206
EMC Control Center permits administration/management of the entire infrastructure, from host/server OS, to SAN and to Storage systems, as Hitachi, HP, IBM, etc. By the use of wizards, Control Center permits administrators to do automated storage provisioning. Timefinder allows to make copies of volumen inside the same symmetrix system. (local) SRDF permits to replicate/copy sites between Symmetrix systems. (remote copy) Symmetrix architecture (950 part icular, as A & B cards are back end) Each Hyper has a number, or symvol. This symmvol, is consecutive, so always is better to allocate continuous hypers. The rule of 17, comes from older DMX or 8000 series. Always the directors configuration is started from highest # to the lowest (17-0) (16-1), etc. Hyper types : STD, BCV. STD: is the normal volume, and is able to be under RAID1, 5, 6, unprotected, etc. BCV: is used by Timefinder, normally unprotected, but it can also have R5, 6, 1, etc. For cloning, it can be done from STD to BCV, or from STD to STD volumes. VDEV: Virtual devices used with Timefinder Snap. VCMDB : Only exists one VCMDB per Symmetrix system, here resides all the masking configuration of the symmetrix system. (hosts HBA WWN, switch port, symm port, etc) Can be backedup in the Control Center Host. (Right click, backup VCMDB.) META : Meta devices are simply several logical devices that are presented to a host as just one larger device. Within the Console it appears in most views to be several devices, though the partnered members are eas y to identify. Meta devices can be concatenated (data addressed linearly) or striped (data address shuffled among the members). R1 & R2: SRDF Volumes, R1 is source, R2 is target device. Gatekeeper (GK): utilized to send commands to S ymmetrix system. This volumes must be presented to any host in which the ECC / Solution Enabler will be installed. Recommended is to CA CH E (E VERYTIME A HOST S TRIES TO W RITE, THE WRITE GOE S TO THE CA CH E , AND THE N I S DE ST AG ED TO DIS K ) 01 02 16 17 D C B A 0 1 0 1 0 1 0 1 D C B A C D C D C D C D DISKS / H YPE RS LOO P LOO P 0 00 sy mm vo l LUN 000 EMC Control Center Knowledge Share - July 17th 2009, Gaston Benetrix @ EMC Corporation, Argentina.

Control Center Knowledge Share

Embed Size (px)

DESCRIPTION

ControlCenter Storage Allocation SRDF SAN Configuration TimeFinder Knowledge Share

Citation preview

Page 1: Control Center Knowledge Share

EMC Control Center permits administration/management of the entire infrastructure, from host/server OS, to SAN and to Storage systems, as Hitachi, HP, IBM, etc.

By the use of wizards, Control Center permits administrators to do automated storage provisioning.

Timefinder allows to make copies of volumen inside the same symmetrix system. (local) SRDF permits to replicate/copy sites between Symmetrix systems. (remote copy) Symmetrix architecture (950 part icular, as A & B cards are back end)

Each Hyper has a number, or symvol. This symmvol, is consecutive, so always is

better to allocate continuous hypers. The rule of 17, comes from older DMX or 8000 series. Always the directors configuration is started from highest # to the lowest (17-0) (16-1), etc. Hyper types: STD, BCV. STD: is the normal volume, and is able to be under RAID1, 5, 6, unprotected, etc.

BCV: is used by Timefinder, normally

unprotected, but it can also have R5, 6, 1, etc. For cloning, it can be done from STD to BCV, or from STD to STD volumes. VDEV: Virtual devices used with Timefinder Snap. VCMDB: Only exists one VCMDB per Symmetrix system, here resides all the masking configuration of the symmetrix system. (hosts HBA WWN, switch port, symm port, etc) Can be backedup in the Control Center Host. (Right click, backup VCMDB.) META: Meta devices are simply several logical devices that are presented to a host as just one

larger device. Within the Console it appears in most views to be several devices, though the partnered members are easy to identify. Meta devices can be concatenated (data addressed linearly) or striped (data address shuffled among the members). R1 & R2: SRDF Volumes, R1 is source, R2 is target device. Gatekeeper (GK): utilized to send commands to Symmetrix system. This volumes must be presented to any host in which the ECC / Solution Enabler will be installed. Recommended is to

CA CHE

(E VERYTIME A HOST S TRIES TO W RITE, THE WRITE GOE S TO THE CA CHE, AND THE N IS DE STAGED TO DISK)

01 02

16 17

D

C

B

A

0

1

0

1

0

1

0

1

D

C

B

A

C

D

C

D

C

D

C

D

DIS

KS

/ H

YPE

RS

LOO P

LOO P

0 00

sy mmvo l

1

0

LUN 000

EMC Control Center Knowledge Share - July 17th 2009, Gaston Benetrix @ EMC Corporation, Argentina.

