Administrator Guide
Table Of Contents
- Dell EMC PowerVault ME4 Series Storage System Administrator’s Guide
- Contents
- Getting started
- New user setup
- Configure and provision a new storage system
- Using the PowerVault Manager interface
- System concepts
- About virtual and linear storage
- About disk groups
- About RAID levels
- About ADAPT
- About SSDs
- About SSD read cache
- About spares
- About pools
- About volumes and volume groups
- About volume cache options
- About thin provisioning
- About automated tiered storage
- About initiators, hosts, and host groups
- About volume mapping
- About operating with a single controller
- About snapshots
- About copying volumes
- About reconstruction
- About quick rebuild
- About performance statistics
- About firmware updates
- About managed logs
- About SupportAssist
- About CloudIQ
- About configuring DNS settings
- About replicating virtual volumes
- About the Full Disk Encryption feature
- About data protection with a single controller
- Working in the Home topic
- Guided setup
- Provisioning disk groups and pools
- Attaching hosts and volumes in the Host Setup wizard
- Overall system status
- Configuring system settings
- Managing scheduled tasks
- Working in the System topic
- Viewing system components
- Systems Settings panel
- Resetting host ports
- Rescanning disk channels
- Clearing disk metadata
- Updating firmware
- Changing FDE settings
- Configuring advanced settings
- Changing disk settings
- Changing system cache settings
- Configuring partner firmware update
- Configuring system utilities
- Using maintenance mode
- Restarting or shutting down controllers
- Working in the Hosts topic
- Working in the Pools topic
- Working in the Volumes topic
- Viewing volumes
- Creating a virtual volume
- Creating a linear volume
- Modifying a volume
- Copying a volume or snapshot
- Abort a volume copy
- Adding volumes to a volume group
- Removing volumes from a volume group
- Renaming a volume group
- Remove volume groups
- Rolling back a virtual volume
- Deleting volumes and snapshots
- Creating snapshots
- Resetting a snapshot
- Creating a replication set from the Volumes topic
- Initiating or scheduling a replication from the Volumes topic
- Manage replication schedules from the Volumes topic
- Working in the Mappings topic
- Working in the Replications topic
- About replicating virtual volumes in the Replications topic
- Replication prerequisites
- Replication process
- Creating a virtual pool for replication
- Setting up snapshot space management in the context of replication
- Replication and empty allocated pages
- Disaster recovery
- Accessing the data while keeping the replication set intact
- Accessing the data from the backup system as if it were the primary system
- Disaster recovery procedures
- Viewing replications
- Querying a peer connection
- Creating a peer connection
- Modifying a peer connection
- Deleting a peer connection
- Creating a replication set from the Replications topic
- Modifying a replication set
- Deleting a replication set
- Initiating or scheduling a replication from the Replications topic
- Stopping a replication
- Suspending a replication
- Resuming a replication
- Manage replication schedules from the Replications topic
- About replicating virtual volumes in the Replications topic
- Working in the Performance topic
- Working in the banner and footer
- Banner and footer overview
- Viewing system information
- Viewing certificate information
- Viewing connection information
- Viewing system date and time information
- Viewing user information
- Viewing health information
- Viewing event information
- Viewing capacity information
- Viewing host information
- Viewing tier information
- Viewing recent system activity
- Other management interfaces
- SNMP reference
- Using FTP and SFTP
- Using SMI-S
- Using SLP
- Administering a log-collection system
- Best practices
- System configuration limits
- Glossary of terms
Setting system notification settings
The Notifications tab provides options for you to set up and test several types of system notifications.
● Configuring SMTP settings.
● Sending notifications to email addresses when events occur in the system.
● Sending notifications to SNMP trap hosts.
● Enabling managed logs settings, which transfers log data to a log-collection system. For more information about the
managed logs feature, see About managed logs.
● Setting remote syslog notifications to allow the logging of events by the syslog of a specified host computer. Syslog is
a protocol for sending event messages across an IP network to a logging server. This feature supports User Datagram
Protocol (UDP) but not Transmission Control Protocol (TCP).
● Testing notifications.
NOTE: Enable at least one notification service to monitor the system.
Configure SMTP settings
Perform the following steps to configure SMTP settings:
1. Perform one of the following to access the options in the Notifications tab:
● In the Home topic, select Action > System Settings, then click Notifications.
● In the System topic, select Action > System Settings, then click Notifications.
● In the footer, click the events panel and select Set Up Notifications.
● In the Welcome panel, select System Settings, and then click the Notifications tab.
2. If the mail server is not on the local network, ensure that the gateway IP address was set in Configuring controller network
ports.
3. Select the Email tab.
4. In the SMTP Server address field, enter the network address of the SMTP mail server to use for the email messages.
5. In the Sender Domain field, enter a domain name, which is joined with an @ symbol to the sender name to form the from
address for remote notification. The domain name can have a maximum of 255 bytes. Because this name is used as part of
an email address, do not include spaces or the following characters: \ " : ; < > ( )
If the domain name is not valid, some email servers fail to process the email.
6. In the Sender Name field, enter a sender name, which is joined with an @ symbol to the domain name to form the from
address for remote notification. This name provides a way to identify the system that is sending the notification. The sender
name can have a maximum of 64 bytes. Because this name is used as part of an email address, do not include spaces or the
following characters: \ " : ; < > ( ) [ ]
7. In the Port text box, enter the port to use when communicating with the SMTP server.
Leaving the port set to Default tells the system to use the default port that is associated with the security protocol.
8. Set the security protocol to use when communicating with the SMTP server:
● None. Does not use a security protocol. The standard SMTP port is 25, and is the system default.
● TLS. Enables Transport Layer Security (TLS) authentication. The standard ports are 25 or 587. The system default is
587.
● SSL. Enables Secure Sockets Layer (SSL) authentication. The standard port is 465, the system default.
9. If you selected TLS or SSL, type the password of the sender in the Sender Password and Confirm Password fields.
The password is case sensitive and can have 8–32 characters. If the password contains only printable ASCII characters,
then it must contain at least one uppercase character, one lowercase character, one numeric character, and one non-
alphanumeric character. A password can include printable UTF-8 characters except for a space or the following characters:
" ' , < > \
10. Perform one of the following:
● To save your settings and continue configuring your system, click Apply.
● To save your settings and close the panel, click Apply and Close.
A confirmation panel appears.
11. Click OK.
48
Working in the Home topic