100
EMC Corporation 171 South Street Hopkinton, MA 01748-9103 Corporate Headquarters : (508) 435-1000, ( 800) 424-EMC2 Fax : (508) 435-5374 Service : (800) SVC-4EMC EMC ControlCenter Version 5.0 INTRODUCTION P/N 300-000-295 REV A01

Control Center Introduction 5.0 A01

Embed Size (px)

Citation preview

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 1/100

EMC Corporation171 South Street

Hopkinton, MA 01748-9103

Corporate Headquarters : (508) 435-1000, (800) 424-EMC2

Fax : (508) 435-5374 Service : (800) SVC-4EMC

EMC ControlCenterVersion 5.0

INTRODUCTION

P/N 300-000-295

REV A01

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 2/100

EMC ControlCenter Version 5.0 Introduction ii

Copyright © 2001 EMC Corporation. All rights reserved.

Printed December, 2001

EMC believes the information in this publication is accurate as of its publication date. The information issubject to change without notice.

THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NOREPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THISPUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY ORFITNESS FOR A PARTICULAR PURPOSE.

Use, copying, and distribution of any EMC software described in this publication requires an applicablesoftware license.

Trademark Information

EMC2, EMC, MOSAIC:2000, Symmetrix, and CLARiiON are registered trademarks and EMC Enterprise Storage, The Enterprise Storage Company, TheEMC Effect, Connectrix, ControlCenter, EDM, SDMS, SRDF, TimeFinder, PowerPath, InfoMover, Farpoint, EMC Enterprise Storage Network, EMCEnterprise Storage Specialist, EMC Storage Logic, Universal Data Tone, E-Infostructure, and Celerra are trademarks of EMC Corporation.

AIX is a registered trademark of International Business Machines Corporation.

Compaq and the names of Compaq products referenced herein are either trademarks and/or service marks or registered trademarks and/or servicemarks of Compaq.

Computer Associates is a trademark of Computer Associates International, Inc.

DB2 is a registered trademark of IBM Corporation.

ESCON is a registered trademark of IBM Corporation.

HP-UX is a registered trademark of Hewlett-Packard Company.

IBM is a registered trademark of International Business Machines Corporation.

 Java is a trademark of Sun Microsystems, Inc.

Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation.

MVS is a trademark of International Business Machines Corporation.

NetView is a registered trademark of IBM in the United States.

Novell is a registered trademark of Novell, Inc., in the United States and other countries.

OpenView is a registered trademark of Hewlett-Packard Company.

Oracle is a registered trademark of Oracle Corporation.

SCSI is a registered trademark of Security Control Systems, Inc.

Solaris is a registered trademark of Sun Microsystems, Inc.

Tivoli is a trademark of Tivoli Systems, Inc., an IBM Company.

Unicenter TNG is a registered trademark of Computer Associates International, Inc.

All other trademarks used herein are the property of their respective owners.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 3/100

EMC ControlCenter Version 5.0 Introduction  iii

Preface........................................................................................................................... vii

Chapter 1 EMC ControlCenter Overview

What Is EMC ControlCenter? ........................................................ 1-2End-to-End Management ........................................................ 1-2Heterogeneous Environments ................................................ 1-3Typical Management Tasks ..................................................... 1-4

How Does ControlCenter Work?................................................... 1-6Console Tier............................................................................... 1-6Infrastructure Tier: ECC Server, Repository, and Store....... 1-7Agent Tier .................................................................................. 1-7

Customer Storage Environment ............................................. 1-8How Do I Use ControlCenter? ....................................................... 1-9Console Window..................................................................... 1-10

Chapter 2 EMC ControlCenter Architecture

Console .............................................................................................. 2-2ECC Server ........................................................................................ 2-3

Repository ......................................................................................... 2-4How ControlCenter Models the Storage Environment....... 2-4Store ................................................................................................... 2-6Agents................................................................................................ 2-7

Types of Agents......................................................................... 2-8What Do Agents Do?.............................................................. 2-12

Deployment of EMC ControlCenter ........................................... 2-16Scalability................................................................................. 2-19

Contents

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 4/100

EMC ControlCenter Version 5.0 Introduction iv

Contents

Chapter 3 EMC ControlCenter Tasks

Introduction...................................................................................... 3-2Common Views................................................................................ 3-3

Properties................................................................................... 3-3Alerts .......................................................................................... 3-4Relationships............................................................................. 3-5Performance .............................................................................. 3-6

Storage Allocation ........................................................................... 3-7Visual Storage View ................................................................. 3-7

Configure Menu........................................................................ 3-8Host Menus ............................................................................... 3-9

Monitoring...................................................................................... 3-10Topology Menu....................................................................... 3-10Topology View ........................................................................ 3-11Command History View........................................................ 3-12Physical Display View ........................................................... 3-12Monitoring Host Objects ....................................................... 3-13

Performance Management ........................................................... 3-15Optimizer Menu ..................................................................... 3-15QoS View ................................................................................. 3-15

Data Protection............................................................................... 3-17TimeFinder .............................................................................. 3-17SRDF......................................................................................... 3-20

Administration............................................................................... 3-22Security Management ............................................................ 3-22

Agents ...................................................................................... 3-24Alert Management.................................................................. 3-25Reports ..................................................................................... 3-26

Workload Analyzer ....................................................................... 3-28WLA Archiver......................................................................... 3-28WLA Data Collection Policies............................................... 3-28WLA Performance View........................................................ 3-29

Enterprise Framework Environments ........................................ 3-30SNMP Interface....................................................................... 3-30

Launching Third-Party Applications.......................................... 3-31Help ................................................................................................. 3-32

Glossary ........................................................................................................................ g-1

Index ................................................................................................................................ i-1

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 5/100

EMC ControlCenter Version 5.0 Introduction  v

Figures

1-1 ControlCenter Architecture ........................................................................ 1-61-2 EMC ControlCenter Console ...................................................................... 1-91-3 Taskbar With Monitoring Selected .......................................................... 1-10

1-4 Taskbar With Data Protection Selected ................................................... 1-111-5 Tree Panel Before and After the Hosts Folder Expanded ..................... 1-121-6 Target Panel With Physical Display View .............................................. 1-131-7 Target Panels With a Properties View and a Relationship View ........ 1-142-1 Console in the ControlCenter Architecture .............................................. 2-22-2 ECC Server in the ControlCenter Architecture ........................................ 2-32-3 Repository in the ControlCenter Architecture ......................................... 2-42-4 Store in the ControlCenter Architecture ................................................... 2-6

2-5 Agents in the ControlCenter Architecture ................................................ 2-72-6 Example Deployment of EMC ControlCenter ....................................... 2-173-1 Properties View for Storage Objects .......................................................... 3-33-2 Alerts View for Selected Symmetrix System ............................................ 3-43-3 Relationship View ........................................................................................ 3-53-4 Performance View ........................................................................................ 3-63-5 Visual Storage View of a Symmetrix System ........................................... 3-73-6 Logical Device Configuration Dialog Box ................................................ 3-8

3-7 Properties View of Host Objects ................................................................ 3-93-8 Topology View ............................................................................................ 3-113-9 Target Panel Showing Command History View ................................... 3-123-10 Monitoring Host Objects ........................................................................... 3-133-11 Host Agent Output ..................................................................................... 3-143-12 QoS Dialog Box ........................................................................................... 3-163-13 TimeFinder View ........................................................................................ 3-183-14 TimeFinder Establish Dialog Box ............................................................. 3-193-15 Target Panel Showing SRDF View ........................................................... 3-203-16 SRDF Spit Dialog Box ................................................................................ 3-21

Figures

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 6/100

vi EMC ControlCenter Version 5.0 Introduction 

Figures

3-17 Properties View of User Groups and Users ............................................ 3-233-18 Policies View ................................................................................................ 3-243-19 Properties View of a Reports Folder ........................................................ 3-263-20 General Assets Detail Report .................................................................... 3-273-21 Help Navigator ............................................................................................ 3-323-22 Introducing EMC ControlCenter Topic ................................................... 3-33

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 7/100

EMC ControlCenter Version 5.0 Introduction  vii

Preface

 As part of its effort to continuously improve and enhance the performanceand capabilities of the EMC product line, EMC periodically releases newversions of both the EMC Enginuity Operating Environment andEMC ControlCenter. Therefore, some functions described in this guide maynot be supported by all versions of Enginuity or ControlCenter currently inuse. For the most up-to-date information on product features, see your product release notes.

If an EMC ControlCenter feature does not function properly or does not function as described in this guide, please contact the EMC CustomerSupport Center for assistance.

Audience This guide is part of the EMC ControlCenter documentation set. It isintended to be read first and gives a light introduction to thecapabilities of EMC ControlCenter. It describes the purpose ofControlCenter and the business problem it is designed to solve; givesan overview of the architecture and concepts underlyingControlCenter, and provides a guided tour of the EMC ControlCenteruser interface.

Readers of this guide are expected to be familiar with these topics:

x Symmetrix operationx Web-based operating environment

Organization Here is an overview of where information is located in this guide.

Chapter 1, EMC ControlCenter Overview, provides an overview of theControlCenter capabilities.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 8/100

viii EMC ControlCenter Version 5.0 Introduction 

Preface

Chapter 2, EMC ControlCenter Architecture, describes the architectureof EMC ControlCenter and how it could be deployed in yourorganization.

Chapter 3, EMC ControlCenter Tasks, describes the five areas of storagemanagement and shows how to use the EMC ControlCenter Consoleto perform these tasks.

The Glossary defines the terms used in this guide.

RelatedDocumentation

Other guides in the EMC ControlCenter documentation set include:

x EMC ControlCenter Version 5.0 Installation and Configuration GuideA guide giving comprehensive procedures for installing andconfiguring ControlCenter components.

x EMC ControlCenter Version 5.0 Installation MapA high-level installation overview; a companion to the EMCControlCenter Version 5.0 Installation and Configuration Guide.

x EMC ControlCenter Version 5.0 User GuideA task-based guide showing how to perform data center tasksusing ControlCenter functions.

x EMC ControlCenter Version 5.0 Quick Reference Guide A set of short commonly-used procedures; a companion to theEMC ControlCenter Version 5.0 User Guide.

x EMC ControlCenter Version 5.0 Symmetrix Storage Concepts Guide 

A guide providing detailed background information for manygeneral storage concepts used by ControlCenter.

x Online HelpA comprehensive help system accessed from the Consoleproviding detailed procedure and reference documentation forall ControlCenter features. A standalone version of the helpsystem is provided on the ControlCenter Documentation CD.

x

EMC ControlCenter Version 5.0 Integration Packages Product Guide A guide describing how to integrate ControlCenter intothird-party framework applications.

x EMC ControlCenter Version 5.0 Migration GuidelinesA paper giving guidelines for migrating from ControlCenter 4.xto ControlCenter 5.0.

x EMC ControlCenter Version 5.0 Troubleshooting Guidelines 

A paper presenting descriptions and remedies to problems youmay encounter, together with a reference section with pointers tologs and other diagnostic tools.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 9/100

EMC ControlCenter Version 5.0 Introduction  ix

Preface

Conventions Used inthis Guide

EMC uses the following conventions for notes.

A note presents information that is important, but not hazard-related.

EMC uses the following type style conventions in this guide:

Where to Get Help Obtain technical support by calling your local sales office.

For service, call:

and ask for Customer Support.

AVANT 

GARDE

Keystrokes 

Palatino,boldx

Dialog box, button, icon, and menu items in textx Selections you can make from the user interface,including buttons, icons, options, and fieldnames

Palatino,italic

x New terms or unique word usage in textx Command line arguments when used in textx Book titles

Courier,italic

Arguments used in examples of command linesyntax.

Courier System prompts and displays and specificfilenames or complete paths. For example:

Server Port Number [5799]:

<ECCdirectory>/exec/start_master.csh

Courier,

boldUser entry. For example:

install_setup.sh

United States: (800) 782-4362 (SVC-4EMC)

Canada: (800) 543-4782 (543-4SVC)

Worldwide: (508) 497-7901

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 10/100

x EMC ControlCenter Version 5.0 Introduction 

Preface

Sales and CustomerService Contacts

For the list of EMC sales locations, please access the EMC home pageat:

http://www.emc.com/contact/

For additional information on the EMC products and servicesavailable to customers and partners, refer to the EMC Powerlink Website at:

http://powerlink.emc.com

 Your Comments Your suggestions will help us continue to improve the accuracy,organization, and overall quality of the user publications. Please senda message to [email protected] with your opinions ofthis guide.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 11/100

EMC ControlCenter Overview  1-1

1Invisible Body Tag

This chapter introduces EMC ControlCenter. It starts with a briefoverview of the purpose of ControlCenter; then introduces thearchitecture; and finally describes the user interface.

x What Is EMC ControlCenter?...........................................................1-2x How Does ControlCenter Work?.....................................................1-6x How Do I Use ControlCenter? .........................................................1-9

EMC ControlCenterOverview

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 12/100

1

1-2 EMC ControlCenter Version 5.0 Introduction 

EMC ControlCenter Overview

What Is EMC ControlCenter?

Today, most companies are storing ever-increasing amounts ofinformation. As enterprise storage networks become more complex,and storage devices grow in number and size, companies are facedwith the challenge of effectively managing their storage.

What do we mean by the term enterprise storage network? Anenterprise storage network (ESN) is a collection of storage

subsystems linked together to provide access to information frommultiple platforms, operating systems, and applications across anycombination of SCSI®, ESCON®, or Fibre Channel technologies. Thisconvergence of storage technology and network access creates a newmodel for information management.

End-to-EndManagement

The EMC® ControlCenter™ family of products enables you todiscover, monitor, automate, provision and report on host storageresources, networks, and storage across your entire informationenvironment from a single console.

From a single console, ControlCenter will manage or monitor:

x Storage components — such as EMC’s Symmetrix® and othervendor’s storage arrays.

x Connectivity components — such as Fibre Channel switches and

hubs.x Host components — such as host operating systems, file systems,

volume managers, databases, and backup applications.

Every physical and logical element that ControlCenter manages isknown as a managed object. From a console anywhere on the network,ControlCenter shows a consolidated view of the storageenvironment, allowing you to monitor the health of, track the status

of, report on, and control each managed object.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 13/100

1

What Is EMC ControlCenter?  1-3

EMC ControlCenter Overview

Heterogeneous

Environments

ControlCenter is designed for use in a heterogeneous environment of

multivendor storage, multivendor storage networks, andmultivendor storage hosts. Information can reside on technologicallydisparate devices running a variety of operating systems, ingeographically diverse locations.