Page 2: Control Center Knowledge Share

have at least 4 GK Volumes allocated to the host via Fibre Channel. If not GK available, another hyper can be allocated to host. It normally has 6 cylinders (2.88). CLARiiON architecture: Storage processors in clariion have separated caches for read & writes, but not mirrored like in

Symmetrix.

S UPERVISOR

WS-X 9530 SFI

CONSOLE M GMT

STATUS

SYSTE

M

RESE TACT

IV EPWR

M

GMT

COM 1 C FI

1 0/100

S UPERVISOR

WS-X 9530 SFI

CONSOLE M GMT

STATUS

SYSTE

M

RESE TACT

IV EPWR

M

GMT

COM 1 C FI

1 0/100

To allocate disks from Clariion arrays, we must create RAID Groups, when creating a RAID Group, we must choose the type of protection you desire, but it will depend also, on how many disks you have selected for the group. * In Clariion, instead of Timefinder, we have Snapview, and instead of SRDF, Mirrorview. The SAN or Storage Area Network, is network of storage disks. In large enterprises, a SAN connects multiple servers to a centralized pool of disk storage. Compared to managing hundreds of servers, each with their own disks, SANs improve system administration. By treating all the company's storage as a single resource, disk maintenance and routine backups are easier to

schedule and control. In some SANs, the disks themselves can copy data to other disks for backup without any processing overhead at the host computers.

Storage Scope: is an independent Oracle database for the reports There is a process that gathers information from ECC Database to the Storage Scope DB. (Extract, Transform and Load - ETL)

Page 3: Control Center Knowledge Share

ControlCenter is made up of three layers. They can be easily thought of as data visualization, data storage, and data collection, but are more formally called the User Interface Tier, Infrastructure Tier, and Agents Tier.

The infrastructure is the tier responsible for data storage made up of three separate processes (Server, Repository, and Store). The console tier handles data presentation. The main presentation tool is the ControlCenter Java Console, but other presentation tools are used for deeper analysis. The agent tier is responsible for data gathering. Agents of different types monitor and manage

objects such as arrays, switches, and applications. This will be covered in more detail in the next lecture. The Store, is the entity that writes all the agents information to the repository. The Java console permits a complete management, but the web console is only to manage aler ts. ECC Server is the host from which all the commands are ran, and saved in to the repository. The data collection policies maintain our reposi tory continously updated. The master agents are mandatory for the servers which you want to administer from control center, they manage the other installed agents. (permit updates, patching and install/deinstall).

The host (or OS) agent, is the one that collects the host’s health and aler ts and presents it to ControlCenter. Passes information to ECC and Storage Scope. In ESX servers, you must install master and vmware agents in order to view the LUNS mapped to virtual hosts. * And for every device you want to administer from ControlCenter, you will need to install an specific set of agents (master+device specific agents) to be able to control/administer them. (valid for switches, other s torage arrays, etc.)

All the information you work with on ControlCenter, is taken from the repository, and not from the final device. Every change made to the configuration here, is then later applied to the final device (host, switch, storage, e tc.) ** Authentication is made at OS level, an “eccadmin” account must be created for ControlCenter.

Page 4: Control Center Knowledge Share

A key management server can be utilized for ControlCenter, for authentication using certificates.

If HA is desired, install ECC on MS Cluster or SRDF/CE for MSCS to provide redundancy

* The agents that have same pre-requisites, can be installed togheter, in same server.

IP

SAN

ECC Server

SUN

AIX

WIN

Symmetrix

Clariion

IBM/HP Storage

The communication between Symmetrix and ECC is over FC, but for the rest of devices is over IP.

Page 5: Control Center Knowledge Share

Agent Discovery Automatic Discovery: Many agents discover data objects automatically. – Host Agents. – Storage Agent for Symmetrix. – Symmetrix SDM Agent. Assisted Discovery: These agents must discover their objects by administrator action.

