionedMB NUMBER Provisioned storage in megabytes TotalMB NUMBER Total storage in megabytes StorageCapability VARCHAR2(255) Storage pool capab
Table 95 MVC_DISKEXTENTSUMMARYVW Column Name Type Description DiskExtentID NUMBER(38) Disk Extent ID DiskEnxtentName VARCHAR2(256) Name of the extent DomainID NUMBER(38) Domain ID DiskExtentDescription VARCHAR2(1024) Description of the extent Status NUMBER(38) Operational status Access_Type VARCHAR2(254) Access type BlockSize NUMBER(38) Block Size Number_Of_Blocks NUMBER(38) Number of total blocks Consumable_Blocks NUMBER(38) Number of usable blocks StoragePoolID NUMBER(38)
Table 97 MVC_VOLUMEDISKDRIVEVW Column Name Type Description VolumeID NUMBER(38) Storage Volume ID DiskDriveID NUMBER(38) Disk Drive ID ExtentID NUMBER(38) Disk Extent ID Table 98 MVC_STORAGEPROCESSORSUMMARYVW Column Name Type Description SystemProcessorID NUMBER(38) Storage System Processor ID SystemProcessorName VARCHAR2(256) Name of the system processor DomainID NUMBER(38) Domain ID Vendor VARCHAR2(254) Vendor Description VARCHAR2(1024) Status NUMBER(38) IP VARCHAR2(16)
Table 99 MVC_DISKDRIVESUMMARYVW Column Name Type Description DiskDriveID NUMBER(38) Disk Drive ID DiskDriveName VARCHAR2(256) Name of the Disk Drive DomainID NUMBER(38) Domain ID OID VARCHAR2(254) Object ID of the Disk Drive Vendor VARCHAR2(254) Vendor Description VARCHAR2(1024) Description Status NUMBER(38) Operational status Model VARCHAR2(254) Disk Drive Model Name VARCHAR2(254) Name coming from disk drive CardID NUMBER(38) Card ID DiskDriveStatus VARCHAR2(254) Disk D
Table 100 MVC_DISK_EXTENTVW (continued) Column Name Type Description ContainerExtentID NUMBER Container Extent ID DiskID NUMBER Disk Drive ID Table 101 MVC_ASSETSUMMARY Column Name Type Description DOMAINID NUMBER(38) Domain ID ASSETID NUMBER(38) ID of the Asset depending on Assetclass for example if the assetclass is Host then this is host.
Table 101 MVC_ASSETSUMMARY (continued) Column Name Type Description STORAGETIERCOSTPERGB NUMBER(36,2) Asset storage Tier cost DEPARTMENTNO VARCHAR2(255) Asset department no DEPARTMENTNAME VARCHAR2(255) Asset department Name PERCENTAGEOWNED NUMBER(5, 2) Percentage owned by Department ADMINISTRATOR VARCHAR2(255) Asset maintained by VARCHAR2(255) Staff Name VARCHAR2(255) Staff PH# STAFFDEPARTMENT VARCHAR2(255) Staff Department STAFFEMAIL VARCHAR2(255) Staff E-mail STAFFNAME STAFFP
Table 101 MVC_ASSETSUMMARY (continued) Column Name Type Description RESELLER VARCHAR2(255) Asset Reseller COMMENTS VARCHAR2(4000) Comments NUMBER Asset Fixed cost tax per department per Year NUMBER Storage Fixed cost tax per department per Year ASSETFIXCOSTTAXPERDEPTPE RYEAR STORAGFIXCOSTTAXPERDEPT PERYEAR Table 102 MVC_APPLICATIONSUMMARYVW Column Name Type Description APPLICATIONID NUMBER(38) Application ID APPLICATIONNAME VARCHAR2(256) Application Name DOMAINID NUMBER(38) Doma
Table 103 MVC_UNITACCESSVW Column Name Type ID NUMBER(38) STORAGE_VOLUME_ID NUMBER(38) STORAGE_SYSTEM_PORT_ID NUMBER(38) HBA_PORT_ID NUMBER(38) ACCESS_MODE VARCHAR(254) INITIATOR VARCHAR(254) INITIATOR_FORMAT NUMBER(38) UNIT_NUMBER NUMBER(38) HOST_GROUP VARCHAR(254) HOST_GROUP_NAME VARCHAR(254) HOST_GROUP_MODES VARCHAR(1024) Description Application Core Views Table 104 MVCA_DBAPPCAPACITYVW Column Name Type DBApplicationID NUMBER(38) HostID NUMBER(38) CapacityType Varchar2
Table 105 MVCA_EXCHAPPCAPACITYVW Column Name Type ExchangeAppID NUMBER(38) HostID NUMBER(38) CapacityType Varchar2(7) Timestamp Timestamp StorageGroupID NUMBER(38) ExchangeFilePath Varchar(512) TotalMB NUMBER FreeMB NUMBER UsedMB NUMBER Table 106 MVCA_VIRTUALAPPCAPACITYVW Column Name Type VirtualAppID NUMBER(38) HostID NUMBER(38) Timestamp Date VirtualPath Varchar2(512) TotalMB NUMBER FreeMB NUMBER UsedMB NUMBER Table 107 Description Description MVCA_FSRM_VOLUMESUM
Table 107 MVCA_FSRM_VOLUMESUMMARYVW (continued) Column Name Type TotalDirectories NUMBER(38) TotalFiles NUMBER(38) DomainID NUMBER(38) Timestamp Timestamp(6) Table 108 MVCA_FSRM_AGESUMMARYVW Column Name Type AgeID NUMBER(38) VolumeID NUMBER(38) TotalFiles NUMBER(38) TotalSize NUMBER(38) Timestamp Timestamp(6) Table 109 Description MVCA_FSRM_EXTDETAILSUMMARYVW Column Name Type ExtName Varchar2(254) VolumeID NUMBER(38) TotalFiles NUMBER(38) TotalSize NUMBER(38) Timestamp
Table 110 MVCA_FSRM_DIRDETAILSUMMARYVW (continued) Column Name Type ParentKey NUMBER(38) DirName Varchar2(254) DirLSevel NUMBER(38) DirSize NUMBER(38) TotalSubDirectories NUMBER(38) TotalFiles NUMBER(38) VolumeID NUMBER(38) Timestamp Timestamp(6) Table 111 MVCA_FSRM_USERSUMMARYVW Column Name Type UserID NUMBER(38) FSID NUMBER(38) UserProvidederID Varchar2(254) UserName Varchar2(254) DirName Varchar2(254) Department Varchar2(254) Email Varchar2(254) Quota NUMBER(38) Do
Table 112 MVCA_FSRM_GROUPSUMMARYVW (continued) Column Name Type Contact Varchar2(254) Department Varchar2(254) Email Varchar2(254) Quota NUMBER(38) DomainID NUMBER(38) Table 113 MVCA_FSRM_TOPNFILES Column Name Type GroupID NUMBER(38) FSID NUMBER(38) GroupName Varchar2(254) DirName Varchar2(254) Contact Varchar2(254) Department Varchar2(254) Email Varchar2(254) Quota NUMBER(38) DomainID NUMBER(38) Table 114 Description Description MVCA_FSRM_AGEDFILEDETAILS Column Name
Table 115 MVCA_FSRM_LARGEDIRINFO Column Name Type VolumeID NUMBER(38) DirName Varchar2(256) DirSize NUMBER(38) TotalFiles NUMBER(38) TotalDirs NUMBER(38) Timestamp Timestamp(6) DomainID NUMBER(38) Table 116 MVCA_BU_MASTERSERVERSUMMARY Column Name Type MasterServerID NUMBER(38) MasterServerName Varchar2(256) HostID NUMBER(38) Vendor Varchar2(254) Description Varchar2(1024) Status NUMBER ProductName Varchar2(254) LicenseKey Varchar2(256) LicenseFeatures Varchar2(256) Do
Table 117 MVCA_BU_MEDIASERVERSUMMARY (continued) HostID NUMBER(38) Vendor Varchar2(254) Description Varchar2(1024) Status NUMBER ProductName Varchar2(254) LicenseKey Varchar2(256) LicenseFeatures Varchar2(256) DomainID NUMBER(38) Table 118 MVCA_BU_CLIENTSUMMARY Column Name Type ClientID NUMBER(38) ClientName Varchar2(256) MasterServerID NUMBER HostID NUMBER(38) Vendor Varchar2(254) Description Varchar2(1024) Status NUMBER ProductName Varchar2(254) DomainID NUMBER(38)
Table 119 MVCA_BU_MEDIASUMMARY (continued) Column Name Type TLMediaID Varchar2(32) Type Varchar2(32) Barcode Varchar2(32) MediaPoolName Varchar2(256) RobotType Varchar2(32) RobotNumber NUMBER RobotSlot NUMBER RobotHost Varchar2(128) VolumeGroup Varchar2(64) Created Date Assigned Date LastMounted Date FisrtMounted Date ExpirationDate Date NumberOfMounths NUMBER MaxMountsAllocated NUMBER Density Varchar2(64) TimeAllocated Date LastWritten Date Expir Varchar2(32) Las
Table 119 MVCA_BU_MEDIASUMMARY (continued) Column Name Type Vendor Varchar2(254) Description Varchar2(1024) DomainID NUMBER(38) Table 120 Description MVCA_BU_JOBSUMMARY Column Name Type JobID NUMBER(38) TemplateID NUMBER TemplateName Varchar2(64) MasterServerID NUMBER ClientID NUMBER BUJobID NUMBER JobState Varchar2(16) JobStatus Varchar2(16) ScheduleName Varchar2(32) StorageUnit Varchar2(64) BUTargetServer Varchar2(128) FilesLastWritten NUMBER StartTime Date EndTime
MVCA_BU_LIBRARYSUMMARY Table 121 Column Name Type TapeLibraryID NUMBER TapeLibraryName Varchar2(256) Vendor Varchar2(254) Description Varchar2(1024) MediaServerID NUMBER MasterServerID NUMBER Type Varchar2(64) RobotType Varchar2(64) RobotNumber NUMBER TotalNoOfSlots NUMBER TotalSlotsInUse NUMBER TotalNumberOfDrives NUMBER RobotDevicePath Varchar2(128) DomainID NUMBER(38) Table 122 Description MVIEWCORE_STATUS Name Type MVIEWNAME NOT NULL VARCHAR2(30) LAST_REFRESH_TIME
Table 123 MVIEW_STATUS Name Type MVIEWNAME NOT NULL VARCHAR2(30) LAST_REFRESH_TIME DATE TOTALREFRESHTIME VARCHAR2(32) STATUS VARCHAR2(10) Views from Previous Releases In this release, the materialized views were renamed, revised and in some cases removed. The following views were dropped from this release: • MV_STORAGESYSTEMCAPSUMMARYVW • MV_HOSTDETAILVW • MV_UNITACCESSVW The following table provides the views from earlier releases.