From a single console, ControlCenter will monitor or manage thefollowing types of storage array:

x EMC Symmetrixx EMC Celerra™x EMC CLARiiON®

x Compaq® StorageWorks™x HDS™ (Sun™) 7700E, 9900™x IBM® Enterprise Storage Server™x IBM RAMAC® Virtual Array (RVA) and StorageTek® Shared

Virtual Array™ (SVA™)x Tape Management systems, including STK, VTS, CA-1, and RMM

ControlCenter will manage storage network connectivitycomponents from a variety of vendors including:

x Brocadex Connectrix™x McData™x Qlogic

ControlCenter will manage the following hosts:x Windows NT®, Windows® 2000x Solaris®, HP-UX®, AIX®

x MVS™

These different host platforms are typically running a variedassortment of host applications, for example, a Novell® file system,an Oracle® or a DB2® database, or a backup system running under

Tivoli®

Storage Manager. ControlCenter will monitor and report onthese host applications also.

The ability to manage host applications and their associated storageneeds across disparate platforms from a single interface not onlygreatly simplifies storage management tasks but makes it possible tomanage more effectively and implement cross-platform storage-widestrategies. You continue to leverage the individual strengths of eachof your storage assets while ControlCenter masks the complexity bringing all the components together in one view.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 14/100

1

1-4 EMC ControlCenter Version 5.0 Introduction 

EMC ControlCenter Overview

Typical

Management Tasks

Through its single unified front end, ControlCenter lets you perform

the full range of data storage management tasks. It doesn’t matterwhether you are concerned about data availability, data protection, ordata performance, ControlCenter presents integrated system-wideinformation.

Allocating Storage ControlCenter storage allocation operations allow you to viewavailable storage throughout the network and within individualstorage arrays. You can also perform a variety of configuration tasks

on Symmetrix storage arrays and host systems. You can:

x Bring unallocated storage online, map it to a specific hostapplication such as a database, and specify the path from the hostto the storage.

x Extend the host file system to utilize the newly allocated storage.

Monitoring YourStorage Environment

ControlCenter monitoring operations allow you to:

x Display and monitor objects in the topology and see at a glancewhere problems or errors exist.

x Drill down to display the configuration of a Symmetrix system, orexamine the vital signs of a file system or database in detail.

x Set up alerts to warn of low resources or performance hot spots orfile system capacity threshold exceptions, and define an autofix

x View details of commands issued by ControlCenter users (who,when, on which objects).

Managing thePerformance

ControlCenter performance management operations allow you to:

x Display performance statistics in table or chart form in real-timeto see where bottlenecks are occurring.

x Perform load balancing across physical disks within a Symmetrixsystem.

x Collect historical performance data to plan future capacity by

analyzing historical trends.Protecting Data ControlCenter data protection operations allow you to:

x Maintain local mirrors of selected Symmetrix devices for businesscontinuance needs.

x Establish remote mirrors to address your disaster recovery needs.x Perform and manage backups, data migration, and archiving.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 15/100

1

What Is EMC ControlCenter?  1-5

EMC ControlCenter Overview

AdministeringControlCenter

ControlCenter administration operations allow you set upControlCenter and define the scope of which is managed. You can:

x Define ControlCenter users and user groups, and define who haswhat type of access to permissions to which objects.

x Install and configure agents on hosts in the network.x Define management policies for alerts, data collection policies for

agents, and their schedules.x Define how long data is retained for in the Repository.x Make changes to the topology, for example, to change switch

settings.x Run pre-defined reports. Define custom reports or queries and

specify a schedule for running them.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 16/100

1

1-6 EMC ControlCenter Version 5.0 Introduction 

EMC ControlCenter Overview

How Does ControlCenter Work?

A ControlCenter system has a multi-tier architecture, with hosts ateach tier running different ControlCenter components that performspecific roles.

Figure 1-1 illustrates the major ControlCenter components and showstheir relationship to one another. For a detailed description of thearchitecture, refer to Chapter 2, EMC ControlCenter Architecture.

x Console tier includes:• Console• Optional applications

x Infrastructure tier includes:• ECC Server• Repository• Store

x Agent tier includes:• Master Agent• Agent(s)

Figure 1-1 ControlCenter Architecture

Console Tier The first tier of the ControlCenter architecture contains the Console.The Console is the user interface to ControlCenter through which theuser performs all tasks. At this release, many applications that wereformerly part of traditional ControlCenter have been integrated intothe Console and now form part of its core functionality.

Console Tier Infrastructure Tier Agent Tier

Customer Storage EnvironmentConsole(s)

ECC Server

Store(s)Repository

MasterAgent

Agents MasterAgent

Agents

ECC-000042

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 17/100

1

How Does ControlCenter Work?  1-7

EMC ControlCenter Overview

Infrastructure Tier:

ECC Server,Repository, andStore

The second tier of the ControlCenter architecture contains the

infrastructure components—the ControlCenter (ECC) Server,Repository, and Store.

When the user requests a view or issues a command at the Console,the request is sent to the ECC Server. The ECC Server:

x Controls who has access to ControlCenter and which componentsthey are allowed to access

x Dynamically refreshes the Console with real-time statistics, alerts,

and eventsx In response to user requests from the Console, retrieves data from

the Repository for display on the Consolex Manages commands and provides the common services that tie

the infrastructure together.

The Repository contains a relational database that holds the currentand historical data of both the storage environment and

ControlCenter itself. Most of the data is collected by the agents (see below) and includes configuration details about storage arrays, hosts,and databases; statistical data for capacity planning; alerts; anddetailed status information about any given object.

The Store is responsible for writing persistent data collected by theagents to the Repository. A ControlCenter configuration can containmultiple Stores for scalability and load balancing.

Agent Tier The third tier of the ControlCenter architecture contains the agents.ControlCenter uses intelligent agents to manage or monitor specificobject domains, such as Symmetrix storage arrays; Windows, UNIX,or MVS hosts; and Fibre Channel switches. Agents monitor the healthof the object, check for alert conditions, collect data about the object’sconfiguration and performance, and may perform active commands.

A host can run several agents, depending on the number and type ofobjects it is managing. For example, a Windows host might berunning a Storage Agent for Symmetrix, a Host Agent for Windows, aDatabase Agent for Oracle, and a Connectivity Agent for Switches.

A Master Agent runs on each agent host to manage the individualagents. Agents pass the data they collect to the Store, which writes itto the Repository. Agents can also collect transient data, such as alertsand real-time performance data, and pass this directly to the ECC

Server.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 18/100

1

1-8 EMC ControlCenter Version 5.0 Introduction 

EMC ControlCenter Overview

Customer Storage

Environment

The customer storage environment, illustrated behind the agent tier

in Figure 1-1 are the elements of the enterprise storage network thatControlCenter is designed to maintain. These include storage arrays,network switches and hubs, hosts, file systems, databases, and tapelibraries.

Although the primary user interface to ControlCenter is through the Consoleapplication, an SNMP-based Integration Gateway allows frameworkapplications such as CA Unicenter to retrieve details of ControlCenter alerts

and events. Refer to Enterprise Framework Environments on page 3-30 for moredetails.

For more information on the architecture, refer to Chapter 2, EMCControlCenter Architecture.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 19/100

1

How Do I Use ControlCenter?  1-9

EMC ControlCenter Overview

How Do I Use ControlCenter?

You use ControlCenter through an application known as the Consolethat runs in a Java™ environment. The Console application isinstalled through the host’s Web browser and subsequently startedfrom a desktop icon. It derives its data mainly from the ECC Server.

Figure 1-2 shows an example Console display.

Figure 1-2 EMC ControlCenter Console

ControlCenter can be used only by authorized users. After logging in,you can switch between different views, perhaps stepping back for

Taskbar provides access

to drop-down menus for

storage-specific tasks.

Tree panel allows you

to drill down through

folders to select

individual objects.

Target panel displays

information about the

object selected in the

tree panel, in a map,

table, or report view.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 20/100

1

1-10 EMC ControlCenter Version 5.0 Introduction 

EMC ControlCenter Overview

the complete picture, or drilling down for successively greater levelsof detail. You can view storage from the perspective of the network,

from the perspective of the host, or from the perspective of aSymmetrix subsystem. You can also view the system from theperspective of logical or physical devices.

You can select a device, display its name and status, check whichhosts can access it, display which host objects are stored on it, displayrelated performance statistics, or establish a mirror device, all fromwithin the same framework. You select the components you want to

manage, select a task, and view the result.

Console Window The Console window has three key areas: a taskbar, a tree panel, anda target panel in which different views are displayed.

Taskbar The ControlCenter Console makes your work easier by focusingattention on the management tasks and away from the componentsthat perform those tasks.

The taskbar lists the five main areas of storage management. Eachtask button expands into drop-down menus listing views useful forthat task. Depending on which task is selected, additional menusdisplay on the menu bar.

Figure 1-3 shows the taskbar with the Monitoring task selected. Thedrop-down menu lists the Monitoring views: Topology, CommandHistory, and Physical Display. Additionally, an extra menu item,Topology, appears on the menu bar.

Four common views—Properties, Alerts, Relationship, andPerformance—appear in all five drop-down task menus.

Figure 1-3 Taskbar With Monitoring Selected

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 21/100

1

How Do I Use ControlCenter?  1-11

EMC ControlCenter Overview

Figure 1-4 shows the taskbar with the Data Protection task selected.The drop-down menu lists the data protection views: TimeFinder,

SRDF, and TimeFinder/SRDF QoS, together with the four commonviews. Three extra menu items —TimeFinder, SRDF, andQoS—appear on the menu bar.

Figure 1-4 Taskbar With Data Protection Selected

Irrespective of which task is selected (which task button is pressedand which menu items are shown), you open the drop-down menusfor other tasks and select views without changing which task is thecurrent task.

Tree Panel The tree panel displays all the objects in the storage environment,grouped according to type. The top-level object types include:

x Storage—storage objects for Symmetrix and other types of

storage arrayx Hosts—host objects such as file systems and databasesx Connectivity—network objects such as hubs, switches, and other

connectivity devices in the storage environmentx Administration—alert management, data collection, installation,

report management, schedules, and security management objectsx Status Acknowledged—a folder in which you can store managed

objects that have a warning or error statusx Reports—report groups containing individual reports

Each folder expands to reveal successive levels of details.Figure 1-5 shows the tree panel. In the tree panel on the left, nofolders have yet been expanded. In the tree panel on the right, theStorage folder is expanded; an instance of a Symmetrix is expanded;the Host Directors folder is expanded; an instance of a host director isexpanded, and an instance of a port is expanded.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 22/100

1

1-12 EMC ControlCenter Version 5.0 Introduction 

EMC ControlCenter Overview

Figure 1-5 Tree Panel Before and After the Hosts Folder Expanded

There are potentially a huge number of managed objects withinControlCenter. ControlCenter groups them and provides for filtering.Some grouping and filtering criteria are built into the Console, whileother criteria are specific to a particular type of component and areavailable only when those components are active. You can change thecriteria the Console uses to group managed objects. User preferencesallow you to store criteria changes.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 23/100

1

How Do I Use ControlCenter?  1-13

EMC ControlCenter Overview

Target Panel The target panel displays a view of data for the managed object(s)currently checked in the tree panel. Checking different objects results

in different views displaying in the target panel. Depending on whichobject you check, the information may be displayed in the form of amap, table, tree, or report.

Figure 1-6 shows the contents of a target panel after you select theMonitoring task, select Physical Display from the Monitoring taskdrop-down menu, then expand the Storage folder in the tree panel tocheck a specific Symmetrix system. As you check objects in the

selection tree, their physical location in the front and rear views of thecabinet are highlighted.

Note: the location of the checked host director and devices are highlighted inthe cabinet.

Figure 1-6 Target Panel With Physical Display View

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 24/100

1

1-14 EMC ControlCenter Version 5.0 Introduction 

EMC ControlCenter Overview

You can split the target panel vertically or horizontally, with eachtarget panel displaying a different view. In many cases, you can

switch between one view format and another, for example, from atable view to a map view.

In addition, you can select a managed object anywhere in theinterface (tree panel or target panel) and either select menu actions orright-click to perform actions specific to that object type.

Figure 1-7 shows the Properties view for the selected host directorand port in the upper target panel and the Relationship view for the

selected host director and port in the lower target panel.

Figure 1-7 Target Panels With a Properties View and a Relationship View

For more information on the capabilities of ControlCenter, refer toChapter 3, EMC ControlCenter Tasks.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 25/100

EMC ControlCenter Architecture  2-1

2Invisible Body Tag

This chapter describes the architecture of EMC ControlCenter. Itdescribes each major component in detail. Then it looks at how thesepieces are deployed in a real-life configuration.

x Console ................................................................................................2-2x ECC Server ..........................................................................................2-3x Repository ...........................................................................................2-4x Store .....................................................................................................2-6x Agents..................................................................................................2-7x Deployment of EMC ControlCenter .............................................2-16

EMC ControlCenterArchitecture

EMC C t lC t A hit t

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 26/100

2

2-2 EMC ControlCenter Version 5.0 Introduction 

EMC ControlCenter Architecture

Console

The Console is the user interface through which you view andmanage the storage environment. It is a Java-based application thatcan be launched from a browser such as Microsoft® Internet Exploreror Netscape™, or launched from the command line. Furtherapplications are implemented as plug-ins to the Console and use thecommon collection of services provided by the ECC Server.

Figure 2-1 illustrates how the Console fits within the ControlCenterarchitecture.

Figure 2-1 Console in the ControlCenter Architecture

The objects managed by the various agents in the storageenvironment are displayed in the Console tree panel. The objects areorganized into groups, such as Storage, Hosts, and Connectivity. Youcan drill down through these groups and their data to display detailsabout the individual objects.

The Console presents information to you through a series of views.The Console builds each of these views from definitions in theRepository. These views display data on the selected managed objectsin the target panel, using formats provided by the ECC Server.Topology maps show icons, representing each managed object. Tablesand dialog boxes display data pertaining to each managed object.

