+ All Categories
Home > Documents > Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage...

Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage...

Date post: 18-Sep-2020
Category:
Upload: others
View: 5 times
Download: 0 times
Share this document with a friend
132
Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX 5.2
Transcript
Page 1: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Veritas CommandCentral™Storage Change ManagerUser's Guide

for Microsoft Windows and UNIX

5.2

Page 2: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

CommandCentral Storage Change Manager User'sGuide

The software described in this book is furnished under a license agreement and may be usedonly in accordance with the terms of the agreement.

Documentation version 5.2.0

Legal NoticeCopyright © 2010 Symantec Corporation. All rights reserved.

Symantec, the Symantec logo, Veritas, CommandCentral, NetBackup, and Storage Foundationare trademarks or registered trademarks of Symantec Corporation or its affiliates in theU.S. and other countries. Other names may be trademarks of their respective owners.

This Symantec product may contain third party software for which Symantec is requiredto provide attribution to the third party (“Third Party Programs”). Some of the Third PartyPrograms are available under open source or free software licenses. The License Agreementaccompanying the Software does not alter any rights or obligations you may have underthose open source or free software licenses. Please see the Third Party Legal Noticedocumentation accompanying this Symantec product for more information on the ThirdParty Programs.

The product described in this document is distributed under licenses restricting its use,copying, distribution, and decompilation/reverse engineering. No part of this documentmay be reproduced in any form by any means without prior written authorization ofSymantec Corporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TOBE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTALOR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINEDIN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer softwareas defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights inCommercial Computer Software or Commercial Computer Software Documentation", asapplicable, and any successor regulations.

Page 3: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Symantec Corporation350 Ellis StreetMountain View, CA 94043

http://www.symantec.com

Page 4: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Technical SupportSymantec Technical Support maintains support centers globally. TechnicalSupport’s primary role is to respond to specific queries about product featuresand functionality. The Technical Support group also creates content for our onlineKnowledge Base. The Technical Support group works collaboratively with theother functional areas within Symantec to answer your questions in a timelyfashion. For example, the Technical Support group works with Product Engineeringand Symantec Security Response to provide alerting services and virus definitionupdates.

Symantec’s support offerings include the following:

■ A range of support options that give you the flexibility to select the rightamount of service for any size organization

■ Telephone and/or Web-based support that provides rapid response andup-to-the-minute information

■ Upgrade assurance that delivers software upgrades

■ Global support purchased on a regional business hours or 24 hours a day, 7days a week basis

■ Premium service offerings that include Account Management Services

For information about Symantec’s support offerings, you can visit our Web siteat the following URL:

www.symantec.com/business/support/

All support services will be delivered in accordance with your support agreementand the then-current enterprise technical support policy.

Contacting Technical SupportCustomers with a current support agreement may access Technical Supportinformation at the following URL:

www.symantec.com/business/support/

Before contacting Technical Support, make sure you have satisfied the systemrequirements that are listed in your product documentation. Also, you should beat the computer on which the problem occurred, in case it is necessary to replicatethe problem.

When you contact Technical Support, please have the following informationavailable:

■ Product release level

Page 5: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

■ Hardware information

■ Available memory, disk space, and NIC information

■ Operating system

■ Version and patch level

■ Network topology

■ Router, gateway, and IP address information

■ Problem description:

■ Error messages and log files

■ Troubleshooting that was performed before contacting Symantec

■ Recent software configuration changes and network changes

Licensing and registrationIf your Symantec product requires registration or a license key, access our technicalsupport Web page at the following URL:

www.symantec.com/business/support/

Customer serviceCustomer service information is available at the following URL:

www.symantec.com/business/support/

Customer Service is available to assist with non-technical questions, such as thefollowing types of issues:

■ Questions regarding product licensing or serialization

■ Product registration updates, such as address or name changes

■ General product information (features, language availability, local dealers)

■ Latest information about product updates and upgrades

■ Information about upgrade assurance and support contracts

■ Information about the Symantec Buying Programs

■ Advice about Symantec's technical support options

■ Nontechnical presales questions

■ Issues that are related to CD-ROMs or manuals

Page 6: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Support agreement resourcesIf you want to contact Symantec regarding an existing support agreement, pleasecontact the support agreement administration team for your region as follows:

[email protected] and Japan

[email protected], Middle-East, and Africa

[email protected] America and Latin America

About Symantec ConnectSymantec Connect is the peer-to-peer technical community site for Symantec’senterprise customers. Participants can connect and share information with otherproduct users, including creating forum posts, articles, videos, downloads, blogsand suggesting ideas, as well as interact with Symantec product teams andTechnical Support. Content is rated by the community, and members receivereward points for their contributions.

www.symantec.com/connect

Page 7: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Chapter 1 Introducing CommandCentral Storage ChangeManager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

About Veritas CommandCentral Storage Change Manager ... . . . . . . . . . . . . . . . . 13What you can do with CommandCentral Storage Change

Manager ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Where to find more information .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

CommandCentral Storage Change Manager on the Web .... . . . . . . . . . . . . 15Getting help .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15About CommandCentral Storage Change Manager

documentation .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Commenting on product documentation .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Chapter 2 Using the CommandCentral Storage ChangeManager Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

About the CommandCentral Storage Change Manager Console ... . . . . . . . . . . 19Logging in to the CommandCentral Storage Change Manager

Console ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Logging out of the CommandCentral Storage Change Manager

Console ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Changing your password .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Installing security certificates in supported Web browsers ... . . . . . . . . . . . . . . . 22Working with tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

About the hyperlinks that display in tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24About the icons that display in tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25Performing tasks in tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25About searching for information in tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25Searching for information in tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26About filtering the information in tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26Filtering the information in tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27Resetting table filters ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30Grouping information in tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31Expanding and collapsing all groups in a table ... . . . . . . . . . . . . . . . . . . . . . . . . . . 31Specifying table columns .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Contents

Page 8: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Sorting information in tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32Accessing multiple pages of data in tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32Adjusting the width of table columns .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Printing table contents ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Saving table contents ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Table options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Managing tasks ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34About a task’s status ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35Checking the status of tasks ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35Running a task immediately ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35Running a task again .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36Cancelling a task .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Accessing online Help .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37Online Help options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Chapter 3 Using the Dashboard to display an overview ofrecent changes and violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

About the Dashboard .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39Viewing the Dashboard .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40Viewing data from the Dashboard’s graphs .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Chapter 4 Viewing your storage resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

About viewing your storage resources ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42Viewing hosts ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42Viewing storage arrays ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43Viewing fabrics ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43Viewing switches ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44Viewing zones .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Viewing active zones .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45Viewing defined zones .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45Viewing zone aliases ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46Viewing zone sets ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Viewing a host’s storage .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47Viewing a host’s volumes .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47Viewing a host’s disk groups .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Viewing clusters ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49Viewing applications .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49Viewing paths .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50About unidentified adapters ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50Viewing unidentified adapters ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51About unenclosed devices ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51Viewing unenclosed devices ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

Contents8

Page 9: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Chapter 5 Monitoring changes to your storage resources . . . . . . . . . . . . 53

About monitoring changes to your storage resources ... . . . . . . . . . . . . . . . . . . . . . . . 53About change messages ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54About aggregate change messages ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54About effects and impacts ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55Viewing changes to your storage resources ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

Chapter 6 Monitoring your storage resources with custompolicies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

About custom policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57About storage service policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58About compliance policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59About a custom policy’s status ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59About the Path Outage policy ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

Creating storage service policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60Policy Conditions panel options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61Policy Properties panel options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

Creating compliance policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63Create New Policy Welcome panel options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64Policy Conditions panel options for switches ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65Policy Conditions panel options for storage arrays ... . . . . . . . . . . . . . . . . . . . . 66Policy Conditions panel options for HBAs .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Working with your custom policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70Viewing custom policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71Editing custom policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71Enabling custom policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72Disabling custom policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73Deleting custom policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73Applying custom policies to your storage resources ... . . . . . . . . . . . . . . . . . . . 73Activating custom policies on your storage resources ... . . . . . . . . . . . . . . . . 74Deactivating custom policies from your storage resources ... . . . . . . . . . . 75Removing custom policies from your storage resources ... . . . . . . . . . . . . . . 75

Specifying an SMTP server to receive emails of violations topolicies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

Chapter 7 Managing violations to your custom policies . . . . . . . . . . . . . . . . 77

About violations .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77About a violation’s status ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78About resolving violations .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

Viewing violations .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80Clearing violations .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

9Contents

Page 10: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Chapter 8 Using best practice policies to identify potentialrisks to your storage resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

About best practice policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83Viewing best practice policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84Editing best practice policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84Enabling best practice policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85Disabling best practice policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85About risks ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86Viewing risks ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Chapter 9 Reporting on changes, policies, and violations . . . . . . . . . . . . 87

About default reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87About the Policy Coverage report ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88About the Policy Violation Trends report ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88About the Resolve Time Efficiency report ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89About the Changes in the Data Center report ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

Viewing default reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90Drilling down to detail reports in the Policy Coverage report ... . . . . . . . . . . . . . 91Changing a default report’s time frame .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

Customize Report options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91Exporting report data ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92Archiving reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

Specifying a directory for archived reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93Creating archived reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93Viewing archived reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94Deleting archived reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

About creating ad hoc custom reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

Chapter 10 Configuring agentless discovery of hosts by creatinghost objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

How you can discover hosts in CommandCentral ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97How CommandCentral performs agentless discovery by creating host

objects ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100Manually correlating unidentified adapters (HBAs) to hosts ... . . . . . . . . . . . . 103

Manually associating unidentified adapters to hosts by specifyinghost information .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

Manually correlating unidentified adapters to hosts by matchingpatterns in zone names or zone aliases ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Manually correlating unidentified adapters to hosts by importinga CSV file ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

Automatically correlating unidentified adapters (HBAs) to hosts ... . . . . . . 113

Contents10

Page 11: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Enabling the automatic correlation process ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114Adding CSV records for the automatic correlation process ... . . . . . . . . 116Removing CSV records used to associate HBAs to hosts for

agentless discovery .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116Adding agentless rules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117Running agentless rules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119Editing agentless rules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120Enabling agentless rules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121Disabling agentless rules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121Removing agentless rules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121Starting the automatic correlation process ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Approving the correlations that CommandCentral Storage Change

Manager detects ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Viewing the list of unidentified adapters that were automatically

correlated .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123Disabling the automatic correlation process ... . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

Appendix A Accessibility features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Navigating the CommandCentral Storage Change ManagerConsole ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Accessibility features in dialog boxes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

11Contents

Page 12: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Contents12

Page 13: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

IntroducingCommandCentral StorageChange Manager

This chapter includes the following topics:

■ About Veritas CommandCentral Storage Change Manager

■ What you can do with CommandCentral Storage Change Manager

■ Where to find more information

About Veritas CommandCentral Storage ChangeManager

Veritas CommandCentral™ Storage Change Manager by Symantec providesenterprise–wide insight into storage infrastructure–related changes in yourdatacenter. With this insight, you can maximize storage availability and minimizedowntime due to planned and unplanned changes.

CommandCentral Storage Change Manager includes the following capabilities:

■ Discovers the storage resources in your datacenter. This allows storageadministrators to monitor your storage infrastructure.

■ Detects the changes made to your storage resources. This allows storageadministrators to monitor changes and assess the impact those changes haveon your storage infrastructure.

■ Assesses the changes to storage resources against custom policies andbest-practice policies. With custom policies, storage administrators can define

1Chapter

Page 14: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

connectivity, configuration, and compliance requirements for your storageassets. Best-practice policies monitor your storage assets withindustry–recognized best practices for storage management.

■ Notifies you of changes to storage resources that violate your custom policies.This allows storage administrators to correct the changes that can potentiallydisrupt your storage infrastructure.

■ Identifies potential risks to your storage infrastructure based on best-practicepolicies. With risks, storage administrators can identify the affected storageresources and take the necessary action to remove the risk from your storageinfrastructure.

■ Lets you view reports that provide an enterprise–wide view of the changesthat occur in your datacenter.

Use CommandCentral Storage Change Manager as your solution for storage changeand configuration management to ensure the availability of your storageinfrastructure, manage service level agreements more effectively, and improveoperational efficiency.

What you can do with CommandCentral StorageChange Manager

Storage administrators can use CommandCentral Storage Change Manager tomonitor and manage changes to the storage infrastructure. With CommandCentralStorage Change Manager, you can do the following:

■ Monitor your storage resources and view detailed information about them.For example, you can view storage arrays and the LUNs that reside inside eacharray.

■ Track changes to your storage resources. For example, you can viewinformation about an application that was added to a host.

■ Create custom policies. With custom policies, you can define the connectivity,configuration, and compliance requirements for your storage resources.Additionally, you can also define who should receive notifications of violationsto the policy and you can define the target resolution time for violations.

■ Monitor violations against your custom policies. When a violation occurs, youcan view the violation to determine the impacted storage resources, find thechange that caused the violation, and take the necessary actions to resolve theviolation.

■ Use best practice policies. These policies ship with CommandCentral StorageChange Manager and monitor storage changes against industry recognized

Introducing CommandCentral Storage Change ManagerWhat you can do with CommandCentral Storage Change Manager

14

Page 15: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

best practices for storage management. For example, one best practice policymonitors clusters that host a service group to ensure that the cluster’s nodeshave access to the same set of LUNs.

■ Monitor the risks that best practice policies identify. Similar to violations,CommandCentral Storage Change Manager generates a risk if a change breachesa best practice policy. You can view a description of each risk to identifyimpacted storage resources and then take the necessary action to resolve therisk.

■ View reports that provide an enterprise–wide view of the changes made toyour storage resources, a summary of the hosts and applications that havepolicies applied to them, and details about violations, including the time thatit takes to resolve violations and the type of violations that have generated.

■ Display an overall view of the current state of your data center. With theDashboard, you can view graphs that detail the number of recent violationsand changes. This allows you to identify current impacts and helps you tovisualize storage change trends in your data center.

Where to find more informationThe following product resources are available:

■ “CommandCentral Storage Change Manager on the Web” on page 15.

■ “Getting help” on page 15.

■ “About CommandCentral Storage Change Manager documentation” on page 16.

■ “Commenting on product documentation” on page 17.

CommandCentral Storage Change Manager on the WebFor comprehensive, up-to-date information about product offerings, visit theSymantec product Web site:

http://www.symantec.com/business/commandcentral-storage-change-manager

Getting helpIf an issue arises while you use the products, refer to the product documentationand online help. If necessary, report it to Symantec.

For technical assistance, visit

www.symantec.com/enterprise/support/index.jsp

15Introducing CommandCentral Storage Change ManagerWhere to find more information

Page 16: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

This site also provides access to resources such as TechNotes, product alerts,software downloads, hardware and software compatibility lists, and the customeremail notification service. Use the Knowledge Base Search feature to accessadditional product information, including current and past releases of productdocumentation.

About CommandCentral Storage Change Manager documentationYou can access CommandCentral Storage Change Manager documentation at theSymantec Technical Support Web site:

www.symantec.com/enterprise/support/documentation.jsp?pid=54974

Table 1-1 describes the CommandCentral Storage Change Manager documentation.

Table 1-1 CommandCentral Storage Change Manager documentation

DescriptionGuide

Provides information about how to administer the product.For example, the guide describes how to manage licensesand user accounts, configure product components, andwork with diagnostic information.

CommandCentralAdministrator’s Guide

Provides a high-level overview of how you can useCommandCentral Storage Change Manager.

CommandCentral GettingStarted Guide

Provides setup requirements for applications and devicesand instructs you how to configure CommandCentralStorage Change Manager to discover them.

CommandCentral Hardwareand Software ConfigurationGuide

Lists the devices and applications that CommandCentralStorage Change Manager supports.

CommandCentral HardwareandSoftwareCompatibility List

Instructs you how to install CommandCentral StorageChange Manager.

CommandCentral InstallationGuide

Provides information about supported operating systems,host resource requirements, software limitations, andknown issues.

CommandCentral StorageChangeManagerReleaseNotes

Describes how you can use CommandCentral StorageChange Manager to view your storage resources, viewdescriptions of changes to those storage resources, definepolicies, and view violations to those policies.

CommandCentral StorageChange Manager User’s Guide

Provides information about third-party software that isused in CommandCentral Storage and CommandCentralStorage Change Manager.

CommandCentral Third-PartyLicense Agreements

Introducing CommandCentral Storage Change ManagerWhere to find more information

16

Page 17: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Commenting on product documentationSubmit comments about the product documentation to the following email address:

[email protected]

Please include the following information with your documentation comments:

■ The title and product version of the guide you are commenting on

■ The topic (if relevant) you are commenting on

■ Your comment

■ Your name

17Introducing CommandCentral Storage Change ManagerWhere to find more information

Page 18: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Introducing CommandCentral Storage Change ManagerWhere to find more information

18

Page 19: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Using the CommandCentralStorage Change ManagerConsole

This chapter includes the following topics:

■ About the CommandCentral Storage Change Manager Console

■ Logging in to the CommandCentral Storage Change Manager Console

■ Logging out of the CommandCentral Storage Change Manager Console

■ Changing your password

■ Installing security certificates in supported Web browsers

■ Working with tables

■ Managing tasks

■ Accessing online Help

About theCommandCentral StorageChangeManagerConsole

The CommandCentral Storage Change Manager Console is a graphical userinterface that provides a central point for you to monitor and manage storageinfrastructure–related changes. The Console displays in a standard Web browser.

The Console consists of the following:

■ A header

2Chapter

Page 20: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Located at the top of the Console, the header enables you to:

■ Display version–level information about CommandCentral Storage ChangeManager

■ Disconnect from CommandCentral Storage Change Manager

■ Access the online help system

■ TabsBeneath the header, the following tabs provide access to each major area ofthe Console:

■ Home: View the DashboardSee “Viewing the Dashboard” on page 40.

■ Inventory: View detailed information about your storage resourcesSee “About viewing your storage resources” on page 42.

■ Changes: View details about changes made to your storage resourcesSee “Viewing changes to your storage resources” on page 55.

■ Violations: Monitor and manage violations against your custom policiesSee “Viewing violations” on page 80.

■ Policies: Manage custom policies that define connectivity, configuration,and compliance requirements for your storage resourcesSee “About custom policies” on page 57.

■ Risks: Manage best practice policies and view the risks that the policiesidentifySee “About best practice policies” on page 83.

■ Task Status: View the status of completed or scheduled operationsSee “Managing tasks” on page 34.

■ Reporting: View reports about changes, policies, and violationsSee “Viewing default reports” on page 90.

■ Settings: Configure devices, the Management Server, managed hosts, andexplorers, manage user accounts, and view diagnostic information aboutCommandCentral Storage Change ManagerSee the CommandCentral Administrator’s Guide.

■ A task paneLocated on the left side of the Console, the task pane provides the following:

■ The name of the Management Server to which you are connected

■ The list of available tasks that are specific to the tab that you select

■ A content pane

Using the CommandCentral Storage Change Manager ConsoleAbout the CommandCentral Storage Change Manager Console

20

Page 21: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

The Console’s main display area displays information specific to the tab thatyou select.

Logging in to the CommandCentral Storage ChangeManager Console

After you install CommandCentral Storage Change Manager, you can log in to theConsole.

To log in to the CommandCentral Storage Change Manager Console

1 On a host with a network connection to the Management Server, open a Webbrowser.

Your browser must be configured to accept cookies and must supportJavaScript. If you use a pop-up blocker, either disable it or configure it toaccept pop-ups from the Management Server.

2 In the browser’s address field, type the following URL and press Enter:

https://HostName:PortNumber/scm

where:

■ HostName is the host name, IP address, or fully qualified domain nameof the host on which the Management Server is running.

■ PortNumber is the port through which you are connecting. The defaultport number is 8443.

For example: https://myhost.example.com:8443/scm

3 In the Login page, do the following and click Login:

■ Type your user name and password in the respective fields.

■ In the Domain list, select the domain in which your user name is defined.For example: [email protected]

The CommandCentral Storage Change Manager Console appears.

Logging out of the CommandCentral Storage ChangeManager Console

When you are finished using the Console, you can log out of it.

21Using the CommandCentral Storage Change Manager ConsoleLogging in to the CommandCentral Storage Change Manager Console

Page 22: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

To log out of the CommandCentral Storage Change Manager Console

◆ In the Console, click Logout.

