NetBackup IT Analytics Help
- Section I. Introducing NetBackup IT Analytics
- Section II. What's New
- Section III. Certified configurations
- Introduction
- Portal and database servers
- Data Collector server configurations
- Capacity Manager configurations
- Array/LUN performance Data Collection
- EMC Isilon array performance metrics
- NetApp Cluster-Mode performance metrics
- EMC Symmetrix enhanced performance metrics
- Host access privileges, sudo commands, ports, and WMI proxy requirements
- Cloud configurations
- Virtualization Manager configurations
- File Analytics configurations
- Fabric Manager configurations
- Backup Manager configurations
- ServiceNow configurations
- Internal TCP port requirements
- Section IV. End user
- Understand the portal
- About the Admin tab
- Explore your inventory
- Hierarchy toolbar to organize your data
- Show objects
- Use attributes to organize your data
- Pin reports - saving reports with inventory objects
- Assign attributes in the inventory list view
- Get acquainted with reports
- About badging
- Generate and maintain reports
- Select Report Scope
- Group hosts by attributes
- Search for hosts in the report Scope Selector
- Backup Manager advanced scope selector settings
- Solution reports scope selector settings
- Units of Measure in Reports
- Customize report filter logic
- Sort columns in reports
- Convert tabular report to chart
- Distribute, share, schedule, and alert
- Schedule export of reports and dashboards
- Organize reports
- Work with the dynamic template designer
- Dynamic Template Designer Quick Start
- Converting to a Homogeneous, Product-Specific Template
- Dynamic Template Function Configurations
- Create Fields with the Field Builder
- Scope Selector Component - Custom Filter
- Configure a Bar Chart Dynamic Template
- Steps to Create a Bar Chart Dynamic Template
- Configure an Area/Stacked Area Chart Dynamic Template
- Line Charts for Performance Metrics
- Line Chart Field Requirements
- One Object Per Line Chart, One or More Metrics Per Chart
- Multiple Objects Per Line Chart, One Metric Per Chart
- Example of a Stacked Bar Chart Dynamic Template
- Create a Sparkline Chart in a Tabular Dynamic Template
- Adding or Editing Methods
- Validate and Save a Method
- Work with the SQL template designer
- Configure SQL Template Scope Selector Components
- Sample SQL Queries
- Number, Size, Date, and Time Formatting
- Alignment, Aggregation, Bar Type, and Bar Type Color
- Pipelined functions for report query building
- APTlistOfDates
- aptStringConcat
- getServerAttributeValue
- getObjectAttributeValue
- getChildServerGroupContextById
- getServerGroupContextById
- secsToHoursMinSecs
- APTgetTapeDriveStatusName
- getFullPathname
- listJobSummaryAfterRestart
- listJobSummaryAfterRestartNBW
- listJobSummaryAfterRestart for NetWorker Backup Jobs
- listOfBackupWindowDates
- listChargebackCatByVOLSDetail
- listChargebackCatByNcVolDetail
- listChargebackCatByFSDetail (for HNAS)
- listChargebackCatByFSDetail (for EMC Isilon)
- listChargebackByLUNSummary
- listChargebackByLUNDetail
- listChargebackCatByLUNSummary
- listChargebackCatByLUNDetail
- Alert configuration
- Add/Edit an Alert Policy
- About using SNMP
- Manage hosts, backup servers, and host groups
- NetBackup Primary Servers
- Manage attributes and objects
- Provide Portal access and user privileges
- Setting / Resetting passwords
- Managing user group home pages (Administrator)
- Configure primary schedules and backup windows
- Add, edit, and move policies
- Solutions administration
- Manage and monitor data collection
- About data collection tasks
- Add/Edit Data Collectors
- Review collectors and collection status
- Upgrade Data Collectors
- Work with Capacity Manager host data collection
- Host access requirements
- Manage credentials
- Configure host discovery policies to populate the host discovery and collection view
- Validate host connectivity
- Search and export in host discovery and collection
- Propagate probe settings: Copy probes, paste probes
- Discovery policies for Veritas NetBackup
- View and manage system notifications
- Customize with advanced parameters
- Access control advanced parameters
- General Data Collection advanced parameters
- Cloud data collection advanced parameters
