Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com EMC
Data Protection Advisor
Version 5.8 Administration Guide 300-012-559 REV 11 FOR ADMINISTRATORS SETTING UP DATA MONITORING IN DPA EMC Data Protection Advisor Version 5.8 Administration Guide 2 Copyright Copyright 2005-2014 EMC Corporation. All rights reserved. Published July 2014 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. For the most up-to-date support, product, and licensing information to to EMC Online Support at http://support.EMC.com. For technical support, go to EMC Online Support and select Support. There are several options, including one to create a service request. To create a service request you must have a valid support agreement. Contact your EMC sales representative about obtaining a valid support agreement or with questions about your account. Your suggestions will help us to improve the accuracy, organization, and overall quality of user publications. To provide feedback, please email DPAD.Doc.Feedback@emc.com. EMC Data Protection Advisor Version 5.8 Administration Guide 3 Revision history The following table presents the revision history of this document: Revision Date Description 10 April 4, 2014 Addition of Revision history. Addition of Collector time format limitations after Collector installation within first 13 days of the month on page 83 11 July 31, 2014 Modifications to Monitoring HP Data Protector, Gathering Occupancy Data on p. 31. EMC Data Protection Advisor Version 5.8 Administration Guide 4 EMC Data Protection Advisor Version 5.8 Administration Guide 5 Revision history ........................................................................................................ 3 Chapter 1 Configuring Security and Port Settings Setting the ports for the DPA processes .......................................................... 9 Server port settings........................................................................................... 10 GUI Client port settings................................................................................... 10 Illuminator port settings.................................................................................. 11 Allowing Collector ports through a firewall ................................................ 11 How the Collector starts up............................................................................ 11 Enabling secure communications between processes ....................................... 13 Enabling encryption between processes ............................................................. 14 What happens during an encrypted session ................................................ 14 Using the key tool to set the encryption key type ....................................... 15 Encrypting from a web browser interface .................................................... 16 Chapter 2 Setting up Data Monitoring Monitoring setup summary............................................................................ 17 Checking which licenses have been installed..................................................... 18 Monitoring databases and Microsoft Exchange Server..................................... 19 Performing Discovery on HP-UX and Linux ............................................... 19 Importing hosts from a CSV file..................................................................... 19 Importing hosts from EMC Ionix ControlCenter......................................... 20 Monitoring a single host.................................................................................. 22 Monitoring storage arrays ..................................................................................... 24 Discovering VNX/CLARiiON arrays ........................................................... 24 Discovering EMC Symmetrix arrays ............................................................. 26 Performing Hostless Discovery on Symmetrix and VNX/CLARiiON.... 27 Monitoring storage arrays that use RecoverPoint ....................................... 28 Monitoring data protection servers...................................................................... 29 Monitoring CA BrightStor ARCserve............................................................ 29 Monitoring CommVault Simpana.................................................................. 29 Monitoring EMC Avamar................................................................................ 30 Monitoring EMC NetWorker .......................................................................... 31 Monitoring HP Data Protector ....................................................................... 31 Monitoring IBM Tivoli Storage Manager...................................................... 33 Monitoring Oracle RMAN.............................................................................. 35 Contents EMC Data Protection Advisor Version 5.8 Administration Guide 6 Contents Monitoring Symantec Backup Exec................................................................ 35 Monitoring Symantec NetBackup .................................................................. 36 Monitoring Symantec PureDisk...................................................................... 37 Monitoring EMC HomeBase ........................................................................... 38 Monitoring Microsoft Exchange Server......................................................... 39 Databases.................................................................................................................. 40 Monitoring Oracle............................................................................................. 40 Monitoring SQL Server .................................................................................... 41 Monitoring PostgreSQL ................................................................................... 43 RecoverPoint ............................................................................................................ 44 Host system monitoring......................................................................................... 45 Monitoring a Windows host remotely .......................................................... 45 Monitoring a host for system data.................................................................. 46 Tape libraries............................................................................................................ 48 Switches and I/O Devices...................................................................................... 50 Monitoring Fibre Channel switches ............................................................... 50 Monitoring IP switches .................................................................................... 50 Monitoring Xsigo I/O Director....................................................................... 51 File Servers ............................................................................................................... 52 Monitoring EMC File Storage ......................................................................... 52 Monitoring Network Appliance Filers .......................................................... 52 Backup appliances................................................................................................... 54 Monitoring EMC Disk Libraries ..................................................................... 54 Monitoring EMC Data Domain ...................................................................... 54 Monitoring NetApp NearStore....................................................................... 55 Monitoring Fujitsu ETERNUS CS................................................................... 55 Moniitoring FalconStor Virtual Tape Library devices ................................. 56 ACSLS ....................................................................................................................... 57 Disk management servers...................................................................................... 58 Monitoring HP Command View..................................................................... 58 VMware .................................................................................................................... 59 Monitoring a clustered server ............................................................................... 60 Creating a credential ............................................................................................... 61 Chapter 3 Troubleshooting and Reporter Performance Tuning the Reporter for performance .................................................................. 64 Setting the parameters for Reporter worker processes ............................... 64 How the Reporter handles report requests ................................................... 65 Allocating more memory to a GUI client............................................................. 66 Viewing the log files................................................................................................ 67 Finding the server process log files ................................................................ 67 Finding the client process log file ................................................................... 67 Changing the log level (server) ....................................................................... 67 Managing the log files ...................................................................................... 68 Viewing log files from the GUI ....................................................................... 69 Sending notifications on warnings and errors.............................................. 69 Managing the DPA processes ................................................................................ 71 Stopping and restarting a process .................................................................. 71 Viewing a process status from the GUI.......................................................... 71 Troubleshooting data collection............................................................................ 72 Data collection troubleshooting first actions ................................................ 72 Data collection troubleshooting second actions ........................................... 72 Data collection troubleshooting third actions............................................... 73 EMC Data Protection Advisor Version 5.8 Administration Guide 7 Contents Preparing a log file for submission to EMC Support .................................. 73 Troubleshooting client discovery for recoverability analysis........................... 74 Client discovery using remote execution...................................................... 74 Client discovery with Collector...................................................................... 75 General client discovery .................................................................................. 76 Synchronizing Incorrect Recovery Point times ............................................ 77 Viewing the report history..................................................................................... 79 Synchronizing the system clock............................................................................ 80 Chapter 4 Changing the default data collection settings Assigning a request to a node............................................................................... 82 Reloading the Collector .................................................................................. 83 Removing a request.......................................................................................... 83 Collector time format limitations after Collector installation within first 13 days of the month ................................................................... 83 Assigning recoverability requests ........................................................................ 85 Editing default request settings ........................................................................... 86 Viewing the requests assigned to a node ............................................................ 88 Viewing the request history ............................................................................ 88 Collecting data remotely........................................................................................ 89 Chapter 5 Configuring Control Panels Creating a Control Panel ................................................................................. 91 Running a Control Panel from the navigation tree ..................................... 94 Setting a Control Panel to open when a user logs in................................... 94 Editing a Control Panel ................................................................................... 95 Deleting a Control Panel.................................................................................. 96 Chapter 6 Monitoring an environment for alert conditions What are rulesets and analyses?..................................................................... 97 Generating events from analysis jobs............................................................ 97 Assigning an analysis job to a node..................................................................... 99 Creating an alert ............................................................................................... 99 Passing arguments to an alert....................................................................... 102 Creating an analysis job ...................................................................................... 103 Editing an analysis job................................................................................... 104 Editing an existing ruleset ................................................................................... 105 Creating a simple ruleset .................................................................................... 106 Creating complex rulesets ................................................................................... 114 Testing a ruleset..................................................................................................... 116 Appendix A Analysis Job Definitions Capacity planning................................................................................................. 118 Assigning alerts for pools and storage array analysis jobs ...................... 118 Change management............................................................................................ 119 Configuration ........................................................................................................ 120 Data protection...................................................................................................... 122 Licensing ................................................................................................................ 124 Performance........................................................................................................... 125 Provisioning........................................................................................................... 126 EMC Data Protection Advisor Version 5.8 Administration Guide 8 Contents Resource utilization .............................................................................................. 127 Service Level Agreements.................................................................................... 129 Status....................................................................................................................... 130 Troubleshooting..................................................................................................... 132 Appendix B Exporting and importing DPA configuration Working with the WDS file.................................................................................. 136 Importing the WDS file .................................................................................. 136 Exporting the WDS file .................................................................................. 136 Appendix C Available Command Line Operations Exporting the WDS file from the command line .............................................. 138 Running reports from the Publisher................................................................... 140 Creating the script or batch file..................................................................... 140 Setting the classpath ....................................................................................... 141 Changing the terminology in the GUI ............................................................... 143 Loading historical backup job data ................................................................... 144 Job summary reports ...................................................................................... 145 Index 147 Configuring Security and Port Settings 9 1 Configuring Security and Port Settings Setting the ports for the DPA processes Figure 1 on page 9 displays a summary of the ports used by DPA processes for interprocess communication. Figure 1 DPA process communication Although omitted in the above diagram for clarity, a remote proxy collector requires a connection to the Controller (3741, 3916) and the Listener (4001). The ports described in this section are the default values. If necessary, an administrator can change the port on which a process listens from the File > System Settings dialog box. The administrator requires the "Edit System Settings - Processes" privilege. EMC Data Protection Advisor Version 5.8 Administration Guide 10 Configuring Security and Port Settings Server port settings The default ports for communications between the core Server processes are described in Table 1 on page 10. GUI Client port settings The default ports for communications between the GUI Client and Server processes are described in Table 2 on page 10. For almost all functionality, the GUI Client only needs to connect to ports 3916 (Controller) and port 4002 (Reporter). Connection to ports 9002, 4001, and 4007 are only required if the features described in Table 2 on page 10 are required. Table 1 Server process communications This process: Listens on port: Communicates with: Collector 3741 Controller, Listener, Illuminator Controller 3916 All other processes Illuminator 8009, 8080, 8092, 8093 25011 - Always used 8090 - Opened from the proxy host. Use when the Discovery proxy host is not the DPA Server Collector 8587 (by RMI) Reporter Listener 4001 Collector, Controller, GUI Reporter 4002 Controller 8583 (by RMI) Illuminator Publisher 4007 Controller, Reporter, GUI Web Server 9002 GUI Table 2 Client communications Client listens on port: Communicates with: 3916 Controller 4002 Reporter 9002 Web Server The user can launch the GUI from a web browser, or chose to install it locally. If they choose to launch from a web browser, the client also needs to be able to connect to port 9002, which is the web server. 4001 Listener In the backup module, the user has the ability to annotate failed backups with the reason the job failed and other information. To use this feature, the GUI needs to connect to port 4001 (Listener) to store data in the database. 4007 Publisher If the user is using scheduled reports, and wishes to test the report from the GUI, the GUI neeeds to connect to port 4007 (Publisher). 11 Configuring Security and Port Settings Illuminator port settings The default port settings for gathering date remotely from the Illuminator server are described in Table 3 on page 11. Local and remote discovery Figure 1 on page 9 shows both the ports required for both the local and remote discovery processes: Collector only or application host with Collector This scenario refers to a DPA Collector installed remotely on any platform, or a Collector installed on an application host (for exampole, an ECC host). Windows proxy Collector This scenario refers to a DPA Collector installed on a Windows platform to perform discovery on Windows hosts. This configuration is required to remotely discover Windows hosts when DPA server is running on Solaris. Application host without Collector This scenario refers to discovery performed on an application host without a Collector installed local to the host. If the recoverability discovery process is performed remotely, DPA will attempt on SSH (default port 22). If that fails, DPA will attempt via ftp/telnet (ports 21/23). If this fails, DPA will attempt an RPC connection (default port 135). The following must be enabled to ensure communication between the monitored host and the Illuminator process: RPC services should be enabled and accessible to the DPA Server . SSHD should be enabled and accessible to the DPA Server, or FTP/Telnet services should be enabled and accessible to the DPA Server Allowing Collector ports through a firewall Ensure that the firewall between a Collector and the server that is running the controller allows traffic destined for ports 3916 and 4001 to flow from the Collector to the controller and listener. The Controller must communicate with the Collector on port 3741 to allow the Collector to be informed of changes in the configuration. How the Collector starts up The following is the sequence of events during Collector startup: 1. The Collector is started by the system (/etc/init.d or Windows Services) or manually. Table 3 Remote communications Operating system Direction: Using port: Windows From DPA server RPC port range (Default port 135). To DPA server RPC port Range (Default 1024-65535). TCP port 25011. UNIX From DPA server One of: SSH (TCP 22) FTP & Telnet (TCP 23, TCP 21) To DPA server Port 25011 EMC Data Protection Advisor Version 5.8 Administration Guide 12 Configuring Security and Port Settings 2. The Collector initiates a connection to the Controller as configured during installation, and identifies the hostname and aliases. 3. The Controller obtains its configuration for the host from the config database and forwards this information to the Collector. This information includes the items to monitor along with any options (for example, username and passwords, specific ports, time-out values, polling interval). 4. The Collector immediately starts monitoring the system upon receipt of the configuration. 5. Upon gathering data, the Collector formats the information into an XML packet, and sends the packet to the Listener. 6. The Collector returns to idle, and continues polling each request at the specified interval for that request. 7. The Listener, upon receipt of a packet from the Collector, inserts the data into the database, either as a new row or as an update to data that is already present. In addition, specific Collectors may require other available ports. For example, collecting data through SNMP requires access from the Collector to port 161 on the node being monitored by both TCP and UDP protocols. The full details of the ports required for each module depend on the application being monitored (for example, NetWorker or Symantec NetBackup). Chapter 2, Setting up Data Monitoring, describes the configuration prerequisites for all of the data gathering modules of DPA. Enabling secure communications between processes 13 Configuring Security and Port Settings Enabling secure communications between processes Security for all server processes includes the Reporter, Listener, Analysis engine, and Publisher. If security is enabled, users are not able to connect to any of these processes using the API without being authenticated first. To enable security, modify the controller.xml file on the server. There is an AUTHREQUIRED setting in this file that can be set to one of three values: none Security is not enabled. Users can connect to Server-side processes using the API without being authenticated. compatauth Security is enabled. Users must authenticate when connecting to the Server-side processes. This method should be used with Collectors 2.1 or 2.1.2 in your environment. fullauth Security is enabled. Users must authenticate when connecting to server processes. This method should be used if all Collectors in the environment are version 3.0 or later. If upgrading from a previous version that had security enabled, the security setting is automatically changed to the new method of configuration, and the security level is set to compatauth. If Collectors earlier than version 2.1 are in your environment, do not enable server security. The Collectors will not be able to communicate with the Controller and will stop gathering data. EMC Data Protection Advisor Version 5.8 Administration Guide 14 Configuring Security and Port Settings Enabling encryption between processes If encryption is enabled, all communications between all processes in the product are encrypted. To enable encryption, modify the controller.xml file on the server by changing the CRYPTREQUIRED variable to one of the following values: none No encryption occurs between any processes. allow Processes are capable of performing encryption, and communications are encrypted. Use this setting if components in the environment are an earlier version of the product and are not capable of encryption. enforce All communications are encrypted. If a component is incapable of encrypting data, it will not be able to communicate with other processes. Use this setting if all components are version 3.1 and later. If upgrading from an old version of DPA, set the Collector to allow so that Collectors in the environment that have not been upgraded can continue to communicate with the server. Restart the Controller to apply the changes and enable encryption . What happens during an encrypted session When encryption is enabled, data is encrypted using the Advanced Encryption Standard (AES). A session key is used to encrypt all data sent across the network. This key is unique to each individual network connection and is used only for the duration of that connection. When a client initiates a network connection, it must negotiate a session key with the server. As part of the negotiation phase, the initiating process sends itspublic key across the network to the server. The server generates a unique symmetric session key (256 bit AES by default) and encrypts the session key using the provided public key of the client. The encrypted session key is then returned to the client, which uses its private key to obtain the decrypted session key. The session key is then used to encrypt all further data sent over the network. The private key used by the client process during the negotiation of the session key is created by default when the process is installed. This key is unique to that host. By default, the client process will generate a 2048 bit RSA key. The following algorithms are supported: RSA (1024 and 2048 bit keys) AES (128 and 256 bit keys) 3DES (192 bit keys) DES (56 bit key). The encryption algorithm and key used during the session key negotiation can be modified by a customer if necessary, using the key tool. Enabling encryption between processes 15 Configuring Security and Port Settings Using the key tool to set the encryption key type To change the encryption algorithm, a binary called dpa_keytool is distributed with the Server and Collector packages. The key tool binary is used to generate a new encryption key. Its usage is: dpa_keytool <type> <keylength> [<keyfile>] The list of possible values for type and key length are shown in Table 4 on page 15. For example: dpa_keytool RSA 1024 MyDPA.key When run, the key tool produces a file containing the generated key. If the <keyfile> parameter is not specified, the file is created in the same directory in which the command was run, with a file extension that matches the specified algorithm and key length. On UNIX platforms, you must source the dpa.config file before running the key tool. For sh, ksk, bash, or equivalent shell, run: . <installdir>/etc/dpa.config For csh, tcsh, or equivalent shell, run: source <installdir>/etc/dpa.config For the new key file to take effect, it must be placed in the keys directory for the component. The location of the keys directory depends on the operating system: The Windows keys directory is $INSTALLDIR/keys. The UNIX keys directory is $INSTALLDIR/etc/keys. After creating a key, move the key file into the keys directory on that machine. Multiple keys can be placed in the keys directory. The encryption process uses the key with the longest key length that exists in the keys directory. After putting the key file in the keys directory, all processes must be restarted for the change to take affect. Table 4 Key type and key length Algorithm Key Length RSA 2048 RSA 1024 AES 256 AES 128 DES3 192 DES 56 EMC Data Protection Advisor Version 5.8 Administration Guide 16 Configuring Security and Port Settings Encrypting from a web browser interface To change the encryption method used by a GUI launched from a web browser, the generated keys must be placed inside a jar file. To place the keys inside a jar file for the user interface: 1. Rename the resource.jar file in $INSTALLDIR/webapps/root/resource.jar to resource.zip. 2. Open the file using a zip compression tool. 3. Add the key file or files to the zip file. 4. Save the zip file back to the $INSTALLDIR/webapps/root directory and rename it with a .jar extension. Setting up Data Monitoring 17 2 Setting up Data Monitoring Monitoring setup summary To set up an object in DPA to be monitored, follow the steps in Table 5 on page 17. Table 5 Data monitoring setup summary Step Description Install licenses Check that the licenses to monitor your device, host, or environment has been purchased and installed. See "Checking which licenses have been installed" on page 18. Install the Collector If you are monitoring the object from a host other than the DPA server host, you need to install the remote Collector. Install and run the installation package you used to install the DPA server, and follow the instructions in the installation wizard. The DPA Installation Guide describes how to install a Collector. Install third-party binaries or configure the object for monitoring You may need to install binaries on the DPA host or the remote Collector host to connect to the monitored object. You also may need to configure an account or connection on the monitored object. The following sections descibes the prerequisite configuration for all objects: "Monitoring databases and Microsoft Exchange Server" on page 19 "Monitoring storage arrays" on page 24 "Monitoring data protection servers" on page 29 "Databases" on page 41 "RecoverPoint" on page 45 "Host system monitoring" on page 46 "Tape libraries" on page 49 "Switches and I/O Devices" on page 51 "File Servers" on page 53 "Backup appliances" on page 55 "ACSLS" on page 58 "Disk management servers" on page 59 "VMware" on page 60 Create or modify the DPA credential A credential stores the information used to connect to the monitored object. You may need to modify the default credential or create a new one with the account details from the previous step. See "Creating a credential" on page 62. Run the Discovery or Data Collection Wizard If you are configuring a Symmetrix or VNX environment, or Microoft Exchange Server, select Tools > Discovery Wizard. If you are monitoring anything else, select Tools > Data Collection Wizard. Click Help in the wizard to open the online help, which will step you through the wizard for setting up your monitored object. Modify the default Request settings. Data Collection requests are assigned to the node created by the wizards. If you want to modify the default data collection, right-click the node and select Administration > Node Properties (for example, not collecting performance data, or collecting configuration data every week instead of every day. Chapter 4, "Changing the default data collection settings," describes editing requests. Test data collection After at least ten minutes of letting the request run, run a report from the node that should include data (for example, Backup Job Summary, or a configuration report). If no data is gathered, see Chapter 3, "Troubleshooting and Reporter Performance," EMC Data Protection Advisor Version 5.8 Administration Guide 18 Setting up Data Monitoring Checking which licenses have been installed The options that are available for configuration in the Data Collection and Discovery wizards depend on the types of licenses that you have installed with DPA. If you do not have the correct license installed, the option to create that device or host is disabled in the wizard. To see the installed licenses, go to Tools > License Manager. The EMC Data Protection Advisor Installation Guide describes the license types available for DPA. For more information on how to obtain licenses for reporting, please contact an EMC Account Manager or Customer Support Engineer. Monitoring databases and Microsoft Exchange Server 19 Setting up Data Monitoring Monitoring databases and Microsoft Exchange Server DPA can monitor database hosts and Microsoft Exchange Server for recoverability analysis. There are two methods to configure application hosts for monitoring in DPA: To configure multiple hosts, use the Discovery Wizard. Hosts can be imported from a CSV file, or by connecting to an EMC Ionix ControlCenter host and importing the defined clients. To configure a single host, use the Data Collection Wizard. The following sections describe how to create application host nodes for gathering data: "Importing hosts from a CSV file" on page 19 "Importing hosts from EMC Ionix ControlCenter" on page 20 "Monitoring a single host" on page 22 Performing Discovery on HP-UX and Linux HP-UX If you are performing discovery for a host on HP-UX 11v1, the following patches must be installed on the HP-UX host prior to the discovery: PHCO_24504 PHSS_36004 PHCO_31923 PHCO_35743 PHKL_34805 Linux Retrieving VDISK information on Red Hat and SUSE Linux requires the following library to be installed on the host: libstdc++.so.6. Importing hosts from a CSV file You can provide the Discovery Wizard with a comma-separated list of hostname values that you want imported into the DPA Configuration view. Before you start the Discovery Wizard To perform an import from a CSV file, the user must select a text file from the local filesystem that is in a comma-separated value format. The format of the file must be: Client,AlternativeName,Timezone,Platform The values for the time zone field and Platform field are optional, but if specified must conform to the following formats: Timezone A valid Java time zone string, as defined at http://java.sun.com/j2se/1.4.2/docs/api/java/util/TimeZone.html# NormalizedCustomID Platform One of: Windows, Solaris, Linux, HP-UX, AIX, ESX. If no time zone is specified, the default time zone is taken from the machine on which the DPA client is running. The credentials used to connect to the storage array host must include the following: Windows A user with local or domain administrator rights. EMC Data Protection Advisor Version 5.8 Administration Guide 20 Setting up Data Monitoring UNIX and Linux A user with root level rights , or a user with the following SUDO rights: <user> <computer alias> = NOPASSWD: /<dir>/IllumAgent/l4magent Where <dir> is the home directory for the user specified in the credential (usually/var/tmp). The SUDO program should support the -p parameter and the -s parameter when the interactive mode is used. The following must be enabled to ensure communication between the monitored host and the recoverability process: RPC services should be enabled and accessible to the recoverability agent . SSHD should be enabled and accessible to the recoverability agent . FTP/Telnet services should be enabled and accessible to the recoverability agent . To import hosts from a CSV file 1. Select Tools > Discovery Wizard from the toolbar. The Discovery Wizard appears. 