HP Storage Essentials SRM 6.
Legal and notice information © Copyright 2002-2008 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
Contents About this Guide . . . . . . . . . . . . . . . Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxv Intended Audience . . . . . . . . . . . . . . . . . . . . Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . Related Documentation . . . . . . . . . . . . . . . . . Document Conventions and Symbols. . . . . . . . HP Technical Support . . . . . . . . . . . . . . . . . . HP-Authorized Reseller . . . . . . . . . . . . . . . Helpful Websites . . . . . . . . . . . . . .
Signing in to HP SIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Enabling Product Health Monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovering the HP Storage Essentials Management Server. . . . . . . . . . . . . . . . . . . . . . . . . . Discovering Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovering Switches . . . . . . . .
Obtaining SNMP Traps using Command View EVA . . . . . . . . . . . . . . . . . . . . . . . . . . . . Community String Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Obtaining SNMP traps from Command View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing or Changing the Community String in HP Storage Essentials . . . . . . . . . . . . . . Viewing or Changing the Community String in Command View EVA 6.x . . . . . . . . . . .
Viewing the Status of System Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using Discovery Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Creating Custom Discovery Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Managing Discovery Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Step A — Import the Wrapper Class Definitions into the Caché Instance . . . . . . . . . . . . . Step B — Create APPIQ_USER Account on the Caché Instance. . . . . . . . . . . . . . . . . . . . Locked Down Security Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Removing the APPIQ_USER Account from the Caché Instance. . . . . . . . . . . . . . . . . . . . . Step C — Provide the Caché Instance Name and Port Number . . . . . . . . . . . . . . . . . . .
Managing Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Editing Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Customizing Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Managing Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing the Log Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing Performance Collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Starting Performance Collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stopping Performance Collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Data Aging Statistics for Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Editing the Locale and Currency Settings . . .
Generating a Support Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 About Importing a Customer Support Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Troubleshooting Listener and Database Connection Problems . . . . . . . . . . . . . . . . . . . . . . . 246 9 Viewing Element Topology and Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 About System Manager. . . . . . . . . . . . . . . . . . . . . . . . .
Changing the Fabric Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hiding and Showing Generic Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About Hiding Generic Hosts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hiding Generic Hosts for a Switch . . . . . . . .
Determining If a Host Belongs to a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 About the Data from CXFS File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 10Event Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 About Event Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing Event Manager. . .
Severity Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Creating a Utilization or Backup Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About the Policy Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Creating Policies for Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14Running Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 About Reporter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Available Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting Reporter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing Reporter . . .
Modifying a Zone Alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting a Zone Alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing Information About Zoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Creating a Zone in a Fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding and Removing Zone Members .
Host Security Groups on EMC CLARiiON and Sun 6130 Storage Systems . . . . . . . . . Host Security Groups on LSI Storage Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Host Security Groups on EMC Symmetrix Storage Systems . . . . . . . . . . . . . . . . . . . . Host Security Groups on HDS Storage Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . Host Security Groups on HP MSA Storage Systems . . . . . . . . . . . . . . . . . . . . . . . . .
Determining if the Last Scheduled Backup was Successful . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing the Summary Backup Charts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Backup Results for a Backup Manager Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Backup Results for a Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Backup Information for a Client. . . . . . . . . . . .
LUN Security and Zone Operation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1 - Select Storage System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 2 - Select a Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding a Host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 3 - Select a Host Security Group . . . . .
Adding Asset Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding General Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding Staff Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding Geographic Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Filtering Assets by Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673 Customizing the Asset Status Filter for Chargeback Manager . . . . . . . . . . . . . . . . . . . . . . 674 Hiding Filters in Chargeback Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674 19Business Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675 About the Business Tools . . . . . . . . . .
Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting Discovery and Discovery Data Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Unable to discover Emulex host bus adapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ERROR replicating APPIQ_EVAStorageVolume during Discovery Data Collection for an EVA array . 719 Recalculating the Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719 Troubleshooting the Java Plug-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720 Java Applet Has Data from a Different Build of Management Server Software . . . . . . . . . . . . 720 OutOfMemoryException Messages . . . . . . . . . . . . . . .
Z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figures 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 Accessing Features from the Tools > Storage Essentials Menu . . . . . . . . . . . . . . . . . . . . . . . . . 2 Accessing Roles in Storage Essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Accessing the Documentation Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Status Light . .
47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 xxvi Enclosing the Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Dragging Multiple Elements to Their New Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Showing the Impact of an Element . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
94 Report Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445 95 Choosing a Standard Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448 96 Adding Tables for a Standard Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449 97 Linking Common Data in Tables for a Standard Report . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xxviii
Tables 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxvi Chapters That Apply to Standard Edition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Status Light Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 xxx Supported Hardware for Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Default Settings for Clearing Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 Brocade Switch Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
94 MVCA_VIRTUALAPPCAPACITYVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486 95 MVCA_FSRM_VOLUMESUMMARYVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486 96 MVCA_FSRM_AGESUMMARYVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487 97 MVCA_FSRM_EXTDETAILSUMMARYVW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487 98 MVCA_FSRM_DIRDETAILSUMMARYVW. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 xxxii Right-Click Menu Options on the Topology Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583 Right-Click Menu Options on the Summary Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585 To Obtain Additional Information from a Chart on the Summary Tab . . . . . . . . . . . . . . 586 Show Details for Tabs on the Lower Pane of the Topology Tab . . . . . . . . . . . . . . . . . . .
HP Storage Essentials SRM 6.
xxxiv
About this Guide This guide provides information about: • Discovering elements • Managing Security • Configuring HP • Monitoring and managing elements • Provisioning elements • Viewing events from elements • Viewing reports about elements • Viewing performance, capacity and chargeback information • Troubleshooting HP Intended Audience This guide is intended for: • Network Engineers • Administrators • Any one that needs to monitor and/or manage their file servers Prerequisites Prerequisites for using this
Document Conventions and Symbols Document conventions Table 1 Convention Element Medium blue text: Figure 1 Cross-reference links and e-mail addresses Medium blue, underlined text (http://www.hp.
TIP: Provides helpful hints and shortcuts. HP Technical Support Telephone numbers for worldwide technical support are listed on the HP support web site: http://www.hp.com/support/.
xxxviii
1 Overview This chapter contains the following topics: • About This Product, page 1 • Standard Edition and Enterprise Edition, page 4 • Suggested Topics for First-Time Users, page 5 • Product Components, page 6 • The User Interface on the SE Home Page, page 8 • Installing the Java Plug-in, page 12 • Installing the Software Security Certificate, page 13 • Restarting the Service for the Management Server, page 16 About This Product IMPORTANT: If you access HP Systems Insight Manager through HTTP over SSL (H
Storage Essentials, not in HP Systems Insight Manager. When you select Tools > Storage Essentials, you see a submenu listing several features. These features are only in Storage Essentials. Figure 1 Accessing Features from the Tools > Storage Essentials Menu Some features are not directly accessible from the menus in HP Systems Insight Manager. For example, to edit a role, you must access Storage Essentials first. You can access Storage Essentials in numerous ways.
To access the online help for Storage Essentials, access Storage Essentials, and click Help > For this page or Help > Documentation Center. The Documentation Center provides the documentation set for Storage Essentials, including the PDFs, online help, release notes, and support matrices. Figure 3 Accessing the Documentation Center To manage and monitor your elements in Storage Essentials, discover your elements.
dependencies and view and manage your infrastructure as a whole. A SAN is a network configuration that is dedicated to transporting storage data among network devices, such as storage systems, servers, tape libraries, and switches. Since the SAN is dedicated to transporting storage data, it frees up the data network for regular TCP/IP traffic.
Table 2 Chapters That Apply to Standard Edition ”Discovering Switches, Storage Systems, NAS Devices, and Tape Libraries” on page 19 Yes. Some of the devices described are not included with Standard Edition. Discovering Applications, Backup Hosts and Hosts, page 83 Yes. Some of the devices described are not included with Standard Edition. Managing Security, page 137 Yes Managing Licenses, page 167 Yes. Some of the features and devices described are not included with Standard Edition.
network, so that the management server becomes aware of them. Then you must run Discovery Data Collection, so that the management server is aware of the various types of elements on the network.
• The type of license you have. Depending on your license, all features may not be available. See the List of Features to determine if you have access to all features. The List of Features is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). • The role assigned to your user account.
• Policy Manager — Policy Manager can automatically send an e-mail, generate an event, or run a remote script when an element is being overused or when one of the following occurs: • A new element is discovered • Successful provisioning occurs • An event occurs on one or more specified elements See ”Managing Policies” on page 371 for more information. • Backup Manager — Backup Manager helps you to keep track of element backups. See ”Managing Backups” on page 571 for more information.
• Discovery — This menu provides the tools for the management server to discover and obtain information from elements in your network. See ”Discovering Switches, Storage Systems, NAS Devices, and Tape Libraries” on page 19 and ”Discovering Applications, Backup Hosts and Hosts” on page 83. • Help — This menu provides access to the online help and the copyright information. The links in the upper-left corner let you modify your profile and sign out of the management server.
IMPORTANT: You may not see all of the following utilities, depending on the role assigned to your user account. For example, users assigned to the Help Desk role by default have access to Application Viewer and Event Manager, but not to System Manager, Provisioning Manager, Policy Manager, or Reporter. • Application Viewer — Application Viewer lets you monitor and display information obtained from discovered databases.
The Home Page The Home page provides an overview of the main features for the management server. You can access the Home page for Storage Essentials by selecting Tools > Storage Essentials > Home from HP Systems Insight Manager. To access a feature, click its icon. Table 4 Icons on the Home Page Feature Policy Manager Application Viewer Description Where to Find More Information Policy Manager can send you email, generate an event, or run a custom script when policy conditions are met.
Icons on the Home Page (continued) Table 4 Feature Description Where to Find More Information ”Event Management” on page 329 Event Manager Event Manager keeps you informed of what is happening with your managed elements. Its filter and report format allows you to easily view, clear, and sort the events you are interested in. Provisioning Manager simplifies your SAN-zoning and storage management tasks.
Installing the Java Plug-in Java 2 Runtime Environment is required to access several features in the management server, such as System Manager. If your Web browser is running on or Linux, you must manually install the Java plug-in. To install the Java plug-in on Linux: 1. Go to the following URL and download the installation file for the Sun JRE when asked: http:///servlet.html?page=JavaPluginLinux where is the hostname of the management server. 2.
Installing the Software Security Certificate To stop receiving a Security Alert message each time you use the HTTPS logon, install the software security certificate, as described in this section. • Installing the Certificate by Using Microsoft Explorer 6.0, page 14 • Installing the Certificate by Using Firefox 1.5, page 14 • Changing the Security Certificate to Match the Name of the Server, page 14 Keep in mind the following: • Enter the DNS name of the computer in the URL instead of localhost.
Installing the Certificate by Using Firefox 1.5 1. Access the management server by entering the following: https://machinename where machinename is the name of the management server. 2. When the security alert message appears, click the Accept this certificate permanently radio button. 3. Click OK.
IMPORTANT: The quotes in the example must be entered as left single quotes. 2. Go to the following directory: /Tools where Install_Dir is the directory into which you installed the management server. 3. To delete the original certificate, enter the following at the command prompt: perl generateAppIQKeyStore.pl del The original certificate is deleted. NOTE: If you see an error message when you enter this command, a previous certificate may not have been created.
IMPORTANT: service. Linux management servers require a fixed IP address for starting the appstormanager 1. Open a command prompt window. 2. To stop the management server, enter the following at the command prompt: /etc/init.d/appstormanager stop 3. To start the management server, enter the following at the command prompt: /etc/init.d/appstormanager start 4. To see the status of the management server, enter the following at the command prompt: /etc/init.
18 Overview
2 Discovering Switches, Storage Systems, NAS Devices, and Tape Libraries Before you can use the management server, you must execute the Discovery process to make the software aware of the elements on your network, such as switches, storage systems, NAS devices, and tape libraries. Discovery obtains a list of elements and information about their management interface and dependencies. NOTE: The management server can discover only elements with a suitable management interface.
About Discovery When HP Storage Essentials is integrated with HP SIM, Discovery and Discovery Data Collection are performed using HP SIM’s discovery user interface pages. This allows you to use credentials and perform discovery and data collection tasks in HP SIM and enables hardware and software health status polling, monitoring, and event management for storage, servers, switches, infrastructure, and other elements on your network, such as enclosures, racks, clients and printers.
Note the following: • Storage systems managed by HP Storage Essentials show a subtype of Storage Essentials Managed, and do not show the SMI subtype on the HP SIM System tab. • Storage systems managed by HP Storage Essentials are listed in the HP SIM Storage Essentials Systems collection. • HP SIM data collection from SMI-S devices is disabled to avoid duplicate data collection.
4. A host containing a Host Bus Adapter (HBA). All Fibre Channel host bus adapters look for available elements attached to the HBA. This information is gathered by CIM extensions and sent to the management server. NOTE: Since CIM extensions have not been installed yet, the management server will not be able to obtain this data when you perform discovery for elements.
example, in the phased discovery described in ”Discovering Elements” on page 27, you could discover your switches first. In this case, you would enter only the global credentials that apply to the switches. After successfully running the switch discovery task, you would replace the switch credentials with the global protocol settings for the next set of elements you want to discover. • Some elements lock you out without warning after multiple failed login attempts.
Configuring the HP SIM Connector to Pass Devices with the DNS Name (Optional) By default, HP SIM passes IP addresses to HP Storage Essentials. You can configure the HP SIM Connector to pass elements to HP Storage Essentials so that the DNS name is displayed in HP Storage Essentials discovery lists. To configure the HP SIM Connector to pass the DNS name: 1. Open the file C:\Program Files\HP\Systems Insight Manager\config\ globalsettings.props. 2.
• Do not run the initial discovery process at the end of the wizard. See the HP Systems Insight Manager User Guide for more information about the First Time Wizard. Enabling Product Health Monitoring Enabling this functionality allows you to monitor the database health and available disk space for the HP Storage Essentials management server. To enable product health monitoring: 1. Select Tools > Storage Essentials > Home on the HP SIM home page menu.
The Discovery Setup, Step 1 - Setup page shows the HP Storage Essentials management server as localhost. Figure 7 HP Storage Essentials Management Server “localhost” Discovering the HP Storage Essentials Management Server You do not need to install a CIM extension on the management server because it is monitored through a built in CIM extension that is installed automatically during the HP Storage Essentials installation. Built-in credentials are used to access the localhost.
e. In the WBEM settings section, select Update values for this protocol and Use values specified below. f. Enter the user name and password for the HP Storage Essentials management server (the administrator account) in the format domain\administrator or servername\administrator. 9. Select Options > Discovery. 10.Select the discovery task you created in step 2, and then click Run Now. 11.
IMPORTANT: For best results, enter only global credentials that apply to the set of elements for the current discovery task. When this discovery task is complete, you can delete the element-specific global credentials and enter global credentials for the next set of elements you want to discover. 3. Select Options > Discovery. 4. Click New on the HP SIM Discovery page Automatic tab. 5. Enter a name for the discovery task in the Name box. 6. Clear the Automatically execute discovery every check box. 7.
11.Select the discovery task created in step 4, and then click Run Now. When complete, the task monitor shows 100%. Within two minutes, the status in the SE Identification column changes from Pending to Running. You can click the Running link to view the HP Storage Essentials Discovery progress table. Figure 8 HP Storage Essentials Discovery progress table NOTE: SE discovery processing might finish before the SE Identification column shows status as Running.
Discovery process. For more information on switch support, see the support matrix in the Documentation Center (Help > Documentation Center in HP Storage Essentials). IMPORTANT: Table 5 All SMI-S switches require a user name and password. Overview of Switch Discovery Requirements Element Discovery Requirements For More Information Brocade switches (SMI-S) IP address and the user name and password from the Brocade SMI Agent security setup. See Discovering Brocade Switches, page 30.
periodically to verify that you are running a current version of the Brocade SMI Agent. For more information on Brocade SMI Agent versions, see the support matrix. IMPORTANT: With this release, discovery of Brocade switches through the Fabric Access API is not supported. For information on migrating existing Brocade API switches to SMI-S, see ”Migrating Brocade API Switches to SMI-S After Upgrading” on page 31.
This document is written for an earlier version of the Brocade SMI Agent, but the installation notes and other information also apply to v120.6.0a of the Brocade SMI Agent software. 3. Log on to HP Systems Insight Manager and access the Storage Essentials management server (from HP SIM, select Tools > Storage Essentials).The HP Storage Essentials alerts you to migrate your Brocade Fabric Access API switches when you first log on.
5. Run Discovery Data Collection. See the chapter, “Discovering Switches, Storage Systems, NAS Devices, and Tape Libraries.” The Brocade switches are migrated to the SMI-A provider. IMPORTANT: Before performing any provisioning operations that involve a Brocade switch you must perform Discovery Data Collection for any subset of elements that includes the Brocade switch. 6.
• If you selected No in the Brocade SMI Agent Enabling Security window, you can enter any username and password because security for the proxy server was not enabled. • For Brocade SMI Agent installed on Linux or Solaris, see the Brocade SMI Agent documentation for more information about SMI Agent security for Linux or Solaris. Discovering CNT Switches The management server uses the CNT SMI-S provider to discover CNT switches.
b. Make the following entry in the file: cimomenabled=TRUE c. Save the file, and then restart the InVsn software. 3. Enter the following information in HP SIM: • Primary IP address of the host running the InVsn software you want to discover. • Namespace. If the //root/cntfabric namespace for the InVSN software is not already included in the wbemportlist.xml file in /config/identification, add it in the format .
• Enable the CIM Server for Cisco switches discovered through the SMI-S provider. a. On the Cisco switch, enter the following command to display the Common Information Models (CIM) configurations and settings: cisco_switch# show cimserver b. To enter configuration mode, enter the following: cisco_switch# config c. To enable access to the server, enter the following: cisco_switch# cimserver enableHttps And/or cisco_switch# cimserver enableHttp d.
• HP SIM does not allow blank passwords. Since these switches do not use a password, enter anything for the password. • The management server does not support provisioning for Sun StorEdge, QLogic, and HP M-Series switches. Only the active zone set and its zone members are reported. • To manage a fabric of Sun StorEdge, QLogic, or HP M-Series switches, every switch in the fabric must be included in the discovery list.
• For switches with SMI-S connections, provide the switch user name. • HP SIM does not allow blank passwords. Do one of the following: • For SNMP switches enter anything for the password. • For SMI-S switches enter the switch password. Discovering McDATA and EMC Connectrix Switches McDATA and EMC Connectrix switches use SMI-S, the Fibre Channel Switch Application Programming Interface (SWAPI), or SNMP to communicate with devices on the network.
Keep in mind the following: • SMI-S is the default method for discovering McDATA and Connectrix switches. If you need to migrate to SMI-S or change the discovery settings, see ”Changing the Discovery Settings” on page 43. • You can only choose one discovery method for McDATA and Connectrix switches. For example, if you use SMI-S, you cannot discover additional McDATA and Connectrix switches with SWAPI or SNMP.
http://www.hp.com/go/hpsim/providers for instructions. Check this web site periodically to verify that you are running a current version of the SMI-S provider. Note the following when discovering these switches with SMI-S: • Before attempting to discover your switches, ensure that EFC Manager or Connectrix Manager is installed and configured or add your switches to the SMI-S provider.
NOTE: The user name and password are defined during the SMI-S provider installation. These credentials might be different from the EFC Manager or Connectrix Manager credentials. Discovering McDATA and Connectrix Switches through a Proxy with SWAPI With the SWAPI setting, the management server contacts a proxy to obtain information about the switches connected to it. Use EFC Manager or Connectrix Manager for this option.
• User name—Enter the user name for EFC Manager or Connectrix Manager. • Password—Enter the corresponding password for EFC Manager or Connectrix Manager. Discovering McDATA and Connectrix Switches through a Proxy with SNMP NOTE: Discovering McDATA or Connectrix switches through a proxy using the SNMP protocol does not let you manage or access information about zones, zone sets or zone aliases. You can use this option with EMC Connectrix Manager and EFC Manager to contact the switch.
NOTE: The management server uses the Windows SNMP trap service when you run HP SIM and HP Storage Essentials on a Windows server or when the property cimom.winsnmpTrapService=true is set. The Windows SNMP trap service is not used on Solaris servers. Discovering McDATA and Connectrix Switches through a Direct Connection and SNMP The management server uses SMI-S or SWAPI to discover a McDATA or Connectrix switch through a proxy.
To enable SNMP: a. Uncomment the cimom.useSnmpMcDataProvider property by removing the pound sign (#) in front of it. b. Change the cimom.mcdata.dontUseSmis property as follows: cimom.mcdata.dontUseSmis=true NOTE: The cimom.mcdata.dontUseSmis property exists only in upgrade installations. If the property does not exist on your system, enter it manually. To enable SWAPI: a. Comment out the cimom.useSnmpMcDataProvider property by placing a pound sign (#) in front of it. b. Change the cimom.mcdata.
The management server excludes the switches with the following WWNs: 1000080088A07024 and 1000080088A0D0B6 If the cimom.mcdata.exclude property is not modified, the management server discovers and obtains details from all McDATA and Connectrix switches.
Adding McDATA and EMC Connectrix Switches After you add switches to an existing service processor, you must perform Discovery Data Collection, as described in the following steps. If you are adding switches to a service processor that has not been discovered yet, see the topic, ”Discovering McDATA and EMC Connectrix Switches” on page 38. IMPORTANT: Obtaining details takes some time. You might want to perform this process when the network and the managed elements are not busy.
4. Click Close to return to the Advanced page. 5. Paste the copied text into the Custom Properties box. 6. Make your SNMP trap listener port or SNMP trap community string change in the Custom Properties box. Remove the pound (#) symbol in front of the property to make sure it is not commented out. For example: cimom.snmpTrapListenerPort=162. 7. Click Save. Discovering Storage Systems Use the workflow in ”Discovering Elements” on page 27 to discover storage systems.
Table 7 Discovery Requirements for Storage Systems (continued) Element Discovery Requirements For Additional Information HP Modular Smart Discover the server running the Array (MSA) storage MSA SMI-S provider. systems See Discovering HP StorageWorks MSA Arrays, page 55. HP EVA storage systems Discover the server running Command View EVA. See Discovering HP StorageWorks EVA Arrays, page 56. HP XP storage systems Discover the server running the SMI-S provider or the built-in provider.
• Password of the storage system. Discovering EMC Solutions Enabler If you are using a nethost file, edit it to allow the management server to discover the Solutions Enabler and the Symmetrix storage systems that it manages. See the EMC documentation for details. To discover Symmetrix storage systems, you must create and configure a VCM volume on the storage system. The VCM database on the Solutions Enabler host must also be configured.
If the cimom.symmetrix.exclude property is not specified, the management server discovers and obtains details from all EMC Symmetrix Storage Systems managed by discovered Solutions Enablers. IMPORTANT: The IP addresses of excluded elements appear in the discovery (Tools > Storage Essentials > Home > Discovery > Setup), topology (Tools > Storage Essentials > Home > Discovery > Topology), and Discovery Data Collection (Options > Storage Essentials > Discovery > Run Discovery Data Collection), lists.
1. Select Options >Storage Essentials > Manage Product Health > Advanced. 2. Click Show Default Properties at the bottom of the page. 3. Copy the following command. #cimom.emc.skipRefresh=000183500570,000183500575 4. Click Close to return to the Advanced page. 5. Paste the copied text into the Custom Properties box. 6. Remove the pound (#) symbol in front of the property to make sure it is not commented out. Add the serial numbers corresponding to the Symmetrix storage systems you want the refresh to skip.
When you use the management server to discover the CLARiiON storage system, provide the IP address for the CLARiiON storage system and the user name and password used to log into Navisphere. Discovering LSI Storage Systems When discovering LSI storage systems, note the following: • Discover all controllers on an LSI storage system by entering the IP address of each controller. The management server discovers these controllers as one single storage system.
To obtain information about HDS storage systems, the management server must be able to access the port that HiCommand Device Manager uses to listen. By default, HiCommand Device Manager listens on port 2001, and the management server assumes this configuration at discovery time. If HiCommand Device Manager uses a different port, specify this other port when you discover HiCommand Device Manager. The management server communicates with HiCommand Device Manager through a non-secure connection.
3. Copy the following command. #cimom.hds.exclude=61038,61037 4. Click Close to return to the Advanced page. 5. Paste the copied text into the Custom Properties box. 6. Remove the pound (#) symbol in front of the property to make sure it is not commented out. Add the serial numbers corresponding to the HDS storage systems you want to exclude form discovery. Separate additional serial numbers with a comma, as shown by the following example: cimom.hds.
NOTE: To find the serial number, double-click the storage system in System Manager, and then click the Properties tab. 7. When you are done, click Save. 8. To force a refresh for elements that are not configured to skip the refresh, select the Force Device Manager Refresh option on the Discovery Data Collection page. 9. Click Get Details to run discovery data collection. Discovering HP Storage Systems You can discover the following HP storage systems. For model information, see the support matrix.
• Password for accessing the MSA SMI-S provider Discovering HP StorageWorks EVA Arrays The management server uses the built-in EVA provider. Before discovering EVA arrays, note the following: • HP StorageWorks Command View EVA must be installed on a server before you can discover an HP EVA storage system.
Indications for display in its Event Manager. HP Storage Essentials then forwards the events to HP SIM's event console. Community String Requirements • The default community string for Command View EVA 6.x is Public and the default community string for HP Storage Essentials is public. The community strings must be a case-sensitive match, so if you are using the default values in HP Storage Essentials and Command View EVA 6.x, you must change the community strings to a case-sensitive match.
Viewing or Changing the Community String in Command View EVA 6.x To view or change the community string: 1. Open the c:\hsvmafiles\nsaserver.ini file in a text editor on the Command View EVA server. 2. Find the line Authority=Public This example shows the Command View EVA 6.x default: Public. 3. Change the value to the desired community string. For example, if you want to change the community string to public, enter Authority=public 4. Restart the service for Command View EVA.
NOTE: To determine provisioning support for HP StorageWorks Arrays, see Table 135 on page 536 and Table 136 on page 537. NOTE: HP StorageWorks Command View XP should be installed on a server before you discover an HP XP storage system. Discovering HP XP Arrays by Using Command View XP and SMI-S Before you can discover XP arrays, you must download and install the XP SMI-S Provider software.
NOTE: The user name and password must be for a Partition Storage Administrator account. Discovering IBM Storage Systems and IBM SAN Volume Controllers Before you can discover an IBM storage system or an IBM SAN Volume Controller, you must have the IBM CIM agent installed. Installing the IBM CIM Agent for IBM Storage Systems This section describes how to install the IBM CIM agent for versions earlier than 5.2.1 for IBM Storage Systems.
• For DS devices enter cmd addessserver where ipaddress is the IP address of the management console server of the DS device and username and password are the management console credentials. 6. Restarting the IBM CIM agent service. 7. Verifying that the CIM agent is able to communicate with the storage devices.
Discovering Sun StorEdge 3510 Storage Systems Before you can discover a Sun StorEdge 3510 storage system, you must set up a Sun StorEdge 3510 SMI-S provider and a Sun StorEdge Configuration Service. The provider cannot be installed on the same computer as the management server due to a port conflict.
• IP address or system name of the controller or proxy you want to discover. • HP SIM does not allow blank user names. Enter anything for the user name. • Password for the controller or proxy. Discovering Xiotech Storage Systems IMPORTANT: You must have Xiotech's Intelligent Control (ICON) software installed. If you do not have the software, contact your Xiotech representative.
• Discovering HP NAS Devices on Linux, page 64 • Discovering NetApp NAS Devices, page 65 • Discovering Sun NAS Devices, page 66 Discovering HP NAS Devices on Windows In order to discover an HP NAS device on Windows, you must first install a CIM extension on the device and then modify one of its properties files. See the Installation Guide for information on how to install the CIM extension. To enable NAS support: 1. Connect to the NAS device on which you have installed the CIM extension. 2.
6. Change the value to true to enable NAS support, as shown in the following example: nas=true 7. Save your changes, and then close the file. 8. Restart the CIM extension. See the Installation Guide for information about starting CIM extensions. Discovery Information for HP NAS Devices on Linux To discover an HP NAS device, enter the following information in HP SIM: • IP address or system name of the HP NAS device to discover. • User name of the HP NAS device. You must provide a privileged login.
1. Select Options > Storage Essentials > Manage Product Health, and then click Advanced in the Disk Space tree. 2. Click Show Default Properties at the bottom of the page. 3. Copy the following property: #cimom.providers.netapp.useSSL=true 4. Click Close to return to the Advanced page. 5. Paste the copied text into the Custom Properties box. 6. Uncomment the cimom.providers.netapp.useSSL property by removing the pound symbol (#) in front of cimom.providers.netapp.useSSL. 7. When you are done, click Save.
Discovery Data Collection IMPORTANT: Access Discovery Data Collection by selecting Options > Storage Essentials > Discovery > Run Discovery Data Collection. Do not use the HP SIM Options > Data Collection command; it is for a different HP SIM feature.
• If an element changes and you run Discovery Data Collection while the provider cache is updating, an error might occur or the gathered details might be inconsistent with the actual element status. Running Discovery Data Collection To obtain details about the elements on the network: 1. Select Options > Storage Essentials > Discovery > Run Discovery Data Collection. 2. Select Include infrastructure details, which gathers the latest information about SAN details.
2. On the View Logs page, click the Click here portion of the following message: Click here if you wish to stop getting details. 3. When you are asked if you are sure you want to stop Discovery Data Collection, click OK. The management server stops Discovery Data Collection. NOTE: Existing operations will finish before the management server stops Discovery Data Collection. 4. Schedule a time to resume Discovery Data Collection.
NOTE: The sample file is located in /config on Windows and /opt/mx/config on Linux. Editing Rules for the Selective Discovery Filter Use the following rules when editing the selective discovery filter: • If you edit the selective discovery filter on a Windows system, do not use Notepad because it will not preserve the file formatting. • If you want to edit the selective discovery filter file at run time, set the following property to true in the globalsetting.
Rules for the Inclusive and Exclusive Flags The filter file uses inclusive or exclusive flags to indicate inclusive or exclusive filters. IP addresses are checked against and must pass all specified filters, both inclusive and exclusive.
1. Use a text editor to create a file named SEDiscoveryFilterList (with no file extension), or make a copy of the sample file (SEDiscoveryFilterList.sample) and rename the file to SEDiscoveryFilterList. NOTE: The sample file is located in /config on Windows and /opt/mx/config on Linux. 2. To create an inclusive filter, enter inclusive in the file, and then add IP addresses, ranges, or patterns (one per line).
To view HP Storage Essentials progress, open the HP Storage Essentials Log and click Refresh in the next two to three minutes to view the HP Storage Essentials processing status. 5. Select Tasks & Logs > View HP Storage Essentials Log. Once the HP Storage Essentials log shows that the element has been processed, click Details, select the element, and then click Get Details. Changing Credentials for Discovery You can change the user name and password the software uses to access an element.
4. Select the Systems loaded from the central management server, sorted by option and select the way you want the elements sorted when you save the file. The choices are: • IP address • System name • System type and then by IP address • System type and then by System name. 5. Click Initialize Now to load the hosts file. The content appears in the Contents box. 6. Click OK to save the hosts file. The saved file appears on the Hosts Files page.
During these operations, the management server displays its status at regular intervals. To view logs for these operations: 1. Select Tasks & Logs > View Storage Essentials Log. 2. To obtain the latest status, click Get Latest Messages. If the software is unable to discover or obtain information about a device, the log messages might provide some information about where the problem occurred.
Task Status descriptions (continued) Table 9 Status Description Rejected This task has been rejected by this server. Using Discovery Groups The discovery groups feature is sometimes called segmented replication because it allows you to run Discovery Data Collection for a segment of elements. Because The HP Storage Essentials product runs more slowly when Discovery Data Collection is in progress, it is helpful to break the process into segments which can then be run at night or on multiple days.
Creating Custom Discovery Lists You can create a discovery list for Discovery Data Collection, which will allow you to select a set of discovery groups to use the next time Discovery Data Collection runs. To create a custom discovery list: 1. Select Options > Storage Essentials > Discovery > Run Discovery Data Collection. 2. Click the Specified Discovery Groups link. 3. Select the check box next to each item you want to add to the discovery list.
NOTE: The path to the log file for the discovery group is listed at the top of the page. 7. Click OK to save the changes. 8. Click Back to Discovery Page. Moving Elements Between Discovery Groups In the initial discovery, all elements are placed in the Default discovery group. After the initial discovery, you can move elements between discovery groups. IMPORTANT: Do not move elements between discovery groups when Discovery Data Collection is running.
Deleting Discovered Elements To remove a discovered element completely you must delete it from both HP SIM and HP Storage Essentials. If you do not do this, the deleted element can reappear under the following circumstances: • If a scheduled automatic discovery task includes the deleted element, HP SIM will rediscover it during the next discovery. • If HP Storage Essentials still lists the access point for the element, HP Storage Essentials rediscovers the element during the next Discovery Data Collection.
If you are blocking pop-ups you must disable the popup blocker before you can delete the element. • In Chargeback Manager—Click the Delete ( ) button for the element you want to delete. 2. If the element has multiple access points, you are asked which one you want to delete. Take one of the following actions: • Delete the element and its access points.
The elements you quarantine appear with a flag ( Discovery Data Collection page. ) in the Quarantined column on the The elements are excluded from discovery until you clear them from quarantine. Removing an Element from Quarantine To remove an element from quarantine: 1. Select the check boxes for the elements you want to remove from quarantine on the Discovery Data Collection page. Quarantined elements appear with a flag ( Data Collection page. ) in the Quarantined column on the Discovery 2.
For more information, see the following topics: ”Excluding EMC Symmetrix Storage Systems from Discovery” on page 49 and ”Excluding EMC Symmetrix Storage Systems from a Forced Device Manager Refresh” on page 50. 4. Click Get Details. 5. Select Tasks & Logs > View Storage Essentials Log to View the status of the gathering of element details. For more information, see ”Viewing Log Messages” on page 74. 6.