The Console disconnects from the Management Server.

Changing your passwordWe recommend that you periodically change the password with which you connectto the Management Server.

To change the password with which you connect to the Management Server

1 In the Console, click Settings > Management Server > Users.

2 In the Users table, select (check) your user name.

3 In the drop-down list, click Edit User and click Go.

4 In the Edit User dialog box, do the following and click OK:

■ Click Change Password.

■ In the Old Password field, type your current password.

■ In both the NewPassword and Re-typeNewPassword fields, type a newpassword.

The Management Server updates your password.

Installing security certificates in supported Webbrowsers

When you attempt to log on to the CommandCentral Console with Internet Exploreror Firefox, you may receive a certificate error message. This issue occurs becausethe certificate is a self–signed certificate.

Install the certificate in your Web browser . Install the certificate for eachManagement Server to which you connect.

To install the certificate in Internet Explorer 6.x

1 When you receive the security alert, click View Certificate.

2 In the Certificate dialog box, click Install Certificate.

3 In the Welcome to the Certificate Import Wizard panel, click Next.

4 In the Certificate Store panel, select one of the following and click Next:

■ Automaticallyselectthecertificatestorebasedonthetypeofcertificate

Using the CommandCentral Storage Change Manager ConsoleChanging your password

22

Page 23: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

■ Placeall certificates in the following store and then select TrustedRootCertification Authorities

5 In the Completing the Certificate Import Wizard panel, click Finish.

6 In the Security Warning dialog box, click Yes.

7 In the Certificate Import Wizard dialog box, click OK.

8 In the Certificate dialog box, click OK.

9 In the Security dialog box, click Yes.

The certificate installs. The next time you log on to this Management Serverwith Internet Explorer 6.x, the certificate error message will not appear.

To install the certificate in Internet Explorer 7.x

1 When you receive the security alert, click Continue to this website (notrecommended)

2 In the Security Warning dialog box, click Yes.

3 In the Web browser's address bar, click Certificate Error.

4 In the Certificate Invalid dialog box, click View Certificates.

5 In the Certificate dialog box, click Install Certificate.

6 In the Welcome to the Certificate Import Wizard panel, click Next.

7 In the Certificate Store panel, select one of the following and click Next:

■ Automaticallyselectthecertificatestorebasedonthetypeofcertificate

■ Placeall certificates in the following store and then select TrustedRootCertification Authorities

8 In the Completing the Certificate Import Wizard panel, click Finish.

9 In the Security Warning dialog box, click Yes.

10 In the Certificate Import Wizard dialog box, click OK.

11 In the Certificate dialog box, in the Issued to field, verify if the name listedis one of the following:

■ The fully qualified host name of the Management Server

■ The short name of the Management Server

Then, click OK.

12 In the Security dialog box, click Yes.

The certificate installs. The next time you log on to this Management Server,in the browser’s address bar, enter one of the following:

23Using the CommandCentral Storage Change Manager ConsoleInstalling security certificates in supported Web browsers

Page 24: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

■ The fully qualified host name of the Management Server (for example,commandcentral.symantecexample.com)

■ The short name of the Management Server (for example, commandcentral)

When you log on , you do not see the certificate error message.

To install the certificate in Firefox 2.x

1 When you receive the security alert, click Acceptthiscertificatepermanently.

2 Click OK.

The certificate installs. The next time you log on to this Management Serverwith Firefox 2.x, the certificate error message will not appear.

To install the certificate in Firefox 3.x

1 When you receive the security alert, click Or you can add an exception.

2 Click Add Exception....

3 In the Add Security Exception dialog box, do the following:.

■ Click Get Certificate

■ Click Confirm Security Exception

The certificate installs. The next time you log on to this Management Serverwith Firefox 3.x, the certificate error message will not appear.

Working with tablesThe CommandCentral Storage Change Manager Console displays most informationin tables. You can work with tables to find the information that you need. Forexample, you can search and filter in tables to display specific information. Youcan also print and save information in tables for future use.

About the hyperlinks that display in tablesSome information in tables contain hyperlinks—for example, the name of a storageresource. You can click hyperlinks to load the section of the CommandCentralStorage Change Manager Console that displays information about the hyperlink.For example, in the Changes pane, a change message might describe a change toa switch. In that change message, the name of the switch contains a hyperlink.When you click the hyperlink, the Console navigates to Inventory > Switches.

Using the CommandCentral Storage Change Manager ConsoleWorking with tables

24

Page 25: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

About the icons that display in tablesSome information in tables contain icons—for example, the names of your storageresources. You can click the icons to load a context-sensitive menu. The menuprovides several links that bring you to other sections of the CommandCentralStorage Change Manager Console where you can view related information abouta storage resource. For example, you can click a link that loads the Changes paneand displays only those changes that affect a particular storage resource. Or, youmight click a link that loads the Violations pane and displays only the unresolvedviolations that affect that storage resource.

Additionally, if you use CommandCentral Storage on your Management Server,you can click a link that launches the CommandCentral Storage Console in aseparate browser window and loads the portion of the Console that displaysdetailed information about that storage resource.

Performing tasks in tablesYou can initiate tasks in tables in the following ways:

■ Using the Tasks drop-down list

■ Right clicking a row in the table

To initiate tasks by using the Tasks drop-down list

1 In a table, select (check) the row for which you want to initiate a task.

2 In the Tasks drop-down list, select an option.

The task initiates.

To initiate tasks by right clicking a row in the table

1 In a table, right click the row for which you want to initiate a task.

2 In the Tasks menu, select an option.

The task initiates.

About searching for information in tablesYou can search for information in tables. When you search for information,CommandCentral Storage Change Manager searches all available information inthe table, including information in columns that are not currently displayed.When the search completes, the table refreshes and displays the information thatmatches the expression.

25Using the CommandCentral Storage Change Manager ConsoleWorking with tables

Page 26: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

For example, in the Changes table, to search for all changes related to a specificfabric, you could search on the object name of that fabric. After you do this, thetable refreshes and displays the changes where the name of the fabric is present.

After you search for information in a table, the settings remain in effect until youreset the filter.

See “Resetting table filters” on page 30.

To search for information in a single column, you can filter the information incolumns.

See “Filtering the information in tables” on page 27.

Searching for information in tablesTo find specific information in a table, you can search the contents to find thatinformation. For example, you can search for information that pertains to a specifichost.

To search for information in a table

1 At the top of a table, in the Search box, type an expression.

Expressions are not case sensitive.

2 Click Go.

The table refreshes and displays the information that matches your search.

About filtering the information in tablesYou can select specific characteristics to filter the information in tables. Whilethe search feature allows you to search for keywords in the entire table, the filteroption allows you to search for information in specific columns.

See “Searching for information in tables” on page 26.

For example, in the Changes table, if you want to view connectivity related changes,you can filter the Category column to match the word Connectivity. After you dothis, the table refreshes and displays connectivity type changes.

You can filter information in tables in the following ways:

■ You can use preset filters (the Show drop-down list) that display at the top ofsome tables—for example, in the Violations pane, you can select the presetfilter Resolved.

■ You can use the filter icon.See “Filtering the information in tables” on page 27.

Using the CommandCentral Storage Change Manager ConsoleWorking with tables

26

Page 27: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

After you filter the information in a table, the settings remain in effect until youreset the filter.

See “Resetting table filters” on page 30.

Filtering the information in tablesIf you want to find specific information in a table column, you can filter thecontents of a table.

To filter the information in tables

1 At the top of a table, click the Filter Table icon.

See “Table options” on page 34.

2 In the Filter Table dialog box, enter the required information and click OK.

See “Filter Table options” on page 27.

The table refreshes and displays the information that matches the filter.

Filter Table optionsUse this dialog box to filter the contents of a table.

Table 2-1 Filter table Options

DescriptionField

Select (check) the columns that you want to filter. If you checkKeywords, the filter applies to all columns.

When you check a column, the available filter options appear. Thefilter options appear as radio buttons or as a drop-down list anda text box.

Checkbox

Click a radio button to specify the criteria for which you want tofilter the contents of the column.

Radio buttons

27Using the CommandCentral Storage Change Manager ConsoleWorking with tables

Page 28: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 2-1 Filter table Options (continued)

DescriptionField

Select one of the following matching criteria:

■ matches any words—matches any of the words that you typein the text box

■ matches all words—matches all of the words that you type inthe text box

■ is equal to—matches exactly what you type in the text box

■ matches regular expression—interprets the text that you typein the text box as a Java regular expression

See “Regular Expression Syntax” on page 28.

■ is not equal to—matches the values that do not equal the valuethat you type in the text box

■ is greater than—matches the values that are greater than thevalue that you type in the text box

■ is greater than or equal to—matches the values that are greaterthan or equal to the value that you type in the text box

■ is less than—matches the values that are less than the valuethat you type in the text box

■ is less than or equal to—matches the values that are less thanor equal to the value that you type in the text box

■ is between—matches the values that are between the valuesthat you type in the text boxes

■ on or after—matches the dates that are on or after the datethat you type in the text box

■ before—matches the dates that are before the date that youtype in the text box

■ between—matches the dates that are between the dates thatyou type in the text boxes

Drop-down list

Type the text that you want to match.

When you type in the text box, note the following:

■ Results are case-sensitive. For example, if you typeconnectivity, results that contain the stringConnectivitywill not appear.

■ Type dates in the following format: MM/DD/YYYY

For example, to enter December 1, 2008, type 12/01/2008

Text box

Regular Expression SyntaxTable 2-2 provides the meta character syntax for regular expressions.

Using the CommandCentral Storage Change Manager ConsoleWorking with tables

28

Page 29: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 2-2 Regular Expression Syntax

ExampleDescriptionMeta Character

r.t matches rat, r t, but not root.Matches any single character.

weasel$ matches the end of thestring "It's a weasel" but not thestring "They are a bunch ofweasels."

Matches the end of the line$

^When matches "When in thecourse of human events" but not"What and When in the"

Matches the beginning of the line^

.* matches any number of anycharacters

Matches zero or more occurrencesof the character immediatelypreceding

*

\$ matches the dollar signcharacter ($) rather than the endof a line. Similarly, the expression\. matches the period characterrather than any single character.

This character is the quotingcharacter; use it to treat thecharacter that follows it as anordinary character.

\

r[aou]tmatches rat, rot, and rut,but not ret.

Matches any one of the charactersbetween the brackets.

[ ]

[0-9] matches any digit and[a-zA-Z]matches any uppercaseor lowercase characters. Multipleranges can be specified as well.

Ranges of characters can bespecified by using a hyphen.

[c1-c2]

[^269A-Z] matches anycharacters except 2, 6, 9, anduppercase letters.

The regular expression [A-Za-z]means match any uppercase orlowercase character. To match anycharacter except those in therange, use the caret as the firstcharacter after the openingbracket.

[^c1-c2]

\<the matches on "the" in thestring "for the wise" but does notmatch "the" in "otherwise".

Matches the beginning (\<) or end(\>) or a word.

\< \>

(the man|the woman)matchesthe lines "it belongs to the man"and "it belongs to the woman" butnot the line "it belongs to them."

Alternation, also called the ORoperator.

|

29Using the CommandCentral Storage Change Manager ConsoleWorking with tables

Page 30: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 2-2 Regular Expression Syntax (continued)

ExampleDescriptionMeta Character

9+ matches 9, 99, or 999.Matches one or more occurrencesof the character or regularexpression immediatelypreceding.

+

?at matches the strings cat, rat,bat but not flat

Matches 0 or 1 occurrence of thecharacter or regular expressionimmediately preceding.

?.

WIN(\d)(\d)$ matches WIN98but not WINXP

Matches only one decimal digit;this expression is equivalent tothe class [0-9].

\d

WIN(\w)(\w)$ matches WINXP,WIN98 but not WINDOWS

Matches only one character, "\w"stands for any letter or theunderscore character. This groupis called alphanumeric characters([a-zA-Z0-9_]).

\w

(?=(system|root))(\w+)

matches the words system or root.Matches one or more whole words.\w+

system (?= root)matches theword system only when followedby the word root.

Positive lookahead assertion. Thisexpression succeeds if thecontained regular expression,represented here by ...,successfully matches at thecurrent location, and failsotherwise.

(?=...)

system (?! root)matches theword system only when notfollowed by the word root.

Negative lookahead assertion.This expression is the opposite ofthe positive assertion; it succeedsif the contained expressiondoesn’t match at the currentposition in the string.

(?!...)

Resetting table filtersAfter you search or filter the information in a table, a message appears at thebottom of the table that describes the applied filter settings.

For example, in the Changes table, if you filter the Category column to match theword Connectivity, the following message appears:

Using the CommandCentral Storage Change Manager ConsoleWorking with tables

30

Page 31: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Filtered: Category is equal to Connectivity (reset)

You can reset the filter.

To reset a filter

◆ At the bottom of a filtered table, click reset.

The filter resets and the table refreshes.

Grouping information in tablesYou can group the information in tables. This allows you to find informationquickly and helps to organize information in a way that might be more meaningfulto you. For example, in the Switches table, you can group switches by vendor.

To group the information that displays in a table

◆ At the top of a table that supports grouping, in the Group by drop-down list,select a characteristic to group by.

The table refreshes and displays the information in groups.

Expanding and collapsing all groups in a tableWhen you group information in tables by common characteristics, you can expandand collapse all the groups at once.

Note: Some groups may contain a large amount of information. When you expandand collapse groups that contain a large amount of information, it may take longerto complete the action.

To expand and collapse all groups

◆ At the top of a table for which you grouped the information, select one of thefollowing icons:

■ Expand All

■ Collapse All

See “Table options” on page 34.

All groups in the table expand or collapse.

31Using the CommandCentral Storage Change Manager ConsoleWorking with tables

Page 32: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Specifying table columnsYou can specify which columns appear in a table. For example, in the Violationstable, you may want to view the resolve time for each violation. You can specifythat the Resolve Time column appears so you can view that information.

After you specify table columns, the settings remain in effect until you or anotheruser change them.

To specify which columns appear in a table

1 At the top of a table, click the Show/Hide Columns icon.

See “Table options” on page 34.

2 In the Select columns to display dialog box, select (check and uncheck) thecolumns that you want to display.

3 Click OK.

The table refreshes and displays the specified columns.

Sorting information in tablesYou can sort the information in a table. For example, you can sort the contentsin ascending or descending order.

To sort the information in a table

◆ In a table, click a column header.

The table sorts the selected column in ascending order. To sort in descendingorder, click the header again.

Accessing multiple pages of data in tablesWhen there is more data to display than a table has rows, the table containsmultiple pages. The Go to Page bar helps you navigate to other pages in the table.

To access pages in a table

1 In a table with multiple pages, locate the Go to Page bar.

2 Do any of the following:

■ To go to a specific page, click the page number.

■ To go to the previous page, click the left arrow.

Using the CommandCentral Storage Change Manager ConsoleWorking with tables

32

Page 33: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

■ To go to the next page, click the right arrow.

■ To go to the first page, click the double left arrow.

■ To go to the last page, click the double right arrow.

The table displays the selected page.

Adjusting the width of table columnsYou can adjust the width of table columns.

To adjust the width of table columns

1 In a table, click the edge of the column heading and hold down the left mousebutton.

2 Drag the edge of the column heading to the right or left.

The column width changes. To accommodate the changed column width,other columns become narrower or wider as needed.

Printing table contentsYou can print the contents of a table.

To print a table’s contents

1 At the top of a table, click the Print icon.

See “Table options” on page 34.

A new browser window opens and displays the table in printer-friendly format.

2 In the Print dialog box, choose a printer and adjust printer settings asrequired, then click OK or Print.

The data in the table queues to the printer that you specified.

Saving table contentsYou can preserve the contents of a table by exporting it to a comma-separated(.csv) file. You can then use a standard text editor or spreadsheet program to workwith the data.

33Using the CommandCentral Storage Change Manager ConsoleWorking with tables

Page 34: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

To save a table’s contents to a file

1 At the top of a table, click the Save icon.

See “Table options” on page 34.

2 If the File Download dialog box appears, click Save to Disk.

3 In the Save As dialog box, specify a path and name for the file and click OK.

The data in the table saves to the location that you specified.

Table optionsThere are several options that you can use to manage information in tables. Thefollowing table describes those options.

Table 2-3 Table options

DescriptionIconOption

Displays the Filter Table dialog box. You can use thisdialog box to filter the contents of a table.

Filter Table

Displays the Select columns to display dialog box.You can use this dialog box to select the columns thatyou want to display in a table.

Show/Hide Columns

Expands the contents of all groups.Expand All

Collapses the contents of all groups.Collapse All

Prints the contents of a table.Print Table

Saves the contents of a table to a comma-separated(.csv) file.

Save Table

Managing tasksWhen you submit a task—for example, to configure a new device—the task queuesto the Management Server. It may take a few minutes, depending on how long ittakes for hardware resources like storage arrays and switches to complete theiroperations.

Using the CommandCentral Storage Change Manager ConsoleManaging tasks

34

Page 35: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

About a task’s statusAfter you submit a task—for example, to configure a new device—CommandCentralStorage Change Manager assigns the task a status.

A task’s status can be any of the following:

■ Running: The Server processes the task.

■ Queued: The task waits to be processed.

■ Scheduled: The task is scheduled to be performed later.

■ Serialized: The task waits, pending the completion of other operations thataffect the same storage resources.

■ Successful: The task completes successfully.

■ Failed: The task completes with errors.

Checking the status of tasksYou can check the status of tasks that you submit. Status information displaysabout the tasks that recently completed, are currently running, or are scheduledfor execution.

To check the status of tasks

◆ In the Console, click Task Status.

The Tasks pane appears.

Running a task immediatelyIf a task is SCHEDULED or SERIALIZED, you can request that it run immediately.This request does both of the following:

■ Overrides the original date and time settings for a SCHEDULED task

■ Forces a SERIALIZED task to proceed regardless of the status of otheroperations

Caution: If other processes use resources on which the task is dependent, the taskmay fail as a result.

To run a scheduled task immediately

1 In the Console, click Task Status.

2 In the Tasks Summary table, select (check) a SCHEDULED task.

35Using the CommandCentral Storage Change Manager ConsoleManaging tasks

Page 36: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

3 In the drop-down list, click Schedule Task and click Go.

4 In the Schedule Task dialog box, click OK.

The task runs immediately.

To run a serialized task immediately

1 In the Console, click Task Status.

2 In the Tasks Summary table, select (check) a SERIALIZED task.

3 In the drop-down list, click Run Serialized Task and click Go.

4 In the Run Serialized Task dialog box, click OK.

The task runs immediately.

Running a task againAfter a task runs, you can request that it runs again. Running a task again is usefulin two situations:

■ A task runs successfully, and you want to repeat it. For example, you configureda new device for test purposes and then deleted it, and you want to create itagain.

■ A task fails, and you want to retry it. Before you retry the task, try to correctany conditions that caused it to fail the first time.

To run tasks again

1 In the Console, click Task Status.

2 In the Tasks Summary table, select (check) one or more tasks with aSUCCESSFUL status.

3 In the drop-down list, click Run Task Again and click Go.

4 In the Run Task Again dialog box, click OK.

The tasks run again.

To retry the tasks that fail

1 In the Console, click Task Status.

2 In the Tasks Summary table, select (check) one or more tasks with a FAILEDstatus.

3 In the drop-down list, click Retry Task and click Go.

4 In the Retry Task dialog box, click OK.

The tasks run again.

Using the CommandCentral Storage Change Manager ConsoleManaging tasks

36

Page 37: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Cancelling a taskIf a task has not yet run—in other words, if its status is QUEUED, SCHEDULED,or SERIALIZED—you can cancel it. You cannot cancel or delete a task with a statusof RUNNING.

You can also use the same operation to delete completed tasks from the TasksSummary list.

To cancel a task or delete it from the list

1 In the Console, click Task Status.

2 In the Tasks Summary table, select (check) one or more tasks.

3 In the drop-down list, click Delete Task and click Go.

4 In the Delete Task dialog box, click OK to confirm deletion.

5 When an informational message appears, click OK.

CommandCentral Storage Change Manager deletes tasks with a status ofSUCCESSFUL or FAILED and cancels and deletes tasks with a status ofQUEUED, SCHEDULED, or SERIALIZED.

Accessing online HelpCommandCentral Storage Change Manager offers a cross-platform, browser-basedonline Help system. You can access the online Help from anywhere in theCommandCentral Storage Change Manager Console.