2. Select Servers and click Next to proceed to the Import Source panel. 3. Select File, and enter the full path to the CSV file in the File name field, or click Browse to search for the file. 4. Click Next to proceed to the Select Clients panel. All of the hosts defined in the CSV file are displayed. 5. Select the hosts from the file to be imported. Click Next. The Recoverability panel appears. 6. Select Monitor for Recoverability to enable recoverability analysis for the selected hosts. 7. Select a Credential to use to connect to the hosts to gather recoverability data, or click Edit to modify or create a credential. 8. Select a Schedule for the recoverability data gathering request, or click Edit to modify or create a schedule. Click Next. The Import Location panel appears. 9. Select Assign nodes in Tree to assign the imported host nodes to the selected position in the Configuration view. By default, the created nodes are not added to the Configuration view, but added to the configuration database, and can be edited and assigned from the Node List dialog. 10. Click Next. The Importing panel appears. Click Next to start importing the selected clients. 11. A message indicates if the import process was successful. Select Finish to close the Discovery Wizard, or OK to return to the Wizard if the import failed. 12. If the import was successful, the host nodes are created and the client discovery request is assigned to the nodes with the specified credential and schedule to gather recoverability data. Importing hosts from EMC Ionix ControlCenter You can discover application hosts from EMC Ionix ControlCenter by connecting to the ControlCenter host. Before you start the Discovery Wizard The DPA Collector must be able to communicate with the ECC API. Monitoring databases and Microsoft Exchange Server 21 Setting up Data Monitoring The credentials used to connect to hosts for recoverability monitoring must include the following: Windows A user with local or domain administrator rights. UNIX and Linux A user with root level rights , or a user with the following SUDO rights: <user> <computer alias> = NOPASSWD: /<homedir>/IllumAgent/l4magent The SUDO program should support the -p parameter and the -s parameter when the interactive mode is used. The following must be enabled to ensure communication between the monitored host and the recoverability process: RPC services should be enabled and accessible to the recoverability agent . SSH should be enabled and accessible to the recoverability agent . FTP/Telnet services should be enabled and accessible to the recoverability agent . To import hosts from EMC Ionix ControlCenter 1. Select Tools > Discovery Wizard from the toolbar. The Discovery Wizard appears. 2. Select Servers and click Next to proceed to the Import Source panel. 3. Select ECC connection. 4. If at least one ControlCenter host has already been defined using the Data Collection or Discovery Wizard, it will appear in the Existing list. ControlCenter nodes created using the Node Editor will not appear in this list. Select an existing ControlCenter host from the list to reimport the EMC Ionix ControlCenter configuration. 5. Otherwise, select Custom to import from a known ControlCenter host. Complete the fields: Hostname The name of the host on which ECC API is running. Port The port on which the ECC API listens. Credential The credential used to connect to the ControlCenter host. ECC Credential The credential used to connect to ECC API. Connect Remotely Select if DPA should connect directly to ECC API. Otherwise, DPA will connect to the ECC host (using host credentials) and connect from there to ECC API. 6. Click Next to proceed to the Select Clients panel. 7. Select the hosts that you want to import and click Next. 8. If the import is successful, the Wizard displays a list of all of the hosts that were imported from this ControlCenter server. Click Next. The Recoverability panel appears. 9. Select Monitor for Recoverability to enable recoverability analysis for the selected clients. 10. Select a Credential to use to connect to the clients to gather recoverability data, or click Edit to modify or create a credential. 11. Select a Schedule for the recoverability data gathering request, or click Edit to modify or create a schedule. Click Next. The Import Location panel appears. EMC Data Protection Advisor Version 5.8 Administration Guide 22 Setting up Data Monitoring 12. Select Assign nodes in Tree to assign the imported hosts to the selected position in the Configuration view. By default, the created nodes are not added to the Configuration view, but added to the configuration database, and can be edited and assigned from the Node List dialog. 13. Click Next. The Importing panel appears. Click Next to start importing the selected hosts. 14. A message indicates if the import process was successful. Select Finish to close the Discovery Wizard, or OK to return to the Wizard if the import failed. 15. If the import was successful, the host nodes are created and the client discovery request is assigned to the nodes with the specified credential and schedule to gather recoverability data. Monitoring a single host Monitor an application host from a Collector running on the host machine or another machine in the environment. System data can only be gathered from UNIX systems by a Collector local to the UNIX machine. "Before you start the Discovery Wizard" on page 19 provides the prerequisites for monitoring application hosts. To monitor a host 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Host in the Data Collection Wizard and click Next. The Host Details panel appears. 3. In the Enter the name of the Host field, type the name or IP address of the host. Note: The unique node name must be the name of a valid host. This name is restricted to 255 characters. 4. In the Enter a description of the Host field, type a short description that will help to identify the host. 5. In the Select the operating system running on the Host field, select an operating system from the list of values. 6. In the Enter any aliases of the Host field, type any aliases that are associated with the host. Note: Aliases can be entered on separate lines or separated by commas (for example, Alias1, Alias2, Alias3). 7. Click Next. The Collector Location panel appears. This panel does not appear for operating systems of type Other. 8. In the Is there or will there be a Collector installed on the Host? field, select either Yes or No. Click Next and the Data Gathering panel appears. 9. Select Yes to gather system information from the applications host in the Do you want to gather system information? field, or No to not gather system information. 10. Click Next and the Remote System Information Permissions panel appears. The Remote System Information Permissions panel only appears if the following conditions are met: Monitoring databases and Microsoft Exchange Server 23 Setting up Data Monitoring The operating system is Windows. A Collector is not installed on the computer. System information is to be monitored. 11. In the User Name field, type the user name for an account that exists on the host. In the Password field, type the password for the user name. In the Confirm Password field, type the password again. 12. Click Next. The Recoverability Analysis Permissions panel appears. 13. Select Yes in the Do you want to perform Recoverability Analysis on this host field. Select a Credential used to connect, or click Edit to create or edit an existing credential. 14. Click Next. The Item Location panel appears. Click to select the folder in the Navigation tree under which you want the node to appear. 15. Click Next. The Summary panel appears. Click Finish to create the node. All applicable requests, proxy information, and credentials are assigned to the host node and the Collectors are reloaded. EMC Data Protection Advisor Version 5.8 Administration Guide 24 Setting up Data Monitoring Monitoring storage arrays Data Protection Advisor monitors EMC CLARiiON and Symmetrix storage arrays. EMC CLARiiON and Symmetrix storage arrays replicated with EMC RecoverPoint require additional configuration to enable complete recoverability analysis. The following sections describe setting up storage array nodes for monitoring: "Discovering VNX/CLARiiON arrays" on page 24 "Discovering EMC Symmetrix arrays" on page 26 "Performing Hostless Discovery on Symmetrix and VNX/CLARiiON" on page 27 "Monitoring storage arrays that use RecoverPoint" on page 28 Discovering VNX/CLARiiON arrays EMC VNX/CLARiiON storage arrays must be monitored remotely from a Collector running on a different host (such as the DPA server). To configure hosts and storage arrays, use the Discovery Wizard, as described in "Using the Discovery Wizard to discover CLARiiON arrays" on page 25. DPA discovers all of the storage arrays that are being managed and creates nodes in the Navigation tree. You will need to supply the name of the host on which EMC Solutions Enabler is installed. Before starting the Discovery Wizard Monitoring VNX/CLARiiON requires additional licensing. Without the correct license, the option to configure VNX/CLARiiON for monitoring does not appear in the Data Collection Wizard. The recoverability server connects to the VNX/CLARiiON on TCP port 443. If the VNX/CLARiiON is configured to use port 2163, use port 2163. Setting up EMC Solutions Enabler Discovering VNX/CLARiiON hosts from DPA requires Solutions Enabler to be installed. The following are the steps required. 1. Download EMC Solutions Enabler version 7.2.1 or later from support.emc.com. 2. Install Solutions Enabler on the DPA server or any supported host able to connect to the VNX/CLARiiON array through HTTPS. A Solutions Enabler license is not required to discover VNX/CLARiiON. 3. Create a text file with the following CLARiiON information, one line per VNX/CLARiiON: <SPA IP> <SPB IP> <Username> <Password> where <SPA IP> is the IP address of the first controller (SP-A). <SPB IP> is the IP address of the second controller (SP-B). <username> and <password> are the account name and password of a VNX/CLARiiON user with view permissions. The first field must be the first VNX/CLARiiON controller, followed by the second controller. 4. If the Base license of Solutions Enabler exists, run the following command on the Solutions Enabler host to register the VNX/CLARiiON: Monitoring storage arrays 25 Setting up Data Monitoring symcfg disco -clar -file <filename> 5. If the Base license of Solutions Enabler does not exist, copy the ClarApiDiscovery executable file from the following directory: <DPA Install Directory>\Illuminator_Agent\bin\ClarAPI\<Platform> to the Solutions Enabler host, and run the following command: Windows ClarApiDiscovery.exe REGISTER -file=<filename> UNIX ./ClarApiDiscovery REGISTER -file=<filename> The available platforms are: AIX Hp Linux Solaris Win32 6. Run the following command to confirm that the VNX/CLARiiON has been registered: symcfg list -clar 7. If the VNX/CLARiiON is listed, you are ready to run the Discovery Wizard in DPA and configure the VNX/CLARiiON. Using the Discovery Wizard to discover CLARiiON arrays To perform a discovery of CLARiiON storage arrays, select either a host previously configured in DPA, or connect to a host with Solutions Enabler installed. To discover storage arrays: 1. Select Tools > Discovery Wizard from the toolbar. The Discovery Wizard appears. 2. Select Storage Arrays and click Next to proceed to the Import Source panel. 3. If at least one host has already been defined using the Data Collection or Discovery Wizards, it will appear in the Existing list. Storage array hosts created using the Node Editor will not appear in this list. Select an existing host from the list to re-import changes in the storage array configuration. 4. Otherwise, select New to import from a known host. Complete the fields: Hostname The name of the host running Solutions Enabler. Credential The credential used to connect to the host. Method Select EMC CLARiiON (CLARAPI). Time Offset Specifies the time difference between the Symmetrix host and the recoverability analysis agent (SYMAPI only). 5. Click Next. 6. If the import is successful, the Wizard displays a list of all of the storage arrays that were discovered from this host in the Select Storage Arrays panel. The Remote column indicates if the Storage Array API is remote to the SE host. The Connector column indicates the current node used to store the SE host for this storage array. Click on the Connector column to change the connector node used to discover this storage array. EMC Data Protection Advisor Version 5.8 Administration Guide 26 Setting up Data Monitoring 7. Select the storage arrays that you want to import and click Next. 8. Select a Schedule for the recoverability data gathering request, or click Edit to modify or create a schedule. Click Next. The Import Location panel appears. 9. Select Assign nodes in Tree to assign the imported client nodes to the selected position in the Configuration view. By default, the created nodes are not added to the Configuration view, but added to the configuration database, and can be edited and assigned from the Node List dialog. 10. Click Next. The Importing panel appears. Click Next to start importing the selected clients. 11. A message indicates if the import process was successful. Select Finish to close the Discovery Wizard, or OK to return to the Wizard if the import failed. 12. If the import was successful, the storage array nodes are created. If the user selected recoverability monitoring, the client discovery request is assigned to the nodes with the specified credential and schedule to gather recoverability data. Discovering EMC Symmetrix arrays EMC Symmetrix storage arrays (Symmetrix) must be monitored remotely from a Collector running on a different host (such as the DPA server). To configure multiple hosts and multiple storage arrays, use the Discovery Wizard, as described in "Using the Discovery Wizard to discover Symmetrix arrays" on page 27. DPA discovers all of the storage arrays that are being managed and creates nodes in the Navigation tree. You will need to supply the name of the host on which EMC Solutions Enabler is installed. Before starting the Discovery Wizard Monitoring EMC Symmetrix requires additional licensing. Without the correct license, the option to configure EMC Symmetrix for monitoring does not appear in the Data Collection or Discovery Wizard. Setting up EMC Solutions Enabler Discovering Symmetrix hosts from DPA requires an existing EMC Solutions Enabler host, or Solutions Enabler to be installed. The following are the steps required. 1. If you are using an existing Solutions Enabler host, it must satisfy the following requirements: The host operating system and Solutions Enabler version are supported by DPA as described in the EMC Data Protection Advisor Compatibility Matrix. The host must be connected to the Symmetrix array by a SAN connection. The DPA server must be able to connect to the Solutions Enabler host. Otherwise, download a supported version of EMC Solutions Enabler from support.emc.com and install on a host that satisfies the above. 2. Obtain the "Base" and "DevMasking" licenses for Solutions Enabler. 3. Run the following command on the Solutions Enabler host to register the Symmetrix: symcfg discover 4. Run the following command to confirm that the Symmetrix has been registered: symcfg list Monitoring storage arrays 27 Setting up Data Monitoring 5. If the Symmetrix is listed, you are ready to run the Discovery Wizard in DPA and configure the Symmetrix. Using the Discovery Wizard to discover Symmetrix arrays To perform a discovery of Symmetrix storage arrays, select either a host previously configured in DPA, or connect to a host with Solutions Enabler installed. To import a storage array: 1. Select Tools > Discovery Wizard from the toolbar. The Discovery Wizard appears. 2. Select Storage Arrays and click Next to proceed to the Import Source panel. 3. If at least one host has already been defined using the Data Collection or Discovery Wizards, it will appear in the Existing list. Storage array hosts created using the Node Editor will not appear in this list. Select an existing host from the list to reimport changes in the storage array configuration. 4. Otherwise, select Custom to import from a known host. Complete the fields: Hostname The name of the host running Solutions Enabler. Credential The credential used to connect to the host. Method Select EMC Symmetrix (SYMAPI). Time Offset Specifies the time difference between the Symmetrix host and the recoverability analysis agent (SYMAPI only). 5. Click Next. 6. If the import is successful, the Wizard displays a list of all of the storage arrays that were discovered from this host in the Select Storage Arrays panel. The Remote column indicates if the Storage Array API is remote to the SE host. The Connector column indicates the current node used to store the SE host for this storage array. Click on the Connector column to change the connector node used to discover this storage array. 7. Select the storage arrays that you want to import and click Next. 8. Select a Schedule for the recoverability data gathering request, or click Edit to modify or create a schedule. Click Next. The Import Location panel appears. 9. Select Assign nodes in Tree to assign the imported client nodes to the selected position in the Configuration view. By default, the created nodes are not added to the Configuration view, but added to the configuration database, and can be edited and assigned from the Node List dialog. 10. Click Next. The Importing panel appears. Click Next to start importing the selected clients. 11. A message indicates if the import process was successful. Select Finish to close the Discovery Wizard, or OK to return to the Wizard if the import failed. 12. If the import was successful, the storage array nodes are created. If the user selected recoverability monitoring, the client discovery request is assigned to the nodes with the specified credential and schedule to gather recoverability data. Performing Hostless Discovery on Symmetrix and VNX/CLARiiON Host discovery as described above requires either the installation of a local Collector on the host, or the deployment of a remote Collector with credentials for host access. Either method may be prevented by customer security policies. DPA can perform application discovery on storage arrays without needing to connect to the hosts on which applications are hosted. This changes the node heirarchy that EMC Data Protection Advisor Version 5.8 Administration Guide 28 Setting up Data Monitoring appears, and the reports that are available, in the SLM Workspace. The EMC Data Protection Advisor Report User Guide provides more information. The prerequisites for hostless discovery are the same as those described in "Using the Discovery Wizard to discover CLARiiON arrays" on page 25 and "Using the Discovery Wizard to discover Symmetrix arrays" on page 27. Using the Discovery Wizard for hostless discovery 1. Create a storage array node using the procedure described in "Using the Discovery Wizard to discover CLARiiON arrays" on page 25 and "Using the Discovery Wizard to discover Symmetrix arrays" on page 27. Remember that the credential you select in the Storage Array Permissions panel is the credential to access the Solutions Enabler host. 2. Your storage array node wil be created in the node tree in the location you selected (default Storage > Disk Storage > VNX/CLARiiON or EMC Symmetrix). 3. Right-click on the new node and select Administration > Properties. Click the Assignations tab. 4. In the Requests list, select either Import CLARiiON Information or Import Symmetrix Information and click Run. 5. DPA will perform discovery on the selected storage array. Once the request has run successfully, you can view the storage topology for the array in the SLM Workspace and run Replication Analysis reports. Monitoring storage arrays that use RecoverPoint If your VNX/CLARiiON or Symmetrix storage arrays are replicated with EMC RecoverPoint, DPA provides recoverability analysis for RecoverPoint replication operations. To perform recoverability analysis for RecoverPoint, you have to configure the VNX/CLARiiON or Symmetrix storage arrays and the RecoverPoint host in DPA in correct order. To gather RecoverPoint recoverability data: 1. Use the Data Collection Wizard to create the host node for the Solutions Enabler host that is connected to the storage array replicated with RecoverPoint. 2. Run the Illuminator Client Discovery request from the host connector node you created, to discover the arrays attached to the host. 3. Configure the Symmetrix or VNX/CLARiiON arrays using the Discovery Wizard, as described in "Monitoring storage arrays" on page 24. 4. Run the Illuminator Policy Import request on the storage array nodes you created to import recoverability policy data. 5. Using the Data Collection Wizard, configure the EMC RecoverPoint appliances data monitoring, as described in "RecoverPoint" on page 45. 6. Ensure that the RecoverPoint Configuration request has been assigned to the RecoverPoint appliance node that handles replication for the storage array. Run this request. Chapter 4, "Changing the default data collection settings," describes how to assign requests to nodes and run requests. 7. After the RecoverPoint Configuration request is run and sufficient time has passed, DPA should have begun gathering recoverability analysis data for RecoverPoint. Reports can be run from the storage array nodes and the SLM workspace will show the mapping of storage and recovery points. Monitoring data protection servers 29 Setting up Data Monitoring Monitoring data protection servers This section describes how to monitor the following data protection servers: "Monitoring CA BrightStor ARCserve" on page 29 "Monitoring CommVault Simpana" on page 29 "Monitoring EMC Avamar" on page 30 "Monitoring EMC NetWorker" on page 31 "Monitoring HP Data Protector" on page 31 "Monitoring IBM Tivoli Storage Manager" on page 34 "Monitoring Oracle RMAN" on page 35 "Monitoring Symantec Backup Exec" on page 36 "Monitoring Symantec NetBackup" on page 37 "Monitoring Symantec PureDisk" on page 38 "Monitoring EMC HomeBase" on page 39 "Monitoring Microsoft Exchange Server" on page 39 Monitoring CA BrightStor ARCserve CA BrightStor ARCserve servers are monitored from a Collector running on the CA BrightStor ARCserve server or from a Collector running on any other Windows computer in the environment. Before starting the Data Collection Wizard Install the ARCserve Manager on the computer in which the Collector is running. You will need to know the resolvable hostname or IP address of the ARCserve server. When running ARCserve 11.x, the hostname must be the host short name (aliases cannot be used either). Setting up ARCserve server 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Host in the Data Collection Wizard and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring CommVault Simpana Monitor CommVault Simpana servers from a Collector running on the CommVault Simpana database or from a Collector running on any other computer in the environment. Before starting the Data Collection Wizard The Collector has to run as an account that has permission to access and execute read-only statements in the CommVault database. You will need to know: The resolvable hostname or IP address of the CommVault server. The database hostname and instance name if the CommVault database is remote to the server. EMC Data Protection Advisor Version 5.8 Administration Guide 30 Setting up Data Monitoring Setting up CommVault Simpana 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Host in the Data Collection wizard. Click Next and the Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring EMC Avamar Monitor EMC Avamar
servers using a Collector installed on any remote computer
