Symantecメーカー5.1の使用説明書/サービス説明書
ページ先へ移動 of 52
Veritas CommandCentral ™ Getting Started Guide for Microsoft Windows and UNIX 5.1.
CommandCentral ™ Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 5.1.0 Legal Notice Copyright © 2008 Symantec Corporation.
Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 http://www.symantec.com.
Technical Support Symantec Technical Support maintains support centers globally. Technical Support ’ s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base.
■ Version and patch level ■ Network topology ■ Router, gateway, and IP address information ■ Problem description: ■ Error messages and log files ■ Troubleshooting that was performed before.
Maintenance agreement resources If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: contractsadmin@symantec.com Asia-Pacific and Japan semea@symantec.
Getting started with the CommandCentral family This document includes the following topics: ■ About the CommandCentral family ■ About Veritas CommandCentral Storage ■ About Veritas CommandCentra.
■ CommandCentral Enterprise Reporter: Provides a global view of storage assets mapped to your organization, business insight about inventory and utilization, on-demand customized reporting, and personalized dashboards. For more information, refer to the following: See “ About Veritas CommandCentral Enterprise Reporter ” on page 20.
What ’ s new in CommandCentral Storage 5.1 CommandCentral Storage 5.1 contains and builds upon CommandCentral Storage 5.0 functionality, providing several new features. Management and discovery CommandCentral Storage 5.1 introduces the following management and discovery features.
explorer polls the storage array using the polling interval — for example, a polling interval of 180 minutes. Change detection is available for the following storage arrays: ■ EMC CLARiiON ■ EMC.
Added support for discovery of ESX servers through the VMware Infrastructure SDK In CommandCentral Storage 5.1, you can now configure discovery of ESX servers through the VMware Infrastructure SDK (VI SDK). This allows you to discover individual ESX servers through VI SDK or a VirtualCenter that manages multiple ESX servers through VI SDK.
■ VxVM volumes Added the Switch Port Usage Trend report You can now view the Switch Port Usage Trend report, which allows you to track used and unused ports over a specified time frame.
■ Managed host ■ Switch port ■ NAS (TB) Because of these new licensing options, you need to obtain new licenses when you upgrade to CommandCentral 5.1. When you upgrade to 5.1, an evaluation license installs. The evaluation license is valid for 60 days.
Added links to access the CommandCentral Storage Change Manager Console If you enable CommandCentral Storage Change Manager on your Management Server, you can load the CommandCentral Storage Change Manager Console from the CommandCentral Storage Console.
For more information about the hotfix deployment mechanism, see the CommandCentral Administrator ’ s Guide . What you can do with CommandCentral Storage Symantec strives to help you manage the integrity of your information by enabling you to maintain the right balance of information security and availability.
Responding to this problem, some enterprises have implemented storage area networks (SANs) in which storage is placed on its own dedicated network. This dedicated network can improve efficiency and reliability by effectively separating traffic on the storage network from traffic on the main user network.
■ Generate reports about the network ’ s physical resources and about storage usage ■ Troubleshoot network elements ■ Manage day-to-day performance and resource availability ■ Develop a data.
Storage provisioning Using tools provided in CommandCentral Storage, a storage administrator can allocate storage resources to specific hosts and applications and control access to storage resources. You can also create LUNs from unconfigured storage.
■ Identifies potential risks to your storage infrastructure based on best practice policies. With risks, storage administrators can identify the impacted storage resources and take the necessary action to remove the risk from your storage infrastructure.
■ View reports that provide an enterprise – wide view of the changes made to your storage resources, a summary of the hosts and applications that have policies applied to them, and details about violations, including the time that it takes to resolve violations and the type of violations that have generated.
organized by location, departments, or any other logical business unit. This summarized information enables you to assess trends in your storage environment, which you can then analyze to assign responsibility.
What's new in CommandCentral Enterprise Reporter 5.0 MP1 CommandCentral Enterprise Reporter 5.0 MP1 contains and builds upon previous Enterprise Reporter functionality, providing several new features.
You can now use these custom attributes in Enterprise Reporter reports. In Query Studio, they appear in the list of storage object views with the prefix of "Custom Attribute." For example, to see custom attributes in the Switch Analysis package in Query Studio, select Switch Analysis Views > by Switch Attributes > Switch.
■ NetApp Volumes Dashboard customization with selected reports By default, the Dashboard shows report categories and their descriptions. With Enterprise Reporter 5.0 MP1, you can customize the Dashboard to show any report, including one that you created.
Security enhancements Enterprise Reporter includes additional security features. SSL mode Cognos now runs in SSL mode, enabling enhanced security. User permission enhancements Enterprise Reporter now .
Business executives and storage administrators can use Enterprise Reporter to do the following: ■ Develop highly customizable business views of data from multiple data sources. For example, administrators can discover global storage usage trends and drill down to identify high consumers across geographic or business units.
Getting CommandCentral up and running To get CommandCentral up and running, review information about planning tips, system requirements, and the installation process.