– Common Mapping Agent. – Database Agent for Oracle. – Fibre Channel Connectivity Agent. – Storage Agents for CLARiiON, Centera, Invista, NAS, SMI, HP StorageWorks, HDS, and ESS. – VMware Agent. Use the Discover menu to perform Assisted Discovery. You can use the Discover > Review Progress menu to see the results of the discovery process.

For ECC 6.1 and SAN Switches/Fabrics

with firmware 6.1 or above, the proxy must be configured in order to allow communications with the rest of the SAN Switches. Unidentified Ports in ControlCenter ControlCenter matches WWNs to HBAs, and HBAs to switch ports automatically when: - FCC Agent discovers switches, which report all connected WWN

- Host Agents discover HBA WWNs This will not happen correctly when: - Host does not have a Host Agent - WWN from unsupported HBA, tape library, or other object is discovered Result: Unidentified Ports in Tree Panel - Difficult to allocate storage to host by WWN - Difficult to report on storage utilization by WWN Migrat ion Manager Overview You can use the Host Migration Manager to manage unidentified ports in a large

SAN environment. It allows for the bulk creation of host objects and the association of WWNs to hosts. If you have a list of hosts and WWNs, you can create an input file to specify their relationships, and then use the Migration Manager to import all of them into ControlCenter. This tool does not provide the same level of detail as the manual addition of a host, but it may be an easier option if you have

a large number of hosts to add. *The SAN Manager license is required to use the Host Migration Manager.

Page 6: Control Center Knowledge Share

To use the Host Migration Manager, prepare a file in the format shown here. A “name” and “id” row is needed for each HBA entry. The world wide name of the HBA appears at the left of the line before the first dot, and the related host name appears at the right after the equals sign. The file must be named as shown here, but the utility will allow you to retrieve the file from any folder on the Console host.

Once the file is created, launch the Host Migration Manager from the ECC Administration task menu. It will prompt for the location of the file, and show a preview of the associa tions it will crea te. Use the preview to locate syntax errors. You can find the hosts that it creates in the Hosts tree. Drill down to find the HBAs you ssociated with the hosts. Host objects created this way have fewer details than

normal hosts of course, and they are marked with a diamond icon to show that they are not being actively discovered by an agent.

Menu bars, panels, and icons are used to manipulate the ControlCenter Console display. At the top of the window is the menu bar that most window applications feature. Many of the commands and views can be accessed from one of the menus available here. Below the menu bar is the task bar. Clicking on any of the five tasks (Storage Management, Monitoring, Performance Mgt, ECC Administration, Data Protection) alters the Console display to

present features tailored to that task. The menu selections on the menu bar change and quick access icons appear on the Tool Bar to present features for that task. Pull down menus associated with each task are used to change Target Panel views. Alerts information is located on the far right of the task bar. The number and severity of the current aler ts is displayed here. Clicking on the All Alerts button launches an Alerts view to display all current alerts. The tool bar presents buttons for the six common views: Alerts, At A Glance, Properties, Topology, Relationship, and Performance. Clicking on one of these buttons changes the Target Panel view. Icons to the left of the view buttons can be used for printing, print preview, exporting the Target Panel data to a file, and launching ControlCenter help. Quick access

icons to the right of the view buttons are used for common tasks. At the bottom of the display are two text areas that display hints to guide a user through an operation (“Right click for popup menu”) and status information about ControlCenter objects. Also located on the bottom of the display are icons that launch the At A Glance View, the Consoles (At A Glance) View, and the Agents view. Holding the mouse over each of these icons provides a quick summary about the number of users logged in, number and severity of alerts, and number of active agents.

Page 7: Control Center Knowledge Share

The most common ways to manage the display of objects from the Tree Panel in Target Panel Views are: - Drag the object from the Tree Panel to the desired view in the Target Panel. Large numbers of objects can be added by dragging the folder that contains them. If an object cannot be displayed in the view, an explanation will appear in the Hint Area. - Check the box to the left of the object or folder in the Tree Panel. Un-checking the box selectively deletes objects from the view.

- Right-click the object and use the Add to View menu option. Use the sub-menu to select one of the current views to add the object. Other options on this menu such as Properties and Aler ts also add information about the object to an existing or new Target Panel view. - The eraser icon at a view’s title bar can be used to remove all of the objects from that view.