3 Discovering Applications, Backup Hosts and Hosts HP Storage Essentials Standard Edition supports a subset of the devices supported by Enterprise Edition. See the HP Storage Essentials Standard Edition Support Matrix for a list of supported devices. The support matrix is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
service. To determine the Logon account for the DataProtector CRS service, go to Control Panel > Administrative Tools > Services, select the DataProtector CRS service, access its Properties page, and select the Logon tab. To determine the Logon account for the AppStorWin32Agent service, go to Control Panel > Administrative Tools > Services, select the AppStorWin32Agent service, access its Properties page, and select the Logon tab.
Discovery of hosts consists of these steps: • ”Step A — Set Up Discovery for Hosts” on page 85. • ”Step B — Discovery Data Collection” on page 87 Step A — Set Up Discovery for Hosts HP recommends a phased discovery process. You can discover your elements in phases by creating separate tasks for groups of elements. Before you discover applications, backup servers, and hosts, you should have discovered your switches, storage systems, NAS devices and tape libraries.
NOTE: To use a hosts file to specify systems for an automatic discovery, add the hosts file name to the Ping inclusion ranges, templates and/or hosts files section on the Discovery page, Automatic tab, Configure general settings section. Use the following statement: $Hosts_filename where Hosts_filename is the name of the hosts file that you want to use. NOTE: Refer to Creating a new discovery task in the HP SIM online help for more information. 8. Select the discovery task and click Run Now.
NOTE: SE discovery processing might finish before the SE Identification column shows the Running status. From HP SIM, select Tasks & Logs > View Storage Essentials Logs to see the HP Storage Essentials discovery progress. 12.To obtain details about your discovered elements, click the Run SE Discovery Data Collection Now link in the For Storage Essentials (SE) discoveries section above the list of tasks.
• During Discovery Data Collection the data you see in the user interface is not updated until the data collection is finished. • During Discovery Data Collection, the topology in System Manager is recalculated. While the topology is being recalculated, the loading of the user interface in Storage Essentials may be slow. • You can use discovery groups to break up Discovery Data Collection.
See ”Step 1 — Discovering Your Hosts and Backup Manager Hosts” on page 83, then set up the configurations for your applications on the management server. Some applications may require you to provide additional discovery information about the application. Finally, perform discovery and then run Discovery Data Collection. Discovery Data Collection takes some time. Perform this step when the network is not busy. More details about the steps mentioned above are provided later.
1. Select Discovery > Setup. 2. Click the Applications tab. 3. Click Change Password in the Change Password for Managed Database Account section. 4. Enter the password that was used for creating APPIQ_USER on the managed database instances.
• Verify that the instance TNS (Transparent Name Substrate) listener is running so that the management server can find the Oracle installation and its instances. For example, on Microsoft Windows 2000, you can determine if the instance TNS listener is running by looking in the Services window for OracleOraHome92TNSListener. The name of the TNS listener might vary according to your version of Oracle. See the Oracle documentation for information about verifying if the instance TNS listener is running.
NOTE: You can use a remote Oracle client to run this script. 4. Specify the Oracle instance name, which must be visible to the client, as the first input when running the script. The script prompts you for the name of the Oracle instance on which to create the user for Oracle management packages and the password of the SYS account. You are asked to specify the default and temporary tablespaces for APPIQ_USER during the installation.
2. If you plan to remove the management software for Oracle from a computer running Windows, go to the \DBIQ\oracle\win directory on the CD-ROM. 3. If you plan to remove the management software for Oracle from a computer running OpenVMS do the following: a. Mount the CIM Extensions CD-ROM (if not auto-mounted) using the following command: $ MOUNT /MEDIA=CDROM UNDEFINED_FAT=STREAM:32767/OVERRIDE=IDENTIFICATION DQB0 where DQB0 is the CD-ROM drive. b.
IMPORTANT: Monitoring Oracle 10g or Oracle clusters requires an additional step. If you are not monitoring Oracle 10g or Oracle clusters, go to ”Step 3 — Discovering Applications” on page 123. Step C — Set up Discovery for Oracle 10g NOTE: If you are discovering an Oracle cluster, see ”Discovering Oracle Real Application Clusters (RAC)” on page 94. NOTE: By default discovery of Oracle is not supported through auto scan.
The port can be found in the following code: LISTENER = (DESCRIPTION_LIST = (DESCRIPTION = (ADDRESS_LIST = (ADDRESS = (PROTOCOL = TCP)(HOST = localhost)(PORT = 1521)) (ADDRESS = (PROTOCOL = IPC)(KEY = EXTPROC0)) ) ) ) 6. Select ORACLE from the Database Type menu. 7. Click OK. Discovering Oracle Real Application Clusters (RAC) Since Oracle RAC is an active-active application cluster, one RAC instance can provide information for the whole RAC.
1. Install the CIM extension on each node in the cluster. 2. Create the APPIQ_USER account for the Oracle application from that node in the cluster in which it is currently running. See ”Step A — Create the APPIQ_USER Account for Oracle” on page 90. 3. Click Discovery > Setup, and discover the host for the first node by clicking the Add Address button and providing the appropriate information for discovering the host, as described in ”Adding an IP Range for Scanning” on page 30. a.
Discovery of Oracle RAC Instances Using One Instance Because one RAC instance can provide information for the whole RAC, it is possible to identify and discover all the instances in the Oracle RAC cluster from any one of its instances. This means that the you can enter the application setup information for one instance of the Oracle RAC, and the management server will automatically discover the other instances, subject to certain conditions.
b. Click the Create button for the Database Information table. c. In the Host IP/DNS Name box, enter the IP address or DNS name of the host running Oracle. In the Management IP/DNS Name box, enter the IP address the listener is listening on for the Oracle instance. The IP address can be a virtual IP or a host IP. You can find the IP address in the listener.ora file for the monitored database. You can find the listener.ora file in the following directory on the host of the monitored database.
return identical capacity data). However, the management server does not explicitly identify and construct the Oracle RAC application cluster. Also, when the underlying host cluster is not discovered, other instances of the Oracle RAC cannot be discovered automatically as described in the Discovery of Oracle RAC Instances Using One Instance section.
of the monitored database. Do not look for the listener.ora file on the management server for this information. Microsoft Windows %ORA_HOME%\network\admin\listener.ora Unix Platforms $ORACLE_HOME/network/admin/listener.ora The port can be found in the following code: LISTENER = (DESCRIPTION_LIST = (DESCRIPTION = (ADDRESS_LIST = (ADDRESS = (PROTOCOL = TCP)(HOST = localhost)(PORT = 1521)) (ADDRESS = (PROTOCOL = IPC)(KEY = EXTPROC0)) ) ) ) g. Select ORACLE from the Database Type menu. h.
• ”Step B — Provide the Microsoft SQL Server Name and Port Number” on page 104 IMPORTANT: Make sure the Microsoft SQL Server database is in “Mixed Mode authentication.” To switch to mixed mode authentication, see ”Switching to Mixed Mode Authentication” on page 100. Switching to Mixed Mode Authentication IMPORTANT: Do not make security changes to your Microsoft SQL Server installation unless you are familiar with the security requirements of your site.
The management server accesses Microsoft SQL Server through the appiq_user account. This account is created when you run the CreateSQLServerAct.bat or CreateSQLServerActCustom.bat script on the computer running the Microsoft SQL Server database you want to monitor. This account has create session and select dictionary privileges, which allow the management server to view statistics for the Microsoft SQL Server.
criteria described in ”Creating Custom Passwords on Managed Database Instances” on page 88. If you are running the CreateSQLServerAct.bat script, the default password (password) is automatically used. 6. The script prompts you for the SA user password. Enter the password. The appiq_user account is created. 7. To determine if the appiq_user account was added correctly to your Microsoft SQL server: a. Open SQL Server Enterprise Manager. b.
You are prompted for the password for this user account when you run the script. 3. In a new command window, run the CreateSQLServerActCustomPwd.bat script on the computer with the SQL Server database. NOTE: You can use a remote SQL Server isql to run this script. 4. The script prompts you for the name of the SQL Server on which to create the appiq_user account.
IMPORTANT: If you have name resolutions issues, your server may be discovered; however, your applications will not be discovered. You can address the name resolution issues by adding entries within the hosts file on the management server for the systems in question.
Microsoft SQL Server 2000 a. Open SQL Server Enterprise Manager. b. Expand the user interface for SQL Server Enterprise Manager, and then select the specific SQL server. Right-click and then select Properties from the menu. c. Click the Network Configurations button. On the General Tab, select the TCP/IP entry under the Enabled Protocols section, then click the Properties button. d. The resulting window shows you the TCP/IP port your SQL server uses.
The account for appiq_user is removed. The management server can no longer monitor the SQL Server databases on this host. Deleting Microsoft SQL Server Information If you do not want the management server to monitor a Microsoft SQL Server instance, you can remove its information, as described in the following steps: 1. Select Options > Protocol Settings > Storage Essentials > System Application Discovery Settings.
• Host IP/DNS Name: • Database Server: • Port Number: • Database Type: SQLSERVER To add information for discovering a Microsoft SQL Server cluster: 1. Select Options > Protocol Settings > Storage Essentials > System Application Discovery Settings. To select a target, you must have at least one element designated as a server, workstation or desktop.
a. Open SQL Server Enterprise Manager. b. Expand the user interface for SQL Server Enterprise Manager, and then select the specific SQL server. Right-click and then select Properties from the menu. c. Click the Network Configurations button. On the General Tab, select the TCP/IP entry under the Enabled Protocols section, then click the Properties button. d. The resulting window shows you the TCP/IP port your SQL server uses. Provide this port number in the Port Number box on the management server.
NOTE: To create the APPIQ_USER with a custom password, run CreateSybaseActCustomPwd.bat. For more information, see ”Creating Custom Passwords on Managed Database Instances” on page 88. Keep in mind the following: • The script must run under SA user. • Obtain the Sybase server name before you run the script • Create APPIQ_USER account on Sybase Database you want to monitor. • You should have already installed the database for the management server.
Removing the APPIQ_USER Account for Sybase IMPORTANT: Before you remove the APPIQ_USER account for the Sybase databases on a host, make sure no processes are running APPIQ_USER for that Sybase database. The management server uses APPIQ_USER to obtain information about a Sybase database. To remove the APPIQ_USER account for the Sybase databases on a host: 1.
5. In the Server Name box, enter the Sybase database you want to monitor. 6. In the Port Number box, enter the port that Sybase is using. 7. Select SYBASE from the Database Type menu. 8. Click OK. IMPORTANT: Perform Discovery Data Collection for your inputs to take effect. See ”Step 3 — Discovering Applications” on page 123. Deleting Sybase Information If you do not want the management server to monitor a Sybase instance, you can remove its information, as described in the following steps: 1.
• The user name you provide could be either the Windows logon name or Common Name (CN) of the Active Directory User for accessing the Microsoft Exchange server. If the CN is provided, make sure that the user resides under the default Users Organization Unit (OU). If the Windows logon name is provided, it should be in the format: Domain\Username and the corresponding user could be in any OU. To find the CN for a user on a domain controller server: a. Install the ADSIEdit MMC snap-in if it is not installed.
Click OK. Deleting a Microsoft Exchange Domain Controller To delete all of the domain controllers of a particular domain: 1. Select Options > Protocol Settings > Storage Essentials > Global Application Discovery Settings. 2. Click the Delete ( ) button corresponding to the domain you want to remove. 3. Run Discovery Data Collection for your changes to take effect. To delete a particular domain controller in a domain: 1.
NOTE: The required drivers for Caché were automatically installed along with the management server. IMPORTANT: Before you begin these steps, make sure you purchased Caché IQ, which is the module that lets you monitor Caché. Contact your customer support if you are unsure if you purchased this module. Step A — Import the Wrapper Class Definitions into the Caché Instance To import the wrapper classes: For Caché 5.0 (5.0.20 onwards) 1.
• On IBM AIX, Linux, or HP-UX, log into an account that has administrative privileges, and mount the CIM Extensions CD-ROM (if not auto-mounted). The wrapper file is /cdrom/DBIQ/cachedb/unix/cachedb50_sqlprojs.xml where /cdrom is the name of the directory where you mounted the CD-ROM • On Microsoft Windows, the wrapper file on the CIM Extensions CD-ROM is \DBIQ\cachedb\win\cachedb50_sqlprojs.xml. • When the Import Classes windows is displayed, click Options.
Figure 15 Selecting appiq.cls For Caché 5.2 and Caché 2007.1 1. Launch the Caché System Management Portal by right-clicking the Caché Cube icon in the system tray area of the Windows toolbar and selecting System Management Portal. 2. Click the Classes link under Data Management. 3. On the Classes page, select the Namespaces radio button, and then select %SYS. 4. Click Import. 5. Browse the CIM Extension CD, select the wrapper xml file, and click Open.
where DKA0 is a local drive on the OpenVMS host. c. Browse to $DKA0 and specify SQLPROJS.XML within $DKA0 as the import file. 6. After the file is opened, click Select All. 7. Select Check here to compile imported items, and click Import. The wrapper class definitions are imported into the Caché %SYS namespace.
NOTE: If you are running Caché 5.2 or later, and the Caché instance was installed using “Locked Down” security mode, see ”Locked Down Security Mode” on page 120 before creating the APPIQ_USER account. To create APPIQ_USER for the Caché instance: 1.
enter the custom password as the fourth argument. When invoking the scripts on OpenVMS, enclose the arguments in double quotes: $ @CRUSER.COM "" "" "" 5. Repeat the previous step for each Caché instance you want to manage. Locked Down Security Mode For Caché 5.2 and later versions, if the Caché instance was installed using “Locked Down” security mode, the following steps must be carried out before creating the APPIQ_USER account: 1.
For Caché 5.2 and later versions, if the Caché instance was installed using “Locked Down” security mode, ensure that the _SYSTEM user has been enabled before trying to remove the APPIQ_USER account. To ensure that the _SYSTEM user has been enabled: 1. Launch the System Management Portal 2. Click the Security Management link under System Administration. 3. On the Security Management page, click the Users link. 4. Click the Edit link for _SYSTEM user. 5.
4. Enter the Caché server name, the Super Server port number and the password of the _SYSTEM user account as arguments for the script. When invoking the scripts on OpenVMS, enclose the arguments in double quotes: $ @DROPUSER.COM "" "" " 5. Repeat the previous step for each Caché instance you want to manage. After deleting the APPIQ_USER account from the Caché instance, you can also delete the wrapper class definitions. For Caché 5.0 (5.0.
8. Click OK. IMPORTANT: Perform Discovery Data Collection for your inputs to take effect. See ”Step 3 — Discovering Applications” on page 123. Deleting Caché Information If you do not want the management server to monitor a Caché instance, you can remove its information, as described in the following steps: 1. Select Options > Protocol Settings > Storage Essentials > System Application Discovery Settings. To select a target, you must have at least one element designated as a server, workstation or desktop.
2. To start discovering elements on the network, click the Start Discovery button on the IP Addresses tab. The software discovers the IP addresses selected. During discovery, the following occurs: • The software changes the status light from green to orange. • The Log Messages page is displayed. To view the status of discovery, click Discovery > View Logs. The DISCOVERY COMPLETED message is displayed in the Log Messages box when Discovery is complete.
Step C — Run Discovery Data Collection Obtain detailed information from the discovered applications as described in this section. Keep in mind the following: • Discovery Data Collection takes some time. You might want to perform this process when the network and the managed elements are not busy. • During Discovery Data Collection the topology is recalculated. While the topology is being recalculated, the loading of the user interface may be slow.
IMPORTANT: If the management server cannot communicate with an application, it labels the application as “Discovered”. The management server could find the application, but it could not obtain additional information about it. 4. See the topic, “Adding a Discovery Schedule” in the User Guide for information about automating the gathering of Discovery Data Collection. If you run into problems with discovery, see ”Troubleshooting” on page 685.
The management server requires the password to have the following characteristics: • a minimum of three characters • starts with a letter • contains only letters, numbers and underscores (_) • does not start or end with an underscore (_) 5. Re–enter the password in the Verify Password box. 6. Click OK. HP Storage Essentials SRM 6.
128 Discovering Applications, Backup Hosts and Hosts
4 Host and Application Clustering Some of the features described in this chapter are not included in HP Storage Essentials Standard Edition. To determine which features apply to your product, see the List of Features, which is accessible from the Documentation Center (Help > Documentation Center in HP Storage Essentials).
For information about discovering application clusters, see ”Discovering Applications, Backup Hosts and Hosts” on page 83. Refer to the support matrix for a complete list of supported configurations. The support matrix is accessible from the Documentation Center (Help > Documentation Center in HP Storage Essentials). Automatic Discovery of Host Clusters MSCS on Windows 2003 and Veritas Clusters on Solaris support automatic discovery. To discover hosts using either of these cluster services: 1.
3. Cluster Manager Step 2 (Specify Cluster Properties and Cluster Members) is displayed. If you are discovering an HP Serviceguard cluster, this page may already be populated, and you can skip to the next step. If this page isn’t already populated, follow these steps to specify the cluster properties and cluster members: a. In the Cluster Properties section, specify the cluster name, cluster server, and cluster virtual IP. b.
Filtering Hosts The Available Hosts table on Cluster Manager Step 2 (Specify Cluster Properties and Cluster Members) allows you to filter the list of hosts displayed. To filter the list of hosts: 1. Click the + Filter link to display the filtering options. If the volume filter is already displayed, the - Filter link is shown instead, which will collapse the filtering options. 2. Enter all or part of a volume name in the Name Contains box. 3. Select an operating system from the Operating System menu. 4.
Clustering in System Manager System Manager has been enhanced to seamlessly support clusters in all areas. You can view connectivity information from all levels on a single canvas — from applications running on clusters, to the storage array spindles that share volumes for all the nodes of a cluster. For detailed information about System Manager, see ”Viewing Element Topology and Properties” on page 249. The following figure shows how clusters are displayed in System Manager.
Double-click a cluster to open the Properties page for the cluster. Double-click an individual cluster node to open the Properties page for that node. Clustering in Topology Element topology expands System Manager’s view to show exactly which shared resources a particular application instance uses. Individual paths from application nodes are listed in the path tree as well. For detailed information about viewing element topology, see ”Viewing Element Topology” on page 311.
In the following figure, individual instances of Microsoft Exchange Server 2003 share HP EVA virtual disk array group shared resources: Figure 18 Cluster Element Topology Representation Clustering in Capacity Manager In Capacity Manager, it is possible to see the whole capacity utilization by the cluster. Clusters are represented as managed elements, and the capacity calculator intelligently avoids double counting of the capacity from individual nodes at the cluster level.
• Whole cluster capacity • Individual application instance capacity • Individual cluster node capacity • Capacity trending over a period of time • Shared resources of individual nodes The following figure shows an example of how clusters are represented in Capacity Manager: Figure 19 Capacity Manager Cluster Representation 136 Host and Application Clustering
5 Managing Security IMPORTANT: Depending on your license, role-based security may not be available. See the List of Features to determine if you have access to role-based security. The List of Features is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
IMPORTANT: These roles apply only to features and elements in HP Storage Essentials. For example, assume you assigned a user to the Help Desk role in Storage Essentials. For example, assigning a user to the Help Desk role in Storage Essentials will not give the user that role in any other product.
SIMViewOnly Users created in HP Systems Insight Manager are automatically placed in the SIMViewOnly role. This role does not allow users to access any of the features listed in Table 12 on page 138. See ”Adding Users” on page 144 for more information. Granting Global Reporter Access Users with access to Global Reporter can view all elements throughout the enterprise, including those on the server running Global Reporter.
Table 13 Default Role Privileges by Elements (continued) Domain Administrator Full Control Full Control Full Control Full Control Full Control Full Control Storage Administrator View View Full Control Full Control Full Control Full Control Server Administrator View Full Control View View View View Application Administrator Full Control View View View View View Help Desk View View View View View View SIMViewOnly View View View View View View Options for Restricting
Users assigned to an organization can see only the elements that belong to that organization. If users are assigned to more than one organization, they see all elements that belong to the organizations to which they are assigned. For example, assume you created two organizations: one called OnlyHosts that allowed access to only hosts and another called OnlySwitches that allowed access to only switches.
• NYWebHost_Solaris • NYWebHosts • WebHosts • US East Coast Figure 21 Children in Multiple Organizations When you remove an element from an organization, users belonging to that organization or to one of its parents can no longer access that element if it is not a member of any other organization. For example, assume an element named MyHost was not only a member of BostonWebHost_Solaris, but also had mistakenly became a member of BostonWebHost_Windows.
report. This is also true when you email reports. If you do not have permission to access hosts, the reports you e-mail, including the host-specific reports, will not contain information about hosts. If the users receiving your reports want to be able to view information about hosts, one of the following must happen: • The hosts in question must be added to your organization. • Someone else, who has the hosts in question already in their organization, must send the reports.
• Viewing the Properties of an Organization, page 148 Adding Users This section contains procedures for adding users and authorizing privileges. Only users belonging to the Domain Administrator role can add or modify users. Keep in mind the following: • On Windows systems — The user name and password must be alpha-numeric, and cannot exceed 256 characters. The user name cannot begin with a number. • On Linux systems — The user name and password cannot exceed 256 characters. To create an account: 1.
The users you created in HP SIM are put in the SIMViewOnly Role. This role does not allow users to access any of the features listed in ”Default Role Privileges” on page 138. 7. If you want to change the role from the default SIMViewOnly role, click the Run SE User Security Configuration link on the HP SIM Users tab. Figure 22 Run SE user security configuration 8. Change the role as described in ”Editing a User Account” on page 145.
NOTE: The Everything organization is the default organization that lets users access all current and future elements. 11.Click OK. The user account is updated. Deleting Users Keep in mind the following: • You cannot delete the admin account. • Only users belonging to the Domain Administrator role can delete users. To delete a user account: 1. In HP SIM, click Options > Security > Users and Authorizations. 2. Click the User tab. 3. Select the check box for the users you want to delete, and click Delete.
3. When you are done with your modifications, click Save Changes. Modifying Your User Preferences Use the User Preference tab to modify your user preferences for System Manager and Element Topology. The User Preference tab controls what is displayed for your user account. To access the User Preferences tab: 1. Click the name of your account in the upper-left corner of Storage Essentials. 2. Click the User Preferences tab.
• Role Description — A description of the role. • Access Level — How much access the user has to a type of element, such as hosts, storage systems, switches, and applications. See ”About Security for the Management Server” on page 137 for more information. • Access to the — Components in the management server the user can access, where is the name of your product. To learn how to edit a role, see ”Editing Roles” on page 149.
• The Role Name and Description boxes do not accept special characters, except spaces and the following characters: $, -, ^, ., and _ • Only users belonging to the Domain Administrator role can add roles. To add a role: 1. Access Storage Essentials through one of the menu options, such as Options > Storage Essentials > Email Settings. 2. In the upper-right corner, click Security > Roles. 3. Click New Role. 4. In the Role Name box, enter a name for the role. For example: Quality Assurance.
1. Access Storage Essentials through one of the menu options, such as Options > Storage Essentials > Email Settings. 2. In the upper-right corner, click Security > Roles. 3. Click the Edit ( ) button. 4. Make the desired changes: • To edit the name of the role, change the name in the Role Name box. The name can contain spaces, but it cannot be longer than 256 characters. • To edit the description of the role, change the description in the Description box.
• Removing Members from an Organization, page 154 • Filtering Organizations, page 154 Adding an Organization You can create new organizations to restrict access to certain elements. For example, if you do not want the help desk to have access to elements belonging to a certain group, you could create an organization that does not allow access to those elements. Once you assign users to that organization, they will only be able to access the elements you specified.
b. In the right-hand pane, select the elements you would like to add by clicking the appropriate check boxes. c. Click Add. d. The selected elements are added to the Organization Members pane. To add storage volumes to the organization, see ”Adding Storage Volumes to an Organization” on page 152. 8. To add organizations: a. Click the Organizations node. b. In the right-hand pane, select the elements you would like to add by clicking the appropriate check boxes. c. Click Add.
To access information about a child organization, click its link in the Child Organization column. Editing an Organization When elements are removed from an organization, users belonging only to that organization are no longer able to access the removed elements. See ”About Security for the Management Server” on page 137 for more information about roles and organizations. Keep in mind the following: • Depending on your license, role-based security may not be available.
organization, you will still have access to hosts because you still belong to the onlyHosts organization. Keep in mind the following: • You cannot remove the Everything organization, which is the default organization. • Only users belonging to the Domain Administrator role can delete organizations. • You cannot delete an organization that contains a user who belongs to no other organizations. For example, assume you create an organization named Org1 that contains two users: User1 and User2.
• Users assigned to the Admin account cannot filter organizations because the Admin account belongs to the Everything organization by default. As a result, these users do not have access to the filtering feature for organizations. • If you do not want to view an element, deselect all child organizations containing that element. You must also deselect all parent organizations containing the child organization that has that element.
• DB_SYSTEM_USER — Used for all the database activity, including establishing a connection to the management server database. Default password: password • SIM_MANAGER — Used for all HP SIM activity, including the HP SIM schema, maintenance, and login. Default password: quake To change the passwords of the SYS, SYSTEM, RMAN_USER, SIM_MANAGER, and DB_SYSTEM_USER accounts, you must use the Database Admin Utility, so the management server is aware of the changes.
5. Enter the current password in the Old Password box. 6. Enter the new password in the New Password box. 7. Re-enter the password in the Confirm Password box. 8. Click Change. The Database Admin Utility changes the password for the specified account. Using Active Directory/LDAP for Authentication NOTE: Active Directory/LDAP is not supported with Storage Essentials Standard Edition.
Configuring the Management Server to Use Active Directory By default, AD allows connections with domain\username, instead of with the distinguished name (DN) used by a generic LDAP server. However, you can use the generic LDAP server setup to authenticate with AD, as described in ”Configuring the Management Server to Use LDAP” on page 161. To specify the management server to use AD: 1.
6. Replace directory2.hp.com with the IP address or the fully qualified DNS name of your secondary Domain Controller server, if available. 192.168.10.2 where 192.168.10.2 is the IP address of the secondary Domain Controller server running AD. 7.
IP address of Primary Domain Controller IP Address of Secondary Domain Controller false false false 3. Comment out the Default tag as follows: 4.
CN=$NAME$,OU=NetworkAdministration, dc=MyCompanyName,ou=US,dc=COM The management server searches only those users in the company who are part of the NetworkAdministration organization (OU=NetworkAdministration) and in the United States (ou=US). IMPORTANT: Different LDAP implementations may be using different keynames for CN. The appropriate keyname should be named in login-handler.xml.
false false false CN=$NAME$,OU=Engineering,DC=mycompanyname,OU=US,DC=COM displayName mail When you a
b. Enter the following at the command prompt to stop the management server: /etc/init.d/appstormanager stop c. To start the management server, enter the following at the command prompt: /etc/init.d/appstormanager start 2. Login as the designated administrator account you specified in ”Step 1 — Configure the Management Server to Use AD or LDAP” on page 157.
166 Managing Security
6 Managing Licenses Some of the features described in this chapter are not included in HP Storage Essentials Standard Edition. To determine which features apply to your product, see the List of Features. Standard Edition supports a subset of the devices supported by Enterprise Edition. For a list of the devices supported by Standard Edition, see your product’s Support Matrix.
Table 14 License Restrictions Type of Restriction Description Unit of Measurement Backup Size The management server determines licensing for Backup Manager through gigabytes (GB). The management server compares the number of gigabytes for Backup Manager with what you are backing up. If you are backing up more than your license allows, you are warned the next time you log onto the management server.
Table 14 License Restrictions Type of Restriction Description Unit of Measurement For File System Viewer The management server determines licensing for File System Viewer through terabytes (TB). When you purchased File System Viewer, you were given a number of TB you were allowed by the management server to monitor. Terabytes (TB) The management server detects the number of TB that are being monitored on file servers and verifies that number is at or below the purchased amount.
Table 15 Determining Managed Access Points (continued) Element Managed Access Point Storage systems The MAPs are the sum of all front-facing ports. Storage systems with FA ports the software does not support, such as mainframe attached FICON, are still counted as MAPs. However, the management server does not count MAPs from storage systems it does not support. See the release notes for information about supported storage systems.
Assume you have the same configuration as the first example, with two Windows 2000 hosts that are directly attached to storage systems, with no Fibre Channel (FC) connections and with a total of 0 FC ports, as shown in the following figure: Figure 25 An Example of Direct Attached Storage The software calculates four MAPs (see the figure), since we assume one MAP for each host, even though it has no Fibre Channel ports. The storage systems are counted, since they are supported by the management server.
To import a license file, 1. Select Deploy > Storage Essentials > License Manager > Manage Storage Essentials Keys in HP Systems Insight Manager or select Security > Licenses in HP Storage Essentials. 2. Select Import License File. 3. Select Browse. You are shown the file system of the computer being used to access the management server. 4. Select the license file. 5. Select OK.
The license’s name and file name are listed, along with its properties. You can determine how many MAPs and/or managed application licenses (MALs) this license supports by looking at the properties in the license file. However, that can be misleading if you have other licenses that also provide support for MAPs and MALs. It is suggested you look at the cumulative licenses to obtain a total of the MAPs and MALs that are supported.
IMPORTANT: You must complete a Discovery Data Collection for the EVA arrays before importing the license and starting the collectors. After importing the license, you can start the data collectors from the Performance Data Collection page (Optimize > Storage Essentials > Performance Data Collection). Although EVA arrays are displayed after you run discovery (Options > Discovery), you must run a Discovery Data Collection for the collectors to run properly.
Select Enhanced Performance Collection Enabling to select the EVA arrays you want to include for enhanced performance data collection and reporting.
2. Go to the Webware Licensing website to use the HP Password Delivery Service, and redeem the license key for your product order. Webware Licensing will send you a link from which to download a license key. 3. Access the Storage Essentials License Manager in System Insight Manager. Do this by using the Deploy > Storage Essentials > License Manager > Manage Storage Essentials License Keys menu choices. 4. Select Import License File to download the file. 5.
7 Configuring the Management Server Some of the features described in this chapter aren’t included in HP Storage Essentials Standard Edition. To determine which features apply to your product, see the List of Features, which is accessible from the Documentation Center (Help > Documentation Center in HP Storage Essentials).
The software does receive SNMP traps from some devices. These traps are translated into events in Event Manager. When they are sent out as SNMP traps, the information in the trap will be the same as the original device trap, but the format of the trap will be different. For example, the trap will contain the original severity and description information, but the Trap OID, fields, and codes will be different. To configure trap forwarding, go to Options > Protocol Settings > Global Protocol Settings.
3. Required: In the Name box, enter the DNS name or the IP address of the Simple Mail Transfer Protocol (SMTP) server you want to use to send the e-mail notification. 4. Required: In the Port box, enter the port of the SMTP server you want to use to send the e-mail notification. 5. In the User Name box, enter a user name for the SMTP server. 6. In the Password box, enter a password for the SMTP server. 7. In the Verify Password box, enter the password you entered previously. 8.
• Paper height - Displays the height of the paper. You can modify the measurement in this field when you select the Custom option in the Paper format drop-down menu. • Top margin - Type a measurement for the top margin. • Bottom margin - Type a measurement for the bottom margin. • Left margin - Type a measurement for the left margin. • Right margin - Type a measurement for the right margin. • Orientation - Click an orientation for the printout. 3.
• Width - Determines the width of the printout. If the width entered does not fit on the page, the printout wraps around to another page. • Height - Determines the height of the printout. If the height entered does not fit on the page, the printout wraps around to another page. • Resolution (pixel/unit) - Lets you change the resolution so that the printout spans several pages. • Page - Lets you expand the printout so it prints on several pages without modifying the graphic. 5.
• Include backup details - To obtain the latest backup information, select the Include backup details option, and schedule the discovery to run nightly after you run your backup sessions. It is recommended you do not schedule the discovery of infrastructure details and backup details to run at the same time.
• Include backup details - To obtain the latest backup information, select the Include backup details option, and schedule the discovery to run nightly after you run your backup sessions. It is recommended you do not schedule the discovery of infrastructure details and backup details to run at the same time. • Force Device Manager Refresh - If you want the device managers for HDS and EMC Symmetrix storage systems to obtain the latest information whenever getting discovery details.
Editing a Schedule To edit a schedule: 1. Select Options > Storage Essentials > Discovery > Schedule Discovery Data Collection in HP Systems Insight Manager. 2. Click the Edit ( ) button corresponding to the discovery schedule you want to modify. 3. If necessary, change the following properties: • Name • Description • Type of discovery • Schedule 4. Click Next. 5. If necessary, change the discovery groups you want assigned to the schedule. 6. Click Finish. Removing a Schedule To remove a schedule: 1.
To apply the filter settings, click Filter to refresh the content of the page. To restore the filters to their default settings, click Reset, and refresh the collector page. You can modify the default collector settings for all future discovery elements by clicking the Edit ( ) button, or by selecting one or more collectors using the checkboxes and clicking Edit Selected.
• Database alert log - The Database Alert Log scans the management server for critical errors at a specified interval and displays the information in its own chart. This setup frees up Event Manager for monitoring other elements. See ”Enabling the Scanning of Critical Events of the Management Server Database” on page 193. • Log files - You can view and download product logs, as described in ”Accessing the Log Files” on page 188 and ”Downloading Logs to a File Using the Download Logs Feature” on page 190.
1. Select Options > Storage Essentials > Manage Product Health in HP Systems Insight Manager. 2. Select Disk Space in the tree. 3. Click the Results tab in the Disk Space window.
• Accessing the Log Files, page 188 • Downloading Logs to a File Using the Download Logs Feature, page 190 • Downloading Logs to a File Using the Log Download Utility, page 190 • Downloading the User Audit Log, page 191 • Downloading the Discovery Summary Log, page 191 • Displaying a Log File in a Command Prompt Window, page 191 • Changing the Provider Log Level, page 192 • Enabling the Scanning of Critical Events of the Management Server Database, page 193 • Viewing the Results of Logging, page 193 Access
Log file timestamp - A timestamp (YYMMDD-HHMMSS) is inserted into the filename at its creation, making its origin more quickly identified. (i.e., appstorm.20071012-122025.log). Log file sort criteria - Logfiles sort in order of their creation, based upon the timestamp in their filename. Log file configurable parameters - Configurable parameters for all log files are these: • Maximum size of the logfile before it rolls over (MaxFileSize). This parameter resides in log4j.
