HP XP P9000 Remote Web Console User Guide Abstract This guide explains how to set up and use the HP Remote Web Console to manage HP XP P9000 disk arrays over a Local Area Network (LAN) connection. Topics include how to obtain storage system configuration and status information, send user-requested commands to the storage system, install and launch HP XP P9000 program products, and troubleshoot storage system issues.
© Copyright 2010, 2014 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice.
Contents Preface........................................................................................................9 1 Remote Web Console overview..................................................................10 Manage the storage system.....................................................................................................10 GUI feature highlights.............................................................................................................10 Emphasis on performance......
Procedure....................................................................................................................29 Returning an SMI-S provider configuration file to default..........................................................29 Installing the report configuration tool........................................................................................30 Prerequisites......................................................................................................................
Configuring the Remote Web Console environment.......................................56 Configuration overview............................................................................................................56 Creating a login message........................................................................................................56 Setting e-mail notification for SIMs or SNMP traps......................................................................57 Configuring e-mail notification....
Creating a configuration report using the Report Configuration Tool.....................................80 Preparing a script file.....................................................................................................80 Executing a regularly scheduled script file.........................................................................84 Execution example and explanation of script files..............................................................84 Error in executing Report Configuration Tool.
C SMI-S provider configuration file...............................................................121 User-defined.properties file.....................................................................................................121 File description format......................................................................................................121 File organization format....................................................................................................
Edit Resource Group Assignment window............................................................................164 Confirm window for Edit Resource Group Assignment...........................................................167 Edit Role Assignment wizard..................................................................................................168 Edit Role Assignment window............................................................................................
Preface This document provides information to help you set up Remote Web Console for the XP P9500, set up end-user computers and Web browsers, and establish user accounts and permissions. It explains the GUI features and provides basic navigation information. Complete information for performing specific tasks in Remote Web Console is contained in the XP P9500 software user guides. Please read this document carefully to understand how to use this product, and keep a copy for reference.
1 Remote Web Console overview HP Remote Web Console provides a unified GUI for managing and optimizing the XP P9500 storage system. You access the system in Remote Web Console from any computer with a Web browser. Besides the GUI, Remote Web Console provides a CLI to allow scheduling of storage system events. Remote Web Console can be set up in either Windows or UNIX environments. Manage the storage system With Remote Web Console, you can perform the following tasks: • Provision storage.
Remote Web Console also provides a window checking on the tasks you have committed to the system. The Tasks window provides detailed information about each task and shows the priority and status of each task you are tracking. Reporting Remote Web Console provides views of various aspects of your storage system. In addition to these views, you can generate a report for specific areas of the system. Reports can be generated for a summary of the system data, ports, Channel Adapters, and disk adapters.
2 Setting up Remote Web Console This topic provides Remote Web Console requirements and set up procedures. Setup workflow The following workflow describes the set up tasks for Remote Web Console: • The HP representative attaches the SVP in your storage system to the LAN. Remote Web Console is already set up on the SVP and is therefore ready for access by client computers. • Ensure the correct LAN cabling and connections are in place. See Cable connection requirements (page 12).
3. Select the Internet Protocol Version 6 (TCP/IPv6) check box. Optionally, clear the Internet Protocol Version 4 (TCP/IPv4) check box. 4. Click OK to close the dialog box. Configuring IPv6 communication in Solaris 10 To configure a Remote Web Console computer to use IPv6 for communication with an SVP: 1. Start the console. 2.
Notes on updating the signed certificate to the SVP Read the following notes about uploading the signed certificate to the SVP: • While the SVP certificate is being updated, tasks that are being executed or scheduled for execution on Remote Web Console are not executed. • Certificates for RMI communication are updated asynchronously (within approximately two minutes).
1. 2. 3. If the read-only attribute is set, release it from the c:\key folder. Open a command prompt. Move the current directory to the folder to which the key file is output (such as c:\keyl), and execute the following command: c:\key > c:\openssl\bin\openssl genrsa -out server.key 1024 This procedure creates a file called server.key in the c:\key folder. This file becomes the private Key. Creating a public key (.csr file) A public key is required to create an SSL keypair.
Figure 3 Creating a public key Acquiring a self-signed certificate To acquire a self-signed certificate, open the command prompt and execute the following command: c:\key>c:\openssl\bin\openssl x509 -req -sha256 -days 10000 -in server.csr -signkey server.key -out server.crt NOTE: This command uses SHA-256 as a hash algorithm. MD5 or SHA-1 is not recommended for a hash algorithm due to its low security level. This creates a server.crt file in the c:\key folder, which is valid for 10,000 days.
2. In the browser of your Remote Web Console computer, specify the following URL: http://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi 3. 4. 5. 6. 7. In the Tool Panel dialog box, click Update Certificate Files. If the SSL encrypted communications is set up and the Security Alert dialog box appears, click OK. The Security Alert dialog box for the certificate may also appear. In this case, click View Certificate, confirm the certificate is correct, and then, click Yes.
NOTE: If an error occurs during update of the certificate, an error message is displayed. If so, resolve the problem and then re-execute from login to Update Certificate Files. Importing the certificate to the SVP If you use a self-signed certificate, the Web browser displays a warning message when it connects to an SSL-enabled SVP. You can disable this message using the following sample procedure, which assumes the use of Internet Explorer® 8.0. To import the certificate to the browser: 1.
Figure 6 Certificate window 6. Click Install Certificate (I) . The Welcome window of the Certificate Import Wizard appears. Figure 7 Certificate Import Wizard dialog box (Welcome to the Certificate Import Wizard) 7. Click Next. The Certificate Store window of the wizard appears.
Figure 8 Certificate Import Wizard dialog box (Certificate Store) 8. Select Automatically select the certificate store based on the type of certificate, and click Next. The completion window appears. Figure 9 Certificate Import Wizard dialog box (Completing the Certificate Import Wizard) 9. 20 Click Finish. If the import was successful, the confirmation window appears.
Figure 10 Root Certificate Store dialog box (example) 10. Click OK. Blocking HTTP communication to the storage system If the Web server (SVP) supports SSL (HTTPS), the HTTP setting tool allows you to block access to port 80. When you block access to port 80, the connection used to import the certificate from the Web browser to the Web server (SVP) occurs on port 443 (HTTPS).
7. Click OK to release HTTP blocking. When the configuration change is complete, the SVP reboots. Once the reboot is complete, the Release HTTP Blocking Complete dialog box appears. If you want to cancel the operation and return to the logon dialog box, click Cancel. It may take 30 or 60 minutes for the Web server to restart. In this case, the Release HTTP Blocking Complete dialog box does not appear and an internal server error occurs, but the setting is actually completed. 8. Click OK.
Table 2 Software requirements for Windows-based computers Operating system 1 32 bit/ Browser 3,4 32 bit Flash Player 3, 5 64 bit Windows XP (SP3) Java Runtime Environment Internet Explorer 8.0 JRE 6.0 Update 20 10.1 10.2 10.3 11.1 Windows Server® 2003 (SP2) 32 bit Internet Explorer 8.0 JRE 6.0 Update 20 10.1 10.2 10.3 11.1 Windows Server 2003 R2 (SP1) 32 bit Internet Explorer 6.0 SP1 JRE 5.0 Update 11 10.1 Windows Server 2003 R2 (SP2) 32 bit Internet Explorer 8.0 JRE 6.
Table 2 Software requirements for Windows-based computers (continued) Operating system 1 Browser 3,4 32 bit/ Java Runtime Flash Player Environment3, 5 64 bit 4. When you use Internet Explorer 8.0 or later, turn off SmartScreen Filter. 5. Use the JRE that is provided by Oracle® Corporation. Requirements for UNIX/Linux-based computers Table 3 Hardware requirements for UNIX/Linux-based computers Item Requirement Processor (CPU) Pentium 4 640 3.2 GHz or better (Recommended: Core2Duo E6540 2.
Setting up TCP/IP for a firewall To connect the Remote Web Console computer and the SVP through a firewall, configure the firewall so that the TCP/IP port for the protocol you use becomes available. When attaching the Remote Web Console to multiple storage systems, the installer must log in to the SVP of each storage system using separate Remote Web Console sessions and separate Web browser instances.
Installing and configuring the JRE You can download and install the JRE from the Java Website at http://java.sun.com/products/ archive. In a Windows environment, you can verify that JRE was successfully installed if you are able to view the Java icon in the Control Panel. You should be able to launch the Java Control Panel by double-clicking the Java icon. In a UNIX or Linux environment, you can verify that JRE was successfully installed if you are able to open the ControlPanel.
Troubleshooting If you cannot access the SMI-S function, check the network environment and access destination. If access cannot be made even though there is no problem with the network environment and access destination, contact HP Technical Support. Uploading a signed certificate to the SMI-S provider To use certificates in SSL communication with the SMI-S provider, you must update and upload the private key and the signed server certificate (public key) to the SMI-S provider to update the certificate.
NOTE: If an error occurs during update of the certificate, an error message displays. Resolve the problem and then run the procedure again, starting with logging in, to update certificate files for SMI-S. Returning an SMI-S provider certificate to default You can return a certificate updated in (page 27) to default. To return a certificate to default: 1. 2. 3. Terminate all instances of Remote Web Consoles that are connected to the SMI-S provider.
Prerequisites • Ensure that the SMI-S provider configuration file (user-defined.properties) has already been created. Change the file name to user-defined.properties unless the file is already named that. Procedure To upload the SMI-S provider configuration file: 1. 2. From a PC on which the Remote Web Console operates, start the Web browser. Specify the following URL to open the Tool Panel dialog box. http://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi 3.
4. In the Tool Panel dialog box, click Update Configuration Files for SMI-S. The login dialog box for Upload Configuration Files for SMI-S opens If SSL communication has been established, the Security Alert dialog box opens before the login dialog box. If so, click OK. If the Security Alert dialog box regarding the certificate opens at other times, click View Certificate to confirm that the certificate is correct and then click Yes. 5. 6. 7.