in the environment, including the DPA Server. Do not install a Collector on an EMC Avamar server or storage node. Before starting the Data Collection Wizard To monitor an EMC Avamar server remotely, no additional software is required. Monitoring EMC Avamar requires additional licensing. Without the correct license, the option to configure EMC Avamar for monitoring does not appear in the Data Collection Wizard. The steps in "Setting up an Avamar server" on page 30 assume that the EMC Avamar server being monitored is a standard EMC Avamar installation. It is possible for the EMC Avamar database to have been modified with different connection parameters. If this is the case, modify the DPA configuration to reflect the changes. To gather data from EMC Avamar, DPA connects directly to the EMC Avamar database. It connects to the mcdb database on the default port for EMC Avamar, which is 5555. If these parameters were modified, change the Avamar Config and Avamar Job Monitor requests to override these parameters with options on the request. Chapter 4, "Changing the default data collection settings," describes how to modify existing requests. When DPA connects to the database, it uses the viewuser account to log in to the database. If the EMC Avamar installation was modified so that this user does not have permission to log in to the database, or the password for this user has been modified, change the user and password in the Default Avamar Credentials to reflect the username and password that should be used to connect to the database. The Collector must be installed on a host that is in the same time zone as the Avamar server. Before you start the Data Collection Wizard, you will need to know the resolvable hostname or IP address of the Avamar server. Setting up an Avamar server 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Host in the Data Collection Wizard and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring data protection servers 31 Setting up Data Monitoring Monitoring EMC NetWorker Monitor NetWorker either from a Collector running on the backup server or remotely using a Collector running on the DPA Server. Before starting the Data Collection Wizard If monitoring NetWorker remotely, the NetWorker client package must be installed on the Collectors host. The NetWorker module uses commands such as mminfo and nsradmin to communicate with the NetWorker server and requires access to the binaries within the NetWorker client package. If monitoring NetWorker 7.3 or later remotely, the DPA Collector service user and the proxy host must be added to the Users list of the NetWorker Administrators User Group. For example, if you are monitoring NetWorker remotely from the host DPACollectorHost, and the Collector is running as the Windows user DPACollector, the following line must be added to the Users list of the properties for Administrators: user=DPACollector,host=DPACollectorHost Before you start the Data Collection Wizard, you will need to know the resolvable hostname or IP address of the NetWorker server. Setting up a NetWorker server 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Host in the Data Collection Wizard and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring HP Data Protector A Collector can monitor HP Data Protector servers running on the HP Data Protector Cell Manager or remotely from another computer. Before starting the Data Collection Wizard If monitoring a Cell Manager remotely, follow the instructions in "Monitoring HP Data Protector remotely" on page 33. Note: The status request cannot be assigned when monitoring the HP Data Protector server remotely, as it relies on a command (omnisv) that is only available on the Data Protector Server. If monitoring a Cell Manager from a Collector installed on the Cell Manager, skip to the section entitled "Setting up a HP Data Protector Server" on page 34. If you are monitoring a Data Protector environment that uses the Manager of Managers option, you must configure DPA as if monitoring a remote Data Protection server. To monitor HP Data Protector remotely, the HP Data Protector client software must be installed on the Collectors host and the client must be configured on the Data Protector Cell Manager so that it has permission to run reports. Gathering Occupancy data Gathering occupancy data is not enabled by default for HP Data Protector. To enable occupancy data gathering, the occupancy option for the DataProtector Jobmonitor request must be enabled, and the DataProtector Client Occupancy request must be assigned to the Data Protector client in the Node Properties dialog. EMC Data Protection Advisor Version 5.8 Administration Guide 32 Setting up Data Monitoring Note: Gathering occupancy information for HP DataProtector can have a significant performance impact on the Data Protector server. You can use the DP_OCCUPANCY_DB_PATH environment variable for the DPA Agent to control where the occupancy data is stored when you run the jobmonitor request. If you do not use the DP_OCCUPANCY_DB_PATH environment variable, then the system stores the occupancy data in the temporary directory. Changing the location of Occupancy database on Linux 1. Stop the DPA Agent. 2. Use the cd command to access the /opt/emc/dpa/agent/etc directory. 3. Edit the dpa.custom file. Add the following to the end of the file: COLLECTOR_DP_OCCUPANCY_DB_PATH=/your/absolute/path/ export COLLECTOR_DP_OCCUPANCY_DB_PATH Ensure that you include the trailing backward slash (/) character in the above path. 4. Restart the DPA Agent. Changing the location of Occupancy database on Windows 1. Stop the DPA Agent. 2. Run the regedit.exe as the administrator user. 3. Expand the HKEY_LOCAL_MACHINE registry key. 4. Expand the SOFTWARE registry key. 5. Create an EMC registry key if one does not already exist. 6. Create a DPA registry key if one does not already exist. 7. Ceate an Collector registry key if one does not already exist. 8. Create a new String registry value with name DP_OCCUPANCY_DB_PATH and set the value to the desired directory path. For example: C:\DPA\OccupancyData\ Ensure that you include the trailing backward slash (/) character in the above path. 9. Restart the DPA Agent. omnirpt patch HP has released a patch for Data Protector 6.1 that must be installed onto a Data Protector 6.1 installation before it can be supported by DPA. Monitoring data protection servers 33 Setting up Data Monitoring Table 6 on page 33 lists the required patch ID by platform. The patch is available for General Release from HP from www.hp.com. Enter the patch ID into the Search field of the HP home page to be directed to the patch download page. Refer to Chapter 4, "Changing the default data collection settings," for more information on configuring and assigning requests. Monitoring HP Data Protector remotely To install the client software on the computer that monitors the Cell Manager: 1. Launch the Data Protector Manager administration GUI to add a client. 2. When selecting the software components to install on the client, ensure that the User Interface option is selected. The DPA Data Protector module requires access to commands such as omnirpt and omnicellinfo to gather data from the Cell Manager. These components are only installed when the user interface component is installed, so it is essential to select this option. 3. Configure the client to have permissions to run reports on the Cell Manager. First determine the user for which the Collector process will be running: On UNIX systems, the Collector always runs as the root user. On Windows systems, the Collector runs as the DPA Collector service user. To verify the user for the service on a Windows system, launch the Windows service control manager and view the details of the DPA Collector service. 4. Create a user on the Cell Manager that matches the Collectors username. Type the name of the host in the user definition field. 5. Add the user to a Data Protector User Group that has Reporting and Notifications and See Private Objects permissions. Typically, this means adding the user to the admin group. However, to restrict a user from inheriting other administrator privileges, create a new group with Reporting and Notification and See Private Objects permissions and add the user to that group. 6. Verify that remote authentication privileges are set up correctly by running the following command from the Collectors host: omnirpt -tab -report list_sessions -timeframe 06/01/01 12:00 06/01/30 12:00 If successful, this command returns a list of all the sessions that have run on the Data Protector server during the time period specified. If an error indicating insufficient permission to run reports appears, review the configuration settings on the Data Protector server. Table 6 HP Data Protector 6.1 patch IDs Platform Patch ID Windows DPWIN_00417 HPUX PA-Risc PHSS_39512 HPUX IA64 PHSS_39513 Linux DPLNX_00077 Solaris DPSOL_00371 EMC Data Protection Advisor Version 5.8 Administration Guide 34 Setting up Data Monitoring Setting up a HP Data Protector Server 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Host in the Data Collection wizard and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring IBM Tivoli Storage Manager Monitor a TSM server from a Collector running on the TSM Server or remotely from a Collector running on a different host (such as the DPA server). If you are monitoring TSM remotely, follow the instructions in "Monitoring TSM remotely" on page 35 before configuring the server in DPA. If you are monitoring TSM from a Collector running on the TSM server, skip to "Setting up a TSM server" on page 35. Before starting the Data Collection Wizard The TSM Credential must use the name and password of a TSM Administrator. The Administrative user does not need full system privileges: Analyst or Operator privileges are sufficient. Navigate to Tools > Credential Editor to modify the TSM Credentials that are created after you have used the Data Collection wizard to create a TSM node. If the Server being monitored is a shared Library Client, the collector also must query the Servers Library Manager to gather certain data. By default, the collector uses the same credentials used to query the Library Client to query the Library Manager. If different credentials are required to access the Library Manager, they can be set using the following DPA environment variables (UNIX) or registry settings (Windows): COLLECTOR_TSM_LIBMGRUSERNAME COLLECTOR_TSM_LIBMGRPASSWORD Gresham Clareti EDT In Tivoli Storage Manager environments that use Gresham Clareti EDT for device control, DPA communicates with EDT to gather device configuration information by reading information from two files: elm.conf and rc.edt. DPA reads from elm.conf at the following location: On Windows, an environment variable called EDT_DIR is set by EDT. DPA looks up the location specified in EDT_DIR. On Unix, DPA looks first in /opt/GESedt-acsls/bin for elm.conf. If not found, on AIX DPA looks in /usr/lpp/dtelm/bin. On other flavours of UNIX, DPA looks in /opt/OMIdtelm/bin. If the elm.conf file is not present in these directories, the registry variable (Windows) or environment variable (UNIX) COLLECTOR_TSM_ELMCONF_FILENAME can be set to the location of elm.conf if required. DPA reads from the rc.edt file at the following location: On Windows, DPA looks up the location specified in the environment variable EDT_DIR. On Unix, DPA looks first in /opt/GESedt-acsls/SSI for rc.edt. If not found, on AIX DPA looks in /usr/lpp/dtelm/bin. On other flavours of UNIX, DPA looks in /opt/OMIdtelm/bin. Monitoring data protection servers 35 Setting up Data Monitoring If the rc.edt file is not present in these directories, the registry variable (Windows) or environment variable (UNIX) COLLECTOR_TSM_RCEDT_FILENAME can be set to the location of rc.edt if required. Note: Because a TSM environment using EDT requires the Collector to read from these files to collect configuration data, the Collector must be on the same server as the TSM server. Monitoring TSM remotely When monitoring a TSM instance remotely, the TSM client software must be installed on the host that will monitor the TSM instance. The TSM module uses the dsmadmc command included with the TSM client software to connect to the TSM instance and gather data. In a default TSM Client installation on a Windows computer, the administrative components required by DPA are not installed. To install the administrative components: 1. Click Custom when prompted during the TSM client installation. 2. The installation components are displayed. Select Administrative Client Command Line Files and click Next. The TSM client installation continues. 3. After the TSM client installation is complete, initialize the client for the first time by starting the TSM Backup-Archive GUI from the Start menu. Use the wizard to configure the client. 4. To configure the client, accept the default Help me configure the TSM Backup Archive Client value and click Next. Either import an existing options file or create a new one when prompted. 5. Accept the default value Create a new options file. A blank options file (dsm.opt) will have to be created in the baclient directory under the install directory for TSM (default C:\Program Files\Tivoli\TSM). 6. Continue to progress through the wizard. Complete all of the windows in the wizard until a new options file is created. Setting up a TSM server 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Select Host in the Data Collection Wizard panel. Click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring Oracle RMAN DPA gathers detailed information about Oracle backup Jobs with the Oracle (Recovery Manager) RMAN utility. When RMAN backups run, they write detailed information about the backups to either the database that was backed up or to a designated recovery catalog within the environment. Depending on the configuration of the DPA Oracle RMAN module, the module gathers information directly from the database that was backed up or from a centralized recovery catalog. Backup applications such as NetWorker and Symantec NetBackup interface directly with RMAN to perform hot backups of Oracle databases. If you are monitoring the backup applications with DPA, you receive information about the RMAN backups that occurred on the backup application. However, the level of detail that is available EMC Data Protection Advisor Version 5.8 Administration Guide 36 Setting up Data Monitoring from traditional backup applications is significantly less than gathering data directly from RMAN. Information is gathered on RMAN Jobs by a Collector running on the Oracle backup server, or from a recovery catalog by a Collector running on the same computer as the recovery catalog. Data can be gathered remotely in either scenario, but the Oracle client must be installed on the Collectors host to communicate with the database (if monitoring of an Oracle database was selected during Data Protection Advisor installation, the Oracle client binaries are automatically installed). Before starting the Data Collection Wizard To monitor Oracle RMAN remotely, the Oracle client must be installed on the Collectors host so that the Collector process can communicate with the database. The version of the client installed on the computer must be compatible with the target database to which the Collector connects. Determine the name of the target database in the environment. If you are using a recovery catalog for backups, the recovery catalog database should be monitored. If a recovery catalog is not used, the name of the target database is the individual database that is being backed up. Setting up Oracle RMAN To configure DPA for Oracle RMAN monitoring: 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Select Host in the Data Collection wizard and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring Symantec Backup Exec Monitor Symantec Backup Exec servers from a Collector running on the Backup Exec server or from a Collector running on any other Windows computer in the environment. You cannot monitor a Symantec Backup Exec server from a Collector running on a UNIX-based host. If you are monitoring Backup Exec remotely, follow the steps in "Monitoring Backup Exec Remotely" on page 36. If monitoring Backup Exec with a Collector on the Backup Exec server, skip to "Setting up a Backup Exec server" on page 37. Before starting the Data Collection Wizard To monitor a Symantec Backup Exec backup server remotely, the DPA Collector service must run as a named user account rather than the Local System account. When installing the Collector, you are prompted to specify whether the Collector runs using the Local System account or as a named user. The Backup Exec Credentials must use the username and password of a Windows administrator account on the Backup Exec server. Navigate to Tools > Credential Editor to modify the Backup Exec Credentials that are created after you have used the Data Collection wizard to create a Backup Exec node. Monitoring Backup Exec Remotely To verify that the Collector service is running, launch the Windows Service Control Manager (Start > Settings > Control Panel > Administrative Tools > Services). Right-click on the DPA Collector Service and select Properties: 1. Select the Log On tab of the Service Properties panel. Monitoring data protection servers 37 Setting up Data Monitoring 2. Ensure This Account is selected. 3. Type the username and password of the local administrator account to run the service. 4. Modify the service account details and click OK. 5. Restart the service to activate the changes. Setting up a Backup Exec server 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Host in the Data Collection wizard and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring Symantec NetBackup Configure a Symantec NetBackup server to be monitored from a Collector running on the NetBackup Master Server, or from a Collector running on a different host such as the DPA server. Before starting the Data Collection Wizard If gathering data from NetBackup remotely, follow the instructions described in "Configuring NetBackup authentication for remote data collection" on page 37. Note: Media Server Status data can only be collected if a Collector is stored on the Media Server itself. It can not be collected via proxy. Configuring NetBackup authentication for remote data collection To successfully gather data remotely, the following must be configured: The NetBackup Server binaries must be installed on the Collectors host. The Collectors host must be able to successfully resolve the NetBackup Media Servers. The NetBackup Master Server must be able to successfully resolve the Collectors host. The instructions for this are provided. To resolve the Collector host from the NetBackup Master Server: UNIX If the NetBackup Master Server is running on a UNIX computer, the name of the host on which the Collector is running must be added to the bp.conf file on the NetBackup Master Server. To add the host: 1. Open /usr/openv/netbackup/bp.conf for editing and add the following line: SERVER = Collectorhost where Collectorhost is the Collectors hostname. The Collectors hostname must be resolvable by the Master Server. 2. Restart NetBackup on the Master Server for the changes take effect. Windows If the NetBackup Master Server is running on a Windows computer, add the name of the Collector host through the NetBackup Administration Console: 1. Launch the NetBackup Administration Console and open the Master Server Properties dialog box. EMC Data Protection Advisor Version 5.8 Administration Guide 38 Setting up Data Monitoring 2. Click Servers and add the name of the Collectors host to the list of additional servers that are allowed to access the Master Server. Click OK. 3. Restart the NetBackup services to activate the changes. Setting up a NetBackup server 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Select Host in the Data Collection wizard and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring Symantec PureDisk Configure a Symantec PureDisk server to be monitored from a Collector running on the PureDisk Server, or from a Collector running on a different host, such as the DPA server. Before starting the Data Collection Wizard PureDisk servers implement a firewall that may prevent Data Protection Advisor from gathering data from PureDisk, or from communicating with a collector installed on the PureDisk server. In order to ensure successful data gathering and communications, the following sections describe how to configure the PureDisk server before configuring the server in the Data Protection Advisor GUI. The configuration process depends on the version of PureDisk being monitored. Manually configuring the firewall (versions of PureDisk earlier than 6.5) To manually configure the firewall for data collection: 1. Log on to the PureDisk server as the root user. 2. Stop the PureDisk firewall by running the following command: /etc/init.d/pdiptables stop 3. Edit the file /etc/puredisk/iptables-rules by inserting one of the following lines directly after this line in the file: -A INPUT p icmp j ACCEPT If you are monitoring PureDisk with a collector installed on the PureDisk server, add the following line: -A INPUT p tcp m tcp -dport 3741 j ACCEPT If you are monitoring PureDisk from a collector running on a different machine, add the following line: -A INPUT p tcp m tcp -dport 10085 j ACCEPT Note: It is important that the line is inserted at the correct location in the file, otherwise it may not take effect. 4. Restart the PureDisk firewall by running the following command: /etc/init.d/pdiptables start Updating the IP tables rules (PureDisk version 6.5) Manually configuring the firewall will not work for PureDisk version 6.5. To update the PureDisk IP table: Monitoring data protection servers 39 Setting up Data Monitoring 1. Open the following file in a text editor: /etc/puredisk/custom_iptables_rules 2. If the DPA Collector is installed on the PureDisk server, add the following line to the rules file (three columns separated by a tab): tcp {controller_host_ip} 3741 This allows connections from the controller host to the DPA collector on port 3741 on the Puredisk server. 3. If theDPA Collector is installed on a remote host, add the following line to the rules file (three columns separated by a tab): tcp {collector_host_ip} 10085 This allows connections from the collector host to the postgres database on port 10085 on the Puredisk server. You can specify a single host or an entire subnet (by including a /mask), as in the following example: tcp10.64.205.0/24 10085 Refer to the /etc/puredisk/custom_iptables_rules file itself for additional information on configuring this file. Setting up a PureDisk server 1. Launch the Data Collection Wizard by selecting Tools > Data Collection Wizard from the menu bar. 2. Select Host in the Data Collection Wizard panel. Click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring EMC HomeBase EMC HomeBase is capable of forwarding data about Data Protection events into DPA. Unlike other backup applications, the DPA Collector does not actively connect to Homebase and gather data. Instead, the HomeBase server forwards information on events when they occur. To enable monitoring of a Homebase server, the user must enable DPA Alerting in HomeBase, and must configure the Homebase server in DPA (as described in "Setting up a HomeBase server" on page 39), so that reports can be run from it. For more details on how to enable DPA Alerting in HomeBase, please consult the HomeBase product documentation. Setting up a HomeBase server 1. Launch the Data Collection Wizard by selecting Tools > Data Collection Wizard from the menu bar. 2. Select Host in the Data Collection Wizard panel. Click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring Microsoft Exchange Server An Exchange Server can be monitored for recoverability from a Collector installed on the same machine as the Exchange Server or a Collector installed remotely. EMC Data Protection Advisor Version 5.8 Administration Guide 40 Setting up Data Monitoring Note: Microsoft Exchange can only be monitored for recoverability analysis, and for system information from the Exchange server host. Before starting the Data Collection Wizard The account used to connect DPA to the Exchange server must be a domain user with Exchange read-only administrator rights and local administrator rights. DPA does not support recoverability analysis for two Exchange Information Stores on a cluster. Setting up an Exchange server 1. Select Tools > Data Collection Wizard from the menu to launch the Data Collection wizard. 2. Click Hosts in the Data Collection Wizard panel and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Databases 41 Setting up Data Monitoring Databases This section describes: "Monitoring Oracle" on page 41 "Monitoring SQL Server" on page 42 "Monitoring PostgreSQL" on page 44 Monitoring Oracle An Oracle database can be monitored from a Collector running on the same host as the Oracle server, or from a Collector running on a different host, such as the DPA server. Before starting the Data Collection Wizard To monitor an Oracle database for data protection data, the Collector must connect to the database as an Oracle user. To gather data successfully, this user must be able to perform selects on the following tables and views: V_$INSTANCE V_$PROCESS V_$DATABASE V_$PARAMETER DBA_DATA_FILES V_$SYSTEM_PARAMETER V_$DATAFILE V_$SESS_IO V_$SESSION DBA_FREE_SPACE V_$SESSMETRIC (Oracle 10 only) Any user with the SYSDBA role will have these privileges by default, so it is recommended that you specify a user that has the SYSDBA role when configuring the database for monitoring. If you do not want to use a user with the SYSDBA role to connect, then a separate user can be created and explicitly granted permissions on those tables, as the following example shows: CREATE USER limited_user IDENTIFIED BY password; GRANT CREATE SESSION TO limited_user; GRANT SELECT ON V_$INSTANCE TO limited_user; GRANT SELECT ON V_$PROCESS TO limited_user; GRANT SELECT ON V_$DATABASE TO limited_user; GRANT SELECT ON V_$PARAMETER TO limited_user; GRANT SELECT ON DBA_DATA_FILES TO limited_user; GRANT SELECT ON V_$SYSTEM_PARAMETER TO limited_user; GRANT SELECT ON V_$DATAFILE TO limited_user; GRANT SELECT ON V_$SESS_IO TO limited_user; GRANT SELECT ON V_$SESSION TO limited_user; GRANT SELECT ON DBA_FREE_SPACE TO limited_user; GRANT SELECT ON DBA_TABLESPACES TO limited_user; GRANT SELECT ON DBA_EXTENTS TO limited_user; On version 10 of Oracle, add the following line: GRANT SELECT ON V_$SESSMETRIC TO limited_user; EMC Data Protection Advisor Version 5.8 Administration Guide 42 Setting up Data Monitoring Recoverability analysis To monitor an Oracle database for recoverability analysis, the Collector must connect to the database as an Oracle user able to perform selects on the following tables and views: Dba_data_files Dba_temp_files Dba_tablespaces V_$datafile V_$logfile V_$controlfile V_$log_history V_$archived_log V_$instance V_$database V_$parameter Dict dba_tab_columns When monitoring Oracle on a Windows platform, the operating system user specified in the Credential must belong to the group ORA_DBA. On UNIX, if UNIX authentication is used, no further definition is required in the database. Updating Oracle statistics To gather accurate figures on the number of rows and size of tables and indexes, it is important that Oracle statistics are updated on a regular basis. The Oracle documentation contains more details on how to set up a job to update Oracle statistics. One method to update Oracle statistics on a Schema is to run the following command: exec dbms_stats.gather_schema_stats(ownname => '***SCHEMANAME***', estimate_percent => 5, cascade => true, options => 'GATHER'); Setting up an Oracle database 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Host in the Data Collection wizard and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring SQL Server A SQL Server database can be monitored from a Collector running on the same host as the SQL Server database, or from a Collector running on a different host, such as the DPA server. Before starting the Data Collection Wizard To connect to SQL Server using Windows Authentication, the DPA collector service must run as a named user and not as the Local System Account. Verify that the service is running as the correct user before proceeding with the configuration of the database. Databases 43 Setting up Data Monitoring Collector requirements The Collector needs to be able to connect to the SQL Server "master" database in order to gather the data required. The Collector can either: Use "SQL Server Authentication" using the credentials of the request (if set). Use "SQL Server Authentication" using the credentials against an explicit "master" database in the list of databases to be monitored (if set) If these are not set, the Collector uses "Windows Authentication" using the logon ID of the dpa_collector process. If none of these are sufficient to connect to the "master" database, the request will gather no data. User account requirements To gather data successfully, the user account used to connect to the SQL Server database must be granted specific privileges. Any SQL Server user with dbo access will have the correct privileges by default. If you do not want to connect with a user with dbo access, configure a user with the following: The user must be mapped to the database with the public role. The user must be explicitly granted the VIEW SERVER STATE and VIEW DEFINITION privileges (SQL Server 2005 only). The VIEW SERVER STATE privilege is granted at the server level. The VIEW DEFINITION privilege may be granted at the server level (under the name "VIEW ANY DEFINITION") or at the database, schema, or individual object level. SQL Server 2005 To grant server-wide privileges to the SQL Server "login" used by the Collector, including VIEW DEFINITION privileges for all database tables, connect to the SQL Server as an administrator and run: GRANT VIEW SERVER STATE TO <login\domain> GRANT VIEW ANY DEFINITION TO <login\domain> However, to grant VIEW DEFINITION privileges for only the specific databases that you want to monitor, connect to the SQL Server as an administrator and run: GRANT VIEW SERVER STATE TO [login\domain] GRANT VIEW DEFINITION ON DATABASE :: <dbname> TO <username> Recoverability analysis The recoverability server must connect as a database user with connect privileges for all of the databases and write privilege for the TEMPDB database. For Windows authentication, the user must be able to connect to all SQL Server databases and should have write privilege for the TEMPDB database. Setting up a SQL Server database 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Host in the Data Collection wizard and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. EMC Data Protection Advisor Version 5.8 Administration Guide 44 Setting up Data Monitoring Monitoring PostgreSQL A PostgreSQL database can be monitored from a Collector running on the same host as the PostgreSQL database, or from a Collector running on a different host, such as the DPA server. Before starting the Data Collection Wizard To monitor a PostgreSQL database, the Collector must connect to the database as a PostgreSQL super user. A super user will have the correct privileges by default, so it is recommended that you specify a super user when configuring the database for monitoring. To create a super user, the PostgreSQL administrator must be a super user themselves, and create the account as in the following example: CREATE ROLE xxxxx WITH login superuser password 'yyyyyy' ; where xxxxx is the new username and yyyyyy the new user's password. The following parameters will not be populated in the database server parameters table unless you are connecting to the database as a super user: config_file data_directory dynamic_library_path external_pid_file hba_file ident_file krb_server_keyfile log_directory log_filename preload_libraries unix_socket_directory The following items are also unavailable unless you are connecting as a super user: In the datafile configuration table, the full path to the datafiles cannot be shown, as the path of the file is found in the data_directory parameter. The string "(postgres data directory)" is shown instead. In the connection status table, the f_command and f_status fields will not be populated with the right information. These fields will be set to "<insufficient privileges>". Connecting to the database as a super user will populate all fields. Setting up a PostgreSQL database 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Host in the Data Collection wizard and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. RecoverPoint 45 Setting up Data Monitoring RecoverPoint RecoverPoint must be monitored from a Collector installed remotely (the DPA server, for example). Before starting the Data Collection Wizard Monitoring EMC RecoverPoint requires additional licensing. Without the correct license, the option to configure EMC RecoverPoint for monitoring does not appear in the Data Collection Wizard. DPA needs to be able to connect to the RecoverPoint environment Command Line Interface (CLI) through a secure SSH connection on port 22. DPA connects to the RecoverPoint appliance using the default CLI user admin, but any defined user with sufficient privileges to run a CLI command (remotely using SSH) is possible. However, DPA must not connect with the RecoverPoint user "boxmgmt" (this user is reserved for starting the RecoverPoint installation manager automatically). Setting up RecoverPoint To monitor RecoverPoint: 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Select RecoverPoint in the Data Collection Wizard and click Next. The RecoverPoint Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. EMC Data Protection Advisor Version 5.8 Administration Guide 46 Setting up Data Monitoring Host system monitoring DPA can gather data from operating systems that enable users to report on operating system configuration, status, and performance. There are several DPA modules that gather different types of information, as described in Table 7 on page 46. UNIX To perform system monitoring on UNIX computers, install a Collector on the host that is to be monitored. It is not possible to gather system information remotely from UNIX computers. Windows To gather performance data from Windows machines, Windows Management Infrastructure (WMI) must be installed on the Windows host you are monitoring. It is possible to gather all system monitoring information remotely from Windows computers, with the exception of Fibre Channel HBA information. To gather Fibre Channel HBA information, the Collector must be installed on the computer. "Monitoring a Windows host remotely" on page 46 provides more details on the steps required to monitor a Windows host remotely. To set up system monitoring for a system on which a Collector is installed: 1. Assign the system monitoring requests to the host or group to monitor. 