Console Tier Infrastructure Tier Agent Tier

Customer Storage EnvironmentConsole(s)

ECC Server

Store(s)Repository

MasterAgent

Agents

MasterAgent

Agents

ECC-000049

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 27/100

EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 28/100

2

2-4 EMC ControlCenter Version 5.0 Introduction 

EMC ControlCenter Architecture

Repository

The Repository contains a relational database that holds the currentand historical data of both the storage environment andControlCenter itself. The ECC Server processes transactions from theConsole for Repository data, such as checking user grouppermissions. Figure 2-3 illustrates how the Repository fits within theControlCenter architecture.

Figure 2-3 Repository in the ControlCenter Architecture

How ControlCenterModels the StorageEnvironment

ControlCenter models the storage environment as objects of differenttypes, characteristics, and relationships. Because ControlCenter isdesigned specifically for the purpose of storage management, itincludes several predefined categories of storage-related objects, suchas Storage Array, each with a particular set of characteristics.

ControlCenter views objects in a hierarchical form. Thecharacteristics of abstract objects in the Storage Array category areinherited, for example, by a specific instance of a Symmetrix object.The specific Symmetrix object would in turn contain objectsrepresenting directors for the Symmetrix instance, ports for theSymmetrix instance, and devices for the Symmetrix instance.

The complete hierarchy of objects is called the object model.Information on object instances, called the data model, is stored in theRepository. Managed objects represent the managed elements, such

as file systems and physical drives, that the user wants to monitor or

Console Tier Infrastructure Tier Agent Tier

Customer Storage EnvironmentConsole(s)

ECC Server

Store(s)

Repository

MasterAgent

Agents MasterAgent

Agents

ECC-000051

EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 29/100

2

Repository  2-5

EMC ControlCenter Architecture

manage in the storage environment. ControlCenter passesinformation about these managed objects between its components.

The Repository is designed to hold data about managed objects suchas:

x Storage systems, for example, Symmetrix systems, ports,directors, and devices

x Host systems, for example, logical volume managers, filesystems, and databases

x Connectivity devices, for example, switches, hubs, HBAs, andFAs

This data includes configuration details, statistical data, alerts, andstatus information about any given device. It also contains generalinformation about links, groups, metadata, alert definitions,components, and the data dictionary.

The Repository preserves a history of changes to a managed object.

The Configuration Change log contains an audit trail of configurationchanges with their time stamp.

Data stored in the Repository allows applications to performsophisticated management and problem tracking of changes withinthe storage environment.

Not all information is saved in the Repository. For example, theperformance statistics files for the Workload Analyzer (WLA) are

maintained separately. The WLA Archiver manages the storage andretrieval of data in this separate archive.

EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 30/100

2

2-6 EMC ControlCenter Version 5.0 Introduction 

Store

The Store is a process that populates the Repository with persistentdata from the agents. It provides a store and retrieve interface between the agents and the Repository.

Figure 2-4 illustrates how the Store fits within the ControlCenterarchitecture.

Figure 2-4 Store in the ControlCenter Architecture

Console Tier Infrastructure Tier Agent Tier

Customer Storage EnvironmentConsole(s)

ECC Server

Store(s)Repository

MasterAgent

Agents MasterAgent

Agents

ECC-000052

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 31/100

2

Agents  2-7

Agents

ControlCenter manages every physical and logical element usingintelligent agents. A different agent manages each type of object.For example, there is a Storage Agent for Symmetrix, a Host Agentfor Windows, a Database Agent for Oracle, and so on.

Figure 2-5 illustrates how the Agents fit within the ControlCenterarchitecture.

Figure 2-5 Agents in the ControlCenter Architecture

Console Tier Infrastructure Tier Agent Tier

Customer Storage EnvironmentConsole(s)

ECC Server

Store(s)Repository

MasterAgent

Agents MasterAgent

Agents

ECC-000053

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 32/100

2

2-8 EMC ControlCenter Version 5.0 Introduction 

Types of Agents ControlCenter supports many types of special-purpose agents. Refer

to the EMC ControlCenter Release Notes for a list of which agents aresupported at a particular release.

Table 2-1 ControlCenter Agents

Agent Description  

General-purpose agents 

Master Agent Controls the installation, starting, and stopping of other agents on the host. Required on  

every host running an agent (except for the Connectivity Agent for SNMP).

Integration Gateway Provides an interface from the ECC Server to management framework applications such as HP OpenView Network Node Manager, Tivoli NetView, or the CA Unicenter TNG, enabling those applications to display ControlCenter information.

WLA Archiver Retrieves and archives collections of data from individual agents, and organizes (rolls up)collected data into summaries for the reports. The summarized data is saved to a data archive, separate from the Repository. This data can be viewed by Workload Analyzer (WLA) Performance View.

Connectivity agents 

Connectivity Agent for SNMP Manages information gathered by Managed Object SNMP agents in the storage network,and updates the Repository with current connectivity information.

A Managed Object SNMP agent is software shipped by a device vendor or application vendor (for example, McData), which supports SNMP management of the device or application and is not part of ControlCenter.

Connectivity Agent for SDM Monitors the VCM database for each Symmetrix system in the storage network for configuration changes to Symmetrix volume access control.

Connectivity Agent for Switches Monitors the SAN and discovers topology and fabric information for Fibre Channel switches.

Storage agents 

Storage Agent for Symmetrix Gathers configuration, real-time status, and statistics data, and performs operations on a Symmetrix system. Requires Solutions Enabler.

Storage Agent for CLARiiON Gathers configuration, real-time status, and statistics data from an EMC CLARiiON Fibre 

Channel FC4700 disk-array storage system.

Storage Agent for Celerra Monitors an EMC Celerra system.

Storage Agent for Compaq StorageWorks 

Allows you to explore and monitor the configuration of a Compaq StorageWorks storage subsystem. The agent provides access to subsystem information, such as the serial and model numbers, the count and type of disk controllers, and unit information such as storageset configuration.

Storage Agent for HDS Monitors an Hitachi HDS storage subsystem.

Storage Agent for IBM ESS Monitors an IBM ESS (Shark) storage system.

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 33/100

2

Agents  2-9

Storage Agent for RVA/SVA Manages an IBM RAMAC and STK virtual array.

Host agents 

Host Agent for Windows Enables you to manage a Windows NT or Windows 2000 host. Provides shortcuts for most system management tasks, proactively monitors the system, and issues alerts.

Host Agent for Solaris Enables you to manage a Solaris host. Provides shortcuts for most system management tasks, proactively monitors the system, and issues alerts.

Host Agent for AIX Enables you to manage an AIX host. Provides shortcuts for most system management tasks, proactively monitors the system, and issues alerts.

Host Agent for HP-UX Enables you to manage an HP-UX host. Provides shortcuts for most system management tasks, proactively monitors the system, and issues alerts.

Host Agent for Novell Enables you to manage Novell NetWare 4.x  and 5.x servers. Provides shortcuts for many system management tasks, proactively monitors NetWare servers, and issues alerts.

Physical Agent for MVS Enables you to manage the physical disk and tape environment on OS/390 hosts. Required on each OS/390 host in your data center that ControlCenter will manage.

Logical Agent for MVS Enables you to monitor, generate reports, and automate activit ies affecting cataloged data throughout the OS/390 and MVS/ESA systems across your enterprise. Manages catalogs and data sets.

Host Agent for MVS HSM Enables you to monitor the Hierarchical Storage Management (HSM) subsystem to manage data set migrate recall activities.

Host Agent for MVS SMS Enables you to monitor the DFSMS configuration and manage data set placement and attributes.

Database agents 

Database Agent for Oracle Enables you to manage multiple Oracle databases installed on the host. Provides shortcuts for many system management tasks, proactively monitors the Oracle database, and issues alerts.

Database Agent for DB2 Explores and manages DB2 environments.

Backup agents 

Backup Agent for TSM Allows you to monitor Tivoli Storage Manager backup systems, looking for events that you define such as failed backups, and increasing space utilization.

Tape agents 

Tape Agent for MVS Manages a tape system; it has functions for a Vir tual Tape Server (VTS) tape system, for a CA-1 tape software package by CA, for a StorageTek tape silo environment, and for Removable Media Manager (RMM), a software product by IBM.

Table 2-1 ControlCenter Agents (continued )

Agent Description  

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 34/100

2

2-10 EMC ControlCenter Version 5.0 Introduction 

Master Agent The Master Agent is required on every host running an Agent and isresponsible for:

x Distribution, installation and upgrades of agents

x Agent management and health monitoring

Solutions Enabler Solutions Enabler must be installed on each host through which a Symmetrixis managed.

In order to retrieve data from a Symmetrix system, you must install

the EMC Solutions Enabler ™ on the host managing the Symmetrixsystem (usually, the host running the Storage Agent for Symmetrix).Solutions Enabler provides low-level SCSI commands thatcommunicate with Symmetrix systems to retrieve configuration,status, and performance information.

When you install EMC Solutions Enabler, you are installing itscomponents, including:

x SYMAPI—SYMAPI (or SymmAPI ™) is the SymmetrixApplication Programming Interface and runtime libraries.

x SYMCLI—SYMCLI is an open systems application, written usingthe SYMAPI, that manages Symmetrix systems.

x SYMAPI Server—The SYMAPI Server retrieves status andperformance information by polling the Symmetrix systems andprocessing client commands. The SYMAPI Server process is

called symapisrv.

Proxy Agent Usually, you run the Storage Agent for Symmetrix on a host that isdirectly connected to a Symmetrix system. However, if required, youcan run a SYMAPI Server on the host directly connected to theSymmetrix, run a Storage Agent for Symmetrix elsewhere on thenetwork, and have the SYMAPI Server pass the data it collects to theproxy Storage Agent for Symmetrix.

The most likely reason for using a proxy agent is because theSYMAPI Server is supported on more platforms than the StorageAgent for Symmetrix. For example, if the host connected to theSymmetrix system is running MVS or a version of UNIX for whichthe SYMAPI Server is supported but the Storage Agent forSymmetrix is not, then the SYMAPI Server host can collect data fromthe Symmetrix and transmit it to a Storage Agent for Symmetrixrunning as a proxy agent.

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 35/100

2

Agents  2-11

Integration Gateway Most users will use ControlCenter through the Console application.However, if you already use a management framework application

such as HP OpenView Network Node Manager, Tivoli NetView, orCA Unicenter TNG, you can display ControlCenter informationthrough that third-party management framework.

The information is passed using SNMP from the ECC Server throughthe Integration Gateway to the third-party management framework.Each framework is slightly different and requires its own icons,configuration, and registration files.

The Integration Gateway provides the following functionality to thethird-party framework application:

x Discovers managed objects on the ControlCenter side andrepresents them in a topology map

For this release of ControlCenter, the Integration Gateway supports onlytop-level Symmetrix, host, and connectivity managed objects. Forexample, it exposes a Symmetrix system but not its ports or devices.

x Receives and processes ControlCenter events, such as alerts

x Launches applications that provide a detailed view of managedobjects on the ControlCenter side

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 36/100

2-12 EMC ControlCenter Version 5.0 Introduction 

What Do Agents

Do?

Each agent type has a predefined set of actions it can perform,

specific to the object type it manages.Agents work autonomously in the background according touser-defined management policies or in response to Consolecommands by you or by software clients. They are the principalmeans by which ControlCenter management is effected on your behalf.

Typically, agents watch for events; gather, organize, analyze, and

interpret information; send out alerts when a monitored event occurs;and manage themselves and their corresponding objects. They bothcollect data from the object and transmit commands to the object.

Agents can operate independently of the infrastructure in a limitedfashion; they communicate with the infrastructure only whenrequested or when they find anything to report. If the network isunavailable, the agents continue to operate as normal, saving the datauntil the network becomes available again.

Discovery A major agent function is querying and reporting on the existence ofand health of the object(s) it manages in the environment.

ControlCenter periodically polls every agent (as defined by thatagent’s policy). When an agent is installed, the host or any storagesubsystem directly connected to the host is automatically discoveredon the next polling cycle. For example, a Storage Agent for

Symmetrix is configured to automatically discover Symmetrixsystems, ports, directors, devices, and so on for anydirectly-connected Symmetrix system.

Additionally, you can manually discover other types of managedobjects, such as storage subsystems, hosts, or connectivity devices inthe Fibre Channel network. This discovery is at the request of a userthrough the Console to find a specific device at a given address.ControlCenter does not recognize the object until it is identified ordiscovered by an appropriate agent.

Alerts Each agent has numerous predefined alerts to help monitor variousaspects of your distributed storage environment, such as:

x Space availability of volumes or disksx Performance of hosts and storage subsystemsx Status of backup operations

x Availability and status of ControlCenter components

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 37/100

Agents  2-13

Agents monitor metrics, that is, the value of a particular variable in amanaged object, such as file size, file system occupancy, Symmetrix

status, and so on.Alerts can monitor four types of metrics:

The definition of an alert tells the agent:

x What metrics to monitorx How often to checkx What threshold values trigger an alertx What action to take when an alert is triggered

Each agent monitors its assigned metrics in the managed objects forconfiguration changes and alertable conditions. When a conditionoccurs, the agent automatically triggers an alert.

When an alert is triggered, the alert’s management policy defineswhat action the agent should take. Typical actions are for the agent to:

x Send the alert to the ControlCenter infrastructure and route to theConsole for display.

x Run an autofix, which is a user-specified action in response to thealert. An autofix enables an agent to autonomously respond toalertable conditions independently of the rest of ControlCenter.

x Forward as an SNMP trap to the Integration Gateway for onwardtransmission to a supported third-party management frameworksuch as Tivoli.

You can customize the supplied alerts or define new alerts using asupplied template and assign them to specific agents.

Rate Triggers an alert using percentages to indicate whetherthe value of a metric has exceeded its threshold. Forexample, a file size change of 50%.

Interval Triggers an alert if the difference between two valuesexceeds a specified amount. For example, a file size

change by number of bytes.State Triggers an alert if a Boolean value of TRUE or FALSE isreturned. For example, is the service running?

Count Triggers an alert by comparing the value of a metricagainst the threshold value. For example, memory usagehas exceeded a predefined absolute threshold value, suchas 256 MB.

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 38/100

2-14 EMC ControlCenter Version 5.0 Introduction 

Data Collection Agents can collect five types of data about managed objects:

Data Collection PoliciesEach agent has a set of predefined data collection policies. You canmodify the existing data collection policies or define new ones basedon templates available through the Console.