1. 2. 3. Insert the Report Configuration Tool installation CD into the CD-ROM drive. On the CD, navigate to the /program/Config_Report_CLI/Win32 folder and double-click setup.exe. Follow the instructions on the screen. When prompted, enter the name of the directory in which to install the report configuration tool. The installer continues until the tool is installed. NOTE: The directory where the report configuration tool is installed is not specified as an application path.
3 Getting started using Remote Web Console This topic describes login and restrictions when using Remote Web Console. For instructions on navigating to storage system information, see Viewing and managing the storage system (page 75).
6. If a local storage area pop-up dialog box of Adobe Flash Player Setting appears, click Allow to open the Remote Web Console main window. The cache function of Flash Player optimizes the process of Remote Web Console. Denial of the request might delay the processing speed of Remote Web Console. Figure 11 Flash Player local storage area dialog box NOTE: The roles and resource groups for each user are set up ahead of time and will be available to you when you log in to Remote Web Console.
To add the SVP to the trusted sites zone 1. 2. 3. 4. Click Add in the message dialog box. The Trusted Sites dialog box opens. In Add this web site to the zone, enter the URL of the SVP that you want to log in to. For example, if the host name is host01, the URL is https://host01. If the IP address is 127.0.0.1, the URL is https://127.0.0.1. Click Add to add the URL of the SVP to the web sites list. Click Close to close the dialog box.
• Do not disable Flash Player because Flash Player is necessary for Remote Web Console and works as an add-on to a Web browser. If you use Internet Explorer, do not change the settings in Tools→Manage Add-ons. • Do not use the following Web browser functions: character encoding, text size, the zoom function, the Ctrl+F (search), Ctrl+A (select all). • Use the Tab shortcut only to move the focus to Flash Player; do not use the Shift+Tab.
If the error occurs while you are either switching between Modify and View mode, or switching tabs, wait a few minutes, click Refresh on the File menu, and then retry the operation. • When the microcode is being updated on the SVP, you must exit and restart all Web client sessions on the Remote Web Console computer. • When you use Remote Web Console on Windows, the Add or Remove Programs window in the Windows’ Control Panel might or might not display Remote Web Console.
Table 6 User view items that can be reset (continued) # Part Item Status after reset Rows/Page Default (1,000) z Capacity Unit Default (depends on the configuration) Condition Cleared 12 ON/OFF OFF 13 Opened/Closed Closed 14 Property table Open/Closed Opened 15 Wizard Options area Closed 9 Table Options 10 11 Filter For more information about Remote Web Console After you log in, the Remote Web Console main window opens. You can navigate using the menu, tree, or General Tasks.
4 Setting up and managing user accounts When Remote Web Console has been set up on the SVP, and the client computers are set up, you create user accounts for Remote Web Console users and define their roles. This topic provides information for setting up and managing user accounts. Workflow for creating and managing user accounts Administrators use Remote Web Console to create accounts for all users.
Figure 15 Logging in when an authentication server and an authorization server are used in combination You can use the authentication server without knowing the host names and port numbers, if you register the information of the authentication server as an SRV record in the DNS server. If you register the multiple numbers of authentication servers to the SRV record, you can determine the authentication server to be used, based on the priority that has been set in advance.
Prerequisite software • Active Directory Authentication protocol for user for searching • LDAP v3 Simple bind Connecting two authentication servers Two authentication servers can be connected. When the servers are connected, the server configurations must be the same, except for the IP address and the port.
2. 3. 4. 5. 6. 7. 8. Click Setup Server to open the Setup Server window Select the type of the authentication server. Specify options to connect to the authentication server. If you use more than one authentication server or an authorization server, specify an option for each server. To test the connection in the Server Configuration Test field, click Check. Click Finish. Enter a task name, and then, click Apply.
For details about resource groups, see HP XP P9000 Provisioning for Open Systems User Guide or HP XP P9000 Provisioning for Mainframe Systems User Guide. User registering example • The setting operations that affect the security of the whole system must be done by the administrator. • The setting operations on the resource group 10 must be done by user A. • The setting operations on the resource group 20 must be done by user B.
Table 8 Roles, Permissions, and Capabilities Role Permissions Capabilities Security Administrator View Only • Viewing information about user accounts and encryption settings • Viewing information about encryption key in the key management server Security Administrator View & Modify • Configuring user accounts • Creating encryption keys and configuring encryption settings • Viewing and switching where encryption keys are generated • Backing up and restoring encryption keys • Deleting encryption keys
Table 8 Roles, Permissions, and Capabilities (continued) Role Permissions Capabilities • • Configuring host groups, paths, and WWN • Configuring Auto LUN except splitting Auto LUN pairs when using RAID Manager • Configuring access attributes for LDEVs • Configuring LUN security • Continuous Access Synchronous and ESAM operations in general* Storage Administrator Storage Administrator Performance management • Configuring monitoring Local copy • Performing pair operations for local copy • Starting an
NOTE: Normally, the Support Personnel role is assigned to a HP service representative, but if the role is assigned to a user account, dump files can be downloaded using the FD Dump tool Built-in groups, roles, and resource groups More than one built-in group is available to each user. You cannot change roles or resource groups set to the built-in groups. The following table shows the built-in groups, and their built-in roles and resource groups.
Table 9 Roles and resource groups configured in built-in groups Built-in Group Role Resource group Administrator • Security Administrator (View & Modify) All Resource Groups Assigned • Audit log Administrator (View & Modify) • Storage administrator (Initial Configuration) • Storage Administrator (System Resource Management) • Storage Administrator (Provisioning) • Storage Administrator (Performance Management) • Storage Administrator (Local Copy) • Storage Administrator (Remote Copy) • User Maintenanc
Table 9 Roles and resource groups configured in built-in groups (continued) Built-in Group Role Resource group • Storage Administrator (Performance Management) • Storage Administrator (Local Copy) • Storage Administrator (Remote Copy) • Support Personnel • User Maintenance Maintenance • Storage Administrator (View Only) • User Maintenance All Resource Groups Assigned Creating a new user group This topic explains how administrators can create a user group.
Creating user accounts This topic explains how to create a user account and register the account to a user group with appropriate permissions. Prerequisites • You must have Security Administrator (View & Modify) role to perform this task. • You can log in to SVP and RAID Manager with user accounts that are created by Remote Web Console. You must have Support Personnel role to log in to the SVP. • You can log in to SVP and RAID Manager with user accounts that are created by Remote Web Console.
Table 12 User name and password for logging in to RAID Manager Item Length in characters Characters that can be specified User name 1-63 ◦ Alphanumeric (ASCII code) characters ◦ Following symbols (see Note below) : -.@_ Password 6- 63 ◦ Alphanumeric (ASCII code) characters ◦ Following symbols (see Note below) : -.@_ NOTE: If you use a Windows computer for RAID Manager, you can also specify a backslash (\). When you use a UNIX computer for RAID Manager, you can also specify a slash (/).
2. 3. 4. 5. 6. On the User Groups tab, select the user group to which the user belongs. Click the User tab, select the user, and then, click Change Password. The Change Password dialog box opens. Specify a new password for the user in the two password fields. Click Finish. Specify a task name, and click Apply. Changing user permissions User permissions are determined by the groups to which the user belongs. You change these permissions by changing membership in the user group.
To allow the user to log in to Remote Web Console, perform the operation above, and click Activate instead of Lock in the Edit User dialog box. Deleting user accounts Security Administrators can delete a user account when the account is no longer in use. Built-in user accounts cannot be deleted. Prerequisites You must have Security Administrator (View & Modify) role to perform this task. To delete a user account: 1. 2. 3. 4. In the resource tree, click Administration→User Groups.
Importing a tool definition file into HP Systems Insight Manager To implement single sign-on, you need to import a Remote Web Console tool definition file into HP Systems Insight Manager. To import a Remote Web Console tool definition file into HP Systems Insight Manager: 1. Download a Remote Web Console tool definition file from the following URL. Some Web browsers may display the content of the tool definition file. In this case, save the displayed content as an XML file by using the Web browser.
5. 6. 7. If necessary, enter an alias name of the certificate into the Alias Name box. By default, the IP address or the host name that you specified in the Register Certificate window is displayed in the Alias Name box. Enter the user name and password of Remote Web Console. Click Register. Deleting the certificates for single sign-on To delete certificates from SVP: 1. Specify the following URL to open the Delete Certificates window. https://IP-address-or-host-name-of-SVP/cgi-bin/utility/sceDelete.
To change the user group name: 1. 2. 3. 4. 5. 6. In the tree, click Administration→User Groups. From the User Groups tab, select the user group, and then, click More Actions→Edit User Group to open the Edit User Group window. In the Edit User Group window, enter a new user group name. If you use an authorization server, click Check, and verify that the entered user group name is registered in the authorization server. Click Finish. Specify a task name, and click Apply.
3. 4. 5. In the Edit Resource Group Assignment window, change resource groups to be assigned to the user group. • Select the resource group to add, and click Add. • Select the resource group to remove, and click Remove. Click Finish. Specify a task name, and click Apply. Deleting a user group Delete a user group when the user group is no longer needed. Prerequisites • You must have Security Administrator (View & Modify) role to perform this task. • You cannot delete built-in groups.
5 Configuring the Remote Web Console environment This topic provides instructions for setting customized behaviors on Remote Web Console, including timeout and polling periods, e-mail notifications, and so on. Also, instructions are included for saving your Remote Web Console configuration settings and restoring them as needed. Configuration overview You can set up the following Remote Web Console behaviors: • Create a message to display on the Remote Web Console login screen.
3. Enter the message in the window. Alphanumeric characters and symbols can be used in the message. The maximum length of the message is 2,048 characters. 4. Click Apply. Setting e-mail notification for SIMs or SNMP traps You can specify notification by e-mail to key users when system failures occur. Failures reported in the e-mail are the same as the SIMs displayed in the Alerts window or reported by SNMP traps.