Adding trace for XML received from CIMOM - Traces are normally very large files. For that reason, the trace is turned “off” by default. To add a trace, go into the properties file in the following directory: %/JBOSS4_DIST%\server\appiq\conf At the conf directory, uncomment the line shown below by deleting the pound sign (#): #wbem.debug.sml=1 After uncommenting the line, set the level to at least 3 for the XML traces to be written.
NOTE: The Log Download Utility does not trigger CIMOM thread dumps, Environment variable dumps, Port usage information, or the latest JBoss thread dump information. The Download Logs button on the Configuration screen can be used to trigger the items not triggered by the Log Download Utility. To download logs to a file by using the Log Download Utility: 1. Open the Command Prompt window and go to the following directory: %MGR_DIST%\Tools\logDownloader 2.
Downloading the Discovery Summary Log You can view status information from Discovery Data Collection by viewing the discovery summary logs, as described in the following steps: 1. Select Options > Storage Essentials > Manage Product Health in HP Systems Insight Manager. 2. Click Download Discovery Summary. 3. Save the zip file. 4. Unzip the zip file. 5. Open the GAEDSummary.log file in a text editor. If you are using NotePad, you may need to select Format > Word Wrap.
Use the table ”Logging Levels” on page 192 as a guideline for the different options. Several of the options mention providers. A provider is software that gathers information from an element, such as a switch. Table 16 Logging Levels Log Level Option Description Use When You Default Logging Provides superficial logging Do not want additional logging. Detailed tracing of Brocade provider Provides detailed logging of the providers used to gather information from the Brocade switch.
Enabling the Scanning of Critical Events of the Management Server Database You can configure the management server to scan for only critical events occurring with the database for the management server at a specified time interval. The management server displays the results of these scans under Options > Storage Essentials > Manage Product Health > Log Files in HP Systems Insight Manager. To enable this type of scanning: 1.
Controlling the Display of Cleared and Deleted Events You can control how the management server displays events by modifying one or more of the following: • The clearing and deletion frequency - The frequency table determines how often the user interface in Event Manager removes events and marks events as cleared. Events always display as they occur in the user interface. IMPORTANT: Events are only removed or marked cleared when their automatic delay time is completed.
Configuring the Clearing of Events Depending on the severity of an event, the management server may mark the event as cleared after 60 minutes. Events designated as Major and Critical are never marked as cleared. You can change the time delay in clearing an event, and you can specify that the management server never marks an event as cleared. To help you in filtering events, you may want to have unimportant events marked as cleared rather than automatically deleted.
To change the default time delay to delete an event: 1. Select Options > Events > Storage Essentials > Event Configuration. 2. Do one of the following: • If you never want an event of the specified severity level automatically deleted, select the Never option in the Automatic Delete Delay column.
• Next Scheduled Run - Displays the next time the management server is scheduled to obtain image details from the backup server. • Interval in Minutes - Displays how often the management server is scheduled to obtain image details. • Running - A check mark means the collector is running. • Edit Schedule - Lets you modify the collection details • Start Collectors - Click this button to start the collectors. • Stop Collectors - Click this button to stop the collectors.
5. Set the date, time, and repeat interval for this task. For more information, see ”Setting the Date and Time for Scheduled Tasks” on page 181. 6. Click OK. The management server gathers information about image, session, or media details. Setting the Backup Sessions Retention Period You can set the retention value for sessions to be stored in the database. To set the backup sessions retention period: 1. Select Tools > Storage Essentials > Home > Configuration > Backup. 2.
• Interval (Minutes) - Displays how often the management server is scheduled to obtain drive monitoring details. • Running - A check mark means the collector is running. • Edit - Lets you modify the collection details • Start Collectors - Click this button to start the collectors. • Stop Collectors - Click this button to stop the collectors. Viewing the Status of Backup Collection The management server keeps track of the collections it has completed on the discovered Backup Managers on the Status tab.
views are refreshed, as described in ”Refreshing the Report Cache” on page 208. The overall report architecture is displayed in Figure 29, “Report Views and Report Cache Refresh,” on page 200. Figure 29 Report Views and Report Cache Refresh Suggestion for Scheduling the Report Cache Refresh: The report cache (report views) is snapshot data of a management server schema up to a point in time. The report cache refresh is time- and resource-consuming.
Report Refresh Status The management server has two types of views for its reports. During a report cache refresh, these views are updated. You can check the status of the following views as described in this section: • MVIEWCORE_STATUS - This table keeps track of the refresh status of the core views. The core views are the views starting with mvc, mvca and mvcs as shown in Table 60 on page 461. To obtain detailed information of MVIEWCORE_STATUS, see Table 109 on page 494.
6. Enter the following at the command prompt: order by 2; Managing Collectors for Reports The management server uses data collectors to gather information for reports. To view a report, you must have its corresponding collector running, and your report cache must be up-to-date. See ”Refreshing the Report Cache” on page 208 for details. To view collectors for reports, select Reports > Storage Essentials > Report Configuration in HP Systems Insight Manager, and click the Data Collection tab.
Table 18 About Collectors for Reports Column Heading Description Element Displays the name of the element from which this collector gathers information. Element Type Displays the type of element from which the collector gathers information. Reports Lists the reports for which the collector is responsible for providing information. Enabled Displays the status of the collector. Collectors that are running display a check mark in this column.
3. Set the date, time, and repeat interval for this task. For more information, see ”Editing a Collector Schedule” on page 222. 4. Click OK. Stopping Collectors When you stop a collector, the management server stops gathering the information for which the collector is responsible. For example, if a collector is not running, its corresponding reports are no longer receiving information to display.
Table 19 Viewing System-Wide E-mail Schedules (continued) Column Name Description Format The format of the report sent: • PDF • Microsoft EXCEL • XML Scheduled By Edit Delete The user who scheduled the report. Click the Edit ( ) button to edit a schedule. For information about the options displayed in this window, see ”Editing an E-mail Schedule for a Report” on page 443. Click the Delete ( ) button to remove the corresponding schedule.
If you are e-mailing reports in bulk, you might want to let users know the e-mail is being sent by an automated process. You might also want to provide an e-mail address for users to provide feedback, for example: This e-mail and its attached report are generated automatically. If you would like to change how often the report is sent to you or you want to be taken off the list, please contact username@companyname.com. 7.
IMPORTANT: Perform the following steps only if customer support has instructed you to modify one of the collectors on the page: 3. Click the Edit ( ) button. 4. Set the date, time, and repeat interval for this task. For more information, see ”Setting the Date and Time for Scheduled Tasks” on page 181. 5. Click the Enable option. NOTE: If you are not allowed to disable the collector, the Enable option is unavailable. 6.
Keep in mind the following: • If Discovery Data Collection is occurring, wait for it to finish before clicking Refresh Now. This technique ensures the database is completely updated and thus your reports will be as accurate as possible. Discovery Data Collection collects the latest data. When you refresh the report cache, the management server transfers the information collected from Discovery Data Collection and transfers it to the report cache.
When you set up Global Reporter, the management server pulls the data from the local database views at these sites through the database link. The flow of the data is shown by the arrows in the figure below. A global reporting view on the server running Global Reporter contains information in the database that can be used for local and global reports. The management server in New York is referred to as a Global Reporter server because it has Global Reporter enabled.
Table 20 Description of “An Example of Global Reporting” (continued) Item Description 2 Database containing the local materialized views for the management server in Tokyo. 3 Management server for the SAN in New York City. 4 Database for the Management Server in New York City. It contains the local materialized views for New York City, in addition to the global views containing local data from Tokyo, London, and New York.
• Unable to Contact Site - If the management server is unable to contact one of the sites in the Global Reporting list, the refresh process will not start. You can verify if a site can still be contacted by clicking the Test button for the site. You may want to try pinging the machine and verify that management server on the remote server is running. If the site cannot be contacted, remove the obsolete site from the list by clicking the button.
Keep in mind the following: • The remote site is not required to have global reporting enabled in its license. • If you want data from the Global Reporter server included in global reports, add the local management server. Enter localhost as an IP Address/DNS name for your local management server. 6. Click OK. 7. When you are done, click OK. The management server verifies that it can contact the site and it checks the build of the management server the site is running.
4. Modify the following information for your remote servers that are running the management server: • IP Address - The IP address or DNS name of a server. If you change the IP address, you must modify the listener.ora file on the remote server, as described in the following step. • Port (optional) - The Oracle TNS listener port the remote server uses. If this box is left blank, the management server assumes the database on the remote server uses port 1521.
Now, let's assume you removed remotesiteA from the user interface by clicking the corresponding button for the site and then the Refresh Now button near the bottom of the Global Reporter page (Reports > Storage Essentials > Report Configuration in HP Systems Insight Manager). Even though the remote site has been removed from the user interface, it still appears in the tnsnames.ora file. If you add remotesiteA as a remote site for global reporting again, another listing will be added to the tnsnames.
The instructions also remind you to refer to Help for additional information. After you package the necessary files into a .zip file, use the Browse button to navigate to the desired .zip file. When ready to upload the selected file, click the Import button. After importing, a screen display similar to the following shows the imported report files. The imported reports can then be viewed from the “system” link of the Reporter.
Deleting Custom Reports If you want to delete imported custom reports by clicking Delete, the system displays a warning message. If you confirm that you want to delete by clicking Yes, the system deletes the reports and supporting files. You can confirm that the files are deleted by navigating to the Reporter tab and clicking the link.
To apply the filter settings, click Filter to refresh the content of the Report Data Collector page. To restore the filters to their default settings, click Reset, and refresh the collector page. In addition to changing the collector schedule after an element has been discovered, you may wish to decide whether a collector schedule should be started or not for future discovery elements.
Table 21 About Performance Collectors (continued) Column Heading Description Action Displays one of the following buttons: • Stop - Stops the collector. The corresponding reports display only information gathered previously. See ”Stopping Performance Collectors” on page 219. • Start - Starts the collector. When you start a collector, it begins gathering information for its corresponding reports. See ”Starting Performance Collectors” on page 219. Starting Performance Collectors To start a collector: 1.
The collector stops gathering information for its corresponding reports. To stop more than one collector at once, select more than one collector and then click Stop Collectors. Viewing Data Aging Statistics for Performance Data Aging includes Data Rollup and Garbage Collection. Data Rollup controls how often a set of data is summarized. For example, hourly data is rolled into the daily table periodically.
Editing the Locale and Currency Settings The management server determines which languages and currency to display by looking at the language and currency settings for the operating system. You can override the management server’s default locale and currency settings. For example, assume the user interface for the management server is displayed in English, but you want to view it in Japanese.
IMPORTANT: You must restart the management server for your changes to take effect. Process Names This section describes the process names on Windows and Unix systems. Process names on Windows The following process names are displayed in the Windows Task Manager on the management server: Table 23 Process Names on Windows Process Executable name Application Server (JBoss) storApplicationServer.exe CIMOM for Default Discovery Group storCimomDefault.exe CIMOM for Discovery Group 1 storCimom1.
NOTE: If you are using the prstat utility, all of the processes will be named java.exe. Editing a Collector Schedule There are several ways to modify a collector schedule: • Locate the collector you want to edit in the collector table, and click the Edit ( collector’s row. ) button in that • Locate the collector you want to edit in the collector table, and select the collector using the checkbox in the first column of the table. You can select one or more collectors this way.
224 Configuring the Management Server
8 Database Maintenance and Management This chapter contains information about backing up and restoring the database using the Database Admin Utility.
NOTE: The archive directory (\oracle\oradata\APPIQ\archive on Microsoft Windows and $ORACLE_HOME/oradata/APPIQ/archive on UNIX systems) only exists if you have previously set the management server to archive mode. 7. Return the database to archive mode, as described in ”Changing the Archive Mode” on page 240. 8. Start the service for the management server. 9.
IMPORTANT: Table 26 Export and RMAN backups should be done regularly and in combination. Description of Backups Backup Type Description Files Backed Up Database Mode Export backup Done through the Database Admin Utility. See ”Exporting the Database” on page 236 for more information about exporting the database. Database Schema, Oracle network configuration files (tnsnames.ora, listener.
The scheduled backup writes in the backup1 and backup2 folders, in rotation. The Backup Now backup from the management server keeps overwriting in the current folder. See ”Architectural Overview of RMAN Backups” on page 229 for more information about RMAN backups. Database Mode The database can be set to archive mode or no-archive mode.
• If the database fails as a result of a corrupt data file, the database can only be restored to the last export backup available. This requires recreating the database along with the import. Architectural Overview of RMAN Backups By default the management server does not backup the database automatically.
Table 27 Sample Backup Example (continued) Day Backup Type Backup 1 Backup 2 Current Available Backup Day 10 Scheduled Day 10 backup ---------- Backups from Days 7, 8, and 10 ---------- Keep in mind the following: • Only one user at a time can back up the database. • The management server archives files for the backup in a separate directory. Do not modify the files in this directory (\oracle\oradata\APPIQ\archive on Microsoft Windows and $ORACLE_HOME/oradata/APPIQ/archive on UNIX systems).
Performing an RMAN Hot Backup You can perform an RMAN hot backup instantly. The backup is referred to as being “hot” because the management server is still running. When you perform an RMAN hot backup, the following files are backed up: • Database files • Control files • Redo files • Archive files • Oracle network configuration files (tnsnames.ora, listener.ora) • CIM repository • File System Viewer. NOTE: The buttons on the RMAN backup page appear disabled when the database archive mode is disabled.
1. Verify that you have enabled database archive mode and RMAN backup as described in ”Changing the Archive Mode” on page 240. 2. Click Options > Storage Essentials > Manage Product Health in HP Systems Insight Manager. 3. Select RMAN Backup in the Product Health tree. 4. Click the calendar icon . 5. In the Time box, take the following actions: a. Enter the time in 24-hour format. b. Click the date on which you want to run the next backup of the database. Today’s date is highlighted in pink. c. Click Set.
1. Click Options > Storage Essentials > Manage Product Health in HP Systems Insight Manager. 2. Select RMAN Backup in the Product Health tree. 3. Click the Results tab in the RMAN Backup window. The following information is displayed: • Date/Time of the backup • Status of the backup • Backup folder About the Database Admin Utility The Database Admin Utility allows you to manage your database, from restoring it from a cold backup to resetting the temp tablespace.
2. Access the database utility by doing the following on the management server: • On Linux: a. Set the display if you are accessing the Database Admin Utility remotely. The Database Admin Utility uses Perl. To set Perl in your path, enter the following command at the command prompt: . /opt/productname/install/setvars.sh where /opt/productname is the directory containing the software. It is defined by $APPIQ_DIST. b.
IMPORTANT: Do not use the Oracle tools to change the passwords. • SYS - Used for the management server database creation. Default password: change_on_install • SYSTEM - Used for management server database creation, in addition to database import, export and re-initialization. Default password: manager • RMAN_USER - Used for RMAN backup and restore. This user has sys privilege.
d. Stop the HP Systems Insight Manager service so that it cannot access the database. It is very important that the HP Systems Insight Manager service does not access the database before you are finished with changing the password for the database. 2. Access the Database Admin Utility as described in ”Accessing the Database Admin Utility” on page 233. 3. Click Change Passwords in the left pane. 4. Select an account name from the User Name box. 5. Type the current password in the Old Password box. 6.
save you time with exporting the database if your database includes a large amount of report data. 7. Click Export Database. Importing the Database You can revert to an earlier configuration by uploading a file (*.zip) containing the database information. The software stores a snapshot of the data in its database. Since this file is a snapshot of the network at a certain time, it may not contain your most current network configuration.
Re-initializing the Database CAUTION: Do not use the Database Admin Utility to re-initialize the HP SIM database. Follow the steps in this section to re-initialize the HP SIM database and then the HP Storage Essentials database. Keep in mind the following: • Re-initializing the database removes everything from the database. This is not recommended unless you are sure about what you are doing. It is strongly suggested you export the database before you re-initialize it.
c. Type the password of the SYSTEM account. Then, click OK. The default password of the SYSTEM account is the following: manager You are notified when the re-initialization is complete. d. Click the Re-initialize Database button. 10.Install the HP SIM Connector, as described in the Installation Guide. 11.Ensure that the service for HP SIM is still running and then start AppStorManager. Resetting the Temp and Undo Tablespace The temporary and undo tablespace may grow large due to high database activity.
RMAN Backup. The backup is referred to as being “cold” because the management server is not running while the backup is occurring. For information about changing the archive mode, see ”Changing the Archive Mode” on page 240. To restore a cold backup: 1. Access the Database Admin Utility as described in ”Accessing the Database Admin Utility” on page 233. 2. Click Restore Cold Backup in the left pane. 3. Click Browse. 4.
• The Disable RMAN backup button is displayed if the archive mode is currently enabled. Select this option if and only if you always shut down the management server prior to a backup. With the database running in no-archive mode, you can only cold back up your database. Changing the database to no-archive mode resets the logs SCN (System Change Number), sets the archiver parameter in the database parameter file, and disables the RMAN backup scheduler.
• Management server RMAN backup files —These files contain information about the elements your management server monitors. • Oracle Network Configuration Files —The configuration files are tnsnames.ora and listener.ora. • CIM Repository To run a cold backup: 1. Access the Database Admin Utility as described in ”Accessing the Database Admin Utility” on page 233. 2. Click Run Cold Backup in the left pane. 3. Click Browse to select a file path. 4.
1. Access the Database Admin Utility as described in ”Accessing the Database Admin Utility” on page 233. 2. In the Directory box at the top of the screen, enter the path to an existing directory or browse to a directory using the Browse button. 3. Click Download Logs. The log files are saved to a zip file which is copied to the directory you specified NOTE: The Download Logs option is available when the management server is running.
Warning Messages During Reinitializing the Database When you use the Database Admin Utility to re-initialize the database, warning messages similar to the following appear in the command prompt window that pops up when the utility runs. You can ignore these messages. Connected. Creating FSRM Creating FSRM Connected. Warning: View Warning: View Warning: View DATA tablespace INDX tablespace created with compilation errors. created with compilation errors. created with compilation errors.
For example, if the management server is managing two Oracle and two Sybase database applications, ask the database administrator to change the password for APPIQ_USER on all the Oracle and Sybase managed databases to a single password. Then, change the password for APPIQ_USER on the management server as described in ”Changing the Password for the Managed Database Account” on page 126.
• Only the admin user will be able to log into the management server, no other user will be able to log in to the system. To enable other users to log in, the admin user would need to re-enter the passwords for all other users. • The passwords for all discovered elements in the database — hosts, switches, and storage systems would become invalid and discovery would fail for all elements.
• From the Database Admin Utility. See ”Checking the Database and Listener Status” on page 234. Checking Database Status: These steps should restart the database. If you receive an error message, contact technical support. • On Windows: • From the command line, enter the following commands: Sqlplus /nolog Sql>connect sys/change_on_install@appiq as sysdba Sql> startup force; • From the Database Admin Utility. See ”Checking the Database and Listener Status” on page 234.
248 Database Maintenance and Management
9 Viewing Element Topology and Properties Some of the features described in this chapter are not included in HP Storage Essentials Standard Edition. To determine which features apply to your product, see the List of Features, which is accessible from the Documentation Center (Help > Documentation Center in HP Storage Essentials).
NOTE: To view direct-attached storage, you must enable the page 253 for more information. button. See Table 29 on Use the utilities provided in the toolbar to modify the topology. For example, you can filter out fabrics and change the placement of elements in the topology through drag and drop functionality. See ”The Toolbar in System Manager” on page 252 for more information.
• Navigation - The Navigation tab provides information about an element and how it relates to other elements in its path. See ”About the Navigation Tab” on page 302 for more information. • Properties - The Properties tab provides a detailed status of the element. See ”Viewing Element Properties” on page 307 for more information. • Topology - The Topology tab provides a graphical representation of an element's path.
belong to the same fabric. The management server displays switch_A and switch_B under the same fabric without their VSAN listed in the tree. To determine the VSAN to which a port on a Cisco switch belongs, access the Properties page for the port. (Double-click the switch in System Manager, and click the Properties tab.) Then click the hyperlink for the port in the Properties page for the switch.
Table 29 Button Feature of the Toolbar in System Manager Description Prints the topology. See ”Printing the Topology” on page 276. Exports the topology to an XML file that can be viewed in Microsoft Visio. See ”Exporting the Topology to Microsoft Visio” on page 278. Magnifies the view Decreases the magnification Lets you set the magnification to a percentage of the default magnification Opens a smaller pane, which provides a global view of the topology.
Table 29 Button Feature of the Toolbar in System Manager (continued) Description Saves the current topology, so that when you return to System Manager, the saved layout is restored. This option can be especially useful if you have moved elements in the topology and you want to keep their current location. This button is not accessible from the Topology tab. When you click the button, you are asked if you want the layout to apply to all users.
Table 29 Feature of the Toolbar in System Manager (continued) Button Description Displays the event severity icons for the elements displayed in the topology. See ”Viewing Event Status in the Topology” on page 284. This feature is disabled for Performance Manager and Capacity Manager. Calculates the topology paths. Clicking this button also allows you to view direct attached storage in System Manager. Direct attached storage is indicated by dotted lines.
Table 30 Icon Icons Displayed in the Topology (continued) Description Indicates a switch. This particular icon is for a Brocade switch. Indicates a filer. This particular icon indicates a NAS filer. Indicates a tape library. The List Tab The List tab provides information about the elements by type, by cluster, or by fabric and domain. To find the fabrics in a domain, expand the domain node. You can see the elements in each fabric by expanding the fabric node, as shown in the following figure.
When you click a fabric name in the tree, its members are highlighted in the right pane, as shown in the following figure. Figure 34 Highlighting a Fabric's Members in the Topology When you right-click an element in the List tab, a menu is displayed. The options displayed depend on the type of element you clicked. See About the Right-Click Menu Options, page 265 for an explanation of the options in the menu.
Applications node, the applications are highlighted in the topology, as shown in the following figure. Figure 35 Highlighting the Applications in the Topology If you select an element in the left pane, the element is highlighted in the topology. You also have access to additional functionality by right-clicking the element. See About the Right-Click Menu Options, page 265 for more information.
Obtaining Information About Zone Entries To view the zone entries in a domain, expand the tree for the domain, fabric, and zone set. Select the zone set node to see the members of the zone set highlighted in the right pane, as shown in the following figure. Figure 36 Members of a Zone Set The icon is displayed next to the name of the active zone set. The the inactive zone sets. icon is displayed next to To view members of a zone, do one or more of the following: • Expand the node of the zone in the tree.
• Click the node of the zone in the tree. The software highlights the zone members in the right pane. Figure 37 Displaying a Zone Member and its Switch To view the relationship of the zone member to the switch, click the zone member in the tree. The software highlights the zone member and its switch.
To view information about a zone member's port, expand the zone member node, as shown in the following figure. Notice that when you select the zone member node in the tree, it appears highlighted in the right pane. Figure 39 Obtaining Information About a Zone Member's Adapter Obtaining Information About Host Bindings To view the elements that have host bindings, click the Host Bindings node in the tree.
When you click the HBA node, the host and the element to which it has the binding are highlighted.
displayed under the node, and the storage system is highlighted in the right pane, as shown in the following figure. Figure 43 WWN Properties The software displays properties of the WWN. If the LUN has a LUN masking, expand the LUN node to obtain information about the LUN masking, as shown in the following figure. Figure 44 WWN Properties To view a LUN masking, expand a LUN node. About the Path Tab The Path tab provides information about an element's path.
When you expand a domain node, if any of the paths for hosts are not fully calculated, a pop-up dialog box displays a list of all the hosts with partially calculated paths. In addition, the current state of the path calculation is appended to the node name. When you click a host node in the tree, the elements in the host's path appear highlighted in the right pane, as shown in the following figure.
You can also determine the elements in a hosts path by expanding the Application Path and Path nodes under the host node in the tree, as shown in the following figure. Figure 46 Path Information Visible in the Tree When you right-click an element in the List tab, a menu is displayed. The options displayed depend on the type of element you clicked. See ”About the Right-Click Menu Options” on page 265 for an explanation of the options in the menu.
NOTE: Table 31 Right-click menu options are not available to undiscovered fabrics. Menu Options Accessible from the Topology* Menu Option Description Go to Navigation Details This menu option redirects you to the Navigation page. If the element is labeled discovered, you are shown the Properties page. Elements are labeled discovered when the management server has discovered the element but cannot obtain additional information about it. See ”About the Navigation Tab” on page 302.
Table 31 Menu Options Accessible from the Topology* (continued) Menu Option Description External Tools Provides several ways to access an element: • Telnet - Lets you access a host or a switch through the telnet utility. The Telnet feature is accessible only to Web browsers on Microsoft Windows operating systems. • Browse - Lets you access the main Web page for a host or a switch. • Set Up External Tools - Lets you add URLs for accessing the management tools for the storage system.
Table 31 Menu Options Accessible from the Topology* (continued) Menu Option Description Provision Provides provisioning tools for switches and storage systems: Switches - Lets you activate and deactivate zone sets, in addition to managing the following: • Zone aliases (Not applicable to McDATA switches) • Zones • Zone sets (The delete zone set option is disabled for active zone sets).
Table 31 Menu Options Accessible from the Topology* (continued) Menu Option Description Delete Element Removes an element and its discovery instance from the system. It also removes other elements discovered through the removed element. Important: If you are blocking pop-ups in a Netscape or Mozilla Web browser, and you use the right-click menu to delete an element from System Manager, the Delete window is blocked, and you are unable to delete the element.
your kit. To determine if you can access Provisioning Manager, access the List of Features, which is accessible from the Documentation Center. • Delete This Fabric - Deletes a fabric. When you are asked if you want to delete the fabric, click Yes if you do not mind waiting for the management server to recalculate the topology. If the elements in the deleted fabric do not belong to another fabric, they are moved to the “unknown” node on the List tab.
Table 32 Menu Options on the Access Tab (continued) Task To Perform Task, Right-Click... Create a zone alias1 A zone alias with a blue folder under the fabric node. Delete a zone alias1 A zone alias under the Zone Aliases node. Modify a zone alias1 Show zone alias details1 Provision a storage pool A storage system under the Storage System LUN Access node.
• Using the Global View, page 276 • Printing the Topology, page 276 • Exporting the Topology to Microsoft Visio, page 278 • Updating Element Data, page 280 • Viewing Ports, page 280 • Showing the Impact of an Element, page 281 • Assigning a Business Cost to an Application, page 282 • Expanding the Topology Pane, page 284 • Filtering Fabrics, page 284 • Viewing Event Status in the Topology, page 284 • Custom Name for a Switch Truncated in the Topology, page 286 • Managing Groups, page 286 • Managing Fabrics,
Adding Information for Discovered Hosts The software labels a host as discovered when it cannot obtain additional information about a host it has discovered. To learn why the software was unable to obtain information about the element, see ”Troubleshooting Discovery and Discovery Data Collection” on page 701. If you have more than one discovered host, it can be difficult to differentiate them.
Arranging Elements in the Topology To improve usability, arrange the topology so it suits your environment. For example, if you plan to filter various fabrics, you might want to arrange the topology so that elements are arranged by fabric. Thus, when you filter the fabrics, large gaps do not appear in the topology. You can arrange elements individually or in groups, as described in the following sections.
A square encloses the elements, as shown in the following figure. If you want to redo the square, just click outside of the square and retry. Figure 47 Enclosing the Elements 3. To move the elements within the square, click within the square. Holding down the mouse button, drag the elements to the new location. Figure 48 Dragging Multiple Elements to Their New Location HP Storage Essentials SRM 6.
Closing Topology Windows Whenever you select a new topology view, the software creates a pane for that view. To lessen the number of panes open, do the following: 1. Right-click the tab of one of the views. 2. Select one of the following from the menu: • Close - Closes the current topology pane in System Manager. • Close All - Closes all of the topology panes in System Manager. • Close All But Current - Closes all of the topology panes in System Manager, except the current one.
• Bottom margin - Enter a measurement. • Left margin - Enter a measurement. • Right margin - Enter a measurement. • Orientation - Click an orientation for the printout. A preview of the printout is displayed in the right pane. 5. When you are done, click Apply. 6. To see how the printout will appear on the page, click the View Selection tab. If you want the default settings, click Default.
10.To preview your pages, click the Preview tab. Then click the page you want to preview. The page appears in the right pane. 11.When you are ready to print, click Print. 12.Click Close. NOTE: To return to all of the original settings, click the Default button next to the Print button. Exporting the Topology to Microsoft Visio You can export the topology to an XML file that can be viewed in Microsoft Visio. To export the topology: 1.
2. Click Next. The Select Destination Location windows is displayed. 3. Click Next. The Select Components window is displayed. 4. Click Next. 5. Click Install. The Storage Planner component is installed. 6. If you have not installed Microsoft XML 6.0 Parser, select the check box. 7. Click Finish. NOTE: If you are installing Microsoft XML 6.0 Parser, the MSXML 6.0 Parser Setup wizard is displayed. If MSXML 6.0 parser was installed previously, you will not see the following steps. 8.
12.Click OK. 13.Restart Visio, and select Enable Macros when prompted. NOTE: If the Storage Planner menu item does not appear when you restart Visio, go to Tools > Add-Ons > Storage Planner, and select Storage Planner. Updating Element Data System Manager lets you update data about elements directly from this screen. When you update element data, the management server updates infrastructure details from the element and then redraws the topology with the updated information.
• Right-click an element, and then select Show Element Topology from the menu. 2. Right-click an element in the topology. 3. From the menu, select Show Port Details. The ports are displayed. Showing the Impact of an Element You can display an element's impact. For example, assume you want to replace a switch. You can use this feature to determine which elements in the network would be impacted by taking the switch off the network. To find an element's impact: 1.
in yellow. This means that if any of these highlighted elements are removed from the network, klu2e may have difficulty functioning. Figure 49 Showing the Impact of an Element However, the Show Impact feature not only displays the elements on which an element is dependent, but it also displays the other elements dependent on it. For example, assume you right-clicked a switch and selected Show Impact from the menu.
Table 33 Show Impact Results If you select Show Impact for... The software highlights... An Application (virtual or real) Elements required by the application, such as its host and a switch. A Host Elements that are dependent on the host, such as its applications. Elements that are required by the host, such as switches. A Switch Elements dependent on the switch, such as hosts and storage systems A Storage System Elements dependent on the storage system, such as hosts.
example, a storage system has a value of $60 if two $30 applications are in its path, as shown in the following figure. Figure 50 Determining Business Cost To assign a business cost to a application: 1. Do one of the following: • Right-click an application in System Manager, and then select Set Business Cost from the menu. • Double-click an application in System Manager. Click the Properties tab. Then click the Change button next to the Business Cost box. • Click an application in Application Viewer.
Expanding the Topology Pane To increase screen space for viewing the topology, hide the List, Access, and Path tabs by clicking the arrow pointing left on the border between the pane containing the tabs and the main pane. Figure 51 Expanding the Topology Pane To display these tabs, click the arrow pointing right on the border for the left pane. Filtering Fabrics To view a specified fabric in the topology: 1. Click Tools > Storage Essentials > System Manager in HP Systems Insight Manager. 2.
NOTE: Table 34 Icon The Event Status button ( ) is disabled in Capacity Manager and Performance Manager. Severity Levels Severity Level Description The event has a critical impact. Denotes elements that have a critical severity level. The elements may also have events of lower severity levels. Example: A Brocade switch has a failed firmware download. The failure reason code for each respective switch is displayed. The event has a major impact. Denotes elements that have a major severity level.
Since the severity level for an element is set by the manufacturer, the meanings of the severity levels vary. It is best to view the description of the event. Use the Severity menu to filter which type of events you want to view. It displays the severity icons with the selected severity level or higher. For example, you can be notified of only critical and major events by selecting Major from the Severity menu and clicking the NOTE: If you select a severity, click the Manager remembers your selection.
• Do not create groups during Get Topology or Discovery Data Collection. You can determine if the management server is getting either the topology or all element details, because the status button appears red during both operations. • You can determine if a host is generic by double-clicking the host in System Manager and then clicking the Properties tab. If a host is generic, it is listed as Generic Host for its description. To group Discovered hosts: 1.
• A user's role must include an access level of Element Control or Full Control for hosts. See the topic, ”Editing Roles” on page 149 for more information about the access level of a role. To ungroup multiple elements: 1. Access System Manager, as described in ”Accessing System Manager” on page 251. 2. Right-click the host icon for a group, and select Ungroup into multiple hosts from the menu. 3. When you are asked if you want to ungroup the elements, click OK. The elements are ungrouped.
• Connected Switches - To sort storage systems by connected switches, click the Connected Switches column heading. An arrow appears next to the column heading that sorts the storage systems. For example, if the storage systems are being sorted by name, an arrow appears next to the Storage Systems column heading. If the arrow next to the column heading is pointing up, the storage systems are sorted in ascending numerical and alphabetical order.
4. Select Change Fabric Name from the menu. 5. In the Enter a Fabric Name box, enter a new fabric name. 6. Click OK. Deleting Fabrics When you delete a fabric, the elements in the fabric are not removed. After you delete the fabric, the management server recalculates the entire topology. The recalculation may take some time, especially if you have a large topology. To delete a fabric: 1. Access System Manager (Tools > Storage Essentials > System Manager in HP Systems Insight Manager). 2.
The management server provides two variations of this feature: • Hiding Generic Hosts for One Switch: This feature hides unnamed generic hosts detected by a switch. The management server detects an element by looking at the ports on a switch. If it cannot find additional information about the element, it marks it as generic by displaying a question mark above its icon. For example, assume you have a switch with 10 discovered elements.
Expanding Generic Hosts for All Switches To display hidden generic hosts for a domain: 1. Right-click a switch with a "+" icon. This "+" icon indicates the switch has hidden generic hosts. 2. Select Discovered Element > Expand Generic Hosts for All Switches from the menu. The hidden elements for the domain appear in upper right corner of the topology.
If you want a Perl script to run as a custom command on Microsoft Windows, you must prefix the script name with the complete path to Perl. The management server already has a directory containing the Perl executable inside the folder %JBOSS4_DIST%\server\appiq\remoteScripts\perl\bin. You would prefix the script name as follows: .\perl\bin\perl myscript.pl where .\perl\bin\ is the directory containing the Perl executable in the RemoteScripts directory perl is the executable myscript.
If the file is missing, repeat step 3. 8. Select one of the following options to determine the elements for which you want the command to be visible. For example, if you select the All Elements option, the command is visible in the menu when you right-click any element. • Name of the Element - Select the name of the element if you want the command to be visible in the menu only when you right-click this element.
