Veritas InfoScale™ Operations Manager 8.0 User's Guide
- Section I. Getting started
- Introducing Veritas InfoScale Operations Manager
- Using the Management Server console
- About the Management Server console
- About the Management Server console Home page
- About the Global Dashboard
- About the elements in a perspective view
- About viewing the summarized information
- About selecting the objects
- About drilling down to more information on the selected object
- About searching for objects
- About viewing the solutions
- About viewing the reports
- About viewing tasks
- About viewing connectivity graphs
- About accessing the Veritas InfoScale Operations Manager Help
- Examples for using Veritas InfoScale Operations Manager
- Example: Creating a volume using Veritas InfoScale Operations Manager
- Example: Creating a service group, adding it to a cluster, and bringing it online using Veritas InfoScale Operations Manager
- Example: Cluster Server troubleshooting using Veritas InfoScale Operations Manager
- Example: Ensuring the correct level of protection for volumes controlled by Storage Foundation
- Example: Improving the availability and the disaster recovery readiness of a service group through fire drills
- Example: Identifying the performance issues of an application using Veritas InfoScale Operations Manager
- Example: Volume migration using Veritas InfoScale Operations Manager
- Examples: Identifying and reducing storage waste using Veritas InfoScale Operations Manager
- Section II. Managing Veritas InfoScale Operations Manager
- Managing user access
- Creating an Organization
- Modifying the name of an Organization
- Deleting an Organization
- Moving an object to an Organization in a perspective
- Assigning permissions to user groups on an Organization within a perspective
- Modifying permissions assigned to user groups on an Organization within a perspective
- Deleting permissions assigned to user groups on an Organization within a perspective
- Modifying permissions assigned to user groups on an object within a perspective
- Verifying a user group in the domain
- Viewing permissions information
- Viewing the permissions assigned on a perspective, an Organization, or on an object
- Setting up fault monitoring
- About alerts and rules
- Creating rules in a perspective
- Create Rule - Select the type of fault conditions to trigger this rule panel options
- Create Rule - Select one or more fault topics which will trigger this rule panel options
- Create Rule - Select organizations panel options
- Create Rule - Setup notifications panel options
- Create Rule - Enter name and description panel options
- Editing rules in a perspective
- Edit Rule - Select the type of fault condition to trigger this rule panel options
- Edit Rule - Select one or more fault topics which will trigger this rule panel options
- Edit Rule - Select organization panel options
- Edit Rule - Setup notifications panel options
- Edit Rule - Enter name and description panel options
- Deleting rules in a perspective
- Enabling rules in a perspective
- Disabling rules in a perspective
- About faults and risks
- Suppressing faults in a perspective
- Restoring a suppressed fault in a perspective
- Using reports
- About reports
- About using reports
- Running a report
- Saving a report
- Subscribing for a report
- Editing a report subscription
- Deleting a report subscription
- Sending a report through email
- Viewing my report subscriptions in a perspective
- Viewing all the report subscriptions in a perspective
- About the reports available in Veritas InfoScale Operations Manager
- About global reports
- Adding management servers in the Global Reports perspective
- Creating a report
- Managing user access
- Section III. Managing hosts
- Overview
- Working with the unmanaged hosts and clusters
- Working with the uncategorized hosts
- Managing File Replicator (VFR) operations
- About performing File Replicator operations
- Viewing the VFR option of a host
- Creating a consistency group
- Viewing consistency groups
- Deleting a consistency group
- Associating a consistency group to a replication job
- Disassociating a consistency group from a replication job
- Viewing consistency group properties
- Creating a replication job
- Viewing File Replication Jobs
- Starting a replication job
- Pausing a replication job
- Resuming a replication job
- Stopping a replication job
- Syncing a replication job
- Modifying a replication job
- Deleting a replication job
- Viewing properties of File Replication Jobs
- Managing disk groups and disks
- About managing disk groups
- Creating disk groups
- Recovering disk groups