3. 4. 5. Select Enable in Mail Notice. Select IPv4, IPv6, or Host Name, and enter the IP address or host name of the mail server. In SMTP-AUTH, select Enable to use SMTP authentication. Enter the account and password for SMTP authentication Select Disable not to use SMTP authentication. 6. 7. Enter addresses in the From Address (required) and Return Address (optional). In To Address, add an e-mail address: a. Select a blank row in the list. b. Enter an e-mail address in the text box. c.
Table 15 E-mail details for system failures notice # Item Description 1 Date Date and time when the e-mail was sent. This time stamp is set by the mail server. 2 To E-mail address of the receiver. 3 From E-mail address of the sender. 4 Reply-To E-mail address to which replies from the receivers will be sent. Optional. 5 Subject E-mail title. Cannot be changed. 6 Date Date when a system failure occurred. 7 Time Time when a system failure occurred.
Table 16 Environment parameters Item Description RMI time-out period If the user cannot access the SVP for a certain period of time because of a network error, the RMI time-out logs the user out of the SVP. • The value of the RMI time-out period must be greater than the value set for the smallest polling period, either for checking exclusive lock or for checking obstacles (see below for those parameters).
Table 17 Roles required to back up and restore configuration files Configuration file Description Required role to back up a Required role to restore a file file User Account Information User account information registered to the Security Administrator Remote Web Console. (View Only) Security Administrator (View & Modify) Environment Parameter List The parameters settings in the Set Env. window.
To restore the configuration files: 1. Start a Web browser, and enter the following URL to open the tool panel: http://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi 2. 3. 4. 5. 6. 7. 8. 9. Click Control Panel to open the Control Panel. Enter the user ID and password, and click Login. Click the Restore tab to open the Restore dialog box. Click the files, and click Browse to specify the directory of the file. You can restore only the files for which you have permission. Click Next.
To send a test syslog: 1. 2. 3. 4. 5. 6. 7. Click Settings→Environmental Setting→Edit SIM Syslog Server Settings. Make sure that the servers are set to Enable and that the settings in the window are correct. Check Send a test message. Enter a name in the Location Identification Name field to identify the storage system. Click Finish Specify a task name, and click Apply. Confirm that the syslog servers received the following log: RefCode:7FFFFF, This is a Test Report.
6 License keys Accessing software functionality requires a license key. This topic provides information on license keys and instructions for installing, disabling, enabling, and uninstalling license keys. License keys overview When you install a license key, it is also enabled. The functionality for the software that you installed is available in Remote Web Console. The license key can be disabled. This allows you to conserve time on a term key, for example.
Using the permanent key You can purchase the permanent key to use a software application and purchase a license key for the amount of the required capacity. • If insufficient licence capacity is installed, Not Enough License is displayed in the status field of the License Key window, and the software application is not enabled.
You can also use the emergency key if the configuration of the software application that is installed by the temporary key remains in the changed status and cannot be restored to the original status. For example, if you do not plan to purchase the software application with the emergency key. CAUTION: • If the emergency key is installed in the software application in which the permanent key, term key, or meter key is installed, the effective term of the license key is 30 days.
Example of licensed capacity of permanent key + licensed capacity of meter key >= used capacity The meter license is used, and the licensed capacity of the meter key is subtracted. Meter is displayed in the key type field, and Installed is displayed in the status field. If the used capacity is 4 TB, the licensed capacity of the permanent key is 3 TB, the licensed capacity of the meter key is 2 TB, and the effective term is 2 days.
In the Grace Period term, the operation can be performed in the same manner as the Installed status. However, as the license capacity of the meter key continues to be subtracted, the subtraction continues even if the license capacity of the meter key becomes a negative value. For example: • If the licensed capacity of the meter key is -10 TB and 20 TB of license capacity is installed, the remaining licensed capacity becomes 10 TB.
Table 20 Software and licensed capacity (continued) Option name Licensed capacity Notes Continuous Access Journal Used capacity for normal volumes 2 To use Continuous Access Journal, first install Continuous Access Synchronous. Continuous Access Journal Z Used capacity for normal volumes To use Continuous Access Journal Z, first install Continuous Access Synchronous Z. External Storage Access Manager Unlimited To use External Storage Access Manager, first install Continuous Access Synchronous.
Table 20 Software and licensed capacity (continued) Option name Licensed capacity Resource Partition Unlimited Notes 1 Volume Retention is not supported for version 01.
External Volume Capacity (KB) = Volume Capacity (number of blocks) X 512 (bytes) / 1,024 Calculating pool capacity The license capacity of Thin Provisioning is calculated using the total capacity of the Thin Provisioning pool.
Prerequisite The license key file name can be up to 200 alphanumeric characters but cannot include the following symbols: " \ ; : , * ? < > | / . To install software using the license key file: 1. Click Settings→Environmental Setting→License Key. The License Key window opens. 2. 3. 4. Click to change to Modify mode. From Mode, click File. The Browse button becomes available.
4. 5. 6. In License Status, select Enable or Disable. Click Set. The Status column changes to Install or Install (Disabled). Click Apply. The status changes. Removing software To remove software: 1. Click Settings→Install→License Key. The License Key window opens. 2. 3. 4. 5. 6. 7. Click to change to Modify mode. Select the desired option that you want to remove from the list. From Mode, click Key Code. Click Uninstall. The status changes to Remove. Click Apply.
Status column of the License Key window. After that, when you re-enable software-A, software-B is also re-enabled. If the Status column for software-B continues to display Installed (Disabled), go to the License Key window and manually change the status of software-B back to Installed. After your license key expires, no new configuration settings can be made, and no monitoring functions can be used with Performance Monitor.
7 Viewing and managing the storage system This topic describes how to navigate to storage system information, create and download system configuration reports, and manage Remote Web Console tasks. Viewing and managing overview This topic shows you how to do the following tasks in Remote Web Console: • Perform basic navigation to storage system information. See Viewing storage system information (page 75). • Create, download, and delete system configuration up to 20 reports.
Viewing other system information You can also find other system information such as a port status and data regarding used and unused resources. This information is displayed in a Remote Web Console secondary window. To view other system information: 1. 2. 3. 4. 5. Click Settings→Environmental Setting→License Key. Java starts. If a message appears and asks if you want to run the Java application, click Run. The Remote Web Console secondary window opens.
Status icons for certain resources The status of certain resources is indicated by the following icons: Status Description The resource can be used normally. The resource has the following status: • The resource can be used, but has a limit on I/O performance and so on. • The status of the resource is changing. • The status of the resource is being confirmed. • The resource has subresources of different status.
Viewing a Remote Web Console report Adobe Flash Player is necessary to view reports. For details on Flash Player, see General restrictions (page 34) and Installing the Adobe Flash Player (page 25). Prerequisite • Users that create the report or users with Storage Administrator (Initial Configuration) role can view the report. To download and view a report: 1. 2. 3. 4. 5. 6. In the Remote Web Console tree, click storage systems→Reports. Specify the report to download. Click Download Reports.
Prerequisite Users that create the report or users with Storage Administrator (Initial Configuration) role can delete a configuration report. To delete a report: 1. 2. 3. 4. In the tree, click Storage Systems→Reports. Specify the report to delete. Click Delete Reports. Click Apply. Managing tasks This topic describes tasks and the Tasks window, and provides instructions for managing tasks.
3. 4. In the bottom right corner of the window, click the corresponding button for the task you want to perform: • Click Delete Tasks to delete or cancel a task. • Click Suspend Tasks to suspend a queued task. • Click Resume Tasks to resume a suspended task. • Click More Actions→Enable Auto Delete to delete tasks from the Task list when they have completed and the task list is full. This allows you to check for completed tasks and to clear the list when the limit (384) is reached.
Two examples of scripts are shown below. Refer to these examples as needed to create a script file that suits your needs. • Script example for creating a configuration report (page 81) • Script example for downloading a configuration report (page 82) Script example for creating a configuration report This script logs the user in, deletes a configuration report, creates a configuration report, and logs the user out, using the Report Configuration Tool.
GOTO :END EXIT /B :SLEEP REM REM ############################# SLEEP with %TIMEOUT% sec REM ping 127.0.0.1 -n %TIMEOUT% > NUL EXIT /B :ABEND REM ############################# ABEND ECHO "Create Report Script was ABEND" :END REM ############################# Logout %RAIDINF_PATH%\raidinf -logout -servername %SERVER% Script example for downloading a configuration report This script logs the user in, downloads a configuration report, and logs the user out, using the Report Configuration Tool.
SET /a CNT_DL=0 :DL_RETRY REM ####################################### Download %CNT_DL% SET /a CNT_DL=%CNT_DL% + 1 %RAIDINF_PATH%\raidinf download report -servername %SERVER% ^ -report %REPORT_NAME% -targetfolder %TARGETFOLDER% if ERRORLEVEL 1 ( IF %CNT_DL% GTR %LOOP% GOTO :ABEND CALL :SLEEP GOTO :DL_RETRY ) REM ####################################### Create Error Check IF EXIST %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz ( IF EXIST %TARGETFOLDER%\Report_%REPORT_NAME%.
REM ####################################### Logout %RAIDINF_PATH%\raidinf -logout -servername %SERVER% Executing a regularly scheduled script file To execute the created script file on a regular basis, register it as a scheduled task in Windows. The following procedure uses the Windows schtasks command to register the script files created in the example shown in Preparing a script file (page 80) as tasks of Windows. Registration example • Create a configuration report at 21:00 every day (CreateReport.
DownloadReport.bat Report_DailyConfigurationReport_1.tgz • On the second day: Report_DailyConfigurationReport_1.tgz is renamed Report_DailyConfigurationReport_2.tgz, and Report_DailyConfigurationReport_1.tgz is newly created. • From the third day on: Report_DailyConfigurationReport_1.tgz and Report_DailyConfigurationReport_2.tgz are renamed Report_DailyConfigurationReport_2.tgz and Report_DailyConfigurationReport_3.tgz, and Report_DailyConfigurationReport_1.tgz are newly created.