2. Reload the Collector by selecting Administration > Reload Collectors from the node being monitored in the GUI. Monitoring a Windows host remotely All system information can be gathered remotely from a Windows computer with the exception of Fibre Channel HBA information. To monitor a Windows computer remotely, a Collector must be installed on another Windows computer. It is not possible to remotely monitor a Windows computer from a Collector running on a UNIX computer. Table 7 System monitoring modules Module Description Host Gathers basic information about the operating system type. Disk Gathers configuration, status, and performance information on the disks attached to the host. Fibre Channel HBA Gathers configuration, status, and performance information on Fibre Channel HBAs configured on the computer. File system Gathers configuration, status, and performance information on the file systems mounted to the host. Memory Gathers configuration, status, and performance information on memory in the host. NetInt Gathers configuration, status, and performance information on network interface cards in the host. Process Returns information on any processes running on the host. Processor Returns configuration, status, and performance information on all CPUs on the host. Host system monitoring 47 Setting up Data Monitoring To monitor a Windows host from another Windows computer, the DPA Collector service must run as administrator on the computer performing the monitoring. During the DPA Collector installation, type the name and password of an Administrator account on the local computer and the Collector service is automatically configured for that user. If this was entered incorrectly during installation, modify the Collector service login parameters so that the Collector service runs as an Administrative account rather than the Local System account. To modify the login parameters of the Collector service: 1. Launch the Windows Services control manager (Start > Settings > Control Panel > Administrative Tools > Services), and select the Collector service. Right-click and select Properties from the menu. 2. Select the Log On tab in the Properties dialog box. Select This Account. 3. Type the username and password of the administrator that the service to run as. 4. Click OK and restart the service. To monitor activity on a remote computer: 1. Create a host node for the computer to monitor in the GUI. The name of the node is the hostname of the remote host. The hostname must be resolvable from the computer on which the Collector that will be monitoring the node is running. 2. Assign requests to that node to specify the data to gather. 3. Mark each request as a proxy request and complete the details. 4. To complete the proxy details, type the name of the host for the Collector in the Proxy Host field. 5. Create a Windows credential for the Administrator account on the computer being monitored. This account can be the name of a Local Administrator or that of a Domain Administrator. 6. Notify the Collector that will monitor the server of the changes by right-clicking the node in the navigation tree and selecting Administration > Reload Collectors. Data collection from the server begins. It can take several minutes for data to display. 7. It may not be possible to gather file system performance information from Windows 2000 servers unless disk monitoring is enabled on the host. It is disabled by default. To enable disk monitoring on Windows 2000, run the following commands and then reboot the computer: diskperf /Y winmgmt /resyncperf <PID of winmgmt process> Monitoring a host for system data Monitor an application host for system data from a Collector running on the host machine or another machine in the environment. Before starting the Data Collection Wizard System data can only be gathered from UNIX systems by a Collector local to the UNIX machine. Setting up a host 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. EMC Data Protection Advisor Version 5.8 Administration Guide 48 Setting up Data Monitoring 2. Click Host in the Data Collection Wizard and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Tape libraries 49 Setting up Data Monitoring Tape libraries When specifying a hostname, it is important that the name of the tape library is resolvable from the host that is monitoring the tape library. Before starting the Data Collection Wizard The tape library credentials must contain the SNMP community string for the tape library in the Password field of the Credential Properties dialog box. Unless the community string was modified on the tape library, set the community string to Public. Navigate to Tools > Credential Editor to modify the tape library Credentials that are created after using the Data Collection wizard to create a tape library node. Monitoring the IBM System Storage TS 3500 tape library Use the Tape Library Specialist web interface to enable Simple Network Management Protocol (SNMP) requests for the IBM System Storage TS 3500 Tape Library. To enable SNMP requests: 1. Type the Ethernet IP address on the URL line of the browser. The welcome page appears. 2. Select Manage Access > SNMP Settings. In the SNMP Trap Setting field, view the current setting then click to enable SNMP requests. 3. Ensure that the SNMP Requests Setting field is set to Enabled. Monitoring the IBM TotalStorage 3583 tape library Configure the Remote Management Unit (RMU) to enable SNMP for the IBM TotalStorage 3583 Tape Library. To enable SNMP: 1. In the RMU, click Configuration. 2. In the SNMP Configuration region, perform the following: To enable the feature, select ON in the SNMP Enabled field. To enable or disable SNMP alerts, select ON or OFF in the Alerts Enabled field. In the Manager field, type the SNMP server address. In the Public Name field, type the name of the read-only SNMP community. In the Private Name field, type the name of the read/write SNMP community. 3. Click Submit and review the changes. 4. Type the password and click Confirm. Redirect the browser if required. 5. Click Done to reboot. Monitoring the IBM TotalStorage 3584 tape library To enable SNMP from the web interface of the IBM TotalStorage 3584 tape library: 1. From the Welcome screen of the Tape Library Specialist Web Interface, select Manage Access > SMNP Settings. 2. In the SNMP Trap Setting field, view the current setting, and select the button to enable or disable SNMP requests. Alternately, to enable SNMP requests from the operator panel: EMC Data Protection Advisor Version 5.8 Administration Guide 50 Setting up Data Monitoring 1. From the Activity screen of the tape library operator panel, select MENU > Settings > Network > SNMP > Enable/Disable SNMP Requests > ENTER. The screen displays the current status of SNMP requests. 2. Press UP or DOWN to specify ENABLED or DISABLED for SNMP messaging, and press ENTER. The Enable/Disable SNMP Requests screen redisplays the new setting. To accept the new setting and return to the previous screen, press BACK. Monitoring the Sun SL24 Tape Autoloader and SL48 tape library Configure the Remote Management Interface (RMI) to enable SNMP for the Sun StorageTek SL24 Tape Autoloader or SL48 Tape Library. To enable SNMP: 1. In the RMI, navigate to Configuration > Network. 2. Ensure the SNMP Enabled checkbox is enabled. 3. The Community Name string must be contained in the credentials used to connect to this Tape Library in Data Protection Advisor. 4. Click Submit and review the changes. Monitoring the HP StorageWorks tape library Configure the NeoCenter utility to enable SNMP for the tape library. To enable SNMP: 1. Launch the NeoCenter utility from the host machine. 2. Select Configure from the Main screen menu. The Configure dialog box appears. 3. Select the SNMP Traps tab. 4. In one of the available Trap Address fields, type the IP address of the Data Protection Advisor server. Monitoring Fujitsu tape libraries Ensure Simple Network Management Protocol (SNMP) requests are enabled on the tape library. Use the tape library management interface to enable SNMP. Setting up a tape library 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Select Tape Library in the Data Collection wizard and click Next. The Tape Library Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Switches and I/O Devices 51 Setting up Data Monitoring Switches and I/O Devices DPA monitors the following switches and I/O devices: "Monitoring Fibre Channel switches" on page 51 "Monitoring IP switches" on page 51 "Monitoring Xsigo I/O Director" on page 52 Monitoring Fibre Channel switches When specifying a hostname, it is important that the name of the switch is resolvable on the Collectors host. Before starting the Data Collection Wizard To ensure that Brocade switches return all data, verify that the Fibre Channel Alliance MIB is loaded and enabled on the switch. This MIB might not be installed on the switch by default. To enable FA MIB support on Brocade switches, log in as an administrator and run the snmpmibcapset command. Change the FA-MIB parameter to Yes. Press Enter to accept the default for the other settings. For example: telnet <switch> > snmpmibcapset The SNMP Mib/Trap Capability has been set to support FE-MIB SW-MIB FA-MIB SW-TRAP FA-TRAP FA-MIB (yes, y, no, n): [yes] SW-TRAP (yes, y, no, n): [enter] FA-TRAP (yes, y, no, n): [enter] SW-EXTTRAP (yes, y, no, n): [enter] > Setting up a Fibre Channel switch 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Select Fibre Channel Switch in the Data Collection wizard and click Next. The Fibre Channel Switch Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring IP switches When you are specifying a hostname, ensure the name of the switch is resolvable on the Collectors host. Before starting the Data Collection Wizard The IP Switch Credentials must contain the SNMP community string for the IP switch in the Password field of the Credential Properties dialog box. Unless the community string was modified on the IP switch, set the community string to public. Navigate to Tools > Credential Editor to modify the IP Switch Credentials that are created after you have used the Data Collection wizard to create an IP switch node. Setting up an IP switch 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click IP Switch in the Data Collection wizard and click Next. The IP Switch Details panel appears. EMC Data Protection Advisor Version 5.8 Administration Guide 52 Setting up Data Monitoring 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring Xsigo I/O Director When you are specifying a hostname for the Xsigo I/O Director, ensure the hostname or IP address of the Director is resolvable on the Collectors host. Before starting the Data Collection Wizard Monitoring Xsigo I/O Director requires additional licensing. Without the correct license, the option to configure Xsigo Director for monitoring is not enabled in the Data Collection Wizard. The Xsigo Director SNMP credentials must contain the SNMP community string for the Director in the Password field of the Credential Properties dialog box. Unless the community string was modified on the Director, set the community string to public. Navigate to Tools > Credential Editor to modify the default Xsigo Director SNMP Credentials if required, or to create a new credential. Setting up a Xsigo Director 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Xsigo Director in the Data Collection wizard and click Next. The Xsigo Director Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. File Servers 53 Setting up Data Monitoring File Servers DPA monitors the following file servers: "Monitoring EMC File Storage" on page 53 "Monitoring Network Appliance Filers" on page 53 Monitoring EMC File Storage EMC File Storage must be monitored from a Collector running on a remote computer, for example, the DPA server. Before starting the Data Collection Wizard The EMC File Storage appliance needs the Manager Licence installed on the appliance for DPA to gather data for reporting. The EMC File Storage module gathers information from EMC File Storage through an XML API and directly from the EMC File Storage Control Station. An administrator with specific privileges must be created on the EMC File Storage: 1. Log in to the EMC File Storage Manager web browser interface as an administrator. (You can also use the command line interface to create a DPA administrator.) 2. Navigate to Security > Administrators. 3. Create a new administrator, with a username of DPA, for example. 4. Select Local Only Account and enter and confirm a password for the administrator. 5. Select a Primary Group of at least opadmin level of privilege. DPA does not need greater privileges than those assigned by opadmin. 6. Enable the following client access options: XML API v2 allowed Control Station shell allowed 7. Click OK. The DPA Credential used to connect to the EMC File Storage must contain the username and password of the EMC File Storage administrator you created. Setting up an EMC File Storage appliance 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click File Server in the Data Collection wizard and click Next. The File Server Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring Network Appliance Filers NetApp Filers must be monitored from a Collector running on a remote computer. Before starting the Data Collection Wizard Monitoring Network Appliance Filer requires the EMC Data Protection Advisor File Servers module licence to be installed. Without the licence, the option to configure EMC Data Protection Advisor Version 5.8 Administration Guide 54 Setting up Data Monitoring Network Appliance Filer for monitoring does not appear in the Data Collection Wizard. The NetApp module gathers information from a Filer by communicating with the NetApp ONTAPI service that listens on default port 80. If there are any firewalls between the Collector and the Filer, it is important that port 80, or the designated port, is open to permit data gathering. If the Filer is configured to run multiple virtual Filers (vFilers), the Controller only requires network connectivity to vFiler0 (the physical filer). To gather data from a Filer, enable HTTP administrative access on the Filer: 1. Log in to the Filer and run the following command: filer> options httpd.admin.enable 2. If the option is set to off, enable it by running the following command: filer> options httpd.admin.enable on DPA requires a valid Filer username and password to connect to the Filer. Use the standard Filer user of root, but if a separate login is desired for monitoring purposes, create it. 3. For filers running versions of ONTAP earlier than 7.0, run: filer> useradmin useradd dpa Type a valid password. 4. For filers running ONTAP version 7.0 and later, run: filer> useradmin user add dpa-g Administrators Type a valid password. Setting up a NetApp filer 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click File Server in the Data Collection wizard and click Next. The File Server Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Backup appliances 55 Setting up Data Monitoring Backup appliances Data Protection Advisor monitors the following backup appliances: "Monitoring EMC Disk Libraries" on page 55 "Monitoring EMC Data Domain" on page 55 "Monitoring NetApp NearStore" on page 56 "Monitoring Fujitsu ETERNUS CS" on page 56 "Moniitoring FalconStor Virtual Tape Library devices" on page 57 Monitoring EMC Disk Libraries Data Protection Advisor monitors the following EMC Disk Library backup appliances: EMC Disk Libraries (EDL) EMC Disk Libraries 3D (EDL 3D) Before starting the Data Collection Wizard DPA gathers data from the EDL by connecting over HTTP. If the EDL 3D has SSL enabled, you must specify that SSL is used when configuring the EDL in the Data Collection Wizard. To determine if SSL is enabled on the EDL: 1. Log in to the EDL 3D management interface using a web browser. 2. From the home page, navigate to Configuration > Security > SSL. 3. If Enable is selected, SSL is enabled. Setting up an EMC Disk Library or EMC Disk Library 3D 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Select Backup Appliance in the Data Collection wizard and click Next. The Backup Appliance Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring EMC Data Domain Data Protection Advisor monitors EMC Data Domain backup appliances. Before starting the Data Collection Wizard SNMP must be enabled on the EMC Data Domain backup appliance. You also need to set the community string. This can be done from the command line. To enable SNMP on the EMC Data Domain appliance: 1. Log on to the EMC Data Domain appliance console using the sysadmin account. 2. Enter the following commands: snmp add ro-community <string> yes snmp enable EMC Data Protection Advisor Version 5.8 Administration Guide 56 Setting up Data Monitoring where <string> is the selected community string (for example, public). If SNMP is already enabled, you will have to disable and reenable SNMP for the new string to take effect. If you are not using a community string of public, you must change the community string used in the EMC Data Domain Credential. SNMP settings can also be set through the System Settings tab of the EMC Data Domain Enterprise Manager interface. Gathering new performance data As of DPA 5.7, the following data gathered is gathered only over an SSH connection to the Data Domain from the DPA Collector: Fibre Channel data File Server performance and compression ratio data Access group configuration data Tape drive performance Library volume status data. If you monitor Data Domain and are upgrading to version 5.7 of DPA, you will have to manually create a new SSH-specific credential in DPA to gather the new data from your existing Data Domain. There is no default SSH credential for Data Domain in DPA. After the upgrade to DPA 5.7, assign the request Data Domain SSH Performance to the Data Domain node in the Navigation tree and assign the SSH credential to that request. "Changing the default data collection settings" describes how to edit and assign requests. Setting up EMC Data Domain 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Select Backup Appliance in the Data Collection wizard and click Next. The Backup Appliance Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring NetApp NearStore There are no prerequisites for monitoring NetApp NearStore. 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Select Backup Appliance in the Data Collection wizard and click Next. The Backup Appliance Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Monitoring Fujitsu ETERNUS CS Data Protection Advisor monitors Fujitsu ETERNUS CS backup appliances. Before starting the Data Collection Wizard DPA provides the ability to report on Fujitsu ETERNUS CS disk-based backup appliances. Unlike the monitoring of other VTLs, Fujitsu ETERNUS CS monitoring is Backup appliances 57 Setting up Data Monitoring performed by an external script that is provided by Fujitsu Technology Solutions, and not by the DPA Collector process. Configuring monitoring of Fujitsu ETERNUS CS requires the user to install and configure the ETERNUS CS monitoring script before configuring the Fujitsu ETERNUS CS node in DPA using the Data Collection Wizard. The collection script, an installation description, and the ETERNUS CS reports can be downloaded from: ftp://ftp.fsc.net/pub/nsrproducts/DPA Setting up Fujitsu ETERNUS CS 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Select Backup Appliance in the Data Collection wizard and click Next. The Backup Appliance Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Moniitoring FalconStor Virtual Tape Library devices Data Protection Advisor monitors FalconStor hardware Virtual Tape Library devices. Before starting the Data Collection Wizard DPA gathers data from FalconStor by connecting over SNMP. FalconStor VTL devices must be monitored by a remote Collector. Setting up FalconStor 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Select Backup Appliance in the Data Collection wizard and click Next. The Backup Appliance Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. EMC Data Protection Advisor Version 5.8 Administration Guide 58 Setting up Data Monitoring ACSLS ACSLS cannot be monitored remotely. Before starting the Data Collection Wizard The Collector component must be installed and running on the ACSLS server that you want to monitor. After installing the Collector, verify that the ACS_HOME value in the DPA.config file matches the location in which ACSLS is installed. Setting up an ACSLS Server 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Host in the Data Collection Wizard and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Disk management servers 59 Setting up Data Monitoring Disk management servers Data Protection Advisor monitors HP Command View. Monitoring HP Command View Monitor a HP EVA Disk Array through HP Command View from a Collector running on the Command View host, or remotely from a Collector running on a different host (such as the DPA server). Before starting the Data Collection Wizard Monitoring HP EVA disk arrays through HP Command View requires additional licensing. Without the correct license, the option to configure HP EVA for monitoring does not appear in the Data Collection Wizard. DPA gathers data from HP Command View using SMI-S. Setting up HP Command View 1. Launch the Data Collection wizard by selecting Tools > Data Collection wizard from the menu. 2. Click Host in the Data Collection Wizard panel and click Next. The Host Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. EMC Data Protection Advisor Version 5.8 Administration Guide 60 Setting up Data Monitoring VMware Monitor your VMware environment from a Collector running on the VirtualCenter Server, or remotely from a Collector running on a different host (such as the DPA server). DPA provides a plug-in for VMware that allows VMware administrators to view DPA data protection reports from a tab in the infrastructure client GUI. "Registering the VMware plug-in" on page 60 describes how to register the plug-in from DPA. There are no prerequisites for monitoring a VMware virtualized environment. Setting up a VMware virtualization server 1. Launch the Data Collection wizard by selecting Tools > Data Collection Wizard from the menu. 2. Click VMware in the Data Collection Wizard panel and click Next. The VMware Details panel appears. 3. Step through the Wizard, using the instructions as a guide. Click Help to bring up the online help. Registering the VMware plug-in After you have configured the virtualization node in DPA, register the plugin from the DPA GUI to view reports from the infrastructure client. To register the plugin: 1. Select the appropriate node: a. For Virtualization Servers, right-click on the Virtualization host that you created in the Navigation tree. b. For Virtualization Managers, expand the Virtualisation Manager to display the Application group node, then expand the Application group node to display the vCenter node. Right click on the vCenter node 2. Select Administration > Manage VMware Plug-in from the menu. The Manage VMware Plug-in dialog appears. 3. Enter the username and password of a VMware administrator. 4. DPA will connect to the VMware host and register the plugin. Note: If the plugin has already been registered, the process will unregister the plugin. Specific DPA reports are now displayed in the DPA tab of the infrastructure client GUI. The EMC Data Protection Advisor Report Reference Guide describes the DPA reports available from the VMware client. Monitoring a clustered server 61 Setting up Data Monitoring Monitoring a clustered server Configuring DPA to monitor a clustered backup server (for example, EMC NetWorker) is an installation-specific exercise that varies depending on the clustering software being used. The following Knowledge Base article, available to all customers with an account on EMC Online Support, is a brief introduction to configuring DPA to monitor clustered servers: http://solutions.emc.com/emcsolutionview.asp?id=esg117911 If the Knowledge Base article is insufficient to configure DPA to monitor your clustered environment, please contact your EMC Professional Services representative. EMC Support is unable to assist with configuring clustered environments. EMC Data Protection Advisor Version 5.8 Administration Guide 62 Setting up Data Monitoring Creating a credential Credentials are used by the DPA Collector to connect to hosts, applications, and devices for data gathering. Once a credential is created, it can be assigned when configuring data gathering for a node using the Data Collection Wizard or from the Node Properties dialog box. To create a credential: 1. Select Tools > Credential Editor. The Credential List dialog box appears. 2. Select New. The Credential Editor appears. An example of a UNIX credential is shown in Figure 2 on page 62. Figure 2 Credential properties 3. Type a Name for the credential. 4. Add an optional Description for the credential. 5. Select the Type of credential (UNIX, Windows, SNMP, or System). Creating a credential 63 Setting up Data Monitoring 6. Complete the fields in the Settings panel, according to the type of Credential, as described in Table 8 on page 63. 7. Click OK. Table 8 Credential fields Field Description System Username Valid username to initiate connection. Password Valid password to initiate connection. Confirm password Confirmation of password. Windows Domain Windows Domain to log in to. Username Valid username to initiate connection. Password Valid password to initiate connection. Confirm password Confirmation of password. SNMP Community String String with which to connect to the device. UNIX Username Valid username to initiate connection. Password Valid password to initiate connection. Confirm password Confirmation of password. None Indicates there are no advanced options for this UNIX credential. Switch user ("-su") after login Indicates that the Collector use su to become root after connecting. Root Password The root password to use for su if the user has selected Switch user After Login. Confirm the password in the Confirm Password field. Use sudo Indicates that the Collector use sudo to become root after connecting. Use sudo with password Indicates that a password needs to be set when performing sudo. Type the password in the Alternative Sudo Password field, and confirm the password in the Confirm Password field. Use sudo interactively Indicates that sudo will be run interactively. User has home directory Indicates that the user has a Home directory. Alternative Sudo path Specifies an alternate path to find the sudo binary. EMC Data Protection Advisor Version 5.8 Administration Guide 64 Setting up Data Monitoring Troubleshooting and Reporter Performance 63 3 Troubleshooting and Reporter Performance This chapter provides assistance on troubleshooting configuration and data gathering problems that may be encountered in Data Protection Advisor. It also describes how to tune the Reporter process to scale to your environment. It includes the following sections: Tuning the Reporter for performance ......................................................................... 64 Allocating more memory to a GUI client.................................................................... 66 Viewing the log files....................................................................................................... 67 Managing the DPA processes ....................................................................................... 71 Troubleshooting data collection................................................................................... 72 Troubleshooting client discovery for recoverability analysis .................................. 74 Viewing the report history............................................................................................ 79 Synchronizing the system clock................................................................................... 80 EMC Data Protection Advisor Version 5.8 Administration Guide 64 Troubleshooting and Reporter Performance Tuning the Reporter for performance If memory utilization is causing problems, the Reporter can run requests as independent child processes, called a Reporter worker process. Setting the parameters for Reporter worker processes To enable Reporter worker processes: 1. Go to File > System Settings > Processes tab. 2. Click on Reporter in the list of processes. 3. Select Yes under the User Worker Processes option. 