- Deporting disk groups
- Destroying disk groups
- Importing disk groups
- Adding disks to disk groups
- Resizing disks in disk groups
- Renaming disks in disk groups
- Upgrading disk groups
- Splitting disk groups
- Moving disk groups
- Joining disk groups
- About managing disks
- Initializing disks
- Replacing disks
- Recovering disks
- Mapping disks
- Unmapping disks
- Disconnecting disks
- Removing disks from disk groups
- Setting host prefix for disks
- Bringing disks online
- Taking disks offline
- Setting disk usage
- Evacuating disks
- Running or scheduling Trim
- Rescanning disks
- Managing volumes
- About managing Storage Foundation volumes
- Creating Storage Foundation volumes
- Create Volume - Select Disk Group and Disk Selection method panel options
- Volume attributes panel options for creating volumes on UNIX or Linux hosts for specifying values
- Volume attributes panel options for creating volumes on Windows hosts
- Add Drive Letter, Path and Create File System details panel options
- Stopping volumes
- Recovering volumes
- Reactivating volumes
- Deleting volumes
- Moving volumes
- Renaming volumes
- Adding mirrors to volumes
- Removing the mirrors of volumes
- Creating instant volume snapshots
- Creating space optimized snapshots for volumes
- Creating mirror break-off snapshots for volumes
- Dissociating snapshots
- Reattaching snapshots
- Resizing volumes
- Restoring data from the snapshots of volumes
- Refreshing the snapshot of volumes
- Configuring a schedule for volume snapshot refresh
- Adding snapshot volumes to a refresh schedule
- Removing the schedule for volume snapshot refresh
- Setting volume usage
- Splitting snapshots
- Starting synchronization of snapshots
- Enabling FastResync on volumes
- Disabling FastResync on volumes
- Managing file systems
- About managing file systems
- Creating file systems
- Enabling change logs
- Disabling change logs
- Synchronizing change logs
- Removing change logs
- Defragmenting file systems
- Unmounting non clustered file systems from hosts
- Mounting non clustered file systems on hosts
- Unmounting clustered file systems
- Mounting clustered file systems on hosts
- Remounting file systems
- Checking file systems
- Creating file system snapshots
- Remounting file system snapshot
- Mounting file system snapshot
- Unmounting file system snapshot
- Removing file system snapshot
- Monitoring capacity of file systems
- Managing SmartIO
- About managing SmartIO
- Enabling or disabling SmartIO caching
- Creating a cache
- Viewing the cache details
- Viewing the SmartIO Impact analysis chart
- Changing SmartIO mode
- Modifying a cache
- Deleting a cache
- Loading files to a cache
- Pinning tablespaces or files to a cache
- Unpinning tablespaces or files from a cache
- About using SmartAssist
- Creating an I/O trace log
- Viewing I/O trace logs
- Analyzing an I/O trace log
- Removing an I/O trace log
- Managing application IO thresholds
- Managing replications
- About managing replications
- Configuring Storage Foundation replications
- Configure replication - Create primary panel options
- Configure replication - Create resources
- Configure replication - Create primary result panel options
- Configure replication - Consistency check on secondary host panel options
- Configure replication - Replication settings for secondary host panel options
- Configure replication - Add secondary result panel options
- Adding a Secondary
- Pausing the replication to a Secondary
- Resuming the replication of a Secondary
- Starting replication to a Secondary
- Stopping the replication to a Secondary
- Switching a Primary
- Taking over from an original Primary
- Associating a volume
- Resynchronizing a Secondary
- Removing a Secondary
- Unconfiguring replication
- About setting alerts for replication
- Monitoring replications
- Optimizing storage utilization
- Section IV. Managing high availability and disaster recovery configurations
- Overview
- Managing clusters
- Managing service groups
- About managing service groups
- Creating service groups
- Enabling service groups
- Disabling service groups
- Creating Atleast Count dependencies for a resource in a service group
- About Atleast Count dependency
- Autoenabling service groups
- Freezing service groups
- Unfreezing service groups
- Flushing service groups
- Enabling all resources of service groups
- Disabling all resources of service groups
- Deleting service groups
- About linking service groups in a cluster
- Linking service groups in a cluster
- Unlinking service groups
- About site aware service group operations
- Prerequisites for using site-related service group operations