Error code Error message Cause of error and action Return value EW_LNGARG Argument too long. Either of the following causes is possible. 131 Please refer to the help. • The length of a parameter of the command exceeds 256 bytes. • The length of all the parameters of the command exceeds 1,021 bytes. See Report Configuration Tool command reference (raidinf commands) (page 115) and specify a new parameter. EW_MAXAPP Maximum application start. Please check starting application.
Error code Error message Cause of error and action EW_WEBERR Server name can not be resolved. The server specified by the -servername 131 option does not exist. Check the server name and specify a new server. Please check the setting of server name. EW_WEBERR Server is no response. Input argument server is incorrect or server is not ready. Return value No response from the server specified by the-servername option. Make sure that: 131 • The correct server name is specified.
8 Troubleshooting This topic provides information for identifying and correcting problems with Remote Web Console. General troubleshooting A system administrator is responsible for the operation and normal maintenance of the Remote Web Console Web client. The following are guidelines for troubleshooting the Remote Web Console Web client: • Check the cabling and the LAN. Verify that both the computer and LAN cabling are firmly attached, and that the LAN is operating properly. • Reboot the computer.
To check details of a SIM: 1. In the Remote Web Console main window, click Alert. The Alerts window opens. Figure 21 Alert icon on Remote Web Console main window 2. 3. To check the details of each alert, select and right-click one row, and then, click Detail in the pop-up menu. The detail dialog box opens.
Table 24 Java application errors (continued) Error condition Probable cause / recommended action If none of the above actions solve the problem, reinstall the JRE. 2 If you click the Remote Web Console menu, a message appears asking you to download the file, SJsvlSNStartServlet.door SJsvlAppStartServlet.do. One minute later, the application error (20020,10800) occurs.
Table 24 Java application errors (continued) Error condition Probable cause / recommended action 7 Restart the Remote Web Console computer, or terminate the Remote Web Console process with the following method. A message box remains displayed when opening the Remote Web Console secondary window (Java application). The Remote Web Console secondary window does not appear for a long time. • For Windows: Exit all applications using Java, and then terminate the javaw.exe and javaws.
Table 24 Java application errors (continued) Error condition Probable cause / recommended action 1. In the Windows menu bar, click Safety→SmartScreen Filter→Turn Off SmartScreen Filter. 2. Restart Internet Explorer. No-response errors The following table lists no-response errors: Table 25 No-response errors Error condition Probable cause / Recommended action 1 The SVP might have been restarted. Close Remote Web Console, wait 10 minutes, and then restart Remote Web Console.
Table 25 No-response errors (continued) Error condition Probable cause / Recommended action behind the window remains gray and does not go back to normal for a long period of time. • The entire Remote Web Console window is gray and does not go back to normal for a long period of time. For the Remote Web Console main window: • For Windows: Exit all Web browser windows, and then terminate the iexplorer.exe through the Task Manager.
Table 25 No-response errors (continued) Error condition 15 • After you click Refresh View or Refresh All in the Remote Web Console main window, the percentage of progress remains 99%. • After you click Refresh or Refresh All in the Remote Web Console secondary window, it displays the message, Loading, for a long time. 16 Probable cause / Recommended action The probable causes are as follows: • Another application such as RAID Manager may be changing configuration.
Table 26 Incorrect display errors (continued) Error condition Probable cause / Recommended action Make sure that all the required software options are installed. If they are installed, perform one of the following operations. • Click File→Refresh. • Click File→Refresh All. • Log in to Remote Web Console again. 5 When you switch windows from one window to the Close all windows, and then log in to Remote Web Console Remote Web Console window, the Remote Web Console again. window is not displayed.
Table 26 Incorrect display errors (continued) Error condition Probable cause / Recommended action 16 Click File→Refresh. The following information does not display on Remote Web Console windows: • Information on the storage system, such as ports or HDDs If the problem continues, close all Remote Web Console windows, and then clear the Java and Web browser caches.
Table 28 Other errors (continued) Error condition Probable cause / Recommended action not sure that the microcode on the SVP is upgraded or downgraded, clear the Java and Web browser caches. 2 Remote Web Console processing is temporarily delayed. Internal processing (such as, configuration change, P.P. check, or operational information acquisition) might be running on the SVP (Web server). 3 Remote Web Console processing is delayed. The local storage value for Adobe Flash Player might decrease.
Firefox Web browser problems on UNIX Note the following when using Firefox Web browser on UNIX: • If a java_vm process or a Firefox Web browser process becomes unavailable, Remote Web Console performance is affected. Delete the abnormal process and continue with Remote Web Console operations.
• Detail Dump files include all information about the SVP and the storage system. Select this if Remote Web Console has a serious problem (for example, when Remote Web Console does not start) or if you need to determine whether the storage system has a problem. • The Detail Dump (for DKC Performance) file contains I/O performance-related information. This performance-related information includes performance monitor collection information, in addition to information applicable to Detail Dump.
9 Support and other resources Contacting HP For worldwide technical support information, see the HP Support Center: http://www.hp.
Conventions for storage capacity values P9000 disk arrays use the following values to calculate physical storage capacity values (hard disk drives): • 1 KB (kilobyte) = 1,000 bytes • 1 MB (megabyte) = 1,0002 bytes • 1 GB (gigabyte) = 1,0003 bytes • 1 TB (terabyte) = 1,0004 bytes • 1 PB (petabyte) = 1,0005 bytes • 1 EB (exabyte) = 1,0006 bytes P9000 disk arrays use the following values to calculate logical storage capacity values (logical devices): • 1 KB (kilobyte) = 1,024 bytes • 1 MB (megab
CAUTION: IMPORTANT: NOTE: TIP: Indicates that failure to follow directions could result in damage to equipment or data. Provides clarifying information or specific instructions. Provides additional information. Provides helpful hints and shortcuts.
A Storage configuration reports This section describes the configuration reports you can generate. They are shown here according to the way they display: in tables, graphs, or CSV files. To create, download, and delete reports, see Viewing a Remote Web Console report (page 78). Reports in table view The reports described in this appendix appear in table format, as seen in the following example. icons are displayed before names of reports in table view.
Table 30 Disk Adapters report (continued) Item Description Number of PGs The number of the parity groups that the disk adapter controls. • If "DKA" is "External", this item indicates the number of parity groups mapped to external volumes. • If "DKA" is "External (FICON DM)," this item indicates the number of parity groups mapped to volumes for FICON DM. Number of LDEVs (Total) The number of the logical volumes belonging to the parity groups that the disk adapter controls.
Table 32 Hosts report Item Description Port Location Name of the port. Port Internal WWN WWN of the port. Port Security Security of the port. Host Group Name of the host group. Host Mode Host mode of the host group. Host Mode Option Host mode option of the host group. Host mode options are separated by semicolons (;) when more than one option is specified. Host Name Name of the host that can access the LU path through the port. HBA WWN WWN of the host.
Table 34 Logical Devices report Item Description LDEV ID The logical volume number. LDEV Name The logical volume name. Capacity (MB) Capacity of the logical volume. Emulation Type Emulation type of the logical volume. Resource Group Name Resource group name where LDEV belongs. Resource Group ID Resource group ID where LDEV belongs. PG The parity group number. • If the number starts with "E" (for example, E1-1), the parity group contains external volumes.
Table 34 Logical Devices report (continued) Item Description Setting MPB The number of the MP blade that you specified to control the logical volume. Command Device : Security Indicates whether Security is specified as the attribute for the command device. Blank displays when "Attribute" is not "CMDDEV." Command Device : User Authentication Indicates whether User Authentication is specified as the attribute for the command device. Blank displays when "Attribute" is not "CMDDEV.
Table 36 MP Blades report (continued) Item Description Number of Resources (LDEV) The number of logical volumes that the MP blade controls. Number of Resources (Journal) The number of journals that the MP blade controls. Number of Resources (External Volume) The number of external volumes that the MP blade controls, including FICON DM volumes. Number of Resources (Total) The total number of resources that the MP blade controls.
Table 38 Parity Groups report (continued) Item Description Unallocated LDEV Capacity (MB) Capacity of the logical volumes in the parity group that the host cannot access. Drive Type-Code Type code of the drive in the parity group. • If the parity group contains external volumes, this displays the vendor, the model, and the serial number of the storage system. • Blank displays if the parity group contains volumes for FICON DM.
Table 39 Ports report (continued) Item Description Port Security Security of the port. Speed Data transfer speed of the port. Resource Group Name Name of the resource group in which the port belongs. Resource Group ID ID for the resource group in which the port belongs. Number of Hosts The number of the hosts registered to the port. Number of LUNs The number of the LU paths defined to the port. Number of LDEVs The number of the logical volumes that can be accessed through the port.
Table 42 Storage System Summary report (continued) Item Description Microcode Versions Version of the following programs. • Main • SVP • SSVP • HTP • FOEF • DKAF • FCDG • CUDG4 • RAM BOOT • ROM BOOT • CMBK • Config • HDD • HDD (SVP) • SSW • SCHIP • Battery • Exp • Exp (FMU) • CMSSD • Printout Tool Number of CUs The number of control units in the storage system. Shared Memory Size (GB) Capacity of shared memory. Cache Size (GB) Capacity of the cache.
Reports in graphical view The reports described in this topic display as graphics. icons are displayed before names of reports in graphical view. If the icons or graphics do not displayed properly, refresh the window Cache Memories report This report shows cache memory data, including shared memory capacity and PCB and DIMM cache. Figure 23 Cache Memories report Total capacity of the cache memory and shared memory is displayed separately for each module.
Figure 24 Channel Adapters report It shows channel adapters, ports, and types of channel adapters. On the bottom of the view, you can confirm the legend of ports (Installed or Not Installed). Physical View report This report shows disk controllers and disk units, and includes cache PCBs, MP blades, channel adapters, disk adapters, data drives, and spare drives.