- Host discovery and collection advanced parameters
- Backup Manager advanced parameters
- Capacity Manager advanced parameters
- File Analytics advanced parameters
- Virtualization Manager advanced parameters
- Manage your Portal environment
- Manage ransomware scorecard
- Analyze files
- Troubleshoot the Portal
- Retrieving log files
- Debug
- Attribute inheritance overrides
- Understand report data caching
- Understand the portal
- Section V. Report Reference
- Introduction to NetBackup IT Analytics
- Alert Reports
- Ransomware reports
- Risk Mitigation Solution Reports
- Risk Mitigation Reports
- Storage Optimization Solution Reports
- System Administration Reports
- Oracle Job Overview
- Capacity Manager Reports
- Application Capacity Reports
- Array Capacity Utilization Reports
- Array Capacity & Utilization (Generic Data)
- Array Capacity & Utilization (IBM SVC View)
- Array Capacity and Utilization (IBM XIV View)
- Array Capacity and Utilization (NetApp View)
- Array Capacity and Utilization (NetApp Cluster)
- NetApp Storage System Detail
- Array Capacity and Utilization (OpenStack Swift)
- IBM Array Site Summary
- IBM Array Detail
- LUN Utilization Summary
- NetApp Aggregate Detail
- NetApp Cluster-Mode Aggregate Detail
- NetApp Plex Details
- NetApp Volume Details
- NetApp Cluster-Mode Volume Detail
- NetApp StorageGrid Tenant Summary
- Available/Reclaimable Capacity Reports
- Capacity at Risk Reports
- Capacity Chargeback Reports
- Host Capacity Utilization Reports
- SnapMirror Reports
- SnapVault Reports
- Capacity Forecasting Reports
- Storage Performance Reports
- Mission Control for Performance Analysis
- Thin Provisioning Reports
- Hitachi Dynamic Provisioning Pool Utilization
- File Analytics Reports
- Virtualization Manager Reports
- Understanding the Datastore
- VM Server Detail
- VM Snapshot Summary
- VM Detail
- Datastore Utilization Summary
- Datastore Detail
- Fabric Manager Reports
- Host to Storage Dashboard
- Backup Manager Management Reports
- Error Log Summary
- Job Duration Report
- Veeam Backup & Replication Job Summary Report (Homogeneous)
- Veeam and RMAN Job Details Report
- Adding a Note to a Job
- Job Volume Summary Report
- NetBackup deduplication to MSDP savings
- Backup Administration Reports
- Host Details
- IBM Spectrum Protect (TSM) Storage Pools Dashboard
- Job Histogram
- EEBs on Primary server, Media server and Clients reports
- Backup Media Management Reports
- TSM Tape Media Detail Table
- Backup Service Level Agreement (SLA) Reports
- Determining and Improving Backup Start Time Performance
- Determining and Improving Backup Success Performance
- Determining and Improving Backup Duration Performance
- Backup Storage Utilization Reports
- Backup Manager Forecasting Reports
- Backup Billing and Usage Reports
- Backup Policies Reports
- HP Data Protector Backup Specification Detail
- Public Cloud Reports
- AWS Reports
- Microsoft Azure Reports
- Section VI. NetBackup IT Analytics Exporter Installation and Configuration
- Section VII. Data Collector Installation and Troubleshooting
- Installing the Data Collector Software
- Validating Data Collection
- Uninstalling the Data Collector
- Manually Starting the Data Collector
- Data Collector Troubleshooting
- Host resources: Check host connectivity using standard SSH
- Host resources: Generating host resource configuration files
- Configuring parameters for SSH
- CRON Expressions for Policy and Report Schedules
- Clustering Data Collectors with VCS and Veritas NetBackup (RHEL 7)
- Clustering Data Collectors with VCS and Veritas NetBackup (Windows)
- Install and configure NetBackup IT Analytics Data Collector on MSCS environment
- Maintenance Scenarios for Message Relay Server Certificate Generation
- Installing the Data Collector Software
- Section VIII. Data Collector Installation and Configuration for Cohesity NetBackup
- Introduction
- Configure a NetBackup IT Analytics Distributed Data Collector on a NetBackup Primary Server
- Configure Data Collector on non-clustered NetBackup 10.4 and later primary server
- Configure Data Collector on non-clustered NetBackup 10.1.1, 10.2, 10.2.01, 10.3 or 10.3.0.1 primary server
- Configure a Veritas NetBackup Data Collector Policy
- Configuring file analytics in NetBackup Data Collector policy