Table 124 Views from Previous Releases (continued) View Name Corresponding New View MV_HOSTSTORAGESUMMA Information about storage on hosts is now spread across several RYVW reports. MV_HOSTHOSTSTORAGEO CATIONVW No replacement. Information in several views now. MV_HOSTSTORAGESUMMA MVC_HOSTSUMMARYVW RYVW MV_STORAGESYSTEMPORT UTILVW No replacement. Information in several views, such as MVC_STORAGESYSTEMCONFIGVW.
14 Viewing Performance Data IMPORTANT: Depending on your license, Performance Manager may not be available. See the “List of Features” to determine if you have access to Performance Manager. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
• If you see “There is not enough data to produce a chart [chart_title] at this time.” message, lessen the frequency option, so that the amount of time listed in the Frequency drop-down menu has passed before you view the chart again. For example, if the Frequency menu displays hourly, you need to wait an hour for data to appear in the chart. If the frequency option is Default, the information is displayed according to the interval of the performance collector that gathers information for the graph.
3. Under the Monitoring tab in the lower-left pane, select the element again. In some instances, you may need to select an element's port, such as a switch. 4. In the pane under the tree, select a monitoring option. See ”About the Monitoring Options” on page 499 for more information. 5. Use the Chart, Unit and Frequency combo box to modify the chart. When you are done with your selections, click the button in the lower pane.
Table 125 Toolbar in Lower Pane of Performance Manager (continued) Icon Description Lets you determine the unit of the measurement in the graph. Select one of the following options and then click the button for your selection to take effect: • Default - Displays the data in its default unit, which is usually megabytes. • GB (Binary) - Displays the data in gibibytes, which is a binary unit of measurement. The computer handles the data in binary format. A gibibyte is equal to 1,073,741,824 bytes.
Table 125 Icon Toolbar in Lower Pane of Performance Manager (continued) Description Lets you change the display frequency. Select one of the following options and then click the your selection to take effect: button for • Default - The information is displayed according to the interval of the performance collector that gathers information for the graph.
Table 125 Toolbar in Lower Pane of Performance Manager (continued) Icon Description Lets you arrange the chart windows as follows: • Tiled - Displays the windows within their own tile. • Cascade - Displays the windows on top each other with the active window on top. • Minimize All - Minimizes all windows. • Restore All - Opens all windows that have been minimized. Comparing the Performance of Different Elements Use Performance Manager to compare the performance of different elements.
Viewing Summary Charts Performance Manager provides summary charts which display a single line that summarized the values for a single statistic. Multiple statistics can be shown with multiple lines. The characteristic of the line has the following attributes: • The vertical length of the line indicate the minimum and maximum value of the statistic within the selected data time frame. • The green marker marks the value obtained from the latest time stamp (latest polled value).
information for five frequency intervals, such as five weeks if weeks was selected from the Frequency drop-down combo box menu. 7. Click OK. The trending information is displayed in the chart. NOTE: If there is not enough data to display, Performance Manager does not display the chart. For example, if you selected the weekly option from Frequency drop-down combo box menu and you only have two days of data, a chart is not displayed regardless of the value in the Trend field.
3. Under the Monitoring tab in the lower-left pane, select the element again. In some instances, you may need to select an element's port, such as a switch. 4. In the lower-left pane on the Monitoring tab, click a performance monitoring option. The performance monitoring options listed in this figure vary according to the type of element. 5. Select Custom from the Period combo box in the lower pane. The Performance Graphic Editing Dialog window appears when you select the Custom option. 6.
About the Monitoring Options See the following table for more information about some of the monitoring options. Table 126 About the Monitoring Options Available Monitoring Options Available to Which Elements Active Client Logons Microsoft Exchange Stores The number of active client logons. Average Delivery Time (Messages/Sec) Microsoft Exchange Stores The average delivery time for messages per second.
Table 126 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Buffer Hit Ratio Oracle The buffer cache hit ratio calculates how often a requested block has been found in the buffer cache, without requiring disk access. If the ratio is less then 90 percent investigate further. You may need to increase cache size by increasing db_block_buffer(8i) or db_cache_size(9i). Bytes Transferred Engenio Storage Systems Bytes transferred on a drive.
Table 126 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description CRC Errors (Errors/Sec) • Storage Systems The number of cyclic redundancy checking (CRC) errors per second. • Host (port for HBA card) • Switch Port Data Received (rate/sec) NAS Filers The data received per second by an IP port on a filer. Data Sent (rate/sec) NAS Filers The data sent per second by an IP port on a filer.
Table 126 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Disk Utilization (%) Disk Drives The percentage of space used on the disk. To receive this data from a 64-bit AIX host, the bos.perf.libperfstat file must be installed on the host. See the Prerequisites section in the chapter for installing the CIM Extension on AIX in the Installation Guide. *Disk Write (KB/second) The speed to which the disk is written.
Table 126 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Free Physical Memory (KB) Host The amount of free physical memory on the host. To receive this data from a 64-bit AIX host, the bos.perf.libperfstat file must be installed on the host. See the Prerequisites section in the chapter for installing the CIM Extension on AIX in the Installation Guide. Free Virtual Memory (KB) Host The amount of free virtual memory on the host.
Table 126 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Link Failures (failures/second) • Storage Systems The number of link failures per second. • Host (port for HBA card) • Switch Port Mail Box Count Microsoft Exchange Stores The number of mail boxes for a store. Memory Usage Percentage (%) Sybase Microsoft Exchange Messages Awaiting Directory Lookup Queue Size Percentage of the Sybase memory being used, not the host memory.
Table 126 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Packets Sent (rate/sec) NAS Filers (IP Port) The packets sent per second by the IP ports on a filer. Parse CPU to Total CPU Ratio Oracle Ratio closer to 0 percent is good. A high ratio means system is performing too many parses and indicates that shared pool is configured poorly or application is using SQL and so SQL cannot be shared.
Table 126 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Processor Busy Time NAS Filers (processor) The amount of time the processor is busy. Processor Elapsed Time NAS Filers (processor) The amount of time that has passed since the NAS filer was rebooted. Read IO Rate (Reads/Sec) Engenio Storage Systems The input/output of the read rate. Read Operations EMC Storage Systems Read operations (bytes/second).
Table 126 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Retried Requests Engenio Storage Systems The number of retried requests for a drive. Send Queue Size Microsoft Exchange Stores The size of the send queue. SMTP Local Delivery Queue Size Microsoft Exchange The number of messages in the SMTP Local Delivery Queue, the queue hold mail box of local recipients.
Table 126 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Total Bandwidth (Bytes/Sect) Engenio Storage Systems The Total bandwidth. Total Inodes NAS Filers (File systems) The total number of inode files for a NAS file system. Total IOs Engenio Storage Systems The total input/output. Total IO Rate (IOs/Sec) Engenio Storage Systems The total input/output rate.
If you think you might be trying to collect too much information from the element, you might want to narrow down the collection. For example, if you are trying to collect monitoring information for three disks drives on a server, you might want to try collecting information for one disk drive. The software stops trying to gather information after several unsuccessful attempts.