Figure 26 Physical View report (back view) Physical View report has two views, which are the Front view and the Back view. Each view shows the disk controllers and disk units, so you can confirm where they are installed. If a module #1 exists, the information is displayed below module #0 information. At the top of each view, Storage System Type, Full Serial Number and Micro Version display. At the bottom of each view, a legend is displayed showing SAS, SATA, SSD, Spare, and Not Installed.
B Report Configuration Tool command reference (raidinf commands) This section describes the raidinf commands, symbols, and reports. raidinf command list and command description The following lists the raidinf commands and symbols. Table 43 raidinf command list Command Description raidinf add report Creates a report. raidinf delete report Deletes a report. raidinf download report Downloads a report. raidinf get reportinfo Displays a list of reports.
Syntax raidinf [-h]
Options: -h -login -logout Help/Usage Specify LOGIN explicitly Specify LOGOUT
CreateConfigurationReport ReportName UserName CreateTime 101009-CreateConfigurationReport user01 2010/10/09-12:43:10 The respective items of the output example are explained next. • ReportName The report name is displayed (up to 32 characters). • UserName The user name is displayed (up to 16 characters). If the user name exceeds 16 characters, an ellipsis (...) is displayed. • CreateTime The time of creating a report is displayed (up to 9 characters).
The name of the downloaded file is Report_report name.tgz. Note that the files are overwritten if reports of the same name has already existed. Example: the name of the downloaded file when the report name is 110309-CreateConfigurationReport Report_110309-CreateConfigurationReport.
Options and parameters Option Description servername Specifies the host name or the IP address of the Web server (SVP). Examples Displays a list of reports. # raidinf get reportinfo -servername 10.213.74.
C SMI-S provider configuration file This section describes the SMI-S provider configuration files. User-defined.properties file This section describes the description format and organization format of SMI-S provider user configuration files and parameters to be defined. The user-defined.properties file is an SMI-S provider user configuration file. File description format The format of the user-defined.
The CipherSuites parameter can use any of the following values: • SSL_RSA_WITH_RC4_128_SHA • TLS_DHE_RSA_WITH_AES_128_CBC_SHA • TLS_DHE_DSS_WITH_AES_128_CBC_SHA • TLS_RSA_WITH_AES_128_CBC_SHA • SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA • SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA • SSL_RSA_WITH_3DES_EDE_CBC_SHA Setting up the CipherSuites parameter Connect cipher suites with a comma (,) as a delimiter.
format <2HexLDKC>:<2HexCU>:<2HexLDEV> • <2HexLDKC>: LDKC number (two-digit hexadecimal) of the single virtual volume to be specified • <2HexCU>: CU number (two-digit hexadecimal) of the single virtual volume to be specified • <2HexLDEV>: LDEV number (two-digit hexadecimal) of the single virtual volume to be specified Example VVolForSnapshot=00:00:00to00:00:FF,00:02:00,00:04:00to00:04:FF In this example, a virtual volume having one of the following LDEV IDs is used as the snapshot target:
Table 46 Values for the DefaultSnapshotFunction parameter Value Description FS Enables Fast Snap COW Enables Copy-on-Write Snapshot Setting up the PoolIDForSnapshot parameter Specify FS or COW.
D Remote Web Console GUI reference (main window) This topic describes the Remote Web Console main window and wizards. Remote Web Console main window Menu Item Description Click to return to the previous window Click to advance to the next window File • Refresh All: Acquires all the information about the storage system and updates both the SVP and Remote Web Console. You must have Storage Administrator (initial configuration) permissions to use this function.
Item Description Reports • Task Management: Manages the tasks that will be applied to the storage system. • Configuration Report: Creates and downloads the configuration report about the storage system. • Performance Monitor: Monitors performance of the storage system. • Shredding Report: Downloads the shredding report. Settings • User Management: Manages user accounts of Remote Web Console including changing password. • Security: Performs audit log or encryption key operations.
Table Item Description Filter Open the filtering area. ON OFF When filter is ON, the items in the table are narrowed down according to the specified filtering conditions. Select All Pages Selects all pages when the table has multiple pages. Item Description Options Sets the table options. • Column Settings: Specifies whether you display or hide table columns. • Rows / Page: Specifies how many rows to display in one page.
To perform an operation using the main window and a wizard: 1. Click a function in the resource tree in the Explorer. 2. If necessary, choose a tab and use a filter to narrow down the items in the table. 3. Select an item in the table, and click a button to open a wizard. 4. 5. Set options in the wizard, and click Finish to confirm the setting. Enter a task name, and click Apply to apply the setting to the storage system. The setting is queued as a task and performed in order.
Figure 30 Buttons at upper right of main window Alert, Audit Log, and Resource Lock are updated every 60 seconds by default. To change the refresh interval, click Settings→Environmental Settings→Edit Information Display Settings, then change the value for Top Status Indicator Refresh Interval. If you place the mouse cursor over "Last Updated," Remote Web Console displays a tooltip (a small hover box) that shows how many minutes ago the last update was made. The update interval is 1 minute.
NOTE: . • Users can set up to 16 conditions. • When the input condition is wrong, click Apply to clear the condition. • Select the attribute whose date and time values must be entered, and then enter the values. • The values of date and time are "YYYY/MM/DD" and "hh:mm:ss," respectively. • After you enter the date in the first box, "00:00:00" is displayed in the second box as a default time value. Edit this value, as needed, and click Apply.
Window part Filter Wizard Option part Item State after reset Capacity unit GB or Cyl Setting column Default state (*) ON/OFF OFF Settings NA Open/Closed Closed Open/Closed Default state (*) (*) The default state varies from window to window. Column Settings window Table 47 Setting fields in the Column Settings window Item Description Restore Default Settings Changes the selection of the displayed columns to the factory default settings. Checkbox Selects the columns to display.
Storage Systems window • Hardware summary (page 132) • Allocation summary (page 132) Hardware summary Item Description Storage System Name Device name of the storage system. Storage System Type Model type of the storage system. Full Serial Number Serial number of the storage system. IP Address IP address of the SVP. Contact Contact information such as personnel and telephone number where you can inquire about the storage system. Location Location of the connected storage system.
Item Description Total: Displays all the open-systems, mainframe-systems and multi-platform volumes. Open Only: Displays only open-systems volumes. Mainframe Only: Displays mainframe-systems and multi-platform volumes. Capacity Unit Switches the displayed units of the capacity. • Appropriate: Displays capacity in appropriate unit depending on the capacity of each item. • TB/GB/MB: Displays capacity in the specified unit.
Physical Summary # Item Description 1 Allocated • When Open is selected from Open / Mainframe: Displays the capacity of path-defined open system volumes (LDEVs) and the number of logical devices that the host can recognize. This capacity includes all LDEVs that comprise LUSE volumes, but does not include control cylinders.
# Item Description • When Mainframe is selected from Open / Mainframe: Capacity and the number of logical devices do not display. 6 Available Space - Free Space • When Open is selected from Open / Mainframe: Displays free space that user can create Open volumes. Control cylinder is not included in the capacity. The number of logical devices does not display. • When Mainframe is selected from Open / Mainframe: Displays free space that user can create Mainframe-systems and multi-platform volumes.
Edit Storage System window This window lets you set storage system values. The configured values are required to use SNMP agents. Make sure to document the information, because the settings will be cleared when the SVP is replaced. • Enter a device name using up to 180 alphanumeric characters (ASCII codes), except for some symbols, such as ", \, ;, :, ,, *, ?, <, >, |, /, ^, and, and %. • You can also use a space, except for before and after the settings.
Confirm window (Edit Storage System) Edit Storage System table Item Description Storage System Name Device name of the storage system. Contact Contact information such as personnel and telephone number where you can inquire about the storage system. Location Location of the connected storage system. Edit Information Display Settings window Use this wizard to change the display parameters.
Item Description (Alerts, Audit log, and Resource You can specify 10–3600 seconds. The default value is 60 seconds. Lock) Task Screen Refresh Interval Interval for the automatic updates of the task window. You can specify 10–3600 seconds, or No Update. The default value is 60 seconds. No Update indicates the task window will be updated only when the user performs Refresh View or Refresh All. Resource Lock Properties window Displays information about the user who locks the storage system.
Item Description Lock User Displays the user name who locks. System Displays the system that locked user is using. Lock Start Time Displays the time when the lock starts. Unlock All All locked resource groups are forcibly unlocked. Tasks window This window displays a list of tasks performed on the storage system. Up to 384 tasks can display, including 256 that are Completed and/or Failed. Up to 128 tasks whose statuses are In Progress, Waiting, and Suspended can also display.
Tasks tab Item Description Task Name Task name specified by a user when the user performed the task. Click to view the detail of the task. Status Task status. Click to view more details about status or errors. • : Completed or Completed (Request): The task completed normally. • : In progress: the task is being processed by the system. • : Waiting: the task is not yet started. • : Suspended: the task has been suspended. • : Failed: the task ended abnormally. Type General name of the task.
Task Properties window This window displays details about a task performed on the storage system. Suspend Tasks window Use this window to suspend waiting tasks.
Selected Tasks table Item Description Task Name Task name specified by a user when the user performed the task. Status Task status. Type General name of the task. User Name User name who performed the task. Submission Time Date and time when the task was submitted. Resume Tasks window Use this window to resume suspended tasks. Selected Tasks table 142 Item Description Task Name Task name specified by a user when the user performed the task. Status Task status.
Delete Tasks window Use this window to delete tasks. If you delete a waiting task, the task will be cancelled. Selected Tasks table Item Description Task Name Task name specified by a user when the user performed the task. Status Task status. Type General name of the task. User Name User name who performed the task. Submission Time Date and time when the task was submitted.