An agent’s data collection policy defines:

x Whether collection is enabledx Which managed objects (also called data providers) the agent

should monitorx Collection intervalx Durationx Cycle time

x Numbers to keepx Collection name

Discovery High-level information such as the newly discovered

object’s name and type. Agents perform discoverywhen they start and periodically afterwards, basedon their policy. Discovery information is written tothe Repository.

Configuration The managed object’s configuration, including thehierarchy of the managed object and itssubcomponents.

Status The status of one or more components of a managed

group. Status data can indicate OK, Error, Offline, oranother condition, together with a reason.

PerformanceStatistics

The values of specific information such as bandwidth, disk space, memory, CPU and so forth.

The data archiving mechanism saves these metricsand converts them to performance statistics at thetime specified through a data collection policy. Inaddition, agents can deliver raw data straightthrough to the ECC Server on request, withoutprocessing it.

Logs System data.

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 39/100

Agents  2-15

Data Collection ProcessingAgents process the collected data as follows:

x Snapshot data (discovery, configuration, and status) is sent to theStore to be archived in the Repository. The ECC Server reads datafrom the Repository for display on the Console.

x Performance statistics are saved in local collections.

Once data collection is enabled, the agent polls the data providerfor statistical data. Daily and Analyst statistics are sent to theWLA Archiver as collected. Revolving data is stored on the agent

host until requested by the user. The WLA Archiver archivescollections from the agents based upon the WLA Daily, WLAAnalyst, and WLA Revolving data collection policies. Thesummarized data is saved to a data archive, separate from theRepository. The contents of the data archive are viewed throughthe Workload Analyzer Performance View application.

The WLA Retention policy provides parameters defining how

long to save the archived data collections.

Host Management You can manage host storage resources (file systems, devices,databases) by issuing commands through the right-click menudirectly to the host agent. Refer to Table 2-1 on page 2-8 for a list ofhost agents. These commands allow you to:

x Create, extend, or mount file systems hostx Manage volume groupsx Explore files, host logical volumes, or physical devicesx Control disk consumption, disk quotas, or file size on hostsx Monitor host securityx Monitor host memory, disk, or processor performancex Manage Oracle or DB2 database applications

Disk and TapeManagement

You can manage disk and tape subsystem resources through thestorage and tape agents. Refer to Table 2-1 on page 2-8 for a list of

storage agents and tape agents. To manage a Symmetrix storagearray, you use the tasks and menus available through the Consolewindow (refer to Chapter 3). To manage other storage or tapesubsystems, you issue commands through the right-click menudirectly to the storage or tape agent. These commands allow you to:

x Explore host and physical devices in disk subsystemsx Manage host connections to disk subsystems

x View configuration and performance datax Explore and manage tape subsystems

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 40/100

2-16 EMC ControlCenter Version 5.0 Introduction 

Deployment of EMC ControlCenter

Each deployment of ControlCenter is likely to vary from site to site. AControlCenter deployment may be simple or complex. The EMCControlCenter Installation and Configuration Guide describes twopotential configurations:

x Single Host Configuration—all ControlCenter componentscombined on a single host.

x Distributed Configuration—each major component installed onits own host.

Different sites may have different priorities regarding availability,performance, scalability, and security.

Figure 2-6 illustrates how EMC ControlCenter components could bedeployed in a large example storage network.

CAUTION!This illustration is intended to show the possibilities for whichControlCenter is designed. It does not guarantee support forparticular configurations at particular releases.

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 41/100

Deployment of EMC ControlCenter  2-17

Figure 2-6 Example Deployment of EMC ControlCenter

ores

Open Systems hosts running a:

- Master Agent

- Host Agent

- Storage Agent for Symmetrix,

and a

- SYMAPI Server 

 Agents Customer Storage Environment

Windows agent host

running

- Master Agent

- Storage Agent for Symmetrix

- SYMAPI Server - Connectivity Agent for SNMP

- Connectivity Agent for Switches

- Connectivity Agent for SDM

Fabric

Windows agent host

running

- Master Agent

- Integration Gateway

- Third-party framework

application

SNMP

Performance

 Archives

Windows agent host

running

- Master Agent and

- WLA Archiver 

 A

Celerra Tape libraryCLARiiON

 A

 A A A

 A

 A

 A

Proxy agent

host running a:

- Master Agent

- Storage Agent

for Symmetrix

Mainframe host

running a:

- Master Agent

- SYMAPI Server CSISCSI

 Agent host running a:

- Master Agent

- the appropriate storage or tape

agent

Linux host

running a:

- SYMAPI

Server 

Proxy agent

host running a:

- Master Agent

- Storage Agent

for Symmetrix

pository

C Server

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 42/100

2-18 EMC ControlCenter Version 5.0 Introduction 

In this example, the storage environment has several parts:

x A host running the Console application is connected across an

HTTP connection to an ECC Server.

x In this configuration, separate hosts run infrastructurecomponents. One system runs an ECC Server, another theRepository, two systems run Store processes to provide load balancing. Communication with the Store is through the JavaDatabase Connectivity Interface (JDBC).

x A Master Agent runs on each agent host. The Agent tier connects

to the infrastructure across ICP (Infrastructure CommunicationProtocol).

x Two Symmetrix systems are connected over SCSI connections toUNIX or Windows hosts. Each host runs a Storage Agent forSymmetrix and Solutions Enabler to collect Symmetrix data.

x A Symmetrix system is connected over ESCON to a MVS agenthost running SYMAPI Server, which in turn is connected through

the network to a UNIX or Windows host running a Storage Agentfor Symmetrix as a proxy.

x A Symmetrix system is connected to a Linux host runningSYMAPI Server, which in turn is connected through the networkto a UNIX or Windows host running a Storage Agent forSymmetrix as a proxy.

x A Celerra, a CLARiiON storage array, and a Tape Library are

connected to their respective storage agents. Other supportedstorage systems could similarly be connected through theirrespective storage agents. Host storage agents or applicationagents (not shown) could run on various agent hosts asappropriate.

x More Symmetrix systems and switches are connected through aFibre Channel network to an agent host running a Connectivity

Agent for SNMP (which in turn collects data from generic SNMPagents running on other vendor’s connectivity devices).

x A Windows agent host running the Integration Gateway collectsSNMP events and alerts for onward transmission to a third-partyframework application (or any other host interested inintercepting ControlCenter events or alerts). This could be thehost actually running the third-party framework application.

x A Windows agent host running the WLA Archiver archivesstatistics from the other agents for performance analysis.

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 43/100

Deployment of EMC ControlCenter  2-19

Scalability ControlCenter is easily scalable, making it well-suited to large data

warehouse environments. Scalability features include:x Intelligent agents send changed data only, because data is

processed locally. Their activity is policy-based and user-defined.

x You can add multiple stores to provide load balancing for a largenumber of agents.

x The Repository is based on a commercial database.

x The Console has built in scalability features, allowing it to displaymany thousands of managed objects, for example:• Pre-defined groups

– Pre-defined groups such as Hosts, and Storage, are built in.

– An Arrange BY feature provides flexible groupings, Forexample, you can list objects by name, type, or vendor.

• Site-defined groups, allowing you to logically group hosts,Symmetrix systems, and other objects that ControlCentermanages. You can create groups that correspond to particulargeographic locations or to departments and manage thatgroup as an entity. Creating object groups also simplifies howyou manage object permissions. For example, you can createan object group that includes all your UNIX hosts and thengrant your UNIX administrators permissions to performactions on those hosts.oups, allowing you to builduser-defined groups across

• Filtering, allowing you to exclude unwanted objects from thedisplay

2EMC ControlCenter Architecture

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 44/100

2-20 EMC ControlCenter Version 5.0 Introduction 

3Invisible Body Tag

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 45/100

EMC ControlCenter Tasks  3-1

This chapter explores the five storage management tasks in moredetail and illustrates the capabilities of ControlCenter through theuse of screen shots of the EMC ControlCenter Console.

x Introduction ........................................................................................3-2x Common Views ..................................................................................3-3x Storage Allocation..............................................................................3-7x Monitoring ........................................................................................3-10x Performance Management..............................................................3-15x Data Protection .................................................................................3-17x Administration .................................................................................3-22x Workload Analyzer..........................................................................3-28

x Enterprise Framework Environments...........................................3-30x Launching Third-Party Applications............................................3-31x Help....................................................................................................3-32

EMC ControlCenter

Tasks

3EMC ControlCenter Tasks

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 46/100

3-2 EMC ControlCenter Version 5.0 Introduction 

Introduction

The EMC ControlCenter Console makes your work easier byfocusing attention on the management tasks and away from thecomponents that perform those tasks.

Chapter 1 introduced the Console window and described its basicoperation. In summary, most activities involve three steps.

1. On the taskbar, click the task that you want to perform. Select atask view or menu action.

2. In the tree panel, expand the tree, and check the object(s) ofinterest.

3. View the result in the target panel.

Each of the five task buttons has a drop-down menu listing viewsuseful for that task. Depending which task is selected, additionalmenus are displayed on the menu bar showing the commands

available for the selected task.

The following sections describe the user interface to ControlCenter,giving a brief overview of what information is available and theoperations that you can perform.

3EMC ControlCenter Tasks

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 47/100

Common Views  3-3

Common Views

Four common views are available from all tasks and from the toolbar:

x Propertiesx Alertsx Relationshipx Performance

The next sections describe each view in turn.

Properties The Properties view is the default view for a checked object, anddisplays the most common attributes for the object. If appropriate,the view may also list the selected object’s configuration.

Figure 3-1 shows the Properties view for a number of objects in theStorage folder: a Symmetrix system, a Fibre Channel host director,and several devices.

Figure 3-1 Properties View for Storage Objects

3EMC ControlCenter Tasks

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 48/100

3-4 EMC ControlCenter Version 5.0 Introduction 

Alerts The Alerts view shows the active alerts and alert definitions thatpertain to a checked object. The Active Alerts table is shown first,followed by the Alert Definitions table.

The Active Alerts table contains the alert details including theassociated severity, alert string, and so on. You can change the formatof the display from a table to a chart.

You can also expand the scope to encompass the entire storagenetwork, by clicking the All Alerts button in the task bar.

Figure 3-2 shows the Alerts view for a given Symmetrix system.

Figure 3-2 Alerts View for Selected Symmetrix System

Through the Administration task, you can set alert policy, send alerts,facilitate quick resolution, automation/autofixes, configure, andacknowledge alerts. Refer to Alert Management on page 3-25 fordetails of the Administration task.

3EMC ControlCenter Tasks

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 49/100

Common Views  3-5

Relationships The Relationship view shows the logical mapping of file systems anddatabases to Symmetrix devices. End-to-end mapping is one of themost important tools at your disposal for helping you trulyunderstand your storage environment. Viewing the entire storagechain on a single screen can help you understand the effects ofperformance tuning and capacity planning from a database, system,and storage perspective. You can map host objects through thestorage logical volumes to the physical devices—and back again— providing a complete, top-to-bottom view of file systems and

databases from the host through the specific devices on theSymmetrix.

Figure 3-3 shows the Relationship view for checked host directorsand mapped devices.

Figure 3-3 Relationship View

3EMC ControlCenter Tasks

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 50/100

3-6 EMC ControlCenter Version 5.0 Introduction 

Performance The Performance view displays performance statistics about theselected object(s).

For each object, you can display:

x a table (displayed by default) showing the real-time performancestatistics, updating in real-time, for the object, collected directlyfrom the agent monitoring that object, not the Repository. Dataobtained in this way is transient.

x a chart, showing historical performance data for the period since

the Performance view was selected.Figure 3-4 shows the Performance view for a number of checkedobjects: a Symmetrix system, several host directors (toggled fromtable to chart display), and a several devices.

Figure 3-4 Performance View

3EMC ControlCenter Tasks

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 51/100

Storage Allocation  3-7

Storage Allocation

ControlCenter makes it easy to allocate storage as and when youneed it. Figure 3-1 on page 3-3 shows how to display details ofconfigured and unconfigured storage capacity for multipleSymmetrix systems. You use the Storage Allocation task to view theconfiguration of each Symmetrix system, and to configure devices onthe Symmetrix system.

Visual Storage View The Visual Storage view allows you to view a highly configurablegraphical display of Symmetrix configuration details that can showall directors, channels, cache, ports, and volumes, as well as the links between them. Figure 3-5 shows an example Visual Storage view.

Figure 3-5 Visual Storage View of a Symmetrix System

The Visual Storage view displays the front-end and back-end viewsof the configuration side-by-side. By comparing these views, you can

easily see the relationships between the front-end and back-enddirectors and devices.

3EMC ControlCenter Tasks

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 52/100

3-8 EMC ControlCenter Version 5.0 Introduction 

Configure Menu When the Storage Allocation task is selected, the menu bar containsthe Configure menu enabling you to remotely configure the selectedSymmetrix system. The Configure menu offers these options:

x SDR — Controlling mapping of devices to Symmetrix front endports. This option lets you bring previously-unallocated devicesonline to a specific port or directory to provide extra storage, andlets you redistribute devices between ports to balance workloads.

x Logical Device Configuration — Defining additional storagecapacity from unused physical disks within a Symmetrix.

x Meta Device Configuration — Creating new and configuringexisting members of meta devices.

x Port Flag Settings — Configuring the flag settings on SymmetrixFibre and SCSI Front End Ports.

x Device Type Definition — Defining the identity of a deviceamongst BCV, DRV and STD.

Figure 3-6 shows the Logical Device Configuration dialog box.

Figure 3-6 Logical Device Configuration Dialog Box

3EMC ControlCenter Tasks

H t M O h fi d ddi i l S i

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 53/100

Storage Allocation  3-9

Host Menus Once you have configured additional space on a Symmetrix system,you can then map the storage to the host that requires it. Right-clickmenus for each host listed in the tree panel or displayed in the targetpanel enable you to make changes at the file, system, or databaselevel on the selected host.

Figure 3-7 shows several host objects selected in the tree panel andtheir corresponding properties displayed in the target panel.

Figure 3-7 Properties View of Host Objects

3EMC ControlCenter Tasks

M it i

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 54/100

3-10 EMC ControlCenter Version 5.0 Introduction 

Monitoring

ControlCenter makes it easy to monitor your entire storage networkfrom a single Console window. The Monitoring task displays thephysical and logical configuration of your storage network and tracksthe health and status of components. The display updates in real-timeto alert you to incoming Warning, caution, or Information statuschanges on managed objects.