Table 127 Host Monitoring Support Host Configuration Monitoring Supported? Solaris 8,9 Y Solaris 8,9 VXVM Y Solaris 8,9 VXVM dmp Y Solaris 8,9 PowerPath Y Solaris 8,9 HDLM N Solaris 8,9 RDAC N Solaris 8,9 Sun Foundation Suite Leadville Y Solaris 8,9 DAS N Solaris 8,9 Sun Foundation Suite Leadville + MPXIO N Solaris 8,9 Solstice Disksuite/Volume Manager Y Solaris 8,9 Sun Foundation Suite Leadville + MPXIO + Solstice Disksuite/Volume Manager N Windows NT 4 N Windows 2000 Y Window
Table 127 Host Monitoring Support (continued) Host Configuration Monitoring Supported? AIX 5.3 Y Irix 6.5.x Y Irix 6.5.x XVM Y Irix 6.5.x CXFS Y (only on node sending I/O) Redhat 2.1 Y Redhat 3.0 with Sistina LVM Y Redhat 2.1 with HDLM N Redhat 3.0 Y Redhat 3.0 with HDLM N HP-UX 11i Y HP-UX 11.0 Y HP-UX 11i LVM Y HP-UX 11.0 LVM Y HP-UX 11i PV Link Y HP-UX 11.0 PV Link Y HP-UX 11i PV Link Volumes Y HP-UX 11.0 PV Link Volumes Y HP-UX 11.i with PowerPath Y HP-UX 11.
The sudden dip in the charts occur because the counters holding the values displayed in the charts can contain at most 231 (2147483648) integers. The counters revert back to zero after reaching 231 (2147483648) integers. Then, they continue to go up again. The counters do not usually display zero in a chart because they are quickly gathering data again.
514 Viewing Performance Data
15 Finding an Element’s Storage Capacity IMPORTANT: Depending on your license, Capacity Manager may not be available. See the “List of Features” to determine if you have access to Capacity Manager. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
• Capacity Manager takes extra time to load the first time you access it after restarting the management server. The extra time is required for the management server to calculate the element capacity data. Capacity Manager loads faster during subsequent times because the element capacity data has already been calculated. About the List Tab The List tab lets you quickly access an element.
For example, the element displayed in the following figure is about 75 percent available. The rest if it is being used. Figure 78 Capacity of an Element You can obtain more detailed information about an element by clicking it in the right pane or in the Capacity Manager tree, as explained in the topic, See ”Finding the Capacity of an Element” on page 521 for more information. About the Capacity Chart Tab The Capacity Chart tab lets create bar or line charts to view your capacity data.
Table 128 Toolbar in Lower Pane of Capacity Manager Icon Description Lets you switch between the following: • Bar - Displays each data point as a bar. The data for the different elements is displayed side by side. • Line - Displays each data point as a dot with a line connected to the previous data points. The data for the different elements for a specific point in time is displayed in the same column. Lets you format the graph to provide data within the time period specified.
Table 128 Icon Toolbar in Lower Pane of Capacity Manager (continued) Description Lets you format the graph to provide data within the starting and ending time specified. Select the option to the left of the Start field. Click the icon. In the Time field, type the time you want the graph to start. Use the 24-hour clock. Select a date and click Set. Repeat the steps for the End field. Then, click the update the chart.
Table 128 Toolbar in Lower Pane of Capacity Manager (continued) Icon Description Lets you set trending information. In the pane displaying the chart, type an integer in the Trend field. The integer corresponds to the number of frequency intervals for which the trending information will be provided. For example, if you type 5 in the Trend field, the chart provides trending information for five frequency intervals, such as five weeks if weeks was selected from the Frequency drop-down combo box menu.
Finding the Capacity of an Element NOTE: Capacity Manager rounds the data it displays. This rounding could result in discrepancies in the totals you add for a property against the data displayed in the Summary column. For example, if you add the total capacity from each data pool and compare that total against the number for Total Capacity displayed under the Summary heading, you will most likely find the results differ. To find the capacity of an element: 1.
can discover. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). The following is displayed for storage systems under the Capacity and Capacity Summary columns: • Total Capacity • Mapped • Unmapped • Total Allocated • Unallocated • Unused Raw* • Percentage Allocated* *You may need to use the scroll bar in the pane to view these properties.
• Percentage Allocated - The percentage allocated compared to the total capacity of the storage system. NOTE: To sort information by ascending order in a column, click the column heading. The following table describes how the properties are calculated for HDS array groups. Table 129 Explanation of the Properties of the Capacity Levels for HDS Array Groups Property Displayed for an Array Group (CIM_StoragePool) How It Is Calculated Explanation Total Capacity Sum of volume.size + pool.
2. Click the Utilization tab. 3. To view a utilization report, click one of the reports listed in the tree, as shown in the following figure. Figure 80 Viewing a Utilization Report The report appears in the right pane. Printing Elements in Capacity Manager The software lets you print the topology in Capacity Manager. For example, you can provide a printout to upper management that shows not only the topology of the network, but also the capacity of each element.
• Right margin - Type a measurement for the right margin. • Orientation - Click an orientation for the printout. 5. Click the View Selection tab to modify how the printout will appear on the page. You can modify the following. When you are done, click Apply. If you want the default settings, click Default. A preview of the printout is displayed in the right pane. IMPORTANT: Before you change the margins, decide on a unit of measurement.
8. When you are ready to print, click Print. 9. Click Close. NOTE: To revert back to all of the original settings, click the Default button next to the Print button. Viewing Capacity Charts Capacity Manager provides a graphical representation of the capacity history of an element, such as port summary information for switches. You can manipulate the charts, so they show a different reporting period and frequency.
• Last 7 Days - Information collected in the seven days is reported. • Last Month - Information collected in the last month is reported. • Last Year - Information collected in the last year is reported. • Display data within a starting and ending time - You can format the graph to provide data within the starting and ending time specified. Select the option to the left of the Start field. Click the icon. In the Time field, type the time you want the graph to start. Use the 24-hour clock.
2. Click the element for which you want to see a history of its performance. 3. In the bottom pane, click the Capacity Chart tab. 4. In the lower-middle split pane, click a monitoring option. 5. In the pane displaying the chart, type a number in the Trend field. The number corresponds to the number of frequency intervals for which the trending information will be provided.
• 66880 KB is the capacity reserved for the superuser. The percentage of the reserved capacity can be set when using the newfs -m command.
530 Finding an Element’s Storage Capacity
16 Managing Policies IMPORTANT: Depending on your license, Policy Manager may not be available. See the “List of Features” to determine if you have access to Policy Manager. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
• Backup policies - Monitors the backup of your network. For example, polices can be created to notify you if a backup failed on a backup client. • Infrastructure policies - Monitors the following: • A new element is discovered • Successful provisioning occurred • An event occurred on one or more specified elements Accessing Policy Manager This topic provides the various techniques for accessing Policy Manager.
Creating a Utilization or Backup Policy You can create a utilization or backup policy that generates an event, sends an e-mail, or runs a custom command when an element is being overused. For example, you can configure Policy Manager so you receive an e-mail message when the amount of free space on a server decreases to a specified level.
• Send E-mail - Policy Manager sends an e-mail when the condition is fulfilled. Enter a comma-separated list of e-mail addresses, and then click OK. • Generate Event - Policy Manager generates an event of the specified event type. The event appears in Event Manager. Select one of the following event types. IMPORTANT: Since the severity level for an element is set by the manufacturer, the meanings of the severity levels vary. It is best to view the description of the event.
The management server fires a test for all utilization policies associated with that element. Figure 81 Testing a Newly Created Utilization Policy About the Policy Templates The following table provides descriptions of the policy templates. Table 130 Policy Templates Policy Type Description Applies to Backup failure A backup job failed for the selected backup client. Backup Clients Backup partially complete A backup job completed with partial success for the selected backup client.
Table 130 Policy Templates (continued) Policy Type Description Percent Used Description varies according to element type: Applies to • Hosts • Hosts - Percent of storage used for a host. • Backup clients • Microsoft Exchange instances - Percent of storage used for a Microsoft Exchange instance. • Microsoft Exchange • Microsoft SQL Server • Database instances - Percent of storage used for a database instance, such as Microsoft SQL Server, Sybase, or Oracle.
3. Click the Add button in the right pane. 4. In the Name field, type a name for the policy. 5. In the Description field, type a description for the policy. 6. Select one or more element types. When a condition is fulfilled on a select element, Policy Manager generates an event, sends an e-mail, or runs a custom command. 7. Select Fire when event is cleared if you want the policy to fire when the event is cleared, Otherwise the event fires when the event is received. 8.
script in the field. Then, click OK. The software assumes you are in the %JBOSS4_DIST%\server\appiq\remotescripts directory on the management server when the script is executed. You can use environment variables in your script, such as POLICY_NAME and POLICY_DESCRIPTION. POLICY_NAME. POLICY_NAME provides the policy name and POLICY_DESCRIPTION provides the policy description. See ”Software Environment Variables for Scripting” on page 264 for more information.
IMPORTANT: Since the severity level for an element is set by the manufacturer, the meanings of the severity levels vary. It is best to view the description of the event. • Unknown - The severity level is not known. • Informational - An example of an informational event is a progress report event for firmware download operation currently in progress. • Warning - An example of a warning is one or more new physical fabric objects (device port, switch, or fabric) have appeared.