- Limitations of site-related service group operations
- Bringing service groups online
- Taking service groups offline
- Switching service groups
- Clearing faults on service group
- Clearing the resources in a service group from the Admin Wait state
- Editing attributes of service groups
- Modifying the system list for a service group
- About dependency views
- Viewing the service group dependency view
- About modifying a service group
- About Cluster Server service group alerting and failover reporting
- Viewing VCS Failover Duration report
- Managing systems
- Managing VSystems
- Managing resources
- About managing resources
- Enabling resources
- Disabling resources
- Deleting resources
- Clearing faults on resources
- Probing resources
- Taking a resource offline and propagating the state
- Bringing resources online
- Taking resources offline
- Invoking a resource action
- Editing attributes of a resource
- Editing attributes of a resource type
- Linking resources in a service group
- Unlinking resources in a service group
- Adding or modifying resources
- Marking a resource as critical
- Marking a resource as non critical
- Viewing the resource dependency view
- Managing global cluster configurations
- Running fire drills
- About high availability and disaster recovery readiness
- About high availability fire drills
- Running the high availability fire drill
- About disaster recovery fire drills
- About configuring a fire drill service group
- Running the disaster recovery fire drill
- Editing a fire drill schedule
- Deleting fire drill schedules
- Enabling fire drill schedules
- Disabling fire drill schedules
- Viewing fire drill schedules
- Using recovery plans
- Managing ApplicationHA
- About ApplicationHA Management
- Prerequisites for ApplicationHA Management
- About the ApplicationHA operations
- Launching ApplicationHA operations from Veritas InfoScale Operations Manager
- About the ApplicationHA infrastructure
- Enabling the ApplicationHA infrastructure for a managed host
- Disabling the ApplicationHA infrastructure for a managed host
- Managing application configuration
- Multi Site Management
- Appendix A. List of high availability operations
- Section V. Monitoring Storage Foundation HA licenses in the data center
- Managing licenses
- About licenses
- About Veritas licensing and pricing
- About the Symantec Performance Value Unit
- About the Symantec Performance Value Unit for VMware virtual machines
- About the Symantec Performance Value Unit for Solaris LDOM virtualization server
- About the Symantec Performance Value Unit for kernel-based virtual machines
- About the Symantec Performance Value Unit for IBM LPAR
- About the per-core licensing
- About assigning price tiers to hosts
- About license deployment policies
- Assigning a price tier to a host automatically
- Assigning a price tier to a host manually
- Creating a license deployment policy
- Modifying a license deployment policy
- Deleting a license deployment policy
- Viewing deployment information
- Managing licenses
- Monitoring performance
- About performance metering statistics
- About metered resources
- About space estimation for data logs
- Enable performance metering for a host
- Disable performance metering for a host
- Enable performance metering for a virtualization server
- Disable performance metering for a virtualization server
- About Veritas InfoScale Operations Manager performance graphs
- Viewing the performance graphs for a host
- Viewing the performance graphs for a disk
- Viewing the performance graphs for volume and file system
- Viewing the performance graphs for a path
- Viewing the performance graphs for an initiator
- Viewing the performance graphs for virtualization server and virtual machines
- Viewing the performance graphs for a path of a virtualization server
- Viewing the performance graphs for an enclosure
- About threshold settings
- Adding threshold settings for an object
- Deleting the threshold settings for an object
- Enabling the threshold settings for an object
- Disabling the threshold settings for an object
- Managing Business Applications
- About Business Applications in Veritas InfoScale Operations Manager
- Creating or modifying a Business Application
- Renaming a Business Application
- Deleting a Business Application
- Viewing Business Applications in the data center
- Viewing the overview of a Business Application
- Viewing service availability for a Business Application
- Viewing data availability for a Business Application
- Viewing SAN connectivity for a Business Application
- About the makeBE script
- Creating Business Application using the makeBE script