4. Change the default concurrency and memory management settings if required. These are listed in Table 9 on page 64 Viewing the Worker process logs Each Reporter Worker process maintains its own log file in the standard DPA logs directory (defined in Log File system setting). Each log file is named reportworkerNN.log, where NN is the identifying number of the Report Worker (for example, 01, 02, 03). Changing the Debug level of the Reporter modifies the Debug level of all Report Worker threads automatically. Table 9 reporter worker process settings Setting Description Use Worker Processes If set to 'Yes', the Reporter process runs reports through spawned child processes. If set to 'No' (the default), the Reporter runs all reports. You must restart the Reporter process after modifying this setting. Concurrency Specifies the maximum number of Report Worker processes that can be spawned at one time. Worker JVM Memory Limit Specifies the maximum size that each Report Worker processes can grow to. Be careful when setting the JVM Memory Limit for Workers. If you have 10 Report Workers configured, each with a JVM Size of 1GB, it is possible for the Reporter to use up to 10GB of Memory if the reports require it. If this exceeds the total amount of memory available on the machine, reports can fail. Soft Memory Limit If a ReportWorker process uses more than the Soft Memory Limit in running a report, it will automatically shut down after completing the report, returning memory to the operating system. Queue Timeout The amount of time that a report will be queued in the main reporter process. If a Report Worker is not available in the time it is queued for, the report will be terminated automatically with an error. Run Timeout The maximum amount of time a report can run before being terminated by the main Reporter process. This defaults to one hour, and may need to be increased in environments running complex reports that take more than one hour to process. RMI Communication Port Report Worker processes communicate with the main Reporter process via RMI. Port 4008 is used for this communication. This value should only be changed in rare situations where another application on the host is using this port. Tuning the Reporter for performance 65 Troubleshooting and Reporter Performance How the Reporter handles report requests By default, when the Reporter receives a report request from another DPA process, the request is placed onto an internal queue until it can be processed. To avoid overloading the database, the Reporter limits the number of reports that can be run at the same time. When resources become available, the Reporter takes the report off the queue, processes the report, and returns the report results to the process that requested it. The number of reports that can be run in parallel can be configured by the Concurrency value in the System Settings for the Reporter process. By default, the reporter runs up to 10 reports in parallel. When the Reporter process starts up, it checks the JVM Memory Limit System Setting to determine the maximum size that the Reporter process can grow to. If the total memory requirements of the reports running at a certain point in time exceed this limit, then reports can fail with memory allocation issues, and the DPA Reporter process is likely to become unstable and need to be restarted. A Report Worker handles the report the same way as the Reporter, but allows for more efficient memory management. If the Report Worker has used a lot of memory in processing the report, it shuts down after completing the report. The memory that was used to process the report is released back to the operating system. This also makes it easier to stop individual reports from the user interface. Instead of shutting down the Reporter to stop a single running report, a single report can be stopped from the GUI client without affecting other running reports. EMC Data Protection Advisor Version 5.8 Administration Guide 66 Troubleshooting and Reporter Performance Allocating more memory to a GUI client If a local DPA client runs out of memory when displaying reports, you will receive an error message: Error: Out of memory whilst parsing result To increase the memory allocated to a locally installed client: 1. Go to Start > Run on the client machine and type regedit. 2. In the registry editor, navigate to HKLM\Software\EMC\DPA\GUI. 3. Create a new string called JVMARGS with a value of -Xmx1024m. The default value is 512MB. The above example sets it to 1024MB. However, you can set this to any value you require (for example, -Xmx2048m) as long as there is memory available on the machine. Viewing the log files 67 Troubleshooting and Reporter Performance Viewing the log files Each DPA process has an associated log file that provides important information when troubleshooting problems. Note: The following section describes the log file locations for a standard DPA installation. If the default installation directory was changed during installation, the location of the log directory will be different. Finding the server process log files The server process logs are generated in the following locations: UNIX /var/log/emc/dpa/ Windows C:\Program Files\emc\dpa\log\ The following logs are stored: collector.log controller.log listener.log reporter.log publisher.log analysisengine.log illuminator.log dbserver.log (iAnywhere only) dbengine.log (iAnywhere only) Finding the client process log file If you are logging into the DPA Server from a browser, the GUI log is generated on the local machine in the following locations: UNIX /tmp/ or /var/tmp Windows C:\Documents and Settings\[username]\Local Settings\Temp The UNIX location depends on the platform and the temporary directory settings configured by the system administrator. The name of the GUI log is dpagui.log. Changing the log level (server) By default, all processes log only warnings and error messages. These may not provide enough information when troubleshooting complex problems. The log detail level can be changed for a process. To change the log level: 1. Log in to DPA as a user with administrative privileges. EMC Data Protection Advisor Version 5.8 Administration Guide 68 Troubleshooting and Reporter Performance 2. Select File > System Settings. The System Settings dialog box appears. Select the Processes tab. 3. Select the process to modify the log level setting for. 4. Select either Log Level or Server Log Level. A list of options appears. The Log Level determines the level of logging to the log file. Server Log Level determines the level of logging to the DPA database. Log data recorded in the database can be viewed from reports in the DPA client. 5. Select the level of logging. The levels available depend on the type of process. Table 10 on page 68 describes the log levels available for the Java processes (Collector, Controller, Reporter, Listener, Database Server, Illuminator). Table 11 on page 68 describes the log levels that are available for the C processes (GUI, Publisher, Analysis Engine), in addition to the levels available in Table 10. The C process log levels are not logged to the DPA database. The log levels are cumulative. For example, selecting Debug logs all Info, Warn, Error, and Fatal messages. 6. Click OK to apply the log level. The process begins logging immediately with the new level of detail. There is no need to restart the process. Managing the log files When a log file reaches its maximum size, and the maximum number of log files exist in the log file directory, the oldest log file for that process is deleted and a new log file created. You can modify the maximum log file size and maximum number of log files for the following processes: Analysis Engine Collector Table 10 Java process log levels Log level Description Fatal Critical error. DPA is unable to continue. Error Error. DPA is unable to handle the error, but can continue operation. Warn Warning. An exception occurred that DPA has ignored but may require investigation. Table 11 C process log levels Log level Description Debug Low Include additional debug level information. Debug Low information assists Support when troubleshooting problems. Debug Functions Include low level debug information on function usage. Trace Lowest possible log level. Note: Care should be used with the Trace log level, as log files can grow large extremely quickly. Info General information. Info is the default level. Debug Include additional information when exceptions occur. Viewing the log files 69 Troubleshooting and Reporter Performance Controller Listener Reporter Publisher Illuminator You can also change the location of the log file for a process if required. Setting the maximum log size values To set the maximum log size values: 1. Select File > System Settings. The System Settings dialog box appears. Select the Processes tab. 2. Select the process to modify the maximum size values for. 3. Double-click in the value for the Maximum Log File Size (MB) field and type in a new maximum log file size. A value of 0 indicates no maximum file size. 4. Double-click in the value for the Maximum Number of Log Files field and type in a new maximum log file size. The minimum value for the number of log files is 2. 5. Click OK. Changing the log file location To change the log file location: 1. Select File > System Settings. The System Settings dialog box appears. Select the Processes tab. 2. Select the process to modify the location of the log file. 3. Double-click in the value for the Log File field. 4. Type in the new path for the log file. 5. Click OK. Viewing log files from the GUI If you are logging to the DPA database, reports are available that allow the user to view log and error messages from the user interface. Users do not need to log on to remote machines to check if any errors have been written to the log files. The following reports are available: Collector log file To view any log file messages written to a collector log file, select the node in the tree that the collector is running on, and run DPA > Errors > Collector Logs. Collector errors To view any error messages written to a collector log file, select the node in the tree that the collector is running on, and run DPA > Errors > Collector Errors. Server process log files To view any log file messages written to any of the DPA Server process log files, select the DPA Server node in the tree and run DPA > Errors > Server Logs. Sending notifications on warnings and errors Data Protection Advisor has two analyses that monitor for any errors or warnings logged in any Collector or Server log file: Collector Log File Message EMC Data Protection Advisor Version 5.8 Administration Guide 70 Troubleshooting and Reporter Performance Server Log File Message To receive SNMP or email notifications when an error or warning occurrs in a Server or Collector log file, assign these analyses to the DPA server node in the Naviagation tree. Chapter 6, "Monitoring an environment for alert conditions," describes how to assign an analysis job to a node. Managing the DPA processes 71 Troubleshooting and Reporter Performance Managing the DPA processes This section describes how to determine the runtime status of a DPA process, and how to stop and restart a process. Stopping and restarting a process To stop and restart a process: Windows 1. Select Start > Settings > Control Panel. The Control Panel appears. 2. Double-click Administrative Tools. The Administrative Tools window appears. 3. Double-click Services. The Services window appears. The DPA processes are listed. All the processes are prefixed with DPA. If a process is running, the status will be Started in the Services window. 4. To stop a process, right-click on the process and select Stop. After the process is stopped, the status field is empty. 5. To restart a process, right-click on the process and select Start. UNIX 1. Navigate to the DPA install directory. 2. View the DPA processes that are running. Run the following command to view running processes that contain dpa_ in the process name: ps -ef | grep dpa_ 3. Source the dpa.config file. For sh, ksk, bash, or equivalent shell, run: . <DPA installdir>/etc/dpa.config For csh, tcsh, or equivalent shell, run: source <installdir>/etc/dpa.config 4. Stop the process. For example: ./<installdir>/etc/dpa stop 5. After the process has stopped, restart the process: ./<installdir>/etc/dpa start Viewing a process status from the GUI You can view the status of processes from the DPA user interface. To view the status of a process: 1. Select the DPA server node in the Navigation tree. 2. Right-click and select DPA > Status > Process Status. The DPA Status report appears, showing the current active or disables state of all processes. EMC Data Protection Advisor Version 5.8 Administration Guide 72 Troubleshooting and Reporter Performance Troubleshooting data collection This section describes the steps that can be taken to diagnose problems when trying to gather data. The following scenario is assumed: Data Protection Advisor was successfully installed. The Data Collection Wizard was successfully run to create the node to monitor in the Navigation tree. Requests have been assigned to the node in the Node Properties dialog box and the Collector has been reloaded. Sufficient time (fifteen minutes) has passed to allow the Collector to gather data. An appropriate report has been run that returns no data, and data should exist for the node. Data collection troubleshooting first actions Perform the following: 1. Verify that the time window selected for the report is correct. 2. Check that the correct requests have been assigned to the node. Right-click the node and select Administration > Properties. Select the Requests tab of the Node Properties dialog box. 3. Select Node > Reload Collectors from the menu to reload the Collectors. 4. Rerun the report. If the report continues to show no data, right-click the node being monitored and select DPA > Errors > Collector Errors. Review any errors returned by the Collector Errors report and take corrective action if possible (for example, an authentication problem that needs to be resolved). Data collection troubleshooting second actions If the first round of steps do not resolve the problem, perform the following: 1. If no resolvable Collector errors are reported, right-click the DPA server node in the Navigation tree and select Status > Process Status. The Process Status report displays the current status of all DPA processes. 2. If the status report shows that the Collector is active, verify that the process is active on the operating system on which the Collector is installed. Restart the process on the operating system if necessary. "Managing the DPA processes" on page 71 describes how to start and stop a process. 3. Rerun the report. If the report continues to show no data, open the Collector log and review the Collector log for any problems (for example, an incorrect value was entered during Collector installation). "Viewing the log files" on page 67 describes how to view the log files. Troubleshooting data collection 73 Troubleshooting and Reporter Performance Data collection troubleshooting third actions If the second round of steps do not resolve the problem, perform the following: 1. Verify the status of the Listener process, as described for the Collector. 2. If the Listener is not active, restart the Listener and rerun the report. 3. If both the Collector and Listener are active and data is still not being returned, it may be necessary to contact EMC Support. Follow the instructions in "Preparing a log file for submission to EMC Support" on page 73. Preparing a log file for submission to EMC Support When submitting a log file to EMC Support, steps can be taken to ensure that the log file contains the relevant information, and unnecessary log entries are minimized. To prepare a clean log file: 1. Set the Log Level of the process to Debug Low in the System Settings dialog box, as described in "Viewing the log files" on page 67. 2. Stop the process, using the instructions in "Managing the DPA processes" on page 71. Do not restart the process at this point. 3. Navigate to the directory in which the log file is stored. Rename or remove all existing log files for the process. 4. Restart the process. Restarting a Collector reloads all the requests assigned to that Collector and starts the data gathering routine. This ensures that all requests have been attempted. Starting a new log file removes the need to search through unnecessarily long log files for a problem. 5. Wait a sufficient amount of time (fifteen minutes). 6. Rerun the report to confirm data is not being gathered. 7. Set the Log Level of the process back to Info in the System Settings dialog box. 8. Make a copy of the log for submission to EMC Support. EMC Data Protection Advisor Version 5.8 Administration Guide 74 Troubleshooting and Reporter Performance Troubleshooting client discovery for recoverability analysis This section describes the steps that can be taken to diagnose problems when trying to configure VNX/CLARiiON or Symmetrix storage arrays for recoverability analysis. The following scenario is assumed: Data Protection Advisor was successfully installed. The DPA server and the storage array host meet the requirements as specified in the EMC Data Protection Advisor Compatibility Matrix. EMC Solutions Enabler has been successfully installed. Client discovery using remote execution Table 12 on page 74 describes possible problems and solutions encountered when attempting to discover clients remotely (without a DPA Collector). Table 12 Client discovery problems and solutions (Page 1 of 2) Problem Solutions When using sudo, the Illuminator Client Discovery request may fail to return volume group information on AIX hosts with the following message: SymMapVgShow exited with code 161 (SYMAPI_C_VG_NOT_AVAILABLE) SessionId: 0 - for VG:<vg_name> with type: 2(AIX LVM) VolumeGroup information will not be parsed. This occurs only when the credentials are configured to use sudo. Add the following line to the sudoers file: Defaults env_keep += "ODMDIR" Client discovery fails: No authentication defined, or unable to log in. Create a credential in DPA (Tools > Credential Editor) and assign it to the client. Check that the username and password supplied with the credential is able to connect the client. Make sure su or sudo are not needed to connect, and if so that the correct parameters are supplied in the credential. Client Discovery fails: Failed to connect to client using RPC, or a specified logon session does not exist. Check that the username and password supplied with the credential is able to connect the client. Make sure you supplied the username along with the domain name: <domain>\<username > for remote computers, <computer name>\<username> for local computers. In most cases localhost\<username> can be used. Check if the host is accessible from the DPA server using the admin share: \\hostname\Admin$ If, after all the above , the same message is still displayed, change the Log on as value for the DPA server service from "local system" to any other user with administrator privileges. A local administrator also can be set. Client Discovery failed: Failed to connect to client using RPC. The network path was not found. Check if the client's Name, IP or Alias is defined correctly and reachable from the DPA server. Check if the host is accessible from the DPA server using the admin share: \\hostname\Admin$ If the share is not accessible, check that it is not blocked by a firewall. Troubleshooting client discovery for recoverability analysis 75 Troubleshooting and Reporter Performance Client discovery with Collector Table 13 on page 75 describes possible problems and solutions encountered when attempting to discover clients using the DPA Collector. Client Discovery failed: User doesn't have enough privileges to get the device mapping information. Follow the system requirements for remote execution permissions. Assign a user with administrator capabilities to the credential. Check that the user that connects to the client has "write and execute" privileges to the path /var/tmp. (UNIX) Client Discovery failed: Failed to send file for discovery to client using SCP, or failed to send file for discovery to client using FTP. Check for free disk space in /var/tmp. If the DPA Server is installed on Sun Solaris host and the user would like to run a request on a Windows host without installing a local Collector, the user must run the request trough a proxy (a Windows host that has installed a Collector on it). If the proxy host does not resolve the DPA server name correctly (DNS issues), the following error will appear in the request history log: "Error Running Request: No Data" (The following error will also appear in the Collector Log: Detail: get host by name failed in tcp_connect() ) Make sure the DPAServer is resolvable from the Windows Proxy host. The DPA server name might need to be added to the hosts file. Client Discovery fails: Error (977). Overlapped IO operation in progress. Please verify that there is no antivirus software installed on the host; antivirus sofware may be blocking the irxsvs.exe operation. Disable antivirus blocking by authorizing the irxsvs.exe file in the anti-virus software. Client discovery fails with the following error: <client_name> irx errMsg: Unable to connect host:<client_name> with user:<domain>\<username> using RPC irx output: Error (1203): No network provider accepted the given network path. Make sure that the following services are running: "Server", "Computer Browser" and 'Workstation". Table 12 Client discovery problems and solutions (Page 2 of 2) Problem Solutions Table 13 Client discovery with Collector problems and solutions Problem Solution Client Discovery request is using remote execution instead of using the installed Collector. 1. Make sure that the Collector is installed on the host. 2. Make sure that the DPA server is defined as the Controller for the Collector. 3. Restart the Collector service. EMC Data Protection Advisor Version 5.8 Administration Guide 76 Troubleshooting and Reporter Performance General client discovery Table 14 on page 76 describes general possible problems and solutions encountered when attempting to discover clients from DPA. Table 14 General client discovery problems and solutions Problem Solution Client Discovery finished with warnings: Failed to discover application storage objects for application <application_name> on client <client_name>. Check if the application is running and available for connection. Check if the user configured in the DPA credential has enough privileges to query the application's system data. Client discovery failed: cant connect to any IP. Check that port 25011 from the host to the DPA server is not blocked by a firewall. Client Discovery finished with warnings: Home directory was not found for application. 1. Expand the client in the DPA Navigation tree. Right-click on the application and select Administration > Properties. 2. Select the Assignations tab. Select the discovery request for this application type (SymAPI or ClarAPI Engine) and click Edit. 3. In the Request Settings dialog box, edit the Credential. 4. In the Credential Properties dialog, select User has home directory. Unsupported File System Type encountered: <filesystem_name>. This filesystem type is not supported by DPA. To avoid this warning in the next client discovery, you can ignore discovery for this filesystem by deselecting the Gather Data checkbox in the Node Properties dialog box (right-click > Administration > Properties). Note: DPA will not display recovery data for this filesystem. Client Discovery failed with the error: Please verify that you have enough disk space and write permission. or Failed to unpack file on client <client_name>. Ensure there is enough disk space in the host's root filesystem according to the system requirements in the EMC Data Protection Advisor Installation Guide. Client Discovery finished with warnings: Can't find or no permission to execute file <home_dir>. Check if <home_dir> that was discovered exists on the client. Check if the file sqlplus in the home directory that was discovered has enough permissions for being executed by DPA. Client Discovery finished with error: Timeout waiting for agent response on client <client_name>. 1. In DPA, go to File > System Settings > Processes > Illuminator. 2. Change the parameter Timeout for agent response (seconds) from the default 1200 to a larger value. or Check if the DPA server has two network cards enabled and the client is able to reach both of them. If the client isn't able to reach one of the cards, disable this network card. Troubleshooting client discovery for recoverability analysis 77 Troubleshooting and Reporter Performance Synchronizing Incorrect Recovery Point times If there is a time difference between the DPA server and the storage array being monitored, recovery points may be displayed with times that do not match the expected times. For example, a system administrator initiates a recovery point at 0200H but the recovery point is displayed at 0400H in DPA. The discovery requests have a Time Offset option that accounts for time differences and allows recovery points to be displayed with consistent times. You must calculate the exact offset between the DPA server and the storage array host. In the following instructions, "connector" refers to the DPA host node which has the Illuminator SYMAPI/CLARAPI Engine Discovery request assigned. The time offset is calculated in seconds. VNX/CLARiiON To calculate the time offset between the VNX/CLARiiON and the DPA server: 1. Query the VNX/CLARiiON's time using the navicli command getsptime. 2. At the same time, query the connector's time. 3. If the connector time and the DPA server time are equal (no Time Zone difference): TimeOffset = Connector time - VNX/CLARiiON time. When connecting to ECC 6.1, Client Discovery finished with error: Error Import Clients for w2k3-96-52.dm1nprlab.com finished with errors. Check previous error messages for further information. Unable to logon (Connection refused). 1. Run a batch file containing the following commands: %ECC_INSTALL_ROOT%\tools\JRE\Nt\late st\bin\java -cp %ECC_INSTALL_ROOT%\ECCAPIServer\clas s;%ECC_INSTALL_ROOT%\ECCAPIServer\ec c_inf\exec\eccapiclient.jar; com.emc.ecc.eccapi.client.util.EccAp iPopulateRandomPassword ApiClient The additional classpath parameter is only required if the command is not used from within the ecc classes directory. SYMAPI and CLARAPI Discovery requests fail when run together for the first time on a Solaris DPA Server. 1. Run the Discovery requests separately; make sure that one CLARAPI or SYMAPI discovery is succesful before running the other. 2. Once successful requests have been run sequentially first, they can be run together. Client discovery is not correctly resolving LUNs on VFMS on ESX 4.1. When trying to correlate the virtual devices to the remote storage they reside on, and the hosting ESX of the virtual machine cannot resolve the name of the VM (DNS configuration), the correlation fails and the virtual devices are displayed as local devices. Configure the DNS on the ESX properly or add the VM name and IP to the ESX hosts file. Importing Clariion information request fails with the following error message: "An error occurred while data was being loaded from a Clariion ClarEventGet exited with code 3593 (SYMAPI_C_CLARIION_LOAD_ERROR) " Run the SYMCLI command on the SE host for this CLARiiON: "symcfg sync -clar" Table 14 General client discovery problems and solutions Problem Solution EMC Data Protection Advisor Version 5.8 Administration Guide 78 Troubleshooting and Reporter Performance 4. Otherwise, if there is a time difference also between the connector time and the DPA server time: TimeOffset = (DPA server time - Connector time) - VNX/Clariion's time. 5. Set the time offset for the request, as described in "Configuring the time offset" on page 78. Symmetrix To calculate the time offset between the Symmetrix and the DPA server: 1. Query the DPA server time. 2. At the same time, query the connector's time. 3. If the Connector time and DPA server time are not equal: TimeOffset = DPA server time - Connector Time. 4. Otherwise, no time offset for Symmetrix needs to be set. 5. Set the time offset for the request, as described in "Configuring the time offset" on page 78. Configuring the time offset Once you have calculated the time offset, set the value for the request. To set the time offset value: 1. Right-click on the Symmetrix or VNX/CLARiiON host node in the DPA Navigation tree and select Administration > Properties. 2. Select the Assignations tab. Select the Illuminator Engine Discovery request and click Edit. 3. In the Options field, enable the Time Offset checkbox. 4. Enter the time offset you calculated in the Value field. 5. Click OK. Viewing the report history 79 Troubleshooting and Reporter Performance Viewing the report history It is possible to report on all the reports that have been run in DPA. These include reports run by a user or any of the other components of the system, such as the Publisher or Analysis Engine. This is useful for identifying reports that are taking the longest time to run. To view a history of all reports: 1. Select the DPA server from the navigation tree. 2. Run DPA > History > Report History from the menu. A report is displayed showing all reports completed during the specified time period. The report history report displays the name of the report, the objects against which it ran, the status of the report, and the duration of the report. The report history report contains the information described in Table 15 on page 79. Table 15 Report history fields Field Descriptions Report Name of the report User Name of the user that ran the report View Name of the view that the object was in that the report was ran against Object Name of the object(s) that the report was run against Status Indicates whether the report was successful Total Time Total time that the report took to run Start Time Time the report started End Time Time the report ended EMC Data Protection Advisor Version 5.8 Administration Guide 80 Troubleshooting and Reporter Performance Synchronizing the system clock As part of the User Authentication process, Data Protection Advisor relies on the system clock times on the client machine and the server differing by less than one minute. In the event that clock times are unsynchronized, the following error message will be displayed: 'User Authentication failed due to the times on the client and server not matching. Please ensure that the times are synchronized' To resolve this issue, ensure that the system clock times on the client and server are synchronized. Changing the default data collection settings 81 4 Changing the default data collection settings A DPA request contains data on how and when to gather data from an object. You can change the default data collection settings by adding, deleting, and changing request details. Assigning a request to a node ...................................................................................... 82 Assigning recoverability requests................................................................................ 85 Editing default request settings ................................................................................... 86 Viewing the request history.......................................................................................... 88 Collecting data remotely............................................................................................... 89 EMC Data Protection Advisor Version 5.8 Administration Guide 82 Changing the default data collection settings Assigning a request to a node The User Interface filters the list of possible requests that can be assigned to a node. Filtering is based on the node type and platform (for Host nodes) to which the requests are being assigned. For example, if a node of type tape library is created, only tape library requests to that node can be assigned. To assign a request to a node: 1. Right-click the node to assign requests. 2. Select Administration > Properties. The Node Properties dialog box appears. 3. Click the Assignations tab The Requests list displays the requests assigned to the node. If you created a node using the Data Collection wizard, all applicable requests are already assigned to the node. 4. Click Add. The Request List dialog box appears. The Request List dialog box shows the unassigned DPA requests for the node. Only the requests that are valid for that node type are displayed in the Request List. Note: For some node types (for example, Component process nodes) no requests can be assigned. 