1. Access Policy Manager as described in the topic, ”Accessing Policy Manager” on page 532. 2. In the Policy Manager tree in the middle pane, expand the node, Infrastructure Policies. Then, click Events. 3. Click the Add button. 4. In the Name field, type a name for the policy. 5. In the Description field, type a description for the policy. 6. In the Re-arm Period field, specify a re-arm period in minutes. The rearm period is the amount of time after the policy executes before it can execute again.
• Matches Regular Expression - If the event's summary text matches the specified expression, Policy Manager sends an e-mail, generates an event, or runs a custom command. Type the specified text in the field that appears to the right of the Summary Text drop-down menu. 12.Select an action to occur when the policy condition is fulfilled by clicking one of the following buttons (more than one action can be assigned to a policy): • Send E-mail - Policy Manager sends an e-mail when the condition is fulfilled.
Testing a Utilization Policy After you create or modify a utilization policy, test it to verify it provides the results you are anticipating. To test a policy, click the Test button in the Utilization Policy table. The management server fires a test for all utilization policies associated with that element. Keep in mind the following: • If you want to run the Test functionality more than once, set the Re-arm period to zero before clicking the Test button a second time.
IMPORTANT: Since the severity level for an element is set by the manufacturer, the meanings of the severity levels vary. It is best to view the description of the event. • Unknown - The severity level is not known. • Informational - An example of an informational event is a progress report event for firmware download operation currently in progress. • Warning - An example of a warning is one or more new physical fabric objects (device port, switch, or fabric) have appeared.
5. In the Description field, change the description of the policy. 6. Select or deselect one or more element types. When a condition is fulfilled on a select element, Policy Manager generates an event, sends an e-mail, or runs a custom command. 7. Select Fire when event is cleared if you want the policy to fire when the event is cleared, Otherwise the event fires when the event is received. 8.
For example, assume you want the custom command to open a command prompt window and list the contents in the directory. You would prefix the command with start as shown below: start dir 9. Click OK. Modifying Provisioning Policies You can create an infrastructure policy that generates an event, sends an e-mail, or runs a custom command when successful provisioning occurred.
• Major - An example of a major event is one or more physical fabric objects (device port, switch, or fabric) have disappeared. • Critical - An example of a critical event is Brocade switches that have a failed firmware download and the failure reason code for each respective switch. After you select an event level, click OK. • Execute a Custom Command - Policy Manager executes a custom command on the management server when the condition is fulfilled.
9. In the Severity drop-down menu, specify a comparison operator. 10.To the right of the Severity drop-down menu, you can change the severity level: IMPORTANT: Since the severity level for an element is set by the manufacture, the meanings of the severity levels vary. It is best to view the description of the event. • Unknown - The severity level is not known. • Informational - An example of an informational event is a progress report event for firmware download operation currently in progress.
• Warning - An example of a warning is one or more new physical fabric objects (device port, switch, or fabric) have appeared. • Minor - An example of a minor event is a physical fabric object (switch port or fabric) has changed state. • Major - An example of a major event is one or more physical fabric objects (device port, switch, or fabric) have disappeared.
Table 131 Policy Table Description (continued) Heading Description Delete Click the button to remove a policy. Deactivating a Policy Policies are activated when they are created. You can deactivate a policy, but still keep it stored in the management server. For example, assume you created a policy that sends an e-mail whenever an event of type minor is generated for a server. You might want to deactivate this policy before you upgrade the server. To deactivate a policy: 1.
• First assign an SMTP server from which the management server can send its e-mail notifications. See ”Setting Up E-mail Notification” on page 154 for more information. • The following instructions assume you have already created a policy.
IMPORTANT: Since the severity level for an element is set by the manufacturer, the meanings of the severity levels vary. It is best to view the description of the event. • Unknown - The severity level is not known. • Informational - An example of an informational event is a progress report event for firmware download operation currently in progress. • Warning - An example of a warning is one or more new physical fabric objects (device port, switch, or fabric) have appeared.
provides the policy name and POLICY_DESCRIPTION provides the policy description. See ”Software Environment Variables for Scripting” on page 264 for more information. Prefix the command with “start” if the custom command triggers a user component, such as a program that uses the user interface (Example: Microsoft Internet Explorer) or a command prompt window. For example, assume you want the custom command to open a command prompt window and list the contents in the directory.
17 Chargeback Manager IMPORTANT: Depending on your license, Chargeback Manager may not be available. See the “List of Features” to determine if you have access to Chargeback Manager. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
your asset information is restored when you restore the database. See ”Performing an RMAN Hot Backup” on page 204 for more information. First set up your chargeback as described in the topic, ”Setting Up Chargeback Manager” on page 554. When you are done with adding your chargeback information, you can view chargeback as following: • By element - Displays chargeback for a single element. See ”Viewing Chargeback by Element” on page 578 for more information.
Table 132 Setting Up Chargeback Manager Step Description Where to Find More Info 1 Create an asset record if it does not exist. You can use Chargeback Manager for applications and hardware the management server does not detect. Just create an asset record for that element. ”Creating an Asset Record” on page 555 2 Set the status of the asset. ”Changing the Status of an Element” on page 556 3 (Optional) Add asset information for asset management.
management server cannot obtain detailed information about the element. If you create a record for an application, that application is treated as a virtual application. IMPORTANT: You can easily remove an element's record by clicking the button. When you remove an element's record, the management server no longer monitors that element. See ”Deleting Elements from the Product” on page 78 for more information. To create a record: 1.
• In Use - The element is running. The status settings are set manually. For example, if the status of an element changes from being “In Use” to being “Repaired,” you must change this status manually. Refer to the Topology and Event Manager for the latest status of an element. 3. To change the status of multiple elements at once: a. Select the elements you want to modify. b. Click the Set Status button. c. Select the new status for the elements you selected from the Asset Status drop-down menu. d. Click OK.
Table 133 Element Type Icons Graphic Element Type Application Host Switch Storage System 2. To remove an asset record, click the button corresponding to the record you want to remove. Setting Storage Tier Name and Cost Storage-based chargeback lets you charge the application owners based on the amount of storage allocated to them. Each storage system is designated a storage tier classification. You can specify a charge for each storage tier. This charge is referred to as storage tier cost.
• Avoid using the following characters: <, >, ^ 6. When you are done, click OK.
NOTE: The nodes under Chargeback Manager in the tree are for creating and viewing reports. The Storage-based node is available only for applications. See ”Chargeback Reports” on page 580 for more information. Adding General Information The management server provides a page for you to enter the following general information about an element. When you are done with adding information on this page, click the Save Changes button at the bottom of the page.
• Ultra High Availability is usually assigned to the ultra high availability storage. This tier contains the premium storage in your network, usually the most expensive. • High Availability is usually assigned to the high availability storage. This tier contains storage that is not as expensive as the storage assigned to the Ultra High Availability tier. • IDE Based Storage is usually assigned to IDE-based storage. This tier contains storage that is comparatively inexpensive.
• License (maximum of 4000 characters) - The license of the element. • Warranty Information (maximum of 4096 characters) - Information about the warranty. In this field, you probably want to enter information such as how long the warranty lasts and what it covers. • Comments (maximum of 4000 characters) - Any financial information you might want to add about the element Adding Custom Information You can provide up to six custom properties. 1. In the Name field, assign a name for the field.
1. Access Chargeback Manager, as described in ”Accessing Chargeback Manager” on page 555. 2. Click the Departments tab above the table. 3. Click the button corresponding with the department you want to edit. 4. In the Edit Department window, you can edit all fields except the department number. 5. Click OK. Removing a Department from Chargeback Manager Over time, departments in your company may merge and others may be dissolved.
About Asset–based Infrastructure Cost Asset-based infrastructure cost is an optional chargeback calculation that you can specify on the Ownership page. Setting an asset-based infrastructure cost calculates a monthly infrastructure charge which is identical for each department and is applied once each month on top of their total ownership cost. Modifying the infrastructure charge impacts the asset-based chargeback result for all department owners.
• Assign a Departmental Ownership Percentage. • Review the asset-based chargeback result. IMPORTANT: You must have already added your departments, as described in the topic, ”Editing a Department” on page 562. To provide information for asset-based chargeback: 1. Access Chargeback Manager, as described in ”Accessing Chargeback Manager” on page 555. 2. Do one of the following: • Click the icon corresponding to the element. • Click the link for an element in the right pane. 3.
• Fixed Declining Balance - The Fixed Declining Balance method calculates depreciation based on the value of the asset each month instead of a fixed rate like straight line depreciation. To learn more about how the management server calculates fixed declining balance, see ”Calculating Fixed Declining Balance” on page 574. • Double Declining Balance - This depreciation method doubles the calculation of the Fixed Declining Balance method. Thus, it doubles the speed at which a device depreciates.
The infrastructure cost is added to each department, regardless of whether the department owns one or 100 elements. a. Click the Set Infrastructure Cost button. b. Type the monthly infrastructure charge for when asset-based calculation is performed. c. Click OK. 8. When you are done with assigning the element to a department, click the Save Changes button. Step 3 - Review Asset-based Chargeback Result IMPORTANT: The management server displays chargeback information up to the end of the previous month.