Multiple Tree and Target Panels can be created using the horizontal and vertical split pane buttons on the upper right of each panel. The delete pane button (“X”) next to them can be used to delete an unwanted panel. At least one Target and Tree Panel must remain on the Console display—the last one of each can not be deleted.

Page 8: Control Center Knowledge Share

You can create groups of managed objects to simplify your ControlCenter monitoring and management tasks. You can easily add the objects in the group to one of the views by just selecting the group in the panel. This makes it easy to limit your views to a single department or line of business. These groups also appear in the StorageScope and Performance Manager tool. You can use these groups to create storage allocation reports or performance graphs related to the objects in the

group.

When a view is filtered, the filter icon at the top will be blue. If you are not seeing the objects you expect, make sure the view is not being filtered.

Page 9: Control Center Knowledge Share

A Properties view shows tabular information about objects. Different values are displayed for different types of objects. The example above displays information regarding the entire Symmetrix, its front end directors and its back end directors. By selecting individual arrays, you can find such things as Symmetrix serial Number, Model number, configured capacity, un-configured capacity, the amount of devices that are standard or BCV, and much more.

By selecting front end fibre ports you can see whether the ports are online or offline, how many ports are managed by the processor, and how many devices are mapped to the director. The disc Director properties is similar to the front end with the addition of not only how many physical disks are mapped, but also how many hyper volumes reside on those disks. The Last Discovered and the Last Modified columns are the last columns in the properties view for many objects. The Last Modified column updates whenever information on the row changes. For example, the Last Modified column time will change if the physical capacity of the array changes or the alert severity changes. The Last Discovered column shows the time the object

was discovered by an agent within ControlCenter. There is a specific data collection policy for each object type (i.e. Hosts, switches, and arrays) that runs and updates the Last Discovered column. For example, the Configuration policy schedule causes the Storage Agent for Symmetrix to read the configuration of the array at regular intervals. Since the policies discover whole objects, the Last Discovered time is only available for top-level objects like arrays, hosts, and switches. Symmetrix Fibre Channel Directors and Back End Directors don’t have a Last Discovered column, for instance. In short, by using the Properties view, you can gather basic information about any object within a Symmetrix, all the way from a single device to the whole array.

Page 10: Control Center Knowledge Share

Sub-objects are organized into different folders under the main object of the Tree Panel. Symmetrix devices are divided into Mapped, Unmapped, and System folders. Within each folder are subfolders that you can organize by type, name, or size. Open a folder to show the devices.

NP=unprotected

On the left, we can see Disk Directors (Disk-Fibre) or Back end, and SRDF reserved ports, with their corresponding devices. On the right, you can see the devices types, such as NP=unprotected, R5=RAID5, M1 & M2 But also, there is another way to recognize their type: With shadow=BCV ; Pink=R5 ; Nothin=unprotected. R5=RAID5

EM

C C

ontr

ol C

ente

r K

now

ledg

e S

hare

- J

uly

17th

200

9, G

asto

n B

enet

rix @

EM

C C

orpo

ratio

n, A

rgen

tina.

Page 11: Control Center Knowledge Share

Another very good view for examining device characteristics is the TimeFinder view. This view, opened by selecting TimeFinder under the Data Protection task drop down list, displays selected devices based on their TimeFinder relationships to other devices. This view can be used for performing research as part of architecting a TimeFinder solution as well as executing and monitoring relationships in a production environment.

TimeFinder Architecting - Part of architecting TimeFinder solutions is identifying devices that are available to be used. By selecting the BCV container of a Symmetrix and adding it to the TimeFinder view window, you can very quickly identify those devices that are available by sorting the BCV column and looking for devices that are not paired with a standard device. You can easily populate device groups by dragging devices from the TimeFinder view into groups in the tree panel. You can then confirm changes once the solution has been implemented by examining Device group membership and standard-BCV partnering in the view window. Execution and monitoring – Whether you use the Console or scripts to execute TimeFinder tasks, the TimeFinder view can be an invaluable tool when managing these operations. From an

execution standpoint, you can quickly select, sort and identify those devices that you would like to work with, perform pre-operation checks such as invalid track counts and pair states, and then execute commands all from within the view window. From a monitoring perspective, you can keep track of operation progress because the view is updated in real time. You can monitor changes in state, track table merging processes, MB out of sync numbers, and even estimated time to completion. There is a similar SRDF view for remote replication monitoring.