You can also access manual pages for help with CommandCentral Storage ChangeManager commands.

For more information about manual pages, refer to the CommandCentralAdministrator’s Guide.

To access online Help

◆ In the Console header or, in a dialog box or wizard, click Help.

The online Help displays.

See “Online Help options” on page 37.

Online Help optionsThe following table describes the options you can use to work with the onlineHelp.

37Using the CommandCentral Storage Change Manager ConsoleAccessing online Help

Page 38: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 2-4 Online Help options

DescriptionIconOption

Displays the table of contents location of the currenthelp topic.

Show in Contents

Moves from the current help topic to the next help topicin the table of contents.

Previous

Moves from the current help topic to the previous helptopic in the table of contents.

Next

Prints the current help topic.Print

Adds the current help topic to your Web browser’sFavorites or Bookmarks list.

Bookmark

Using the CommandCentral Storage Change Manager ConsoleAccessing online Help

38

Page 39: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Using the Dashboard todisplay an overview ofrecent changes andviolations

This chapter includes the following topics:

■ About the Dashboard

■ Viewing the Dashboard

■ Viewing data from the Dashboard’s graphs

About the DashboardYou can view the Dashboard to display an overall view of the recent changes andviolations in your data center. This allows you to identify current impacts andhelps you to visualize storage change trends in your data center.

In the Dashboard, you can view the following graphs:

■ Host Summary: For each policy category, displays the number of hosts thathave policies applied to them and the number of hosts that have associatedviolations.

■ Application Summary: For each policy category, displays the number ofapplications that have policies applied to them and the number of applicationsthat have associated violations.

3Chapter

Page 40: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

■ Changes in Last 24 Hrs: For the last twenty-four hours, displays the totalnumber of changes, the number of changes that caused violations, and thenumber of changes that resolved violations. The graph further breaks downthis information by storage resource type—for example, by host and application.

■ Violation Summary: For each category of violation, displays the total numberof unresolved violations.

■ Change Trend: For each of the last seven days, displays the total number ofchanges and the number of changes that caused violations.

Viewing the DashboardYou can view the Dashboard to display graphs that detail the number of recentviolations and changes.

To view the Dashboard

◆ In the CommandCentral Storage Change Manager Console, click Home.

The Dashboard appears.

Viewing data from the Dashboard’s graphsThe Dashboard displays several graphs that provide insight into recent changesand violations. You can drill down to view the data from these graphs.

For example, the Changes in Last 24 Hrs graph may identify five changes to storagearrays. You can click the data point for Array to display the change messages forthese five changes. When you do this, CommandCentral Storage Change Managerdisplays the Changes pane and filters the contents of the table to display onlythose five storage array related changes.

To view data from the Dashboard’s graphs

1 In the CommandCentral Storage Change Manager Console, click Home.

2 In the Dashboard, in one of the graphs, click a data point.

The CommandCentral Storage Change Manager Console displays theinformation from the data point.

Using the Dashboard to display an overview of recent changes and violationsViewing the Dashboard

40

Page 41: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Viewing your storageresources

This chapter includes the following topics:

■ About viewing your storage resources

■ Viewing hosts

■ Viewing storage arrays

■ Viewing fabrics

■ Viewing switches

■ Viewing zones

■ Viewing a host’s storage

■ Viewing clusters

■ Viewing applications

■ Viewing paths

■ About unidentified adapters

■ Viewing unidentified adapters

■ About unenclosed devices

■ Viewing unenclosed devices

4Chapter

Page 42: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

About viewing your storage resourcesCommandCentral Storage Change Manager discovers information about thestorage resources in your data center and displays them in its Console. This allowsyou to monitor your storage assets and view detailed information about them.For example, you may want to ensure that a host is a member of an active zone.Or, you may want to know which applications are running on a particular host.

Additionally, if you use CommandCentral Storage on your Management Server,when you view details about your storage resources in CommandCentral StorageChange Manager, you can click a link that loads the CommandCentral StorageConsole. In CommandCentral Storage, you can then view and perform operationson that storage resource.

See “About the hyperlinks that display in tables” on page 24.

Viewing hostsYou can view the hosts that CommandCentral Storage Change Manager discoversin your network. In the Hosts pane, the Hosts table displays basic informationabout each host. For example, you can view the IP address and the OS type foreach host.

You can also view detailed information about each host. After you select a hostfrom the Hosts table, you can select the following panes:

■ Summary: Displays full details about the host

■ HBAs: The HBAs to which the host connects

■ HBA Ports: The ports through which the host and HBAs connect

■ Applications: The applications that run on the host

■ Volumes: The volumes associated with the host

■ LUNs: The LUNs allocated to the host

■ Device Handles: The device handles associated with the host

■ Active Zones: The active zones that the host belongs to

■ Defined Zones: The defined zones that the host belongs to

■ Virtual Machines: The virtual machines that run on the host

■ Storage Pools: The storage pools assigned to the virtual machines that run onthe host

Viewing your storage resourcesAbout viewing your storage resources

42

Page 43: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

To view hosts

1 In the CommandCentral Storage Change Manager Console, click Inventory> Hosts.

2 To view more details about a specific host, in the Hosts table, select a host.

The tabs beneath the Hosts table activate and display more details about thehost.

Viewing storage arraysYou can view the storage arrays that CommandCentral Storage Change Managerdiscovers in your network. In the Arrays pane, the Arrays table displays basicinformation about each storage array. For example, you can view the vendor andmodel of each storage array.

You can also view detailed information about each storage array. After you selecta storage array from the Arrays table, you can select the following panes:

■ Summary: Displays full details of the storage array

■ LUNs: The LUNs that reside inside the storage array

■ LUN Maskings: The paths from the LUNs that reside in the storage array tothe hosts that consume the LUN

■ Adapters: The adapters associated with the storage array

■ Ports: The ports associated with the storage array

■ Zones: The zones that the storage array belongs to

■ Aliases: The zone aliases that the storage array belongs to

To view arrays

1 In the CommandCentral Storage Change Manager Console, click Inventory> Arrays.

2 To view more details about a specific storage array, in the Arrays table, selectan array.

The tabs beneath the Arrays table activate and display more details aboutthe array.

Viewing fabricsYou can view the fabrics that CommandCentral Storage Change Manager discoversin your network. In the Fabrics pane, the Fabrics table displays basic information

43Viewing your storage resourcesViewing storage arrays

Page 44: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

about each fabric. For example, you can view the number of switches and portsin each fabric.

You can also view detailed information about each fabric. After you select a fabricfrom the Fabrics table, you can select the following panes:

■ Summary: Displays full details about the fabric

■ Switches: The switches associated with the fabric

■ Arrays: The storage arrays associated with the fabric

■ Hosts: The hosts associated with the fabric

■ Ports: The ports associated with the fabric

To view fabrics

1 In the CommandCentral Storage Change Manager Console, click Inventory> Fabrics.

2 To view more details about a specific fabric, in the Fabrics table, select afabric.

The tabs beneath the Fabrics table activate and display more details aboutthe fabric.

Viewing switchesYou can view the switches that CommandCentral Storage Change Managerdiscovers in your network. In the Switches pane, the Switches table displays basicinformation about each switch. For example, you can view the vendor and modelof each switch.

You can also view detailed information about each switch. After you select a switchfrom the Switches table, you can select the following panes:

■ Summary: Displays full details about the switch

■ Ports: The ports that connect each switch to other network nodes

To view switches

1 In the CommandCentral Storage Change Manager Console, click Inventory> Switches.

2 To view more details about a specific switch, in the Switches table, select aswitch.

The tabs beneath the Switches table activate and display more details aboutthe switch.

Viewing your storage resourcesViewing switches

44

Page 45: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Viewing zonesYou can view the zones that CommandCentral Storage Change Manager discoversin your network. In the Zones pane, you can view information about the followingtypes of zones:

■ Active zones—The zones currently enforced on a fibre channel fabricSee “Viewing active zones” on page 45.

■ Defined zones—All active and inactive zones on the fibre channel fabricSee “Viewing defined zones” on page 45.

■ Zone aliases—A device or group of devices on a SAN fabric that is assigned asymbolic name (alias)See “Viewing zone aliases” on page 46.

■ Zone sets—A set of zone definitions for a single fibre channel fabricSee “Viewing zone sets” on page 47.

Viewing active zonesYou can view the active zones that CommandCentral Storage Change Managerdiscovers in your network. In the Active Zones pane, the Active Zones table displaysbasic information about each active zone. For example, you can view the numberof members that belong to the active zone.

You can also view detailed information about each active zone. After you selectan active zone from the Active Zones table, you can select the following panes:

■ Summary: Displays full details about an active zone

■ Members: Lists details about the members of the active zone

To view active zones

1 In the CommandCentral Storage Change Manager Console, click Inventory> Zoning > Active Zones.

2 To view more details about a specific active zone, in the Active Zones table,select an active zone.

The tabs beneath the Active Zones table activate and display more detailsabout the active zone.

Viewing defined zonesYou can view the defined zones that CommandCentral Storage Change Managerdiscovers in your network. In the Defined Zones pane, the Defined Zones table

45Viewing your storage resourcesViewing zones

Page 46: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

displays basic information about each defined zone. For example, you can viewthe number of members that belong to the defined zone.

You can also view detailed information about each defined zone. After you selecta defined zone from the Defined Zones table, you can select the following panes:

■ Summary: Displays full details about the defined zone

■ Members: The members of the defined zone

■ Zone Sets: The zone sets to which the defined zone belongs

To view defined zones

1 In the CommandCentral Storage Change Manager Console, click Inventory> Zoning > Defined Zones.

2 To view more details about a specific defined zone, in the Defined Zones table,select a defined zone.

The tabs beneath the Defined Zones table activate and display more detailsabout the defined zone.

Viewing zone aliasesYou can view the zone aliases that CommandCentral Storage Change Managerdiscovers in your network. In the Zone Aliases pane, the Zone Aliases table displaysbasic information about each zone alias. For example, you can view the numberof members that belong to the zone alias.

You can also view detailed information about each zone alias. After you select azone alias from the Zone Aliases table, you can select the following panes:

■ Summary: Displays full details about the zone alias

■ Members: The members of the zone alias

■ Zones: The zones that the zone alias belongs to

To view zone aliases

1 In the CommandCentral Storage Change Manager Console, click Inventory> Zoning > Zone Aliases.

2 To view more details about a specific zone alias, in the Zone Aliases table,select a zone alias.

The tabs beneath the Zone Aliases table activate and display more detailsabout the zone alias.

Viewing your storage resourcesViewing zones

46

Page 47: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Viewing zone setsYou can view the zone sets that CommandCentral Storage Change Managerdiscovers in your network. In the Zone Sets pane, the Zone Sets table displaysbasic information about each zone set. For example, you can view the number ofmembers that belong to the zone set.

You can also view detailed information about each zone set. After you select azone set from the Zone Sets table, you can select the following panes:

■ Summary: Displays full details about the zone set

■ Defined Zones: The defined zones that belong to the zone set

To view zone sets

1 In the CommandCentral Storage Change Manager Console, click Inventory> Zoning > Zone sets.

2 To view more details about a specific zone set, in the Zone Sets table, selecta zone set.

The tabs beneath the Zone Sets table activate and display more details aboutthe zone set.

Viewing a host’s storageYou can view the storage that CommandCentral Storage Change Manager discoversfor a host in your network. In the Host Storage pane, you can view informationabout the following types of storage for a host:

■ VolumesSee “Viewing a host’s volumes” on page 47.

■ Disk groupsSee “Viewing a host’s disk groups” on page 48.

Viewing a host’s volumesYou can view the volumes for the hosts that CommandCentral Storage ChangeManager discovers in your network. In the Volumes pane, the Volumes tabledisplays basic information about each volume. For example, you can view thevolume’s total capacity and the host to which it belongs.

You can also view detailed information about each volume. After you select avolume from the Volumes table, you can select the following panes:

■ Summary: Displays full details of the volume

47Viewing your storage resourcesViewing a host’s storage

Page 48: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

■ Applications: The applications associated with the volume

■ File Systems: The file systems associated with the volume

■ LUNs: The LUNs associated with the volume

■ Disks: The disks associated with the volume

To view a host’s volumes

1 In the CommandCentral Storage Change Manager Console, click Inventory> Host Storage > Volumes.

2 To view more details about a specific volume, in the Volumes table, select avolume.

The tabs beneath the Volumes table activate and display more details aboutthe volume.

Viewing a host’s disk groupsYou can view the disk groups for the hosts that CommandCentral Storage ChangeManager discovers in your network. In the Disk Groups pane, the Disk Groupstable displays basic information about each disk group. For example, you can viewa disk group’s used capacity and available capacity.

You can also view detailed information about each disk group. After you select adisk group from the Disk Groups table, you can select the following panes:

■ Summary: Displays full details of the disk group

■ Applications: The applications associated with the disk group

■ File Systems: The file systems associated with the disk group

■ Volumes: The volumes associated with the disk group

■ LUNs: The LUNs associated with the disk group

■ Disks: The disks that belong to the disk group

To view a host’s disk groups

1 In the CommandCentral Storage Change Manager Console, click Inventory> Host Storage > Disk Groups.

2 To view more details about a specific disk group, in the Disk Groups table,select a disk group.

The tabs beneath the Disk Groups table activate and display more detailsabout the disk group.

Viewing your storage resourcesViewing a host’s storage

48

Page 49: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Viewing clustersYou can view the clusters that CommandCentral Storage Change Manager discoversin your network. In the Clusters pane, the Clusters table displays basic informationabout each cluster. For example, you can view the number of nodes and servicegroups within the cluster.

You can also view detailed information about each cluster. After you select acluster from the Clusters table, you can select the following panes:

■ Summary: Displays full details of the cluster

■ Service Groups: The service groups that the cluster hosts

■ Resources: Associated storage resources, such as disk groups and volumes

■ LUNs: The LUNs associated with the cluster

■ HBAs: The HBAs to which the nodes in the cluster connect

■ HBA Ports: The ports through which the HBAs and nodes within the clusterconnect

■ Applications: The applications that run on the cluster

■ Nodes: The nodes (hosts) that belong to the cluster

To view clusters

1 In the CommandCentral Storage Change Manager Console, click Inventory> Clusters.

2 To view more details about a specific cluster, in the Clusters table, select acluster.

The tabs beneath the Clusters table activate and display more details aboutthe cluster.

Viewing applicationsYou can view the applications that CommandCentral Storage Change Managerdiscovers in your network. In the Applications pane, the Applications table displaysbasic information about each application. For example, you can view anapplication’s total size and the host that runs the application.

You can also view detailed information about each application. After you selectan application from the Applications table, you can select the following additionalpanes:

■ Details: Displays full details about the cluster

49Viewing your storage resourcesViewing clusters

Page 50: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

■ Volumes: The volumes associated with the application

■ Device Handles: The device handles associated with the application

■ LUNs: The LUNs associated with the application

■ File Systems: The file systems associated with the application

To view basic information about applications

1 In the CommandCentral Storage Change Manager Console, click Inventory> Applications.

2 To view more details about a specific application, in the Applications table,select an application.

The tabs beneath the Applications table activate and display more detailsabout the application.

Viewing pathsYou can view the paths from a host to a LUN that CommandCentral Storage ChangeManager discovers in your network. In the Paths pane, the Paths table displaysbasic information about each path. For example, you can view the host and storagearray for which the path exists.

You can also view detailed information about each path. After you select a pathfrom the Paths table, you can select the following panes:

■ Details: Displays full details about the path

■ Paths: Displays the network resources that connect the host to a LUN—forexample, the HBA and HBA port

To view paths

1 In the CommandCentral Storage Change Manager Console, click Inventory> Paths.

2 To view more details about a specific path, in the Paths table, select a path.

The tabs beneath the Paths table activate and display more details about thepath.

About unidentified adaptersSometimes CommandCentral Storage Change Manager cannot completely discoveran HBA or storage device that has logged into a Fibre Channel switch. This canoccur in any of the following circumstances:

Viewing your storage resourcesViewing paths

50

Page 51: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

■ The Management Server is not configured to communicate with the HardwareAbstraction Layer (HAL) on the remote host to which the HBA connects

■ The HBA has an unsupported HBA card or driver version

■ None of the device’s LUNs are visible to a CommandCentral Storage ChangeManager Management Server or managed hostThis happens, for example, when the device is zoned out of view of the host.

■ The switch name server does not provide enough information (that is, a SCSIINQUIRY string) to determine whether a discovered adapter belongs to anHBA or a device

■ The object’s vendor (a discoverable attribute) is not known to be a storagevendor

In these circumstances, CommandCentral Storage Change Manager categorizesthe device as an unidentified adapter. You can take the necessary steps to correlatethe unidentified adapter (HBA) to the host to which it connects.

See “How CommandCentral performs agentless discovery by creating host objects”on page 100.

Viewing unidentified adaptersYou can view the list of adapters that CommandCentral Storage Change Managercannot identify. From the unidentified adapters table, you can take the necessarysteps to correlate the unidentified adapter (HBA) with the host to which it connects.

See “How CommandCentral performs agentless discovery by creating host objects”on page 100.

To view unidentified adapters

◆ In the CommandCentral Storage Change Manager Console, click Inventory> Lost and Found > Unidentified Adapters.

The Unidentified Adapters pane appears.

About unenclosed devicesGeneric or unenclosed devices include disks and other storage devices that arenot grouped into enclosures in the CommandCentral Storage Change ManagerConsole. Examples of unenclosed storage devices include JBODs and unconfiguredstorage arrays.

51Viewing your storage resourcesViewing unidentified adapters

Page 52: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Viewing unenclosed devicesYou can view the list of devices that CommandCentral Storage Change Manageridentifies as unenclosed devices. This includes JBODs and unconfigured storagearrays.

To view unenclosed devices

◆ In the CommandCentral Storage Change Manager Console, click Inventory> Lost and Found > Unenclosed Devices.

The Unenclosed Devices pane appears.

Viewing your storage resourcesViewing unenclosed devices

52

Page 53: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Monitoring changes to yourstorage resources

This chapter includes the following topics:

■ About monitoring changes to your storage resources

■ About change messages

■ About aggregate change messages

■ About effects and impacts

■ Viewing changes to your storage resources

Aboutmonitoring changes to your storage resourcesWhen changes occur to the storage resources in your data center, CommandCentralStorage Change Manager detects the changes and displays detailed informationabout them in the Console. This allows you to monitor the planned and unplannedchanges that occur to your storage resources. You can then assess the impactthose changes have on your storage infrastructure.

For example, a database that is vital to your business might lose connectivity toyour network. When this happens, CommandCentral Storage Change Managerdetects the change and generates a change message in the Console. Because youhave immediate information about this change, you can take the necessary actionto restore connectivity to the database. As a result, you reduce downtime andensure the availability of your storage infrastructure.

Additionally, some changes may have multiple effects. For example, if an HBAport goes offline, a host may lose the path to a set of LUNs. Because you are awarethat the root cause of the problem is the offline HBA port, you can correct theproblem with the HBA port to regain the host’s path to the LUNs.

5Chapter

Page 54: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

About change messagesCommandCentral Storage Change Manager displays information about changesto your storage resources in the form of change messages. Each change messagedescribes the storage resource that was changed, the type of change made to theobject, and, when applicable, any associated objects. For example, a change messagemight inform you of a configuration change to an active zone in a fabric.

Changes messages also identify violations. When a change impacts a violation,the change message includes an icon. The following table details these icons.

Table 5-1 Icons that indicate that a change impacts a violation

DescriptionIcon

The change caused a violation.

The change resolved a violation.

About aggregate change messagesCommandCentral Storage Change Manager organizes related changes intoaggregate change messages. An aggregate change message provides a high leveloverview of a collection of changes. Each aggregate change message describesthe type of change that occurred to the storage resource—for example, aconfiguration change. When you expand the aggregate change message, individualchange messages display. These change messages describe specific changes madeto the storage resource.

For example, in the following figure, an aggregate change message informs youof a configuration change to a storage array. When you expand the aggregatechange message, the change messages detail the configuration changes—in thiscase, three disks were added to the storage array.

Figure 5-1 Example of an aggregate change message

Monitoring changes to your storage resourcesAbout change messages

54

Page 55: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

About effects and impactsWhen you log in to the Console and view new change messages, you may want tofocus on those changes that have the biggest impact on your datacenter. To helpyou do this, the Changes table identifies the effects and impacts that are associatedwith a change message. Effects and impacts identify that a change has affectedother storage resources within your datacenter.