Topology Menu When the Monitoring task is selected, the menu bar contains aTopology menu that offers these options:

x Discover—Identifying storage subsystems, hosts, andconnectivity devices in the storage area network. ControlCentercan discover a variety of objects that comply with the FibreAlliance MIB, including but not limited to:

• Storage systems, such as Symmetrix systems

• Hosts• HBAs• Hubs• Switches• Bridges• Converters• Gateways

x View login history—Enabling you to verify that properconnections have been established between an HBA port on ahost and an FA port on a Symmetrix system. The login history canalso be used to track changes in a configuration.

x Identify port—Identifying ports that are known to exist but whichare not associated with an adapter. ControlCenter allows you toenter properties (such as Vendor name or serial number) forobjects that it cannot discover.

x Connection settings—Enabling you to enter or modifyconnectivity information for Fibre Channel switches.

3EMC ControlCenter Tasks

Topology View The Topology view:

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 55/100

Monitoring  3-11

Topology View The Topology view:

x Represents the physical configuration of the storage networkx Displays the paths between host HBA pairs and Symmetrix / FA

port pairs in the Fibre Channel topology

You can view the topology at a high level or in detail. You can drilldown to display information about physical objects such asSymmetrix subsystems, Host Bus Adapters (HBAs), or Fibre Channelswitches that comply with the Fibre Alliance MIB.

Figure 3-8 shows an example Topology view.

Figure 3-8 Topology View

3EMC ControlCenter Tasks

Command History The Command History view shows in table form for each active

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 56/100

3-12 EMC ControlCenter Version 5.0 Introduction 

Command HistoryView

The Command History view shows in table form, for each activesession, the commands issued by a user, together with theirassociated object, outcome, status, start and end dates.

Figure 3-9 shows an example Command History view.

Figure 3-9 Target Panel Showing Command History View

Physical DisplayView

The Physical Display view shows a picture of the front and rear viewsof a Symmetrix system together with some general information aboutthe Symmetrix, such as its serial number and name.

As you interactively check and uncheck devices in the tree panel, thePhysical Display view in the target panel changes to reflect yourselections, thus helping you locate a physical device in yourSymmetrix system, if you know only the logical device identifiers.

An example Physical Display view is shown in Figure 1-6 onpage 1-13. 

3EMC ControlCenter Tasks

Monitoring Host ControlCenter also lets you monitor a wide variety of host objects.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 57/100

Monitoring  3-13

Monitoring HostObjects

ControlCenter also lets you monitor a wide variety of host objects.By installing an agent on each system you want to monitor, you can

consolidate your logical and database storage management ofdifferent data types, access methods, and storage systems withinWindows NT, Windows 2000, Solaris, HP-UX, AIX, and MVS hostenvironments.

Each agent contains the functionality to perform the daily storageresource management tasks and problem analysis required to ensurethe best utilization of resources. The agents are equipped with alerts,

metrics, autofixes, and wizards to enhance policy making. Using theExplore function of each Agent, you can navigate the data structureson the agent host to search for files anywhere in the enterprise.Figure 3-10 shows an example of the Console. The user has selected ahost, from the right-click menu selected the Host Agent for Windowson that host, and invoked the Explore command.

Figure 3-10 Monitoring Host Objects

3EMC ControlCenter Tasks

Figure 3-11 shows an example of host agent output.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 58/100

3-14 EMC ControlCenter Version 5.0 Introduction 

Figure 3-11 Host Agent Output

3EMC ControlCenter Tasks

Performance Management

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 59/100

Performance Management  3-15

e o a ce a age e

Performance management, in the context of information storage,includes:

x Evaluating the architecture of a sitex Measuring the performance of each host, each storage device, and

the pathways betweenx Reporting and analyzing, and looking for trendsx Making controlled changes to the configuration to tune different

aspects.Changes may involve adding more hardware, upgrading hardware,tuning the software, or changing the process, to, for example, collectstatistical data at different rates.

A complex system like a storage network has multiple levels at whichperformance problems can occur: on the network, within particularstorage devices, or within individual hosts. Ongoing performance

measurement and management can provide early warning signalsthat a particular link in the chain is reaching full capacity.

As for Storage Allocation and Monitoring, select the PerformanceManagement task, and then open menus to perform actions orexpand the task to display views.

Optimizer Menu Optimizer helps you increase performance of a Symmetrix system by

spreading I/O activity evenly across physical disks.

Optimizer provides automatic performance tuning for Symmetrixdisk drives. When a particular drive is in high demand, there isexcessive head movement on that drive. This movement slows downread and write activity. By balancing highly active logical volumes(hot spots) and lower activity logical volumes (cold spots) acrossdrives, seek activity is balanced, and contention among drives is

reduced. Throughput within the overall Symmetrix system isimproved, and users experience optimal response times.

QoS View Quality of Service (QoS) allows you more flexibility in managing theperformance of your Symmetrix. By reducing the resources allocatedfor BCV or SRDF copy operations on selected logical volumes, youfree Symmetrix resources and increase the overall performance of theother Symmetrix devices. Typically, you would assign the replicationfunctions a lower priority during peak business activity.

3EMC ControlCenter Tasks

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 60/100

3-16 EMC ControlCenter Version 5.0 Introduction 

Figure 3-12 QoS Dialog Box

For more information on Performance Management, refer toPerformance on page 3-6 and Workload Analyzer on page 3-28.

3EMC ControlCenter Tasks

Data Protection

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 61/100

Data Protection  3-17

Data protection, in the context of ControlCenter, covers two relatedfunctions:

x TimeFinder — Addressing business continuance needs bycreating separately addressable mirrored volumes within the local Symmetrix system

x SRDF — Addressing disaster recovery needs by creating andmaintaining a mirror image of one or more logical volumes on a

remote Symmetrix system

TimeFinder TimeFinder manages the relationship between standard storagedevices (STD) and separately addressable mirrored volumes (BCV)within the local Symmetrix system. These mirrored volumes containa copy of the data while the original device is online for regular I/Ooperation.

Before using TimeFinder, some of the disks in the Symmetrix systemmust be configured (through the Storage Allocation task) as specialdisks known as Business Continuance Volumes (BCVs). Each BCVdevice has its own host address, and is configured as a stand-alonedevice. You then pair the BCV with a standard Symmetrix volume.

After the mirror image is established, you can split it from thestandard device, manipulate the data (back it up or perform

applications testing), and later reestablish the mirror image with thestandard device.

Selecting TimeFinder from the Data Protection task displays a viewshowing the topology and attributes of the BCV devices that arerelated to the selected objects. Figure 3-13 shows a TimeFinder view.

3EMC ControlCenter Tasks

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 62/100

3-18 EMC ControlCenter Version 5.0 Introduction 

Figure 3-13 TimeFinder View

You perform TimeFinder operations from the TimeFinder menu.Figure 3-14 shows the TimeFinder Establish dialog box.

3EMC ControlCenter Tasks

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 63/100

Data Protection  3-19

Figure 3-14 TimeFinder Establish Dialog Box

3EMC ControlCenter Tasks

SRDF SRDF creates and maintains a mirror image of one or more logicalvolumes on a remote Symmetrix system. Before you can use SRDF,

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 64/100

3-20 EMC ControlCenter Version 5.0 Introduction 

volumes on a remote Symmetrix system. Before you can use SRDF,

the local and remote Symmetrix systems must each be set up with atleast two Remote Link Directors (RLD) through which the twosystems are linked. The Symmetrix system being mirrored isdesignated as the source; the Symmetrix system maintaining theremote mirror is designated as the target. Information is transferredacross the SRDF link from the source to the target system. SRDFsystems can be up to 12,000 miles apart. (In practice, many customerssimply link two Symmetrix systems and have each maintain a mirror

of the other. In this case, each is both a source and a target, withinformation being transferred in both directions.)

Figure 3-15 shows the target panel with various SRDF propertiesview showing the topology and attributes of SRDF devices.

Figure 3-15 Target Panel Showing SRDF View

3EMC ControlCenter Tasks

By maintaining real-time copies of data in different physicallocations, SRDF enables you to recover from disasters or plannedoutages, or perform data center migration, with minimal impact.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 65/100

Data Protection  3-21

outages, or perform data center migration, with minimal impact.

You perform SRDF operations from the SRDF menu. Figure 3-16 shows the Split dialog box for the selected device group.

Figure 3-16 SRDF Spit Dialog Box

SRDF/DM SRDF/DM (SRDF/Data Mobility) is a special form of SRDF that

permits operation in SRDF Adaptive Copy mode only and isdesigned for movement of offline data. This lower-cost SRDFsolution permits data to be mirrored from one Symmetrix system toanother but because the data arrives at the remote Symmetrix systemasynchronously, SRDF/DM is not recommended for operations thatrequire real-time mirroring, such as disaster recovery. SRDF/DM issold as a separate license by EMC.

3EMC ControlCenter Tasks

Administration

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 66/100

3-22 EMC ControlCenter Version 5.0 Introduction 

ControlCenter includes a comprehensive administrationenvironment to manage security, remote installation andmanagement of agents, and policy definition.

SecurityManagement

Users must login before using ControlCenter. Users can be assignedindividual user or user group access privileges.

The security management system controls the authorization for

performing ControlCenter actions. The system manages permissions based on authorization rules, which work by granting specific userspermission to perform actions on specific objects.

For example, the TimeFinder rule could grant the backup manager(user) permission to use the TimeFinder application (action) on anamed Symmetrix system (object).

A ControlCenter administrator creates each authorization rule andmanages the users and the objects named in each rule.

If users attempt to perform a command for which they are notauthorized, ControlCenter issues a message and prevents thecommand from executing.

Initial User Groups andRules

To facilitate setting up ControlCenter security, the product providessome initial user groups, object groups, and rules.

ControlCenter creates several default user groups and rules whenyou first start the ECC Server. After you create your users, add themto these user groups to grant them sets of permissions.

Permissions The user groups and rules are organized according to typical jobresponsibilities. The rules grant permissions based on object types,such as Symmetrix devices or hosts. For example, users included inthe Symmetrix Configuration Manager group gain a set of

permissions for all Symmetrix systems in ControlCenter. Thestandard set of permissions are:

x Symmetrix permissions

x Host permissions

x Storage network (ESN) permissions

x Agent permissions

x ObjectGroup permissions

3EMC ControlCenter Tasks

x SST Server Commands permissions

x Authorization Data permissions

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 67/100

Administration  3-23

x User Account Manager Data permissions

You can view security management information in two ways:

x View which rules apply to which users, groups, and objects

x View the basic properties of authorization rules, users, and usergroups, such as names and descriptions for users and groups andthe permissions granted by a rule

Figure 3-17 shows a Properties view of user groups, and users.

Figure 3-17 Properties View of User Groups and Users

3EMC ControlCenter Tasks

Agents Individual agents can be installed or upgraded remotely from theConsole host. A Master Agent must already be running on any agent

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 68/100

3-24 EMC ControlCenter Version 5.0 Introduction 

host wanting to install or upgrade a specific agent.

In addition, you can set policies for agents through the Console.Figure 3-18 shows a Policies view.

Figure 3-18 Policies View

3EMC ControlCenter Tasks

Alert Management ControlCenter provides numerous alerts to help monitor variousaspects of your distributed storage environment, such as:

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 69/100

Administration  3-25

x Space availability of volumes or disks

x Size of files

x Performance of hosts and storage subsystems

x Status of backup operations

x Availability and status of ControlCenter components

Notification Options You have great flexibility in how ControlCenter notifies you aboutalerts. Notification options include:

x Displaying color-coded messages in the ControlCenter Console

x Sending e-mail messages

x Sending messages to a third-party framework like HewlettPackard’s OpenView or the Tivoli Management Framework

Automated Responses To help streamline your storage management activities,ControlCenter provides automatic responses, called autofixes, thatyou can attach to alerts. For example, ControlCenter provides an alertthat triggers when a Windows event log reaches a certain size. Youcan attach to this alert an autofix that automatically backs up andclears the event log.

ControlCenter allows you to create your own autofixes as well. To

create your own autofix, specify the name of a shell or perl script oran executable that should run when an alert triggers.

Alert Creation You can create alerts from the templates ControlCenter provides or by copying existing alerts. You control:

x The values that cause an alert to trigger

x How often ControlCenter evaluates the alert

x What happens when the alert triggers

In addition to the automated responses, you can respond to atriggered alert by right-clicking it and selecting from a list ofcommands. The Online Help provides recommendations for how torespond to each alert.

3EMC ControlCenter Tasks

Schedules Schedules define when ControlCenter events should occur, such asthe evaluation of an alert, the collection of statistics, or the running ofa report. In a schedule, you can define the interval at which an event

( 10 d i h d ) h d f h

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 70/100

3-26 EMC ControlCenter Version 5.0 Introduction 

occurs (every 10 seconds, minutes, hours, and so on), the days of theweek, and the days of the year. ControlCenter provides severalpredefined schedules, and you can define additional ones.

You use schedules to specify when ControlCenter should evaluatealerts or collect statistics. You can use one schedule with multiplealerts or data collection policies.

Reports ControlCenter includes a reporting mechanism, allowing you to runstandard queries or reports, edit the ones that already exist, or createnew ones. Figure 3-19 shows the Properties view of the ECC reportsfolder.

Figure 3-19 Properties View of a Reports Folder

3EMC ControlCenter Tasks

Figure 3-20 shows the results of running a report.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 71/100

Administration  3-27

Figure 3-20 General Assets Detail Report

3EMC ControlCenter Tasks

Workload Analyzer

Workload Analyzer supplements the Performance Management task

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 72/100

3-28 EMC ControlCenter Version 5.0 Introduction 

Workload Analyzer supplements the Performance Management task by providing ways of measuring performance across the system. Ithelps you answer questions such as:

x Are my backups running successfully?

x Are they running fast?

x Which hosts are performing poorly and when?

x

How active are my servers today compared with six months ago?Workload Analyzer provides both historical reporting and real-timeevent polling. By analyzing historical trends, you can predict futurecapacity.

WLA Archiver The WLA Archiver is used to process and store statistical datacollected for Workload Analyzer (WLA) by storage agents, host

agents, and database agents.Data collection policies are assigned to the Storage Agent forSymmetrix to collect Symmetrix statistics, to the Database Agent forOracle to collect Oracle database statistics, and to some Windows andUNIX Host Agents to collect host statistics. As the statistical data iscollected for these agents, it is transferred to the WLA Archiver whichprocesses and stores the data as Performance Archives, Revolvingdata, and Analyst data.