ß Thse are physical disks, containing hypers. ß Thse are physical disks, containing hypers. ß Thse are physical disks, containing hypers.

Page 12: Control Center Knowledge Share

The Visual Storage view is accessed from the Storage Allocation task pull-down. The Visual Storage view shows a logical and physical configuration of Symmetrix, CLARiiON, HDS, and HP StorageWorks storage arrays. y The top panel of the view shows the logical arrangement of host-addressable devices. Each host port is displayed with each of the devices mapped to the port and their LUNS (logical unit numbers) and Symmetrix device numbers. In the illustration above, note that the #1 port of

each Symmetrix Fibre Adapter has the same devices mapped to them--two access paths to the same devices might be used in a multi-pathed or clustered environment. y The bottom panel of the view shows the physical arrangement of the devices. Each disk port is displayed with the physical disks mapped to them; each disk displays the logical devices stored on it. In the i llustration, several Symmetrix Disk Adapters having two ports (C and D) are visible. Only one physical disk is visible on each port without scrolling down, and the disks list many devices. y The very bottom of the view contains a mouse-over information box. Moving the mouse over objects in the view changes this display. In this example, the administrator has placed a Symmetrix into the Visual Storage view and then

selected a host. By selecting a host, all of the devices that that host can see are highlighted in the view panel. This allows an administrator to very quickly identify device locations, and visually identify resources that might be overly taxed at this time. An administrator can highlight devices in the view panel by selecting hosts, databases, filesystem, device group, and many others.

The Performance View within the ControlCenter Console has the ability to present real-time performance statistics as

well as 24 hours of historical information (extended to 7-days with the Performance Manager license key).

Page 13: Control Center Knowledge Share

Here you can see the hypers on the disks, and the marked hypers in which disk are standing by. 500601=Clariion ; 500604=Symm

The Topology View displays the physical layout of the environment in a pictorial rendering of the

SAN. You can build this view by selecting objects in the tree panel with Topology view open and active. Hosts, connectivity devices, storage containers, adapters, ports, links, fabrics, user-defined objects, user-defined groups, zone members, and zone set members can be displayed in the map. With Topology view open and in focus, tree-selected objects, plus the objects to which they are connected, as well as the connectivity relationships among them, are displayed in the map.

Page 14: Control Center Knowledge Share

The Path Details view shows which paths exist (the mapping, or I/O path) between a host device and a storage logical volume across a storage area network. The information in the Path Details correlates data received from host, SAN, and array agents. You can use this view to examine the host device to logical volume mapping and resolve unmapped device paths. Only ports and fabrics that have viable connectivity will appear in the Path Details view. Path Details view has three panes. The top pane is a selection area used to fil ter the objects

displayed. Click on one (only) object from each of the drill down boxes that appear in the selection area and then hit Show Devices to display the corresponding devices.

The Relationship view is one of the most powerful views available in ControlCenter. This view is a visual display of the relationship between host storage structures (databases, file systems,

volume groups), and their logical and physical locations in the storage arrays. It can be used for storage allocation planning by helping identify current storage layout, performance analysis by identifying devices to graph, business continuance activities to help identify STD or R1 devices, and a myriad of other administrative tasks. A Relationship option appears on the context-sensitive menu that appears when a user right-clicks on the object (objects that do not provide Relationship view information do not have this option). Under the Relationship option are a number of choices which parallel the information on the full Relationship view. Choosing one of the sub-choices brings up a properties-like dialog that lists the related information.

Storage Device Masking functions as a component of the EMC ControlCenter storage management suite of tools and controls the masking policies of hosts and host ports to volumes in the SAN. It operates in Fibre Channel switched fabric or hub environments and has compatibility with a broad array of hardware and software platforms using Fibre Channel host bus adapters.