Effects provide information that is important, but not critical. For example, achange message may inform you that a new tablespace was configured on anOracle database. The effect of this change is that the database started consumingstorage from LUNs.

Impacts provide information that may be critical to managing your storageinfrastructure. For example, a change message may inform you that a host lostconnectivity in a fabric. The impact is that the host lost access to a device handleon an array.

There are two ways that you can identify if a change has an effect or impact. Inthe Changes table, the columns, Effects and Impacts, count the number of effectsor impacts. These columns are hidden by default. Additionally, two icons appearin the change message that indicate a change has an effect or impact. The followingtable details these icons.

Table 5-2 Icons that indicate that a change has an effect or impact

DescriptionIcon

The change includes an effect.

The change includes an impact.

Viewing changes to your storage resourcesYou can view messages that describe storage–related changes made in your datacenter. In the Changes pane, the Changes table displays change messages thatdescribe the changes to your storage resources. The changes table also includesbasic information about each change—for example, the time the change took place.

As you view the change messages, there are several options that you can use tofind the information that you are looking for. You can search, filter, group, andsort the information. For more information, refer to the following topic:

See “Working with tables” on page 24.

55Monitoring changes to your storage resourcesAbout effects and impacts

Page 56: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

You can also view more detailed information for each change message. When youselect a change message from the Changes table, you can select the followingpanes:

■ Details: Displays full details about a change message.

■ Caused Violations: If the change causes a violation, this pane displays detailsabout the violation. You can view a description of the violation and you canclick the violation type to link to the Violations pane. In the Violations pane,you can view more details about the violation.See “Viewing violations” on page 80.

■ Resolved Violations: If the change resolves a violation, this pane displaysdetails about the violation. You can view a description of the violation and youcan click the violation type to link to the Violations pane. In the Violationspane, you can view more details about the violation.See “Viewing violations” on page 80.

To view change messages

1 In the CommandCentral Storage Change Manager Console, click Changes.

2 To view more details about a specific change, in the Changes table, select achange message.

The Details pane displays.

Monitoring changes to your storage resourcesViewing changes to your storage resources

56

Page 57: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Monitoring your storageresources with custompolicies

This chapter includes the following topics:

■ About custom policies

■ Creating storage service policies

■ Creating compliance policies

■ Working with your custom policies

■ Specifying an SMTP server to receive emails of violations to policies

About custom policiesYou can use custom policies to monitor your storage resources. With custompolicies, you define the aspects of your storage resources that you wantCommandCentral Storage Change Manager to monitor. When a change to a storageresource does not meet the requirements of a policy, CommandCentral StorageChange Manager notifies you of a violation. This allows you to monitor the changesthat do not meet the defined settings for your storage resources.

Each custom policy consists of one or more conditions. Each condition specifiesan aspect of a storage resource that you want CommandCentral Storage ChangeManager to monitor. For example, a condition might define the required firmwareversion for storage arrays from a specific vendor and model.

After you apply a policy to your storage resources, CommandCentral StorageChange Manager monitors those storage resources for compliance with your

6Chapter

Page 58: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

policy. For example, you might create a policy that includes a condition thatdefines that the number of paths must be at least three. Then, you apply thispolicy to a host in your data center. Initially, the host may have more than threepaths to each of the LUNs that it consumes. However, after a change, the numberof paths to a LUN reduces to two. When this happens, CommandCentral StorageChange Manager generates a violation to notify you.

See “About violations” on page 77.

With custom policies, you can do the following:

■ Specify who you want to receive email notifications of all violations to thepolicy. Additionally, when you assign the policy to storage resources, you canspecify who you want to receive email notifications of violations to thoseselected storage resources.

■ Assign a resolution time. When a change violates a policy, CommandCentralStorage Change Manager includes this resolution time in the violation. Thisallows you to define the amount of time that you want a storage administratorto resolve the violation.

■ Assign a criticality level. For example, you can assign a criticality level of Low,Medium, or High. Criticality levels allow you to define which violations requirethe most attention.

You can create the following types of custom policies:

■ Storage service policies—these policies allow you to define connectivity andconfiguration requirements for hosts, applications, and host–to–LUN pairsSee “About storage service policies” on page 58.

■ Compliance policies—these policies monitor the firmware version for switches,storage arrays, and HBAsSee “About compliance policies” on page 59.

About storage service policiesYou can use storage service policies to select conditions from one or more of thefollowing categories:

■ Connectivity—The conditions in this category allow you to specify the requirednumber of paths and hops, or redundancies in your SAN. For example, youcan add a condition that defines that a single point of failure cannot exist froma host to a LUN. You can further specify that more than one HBA connectionmust exist between a host and LUN.

■ Storage Configuration—The conditions in this category allow you to specifythe properties of consumed volumes and LUNs. For example, you can add a

Monitoring your storage resources with custom policiesAbout custom policies

58

Page 59: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

condition that defines that a storage resource should consume LUNs fromspecific storage arrays in your data center.

You can apply storage service policies to hosts, applications, and host–to–LUNpairs.

About compliance policiesYou can use compliance policies to select conditions that specify the requiredfirmware versions for switches, storage arrays, and HBAs. For example, you mightcreate a compliance policy that defines a specific firmware version for all EMCDMX800 storage arrays. Additionally, you can specify the required driver versionfor HBAs.

About a custom policy’s statusAs you work with your policy—for example, when you apply it to your storageresources or when you enable and disable it—CommandCentral Storage ChangeManager assigns a status to the policy. The status appears in the Policies table.You can view a policy’s status to understand how the policy is currently monitoringyour storage resources.

A policy has one of the following statuses:

■ Active—This status appears when you apply the policy to one or more storageresources. In this state, CommandCentral Storage Change Manager activelymonitors the policy against all the storage resources to which you applied thepolicy.

■ Partially Active—This status appears when you apply the policy to two or morestorage resources, then you deactivate the policy on one of those storageresources. In this state, CommandCentral Storage Change Manager activelymonitors the policy only for those storage resources with an active status.

■ Inactive—This status appears when you apply the policy to one or more storageresources, then you deactivate the policy for each of those storage resources.In this state, CommandCentral Storage Change Manager does not activelymonitor the policy against any of the storage resources to which you appliedthe policy.

■ Not Applied—This status appears when you do not apply the policy to anystorage resources. In this state, CommandCentral Storage Change Managerdoes not monitor the policy against any storage resources.

■ Disabled—This status appears when you disable the policy. In this state,CommandCentral Storage Change Manager does not actively monitor thepolicy against any of the storage resources to which you applied the policy.

59Monitoring your storage resources with custom policiesAbout custom policies

Page 60: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Additionally, when you apply the policy to your storage resources, the policy canbe active or inactive for each storage resource. For example, you can apply a policyto two storage resources and that policy can be active for one and inactive for theother. When you select a policy, these statuses appear in the Applied on Objectstab. Descriptions of these statuses are as follows:

■ Active—This status appears when you active the policy on a storage resource.In this state, CommandCentral Storage Change Manager actively monitors thepolicy against the storage resource.

■ Inactive—This status appears when you deactivate the policy on the storageresource. In this state, CommandCentral Storage Change Manager does notactively monitor the policy against the storage resource.

About the Path Outage policyCommandCentral Storage Change Manager ships with one pre-defined custompolicy—the Path Outage policy. The Path Outage policy monitors the path betweena host and a LUN. If a host loses access to a LUN, CommandCentral Storage ChangeManager generates a violation. For example, a path outage may occur due to afibre channel connection failure or zoning or masking errors.

By default, CommandCentral Storage Change Manager enables the Path Outagepolicy on all of your storage resources. You cannot edit or delete this policy. Youcan, however, enable and disable the policy.

See “About custom policies” on page 57.

Creating storage service policiesYou can create a storage service policy to define connectivity or configurationrequirements for your storage resources.

To create a storage service policy

1 In the CommandCentral Storage Change Manager Console, click Policies.

2 In the Policies pane, in the Tasks panel, click New Storage Service Policy.

3 In the Create New Policy Welcome panel, read the instructions and click Next.

4 In the Policy Conditions panel, enter the required information and click Next.

See “Policy Conditions panel options” on page 61.

5 In the Policy Properties panel, enter the required information and click Next.

See “Policy Properties panel options” on page 63.

Monitoring your storage resources with custom policiesCreating storage service policies

60

Page 61: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

6 In the Policy Summary panel, review the details of the policy. Then, to createthe policy, click Create.

7 In the Policy Creation Complete panel, do one of the following:

■ To apply the policy to your storage resources, click Next.

■ To exit the Create New Policy wizard, click Finish.The policy appears in the Policies table with a status of Not Applied. Youcan apply the policy to your storage resources at a later time.See “Applying custom policies to your storage resources” on page 73.

8 In the Applying the Policy to Objects panel, do the following and click Next:

■ Click a tab to select a storage resource type.

■ In the table, select (check) one or more storage resources.You can select storage resources from more than one tab.

9 In the Email Notification panel, in the Email address field, type one or moreemail addresses. Then, click Finish.

When a change to the selected storage resource violates the policy,CommandCentral Storage Change Manager emails details of the violation tothe email addresses that you specify in this field.

10 When a confirmation message appears, click OK.

CommandCentral Storage Change Manager applies the policy to the specifiedstorage resources.

Policy Conditions panel optionsUse this panel to select the conditions for your storage service policy. You canselect one or more conditions from each of the two categories—Connectivity andStorage Configuration. Click Connectivity or Storage Configuration to display theoptions for each respective category.

The following table details the available options for the Connectivity tab.

Table 6-1 Connectivity options

DescriptionField

Select (check) this option to specify the least number of pathsthat should exist from a host to a LUN. Then, in the text box, typethe least number of paths that you want from a host to a LUN.

A path is the route through which the host accesses data on aLUN. The path consists of an HBA on the host, a SCSI or FCconnector, and a controller on the disk or disk array.

The number of pathsmust be at least

61Monitoring your storage resources with custom policiesCreating storage service policies

Page 62: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 6-1 Connectivity options (continued)

DescriptionField

Select (check) this option to specify the maximum number ofhops from a host to a LUN. Then, in the text box, type themaximum number of hops that you want from a host to a LUN.

The number of hopsmust be no greater than

Select (check) this option if you do not want a single point offailure along the path. After you select this option, to specify thetype of storage resource that should not have a single point offailure along the path, select (check) one or more of the following:

■ Switch redundancy required

■ HBA redundancy required

■ Array controller redundancy required

No single point offailure

Select (check) this option if you do not want a single point offailure in a fabric.

Fabric redundancyrequired

The following table details the available options for the Storage Configurationtab.

Table 6-2 Storage Configuration options

DescriptionField

Do the following to specify the properties of consumed volumes:

■ In the drop-down list, select a property.

■ In the values box, select a value for the property.

■ Click Add Condition.

The properties ofconsumed volumesmust be

Do the following to specify the properties of consumed LUNs:

■ In the drop-down list, select a property.

■ In the values box, select a value for the property.

■ Click Add Condition.

The properties ofconsumed LUNs mustbe

Do the following to specify the storage arrays that you want hostsor applications to consume LUNs from:

■ Click Select Specific Arrays.

■ In the Select Specific Arrays table, select (check) one or morestorage arrays.

■ Click OK.

Consumed LUNs mustbe from specific arrays

Monitoring your storage resources with custom policiesCreating storage service policies

62

Page 63: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Policy Properties panel optionsUse this panel to specify the properties of your policy.

Table 6-3 Policy Properties options

DescriptionField

Enter a name for the policy.

The maximum number of characters that you can enter is 100.

Name

(Optional) Enter a description for the policy.

The maximum number of characters that you can enter is 300.

Description

Select the criticality level for the policy. For example, you canselect High if you want violations to this policy to receive a highpriority.

Criticality

(Optional) Select the resolution time for a violation against thepolicy. The resolution time appears when you view a violationagainst the policy. This is helpful if you want a CommandCentralStorage Change Manager user to address the violation in a certaintime frame.

Resolution time

(Optional) Enter the email addresses for the users who you wantto receive an email notification of all violations against the policy.

The maximum number of characters that you can enter is 200.

To enable CommandCentral Storage Change Manager to sendemail notifications, you must specify an SMTP server.

See “Specifying an SMTP server to receive emails of violationsto policies” on page 76.

Send email notificationto

Creating compliance policiesYou can create a compliance policy to define compliance requirements for switches,arrays, and HBAs. For example, you can specify the required firmware versionfor a specific type of storage array.

To create a compliance policy

1 In the CommandCentral Storage Change Manager Console, click Policies.

2 In the Policies pane, in the Tasks panel, click New Compliance Policy.

63Monitoring your storage resources with custom policiesCreating compliance policies

Page 64: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

3 In the Create New Policy Welcome panel, enter the required information andclick Next.

See “Create New Policy Welcome panel options” on page 64.

4 In the Policy Conditions panel, enter the required information and click Next.

See “Policy Conditions panel options for switches” on page 65.

See “Policy Conditions panel options for storage arrays” on page 66.

See “Policy Conditions panel options for HBAs” on page 68.

5 In the Policy Properties panel, enter the required information and click Next.

See “Policy Properties panel options” on page 63.

6 In the Policy Summary panel, review the details of the policy. Then, to createthe policy, click Create.

7 In the Policy Creation Complete panel, do one of the following:

■ To apply the policy to your storage resources, click Next.

■ To exit the Create New Policy wizard, click Finish.The policy appears in the Policies table with a status of Not Applied. Youcan apply the policy to your storage resources at a later time.See “Applying custom policies to your storage resources” on page 73.

8 In the Applying the Policy to Objects panel, do the following and click Next:

■ Click a tab to select a storage resource type.

■ In the table, select (check) one or more storage resources.You can select storage resources from more than one tab.

9 In the Email Notification panel, in the Email address field, type one or moreemail addresses. Then, click Finish.

When a change to the selected storage resource violates the policy,CommandCentral Storage Change Manager emails details of the violation tothe email addresses that you specify in this field.

10 When a confirmation message appears, click OK.

CommandCentral Storage Change Manager applies the policy to the specifiedstorage resources.

Create New Policy Welcome panel optionsUse this panel to select the storage resource that you want to create a compliancepolicy for.

Monitoring your storage resources with custom policiesCreating compliance policies

64

Page 65: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 6-4 Create New Policy Welcome panel options

DescriptionField

Select to specify compliance conditions for switches.Switch Compliance

Select to specify compliance conditions for storage arrays.Array Compliance

Select to specify compliance conditions for HBAs.HBA Compliance

Policy Conditions panel options for switchesUse this panel to specify conditions that define the firmware version that certainswitches should have.

Table 6-5 Policy Conditions panel options for switches

DescriptionField

In the drop-down list, select a vendor.Vendor

In the drop-down list, select one of the following:

■ equals—Select to use an exact value to specify one or more modelnumbers (separate model numbers by pressing Enter)

■ reg expr—Select to use a Java regular expression to specify themodel number

In the text box, do one of the following:

■ If you selected equals, do one of the following:

■ Type the model number

■ Click the Reference icon and then, from the list, select a modelnumber

■ If you selected reg expr, type a Java regular expression

See “Regular Expression Syntax” on page 28.

Model

65Monitoring your storage resources with custom policiesCreating compliance policies

Page 66: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 6-5 Policy Conditions panel options for switches (continued)

DescriptionField

In the drop-down list, select one of the following:

■ equals—Select to use an exact value to specify one or more firmwareversions (separate firmware versions by pressing Enter)

■ reg expr—Select to use a Java regular expression to specify thefirmware version

In the text box, do one of the following:

■ If you selected equals, do one of the following:

■ Type the firmware version

■ Click the Reference icon and then, from the list, select afirmware version

■ If you selected reg expr, type a Java regular expression

See “Regular Expression Syntax” on page 28.

Firmware Version

Click to add the condition to the policy.Add

After you click Edit and make modifications to a condition, click Saveto save your edits.

Save

After you click Edit and make modifications to a condition, click Cancelto cancel your edits.

Cancel

Click to edit the condition. To save your edits, click Save.

This option appears after you add a condition to the policy.

Edit icon

Click to remove the condition from the policy.

This option appears after you add a condition to the policy.

Remove icon

Policy Conditions panel options for storage arraysUse this panel to specify conditions that define the firmware version that certainstorage arrays should have.

Table 6-6 Policy Conditions panel options for storage arrays

DescriptionField

In the drop-down list, select a vendor.Vendor

Monitoring your storage resources with custom policiesCreating compliance policies

66

Page 67: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 6-6 Policy Conditions panel options for storage arrays (continued)

DescriptionField

In the drop-down list, select one of the following:

■ equals—Select to use an exact value to specify one or more modelnumbers (separate model numbers by pressing Enter)

■ reg expr—Select to use a Java regular expression to specify themodel number

In the text box, do one of the following:

■ If you selected equals, do one of the following:

■ Type the model number

■ Click the Reference icon and then, from the list, select a modelnumber

■ If you selected reg expr, type a Java regular expression

See “Regular Expression Syntax” on page 28.

Model

In the drop-down list, select one of the following:

■ equals—Select to use an exact value to specify one or more firmwareversions (separate firmware versions by pressing Enter)

■ reg expr—Select to use a Java regular expression to specify thefirmware version

In the text box, do one of the following:

■ If you selected equals, do one of the following:

■ Type the firmware version

■ Click the Reference icon and then, from the list, select afirmware version

■ If you selected reg expr, type a Java regular expression

See “Regular Expression Syntax” on page 28.

Firmware Version

Click to add the condition to the policy.Add

After you click Edit and make modifications to a condition, click Saveto save your edits.

Save

After you click Edit and make modifications to a condition, click Cancelto cancel your edits.

Cancel

Click to edit the condition. To save your edits, click Save.

This option appears after you add a condition to the policy.

Edit icon

Click to remove the condition from the policy.

This option appears after you add a condition to the policy.

Remove icon

67Monitoring your storage resources with custom policiesCreating compliance policies

Page 68: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Policy Conditions panel options for HBAsUse this panel to select conditions that define the firmware version and, if youchoose, the driver version that certain HBAs should have.

Table 6-7 Policy Conditions panel options for HBAs

DescriptionField

Use this field to specify the vendor of the HBA.

In the drop-down list, select a vendor.

Vendor

Use this field to specify the model of the HBA.

In the drop-down list, select one of the following:

■ equals—Select to use an exact value to specify one or more modelnumbers (separate model numbers by pressing Enter)

■ reg expr—Select to use a Java regular expression to specify themodel number

In the text box, do one of the following:

■ If you selected equals, do one of the following:

■ Type the model number

■ Click the Reference icon and then, from the list, select a modelnumber

■ If you selected reg expr, type a Java regular expression

See “Regular Expression Syntax” on page 28.

Model

Use this field to specify the type of host to which the HBA connects.

In the drop-down list, select one of the following:

■ equals—Select to use an exact value to specify information aboutthe host (separate information by pressing Enter)

■ reg expr—Select to use a Java regular expression to specify the hostinformation

In the text box, do one of the following:

■ If you selected equals, do one of the following:

■ Type the host information

■ Click the Reference icon and then, from the list, select the hostinformation

■ If you selected reg expr, type a Java regular expression

See “Regular Expression Syntax” on page 28.

Hostinfo

Monitoring your storage resources with custom policiesCreating compliance policies

68

Page 69: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 6-7 Policy Conditions panel options for HBAs (continued)

DescriptionField

Select to specify the names of the arrays to which the HBA is attached.To do this, do the following:

■ Click the Reference icon

■ In the Select Specific Arrays table, select one or more storage arrays

■ Click OK

Named

Use this field to specify the firmware version of the device.

In the drop-down list, select one of the following:

■ equals—Select to use an exact value to specify one or more firmwareversions (separate firmware versions by pressing Enter)

■ reg expr—Select to use a Java regular expression to specify thefirmware version

In the text box, do one of the following:

■ If you selected equals, do one of the following:

■ Type the firmware version

■ Click Browse and then, from the list, select a firmware version

■ If you selected reg expr, type a Java regular expression

See “Regular Expression Syntax” on page 28.

Firmware Version

In the drop-down list, select one of the following:

■ equals—Select to use an exact value to specify one or more driverversions (separate driver versions by pressing Enter)

■ reg expr—Select to use a Java regular expression to specify thedriver version

In the text box, do one of the following:

■ If you selected equals, do one of the following:

■ Type the driver version

■ Click Browse and then, from the list, select a driver version

■ If you selected reg expr, type a Java regular expression

See “Regular Expression Syntax” on page 28.