5. To assign one or more requests to the node, select the requests to add and click OK. Press Ctrl and click to select multiple requests. The requests are added to the Requests list in the Node Properties dialog box. 6. To edit a request, select Edit. The Request Settings dialog box appears. Request settings that are modified through the Request Settings dialog box apply only to the node selected in step 1; any changes will not be global across all nodes assigned the request. Adding a request to a group node assigns the request to all child nodes (the request may be removed or modified on each individual child node). Table 16 on page 82 describes the fields in the Request Settings dialog box. 7. Once the settings for the request have been edited, click OK to return to the Node Properties dialog box. Table 16 Field Description Proxy Host Indicates if the Collector is remote to the DPA Server. The Proxy Host is the host machine on which the Collector is installed. Credential Indicates the DPA Credential the Collector uses to access the server or appliance to gather data. Frequency Indicates how often DPA polls the monitored component to gather data. Disabled Request does not gather data. Manual Gathers data only when Request is manually run from the Node Properties dialog box. Period Gathers data according to the user-specified time period. Schedule Gathers data according to a defined DPA schedule. Options Options are additional configuration parameters that are specific to each request. Assigning a request to a node 83 Changing the default data collection settings 8. To test that the request can successfully connect and gather data, click Test. If the request attempt fails, an error message is generated that provides details on the reason for failure. You may have to configure proxy and credential settings before the request can be tested. 9. To run the request now, click Run. 10. Click OK. The Reload Collectors dialog box prompts you to reload the collectors. 11. Click Yes. Reloading the Collector After assigning or removing requests to either a group or host node, you are prompted to reload the Collectors to update the configuration. The collectors can also be reloaded manually. To do this, right-click the changed group or host node and select Administration > Reload Collectors. A dialog box confirms whether each Collector was contacted successfully. Removing a request Requests can be removed if they gather unwanted data. To remove a request: 1. Right-click the node to assign requests. 2. Select Administration > Properties. The Node Properties dialog box appears. 3. Click Requests. 4. Select the request to remove and click Remove. 5. Click OK. The Reload Collectors dialog box prompts you to reload the collectors. Collector time format limitations after Collector installation within first 13 days of the month jobmonitor Requests fail to run properly if the Collector is installed and first run before the 13th day of the month, and return errors such as the one below: ERR 156384.1352 20140307:130220 clctr.mod.nbu.job - jobmonitor(): failed to calculate suitable timeformat - please provide a value for "timeformat" request option This is because there is inherent ambiguity in the auto-calculate between days of the month and months of the year for the time format if the date selected is within the first 12 days of the month. This most often affects NetWorker and NetBackup environments. This may not be an issue with other backup applications. Workaround The workaround for this issue is: Set the timeformat Request option manually for each jobmonitor Request on each backup server. Alternatively: Reset the Collector to attempt to calculate a timeformat after the 12th of the month. Verifying correct Collector times The Collector saves worked out timeformats to its pstore so once a format is found that is used in all future jobmonitor requests. EMC Data Protection Advisor Version 5.8 Administration Guide 84 Changing the default data collection settings If on the 13th day of the month the Collector has not determined a suitable time format, it should then work out the correct format. You don't need to restart the Collector to do this. If however, the timeformat has been set and is not correct: 1. Stop the Collector. 2. Delete the pfiles. 3. Restart the Collector. Then it should calculate the correct format, as long as they are on or after the 13th day of the month. Assigning recoverability requests 85 Changing the default data collection settings Assigning recoverability requests Host nodes for ECC, VNX/CLARiiON, or Symmetrix created through the Discovery Wizard are assigned specific client discovery requests. These requests, when run, search the storage array hosts for ECC servers or and storage arrays reachable from that host. New components are then populated in the Navigation tree and existing components are updated. The requests from recoverability host nodes therefore are not designed to be run on a scheduled basis, but only when new servers or arrays are added to an existing environment, for example. These nodes act as "connectors" to the host API and provide no report data themselves. Recoverability data gathering requests can be assigned manually to existing nodes or new nodes created by the Node Editor, like other requests. This section describes the recoverability requests, and the options associated with each. SymAPI Engine Discovery The Illuminator SymAPI Engine Discovery request retrieves the Symmetrix storage arrays connected to a host. It has the following options: Symapi Version Version of the Symmetrix API. SYMAPI DB Path Full path to the Symmetrix host database. Time offset (seconds) Specifies the time difference between the Symmetrix host and the collector. Allow Management over SRDF Flag indicating whether management is enabled over SRDF. ClarAPI Engine Discovery The Illuminator ClarAPI Engine Discovery request retrieves the VNX/CLARiiON storage arrays connected to a host. It has the following options: Time offset (seconds) Specifies the time difference between the VNX/CLARiiON host and the collector. ECC Clients Discovery The Illuminator ECC Clients Discovery request retrieves the ECC clients connected to a host. It has the following options: ECC API Port Port on which the ECC API listens. Connect to ECC API Remotely Indicates the Collector is on a different machine to the ECC host. Applicative Credential Credential for connecting to the ECC host. Client Discovery The Illuminator Client Discovery request retrieves information about file systems and applications running from a host. It has the following options: Gather HBA Information Indicates that HBA information should be gathered from the host. Time offset (seconds) Time offset between the Collector and the client. ESXServer If the host is a virtual host that uses virtual disks that reside on Symmetrix or CLARiiON, the ESX server that the virtual host resides on must be specified here. ESX Server Credentials The DPA credential that contains the username and password to connect to the ESX server. EMC Data Protection Advisor Version 5.8 Administration Guide 86 Changing the default data collection settings Editing default request settings All requests have a default data gathering frequency and a set of options associated with them. When a request is assigned to a node, the request inherits the default settings unless they are over-ridden in the Node Properties dialog box. In larger environments, the user may want to assign the same request to multiple nodes. If the user wants all the requests for these nodes to have the same frequency and option settings, they can modify the default settings for the request. All nodes to which the requests are assigned are updated with the changes. 1. Log in as an administrator with the Edit Request privilege. 2. Select Tools > Request Editor. The Request List dialog box appears. 3. Use the Module list to narrow the search, or type the request name in the Name field. 4. Select the request to edit from the list and click Edit. The Request Defaults dialog box appears. Figure 3 on page 86 shows an example BackExec Job Monitor request. Figure 3 Request Defaults 5. Clear Use Default Run Settings to enable the Period and Schedule options. 6. Click Period to change the hours and minutes the Collector waits before gathering data, or click Schedule to associate the request with a schedule so that data is gathered according to the schedule. Note: Not all requests can be assigned a schedule. For example, most requests that gather data from an operating system cannot be assigned a schedule. Editing default request settings 87 Changing the default data collection settings 7. If the request has options available, select the checkbox next to the option to enable the field for editing. The available options are different for each request. The EMC Data Protection Advisor Data Collection Reference Guide lists the options for each request in DPA. 8. Click OK. 9. The Collectors for nodes that inherit the modified default values must be reloaded. After reloading, data will be gathered for nodes assigned this request at the new default frequency. EMC Data Protection Advisor Version 5.8 Administration Guide 88 Changing the default data collection settings Viewing the requests assigned to a node To view which requests are assigned to a node: 1. Right-click the node in the navigation tree. 2. Select Administration > Current Configuration. The Configuration dialog box displays the properties of the node, the requests that are assigned to it, and any analyses assigned to it. Requests can be assigned directly to a host in the Navigation tree or to a group. Requests that are assigned to a group node are inherited by any hosts within that group. Viewing the request history You can view the data gathering history for a request on a node. The request history is specific to the view in which the node is selected. To view the request history: 1. Select the node in the Navigation tree. 2. Right-click and select Administration > Properties. The Node Properties dialog box appears. 3. Click Assignations. 4. Select the requests in the Requests list for which you want to view the history. Press Ctrl and click to select multiple requests. 5. Click History. The Request History dialog box appears. The top pane shows the data gathering history from the Collector for the selected requests. 6. Increase or decrease the number of rows displayed from the Row Count field, and click Refresh. 7. The bottom pane displays the log information for the request instance selected in the top pane. Collecting data remotely 89 Changing the default data collection settings Collecting data remotely You can gather certain types of data with DPA without deploying a Collector on the monitored device. To do this, a Collector on another computer (such as the DPA Server) gathers the data remotely. When gathering data remotely, the Collectors host is referred to as a proxy server. The Collector uses a protocol to gather data from the remote computer and forwards it back to the Listener process on the DPA server. The protocol used depends on the type of data being collected. For certain devices types, such as IP and Fibre Channel switches, data must always be gathered remotely as it is impossible to install a Collector directly on a switch. To configure remote data collection within DPA, configure the details when assigning requests. If the Data Collection wizard created the nodes, this configuration is already created. However, if proxy or credential details have changed, modify the details as required. To specify remote data collection or to modify existing configuration: 1. Right-click the node in the navigation tree. Select Administration > Properties. 2. Click Assignations. 3. Select the request from the Requests list and then click Edit. The Request Settings dialog box appears. 4. Enable Proxy Host, and Browse to select from a list of defined Host nodes. 5. If the proxy host requires a username and password to authenticate, select the Credential for access to the host on which the Collector is running, or click Edit to create a new credential. You will be prompted to reload the Collectors. EMC Data Protection Advisor Version 5.8 Administration Guide 90 Changing the default data collection settings Configuring Control Panels 91 5 Configuring Control Panels Creating a Control Panel A Control Panel is a collection of reports grouped together into a single panel to provide users with multiple views of their application. 1. Log in as a user with administrative privileges. 2. Select Tools > Control Panel Editor. The Control Panel Editor appears. The Control Panel Editor consists of a Configuration region and a Control window that shows what the Control Panel looks like. At the top of the Control window is an icon toolbar for adding elements to the Control Panel. 3. Type a unique name for the Control Panel. 4. In the Spacing field, specify the minimum number of pixels by which Control Panel components must be separated. 5. Select a page shape from the Page Boundary list (for example, A4 Portrait). 6. By default, when a user clicks a report on a Control Panel, the report is launched in a separate window outside the Control Panel. This is referred to as a drill down. To change this behavior so that reports are not launched when a user clicks them, clear the Allow Drill Down checkbox. 7. Select Allow Interaction to enable users to modify and refresh reports inside the Control Panel window. By default, Allow Interaction is cleared. 8. The following sections describe how to construct a Control Panel from the elements provided: "Changing the background of a Control Panel" on page 91 "Adding a label to a Control Panel" on page 92 "Adding an image to a Control Panel" on page 92 "Adding a report to a Control Panel" on page 93 "Adding a button to a Control Panel" on page 94 Changing the background of a Control Panel To modify the appearance of a Control Panel: 1. Click Background ( ). The Control Panel background dialog box appears. 2. To select a color for the background of the Control Panel, click Color. The Color Properties dialog box appears. 3. Select the background color and click OK to return to the Control Panel background dialog box. 4. To use an image in the background, select Use Image, and click the Image field to open the Image Chooser dialog box. 5. Select one of the default backgrounds, or select the checkbox and type the URL of an image file into the field. Click OK to return to the Control Panel background dialog box. An example URL for a file on the local file system is: EMC Data Protection Advisor Version 5.8 Administration Guide 92 Configuring Control Panels file:///C:/myimage.gif 6. Select whether the image for the background is tiled, centred, or stretched to fit the size of the window from the Layout list. 7. Click OK to apply the Control Panel background settings. Adding a label to a Control Panel To add a label to a Control Panel: 1. Click Add Label ( ). 2. In the Control Panel Editor dialog box, click a location on the Control Panel to add the label. A text label is added to the Control Panel and the Label Editor dialog box appears. 3. Complete the fields described in Table 17 on page 92: 4. Click OK. The label is added to the Control Panel. Adding an image to a Control Panel To add an image to the Control Panel: 1. Click Add Image ( ). The Properties dialog box appears. 2. Select the URL checkbox and type the URL of an image file in the field. For example, an image on the local file sytem might be: file:\c:\directory name\filename.extension 3. Select the image that you want to add. Click OK. The image is added to the Control Panel Editor. 4. To move images and titles around on a Control Panel, select the component and drag it with the mouse to a different location. 5. To resize the image, select a corner and drag it, or right-click the image and select Properties. The Image Properties dialog box appears. 6. To resize and reposition the image, select values from the X, Y, Width, and Height fields. 7. Click Maintain aspect ratio to maintain the relative horizontal and vertical sizes of the image. 8. Click OK. Table 17 Label Editor fields Field Description Label Text displayed in the title. Variable The variable you want to insert in the report title (for example, Current Time or View). Insert Inserts the selected variable in to the Label field. Time Format Allows users to specify the time format to be displayed, if they have included a Time-related variable in the title. If a Time Format of Custom is selected, type the custom format (using the same syntax as other Time Formats) in the text field. Use Default Select to display the font and color for the title from the users preferences. Clear this checkbox to set the default font and color. Color and Font Select Edit to configure the Color and Font of the title. 93 Configuring Control Panels Adding a report to a Control Panel To add a report to a Control Panel: 1. To find the report, partially type the name of the report in the Find field in the Reports section on the left-hand side, or select a report Category to narrow down the search. 2. Select the report to add from the Report list on the left-hand side, and drag it to the main window. To resize or move the report, select a corner and drag it. 3. Click Properties ( ) on the Control Panel, or right-click the report window in the Control Panel and select Properties. The Report Properties dialog box appears. 4. Specify the Report Properties fields as described in Table 18 on page 93. 5. A second set of parameters enable you to configure the contents of the report within the report frame. The Report Parameters icons appear in the top right-hand side of the Control Panel as shown in Figure 4 on page 93. Figure 4 Report parameter toolbar The Report Parameters toolbar is identical to the toolbar that appears in the Report Editor when editing a report. Use this toolbar to customize the appearance of the report within the Control Panel. Any changes made using the toolbar in the Control Panel Properties dialog box apply only to the report when it runs in that particular Control Panel. Table 18 Report Properties fields Field Description X Position Controls the location of the report within the Control Panel on the x-axis. Manually set the location if you are not using the mouse. Y Position Controls the location of the report within the Control Panel on the y-axis. Manually set the location if you are not using the mouse. Width Width of the report in pixels. Height Height of the report in pixels. Border Type Select an optional border type for a report. Border Title Type the title if you are using a Border type of Titled. Time Window If selected, the report is always run against the time window specified and not any user-selected value. View Name If selected, the report is always run against the view specified rather than the view displayed by the user when running the Control Panel. Node Name If selected, the report is always run against the nodes specified rather than the nodes selected in the Navigation tree. Report Required If selected, the Control Panel is only displayed on the Navigator menu if the node against which the Control Panel is being run is gathering the data required to run the report. EMC Data Protection Advisor Version 5.8 Administration Guide 94 Configuring Control Panels The EMC Data Protection Advisor Report User Guide contains more information about configuring the appearance of a report. 6. To test a report, click Test Report ( ). The Sample Data dialog box appears. 7. Type the time window, view, and node against which to run the report. Click OK. The report runs and the output can be viewed in the Control Panel Properties dialog box. Testing a report shows how the Control Panel will look when it runs in DPA. 8. To remove a report, title, or image from a Control Panel, select the item to remove. Click Delete ( ). Adding a button to a Control Panel Buttons can be added to a Control Panel to generate reports with criteria you have predefined. To add a button to a Control Panel: 1. Click Add Button ( ), and click a location on the Control Panel editor. The Button Properties dialog box appears. 2. Complete the fields in the Button Properties dialog box according to the descriptions in Table 19 on page 94: 3. Click OK. Running a Control Panel from the navigation tree To run a Control Panel from the navigation tree, update the menu in the navigation tree so that the Control Panel is available for selection. Select Tools > Menu Editor to open the menu editor. The EMC Data Protection Advisor Product Guide provides details on adding reports to menus. Setting a Control Panel to open when a user logs in DPA can be configured so that when a user first logs in to DPA, an initial Control Panel is launched. 1. Select Tools > User Editor. The User List dialog box appears. Table 19 Button Properties Field Description X and Y Position Controls the location of the button within the Control Panel on the X and Y axes, or use the mouse to position the button. Height and Width Controls the Height and Width of the button within the Control Panel, or use the mouse to resize the button. Type Whether the button runs a Control Panel or report. Category Report category. Report Report to run if Type of Report is selected. Control Panel Control Panel to run if Type of Control Panel is selected. Window Window in which to run the report or Control Panel. View View to run the report against. Node(s) Node or nodes to run the report against. 95 Configuring Control Panels 2. Select the required user and click Edit. 3. Select Preferences in the User Properties dialog box. 4. Select a Control Panel from the Home Control Panel list. Or, to inherit the default Control Panel defined for the user role, select User Role Default. Only user-created Control Panels are available from the Home Control Panel list. 5. Click OK. 6. Restart the GUI and log in as the modified user. Editing a Control Panel 1. Select Tools > Control Panel Editor. The Control Panel Editor appears. 2. Select File > Open. The Open dialog box appears, from which you can view system Control Panels or edit user-defined Control Panels. 3. Click Dependent Items in the lower left of the editor to bring up the Dependencies dialog box. The Dependencies dialog box displays all the DPA objects with a dependent relationship on the Control Panel (for example, a menu that has the Control Panel as an option). 4. Edit the Control Panel and click OK, or select Save As to save a new Control Panel. Note: When first installed, several Control Panels are automatically installed. Do not modify these Control Panels directly. To modify a system Control Panel, open the Control Panel and select Save As to save the Control Panel under a custom name. EMC Data Protection Advisor Version 5.8 Administration Guide 96 Configuring Control Panels Deleting a Control Panel To delete a Control Panel: 1. Select Tools > Control Panel Editor. 2. Select the name of the Control Panel to delete. 3. Click Delete and confirm the Control Panel deletion. 4. Click OK. Monitoring an environment for alert conditions 97 6 Monitoring an environment for alert conditions What are rulesets and analyses? DPA compares collected data in the datamine to a set of conditions to predict and monitor alert situations that may happen. The set of conditions is defined by a ruleset and an analysis. Ruleset A ruleset is a set of instructions to the Analysis Engine to carry out certain operations and display the resulting events. For example, the file system filling up ruleset contains the set of rules to determine if any file systems will exceed a certain threshold at a certain point in the future. The file system filling up ruleset has two parameters: the maximum predicted utilization, which specifies at which utilization level you want an alert to be generated, and the Number of hours to forecast parameter, which specifies how far in the future to look. Several rulesets are available when you install Data Protection Advisor. You can use these rulesets as the basis for creating analyses. DPA provides a Ruleset Editor that you can use to create entirely new rulesets. The Ruleset Editor is discussed in "Editing an existing ruleset" on page 105. Analysis An analysis consists of the name of a ruleset along with details that specify how that ruleset is run. An analysis includes: A Schedule, which determines the hours for which the ruleset is run. A Period, which determines how often it should run within the selected schedule. Values, which are passed to the ruleset as parameters. For example, an analysis can be created specifying the file system filling up ruleset and should monitor for partitions whose utilization exceeds 90% in the next hour, every 30 minutes between 9 a.m. and 5 p.m. A set of predefined analyses are installed with DPA. Appendix A, Analysis Job Definitions provides a list of the analyses that are installed with DPA. Generating events from analysis jobs When an analysis finds a matching condition, DPA generates an event. All events are automatically logged in to the DPA database and can be viewed by running an Analysis Event report in the GUI. Analyses can generate an e-mail, send an SNMP trap, or execute a script when events occur. To monitor a node or group of nodes, you must assign an analysis to a node in the navigation tree. Analyses that are assigned to group nodes are automatically inherited by the host nodes that are children of that group. To view the analyses assigned to a node: 1. Right-click the node. 2. Select Administration > Current Configuration from the navigation tree. Assigned analyses are displayed in the Analyses region of the Configuration dialog box. To view the nodes assigned to an analysis: EMC Data Protection Advisor Version 5.8 Administration Guide 98 Monitoring an environment for alert conditions 1. Select Tools > Analysis Editor. The Analysis List dialog box appears. 2. Select the analysis for which you want to view the assigned nodes from the list. 3. Click Assigned To. The Analysis Assignations dialog box appears, showing all the nodes to which the analysis has been assigned. Assigning an analysis job to a node 99 Monitoring an environment for alert conditions Assigning an analysis job to a node There are many default analysis jobs installed with DPA that cover common alert scenarios. 1. Right-click the node to assign the analysis. 2. Select Administration > Properties from the navigation tree. The Node Properties dialog box for that node appears. 3. Click Assignations. The Analyses list shows any existing analyses assigned to the node. 4. Click Add. The Analysis List dialog box appears. 5. Search for the analysis to assign by typing part of the name in the Find field, or select a category to narrow the search. Select the desired analysis and click Select. Press Ctrl and click to select multiple analyses. When analyses are assigned to a group node, all the host nodes associated with the group inherit the groups analyses. 6. Click Edit to open the Analysis Settings dialog box and change the alerts assigned to an analysis already assigned. You can create an alert as described in "Creating an alert" on page 99. All events detected by the Analysis Engine are automatically logged to the database so that they can be viewed in reports. Each event is assigned a severity level. If an alert has not been defined with a severity level, the value in the Internal Severity field of the Analysis Settings dialog box is assigned to the alert when raised. 7. Click OK. Note: An alert can be raised if an analysis job has not run by a specified time past its configured schedule. The Delay Name and Delay Threshold (Minutes) system settings of the Analysis Engine process determine this alarm and the threshold time. Creating an alert In addition to sending alerts to its own database, DPA can send the alerts described in Table 20 on page 99. To create an alert and assign the alert to an analysis job: Table 20 Analysis engine alert types Alert type Description E-mail Sends an e-mail to the specified recipients containing details of the alert. E-mail Report E-mails a report or Control Panel to the specified recipients. SNMP Trap Sends an SNMP Trap to the specified host containing the details of the alert. Script Runs a user-configured script passing in the event details. Event Log Logs the results of an analysis in the Windows event log. EMC Data Protection Advisor Version 5.8 Administration Guide 100 Monitoring an environment for alert conditions 1. Select Assignations of the Node Properties dialog box. 2. Select the analysis from the Analyses list and click Edit. The Analysis Settings dialog box appears. 3. Click Edit. The Alert List dialog box appears. 4. Click New. The Alert Properties dialog box appears. 5. Specify the alert parameters defined in Table 21 on page 100: a. If configuring an e-mail alert, specify the e-mail parameters as defined in Table 22 on page 100: b. If configuring an alert to e-mail a report or Control Panel, specify the parameters as defined in Table 23 on page 100. Table 21 Alert parameters Parameter Definition Name Name of the alert. Description Optional description for the alert. Type Type of alert. Alert types are listed in Table 20 on page 99. Severity Severity assigned to the alert. Table 22 E-mail parameters Parameter Description To Address of the user to which the e-mail is sent. Subject Subject of the e-mail. You can include the following variables in the subject parameter to communicate information about the alert origin: @analysis@ Name of the analysis that triggered the alert. @severity@ Severity assigned to the alert. @host@ Host on which the analyis triggered the alert. For example: No Backup for Three Days triggered by @analysis@ on @host@. Table 23 E-mail report parameters (page 1 of 2) Parameter Description To E-mail address of the recipient of the report. Subject Subject of the e-mail. You can include the following variables in the subject parameter to communicate information about the alert origin: @analysis@ Name of the analysis that triggered the alert. @severity@ Severity assigned to the alert. @host@ Host on which the analyis triggered the alert. For example: No Backup for Three Days triggered by @analysis@ on @host@. Report Type Indicates whether you want to e-mail a report or a Control Panel. Assigning an analysis job to a node 101 Monitoring an environment for alert conditions Note: The report is run against the node for which the alert is generated. c. If configuring an SNMP alert, specify the SNMP parameters as defined in Table 24 on page 101. d. If configuring an alert to execute a script, type the name of the script that runs. When the analysis engine executes a script, it passes the fields in Table 25 on page 101 as parameters to the script to use to perform actions. 6. Click OK. Category Category of the report or Control Panel you want to mail. Report Name of the report you want to mail. Control Panel Name of the Control Panel you want to mail. Window Period of time over which you want to run the report. User User for which the report is run. The report is formatted with those user preferences. Table 23 E-mail report parameters (page 2 of 2) Parameter Description Table 24 SNMP parameters Parameter Description Hostname Name of the host for which the trap is issued. Community Community string that is sent in the trap. Port Port on which the trap receiver is listening. Table 25 Script field parameters Parameter Description Node Name of the node to which the alert applies. Text Textual error message as defined in the ruleset. Severity Severity of the alert. Name Name of the analysis that triggered this alert. Alert ID ID that uniquely describes this alert. Event ID ID that uniquely describes the type of alert that has occurred. First occurrence Timestamp that details the time that this alert first occurred. Last occurrence Timestamp that details the time that this alert last occurred. Count Number of times this alert has been issued. View Name of the view to which the analysis is assigned. Node Name of the node to which the analysis is assigned. Category Category of the analysis job that ran. EMC Data Protection Advisor Version 5.8 Administration Guide 102 Monitoring an environment for alert conditions Passing arguments to an alert Table 26 on page 102 describes the arguments that are passed to a script in an alert action. Table 26 Script alert arguments Argument Description $0 Event node. $1 Event message. $2 Event severity (as set in the analysis properties). $3 Name of analysis that caused the event. $4 Alert ID (unique for this run of the script). $5 Event ID (unique for this alert). $6 First occurrence (timestamp). $7 Last occurrence (always same as first occurrence). $8 Count (always 1). $9 Source view (the view to which the analysis was assigned). $10 Source node (the node to which the analysis was assigned). $11 Ruleset category. Creating an analysis job 103 Monitoring an environment for alert conditions Creating an analysis job You can create new analysis jobs by customizing an existing job. 1. Select Tools > Analysis Editor. 