The Masking view can be used to identify those devices that have been masked to a host. This view can be launched from within the Storage Allocation list in the Task Bar. Select one or more hosts in the Tree Panel to display in the view and then make these selections as numbered in the selection pane:

Page 15: Control Center Knowledge Share

1. Storage type: Choose the type of array storage to display. Currently only Symmetrix and StorageWorks arrays are supported in this view. Storage from other array types are masked and monitored from other views. 2. Storage array: Choose the array. Since you dragged one or more hosts to populate this view, only the arrays that have storage masked to that host or hosts will be available. 3. Storage port: Choose the port. Again, only ports supporting devices masked to the hosts you

dragged wil l be available here. 4. Device Filter Options: Choose filters to limit the devices displayed. You can show devices for which the host has or does not have access rights, devices masked to your selected hosts or to all hosts on this port, or devices that are or are not reserved. 5. Click Show Devices to display the selection in the display pane at the bottom. The devices displayed are the ones masked to your host or hosts that meet the options you chose. The device icons show the type of device and whether it is single (line to left below the device) or multi-pathed (line to left nd right below the device). The background color shows that access status.

Data is updated in real-time, and color-coded according to perf aler t severity. The metrics can be displayed in table or chart form. It is important to note that this view is not intended to be the primary tool

for perf troubleshooting. The Performance Manager application is a far more powerful tool for detailed perf analysis and trending.

Page 16: Control Center Knowledge Share

Host Support for ControlCenter The following hosts are supported by ControlCenter * Dedicated Host agents – Microsoft Windows – Hewlett-Packard HP-UX – IBM AIX

– IBM MVS – Linux – Sun Solaris * Proxy management via Common Mapping Agent (CMA) – Compaq Tru64, OpenVMS – Fujitsu-Siemens BS2000 – IBM OS/400 – Windows, Solaris, AIX, Linux, and HP-UX host monitoring capability. * Hosts supported through assisted discovery – VMware ESX Servers

For specific OS levels see the ControlCenter Support Matrix. A few other hosts can be managed by proxy using the Common Mapping Agent (CMA). The Common Mapping Agent always resides on a different host and manages by proxy over the network. The Common Mapping Agent can also manage several types of dedicated agent hosts by proxy. This is sometimes useful because it allows management without installing agent software on the hosts. However, only limited functionality is avai lable and the Solutions Enabler component Symapi Server must be running on the target host.

Server Virtualizat ion Support * VMware ESX Servers can be discovered and monitored using ControlCenter. * VMware agent supported on physical Windows platforms. * ControlCenter views show ESX and guest OS information. – Properties – Relationship – Topology – Path Details – Free Space – Alerts – Agents

* Storage is provisioned to ESX HBAs then to VM guests through the VMware ESX server user interface. Server virtualization is becoming widely adopted by businesses to cut costs on physical server spending without compromising resources and performance. Many virtual machines can be monitored from one simple user interface and resources can be proportioned out on a per OS basis. As stated previously, ControlCenter provides server vir tualiza tion support for VMware ESX Servers. They can be discovered and monitored using the ControlCenter console interface. The VMware agent is supported only on Windows physical platforms. Once installed and running, the VMware agent provides users and administrators with a number of views showing information

about ESX Servers and their guest VMs.

Page 17: Control Center Knowledge Share

Properties – Hosts

In the example above, we can see that by selecting whole hosts, you can see inventory type information such as host

name, operating system, OS levels and version numbers, # or CPUs amount of installed RAM, and even the time zone configured. Selecting devices displays device naming, array dev numbers, size, and utilization information (and more). You can even select individual hardware components

like HBAs in order to determine drive and firmware information. Much can be found using this

view as a research aid. Properties – Oracle Database

Database and Backup Support for ControlCenter The following databases are supported by ControlCenter

* Dedicated database agent – Oracle * Proxy management via Common Mapping Agent (CMA) – SQL Server – Sybase – Informix – DB2 * Dedicated backup agent – EMC EDM – IBM Tivoli

– Legato Networker – Veritas Netbackup

For specific database versions see the ControlCenter Support Matrix Although reporting of total database capaci ty is supported for all databases supported by the Common Mapping Agent (CMA): * Used capacity for Oracle databases is tablespace used capacity. For Sybase databases, used capacity is used database capacity. * For Sybase databases, the Common Mapping Agent collects total and used data and database capacity. For all other supported database types, the Common Mapping Agent collects total data

and database capacity and assumes that used capacity is the same as the total.

Page 18: Control Center Knowledge Share

Print, Preview, Export and Launch

Page 19: Control Center Knowledge Share

`

Page 20: Control Center Knowledge Share

Here we can see the relationship within hosts and storage devices, with all the media in between them. Also, in the second image, we can see under visual storage, that, selecting a Disk Director, or a Hyper in it, where it resides, in which physical disks, in the below portion of the image.