Driver Version

Click to add the condition to the policy.Add

After you click Edit and make modifications to a condition, click Saveto save your edits.

Save

After you click Edit and make modifications to a condition, click Cancelto cancel your edits.

Cancel

69Monitoring your storage resources with custom policiesCreating compliance policies

Page 70: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 6-7 Policy Conditions panel options for HBAs (continued)

DescriptionField

Click to edit the condition. To save your edits, click Save.

This option appears after you add a condition to the policy.

Edit

Click to remove the condition from the policy.

This option appears after you add a condition to the policy.

Remove

Working with your custom policiesAfter you create a custom policy, you can perform several tasks to work with thatpolicy. The following table details what you can do after you create a policy.

Table 6-8 Tasks that you can perform with custom policies

See this topicTasks

“Viewing custom policies” on page 71.View details about a policy.

“Applying custom policies to your storageresources” on page 73.

Apply a policy to one or more of yourstorage resources.

“Editing custom policies” on page 71.Add, edit, or remove conditions from apolicy.

“Editing custom policies” on page 71.Edit the policy’s name, description,criticality, resolution time, or emailaddress.

“Enabling custom policies” on page 72.Activate a disabled policy so thatCommandCentral Storage ChangeManager monitors storage resourcesfor compliance with the policy.

“Disabling custom policies” on page 73.Disable a policy so thatCommandCentral Storage ChangeManager does not monitor storageresources for compliance with thepolicy.

“Deleting custom policies” on page 73.Delete a policy.

“Removing custom policies from your storageresources” on page 75.

Remove a policy from a storageresource.

Monitoring your storage resources with custom policiesWorking with your custom policies

70

Page 71: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 6-8 Tasks that you can perform with custom policies (continued)

See this topicTasks

“Activating custom policies on your storageresources” on page 74.

Activate a policy for a storage resourceto which the policy is applied.

“Deactivating custom policies from your storageresources” on page 75.

Deactivate a policy for a storageresource to which the policy is applied.

Viewing custom policiesYou can view details about the custom policies that you create. In the Policiespane, the Policies table displays basic information about each policy. For example,you can view the number of violations associated with a policy and then link tothe Violations pane to view and resolve those violations.

You can also view more detailed information about each policy. After you selecta policy from the Policies table, you can select the following panes:

■ Details: Displays full details of the policy. For example, you can view the numberof objects to which the policy is applied.

■ Conditions: Displays the policy’s conditions. For example, if you create a policywith the condition fabric redundancy required, that condition appears in theConditions pane.

■ Applied on Objects: Displays the storage resources to which the policy isapplied. You can perform several actions from this pane to work with thesestorage resources.See “Working with your custom policies” on page 70.

To view custom policies

1 In the CommandCentral Storage Change Manager Console, click Policies.

2 To view more details about a specific policy, in the Policies table, select apolicy.

The Details pane appears.

Editing custom policiesYou can edit the conditions and properties of custom policies. For example, youcan add, modify, or delete a condition to a policy. Or, you can modify the policy’sname, description, criticality, resolution time, or email notification.

71Monitoring your storage resources with custom policiesWorking with your custom policies

Page 72: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

To edit a custom policy

1 In the CommandCentral Storage Change Manager Console, click Policies.

2 In the Policies table, select (check) a policy.

3 In the Tasks menu, click Edit Policy.

4 In the Policy Conditions panel, make any modifications and click Next.

For storage service policies, refer to the following:

“Policy Conditions panel options” on page 61.

For compliance policies, refer to the following:

■ “Policy Conditions panel options for switches” on page 65.

■ “Policy Conditions panel options for storage arrays” on page 66.

■ “Policy Conditions panel options for HBAs” on page 68.

5 In the Policy Properties panel, make any modifications and click Next.

See “Policy Properties panel options” on page 63.

6 In the Edit Policy Summary panel, review your changes to the policy. Then,to save the changes, click Next.

7 In the Edit Operation Result panel, click Finish.

8 When a confirmation message appears, click OK.

CommandCentral Storage Change Manager updates the policy with yourchanges.

Enabling custom policiesYou can enable a disabled policy. When you enable a policy, CommandCentralStorage Change Manager assesses the policy against the storage resources towhich the policy is actively applied.

To enable a disabled policy

1 In the CommandCentral Storage Change Manager Console, click Policies.

2 In the Policies table, select (check) a disabled policy.

3 In the Tasks menu, click Enable Policy.

4 In the Enable Policy dialog box, review the details of the policy that you wantto enable. Then, to enable the policy, click OK.

5 When a confirmation message appears, click Close.

CommandCentral Storage Change Manager enables the policy.

Monitoring your storage resources with custom policiesWorking with your custom policies

72

Page 73: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Disabling custom policiesYou can disable an active policy. When you disable a policy, CommandCentralStorage Change Manager does not assess the policy against the storage resourcesto which the policy is applied. Additionally, CommandCentral Storage ChangeManager changes all unresolved violations against the policy to resolved.

To disable an active policy

1 In the CommandCentral Storage Change Manager Console, click Policies.

2 In the Policies table, select (check) an active policy.

3 In the Tasks menu, click Disable Policy.

4 In the Disable Policy dialog box, review the details of the policy that you wantto disable. Then, to disable the policy, click OK.

5 When a confirmation message appears, click Close.

CommandCentral Storage Change Manager disables the policy.

Deleting custom policiesYou can delete custom policies. When you delete a policy, CommandCentral StorageChange Manager changes any unresolved violations against the policy to resolved.

To delete custom policies

1 In the CommandCentral Storage Change Manager Console, click Policies.

2 In the Policies table, select (check) one or more policies.

3 In the Tasks menu, click Delete Policy.

4 In the Delete Policy dialog box, review the details of the polices that you wantto delete. Then, to delete the policies, click OK.

5 When a confirmation message appears, click Close.

CommandCentral Storage Change Manager deletes the policies.

Applying custom policies to your storage resourcesYou can apply custom policies to your storage resources. When you do this,CommandCentral Storage Change Manager assesses the conditions of the policyagainst the storage resources to which you specified.

To apply a custom policy to your storage resources

1 In the CommandCentral Storage Change Manager Console, click Policies.

2 In the Policies table, select (check) a policy.

73Monitoring your storage resources with custom policiesWorking with your custom policies

Page 74: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

3 In the Tasks menu, click Apply on Objects.

4 In the Applying the Policy to Objects panel, do the following and click Next:

■ Click a tab to select a storage resource type.

■ In the table, select (check) one or more storage resources.You can select storage resources from more than one tab.

5 In the Email Notification panel, in the Email address field, type one or moreemail addresses. Then, click Finish.

When a change to the selected storage resource violates the policy,CommandCentral Storage Change Manager emails details of the violation tothe email addresses that you specify in this field.

6 When a confirmation message appears, click OK.

CommandCentral Storage Change Manager applies the policy to the specifiedstorage resources.

Activating custom policies on your storage resourcesAfter you deactivate a policy from a storage resource, you can activate it. Whenactive, CommandCentral Storage Change Manager monitors the storage resourcefor compliance with the applied policy.

To activate a custom policy for a storage resource

1 In the CommandCentral Storage Change Manager Console, click Policies.

2 In the Policies table, select a policy.

3 Click Applied on Objects.

4 In the Applied on Objects table, select (check) a storage resource with anInactive status.

5 In the Applied on Objects pane, in the Tasks menu, click Activate Policy forthis Object.

6 In Activate Policy for this Object dialog box, review the details of the policythat you want to activate. Then, click OK.

7 When a confirmation message appears, click Close.

CommandCentral Storage Change Manager activates the policy on thespecified storage resource.

Monitoring your storage resources with custom policiesWorking with your custom policies

74

Page 75: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Deactivating custom policies from your storage resourcesYou can deactivate a custom policy from specific storage resources. When youdeactivate a policy from a storage resource, CommandCentral Storage ChangeManager does not monitor the storage resource for compliance with the appliedpolicy.

To deactivate a custom policy from specific storage resources

1 In the CommandCentral Storage Change Manager Console, click Policies.

2 In the Policies table, select a policy.

3 Click Applied on Objects.

4 In the Applied on Objects table, select (check) a storage resource with anActive status.

5 In the Applied on Objects pane, in the Tasks menu, click Deactivate Policyfor this Object.

6 In the Deactivate Policy on this Object dialog box, review the details of thepolicy that you want to deactivate. Then, click OK.

7 When a confirmation message appears, click Close.

CommandCentral Storage Change Manager deactivates the policy on thespecified storage resource.

Removing custom policies from your storage resourcesYou can remove a policy from your storage resources. When you do this,CommandCentral Storage Change Manager no longer assesses the policy againstthe specified storage resource. The status of any unresolved violations againstthat storage resource change to system cleared.

To remove a policy from an object

1 In the CommandCentral Storage Change Manager Console, click Policies.

2 In the Policies table, select a policy.

3 Click Applied on Objects.

4 In the Applied on Objects table, select (check) one or more storage resources.

5 In the Applied on Objects pane, in the Tasks menu, click Remove Object.

75Monitoring your storage resources with custom policiesWorking with your custom policies

Page 76: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

6 In the Remove Object dialog box, review the list of storage resources fromwhich you want to remove the policy. Then, to remove the policy from thespecified storage resources, click OK.

7 When a confirmation message appears, click Close.

CommandCentral Storage Change Manager removes the policy from thespecified storage resources.

Specifying an SMTP server to receive emails ofviolations to policies

When you create a custom policy, you can add the email recipients who you wantto receive notifications of violations to policies. CommandCentral Storage ChangeManager sends the notifications by email. In order for CommandCentral StorageChange Manager to send the emails, you need to specify an SMTP server. You onlyneed to specify the SMTP server once. You would only need to specify the serveragain if your SMTP server configuration changes.

To specify an SMTP server

1 On the Management Server, open an operating system console and log in asroot (Solaris) or as a user with administrator-level privileges (Windows).

2 Change to the directory where the scmscli script resides. By default, thelocation is:

■ Solaris: /opt/VRTSccs/VRTSscm/VRTSscms/bin

■ Windows: \Program Files\VERITAS\CommandCentral Storage\Storage

Change Manager\bin

3 Type the following command:

perl scmscli.pl -set-smtp-server server_name server_port

where:

■ server_name is the name of the SMTP server

■ server_port is the SMTP server’s port number

Monitoring your storage resources with custom policiesSpecifying an SMTP server to receive emails of violations to policies

76

Page 77: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Managing violations to yourcustom policies

This chapter includes the following topics:

■ About violations

■ Viewing violations

■ Clearing violations

About violationsWhen you apply a custom policy to a storage resource, CommandCentral StorageChange Manager monitors the storage resource for compliance with the policy.If a change to the storage resource violates the policy, CommandCentral StorageChange Manager generates a violation. You can then use the violation to determinethe impacted storage resources, find the change that caused the violation, andtake the necessary actions to resolve the violation.

CommandCentral Storage Change Manager notifies you of violations in thefollowing ways:

■ Sends an email to the email addresses that you specified in the associatedpolicy. The email contains details of the violation—for example, a descriptionof the violation and the target resolution time to resolve the violation.

■ Provides detailed information about the violation in the Console. For example,you can view details about the affected storage resources so you can understandthe impact to those resources.See “Viewing violations” on page 80.

7Chapter

Page 78: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

About a violation’s statusEach violation displays in the Console with a status. You can use the status toidentify whether you need to take action on the violation. A violation can haveone of four different statuses.

Table 7-1 describes each status.

Table 7-1 Violation statuses

DescriptionStatus

When CommandCentral Storage Change Manager createsa violation, it displays as Unresolved until you resolve orclear the violation.

See “About resolving violations” on page 78.

Unresolved

Violations change to Resolved when a change to the affectedstorage resource corrects the violation.

Resolved

Violations change to System Cleared when CommandCentralStorage Change Manager clears the violation.CommandCentral Storage Change Manager clears theviolation when you do any of the following:

■ Delete the associated policy

■ Change the associated policy by:

■ Editing the conditions of the policy so that thestorage resource’s current connectivity orconfiguration settings do not violate policy conditions

■ Deactivating the policy from the associated storageresource

■ Removing the policy from the associated storageresource

System Cleared

Violations change to Manually Cleared when a user clearsthe violation.

See “Clearing violations” on page 81.

Manually Cleared

About resolving violationsWhen CommandCentral Storage Change Manager creates a violation, it displaysas Unresolved until you resolve or clear the violation. The following exampledescribes how you might resolve or clear a violation.

You create a custom policy that defines that the number of paths from a host toa LUN must be at least three. Then, you apply this policy to a host in your data

Managing violations to your custom policiesAbout violations

78

Page 79: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

center. Later, you receive email notification of a violation against this policy. Thenumber of paths from the host to a LUN has dropped below three.

You decide that you need to know more information about the violation and theaffected storage resources. In the CommandCentral Storage Change ManagerConsole, you view the following:

■ A full description of the violation to determine the affected storage resources

■ The change that caused the violation

■ The path from the impacted host to the impacted LUN

See “Viewing violations” on page 80.

After you view information about the violation and the affected storage resources,you decide that you have enough information to resolve or clear the violation.

Table 7-2 details how you might resolve or clear a violation.

Table 7-2 How to resolve or clear a violation

ResultActionDecision

When CommandCentralStorage Change Managerdiscovers the change, and ifthe connectivity orconfiguration settings of thatstorage resource no longerviolates the policy, the statusof the violation changes fromUnresolved to Resolved.

You use a storage resourcemanagement program, suchas CommandCentral Storage,to reverse the change.

You decide to reverse thechange that was made to thestorage resource.

After you modify theconditions of the policy sothe connectivity orconfiguration settings of thestorage resource no longerviolates the policy, the statusof the violation changes fromUnresolved to SystemCleared.

You modify the conditions ofthe policy.

See “Editing custom policies”on page 71.

You decide that the changeto the storage resource thatgenerated the violation wasvalid—you want the storageresource to have this type ofconnectivity or configurationsetting.

79Managing violations to your custom policiesAbout violations

Page 80: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 7-2 How to resolve or clear a violation (continued)

ResultActionDecision

After you clear the violation,the status of the violationchanges from Unresolved toManually Cleared.CommandCentral StorageChange Manager no longergenerates a violation if achange to this storageresource violates theassociated policy.

You clear the violation.

See “Clearing violations”on page 81.

You decide that the violationis not important for thestorage resource for whichthe violation was generated.

Viewing violationsCommandCentral Storage Change Manager displays violations in its Console. Youcan view basic information about each violation—for example, the associatedpolicy and the criticality of the violation.

You can also view detailed information about each violation. When you select aviolation from the Violations table, you can select the following panes:

■ Details: Displays more detailed information about the violation. For example,you can view a full description of the violation.

■ Caused By: Displays the changes that caused the violation. You can view adescription of the change and you can click the Change ID number to load theChanges pane. In the Changes pane, you can view more details about the changethat caused the violation.See “Viewing changes to your storage resources” on page 55.

■ Resolved By: If the violation was resolved, this pane displays the changes thatresolved the violation. You can view a description of the change and you canclick the Change ID number to load the Changes pane. In the Changes pane,you can view more details about the change that resolved the violation.See “Viewing changes to your storage resources” on page 55.

■ Path: Displays the path from the impacted host to the impacted LUN. You canview the storage resources that the violation affects—for example, the fabricor HBA.

Managing violations to your custom policiesViewing violations

80

Page 81: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

To view violations

1 In the CommandCentral Storage Change Manager Console, click Violations.

2 To view more details about a specific violation, in the Violations table, selecta violation.

The Details pane appears.

Clearing violationsAfter a violation generates, if you decide that you do not want CommandCentralStorage Change Manager to generate the specific violation again, you can clearthe violation. When you clear a violation, its status changes to Manually Cleared.

For example, CommandCentral Storage Change Manager generates a violationbecause a change to a LUN violates a policy that is applied to a host. You decidethat the violation against this LUN is not important, but you still want the policyto generate violations if other LUNs that the host consumes violates the policy.To do this, you clear the violation so that CommandCentral Storage ChangeManager no longer generates a violation if the LUN violates the associated policy.

To clear violations

1 In the CommandCentral Storage Change Manager Console, click Violations.

2 In the Violations table, select (check) one or more violations.

3 In the Tasks drop-down list, click Clear Violation.

4 In the Clear Violation wizard, click OK to clear the selected violations.

The status of the violations change from Unresolved to Manually Cleared.

81Managing violations to your custom policiesClearing violations

Page 82: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Managing violations to your custom policiesClearing violations

82

Page 83: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Using best practice policiesto identify potential risks toyour storage resources

This chapter includes the following topics:

■ About best practice policies

■ Viewing best practice policies

■ Editing best practice policies

■ Enabling best practice policies

■ Disabling best practice policies

■ About risks

■ Viewing risks

About best practice policiesCommandCentral Storage Change Manager includes best practice policies thatmonitor your storage infrastructure using industry recognized best practices forstorage management. You can use these policies to identify potential risks to yourstorage resources.

By default, CommandCentral Storage Change Manager applies these best practicepolicies to all of your storage resources. As CommandCentral Storage ChangeManager detects changes to your storage resources, if a change does not matchthe requirements of a best practice policy, CommandCentral Storage ChangeManager generates a risk.

8Chapter

Page 84: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

See “About risks” on page 86.

You cannot create best practice policies. If you want to create a policy, you cancreate a custom policy.

See “About custom policies” on page 57.

Viewing best practice policiesYou can view details about the best practice policies that ship withCommandCentral Storage Change Manager. In the Risks pane, the Risks tabledisplays basic information about each best practice policy. For example, you canview a policy’s state and the number of associated risks.

You can also view more detailed information about each best practice policy. Afteryou select a best practice policy from the Risks table, you can select the followingpanes:

■ Details: Displays full details about the best practice policy. For example, youcan view a description of the best practice policy.

■ Risks: Displays information about the risks associated with the best practicepolicy.See “About risks” on page 86.

To view best practice policies

1 In the CommandCentral Storage Change Manager Console, click Risks.

2 To view more details about a specific best practice policy, in the Risks table,select a best practice policy.

The Details pane displays.

Editing best practice policiesYou can edit only the following best practice policy: High Fan In of LUNs via ArrayPort. You can edit this best practice policy to specify the maximum number ofhosts that should consume a masked LUN bound by a single array port.

To edit a best practice policy

1 In the CommandCentral Storage Change Manager Console, click Risks.

2 In the Potential Risks to the System table, select (check) HighFanInofLUNsvia Array Port.

Using best practice policies to identify potential risks to your storage resourcesViewing best practice policies

84

Page 85: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

3 In the Edit Best Practice Policy dialog box, in the New Host Count field, entera number to specify the maximum number of hosts that should consume amasked LUN bound by a single array port. Then, click OK.

4 When a confirmation message displays, click Close.

The best practice policy updates.

Enabling best practice policiesBy default, CommandCentral Storage Change Manager enables best practicepolicies against all of your storage resources. However, you may decide to disablea best practice policy. After you disable a best practice policy, you can re-enableit. When you do this, CommandCentral Storage Change Manager assesses the bestpractice policy against all of your storage resources.

To enable a disabled best practice policy

1 In the CommandCentral Storage Change Manager Console, click Risks.

2 In the Risks table, select (check) one or more disabled best practice policies.

3 In the Tasks menu, click Enable.

4 In the Enable Best Practice Policy dialog box, review the best practice policiesthat you want to enable and click OK.

5 When a confirmation message displays, click Close.

CommandCentral Storage Change Manager enables the selected best practicepolicies.

Disabling best practice policiesBy default, CommandCentral Storage Change Manager enables best practicepolicies against all of your storage resources. However, you can disable a bestpractice policy. When you do this, CommandCentral Storage Change Manager nolonger assesses the best practice policy against your storage resources.

To disable a best practice policy

1 In the CommandCentral Storage Change Manager Console, click Risks.

2 In the Risks table, select (check) one or more enabled best practice policies.

3 In the Tasks menu, click Disable.

85Using best practice policies to identify potential risks to your storage resourcesEnabling best practice policies

Page 86: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

4 In the Disable Best Practice Policy dialog box, review the best practice policiesthat you want to disable and click OK.

5 When a confirmation message displays, click Close.

CommandCentral Storage Change Manager disables the selected best practicepolicies.