- Installing the Data Collector software
- Configure SSL
- Centralized Data Collector for NetBackup - Prerequisites, Installation, and Configuration
- Step-1: Choose operating system and complete prerequisites
- Step-5: SSH/WMI
- Upgrading Data Collector Locally
- Clustering Data Collectors with VCS and Veritas NetBackup (RHEL)
- Clustering Data Collectors with VCS and Veritas NetBackup (Windows)
- Install and Configure NetBackup IT Analytics Data Collector on MSCS
- Data Collector Policy Migration
- Pre-Installation setup for Veritas NetBackup appliance
- Pre-installation setup for Veritas Flex Appliance
- Data Collector Troubleshooting
- Host resources: Check host connectivity using standard SSH
- Host resources: Generating host resource configuration files
- Configuring parameters for SSH
- Appendix B. Configure Appliances
- Appendix C. Firewall configuration: Default ports
- Appendix D. CRON Expressions for Policy and Report Schedules
- Appendix E. Maintenance Scenarios for Message Relay Server Certificate Generation
- Section IX. Data Collector Installation and Configuration
- Introduction
- Install and configure a Data Collector
- Step-1: Choose operating system and complete prerequisites
- Installing the Data Collector software
- Configure SSL
- Section X. Data Protection
- Configuration for Veritas Backup Exec
- Configuration for Cohesity DataProtect
- Configuration for Commvault Simpana
- Open TCP/IP access to the Commvault database
- Set up a read-only user in the CommServe server
- Configuration for EMC Avamar
- Import EMC Avamar server information
- Configuration for EMC Data Domain backup
- Configuration for Dell EMC NetWorker backup & recovery
- Importing generic backup data
- Configuration for generic backup
- CSV format specification
- Configuration for HP Data Protector
- Architecture overview (HP Data Protector)
- Configure the Data Collector server in Cell Manager (HP Data Protector)
- Configuration for IBM Spectrum Protect (TSM)
- Architecture overview (IBM Spectrum Protect -TSM)
- Import IBM Spectrum Protect (TSM) information
- Configuration for NAKIVO Backup & Replication
- Configuration for Oracle Recovery Manager (RMAN)
- Configuration for Rubrik Cloud Data Management
- Configuration for Veeam Backup & Replication
- Appendix F. Load historic events
- Load Veritas NetBackup events
- Configuration for Veritas Backup Exec
- Section XI. Storage (Capacity)
- Configuration for Compute Resources
- Configuration for DELL EMC Elastic Cloud Storage (ECS)
- Configuration for Dell EMC Unity
- Configuration for EMC data domain storage
- Configuration for EMC Isilon
- Configuration for EMC Symmetrix
- Configuration for EMC VNX Celerra
- Configuration for EMC VNX CLARiiON
- Configuration for EMC VPLEX
- Configuration for EMC XtremIO
- Configuration for FUJITSU ETERNUS Data Collector
- Configuration for Hitachi Block
- Configuring a Hitachi Device manager user
- Configuration for Hitachi Content Platform (HCP)
- Hitachi content platform system management console
- Hitachi content platform tenant management console
- Configuration for Hitachi NAS
- Configuration for Hitachi Vantara All-Flash and Hybrid Flash Storage
- Configuration of Host inventory
- Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements
- Configure host Discovery policies to populate the host Inventory
- Validate host connectivity
- Host Inventory search and host Inventory export
- Configure and edit host probes
- Propagate Probe Settings: Copy Probes, Paste Probes
- Configuration for HP 3PAR
- Configuration for HP EVA
- Configuration for HPE Nimble Storage
- Configuration for HPE StoreOnce
- Configuration for IBM Enterprise
- Configuration for IBM COS
- Configuration for IBM SVC
- Configuration for IBM XIV
- Configuration for Microsoft Windows server
- Configuration for NetApp-7
- Configuration for NetApp StorageGRID
- Configuration for NetApp Cluster
- Configuration for NetApp E-Series
- Configuration for NEC HYDRAstor
- Configuration for Pure Storage FlashArray
- Section XII. Compute (Virtualization and Host Collection)
- Configuration for VMware
- Configuration for IBM VIO
- Configuration for Microsoft Hyper-V
- Section XIII. Cloud
- Configuration for Amazon Web Services (AWS)