At a glance view (showing all)

Page 21: Control Center Knowledge Share

Web Console – Login

Web Console V iews The Web Console has several views that contain the same information as their Java Console counterparts, though it is displayed in a different way. You can see that the application removes

the normal browser’s menu bar and management buttons, so you have to use the tool’s own links to do things like print and save. The Print button displays either the data from the tree or the main panel in a browser page without the menus, allowing you to print the data easily. The Export button saves the data from the tree or main panel in a file in HTML, JPG, or CSV format.

Properties View – Symmetrix Host Directors: Same as Java console. Properties View – SAN ZoneSet: Same as Java console. Performance View – Symmetrix: Same as Java console. Relationship View – Host: Same as Java console. Alerts View: The only in which can be modified data, asignin new alerts, aler ts to users, etc.

Command History View – Symmetrix: System Auditory.

Page 22: Control Center Knowledge Share

The ControlCenter Security Model

EMC ControlCenter’s security model is very simple and much like many others in the industry. User accounts are created within the ControlCenter Console. Users are then placed into groups for easier administration, monitoring, and reporting. Authorization rules are then created which define a set of objects and the rights that this rule grants to those objects. Lastly, groups are

associated to the rules, effectively granting users within that group the permissions defined by the Authorization rule. ControlCenter Users: * ControlCenter User account logins are validated using the data center’s underlying security model. * eccadmin user must be a valid Local or LDAP user on the ControlCenter Server host. All other users can be associated to one of three types of host user accounts: – Local Windows user account created on the ControlCenter Server. – Windows domain user account.

– User account in LDAP directory. * ControlCenter login uses Secure Socket Layer (SSL) to encrypt login and password information between the ControlCenter Console and Server. When installing ControlCenter, you need to speci fy which method of user validation is to be used: LDAP or Windows Domain authentication. This can be changed later, but you cannot use both types at the same time. It is important to note that all user and password information is encrypted using Secure Sockets Layer (SSL) between Console and Server hosts in order to protect the security of that information.

ControlCenter Authorization Rules * Rules grant permissions to a single user or groups of users. * Permissions determine what actions a user or group may perform on a given object or user-defined group. * The “Any User Rule” is applied to newly crea ted ControlCenter users and allows monitoring only permissions. * To make any management changes the user must be added to a group or an authorization rule must be assigned to the individual. * Only one Rule can be applied to a ControlCenter User or User Group. * Users can be members of multiple Groups.

Page 23: Control Center Knowledge Share

ControlCenter User Groups

“The symcli does not have special permissions, as to deny the chance to run symcli commands with an unathorized user. One option would be to use Symmetrix ACL Flag to provide a group with SRDF commands for example.” Security Considerations

* Users: – Controlling the administrators that configure the storage environment is a critical part of automated networked storage security. Control ling administrators’ actions requires enforcing general security rules: . Each administrator should have an individual account; there should be no shared accounts. . Strong password policies for administrators should be enforced; passwords should be complex and regularly changed. . Administrators should only be authorized to perform management actions that are required to perform their job.

. Administrator actions should be audited. * Group/Rules: – Groups should be designed to reflect a particular job description or task. – Rules should be written most restrictively, to reflect the access rights required by the groups that will be associated to it (e.g., Payroll Backup Group - TimeFinder). To create a new authorization rule, right-click on Authorization Rules and choose New from the menu. Type a name for the rule at the top. If you are associating this rule wi th a group, it will make your administration easier if you give the rule a similar name. Then choose the user or group to associate the rule with from the top part of the dialog.

Choose the actions or privileges to associate with this rule in the bottom of the dialog. Start by choosing to organize the actions by Groups/Instances or Types. Choosing Types (illustrated here) lets you actions that will apply across all objects of that type. Choosing an action related to Symmetrix arrays will give the users power over all arrays, for instance. Choose an object type first, and then one or more of the available actions next. You can repeat this process to add any number of actions to your rule.

Page 24: Control Center Knowledge Share

Add New User

Add User to User Group

New Authorization Rule By Type

EM

C C

ontr

ol C

ente

r K

now

ledg

e S

hare

- J

uly

17th

200

9, G

asto

n B

enet

rix @

EM

C C

orpo

ratio

n, A

rgen

tina.