The amount of data that is stored by the WLA Archiver is determined by the WLA Retention policy.

Alerts are available to the WLA Archiver to inform you when data isavailable or if there was a problem with data collection or processing.

WLA Data

Collection Policies

Data collection policies are used to manage the statistical data

collected for Workload Analyzer Performance View. There are threetypes of policies for collecting Workload Analyzer (WLA) data:

x WLA Dailyx WLA Revolvingx WLA Analyst

You create a data collection policy from a predefined template. Whenyou have defined the appropriate settings and schedule, you assign

the policy to a specific agent, for example, to the Storage Agent for

3EMC ControlCenter Tasks

Symmetrix (for Symmetrix statistics), to the Database Agent forOracle (for Oracle database statistics), and to the Windows or SolarisHost Agents (for host statistics).

All t th i t f t ti ti i ll ti

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 73/100

Workload Analyzer  3-29

All agents save their counters or performance statistics in a collectionfile maintained locally by each agent. The WLA Archiver thengathers the counters from the collection files, creates the performancestatistics based on user requests, and saves them in a local database.The user can view these performance statistics from WLAPerformance View when requested, or from automatically generatedreports.

For ControlCenter 5.0, the user interface for the Workload Analyzer is notintegrated into the Console. You must install and start the PerformanceReport Manager and WLA Performance View applications separately.However, Workload Analyzer does use the WLA Archiver, ECC Server, andStore to gather and retain its data.

WLA PerformanceView

WLA Performance View presents data on specified managed objectsin a tabular or graphical format. The data can be performance orconfiguration data—archived or real-time— filtered by user-specifiedcriteria. WLA Performance View provides data views, which areformulas for tracking one or more performance statistic gathered byagents. WLA Performance View allows users to create their owngraphs from specified managed objects. WLA Performance View canalso display performance and configuration data in tables with

 behavior similar to Microsoft Excel tables.

Every graph and table listed above derives its statistics from thecollections. The user can view historical reports side-by-side formultiple data providers.

3EMC ControlCenter Tasks

Enterprise Framework Environments

EMC ControlCenter can be integrated into a number of enterprisef k

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 74/100

3-30 EMC ControlCenter Version 5.0 Introduction 

EMC ControlCenter can be integrated into a number of enterprisemanagement frameworks:

x Computer Associates Unicenter TNG® 

x HP OpenView® Network Node Manager

x HP OpenView NNM VPO (ITO)

x Tivoli™ NetView

x Tivoli Enterprise Console

x MicroMuse™ Netcool® OMNIbus

If you currently use one of these monitoring systems to control yourIT environment from a central command console, you can integrateControlCenter into the enterprise management framework.

The integration relies on the Integration Gateway (refer to IntegrationGateway on page 2-11) that provides an SNMP interface on the frontend that includes an SNMP MIB (Management Information Base) fordiscovery information and SNMP traps for the events. AdditionalIntegration Packages files are provided to help you integrateControlCenter into the management framework display.

For more information, refer to the EMC ControlCenter IntegrationPackages Product Guide.

SNMP Interface Although the Integration Gateway is primarily for integration withframework applications, any application can obtain ControlCenterdata through the SNMP-based Integration Gateway interface toControlCenter.

3EMC ControlCenter Tasks

Launching Third-Party Applications

Many third-party applications can be launched through the Consoleif th C t lC t t

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 75/100

Launching Third-Party Applications  3-31

Ma y t d pa ty app cat o s ca be au c ed t oug t e Co so eas if they were ControlCenter components.

Each application component must register itself on a host connectedto the ControlCenter environment using an Integration DefinitionFile (IDF). The launching mechanism discovers these componentsthrough the IDF file at runtime and launches the component on adefined host (possibly a host other than the component’s host). Formore information, refer to the EMC Powerlink Web site,http://powerlink.emc.com

3EMC ControlCenter Tasks

Help

The Help menu at the right of the menu bar and Help buttons ondialog boxes provide access to a comprehensive Java based Help

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 76/100

3-32 EMC ControlCenter Version 5.0 Introduction 

p g pdialog boxes provide access to a comprehensive Java-based Helpsystem. In the same way as the ControlCenter Console focusesattention on the management tasks and away from the componentsthat perform those tasks, so the Help topics list tasks rather thancomponents.

The Help viewer has a toolbar and two panes.

The toolbar contains back and forward buttons, enabling you toretrace your browsing history. Print buttons enable you to print thetree, the current topic, or the current topics together with those belowit in the hierarchy. Join and split docking buttons let you join or splitthe navigation and contents panes.

The navigation pane is a tabbed interface that allows you to switch between a contents view, an index, and a full-text search pane.

Figure 3-21 Help Navigator

3EMC ControlCenter Tasks

The content pane displays the selected Help topic.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 77/100

Help  3-33

Figure 3-22 Introducing EMC ControlCenter Topic

For complete information on how to use EMC ControlCenter, pleaserefer to the online help. A Help on Help topic explains how to use thehelp system and the functions available.

3EMC ControlCenter Tasks

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 78/100

3-34 EMC ControlCenter Version 5.0 Introduction 

Glossary

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 79/100

EMC ControlCenter Version 5.0 Introduction  g-1

This glossary contains terms related to EMC ControlCenter. Many ofthese terms are used in this manual.

A

active alert An alert for which one or more trigger values have been met. Activealerts display in the Active Alerts view in the Console. Respond to anactive alert by right-clicking it and selecting from a list of availablecommands. An active alert displays until you remove or reset it or theconditions that caused the alert to trigger are alleviated.

Administration folder A folder in the tree panel that contains a hierarchical tree of ECCadministration objects, organized by task: alert management, datacollection policies, security management, and so on. Drilling downthrough the hierarchy displays increasing levels of detail, such asspecific definitions and templates.

agent A program, running on a system, that takes action on behalf of anadministrator or user. A ControlCenter agent typically acts on

policies, monitors, collects data, and executes commands initiated atthe Console.

alert An expression, based on a metric, that triggers notification when it isobserved. For example, an alert could be triggered when 95% orgreater storage utilization occurs for a particular device.

Glossary

alert definition An alert for which keys, trigger values, and a schedule have beendefined, and optionally autofixes and a management policy. Youcreate alert definitions using the alert templates or by copying

existing alerts. See also management policy.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 80/100

g-2 EMC ControlCenter Version 5.0 Introduction 

alert schedule Defines when ControlCenter should evaluate an alert. In a schedule,you can define the interval at which the evaluation occurs (every 10seconds, minutes, hours, and so on), the days of the week, and thedays of the year. ControlCenter provides several predefinedschedules, and you can define additional ones. One predefinedschedule is Agent Controlled. You cannot edit this schedule. It is used

in cases where ControlCenter uses intercepts or drivers that rely onan event occurring (for example, a message being written to a log fileor ControlCenter itself completing a task).

alert type - count A count alert monitors values that can be calculated, such as thepercentage of free space in a file system or the size of a file. Countalerts have numeric values for the triggers.

alert type - state A state alert evaluates whether a condition is true or false, such aswhether a subsystem or database is active or whether an importantfile was backed up. State alerts have TRUE or FALSE as the triggervalue.

allocated capacity The amount of storage made available to hosts connected to aSymmetrix system. In a direct-connect (SCSI or ESCON)environment, Symmetrix devices are considered allocated as soon as

they are mapped to a front-end port. In a SAN (Fibre Channel)environment, Symmetrix devices are considered allocated whenVolume Logix allows access from a specific host to those devices.

authentication agent A process that maintains user IDs and passwords.

authorization A mechanism within ControlCenter allowing you (the ControlCenteradministrator) to control user access to hosts, Symmetrix systems,

and the ControlCenter security management system. You createauthorization rules for users or user groups. Although you can onlycreate one authorization rule per user or user group, the securitymanagement system provides endless flexibility by allowing you toinclude users in multiple groups and to nest groups within othergroups. Users inherit the authorization rules of the groups to whichthey belong and, similarly, groups inherit the authorization rules ofthe groups in which they are nested.

Glossary

authorization rules A set of permissions assigned to ControlCenter users and usergroups. For example, you might create an authorization rule thatgrants the user group SymmetrixAdmins permissions to use the

TimeFinder and SRDF applications for managing Symmetrixsystems. Unless the users are granted these permissions by some

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 81/100

EMC ControlCenter Version 5.0 Introduction  g-3

y g p yother rule, ControlCenter would prevent users not in theSymmetrixAdmins group from making changes to Symmetrixdevices.

autofix An action that ControlCenter can perform automatically when analert triggers, such as backing up or clearing a log file. ControlCenter

provides some autofixes; you can also create your own using existingscripts, batch files, and executables, or by writing new ones.

B

back-endconfiguration

The configuration of disk directors and physical disk devices in aSymmetrix system. Back-end components are responsible for stagingdata from the physical disk devices to cache and the subsequent

destaging of data from cache back to the physical devices.

Backup Agent for TSM(Tivoli Storage

Manager)

A ControlCenter agent that allows you to monitor your TSM backupsystems, looking for events that you define, such as failed backupsand increasing space utilization. TSM is a storage managementsystem to manage business information in an enterprise-wide StorageArea Network (SAN) and traditional network environment.

Business ContinuanceVolume (BCV)

A Symmetrix device that represents an additional mirror image of astandard device. The BCV can be dynamically synchronized, andsplit at any time, to create point-in-time copies of data. While a BCV issplit from the device, it can be allocated to a host. BCVs are located inthe same Symmetrix system as the devices they are mirroring.

C

Celerra File Server An EMC high-end network file server composed of two cabinets--one cabinet contains the Symmetrix system, and the other cabinetcontains the Celerra File Server components.

CLARiiON An EMC midrange, scalable, full Fibre Channel storage array.

client A host that runs the ControlCenter management applications.

Glossary

Command History A function within the ControlCenter Console monitoring group thatprovides a tabular view of the ControlCenter active commandsassociated with managed objects. It shows who executed which

command on which object when.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 82/100

g-4 EMC ControlCenter Version 5.0 Introduction 

Common ArrayManager

The ControlCenter product that encompasses support for storagesystems from other manufacturers such as Compaq StorageWorks,HDS/HP, RVA/SVA, and IBM ESS.

configured capacity The amount of storage capacity configured into Symmetrix devices. Itis the usable capacity (the amount of storage a host can use to build a

file system or database). See also unconfigured capacity.

connected In regard to fabrics, a state where all the units comprising the fabrichave physically intact links between them to conduct I/Otransactions from any unit to any other unit in the fabric. A fabriccould have some physical links down and still be connected if thereare sufficient physical links to allow I/O to and from all of the units.

Connectivity Agent forSDM

A ControlCenter agent that monitors the VCM database on eachSymmetrix system for storage access control configuration changes.The SDM (storage device masking) Agent discovers volume accesscontrol information for each Symmetrix system in a storage networkand updates the Repository with configuration changes.

Connectivity Agent forSNMP

A ControlCenter agent that manages information gathered by genericSNMP agents in the storage network, updates the Console with

current connectivity settings, executes data collection policies, andgenerates alerts. It is generally installed on the same host as the ECCServer.

Connectivity Agent forSwitches

A ControlCenter agent that monitors switch status throughvendor-supplied software. The Connectivity Agent for Switchesdiscovers topology and fabric information for switches, runs datacollection policies to monitor topology and fabric status, and updates

the Repository with switch connection data. Typically, a singleinstance of the Switch Agent is installed.

connectivity device Any device that indirectly connects hosts with storage arrays. Theymay also be devices that allow connections to other connectivitydevices, but with the ultimate purpose of connecting hosts to storagearrays. Examples include: switches, hubs, bridges, and patch panels.

Glossary

Connectivity folder A folder in the tree panel that contains a hierarchical tree ofconnectivity objects, organized by connectivity device, links, orunknown ports. Drilling down through the hierarchy displays

increasing levels of detail, such as specific switches and ports.

C l

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 83/100

EMC ControlCenter Version 5.0 Introduction  g-5

Console The user interface to ControlCenter. It provides the core functionality;other applications are built into the Console as plug-ins. The Consoleallows the user to manage objects, views, and actions together in anintuitive flow, to achieve a particular task.

D

database agents A collective term for the ControlCenter agents that monitor ormanage host databases. Database agents are provided for Oracle andMVS DB2. The agent typically gathers configuration, status, andperformance data from the database and may support control actions.

Database Tuner(Symmetrix)

An EMC application that analyzes database and storage objects (forexample, an Oracle database and Symmetrix system) from a single

location. It monitors and tunes the database object for improveddatabase performance, optimizes it for the storage object, andidentifies storage devices that are causing bottlenecks for databaseaccess.

data collection policy A formal set of statements used to manage the data collected byControlCenter agents. A policy specifies the data to collect and thecollection frequency. Most agents have associated predefined

collection policies and collection policy templates that can beconfigured through the ECC Administration task.

data collection policytemplate

A template that provides default values for the creation of newcollection policies. ControlCenter provides one or more policytemplate for each agent. You can configure your own policies bymodifying the collection policy templates.

device group A group of devices that can be managed using a single device groupname. ControlCenter allows you to view, create, and modify SYMCLIdevice groups and to perform operations on the device group. Devicegroups (unlike ControlCenter) are associated with a particular hostand Symmetrix. For example, you might set up a group of all devicesused by a particular host. Another group might be all devices used ina particular database. See also group.

Glossary

device reallocationvolume (DRV)

A non-user-addressable device within the Symmetrix that isdesignated to act as the temporary staging area while a pair ofSymmetrix devices are swapped by the Optimizer product.

discoverable object A connectivity device in the storage network that can be identified byt Th f ll i tt ib t f th bj t t b id tifi d IP

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 84/100

g-6 EMC ControlCenter Version 5.0 Introduction 

an agent. The following attributes of the object must be identified: IPaddress, world wide name (WWN), ports, neighboring switches,type, management information base (MIB), Fibre Channel adapter(FA) port, director, and serial number.

discovery The process of identifying storage systems, hosts, ports, links,

switches, and other objects in the storage network. Discovery isperformed by the Storage Agent for Symmetrix and Host Agent oncethey are installed, according to a predefined discovery policy. Theuser initiates discovery of other objects in the topology using theSNMP Collector, ESN Switch Agent, ESN SDM Agent, Oracle Agent,other ControlCenter agents, and various vendor agents. The agentscollect data from the objects in the storage network and correlate it inthe Repository. Once the discovered data is in the Repository, it

remains persistent and adheres to normal update, delete, andrediscovery constraints.