- Mandatory probe user privileges
- Link AWS accounts for Collection of consolidated billing data
- Configuration for Google Cloud Platform
- Configuration for OpenStack Ceilometer
- Configuration for OpenStack Swift
- Configuration for Microsoft Azure
- Configuration for Amazon Web Services (AWS)
- Section XIV. Fabric
- Configuration for Brocade switch
- Configuration for Cisco switch
- Configuration for Brocade Zone alias
- Configuration for Cisco Zone alias
- Configuration for Brocade switch
- Section XV. File Analytics
- Configuration for File Analytics
- Host Discovery and Collection File Analytics probe
- Adding a File Analytics Data Collector policy
- File Analytics Export Folder Size and Folder Depth
- Configuration for File Analytics
- Section XVI. Data Collection Validation and Troubleshooting
- Validate data collection
- Data Collector Troubleshooting
- Host resources: Check host connectivity using standard SSH
- Host resources: Generating host resource configuration files
- Configuring parameters for SSH
- Uninstalling the Data Collector
- Section XVII. System Administration
- Preparing for Updates
- Backing Up and Restoring Data
- Monitoring NetBackup IT Analytics
- Accessing NetBackup IT Analytics Reports with the REST API
- Defining NetBackup Estimated Tape Capacity
- Automating Host Group Management
- Categorize host operating systems by platform and version
- Load relationships between hosts and host group
- Automate NetBackup utilities
- Scheduling utilities to run automatically
- Attribute Management
- Importing Generic Backup Data
- Backup Job Overrides
- Managing Host Data Collection
- System Configuration in the Portal
- Custom parameters
- Performance Profile Schedule Customization
- LDAP and SSO authentication for Portal access
- Changing Oracle Database User Passwords
- Integrating with CyberArk
- Tuning NetBackup IT Analytics
- Defining Report Metrics
- Working with Log Files
- Portal and data collector log files - reduce logging
- Data collector log file naming conventions
- Portal log files
- SNMP Trap Alerting
- SSL Certificate Configuration
- Configure virtual hosts for portal and / or data collection SSL
- Keystore on the portal server
- Portal Properties: Format and Portal Customizations
- Data Retention Periods for SDK Database Objects
- Data aggregation
- Troubleshooting
- Appendix G. Kerberos based proxy user's authentication in Oracle
- Appendix H. Configure TLS-enabled Oracle database on NetBackup IT Analytics Portal and data receiver
- Appendix I. NetBackup IT Analytics for NetBackup on Kubernetes and appliances
- Section XVIII. Licensing
- License installation and guidelines
- License overview
- Verify the current license configuration
- Storage suite
- Protection suite
- Backup Manager
- Backup Manager
- Complete suite
- Managing licenses
- Configure the Data Collector policy to exclude the object
- License management from the command line
- Troubleshooting
- License installation and guidelines
- Section XIX. Inventory reports and operations
- Section XX. OpsCenter Transition
Configure Storage Optimization rules
A set of storage optimization rules are provided to assess areas within your enterprise that offer candidates for optimization. These rules include parameters that can be configured to isolate specific conditions relevant for your environment. You can also associate costs with rules. Cost sources may related to Chargeback values or you can set your own custom value. For example, the Unallocated LUNs rule can be configured to exclude LUNs less than a certain size. While various use cases drive how you configure a rule, the goal is to have analytics that help you identify storage optimization candidates and trends that require attention. This on-going process should periodically assess trends and codify business practices.
See Storage Optimization solution overview.
See Enable Storage Optimization rules.
See Report Reference Guide for details on Storage Optimization Solution Reports.
Once configured, a scheduled process gathers historical data for these categories so that you can identify areas that require further scrutiny. Accompanying reports present data that can be monitored over time, enabling an actionable process to maintain an optimized storage environment.