Editing a Custom Command To edit a custom command: 1. Right-click an element in System Manager. 2. Select Custom Commands > Set Up Custom Commands from the menu. 3. Click the button corresponding to the custom command you want to edit. 4. Make the appropriate changes in the Edit Custom Command window. 5. Click OK. The custom command is modified. Deleting a Custom Command To delete a custom command: 1. Right-click an element in System Manager. 2.
Table 35 Variables for All Elements Variable Value APPIQ_ELEMENT_DESCRIPTION The description for the element. APPIQ_ELEMENT_MANAGEMENT_IP_ADDRESS The IP address of the first access point used to discover the element. APPIQ_ELEMENT_VENDOR The vendor for the element. APPIQ_ELEMENT_TYPE_NAME The type of element, for example, switch, application, or host. Table 36 on page 296 lists variables that can be used to gather information for storage systems, switches, and hosts only.
Table 38 Variables for Hosts Only Variable Value APPIQ_ELEMENT_OPERATING_SYSTEM The operating system of the host. APPIQ_ELEMENT_NUMBER_OF_PROCESSORS The number of processors used by the host. APPIQ_ELEMENT_TOTAL_PHYSICAL_MEMORY The total physical memory of the host. APPIQ_ELEMENT_DOMAIN The domain of the host. Table 39 on page 297 lists variables that can be used to gather information for applications.
Table 39 Variables for Applications Only Variable Value APPIQ_HOST_MODEL The model of the host on which the application resides. APPIQ_HOST_VERSION The version of the host on which the application resides. APPIQ_HOST_OPERATING_SYSTEM The operating system of the host on which the application resides. APPIQ_HOST_NUMBER_OF_PROCESSOR The number of processors on the host on S which the application resides.
example, you can use the remote console to start a remote command prompt on the management server. Figure 53 Remote Console Keeping the Remote Console Active NOTE: This section is for management servers running on Microsoft Windows only. Keep in mind the following: • The remote console become inactive when the custom command finishes its execution. To use the menus and buttons in the remote console, the remote console must be kept active.
6. In the Command Line box, enter the following command, which will run on the management server: cmd /k 7. Select the All elements option. 8. Click OK. To run the remote command prompt: 1. Right-click an element from which you want to obtain information. 2. Select Custom Commands and select the command from the menu. The software displays the remote console on the management server. To enter a command in the remote console: 1. Enter the command in the Commands box, and then 2. Press Enter.
Menu Options The remote console also provides the following menu options. Table 41 Menu Options Option Description CRLF (Default setting) Provides a carriage return and a linefeed. Important: Do not use this option when you are using telnet to access another computer. You must select the CR option after you enter a user name. To enter a password, if you leave the setting at CRLF, the software enters a carriage return and a line feed when you click OK. As a result, no value is entered for the password.
• Set up external tools - Lets you add a URL for accessing management software, such as Hitachi HiCommand Device Manager and EMC ControlCenter™ Navisphere. See ”Setting up External Tools” on page 302 for more information. • Access the management tool for the storage system - In some instances, the management tool for the storage system is accessible from this menu. For example, HiCommand for HDS storage systems and Command View for HP XP storage systems are accessible from the External Tools menu.
• If you see a message that zone aliases are not supported on a Brocade switch, perform Discovery Data Collection. The management server does not gather provisioning information from a fabric until Discovery Data Collection is performed. Figure 54 Obtaining Information About a Host You can learn more about a component, by clicking it in the Navigation page. For example, assume you brought up the Navigation page, and you want to learn which hosts are dependent.
in the page. You are shown information about the dependent hosts, as shown in the following figure: Figure 55 Details of a Host Connected to a Switch The following table provides an overview of the information presented for each type of element: Table 42 Information Available from the Navigation Page Element Dependencies Front Physical Back Physical Logical Physical Applications Hosts* Switches HP Storage Essentials SRM 6.
Table 42 Information Available from the Navigation Page (continued) Element Dependencies Front Physical Back Physical Logical Physical Storage Systems *The management server displays cxfs for SGI IRIX computers if it detects CXFS on the cluster.
3. Click the Ports button in the Physical column in the Navigation tab, as shown in the following figure. Figure 56 Finding the Status of a Port 4. Under the Name column in the Ports table, click the port whose status you want to obtain. 5. On the Properties page, the status of the port is displayed in the right column. The status of the port can be online, off line, or unknown.
Accessing the Navigation Tab To access the Navigation tab: 1. Access the management server. 2. To access the Navigation tab, do one of the following: • Click an element in Application Viewer. • Double-click an element in Capacity Manager, Performance Manager, or System Manager. • Click one of the following elements in Backup Manager, and then click Navigation in the lower-right corner. • Backup Client • Backup Library • Host • Master backup server • Master backup media 3. Click the Navigation tab.
• Version (Generic Hosts Only) - Enter a version number for a generic host. • Operating System (Generic Hosts Only) - Enter an operating system for a generic host. • Vendor - Enter the vendor name. • View element properties - Lets you view the element properties for the type of device. The properties provided vary according to the element. The following information is usually provided: • Record Creation - The first time the software contacted this element.
You can view the following properties of a fabric: • Vendor - The vendor name. • Created - The first time the software contacted this element. • Discovery Status - The status of the discovery of the element, for example "Contacted." • Install Date - Not applicable • Name Detected - The name of the fabric detected. • OID - Not applicable • Description - Information about the fabric. • WWN - The Worldwide Name of the fabric. • Zones - The zones in the fabric. To learn more about a zone, click its link.
IMPORTANT: Do not update element data during Get Topology or Discovery Data Collection. You can determine if the management server is getting the topology or all element details by looking at the label near the status button. NOTE: Since all users query the same database, this name is displayed to others using the software, so you might want to make them aware of the name. 1. Access the custom name box by double-clicking the element in System Manager and then clicking the Properties tab. 2.
in the following figure. According to the following figure, the server can access three storage systems: LSI, EMC, and HDS.
The topology extends the length of the screen. The second portion of the topology is provided by the following figure. Figure 58 Topology of a Server (Continued) NOTE: If any of the paths are not fully calculated, a pop-up dialog box displays a list of all the hosts with partially calculated paths. In addition, the current state of the path calculation is appended to the node name in the left pane.
access a storage system. Another is providing redundant paths from the host to the switch. To determine if your multipathing software is supported, see the support matrix for your edition, which is available from the Documentation Center. Keep in mind the following: • SANtricity Manager Utilities must be installed on the host running RDAC for the management server to obtain RDAC information.
Figure 59 Multipathing Displayed in the Topology The topology extends the length of the screen. The following figure displays the second portion of the topology: HP Storage Essentials SRM 6.
Figure 60 Multipathing Displayed in the Topology (Continued) Keep in mind the following: • If you do not see all of the elements in the path displayed, verify they have been discovered and details have been obtained from them. See ”Discovering Switches, Storage Systems, NAS Devices, and Tape Libraries” on page 19. • For multipathing issues regarding certain devices, see ”Known Device Issues” on page 722. • The management server displays only the active path for an RDAC host.
Once the button is enabled, the management server displays the link between the storage system port and the port to the host as a dotted line, as shown in the following figure: Figure 61 Direct Attached Storage in the Topology In this figure, Slot A Port 1 belongs to the storage system, and Adapter 1 Port 0 belongs to the host. The dotted line indicates that the storage system is directly attached to the host.
Table 44 Icon The Toolbar in the Topology Tab Description Prints the topology. See ”Printing the Topology” on page 318 for more information. Magnifies the view Decreases the magnification Lets you set the magnification to a percentage of the default magnification Opens a smaller pane, which provides a global view of the topology. This lets you position the main view to a certain section of the topology. See ”Using the Global View” on page 276. Lets you drag an element in the topology.
About the New Window Option The New Window option in System Manager lets you view several sections of the topology at once. Click the topology. button. A new window pops opens. Use this window to view another section of the Figure 62 New Window Option Printing the Topology The software lets you print the topology. This option is extremely helpful when you want to show someone the layout of the network, such as in a presentation. To print the topology: 1. Access the management server. 2.
to move. Drag the element to its new location. Moving elements closer together provides a more compact printout. 4. Click the button. 5. The Paper tab shows the page setup. If you want the default settings, click Default. You can modify the following settings: IMPORTANT: Before you change the margins, decide on a unit of measurement. • Paper format - Select the paper size from the menu. • Unit - Select cm (centimeters) or inch for the margins.
IMPORTANT: Before you change the margins, decide on a unit of measurement. • Unit - Select cm (centimeters) or inch for the margins. • Position/Size - Lets you change the position and size of the printout so that it spans several pages: • Start x - Same as in step 6. • Start y - Same as in step 6. • Width - Determines the width of the printout. If the width entered does not fit on the page, the printout wraps around to another page. • Height - Determines the height of the printout.
• Description • Vendor • Version 5. Click Next. 6. Select a storage volume containing the application for which you are creating the virtual application. NOTE: You can view the properties of a volume by clicking its link. 7. If applicable, choose a disk partition by clicking the Disk Partitions tab or the Next button and then selecting a disk partition. 8. Click Finish.
• Severity - The severity level • Time - The time the event was recorded. • Summary Text - A brief explanation of the event. When you click the summary text, the details of the event are displayed. The Events tab lets you use Event Manager to: • View Event Details - See ”Viewing Event Details” on page 335. • Clear Events - See ”Clearing Events” on page 337. • Delete Events - See ”Deleting Events” on page 339. • Sort Events - See ”Sorting Events” on page 339.
• ”Adding Custom Information” on page 647 Figure 63 Viewing Asset Records To set up chargeback, expand the Chargeback Manager node, and click Asset-based or Storage-based. To learn more about each type of Chargeback Manager, see ”Setting Up Asset-Based Chargeback Manager” on page 650 and ”Setting Up Storage-Based Chargeback Manager” on page 653. The boxes on the Asset Management tab are as follows.
• Asset Tag - The asset tag assigned to the element. • Asset Category - The asset category assigned to the element. • Geographic Location - The location of the element, for example, Boston, Massachusetts. • (Storage Systems Only) Storage Tier Classification - Click the Set Storage Tier Cost link to set up storage tiers. See ”Defining Storage Tiers” on page 642 for more information. About the Collectors Tab The management server uses collectors to gather information.
About the Policies Tab The Policies tab lets you view the utilization policies for an element. Utilization policies can automatically send an e-mail, generate an event, or run a custom script when an element is being overused. If the policy table is unpopulated, no policies exist for the element. The Policies tab lets you use Policy Manager to do the following.
If a storage volume is a member of a shared file system, such as CXFS or XFS, it is listed in the Storage Volume column. You may need to expand the Storage Volume column if the volume names are long. About the Data from CXFS File Systems The management server can only monitor CXFS file systems from the host generating the input/output. For example, assume the elements in the following figure are part of a CXFS file system.
328 Viewing Element Topology and Properties
10 Event Management HP Storage Essentials Standard Edition supports a subset of the devices supported by Enterprise Edition. See the HP Storage Essentials Standard Edition Support Matrix for a list of supported devices. The support matrix is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
• Clear Selected - Marks the selected events as cleared. • Clear All - Marks all events as cleared. • Un-clear Selected - Removes the clear status from events that are selected. • Un-clear All - Removes the clear status from all events. Event Manager Summary Metrics The top of the Event Manager pane provides a subtotal of the severity rating of the events and the number of events from the different element types.
Table 45 Severity Levels (continued) Severity Level Description Informational Provides informational data. For example, for a Brocade switch, it could be a list of switches that have successfully completed firmware download. Warning Provides warning data. For example, for a Brocade switch, one or more new physical fabric objects (device port, switch, or fabric) have appeared. Minor Provides a message to indicate a minor problem.
Event Manager Icons The following icons are displayed in Event Manager. Table 46 Icon Icons in Event Manager Description Event is marked cleared. See the topic, ”Clearing Events” on page 336 for more information. The severity of the event is not known. The event is informational. The event might have some impact. The event has a minor impact. The event has a major impact. The event has a critical impact. Events Supported Event Manager does not support events from all discovered elements.
Table 47 Supported Hardware for Events (continued) Hardware Events Supported? Additional Information McDATA switches SNMP to switches Y Need to configure the switch or proxy to send traps to the management server. Also applies to EMC Connectrix switches. QLogic SNMP switches Y Need to configure the switch or proxy to send traps to the management server. Also applies to Sun StorEdge switches.
Table 47 Supported Hardware for Events (continued) Hardware Events Supported? Additional Information NetApp Filers Y To receive events from NetApp filers, you must add the management server address as an SNMP trap host on the NetApp filer. Sun NAS Devices N Tape Libraries N Viewing Events from the Management Server By default the management server displays events from all of the elements, regardless of the user’s organization. However, it does not display its own events.
Event Manager displays events it receives from CNT InVsn Enterprise Manager. As of version 9.5, InVsn Enterprise Manager does not provide events to the management server. As future versions of CNT InVsn Enterprise Manager provide event support, the management server will be able to provide information about those events. Issues with Brocade Switches • Event Manager does not display events from Brocade switches with the firmware version 3.0. This firmware version is not supported by Event Manager.
2. In Event Manager click the event summary, as shown in the following figure. Figure 67 Accessing Event Details The event details are displayed. The Event Details pane provides information on one or more of the following items: • Serial Number - The number assigned to the event. • Status - Indicates whether the event has been cleared. • Component - If the event came from a component of an element, the component is listed. • Element - The source of the event.
NOTE: Events listed in Event Manager may not be attributed to the correct source until Discovery Data Collection has completed. Clearing Events If you have already reviewed an event, you might want to mark it as “cleared” so you can keep track of which events you have already reviewed. To clear events, do one of the following: • To clear an event - Click the Not cleared text for the event.
Table 48 Default Settings for Clearing Events (continued) Severity Level Default Time Delay to Clear the Event (Hours) Major Never Critical Never To change the default time delay before clearing an event, do the following: 1. Select Configuration > Events to access the Events page. 2. Do one of the following: • If you never want an event of a specified severity level marked as cleared, select the Never option next to the severity level in the Automatic Clear Delay column.
For example, if you want events that are a week old deleted, select Weeks in the combo box in the Automatic Delete Delay column, and then enter 1. 3. Click Save Changes. Deleting Events To delete an event, do one of the following: • To delete one element at a time - Click the trash can icon next to the event. • To delete specific elements - Select the events you want to delete, and then click the Delete Selected button at the top of the screen.
4. Click Add Journal Entry. The entry is added with the user's account name and the date and time it was added. Changing the CLARiiON Event Polling Interval You can change how frequently the management server polls the CLARiiON storage systems by modifying the cimom.ClariionEventPollInterval property. You may want to change this interval if you are receiving too many “information” messages from the CLARiiON storage system. IMPORTANT: Do not set a very long time interval.
Brocade Switch Events When a Brocade switch generates an event, it assigns a code instead of an event severity level to the event. The software assigns an event severity level to the event according to the event's code. This lets you filter Brocade switch events by severity level in Event Manager, as described in the following table. NOTE: Events regarding firmware downloads are removed from the following table since the management server cannot be made aware of those events.
Table 49 Brocade Switch Events (continued) *Code Event Severity Level *Name Description 11 Major EV_STATE_CHANGE State changes such as: login, logout, login failed, configuration change, track on/off, port up/down, fabric segmentation, security violations, zone change. 12 Major EV_PLATFORM_CHANGE The platform database has changed. *This term does not appear in the event description, but is provided for clarity.
• Cleared status • Specific element To set up a filter: 1. To access the filter for Event Manager, click the Filter heading at the top of the page, as shown in the following figure: Figure 69 Accessing the filter feature The filtering feature is displayed, as shown in the following figure: Figure 70 The Filter feature in Event Manager 2. Select a time from the Time Period combo box. You can also select a customized time as described in ”Selecting a custom time period” on page 344.
• Minor - Only events of the severity type, minor, are displayed. • Major - Only events of the severity type, major, are displayed. • Critical - Only events of the severity type, critical, are displayed. 4. Select which events of an element type you want displayed. Use the Control and Shift keys to select multiple severities. The following options are provided: • All • Application • Host • Switch • Storage System • Tape Library • Fabric • Other • HP Storage Essentials 5.
• 30 seconds • 1 minute • 5 minutes • 10 minutes 10.When you are done setting your options, click the Filter button. NOTE: You can update the events displayed by clicking the Filter button. Selecting a custom time period NOTE: You may want to select a custom time period for the filter when troubleshooting an issue. To select a custom time period: 1. Select the Custom Time Period option. Figure 72 Custom Time Period 2.
b. In the Calendar, select the start date. Figure 74 Selecting a date c. In the Time field, enter the start time. The time is based on a 24-hour click. For example, if you want Event Manager to display events occurring after 8 p.m. on the specified date, you would enter 20:00. d. When you are done setting the start time and date, click Set. 3. To set the end date and time for the filter. Event Manager only displays events that occur after the start date and time and before the end date and time: a.
b. In the Calendar, select the end date. Figure 75 Selecting a date c. In the Time field, enter the end time. The time is based on a 24-hour click. For example, if you want Event Manager to display events occurring before 8 p.m. on the specified date, you would enter 20:00. d. When you are done setting the end time and date, click Set. Resetting a filter To revert to the default settings for the filter: 1.
The filtering feature is displayed, as shown in the following figure: Figure 77 The Filter feature in Event Manager 2. Click the Reset button. The filter is reset. Setting up advanced filtering Event Manager has an advanced filtering feature that lets you provide detailed information for filtering. To set up advanced filtering: 1.
IMPORTANT: Once the Advanced Options heading has been expanded, the Element Name Contains field becomes inactive. Any values entered in the Element Name Contains field are ignored as long as the Advanced Options heading is expanded. Figure 80 Accessing advanced options for filtering 3. Click the Add button as shown in the following figure: Figure 81 Clicking the Add button 4. Select the element type you want to add. Then, click Next. 5. Select one or more elements you want to add to the filter.
For example, in the following figure Host_13081 and Host_10380 were selected for advanced filtering, so they are listed under the Advanced Filtering heading, as shown in the following figure: Figure 82 Listing of elements 6. Verify that Advanced Options heading is expanded as shown in the following figure. Advanced Options must be expanded for advanced filtering to work. Figure 83 Advance filtering options 7. Click the Filter button. Event Manager displays the elements specified under Advanced Options.
Clearing Advance Filtering Options You can clear the filtering set for advanced options, by clicking the Clear Data button under the Advanced Options heading. Specifying a Filter for Events Forwarded from Storage Essentials to HP SIM Users can filter events forwarded from Storage Essentials to HP Systems Insight Manager (HP SIM).
5. To filter events by severity, use the tag. For example, to prevent informational events from being forwarded to HP SIM, enter the following between the tags: INFORMATIONAL You can also filter out the following event severities: • UNKNOWN • CRITICAL • MAJOR • MINOR • INFORMATIONAL • WARNING 6. To filter events by element type, use the tag.
HP Storage Essentials SRM 6.
354 Event Management
11 Finding an Element’s Storage Capacity IMPORTANT: Depending on your license, Capacity Manager may not be available. See the List of Features to determine if you have access to Capacity Manager. The List of Features is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). HP Storage Essentials Standard Edition supports a subset of the devices supported by Enterprise Edition.
• The Capacity Manager displays the total capacity of an application, including the network drives. If you look at the capacity of the application in Chargeback Manager, the capacity differs. Chargeback Manager provides only network capacity with the exception of Windows 2000 hosts. See ”How Capacity Differs in Chargeback Manager and Capacity Manager” on page 656 for more information. • Volume names from ambiguous automounts on Solaris hosts are not displayed in Capacity Manager.
Table 50 Color Coding for Capacity Manager Description varies according to element type: • For storage systems — The space is mapped. • For all elements except storage systems — The space is used. Unallocated Unused raw (storage systems only) Unmapped (storage systems only) The colors indicate that the element displayed in the following figure is about 75 percent available. The rest of it is being used.
NOTE: same. Table 51 Capacity Manager provides additional tabs for NetApp NAS devices. The toolbars are the Toolbar in Lower Pane of Capacity Manager Icon Description Lets you switch between the following: • Bar — Displays each data point as a bar. The data for the different elements is displayed side by side. • Line — Displays each data point as a dot with a line connected to the previous data points. The data for the different elements for a specific point in time is displayed in the same column.
Table 51 Icon Toolbar in Lower Pane of Capacity Manager (continued) Description Applications and hosts only: Lets you change the display frequency. The options are the following: • Hourly — The information is displayed in hourly increments. • Daily — The information is displayed in daily increments. • Weekly — The information is displayed in weekly increments. • Monthly — The information is displayed in monthly increments. Lets you set trending information.
Finding the Capacity of an Element NOTE: Capacity Manager rounds the data it displays. As a result, the totals you add for a property may be different from the data displayed in the Summary column. For example, if you add the total capacity from each data pool and compare that total to the number for Total Capacity displayed under the Summary heading, you will most likely find that the results differ. To find the capacity of an element: 1.
The following additional information is displayed for each storage group (Microsoft Exchange) or database file (Oracle): • Total Capacity • Total Used • Available • Percentage Used — The percentage used compared to the total capacity of the storage group or database file.
• Volume Name • Aggregate Available • Aggregate Used • Volume Maximum • Volume Used • Percentage Volume Used Capacity Manager displays the following information under the Capacity Summary and Capacity columns on the Aggregate Data tab: NOTE: Aggregate tabs only apply to NetApps hosts.
• Quota Soft Limit — The amount of disk space or the number of files that would have to be exceeded before a message is logged and an SNMP trap is generated. • Quota Used • Percentage Used Capacity Manager displays the following options under the Capacity Summary and Capacity columns on the Snapshot Data tab. Definitions are provided here. NOTE: Snapshot tabs only apply to NetApps hosts.
volumes have been allocated from those disk groups. For example, on CLARiiON storage systems these are disks that are in RAID groups. • Unused Raw - Raw disk capacity not currently configured into any kind of RAID or disk group. Disks that have not been configured for use in provisioning volumes. For example, on the EVA or MSA, these are not part of any volume group. For enterprise arrays that are preconfigured at installation, Unused Raw will typically be zero.
IMPORTANT: For arrays that permit RAID choice when creating volumes (for exaple the EVA), the concept of flexible RAID Pools is introduced. In this case, the amount of unallocated space is dependent on the RAID level chosen for new volumes. Therefore, the values for Unallocated and Total Capacity displayed may be modified dynamically by choosing a RAID level for unallocated space. Figure 86 Post-RAID tab The following table describes how the properties are calculated for HDS array groups.
Table 52 Explanation of the Properties of the Capacity Levels for HDS Array Groups (continued) Property Displayed for an Array Group (CIM_StoragePool) How It Is Calculated Explanation Unallocated pool.
To print the elements in Capacity Manager: 1. Access Capacity Manager as described in ”Accessing Capacity Manager” on page 357. 2. If the topology spans more than one screen, arrange the elements so they are closer together, preferably on one screen. To move an element, click the button and then the element you want to move. Drag the element to its new location. Moving elements closer together prevents the printout from appearing too stretched. 3. Click the button.
NOTE: To change the orientation of the chart, hold down the mouse button when you click the chart, and continue holding it while you move the mouse. 5. To change the reporting period, do one of the following, and then click the the chart. button to update • Display data within a time period — You can format the graph to provide data within the time period specified. Select the option to the left of the Period combo box. Select one of the following from the menu.
9. Click the button to update the chart. 10.To print the chart, click the button displayed in the same pane as the chart. Viewing Trending Information for Storage Capacity The management server can display trending information in its reports. For example, you can configure Capacity Manager to display trending information for the next week. This information can give you an indication of an element's future capacity need based on its past capacity utilization.
The difference between the two calculations is the capacity reserved for superuser. If a file system has a reserved capacity, the total capacity from the df -k command and Capacity Manager will differ. For example, assume you run the df -k command for the file system /dev/dsk/c0t0d0s0. After you run the df -k command, you notice that the total capacity displayed is 6688076 KB. When you look at Capacity Manager, the total capacity displayed is 6621196 KB.
12 Managing Policies Depending on your license, Policy Manager may not be available. See the List of Features to determine if you have access to Policy Manager. The List of Features is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials).
• successful provisioning • the occurrance of an event on one or more specified elements Accessing Policy Manager This section describes the various techniques for accessing Policy Manager. Although there is only one way to access policies for discovery, provisioning, and events; there are multiple ways to access policies. This flexibility in accessing utilization policies lets you easily create and manage policies without interrupting your work flow.
• Send E-mail - Policy Manager sends an e-mail when the condition is fulfilled. Enter a comma-separated list of e-mail addresses, and then click OK. • Generate Event - Policy Manager generates an event of the specified event type, and the event appears in Event Manager. After you select a severity level, click OK. For a list of the severity levels you can select from, see ”Severity Levels” on page 373.
Manager so you receive an e-mail message when the amount of free space on a server decreases to a specified level. Keep in mind the following: • If you plan to use e-mail notification with your policy, first assign an SMTP server from which the management server can send its e-mail notifications. See ”Setting Up E-mail Notification” on page 178. • Policies that are triggered for virtual applications are also triggered for file servers. To create a utilization or Backup policy: 1.
15.To test a policy, click the Test button in the Utilization Policy table. The management server fires a test for all utilization policies associated with that element. Figure 88 Testing a Newly Created Utilization Policy About the Policy Templates The following table provides descriptions of the policy templates. Table 53 Policy Templates Policy Type Description Applies to Backup failure A backup session for the selected backup client failed.
Table 53 Policy Templates (continued) Policy Type Description Applies to Free Space Trending A forecast of amount of free space on one of the following: • Hosts • A host • Oracle • A database instance, such as Microsoft SQL Server, Sybase, Caché, or Oracle. • Sybase • A file servers • File servers • A virtual applications Percent Used Description varies according to element type: • Microsoft SQL Server • Caché • Virtual applications • Hosts • Hosts - Percent of storage used for a host.
Table 53 Policy Templates (continued) Policy Type Description Applies to Unmapped Storage Trending Forecast of space not assigned to any mapped volume for the storage system. Storage systems Unmapped Storage Percent Percent of total space not assigned to any mapped volume for the storage system Storage systems Unmapped Storage Percent Trending Forecast of percent of total space not assigned to any mapped volume for the storage system.
1. Access Policy Manager as described in the topic, ”Accessing Policy Manager” on page 372. 2. In the Policy Manager tree, expand the Infrastructure Policies node, and then select New Element Discovery. 3. Click the Add button in the right pane. 4. In the Name box, enter a name for the policy. 5. In the Description box, enter a description for the policy. 6. Select one or more element types.
6. Select one or more element types. When a condition is fulfilled on a select element, Policy Manager generates an event, sends an e-mail, or runs a custom command. 7. Select Fire when event is cleared if you want the policy to act when the event is cleared. If you do not select "Fire when event is cleared," the policy is triggered when the event is received. 8. Select an action to occur when the policy condition is fulfilled.
IMPORTANT: Since the severity level for an element is set by the manufacture, the meanings of the severity levels vary. It is best to view the description of the event. • Unknown - The severity level is not known. • Informational - An example of an informational event is a progress report event for firmware download operation currently in progress. • Warning - An example of a warning is one or more new physical fabric objects (device port, switch, or fabric) have appeared.
• Modifying Utilization and Backup Policies, page 381 • Modifying Discovery Policies, page 381 • Modifying Provisioning Policies, page 382 • Modifying Policies for Events, page 382 Modifying Utilization and Backup Policies To modify a utilization or backup policy: 1. Access Policy Manager as described in the topic, ”Accessing Policy Manager” on page 372. 2. Click the Edit ( ) button corresponding to the policy you want to modify. 3. In the Name box, change the name for the policy. 4.
7. Select Fire when event is cleared if you want the policy to act when the event is cleared. If you do not select "Fire when event is cleared," the policy is triggered when the event is received. 8. Select an action to occur when the policy condition is fulfilled. For more information, see ”Actions Available for When a Policy Condition is Fulfilled” on page 372. 9. Click OK.
IMPORTANT: Specify shorter periods for important applications. 7. Select or deselect one or more element types. When a condition is fulfilled on a select element, Policy Manager generates an event, sends an e-mail, or runs a custom command. 8. Select Fire when event is cleared if you want the policy to act when the event is cleared. If you do not select "Fire when event is cleared," the policy is triggered when the event is received. 9. In the Severity menu, specify a comparison operator. 10.
Table 54 Policy Table Description (continued) Heading Description Delete Click the Delete ( ) button to remove a policy. Deactivating a Policy Policies are activated when they are created. You can deactivate a policy, but still keep it stored in the management server. For example, assume you created a policy that sends an e-mail whenever an event of type Minor is generated for a server. You might want to deactivate this policy before you upgrade the server. To deactivate a policy: 1.
• First assign an SMTP server from which the management server can send its e-mail notifications. See ”Setting Up E-mail Notification” on page 178 for more information. • The following instructions assume you have already created a policy.
Providing a Custom Command for a Policy You can configure Policy Manager to run a custom command on the management server when an element is being overused or when any of the following occurs: • A new element is discovered • Provisioning is successful • An event occurs on one or more specified elements The following instructions assume you have already created a policy.
13 Viewing Performance Data Depending on your license, Performance Manager may not be available. See the List of Features to determine if you have access to Performance Manager. The List of Features is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). HP Storage Essentials Standard Edition supports a subset of the devices supported by Enterprise Edition. See the HP Storage Essentials Standard Edition Support Matrix for a list of supported devices.
Array Performance Pack Requirements The following paragraphs describe important requirements and considerations for licensing and using the Array Performance Pack: • Licensing Requirements and Setup • Software Requirements • EVAPerf Requirements • Specifying Data Collectors • EVA Array Discovery Licensing Requirements and Setup Your Array Performance Pack license determines how many EVA arrays you can select for performance monitoring.
Command View version v7.01, or later, is highly recommended to take best advantage of the enhancements. The required Command View EVA versions support the new built-in provider, which replaces the SMI-S provider used previously for EVA array discovery. For Command View versions prior to v7.0.1, there is a maximum of 8 EVA arrays supported per Command View EVA server. The maximum number of vdisks supported per EVA array is 512. NOTE: You must discover your EVA arrays for the Array Performance Pack to work.
A screen similar to the following displays. Figure 89 Data Collector Selection Select the desired collectors from those listed in your display; then, click Start Selected for multiple collectors or click Action for single collectors. You might prefer to start and run the collectors only for specific needs, rather than running all of them all the time; otherwise it may affect overall system response.
When licensed appropriately, you can review the collected data in Performance Manager. You can expand the device sub-elements (controllers, volume group, etc.) in the navigation tree, as shown in the following representative screen. Figure 90 Expanded View of Available Metrics in Performance Manager The list of sub-elements and metrics vary depending upon the device type. The selections determine the performance data retrieved and available for analysis. HP Storage Essentials SRM 6.
For example, the following representative screen display shows information about data rates associated with the highlighted EVA array host port. Figure 91 EVA Array Host Port Data Rates EVA Array Discovery The following paragraphs describe important considerations in the EVA array discovery process to support the EVA Array Performance Pack.
Command View EVA supports a standby configuration whereby an array can be managed by multiple Command View EVA stations simultaneously, with only one of them actively managing a specific array at a time. Discovery will include both the EVA array being actively managed and the array not being actively managed (Standby Command View station).
• The minimum collection interval that can be set for the EVA performance data collectors is 1 minute. The collection interval for real-time metrics is 20 seconds and cannot be changed. Frequent collection of large amounts of performance data, combined with regular I/O, may impact Command View EVA responsiveness. However, this does not impact the EVA’s data I/O. The repeat collection interval is two hours and is not configurable.
2. Select the element you want to monitor. 3. Under the Monitoring tab in the lower-left pane, select the element again. In some instances, you may need to select an element’s component, such as a port on a switch. 4. In the pane under the tree, select a monitoring option. See ”Monitoring Options” on page 401 for more information. 5. Use the Chart and Unit combo box to modify the chart. When you are done with your selections, click the button in the lower pane.
Table 55 Icon Toolbar in Lower Pane of Performance Manager (continued) Description Lets you determine the unit of measurement in the graph. Select one of the following options, and then click the button: • Default - Displays the data in its default unit, which is usually megabytes. • GB (Binary) - Displays the data in binary gigabytes. (The computer handles the data in binary format. A gigabyte is equal to 1,073,741,824 bytes.) • GB (Decimal) - Displays the data in gigabytes.
Table 55 Icon Toolbar in Lower Pane of Performance Manager (continued) Description Lets you modify the performance data displayed in the graph and change graph settings. When you select it, the following options are displayed: Performance data in the graph • Data and Delete note pad - Displays elements on the chart (including statistics for the element) and allows you to delete some or all of them.
Comparing the Performance of Different Elements Use Performance Manager to compare the performance of different elements. Let's assume you want to compare the physical memory used on different hosts, you would do the following: 1. Access Performance Manager as described in ”Accessing Performance Manager” on page 394. 2. Click the element in the topology whose performance you want to see. In this example, let's assume you clicked a host named Cortez. 3. Select a component of the element.
To view a summary chart: 1. Access Performance Manager as described in ”Accessing Performance Manager” on page 394. 2. Create a chart as described in ”Creating Performance Charts” on page 394. 3. Select Summary from the Chart combo box in the lower pane. 4. Click the button in the lower pane for the change to take effect. Viewing Trending Information for Performance The management server can display trending information in its charts.
NOTE: If there is not enough data to display, Performance Manager does not display the chart. For example, if you selected the weekly option from Frequency menu and you only have two days of data, a chart is not displayed, regardless of the value in the Trend box. Performance Manager does not display a chart if there is not enough data, and the trending number is ignored. Removing Performance Data from a Graph To remove multiple data from a performance graph: 1.
7. Click the calendar button to the right of the Start box. 8. Enter the time in the time box. Make sure the time resembles a 24-hour clock, for example 22:00 for 10 p.m. 9. Click the date. The date is highlighted in pink. You can navigate the calendar as follows: - Displays the same month in the previous year - Displays the previous month - Displays the next month - Displays the same month in the following year 10.When you are done, click Set. The start time and date are displayed in the Start box. 11.
Table 56 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Average IO Size (Bytes/Sec) LSI storage systems The average input/out size (bytes/sec) Buffer Cache Hits Count per Second NAS filers (system) The number of buffer cache hits per second. Buffer Cache Misses Count per Second NAS filers (system) The number of buffer cache misses per second.