Table 1-1 Supported operating systems for CommandCentral components Operating systems supported Component Solaris and Windows CommandCentral Storage Management Server Solaris and Windows CommandCentral Storage Change Manager Management Server Solaris Enterprise Reporter Management Server Solaris, Windows, Red Hat Linux, SUSE Linux, AIX, and HP-UX.
■ Mount the product disc ■ Run the product installer ■ Perform post-installation setup For more information about the installation process refer to the following: ■ For CommandCentral Storage and CommandCentral Storage Change Manager, refer to the CommandCentral Installation Guide .
Diagnostic tools are also available to assist in troubleshooting problems associated with the product. These tools can be downloaded from the Symantec FTP site.
Provides information about supported operating systems, host resource requirements, software limitations, and known issues. CommandCentral Storage Release Notes Describes how you can use CommandCentral Storage to monitor, manage, and report on your storage infrastructure.
Describes how you can use CommandCentral Storage Change Manager to view your storage resources, view detailed descriptions about changes to those storage resources, set up policies, and view violations to those policies.
storage_management_docs@symantec.com Please include the following information with your documentation comments: ■ The title and product version of the guide you are commenting on ■ The topic (if r.
Getting started with the CommandCentral family Where to find more information about CommandCentral 34.
access group See array virtual port. active zone set The zone set that is currently enforced on a Fibre Channel fabric. Only one zone set can be active for a fabric at a given time.
array virtual port A logical — or, as it is commonly called, "virtual" — port defined for some array types that support SMI-S 1.0.2 and earlier. When an array virtual port (or AVP) is defined, the array can support LUN masking with multiple, heterogeneous hosts through a single physical array port.
CLARiiON storage group In an EMC CLARiiON storage array, a set of addressable units (LUNs) defined so that an operator can perform one LUN masking operation for the entire set of LUNs rather than separately for each LUN.
Console provides a central point to display and manage storage resources, create and modify policies, provision storage, administer access control, and view reports.
deleted objects, destroyed objects cannot be restored to the CommandCentral Storage database by a rediscover operation. Contrast with delete. device A collective term for disks, tapes, disk arrays, tape arrays, and any other objects that store data. Also storage device.
event A notification that indicates when an action, such as an alert or a change in state, has occurred for one or more objects on the storage network. explorer A software tool that uses a unique methodology to discover information about a particular kind of resource on the storage network.
GBIC Gigabit interface converter. A widely used transceiver module for Fibre Channel. A GBIC is modular and hot-swappable and can be either copper or optical.
host storage domain See array virtual port. hub A common connection point for devices in the storage network. The hub may be unmanaged, IP-managed, or FC-managed. An unmanaged hub is passive in the sense that it serves simply as a conduit for data, moving the data from one storage resource to another.
associated with the LUN (the access path) between that AddrUnit and an array port to which it is bound. The access control list for a LUN contains the World Wide Name of each HBA port that is allowed to access that LUN within the array.
object A single, unique addressable entity on a storage network. It is possible for objects to be present within objects. For example, while a tape array is an object, each individual tape drive within the array is also an object. A host is an object, and the HBA inside the host is also an object.
Push Install See CommandCentral Storage Agent Push Install Utility. QoSS (Quality of storage service) A technique for managing storage resources to fulfill predefined service-level criteria. For each service level, or tier, policy rules are used to ensure the appropriate level of availability and performance.
SAN Access Layer (SAL) A component that performed discovery and access control in the SANPoint Control and CommandCentral Storage 4.x products. See Hardware Abstraction Layer (HAL). scan An operation that detects all resources visible to an explorer through either an in-band connection or a device manager.
cooperating systems that must adhere to a common framework and a common language or protocol. soft zoning A fabric zoning method that filters the visibility of objects on the storage network so that an object can only see other objects that share at least one zone membership with it.
Symantec Product Authentication Service A component of Veritas Security Services (VxSS) that is used by CommandCentral Storage to provide user authentication. Authentication Service is a set of processes and runtime libraries that enables users to log on to multiple Veritas products with one login.
when the SAN runs an unsupported HBA card or driver version, there is no managed host attached to the HBA, or the Management Server is not configured to communicate with the managed host. For storage devices, this can occur when no LUNs are visible to a managed host (usually due to zoning or LUN masking security).
administrative operations on resources, including starting, stopping, restarting, and monitoring at the service group level. Veritas NetBackup A Symantec product family that provides a fast, reliable backup and recovery solution for environments ranging from terabytes to petabytes in size.
volume In storage media managed by Veritas Volume Manager, a virtual disk made up of a portion or portions of one or more physical disks and representing an addressable range of disk blocks. It is used by applications such as file systems or databases.
CommandCentral Glossary 52.
デバイスSymantec 5.1の購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
Symantec 5.1をまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはSymantec 5.1の技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。Symantec 5.1の取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。Symantec 5.1で得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
Symantec 5.1を既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はSymantec 5.1の不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、Symantec 5.1に関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちSymantec 5.1デバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。