Disable Auto Delete window Use this window to prevent a task from being automatically deleted from the task window. Selected Tasks table Item Description Task Name Task name specified by a user when the user performed the task. Status Task status. Type General name of the task. User Name User name who performed the task. Submission Time Date and time when the task was submitted.
Use this window to automatically delete completed tasks from the task window when the number of displayed tasks reaches the maximum (384 tasks). Selected Tasks table Item Description Task Name Task name specified by a user when the user performed the task. Status Task status. Type General name of the task. User Name User name who performed the task. Submission Time Date and time when the task was submitted. Reports window This window lists configuration reports about the storage system.
Summary Item Description Number of Reports Number of created reports. Reports tab Item Description Report Name Task name specified when users created a report. Click to view the report in HTML format. User Name User name who created the report. Submission Time Date and time when the report was created. Create Configuration Report Creates a new report. Download Reports Downloads the created report in both HTML and CSV format. Delete Reports Deletes the selected report.
Delete Reports window Use this window to delete configuration reports. Selected Reports table Item Description Report Name Task name specified when users created a report. User Name User name who created the report.
This window lists all user groups created in Remote Web Console. Summary Item Description Number of User Groups Number of user groups created in Remote Web Console. User Groups tab Item Description User Group Name Displays user group name. User Group Type Displays the user group type. Built-in: Indicates a built-in user group. User-created: Indicates a user group that users created. Number of Roles Displays the number of the roles that are assigned to the user group.
Window when User Group is selected • Summary (page 149) • Users tab (page 150) • Roles tab (page 150) Summary Item Description Number of Roles Displays the number of roles that are assigned to the selected user group. Number of Resource Groups Displays the number of resource groups that are assigned to the selected user group. Number of Users Displays the number of users who belong to the selected user group. User Group Type Displays the user group type.
Users tab Lists all users who belong to the selected user group. Item Description User Name Name of user who belongs to the user group. Account Status Account status. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console.
Resource Groups tab Lists the resource groups that are assigned to the selected user group. Item Description Resource Group Name (ID) Displays the name and ID of the resource group assigned to the user group. Number of User Groups Displays the number of user groups that are assigned to the resource group. Number of Parity Groups Displays the number of the parity groups that are assigned to the resource group. Number of LDEVs Displays the number of the LDEVs that are assigned to the resource group.
Item Description The allowable characters and length of user names depend on the application that the user uses. Account Status Account statuses. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server.
Change Password window Use this wizard to change the password for yourself or another user. Setting fields Item Description User Name Selected user name. Current Password Current password of your user account. Required only when you change your own password. New Password New password that the selected user enters for login. The allowable characters and length of passwords depend on the application that the user uses. Re-enter New Password Same password as above.
Selected User table Item Description User Name Selected user name. Current Password Current password. A hyphen (-) indicates no current password is specified. New Password New password. Edit User window Use this wizard to change the setting for authentication or for the account status. Setting fields Item Description User Name Selected user name. Account Status Account statuses. The following statuses are available: Enabled: The user can use the account.
Confirm window (Edit User) Selected User table Item Description User Name Selected user name. Account Status Account status. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server.
Available Users table Lists all the candidate users who do not belong to the selected user group. Item Description User Name Selected user name. Account Status Account status. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console.
Lists users to be added to the user group. Item Description User Name Selected user name. Account Status Account status. The following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server.
Item Description Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server. User Group Name Name of user group to which the user is added. Remove Users window Selected User Group table Item Description User Group Name Displays the name of the user group where the user is removed. Selected Users table Item Description User Name Selected user name. Account Status Account status.
Delete Users window Selected Users table Item Description User Name Selected user name. Account Status Account status. the following statuses are available: Enabled: The user can use the account. Disabled: The user cannot use the account or log in to Remote Web Console. Authentication Authentication method. The following methods are available: Local: Does not use authentication server. Uses a dedicated password for Remote Web Console. External: Uses authentication server.
Setting fields Item Description User Group Name Enter the name of the user group to be created. You can specify ASCII code characters, spaces, and the following symbols: ! # $ % and ' ( ) + - . = @ [ ] ^ _ ` { } ~ Check Check whether the entered user group name is registered to the authorization server when you use an authorization server. Confirm window (Create User Group) Create User Group table Item Description User Group Name Displays the name of user groups to be created.
Assigned Roles table Item Description Role Displays the roles that are assigned the user group to be created. Assigned Resource Groups table Item Description Resource Group Name (ID) Displays the name and ID of the resource group assigned to the user group to be created. Number of User Groups Displays the number of user groups that are assigned to the resource group. Number of Parity Groups Displays the number of parity groups that are assigned to the resource group.
Edit User Group wizard Edit User Group window Use this window to change the name of a user group. Setting fields Item Description User Group Name Enter the new name of the user group. You can use ASCII code characters, spaces, and the following symbols: ! # $ % and ' ( ) + - . = @ [ ] ^ _ ` { } ~ Check Check whether the entered user group name is registered to the authorization server when you use an authorization server.
Selected User Group table Item Description User Group Name Displays the new name of the user group. Number of Roles Displays the number of roles that are assigned to the user group. Number of Resource Groups Displays the number of resource groups that are assigned to the user group. Number of Users Displays the number of users that belong to the user group. All Resource Groups Assigned Displays whether all the resource groups are assigned. Yes: All resource groups are assigned to the user group.
Edit Resource Group Assignment wizard Edit Resource Group Assignment window Use this window to assign created resource groups to the user group and to assign created resource groups to the user group in the Create User Group window. Setting fields These fields display only when resource groups are assigned in the Create User Group wizard. Item Description All Resource Groups Assigned Displays whether all the resource groups are assigned to the user group.
Unassigned Resource Groups table Lists the resource groups that are not assigned to the user group. Item Description Resource Group Name (ID) Displays the name and ID of the resource group assigned to the user group to be created. Number of User Groups Displays the number of user groups that are assigned to the resource group. Number of Parity Groups Displays the number of parity groups that are assigned to the resource group.
Assigned Resource Groups table Lists the resource groups to be assigned to the user group. Item Description Resource Group Name (ID) Displays the name and ID of the resource group assigned to the user group to be created. Number of User Groups Displays the number of user groups that are assigned to the resource group. Number of Parity Groups Displays the number of parity groups that are assigned to the resource group.
Confirm window for Edit Resource Group Assignment Selected User Group table Item Description User Group Name Displays the new name of the user group. Assigned Resource Groups table Item Description Resource Group Name (ID) Displays the name and ID of the resource group assigned to the user group to be created. Number of User Groups Displays the number of user groups that are assigned to the resource group.
Edit Role Assignment wizard Edit Role Assignment window Use this window to add roles to the user group and to assign roles to the user group in the Create User Group window. Unassigned Roles table Lists roles that are not assigned to the user group. Item Description Role Displays roles.
Add button Adds the selected roles in the Unassigned Roles list to the Assigned Roles list. Remove button Removes the selected roles from the Assigned Roles list and relocates the selected roles to the Unassigned Roles list. Assigned Roles table Lists roles to be assigned to the user group. Item Description Role Displays roles.
Confirm window for Edit Role Assignment Selected User Group Item Description User Group Name Displays the new name of the user group. All Resource Groups Assigned Displays whether all the resource groups are assigned. Yes: All the resource groups are assigned to the user group. No: All the resource groups are not assigned to the user group. Assigned Roles 170 Item Description Role Displays the roles that are assigned to the user group.
Alerts window Displays the list of alerts (SIM) that occurred in the storage system. Summary Item Description Number of Uncompleted Alerts Displays the number of alerts that are not authenticated yet. • Acute: Displays total number of Acute level alerts that are not authenticated yet. • Serious: Displays total number of Serious level alerts that are not authenticated yet. • Moderate: Displays total number of Moderate level alerts that are not authenticated yet.
Item Description Error Level Displays error level of alerts. • Service: No need to deal with immediately. Errors that are dealt with within periodical maintenance. • Moderate: No need to deal with immediately. Errors that are dealt with within periodical maintenance. • Serious: Contact the HP Technical Support. Take adequate measure as instructed, report and solve the problem. • Acute: Contact the HP Technical Support. Take adequate measure as instructed, report and solve the problem.
Alert properties Item Description Error Code Displays reference codes of the SIM. For details about reference codes, contact HP Technical Support. About errors that need to be solved, see Checking alerts (page 88). Date Displays the date when alerts occurred. Error Level Displays error level of alerts. • Service: No need to deal with immediately. Errors that are dealt with within periodical maintenance. • Moderate: No need to deal with immediately.
Setup Server wizard Select Authentication Server window This window is displayed when you select Server Setup from the LDAP, RADIUS, or Kerberos properties window Setting field Item Description External Authentication Select the type of authentication server. • Disable: Does not use any authentication server. Users are authenticated with user information registered in the SVP. • LDAP: Users are authenticated with user information registered in the LDAP server.
Disable authentication server setup window This window is displayed when you select Disable in Select Authentication Server window. Selected Server table Item Description External Authentication Displays the type of the authentication server. • Disable: Does not use any authentication server. Users are authenticated with user information registered in the SVP. • LDAP: Users are authenticated with user information registered in the LDAP server.
LDAP Properties window This window is displayed when you select Disable or LDAP in External Authentication. LDAP Properties table Item Description DNS Lookup Displays whether to search for the LDAP server using the information registered in the SRV records in the DNS server. • Enable: Performs the search using information registered in the SRV records in the DNS server. • Disable: Performs the search using the host name and the port number. You can enter alphanumeric characters and all symbols.
Item Description Primary Port Number Displays the port number of the LDAP server. Domain Name Displays the domain name that the LDAP server manages. User Name Attribute Displays the attribute name to identify a user, such as a user ID. Base DN Displays the Base DN for searching for users to authenticate. Search User's DN Displays the DN of the user for searching. Password Displays asterisks (*) to mask the password of the user for searching.