Table 56 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Bytes Received (MB/Sec) • Storage systems Number of bytes received by the port per second • Host (port for HBA card) • NAS filer (IP port) • Switch port CPU Usage Percentage (%) Sybase Percentage of the Sybase CPU being used.
Table 56 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Disk Read (KB/second) Disk drives The speed at which the disk is read. To receive this data from a 64-bit AIX host, the bos.perf.libperfstat file must be installed on the host. See the Prerequisites section in the chapter about installing the CIM extension on AIX in the installation guide. Disk drives Total speed at which the disk is read and written for HP-UX hosts.
Table 56 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description File Read Percent Oracle Percentage of “reads” for the file against the total “reads” in the database. File Total I/O Percent Oracle This gives Datafile I/O percentage against Total I/O. Percentage of read+write for the file against total read+write in the DB. File Write Percent Oracle Percentage of “write” for the file against the total “writes” in the database.
Table 56 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Inode Cache Misses Count per Second NAS filers (system) The number of inode cache misses per second. Invalid CRC Errors (errors/second) Storage systems The speed at which invalid cyclic redundancy check (CRC) errors are found.
Table 56 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Name Cache NAS filers Misses per Second The number of name cache misses per second on a NAS filer. Packets Received (rate/second) NAS filers (IP port) The number of packets received per second by the IP ports on a filer. Packets Transmitted (rate/sec) NAS filers (IP port) The packets sent per second by the IP ports on a filer.
Table 56 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Physical Memory Used (%) Hosts The percentage of physical memory used on the host. To receive this data from a 64-bit AIX host, the bos.perf.libperfstat file must be installed on the host. See the Prerequisites section in the chapter about installing the CIM extension on AIX in the installation guide. Percent Read (%) LSI storage systems The percentage read.
Table 56 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Redo Logspace Request Ratio Oracle The number of times lgwr had to wait for writing to redo the log file. If the ratio is more then .0002 (1 in 5000), investigate further, and consider increasing redo log buffer size. Requests Serviced EMC storage systems Requests serviced (bytes/second).
Table 56 About the Monitoring Options (continued) Available Monitoring Options Available to Which Elements Description Tablespace Read Percent Oracle Percentage of “reads” for the tablespace against the total “reads” in the database. Tablespace Write Percent Oracle Percentage of “writes” for the tablespace against the total “writes” in the database. Tablespace Total I/O Percent Oracle The tablespace input/output percentage against the total input/output.
Managing Late Data or Errors If you are performing real time data collection, and the element is not returning the information in time, you are shown a message in red resembling the following: Data is late or an error occurred... The software cannot obtain the information in a timely manner because of one or more of the following: • The element might be inherently slow. • The element might be busy with other tasks. • You are trying to collect too much information at once from the element.
• The management server only monitors the top or bottom layer of Solstice Disksuite/Volume Manager. For example, assume you have a normal configuration for Solstice Disksuite/Volume Manager (/folder <- d1 <- d2 <- d3 <- d4 <- cxtydzs#). The management server reports on the folder and the highest layer, which is d1. Assume you have soft partitioning (/folder <- d1 <- d2 <- d3 <- d4 <- cxtydzs#). The management server reports on the folder and the lowest layer, which is d4.
Table 57 Host Monitoring Support (continued) Host Configuration Monitoring Supported? Irix 6.5.x Y Irix 6.5.x XVM Y Irix 6.5.x CXFS Y (only on node sending I/O) Redhat 2.1 Y Redhat 3.0 Sistina LVM Y Redhat 2.1 HDLM N Redhat 3.0 Y Redhat 3.0 HDLM N Redhat 4.0 Y Redhat 4.0 Itanium Y SGI ProPack 3.0 Y SGI ProPack 3.0 XVM Y SGI ProPack 3.
Table 57 Host Monitoring Support (continued) Host Configuration Monitoring Supported? Windows NT 4 N Windows 2000 Y Windows 2000 PowerPath N Windows 2000 HDLM N Windows 2000 RDAC N Windows 2000 DAS N Windows 2000 Volume Manager N Windows 2000 Volume Manager and PowerPath N Windows 2000 Volume Manager and HDLM N Sudden Dips Displayed in Certain Charts in Performance Manager In Performance Manager and on the Monitoring tab, charts that display data gathered by certain volume and drive co
The following charts for aggregate drives are impacted: ReadIOs, WriteIOs, TotalIOs, Bytes Transferred, Unrecovered Errors, Recovered Errors, Timeouts, Retried Requests. Charts for aggregated drives are also provided for arrays, controllers, and volume groups. The following charts for aggregate volumes are impacted: Bytes Read, Bytes Read Large, Bytes Written, Bytes Written Large, ReadIOs Large, WriteIOs Large, ReadIOs, WriteIOs, TotalIOs, Bytes Transferred, ReadHitIOs.
416 Viewing Performance Data
14 Running Reports Depending on your license, Reporter may not be available. See the List of Features to determine if you have access to Reporter. The List of Features is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). Global reports and custom reports are not included with HP Storage Essentials Standard Edition.
• Excel - The software displays the report in Microsoft Excel, providing you have a copy of Microsoft Excel already installed. • XML - The software displays the report in the XML format. The management server also provides some reports with pie charts. If the report is available as a pie chart, the icon appears next to the report name. The software provides reports for the following: • Global - These reports provide data gathered from multiple management servers.
• Backup Manager - Data about backups, such as reports about the status of the daily backup, backup volume, and media availability. To learn more about backups, see ”About Backup Manager” on page 571. • Applications - These reports provide information about an application, such as Oracle or Microsoft Exchange. • Hosts - These reports provide information about a host.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description Global Reports/System/Storage System Global Storage System Details by Vendor Shows the capacity summaries for all storage systems rolled up from multiple Storage Essentials servers grouped by vendor. Global Reports/System/Storage System Global Storage System Utilization Summary Shows the aggregated storage capacity for each site.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description Chargeback Manager Asset-Based Chargeback A monthly chargeback report, listed by subsystem, that shows cost of storage based on storage tier price per MB/GB/TB. Chargeback Manager Chargeback by Application Application based chargeback report. Chargeback Manager Storage-based Chargeback by Application Shows the total cost by department for their application usage.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description System/Events Event Summary by Date Shows incomplete events by severity over time. Incomplete events are the events that are not cleared using the Event Manager pages of Storage Essentials.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description System/File Server Top N Aged Files Shows the list of Top N aged files based on the file accessed time stamp for each volume grouped by file servers. You can define the value of N by setting a JBoSS property “fileSrm.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description System/File Server Top N Volumes with Stale Files Shows the top N Volumes with stale files for each file server. System/File Server Top N Volumes with Stale Files by File Server Shows the Top N volumes at the enterprise level across all discovered file servers. System/File Server User Details Shows the users consuming the most capacity across all discovered file servers.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description System/Host Host Use of SAN Storage Details Shows how external storage is being used by each host. System/Host Host Use of SAN Storage Summary Summarizes how SAN storage and File Systems are being used by the hosts in the enterprise.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description System/Performance *EVA Storage Controller CPU Utilization Shows the CPU utilization for each controller. System/Performance *EVA Storage Controller Data Transfer Shows the data transfer percentage for each controller. System/Performance *EVA Storage Controller Latency Shows the average latency for the controller over time.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description System/Performance *EVA Storage Pool Throughput Shows the throughput in MBs for the storage pool over time. System/Performance *EVA Storage System Request Rate Shows the I/O request rate for the storage system over time. System/Performance *EVA Storage System Throughput Shows the throughput in MBs for the storage system over time.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description System/Storage System Storage Array Capacity by Applications Shows the capacity utilization by diiferent applications which have been discovered by SE. System/Storage System Storage System Array Overhead Utilization Shows the array raw capacities versus the all capacity utilization for the array over time.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description System/Switch Total Switch Port Utilization Shows used and free ports across all fabrics and switches. Backup Manager Backup Volume by Clients Shows the amount of data backed up for each client. Backup Manager Backup Volume by Policy Shows the amount of data backed-up by each policy. Backup Manager Backup Volume Overview Shows the backup details for clients.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description Backup Manager Restore SLA Summary Shows the Restore backup SLA summary details over time. Backup Manager SLA Summary Shows the backup SLA summary details over time. Applications Application Dependency Shows everything necessary for the application to run which is especially useful for defining disaster recovery plans for mission critical applications.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description Hosts/ Asset Summary Shows the detailed asset information for a host. Hosts Dependency Shows all applications running on the host which is especially useful for disaster recovery plans, application load balancing or server refreshes. Hosts Details Shows all the storage information relevant to the host which is useful information to save for server rebuilds or disaster recovery.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description NAS Details Shows the detailed configuration details of NAS storage. NAS Events Shows all non-cleared events received for the NAS storage. NAS Utilization by File System Shows Capacity statistics for the mount points of a NAS storage. Storage Systems Asset Summary Shows detailed asset management information for the storage system.
Table 58 Description of the Built-in Reports (continued) Report Type/Sub-types Name of Built-in Report Description Storage Systems Utilization Shows the capacity statistics of the storage array. This repot also shows the list of hosts connected to the array and their storage consumption from this array. Switches Asset Summary Shows detailed asset management information for the storage switch. Switches Dependency Lists all devices that would be impacted should the switch have a problem.
• In File System Viewer reports, file extensions may sometimes be truncated in reports. For example myfilename.txt may appear as myfilename.tx with a missing t in the report. • The following IBM HBA appears as QLogic HBAs in the Navigation and Properties pages, in addition to reports: • IBM MSJ • FaStT FC-2/2-133 • The following reports generally presents the volumes and the associated mapped and unmapped capacities. The units are always post-RAID.
• Application Reports • Hosts Reports* • Storage System Reports* • Switch Reports* *These reports display information for only one element, such as Asset Summary, Details, Events, and Utilization reports. Accessing Reporter To access Reporter, click Reports > Storage Essentials > Manage Reports or click Tools > Storage Essentials > Home, and then click Reporter in the left pane. Viewing Reports Collectors gather information for reports. If you stop a collector, its reports are not updated.
• Excel - The software displays the report in Microsoft Excel, providing you have a copy of Microsoft Excel already installed. • XML - The software display the report in the XML format. 4. To view a report in a new window, click the Open in new window option located next to the menu, and then click Run Report. 5. Some reports provide the option to view data within a time period.
yyyy-mm-dd hh:mm based on the 24-hour clock. There should be a space between the date and the time, as shown below: 2003-08-20 09:41 After the collector runs, the value in this column is updated to the next time the collector will run. 3. To change how often the collector runs, enter the number of minutes in the Interval box. IMPORTANT: Do not make the interval too short. Running a collector too frequently uses up space on the management server and impacts its performance. 4.
• XML - Display the report in the XML format. Opening a Report in a New Window Use this feature to view two or more reports simultaneously. To view a report in a new window: 1. While viewing a report, select the Open in new window option. 2. Click Run Report. A new window opens, and it displays just the report. You can arrange the windows on the screen so you can view one report in one corner and another report in a different corner.
If you do not see information in your reports, verify that you have global reporting set up correctly. See ”Setting Up Global Reporter” on page 209. To filter data global reports: 1. Access Reporter as described in ”Accessing Reporter” on page 435. 2. Expand the Global node. 3. Select a global report. 4. In the right pane, click Filter Data. 5. Expand the Sites and Organizations node. 6. In the Filtering window, select the sites you want to view. 7.
5. (Backup Manager reports only) Select the period of time you want displayed in the report by entering a start date and end date in the appropriate boxes. 6. From the Format menu, select one of the following formats: • PDF - Requires the use of Adobe Acrobat, which can be downloaded for free from http://www.adobe.com. • Excel - Requires the use of Microsoft Excel. • XML - Requires the user has an understanding of XML. 7. Optional: Modify the subject and the message. 8. Click OK. The report is sent.
To add an e-mail schedule: 1. Access Reporter as described in ”Accessing Reporter” on page 435. 2. Expand the tree in the middle pane, and click the report you want to send at a scheduled time. 3. When the report is displayed in the right pane, click the Scheduled Deliveries tab in the right pane. 4. Click Add E-mail Schedule. 5. Verify that the Properties tab is displayed. 6. In the top box, enter the recipient's e-mail address. The software verifies the address entered has a correct form.
• Monthly - If you select Monthly, select the time during the month you want the report sent: • To send the report on the first or last day of the month, select the first option, and then select First or Last from the menu. • To send the report on a specified day during the month, select the second option, and then enter the day on which you want the report sent. If you enter a day that is not in the month, (for example 30 for February) the report is sent on the last day of the month. 13.Click Next.
Editing an E-mail Schedule for a Report IMPORTANT: Only the e-mail schedules created by the current user are listed. To view the e-mail schedules for all reports, select Reports > Storage Essentials > Report Configuration in HP Systems Insight Manager, and then click the Scheduled Deliveries tab. To edit an e-mail schedule for a report: 1. Access Reporter as described in ”Accessing Reporter” on page 435. 2. Expand the tree in the middle pane, and click the report you want to send at a scheduled time. 3.
3. When the report is displayed in the right pane, click the Scheduled Deliveries tab in the right pane. Information about the e-mail schedules for that report are displayed. Table 59 Viewing E-mail Schedules for a Report Column Name Description Recipient The person who receives the report. Subject The subject of the e-mail plus a brief summary of what it is about.
reports as you create them. Once you are satisfied with the customized reports, you can merge them onto the management server so they are accessible from the management server console. The following figure shows how Report Designer fits into the reporting architecture. Use Report Designer to create the reports, and then deploy the reports on the management server. Figure 94 Report Architecture About Materialized Views When you create reports, you can use pre-existing schema materialized views.
1. Add the following class path to Report Designer. Refer to the documentation accompanying Report Designer for more information. C:\oracle\ora92\jdbc\lib\classes12.jar where C:\oracle\ora92 is the directory containing classes12.jar. 2. Select File > New Catalog. A catalog is a repository for reports. The catalog and the reports that are based on it must be in the same directory for the report to run. This is because the catalog contains the object definitions that are used by the reports in the catalog. 3.
If Report Designer cannot find the JDBC drivers, you may have entered incorrect path information. 10.Select APPIQ_SYSTEM under the schemas section. The Tables pane becomes populated. These are all the tables you can use to create the reports. It is best to select as many tables as possible rather than too few. If you are not sure which tables you may be using, you may want to select them all. 11.Select the tables and then click Add. 12.When you have finished adding tables, click Done.
3. Click the Standard Report icon and then click Create to start the Report Form Creation Wizard. Figure 95 Choosing a Standard Report 4. Select the data you want in your report by selecting the corresponding materialized views (tables) displayed in the Data tab. For example, in the following figure, the MV_APPLICATIONVW table has been selected. System application data will be made available to the report, according to the Report Categories table.
not want all data displayed in the report. To find a definition of the listings in a table, see ”Detailed Schema Information” on page 460. When you are done, click Next. Figure 96 Adding Tables for a Standard Report 5. When you are asked if Report Designer will create a new query, click OK. 6. If you selected more than one materialized view (table) in the Data tab, you need to link common search criteria, such as the DEVICE_ID in one table to the DEVICE_ID of another table.
Refer to the online help for Report Designer for more information. When you finish selecting and linking materialized views, click Next.
7. Enter search criteria that will be used to generate the report. For example, if you want the report to display information only about Oracle applications, enter a search criterion that tells Report Designer to display data from Oracle applications. When you are done, click Next. Figure 98 Creating Search Criteria for Standard Reports 8. To select the data you want displayed in the report, click the data source in the Data Source pane, and then click the arrow pointing right.
the text in the AutoLabel column in the Report fields pane. To find a definition of the listings in a table, see ”Detailed Schema Information” on page 460. Figure 99 Deciding Which Data Should Appear in the Report 9. Select the fields in the left pane in the order you want them sorted in your report, and then click the arrow pointing right. When you are done, click Next.
For example, in the following figure, information in the report will first be sorted by an application name. If you then select APPLICATIONID, applications will first be sorted by application name and then by their application ID. Figure 100 Sorting Information in the Report HP Storage Essentials SRM 6.
10.Use the Style tab to determine the layout of the report. When you are done, click Finish.
The report template is displayed. You will not see any data reported, only placeholders, as shown in the following figure. Figure 102 Report Template Displayed 1. To view the report with its data, click the View tab. 2. The database for the management server must be running on the management server to be able to view active data in the report. Verify that the OracleOraHome92TNSListener service is running on the management server.
5. Refer to the online help for Report Designer for information on how to design the report. Figure 103 Result of Clicking the View Tab Managing Custom Reports (Importing and Deleting) You can manage custom reports using the graphical user interface. This interface enables you to import and delete custom reports and is accessed from the Reports tab under the Configuration choice. The interface eliminates the need to manually deploy custom reports at customer locations.
The following screen displays. Figure 104 Manage Custom Reports Screen The screen lists these instructions to import and view a custom report: 1. Package the report definition, report template, and database into a zip file. 2. Use the Browse button in the display to specify the name/path of the zip file. 3. Use the Import button in the display to import the zip file. 4. View the report from the “system” link of the Reporter. The instructions also remind you to refer to Help for additional information.
After importing, a screen display similar to the following shows the imported report files. The imported reports can then be viewed from the “system” link of the Reporter. Figure 105 Screen Displays Custom Reports Available Importing Custom Reports Error Messages If you attempt to load a file type other than .zip, the system will give an error message saying that it is not a valid file type.
report to the management server, and then you must integrate the report so that it is accessible from Reporter. Custom reports appear with their own icon in the reports tree. IMPORTANT: You can have only one catalog (*.cat) file to a directory. If you have more than one catalog, create a subdirectory under %JBOSS4_DIST%\server\appiq\reports\custom. For example, if you have two reports that use a different catalog, you would create two subdirectories under reports\custom, one for each catalog.
d. Make sure you use an ID that is not used by any of the existing reports. You must specify a title to appear in the tree and the file names for the CLS and CAT files, as shown in the following example. PAGE 499Table 60 Description of the Report Views Materialized View Description (Tables) MVC_ORGANIZATIONVW Provides information about organizations. See Table 76 on page 476. MVC_ORGRELATIONVW Provides information about the relationships in an organization, such as the parent and child identifiers in an organization. See Table 77 on page 476. MVC_OPTIONALTABLEVW Provides information about the names and values of the optional value. See Table 82 on page 478.
Table 60 Description of the Report Views (continued) Materialized View Description (Tables) MVCA_DBAPPCAPACITYVW Provides capacity information for a supported database application. See Table 92 on page 485. MVCA_EXCHANGEAPPCAPACITYVW Provides capacity information for Microsoft Exchange. See Table 93 on page 486. MVCA_VIRTUALAPPCAPACITYVW Provides capacity information for a virtual application. See Table 94 on page 486.
Table 60 Description of the Report Views (continued) Materialized View Description (Tables) MVC_HOSTDISKDRIVEVW Provides information about host disk drives. See Table 64 on page 467. MVC_HOSTVOLUMESUMMARYVW Provides summary information about host volumes. See Table 63 on page 467. MVC_DISKEXTENTSUMMARYVW Provides summary information about disk extents. See Table 83 on page 479. MVC_STORAGEVOLUMEPORTS Provides information about storage volume ports. See Table 84 on page 479.
Table 60 Description of the Report Views (continued) Materialized View Description (Tables) MVC_HOSTCAPACITYVW Provides host capacity information. See Table 78 on page 477. MVC_STORAGESYSTEMCONFIGVW Provides storage system configuration information. See Table 79 on page 477. MVC_STORAGEPOOLCONFIGVW Provides information about storage pool configurations. See Table 80 on page 478. MVC_DISCOVERYDETAILSVW Provides information about quarantined elements. See Table 111 on page 495.
Table 60 Description of the Report Views (continued) Materialized View Description (Tables) MVCA_FSRM_DIRREPORTDATAVW Provides information about File System Viewer directories. See Table 122 on page 500 MVCA_FSRM_REPORTRULEVW Provides information about File System Viewer rules.See Table 123 on page 501. MVCS_HOSTMEMORYSTATSVW Provides host memory performance statistics. See Table 124 on page 501 MVCS_HOSTCPUSTATSVW Provides host CPU performance statistics. See Table 125 on page 502.
MVC_HOSTSUMMARYVW (continued) Table 61 Column Name Type Description HOSTNAME VARCHAR2(256) Host Name DOMAINID NUMBER(38) DomainID VENDOR VARCHAR2(256) Host Vendor DESCRIPTION VARCHAR2(1024) Host Description STATUS NUMBER(38) Operation status (provide map here) IP VARCHAR2(16) Host IP DNS VARCHAR2(50) Host DNS Name Model VARCHAR2(256) Host Model Version VARCHAR2(256) Host Version number OS VARCHAR2(24) Host Operating System TOTALPHYSICALMEM NUMBER(38) Total physical memor
Table 62 MVC_CARDSUMMARYVW (continued) Column Name Type Description Model VARCHAR2(256) Card model SerialNumber VARCHAR2(256) Card Serial Number Version VARCHAR2(256) Card Version Firmware VARCHAR2(256) Firmware version DriverVersion BASETABLENAME Table 63 VARCHAR2(256) CHAR(4) Driver version Name of the base table for optional values MVC_HOSTVOLUMESUMMARYVW (logical volumes) Column Name Type Description LogicalVolumeID NUMBER(38) Storage Volume ID LogicalVolumeName VARCHAR2(256
Table 64 MVC_HOSTDISKDRIVEVW (continued) Column Name Type Description DiskPartition VARCHAR2(256) Disk Partition Name DiskPartitionDescription VARCHAR2(1024) Description of the partition DiskPartitionSPace Number Capacity of the disk partition, in megabytes Table 65 MVC_STORAGESYSTEMSUMMARYVW Column Name Type Description StorageSystemID NUMBER(38) Storage system ID StorageSystemName VARCHAR2(256) Storage system Name DomainID NUMBER(38) Domain ID Vendor VARCHAR2(254) Vendor Des
Table 66 MVC_STORAGEPOOLSUMMARYVW (continued) Column Name Type Description StoragePoolDescription VARCHAR2(1024) Description of the storage pool Status NUMBER(38) Operational status (provide map) StorageSystemID NUMBER(38) ID of storage system to which pool belongs PoolSettingID NUMBER(38) Storage capabilities ID ParentPoolID NUMBER(38) Parent pool ID, reference to Storage Pool ID TotalAvailableSpace NUMBER(38) Total available space in bytes CIMPoolID VARCHAR2(254) Reserved PoolTyp
Table 67 MVC_STORAGEVOLUMESUMMARYVW Column Name Type Description StorageVolumeID NUMBER(38) StorageVolume ID StorageVolumeName VARCHAR2(256) StorageVolume Name DomainId NUMBER(38) Domain ID OID VARCHAR2(254) Reserved Status NUMBER(38) Operational status (provide map here) StorageSystemID NUMBER(38) ID of the storage system that contains this volume StorageCapabilityID NUMBER(38) Storage Capability ID VolumeDeviceID VARCHAR2(254) Device ID AccessType VARCHAR2(254) Volume access
Table 68 MVC_SWITCHSUMMARYVW (continued) Column Name Type Description Description VARCHAR2(1024) Description of the Switch Status NUMBER(38) Operational status (provide map here) IP VARCHAR2(16) Switch IP DNS VARCHAR2(50) DNS of the Switch WWN VARCHAR2(254) WWN of the Switch Model VARCHAR2(254) SerialNumber VARCHAR2(254) Serial Number of the Switch Version VARCHAR2(254) Switch’s hardware version LoginName VARCHAR2(254) Login name for this Switch LoginPwd VARCHAR2(254) Login
Table 69 MVC_PORTSUMMARYVW Column Name Type Description PortID NUMBER(38) Port ID PortName VARCHAR2(256) Port Name DomainID NUMBER(38) Domain ID Description VARCHAR2(1024) Description Status NUMBER(38) Operational status (provide map) WWN VARCHAR2(32) Port WWN ContainerID NUMBER(38) Container ID of this port TargetPort NUMBER(38) Target Port ID (Never populated) Connected_To_WWN VARCHAR2(32) WWN of connected port Device_ID VARCHAR2(254) Port Device ID PortState VARCHAR2(2
Table 70 MVC_ZONESUMMARYVW (continued) Column Name Type Description DominaID NUMBER(38) Domain ID (currently only one domain) CimClassName VARCHAR2(28) Status NUMBER(38) ActiveZone VARCHAR2(3) ZoneType VARCHAR2(254) ProtocolType VARCHAR2(254) ReadOnly NUMBER(1) FabricID NUMBER(38) Fabric ID FabricWWN VARCHAR2(254) Fabric WWN FabricCName VARCHAR2(256) ZoneCapID NUMBER(38) Zone capability ID ZoneCapabilitiesName VARCHAR2(254) Name of the zone capabilities ZC_MaxName_length N
MVC_ZONEVW (continued) Table 71 Column Name Type Description ZoneMemberName VARCHAR2(254) Name of the zone member ZoneMemberType VARCHAR2(254) Type of the zone member ZoneMemberInFabric NUMBER(1) ZonePortWWN VARCHAR2(32) ZoneAlias VARCHAR2(256) Table 72 WWN of the zone port MVC_PATHVW Column Name Type Description PathID NUMBER(38) Path ID HostID NUMBER(38) Host ID on this path LogicalVolumeID NUMBER(38) Logical Volume ID DiskPartitionID NUMBER(38) Disk Partition ID if raw p
Table 73 MVC_SUBPATHVW (continued) Column Name Type Description HBAPortID NUMBER(38) HBA Port ID HostSwitchPortID NUMBER(38) ID of Host Switch Port SystemSwitchPortID NUMBER(38) ID of the system switch port StorageSystemPortID NUMBER(38) StorageVolumeID NUMBER(38) StorageSystemID NUMBER(38) LUN NUMBER(38) IsLocal VARCHAR2(6) FabricID NUMBER(38) MultipathDeviceID NUMBER(38) PathSwitchID NUMBER(38) Table 74 MVC_MULTIPATHVW Column Name Type Description PathID NUMBER(38) Pat
Table 75 MVC_EVENTSVW (continued) Column Name Type Time_Reported Date Severity NUMBER(38) Cleared NUMBER(1) Source VARCHAR2(254) Type NUMBER(38) SubType NUMBER(38) Probable_Cause_Description VARCHAR2(4000) Recommanded_Actions VARCHAR2(254) Correlated_Indications VARCHAR2(254) Type_Description VARCHAR2(254) Element_type NUMBER(38) Name VARCHAR2(256) Vendor VARCHAR2(254) Model VARCHAR2(254) Table 76 Description MVC_ORGANIZATIONVW Column Name Type Description ORGID NUMBER
Table 77 MVC_ORGRELATIONVW (continued) Column Name Type Description DOMAINID NUMBER(38) Domain ID Table 78 MVC_HOSTCAPACITYVW Column Name Type Description HostID NUMBER(38) Host ID VolumeID NUMBER(38) Logical Volume ID TimeStamp TIMESTAMP Time of data collection Total NUMBER(38) Total capacity in megabytes Used NUMBER(38) Used capacity in megabytes Free NUMBER(38) Free capacity in megabytes Table 79 MVC_STORAGESYSTEMCONFIGVW Column Name Type Description StorageSystemID N
Table 80 MVC_STORAGEPOOLCONFIGVW Column Name Type Description StoragePoolID NUMBER(38) Storage Pool ID CollectionTime TIMESTAMP (6) Configuration stats collection time MaskedMB NUMBER Masked Storage in megabytes ExportedMB NUMBER Storage exposed in megabytes UnexportedMB NUMBER Volume unexposed in megabytes AvailableMB NUMBER Available storage left on storage pool ProvisionedMB NUMBER Provisioned storage in megabytes TotalMB NUMBER Total storage in megabytes StorageCapability V
Table 83 MVC_DISKEXTENTSUMMARYVW Column Name Type Description DiskExtentID NUMBER(38) Disk Extent ID DiskEnxtentName VARCHAR2(256) Name of the extent DomainID NUMBER(38) Domain ID DiskExtentDescription VARCHAR2(1024) Description of the extent Status NUMBER(38) Operational status Access_Type VARCHAR2(254) Access type BlockSize NUMBER(38) Block Size Number_Of_Blocks NUMBER(38) Number of total blocks Consumable_Blocks NUMBER(38) Number of usable blocks StoragePoolID NUMBER(38)
Table 85 MVC_VOLUMEDISKDRIVEVW Column Name Type Description VolumeID NUMBER(38) Storage Volume ID DiskDriveID NUMBER(38) Disk Drive ID ExtentID NUMBER(38) Disk Extent ID Table 86 MVC_STORAGEPROCESSORSUMMARYVW Column Name Type Description SystemProcessorID NUMBER(38) Storage System Processor ID SystemProcessorName VARCHAR2(256) Name of the system processor DomainID NUMBER(38) Domain ID Vendor VARCHAR2(254) Vendor Description VARCHAR2(1024) Status NUMBER(38) IP VARCHAR2(16)
Table 87 MVC_DISKDRIVESUMMARYVW Column Name Type Description DiskDriveID NUMBER(38) Disk Drive ID DiskDriveName VARCHAR2(256) Name of the Disk Drive DomainID NUMBER(38) Domain ID OID VARCHAR2(254) Object ID of the Disk Drive Vendor VARCHAR2(254) Vendor Description VARCHAR2(1024) Description Status NUMBER(38) Operational status Model VARCHAR2(254) Disk Drive Model Name VARCHAR2(254) Name coming from disk drive CardID NUMBER(38) Card ID DiskDriveStatus VARCHAR2(254) Disk D
Table 88 MVC_DISK_EXTENTVW (continued) Column Name Type Description ContainerExtentID NUMBER Container Extent ID DiskID NUMBER Disk Drive ID Table 89 MVC_ASSETSUMMARY Column Name Type Description DOMAINID NUMBER(38) Domain ID ASSETID NUMBER(38) ID of the Asset depending on Assetclass for example if the assetclass is Host then this is host.
