HP Storage Essentials V5.00.01 user guide (T4283-96012, January 2006)

Discovering Filers, Tape Libraries, Switches and Storage Systems52
3. Copy the cimom.mcdata.exclude property. How you copy the text depends on your Web
browser. If you are using Microsoft Explorer or Netscape Navigator, select the text and then
right-click the selected text. Then, select Copy.
4. Return to the Advanced page (Options > Storage Essentials > Manage Product
Health. Then, click Advanced in the Disk Space tree).
5. Paste the copied text into the Custom Properties field. How you paste the text depends on
your Web browser. If you are using Microsoft Explorer or Netscape Navigator, right-click the
field and select Paste.
6. Make your changes in the Custom Properties field. Make sure the property is not commented
out by removing the hash (#) symbol in front of the property.
7. Add the Worldwide Names corresponding to the switches you want to exclude from discovery.
Separate additional Worldwide Names with a comma, as shown by the following example:
cimom.mcdata.exclude=1000080088A07024,1000080088A0D0B6
where 1000080088A07024 and 1000080088A0D0B6 are the Worldwide Names for
McDATA and Connectrix switches.
8. When you are done, click Save.
While AppStorManager is restarting, users are not able to access the management server. The
AppStorManager service must be running for the management server to monitor elements.
Viewing Log Messages
Use the View Logs page to obtain the status of the following:
Discovery
Building the Topology (Applies to Discovery from HP SE)
Get Details for Discovery from HP SE and Discovery Data Collection for Discovery from HP SIM
Backup Details
During these operations, the management server displays its status at regular intervals.
To view logs for these operations:
1. Do one of the following:
Discovery from HP SIM - Click Tasks & Logs > View Storage Essentials Log.
Discovery from HP SE - Click Discovery > View Logs.
2. To obtain the latest status, click the Get Latest Messages button.
If the software is unable to discover or obtain information about a device, the log messages might
provide some information as to where the problem occurred.
For example, if a host was not discovered, the log messages might indicate the provider
configuration for that device was never created. This could mean the software was given the wrong
user name and/or password for that host. As a result, the software logged onto the host with a guest
account, which does not have enough permissions to start WMI.