E

ECC Server The primary interface between the Console(s), Repository, andagents. It also provides many of the common services to theControlCenter infrastructure.

EMC ControlCenter A family of products that enables you to discover, monitor, automate,provision, and report on host storage resources, networks, andstorage across your entire information environment from a singleconsole.

Enterprise StorageNetwork (ESN)

A storage network implementation that integrates products,technology, and services offering universal data access for every

major computing platform, operating system, and application acrossany combination of SCSI, Ultra SCSI, Fibre Channel, and ESCONtechnologies.

Enterprise SystemConnection (ESCON)

A set of IBM and vendor products that interconnect S/390 computerswith each other, with attached storage, and with other devices usingoptical fiber technology and dynamically modifiable ESCONdirectors.

Glossary

F

Framework

Integration package(ControlCenter)

ControlCenter software that consists of a component that integrates

ControlCenter into various third-party framework applications suchas HP OpenView or CA Unicenter, and an agent (the IntegrationGateway) that uses SNMP to monitor events and interface to the

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 85/100

EMC ControlCenter Version 5.0 Introduction  g-7

Gateway) that uses SNMP to monitor events and interface to thethird-party application.

front-endconfiguration

The configuration of host channels, SCSI, ESCON, and Fibre Channeldirectors, ports, and Symmetrix logical devices. Front-endcomponents are responsible for handling I/O requests from hosts and

serving the data from cache.

functional deviceidentifier (FDID)

A unique ID that the RVA or SVA uses for an MVS device.

G

gatekeeper A Symmetrix device accessible by the host through which theControlCenter agent communicates with the Symmetrix. The

gatekeeper routes low-level SYMAPI commands to the Symmetrix.

group A group of objects that allows you to logically group hosts,Symmetrix systems, and other objects that ControlCenter manages.Creating object groups simplifies how you manage objectpermissions. For example, you can create an object group thatincludes all your UNIX hosts and then grant your UNIXadministrators permissions to perform actions on those hosts.

H

host agents A group of ControlCenter agents that monitor or manage the hostenvironment. Host agents are provided for AIX, HP-UX, Novell,Solaris, Windows, and various MVS subsystems. The agent typicallygathers configuration, status, and performance data from the host onwhich it is running and may support control actions.

host bus adapter(HBA)

An I/O adapter that sits between the host computer’s bus and theFibre Channel loop, and manages the transfer of information betweenthe two channels.

Hosts folder A folder in the tree panel that contains a hierarchical tree of hostobjects, organized by operating system: Solaris, Windows, MVS, andso on. Drilling down through the hierarchy displays increasing levels

of detail, such as specific hosts, databases, and tablespaces.

Glossary

hot spare device A powered up physical disk drive that a Symmetrix system can use insituations such as the failure of a standard (STD), R1, or R2 device.

hyper device The splitting of a physical disk into two or more devices. The hostviews hyper volumes as individual physical devices. Also calledSymmetrix device (logical device)

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 86/100

g-8 EMC ControlCenter Version 5.0 Introduction 

Symmetrix device (logical device).

infrastructure A collective term that describes the base ControlCenter components:ECC Server, Store, and Repository.

Integration Gateway A ControlCenter agent that provides an interface from the ECC

Server to management framework applications such as HPOpenView Network Node Manager, Tivoli NetView, or the CAUnicenter TNG Framework, enabling those applications to displayControlCenter information. See also Framework Integration package.

L

login history table

(LHT)

A table residing on Symmetrix systems that contains the current and

historical login information of host HBAs logging into each FA in aSymmetrix system. The information in the table can be used to trackchanges in a configuration.

log file A file (one for each ControlCenter component) that contains outputmessages from component execution. Log files contain messageswith different levels of output that indicate message severity. When alog file reaches a maximum size, a new log is created. The number of

log files per component is configurable; the default is five. Once themaximum number of logs are created, the first log is reused.

logical deviceconfiguration

The process of defining additional storage capacity fromunconfigured space within a Symmetrix system.

logical unit number(LUN)

An addressing model for devices in which each separatelyaddressable logical unit in a storage system has a unique LUN ID,

which is a hexadecimal number. The default ID for the first new LUNis the smallest available one; for the next new LUN, it is the nextsmallest available, and so on.

M

managed object Hosts, databases, file systems, storage systems, switches, and otherconnectivity devices in the storage network that can be managed by

ControlCenter.

Glossary

managementinformation base

(MIB)

A formal description of each network object and storage component,organized in a hierarchical tree structure. The information for eachobject is addressed using an object identifier (OID). An application

typically reads or writes the information for each object using anetwork management protocol like SNMP. A basic MIB is defined aspart of SNMP All other MIBs are extensions of this basic MIB

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 87/100

EMC ControlCenter Version 5.0 Introduction  g-9

part of SNMP. All other MIBs are extensions of this basic MIB.Therefore MIBs (or more accurately, MIB extensions) exist for each setof related network entities that can be managed.

management policy A formal set of statements that defines the users (scripts, SNMP trap,and so on) that ControlCenter should notify when an alert triggers,

and how those users should be notified. Notification options include:a message through the Console, an e-mail, and a message to amanagement framework such as Hewlett Packard’s OpenView.

mapped capacity Devices that are mapped to front-end ports on a Symmetrix system.Host systems cannot access device unless they are mapped tofront-end ports. See also unmapped capacity.

Master Agent A ControlCenter agent that manages the installation, starting, andstopping of other agents on the host. Required on every host runningan agent (except for the Connectivity Agent for SNMP).

media repository An area on the ECC Server to which ControlCenter components aredownloaded before they are installed. Installation and licensinginformation is captured and shared through the media repositorytables.

meta device Meta devices are Symmetrix devices concatenated together to form alarger device. The Symmetrix devices forming the meta device are allaccessed through the same target/LUN value. The SDR componentreports the Symmetrix meta device number as the device number ofthe first device in the group, which is also known as the meta head.The remaining members of the group are known as meta members.

mirroring The concept of maintaining data on both a production volume and amirror volume. RAID technology (for example RAID Level 1)provides various levels of mirroring at the physical disk level.TimeFinder uses local mirroring to protect data at the logical volumelevel by maintaining data on both a production volume and a mirrorvolume within the same storage unit. SRDF uses remote mirroring,which is similar to local mirroring except that the production volumeresides in one storage unit while its mirror resides in a different

storage unit.

Glossary

MVS (OS/390) An operating system from IBM that is installed on most of itsmainframe and large server computers. Payroll, accounts receivable,transaction processing, database management, and other programs

critical to large businesses typically run on an MVS system.

N

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 88/100

g-10 EMC ControlCenter Version 5.0 Introduction 

N

Navisphere An EMC application that manages storage for CLARiiON storagesystems. It configures, monitors, and tunes CLARiiON disk arrays,provides the Console with the status of CLARiiON systems, andindicates when an alert occurs by changing the color of the

CLARiiON icon.

net capacity load(NCL)

In an RVA/SVA storage array, a statistic measuring the percentage ofactual total physical capacity of the subsystem or one of its partitions(test or production). A value of 70 to 80 is considered normal forNCL.

O

OnAlert An EMC application that provides remote support functionality and,optionally, dial-home capability to Symmetrix systems.

Open IntegrationComponents

The ControlCenter product encompassing the set of common servicesavailable to all EMC ControlCenter/Open Edition products,including centralized install, agents for all managed entities, loginand access control administration, a Repository, and so on.

Optimizer A separate product that automatically collects, analyzes, anddynamically balances physical drive I/O load by swappingSymmetrix devices.

P

Performance view A view displaying Symmetrix performance statistics about various

objects available within ControlCenter. For each object, ongoingreal-time data can be displayed in chart form, or point-in-time datacan be displayed in table form.

permissions A set of permissions granted to a ControlCenter user that grantpermission to perform specific actions on specific objects. A user’spermissions are controlled by an authorization rule applied directlyto the user, plus those permissions the user inherits from the user

Glossary

groups to which they belong. ControlCenter provides several defaultpermission sets. The ECCAdministrators Rule is a set of permissionscreated by default when you first start the ECC Server. It grants to

members of the ECCAdminstrators user group all permissions on allobjects. The rule is intended for initial set up of your ControlCentergroups and permissions.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 89/100

EMC ControlCenter Version 5.0 Introduction  g-11

g p p

point/record In Workload Analyzer, a point or a record represents the value of datacollected by an agent at a specific time. For example, if the agentcollects statistical data every 15 minutes, the data collected at 8:15 isrepresented by one point or one record. When looking at a WLA

Performance view graph, each value is represented by one point onthe graph. However, when talking about Performance Archives,Revolving data, and Analyst data, you can use the terms record andpoint interchangeably.

port flags Settings assigned to front-end ports that tell a Symmetrix system howto communicate with different host types and how to behave incertain situations.

production partition In the RVA or SVA subsystem, a classification assigned to drives inuse (or available) for data storage. The production partition has nofunctional difference from the test partition.

proxy agent A Symmetrix agent that provides indirect access to a host running theSYMAPI Server and directly connected to a Symmetrix system. TheSYMAPI Server host receives requests for data or commands from the

Symmetrix Agent, acts upon the data request or command, andreplies to the Symmetrix Agent. A proxy host is typically used in asituation where the SYMAPI Server host is running on a platform notsupported for the Symmetrix Agent, such as MVS.

Q

quality of service

(QoS)

A function within the ControlCenter Console that reduces the

resources allocated for Business Continuance Volumes (BCVs) orSRDF copy operations on selected devices. QoS allows you to controlthe balance between standard and BCV/SRDF operations.

Glossary

R

RA group A logical grouping of source (R1) or target (R2) devices associated

with a remote link director. Up to 16 RA groups may exist in an SRDFconfiguration.

di A th t f h C t lC t b t i i th l t t

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 90/100

g-12 EMC ControlCenter Version 5.0 Introduction 

rediscover A process that refreshes ControlCenter by retrieving the latesttopology connection settings from the Repository.

Relationship view A function within the ControlCenter Console that provides acomplete mapping of host objects to Symmetrix devices, with

physical, logical, and line-of-business views.

remote link director(RLD)

A two-port serial channel or Fibre Channel directormicrocode-configured as the link between the two Symmetrixsystems in a Symmetrix Remote Data Facility (SRDF) configuration.

Reports folder A folder in the tree panel that contains a hierarchical tree ofControlCenter and user-defined reports, organized by type. Drilling

down through the hierarchy displays specific reports.

Repository A central, relational database that contains the aggregation of all thedata about your installation’s managed environment.

Resource Availability A ControlCenter application that allows platform-independentmanagement of logical storage resources. Resource Availability:

• Automates event response to storage resource issues, such as

 backup status and capacity utilization

• Contains established business policies designed to improveservice levels and availability

• Eliminates the need for host-specific configuration andmonitoring commands

rules See authorization rules.

Glossary

S

schedule A set of instructions that defines when ControlCenter events should

occur, such as the evaluation of an alert or the collection of statistics.In a schedule, you can define the interval at which an event occurs(every 10 seconds, minutes, hours, and so on), the days of the week,

d th d f th C t lC t id l d fi d

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 91/100

EMC ControlCenter Version 5.0 Introduction  g-13

and the days of the year. ControlCenter provides several predefinedschedules, and you can define additional ones.

Server See ECC Server.

SNMP Agent Vendor software installed on connectivity devices that responds tomanagement requests through the SNMP protocol. SNMP agentsdetect changes in the physical connectivity of devices in the SAN.Data generated by SNMP agents is used by the Connectivity Agentfor SNMP to update the Console and generate alerts. One SNMPAgent can manage multiple devices.

Solutions Enabler An EMC product included with ControlCenter that can manage and

retrieve configuration, status, and performance information fromSymmetrix systems. The Solutions Enabler components includeSYMCLI, SYMAPI, and SYMAPI Server.

spares partition In the RVA or SVA subsystem, the classification assigned to drivesthat have passed media acceptance testing but are currently unusedfor data storage. Such drives are called spares.

SRDF (SymmetrixRemote Data Facility) A ControlCenter plug-in (optional application) that manages business continuance and disaster recovery operations using remotemirroring.

Status Acknowledgedfolder

A folder in the tree panel in which you can store managed objects thathave a warning or error status. If you drag an object that has awarning or error status on it (yellow caution or red X) into this folder,then the object’s status will not propagate up the tree causing a parent

icon to show the warning or error icon when that parent is collapsed.The purpose is to acknowledge that you saw the status conditionwithout being reminded of it through the parent object.

Glossary

storage agents A group of ControlCenter agents that monitor or manage storagearrays. Storage agents are provided for Symmetrix, CLARiiON,Celerra, Compaq StorageWorks, HDS, RVA/SVA, and IBM ESS

storage arrays. The agent runs on a host connected to the storagearray and typically gathers configuration, status, and performancedata and may support control actions.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 92/100

g-14 EMC ControlCenter Version 5.0 Introduction 

storage allocation The process of finding and configuring suitable storage space for use by a host.

storage area network

(SAN)

A special-purpose network (or sub network) that interconnects

different kinds of data storage devices with associated data serverson behalf of a larger network of users. Typically, a SAN is part of theoverall network of computing resources for an enterprise. A SAN isusually clustered in close proximity to other computing resources, but may also extend to remote locations for backup and archivalstorage, using wide area network carrier technologies such asasynchronous transfer mode or synchronous optical networks.

storage devicemasking (SDM) An access control mechanism for Symmetrix systems that regulateswhich host bus adapters in a Fibre Channel environment can accessspecific Symmetrix volumes. Synonymous with LUN masking.

Storage folder A folder in the tree panel that contains a hierarchical tree of storagesystem objects, organized by type: Celerra, CLARiiON, HDS,StorageWorks, Symmetrix, and so on. Drilling down through thehierarchy displays increasing levels of detail, such as specific storage

systems, host directors, and individual storage devices.

StorageScope A ControlCenter optional application that addresses the storagemetering and capacity planning requirements of organizationsinterested in consolidating their storage, and improving their storageutilization and asset management.

Store A ControlCenter infrastructure component that populates the

Repository with data from the agents, and controls the sending andreceiving of data between the agents and the Repository.