Table 89 MVC_ASSETSUMMARY (continued) Column Name Type Description STORAGETIERCOSTPERGB NUMBER(36,2) Asset storage Tier cost DEPARTMENTNO VARCHAR2(255) Asset department no DEPARTMENTNAME VARCHAR2(255) Asset department Name PERCENTAGEOWNED NUMBER(5, 2) Percentage owned by Department ADMINISTRATOR VARCHAR2(255) Asset maintained by VARCHAR2(255) Staff Name VARCHAR2(255) Staff PH# STAFFDEPARTMENT VARCHAR2(255) Staff Department STAFFEMAIL VARCHAR2(255) Staff e-mail STAFFNAME STAFFPH
Table 89 MVC_ASSETSUMMARY (continued) Column Name Type Description RESELLER VARCHAR2(255) Asset Reseller COMMENTS VARCHAR2(4000) Comments NUMBER Asset Fixed cost tax per department per Year NUMBER Storage Fixed cost tax per department per Year ASSETFIXCOSTTAXPERDEPTPE RYEAR STORAGFIXCOSTTAXPERDEPT PERYEAR Table 90 MVC_APPLICATIONSUMMARYVW Column Name Type Description APPLICATIONID NUMBER(38) Application ID APPLICATIONNAME VARCHAR2(256) Application Name DOMAINID NUMBER(38) Domain
Table 91 MVC_UNITACCESSVW Column Name Type Description ID NUMBER(38) STORAGE_VOLUME_ID NUMBER(38) STORAGE_SYSTEM_PORT_ID NUMBER(38) HBA_PORT_ID NUMBER(38) ACCESS_MODE VARCHAR(254) INITIATOR VARCHAR(254) INITIATOR_FORMAT NUMBER(38) UNIT_NUMBER NUMBER(38) HOST_GROUP VARCHAR(254) HOST_GROUP_NAME VARCHAR(254) HOST_GROUP_MODES VARCHAR(1024) Application Core Views Table 92 MVCA_DBAPPCAPACITYVW Column Name Type DBApplicationID NUMBER(38) HostID NUMBER(38) CapacityType Varchar2(7
Table 93 MVCA_EXCHAPPCAPACITYVW Column Name Type ExchangeAppID NUMBER(38) HostID NUMBER(38) CapacityType Varchar2(7) Timestamp Timestamp StorageGroupID NUMBER(38) ExchangeFilePath Varchar(512) TotalMB NUMBER FreeMB NUMBER UsedMB NUMBER Table 94 MVCA_VIRTUALAPPCAPACITYVW Column Name Type VirtualAppID NUMBER(38) HostID NUMBER(38) Timestamp Date VirtualPath Varchar2(512) TotalMB NUMBER FreeMB NUMBER UsedMB NUMBER Table 95 Description Description MVCA_FSRM_VOLUMESUMMAR
Table 95 MVCA_FSRM_VOLUMESUMMARYVW (continued) Column Name Type TotalDirectories NUMBER(38) TotalFiles NUMBER(38) DomainID NUMBER(38) Timestamp Timestamp(6) Table 96 MVCA_FSRM_AGESUMMARYVW Column Name Type AgeID NUMBER(38) VolumeID NUMBER(38) TotalFiles NUMBER(38) TotalSize NUMBER(38) Timestamp Timestamp(6) Table 97 Description MVCA_FSRM_EXTDETAILSUMMARYVW Column Name Type ExtName Varchar2(254) VolumeID NUMBER(38) TotalFiles NUMBER(38) TotalSize NUMBER(38) Timestamp T
Table 98 MVCA_FSRM_DIRDETAILSUMMARYVW (continued) Column Name Type ParentKey NUMBER(38) DirName Varchar2(254) DirLSevel NUMBER(38) DirSize NUMBER(38) TotalSubDirectories NUMBER(38) TotalFiles NUMBER(38) VolumeID NUMBER(38) Timestamp Timestamp(6) Table 99 MVCA_FSRM_USERSUMMARYVW Column Name Type UserID NUMBER(38) FSID NUMBER(38) UserProvidederID Varchar2(254) UserName Varchar2(254) DirName Varchar2(254) Department Varchar2(254) Email Varchar2(254) Quota NUMBER(38) Doma
Table 100 MVCA_FSRM_TOPNFILES (continued) Column Name Type Contact Varchar2(254) Department Varchar2(254) Email Varchar2(254) Quota NUMBER(38) DomainID NUMBER(38) Table 101 MVCA_FSRM_AGEDFILEDETAILS Column Name Type VolumeID NUMBER(38) FileName Varchar2(254) FileSize NUMBER(38) FileAge NUMBER(38) Timestamp Timestamp(6) DomainID NUMBER(38) Table 102 Description Description MVCA_FSRM_LARGEDIRINFO Column Name Type VolumeID NUMBER(38) DirName Varchar2(256) DirSize NUMBER
Table 103 MVCA_BU_MASTERSERVERSUMMARY Column Name Type MasterServerID NUMBER(38) MasterServerName Varchar2(256) HostID NUMBER(38) Vendor Varchar2(254) Description Varchar2(1024) Status NUMBER ProductName Varchar2(254) LicenseKey Varchar2(256) LicenseFeatures Varchar2(256) DomainID NUMBER(38) Table 104 Description MVCA_BU_MEDIASERVERSUMMARY Column Name Type MediaServerID NUMBER MediaServerName Varchar2(256) MasterServerID NUMBER HostID NUMBER(38) Vendor Varchar2(254) De
Table 105 MVCA_BU_CLIENTSUMMARY Column Name Type ClientID NUMBER(38) ClientName Varchar2(256) MasterServerID NUMBER HostID NUMBER(38) Vendor Varchar2(254) Description Varchar2(1024) Status NUMBER ProductName Varchar2(254) DomainID NUMBER(38) Table 106 Description MVCA_BU_MEDIASUMMARY Column Name Type MediaID NUMBER(38) MediaName Varchar2(256) TapeLibraryID NUMBER PoolID NUMBER MasterServerID NUMBER(38) TLMediaID Varchar2(32) Type Varchar2(32) Barcode Varchar2(32) M
Table 106 MVCA_BU_MEDIASUMMARY (continued) Column Name Type Created Date Assigned Date LastMounted Date FisrtMounted Date ExpirationDate Date NumberOfMounths NUMBER MaxMountsAllocated NUMBER Density Varchar2(64) TimeAllocated Date LastWritten Date Expir Varchar2(32) LastRead Date Mbytes NUMBER NImages NUMBER VImages NUMBER RL Varchar2(64) TotalRestores NUMBER MediaStatus Varchar2(16) Vendor Varchar2(254) Description Varchar2(1024) DomainID NUMBER(38) Table 107
Table 107 MVCA_BU_JOBSUMMARY (continued) Column Name Type MasterServerID NUMBER ClientID NUMBER BUJobID NUMBER JobState Varchar2(16) JobStatus Varchar2(16) ScheduleName Varchar2(32) StorageUnit Varchar2(64) BUTargetServer Varchar2(128) FilesLastWritten NUMBER StartTime Date EndTime Date Description Varchar2(256) Time NUMBER RetentionPeriod Varchar2(16) Compression Varchar2(16) Priority Varchar2(16) KBLastWritten NUMBER FileListCount NUMBER Table 108 Description MVCA
MVCA_BU_LIBRARYSUMMARY (continued) Table 108 Column Name Type Type Varchar2(64) RobotType Varchar2(64) RobotNumber NUMBER TotalNoOfSlots NUMBER TotalSlotsInUse NUMBER TotalNumberOfDrives NUMBER RobotDevicePath Varchar2(128) DomainID NUMBER(38) Table 109 Description MVIEWCORE_STATUS Name Type MVIEWNAME NOT NULL VARCHAR2(30) LAST_REFRESH_TIME DATE TOTALREFRESHTIME VARCHAR2(32) STATUS Table 110 VARCHAR2(10) MVIEW_STATUS Name Type MVIEWNAME NOT NULL VARCHAR2(30) LAST_REFRE
Table 111 MVC_DISCOVERYDETAILSVW Name Description ElementID ID of the quarientiend element ElementName Name of the quarientiend element Address IP address of the element ElementType Type of element DiscoveryGroup Name of the discovery group Enabled Enabled quarientied or not Status Status of the element ParentAddressID Parent address Mapping_version Table 112 MVC_HOSTRELATIONVW Name Description DomainID Domain ID ID ID of the cluster ClusterHostID ID of the cluster host Cluste
Table 112 MVC_HOSTRELATIONVW Name Description ObjectType Object type Table 113 MVC_APPLICATIONRELATIONVW Name Description ApplicationClusterID ID of the cluster application ApplicationClusterName Name of the cluster application AppClusterMemberID ID of the application cluster member AppClusterMemberName Name of the application cluster member Table 114 MVC_STORAGETIERDETAILVW Name Description Memberid ID for the storage members Domainid Domain of the member Member Name of the membe
MVC_STORAGETIERDETAILVW Table 114 Name Description Storagetype Type of storage Table 115 MVCA_BU_OPTIONALTABLEVW Name Description Basetableid ID of the basetable Basetablename Name of the basetable Optionalname Optional name Optionalvalue Optional value Table 116 MVCA_BU_DRIVESTATVW Name Description Driveid ID of the drive Collectiontime Timestamp of the collection ID Robotnumber Robot number Serialnumber Serial number Status Status of the drive Devicetime APPLICATION Applica
Table 117 MVCA_EXCHMAILBOXDETAILVW Name Description ServerName Name of Exchange server StoreID Store ID of the mailbox MailboxMessageSizeBytes Messages size UserMailBoxSizebytes Mailbox size Legacy_dn EmailAddress Email address NTUserName Name of NT user LastLogonTime Timestamp of last logon Storage_limit_info Storage limit CountofNormalMessages Count of normal messages CountofAssociatedMessages Count of attachment messages Applicationid ID of the exchange application Table 118 MV
Table 118 MVCA_EXCHPUBLICFOLDERDETAILVW Name Description CountofContacts Count of contacts in the mailbox CountofMessages Count of messages Associated_content_count Associated messages count MessageSizeinFolderbytes Message size in bytes FolderSizeBytes Public folder size CreationTime Timestamp of creation LastAccessTime Timestamp of last access LastModifiedTime Timestamp of the last modification of the file CountofOwners Count of owner of folder Table 119 MVCA_EXCHANGESTORESUMMARYVW
Table 120 MVCA_EXCHSTORGROUPSUMMARYVW Name Description ApplicationID Application ID Table 121 MVCA_FSRM_FILEREPORTDATAVW Name Description Volumeid ID of FSRM volume Volumename Name of volume Ruleid Rule ID Rulename Name of the rule created Fullpath Path of the file Filename Name of the file Totalsize Total size of file Accesstime Timestamp of access time Createtime Timestamp of creation time Modifytime Timestamp of modified time Attributes Owner Table 122 Owner name of file
Table 122 MVCA_FSRM_DIRREPORTDATAVW Name Description Filename Name of the file Totalsize Total size of file Accesstime Timestamp of access time Createtime Timestamp of creation time Modifytime Timestamp of modified time Attributes Owner Table 123 Owner name of file MVCA_FSRM_REPORTRULEVW Name Description Ruleid ID of the FSRM rule created Rule_name Name of the rule created Description Description Collection_type Type of collection Condition_sq Table 124 MVCS_HOSTMEMORYSTATSVW
Table 124 MVCS_HOSTMEMORYSTATSVW Name Description Freephysicalmemory Percentage of physical memory free Percentvirtualused Percentage of virtual memory used Freevirtualmemory Percentage of virtual memory free Table 125 MVCS_HOSTCPUSTATSVW Name Description Hostid Hosti ID CAPACITYTYPE Type of capacity (Raw,Daily,Weekly,Mo nthly) Processorid ID of the processor Name Name of the processor Timestamp Collection time Pctprocessortime Table 126 MVCS_EVACTRLSTATSVW Name ID COLLECTIONTIME
Table 126 MVCS_EVACTRLSTATSVW Name Description CPUPERCENT DATAXFERPERCENT DELTAREADIOS DELTAREADLATENCY DELTAWRITEIOS DELTAWRITELATENCY PCTREADIOS PCTWRITEIOS READDATARATE READRATE TOTALDATARATE TOTALIORATE WRITEDATARATE WRITERATE Table 127 MVCS_EVADISKSTATSVW Name Description COLLECTIONTIME ID STATSTYPE DEVICETIME DURATION AVGDRIVELATENCY AVGQUEUEDEPTH AVGREADLATENCY AVGREADSIZE AVGWRITELATENCY HP Storage Essentials SRM 6.
Table 127 MVCS_EVADISKSTATSVW Name Description AVGWRITESIZE DELTADRIVELATENCY DELTAREADIOS DELTAREADLATENCY DELTATOTALIOS DELTAWRITEIOS DELTAWRITELATENCY PCTREADIOS PCTWRITEIOS READDATARATE READRATE TOTALDATARATE TOTALIORATE WRITEDATARATE WRITERATE Table 128 MVCS_EVAHOSTFCPORTSTATSVW Name ID COLLECTIONTIME STATSTYPE DEVICETIME DURATION AVGQUEUEDEPTH AVGREADLATENCY AVGWRITELATENCY BADCRCERR 504 Running Reports Description
Table 128 MVCS_EVAHOSTFCPORTSTATSVW Name Description DELTAREADIOS DELTAREADLATENCY DELTAWRITEIOS DELTAWRITELATENCY DISCARDFRAMES LINKFAILURE LOSSOFSIGNAL LOSSOFSYNCH PCTREADIOS PCTWRITEIOS PROTOCOLERROR READDATARATE READRATE RECEIVEEOFA TOTALDATARATE TOTALIORATE WRITEDATARATE WRITERATE Table 129 MVCS_EVASPAGVOLUMESTATSVW Name Description ID COLLECTIONTIME STATSTYPE DEVICETIME DURATION AVGREADHITLATENCY HP Storage Essentials SRM 6.
Table 129 MVCS_EVASPAGVOLUMESTATSVW Name AVGREADMISSLATENCY AVGREADSIZE AVGWRITELATENCY AVGWRITESIZE DELTAREADHITIOS DELTAREADHITLATENCY DELTAREADMISSIOS DELTAREADMISSLATENCY DELTAWRITEIOS DELTAWRITELATENCY FLUSHDATARATE FLUSHRATE MIRRORDATARATE PCTREADIOS PCTWRITEIOS PREFETCHDATARATE READDATARATE READHITDATARATE READHITRATE READMISSDATARATE READMISSRATE READRATE TOTALDATARATE TOTALIORATE WRITEDATARATE WRITERATE 506 Running Reports Description
Table 130 MVCS_EVASTORAGESYSTEMSTATSVW Name Description ID COLLECTIONTIME STATSTYPE DEVICETIME DURATION TOTALDATARATE TOTALIORATE Table 131 MVCS_EVAVOLUMESTATSVW ID COLLECTIONTIME STATSTYPE DEVICETIME DURATION AVGREADHITLATENCY AVGREADMISSLATENCY AVGREADSIZE AVGWRITELATENCY AVGWRITESIZE DELTAREADHITIOS DELTAREADHITLATENCY DELTAREADMISSIOS DELTAREADMISSLATENCY DELTAWRITEIOS DELTAWRITELATENCY HP Storage Essentials SRM 6.
Table 131 MVCS_EVAVOLUMESTATSVW FLUSHDATARATE FLUSHRATE MIRRORDATARATE PCTREADIOS PCTWRITEIOS PREFETCHDATARATE READDATARATE READHITDATARATE READHITRATE READMISSDATARATE READMISSRATE READRATE TOTALDATARATE TOTALIORATE WRITEDATARATE WRITERATE Views from Previous Releases In this release, the materialized views were renamed, revised and in some cases removed.
correctly against these new views. Some of the views have changed and may not work in existing reports.
Table 132 Views from Previous Releases (continued) Legacy View Alternate Core Views MV_LUNSPERFASUMMARYVW MVC_STORAGESYSTEMCONFIGVW MVC_STORAGESYSTEMSUMMARYVW MVC_STORAGEPROCESSORSUMMARYVW MVC_PORTSUMMARYVW MVC_PORTCONTROLLERMAPVW MVC_PROTOCOLCONTROLLERVW MVC_STORAGEVOLUMESUMMARYVW MVC_STORAGEVOLUMEPORTS MVC_LUNMAPPINGVW MVC_CARDSUMMARYVW, MV_HOSTSUM MV_FABRICADAPCAPLUNVW MVC_STORAGESYSTEMSUMMARYVW MVC_STORAGEPROCESSORSUMMARYVW MVC_PORTSUMMARYVW MVC_PORTCONTROLLERMAPVW MVC_PROTOCOLCONTROLLERVW MVC_ST
Table 132 Views from Previous Releases (continued) Legacy View Alternate Core Views MV_TEMPHOSTLOGICALVW MVC_HOSTDISKDRIVEVW MVC_SUBPATHVW MVC_PATHVW MVC_HOSTVOLUMESUMMARYVW MVC_HOSTSUMMARYVW MVC_HBASUMMARYVW MVC_CARDSUMMARYVW MVC_PORTSUMMARYVW MV_TEMPHOSTCARDVW MVC_PORTSUMMARYVW MVC_HBAPORTTARGETS MVC_PORTSUMMARYVW MVC_CARDSUMMARYVW MVC_PORTSUMMARYVW MV_HOSTSTORAGESUMMARYVW MVC_HOSTSUMMARYVW MVC_HOSTVOLUMESUMMARYVW MVC_HOSTCAPACITYVW MVC_OPTIONALTABLEVW MV_HOSTSTORAGEBYOSVW MVC_HOSTSUMMARYVW MVC
Table 132 Views from Previous Releases (continued) Legacy View Alternate Core Views MV_HOSTVXVMVW MVC_DISKEXTENTSUMMARYVW MVC_HOSTSUMMARYVW MVC_DISK_EXTENTVW MVC_DISKDRIVESUMMARYVW MVC_OPTIONALTABLEVW, MVC_PATHVW MVC_SUBPATHVW MVC_HOSTDISKDRIVEVW MVC_HOSTVOLUMESUMMARYVW MV_HOSTVMVW MVC_HOSTDISKDRIVEVW MVC_PATHVW MVC_HOSTVOLUMESUMMARYVW MVC_HOSTSUMMARYVW MVC_HOSTDISKDRIVEVW MV_HOSTLOGICALVOLUMEVW MVC_HOSTCAPACITYVW MV_HOSTFSVOLUMEVW MVX_HOSTSUMMARYVW MVC_HOSTCAPACITYV MVC_PATHVW MVC_SUBPATHVW MVC_
Table 132 Views from Previous Releases (continued) Legacy View Alternate Core Views MV_HOSTSSDEPENDECYVW MVC_HOSTSUMMARYVW MVC_SUBPATHVW MVC_STORAGEVOLUMESUMMARYVW MVC_STORAGESYSTEMSUMMARYVW MVC_STORAGEPROCESSORSUMMARYVW MVC_PORTSUMMARYVW MVC_PATHVW MVC_HOSTVOLUMESUMMARYVW MV_HOSTAPPDEPENDECYVW MVC_APPLICATIONSUMMARYVW MVC_HOSTVOLUMESUMMARYVW MVC_STORAGEVOLUMESUMMARYVW MVC_SUBPATHVW MVC_PATHVW MVC_PORTSUMMARYVW MV_HOSTSPERFAVW MVC_HOSTSUMMARYVW MVC_CARDSUMMARYVW MVC_PORTSUMMARYVW MVC_LUNMAPPINGVW M
Table 132 Views from Previous Releases (continued) Legacy View Alternate Core Views MV_TEMPCONNECTEDSTORAGEVW MVC_PORTSUMMARYVW MVC_STORAGEPROCESSORSUMMARYVW MVC_STORAGESYSTEMSUMMARYVW MVC_SWITCHSUMMARYVW MVC_HOSTSUMMARYVW MV_TEMPZONEVW MVC_ZONEVW MVC_ZONESUMMARY MV_SWITCHDETAILVW MVC_SWITCHSUMMARYVW MVC_ZONESUMMARY MVC_ZONEVW MVC_PORTSUMMARYVW MVC_CARDSUMMARYVW MVC_HOSTSUMMARYVW MV_AVAILABLEPORTVW MVC_SWITCHSUMMARYVW MV_TOTALPORTSVW MVC_PORTSUMMARYVW MV_SANZONEPORTWWNVW MVC_PORTSUMMARYVW MVC
Table 132 Views from Previous Releases (continued) Legacy View Alternate Core Views MV_DBAPPCHARGEBACKVW MVC_APPLICATIONSUMMARYVW MVCA_DBAPPINSTCAPACITYVW MVCA_DBAPPPHYCAPACITYVW MVCA_EXCHAPPCAPACITYVW MVCA_VIRTUALAPPCAPACITYVW MV_APPDEPENDENCYVW MVC_APPLICATIONSUMMARYVW MVC_HOSTVOLUMESUMMARYVW MVC_SUBPATHVW MVC_PATHVW MVC_PORTSUMMARYVW MV_ASSETSUMMARYVW MVC_ASSETSUMMARYVW MVC_OPTIONALTABLEVW MV_ASSETCOUNTVW MVC_APPLICATIONSUMMARYVW MVC_HOSTSUMMARYVW MVC_STORAGESYSTEMSUMMARYVW MVC_SWITCHSUMMARYVW
516 Running Reports
15 Provisioning Manager Depending on your license, Provisioning Manager may not be available. See the List of Features to determine if you have access to Provisioning Manager. The List of Features is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). Provisioning is not included with HP Storage Essentials Standard Edition.
About Provisioning Brocade Switches After Upgrading After you upgrade the management server, perform Discovery Data Collection for any subset of elements that includes the Brocade switch before performing any provisioning operations that involve that switch. For more information, see ”Discovering Switches, Storage Systems, NAS Devices, and Tape Libraries” on page 19.
some network administrators prefer to put all of the Microsoft Windows computers in one zone and all of the Sun Solaris computers in another; or you might create zones according to an application. For example, you might want to create a zone for Production and another zone for Finance. This way the users in the Finance department are not even aware of the disks and ports available for Production, and vice versa. Only elements in an active zone set can communicate with each other.
Finance can access storage systems B and C but not storage system A. Likewise, users in Production can access storage systems A and C, but not storage system B. Figure 106 Resources in Two Zones The following figure provides an overview of zoning structure: Figure 107 Overview of Zoning Structure Zoning Structure • Zone Sets - A zone set is a collection of zones. You can have only one zone set active at a time in a fabric; however, you can have a zone in more than one zone set.
Use Table 133 on page 521 as a guideline for setting up zoning. Table 133 Setting Up Zoning Step Action Description For More Information 1 Create a zone alias Optional: Zone aliases are used to give meaningful names to switch ports, HBA ports, or storage system ports. ”Creating a Zone Alias” on page 524 2 Create zones Zoning is the primary tool to constrain groups of SAN members. A zone defines a logical SAN that contains limited element membership.
Table 134 Zoning Support Switch Type Capability View Active Zones View Inactive Zones View Aliases Zone/ Zone Set Provisioning1 Zone Set Copying Port Statistics McDATA SWAPI to EFCM2 Y Y N Y Y Y McDATA SNMP through proxy2 N N N N N Y McDATA SNMP to switches2 Y N N N N Y Cisco SNMP Y N Y N N Y Cisco SMI-S5 Y Y Y Y N Y CNT SMI-S Y Y N N N Y QLogic SNMP4 Y3 N N N N Y QLogic SMI-S4 Y Y Y Y N Y 1 The ability to create, modify, and remove zone alias
• If a zone alias for a Sun StorEdge or QLogic switch is a member of an active zone, the zone alias is not shown in the user interface, but its members are displayed as belonging to the active zone. Issues for QLogic SMI-S switches • The management server prefixes the names of zone aliases, zones, and zone sets on QLogic switches with the name of the switch. For example, assume the name qlogic1:DeviceName is displayed in the Name column.
2. In the right pane, click the SAN Zoning tab. 3. Click the Provision button for the fabric on which you want to do provisioning. 4. Click Step 1 Zone Alias. This page lists the zone aliases and their ports under the following columns: • Name - Click the name of the zone alias to view its properties. • Ports - In some instance, you may be able to click the link of a port to view its properties. • Active - A check mark appears in the Active column if the zone alias is included in an active zone set.
Zone Naming Conventions The following naming conventions apply to zones, zone sets, and zone aliases: Naming Conventions for Brocade Switches: • Names can have a maximum of 64 characters. • Names must begin with a letter. Any character other than the first character can be a letter, a number (0 to 9), or an underscore (_). • Names are case-sensitive. For example, Zone1 and zone1 are considered to be different zones. • You cannot create a zone with the same name as an existing zone, zone alias or zone set.
NOTE: To select all of the ports, select the check box next to the Port heading. 7. Click OK. Deleting a Zone Alias You cannot delete a zone alias if it is the only member in a zone. To delete a zone alias: 1. Click Tools > Storage Essentials > Provisioning Manager in HP Systems Insight Manager. 2. In the right pane, click the SAN Zoning tab. 3. Click the Provision button for the fabric in which you want to delete a zone alias. 4. Click Step 1 Zone Alias. 5.
Qlogic1:zone_name displayed under the Name column. Qlogic1 is the name of the switch, and zone_name is the name the user assigned to the zone. • Zone Aliases - Click the name of the zone alias to view its properties. • Ports - In some instance, you may be able to click the link of a port to view its properties. • Active - A check mark appears in the Active column if the zone is included in an active zone set. • Edit - Click the Edit ( ) button to edit a zone.
• You cannot create a zone with an existing name. • A port is not in the virtual SAN if the icon is next to it. 10.Click OK. Adding and Removing Zone Members IMPORTANT: A zone must have at least one member. To add and remove zone members: 1. Click Tools > Storage Essentials > Provisioning Manager in HP Systems Insight Manager. 2. In the right pane, click the SAN Zoning tab. 3. Click the Provision button for the fabric in which you want to modify a zone. 4. Click Step 2 Zone. 5.
• For more information about which zoning features are supported for your switches, see Table 134 on page 521. • Cisco SMI-S Switch Connections only: Active zone sets are listed multiple times for each switch in the virtual SAN. When a zone set is activated, the zone set is copied to each switch in the virtual SAN. The zone set is then listed twice (active and non-active versions) for each switch. To access information about zone sets and to be able to manage them: 1.
1. Click Tools > Storage Essentials > Provisioning Manager in HP Systems Insight Manager. 2. In the right pane, click the SAN Zoning tab. 3. Click the Provision button for the fabric in which you want to create a zone set. 4. Click Step 3 Zone Set. 5. Cisco SMI-S Switch Connections only: Select the virtual SAN in which you want to view zone sets from the VSAN menu. 6. Click New Zone Set. 7.
8. Click OK. Deleting a Zone Set The software does not display all elements in a zone set, such as quick loop and fabric assist elements. When you delete a zone set, all elements, including quick loop and fabric assist, which are not viewable in the software, are deleted. Only the zone set is deleted, not the zones contained in the zone set. For example, assume Zone A is contained in two zone sets: one named Zone_Set_One and another named Zone_Set_Two.
IMPORTANT: This feature is supported only for switches that support zone set copying. Refer to Table 134 on page 521 for information on which switches support zone set copying. Aliases in the zone set are not copied over for McDATA switches. To copy a zone set: 1. Click Tools > Storage Essentials > Provisioning Manager in HP Systems Insight Manager. 2. In the right pane, click the SAN Zoning tab. 3. Click the Provision button for the fabric in which you want to copy a zone set. 4. Click Step 3 Zone Set. 5.
b. Optional: In the Name box, modify the name that has been assigned to the backup zone set. The management server assigns the name by appending the date and time of the zone set you have selected to become active, as shown in the following example: zone_name_2005-05-17_13-41-05 where • zone_name is the name of the zone you are making active. • 2005-05-17 is the date you made the zone active in the format yyyy-mm-dd. In the example, the date is May 17, 2005.
If a user activates ZoneSetB, the existing information in ZoneSetB is copied to the switch and activated. The Zoning Library, however, still contains the older information.
1. Select Options > Storage Essentials > Manage Product Health, and then click Advanced in the Disk Space tree. 2. Click Show Default Properties at the bottom of the page. 3. Copy the following command. How you copy the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, select the text and then right-click the selected text. Then select Copy. cimom.cisco.displayZoneDatabase=primary 4.
Managing Storage This section contains the following topics: • Setting Up Storage Partitioning, page 536 • Modifying the Cache Settings (LSI and Sun 6130), page 541 • Changing the Owner of a Volume (LSI, CLARiiON and Sun 6130), page 542 • Managing Storage Pools, page 542 • Managing Volumes, page 544 • Rules for Creating Host Security Groups, page 551 • Managing Host Security Groups, page 556 • General Provisioning Issues, page 563 • Provisioning Issues by Vendor, page 563 Setting Up Storage Partitioning Ea
Table 135 Provisioning and Pool Support (continued) Storage System Storage Provisioning Create/Dele te Pool Create Pool Using Settings1 Additional Information HP MSA Y N N Selective Storage Presentation (SSP) for the array must be enabled for provisioning to work.
Table 136 Volume and Host Security Group Support (continued) Storage System Create/ Delete Volume Create Volume Using Settings1 Create/ Delete Meta Volume Host Security Group Provisioning Supported Additional Information CLARiiON Y Y Y Y RAID level can be specified for first volume in a pool, subsequent volumes inherit this setting.
Table 136 Volume and Host Security Group Support (continued) Storage System Create/ Delete Volume Create Volume Using Settings1 Create/ Delete Meta Volume Host Security Group Provisioning Supported Additional Information HP MSA Y N N Y IBM DS Y N N Y See ”Additional Information About IBM DSS and IBM ESS” on page 540 IBM ESS Y N N Y Volumes created on IBM storage systems cannot be deleted.
Additional Information About CLARiiON Storage Systems The EMC Navisphere® CLI is required to communicate with the CLARiiON storage system. The CLARiiON storage system must be configured to recognized the management server as a privileged user. For more information, see ”EMC Navisphere CLI Is Required” on page 564. Additional Information About HP EVA Arrays • To determine provisioning support for HP StorageWorks Arrays, see Table 135 on page 536 and Table 136 on page 537.
• Issues Specific to LSI Storage Systems, page 569 How to Set Up Storage Partitioning To set up storage partitioning: 1. LSI, CLARiiON, Sun 6130 and Sun 35xx only: Create a storage pool (sometimes referred to as a volume group or RAID group). For more information about storage pools, see ”About Storage Pools” on page 541 2. Create a volume. For more information about volumes, especially in CLARiiON storage systems, see ”About Volumes” on page 541. 3. Create a host security group.
1. Click the Edit ( ) button for the volume you want to modify. 2. Enter the cache read ahead multiplier (0 to 65535 bytes) in the Cache read-ahead multiplier box. A cache read ahead multiplier copies additional data blocks into the cache while it is reading and copying host-requested data blocks from disk to cache. To disable this option, enter 0. 3. Optional: Select Read Caching. Use this option to store the host's operations in controller cache memory. 4. Optional: Select Write Caching.
Creating a Storage Pool (LSI, CLARiiON, Sun 6130 and Sun 35xx) A storage pool is a group of disks associated together through a RAID configuration. The pool’s capabilities define the level of protection for the associated volumes and LUNs. You should create at least one storage pool before provisioning a volume. To create a storage pool: 1. Click Tools > Storage Essentials > Provisioning Manager in HP Systems Insight Manager. 2. In the right pane, click the Storage Systems tab. 3.
• Volumes - Click the name of the volume to view its properties. If the storage system has a large number of volumes, not all the volumes are displayed. To display all the volumes, select the Show All option. • Capabilities - Click the RAID level or name to view its properties. • Mainframe - Displays whether the storage pools have volumes that are on a mainframe. (Available to only HDS storage systems). • Delete - Click the Delete ( ) button for the storage pool you want to delete.
• Creating a Storage Volume, page 547 • Deleting a Storage Volume, page 550 • Changing the Cache Block Size for a Storage System (LSI and Sun 6130), page 551 • Modifying the Cache Settings (LSI and Sun 6130 Only), page 551 Accessing Information About Volumes IMPORTANT: Some storage vendors require a password to access the storage system. If the correct password is not entered, an authentication error message is displayed.
To create a volume, click the New Volume button in the upper-right corner of the page. To delete several volumes at once, select the volumes you want to delete and then click Delete Selected Volumes. NOTE: If you have an HDS storage system, see ”About Volumes on HDS Storage Systems” on page 546. 5. If the table contains more than 10 entries, the following buttons for navigating through the table are enabled: • - Move to the first page. • - Move back one page. • - Move forward one page.
to the storage system until the volume is mapped to a port. As a result, they are referred to as Groups. For example: Group:0(LDEV:0, LDEV:1) where 0 in Group:0 is the volume identifier and LDEV:0 and LDEV:1 are the LDEVs that make up this volume. After you create a storage volume on an HDS storage system, you must map the volume to a target port on the storage system, using the storage system Provisioning tool. In the tool, click Step 3, LUNs.
operations. So if you want to create a LUSE volume and then perform LUN creation on the HDS box, it is a two-step process. First, use the management server to create LUSE volumes. Then create a LUN and map a volume to a target port, by creating a host security group. For more information, see ”Creating Host Security Groups” on page 558 and ”Rules for Creating Host Security Groups” on page 551. HDS ships some of its storage systems with volumes already created.
NOTE: You can also access the Create Storage Volume wizard from the Navigation tab in System Manager. To access the wizard from the Navigation tab, click the Volumes link for a storage system, then click the New Volume button at the bottom of the screen. 3. LSI, CLARiiON, and Sun 6130 only: In the Volume Name box, enter a name for the volume. If you do not provide a name, the software assigns one. If you enter a volume name, observe the following conventions: • It cannot be more than 30 characters.
• Database - Provides a cache read ahead multiplier of 0 with a segment size of 64 KB. • Multimedia - Provides a cache read ahead multiplier of 8 with a segment size of 128 KB. • Custom - Lets you customize the cache read ahead multiplier and the segment size. NOTE: HDS only: Under the Volume Capabilities tab, keep the default selection and click Finish. Once the settings have been made, you will see a new volume called a Group Volume in the list of unmapped volumes.
7. When you are asked if you want to delete the volume, click OK. 8. To delete several storage volumes at once, select the storage volumes you want to delete and then click Delete Selected Volumes. NOTE: To select all volumes, select the check box next to the Volume heading Changing the Cache Block Size for a Storage System (LSI and Sun 6130) LSI and Sun 6130 storage systems let you change the cache block size. To change the cache block size of a storage system: 1.
11.Click OK.
NOTE: For the Volume Creation and LUN Security option in Path Provisioning, the All Ports node is not shown because volumes cannot be placed inside host security groups for All Ports. Each storage system treats host security groups differently. See the following sections for more information.
• When creating a host security group, if you provide a volume, but not an initiator, the host security group is created, but the volume is part of the Default Group, not the group you created. This occurs because until a volume is assigned to a host security group with an initiator, it is visible to all initiators and is assigned to the Default Group. To assign a volume to a specific host security group, you must add an initiator to that host security group.
Host Security Groups on HP MSA Storage Systems Keep in mind the following rules for host security groups on HP MSA storage systems. • When you create a host security group on the MSA, the host mode is set to the value defined by the smi.ProvisioningHpMsa.hostConnectionProfile property (the default is Windows). To change the value, follow the instructions in ”Customizing Properties” on page 187, and then restart the service. • You can have one initiator per host security group.
• The management server can read the names of host security groups created by the native tool. • Creation of a new host security group with an initiator that already exists in another host security group adds the volumes to the previously created host security group. • The management server displays the ports connected to the initiator you selected for creating an host security group. If the initiator is not connected to any ports, no ports are displayed.
2. In the right pane, click the Storage Systems tab. 3. Click the Provision button for the storage system for which you want to access host security group information. 4. Click Step 3 Host Security Group. To access host security groups from System Manager: 1. Double-click a storage system in System Manager. 2. Click Host Security Groups in the Navigation tab.
• - Move back one page. • - Move forward one page. • - Move to the last page. You can also create, edit and delete host security groups from this page.
NOTE: You cannot name a host security group on IBM storage systems. The host security group will be given the name of the initiator you select for the host security group. Keep in mind the following: • The name must contain the following number of characters. If you enter no characters, you are given the option of using a default name.
5. To remove an initiator from the host security group, click the Delete ( ) button. To remove multiple HBA initiators from the list, select the HBA ports you want to remove and then click Remove Selected. 6. Click Next. Step 3 - Add Volumes to the Host Security Group 1. To add a volume to the host security group, click the Add button in the upper-right corner of the window. 2. Select a volume.
NOTE: Each type of storage system handles ports for host security groups differently. For more information, see ”Rules for Creating Host Security Groups” on page 551. 3. HDS storage system: Click the Options button to the right of the Host Mode box. Select a host mode resembling the port settings for your environment and then click OK. If your host mode is not listed, enter it in the Host Mode box. 4.
• If you want to choose a unit number, deselect the Auto-Select option and enter the unit number in the Unit Number box at the top of the window. Then click Add. Click Close to exit the window. NOTE: For LSI storage systems, LUN numbers cannot be duplicated. The management server can use an existing LUN number if the access mode for the created LUN is “No Access.” CAUTION: Removing an HBA can cause hosts that are using it to lose access to their storage. This may result in the loss of data.
2. Click Show Default Properties at the bottom of the page. 3. Copy smi.ProvisioningIbmEss.hostConnectionProfile. How you copy the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, select the text, right-click the selected text, and then select Copy. 4. Return to the Advanced page (Options > Storage Essentials > Manage Product Health, and then click Advanced in the Disk Space tree). 5. Paste the copied text into the Custom Properties box.
Issues Specific to CLARiiON Storage Systems The following issues are specific to CLARiiON® storage systems: • Making the Management Server a Privileged User for CLARiiON, page 564 • EMC Navisphere CLI Is Required, page 564 Making the Management Server a Privileged User for CLARiiON Before you can provision a CLARiiON storage system, you must configure it to recognize the management server as a privileged user. This task can be completed by using NaviCli as follows: C:\>navicli -h 192.168.1.
About Provisioning on EMC Symmetrix Storage Systems EMC ships its Symmetrix storage system with volumes already created. When the software first discovers an EMC Symmetrix storage system, it assumes the devices on the Symmetrix storage system are volumes. This software refers to the term “device” to define a piece of hardware in the storage network. EMC uses the term “device” to refer to a volume on one of its storage systems. In this section, the term “device” is used in the context of EMC storage systems.