2. Click Assigned To to see all the nodes to which an analysis is currently assigned. 3. Click New. The Analysis Properties dialog box appears as shown in Figure 5 on page 103. 4. Specify the Analysis Properties as defined in Table 27 on page 103. 5. To create an analysis job that reports when messages are sent to any of the server log files, for example, specify the parameters shown in Figure 5 on page 103. Figure 5 Example analysis Table 27 Analysis parameters Parameter Definition Name Name of this analysis. Description Optional description of the analysis. Category Category in which the analysis is grouped. Select a value from the field or type the name of a new category. Schedule Period of time during which the analysis runs. Period Frequency with which the Analysis Engine processes the ruleset within the schedule. Ruleset Name of the ruleset that is the basis of this analysis. Options Set of options specific to the selected ruleset. Hover the mouse over the option for a description of the option. EMC Data Protection Advisor Version 5.8 Administration Guide 104 Monitoring an environment for alert conditions 6. Click OK. 7. Assign a node in the navigation tree to the analysis by following the steps in "Assigning an analysis job to a node" on page 99. Editing an analysis job To edit an analysis job: 1. Select Tools > Analysis Editor. The Analysis List dialog box appears. 2. Select the analysis job from the Analysis List dialog box and click Edit. Note: You cannot edit analysis jobs that are shipped with DPA. If a system analysis job is selected, Edit is replaced by View. Modify a system analysis by clicking Copy and editing the copy. 3. Make the desired changes and click OK. Editing an existing ruleset 105 Monitoring an environment for alert conditions Editing an existing ruleset When DPA is installed, several predefined rulesets are installed. The rulesets are used to monitor common problems in the environment. Use the DPA ruleset editor to modify and create rulesets. 1. Log in to DPA as a user with administrative privileges. 2. Select Tools > Ruleset Editor from the menu. 3. Select File > Open to launch the Open dialog box, from which you can view system rulesets or edit user-defined rulesets. System rulesets cannot be changed. To modify system rulesets, open the ruleset and select File > Save As to save the ruleset with a custom name. 4. Type part of the ruleset name into the Search field if it is known. The list of rulesets is limited to only those that contain the entered characters at any position in their name. Click Ruleset to sort the reports alphabetically. Click Editable to sort the reports to place the user-defined reports at the top of the list and the rest in alphabetical order. Note: The rulesets are also categorized. To display rulesets within a particular category, change the value in the Category field to the category that in which the report to edit is classified. To view a list of all rulesets in Data Protection Advisor, select All from the list of values in the Category field. 5. Select the ruleset and click Open. The Ruleset Editor dialog box appears as shown in Figure 6 on page 106. 6. To view the items that are dependent on a ruleset (for example, an analysis that uses the ruleset) click Dependent Items in the lower left. The Dependencies dialog box display all dependent DPA objects. The ruleset editor is graphical, and allows new rulesets to be built, or existing rulesets to be changed. A ruleset is represented as a flowchart with different elements representing the steps performed by the Analysis Engine as it evaluates the ruleset. A ruleset is built using several element types. These elements are displayed in the toolbar above the graphical editor. To add an element to a ruleset: 1. Select the element on the toolbar, and click the main pane of the Ruleset Properties dialog box. 2. Link elements to the flow chart by selecting the input port or output port of the element and dragging it to the input port or output port of the required element. 3. Select File > Export to export a single ruleset as an XML file. Rulesets must be named before being exported. EMC Data Protection Advisor Version 5.8 Administration Guide 106 Monitoring an environment for alert conditions Creating a simple ruleset The following illustrates how to use the ruleset editor to create a simple ruleset. The example ruleset generates an event for all hosts for which CPU utilization is beyond a threshold specified in the analysis job. There are several steps: "Create the ruleset" on page 106 "Specify the input parameter" on page 107 "Specify the report source parameter" on page 107 "Specify the result iteration parameter" on page 109 "Specify the condition parameter" on page 109 "Specify the alert event" on page 111 Create the ruleset 1. Select Tools > Ruleset Editor from the menu. Select File > New to create a new ruleset. The Ruleset Editor dialog box appears as shown in Figure 6 on page 106. Figure 6 Ruleset Editor 2. Type a name that uniquely identifies the ruleset in the Name field. 3. Type a description in the Description field describing the ruleset actions. Creating a simple ruleset 107 Monitoring an environment for alert conditions 4. Select a ruleset category by clicking a value from the Category field, or by typing a new category name in the field. The category helps to search for the ruleset in other areas of DPA. Specify the input parameter The Ruleset Properties dialog box contains the Input element, which is the starting point for all rulesets. An input parameter variable specifies when a user creates an analysis job using this ruleset. In this example, the user specifies the threshold on which to generate alerts as a parameter to the ruleset. 1. Right-click the input element and select Properties from the menu. The Properties Editor appears. Click Add and the Properties Editor inserts a blank line to specify the associated input parameters for the ruleset. All input parameters have a name, description, and cast. The default value is optional. The description of the parameter appears as a tool tip when a user creates an analysis job using this ruleset. The Input Property Editor is shown in Figure 7 on page 107. Figure 7 Ruleset Input Property Editor 2. In the Name field, type Maximum CPU Utilization, and type a description in the Description field. Select Int in the Cast field and set the default to an appropriate value in the Default field. 3. Click OK. The input element is updated in the Ruleset Properties dialog box to display the names of any input parameters. Specify the report source parameter The next element in any ruleset is a Report element. A report element runs one or more reports and returns the results for the remainder of the ruleset to analyze. 1. To add a report element to the ruleset, click the Report icon. Click the main panel of the Ruleset Properties dialog box and the elements are automatically connected to the nearest available node. 2. Most elements have two connectors represented by small red triangles. The triangles represent the input and output connector of the element. Connect elements by clicking and dragging the output connector of the first element to the input connector of the second element. 3. Right-click the report element and select Properties from the menu. The Property Editor dialog box appears as shown in Figure 8 on page 108. EMC Data Protection Advisor Version 5.8 Administration Guide 108 Monitoring an environment for alert conditions Note: Except for the Input element, elements must be connected for the Property Editor dialog box appear. Figure 8 Defining report element properties 4. The available data sources are displayed in the Report List. To select a report data source, scroll to the report (in the example Processor Utilization by Node) and drag the report to the Current field as shown in Figure 8 on page 108. Drag more than one report to a ruleset if required. The Property region displays the properties of the currently selected report in the Current field. The Property region allows the report to be labeled in the Name field. Run the same report twice with different input parameters, and later, uniquely identify the output of each report in the ruleset. When a report runs using the analysis engine, it requires several arguments to be passed. The Property region allows each input argument to be specified. The input arguments can be static values, typed in, or selected from the variables in the list of values. Variables are enclosed in braces. By default, several report element variables are displayed, as described in Table 28 on page 108. Table 28 Report element variables (page 1 of 2) Variable Description {The current node} Node to which the Analysis job is assigned. {The current node and all its children} Node to which the Analysis job is assigned and all of its children. {Each child of the current node (separately)} Children of the node to which the Analysis is assigned. Creating a simple ruleset 109 Monitoring an environment for alert conditions In addition to the system variables, select any input parameter created on the input element. 5. The Conditions region allows results returned from the report to be filtered. For example, to restrict alerted clients to only those that begin with the letter a, add a condition. Information that meets the set condition is passed onto the next stage of the ruleset. To set a condition, click Add to modify the Conditions region, and select the variable containing the host from the list of values in the Instance field. In this case the field is Processor Utilization By Node::Hostname. This represents the Hostname field as returned by the Processor Utilization by Node report. Specify a condition of starts with and type a in the Value field as shown in Figure 8 on page 108. 6. Click OK. Specify the result iteration parameter Specify what to do with the results. One option is to iterate over each element in the results and carry out further actions, by adding an iteration element to the ruleset. The element for iteration is the For Each element. 1. To add the For Each element to the chart, select it from the toolbar, and click the main Ruleset Properties dialog box. Connect it to the output of the report element. 2. Select the source to iterate over by right-clicking the For Each element and selecting Properties to display the Property Editor, as shown in Figure 9 on page 109. Figure 9 Property Editor 3. Accept the default in the Iterate over field and click OK. Specify the condition parameter This ruleset triggers an event if the CPU on a host is greater than a certain percentage. 1. To do this, add a condition element to the ruleset by selecting the Condition element icon on the toolbar and clicking the main Ruleset Properties dialog box. {Now} Time at which the ruleset is evaluated. {Last time the ruleset ran} Last time the ruleset was evaluated. {Interval between runs of this ruleset} Time interval between subsequent evaluations of the ruleset. Table 28 Report element variables (page 2 of 2) Variable Description EMC Data Protection Advisor Version 5.8 Administration Guide 110 Monitoring an environment for alert conditions 2. If the condition box is not automatically connected, connect it to the For Each element by clicking the connector on the For Each element and dragging it to the Condition element. The Ruleset Editor dialog box should resemble the structure shown in Figure 10 on page 110. Figure 10 Ruleset Editor condition 3. To specify the details of a condition, right-click the Condition element and select Properties. The Property Editor dialog box appears as shown in Figure 11 on page 110. Figure 11 Condition properties Creating a simple ruleset 111 Monitoring an environment for alert conditions 4. A condition consists of an instance, a relational operator, and a value. The value can be one of the variables available in the list of values or a static value. For this example, the required condition is set to {Processor Utilization By Node: Utilization} greater than {Maximum CPU Utilization}. That is, take the processor utilization variable returned from the report and compare it to the Maximum CPU Utilization parameter that we created as an input parameter to the ruleset. Click OK. A Condition element can have more than one condition. If more than one condition exists, all conditions must be met for the information to be passed to the next element in the ruleset. Specify the alert event After determining the hosts for which CPU utilization is greater than the specified amount, the Analysis Engine generates an alert event for each host. The final element of all rulesets is the Event element. 1. Click the Event icon, and then click the main Ruleset Properties dialog box. Condition elements have two outputs. The first is indicated by a green triangle and indicates the path taken if the condition is met. Attach the event condition to the green triangle. 2. Events forwarded by the Analysis Engine are sent with four pieces of information, as seen in Figure 12 on page 112: Key The Key specifies the relevant information about the node on which the analysis is run, data from the report source, or the ruleset itself (for example, the last time the ruleset was run). For example, the Backup Failed Ruleset returns in the Key the Backup Server, the Backup Client, and the Backup Job. Hostname The host or node for which the analysis is run (for example, the Hostname for a report source input of Backup Jobs Failed could be "Client"). Subname TSM instance or database instance for the which the analysis is run. Note: The subname is used only for rulesets intended to alert on TSM and Oracle, SQL Server, or PostgreSQL database instance nodes (for example, TSM Database Backup Occurred). For all other ruleset types, set Subname to the default value, none. Message The message that will be sent in the alert (for example, the content for an email alert). 3. To specify this information, right-click the Event element and choose Properties. The Event Properties dialog box appears. 4. Configure the Key, Host, and Message fields. Each field can contain a mix of text and variables that are substituted when the ruleset is evaluated. Complete the fields as shown in Figure 12 on page 112. Click Insert variable to modify the Key field and select a value from the list of values in the Host field. Type data in the Message field, and click Insert variable to insert variables in the text. EMC Data Protection Advisor Version 5.8 Administration Guide 112 Monitoring an environment for alert conditions Figure 12 Event properties The following message combines variables from the ruleset with static text. The alert message produced by the analysis engine appears similar to the following: CPU on host.emc.com is running at 94%, which is higher than 90% Note: The Message field can include XML tags. 5. After specifying the Event properties, click OK. The graphical editor displays the ruleset. 6. To complete the ruleset, be sure to define if the condition is not met by connecting an element to the red triangle on the Condition element. In this case, do not perform any action, so add the End element to the flow chart. The End element causes the analysis engine to stop processing. Click End and then click the main Ruleset Properties dialog box. Link the End element to the red triangle of the Condition element. The completed ruleset is displayed, as shown in Figure 13 on page 113. Creating a simple ruleset 113 Monitoring an environment for alert conditions Figure 13 Ruleset Editor complete 7. Save the ruleset by clicking OK. The ruleset is saved to the database. Use the ruleset as part of analysis jobs when monitoring functions. 8. Click Export to export the individual ruleset as an .xml file. The Save dialog box appears. Modify the value in the Save in field to change the location to save the file. Type a value in the File name field and click Save. Note: Individual rulesets can be imported by selecting File > Import from the menu. EMC Data Protection Advisor Version 5.8 Administration Guide 114 Monitoring an environment for alert conditions Creating complex rulesets In addition to the elements used in the CPU Busy ruleset example, you can use the Once, Variable, Branch, and Merge elements to create more complex rulesets that provide more intelligent behavior: The Once element is similar to the For Each block. However, rather than iterating over each row of the result, Once executes the remaining rule set only once. The Variable element allows new variables or functions to be defined. A variable consists of a name and its assigned value, which can be a static value the user defines or a dynamic value calculated by a function or expression. The Property Editor dialog box for the Variable element is shown in Figure 14 on page 114. Figure 14 Defining a new variable A Branch element defines multiple paths to enable you to check different conditions. An example ruleset using variables and branches to generate two different events appears in Figure 15 on page 115. Creating complex rulesets 115 Monitoring an environment for alert conditions Figure 15 A ruleset with variable and branch elements A Merge element is the opposite of the branch element. You can use it to merge different branches of the flow chart together. EMC Data Protection Advisor Version 5.8 Administration Guide 116 Monitoring an environment for alert conditions Testing a ruleset To test a ruleset: 1. Open the ruleset in the Ruleset Editor. Click Test ( ). The Parameters dialog box appears. 2. In the View field, select a view that contains the view, group, or node against which to test the ruleset. 3. In the Node field, select the view, group, or node against which to test the ruleset. 4. Set Last Run to the time that the ruleset last ran. 5. Set Current Time to the current time. Note: Modify the value of this field to test ruleset behavior. For example, if testing a ruleset for a 24 hour period and the value for the Last Run is greater than 24 hours in the past, set the value of the Current Time field to be 24 hours from the value of the Last Run field. 6. Set any other ruleset-specific input parameters fields available for the ruleset. 7. In the Log to File field, type a filename to log the test run to a file. Click Browse to navigate to an existing file, and leave the field blank to avoid logging the success or failure of the test run. 8. Click OK. The ruleset and input parameters are passed to the analysis engine and executed immediately. Analysis Job Definitions 117 A Analysis Job Definitions This appendix contains information regarding all the analysis jobs included in Data Protection Advisor and contains the following sections: Capacity planning.........................................................................................................118 Change management ....................................................................................................119 Configuration................................................................................................................ 120 Data protection ............................................................................................................. 122 Licensing........................................................................................................................ 124 Performance .................................................................................................................. 125 Provisioning.................................................................................................................. 126 Resource utilization ..................................................................................................... 127 Service Level Agreements........................................................................................... 129 Status.............................................................................................................................. 130 Troubleshooting............................................................................................................ 132 EMC Data Protection Advisor Version 5.8 Administration Guide 118 Analysis Job Definitions Capacity planning Capacity planning analysis jobs create alerts about events that indicate that resources might soon run out. Table 29 on page 118 describes these jobs. Assigning alerts for pools and storage array analysis jobs When assigning the following analysis jobs to nodes, the recommended severity levels are: Pool is Filling Up Severity 3 Pool is Filled Up Severity 2 Storage Array is Filling Up Severity 1 Table 29 Capacity planning Name Description Ruleset Parameters File system May Be Full In 2 Weeks Generates alerts if a file system utilization will exceed 90% in the next 2 weeks. File system filling up Max Predicted Utilization 100% Number of hours to forecast 336 Less Than 25 Available Backup Client Licenses Generates alerts if the license only permits you to monitor less than an additional 25 computers. Running out of backup client licenses Maximum client licenses 25 NetApp May Run Out of Spare Disks in 6 Weeks Generates alerts if a NetApp may run out of spare disks in the next 6 weeks. Running out of spare disks Number of days to forecast 42 Pool is Filling Up Alerts when according to the growing trend there will not be space left on the pool for the selected time period. Pool is Filling Up Minimum Free Space Allowed 0 Days to Forecast 90 Pool is Filled Up Alerts when there is no space on the pool to physically allocate a new LUN. Pool is Filled Up Initial Consumed Capacity 3 Storage Array is Filling Up Alerts when there is no space left to allocate a new LUN on the pool and there are no free disks available on the storage array. Storage Array is Filling Up Initial Consumed Capacity 2 Tape Pool May Be Out of Empty Tapes within 6 weeks Generates alerts if there will be no empty tapes available in a tape pool within 6 weeks. Running out of empty tapes Maximum Predicted Count 0 Number of hours to forecast 1008 TSM Database May be Full in Two Weeks Generates an alert if the TSM Database is predicted to reach 100% usage within 2 weeks. TSM Database Filling Up Number of Hours to Forecast 336 Maximum Predicted Utilization 100 TSM Recovery Log May be Full in Two Weeks Generates an alert if the TSM Recovery log is predicted to reach 100% usage within 2 weeks. TSM Recovery Log Filling Up Number of Hours to Forecast 336 Maximum Predicted Utilization 100 Change management 119 Analysis Job Definitions Change management Change management analysis jobs alert about changes in the environment. Table 30 on page 119 describes these jobs. Table 30 Change management Name Description Ruleset Parameters Backup Client Configuration Changed Generates alerts if the configuration of a backup client has been modified. Backup client configuration changed N/A Backup Device Configuration Changed Generates alerts if the configuration of a backup device has been modified. Backup device configuration changed N/A Backup Group Configuration Changed Generates alerts if the configuration of a backup group has been modified. Backup group configuration changed N/A Disk Firmware Level Changed Generates alerts if the firmware level of a disk has changed. Disk firmware level changed N/A Disk Serial Number Changed Generates alerts if a disk serial number has changed. Disk serial number changed N/A NetApp Configuration Option Changed Generates alerts if one of the configuration options on a NetApp filer has changed. NetApp configuration option changed N/A Node Operating System Changed Generates alerts if the operating system of a node has changed. Node operating system changed N/A RecoverPoint Active RPA Changed Generates an alert if the active RPA has changed since the last analysis run. RecoverPoint Active RPA changed N/a RecoverPoint RPA Link Status Changed Generates an alert if the status of the RPA link has changed since the last analysis run. RecoverPoint RPA Link Status Changed N/a Tape Drive Firmware Level Changed Generates alerts if the firmware level on a tape drive has changed. Tape drive firmware level changed N/A Tape Drive Serial Number Changed Generates alerts if the serial number of a tape drive has changed. Tape drive serial number changed N/A EMC Data Protection Advisor Version 5.8 Administration Guide 120 Analysis Job Definitions Configuration The configuration analysis jobs monitor the environment for device or application configuration issues. Table 31 on page 120 describes these jobs. Table 31 Configuration (page 1 of 2) Name Description Ruleset Parameters Backup Client Inactive Generates alerts if a backup client is not scheduled to run. Backup client inactive N/A Fileserver export and LUN on same volume Generates alerts if a fileserver export is on the same volume as a LUN. Fileserver export and LUN on same volume N/A LUN on vol0 Generates alerts if a LUN has been configured on vol0. LUN on given volume Volume vol0 NetApp Autosupport Disabled Generates alerts if autosupport has been disabled on a NetApp. NetApp autosupport disabled N/A NetApp Cluster Partner Missing License Generates alerts if a NetApp cluster partner is missing a license. NetApp cluster partner missing license N/A NetApp Potential Performance Impact Generates alerts if the configuration option on a NetApp filer allows a potential performance impact. NetApp background process performance impact high N/A NetApp Volume Larger than 3TB Alert is a NetApp volume is larger than 3 TB. NetApp volume larger than recommended size Maximum capacity 3000 NetApp Volume Overallocated Generates alerts if a NetApp volume has more space allocated than available. NetApp volume overallocated N/A NetApp Volume Using Disks of Different Size Alert if a NetApp volume is using disks of different sizes. NetApp volume using disks of different size N/A NetApp vol0 has Multiple Data Disks Generates alerts if vol0 has more than 1 data disk. File system has too many data disks File system vol0 Max disks 1 Network Autonegotiation Mismatch Generates alerts if there is an autonegotiation mismatch between a host and its switch port. IP autonegotiation mismatch N/A Configuration 121 Analysis Job Definitions Network Duplex Mismatch Generates alerts if there is a duplex mismatch between node and switch. IP duplex mismatch N/A Virtual Memory Less Than 1.5x Physical Memory Generates alerts if the amount of virtual memory on a computer is less than 1.5 times the amount of physical memory. Not enough virtual memory N/A Volume Priority Not Normal Generates alerts when volume priority is set to something other than normal. Volume priority not normal N/A Table 31 Configuration (page 2 of 2) Name Description Ruleset Parameters EMC Data Protection Advisor Version 5.8 Administration Guide 122 Analysis Job Definitions Data protection The data protection analysis jobs monitor the environment for exceptions related to backup and recovery issues. Table 32 on page 122 describes the monitored jobs. Table 32 Data protection (page 1 of 2) Name Description Ruleset Parameters Application Restore Time Estimate More Than 12 Hours Generates alerts if it is estimated that it will take more than 12 hours to restore an application. Application restore time estimate too high Recovery time objective 12 hours Application Unprotected For 72 Hours Alert if an application has not had a successful backup in more than 72 hours. Application recovery point objective missed Recovery point objective 72 hours Backup Failed Alert generated if a backup fails. Backup failed N/A Backup Failed More than Twice In A Row Alert generated if a backup fails two consecutive times. Backup failed many times Maximum failures 2 Backup More Than 200% of Average Size Generates an Alert if a backup Job is double its size of its average size over the last 14 days. Backup larger than average Days of history 14 days Deviation 100% Backup Not Succeeded For At Least 3 Days Alert is generated if a host has not had a backup in the last 3 days. Backup not occurred for many days Maximum days not backed up 3 Backup Running at Same Time as TSM Server Operation Generates an alert if there were any backups completed over a period that overlapped with any of the following operations on the backup server: Delete volumes Expirations Storage pool copies Moves Database backup Migrations Reclamations Backup Running at Same Time as Server Operation None. Backup Spans More Than 3 Tapes Alert is generated if a backup spans more than 3 tapes. Backup spans multiple tapes Maximum number of tapes 3 Full Backup Less Than 50% of Average Size Generates alerts if a Full backup is less than 50% of its usual size. Full backup smaller than average Days of History 14 days Deviation 50% Full Backup Not Succeeded for At Least 14 days Generates alerts if a host has not had a successful full backup in the last 14 days. Full backup not occurred for many days Maximum Days Not Backed Up 14 Mirror Not Updated For At Least 2 Days Generates alerts if a Remote Disk Mirror has not been updated in at least 2 days. Mirror not updated for a number of hours Maximum Exposure 48 hours Data protection 123 Analysis Job Definitions More than 7 Backups Without A Full Generates alerts if there have been more than seven runs of a backup Job since the last Full backup. Too many backups without a full Maximum Non Fulls 7 No NetWorker Bootstrap Generated in Last 48 Hours Generates an alert if there has not been a NetWorker bootstrap ran in the last 48 hours. No NetWorker bootstrap generated Maximum hours without bootstrap defaults to 48 hours TSM Database Backup Running at Same Time as TSM Server Operation Generates an alert if a database backup process completed while there was other activity on the backup server, including other backups TSM Database Backup Running at Same Time as Server Operation None. TSM Database Backup Occurred in Last 24 Hours Alerts if there was a TSM database backup in the last 24 hours, or returns the last TSM backup time if there was no backup. TSM Database Backup Occurred Time - 24 Hours Table 32 Data protection (page 2 of 2) Name Description Ruleset Parameters EMC Data Protection Advisor Version 5.8 Administration Guide 124 Analysis Job Definitions Licensing The licensing Analysis jobs monitor the environment and generate alerts about licensing issues. Table 33 on page 124 