About risksIf a change to a storage resource does not match the requirements of a best practicepolicy, CommandCentral Storage Change Manager generates a risk. Risks identifypotential vulnerabilities in your storage infrastructure. Because each risk identifiesthe impacted storage resources, you can take the necessary action to remove therisk from your storage infrastructure.

For example, the best practice policy LUNs Unclaimed by Host may identify threerisks. Each of those three risks describe a LUN that is masked, but not consumedby a host. To resolve the risk, you can provision the LUN to the host. After you dothis, CommandCentral Storage Change Manager no longer identifies the risk.

Viewing risksYou can view the total number of risks associated with a best practice policy. Inthe Risks pane, in the Risks table, the Count column identifies the total numberof risks associated with the best practice policy. Additionally, if CommandCentralStorage Change Manager identifies risks, in the Name column, the name of thebest practice policy displays in red.

After you identify that there are risks associated with a best practice policy, youcan view each individual risk. For each risk, CommandCentral Storage ChangeManager identifies the affected storage resources.

To view risks

1 In the CommandCentral Storage Change Manager Console, click Risks.

2 In the Risks table, select a best practice policy.

3 Below the Risks table, click Risks.

The Risks pane displays and lists each individual risk.

Using best practice policies to identify potential risks to your storage resourcesAbout risks

86

Page 87: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Reporting on changes,policies, and violations

This chapter includes the following topics:

■ About default reports

■ Viewing default reports

■ Drilling down to detail reports in the Policy Coverage report

■ Changing a default report’s time frame

■ Exporting report data

■ Archiving reports

■ About creating ad hoc custom reports

About default reportsCommandCentral Storage Change Manager provides default reports that enableyou to analyze the changes made to your storage resources. You can use the defaultreports to view details about the following:

■ The number of changes that occur in your data centerSee “About the Changes in the Data Center report” on page 90.

■ The time that it takes to resolve violationsSee “About the Resolve Time Efficiency report” on page 89.

■ The type of violations that generateSee “About the Policy Violation Trends report” on page 88.

■ The policy coverage on your storage resources

9Chapter

Page 88: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

See “About the Policy Coverage report” on page 88.

About the Policy Coverage reportThe Policy Coverage report provides a summary of the hosts and applications inyour data center that have policies applied to them. This report helps you toanalyze the policy coverage on your hosts and applications. For example, you canidentify if all your hosts have active policies applied to them.

The following table describes the components of the report.

Table 9-1 Description of the Policy Coverage report

DescriptionName

By policy type, displays the number of hosts that have activepolicies, inactive policies, and no policies applied.

Policy Coverage onHosts by Policy Typebar chart

By policy type, displays the number of applications that haveactive policies, inactive policies, and no policies applied.

Policy Coverage onApplications by PolicyType bar chart

Displays the number of hosts that have active policies, inactivepolicies, and no policies applied.

Policy Coverage onHosts pie chart

Displays the number of applications that have active policies,inactive policies, and no policies applied.

Policy Coverage onApplications pie chart

About the Policy Violation Trends reportThe Policy Violation Trends report provides detail into the type of violations thatgenerate from changes to your storage resources. This report helps you to identifythe types of violations that occur more frequently than others.

The following table describes the components of the report.

Table 9-2 Description of the Policy Violation Trends report

DescriptionName

By violation category, displays the number of violations generatedduring the specified time frame.

Violation TrendsSummary bar graph

By violation type, displays the number of violations generatedduring the specified time frame.

Violation TrendsDetails table

Reporting on changes, policies, and violationsAbout default reports

88

Page 89: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 9-2 Description of the Policy Violation Trends report (continued)

DescriptionName

By violation type, displays the number of violations generated forconnectivity changes during the specified time frame.

Connectivity ViolationTrends graph

By violation type, displays the number of violations generated forconfiguration changes during the specified time frame.

Storage ConfigurationViolation Trends graph

By violation type, displays the number of violations generated forcompliance changes during the specified time frame.

Compliance ViolationTrends graph

About the Resolve Time Efficiency reportThe Resolve Time Efficiency report provides detail into the time required to resolveviolations to your custom policies. This report helps you to analyze the efficiencyin meeting the target resolution times for violations. Additionally, you can analyzethe time required to resolve violations for each violation type. This helps you toidentify the types of violations that are not resolved as quickly as others.

The following table describes the components of the report.

Table 9-3 Description of the Resolve Time Efficiency report

DescriptionName

For each type of connectivity violation, displays the averageresolution time during the specified time frame.

ConnectivityViolations ResolutionTime graph

For each type of connectivity violation, displays the total numberof violations and the average, minimum, and maximum resolutiontimes during the specified time frame.

ConnectivityViolations ResolutionTime Details table

For each type of configuration violation, displays the averageresolution time during the specified time frame.

Storage ConfigurationViolations ResolutionTime graph

For each type of configuration violation, displays the total numberof violations and the average, minimum, and maximum resolutiontimes during the specified time frame.

Storage ConfigurationViolations ResolutionTime Details table

For each type of compliance violation, displays the averageresolution time during the specified time frame.

Compliance ViolationsResolution Time graph

For each type of compliance violation, displays the total numberof violations and the average, minimum, and maximum resolutiontimes during the specified time frame.

Compliance ViolationsResolution TimeDetails table

89Reporting on changes, policies, and violationsAbout default reports

Page 90: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

About the Changes in the Data Center reportThe Changes in the Data Center report provides an enterprise–wide view of thechanges in your data center. The report shows the number of changes that haveoccurred to your storage resources and summarizes the violations that generatedfrom these changes. You can use this report to analyze how many changes occuron a month–to–month basis. You can also identify the number of violations thatgenerate from these changes by storage resource type. With this information, youcan identify the area in your data center that may require more attention.

The following table describes the components of the report.

Table 9-4 Description of the Changes in the Data Center report

DescriptionName

Displays the number of changes by month and how manyviolations were caused from those changes.

Trend on Changes inthe Data Center graph

Displays data from the Trend on Changes in the Data Center graph.Changes table

For all the changes that occurred during the selected time frame,displays the number and percentage of changes that causedviolations.

Percentage of Changesthat Caused Violationspie chart

For all the changes that occurred during the selected time frame,categorizes the number and percentage of changes that causedviolations by storage resource type. For example, you can viewthe number and percent of changes to hosts that caused violations.

Category of Changesthat Caused Violationspie chart

Viewing default reportsYou can view default reports that provide details into changes, policies, andviolations.

To view default reports

1 In the CommandCentral Storage Change Manager Console, click Reporting> All Reports.

2 In the All Reports pane, select a report.

The report appears.

Reporting on changes, policies, and violationsViewing default reports

90

Page 91: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Drilling down to detail reports in the Policy Coveragereport

In the Policy Coverage report, you can click a slice within the bar and pie chartsto drill down to detail reports. For example, in the Policy Coverage on Applicationsbar chart, you can click on a slice of the Connectivity bar to load the PolicyCoverage Details Report. You can then view detailed information about theconnectivity policies applied to each of your applications.

To click a data point to drill down to detail reports

1 In the CommandCentral Storage Change Manager Console, click Reporting> All Reports.

2 In the All Reports pane, click Policy Coverage.

3 In the Policy Coverage report, in one of the graphs, click a slice.

Changing a default report’s time frameYou can adjust the time frame for default reports. This allows you to narrow orbroaden the time in which you want to report on. For example, you can select astandard time frame, such as a month or quarter, or you can select a custom timeframe and specify a start date and end date.

Note: You cannot change the time frame for the Policy Coverage report.

To change a default report’s time frame

1 In the CommandCentral Storage Change Manager Console, click Reporting> All Reports.

2 In the All Reports pane, select a report.

3 At the top of the report, click Time Frame.

4 In the Customize Report dialog box, enter the required information and clickOK.

See “Customize Report options” on page 91.

The report refreshes and displays data for the specified time frame.

Customize Report optionsUse the Customize Report dialog box to adjust the time frame of a default report.

91Reporting on changes, policies, and violationsDrilling down to detail reports in the Policy Coverage report

Page 92: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 9-5

DescriptionField

In the drop-down list, select one of the following time frames:

■ Last week

■ Last 1 month

■ Last quarter

■ Last 6 months

■ Last 1 year

Standard TimeFrames

In the Start date and End date fields, type a date in the followingformat: MM/DD/YYYY

For example, to enter December 1, 2008, type 12/01/2008

Custom Time

Exporting report dataYou can export a report to capture the report data in a comma-separated (.csv)file format. You can then open the file using either a spreadsheet program or atext editor.

To export report data

1 In the CommandCentral Storage Change Manager Console, click Reporting> All Reports.

2 In the All Reports pane, select a report.

3 At the top right of the report, in the drop-down list, click ExportReportData.Then, click GO.

4 Use your Web browser’s file download options to open or save the reportdata.

The report’s data exports in a comma-separated file format.

Archiving reportsWhen you display a report in the CommandCentral Storage Change ManagerConsole, you can archive the report. This allows you to capture the state of thenetwork at a precise moment in time. For example, you can archive a report thatshows violation trends for the past week. Then, you might use that report in apresentation.

Reporting on changes, policies, and violationsExporting report data

92

Page 93: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

When you archive a report, the report saves to location on the CommandCentralStorage Change Manager Management Server. You can specify the location towhich the reports save.

After you archive a report, you can display the report in the Console and you candelete the report if you no longer need it.

Specifying a directory for archived reportsYou can specify a directory into which CommandCentral Storage Change Managerarchives reports. In this way, you can save the archived reports to a well-knownlocation, such as a shared drive, that users can access easily.

To specify the directory in which archived reports are saved

1 Click Settings > Management Server > Web Engine Settings.

2 In the drop-down list, click Edit Settings. Then, click Go.

3 In the Edit Settings dialog box, in the Archive Report Base Directory field,type a directory path.

Examples:

■ Solaris:

/opt/VRTSweb/Veritas/spc/archive

■ Windows:

C:\Program Files\Veritas\VRTSweb\Veritas\spc\archive

4 Click OK.

New archived reports will save to the specified directory on the ManagementServer. Note that previously archived reports do not move to thisdirectory—they remain in the directory where they were originally saved.

Creating archived reportsYou can archive the contents of a report to view at a later time. The data thatdisplays in the archived report represents the state of the network at the timethat you archive the report.

To archive a report

1 In the CommandCentral Storage Change Manager Console, click Reporting> All Reports.

2 In the All Reports pane, select a report.

93Reporting on changes, policies, and violationsArchiving reports

Page 94: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

3 At the top right of the report, in the drop-down list, click Archive Report.Then, click GO.

4 In the Archive Report dialog box, enter the required information and clickOK.

See “Archive Report options” on page 94.

The report archives to the Management Server.

Archive Report optionsUse the Archive Report dialog box to archive a default report.

Table 9-6 Archive report options

DescriptionField

Type a file name for the archived report.

The maximum number of characters that you can enter is 255.

The following characters are not allowed:

~ ` ! @ ^ & < > ;()(parenthesis) < > ,(comma) \ | '(single quote) "(doublequote) ;

File Name

In the drop-down list, select one of the following file formats:

■ HTML

■ CSV

Type

Viewing archived reportsAfter you archive a report, you can view the report in the Console.

To view an archived report

1 In the CommandCentral Storage Change Manager Console, click Reporting> Archived Reports.

2 In the Archived Reports table, in the Archive File column, click the name ofthe report that you want to view.

The archived report displays in a new browser window.

Deleting archived reportsIf you no longer need an archived report, you can delete it.

Reporting on changes, policies, and violationsArchiving reports

94

Page 95: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

To delete an archived report

1 In the CommandCentral Storage Change Manager Console, click Reporting> Archived Reports.

2 In the Archived Reports table, select (check) one or more archived reports.

3 In the drop-down list, click Delete Archived Report. Then, click GO.

4 In the Delete Archived Report dialog box, review your selections. Then, clickOK.

CommandCentral Storage Change Manager deletes the archived reports.

About creating ad hoc custom reportsIn addition to using the reports that come packaged with CommandCentral StorageChange Manager, you can create ad hoc reports. An ad hoc report displaysinformation specifically tailored to your CommandCentral Storage Change Managerinstallation. Once created, the ad hoc report is then viewable in the custom reportstable of the CommandCentral Storage Console.

Note:Currently, you can only create and view ad hoc reports for CommandCentralStorage Change Manager from CommandCentral Storage.

See the CommandCentral Storage User’s Guide (section about Generating Adhocreports) for details about creating and viewing reports in the CommandCentralStorage Console -- specifically, see the sections for generating ad hoc reports andviewing custom reports.

95Reporting on changes, policies, and violationsAbout creating ad hoc custom reports

Page 96: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Reporting on changes, policies, and violationsAbout creating ad hoc custom reports

96

Page 97: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Configuring agentlessdiscovery of hosts bycreating host objects

This chapter includes the following topics:

■ How you can discover hosts in CommandCentral

■ How CommandCentral performs agentless discovery by creating host objects

■ Manually correlating unidentified adapters (HBAs) to hosts

■ Automatically correlating unidentified adapters (HBAs) to hosts

How you can discover hosts in CommandCentralCommandCentral provides several ways to discover hosts and their associationsto storage resources and network devices. To discover a host, you can use agentlesscapabilities or you can install an agent.

Out of the box, the Management Server can discover the storage resources in yourstorage area network. To get up and running, you can use agentless capabilitiesto discover hosts and their connections to storage resources. Agentless capabilitiesinclude the following:

10Chapter

Page 98: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

CommandCentral can discover a remote host by running thescripts that collect data from the host. You can run the scripts inthe following ways:

■ You can let CommandCentral remotely access the host andrun the scripts.

■ You can copy the scripts to the remote host, run the scripts,and then send the output file to the Management Server.

CommandCentral identifies this type of host as an agentless host.

For more information about agentless discovery, see theCommandCentral Administrator’s Guide.

Host discovery byremotely runningagentless discoveryscripts

If CommandCentral does not discover a host through an agent orthrough agentless discovery scripts, it cannot discover that host'sassociations to storage resources. However, if a host connects toa fabric that the Management Server discovers, the ManagementServer discovers the HBAs to which the host connects.CommandCentral identifies the HBAs as unidentified adapters.

You can use agentless capabilities to create a host object andassociate the unidentified adapter to that host. After you createthe host object, CommandCentral can associate objects such aszones and LUNs to the host.

To perform this process, you can match patterns in the name ofthe zone or zone alias to which the HBA is associated. You canalso specify the mapping information between HBAs and hosts.

The host object is an object that exists in the CommandCentraldatabase. CommandCentral does not communicate with thephysical host. CommandCentral identifies this type of host as auser-created host.

See “How CommandCentral performs agentless discovery bycreating host objects” on page 100.

Host discovery byassociating HBAs touser-created hosts

An agent is software that runs on a host. It discovers information about a hostand relays the information to the Management Server. You can install the followingtypes of agents:

The Standard Agent discovers and monitors the storage resourcesthat are associated with a host.

For more information about Standard Agents, see theCommandCentral Administrator’s Guide.

Standard Agents

Configuring agentless discovery of hosts by creating host objectsHow you can discover hosts in CommandCentral

98

Page 99: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

The Unified Agent is a part of Veritas Storage Foundation. Itconsists of the VRTSsfmh package, which collects informationabout a host that includes a Storage Foundation product. WhereverStorage Foundation is installed, CommandCentral can use theagent to discover information about the host.

For more information about Unified Agents, see theCommandCentral Administrator’s Guide.

Unified Agents

CommandCentral also lets you discover a host through the Control Host, whichis a special type of Standard Agent. The Control Host helps you manage discoverydata from agentless hosts and can discover arrays, switches, and VMware ESXservers.

For more information about Control Hosts, see the CommandCentralAdministrator’s Guide.

To decide which host discovery option you want to use, you can review informationabout the supported features for each option.

For information about the supported features for each host discovery option, seethe CommandCentral Administrator’s Guide.

Through each of these host discovery options, the Management Server is thecentral point to which all of the discovered data flows. The following figure depictsthe flow of data with each of the host discovery options.

99Configuring agentless discovery of hosts by creating host objectsHow you can discover hosts in CommandCentral

Page 100: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Figure 10-1 How CommandCentral components work together to discover hosts

Agentlesshosts

Agentlesshosts

Agentlesshosts

StandardAgents

UnifiedAgents

ControlHost

ControlHost

ManagementServer

Switches

Storagearrays

HowCommandCentral performs agentless discoveryby creating host objects

If CommandCentral does not discover a host through an agent or through agentlessdiscovery by running scripts, it cannot discover that host's associations to storageresources. However, if a host connects to a fabric that the Management Serverdiscovers, the Management Server discovers the HBAs to which the host connects.CommandCentral identifies the HBAs as unidentified adapters.

You can use agentless capabilities to create a host object and associate theunidentified adapter to that host. This enables CommandCentral to associateobjects such as zones and LUNs to the host.

To discover that host’s associations to storage resources, you can use severalmethods to associate an unidentified adapter to the host to which it connects.After you associate an unidentified adapter with a host, CommandCentral createsan object for the host if it does not already discover the host. The host object isan object that exists in the CommandCentral database. CommandCentral does not

Configuring agentless discovery of hosts by creating host objectsHow CommandCentral performs agentless discovery by creating host objects

100

Page 101: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

communicate with the physical host. CommandCentral identifies the host as auser-created host.

You can run the correlation process in the following ways:

With this process, you monitor the Unidentified Adapters panefor new unidentified adapters. Then, you use any of the threecorrelation methods to correlate the unidentified adapters to thehosts to which they connect.

See “Manually correlating unidentified adapters (HBAs) to hosts”on page 103.

Manually

With this process, you initially upload a master CSV file or definerules for zone names or zone aliases. Then, when CommandCentraldiscovers an unidentified adapter, it can automatically detect thehost to which it connects. You can also specify if you want toapprove the correlations yourself or if you want CommandCentralto automatically approve them.

See “Automatically correlating unidentified adapters (HBAs) tohosts” on page 113.

Automatically

When you choose the manual or automatic process, you can use several methodsto correlate an unidentified adapter to a host. You can do any of the following:

Choose this method if you consistently include a host namein the names of zones or zone aliases.

Match patterns in thename of the zone or zonealias to which the HBA isassociated

Choose this method if you maintain a spreadsheet thatcontains the mapping information between an HBA and ahost.

Import a CSV file thatcontains details abouthosts and HBAs

Choose this method if you want to manually supplyCommandCentral with the host name associated with eachunidentified adapter. Typically, you might use this methodto quickly correlate a few unidentified adapters or if either ofthe first two methods do not apply. This method is notavailable for the automatic correlation process.

Specify host informationfor each unidentifiedadapter

The following figure provides an overview of the process that you can use tocorrelate unidentified adapters to hosts.

101Configuring agentless discovery of hosts by creating host objectsHow CommandCentral performs agentless discovery by creating host objects

Page 102: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Figure 10-2 Correlation process

Choose to run thecorrelation process

manually orautomatically

Manually Automatically

If you chose toask for approval

View the list ofadapters that

CommandCentralautomatically

correlated

If you chose toautomatically correlate

Choose one or morecorrelation methods

Approve thecorrelations thatCommandCentral

detects

Match patterns inthe name of the

zone

Match patterns inthe name of the

zone aliasImport a CSV file

Match patterns inthe name of the

zone or zone aliasImport a CSV file Ask for approval

Automaticallycorrelate

Choose anautomation mode

Choose acorrelation method

Specify hostinformation for

each unidentifiedadapter

Configuring agentless discovery of hosts by creating host objectsHow CommandCentral performs agentless discovery by creating host objects

102

Page 103: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Manually correlating unidentified adapters (HBAs) tohosts

You can manually create a host object and associate unidentified adapters (HBAs)to the user-created host. This lets you see a host's connectivity and capacitywithout installing an agent.

See “How CommandCentral performs agentless discovery by creating host objects”on page 100.

You can also enable CommandCentral Storage Change Manager to automaticallyrun the process.

See “Automatically correlating unidentified adapters (HBAs) to hosts” on page 113.

Table 10-1 outlines the process to associate unidentified adapters to hosts.

Table 10-1 Manual process to associate unidentified adapters to hosts

More informationAction

See “Viewing unidentified adapters” on page 51.Identify if CommandCentralStorage Change Managerdiscovers any unidentifiedadapters.

See “How CommandCentral performs agentlessdiscovery by creating host objects” on page 100.

If there are unidentified adapterspresent, decide which method(s)you want to use to associate theunidentified adapters to hosts.