Symmetrix An integrated cache disk array (ICDA) storage array that providescentralized, sharable enterprise storage. It helps create an informationinfrastructure capable of managing large, complex ultra-dynamicstorage area network (SAN) environments by consolidating storagefrom multiple heterogeneous hosts onto a single system.

Glossary

Symmetrix DataMobility Manager

(SDMM)

An EMC application that allows you to configure, monitor, andmanage the replication of data between Symmetrix devices.

Symmetrix DeviceReallocation (SDR)

A function within the ControlCenter Console storage allocation taskthat allows you to map Symmetrix devices to the front-end directorports of the Symmetrix system You must map a device to one or

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 93/100

EMC ControlCenter Version 5.0 Introduction  g-15

ports of the Symmetrix system. You must map a device to one ormore front-end ports to make it available to a host.

Symmetrix Manager A set of functions accessed from within the ControlCenter Consolethat allows the user to monitor the status, performance, and

configuration of Symmetrix systems and to perform activeSymmetrix commands such as TimeFinder, SRDF and configurationchanges. The Symmetrix Manager also allows you to modify theconfiguration of a Symmetrix system. The controllable areas includelogical device allocation, device type definition, metadeviceconfiguration, SDR, and port flag settings.

T

tape agent A ControlCenter agent for MVS that manages tape systems. It hasfunctions for a Virtual Tape Server (VTS) tape system, a CA-1 tapesoftware package by CA, a StorageTek tape silo environment, andRMM (Removable Media Manager—a software product by IBM).

target panel The right panel in the Console, displaying one or more views of taskdata for the managed object(s) currently selected in the tree panel.

taskbar A blue bar, located by default below the menu bar, providing accessto five task buttons: Storage Allocation, Monitoring, PerformanceMgt, ECC Administration, and Data Protection. Clicking a task button opens a drop-down menu offering a selection of views.

template A set of default values for the creation of new alerts. ControlCenterprovides templates for every alert. You can specify your own default

settings by modifying the alert templates.

test partition In the RVA or SVA subsystem, a classification assigned to drives inuse (or available) for data storage. The test partition has no functionaldifference from the production partition.

Glossary

TimeFinder A ControlCenter plug-in that allows customers to use BusinessContinuance Volumes (BCVs) to provide a local mirror of Symmetrixdevices, while the standard devices are online for regular host

operations.

time window In the context of Optimizer, a period in time during which an aspectof Optimizer’s behavior is controlled. Performance time windows

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 94/100

g-16 EMC ControlCenter Version 5.0 Introduction 

of Optimizer s behavior is controlled. Performance time windowsallow you to specify which samples (past or future) SymmetrixOptimizer should consider when running its swap generationalgorithm. Swap time windows allow you to specify whenSymmetrix Optimizer should or should not perform swap activity.

topology A description of the physical and logical configuration of the storagenetwork, including storage systems, hosts, ports, connectivitydevices, and connecting links.

topology discovery A ControlCenter core function that automatically identifies storage,hosts, ports, links, switches, and other objects in a storage network.See also discovery.

topology editing A ControlCenter feature that allows display in the topology map ofobjects that the Console cannot discover automatically. For example,some elements do not have software-based management interfaces(they are entirely hardware entities). Topology editing can depictthose elements by providing the desired placement in the map andsome basic properties of the object. The Topology Editing featureallows you to display this object in the map, and manually supply

missing connectivity information. In addition to properties, userediting allows you to manually define an object’s relationship toother entities in the topology map.

topology map A ControlCenter core function that provides a picture of elements inthe storage network. It depicts those objects selected in the tree paneland the connectivity relationships between them in a graphicaldisplay. For example, if you select a host, the topology map displays

all children of the host and all connections for the host, such as HBAs,connections, switches, and storage. The topology map reflects thestate of elements that are discoverable through the ConnectivityAgent for SNMP.

tree panel The left panel in the Console, displaying all the objects in the storageenvironment, organized by type.

Glossary

trigger The logical operator that evaluates an alert condition (for example,>90% storage utilization).

Uunallocated capacity The amount of storage formatted into Symmetrix devices but not yet

allocated to a host Unallocated capacity includes both mapped and

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 95/100

EMC ControlCenter Version 5.0 Introduction  g-17

allocated to a host. Unallocated capacity includes both mapped andunmapped devices but does not include unconfigured capacity. Seealso allocated capacity.

unconfigured

capacity

The amount of storage capacity that remains unconfigured (often

expressed in terms of the raw size of the physical drive, such as 36GB). See also configured capacity.

uncollected freespace

The space for deleted data that the RVA or SVA has been informed of(by Deleted Data Space Release (DDSR) processes) but has not yetfreed.

undiscoverable

object

An object in the storage network that cannot be identified by an

agent. An object may remain undiscovered if an agent cannot identifyany of the following attributes: IP address, world wide name (WWN),ports, neighboring switch, type, management information base(MIB), Fibre Channel adapter (FA) port, director or serial number.

unmapped capacity Devices or capacity that have been configured, but not mapped tofront-end ports on a Symmetrix system. Host systems cannot accessvolumes unless they are mapped to front-end ports. See also mapped

capacity.

user groups User groups simplify the management of ControlCenter userpermissions. You can create authorization rules for user groups andgrant permissions to users by including them in specific user groups.For example, you might create a WindowsAdmin user group that hasfull permissions on all Windows hosts. You would include all of yourWindows administrators in that user group.

VCM database A database, residing on a Symmetrix system, that contains host accessinformation for Symmetrix volumes. Each Symmetrix system has itsown VCM database.

Glossary

Visual Storage A function in Symmetrix Manager that shows the configuration of aSymmetrix system. The view can include all directors, channels,cache, ports, and devices, as well as the links between them. You can

configure Visual Symmetrix to your specific needs, such as to displaydisk devices that are serviced by any disk assembly, or to displaywhich volumes are in RAID-S groups.

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 96/100

g-18 EMC ControlCenter Version 5.0 Introduction 

volume A general term referring to a logical storage device. Synonymouswith Symmetrix device.

Volume Logix An EMC application that controls access to Symmetrix volumes. It

avoids conflict, between host-based access control mechanisms, byusing a single, centralized monitoring function. Using Volume Logix,you can define a virtual channel connecting each host with its storagevolumes in a Symmetrix system, even though there may be manyhosts sharing the same Symmetrix port.

WLA Archiver A ControlCenter agent that retrieves and archives collections of datafrom individual agents, and organizes (rolls up) collected data into

summaries for the reports. The summarized data is saved to a dataarchive, separate from the Repository.

WLA PerformanceView

An optional ControlCenter application that is used for viewinghistorical and revolving performance and configuration data ofSymmetrix systems, hosts, and Oracle databases. WLA Archivermanages the statistical data collected for historical analysis throughWLA Performance View.

world wide name(WWN)

A unique 48- or 64-bit number assigned by a recognized namingauthority (often via block assignment to a manufacturer) thatidentifies a connection or set of connections to a network. A WWN isassigned for the life of the connectionor device.

Index

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 97/100

EMC ControlCenter Version 5.0 Introduction  i-1

Aadministration 1-5, 3-22Administration folder 1-11, g-1agents 1-7, 2-7, 2-12, 3-24, g-1

management 2-3permissions 3-22tier 1-6

AIX 2-9alerts 2-12, 3-25, g-1

active g-1Active Alerts table 3-4Alert Definitions table 3-4Alerts view 3-4All Alerts 3-4definition g-2management 2-3notification 3-25schedule g-2schedules 3-26templates 3-25

allocated capacity g-2architecture 1-6authentication 2-3authorization 2-3, g-2

autofix 2-13, 3-25, g-3

B back-end configuration g-3Backup Agent for TSM 2-9, g-3BCV 3-17, g-3  bridges 3-10

CCA Unicenter TNG 2-8, 2-11, 3-30CA-1 tape management 2-9Celerra 1-3, 2-8, 2-18, g-3CLARiiON 1-3, 2-8, 2-18, g-3client g-3Command History view 3-12, g-4

Common Array Manager g-4Compaq StorageWorks 1-3, 2-8configuration 2-14

distributed host 2-16single host 2-16

configuration change log 2-5Configure menu 3-8configured capacity g-4connection settings 3-10Connectivity Agent for SDM 2-8, g-4Connectivity Agent for SNMP 2-8, 2-18, g-4Connectivity Agent for Switches 2-8, g-4connectivity device g-4Connectivity folder 1-11, g-5Console 1-6, 2-18, g-5

tier 1-6converters 3-10

count (metric) 2-13customer storage environment 1-8

Ddata collection 2-14data collection policies 2-14, 3-28, g-5data model 2-4data protection 1-4, 3-17

Database Agent for DB2 2-9

Index

Database Agent for Oracle 2-9Database Tuner g-5DB2 database 2-9

device group g-5device type definition 3-8DFSMS 2-9discovery 2-12, 2-14, 3-10, g-6

Host Agent for MVS HSM 2-9Host Agent for MVS SMS 2-9Host Agent for Novell 2-9

Host Agent for Solaris 2-9Host Agent for Windows 2-9, 3-13Hosts folder 1-11, g-7HP OpenView Network Node Manager 2-8, 2-11, 

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 98/100

EMC ControlCenter Version 5.0 Introduction i-2

disk subsystem management 2-15DRV g-6

E

ECC Server 1-7, 2-3, 2-18, g-6enterprise storage network (ESN) 1-2, g-6

permissions 3-22ESCON 2-18, g-6event management 2-3

Ffabric 2-8

FDID g-7Fibre Channel 2-18Fibre Channel switches 3-10framework applications 1-8, 2-8, 3-30, g-7front-end configuration g-7

Ggatekeeper g-7

gateways 3-10group g-7

HHBAs 3-10, g-7HDS 1-3, 2-8Help menu 3-32Help topics 3-33

Hierarchical Storage Management (HSM) 2-9horizontal split 1-14host 1-3

agents g-7discovery 3-10management 2-15permissions 3-22

Host Agent for AIX 2-9Host Agent for HP-UX 2-9

3-30HP OpenView NNM VPO (ITO) 3-30HP-UX 2-9HTTP connection 2-18hubs 3-10hyper device g-8

IIBM ESS 1-3, 2-8infrastructure g-8

tier 1-6Infrastructure Communication Protocol 2-18Integration Gateway 2-8, 2-11, 2-18, 3-30, g-8interval (metric) 2-13

J  Java 1-9 Java Database Connectivity Interface 2-18

L

licensing 2-3Logical Agent for MVS 2-9logical device configuration 3-8, g-8login 2-3login history table 3-10, g-8logs 2-14, g-8LUN g-8

Mmanaged objects 1-2, 2-4, g-8management policies 2-13, g-9mapped capacity g-9Master Agent 1-7, 2-8, 2-10, 2-18, g-9media repository g-9meta device g-9meta device configuration 3-8MIB 3-30, g-9

Index

MicroMuse Netcool OMNIbus 3-30mirroring 1-4, g-9monitoring 1-4, 3-10

MVS/ESA 2-9

NNavisphere g-10

Resource Availability g-12retention policies 2-15, 3-28Right-click menus 3-9

RLD 3-20, g-12rules 3-22, g-3RVA/SVA 1-3, 2-9

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 99/100

i-3EMC ControlCenter Version 5.0 Introduction 

Navisphere g 10Novell NetWare 2-9

O

object management 2-3object model 2-4objectgroups

permission 3-22Open Integration Components g-10Optimizer 3-15, g-10Oracle database 2-9OS/390 2-9

Pperformance management 1-4, 3-15performance statistics 2-14Performance view 3-6, g-10permissions 3-22, g-3, g-10Physical Agent for MVS 2-9Physical Display view 1-13, 3-12plug-ins 2-2

Policies view 3-24port flag settings 3-8, g-11port identification 3-10Properties view 3-3proxy agent 2-10, g-11

QQuality of Service (QoS) 3-15, g-11

Rrate (metric) 2-13Relationship view 3-5, g-12Removable Media Manager (RMM) tape 2-9reports 3-26

management 2-3Reports folder 1-11, g-12

Repository 1-7, 2-4, 2-18, g-12

SScalability 2-19schedules 3-26, g-13SCSI 2-18

SDM g-14SDR 3-8, g-15security 2-3, 3-22SNMP 2-11, 3-30SNMP agents 2-8, g-13SNMP collection 2-3SNMP Gateway 1-8Solaris 2-9Solutions Enabler 2-10, g-13SRDF 3-17, g-13SRDF properties view 3-20SRDF/DM 3-21SST Server

permissions 3-23state (metric) 2-13statistics

real-time 2-3

status 2-14Status Acknowledged folder 1-11, g-13Storage Agent for Celerra 2-8Storage Agent for CLARiiON 2-8Storage Agent for Compaq StorageWorks 2-8Storage Agent for HDS 2-8Storage Agent for IBM ESS 2-8Storage Agent for RVA/SVA 2-9Storage Agent for Symmetrix 2-8, 2-18

storage allocation 1-4, 3-7storage arrays 1-3, 3-10Storage folder 1-11, 3-3, g-14StorageScope g-14StorageTek tape silo 2-9Store 1-7, 2-6, 2-18, g-14switches 2-8, 3-10SYMAPI Server 2-10

Index

Symmetrix 1-3, 2-8, 2-18, g-14permissions 3-22

Symmetrix Manager g-15

TTape Agent for MVS 2-9, g-15Tape Management systems 1-3, 2-15, 2-18

8/4/2019 Control Center Introduction 5.0 A01

http://slidepdf.com/reader/full/control-center-introduction-50-a01 100/100

EMC ControlCenter Version 5.0 Introduction i-4

p g y , ,target panel 1-13, g-15taskbar 1-10, g-15TimeFinder 3-17, g-16TimeFinder view 3-17

Tivoli Enterprise Console 3-30Tivoli NetView 2-8, 2-11, 3-30Tivoli Storage Manager (TSM) 2-9topology g-16Topology view 3-11tree panel 1-11, 2-2, g-16

U

unallocated capacity g-17unconfigured capacity g-17unmapped capacity g-17User Account

permissions 3-23user groups g-17users 3-22

VVCM database 2-8, g-17vertical split 1-14view

format 1-14views 1-13, 2-2Virtual Tape Server (VTS) 2-9Visual Storage view 3-7, g-18

WWeb server 2-3Windows 2-9WLA Archiver 2-8, 2-15, 2-18, 3-28, g-18

archives 2-5WLA Performance View 2-8, 3-29, g-18WWN g-18