Keep in mind the following: • You must have already added your departments, as described in the topic, ”Adding Departments” on page 562. • Not all applications use storage on storage systems. Storage-based chargeback is applicable only for those applications that use storage on storage systems. • You must have access to the storage system the application uses. Verify your organization and roles allow you access. See ”About the Security for the Management Server” on page 125 for more information.
6. If multiple departments own the element repeat the steps above for each element. You can have departments owning more than 100 percent of the element. 7. (Optional) Specify a monthly infrastructure charge for when storage-based calculation is being done. This charge is identical for each department and is applied once each month on top of their total storage cost. Modifying the infrastructure charge will impact the storage-based chargeback result for all department owners.
• The name must begin with a letter. Any character other than the first character can be a letter, a number (0 to 9), or one of the following symbols: dollar sign ($), caret (^), hyphen (-), an underscore (_) or a space. 3. When you are done, click Save Changes. Step 3 - Review Storage Dependency and Cost IMPORTANT: The management server displays chargeback information up to the end of the previous month. For example, assume you view chargeback information in the middle of February.
IMPORTANT: If you perform the calculations manually, you may see a different value than the one displayed in the Storage Cost column. When the management server calculates the storage cost, it does not use the rounded values displayed in the Mounted Storage, Unmounted Storage and Storage Tier columns. The management server rounds the values of all calculation results, except for the total storage cost (Step 4), in the tables for better viewing.
5. Click the Edit ( ) button corresponding to the percentage of ownership you want to modify. 6. In the Ownership % field, type a new percentage of ownership. 7. Click Save Changes. Removing Department Ownership of an Element Sometimes you may need to remove ownership from an element, such in the case of an element being moved from one department to another. When department ownership is removed from an element, the department is still accessible from the list of departments.
gigabytes (0.887 GB) and round the output (0.89 GB), the capacity in Capacity Manager matches the number in Chargeback Manager.
Example: Using the examples from the previous two steps, the delta is 12 months (January 1, 2003 - December 31, 2003). 4. It subtracts the salvage value from the purchase price. This is the depreciable amount. Example: Assume the purchase price for the element is $2500 and the Salvage Value is $100. The depreciable amount is $2400, which was calculated by subtracting the Salvage Value ($100) from the purchase price ($2500). 5.
3. The management server takes the user-specified depreciation period and use it as the life of the asset. Example: Let's assume the depreciation period is 24 months and that it is also the life of the asset. 4. The management server calculates the declining ratio using this formula: (1.0 / life). This determines the rate at which depreciation should occur each month. Example: Use the example from step 4 (24 months) and use it in the following formula to find the rate of depreciate per month: 1.
Step 6a - Assume the asset value of the element is $2395. Calculate the "would-be" depreciation of the month by multiplying the asset value by the declining ratio from Step 5 (0.042): $2395 x .042 = $100.59 Step 6b - Assume the salvage value is $100. Determine if the asset value after depreciation is less than the salvage value by using the following formula: Asset value of the month ($2395) - Depreciation for the month ($100.59) = $2294.41 Since the $2294.
Example: Use the example from step 4 (24 months) and use it in the following formula to find the rate of depreciate per month: (1.0/24)*2 The depreciation ratio is 0.084. 6. For each month identified by delta from Step 3, the management server calculates the following: The example for the following steps can be found at the end of these instructions. a. Determine the “would-be” depreciation for the month. This means multiplying the asset value for the month by the declining ratio from step 5. b.
Step 6b - Assume the salvage value is $100. Determine if the asset value after depreciation is less than the salvage value by using the following formula: Asset value of the month ($2290) - Depreciation for the month ($192.36) = $2097.64 Since the $2097.64 (the depreciated asset value) is greater than the salvage value ($100), the asset value for the month is $2097.64. Go to Step 6c.
described in ”Setting Up Asset-Based Chargeback Manager” on page 564 and ”Setting Up Storage-Based Chargeback Manager” on page 567. IMPORTANT: The management server displays chargeback information up to the end of the previous month. For example, assume you view chargeback information in the middle of February. The calculations for chargeback would include the month of January, but not February. To view chargeback by department: 1.
To view Chargeback by owner: 1. Access Chargeback Manager. 2. Click the Ownership tab in the right pane. 3. Select one of the following from the Chargeback Method drop-down menu: • Asset-based - Displays chargeback information for assets. • Storage-based - Displays chargeback information for storage (applications only). The management server displays asset-based or storage-based chargeback information based on your selection. The management server displays chargeback information from the previous month.
• ”Viewing Chargeback Reports” on page 581 • ”E-mailing a Chargeback Report” on page 582 • ”Managing E-mail Schedules for Chargeback Reports” on page 582 Viewing Chargeback Reports You can access Chargeback reports one of two ways: • From Chargeback Manager • From Reporting Keep in mind the following: • To populate Chargeback reports, enter information for Chargeback, as described in the topic, ”Setting Up Chargeback Manager” on page 554.
E-mailing a Chargeback Report You can e-mail a Chargeback report in PDF, XML or Microsoft Excel format. If you want to e-mail reports by on a regular basis, set up an e-mail schedule for the report, as described in ”Adding an E-mail Schedule for a Chargeback Report” on page 583. IMPORTANT: Before you can e-mail a report, you must set up e-mail notification, as described in the topic, ”Setting Up E-mail Notification” on page 154. To e-mail a report: 1.
Adding an E-mail Schedule for a Chargeback Report You can add an e-mail schedule so that a user receives an attached report on a regular basis. The report can be in the form a PDF, XML or Microsoft Excel document. Keep in mind the following: • Before you can add an e-mail schedule, you must set up e-mail notification, as described in the topic, ”Setting Up E-mail Notification” on page 154. • The management server service must be running for users to receive e-mail notification.
If you are e-mailing reports in bulk, you might want to let users know the e-mail is being sent by an automated process. You might also want to provide an e-mail address for users to provide feedback, for example: This e-mail and its attached report are generated automatically. If you would like to change how often the report is sent to you or you want to be taken off the list, please contact username@companyname.com. 9.
Editing an E-mail Schedule for a Chargeback Report IMPORTANT: Only the e-mail schedules created by the current user are listed. To view the e-mail schedules for all reports, click Reports > Storage Essentials > Report Configuration in HP Systems Insight Manager in the upper-right corner of the screen. Then, click the Scheduled Deliveries tab at the top of the screen. To edit an e-mail schedule for a report: 1. Access Chargeback Manager, as described in ”Accessing Chargeback Manager” on page 555. 2.
10.In the Time to Run field, type the time you want to send the report. This time must be entered in the 24-hour format. For example, if you want a report sent at 2:15 p.m., you would type 14:15 in Time to Run field. 11.Select one of the following options to determine how frequently you want to send the report. • Daily - If you selected daily, select how frequently you want the management server to send the report. • Everyday - The report is sent everyday.
The report is displayed as a Web page in the right pane. See the topic, ”Chargeback Reports” on page 580 for more information about each of the reports. 4. Click the Scheduled Deliveries tab. 5. Click the button corresponding to the e-mail schedule you want to remove. Viewing E-mail Schedules for a Chargeback Report IMPORTANT: Only the e-mail schedules created by the current user are listed.
Table 134 Viewing E-mail Schedules for a Chargeback Report (continued) Column Name Description History Click the View button to display the times and dates when the report was sent. You can also delete a historical entry by clicking the button for the corresponding entry. Edit Delete Click the button to edit a schedule of the report. See the topic, ”Adding an E-mail Schedule for a Chargeback Report” on page 583 for information about the options displayed in this window.
• ”Customizing the Asset Status Filter for Chargeback” on page 590 • ”Hiding Filters in Chargeback Manager” on page 590 About Filtering Assets The management server provides several types of filters to specify which assets you want Chargeback to display. You can use all the filters at once or you can use just one of them. You can filter assets by: • Status • Element type For example, assume you need a host to install an application, but you are not too sure which hosts are in use.
Table 135 Element Types (continued) Element Type Description All Lists all elements. Customizing the Element Type Filter for Chargeback You can customize the element type for your filter by clicking the Customize button next to the Show Element Type drop-down menu in Chargeback. For example, you can specify you want only hosts and switches displayed in Chargeback. To select more than one element for filtering: 1. Click the Custom button next to the Show Element Type drop-down menu in Chargeback. 2.
3. Click OK. 4. When you are asked if you want to apply your changes, click Yes. if you want them to take effect immediately. If not, click No. Then, click the Apply Filters button when you want your changes to take effect. Chargeback Manager displays the assets that meet the criteria selected in the filter. Hiding Filters in Chargeback Manager Hide the filters for additional screen space.
592 Chargeback Manager
18 Business Tools IMPORTANT: Depending on your license, Business Tools may not be available. See the “List of Features” to determine if you have access to Business Tools. The “List of Features” is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
Keep in mind the following: • After you use an automator, refresh the element or perform Get Details/Discovery Data Collection so the management server can obtain new information and update the user interface accordingly. Only Get Details/Discovery Data Collection removes elements that are no longer there from the user interface. For example, removed ports could appear in Port Details but not in the topology for the host if you refresh the element, instead of Get Details/Discovery Data Collection.
