Symantec Veritas CommandCentral User Manual

Veritas CommandCentral Getting Started Guide

for Microsoft Windows and UNIX
5.1
CommandCentralGetting Started Guide
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Documentation version 5.1.0
Copyright © 2008 Symantec Corporation. All rights reserved.
Symantec, the Symantec logo, Veritas, CommandCentral, NetBackup, SANPoint, SANPoint Control, and Storage Foundation are trademarks or registered trademarks of Symantec Corporation or its affiliates in theU.S.andothercountries. Other names may be trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (Third Party Programs). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice documentation accompanying this Symantec product for more information on the Third Party Programs.
AIX is a registered trademark of IBM Corporation.
HP-UX is a registered trademark of Hewlett-Packard Development Company, L.P.
Linux is a registered trademark of Linus Torvalds.
Solaris is a trademark of Sun Microsystems, Inc.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations.
Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014
http://www.symantec.com

Technical Support

Symantec Technical Support maintains support centers globally. Technical Supports primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates.
Symantecs maintenance offerings include the following:
A range of support options that give you the flexibility to select the right
amount of service for any size organization
Telephone and Web-based support that provides rapid response and
up-to-the-minute information
Upgrade assurance that delivers automatic software upgrade protection
Global support that is available 24 hours a day, 7 days a week
Advanced features, including Account Management Services
For information about Symantecs Maintenance Programs, you can visit our Web site at the following URL:
www.symantec.com/techsupp/
Contacting Technical Support
Customers with a current maintenance agreement may access Technical Support information at the following URL:
www.symantec.com/techsupp/
Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem.
When you contact Technical Support, please have the following information available:
Product release level
Hardware information
Available memory, disk space, and NIC information
Operating system
Version and patch level
Network topology
Router, gateway, and IP address information
Problem description:
Error messages and log files
Troubleshooting that was performed before contacting Symantec
Recent software configuration changes and network changes
Licensing and registration
If your Symantec product requires registration or a license key, access our technical support Web page at the following URL:
www.symantec.com/techsupp/
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Customer Service is available to assist with the following types of issues:
Questions regarding product licensing or serialization
Product registration updates, such as address or name changes
General product information (features, language availability, local dealers)
Latest information about product updates and upgrades
Information about upgrade assurance and maintenance contracts
Information about the Symantec Buying Programs
Advice about Symantec's technical support options
Nontechnical presales questions
Issues that are related to CD-ROMs or manuals
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows:
Additional enterprise services
Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively.
Enterprise services that are available include the following:
contractsadmin@symantec.comAsia-Pacific and Japan
semea@symantec.comEurope, Middle-East, and Africa
supportsolutions@symantec.comNorth America and Latin America
Symantec Early Warning Solutions
Managed Security Services
Consulting Services
Educational Services
To access more information about Enterprise services, please visit our Web site at the following URL:
www.symantec.com
Select your country or language from the site index.
These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur.
These services remove the burden of managing and monitoring security devices and events, ensuring rapid response to real threats.
Symantec Consulting Services provide on-site technical expertise from Symantec and its trusted partners. Symantec Consulting Services offer a variety of prepackaged and customizable options that include assessment, design, implementation, monitoring, and management capabilities. Each is focused on establishing and maintaining the integrity and availability of your IT resources.
Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs.

Getting started with the CommandCentral family

This document includes the following topics:
About the CommandCentral family
About Veritas CommandCentral Storage
About Veritas CommandCentral Storage Change Manager
About Veritas CommandCentral Enterprise Reporter
Getting CommandCentral up and running
Where to find more information about CommandCentral

About the CommandCentral family

The CommandCentral family includes the following modules:
CommandCentral Storage: A storage resource management solution that
provides centralized visibility and control across heterogeneous storage environments while reducing risks and costs.
For more information, refer to the following: See “About Veritas CommandCentral Storage” on page 8.
CommandCentral Storage Change Manager: A storage change management
solution that provides insight into storage infrastructure related changes in your data center, helping you to ensure the availability of your storage infrastructure, manage service level agreements more effectively, and improve operational efficiency.
For more information, refer to the following: See “About Veritas CommandCentral Storage Change Manager” on page 18.
Getting started with the CommandCentral family
8