Issues Specific to HDS Storage Systems This section contains the following topics: • About Provisioning on HDS Storage Systems, page 566 • Host Security Group Names on HDS Storage Systems, page 566 • Unable to Provision When HDS CruiseControl Is Enabled, page 567 • Increasing the Wait Time for the Management Server, page 567 • Initiator Ports Cannot Be Used for Provisioning, page 568 • Mapping Issue on HDS 9900V Storage Systems, page 568 About Provisioning on HDS Storage Systems IMPORTANT: The management s
In build 5.0, the management server uses the nickname attribute when it’s available. If you want to update the host security group names on the management server so they match the nickname attribute on the devices, you can use the Host Security Group Name Upgrader tool. The tool should be run once before upgrade or before the first full sync after an upgrade.
group, but the target host security group is deleted when the first command is completed, and the second command returns an error. If you need more time for HiCommand Device Manager to respond, you can increase the amount of time the management server waits, by modifying the cimom.provider.hds.ProvisioningTimeout property. To change the provisioning timeout property: 1. Select Options > Storage Essentials > Manage Product Health, and then click Advanced in the Disk Space tree on the management server. 2.
Cannot Always Delete Selected Volume on MSA MSA volumes must be deleted in the reverse order of their creation. For example, if you have six volumes, and you want to delete the second one you created, you must delete the volumes one at a time, starting with the volume created sixth and continuing with the fifth, fourth, third, and then the second. Attempting to delete other volumes will return a generic error code 4.
NOTE: Table 138 No volume-to-LUN masking is done by default. Volume Usage Volume Capability Cache Read Ahead Multiplier Segment Size File and Default 1 64 KB Database 0 64 KB Multimedia 8 128 KB Custom 0 to 65,535 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, 256 KB IMPORTANT: The management server creates a placeholder volume when a storage pool is created. This placeholder volume is not viewable in the management server, but it might be viewable in other storage tools; do not delete it.
16 Managing Backups Depending on your license, the Backup Manager feature may not be available. See the List of Features to determine if you have access to Backup Manager. The List of Features is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). This feature is not included with HP Storage Essentials Standard Edition, but it may be purchased as an optional feature.
• Media Manager Application — A backup application functioning as a server to control the media in a backup hierarchy. A media manager application can be responsible for managing different types of hardware, such as tapes and drives. • Media Manager Host — A host that has the backup application running as the media manager application. A media manager application and its host can be discovered through the backup manager host (similar to the way that hosts are detected through a switch).
IMPORTANT: Make sure you have at least 500 MB available if you are using the host as a backup manager host in a large environment (for example, 300 clients, 25,000 sessions, and 500,000 images). 3. Schedule backup collection for your backup manager hosts as described in ”Scheduling Backup Collection for Backup Managers” on page 198 Determining if You Have Enough Media to Run a Backup If you are performing many and/or large backups, you should make sure you have enough media available for the backup.
• Allocated — The media is currently either actively being used or has a valid backup on it. • Frozen — The media will never become available for backup again, but it is still available for restores. • Suspended — The media will not be used again until all backups written to it expire. It is still available for installations however. 7. To view summary media information for selected media in a report format: a.
• Session Status — The session status: Success or Failure • Session State — The session state: Done, Queued, or Active • Media Used — The type of media used for the backup • Start Time — The starting time and date of the session • End Time — The end time and date of the session • Size — The size of the session in kilobytes (KB) • Files — The number of files. NOTE: After removing Caché and installing Cim extensions, the first session monitoring collection will collect all of the sessions for the past week.
1. Access Backup Manager by clicking Tools > Storage Essentials > Backup Manager or by clicking Tools > Storage Essentials > Home, and then clicking Backup Manager in the left pane. 2. Click the Topology tab on the right side of the window. 3. In the left pane, expand the Backup Applications node, and then select the backup manager host. 4. If necessary, expand the lower pane so you can see the tabs. 5. Click the Sessions tab.
period for the coverage and review the policy, schedule, and results for the backups executed for that period. To obtain detailed information about the backup sessions for a client: 1. Access Backup Manager by clicking Tools > Storage Essentials > Backup Manager or by clicking Tools > Storage Essentials > Home, and then clicking Backup Manager in the left pane. 2. Click the Topology tab on the right side of the window. 3. Select the client from the topology pane or from the tree in the left pane. 4.
To access the backup reports: 1. Access Reporter by clicking Reports > Storage Essentials > Manage Reports or clicking Tools > Storage Essentials > Home, and then clicking Reporter in the left pane. 2. Expand the tree in Reporter. 3. Expand the Backup Manager node. 4. Click one of the reports in the Reporter tree. 5. To e-mail the report, click E-mail Report. NOTE: Before you can e-mail a report, you must make the management server aware of the e-mail server.
About the Toolbars in Backup Manager Backup Manager has two toolbars. • The main toolbar that appears at the top of its screen. • The toolbar for charts that appears in the middle of its screen. About the Main Toolbar Table 139 on page 579 provides a brief description of the buttons and menus on the main toolbar in Backup Manager. This toolbar is available at the top of the Backup Manager screen.
Table 139 The Toolbar in Backup Manager (continued) Button Description Allows you to move an element in the topology. See ”Arranging Elements in the Topology” on page 274. Enabled when the Topology tab is active. Allows you to move the entire topology at once. Click the Pan ( ) button, click any place in the topology, and then drag the mouse to a new location. Enabled when the Topology tab is active. Opens a new window, containing the topology.
Table 139 Button The Toolbar in Backup Manager (continued) Description Change Observer button - Monitors changes in the database status on the server. When changes are detected, the button turns amber. Click on the amber button and a pop-up window displays the elements that have changed on the server. When no changes are detected, the button is greyed out Reloads the Change Observer button to display the latest changes to elements on the server.
Changing the Topology Settings The Display Layout Settings Dialog ( topology in Backup Manager: ) button allows you to modify the following properties of the • Direction — Horizontal or Vertical. The direction of the topology is Horizontal by default, with multiple elements of the same type displayed in a row. If you select Vertical, multiple elements of the same type are displayed in a column. • Alignment — Left, Right, or Center. The default alignment of the topology is Center.
2. Click Export to Visio. 3. Name the file, and then select the directory in which you want the file to be saved. 4. Click Save. The XML file is saved to the directory that you selected. For information about configuring Visio and viewing the exported file, see ”Viewing the Topology in Microsoft Visio” on page 278. Right-Click Menu Options on the Topology Tab When you right-click an element on the Topology tab or in the Backup Applications tree, a list of options is displayed.
Table 141 Right-Click Menu Options on the Topology Tab (continued) Right-Click Menu Option Description Update Element Data The management server gathers new and changed details from the element and then redraws the topology with the updated information. Important: • Do not update element data during Get Topology or Discovery Data Collection. To determine if the management server is getting the topology or all element details, look at the label near the Status button.
Table 141 Right-Click Menu Options on the Topology Tab (continued) Right-Click Menu Option Description Reachable Storage Provides information about the storage accessible from a selected host, such as: • Free volumes on current storage systems • LUNs mapped to a host, but not mounted with a file system • Free volumes on other storage systems in host fabrics • Free volumes on all other storage systems Custom Commands Allows you to run a custom command on an element; for example to start an executable
Table 142 Right-Click Menu Options on the Summary Tab (continued) Right-Click Menu Option Description Show Details The additional information about the data point you right-clicked is displayed. See Table 143 on page 586. Table 143 on page 586 explains what is displayed when you click Show Details on the Summary tab’s right-click menu option. NOTE: When additional information is not available for a data point, Show Details is disabled.
Table 144 Show Details for Tabs on the Lower Pane of the Topology Tab (continued) Right-click... Select Show Details to view... Any element on the Media Pools tab The Media tab for the elements contained in the media pool you right-clicked. About the Summary Backup Charts Backup Manager displays six summary backup charts on the Summary tab by default and offers many other charts as well.
Table 145 Backup Manager Summary Charts (continued) View Description Window Utilization Displays the number of hours it takes for all backup sessions on a server to run. Keep in mind this time may seem extended if you have overlapping sessions. For example, bsession1 starts at 11 p.m. on Monday. While it is running, bsession2 starts. At 2 a.m. on Tuesday, bsession1 stops, but bsession2 continues to run until 9 a.m. on Tuesday.
Table 146 Tabs in the Lower Pane of Backup Manager Topology Tab Element Type Description Properties All elements Provides property information for an element, including information about whether the element supports backup. Backup Clients Provides information about the last time the client was backed up. See ”Viewing Charts for a Backup Manager Host” on page 593 for more information. Charts • Backup Manager Hosts Shows a chart for the selected element.
Table 146 Tabs in the Lower Pane of Backup Manager Topology (continued) Tab Element Type Description Resources • Backup Manager Hosts Displays the resources Backup Manager monitors with the following for each server: • Media Managers • Media Pools — The number of media pools that • Tape Libraries the backup manager host can access • Available Media • Allocated • Frozen • Suspended In the Available Media, Allocated, Frozen, and Suspended columns, the first number shows the number of available online
Table 146 Tabs in the Lower Pane of Backup Manager Topology (continued) Tab Element Type Description Media • Backup Manager Hosts Displays the following information for the media attached to a backup server or tape library: • Media Managers • Media ID — The identifier for the media • Tape Libraries • Media Pool — The media pool to which the media belongs • Usage Count — How often the media is used • Retention — How long the media is retained • State — Whether the media is Full, Available, or Active
can be extremely useful. For example, if you have several clients with failed backups, you would take the following steps to sort the table to show the clients according to their status: 1. Click the Status heading in the session column to sort the sessions according to status. 2. Press the CTRL key, and then click the Client heading. The clients are sorted first according to their status and second according to their client name.
Table 147 Buttons on the Summary Settings Page Button Description Clear Clears the settings for the selected chart. Revert Returns the Summary Settings page to the previous setting. Defaults Returns the Summary Settings page to the default setting. To modify a chart displayed on the Summary tab in Backup Manager: 1. Access Backup Manager as described in ”Accessing Backup Manager” on page 574. 2. Click the icon. 3. To change the title for the summary page, enter a new title in the Title box. 4.
1. Access a backup summary chart by clicking an element on the Topology tab. 2. Scroll to the bottom of the screen. 3. Click the Print ( ) button. 4. Click Landscape at the top of the new window if you want the picture to be printed in landscape format. To revert to portrait format, click Portrait. 5. To change the magnification of the image on the printed page, select the desired percentage. 6. Click Print when you are ready to print the chart.
17 Path Provisioning Depending on your license, Path Provisioning may not be available. See the List of Features to determine if you have access to Path Provisioning. The List of Features is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). Path Provisioning is not included with HP Storage Essentials Standard Edition.
• Changes from executed jobs. After a job is executed in Path Provisioning, the Path Provisioning screen is not updated until you click Refresh or exit and re-enter Path Provisioning. • Adding a volume to an existing host security group on an EMC Symmetrix or DMX array only performs the masking operation, but it does not map the port on the array. The native tools for the array show that the masking to the host initiator took place, but the volume is still not mapped to a storage port.
• Only manageable fabrics will be displayed in the Path Provisioning. If no provisioning can be done on the fabric (any vendor) means it will not be displayed in Path Provisioning, but will be displayed in Provisioning Manager. • Path Provisioning looks for the names of the active zone set and of the active zones and all of their saved counterparts in the zoning library in EFC Manager. The provisioning job only occurs if those names match.
The status of each job is displayed in the State column of the Provision Job section located in the lower pane of the screen. A job can have one of the following statuses: • Created - The job has been created, but it will not be executed. The job cannot be viewed by others and is deleted when the Web browser is closed. See ”Scheduling Provisioning Jobs” on page 628 for information about changing the state of the job from “created” to “scheduled”.
NOTE: You can control which templates users can access. See ”Assigning a Template to a Role” on page 636 for more information. The Table 148 on page 599 provides an overview of the steps required for Path Provisioning. Table 148 Overview for Path Provisioning Step Description Where to Find Additional Information 1 Select a system action. See the topics: 2 Complete the steps.
Table 149 Feature Toolbar Button Description Change Observer button - Monitors changes in the database status on the server. When changes are detected, the button turns gold. Click the gold button and a pop-up window displays the elements that have changed on the server. When no changes are detected, the button is greyed out. Reloads the Change Observer button to display the latest changes to elements on the server. Configure Templates Lets you create and configure a System Action Template.
• If you have options still selected from a previous job, clear the options you do not want in your next job. For example, assume you created a volume, and now you want to create a new volume on the same host. Clear the Volume pane by clicking the button. • If you want to clear all the steps, except for the Step 1 (storage systems) action, select another option from the System Action combo-box.
The selected storage system’s name is displayed below the Storage System pane. The Host pane is populated. Notice in the figure below that some hosts have a red X over their icon. This means the host is not accessible.
• Loading zone data finished. The Step 2 button is disabled until data has been loaded 2. Select a host that is accessible. Keep in mind the following: • To create a provisioning job for multipathing, click the button above the Host pane, and then select the option for multipathing. When you select this option, you must select the same host for both paths. See ”Host Customize Dialog Box” on page 632 for more information. • To automatically create a zone if a zone does not meet a preset criteria: a.
key on your keyboard and selecting free LDEVS. When you select free extents, they must of the same type. For example, on Symmetrix, you cannot select a mirrored volume and a BCV (business continuous volume) to create a meta volume. For more information, see When you first discover a storage system, no free extents are displayed. This is because the management server puts all unmapped volumes into the “unmapped” category for the list of volumes by default.
• To create a zone - Select a fabric in the zone pane, click the button, and then enter a name for the zone. For more information, see ”Creating a Zone” on page 614. Table 150 Zone Icons Icon Description • Above Zone pane - Used to create zones. • In the Zone pane - Represents a zone.
• To clear the action taken in all Steps except Step 1, select another option from the System Action combo-box. • HDS only: Before you can create a volume, you must delete some unmapped LDEVs using the standard provisioning tool. To delete LDEVs: a. Click Tools > Storage Essentials > Provisioning Manager. b. Click the Storage Systems tab, then the Provision button for the storage system. c. Click Step 2 Volume. d.
When you first discover a storage system, no free extents are displayed. This is because the management server puts all unmapped volumes into the “unmapped” category for the list of volumes by default. To move a volume to the free extent node, delete the unmapped volume. When the volume is deleted, it is moved to the free extents node. The free extents category is used internally by the management server. See ”Deleting a Storage Volume” on page 550 for more information.
2. Select the storage system on which you want to create the metavolume. NOTE: The S column heading in the Storage Systems pane means that only a single selection is allowed. 3. Click the Step 1 button below the pane. The selected storage system’s name is displayed below the Storage System pane. The Host pane is populated. Notice in ”Selecting a Storage System” on page 608 that some hosts have a red X over their icon. This means the host is not accessible.
• If you select hosts and storage ports that are not contained in an existing zone alias, the new hosts and storage ports are added into the existing zone alias after the provisioning job finishes successfully. 1. Wait for all data to be loaded. All data has been loaded when you see the following messages: • Host data Loaded. • Loading volume data finished. • Loading HSG data finished. The Step 2 button is disabled until data has been loaded 2.
IMPORTANT: Make sure the added host is physically connected to the network before the scheduled job runs. 1. Click the button. 2. Enter a name for the host in the Host Name box. 3. Enter a port name of the host in the Port WWN box. 4. Click the Add button. 5. Repeat Steps 2 and 3 for multiple ports. 6. When you are done with your changes, click OK. The host is added to the list of hosts. 7. Physically connect the host to the network before the job runs. Step 3 - Select a Volume To select a volume: 1.
Keep in mind the following: • You can narrow the type of volumes displayed in the Volumes pane by using the Customize Volume Options dialog box ( Dialog Box” on page 632. NOTE: ), located above the Volumes pane. See ”Host Customize The Customize Volume Options dialog box is not available for the HP EVA. • If the LUN has already been selected and Step 4 is clicked, skip this step or click the button. Step 4 - Select a Host Security Group 1. Select a host security group.
NOTE: The S column heading in the Storage Systems pane means that only a single selection is allowed. 3. Click the Step 1 button below the pane. The selected storage system’s name is displayed below the Storage System pane. The Host pane becomes populated. Notice in the following pane that some hosts have a red X over their icon. This means the host is not accessible.
1. Wait for all data to be loaded. When all data has been loaded, the following messages are displayed.: • Host data Loaded. • Loading HSG data finished. • Loading zone data finished. The Step 2 button is disabled until data has been loaded. 2. Select a host that is accessible. Keep in mind the following: • To create a provisioning job for multipathing, click the button above the Host pane, and then select the option for multipathing.
Step 3 - Select a Zone NOTE: If the zone has already been selected and Step 5 is clicked, skip this step or click the button to clear the selection. If a zone has not been selected or created yet, most likely the option Automatically Configure Zoning is not selected in the Customize Zone Options dialog box ( ). The management server assumes you want to select a pre-existing zone or create one manually.
• If you want the job to execute now, click the Execute Job ( ) button • If you want the job to execute at a later time, schedule the job as described in the topic, ”Scheduling Provisioning Jobs” on page 628. Volume Creation and LUN Security Keep in mind the following: • If you have options still selected from a previous job, clear the options you do not want in your next job. For example, assume you created a volume. Now you want to create a new volume on the same host used previously.
The selected storage system’s name is displayed below the Storage System pane. Figure 112 Selecting a Storage System Step 2 - Select a Volume To select a volume: 1. In the Volume pane select mapped and unmapped volumes. You can select multiple volumes on Windows computers by pressing the Ctrl key as you select the volumes. • Mapped - There are two types of mapped volumes: • Masked - The volume is exposed to the storage port and to the host.
type. For example, on Symmetrix, you cannot select a mirrored volume and a BCV (business continuous volume) to create a meta volume. When you first discover a storage system, no free extents are displayed. This is because the management server puts all unmapped volumes into the “unmapped” category for the list of volumes by default. To move a volume to the free extent node, delete the unmapped volume. When the volume is deleted, it is moved to the free extents node.
• If you have options still selected from a previous job, clear the options you do not want in your next job. For example, assume you created a volume. Now you want to create a new volume on the same host used previously. Clear the Volume pane. To clear a pane, click the button. • If you want to clear all the steps, except for the Step 1 (storage systems), select another option from the System Action combo-box. • This template does not create volumes nor associate the volumes to HSG.
The selected storage system’s name is displayed below the Storage System pane. The Host pane is populated. Notice in the following pane that some hosts have a red X over their icon. This means the host is not accessible.
The Step 2 button is disabled until data has been loaded 2. Take one of the following actions: • Select a host that is accessible. • Add a host that is not currently connected to the network by clicking the ”Adding a Host” on page 609. button. See Keep in mind the following: • To create a provisioning job for multipathing, click the button above the Host pane, and then select the option for multipathing. When you select this option, you must select the same host for both paths.
5. Repeat Steps 2 and 3 for multiple ports. 6. If you want to remove the host, click the button. 7. When you are done with your changes, click OK. The host is added to the list of hosts. 8. Physically connect the host to the network before the job runs. Step 3 - Select a Host Security Group 1. Select a host security group. See ”Creating a Host Security Group” on page 627 for information on how to create a host security group.
IMPORTANT: (McDATA switches only) Path Provisioning looks for the names of the active zone set and of the active zones and verifies that all of their saved counterparts are matched in the zoning library in EFC Manager. The provisioning job only occurs if those names match. Creating a Zone To create a zone: 1. Select a fabric in the zone pane. 2. Click the button located above the Zone pane. 3. Enter a zone name in the dialog box. For naming conventions, see ”Naming Conventions” on page 630. 4. Click OK.
You can assign a volume to existing host security groups, as described in the following steps. 1. Click Tools > Storage Essentials > Provisioning Manager. 2. In the right pane, click Start Here on the Path Provisioning tab. 3. Select the following from the System Action combo-box: Volume Assignment Step 1 - Select Storage System 1. Wait for the management server to load the storage systems into the Storage System panel. 2. Select a storage system on which you want to create the metavolume.
Step 2 - Select a Volume To select a volume: 1. In the Volume pane select mapped and unmapped volumes. You can select multiple volumes on Windows computers by pressing the Ctrl key as you select the volumes. • Mapped - There are two types of mapped volumes: • Masked - The volume is exposed to the storage port and to the host. • Unmasked - The volume is exposed to the storage port, but not to the host. • Unmapped – The volume is not exposed to the storage port.
Step 3 - Select a Host Security Group 1. Select a host security group in the LUN pane. See ”Creating a Host Security Group” on page 627 for information on how to create a host security group. See ”General Provisioning Issues” on page 563 for information on how your storage system handles host security groups. 2. Click Step 4. 3. Click Create Job. The job is added to the bottom pane. 4.
2. In the right pane, click Start Here on the Path Provisioning tab. 3. Click the Configure Templates button at the top of the screen. 4. Click the New Template button in the Provisioning Template Configuration dialog box. 5. If you want to change the name that was assigned to the new template, enter the name you want for the template in the Template Name box, and then click Apply. 6. Select a master template on which you want to base your new template.
6. Click Apply. 7. When you are done, take one of the following actions: • Click Apply if you want to apply your changes and keep the Provisioning Template Configuration dialog box open. • Click OK if you want to apply your changes and leave the Provisioning Template Configuration dialog box. • Click Cancel if you want to leave the Provisioning Template dialog box without saving your changes. You will lose your changes unless you had previously clicked Apply.
3. Select a host in the Host pane. 4. Click Step 2. 5. Select a port in the LUN pane. 6. Click at the top of the LUN pane. 7. When you are asked to provide a name for the new host security group, enter a unique name. NOTE: For Symmetrix storage systems, you are not asked for the name of the host security group. Keep in mind the following: • The name must contain 1 to 50 characters. If you enter no characters, you are given the option of using a default name.
To schedule a provisioning job: 1. Click the Create Job button in the lower pane. The job is assigned the “created” status. The job, however, is not executed. Keep in mind the following: • When you close the Web browser window, all jobs with a status of “created” are erased. • Other users cannot see a job with a status of “created”. • Change the schedule of job only if its status is “created”.
Executing Provisioning Jobs If you want to save and execute a job, you must click the Execute Job ( ) button. When you click that button, the job is saved on the management server. Other users can now see the job. When the management server is determining which job to perform first, it looks first for jobs requiring volume and/or zone creation. It does not perform the jobs in the order suggested by the Provision Job ID nor in the order of the jobs appearing in the Provision Jobs table.
• The name is case sensitive. For example, “Zone1” and “zone1” are different zones. • You cannot create a zone with the same name as an existing zone, zone alias or zone set. For example, if you create a zone named “new”, you cannot give a zone, zone alias, or zone set the same name. • The following characters are invalid for Brocade switches: caret (^), dash (-), and dollar sign ($). Naming Conventions for McDATA and Connectrix Switches: • The name can have a maximum of 64 characters.
To narrow the types of volumes displayed in the Volume pan, set the Customize Volume Options dialog box. The Customize Volume Options dialog box is not available for the HP EVA.
Customize Volume Options Dialog Box NOTE: The Customize Volume Options dialog box is not available for the HP EVA. 1. If you want to view all volumes, select the Show All Volumes option and then, if desired, select the Show All Volumes option. Youthen have the option to select the Hide mapped volumes option. 2. Select one of the following options for metavolumes: • Concatenating - Only concatenating metavolumes are displayed. • Striped - Only striped metavolumes are displayed.
identical zone contains only the same HBA and storage system ports you selected. If the zone contains additional members, it is not considered to be identical. • If an identical zone exists, it is selected in the Zone pane. • If an identical zone does not exist, the management server asks you to provide a name for the zone that will be created. The new zone appears in the Zone pane, even though it is not created until the job runs.
4. Select a storage system, and click Step 1. 5. Select a host, and click Step 2. One of the following occurs: • If the management server cannot find a zone that meets the criteria set in Step 3, it asks for a zone name. • If the management server finds a zone that meets the criteria set in Step 3, it selects the zone in the Zone pane. 6. If you are asked for a zone name, enter the zone name and then click OK. See ”Naming Conventions” on page 630 for restrictions on naming zones.
Assigning a Template to a Role You can assign templates to a role to restrict a user’s access to all templates. For example, you could specify that only users with administrator privileges can access the Volume Assignment template. IMPORTANT: You must belong to a role that has “Provisioning Administration” privileges to be able to assign templates to a role. The domain administrator and storage sdministrators roles have these privileges by default.
18 Chargeback Manager Depending on your license, Chargeback Manager may not be available. See the List of Features to determine if you have access to Chargeback Manager. The List of Features is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). Chargeback Manager is not included with HP Storage Essentials Standard Edition.
First set up your chargeback as described in the topic, ”Setting Up Chargeback Manager” on page 638. When you are done with adding your chargeback information, you can view chargeback as follows: • By element - Displays chargeback for a single element. See ”Viewing Chargeback by Element” on page 662 for more information. • By department - Displays chargeback for a department. See ”Viewing Chargeback by Department” on page 662 for more information. • By owner - Displays chargeback for an owner.
Table 154 Setting Up Chargeback Manager Step Description Where to Find More Info 1 Create an asset record if it does not exist. You can use Chargeback Manager for applications and hardware that the management server does not detect. Just create an asset record for each element. ”Creating an Asset Record” on page 639 2 Set the status of the asset. ”Changing the Status of an Element” on page 640 3 Optional: Add asset information for asset management.
the management server cannot obtain detailed information about the element. If you create a record for an application, that application is treated as a virtual application. IMPORTANT: You can easily remove an element's record by clicking the Delete ( ) button. When you remove an element's record, the management server no longer monitors that element. See ”Deleting Discovered Elements” on page 79 for more information. To create a record: 1.
• In Use - The element is running. The status settings are set manually. For example, if the status of an element changes from In Use to Repaired, you must change this status manually. Refer to the Topology and Event Manager for the latest status of an element. 3. To change the status of multiple elements at once: a. Select the elements you want to modify. b. Click Set Status. c. From the Asset Status menu, select the new status for the elements you selected. d. Click OK.
Table 155 Element Type Icons Graphic Element Type Application Host Switch Storage System 1. To remove an asset record, click the Delete ( remove.
Creating a New Storage Tier You can create you own storage tiers (up to a maximum of 64). Follow these steps to create a new storage tier: 1. Access Chargeback Manager, as described in ”Accessing Chargeback Manager” on page 639. 2. Click the Ownership tab in the right pane. 3. Click the Chargeback Method menu, and select Storage-based. 4. Click Set Storage Tier Cost. The Storage Tiers window is displayed. 5. Click Create New Storage Tier. 6.
Removing Elements from a Storage Tier Follow these steps to remove elements from a storage tier: 1. Access the Add or Remove Storage Elements from Tier window, as described in ”Adding Elements to a Storage Tier” on page 643. 2. In the Assets for Tier section, select the elements you would like to remove from the storage tier. 3. Click Remove Selected Elements from Storage Tier. The selected elements are removed from the storage tier. 4. Click OK. You will be returned to the Storage Tiers window.
Adding Asset Information Chargeback Manager provides a handy way for you to keep track of your asset information for an element. In addition to warranty and licensing information, you can also store contact information for the element. For example, assume a switch on the network is having some problems, and you want to contact the person in charge of that switch. You can use the element's asset record to find not only the contact information for that switch, but also the location of that switch.
NOTE: This page enforces the maximum number of characters you can enter in a box. When you can no longer add additional characters to a box, you have reached the maximum number of characters that can be entered for that box. • Custom Name - A name you assign to the element. See ”Assigning a Custom Name” on page 310 for more information. • Date Created - The date the element was discovered. • Date Last Modified - The date the record was last modified. • Description - A description of the element.
• Staff #2 Name - The name of an additional person who maintains the element. • Staff #2 Phone Number - A phone number for an additional person who maintains the element. • Staff #2 Department - An additional department that maintains the element. • Staff #2 E-Mail - An e-mail address of an additional person who maintains the element. Adding Geographic Information Use this page to add geographic information about the element.
Managing Departments This section contains the following topics: • Adding Departments, page 648 • Editing a Department, page 648 • Removing a Department from Chargeback Manager, page 648 Adding Departments Before you can assign a department to an element, you must add it to the list of departments, as described in the following steps. To add a department: 1. Access Chargeback Manager, as described in ”Accessing Chargeback Manager” on page 639. 2. Click the Departments tab above the table. 3. Click New. 4.
For example, assume you want to delete a department called TooSmall. The TooSmall department owns 50 percent of a host and the Server department owns 50 percent of the host. When you remove TooSmall, the host is owned by the Server department, but only by 50 percent. To remove a department from the list: 1. Access Chargeback Manager, as described in ”Accessing Chargeback Manager” on page 639. 2. Click the Departments tab above the table. 3.
• Setting Up Asset-Based Chargeback Manager, page 650 • Setting Up Storage-Based Chargeback Manager, page 653 • Editing Percentage of Ownership, page 655 • Removing Department Ownership of an Element, page 656 • How Capacity Differs in Chargeback Manager and Capacity Manager, page 656 • How a Depreciation Method Is Calculated, page 657 Setting Up Asset-Based Chargeback Manager Asset-based chargeback calculates chargeback based on the departmental ownership percentages and the depreciated value of the asset
Step 1 - Specify Financial information 1. Verify that the option Step 1 - Specify Financial information is selected at the top of the page. 2. Provide the following financial information: • Purchase Order Number - The purchase order of the element. • Required: Date Purchased - The date the element was purchased. To select the date, click the calendar icon, . If you select a future date, the purchase date is set to today when calculating depreciation.
1. Select the option Step 2 - Assign Departmental Ownership Percentage at the top of the page. 2. Click Add Ownership. 3. Select a department from the Department menu. 4. Enter the percentage of ownership in the Ownership % box. If you do not see a department listed, add it to the list as described in the topic, ”Adding Departments” on page 648. Click the Manage Departments link. After you have added the department, close the window you used to add the department and then refresh the page. 5. Click OK.
IMPORTANT: The infrastructure cost is not included in ownership cost because the information displayed on this page is per asset. The asset-based infrastructure cost is a monthly charge that is applied to each departmental owner in addition to any ownership charges. The infrastructure cost is not included when you view the chargeback for individual elements; however, the infrastructure cost is added to the Total Cost/Month value in the Asset-based Chargeback report.
NOTE: You can also access the tree from Application Viewer and System Manager. • To access the tree from Application Viewer, click the name of an application in the Application Viewer tree. In the right pane, click the Asset Management tab. • To access the tree from System Manager, double-click an element in the topology. In the right pane, click the Asset Management tab. Step 1 - Assign Departmental Ownership Percentage 1.
Step 3 - Review Storage Dependency and Cost IMPORTANT: The management server displays chargeback information up to the end of the previous month. For example, assume you view chargeback information in the middle of February. The calculations for chargeback would include the month of January, but not February. Click the Storage/volume dependency and cost details link to view the details.
6. In the Ownership % box, enter a new percentage of ownership. 7. Click Save Changes. Removing Department Ownership of an Element Sometimes you may need to remove ownership from an element, for example, when an element being moved from one department to another. When department ownership is removed from an element, the department is still accessible from the list of departments.
MB to gigabytes (0.887 GB) and round the output (0.89 GB), the capacity in Capacity Manager matches the number in Chargeback Manager.
Example: Using the examples from the previous two steps, the delta is 12 months (January 1, 2003 through December 31, 2003). 4. It subtracts the salvage value from the purchase price. This is the depreciable amount. Example: Assume the purchase price for the element is $2500, and the Salvage Value is $100. The depreciable amount is $2400, which was calculated by subtracting the Salvage Value ($100) from the purchase price ($2500). 5.
3. The management server takes the user-specified depreciation period and use it as the life of the asset. Example: Let's assume the depreciation period is 24 months and that it is also the life of the asset. 4. The management server calculates the declining ratio using this formula: (1.0 / life). This determines the rate at which depreciation should occur each month. Example: Use the example from step 3 (24 months) in the following formula to find the rate of depreciate per month: 1.
Step 5a - Assume the asset value of the element is $2395. Calculate the "would-be" depreciation of the month by multiplying the asset value by the declining ratio from Step 4 (0.042): $2395 x .042 = $100.59 Step 5b - Assume the salvage value is $100. Determine if the asset value after depreciation is less than the salvage value by using the following formula: Asset value of the month ($2395) - Depreciation for the month ($100.59) = $2294.41 Since the $2294.
Example: Use the example from step 4 (24 months) in the following formula to find the rate of depreciation per month: (1.0/24)*2 The depreciation ratio is 0.084. 6. For each month identified by delta from Step 3, the management server calculates the following: The example for the following steps can be found at the end of these instructions. a. Determine the “would-be” depreciation for the month. This means multiplying the asset value for the month by the declining ratio from step 5. b.
Step 6b - Assume the salvage value is $100. Determine if the asset value after depreciation is less than the salvage value by using the following formula: Asset value of the month ($2290) - Depreciation for the month ($192.36) = $2097.64 Since the $2097.64 (the depreciated asset value) is greater than the salvage value ($100), the asset value for the month is $2097.64. Go to Step 6c.
Viewing Chargeback by Department You can determine how much a department is being charged for equipment use by viewing chargeback by department. This feature lets you view the monthly costs associated with using hardware and applications. IMPORTANT: The management server displays chargeback information up to the end of the previous month. For example, assume you view chargeback information in the middle of February. The calculations for chargeback would include the month of January, but not February.
Viewing Chargeback by Owner You can view chargeback for all elements by using the Ownership tab. The Ownership tab shows the ownership distribution across different departments and helps you to quickly identify the assets without a department owner. To view chargeback by owner: 1. Access Chargeback Manager. 2. Click the Ownership tab in the right pane. 3. Select one of the following from the Chargeback Method menu: • Asset-based - Displays chargeback information for assets.
Chargeback Reports This section contains the following topics: • Viewing Chargeback Reports, page 665 • E-mailing a Chargeback Report, page 665 • Managing E-mail Schedules for Chargeback Reports, page 666 Viewing Chargeback Reports You can access chargeback reports in either of two ways: • From Chargeback Manager • From Reporter Keep in mind the following: • To populate chargeback reports, enter information for chargeback, as described in the topic, ”Setting Up Chargeback Manager” on page 638.
4. To view the report in a new window, select the Open in new window option, and then click Run Report. E-mailing a Chargeback Report You can e-mail a chargeback report in PDF, XML, or Microsoft Excel format. If you want to e-mail reports by on a regular basis, set up an e-mail schedule for the report, as described in ”Adding an E-mail Schedule for a Chargeback Report” on page 666.