5. When you run the Automator, enter the WWN of the old HBA. Using the Brocade Firmware Update Utility You can update the firmware of a Brocade switch remotely by using the Brocade Firmware Update Utility on the management server. The management server must obtain some information about the switch and the location of the firmware before it can upgrade the firmware on the switch. This information can be entered in a configuration file or it can be entered when you run the Brocade Firmware Update Utility.
• in a shared network folder • on an server with FTP capabilities 10.When you are asked if you want to upgrade, enter Yes. 11.After the firmware is loaded, reboot the switch. Updating the Firmware With Modifying the Configuration File You can enter the information for the firmware upgrade in the update_Brocade.conf file located in %JBOSS4_DIST%\server\appiq\remotescripts\automators. 1. Open the update_Brocade.conf file in a text editor, such as Notepad. 2.
against predefined profiles you created. Before you run either of these tools, create profiles for your environment, as described in the following steps. 1. Go to the %JBOSS4_DIST%\server\appiq\remotescripts\advisors directory and open one of the following files in a text editor, such as Notepad: • HBA Risk Analysis - hba_risk_analysis.conf • Switch Risk Analysis - switch_risk_analysis.conf 2. In the configuration file, do one of the following: • If you are editing hba_risk_analysis.
To save the current configuration, use option 0. The current configuration is saved to a DAT file in the following directory. This file can be opened by using a text editor, such as Notepad: %JBOSS4_DIST%\server\appiq\remotescripts\advisors\saved-configurations The DAT file contains the data for the elements discovered in the configuration.
19 Troubleshooting This chapter describes the following: • ”“Data is late or an error occurred” Message” on page 599 • ”appiq.
NOTE: While the service is stopped, the management server cannot monitor elements and users cannot access the management server. 2. To find the corrupt log file, look in the alert_APPIQ.log file, which can be found in \oracle\admin\APPIQ\bdump, where ORACLE_BASE is c:\oracle You can verify if the REDO log listed in the alert_APPIQ.log file is corrupt by looking for a “redo block corruption” error in the REDO log. 3. On the management server, enter the following at the command prompt: Sqlplus /nolog 4.
IMPORTANT: If you are starting the services manually, start the Oracle service before the service for the management server. Errors in the Logs If you access the logs, you are shown messages resembling the following. The complete text has been shorten as a result of space constraints: Aug 04 2004 11:59:07] INFO [com.appiq.service.policyManager.policyService.PolicyService] Creating [Aug 04 2004 11:59:07] INFO [com.appiq.service.policyManager.policyService.
• password is the password of username. • 1234 the new port for the CIM Extension 4. Save the file. 5. Restart the CIM Extension for your changes to take effect. NOTE: The CIM Extension looks for parameters in the cxws.host.parameters file whenever it starts, such as when it is started manually or when the host is rebooted. 6. The management server assumes the CIM Extension is running on port 4673. If you change the port number, you must make the management server aware of the new port number.
mind that when a port other than 4673 is used for the CIM Extension, the port must be included in the discovery IP. For example, 192.168.1.1:1234, where 192.168.1.1 is the IP for the host and 1234 is the port the CIM Extension uses. Table 136 Troubleshooting Firewalls Configuration Manual Start Parameters for CIM Extension Firewall port 4673 opened between host and management server start If Mentioned in cxws.host.parameters Step 1 Discovery and RMI Registry Port 10.250.250.10 OR 172.31.250.
Table 136 Troubleshooting Firewalls (continued) Configuration Manual Start Parameters for CIM Extension If Mentioned in cxws.host.parameters Step 1 Discovery and RMI Registry Port Firewall port 1234 opened between host and management server on the 192.168.250.x subnet start -on 192.168.250.10:1234 -on 172.31.250.10:1234 172.31.250.10 :1234 With 3 firewall ports opened on different ports respectively 1234, 5678, 9012. -on 10.250.250.10:1234 start -on -on 172.31.250.10: 5678 10.250.250.
Table 136 Troubleshooting Firewalls (continued) Configuration Manual Start Parameters for CIM Extension If Mentioned in cxws.host.parameters Step 1 Discovery and RMI Registry Port With firewall port 1234 opened between a host and management server. NAT environment where 10.250.250.10 subnet is translated to 172.16.10.10 when it reaches other side of the firewall start -port 1234 -port 1234 172.16.10.10 With 3 firewall ports opened on different ports respectively 1234, 5678, 9012.
Table 136 Troubleshooting Firewalls (continued) Configuration Manual Start Parameters for CIM Extension No DNS, never resolve No firewall. Don't want to use root credentials. Want to discover with a non-existent user. start -credentials abcuser:passwd With 3 firewall ports opened on different ports respectively 1234, 5678, 9012. Don't want to use root credentials. Want to discover with a non-existent user. start -on 10.250.250.10:1234 -on 172.31.250.10:5678 -on192.168.250.
automounts because it cannot determine if the comma separate strings that are part of the mounted volume name are host names or part of the name of a remote volume. The following example is a comma separate string that is part of a mounted volume name. The management server cannot tell whether test and three are host names or part of the name of a remote volume. As a result, the management server does not display the volume name.
Installing the Certificate by Using Netscape Navigator 7 1. Access the management server by typing the following: https://machinename where machinename is the name of the management server. 2. When the security alert message appears, click the Always button. 3. When you are told you are requesting an encrypted page, click OK. 4. Click the Always button when you are asked if you want to accept the certificate. 5. When asked if you wanted to trust the signed applet, click the Always button.
The new certificate is copied to the correct location. Troubleshooting After Upgrading This section provides information on troubleshooting after upgrading. It includes the following topics: ”SMI-S Switches Must Be Removed and Rediscovered After Upgrading” on page 609 SMI-S Switches Must Be Removed and Rediscovered After Upgrading You must remove and rediscover Cisco, QLogic, or CNT switches supported through SMI-S after you upgrade the management server.
• ”“Connection to the Database Server Failed” Error” on page 613 • ”DCOM Unable to Communicate with Computer” on page 613 • ”Duplicate Listings for Brocade Switches in Same Fabric” on page 613 • ”Element Logs Authentication Errors During Discovery” on page 614 • ”EMC Device Masking Database Does Not Appear in Topology (AIX Only)” on page 614 • ”Management Server Does Not Discover Another Management Server's Database” on page 614 • ”Microsoft Exchange Drive Shown as a Local Drive” on page 614 • ”Unable to Di
The management server lets you send status reports about Discovery Data Collection/Get Details to users. The status reports that are sent to users can also be found in the GAEDSummary.log file in the [Install_DIR]\logs directory on the management server. To configure the management server to send status reports on Discovery Data Collection/Get Details to your e-mail account: 1. Enable e-mail notification for the management server. Refer to the User Guide for more information. 2.
To change the time-out period and number of retries for switches, modify the properties specified Table 137 on page 612 and Table 138 on page 612 as described in the following steps: 1. Access the management server. 2. Select Options > Storage Essentials > Manage Product Health. Then, click Advanced in the Disk Space tree. 3. Click Show Default Properties at the bottom of the page. 4. Copy the commands specified in Table 137 on page 612. How you copy the text depends on your Web browser.
change the number of retries to five for a McDATA switch, set the cimom.McData.Snmp.Retries properties as shown in the following example: cimom.McData.Snmp.Retries=5 Table 138 Retry Properties Switch Property McDATA/Connectrix cimom.McData.Snmp.Retries discovered through SNMP Cisco cimom.Cisco.Snmp.Retries Other switches discovered through SNMP: cimom.snmp.switch.retries • Sun StorEdge • QLogic 9. When you are done, click Save. 10.
Duplicate Listings for Brocade Switches in Same Fabric If you discover more than one Brocade switch in the same fabric, the Targets tab displays duplicate listings for the Brocade switches. Each Brocade switch is listed multiple times with the IP address of the other switches and its own. For example, assume you discovered Brocade switches QBrocade2 and QBrocade5 in the same fabric, the switches are listed twice on the Targets tab.
displaying it in the topology. Refer to Oracle documentation for information on how to remove the deleted Oracle instance from the TNS listener port. Requirements for Discovering Oracle To discover Oracle: • The management software for Oracle must be installed. For information about installing the management software for Oracle, refer to the Installation Guide. • By default, the software sets the TNS Listener Port to 1521.
• ”Unable to Find Elements on the Network” on page 619 • ”Unable to See Path Information” on page 620 • ”Device Locking Mechanism for Brocade Element Manager Query/Reconfiguration” on page 620 • ”A Discovered Sun StorEdge A5000 JBOD Does Not Display Its WWN Properly” on page 620 • ”Unable to Monitor McDATA Switches” on page 620 • ”Unable to Detect a Host Bus Adapter” on page 620 • ”Navigation Tab Displays Removed Drives as Disk Drives” on page 621 • ”Unable to Obtain Information from a CLARiiON Storage Syst
Table 139 Troubleshooting Discovery and Discovery Data Collection/Get Details (continued) Scenario Description What to do The switch was previously made aware of the host, but it can no longer contact it. Verify that the host is on and the network cables are connected to it. If the steps provided do not work, see ”Link Between a Brocade Switch and a Host Disappears from the Topology” on page 619. Discovery from HP SIM Try discovering the element again in HP SIM. Then, run Discovery Data Collection.