About Veritas CommandCentral Storage

CommandCentral Enterprise Reporter: Provides a global view of storage assets
mapped to your organization, business insight about inventory and utilization, on-demand customized reporting, and personalized dashboards.
For more information, refer to the following: See “About Veritas CommandCentral Enterprise Reporter” on page 20.
About Veritas CommandCentral Storage
Veritas CommandCentral Storage by Symantec represents an entire storage resource management (SRM) solution, giving you what you need to manage your storage infrastructure more effectively. It gives you the following capabilities:
Offers a single console from which data center administrators deploy, manage,
and expand a multi-vendor networked storage environment. The CommandCentral Storage Console seamlessly integrates performance and policy management, storage provisioning, and zoning capabilities to ensure that the storage infrastructure runs as efficiently as possible. The Console enables users to set policies that automate notification, recovery, and other user-definable actions.
Discovers and tracks the utilization and allocation of storage resources down
to the disk level. The reporting features in CommandCentral Storage provide a complete and detailed view into precisely how and where storagefor office documents, files, applications, email, and databasesis used in your enterprise.
Shows usage trends and makes forward projections. You can gather data both
locally and remotely (through a managed host). This means you can get baseline information without huge deployment costs. Armed with this data, you can do predictive modeling to analyze the return on your storage investment. You also have what you need to implement a program of departmental chargeback.
Using CommandCentral Storage together with other Symantec software, IT managers have the tools they need to perform real, active, end-to-end storage resource management and make strategic decisions about their future storage needs.
By actively managing the entire data path from application to array, CommandCentral Storage helps ensure optimal performance and availability of business critical applications. CommandCentral Storage also offers customizable policy-based management to automate notification, recovery, and other user-definable actions.