Best Practice
When configuring values for parameters, be as liberal as possible, initially. Then, over time, change parameters to produce a narrower actionable list. For optimal data comparisons, avoid frequent parameter modifications.
To edit a storage optimization rule
If optimization rules are not modified, the historical data process uses an active rule's default settings to collect the historical data.
- Select Admin > Solutions > Storage Optimization.
Rule
Rules are listed within relevant categories, such as Cloud and Storage.
Availability
If a particular type of collection is not licensed or collected, storage optimization data will not be available, regardless of how a rule is configured. In some cases, a Portal may have the necessary license, but collection may not have been enabled and/or completed.
Cloud does not require a specific license in order to deploy a data collector.
Data Protection requires Protection or Complete Suite license.
File Analytics requires a Complete Suite license.
Storage requires Storage or Complete Suite license.
Virtualization requires Protection or Complete Suite license.
Description
The full description of the Storage Optimization rule can be viewed by placing your mouse over the description.
Notes
Enter operational notes for future reference.
Status
Green check mark indicates successful collection of storage optimization historical data for enabled rules.
Red X indicates failed historical data collection. It could be that collection is attempting to access data for a product module that is not in your Portal environment. Click the red icon to view the Database Error Aggregation report.
A non-colored circle indicates that the storage optimization process did not run, typically because the rule is not enabled.
State
Indicates if the rule is Enabled or Disabled.
Last Run
The date and time that the Storage Optimization process ran and evaluated the collected data against the rule's configured parameters.
- Select a rule in the Storage Optimization grid and click Edit. Or, simply double-click the rule to access the edit dialog.
See Storage optimization rule prerequisites and logic.
Storage Optimization Rule
Description
Cloud Rules
AWS Orphan Snapshots
Amazon Web Services orphaned snapshots that are consuming storage may be impacting costs. This rule identifies snapshots for EC2 instances that no longer exist. When an EC2 instance is deleted, its snapshots need to be reviewed and its volumes brought back into the pool of usable storage. This rule also allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports. For actionable information, see the Storage Optimization detail reports.
AWS Orphan Volumes
Amazon Web Services orphaned volumes that are consuming storage may be impacting costs. This rule identifies volumes for EC2 instances that no longer exist. When an EC2 instance is deleted, its snapshots need to be reviewed and its volumes brought back into the pool of usable storage. This rule allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports. For actionable information, see the Storage Optimization reports.
Data Protection Rules
Sources Backed Up by Multiple Servers
Sources backed up by multiple servers may be wasting storage and increasing maintenance costs. This rule identifies sources backed up by more than one server within a specific number of days (default is 7 days). If a source is moved from one backup system to another backup system, this rule would identify those changes too.
This rule allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports. The cost is calculated based on the number of different servers minus 1, times the average job size in GiB. For example, if a source is backed up by 3 different servers, the average size of these jobs is 200 GiB, and $0.25 for each GiB, then the saving might be: (3-1) * 200 GiB * $0.25 = $100
Data Domain File Compression
Compression metrics for the last 30 days are evaluated for inefficient storage usage and compression ratios for Data Domain clients. A low compression ratio may indicate a storage optimization opportunity or it may warrant a move of low compression clients to less expensive storage. This rule also allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports. For additional details, see the Data Domain NetBackup File Compression Summary report.
High Backup Retention Jobs
Backups retained for too many days may be wasting storage and increasing maintenance costs. This rule identifies backups with a high number of retention days. This rule allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports.
File Analytics Rules
File Type Usage
File types that are consuming storage can be reviewed. The filename extension identifies a file type, such as iso, log, and cab. This rule allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports. This File Type rule is relevant only if File Analytics data collection is enabled. For a list of file types that are relevant for your environment, see the File Types report.
Inactive Large Files
Large files consuming storage can be considered when making tiered storage migration decisions. This rule also allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports. This rule is relevant only if File Analytics data collection is enabled. For additional details, see the Largest Files report.
Storage Rules
Inactive LUNs
LUNs that have no I/O activity collected in the last 30 days, or the collected value during that time period is zero, are candidates for storage reclamation.