See “Manually associating unidentified adapters to hostsby specifying host information” on page 103.

See “Manually correlating unidentified adapters to hostsby matching patterns in zone names or zone aliases”on page 106.

See “Manually correlating unidentified adapters to hostsby importing a CSV file” on page 109.

Associate the unidentifiedadapters to hosts.

Manually associating unidentified adapters to hosts by specifying hostinformation

You can correlate unidentified adapters (HBAs) to hosts by supplying informationabout the host to which the HBA connects. For example, if you want to correlatenine unidentified adapters you can type the name of the hosts to which each ofthe unidentified adapters connect.

103Configuring agentless discovery of hosts by creating host objectsManually correlating unidentified adapters (HBAs) to hosts

Page 104: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Typically, you might use this method to correlate a few unidentified adapters. Or,you might use this correlation method if neither of the other two correlationmethods apply.

See “How CommandCentral performs agentless discovery by creating host objects”on page 100.

See “Manually correlating unidentified adapters (HBAs) to hosts” on page 103.

To manually correlate unidentified adapters by specifying host information

1 In the CommandCentral Storage Change Manager Console, click Inventory> Lost and Found > Unidentified Adapters.

2 In the Unidentified Adapters Summary table, select (check) one or moreunidentified adapters.

3 In the drop-down list, select Correlate Manually. Then, click Go.

4 In the Add host information for adapters panel, enter the required informationfor each unidentified adapter. Then, click Next.

See “Add host information for adapters panel options” on page 104.

5 In the Review actions to be performed panel, verify that your selections arecorrect. Optionally, defer the task to a later time. Then, click Finish.

See “Review actions to be performed panel options” on page 105.

CommandCentral Storage Change Manager correlates the unidentifiedadapters to the specified hosts. The unidentified adapters now appear asHBAs in the Console.

Add host information for adapters panel optionsUse this panel to supply information about the host to which each unidentifiedadapter connects. You must specify host information for each unidentified adapterbefore you can proceed to the next panel.

After you add information for an unidentified adapter, the table updates with thatinformation. Additionally, CommandCentral Storage Change Manager updatesthe Action column to specify the required action for that unidentified adapter. Inthis column, one of the following actions appears:

Appears when CommandCentral Storage Change Manager does notcurrently discover this host. CommandCentral Storage ChangeManager will create a new host object and associate the unidentifiedadapter with this host.

Create host

Configuring agentless discovery of hosts by creating host objectsManually correlating unidentified adapters (HBAs) to hosts

104

Page 105: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Appears when CommandCentral Storage Change Manager currentlydiscovers this host. CommandCentral Storage Change Manager willcorrelate the unidentified adapter to this host.

Correlate

The following table describes the fields that display when you select an unidentifiedadapter.

Table 10-2 Add host information for adapters panel options

DescriptionField

The unidentified adapter’s WWN.

This field is read–only.

Unidentified Adapter

Type a name for the host.

The host name may consist of alphanumeric characters andunderscores.

As you type a host name, CommandCentral Storage ChangeManager lists current discovered and user–created hosts whosehost name matches what you type in the text box. You can selectthese hosts.

Host Name

Click to have CommandCentral Storage Change Manager validatethe host name that you typed in the host name field.

If the host name is valid, the host name field updates with thehost’s fully qualified host name and the IP address field updateswith the host’s IP address.

Validate host name

(Optional) Type the host’s IP address.IP Address

(Optional) Type the host’s operating system—for example,Windows Server 2003.

OperatingSystem/Version

Click to save the information.Update

Click to cancel the information entered for this unidentifiedadapter.

Cancel

Click to remove the selected unidentified adapter from the table.When you do this, CommandCentral Storage Change Managerdoes not correlate the unidentified adapter to a host.

Remove

Review actions to be performed panel optionsUse this panel to verify that your selections are correct and to (optionally) deferthe task until a later date and time.

105Configuring agentless discovery of hosts by creating host objectsManually correlating unidentified adapters (HBAs) to hosts

Page 106: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 10-3 Review actions to be performed panel options

DescriptionField

Select (check) to defer the task until a later date and time.Schedule Task

Use the drop-down lists to specify the date that you want the taskto run.

Date

Use the drop-down lists to specify the time that you want the taskto run.

Time is in 24-hour format—for example, 21:00 means 9:00 p.m.

Time

Manually correlating unidentified adapters to hosts by matchingpatterns in zone names or zone aliases

You can correlate unidentified adapters to hosts by matching patterns in thenames of zones or zone aliases. Use this method if you consistently include a hostname in the names of zones or zone aliases.

For example, you might name a zone as follows: brocade4100_abc.xyz_cx500awhere abc.xyz is the name of the host. In CommandCentral Storage ChangeManager, you can create a rule that extracts the host name from the name of thezone. CommandCentral Storage Change Manager can then correlate theunidentified adapter (HBA) associated with that zone or zone alias to the host.

Before you can use this method, you need to add agentless rules.

See “Adding agentless rules” on page 117.

If you do not consistently include a host name in the names of zones or zonealiases, you can use other methods to correlate unidentified adapters (HBAs) tohosts.

See “How CommandCentral performs agentless discovery by creating host objects”on page 100.

See “Manually correlating unidentified adapters (HBAs) to hosts” on page 103.

Tomanually correlate unidentified adapters to hosts bymatching patterns in zonenames or zone aliases

1 In the CommandCentral Storage Change Manager Console, click Inventory> Lost and Found > Unidentified Adapters.

2 In the drop-down list, click AddAdapterstoHostsUsingPattern. Then, clickGo.

Configuring agentless discovery of hosts by creating host objectsManually correlating unidentified adapters (HBAs) to hosts

106

Page 107: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

3 In the Agentless Rules panel, select the rules that you want to run. Then, clickNext.

If no rules appear in this panel, then you need to add rules.

See “Adding agentless rules” on page 117.

4 In the Approve correlations panel, select (check) the unidentified adaptersfor which you want to approve correlations. Then, do one of the following:

■ To edit the details of the hosts, click Next and proceed to step 5.

■ To approve the actions, click Finish.CommandCentral Storage Change Manager correlates the unidentifiedadapters to the specified hosts. The unidentified adapters now appear asHBAs in the Console.

5 In the Edit host information for adapters panel, edit the details of any of thehosts. Then, click Next.

See “Edit host information for adapters panel options” on page 107.

6 In the Review actions to be performed panel, verify that your selections arecorrect. Optionally, defer the task to a later time. Then, click Finish.

See “Review actions to be performed panel options” on page 105.

CommandCentral Storage Change Manager correlates the unidentifiedadapters to the specified hosts. The unidentified adapters now appear asHBAs in the Console.

Edit host information for adapters panel optionsUse this panel to edit the details of a host. When you run the correlation process,CommandCentral Storage Change Manager discovers information about hostsbased on the method that you chose. You can use this panel to edit the informationthat CommandCentral Storage Change Manager discovered. For each host, youcan modify its name, IP address, and operating system.

In this panel, the Action column specifies the action that CommandCentral StorageChange Manager will take. In the Action column, one of the following actionsappears:

Appears when CommandCentral Storage Change Manager does notcurrently discover this host. CommandCentral Storage ChangeManager will create a new host and associate the unidentified adapterwith this host.

Create host

107Configuring agentless discovery of hosts by creating host objectsManually correlating unidentified adapters (HBAs) to hosts

Page 108: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Appears when CommandCentral Storage Change Manager currentlydiscovers this host. CommandCentral Storage Change Manager willcorrelate the unidentified adapter to this host.

Correlate

The following table describes the fields that display after you select an unidentifiedadapter.

Table 10-4 Edit host information for adapters panel options

DescriptionField

The unidentified adapter’s WWN.

This field is read–only.

Unidentified Adapter

Type a name for the host.

The host name may consist of alphanumeric characters andunderscores.

As you type a host name, CommandCentral Storage ChangeManager lists current discovered and user–created hosts whosename matches what you type in the text box. You can select thesehosts.

Host Name

Click to have CommandCentral Storage Change Manager validatethe host name that you typed in the host name field.

If the host name is valid, the host name field updates with thehost’s fully qualified host name and the IP address field updateswith the host’s IP address.

Validate host name

(Optional) Type the host’s IP address.IP Address

(Optional) Type the host’s operating system—for example,Windows Server 2003.

OperatingSystem/Version

Click to save the information.Update

Click to cancel the information entered for this unidentifiedadapter.

Cancel

Click to remove the selected unidentified adapter from the table.When you do this, CommandCentral Storage Change Managerdoes not correlate the unidentified adapter to a host.

Remove

Configuring agentless discovery of hosts by creating host objectsManually correlating unidentified adapters (HBAs) to hosts

108

Page 109: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Manually correlating unidentified adapters to hosts by importing aCSV file

You can correlate unidentified adapters to hosts by importing a CSV file. Thismethod is useful if you maintain a spreadsheet that identifies the connectionsbetween hosts and HBAs. For example, an entry in the CSV file lists a host’sinformation (host name, IP address, fully qualified host name, and operatingsystem) and the WWN of the HBA to which it connects.

See “About the format of CSV files that you use to correlate unidentified adaptersto hosts” on page 111.

If you do not maintain a spreadsheet that identifies the connections between hostsand HBAs, you can use other methods to correlate unidentified adapters to hosts.

See “How CommandCentral performs agentless discovery by creating host objects”on page 100.

See “Manually correlating unidentified adapters (HBAs) to hosts” on page 103.

To correlate unidentified adapters to hosts by importing a CSV file

1 In the CommandCentral Storage Change Manager Console, click Inventory> Lost and Found > Unidentified Adapters.

2 In the drop-down list, click Add Adapters to Hosts Using CSV. Then, clickGo.

3 In the CSV file upload panel, upload a CSV file. Then, click Next.

See “CSV file upload panel options” on page 110.

4 In the Approve correlations panel, select (check) the unidentified adaptersfor which you want to approve the correlations. Then, do one of the following:

■ To edit the details of the hosts, click Next and proceed to step 5.

■ To approve the actions, click Finish.CommandCentral Storage Change Manager correlates the unidentifiedadapters to the specified hosts. The unidentified adapters now appear asHBAs in the Console.

109Configuring agentless discovery of hosts by creating host objectsManually correlating unidentified adapters (HBAs) to hosts

Page 110: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

5 In the Edit host information for adapters panel, edit the details of any of thehosts. Then, click Next.

See “Edit host information for adapters panel options” on page 107.

6 In the Review actions to be performed panel, verify that your selections arecorrect. Optionally, defer the task to a later time. Then, click Finish.

See “Review actions to be performed panel options” on page 105.

CommandCentral Storage Change Manager correlates the unidentifiedadapters to the specified hosts. The unidentified adapters now appear asHBAs in the Console.

CSV file upload panel optionsUse this panel to upload a CSV file that contains mapping information betweenunidentified adapters (HBAs) and hosts.

You can upload data from more than one CSV file. If you previously uploaded aCSV file, that data displays in the table.

After you upload a file, the Status column identifies if CommandCentral StorageChange Manager can use each record in the file. Any of the following may displayin the Status column:

CommandCentral Storage Change Manager has discovered the HBA,but it is not yet associated with a host. These are the HBAs that youcan correlate to hosts.

Usable

CommandCentral Storage Change Manager has discovered the HBAand it is already associated with a host. This record will not be used.

Used

CommandCentral Storage Change Manager has not yet discovered theHBA. CommandCentral Storage Change Manager retains theinformation about this HBA so that you can correlate it at a later timeshould CommandCentral Storage Change Manager discover the HBA.

Unusable

You might receive an error message when you upload the CSV file.

See “Error messages that might appear when you upload a CSV file to correlateunidentified adapters to hosts” on page 112.

The following table details the CSV file upload panel options.

Table 10-5 CSV file upload panel options

DescriptionField

Click to select the CSV file that you want to upload.Browse

Configuring agentless discovery of hosts by creating host objectsManually correlating unidentified adapters (HBAs) to hosts

110

Page 111: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 10-5 CSV file upload panel options (continued)

DescriptionField

Click to upload the information from the CSV file.Upload

About the format of CSV files that you use to correlateunidentified adapters to hostsIn the CSV Based Correlation wizard, when you upload a CSV file, the contents ofthe file must follow a specific format. Each record in the CSV file must containfive fields. The order of these fields is as follows:

<host name>,<IP address>,<fully qualified host name>,<OS

type>,<Adapter WWN>

For example:

myhost,192.168.254.250,myhost.symantecexample.com,Windows

2000,2000000C987845FG

The following table details the format for each field.

Table 10-6 Format of fields in the CSV file

FormatDescriptionField

The host name can containalphanumeric characters. Do notinclude spaces.

Example:

myhost

The name of the host that you wantto correlate the unidentified adapter(HBA) to.

Host name

The IP address must contain numbersin the range of 1 to 255. Type the IPaddress as an IPv4 address in thedot-decimal notation.

Example:

192.168.254.250

You can enter multiple IP addresses.Use semi-colon’s to separate them.

Example:

192.168.254.250;192.168.255.251

The host’s IP address.IP address

111Configuring agentless discovery of hosts by creating host objectsManually correlating unidentified adapters (HBAs) to hosts

Page 112: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 10-6 Format of fields in the CSV file (continued)

FormatDescriptionField

The fully qualified host name cancontain alphanumeric characters.

Example:

myhost.symantecexample.com

The fully qualified host name of thehost that you want to correlate theunidentified adapter (HBA) to.

Fullyqualifiedhost name

The OS type can containalphanumeric characters.

Example:

Windows 2000

The host’s operating system.OS type

The WWN must contain 16hexadecimal digits. Do not includecolons.

Example:

2000000C987845FG

The WWN of the unidentified adapter(HBA) that you want to correlate to ahost.

AdapterWWN

Error messages that might appear when you upload a CSV fileto correlate unidentified adapters to hostsIn the CSV Based Correlation wizard, when you upload a CSV file, you may receivean error message that states the CSV file is not in the correct format.

The following table describes the error messages that you may receive.

Table 10-7 Descriptions of error messages that appear in the Add Adapters toHosts Using CSV wizard

DescriptionError message

A record in the CSV file does not contain the five requiredfields.

See “About the format of CSV files that you use to correlateunidentified adapters to hosts” on page 111.

No. of columns are less than5

The host name contains a space.

For example, the following is incorrect: my host

The following is correct: myhost

Blank space in host name

Configuring agentless discovery of hosts by creating host objectsManually correlating unidentified adapters (HBAs) to hosts

112

Page 113: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 10-7 Descriptions of error messages that appear in the Add Adapters toHosts Using CSV wizard (continued)

DescriptionError message

The IP address is not in the correct format.

See “About the format of CSV files that you use to correlateunidentified adapters to hosts” on page 111.

Invalid IP address

The WWN does not contain 16 characters.Invalid WWN

Automatically correlating unidentified adapters(HBAs) to hosts

You can configure CommandCentral Storage Change Manager to automaticallycorrelate unidentified adapters (HBAs) to host objects. This lets you see a host'sconnectivity and capacity without installing an agent.

See “How CommandCentral performs agentless discovery by creating host objects”on page 100.

If you do not want CommandCentral Storage Change Manager to automaticallyassociate unidentified adapters to hosts, you can run the process yourself.

See “Manually correlating unidentified adapters (HBAs) to hosts” on page 103.

Table 10-8 outlines the process that you can use to automatically associateunidentified adapters to hosts.

Table 10-8 Automatic process to associate unidentified adapters to hosts

More informationAction

See “Enabling the automatic correlation process”on page 114.

Enable the automatic correlationprocess

See “Adding CSV records for the automatic correlationprocess” on page 116.

See “Adding agentless rules” on page 117.

If needed, add agentless rules oradd CSV records.

See “Starting the automatic correlation process”on page 122.

(Optional) Start the automaticcorrelation process

113Configuring agentless discovery of hosts by creating host objectsAutomatically correlating unidentified adapters (HBAs) to hosts

Page 114: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 10-8 Automatic process to associate unidentified adapters to hosts(continued)

More informationAction

See “Approving the correlations that CommandCentralStorage Change Manager detects” on page 122.

See “Viewing the list of unidentified adapters that wereautomatically correlated” on page 123.

Depending on the correlationsettings, do one of the following:

■ Approve the correlations thatCommandCentral StorageChange Manager detects

■ View the unidentifiedadapters thatCommandCentral StorageChange Managerautomatically correlated

Enabling the automatic correlation processYou can automate the correlation of unidentified adapters (HBAs) to hosts.Automating the correlation process is helpful if you use naming patterns for zonesand zone aliases or if you maintain a master CSV file. When you automate thecorrelation process, CommandCentral Storage Change Manager automaticallydetects correlations and then either asks for your approval or automaticallyapproves the correlations.

See “Automatically correlating unidentified adapters (HBAs) to hosts” on page 113.

To enable the automatic correlation process

1 In the CommandCentral Storage Change Manager Console, click Settings >Management Server > Agentless Settings.

2 In the Agentless Settings pane, check Check for new correlations usingmethods. Then, select your options for the correlation process.

See “Agentless Settings options” on page 114.

3 Click Save.

CommandCentral Storage Change Manager enables the correlation process.

Agentless Settings optionsUse these settings to automate the correlation of unidentified adapters (HBAs) tohosts.

Configuring agentless discovery of hosts by creating host objectsAutomatically correlating unidentified adapters (HBAs) to hosts

114

Page 115: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 10-9 Agentless Settings options

DescriptionField

Check to enable the automation process for correlatingunidentified adapters (HBAs) to hosts. When you enable thisoption, you need to select one or more correlation methods.

Check for newcorrelations usingmethods

Check this option for CommandCentral Storage Change Managerto detect correlations based on the information from an uploadedCSV file.

To use this option, you need to upload data from a CSV file.

See “Adding CSV records for the automatic correlation process”on page 116.

Master CSV

Check this option for CommandCentral Storage Change Managerto detect correlations based on any enabled rules for zone namingpatterns.

To use this option, you need to have at least one enabled rule.

See “Adding agentless rules” on page 117.

See “Enabling agentless rules” on page 121.

Zone Names Pattern

Check this option for CommandCentral Storage Change Managerto detect correlations based on any enabled rules for zone aliasnaming patterns.

To use this option, you need to have at least one enabled rule.

See “Adding agentless rules” on page 117.

See “Enabling agentless rules” on page 121.

Zone Alias Pattern

Select so that after CommandCentral Storage Change Managerdetects new associations between unidentified adapters and hosts,your approval is required to correlate the unidentified adaptersto hosts.

Ask for approvalbefore correlatingHBAs with hosts

Select so that after CommandCentral Storage Change Managerdetects new associations between unidentified adapters and hosts,it automatically correlates the unidentified adapters to hosts.

Automaticallycorrelate HBAs withhosts

Click to save your changes.Save

115Configuring agentless discovery of hosts by creating host objectsAutomatically correlating unidentified adapters (HBAs) to hosts

Page 116: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 10-9 Agentless Settings options (continued)

DescriptionField

Click to have CommandCentral Storage Change Managerimmediately detect correlations based on the specified settings.If you don't use this option, then CommandCentral Storage ChangeManager runs the process at the following intervals:

■ When switch explorers detect events

■ Every 12 hours

Detect Now

Adding CSV records for the automatic correlation processWhen you enable the automatic correlation process, you must choose at least oneof three correlation methods.

See “Automatically correlating unidentified adapters (HBAs) to hosts” on page 113.

One of the methods that you can choose is Master CSV. This method is useful ifyou maintain a spreadsheet that identifies the connections between hosts andHBAs. For example, an entry in the CSV file would list a host’s information (hostname, IP address, fully qualified host name, and operating system) and the WWNof the HBA to which it connects.

To enable the master CSV method for the automatic correlation process, you mustupload data. You can edit the master CSV method to add new data or remove datathat you previously uploaded. If you previously used the manual process anduploaded data from the Unidentified Adapters pane, that data appears in theAgentless Settings pane.

To add CSV records for the automatic correlation process

1 In the CommandCentral Storage Change Manager Console, click Settings >Management Server > Agentless Settings.

2 In the Agentless Settings pane, under the CSV Records table, click Browse.

3 Use your Web browser to choose a CSV file.

4 In the Agentless Settings pane, under the CSV Records table, click Upload.

The data from the CSV file saves to the Management Server.

Removing CSV records used to associate HBAs to hosts for agentlessdiscovery

You can remove the CSV records that you no longer need to associate HBAs tohosts for agentless discovery.