Whats new in CommandCentral Storage 5.1

CommandCentral Storage 5.1 contains and builds upon CommandCentral Storage
5.0 functionality, providing several new features.
Management and discovery
CommandCentral Storage 5.1 introduces the following management and discovery features.
Enhanced agentless discovery of storage resources
If you do not install the CommandCentral managed host on hosts in your storage network, the CommandCentral Management Server can discover those hosts and their connections to storage resources through agentless discovery.
The process involves creating a user-created host in order to associate the unidentified adapter (HBA) discovered through switch discovery to the host to which it connects. In previous versions of CommandCentral, you could do this one host at a time. Now, CommandCentral 5.1 provides you with the ability to create multiple hosts at once and to automate the process by creating rules and importing information from a CSV file.
For more information about this feature, see the CommandCentral Storage Users Guide.
About Veritas CommandCentral Storage
9Getting started with the CommandCentral family
Detection of configuration related changes to storage arrays
In CommandCentral Storage 5.0 MP1, explorers initiate discovery of devices based on the explorers polling interval. The polling interval is the amount of time that the explorer waits to initiate discovery of the device. For example, the polling interval might be 180 minutes.
In CommandCentral Storage 5.1, explorers continue to initiate discovery of devices based on the explorers polling interval; however, for certain array explorers, you can also enable change detection. When you enable change detection, explorers listen to SNMP traps or frequently poll storage arraysfor example, every 15 minutesin order to detect configuration related changes to that arrayfor example, masking changes. When the explorer detects configuration related changes to the storage array, the explorer initiates a full discovery of the array.
For example, if you enable change detection for EMC CLARiiON storage arrays, by default, the explorer listens for SNMP traps from CLARiiON storage arrays. When the explorer detects changes, it initiates discovery of the array. Because the explorer discovers the changes in near real-time, CommandCentral Storage can provide you with more up-to-date information about the storage array. In contrast, if you do not enable change detection, discovery occurs only when the
Getting started with the CommandCentral family
10
About Veritas CommandCentral Storage
explorer polls the storage array using the polling intervalfor example, a polling interval of 180 minutes.
Change detection is available for the following storage arrays:
EMC CLARiiON
EMC Symmetrix
Hitachi HiCommand
HP EVA
NetApp unified storage devices
For information about enabling change detection, see the CommandCentral Hardware and Software Configuration Guide.
Improved Data Module file scanning
In CommandCentral Storage 5.0 MP1, the Data Module file scanner determines a files size by its logical size. Now, in CommandCentral Storage 5.1, the file scanner also collects a files physical size. A files physical size provides you with a more accurate account of space consumption over the logical size. You can use the Data Module Importer settings and Data Module rules to specify whether you want summary reports that report on directory size, user consumption, file type usage, and aging data to display a files size by its logical size or physical size. Additionally, you can drill down into detail reports to display both the logical size and physical size.
For more information, see the CommandCentral Administrators Guide.
Discovery of device groups and composite groups for EMC Symmetrix storage arrays
CommandCentral Storage now discovers the name of the device groups and composite groups to which devices from EMC Symmetrix storage arrays belong. The group names appear when you view an EMC Symmetrix storage arrays Devices pane.
Discovery of replication objects for HP EVA storage arrays
CommandCentral Storage now discovers the following replication objects for HP EVA storage arrays:
Snapshots
Vsnaps
Snapclones
About Veritas CommandCentral Storage
Added support for discovery of ESX servers through the VMware Infrastructure SDK
In CommandCentral Storage 5.1, you can now configure discovery of ESX servers through the VMware Infrastructure SDK (VI SDK). This allows you to discover individual ESX servers through VI SDK or a VirtualCenter that manages multiple ESX servers through VI SDK.
For information about configuring discovery through VI SDK, see the CommandCentral Hardware and Software Configuration Guide.
Sybase ASE 15 support
CommandCentral now supports discovery of Sybase Adaptive Server Enterprise (ASE) 15.
Added support for the correlation of non-HDS backend array volumes for HDS Tagma USP and USP-V series arrays
CommandCentral now supports the correlation of the physical disks of HDS Tagma USP and USP-V series arrays and their backend array volumes (LUNs) when the backend arrays are from other vendors that are listed in the CommandCentral Hardware and Software Compatibility List.
11Getting started with the CommandCentral family
Added support for the correlation of backend array volumes for NetApp V-Series storage systems
CommandCentral now supports the correlation of the physical disks of NetApp V-Series storage systems and their backend array volumes (LUNs).
Reporting
CommandCentral Storage 5.1 introduces the following reporting features.
Added in-context performance reports for certain objects
When you use the Managing Summary section of the CommandCentral Storage Console to navigate to an object's Reporting pane, you can now select performance reports that are scoped for the following objects:
Fibre channel adapters
Fibre channel controllers
LUNs
Physical disks
RAID groups for Hitachi HDS storage arrays
Switch ports
Getting started with the CommandCentral family
12
About Veritas CommandCentral Storage
VxVM volumes
Added the Switch Port Usage Trend report
You can now view the Switch Port Usage Trend report, which allows you to track used and unused ports over a specified time frame.
New sample ad hoc reports
CommandCentral Storage now includes the following sample ad hoc reports:
Application Access Path Inventory Report: Presents all the combinations of
end-to-end access path inventory (for the logical objects) from application to the LUN (and the associated array).
Fibre Attached Storage Consumption Report: Displays information about fibre
attached storage given to hosts and how that capacity is utilized by the file systems.
Local vs Remote Replication Report: Depicts how much of the primary (source)
capacity is replicated locally vs replicated remotely.
NetApp Quota Over-Provisioning Report: Provides details about quota allocation
on a NetApp volume and the % over-provisioning.
SAN Storage Report: Details array and host utilization of SAN storage and also
the shared claimed capacity between hosts.
For information about working with these custom reports, see the CommandCentral Storage Users Guide.
Installation
CommandCentral Storage 5.1 introduces the following installation features.
New licensing options
In previous versions of CommandCentral Storage, you could purchase licenses to enable the following modules:
Operations Module
Data Module
Operations Module and Data Module
In CommandCentral Storage 5.1, both the Operations Module and Data Module install by default. CommandCentral Storage now includes the following types of licenses:
Management Server
About Veritas CommandCentral Storage
Managed host
Switch port
NAS (TB)
Because of these new licensing options, you need to obtain new licenses when you upgrade to CommandCentral 5.1. When you upgrade to 5.1, an evaluation license installs. The evaluation license is valid for 60 days. Obtain new licenses before the evaluation license expires.
For more information about obtaining new licenses, go to the Symantec Licensing Portal: www.symantec.com/business/products/licensing/activation/
For more information about CommandCentral licensing, refer to the CommandCentral Administrators Guide.
Ability to install a managed host and then configure it later
In CommandCentral Storage 5.1, you can now choose to install the managed host without configuring it. You can then configure the host at a later time. For example, you might use this feature to clone the managed host on multiple hosts for a faster deployment.
For more information, see the CommandCentral Installation Guide.
13Getting started with the CommandCentral family
Reduced media and install footprint for the managed host
Both the media footprint and installation footprint of the CommandCentral managed host was reduced. As a result, the managed host occupies less space.
Other enhancements
CommandCentral Storage 5.1 introduces the following features.
Windows Server 2008 support
You can now install the CommandCentral managed host and Push Install Utility on Windows Server 2008 hosts.
Red Hat Linux 5.0 support
You can now install the CommandCentral managed host on Red Hat Linux 5.0 hosts.
SUSE Linux Enterprise server 9 and 10 support
You can now install the CommandCentral managed host on SUSE Linux Enterprise server 9 and 10 hosts.
Getting started with the CommandCentral family
14
About Veritas CommandCentral Storage
Added links to access the CommandCentral Storage Change Manager Console
If you enable CommandCentral Storage Change Manager on your Management Server, you can load the CommandCentral Storage Change Manager Console from the CommandCentral Storage Console. To do this, you can use the following links:
Storage Change Managerthis link appears in the header of the
CommandCentral Storage Console. When you click this link, the CommandCentral Storage Change Manager Console loads in a new browser window and the Home pane (Dashboard) displays.
Change Historythis link appears in the Overview pane for storage resources
for which CommandCentral Storage Change Manager tracks the change history. When you click this link, the CommandCentral Storage Change Manager Console loads in a new browser window, displays the Changes pane, and filters the pane to display the change history for the specific storage resource.
For more information, see the CommandCentral Storage Users Guide.
Name of device managers display when viewing list of devices
When you view the list of configured devices in the Console, the Configured Devices Summary now displays the name of the device manager that manages your devices. This is helpful when you want to identify the device manager that manages a specific device. For example, you may want to identify the CIMOM that manages each of your storage arrays.
For more information, see the CommandCentral Administrators Guide.
Ability to set new managed hosts in unmanaged state
In CommandCentral Storage 5.1, you can configure the Management Server to detect new managed hosts, but not automatically manage those hosts. When this happens, the Management Server does not collect any data from the managed host and it does not monitor the managed host. When you are ready for the Management Server to manage an unmanaged host, you can simply refresh the managed host in the Console.
For example, you might do this if you have a standard system image policy or if you need to take advantage of an available installation window.
For more information, see the CommandCentral Administrators Guide.
Hotfix deployment mechanism
CommandCentral introduces a new hotfix deployment mechanism that allows you to push and install hotfixes on remote hosts. The mechanism also allows you to determine the current version of a CommandCentral component so that you can better manage the deployment of hotfixes.
About Veritas CommandCentral Storage
For more information about the hotfix deployment mechanism, see the CommandCentral Administrators Guide.