RADIUS Properties table Item Description Authentication Protocol Displays the RADIUS protocol to use. • PAP: Password authentication protocol that transmits plaintext user ID and password. • CHAP: Challenge-handshake authentication protocol that transmits encrypted password. Primary Host Name Displays the host name, the IPv4 address, or the IPv6 address of the RADIUS server. Secret Displays asterisks (*) to mask the RADIUS secret key used for the PAP or CHAP authentication.
Item Description External User Group Mapping Search User's DN Search for a user by specifying a DN Available characters: Alphanumeric characters (ASCII characters) and all symbols. If you specify sAMAccountName in External User Group Mapping - User Name Attribute, or if you select Enable in External User Group Mapping, this item must be specified. If you select Disable in External User Group Mapping, this item is disabled. You can enter alphanumeric characters and all symbols.
This window is displayed if you select Kerberos from the External Authentication window. Kerberos Properties table Item Description DNS Lookup Displays whether to search for the Kerberos server using the information registered in the SRV records in the DNS server. • Enable: Performs the search using information registered in the SRV records in the DNS server. • Disable: Performs the search using the host name and the port number. Realm Name Displays the default realm name.
Item Description In some cases, you may need to use a backslash and an ASCII character to escape. • \ -> \5c (hexadecimal) • / -> \2f (hexadecimal) • "-> \22 (hexadecimal) External User Group Mapping Password Displays asterisks (*) to mask the password of the user for searching. External User Group Mapping Timeout Displays the number of seconds before connection to the LDAP server times out.
Setup Server for LDAP Setup Server for LDAP window This window is displayed if you select LDAP in the Select Authentication Server window. Setting fields Item Description Certificate File Name Specify a certificate file. Click Browse to find the file. DNS Lookup Specify whether to search for the LDAP server using the information registered in the SRV records in the DNS server. • Enable: Performs the search using information registered in the SRV records in the DNS server.
Item Description Authentication Protocol Specify an LDAP protocol to use. Available protocols are as follows. • LDAP over SSL/TLS • STARTTLS If you select Enable in DNS Lookup, you cannot select LDAP over SSL/TLS. External User Group Mapping Specify whether to connect an authentication server to an authorization server. • Enable: Connects an authentication server to an authorization server. • Disable: Does not connect an authentication server to an authorization server.
Item Description If you specify sAMAccountName in External User Group Mapping - User Name Attribute, or if you select Enable in External User Group Mapping, this item must be specified. You can enter alphanumeric characters and all symbols. Note, however, that when you enter symbols like the following, you need to use a backslash to escape for each symbol: +;,<=>\/" In some cases, you may need to use a backslash and an ASCII character to escape.
Confirm window for LDAP Setup Server Selected Server table Item Description External Authentication Displays the type of the authentication server. • Disable: Does not use any authentication server. Users are authenticated with user information registered in the SVP. • LDAP: Users are authenticated with user information registered in the LDAP server. • RADIUS: Users are authenticated with user information registered in the RADIUS server.
Setup Server table Item Description Certificate File Name Displays the certificate file. DNS Lookup Displays whether to search for the LDAP server using the information registered in the SRV records in the DNS server. • Enable: Performs the search using information registered in the SRV records in the DNS server. • Disable: Performs the search using the host name and the port number. Authentication Protocol Displays the LDAP protocol.
Setup Server for RADIUS Setup Server RADIUS window This window is displayed if you select RADIUS from the Select Authentication Server window. Setting fields Item Description Authentication Protocol Specify a RADIUS protocol to use. • PAP: Password authentication protocol that transmits plaintext user ID and password. • CHAP: Challenge-handshake authentication protocol that transmits encrypted password. Host Name Specify a name of the RADIUS server.
Item Description ! # $ % and ( ) * + - . = @ \ ^ _ | Re-enter Secret Re-enter the RADIUS secret key to confirm your entry. You can specify ASCII code characters and the following symbols: ! # $ % and ( ) ' * + - . = @ \ ^ _ | NAS Address Specify an identifier for the RADIUS server to find SVP. • To specify a host name, select Identifier, and enter the host name. You can specify ASCII code characters and the following symbols: ! " # $ % and ( ) * + , - .
Item Description If you select Enable in DNS Lookup, you cannot select LDAP over SSL/TLS. If you select Disable in External User Group Mapping, this item is disabled. External User Group Mapping - Host Name Specify a host name of the LDAP server. You can specify ASCII code characters, hyphens (-), and periods (.). If you select Enable in DNS Lookup, or if you select Disable in External User Group Mapping, this item is disabled.
Item Description If you enter any password in External User Group Mapping - Password, you must specify this item. If you select Disable in External User Group Mapping, this item is disabled. External User Group Mapping - Timeout Specify the number of seconds before connection to the LDAP server times out. External User Group Mapping - Retry Interval Specify a retry interval in seconds when the connection to the LDAP server fails.
Confirm window for RADIUS Setup Server Selected Server table Item Description External Authentication Displays the type of the authentication server. • Disable: Does not use any authentication server. Users are authenticated with user information registered in the SVP. • LDAP: Users are authenticated with user information registered in the LDAP server. • RADIUS: Users are authenticated with user information registered in the RADIUS server.
Item Description Secret Displays asterisks (*) to mask the RADIUS secret key used for the PAP authentication or the CHAP authentication. NAS Address Displays the identifier for the RADIUS server to find SVP. Primary Port Number Displays the port number of the RADIUS server. Timeout Displays the number of seconds before connection to the RADIUS server times out. Number of Retries Displays the retry times when the connection to the RADIUS server fails.
Item Description In some cases, you may need to use a backslash and an ASCII character to escape. • \ -> \5c (hexadecimal) • / -> \2f (hexadecimal) • "-> \22 (hexadecimal) External User Group Mapping - Password Displays asterisks (*) to mask the password of the user for searching. External User Group Mapping - Timeout Displays the number of seconds before connection to the LDAP server times out.
Setup Server for Kerberos Setup Server Kerberos window This window is displayed if you select Kerberos in Select Authentication Server window. Setting fields Item Description DNS Lookup Specify whether to search for the Kerberos server using the information registered in the SRV records in the DNS server. • Enable: Performs the search using information registered in the SRV records in the DNS server. • Disable: Performs the search using the host name and the port number.
Item Description You can specify ASCII code characters, hyphens (-), and periods (.). If you select Enable in DNS Lookup, this item is disabled. Port Number Specify a port number of the Kerberos server. If you select Enable in DNS Lookup, this item is disabled. Clock Skew Specify an acceptable range of time difference between the SVP and the Kerberos server. Timeout Specify the number of seconds before connection to the Kerberos server times out.
Item Description In some cases, you may need to use a backslash and an ASCII character to escape. • \ -> \5c (hexadecimal) • / -> \2f (hexadecimal) • "-> \22 (hexadecimal) External User Group Search for a user by specifying a DN Mapping - Search User's DN Available characters: Alphanumeric characters (ASCII characters) and all symbols. If you specify sAMAccountName in External User Group Mapping - User Name Attribute, or if you select Enable in External User Group Mapping, this item must be specified.
Confirm window for Kerberos Setup Server Selected Server table Item Description External Authentication Displays the type of the authentication server. • Disable: Does not use any authentication server. Users are authenticated with user information registered in the SVP. • LDAP: Users are authenticated with user information registered in the LDAP server. • RADIUS: Users are authenticated with user information registered in the RADIUS server.
Setup Server table Item Description DNS Lookup Displays whether to search for the Kerberos server using the information registered in the SRV records in the DNS server. • Enable: Performs the search using information registered in the SRV records in the DNS server. • Disable: Performs the search using the host name and the port number. Realm Name Displayed the default realm name. Primary Host Name Displays the name of the Kerberos server.
Item Description In some cases, you may need to use a backslash and an ASCII character to escape. • \ -> \5c (hexadecimal) • / -> \2f (hexadecimal) • "-> \22 (hexadecimal) External User Group Mapping - Password Displays asterisks (*) to mask the password of the user for searching. External User Group Mapping - Timeout Displays the number of seconds before connection to the LDAP server times out.
Setting fields Item Description Primary Server Specify whether SIMs are reported to syslogs in the primary server. • Enable: SIMs are reported to syslogs in the primary server. • Disable: SIMs are not reported to syslogs in the primary server. Primary Server - IP Address Specify an IP address of the primary syslog server. You can specify an IPv4 address or an IPv6 address. • To specify an IPv4 address, select IPv4 and enter 4 numbers (0-255). For example: XXX.XXX.XXX.
Confirm window (Edit SIM Syslog Server Settings) Syslog Server table Item Description Primary Server - SIM Transfer Displays whether SIMs are reported to syslogs in the primary server. • Enable: SIMs are reported to syslogs in the primary server. • Disable: SIMs are not reported to syslogs in the primary server. Primary Server - IP Address Displays an IP address of the primary syslog server. Primary Server - Port Number Displays a port number of the primary syslog server.
E Remote Web Console GUI reference (secondary windows) This topic describes the Remote Web Console secondary windows. Remote Web Console secondary window The Remote Web Console secondary window is reset when you do any of the following: • Click Apply or Cancel. • Click Refresh or Refresh All on the File menu. • Switch tabs. Item Description Title bar Provides information about the connected storage system. • IP indicates the IP address of the SVP. • S/N indicates the serial number.
Item Description • The information may not display correctly if SVP maintenance is in progress. • Try this command if the configuration information displayed on the Remote Web Console differs from the actual configuration information that can be recognized from the host. File > Refresh Displays the latest information on Remote Web Console. The information might not display correctly when the exclusive lock is effective or SVP maintenance is in progress.
Opening Remote Web Console secondary windows Some Remote Web Console operations are performed through secondary windows that use a Java application. For this reason, whether you are using JRE 5.0 or 6.0, a message might appear and ask if you want to run a Java Application. You might see slightly different dialog boxes depending on your environment and configuration. To use Remote Web Console, click Run in the following dialog box.