Table 139 Troubleshooting Discovery and Discovery Data Collection/Get Details (continued) Scenario Description What to do The switch has not been discovered. Try discovering the switch again. 1. Click the Discovery menu. Click the Setup tab and the Add Address button on the IP Addresses tab. The element appears discovered, but a connected switch does not appear. 2. Type the IP address or DNS Name of the switch. Then, type its user name and password. Click OK. 3. Verify the element is selected. 4.
IMPORTANT: One way to determine what is happening is to look at the log messages during discovery and getting element details. See ”Viewing Log Messages” on page 52 for more information. No Stitching for Brocade Switches with Firmware 3.2.0 Stitching does not appear for hosts attached to Brocade switches running firmware 3.2.0. There is no stitching when the PID format is 0. The port setting must be the same for all Brocade switches in the fabric or the fabric will become segmented.
Device Locking Mechanism for Brocade Element Manager Query/Reconfiguration Please keep in mind that the configuration for Brocade switches is locked while getting all details for elements in a zones. The software ensures that each CIM query locks out any reconfiguration. For example, if you are getting details for elements in all zones, you cannot add a new Brocade switch while you are doing it (the discovery or configuration process waits until the collection of details is finished before proceeding).
cfgadmn command makes the software realize the drive has been removed. Refer to the documentation that shipped with the Solaris operating system for more information about the cfgadm command. Unable to Obtain Information from a CLARiiON Storage System If you are having difficulty obtaining topology information or element details from a CLARiiON storage system, the NaviCLI might have timed out as a result of the service processor being under a heavy load.
9. When you are done, click Save. 10.Restart the service for the management server for your changes to take effect. While AppStorManager is restarting, users are not able to access the management server. The AppStorManager service must be running for the management server to monitor elements.
While AppStorManager is restarting, users are not able to access the management server. The AppStorManager service must be running for the management server to monitor elements. Re-establishing Communication with EFCM To re-establish communication with EFCM, perform the following steps: 1. To check the status of the connection, click the Test button on the Discovery Setup screen. If the McDATA provider reports that it can connect to EFCM, the connection has been restored.
HiCommand Device Manager over a secure socket layer (SSL) connection by doing one of the following: • Use HTTPS in the discovery address - Prepend https:// to the discovery address to force the connection to HTTPS mode, for example, https://192.168.1.1, where 192.168.1.1 is the IP address of the host running HiCommand Device Manager.
Unable to Discover a UNIX Host Because of DNS or Routing Issues If the management server is unable to discover a UNIX host because of a DNS or routing issues, you will need increase the amount of time that passes before the management server times out for that CIM Extension. By default, the management server waits 1,000 ms before it times out. It is recommended you increasing the time before the management server times out to 200000 ms (3.33 minutes), as described in the following steps.
Java Applet Has Data from a Different Version of Management Server Software If you attempt to monitor a host with old JAR (Java Archive) files, you might be unable to monitor the host and you might see the following error message: The Java applet has data from a different version of the management server. Please close and re-start your browser. The reason for this error message is that the client still has JARs from the previous build in its Java Plug-in cache.
“Can't delete this zone” Message If you are shown the following message when you try to delete a zone, move the zone to an inactive zone set. Then, delete the zone. Can't delete this zone, it is member of an Active Zoneset Changes in EFC Manager Requiring Discovery Data Collection/Get Details If you use EFC Manager to delete zones or zone sets, perform Discovery Data Collection/Get Details on the management server afterwards.
Known Device Issues The following table provides a description of the known device issues. You can find the latest information about device issues in the release notes. Table 140 Known Device Issues Device Software Description AIX host NA If you are receiving replication errors for an AIX host, the provider may be trying to connect to the host using the 0.0.0.0 IP address instead of the real host IP address.
Table 140 Known Device Issues (continued) Device Software Description SGI IRIX host CXFS file systems The management server can only monitor CXFS file systems from the host generating the input/output. For example, assume the elements are part of a CXFS file system. When you generate input/out into the metadata server into /folder, only the metadata server is able to monitor the file system.
Table 140 Known Device Issues (continued) Device Software Description Solaris host VxVM If you discover a host with any typical SAN disk groups off line, the storage volume page shows SAN mount points as local instead of external. These disks, however, are not accessible. When you perform Discovery Data Collection/Get Details with all disk groups online, disks on the SAN are shown as external. Hosts connected directly to a storage system are shown as local, except for hosts connected by fibre.
Table 140 Known Device Issues (continued) Device Software Description IBM Storage Systems Subsystem Device Driver (SDD) or MPIO (Multi Pathing IO) If you discovery an IBM storage system without SDD, incorrect stitching is displayed in System Manager for the storage system. You are shown only one path if the storage system is using MPIO instead of SDD.
If a provisioning failure has caused the Symmetrix storage system to remain locked, you are alerted to this situation in Event Manager and on the Properties tab. You may receive a message resembling the following: Unable to end device masking session. Symmetrix '000001835005700' may be locked.
Glossary A access point It is the intersection of the IP address and the provider that discovered the IP address. It is displayed on the screens for discovery. A provider is software that is used to gather information about an element. active zone set An active zone set is the zone set in use. You can have only one zone set active at a time; however, you can have a zone in more than one zone set. Zones sets are usually created for a particular task. Zones work by exclusion.
scan files very quickly because of its structure in the database and because it uses a multi-threaded process. More than one process can be used at a time to scan the files. D device This documentation set defines a device as a piece of hardware in the storage network. EMC uses the term device to refer to a volume on one of its storage systems. E element An element is anything on the network that can be detected by the management server, such as hosts and switches.
M Managed Application Licenses (MALs) Managed application licenses (MALs) are the number of detected instances of Microsoft Exchange, Oracle and Sybase Adaptive Server Enterprise. managed object Managed Access Points (MAPs) A hardware or software system component that is represented as an instance of the CIM class. Information about managed objects is supplied by data and event providers, as well as by the CIM Object Manager.
Solutions Enabler or Hitachi HiCommand Device Manager. Engenio storage systems do not require a proxy, as they can be accessed directly. S SAN A Storage Area Network (SAN) is a high speed network configuration that is dedicated to transporting storage data among network devices, such as storage systems, hosts (servers), switches, and tape libraries to end users.
VSAN (VSAN 1) that initially includes all ports, and an isolated VSAN (VSAN 4094) where ports end up if their owning VSAN is deleted. W Web-Based Enterprise Management (WBEM) Web-Based Enterprise Management (WBEM) is an initiative based on a set of management and Internet standard technologies developed to unify the management of enterprise computing environments.
638
Index 3PAR storage systems 56 A about Access tab 225 asset attributes 291 Backup Manager toolbar 355 Business Tools 593 buttons in System Manager 220 Capacity Manager 515 Chargeback Manager reports 581 custom commands 260 custom reports 443 CXFS 295 Events tab 290 filtering events 420 groups 253 Home page 7 List tab 224 monitoring options 500 Navigation screen 271 Path tab 231 Performance Manager 492 Policies tab 294 Policy Manager 531 provisioning 297 Provisioning tab 290 remote console 268 Reporter 429 R
discovery policies 536 discovery schedule 155 domain controller 102, 121 elements 140, 141 e-mail schedule 436 event policies 539 general information 560 geographic information 561 host security groups 334 hosts 388, 397 IP address 24 IP range 23 license 150 licensing information 561 new elements 92 organizations 140 provisioning policies 538 roles 137 staff information 561 storage pool 321 storage volume 324 switches 85 tape drive 279 TNS Listener Port 120 user accounts 132 utilization policies 533 virtual
Properties tab 368 Protection 368 resources 368 servers 368 summary backup charts 351, 364, 371 topology 358 Backup Manger backup results 351 backup results 351 backup servers viewing collectors 173 backups managing 349 bar chart 493 binding persistent 634 block size cache 346 Bridge Agent 41 Brocade switches 418 tracing 163 Brocade Rapid program 75 Brocade switches 75 discovering 33 events 420 browsing hosts 270 switches 270 Buffer Hit Ratio 500 building topology 31, 75 business cost setting 232 business c
fabric name 232, 256 frequency 493 full name 134 logging 163 login name 134 number of retries 53, 611 organizations 141 password 76, 122, 134 phone number 134 properties 160 provisioning policies 545 roles 138 SNMP trap listener 40 status 556 summary backup charts 371 time 180, 196 time-out period 53, 611 TNS Listener Port 120 tools 271 topology 358, 517 user account 133 user name 76 user preferences 135 user profile 134 utilization policies 542 zone set 309 changing ports zone alias 304 Chargeback 593 asse
cimom.hds.exclude 63 cimom.log 161 cimom.provider.hds.hiCommandTimeout 343 cimom.symmetrix.