describes these jobs in more detail. Run a License report by right clicking the node in the navigation tree on which the DPA server is running. In addition, the related analysis must be assigned to the DPA server. Table 33 Licensing Name Description Ruleset Parameters License Expired Generates an alert if a license in DPA has expired. License expired N/A License Will Expire in the Next Week Generates an alert if a license will expire in the next week. License nearing expiration Minimum days before expiry defaults to 7 days Performance 125 Analysis Job Definitions Performance The performance analysis jobs monitor the environment and generate performance problem alerts. Table 34 on page 125 describes these jobs in detail. Table 34 Performance Name Description Ruleset Parameters Backup Less Than 50% of Average Speed Generates an alert if the performance of a backup job is 50% less than its average over the last 2 weeks. Backup slower than average Days of history 14 Deviation 50% Backup Running For More Than 18 Hours Generates an alert if a backup has been running for more than 18 hours. Backup overrunning Max Runtime 18 hours Fileserver Cache Hit Rate Below 80% Generates alerts if the cache hit rate of a fileserver drops below 80%. Fileserver cache hit rate low Minimum cache hit rate 80% Full Backup Ran At Less Than 300 KB/sec Generates an alert if a full backup ran at less than 300 KB/sec. Full backup succeeded but slow Minimum expected speed 300 KB/sec EMC Data Protection Advisor Version 5.8 Administration Guide 126 Analysis Job Definitions Provisioning The provisioning analysis jobs generate alerts about events that might require provisioning operations. Table 35 on page 126 describes the jobs. Table 35 Provisioning Name Description Ruleset Parameters File system Peak Snapshot Usage Below 80% Generates alerts if the peak snapshot usage over the last 14 days is less than 80%. File system snapshot space under utilized Days to examine usage 14 Minimum peak snapshot usage 80% NetApp Has No Spare Disks Generates an alert if a NetApp has run out of spare disks. Few spare disks Minimum Spares defaults to 0 Resource utilization 127 Analysis Job Definitions Resource utilization Resource utilization Analysis jobs generate alerts about events that have occurred because of resource utilization problems within the environment. Table 36 on page 127 describes these jobs in detail. Table 36 Resource utilization (page 1 of 2) Name Description Ruleset Parameters Aggregate Snapshot Utilization Above 90% Generates an alert if an aggregate snapshot utilization is higher than a specified threshold. Aggregate snapshot utilization high Maximum aggregate snapshot utilization default is 90% CPU Utilization At Least 90% For Last 30 Minutes Generates an alert if the CPU Utilization on a host is greater than 90% for last 30 minutes. CPU pegged Maximum CPU utilization defaults to 90% Number of minutes 30 minutes Disk Activity At Least 90% For Last 30 Minutes Generates an alert if a disk on a host is greater than 90% busy for over 30 minutes. Disk pegged Maximum Disk Busy Percentage 90% Number of minutes defaults to 30 minutes Fibre Channel Port Above 70% of Rated Throughput Generates an alert if a Fibre Channel port exceeds 70% of its max throughput. Fibre Channel port utilization high Maximum utilization 70% Fibre Channel Port Out of BB Credits Generates an alert if a Fibre Channel port has ran out of buffer to buffer credits. Fibre Channel port no BB credits N/A File system File Utilization High Generates an alert if the number of files on a file system is greater than 90% of the max number allowed. File system file utilization high Maximum file system file utilization 90% File system Snapshot Utilization Above 90% Generates an alert if a file systems snapshot utilization is above 90%. File system snapshot utilization high Maximum file system snapshot utilization defaults to 90% File system Utilization Above 90% and Increasing Generates alerts if a file system utilization is above 90% and is increasing. File system utilization high and increasing Maximum file system utilization defaults to 90% Memory Utilization Above 90% Generates an alert if memory utilization on a host is greater than 90%. Memory utilization high Maximum memory utilization defaults to 90% NetApp Cluster Pair CPU Overloaded Generates an alert if a clustered pair of NetApps have a combined CPU utilization of greater than 100%. NetApp cluster pair joint CPU high Maximum CPU defaults to 100% Network Interface Above 70% of Rated Throughput Generates an alert if a network interface exceeds 70% of its rated throughput. Network utilization high Maximum utilization defaults to 70% EMC Data Protection Advisor Version 5.8 Administration Guide 128 Analysis Job Definitions NetApp Volume Would Benefit from More Disks Generates an alert if the Data or Parity disks are busy due to high activity. NetApp volume would benefit from more disks Maximum Activity defaults to 90% RecoverPoint Journal Utilization High Generates an alert if the journal utilization for an RPA is above a specified warning or critical threshold. RecoverPoint Journal Utilization High Warning threshold Critical Threshold RecoverPoint RPA SAN Usage High Generates an alert if the SAN utilization for an RPA is above a specified warning or critical threshold. RecoverPoint Journal Utilization High Warning threshold Critical Threshold RecoverPoint RPA WAN Usage High Generates an alert if the WAN utilization for an RPA is above a specified warning or critical threshold. RecoverPoint RPA WAN Usage High Warning threshold Critical Threshold RecoverPoint Replication Lag High Generates an alert if the replication time or data lag is above a specified warning or critical level. RecoverPoint Replication Lag High Time Lag Warning threshold Time Lag Critical Threshold Data Lag Warning threshold Data Lag Critical Threshold TSM Database Utilization Higher than 90% Generates an alert if the TSM Database utilization exceeds 90%. TSM Database Utilization High Maximum Database Utilization 90% TSM Expiration Process Duration Exceeds Expectation Generates an alert if the TSM Expiration process take longer than an hour to run, or more than 25% longer that the average expiration process time over the last seven days. Expiration Process Duration Exceeds Expectation % Increase 25% Period 7 Max Duration 1 TSM Recovery Log Utilization Higher than 90% Generates an alert if the TSM Database utilization exceeds 90% TSM Recovery Log Utilization High Maximum Recovery Log Utilization 90% Table 36 Resource utilization (page 2 of 2) Name Description Ruleset Parameters Service Level Agreements 129 Analysis Job Definitions Service Level Agreements Service Level Agreement (SLA) analysis jobs generate alerts about SLA violations. Table 37 on page 129 describes the SLA jobs. Table 37 Service Level Agreement Name Description Ruleset Parameters Backup Succeeded But Did Not Meet SLA Requirements Generates an alert if a backup was successful but outside of its backup window. Backup succeed but failed SLA requirements N/A EMC Data Protection Advisor Version 5.8 Administration Guide 130 Analysis Job Definitions Status Status category analysis jobs generate alerts when there is concern of the current status of a monitored device or application match. Table 38 on page 130 describes status jobs. Table 38 Status (page 1 of 2) Name Description Ruleset Parameters Backup Server Errors Generates an alert if a backup server error is logged (TSM only). Backup server errors N/A CPU Offline Generates an alert if a CPU is offline. CPU offline N/A Collector Heartbeat Failed Generates an alert if a collector fails to send in its heartbeat. Collector heartbeat failed N/A Collector Log File Message Alerts on any message that appears in the collector log files. Collector Log Messages N/A Disk Failed Generates an alert if a disk has failed. Disk failed N/A EDL Failover occurred Generates an alert if one EDL appliance fails over to another. EDL Failover Occurred N/A Fan Inactive Generates an alert if a fan on a device is inactive. Fan inactive N/A Fibre Channel Port Changed State Generates an alert if a Fibre Channel port has changed state. Fibre Channel port changed state N/A Less than 75% of Backup Devices Available Generates an alert if less than 75% of the backup devices on a backup server are Up. Less than x% of backup devices available Lowest backup device availability defaults to 75% More Than 3 Backup Devices Unavailable Generates an alert if there are more than 3 backup devices on a backup server Down. Many backup devices unavailable Maximum number of downed devices 3 Network Interface Changed State Generates an alert if network interface gets a link up or link down event. Network interface changed state N/A Node Restarted Generates an alert if a host has been rebooted. Node restarted N/A Node Status not Up Generates an alert if a nodes status changes to anything except active. Node Status not Up N/A PSU Inactive Generate an alert if a Power Supply Unit is not active. PSU inactive N/A Publisher Hung Generates an alert if the Publisher queue hasnt changed since the last poll. Publisher Queue Hung N/A Server Log File Message Alerts on any messages appearing in server log files. Server Log Messages N/A Status 131 Analysis Job Definitions Tape Drive Needs Cleaning Generates an alert if a tape drive needs cleaning. Tape drive needs cleaning N/A Tape Drive Not Okay Generates an alert if a tape drive is reporting a status other than OK. Tape drive not okay N/A Tape Library Not Okay Generates an alert if a tape library is reporting a status other than OK. Tape library not okay N/A Thermometer Inactive Generates an alert if a thermometer becomes inactive. Thermometer Inactive N/A Thermometer Overheating Generates an alert if a thermometer on a device indicates that it is overheating. Thermometer overheating N/A Waiting For Writable Tapes For More Than 30 Minutes Generates an alert if a backup server has been waiting more than 30 minutes for a writable tape. Waiting for writable devices Maximum outstanding devices defaults to 0 Minutes before alerting defaults to 30 minutes Xsigo Fan Less Than 90% of Normal Speed Generates an alert if the speed of a fan on a Xsigo Director falls below 90% of the normal speed. Xsigo Fan Speed Less than Expected Percentage to Check defaults to 90%. Table 38 Status (page 2 of 2) Name Description Ruleset Parameters EMC Data Protection Advisor Version 5.8 Administration Guide 132 Analysis Job Definitions Troubleshooting The troubleshooting analysis jobs provide help for troubleshooting problems with there environment. Table 39 on page 132 describes these jobs. Table 39 Troubleshooting (page 1 of 2) Name Description Ruleset Parameters Backup Failed Due to Client Network Errors Generate an alert if a backup failed on a client while it experienced an increase in network errors. Backup failed due to client network errors N/A Backup Failed Due To High Client CPU Utilization Generate an alert if a backup failed on a client, while the CPU utilization on the computer was greater than 90%. Backup failed due to high client CPU utilization Maximum processor utilization defaults to 90% Backup Failed Due To High Client Memory Utilization Generates an alert if a backup failed on a client whilst the memory utilization on that client was greater than 90%. Backup failed due to high client memory utilization Maximum memory utilization defaults to 90 Backup Failed Due To High Server CPU Utilization Generates an alert if a backup failed on a client whilst the CPU utilization on the backup server was greater than 90%. Backup failed due to high server CPU utilization Maximum processor utilization defaults to 90% Backup Failed Due to High Server Memory Utilization Generates an alert if a backup fails whilst the memory utilization on the backup server is greater than 90%. Backup failed due to high server memory utilization Maximum memory utilization defaults to 90% Backup Failed Due to Server Network Errors Generates an alert if a backup failed while there was an increase in the number of network errors on the backup server. Backup failed due to server network errors N/A Disk Failed For More Than 48 Hours Generates an alert if a disk is in a failed state for more than 48 hours. Disk failed for a number of hours Maximum failure time defaults to 48 hours Fibre Channel Port Reporting Errors Generates an alert if a Fibre Channel port is reporting errors. Fibre Channel port reporting errors N/A Fibre Channel Port Reporting Errors On More Than 1% Frames Generates an alert if more than 1% of all frames going through a Fibre Channel port have errors. Fibre Channel port reporting more than x% errors Maximum percentage errors defaults to 1% Troubleshooting 133 Analysis Job Definitions Network Interface Reporting Errors Generates an alert if errors are being seen on a network interface. Network interface reporting errors N/A Network Interface Reporting Errors On More Than 1% Packets Generates an alert if more than 1% of the packets travelling through a network interface have errors. Network interface reporting more than x% errors Maximum percentage errors defaults to 1% Tape Drive Reporting Errors Generates an alert if there is an increase in the number of errors seen on a tape drive. Tape drive reporting errors. Include Recoverable Errors defaults to False Table 39 Troubleshooting (page 2 of 2) Name Description Ruleset Parameters EMC Data Protection Advisor Version 5.8 Administration Guide 134 Analysis Job Definitions Exporting and importing DPA configuration 135 B Exporting and importing DPA configuration This appendix describes how to import and export the WDS file from the Data Protection Advisor GUI. The WDS file is a file format for importing or exporting DPA configuration (such as user profiles, custom reports, request settings). EMC Data Protection Advisor Version 5.8 Administration Guide 136 Exporting and importing DPA configuration Working with the WDS file Export and import the WDS file to transfer elements from one installation to another. For example, transfer a set of custom report from one DPA installation to another, or export the WDS file to send to EMC Support for troubleshooting. Importing the WDS file 1. Select File > Import. The Open dialog box appears. 2. Navigate to the location of the WDS file to import. 3. Click Open. The Import dialog box appears. The following read-only fields are displayed: The Import Name field displays the name of the WDS file. The Import Description field displays the name of the server from which the WDS file was exported. The Import Version field displays the version of DPA from which the WDS file was exported. The Import Terminology field displays the GUI terminology used by the DPA server from which the WDS file was exported. The Destination Terminology field displays the GUI terminology used by the DPA server to which you are importing the WDS file. 4. The Element field displays the name of the DPA element. The Content field displays at what level the element was exported. To exclude an element from import, deselect it in the Import field. To include or exclude all elements, use the Select All and Deselect All buttons. 5. Click OK. Exporting the WDS file 1. Select File > Export. The Export dialog box appears. 2. In the Export Name field, type a value. This value appears in the Import Name field in the Import dialog box when the WDS file is imported. 3. In the Export Description field, type a description for the exported WDS file. The default value is the name of the server on which the DPA GUI is running and the date on which the export is created. 4. In the File name field, type the filename for the .wds file. 5. Select Browse to choose a location to save the .wds file. If a location is not specified, the file is saved to C:\Documents and Settings\[user]\Desktop. 6. In the Export field, select the level from the list of values to export the associated element. Values include: None. Do not export this element. User. Export only the user-created objects. System. Export only the system objects (objects shipped with the base installation). All. Export both user-created and system objects. Use the Set All list box to set a value for all export elements. 7. Click OK. Available Command Line Operations 137 C Available Command Line Operations This appendix describes administrator utilities that are available from the command line: Exporting the WDS file from the command line ..................................................... 138 Running reports from the Publisher.......................................................................... 140 Changing the terminology in the GUI ...................................................................... 143 Loading historical backup job data ........................................................................... 144 EMC Data Protection Advisor Version 5.8 Administration Guide 138 Available Command Line Operations UNIX users UNIX users must source the DPA config file before running any of the command line operations. To source the config file, navigate to the etc folder of the DPA installation directory and run the command as follows: cd <DPA install dir>/etc . ./dpa.config Exporting the WDS file from the command line Run the exportWDS.bat (on Windows) and exportWDS.sh (on UNIX) shell scripts to launch the exportWDS Java application. Navigate to the directory in which the exportWDS.bat or exportWDS.sh files are located. On Windows, the exportWDS.bat file is located in the top level folder of the installation directory; for example, C:\Program Files\EMC\DPA. On UNIX, the exportWDS.sh file is located in the bin folder of the installation directory. The command syntax is as follows: exportWDS <options> [WDS file] Options include: -h Shows the help and usage message. -c Controller to export from. -p Port number of the controller. Defaults to 3916. -n Name for the WDS file. Optional. -d Description for the WDS file. Optional. -b If set, exports everything to the WDS file. Default option. -u Comma-separated list of objects whose user-created elements are exported. -s Comma-separated list of objects whose predefined elements are exported. -a Comma-separated list of objects whose user-created and predefined (system) elements are exported. Available elements include the following: Analysis Assigned Analyses Assigned DB Maintenance Plans Assigned Request Attribute Control Panel DB Maintenance Plan Menu Module Node Report Report Operator Report Source Request Exporting the WDS file from the command line 139 Available Command Line Operations Ruleset Schedule Scheduled Report User View Window and Time Replace <WDS file> with the name of the WDS file to export. If no name is given, a file with the name export <timestamp>.wds is generated. For example, to export all the elements from the Data Protection Advisor Server host called DataProtectionAdvisor_host, type the following command: exportWDS.bat -c DataProtectionAdvisor_host -p 3916 -b To export the user-defined Analyses and Control Panels into an exported.wds file, type the following command: exportWDS.bat -c DataProtectionAdvisor_host -p 3916 -u "analysis,Control Panel" -n exported.wds EMC Data Protection Advisor Version 5.8 Administration Guide 140 Available Command Line Operations Running reports from the Publisher Reports can be run from the command line that are either saved to disk or sent as e-mail. This allows on-demand reports to run from other scripts or applications without having to wait for a scheduled event to occur. Creating the script or batch file To run a report, create a shell script or batch file with the following settings: java -Xmx512m -classpath <class path> com.sysdm.wysdm.publisher.Main -r reportname -v view -n node [ -c nodetype -P partOfNode ] -t timeperiod [ -F format ] [ -w -f filename ] [ -m mailaddress -s subject ] -u username -p password UNIX and Windows differences On Windows, only double quotes should be used in the above command in the batch file. On UNIX, only single quotes should be used. <class path> should be the equivalent of CPATH on Windows and $CLASSPATH on UNIX. The following options must be set: -r Name of report to be run. This is the name of the report, not the scheduled report. -v Name of view to run the report in (for example, Basic). -n Name of node to run the report against. -t Time window to run the report against (for example, Last Day). The following are optional: -c Node type. Used to specify the type of node when reporting on more complex node types, such as file systems. -N Path to a file containing a list of nodes. Each line in the file represents a node. Each line should be in the format: nodename, [type], [partOfNode]. Some file examples are: auwysdmnivd1c or auwysdmnivd1c, Host or C:, Filesystem, auwysdmnivd1c or C:, Filesystem, auwysdmnivd1c D:, Filesystem, auwysdmnivd1c E:, Filesystem, auwysdmnivd1c -P Parent node of the node to node to report against. -F Format in which you want the report to be displayed: csv, jpg, pdf, xml, html. The format defaults to HTML if not specified. -w Specify if you want publisher to save the report to disk. - f Name of file for the report to be created, as specified by the w option. Running reports from the Publisher 141 Available Command Line Operations Note: This is stored relative to the Doc Root setting of the Publisher. -m Email address of the user you want to receive a report using e-mail. -s Subject to be specified in email. -u Username of a DPA administrator. -p Password for the username. The following is the list of valid node types than can be used with the -c flag: Root, Group, Query-Single,Query-Multi, Host, TapeLibrary, IPSwitch, FCSwitch, EDL, EDL3D,Data Domain, Celerra, NetApp, RecoverPoint, NearStore, Fujitsu ETERNUS CS, ArcServe, Avamar, DataProtector, NetWorker, TSM, NetBackup, PureDisk, BackupExec, CommVault, MSExchange, MSSQLServer, OracleDB, PostgreSQL, ACSLS, ECC, HPCommand View, vCenter, HomeBase, Other Application, Symmetrix, Clariion, HPEVA, VirtualHost, VirtualTapeDrive, VirtualTapeLibrary, NetworkShare, LUN, vFiler, qTree, Aggregate, VolumePriority, DataMover, FCPort, Filesystem, NetInt, Disk, iSCSI, Process, TapeDrive, BackupClient, BackupGroup, BackupPool, BackupLib, BackupDev, BackupJob, MSExchangeStorageGroup, MSSQLServerDB, RPConsistencyGroup, RPSite, RPSplitter, RPA, RPConsistencyGroupCopy, VirtualDataMover. Setting the classpath The classpath environment variable must be set to include the following jar files that are distributed with Data Protection Advisor: DPA_Publisher.jar, xercesImpl.jar, resolver.jar, xml-apis.jar, log4j-1.2.15.jar, jcchart.jar, jcelements.jar, jcfield.jar, jctable.jar, mail.jar, activation.jar, jargs.jar, commons-collections-3.1.jar, commons-logging.jar, ecs-1.4.2.jar, gef.jar, jakarta-oro-2.0.8.jar, jcchart3dj2d.jar, snmp4_13.jar, tablelayout.jar, vecmath.jar, velocity-1.3.1.jar, foxtrot.jar, winlaf-0.5.1.jar, jcpagelayout.jar, itext-2.0.0.jar bcprov-jdk14-138.jar, simple-xml-2.3.3.jar EMC Data Protection Advisor Version 5.8 Administration Guide 142 Available Command Line Operations Example The following is an example Windows batch file running the Publisher from the command line. The batch file runs the Backup All Jobs report from the myhost node in the Configuration view, publishes the report to HTML, and saves the report as a file called BackupAllJobsForMyHost.html. SET JARDIR=C:\Program Files\EMC\DPA\webapps\root\WEB-INF\lib SET CPATH=%JARDIR% SET CPATH=%CPATH%;%JARDIR%\plugins SET CPATH=%CPATH%;%JARDIR%\DPA_Publisher.jar SET CPATH=%CPATH%;%JARDIR%\xercesImpl.jar SET CPATH=%CPATH%;%JARDIR%\resolver.jar SET CPATH=%CPATH%;%JARDIR%\xml-apis.jar SET CPATH=%CPATH%;%JARDIR%\log4j-1.2.15.jar SET CPATH=%CPATH%;%JARDIR%\jcchart.jar SET CPATH=%CPATH%;%JARDIR%\jcelements.jar SET CPATH=%CPATH%;%JARDIR%\jcfield.jar SET CPATH=%CPATH%;%JARDIR%\jctable.jar SET CPATH=%CPATH%;%JARDIR%\mail.jar SET CPATH=%CPATH%;%JARDIR%\activation.jar SET CPATH=%CPATH%;%JARDIR%\jargs.jar SET CPATH=%CPATH%;%JARDIR%\commons-collections-3.1.jar SET CPATH=%CPATH%;%JARDIR%\commons-logging.jar SET CPATH=%CPATH%;%JARDIR%\ecs-1.4.2.jar SET CPATH=%CPATH%;%JARDIR%\gef.jar SET CPATH=%CPATH%;%JARDIR%\jakarta-oro-2.0.8.jar SET CPATH=%CPATH%;%JARDIR%\jcchart3dj2d.jar SET CPATH=%CPATH%;%JARDIR%\snmp4_13.jar SET CPATH=%CPATH%;%JARDIR%\tablelayout.jar SET CPATH=%CPATH%;%JARDIR%\vecmath.jar SET CPATH=%CPATH%;%JARDIR%\velocity-1.3.1.jar SET CPATH=%CPATH%;%JARDIR%\foxtrot.jar SET CPATH=%CPATH%;%JARDIR%\winlaf-0.5.1.jar SET CPATH=%CPATH%;%JARDIR%\jcpagelayout.jar SET CPATH=%CPATH%;%JARDIR%\itext-2.0.0.jar SET CPATH=%CPATH%;%JARDIR%\bcprov-jdk14-138.jar SET CPATH=%CPATH%;%JARDIR%\simple-xml-2.3.3.jar "C:\Program Files\EMC\DPA\_jvm\bin\java.exe" -Xmx512m -classpath "%CPATH%" com.sysdm.wysdm.publisher.Main -r "Backup All Jobs" -v Configuration -n myhost -t "Last Hour" -F html -w -f BackupAllJobsForMyHost.html -u administrator -p administrator Changing the terminology in the GUI 143 Available Command Line Operations Changing the terminology in the GUI During installation, Data Protection Advisor prompts for the data protection and storage terminology to use in the GUI: EMC NetWorker or generic terminology. Data Protection Advisor provides a command line utility called TermConvert that can change the GUI terminology after installation. TermConvert is located in the DPA installation directory and has the following parameters: -c Controller hostname. This parameter is mandatory. -p Controller port. The port defaults to 3916. -U Username. This parameter is mandatory, and the user must have administrator privileges -P Password. This parameter is mandatory. -t Terminology to convert to. This parameter is mandatory. Valid values are Generic and NetWorker. For example: TermConvert -c myhost -p 3916 -U administrator -P administrator -t Generic The utility converts all reports, report sources, report operators, menus, control panels, analyses, and rulesets in the GUI to the new terminology. EMC Data Protection Advisor Version 5.8 Administration Guide 144 Available Command Line Operations Loading historical backup job data Once a backup application node is created and requests are assigned, the Collector immediately begins gathering data on backup jobs to store in the database. However, the Collector also can gather data on backup jobs that were run prior to node creation in Data Protection Advisor. To load historical backup job data, run the Collector binary from the command line with the following parameters: -e Executes module function. Mandatory. -m <module name> Backup application to gather historical data from. Mandatory. Possible values include: Avamar Backup Exec DataProtector NetWorker NetBackup TSM Module options applicable to the request (eg. timeformat) may also need to be specified explicitly on the command line in order to ensure consistent behaviour with "normal" data collection. Specifically, in the case of the DataProtector jobmonitor request, the occupancy option must be specified explicitly if you want historic data to be included in occupancy calculations. The DPA Data Collection Reference Guide provides more information on options. The Job Monitor section provides more information on the occupancy option. -f <function name> Name of data gathering function to execute. Always jobmonitor. Mandatory. -t <target host> Host address of backup application server. The default is localhost. l <listener hostname> Host address of DPA Listener to send gathered data. L <listener port> Port number of Listener. The default is 4001. -B <start time> Start time from which to gather backup jobs. The format is dd/mm/yyyy hh:mm:dd. -E <end time> End time from which to gather backup jobs. The format is dd/mm/yyyy hh:mm:dd. The start and end times can also be in UNIX epoch time format. If <start time> is specified and <end time> is not, <end time> is set to the current time (all the backup jobs that end after <start time> will be included). If <end time> is specified and <start time> is not, <start time> is set to 0 (all the backup jobs that end before <end time> will be included). -i TSM instance name (TSM only). -U Username to connect to the backup application (TSM and Avamar only). -P Password to connect to the backup application (TSM and Avamar only). The following example collects backup job data run between 20:15 to 23:15 on 10/09/2008 from a NetBackup server on NBUmaster. The data collected is forwarded to the Listener on the same host: Loading historical backup job data 145 Available Command Line Operations DPA_Collector.exe -e -m netbackup -f jobmonitor -t NBUmaster -l NBUmaster -L 4001 -B "10/09/2008 20:15:00" -E "10/09/2008 23:15:00" If the -l and -L parameters are omitted, the Collector will not send the jobs to the listener and will not update the database. This can be used to test gathering data before committing data to the database. Job summary reports The job summary reports provide overviews of the totals of backup and maintenance jobs (such as all jobs, successful jobs, failed jobs) that have occurred on backup servers. The summary reports rely on the most up-to-date data in the database to produce accurate summary results. While historical backup job data is loading using the collector command line options, summary reports may display inaccurate totals. It is best to wait until all historical job data is loaded before running summary reports for the loaded historical periods. EMC Data Protection Advisor Version 5.8 Administration Guide 146 Available Command Line Operations EMC Data Protection Advisor Version 5.8 Administration Guide 147 A Alert Parameters 100 analysis 97 Analysis assigned 97 Analysis Engine 97 Analysis Job creating 99 Analysis Parameters 103 authentication settings 13 B Backup Applications 29 Branch Elements 115 C Collector reloading 83 Collector process reloading 83 Config file, sourcing 138 Control Panel creating 92 Deleting 96 editing 95 E E-mail Parameters 100 EMC ControlCenter monitoring 24, 26 EMC Disk Library 54 encryption 14 key algorithm 14 key generation 15 key strength 14 ETERNUS CS 55 Event Properties dialog box 112 F Fibre Channel Switches 50 H Historical backup data, loading 144 HP Commandview monitoring 58 I IP Switches 50 L licenses, data collection wizard 18 N NetApp NearStore 55 NetBackup configuring authentication 36 NetWorker 31 P ports, configuring 9 ports, GUI 10 ports, recoverability analysis 20, 21 processes, ports 9 processes, ports required 10 Publisher command-line 140 PureDisk 37 R RecoverPoint, monitoring for Storage Arrays 28 Remote Data Collection 89 Remote Windows host monitoring 45 Report Element Conditions 109 Report Element Properties defining 108 Report Element Variables 108 Request assigning 82 unassigning 83 request default settings 86 request history 88 Index EMC Data Protection Advisor Version 5.8 Administration Guide 148 Index requests, data gathering 86 Ruleset adding report elements 107 creating a simple 106 ruleset 97 Ruleset Basics 105 Ruleset Event Element 111 S Script Field Parameters 101 security, server processes 13 SNMP community string 48 SNMP Parameters 101 Solutions Enabler 24, 26 Symantec NetBackup 36 System Monitoring 45 System Monitoring Modules 45 T Tape Libraries 48 Tivoli Storage Manager 33 V VMware monitoring 59 W WDS file export values 136 exporting 138 exporting via GUI 136 importing via GUI 136 X Xsigo Director configuring data monitoring 51