If Modify mode is released due to a timeout, the current window will still be visible, but an error message is returned after you click Apply, or after you try to refresh the window through File→Refresh All or Refresh View . About window The About command provides storage system information. Item Description Storage System Type Displays the product name of the connected storage system. Serial Number Displays the serial number of the connected storage system.
License Key window Use the License Key window to install and uninstall software. Item Description License Key list Lists license keys (software). Mounted capacity Displays the capacity of created LDEVs in the storage system. When you install the software application whose license capacity type is Mounted capacity, install more license capacity than the mounted capacity.
License Key list Item Description Product Name The name of the product and icon indicating whether this is available. Key Type • : Installed • : Not Installed The license type: • Permanent • Term • Temporary • Emergency • Meter • Not Installed (when no license key is installed) Permitted Volumes The column shows the following information: • Unlimited: The capacity is unlimited • Unlimited (xx.xxTB) : The capacity is unlimited and xx.xx indicates the used license capacity.
Item Description you delete pairs or pools. In these cases, you can refresh the license status by using the Available button. • Expired: The term has already expired for the temporary key. When the status is Expired, you cannot re-install the temporary key. Status and icons License Key status Icon Key type Not installed. (Not Installed) Not Installed Installed with the Permanent key.
License Key status Icon Key type Permitted volume Term (days) Status Note 2: The Term column shows the number of days remaining before software expiration. Alerts window Use the Alerts window to check the SIMs occurred in the storage system. To check the detail of each alert, select a SIM in a list, right-click it and then, click Detail. The alert history is displayed in a list. A status indicator is displayed at the upper right of the main window to show whether DKC or DKU is in bad condition.
Item Description For resolving SIM reference codes, see Checking alerts (page 88). Error Level The error level. When the status becomes other than Normal, all SIMs must be completed (resolved) from the SVP to restore the status to Normal. • Normal: No error occurs and the status is good. • Service: Does not require immediate attention and can be addressed during routine maintenance. • Moderate: Does not require immediate attention and can be addressed during routine maintenance.
Login Message window Use the Login Message window to specify the login caution message that appears when Remote Web Console users log in. Item Description Login Message You can enter alphanumeric characters (ASCII codes) and some symbols. You can enter up to 2,408 letters. The message that you enter in this text box will appear in the Remote Web Console Login window. Apply Implements all the changes or settings. This button is available only in Modify mode. Cancel Cancels the changes or settings.
Use the E-mail Information window to configure settings to report storage system failures (SIMs) by e-mail. You can also send a test e-mail from this window. Item Description Mail Notice Specify whether to report system failures by e-mail. • Enable: Reports system failures by e-mail. • Disable: Does not report system failures by e-mail. Mail Server Set an IPv4 address, an IPv6 address, or a host name of the mail server.
Report Display dialog box The Report Display dialog box provides the basic configuration information of the storage system. This dialog box opens separately from Remote Web Console window, so you can configure settings while viewing the dialog box. To open the Report Display dialog box, open the Remote Web Console secondary window, then click File→Reports.
◦ X (00:00:01X) indicates that the LDEV is a Thin Provisioning virtual volume. ◦ M (00:00:01M) indicates that the LDEV is a migration volume.
Item Description • Speed: Data transfer speed, in Gbps (gigabits per second), for Fibre Channel ports. • Address (Loop ID) : Address and Loop ID of port. • Fabric: Indicates whether a Fabric switch is used. ON or OFF is displayed. • Connection Type: Topology. FC-AL or P-to-P is displayed. • Attribute: Port attribute. Initiator, Target, RCU Target, or External is displayed. • Internal WWN: WWN of DKC port. • Resource Group Name (ID) : Name and ID of the resource group where the port is assigned.
The LUN dialog box provides information on the open-system volumes. Item Description Port Select the port for which the information is to be listed. Port ID Displays the port name. Group ID Displays the group number of the host group. LUN ID Displays the LUNs (logical unit numbers) assigned to logical volumes. • : Logical volume to which an LU path is defined. • : Expanded LU. • : Remote command device. • : Command device. • : Command device security.
The LDEV dialog box provides information about volumes. Item Description CU or PG Choose which information to display in the LDEV list. • If you select LDKC:CU, two lists are available. You can select an LDKC from the list on the left, and a CU from the list on the right. • If you select PG, one list is available. You can select the parity group to display from the list. CLPR Displays the CLPR number and CLPR name. LDEV ID The LDKC number, the CU number, and the LDEV number.
Item Description External Volume Information Information on the external volume appears in the format of Vendor/ Product name/ Serial number/ Hard disk type. For an internal volume, "-/-/-/-" appears. For a migration volume, "-/-/-/ " appears. The hard disk type appears as follows: • Blank indicates SAS drives. • An asterisk (*) indicates BD or SATA drive. • The dollar sign ($) indicates SSD. • A hyphen (-) indicates internal volume.
Item Description • Quick Formatting: Quick Format is in progress. When a parity group contains both the Normal and Normal (Quick Format) statuses, the list also displays Normal (Quick Format). • Correction Access: Access attributes of all volumes are being changed. • Copying: Data in all volumes is being copied. • Read Only: Hosts can only read the volumes. • Shredding: The shredding operation is in progress. • Unknown: The system does not recognize the status of any volumes.
F Tool Panel GUI Reference This describes the Tool Panel window windows and features. Control Panel This section describes the Tool Panel windows and controls. Environment Parameter window This section describes the Environment Parameter window features and controls. Figure 37 Environment Parameter window Item Description RMI time-out period This parameter specifies the time-out period for forcible logout when the user performs no operation for a certain period of time because of a network error, etc.
Figure 38 Download File window Item Description Configuration File Select the checkbox for the file to be downloaded. Downloadable configuration files differ according to the system configuration. Submit Downloads the configuration file. Reset Cancels downloading the configuration file. Restore File window This section describes the Restore File window features and controls. Figure 39 Restore File window Item Description Upload File (Archive File) Click Browse...
Figure 40 Download Dump Files window Item Description Existing Dump Files Select this when you want to re-download a previously downloaded dump file. This item displays only when one or more compressed dump files exist. If you have not downloaded any dump files, this item does not display even though you have acquired dump files via the SVP. Normal Dump Contains all information about the SVP and minimum information about the storage system.
Figure 41 Update Certificate Files window Item Description Certificate file (.crt file) Click Browse... and specify the key file (server.key file). Key file (.key file) Returns the SSL certificate to default. Upload Uploads the SSL certificate. Reset Cancels the upload of the SSL certificate. Update Certificate Files for SMI-S window This section describes the Update Certificate Files for SMI-S window features and controls.
Upload Configuration Files for SMI-S window This section describes the Upload Configuration Files for SMI-S window features and controls. Figure 43 Upload Configuration Files for SMI-S window Item Description Configuration File Click Browse... and specify the configuration file you want to upload. Return to the default configuration Returns the SMI-S provider configuration file to default. Upload Uploads the configuration file to the SMI-S provider.
Glossary This glossary defines the special terms used in this document. Click the letter links below to navigate. 2DC two-data-center. Refers to the local and remote sites, or data centers, in which Continuous Access Synchronous (Cnt Ac-S) and Continuous Access Journal (Cnt Ac-J) combine to form a remote replication configuration.
custom volume (CV) A custom-size volume whose size is defined by the user using Virtual LVI/Virtual LUN. CV See custom volume (CV) . CVS custom volume size CXFS clustered version of XFS file system data drive A physical data storage device that can be either a hard disk drive (HDD) or a flash drive (also called a solid-state device).
FICON Fibre Connectivity flash drive A data drive that uses a solid-state memory device instead of a rotating hard disk. flash module A high speed data storage device that includes a custom flash controller and several flash memory sub-modules on a single PCB. FMD See flash module HBA host bus adapter HDD hard disk drive HDU hard disk unit head LDEV See top LDEV. host group A group of hosts of the same operating system platform.
logical partition (LPAR) A subset of a system’s hardware resources that is virtualized as a separate system. For a storage system, logical partitioning can be applied to cache memory and/or storage capacity. logical unit (LU) A logical volume that is configured for use by open-systems hosts (for example, OPEN-V). logical unit (LU) path The path between an open-systems host and a logical unit. logical volume See volume.
data to be accessed in the event that one or more of the drives within the RAID group are not available. The RAID level of a RAID group determines the number of data drives and parity drives and how the data is “striped” across the drives. For RAID1, user data is duplicated within the RAID group, so there is no parity data for RAID1 RAID groups. A RAID group can also be called an array group or a parity group. RAID level The type of RAID implementation.
SSID storage subsystem ID. SSIDs are used for reporting information from the CU to the mainframe operating system. Each group of 64 or 256 volumes requires one SSID, so there are one or four SSIDs per CU image. The user-specified SSIDs are assigned during storage system installation and must be unique to all connected host operating environments. SSL secure socket layer storage cluster See cluster. storage tiers See tiered storage. SVP See Service Processor.
Index A account lock policy, 55 adding SVP to trusted zone, 33 Adobe Flash, 25 Alerts function, 88 authentication server, connecting to, 38 B Blocking HTTP communications, 21 built-in user, 32 C cable connections, 12 Cache Memories report, 112 capacity, calculating, 70 capacity, estimating for license, 68 certificates, acquiring, 16 changing a user’s password, 49 changing permissions, 50 Channel Adapters report, 112 clearing cache, 97 client computer setup, 22 UNIX requirements, 24 Windows requirements, 2
M MP Blade Details report, 108 MP Blades report, 107 O online help, 11 overview, 10 P Parity Groups report, 108 password allowable characters and symbols, 49 changing a user’s, 49 permissions, changing, 50 Physical View report, 113 port locations, 76 Ports report, 109 R RADIUS server, accessing, 40 raidinf add report, 117 raidinf command, 115 raidinf delete report, 118 raidinf get reportinfo, 119 registering certificates, Insight Manager, 52 related documentation, 100 Report Configuration Tool Command Re
wizards, 10 233