creating a protection policy 533 CRLF 270 cumulative licenses 151 Current View combo box 517 custom periods 498 custom commands about 260 adding 261 deleting 264 editing 263 setting up 232 stopping 261 custom name truncated 253 custom properties 562 custom reports 443 integrating 454 customer information adding 562 Customizing 160 customizing element filters 423 filters 422, 423 properties 160 severity filters 422 cut off custom name 253 CXFS 294, 295 D data backing up 206 performance 492 trending 527 data
roles 139 storage pool 322 storage pools 321 switches 86 TNS Listener Port 120 user accounts 134 volumes 327, 341 zone aliases 305 zone sets 307, 310, 627 zones 307, 627 deleting events 166 department ownership 563 removing 572 departments adding 562 deleting 563 editing 562 removing 563 designing custom reports 445 detailed tracing 163 detailed schema 456 details event 413 obtaining 80 detecting IP range 23 McDATA switches 85 switches 85 device about 634 finding 340 inaccessible 340 device issues 628 devic
discovery page accessing from HP SIM 17 accessing from HP Storage Essentials 17 discovery policies creating 536 discovery requirements Oracle 615 discovery schedule adding 155 disabling 156 editing 157 removing 157 discovery settings importing 28 saving 29 disk drive 123, 159, 621 Disk Read 500 disk space monitoring results of 159 Disk Utilization 500 Disk Write 500 displaying deleted Oracle instances 614 element home page 232 element impact 246 element properties 276 filters 424 log file 162 port details 2
deleting 232 impact 246 performance 492 refresh 232 element created in Chargeback about 634 element details obtaining 80 element home page viewing 232 element name filtering 424 element performance comparing 496 element properties viewing 276 element topology 232 element type filtering 423 selecting 423 elements adding 140, 141 arranging 241 capacity 521 deleting 27, 78, 246 dragging 517 getting details 31 managing 141 modifying 76 organization 141 removing 143 topology 75, 241 unable to find 615, 619 unman
filtering 420, 422, 424 filters 290 managing 420 policies 546 polling 417 removing 415 severity 290 severity levels 421 sorting 290, 417 switches 418 unclearing 290, 415 viewing 290 Events tab about 290 exceptions 626 excluding events 420 HDS systems 63 switches 51 Symmetrix systems 58 exclusive lock error message 631 export database 208 external tools 270 setting up 271 F fabric name 256 properties 278 fabrics changing name 232 filtering 250, 517 removing 232, 257 viewing 278 file extension assigning 87,
G general information adding 560 generic hosts 240 generic tape drive 279 geographic information adding 561 getting element details 80 getting details 31, 80 applications 102 hosts 102 Global Reporter server about 634 global reporting view 634 global reports filtering 435 setting up 187 tnsnames.
technical support xxv HP SIM discovery page 17 HP XP storage systems 64 HTTP Error 503 600 HTTPS 12 I IBM storage systems discovering 65 icons event 250 impact element 246 showing 232 importing database 209 discovery settings 28 license 150 importing database 209 inaccessible device 340, 626 increasing memory 626 information obtaining element 80 performance 492 infrastructure cost setting 563 initiator WWN 634 In-memory Sort Ratio 500 inode file about 634 installing Java plug-in 11 security certificate 12
login name modifying 134 logs accessing 161 refreshing 214 resetting 214 saving 161 viewing 214 LUN numbering requirements 396 LUN Security Path Provisioning 386 LUSE volumes cannot create 343 M magnifying Capacity Manager 517 topology 517 MALs 147, 635 Managed Access Points about 635 managed access points 147, 635 managed application license 147, 635 managed object 635 management server about 1 assigning a name 278 backup 206 components 4 security 125 stopping 14 variables 264 managing backups 349 collect
external tools 270, 271 fabric name 232, 256 filters 590 frequency 493 full name 134 jboss.
deleted instances 614 discovering 102, 103 discovery requirements 615 Oracle TNS Listener Port 120 organizations about 125 adding 140 deleting 142 editing 141, 143 elements 140, 141, 143 e-mailing reports 436 filtering 144 properties 137 users 137 viewing 141 organizing topology 253 outdated reports 185 OutOfMemoryException 626 overview SAN zoning 298, 301 owners adding 562 editing 562 removing 563 ownership percentage 571 removing 563 P Pan button 517 parent organizations 125 Parse CPU 500 password changi
discovery 536, 543 event 539, 546 provisioning 538, 545 testing 533, 542 utilization 533, 542 viewing 532, 548 Policies tab 294 Policy Manager about 531 accessing 532 creating policies 531 deactivating policies 531, 549 deleting policies 531, 549 modifying policies 531 viewing policies 531, 548 polling events 417 pool information 321 storage 321 pools accessing 321 deleting 321 port CIM Extension 601 port details showing 232 ports definitions 274 viewing 246 predicting 492 performance 492 storage capacity 5
recalculating topology 7 Receive Queue Size 500 receiving SNMP traps 409 refresh element 232 refresh view 433 refreshing Database Admin Utility 206 element properties 276 logs 214 report cache 185 reports 433 Symmetrix systems 83 reinitializing database 210, 215 warnings 215 related documentation xxiii remote commands 232 console 268 remote console buttons 269 copying text 270 keeping active 268 menu options 270 remote drives 614 remote scripts running 551 remote sites filtering 435 removing custom commands
PDF 433 refreshing 433 refreshing cache 185 screen space 434 sending 435 starting collectors 432 storage based 581 storage subsystem 581 utilization 523 XML 433 Reports tab about 293 Requests Serviced 500 resetting tablespace 211 restarting database 211 restoring cold backup 211 database 207 RMAN 213 right button 521 risk analysis setting up 597 RMAN destination 214 RMAN backup viewing results 205 RMAN backups 204 RMAN restore 213 roles about 125 adding 137 Application Administrator 125 CIO 125 deleting 139
installing 12 seeing license 151 selecting element type 423 fabrics 250 severity levels 421 Send Queue Size 500 sending reports 435 server backup 206 Server Administrator role 125 services stopping 14 sets zone 307 setting archive mode 212 business cost 232 date 180, 196 discovery passwords 22 discovery user name 22 event severity 550 infrastructure cost 563 report collectors 293 storage cost 558 storage tier 558 thresholds 498 time 180, 196 time period 493 setting up Chargeback Manager 554, 564, 567 e-mail
changing 556 protection collectors 175 scan 171 stop button remote console 269 stopping collectors 169, 178 performance collectors 196 SAN details 82 scripts 261 services 14 storage assigning costs 554 Storage Administrator role 125 storage area network 636 storage based reports 581 storage capacity predicting 527 storage cost setting 558 storage elements viewing 238 storage pool 636 creating 321 deleting 322 storage pools accessing 321 deleting 321 storage subsystem based reports 581 storage system proxy 6
accessing 219 buttons 220 can’t access 626 Cisco switches 219 deleting elements 246 Discovered hosts 240 element impact 246 event icons 250 global views 243, 286 groups 253 hiding tabs 250 inaccessible 217, 219 installing Java plug-in 11 Java plug-in 11 printing 243 scripting variables 264 storage elements 238 Topology windows 243 update 245 user interface 220 viewing ports 246 virtual applications 289 T tablespace resetting 211 tabs Access 225 hiding 250 List 224 Path 231 tape drive adding 279 task runnin
Cisco SMI-S switches switch names 610 CLARiiON storage systems 341 discovery 613 discovery and getting element details 613, 614, 615, 619, 620, 631 EMC storage systems 342 EMC Symmetrix storage systems 342 Engenio storage systems 346 HDS storage systems 343 JavaScript blockers 219 Microsoft Exchange 614 popups 219 provisioning 340, 341, 342, 626, 627, 631 SMI-S switches 32, 609 truncated custom name 253 Tx Bytes 500 types of monitoring 500 U unable to discover 613 Unable to access resource 626 unable to de
log file 162 log messages 53 logging 165 logs 214 organization properties 137 organizations 141 performance data 492 policies 532, 548 ports 246 report refresh 433 RMAN backup results 205 schedule history 588 scheduled e-mail deliveries 181 security certificate 12 specific license 151 storage elements 238 summary backup charts 351 trending information 527 utilization reports 523 volume information 323 zone aliases 303 views global 243, 286 virtual application about 636 adding 232, 289 creating 289 Virtual M
removing 307 zones creating 305 deleting 307, 627 duplication 312 naming conventions 402 removing 307 viewing aliases 303 Zoning Library duplication 312 662
Figures 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 Accessing Features from the Tools > Storage Essentials Menu . . . . . . . . . . . . . . . . . . . . . . . . . 2 Accessing Roles in Storage Essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Accessing the Documentation Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Status Light . .
47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 Multipathing Displayed in the Topology (Continued) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 Direct Attached Storage in the Topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 New Window Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 Viewing Asset Records . . . . . . . . . . . .
Tables 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiv Status Light Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 .................................................................9 HP SIM Discovery Steps for Switches, NAS filers, and Storage Systems .
44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 About the Toolbar in the Topology Tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 Setting Up Zoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Zoning Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
87 MVC_EVENTSVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469 88 MVC_ORGANIZATIONVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470 89 MVC_ORGRELATIONVW. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470 90 MVC_HOSTCAPACITYVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471 91 MVC_STORAGESYSTEMCONFIGVW . . . . . . . . . . . .
134 135 136 137 138 139 140 Viewing E-mail Schedules for a Chargeback Report . . . . . . . . . . . . . . . . . . . . . . . . . . Element Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Time-out Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Retry Properties . . . . . . . .