- Importing Business Application using the makeBE script
- Exporting Business Application using the makeBE script
- Updating Business Application using the makeBE script
- Deleting Business Application using the makeBE script
- Managing extended attributes
- Managing policy checks
- About policy checks
- How signature registration settings work
- Registering policy signatures
- Unregistering a signature
- Setting signature tunables
- Running a manual policy scan
- Enabling or disabling policy signatures
- Viewing policy violation details
- Viewing or exporting a list of available policy signatures
- About using custom signatures for policy checks
- Creating a custom signature script
- Sample custom signature script
- Installing a custom signature script
- Copying the custom signature script
- Removing a custom signature
- About using the Distribution Manager Add-on to bundle custom signature scripts
- Sample setup.pl script for the custom signature
- Sample unsetup.pl script for a custom signature
- Managing Dynamic Multipathing paths
- About Dynamic Multi-Pathing in Veritas InfoScale Operations Manager
- Disabling the DMP paths on the initiators of a host
- Disabling the DMP paths on an enclosure
- Disabling the DMP paths on a virtualization server
- Re-enabling the DMP paths
- Removing a completed DMP maintenance case record
- Reviewing the output and results of a completed DMP maintenance case
- Managing CVM clusters
- Managing Flexible Storage Sharing
- Implementing Flexible Storage Sharing with Veritas InfoScale Operations Manager
- About Flexible Storage Sharing
- Flexible Storage Sharing use cases
- Flexible Storage Sharing features and support in Veritas InfoScale Operations Manager
- Exporting and un-exporting disks for Flexible Storage Sharing
- Enabling or disabling Flexible Storage Sharing on existing shared disk groups
- Monitoring the virtualization environment
- About the virtualization technologies supported
- About discovering the VMware Infrastructure using Veritas InfoScale Operations Manager
- How Veritas InfoScale Operations Manager discovers vCenter and ESX servers
- Information that Veritas InfoScale Operations Manager discovers on the VMware Infrastructure components
- Viewing the storage mapping information for VMware
- About the datastores in Veritas InfoScale Operations Manager
- About the multi-pathing discovery in the VMware environment
- About near real-time discovery of VMware events
- About discovering Solaris zones
- About discovering logical domains in Veritas InfoScale Operations Manager
- About discovering LPARs and VIOs in Veritas InfoScale Operations Manager
- About Microsoft Hyper-V virtualization discovery
- About the Kernel-based Virtual Machine (KVM) virtualization discovery in Veritas InfoScale Operations Manager
- About the reports related to virtualization
- Using Web services API
- About using Veritas InfoScale Operations Manager Web services API
- Logging in to Veritas InfoScale Operations Manager Web services API
- Logging out of Veritas InfoScale Operations Manager Web services API
- About objects supported by Veritas InfoScale Operations Manager Web services API
- About performing operations using Veritas InfoScale Operations Manager Web services API
- Examples of performing operations using Veritas InfoScale Operations Manager Web services API
- Examples of performing operations using XPRTLC and cURL
- Examples of the output in JSON format
- Veritas InfoScale Operations Manager command line interface
- About the vomadm utility
- Listing all configured enclosures using the vomadm utility
- Host management using the vomadm utility
- Deployment management using the vomadm utility
- Business Application management using the vomadm utility
- Service management using the vomadm utility
- Domain management using the vomadm utility
- List configured schedules using the vomadm utility
- Appendix B. Command file reference
- Appendix C. Application setup requirements
- Application setup requirements for Oracle database discovery
- Application setup requirements for Oracle Automatic Storage Management (ASM) discovery
- Application setup requirements for IBM DB2 discovery
- Application setup requirements for Sybase Adaptive Server Enterprise (ASE) discovery
- Application setup requirements for Microsoft SQL Server discovery
- Application setup requirements for Microsoft Exchange Server discovery
- Glossary
- Index
Glossary
- Active/active configuration
A failover configuration where each system runs a service group. If either system fails, the other one takes over and runs both service groups. Also symmetric configuration.