Configuring agentless discovery of hosts by creating host objectsAutomatically correlating unidentified adapters (HBAs) to hosts

116

Page 117: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

See “Automatically correlating unidentified adapters (HBAs) to hosts” on page 113.

To remove CSV records used for agentless discovery

1 In the CommandCentral Storage Change Manager Console, click Settings >Management Server > Agentless Settings.

2 In the CSV Records table, select one or more CSV records.

3 In the CSV Records drop-down list, select Remove CSV Records. Then, clickGo.

4 In the Remove CSV Records dialog box, click OK.

CommandCentral Storage Change Manager removes the records.

Adding agentless rulesBefore you can correlate unidentified adapters to hosts by matching patterns inzone names or zone aliases, you need to create an agentless rule. An agentlessrule defines how CommandCentral Storage Change Manager extracts host namesfrom zone names or zone aliases.

For example, you might name a zone alias as follows: host_qlogic9000 wherehost is the name of the host. In CommandCentral Storage Change Manager, youcan create a rule that extracts the host name from the name of the zone alias.CommandCentral Storage Change Manager can then correlate the unidentifiedadapter (HBA) associated with that zone alias to the host.

To add an agentless rule

1 In the CommandCentral Storage Change Manager Console, click Settings >Management Server > Agentless Settings.

2 In the Agentless Rules drop-down list, select Add Rule. Then, click Go.

3 In the Add Rule dialog box, enter the required information to add the rule.

See “Add Rule and Edit Rule dialog options” on page 117.

4 Click OK.

CommandCentral Storage Change Manager adds the rule.

Add Rule and Edit Rule dialog optionsUse this panel to create or edit an agentless rule. The rules define howCommandCentral Storage Change Manager extracts host names from zone namesor zone aliases. CommandCentral Storage Change Manager uses the informationto associate unidentified adapters (HBAs) to hosts.

117Configuring agentless discovery of hosts by creating host objectsAutomatically correlating unidentified adapters (HBAs) to hosts

Page 118: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

The fields in this panel display in two tabs—the Rule Properties tab and theAdvanced Options tab.

Table 10-10 Options for the Rule Properties tab

DescriptionField

Type a name for the rule.

The maximum number of characters is 50.

The following characters are not allowed: , (comma) ; (semi-colon)' (single quote) " (double quote)

Rule name

(Optional) Type a description for the rule.

The maximum number of characters is 255.

The following characters are not allowed: , (comma) ; (semi-colon)' (single quote) " (double quote)

Rule description

Select either Zone or Zone Alias. CommandCentral Storage ChangeManager uses either the name of a zone or zone alias to extracthost names.

Correlation Method

Type the delimiter that you use in the name of the zone or zonealias. For example, you might use an _ (underscore).

Spaces, as well as the following characters are not allowed: ,(comma) ; (semi-colon) ' (single quote) " (double quote)

Delimiter

Use the drop-down lists to specify the location of the host namein the name of the zone or zone alias.

Host name position

(Optional) If you include characters before the host name, typethem here.

The following characters are not allowed: , (comma) ; (semi-colon)' (single quote) " (double quote)

Host name prefixstring

(Optional) If you include characters after the host name, type themhere.

The following characters are not allowed: , (comma) ; (semi-colon)' (single quote) " (double quote)

Host name suffixstring

Based on your selections, this field displays the pattern of thezone name or zone alias.

HH indicates the location of the host name.

This field is read–only.

Pattern

Select one or more fabrics to which you want to apply the rule.Fabric Scope

Configuring agentless discovery of hosts by creating host objectsAutomatically correlating unidentified adapters (HBAs) to hosts

118

Page 119: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Table 10-10 Options for the Rule Properties tab (continued)

DescriptionField

Select (check) to enable the rule for the automatic correlationprocess.

Enabled for auto mode

(Optional) Select (check) so that CommandCentral Storage ChangeManager discovers the host’s IP address, fully qualified host name,and operating system during the correlation process.

If you enable this option, the correlation process may run longer.

Perform NS lookup

Table 10-11 Options for the Advanced Options tab

DescriptionField

(Optional) Select (check) to enable the option to use a Perl regularexpression to match the pattern of the name for the zone or zonealias.

If you enable this option, the pattern defined in the Rule propertiestab no longer applies.

Use a Perl regularexpression to extractthe host name

(Optional) Type a Perl regular expression to match the pattern ofthe name for the zone or zone alias. (e.g. "\A([^_]+)_")

Specify Perl regularexpression

(Optional) Select (check) to enable the option to specify the domainname for each host name that CommandCentral Storage ChangeManager extracts. For example, you can specify thatCommandCentral Storage Change Manager appends all host nameswith the domain name symantecexample.com. WhenCommandCentral Storage Change Manager runs the rule andextracts a host name—for example, beatles—it appends the hostname with symantecexample.com so that it appears as follows:beatles.symantecexample.com

Perform additionalpost-processing on theextracted host name

(Optional) Use the following format to specify the host’s domainname: $_=$1.".domain_name"

For example, to specify that all host names extracted with thisrule should include the domain name symantecexample.com, typethe following: $_=$1.".symantecexample.com"

Specify thepost–processingexpression

Running agentless rulesYou can run the agentless rules that you have created. When you run the rules,CommandCentral Storage Change Manager extracts host names from zone names

119Configuring agentless discovery of hosts by creating host objectsAutomatically correlating unidentified adapters (HBAs) to hosts

Page 120: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

and zone aliases, based on the rule’s definition. This lets you correlate unidentifiedadapters to hosts.

To run agentless rules

1 In the CommandCentral Storage Change Manager Console, click Settings >Management Server > Agentless Settings.

2 In the Agentless Rules table, select one or more rules.

3 In the Agentless Rules drop-down list, select Run Rule. Then, click Go.

4 In the Approve correlations panel, select (check) the unidentified adaptersfor which you want to approve correlations. Then, do one of the following:

■ To edit the details of the hosts, click Next and proceed to step 5.

■ To approve the actions, click Finish.CommandCentral Storage Change Manager correlates the unidentifiedadapters to the specified hosts. The unidentified adapters now appear asHBAs in the Console.

5 In the Edit host information for adapters panel, edit the details of any of thehosts. Then, click Next.

See “Edit host information for adapters panel options” on page 107.

6 In the Review actions to be performed panel, verify that your selections arecorrect. Optionally, defer the task to a later time. Then, click Finish.

See “Review actions to be performed panel options” on page 105.

CommandCentral Storage Change Manager correlates the unidentifiedadapters to the specified hosts. The unidentified adapters now appear asHBAs in the Console.

Editing agentless rulesYou can edit an existing agentless rule.

To edit an agentless rule

1 In the CommandCentral Storage Change Manager Console, click Settings >Management Server > Agentless Settings.

2 In the Agentless Rules table, select a rule.

3 In the Agentless Rules drop-down list, select Edit Rule. Then, click Go.

Configuring agentless discovery of hosts by creating host objectsAutomatically correlating unidentified adapters (HBAs) to hosts

120

Page 121: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

4 In the Edit Rule dialog box, edit the rule.

See “Add Rule and Edit Rule dialog options” on page 117.

5 Click OK.

CommandCentral Storage Change Manager updates the rule.

Enabling agentless rulesWhen you run the automatic correlation process, you can enable the Zone NamesPattern option or the Zone Alias Pattern option. Before you can enable theseoptions, you need to enable one or more agentless rules.

See “Adding agentless rules” on page 117.

To enable agentless rules

1 In the CommandCentral Storage Change Manager Console, click Settings >Management Server > Agentless Settings.

2 In the Agentless Rules table, select one or more rules.

3 In the Agentless Rules drop-down list, select Enable Rule. Then, click Go.

4 In the Enable Rule dialog box, click OK to enable the rule(s).

CommandCentral Storage Change Manager enables the rule(s).

Disabling agentless rulesIf you do not want CommandCentral Storage Change Manager to use a zone nameor zone alias rule for the automatic correlation process, you can disable that rule.When you do this, CommandCentral Storage Change Manager no longer uses thatrule to detect the correlation of unidentified adapters (HBAs) to hosts.

To enable agentless rules

1 In the CommandCentral Storage Change Manager Console, click Settings >Management Server > Agentless Settings.

2 In the Agentless Rules table, select one or more rules.

3 In the Agentless Rules drop-down list, select Disable Rule. Then, click Go.

4 In the Disable Rule dialog box, click OK to disable the rule(s).

CommandCentral Storage Change Manager disables the rule(s).

Removing agentless rulesYou can remove, or delete, an existing agentless rule.

121Configuring agentless discovery of hosts by creating host objectsAutomatically correlating unidentified adapters (HBAs) to hosts

Page 122: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

To remove agentless rules

1 In the CommandCentral Storage Change Manager Console, click Settings >Management Server > Agentless Settings.

2 In the Agentless Rules table, select one or more rules.

3 In the Agentless Rules drop-down list, select Remove Rule. Then, click Go.

4 In the Remove Rule dialog box, click OK to remove the rule(s).

CommandCentral Storage Change Manager removes the rule.

Starting the automatic correlation processAfter you enable the automatic correlation process, the process runs at thefollowing intervals:

■ When switch explorers detect events

■ Every 12 hours

If you want the automatic correlation process to run immediately, you canmanually start the process.

See “Automatically correlating unidentified adapters (HBAs) to hosts” on page 113.

To start the automatic correlation process

1 In the CommandCentral Storage Change Manager Console, click Settings >Management Server > Agentless Settings.

2 In the Agentless Settings pane, click Detect Now.

3 In the Automatic correlation dialog box, verify the methods that you want touse are correct. Then, click Next.

The automatic correlation process starts.

Approving the correlations that CommandCentral Storage ChangeManager detects

When you automate the correlation process, CommandCentral Storage ChangeManager automatically detects new correlations. If you select the option for userapproval of those correlations, CommandCentral Storage Change Manager waitsfor you to approve the correlations that it detects. After you do this,CommandCentral Storage Change Manager associates the HBA to the host anddiscovers more information about that host and its connections to storageresources.

See “Automatically correlating unidentified adapters (HBAs) to hosts” on page 113.

Configuring agentless discovery of hosts by creating host objectsAutomatically correlating unidentified adapters (HBAs) to hosts

122

Page 123: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

To approve the correlation of unidentified adapters to hosts

1 In the Console's footer, click Tasks.

2 In the Tasks panel, click the number next to Adapters requiring approvalto correlate.

3 In the Approve correlations panel, select (check) the unidentified adaptersfor which you want to approve correlations. Then, do one of the following:

■ To edit the details of the hosts, click Next and proceed to step 4.

■ To approve the actions, click Finish.CommandCentral Storage Change Manager correlates the unidentifiedadapters to the specified hosts. The unidentified adapters now appear asHBAs in the Console.

4 In the Edit host information for adapters panel, edit the details of any of thehosts. Then, click Next.

See “Edit host information for adapters panel options” on page 107.

5 In the Review actions to be performed panel, verify that your selections arecorrect. Optionally, defer the task to a later time. Then, click Finish.

See “Review actions to be performed panel options” on page 105.

CommandCentral Storage Change Manager correlates the unidentifiedadapters to the specified hosts. The unidentified adapters now appear asHBAs in the Console.

Viewing the list of unidentified adapters that were automaticallycorrelated

When you automate the correlation process, CommandCentral Storage ChangeManager automatically detects associations between unidentified adapters (HBAs)and hosts. If you select the option for CommandCentral Storage Change Managerto automatically approve the correlation that it detects, you can view details aboutthe unidentified adapters that were automatically correlated.

See “Automatically correlating unidentified adapters (HBAs) to hosts” on page 113.

123Configuring agentless discovery of hosts by creating host objectsAutomatically correlating unidentified adapters (HBAs) to hosts

Page 124: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

To view unidentified adapters that were automatically correlated

1 In the Console's footer, click Tasks.

2 In the Tasks panel, click the number next to Adapters automaticallycorrelated.

The Unidentified adapters automatically correlated dialog box identifiesthose unidentified adapters (HBAs) that CommandCentral Storage ChangeManager correlated to hosts.

Disabling the automatic correlation processIf you do not want CommandCentral Storage Change Manager to automaticallydetect the hosts to which unidentified adapters (HBAs) connect, you can disablethe automatic correlation process.

See “Automatically correlating unidentified adapters (HBAs) to hosts” on page 113.

After you disable the automatic correlation process, you will need to manuallycorrelate the unidentified adapters that CommandCentral Storage Change Managerdiscovers.

See “Manually correlating unidentified adapters (HBAs) to hosts” on page 103.

To disable the automatic correlation process

1 In the CommandCentral Storage Change Manager Console, click Settings >Management Server > Agentless Settings.

2 In the Agentless Settings pane, uncheck Check for new correlations usingmethods.

3 In the Agentless Settings pane, click Save.

CommandCentral Storage Change Manager disables the automatic correlationprocess.

Configuring agentless discovery of hosts by creating host objectsAutomatically correlating unidentified adapters (HBAs) to hosts

124

Page 125: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Accessibility features

This appendix includes the following topics:

■ Navigating the CommandCentral Storage Change Manager Console

■ Accessibility features in dialog boxes

Navigating the CommandCentral Storage ChangeManager Console

In the CommandCentral Storage Change Manager Console, you can use yourkeyboard to view information and perform operations by selecting a variety ofdifferent controls.

Examples of selectable controls include:

■ Tabs and subtabs

■ Navigational links at the top of the content pane

■ Column headings in tables

■ Hyperlinked objects in tables

■ Areas, such as bars in a graph, in graphical reports

■ Controls in the header such as Logout and Help

The current active control is enclosed with a rectangle formed by dotted lines.This area has focus. Use the Tab key to move focus from one control to another.

Following are general rules for navigating the Console and performing operations:

■ Press Tab to move the focus to the next active area, field, or control.

■ Press Shift+Tab to move the focus to the previous active area. In effect,Shift+Tab is the reverse of Tab.

AAppendix

Page 126: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

■ Press Ctrl+Tab to move the focus to the top of the browser window.

■ Press Enter to activate the item that has focus. For example, after pressingTab to select a host in the Hosts summary pane, press Enter to display theobject view for that host.

■ In a drop-down list, press the arrow keys to move up and down the list.

■ Move the mouse pointer over an icon in a table to display a ToolTip with textualinformation about the object the icon represents.

■ When a checkbox has focus, press the Spacebar to select or deselect the box.

■ Normal accessibility features for your Web browser apply. In many browsers,for example, press Shift+F10 to display a context menu with which you canmove back to the previous page, print the current page, and perform otheroperations.

Accessibility features in dialog boxesIn CommandCentral Storage Change Manager Console dialog boxes and wizards,the current active control has focus. You can use the Tab key to move focus fromone control to another.

When a radio button has focus, use the up and down arrow keys to move focus toa different radio button.

For example, in the following figure, Create New is selected and has focus. Toselect Edit Existing, press the down arrow key.

Accessibility featuresAccessibility features in dialog boxes

126

Page 127: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Figure A-1 Example of radio button with focus

When a button has focus, press Enter to activate or select the button.

In the example above, press the Tab key to move focus to the Next button andthen press Next to move to the next dialog box.

When a drop-down list has focus, use the up and down arrow keys to move amongthe selections and then press Enter to make your selection.

When a checkbox has focus, press the Spacebar to select or deselect the box.

When a text box has focus, use the keyboard to type text in the box.

With tree controls, the following accessibility features apply:

■ Use the Tab key to move from one tree node to another.

■ Press the Space key to expand and collapse tree nodes.

■ For wizard pages containing two node trees and an Add and Remove button,press Enter to perform the Add and Remove functionality. For example, whenan object is selected in the left tree, press Enter to move the object to the righttree (Add.) When an object is selected in the right tree, press Enter to movethe object to the left tree (Remove.)

127Accessibility featuresAccessibility features in dialog boxes

Page 128: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Accessibility featuresAccessibility features in dialog boxes

128

Page 129: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Aaccessibility

Console 125dialog boxes 126tools 126

active zonesviewing 45

ad hoc reportsStorage Change Manager 95

agentless rulesadding 117disabling 121editing 120enabling 121removing 121running 119

aggregate change messagesoverview 54

applicationsviewing 49

archived reportscreating 93deleting 94viewing 94

Bbest practice policies 83

See also risksdisabling 85editing 84enabling 85overview 83viewing 84

Cchange messages

overview 54viewing 55

changesaggregate change messages 54

changes (continued)change messages

overview 54viewing 55

overview 53Changes in the Data Center report 90checking task status 35, 37clearing

violations 81clusters

viewing 49columns

changing width 33selecting 32sorting 32

CommandCentral Storage Change Managerabout 13documentation 16logging in 21logging out 21overview 14

CommandCentral Storage Change Manager Consoleaccessibility 125certificate error 22getting help 37logging in 21logging out 21overview 19task status 35–37

compliance policies. See custom policiesConsole. See CommandCentral Storage Change

Manager Consolecreating

archived reports 93compliance policies 63custom policies 60, 63storage service policies 60

custom policiesactivating on storage resources 74applying to storage resources 73compliance policies

overview 59

Index

Page 130: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

custom policies (continued)creating

compliance policies 63storage service policies 60

deactivating from storage resources 75deleting 73disabling 73editing 71enabling 72overview 57Path Outage policy 60removing from storage resources 75status 59storage service policies

overview 58viewing 71

custom reportsad hoc reports 95

DDashboard

graphsdisplaying data 40overview 39

overview 39viewing 40

defined zonesviewing 45

deletingarchived reports 94custom policies 73

dialog boxesaccessibility 126

disablingbest practice policies 85custom policies 73

documentation 16

Eediting

best practice policies 84custom policies 71

effects 55enabling

best practice policies 85custom policies 72

exportingreports 92

exporting (continued)table contents 33

Ffabrics

viewing 43filtering

tables 26–27filters

resetting 30Firefox

certificate error 22

Ggrouping

tables 31

HHBAs 100

See also unidentified adaptershelp

displaying 37host discovery

about 97hosts

storageviewing 47

viewing 42

Iimpacts 55Internet Explorer

certificate error 22inventory

overview 42

Llogging in 21logging out 21login

changing passwords 22

Oobject views

tables 24, 32–33online help 37

Index130

Page 131: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Ppages

accessing in tables 32passwords

changing 22Path Outage policy 60paths

viewing 50policies. See best practice policies. See custom

policiesPolicy Coverage report

drilling down 91overview 88

Policy Violation Trends report 88printing

tables 33

Rregular expression

syntax 28reports

ad hoc 95archived reports

creating 93deleting 94overview 92specifying directory for 93viewing 94

Changes in the Data Center 90exporting 92overview 87Policy Coverage 88Policy Violation Trends 88Resolve Time Efficiency 89time frame 91viewing 90

requestschecking status 35, 37

Resolve Time Efficiency report 89risks 86

See also best practice policiesoverview 86viewing 86

Ssaving

table contents 33

searchingtables 25–26

sortingtables 32

statuschecking 35, 37

storage arraysviewing 43

Storage Change Managerad hoc reports 95

storage service policies. See custom policiessupport

commenting on documentation 17contacting 15

switchesviewing 44

Ttables

collapsing groups 31columns 32–33expanding groups 31exporting 33filtering 26–27grouping 31hyperlinks 24icons 25multiple pages 32performing tasks 25printing 33resetting filters 30saving 33searching 25–26sorting 32summary 24

Task Status tab 35–36tasks

checking status 35, 37resubmitting 35–37running immediately 35scheduled 35serialized 35status 35

Tasks Summary list 35–36technical support 15TechNotes 15time frame 91tools

accessibility 126

131Index

Page 132: Veritas CommandCentral™ Storage Change Manager User's Guide · Veritas CommandCentral™ Storage Change Manager User's Guide for Microsoft Windows and UNIX

Uunenclosed devices

overview 51viewing 52

unidentified adapterscorrelating to hosts 100overview 50viewing 51

Vviewing

applications 49archived reports 94best practice policies 84change messages 55clusters 49custom policies 71Dashboard 40fabrics 43hosts 42

disk groups 48storage 47volumes 47

paths 50reports 90risks 86storage arrays 43switches 44unenclosed devices 52unidentified adapters 51violations 80zones

active zones 45defined zones 45zone aliases 46zone sets 47

violationsclearing 81overview 77resolving 78status 78viewing 80

Zzone aliases

viewing 46zone sets

viewing 47

Index132


Recommended