What you can do with CommandCentral Storage

Symantec strives to help you manage the integrity of your information by enabling you to maintain the right balance of information security and availability. Symantec delivers market-leading technology, insight, and expertise in the areas of information security, data management, systems management, storage management, and application performance management.
With Symantecs unmatched breadth and depth, your IT organization can better align with business objectives and address the issues of cost, complexity and compliance. Symantec is uniquely positioned to help keep your business up, running, and growing, no matter what happens.
CommandCentral Storage provides a single, centralized, consistent storage management console to simplify the complex tasks involved in deploying, provisioning, managing, and growing a multi-vendor networked storage environment.
Managing the storage network: introduction
Many organizationsas they adopt e-commerce, supply chain management, compliance, and other data-intensive applicationsfind that their data is exploding. More and more storage is needed to digitize manuals, corporate records, and other paper-based information, and to hold ever-increasing multimedia content.
If all that volume and complexity werent enough of a management challenge, todays business environments demand that data be available immediately, continuously, and from anywhereto multiple applications and to hundreds, thousands, or even millions of customers, business partners, and employees.
15Getting started with the CommandCentral family
Storage network technologies
Historically, enterprises have relied heavily on parallel SCSI technology to provide the performance required for their enterprise data storage needs. More recently, however, some enterprises are finding that the restrictions imposed by SCSI architecture are too costly for SCSI to continue as a viable solution.
To overcome these restrictions, many enterprises have turned to a network-attached storage (NAS) model that enables storage arrays to reside directly on the main user network, where disk accesses may be made directly rather than through the servers network connection. However, this model can add a significant load to the network, which frequently is already starved for bandwidth.
Getting started with the CommandCentral family
16
About Veritas CommandCentral Storage
Responding to this problem, some enterprises have implemented storage area networks (SANs) in which storage is placed on its own dedicated network. This dedicated network can improve efficiency and reliability by effectively separating traffic on the storage network from traffic on the main user network.
Storage virtualization
CommandCentral Storage is a valuable asset for enterprises that have implemented storage virtualizationthe process of taking multiple physical storage devices and combining them into logical (virtual) storage devices that are allocated to applications and users at will.
Storage virtualization helps ease management by building a layer of abstraction above the physical storage; however, your administrators still need to penetrate that layer in order to view and manage the physical storage. CommandCentral Storage collects detailed information about how physical storage is apportioned and used, and it provides a graphical user interface for presenting the information to the administrator.
Although virtualization is not a new concept, CommandCentral Storage now enables you to take advantage of storage virtualization services over the entire storage network, across all types of storage hardware and server platforms. You also gain storage resource management capabilities such as hardware discovery, visualization, reporting, and a central administration point for your storage network.
Storage administrator requirements
Because both storage resources and IT personnel vary widely from enterprise to enterprise, the job of storage administrator is often filled by people with various skill sets and work backgrounds: mainframe operators, traditional network administrators, system administrators, and others in the IT industry.
In a utility computing environment, the storage administrator usually works closely with network administrators and others whose responsibilities range across the entire IT department. Nevertheless, the storage administrator needs to know details about how storage is apportioned and used on both the logical and physical levels. He or she is also responsible for providing overall guidance on how the storage network is used and on the direction it will take in the future.
Here are some examples of other tasks a storage administrator typically performs:
Manage storage resourcesfor example allocating storage to hosts and the
applications that run on them, and defining logical groups for easier management
Test new vendorshardware and integrate it into the storage network
Loading...
+ 36 hidden pages