- Active/passive configuration
A failover configuration consisting of one service group on a primary system, and one dedicated backup system. Also asymmetric configuration.
- addressable unit
Any storage resource in the network that is ready to be allocated for use by hosts and applications. Also AddrUnit or AU.
See also LUN
- allocated storage
The total amount of addressable storage in LUNs that is designated for use by specific hosts. A LUN is considered allocated when a host operating system has written a device handle for the LUN (in other words, claimed the LUN) or when the array has masked the LUN to a specific target.
Contrast with unallocated storage
- application
A program or group of programs designed to perform a specific task. Oracle Database and Veritas NetBackup are examples of applications.
- Authentication Service
See Symantec Product Authentication Service.
- bridge
A device that connects and passes packets between two segments of a storage network that use the same communications protocol.
See also router
- capacity
The amount of storage an object can allocate or use.
- claimed storage
Storage for which at least one host's operating system has created a device handle.
Contrast with unclaimed storage
- cluster
A set of hosts (each termed a node) that share a set of disks and are connected by a set of redundant heartbeat networks.
- cluster communication
Communication between clusters using either of the two core communication protocols defined by Veritas Cluster Server: GAB and LLT. The communication takes place by means of heartbeat signals sent between systems or fast kernel-to-kernel broadcasts.
- configured storage
Physical storage that has been formatted and is ready to be apportioned into RAID groups.
Contrast with unconfigured storage
- device handle
The name the operating system uses to identify a storage resource (known as an addressable unit or LUN), and the correct means (driver, system call) to access it. Also OS handle.
- disk group
A collection of disks that share a common configuration. A disk group configuration is a set of records containing detailed information on existing Veritas Volume Manager objects (such as disk and volume attributes) and their relationships. Each disk group has an administrator-assigned name and an internally defined unique ID. The root disk group (rootdg) is a special private disk group that always exists.
- DMP (Dynamic Multipathing)
A feature of Veritas Volume Manager that provides greater reliability and better performance by using path failover and load balancing for multiported disk arrays connected to host systems through multiple paths. DMP detects the various paths to a disk using a mechanism that is specific to each supported array type. DMP can also differentiate between different enclosures of a supported array type that are connected to the same host system.
- event
A notification that indicates when an action, such as an alert or a change in state, has occurred for one or more objects on the storage network.
- failover
A backup operation that automatically switches to a standby database, server, or network if the primary system fails or is temporarily shut down for servicing.
- file system
A means of organizing the addressable (LUN) storage of one or more physical or virtual disks to give users and applications a convenient way of organizing files. File systems appear to users and applications as directories arranged in a hierarchy.
- firmware
A set of software instructions set permanently in a device's memory.
- GBIC
Gigabit interface converter. A widely used transceiver module for Fibre Channel. A GBIC is modular and hot-swappable and can be either copper or optical.
- Global Service Group
A VCS service group that spans across two or more clusters. The ClusterList attribute for this group contains the list of clusters over which the group spans.
- Group Atomic Broadcast (GAB)
A communication mechanism of the VCS engine that manages cluster membership, monitors heartbeat communication, and distributes information throughout the cluster.
- hub
A common connection point for devices in the storage network. The hub may be unmanaged, IP-managed, or FC-managed. An unmanaged hub is passive in the sense that it serves simply as a conduit for data, moving the data from one storage resource to another. IP-managed and FC-managed hubs are intelligent, containing features an administrator can use to monitor the traffic passing through the hub and configure each port in the hub.
- logical unit number
See LUN.
- LUN (logical unit number)
A unique and discrete addressable unit or logical volume that may reside inside one or more simple or array storage devices. LUNs are exposed to the outside world through an addressing scheme presented to the host as SCSI LUN numbers. Each LUN has a unique device handle and represents a logical volume.