This rule explicitly examines 30 days of collected LUN performance data. This rule can filter the data by RAID type. The format for RAID type specification is specific to storage vendors. For a list of RAID types in your environment, run the LUN Utilization Summary report. This rule also allows you to set a Cost Source for displaying associated costs in the generated reports. Choose from Chargeback values or add a custom value. If you have set up Chargeback rules, those are more granular and can provide greater cost accuracy.
Overprovisioned Hosts
File system usage can help identify overprovisioned file systems and hosts. For additional information, run the Host Utilization Summary report and the Host Filesystem Reclamation Candidates cloud report. This rule also allows you to set a Cost Source for displaying associated costs in the generated reports. Choose from Chargeback values or add a custom value. If you have set up Chargeback rules, those are more granular and can provide greater cost accuracy.
Unallocated LUNs
Storage associated with LUNs that have not been allocated to hosts can be considered for storage optimization. This rule also allows you to set a Cost Source for displaying associated costs in the generated reports. Choose from Chargeback values or add a custom value. If you have set up Chargeback rules, those are more granular and can provide greater cost accuracy.
This rule can filter the data by RAID type. The format for RAID type specification is specific to storage vendors. For a list of RAID types in your environment, run the LUN Utilization Summary or the Unallocated LUNs report. In addition, the Reclamation Summary report can reveal potential reclamation categories.
Undiscovered LUNs
LUNs that have been assigned to a host, but have not been discovered and therefore are not seen on the host side, indicate a reclamation opportunity. The storage in these orphaned LUNs is not available for mounting file systems. This rule also allows you to set a Cost Source for displaying associated costs in the generated reports. Choose from Chargeback values or add a custom value. If you have set up Chargeback rules, those are more granular and can provide greater cost accuracy.
This rule can filter the data by RAID type. The format for RAID type specification is specific to storage vendors. For a list of RAID types in your environment, run the LUN Utilization Summary report. In addition, the Reclamation Summary report illustrates potential reclamation categories.
Unused LUNs
Unused LUNs could be considered for reclamation. These are LUNs that have been assigned to a host, but the host has not been placed into a volume group, or a partition has not been created. This rule also allows you to set a Cost Source for displaying associated costs in the generated reports. Choose from Chargeback values or add a custom value. If you have set up Chargeback rules, those are more granular and can provide greater cost accuracy.
This rule can filter the data by RAID type. The format for RAID type specification is specific to storage vendors. For a list of RAID types in your environment, run the LUN Utilization Summary report. In addition, the Reclamation Summary report illustrates potential reclamation categories.
Virtualization Rules
Non-VM Files
VM storage that is being consumed by files that are unknown VM file types can be considered for storage optimization. This rule allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports. For additional details, see the Datastore Usage Breakdown and the VM Files Summary reports.
VMs Aged Snapshots
VM snapshots have storage associated with them, but these snapshots have been forgotten for some time. Aged snapshots present a reclamation opportunity. This rule allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports. For additional details, see the VM Snapshot Summary.
VMs Low CPU
VMs where the average CPU utilization is low for last 24 hours and CPU usage is less than 5%, may provide a storage optimization opportunity.
Filter your actionable list by guest size and guest state, for example, including only running large guests. This rule allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports. For additional details, see the VM Summary report.
VMs Not in VM Inventory
VMs that are not in the VM inventory may be consuming storage. When a VM is removed from the inventory, it doesn't necessarily mean that the associated storage is returned to the storage pool. This rule also allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports. For additional details, see the Datastore Usage Breakdown and the VM Files Summary reports.
VMs Powered Off
VMs that have been powered off may have storage associated with them. For additional details, see the VM Summary report. This rule also allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports.
VMs Undiscovered Disks
VMs that have been provisioned storage, but that storage is not being used by the VMs, may indicate a storage optimization opportunity. This rule also allows you to set a custom value for Cost per GiB for the purpose of displaying costs in the generated reports. For additional details, see the Physical Disk Utilization report.
- Click in a parameter field to view the green help text at the bottom of the dialog and then use those details to configure parameters. Each rule includes parameters unique to the data that is being evaluated.