• Viewing the History of an E-mail Chargeback Schedule, page 671 Adding an E-mail Schedule for a Chargeback Report You can add an e-mail schedule so that a user receives an attached report on a regular basis. The report can be in the form a PDF, XML, or Microsoft Excel document. Keep in mind the following: • Before you can add an e-mail schedule, you must set up e-mail notification, as described in the topic, ”Setting Up E-mail Notification” on page 178.
If you are e-mailing reports in bulk, you might want to let users know the e-mail is being sent by an automated process. You might also want to provide an e-mail address for users to provide feedback, for example: This e-mail and its attached report are generated automatically. If you would like to change how often the report is sent to you or you want to be taken off the list, please contact username@companyname.com. 9.
Editing an E-mail Schedule for a Chargeback Report IMPORTANT: Only the e-mail schedules created by the current user are listed. To view the e-mail schedules for all reports, click Reports > Storage Essentials > Report Configuration in HP Systems Insight Manager in the upper-right corner of the screen, and then click the Scheduled Deliveries tab at the top of the screen. To edit an e-mail schedule for a report: 1. Access Chargeback Manager, as described in ”Accessing Chargeback Manager” on page 639. 2.
Deleting E-mail Schedules for a Chargeback Report IMPORTANT: Only the e-mail schedules created by the current user are listed. To view the e-mail schedules for all reports, select Reports > Storage Essentials > Report Configuration in HP Systems Insight Manager in the upper-right corner of the screen, and then click the Scheduled Deliveries tab at the top of the screen. To delete an e-mail schedule: 1. Access Chargeback Manager, as described in ”Accessing Chargeback Manager” on page 639. 2.
Information about the e-mail schedules for that report are displayed, as described in Table 156 on page 670. Table 156 Viewing E-mail Schedules for a Chargeback Report Column Name Description Recipient The person who receives the report. Subject The subject of the e-mail, brief summary of what it is about. Format The format of the report sent: • PDF • Microsoft EXCEL • XML Last Delivered The time the last report was sent to the recipient.
4. When the report is displayed in the right pane, click the Scheduled Deliveries tab in the right pane. 5. Under the History column, click View. You are shown when the report was sent. 6. To remove a historical entry, click the Delete ( ) button.
ready for your changes to take effect. Chargeback Manager displays only the elements you specified in your filter. Table 157 Element Types Element Type Description Applications Displays only applications, such as Microsoft Exchange and Oracle. Host Displays only hosts. Switch Displays only switches. Storage System Displays only storage systems. All Lists all elements.
ready for your changes to take effect. Chargeback Manager displays only the elements you specified in your filter. Customizing the Asset Status Filter for Chargeback Manager You can filter multiple assets by clicking the Customize button next to the Show Status menu in Chargeback Manager. For example, you can specify you want only assets that are missing displayed in Chargeback Manager. To select more than one asset for filtering: 1.
19 Business Tools Depending on your license, Business Tools may not be available. See the List of Features to determine if you have access to Business Tools. The List of Features is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). Business Tools is not included with HP Storage Essentials Standard Edition.
Only Discovery Data Collection removes elements that are no longer there from the user interface. For example, removed ports could appear in Port Details but not in the topology for the host if you refresh the element, instead of Discovery Data Collection. • All discovered elements are accessible in Business Tools, regardless of a user's restrictions. For example, assume your account belongs to an organization that has only hosts as members.
Installing New HBA with Old HBA To install the new HBA with the old HBA: 1. Install the new HBA with the old HBA. 2. Run Discovery Data Collection. 3. Run the HBA Replacement Automator (Tools > Storage Essentials > Business Tools). 4. When you run the Automator, select the WWNs of the new and old HBA. Installing New HBA by Itself To install the new HBA by itself: 1. Write down the WWN of the HBA you want to replace. You can find the WWN name of the HBA by doing the following: a.
Let's expand that analysis to verifying that those HBA's also have a certain driver version and a certain firmware level, as shown in the following example profile: any the the the the profile name 'OS' field = Solaris 'Model' field = LP-9000 'DriverVersion' field = whatever 'FirmwareVersion' field = whatever IMPORTANT: The use of special characters in the field values are interpreted as regular expressions (or wildcards) by the search.
• 1002 is the element ID. Comparing a Previous Configuration by Using Global Change Management NOTE: Global Change Management requires you to provide the name of the current configuration the first time you run the tool. Global Change Management then assigns the saved configuration name to a number. To compare a previous configuration, enter the number corresponding with the previous saved configuration. While the script is determining the changes, it lists the elements it is analyzing.
it is done, it lists the changes under the heading CHANGED PROPERTIES on the screen.The following sample output displays the analyzed elements and the properties that have changed: ---------------------------------------------------------------------Global Configuration Change Manager (c) Copyright 2002-2006 Hewlett-Packard Development Company, L.P. All rights reserved.
Host _1750... Host _1739... Switch clbrocade3... Host _1732... Host COLO-WINHOST2... Host _1717... StorageSystem Emulex LP8000 FV3.93A0 Dv5-2.30a2 COLO-WINUTIL... Host _1708...
NEW DiskPartition Disk #6, Partition #2 NEW DiskDrive 6005076303ffc640000000000000110f:c0t1d4p4 NEW DiskDrive 6005076303ffc640000000000000110b:c0t0d0p3 NEW DiskDrive 6005076303ffc6400000000000001110:c0t0d5p3 NEW DiskDrive 6005076303ffc640000000000000110b:c0t1d0p3 NEW LogicalDisk I: NEW LogicalDisk G: NEW HostTargetMapping_1030 NEW LogicalDisk H: NEW HostTargetMapping_1028 NEW LogicalDisk E: NEW HostTargetMapping_1041 NEW HostTargetMapping_1047 NEW DiskPartition Disk #6, Partition #1 NEW LogicalDisk N: NEW D
NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW LogicalDisk M: HostTargetMapping_1025 HostTargetMapping_1042 DiskPartition Disk #2, Partition #0 HostTargetMapping_1037 DiskDrive 6005076303ffc640000000000000110b:c0t1d0p4 DiskDrive 6005076303ffc6400000000000001110:c0t0d5p4 DiskDrive 6005076303ffc640000000000000110c:c0t1d1p4 HostTargetMapping_1029 DiskDrive 6005076303ffc640000000000000110d:c0t1d2p3 HostTargetMapping_1033 DiskPartition Disk #2, Partition #2 ----------------------------------------------------
684 Business Tools
20 Troubleshooting HP Storage Essentials Standard Edition supports a subset of the devices supported by Enterprise Edition. See the HP Storage Essentials Standard Edition Support Matrix for a list of supported devices. The support matrix is accessible from the Documentation Center (Help > Documentation Center in Storage Essentials). This chapter contains the following topics: • Troubleshooting Installation/Upgrade, page 685 • Configuring the Java Console, page 691 • java.lang.
• Increasing the time-out for the HP SIM Connector, page 689 • Storage Essentials Menus Are Not Shown in HP SIM, page 690 • NoSuchElement Error, page 690 • Difficulty Displaying Storage Essentials Pages After Generating a Custom Certificate, page 690 • Troubleshooting the Oracle Database (Windows), page 690 If Your Installation or Upgrade Failed, Capture the Logs (Windows management servers only) You can quickly gather system information and log files for troubleshooting by running the srmCapture.
Checking Installation Log Files • The following log files are generated by the installer and can be found on the management server in the following directories: C:\srmInstallLogs includes these log files: • srmInstall.log — This is the master log file of the installation wizard session. It provides information for troubleshooting installation of the management server and related components. • srmInstallOracle10g.log — Log file that provides information about the Oracle 10g database installation.
“SEVERE: OUI-10029...” Message The installation wizard lets you specify an installation location for Oracle 10g. If you specify a location that is being used by another program or if you specify the Oracle DVD drive, Oracle displays the following message: SEVERE: OUI-10029: You have specified a non-empty directory to install this product. It is recommended to specify either an empty or a non-existent directory.
1. Enter the following at the command prompt, where mycomputer is the shortened DNS name of the machine: nslookup mycomputer The fully qualified domain name and IP address is displayed, as shown in the following example: Server: server.yourcompany.net Address: 192.168.135.52 Name: mycomputer.domain.my.net Address: 192.92.12.131 2. Open the following file in a text editor, such as Microsoft Notepad: C:\windows\srmwiz.ini 3. Assign the fully qualified domain name to the FQDN property in the srmwiz.
management-server-domain\administrator true false MINUTES Set MINUTES to an appropriate value for your system (like 30, 60, or 90) based on the startup time of HP SIM.
IMPORTANT: Do not install the Oracle database separately, the management server Installation Wizard (or Unix scripts) automatically configures the Oracle database for use with the management server. If you install the Oracle database separately, the database will not meet the configuration settings required by the management server.
1. Stop the AppStorManager service, which is the service the management server uses. NOTE: While the service is stopped, the management server cannot monitor elements and users cannot access the management server. 2. To find the corrupt log file, look in the alert_appstorm..log file, which can be found in one of the following locations: • Windows: \oracle\admin\APPIQ\bdump. • Unix systems: $ORACLE_BASE/admin/APPIQ/bdump You can verify if the redo log listed in the alert_appstorm..
Unix systems To verify the Oracle service has started, enter the following at the command prompt: # ps -ef | grep ora If the service has started, output resembling the following is displayed: /opt/oracle/product/9.2.0.1.0/bin/tnslsnr LISTENER -inherit ./appstormservice /opt/productname/ManagerData/conf/solaris-wrapper.
Permanently Changing the Port a CIM Extension Uses (UNIX Only) CIM extensions on UNIX use port 4673 by default. You can start a CIM extension on another port by entering ./start -port 1234, where 1234 is the new port. With this method, you must always remember to provide the nondefault port when starting the CIM extension. You can configure a CIM extension to remember the nondefault port, so you only need to enter ./start to start the CIM extension: 1. Go to the /opt/APPQcime/conf directory. 2.
• The “If Mentioned in cim.extension.parameters” column provides information on how you would modify the cim.extension.parameters file. See ”Permanently Changing the Port a CIM Extension Uses (UNIX Only)” on page 694. Table 158 Troubleshooting Firewalls Configuration Manual Start Parameters for CIM Extension Firewall port 4673 opened between host and management server. start Firewall port 1234 opened between host and management server. start -port 1234 If Mentioned in cim.extension.
Table 158 Troubleshooting Firewalls (continued) Configuration Manual Start Parameters for CIM Extension If Mentioned in cim.extension.parameters Step 1 Discovery and RMI Registry Port With 3 firewall ports opened on different ports respectively 1234, 5678, 9012. start -on 10.250.250.10:1234 -on 172.31.250.10: 5678 -on 192.168.250.10: 9012 -on 10.250.250.10:1234 -on 172.31.250.10: 5678 -on 192.168.250.10: 9012 10.250.250.10:12 34 OR 172.31.250.10:56 78 OR 192.168.250.
Table 158 Troubleshooting Firewalls (continued) Configuration If Mentioned in cim.extension.parameters Step 1 Discovery and RMI Registry Port With firewall start -port 1234 port 1234 opened between a host and management server. NAT environment where 10.250.250.10 subnet is translated to 172.16.10.10 when it reaches other side of the firewall. -port 1234 172.16.10.10 With 3 firewall ports opened on different ports respectively 1234, 5678, 9012.
Table 158 Troubleshooting Firewalls (continued) Configuration Manual Start Parameters for CIM Extension No DNS, never resolve. No firewall. Don't want to use root credentials. Want to discover with a non-existent user. start -credentials abcuser:passwd With 3 firewall ports opened on different ports respectively 1234, 5678, 9012. Don't want to use root credentials. Want to discover with a non existent user. start -on 10.250.250.10:1234 -on 172.31.250.10:5678 -on192.168.250.
The following example is a comma-separated string that is part of a mounted volume name. The management server cannot tell whether test and three are host names or part of the name of a remote volume. As a result, the management server does not display the volume name. VolumeName = two:/ntlocal2,two:/comma,test,three,one:/ntlocal Installing the Software Security Certificate To stop receiving a Security Alert message each time you use the HTTPS logon.
The security certificate has a valid name matching the name of the page you are trying to view. When you change the certificate, you must use the generateAppiqKeystore program to delete the original certificate, and then use the generateAppiqKeystore program to create a new certificate and to copy the new certificate to the management server. Windows To change the certificate on Windows: 1. Go to the %MGR_DIST%\Tools directory. 2.
NOTE: If you see an error message when you enter this command, a previous certificate may not have been created. You can ignore the error message. 4. To create a new certificate containing the DNS name of the management server, enter the following at the command prompt: perl generateAppIQKeyStore.pl 5. If the program is unable to detect a DNS name, enter the following at the command prompt: perl generateAppIQKeyStore.pl create mycomputername where mycomputername is the DNS name of the computer 6.
• A Discovered Sun StorEdge A5000 JBOD Does Not Display Its WWN Properly, page 714 • Unable to Monitor McDATA Switches, page 714 • Unable to Detect a Host Bus Adapter, page 714 • Navigation Tab Displays Removed Drives as Disk Drives, page 715 • Unable to Obtain Information from a CLARiiON Storage System, page 715 • Discovery Fails Too Slowly for a Nonexistent IP Address, page 715 • “CIM_ERR_FAILED” Message, page 716 • CIM_ERR_FAILED When Trying to Activate a Zone Set Using McDATA SWAPI, page 717 • Communica
• HBA (Driver Version) • Multipathing Unable to discover Emulex host bus adapters The Emulex driver does not contain the required library that is required by HP Storage Essentials. You must install Emulex HBAnywhere software so that HP Storage Essentials can discover hosts configured with HBAnywhere and hbatest can detect the Emulex host bus adapter.
The status reports for Discovery Data Collection are sent as follows: • gaedemail property is empty - The e-mail is sent to users whose roles have System Configuration selected. • gaedemail property is populated - The e-mail is sent only to users whose e-mail is assigned to the gaedemail property. 3. If you want additional users to receive the status reports for Discovery Data Collection, do the following: a.
8. To modify the time-out period, set the corresponding property for your switch in the following table to the number of millisecond you want. The default is 5000 ms. For example, to change the time-out period to 30000 ms for a McDATA switch, you would set the cimom.McData.Snmp.Timeout property to 30000, as shown in the following example: cimom.McData.Snmp.Timeout=30000 Table 159 Time-out Properties Switch Property McDATA/Connectrix discovered through SNMP cimom.McData.Snmp.Timeout Cisco cimom.
“Connection to the Database Server Failed” Error If you received an error message resembling the following after getting all element details, verify that the database instance is running: The connection to the database server failed. Check that the Oracle instance 'OIQ3 on host '192.168.1.162:1521 is running correctly and has the management software for Oracle installed correctly. Assume you received the error message listed above. You would want to verify the following: • Oracle instance OIQ3 on host 192.
Duplicate Listings/Logs for Brocade Switches in Same Fabric Duplicate listings: Targets tab If you discover more than one Brocade switch in the same fabric, the Targets tab displays duplicate listings for the Brocade switches. Each Brocade switch is listed multiple times, with the IP address of the other switches and its own. For example, assume you discovered Brocade switches QBrocade2 and QBrocade5 in the same fabric, the switches are listed twice on the Targets tab.
Element Logs Authentication Errors During Discovery During discovery, you may see SNMP authentication errors on the element you are trying to discover. The management server is probing the element with an SNMP request. If the element does not know the management server, it logs authentication errors.
set a TNS listener password, the software is not able to discover the Oracle instances serviced by the listener. Do Not Run Overlapping Discovery Schedules If you are creating multiple discovery schedules, care must be taken to avoid scheduling conflicts—concurrently scheduled Discovery tasks—and that each scheduled task has enough time to start and finish before the next Discovery task is scheduled to start.
• Unable to Detect a Host Bus Adapter, page 714 • Navigation Tab Displays Removed Drives as Disk Drives, page 715 • Unable to Obtain Information from a CLARiiON Storage System, page 715 • Discovery Fails Too Slowly for a Nonexistent IP Address, page 715 • “CIM_ERR_FAILED” Message, page 716 • Communicating with HiCommand Device Manager Over SSL, page 718 • Unable to Discover a UNIX Host Because of DNS or Routing Issues, page 718 About the Topology The software determines the topology by looking at the follo
Table 161 Troubleshooting Discovery and Discovery Data Collection (continued) Scenario Description What to do The switch was previously made aware of the host, but it can no longer contact it. Verify that the host is on and the network cables are connected to it. If the steps provided do not work, see ”Link Between a Brocade Switch and a Host Disappears from the Topology” on page 713. Try discovering the element again in HP SIM, and then run Discovery Data Collection.
Table 161 Troubleshooting Discovery and Discovery Data Collection (continued) Scenario Description What to do When discovering a Windows-based host, the correct IP address is entered, but the host does not appear in the topology. An invalid user account was entered Enter a valid user account that has administrative privileges so it can start WMI. The following can be seen on the host: • In Windows Event Manager the WinMgmt.exe process is not running. This process starts WMI.
8. Enter the host’s WWN in hexadecimal format. Multiple WWNs can be entered as a comma-separated list. For example: hostPortWWNs=00-01-C9,00-01-C8 9. Click Save. Solaris Machines Appear to Have Extra QLogic HBAs Solaris machines using Fibre Channel drives internally will always appear to have extra QLogic HBAs. After discovering a Solaris machine, internal fiber channel drives will show an extra QLogic adapter on the host adapters page. No Stitching for Brocade Switches with Firmware 3.2.
A Discovered Sun StorEdge A5000 JBOD Does Not Display Its WWN Properly Although full monitoring and management support is available only to those devices for which there is a provider, the software's topology displays other devices found on your storage area network (SAN) to give you a more complete view. However, because these devices do not have a provider, only basic information is returned.
Navigation Tab Displays Removed Drives as Disk Drives If you remove an internal disk from a Solaris host and do not enter the cfgadm command, the Navigation tab displays the empty slot as DiskDrives_XXXXX after getting element details. The cfgadmn command makes the software realize the drive has been removed. See the documentation that shipped with the Solaris operating system for more information about the cfgadm command.
9. When you are done, click Save. “CIM_ERR_FAILED” Message If you are in a McDATA environment where the EFC Manager Service Processor is managing multiple switches, it is possible that the management server will send SWAPI requests faster than the EFC Manager Service Processor can handle them. The management server may detect this as a failed connection and take corrective action.
the loss of communication, perform Discovery Data Collection to obtain the latest information from the element. 2. If the ping to EFCM fails, there is a network problem that must be resolved. Once network connectivity is restored, click the Test button to verify the McDATA provider can communicate with EFCM, then do a Discovery Data Collection. 3.
Once the connection is working, the provisioning operation should succeed. If it continues to fail because the active zone set information is out of date, run Discovery Data Collection for this element to update the zoning information. See ”Discovery Data Collection” on page 67 for more information. Communicating with HiCommand Device Manager Over SSL By default, the management server communicates with HiCommand Device Manager through a nonsecure connection.
still increase the time before the management server times out, but keep in mind that it will lengthen discovery. To increase the time-out period: 1. Select Options > Storage Essentials > Manage Product Health, and then click Advanced in the Disk Space tree. 2. Paste the following text into the Custom Properties box. cimom.cxws.agency.firstwait=200000 cimom.cxws.agency.timeout=200000 where • cimom.cxws.agency.
During the recalculation period, you may not be able to log into the application. If you are already logged into the application, navigation may not be possible until the topology recalculation is complete.
See ”Discovering Switches, Storage Systems, NAS Devices, and Tape Libraries” on page 19 for more information on how to discover a controller. Error -56 If you see error -56, the switch has network connection failures or problems. To solve the problem, make sure the switch is physically connected to the network, and then redo the task you were originally trying to complete. If you now see -21(OBJECT_NOT_FOUND) errors, the switch needs to be rediscovered.
• Known Driver Issues, page 722 • Known Device Issues, page 722 • “mailbox command 17 failure status FFF7” Message, page 725 • ”Process Has an Exclusive Lock” Message, page 725 About Swapping Host Bus Adapters Swapping brands of host bus adapters (HBA) on a Microsoft Windows 2000 host may have undesirable side effects. For example, after swapping out one brand of an HBA for another (including driver installation), WinMgmt.
Table 162 Known Device Issues Device Software Description AIX host NA If you are receiving replication errors for an AIX host, the provider may be trying to connect to the host using the 0.0.0.0 IP address instead of the real host IP address. If this situation occurs, you see a message containing the following when you start the CIM extension: CXWS 3.1.0.144 on 0.0.0.0/0.0.0.
Table 162 Known Device Issues (continued) Device Software Description SGI IRIX host CXFS file systems The management server can only monitor CXFS file systems from the host generating the input/output. For example, assume the elements are part of a CXFS file system. When you generate input/output into the metadata server into /folder, only the metadata server is able to monitor the file system.
Table 162 Known Device Issues (continued) Device Software Description Solaris host VxVM If you discover a host with any typical SAN disk groups off line, the storage volume page shows SAN mount points as local instead of external. These disks, however, are not accessible. When you perform Discovery Data Collection with all disk groups online, disks on the SAN are shown as external. Hosts connected directly to a storage system are shown as local, except for hosts connected by fibre.
Table 162 Known Device Issues (continued) Device Software Description IBM Storage Systems Subsystem Device Driver (SDD) or MPIO (multipath I/O) If you discover an IBM storage system without SDD, incorrect stitching is displayed in System Manager for the storage system. You are shown only one path if the storage system is using MPIO instead of SDD.
If a provisioning failure has caused the Symmetrix storage system to remain locked, you are alerted to this situation in Event Manager and on the Properties tab. You may receive a message resembling the following: Unable to end device masking session. Symmetrix '000001835005700' may be locked. HP Storage Essentials SRM 6.
728 Troubleshooting
Glossary A access point It is the intersection of the IP address and the provider that discovered the IP address. It is displayed on the screens for discovery. A provider is software that is used to gather information about an element. active zone set An active zone set is the zone set in use. You can have only one zone set active at a time; however, you can have a zone in more than one zone set. Zones sets are usually created for a particular task. Zones work by exclusion.
services such as event notification, remote access, and query processing. The CIM Object Manager also grants access to the CIM Object Manager repository. D device This documentation set defines a device as a piece of hardware in the storage network. EMC uses the term device to refer to a volume on one of its storage systems. E element element created in Chargeback Manager An element is anything on the network that can be detected by the management server, such as hosts and switches.
scan files very quickly because of its structure in the database and because it uses a multi-threaded process. More than one process can be used at a time to scan the files. G generic element global reporting view Global Reporter server An element is considered to be generic if the management server can detect the element but it cannot obtain additional information about the element during Get the Topology or Discovery Data Collection.
mapped Mapped is capacity that is accessible by one or more hosts external to the array (aggregated capacity of volumes that are accessible from hosts external to the subsystem). meta device This term is used by EMC. A meta device is a device that is a concatenation of several devices. metavolume Metavolumes are created from a disk, slice, stripe, or other metavolumes. Metavolumes are extremely useful because they can expand their storage capacity, such as to mainframe volume sizes.
such as disk mirroring, RAID 5, backup/restore, and data migration, as well as being able to incorporate Network Attached Storage (NAS). SMTP Simple Mail Transfer Protocol (SMTP) is a TCP/IP protocol used in sending and receiving e-mail. soft zone A soft zone is created by assigning a world wide name (WWN) of a device port to a zone.
Instrumentation (WMI) Microsoft created WMI as its implementation of Web-based Enterprise Management (WBEM). For more information about WMI, refer to the Microsoft Web site at http://www.microsoft.com. The Windows CIM Extension enhances Windows Management Instrumentation (WMI) so that it can gather information from host bus adapters and make the information available to the management server.
Index 3PAR 48 A about Access tab 258 asset attributes 323 Backup Manager toolbar 579 Business Tools 675 buttons in System Manager 252 Capacity Manager 355 Chargeback Manager reports 665 custom commands 293 custom reports 444 CXFS 327 discovery 20 Discovery Data Collection 67 Events tab 322 filtering events 342 groups 287 Home page 8 List tab 256 monitoring options 401 Navigation screen 303 Path tab 263 Performance Manager 394 Policies tab 326 Policy Manager 371 provisioning 517 Provisioning tab 322 remote
domain controller 88, 126 elements 151, 153 e-mail schedule 440 event policies 379 general information 645 geographic information 647 host security groups 558 hosts 609, 620, 627 license 171 licensing information 647 organizations 151 provisioning policies 378 roles 148 staff information 646 storage pool 543 storage volume 547 TNS Listener Port 126 user accounts 144 utilization policies 373 virtual application 265 virtual applications 321 warranty information 647 zone alias members 524 zone members 528 zone
resources 588 scheduling collectors 198 servers 588 summary backup charts 575, 587, 592 topology 582 Backup Manger backup results 575 backup results 575 backup servers viewing collectors 197 backups managing 571 bar chart 395 binding persistent 731 block size cache 569 Brocade switches 341 tracing 192 Brocade switches 30 API data 688 stale data 688 browsing hosts 302 switches 302 Buffer Hit Ratio 401 business cost setting 265 business costs assigning 283 Business Tools 675 risk Analysis 677 buttons Backup M
full name 146 logging 192 login name 146 number of retries 704 Oracle Listener Password 243 organizations 153 password 126, 146 phone number 146 properties 187 provisioning policies 382 roles 149 SNMP switch community string 46 SNMP trap listener port 46 status 640 summary backup charts 592 time 223 time-out period 704 TNS Listener Port 126 tools 303 topology 357, 582 user account 145 user preferences 147 user profile 146 utilization policies 381 zone set 530 changing ports zone alias 525 Chargeback 675 ass
cimom.symmetrix.
cumulative licenses 172 Current View combo box 357 custom periods 400 custom commands about 293 adding 294 deleting 296 editing 296 setting up 265 stopping 294 custom name truncated 287 custom properties 647 custom reports 444 integrating 458 customer information adding 647 Customer Support generating a support database 245 customized time filtering 345 Customizing 187 customizing properties 187 cut off custom name 287 CXFS 326, 327 D data backing up 233 outdated (Brocade switches) 688 performance 394 tren
roles 150 storage pool 544 storage pools 543 TNS Listener Port 126 user accounts 146 volumes 550, 564 zone aliases 526 zone sets 528, 531, 721 zones 528, 721 deleting events 195 department ownership 648 removing 656 departments adding 648 deleting 648 editing 648 removing 648 designing custom reports 447 detailed tracing 192 detailed schema 460 details event 335 device about 730 finding 563 inaccessible 563 device issues 722 devices deleting 281 updating 280 different Java applet 720 different version Java
credentials 22 discovery groups 76 discovery list 77 element changes 81 elements 21, 27 Emulex host bus adapters 703 enabling product health monitoring 25 logs 74 management server 26 manual tab 72 NAS devices 63 quarantine 80 scheduling discovery tasks 20 selective discovery filter 23, 69 settings importing a file 74 saving to a file 73 single element 72 SMI-S devices 20 steps 23 storage systems 47 switches 29 tape libraries 63 testing SMI-S providers 23 time-out 715 troubleshooting 706 Discovery Data Coll
discovery schedule 184 e-mail address 146 e-mail schedule 443 e-mail schedules 206, 669 fabric name 265, 290 frequency 395 full name 146 host security groups 560 logging 192 login name 146 organizations 153, 154 ownership percentage 655 password 146 phone number 146 Protection collectors 198 provisioning policies 382 roles 149 selective discovery filter 70 status 640 time 223 user account 145 user preferences 147 user profile 146 utilization policies 381 zone set 530 zone sets 528 editing ports zone alias 5
EMC Symmetrix 49, 536, 564 excluding from forced refresh 50 Empty Chart message 367 Emulex host bus adapters 703 error database connection failed 706 error -56 721 Error 503 692 error message exclusive lock 726 errors authentication 708 EVA arrays 56 event details 335 icons 285 event filter customized time 345 Event Manager clearing events 195 deleting events 195 event policies creating 379 event severity setting 385 event types all 351 all but management server 351 applications 351 fabrics 351 hosts 351 ma
host dependency 632 LUN dependency 633 storage system dependency 632 volume dependency 632, 633 zone dependency 633 Final Destination 401 finding applications 88 capacity 360 devices 563 element impact 281 event details 335 hosts 88 performance data 394 trending information 369 first time users 5 fixed declining balance 658 fixing drivers 722 formatting reports 437 forwarding SNMP traps 329 Free Physical Memory 401 frequency changing 395 full name changing 146 G general information adding 645 Generating a
hierarchy organizations 137 host not in topology 709 host bus adapter unable to detect 714 host bust adapters replacing 676 host dependency host 632 host persistent binding 731 host security groups accessing 556 creating 558 deleting 562 editing 560 hosts adding 609, 620, 627 browsing 302 discovered 273 discovering 88 generic 273 grouping 287 telnet to 302 ungrouping 288 hosts file importing 74 saving discovery settings in HP SIM 73 hot-swapped drives 715 HP authorized reseller xxxvii storage web site xxxvi
Java memory 691 increasing memory 691 Java plug-in 720 installing 13 jboss.
Bridge Agent 38 changing the discovery settings 43 discovering 38 excluding from discovery 44 managing 45 adding 46 removing 46 replacing 46 members zone sets 528 memory increasing 720 messages data is late 691 OutOfMemoryException 720 messages waiting 401 meta device 732 meta volume 732 metadata client 327 metadata server 327 Microsoft Exchange Adding domain controllers 112 deleting domain controllers 114 discovering 88, 112, 708 drive M 708 failover clusters 114 Microsoft Exchange Services 401 minimum thr
naming storage tier 642 naming conventions for zones 630 naming organizations 137 NAS devices discovery 63 HP 64 NetApp 65 Sun 66 navigating elements 303 navigation details 265 Navigation screen about 303 accessing 308 Navigation tab duplication 533 Navisphere 303 Navisphere Agent 564 NetApp NAS devices 65 enabling SSL 65 Networking xxxv new password 146 new window 438 New Window option 319 no data CLARiiON storage systems 715 nonexistent IP addresses 715 nonexistent Oracle instances 708 NoSuchElement error
Volume Creation, LUN Security, and Zone Operation 600, 625 volume dependency filter 632, 633 zone dependency filter 633 Zone Operation 611 Path tab 252, 263, 355 paths 311 percentage ownership 655 performance finding 394 statistics 220 performance collectors managing 217 starting 219 stopping 219 Performance Explorer Java plug-in 13 Performance Manager about 394 accessing 394 chart format 395 charts 394 clearing graph 395 comparing 398 custom periods 400 filtering data 395 frequency 395 multiple elements 39
drivers 722 process exclusive lock 726 Processor Utilization 401 product health monitoring enabling 25 profile user 146 properties customizing 187 fabric 309 organizations 148 roles 147 viewing 308 Protection Explorer master server charts 593 provider 732 provisioning about 517 adding hosts 609, 620, 627 copying zone sets 531 LUN numbering 625 monitoring jobs 630 policies 382 troubleshooting 563, 564, 720, 721, 726 provisioning jobs scheduling 628 provisioning policies creating 378 Provisioning tab 322 prox
schedules 205 storage pool 544 storage pools 543 TNS Listener Port 126 user accounts 146 volumes 550 zone aliases 526 zone members 528 zone sets 531, 721 zones 721 removing ports zone alias 525 renaming storage tiers 638 replacing fabric name 290 HBAs 676 Reporter about 417 custom 444 reports asset based 665 Chargeback Manager 667 cleanup 208 collectors 203 custom 444 data aging statistics 207 deleting e-mail schedules 443 designing 447 detailed schema 460 e-mail 439 e-mail schedule 444 e-mail schedules 205
S SAN xxxv, 732 SAN Zoning Overview 518 saving chargeback information 641 graph 395 graphs 394 logs 190 topology 252, 357, 579 schedules deleting 443 disabling 183 editing 669 e-mail 206, 439, 443 modifying 205 removing 205 scheduling database backup 231 discovery 182, 183, 184 provisioning jobs 628 report cleanup 208 reports 667 screen space maximizing 438 scripting variables 296 scripts remote 386 stopping 294 searching topology 357 security Management server 137 roles 148, 149 security certificate instal
cache block 569 storage pool 543 SMI-S devices discovery 20 testing SMI-S providers 23 SMTP 178, 733 SNIA specification 733 SNMP authentication errors 708 trap forwarding 329 SNMP trap destinations 177 SNMP trap listener port 46 soft zone 733 sorting events 322, 339 specifying custom periods 400 SQL Server authentication modes 101 SQL servers discovering 100 staff information adding 646 Standard XML Connector 1 starting collectors 203, 436 performance collectors 219 Statistics 187 data aging 207 performance
Sun NAS devices 66 Sun StorEdge A5000 714 Sun StorEdge storage systems 61, 62 3510 62 6130 62 6920, 6940 62 Sun StorEdge switches 36 SVC IBM 60 swapped drives 715 swapping HBAs 722 switch events 341 switch community string changing for SNMP switches 46 switch port zoning 733 Switch Risk Analysis 677 switches Brocade 30 browsing 302 CISCO 251 Cisco 35 CNT 34 discovery 29 duplication 533 EMC Connectrix 38 HP M-Series 36 McDATA 38, 714 name truncated 287 number of retries 704 port status 306 QLogic 36 SNMP com
time setting 223 timeout HDS 566 TNS Listener Port changing 126 tnsnames.
user profile modifying 146 users about 137 adding 144 first time 5 organizations 148 roles 147, 148, 149 using global view 276, 319 utilization policies 380, 381 utilization policies creating 373 Utilization tab 355 V variables scripting 296 viewing 74, 75 all logs 190 asset attributes 641 capacity 360 capacity charts 367 chargeback by element 662 charts 398 cumulative licenses 172 data aging statistics 220 database status 234 department views 663 element asset attributes 323 element home page 265 element
Worldwide Name 734 WorldWide Name zoning 733 Worldwide Name zoning 734 about 734 write caching 541 Write Operations 401 WWN 734 X XFS 326 Xiotech storage systems 63 Z zone hard 734 soft 734 zone alias about 734 creating 524 deleting 526 modifying ports 525 zone hard about 734 zone member 734 zone members adding 528 removing 528 zone set creating 529 zone sets accessing 528 activating 532 copying 531 creating 528, 529 deleting 531, 721 duplication 533 editing 528 members 528 modifying 530 removing 528 zone