- node
An object in a network. In Veritas Cluster Server, node refers specifically to one of any number of hosts in a cluster. See also object.
- object
A single, unique addressable entity on a storage network. It is possible for objects to be present within objects. For example, while a tape array is an object, each individual tape drive within the array is also an object. A host is an object, and the HBA inside the host is also an object. Each object has one or more attributes and can be a member of one or more zones.
- Object Reference or OID (Object ID)
A key which uniquely identifies an object in the discovery data store. OIDs are represented in XML files as hexadecimal strings with a maximum length of 128 characters.
- physical fabric
The physical components of a fabric, including all switches and all other SAN objects. You can configure one or more virtual fabrics - each one isolated from the others - based on the hardware components in the physical fabric.
- policy
A set of rules, or configuration settings, that are applied across a number of objects in the storage network. You establish policies to help you monitor and manage the network. Each policy associates certain sets of conditions with storage resources and defines actions to be taken when these conditions are detected.
- RAID
Redundant Array of Independent Disks. A set of techniques for managing multiple disks for cost, data availability, and performance.
See also mirroringstriping
- resource
Any of the individual components that work together to provide services on a network. A resource may be a physical component such as a storage array or a switch, a software component such as Oracle8i or a Web server, or a configuration component such as an IP address or mounted file system.
- SAN
Acronym for "storage area network." A network linking servers or workstations to devices, typically over Fibre Channel, a versatile, high-speed transport. The storage area network (SAN) model places storage on its own dedicated network, removing data storage from both the server-to-disk SCSI bus and the main user network. The SAN includes one or more hosts that provide a point of interface with LAN users, as well as (in the case of large SANs) one or more fabric switches and SAN hubs to accommodate a large number of storage devices.
- SCSI
Small Computer Systems Interface. A hardware interface that allows for the connection of multiple peripheral devices to a single expansion board that plugs into the computer. The interface is widely used to connect personal computers to peripheral devices such as disk and media drives.
- seeding
A technique used to protect a cluster from a preexisting network partition. By default, when a system comes up, it is not seeded. Systems can be seeded automatically or manually. Only systems that have been seeded can run VCS. Systems are seeded automatically only when an unseeded system communicates with a seeded system or when all systems in the cluster are unseeded and able to communicate with each other.
See network partition
- service group
A collection of resources working together to provide application services to clients. It typically includes multiple resources, hardware- and software-based, working together to provide a single service.
- SMTP
Simple Mail Transfer Protocol, a commonly used protocol for sending email messages between servers.
- SnapMirror
A method of mirroring volumes and qtrees on NetApp unified storage devices. With SnapMirror, a user can schedule or initiate data transfers, request information about transfers, update a mirror, and manage mirrors.
See mirroring
- snapshot
A point-in-time image of a volume or file system that can be used as a backup.
- SNMP
The Simple Network Management Protocol for Internet network management and communications used to promote interoperability. SNMP depends on cooperating systems that must adhere to a common framework and a common language or protocol.
- striping
A layout technique that spreads data across several physical disks by mapping the data to successive media, known as stripes, in a cyclic pattern. Also RAID Level 0.
- switch
A network device to which nodes attach and which provides high-speed switching of node connections via link-level addressing.
- system
The physical hardware on which data and applications reside, and the connections between them.
- topology
The physical or logical arrangement of resources on the storage network and the connections between them.
- unused storage
Storage to which data has not been written.
Contrast with used storage
- virtual IP address
A unique IP address associated with a VCS cluster. This address can be used on any system in the cluster, along with other resources in the VCS cluster service group. A virtual IP address is different from a system's base IP address, which corresponds to the system's host name.
See also IP address
- virtualization
Representing one or more objects, services, or functions as a single abstract entity so that they can be managed or acted on collectively. An example of virtualization is the creation of a virtual fabric from a switch and associated storage resources as a means of controlling access and increasing scalability in the storage network.