Page 25: Control Center Knowledge Share

New Authorization Rule By Group/Instances

* Groups can exist only in ControlCenter, there is no need for groups to exist in Local or LDAP Authentication. Data Collection Policies (DCP)

* Formal set of statements used to manage the data collected by ControlCenter agents. * Policies specify the data to collect and the frequency of collection. * ControlCenter agents have predefined collection policies and collection policy templates. – Policy Definitions – Policy Templates * Managing Data Collection Policies: – Edit or Copy existing Data Collection Policies. – Create new Data Col lection Policies from the template. – Delete Data Collection Policies.

– View Data Collection Policies that apply to various managed objects. – Stagger s tart times to help distribute work load. By default, many generic policies are configured, but they tend to be broad in their scope so as to gather as much data as possible and populate the Repository so that ControlCenter can be quickly incorporated into business processes. It may be necessary to create new policies in order to set your discoveries based on priority. For example, say you have ten Windows 2000 servers. Four of them are mission critical database servers that you want monitored every six hours and six of them are corporate file servers that you only need updated once a day. Because the default policy includes all Windows 2000 servers, i t is necessary to edit the default policy as well as add a second policy in order to cover the two separate business needs. Refer to the

ControlCenter Performance and Scalability Guidelines document (available on Powerlink) for details of the recommended number of managed objects to be managed by a single Data Collection Policy definition. Data Collection Policies can be managed from within the Administration\Data Collection Policies folder. There are two subfolders that are used depending on whether you are creating new policies from scratch or managing existing policies.

Page 26: Control Center Knowledge Share

DCP Policy Definitions/Policy Templates

Managing the Data Collect ion Policies consists of: * Assigning Data Collection Policies —Each agent is assigned a set of pre-defined policies and a

set of policy templates. You can define new data collection policies from a pre-defined policy or from a policy template. * Editing Data Collection Policies—You can edit all settings for an existing data collection policy; however, you can only edit the schedule and properties defined by the data collection policy templates. * Copying Data Collection Policies —Use the copy policy function when you want to have more than one data collection policy with similar settings. * Deleting Data Collection Policies —You can only delete policies in the Policies Definitions branch of the Administration tree. Data collection policy templates cannot be deleted. * Viewing Data Collection Policies —You can create a tabular view of specific data collection

policies and template settings. Editing an Existing Data Collection Policy: * Right-click to: – edit – copy

– delete – add/remove object – disable/enable

Editing an Existing Data Collection Policy

Page 27: Control Center Knowledge Share

Editing an Existing Data Collection Policy

Schedules

You can use schedules to specify the times ControlCenter should evaluate alerts and run data collection policies to collect statistics. The properties appear on two tabs: Properties and Alerts/Policies (this tab appears only if the schedule is used by aler ts or data collection policies). Alert or data collection policy schedules define when ControlCenter should evaluate alerts and collect statistics through a data collection policy. In a schedule, you can define the interval at which an event occurs (every 10 seconds, minutes, hours, and so on), the days of the week, and

the days of the year. ControlCenter provides several pre-defined schedules and you can define additional ones. Users are no longer able to delete or edit existing default/pre-defined schedules. Users and administrators must right click on the schedule and select Copy As. The copy of the default policy must then be given a new name and when then editing is complete, the new policy name shows up in the tree panel on the left.

Page 28: Control Center Knowledge Share

Schedules – Continued

Creating a New Policy from a Template

Creating a New Policy from a

Template -(Continued)

Page 29: Control Center Knowledge Share

ControlCenter makes it very easy to monitor configured policies through the use of the Policies View window. If you drag an object to this view, it will show all of the policies applied to it. You can determine the frequency with which they discover information, the last time the policy executed, the host that the managed agent is running on, among others. To populate the Policy View, do the following:

* Click on the ECC Administration Taskbar and open the drop-down list. * Select the Policies View (the active view window is now a Policies View). * Next select the object whose policies you want to look at from the tree panel and add them to the View window. Beyond monitoring your policies, the Views window can also be used for numerous management tasks such as enabling/disabling the policy, deleting, editing, and the like. The next time that the agent is scheduled to poll, the source for data is displayed in the Next collection column. By selecting refresh (shown here), the view is updated with the time and date of the next collection. It is important to understand that though Policy Definitions are configured and maintained in the

Repository, a copy of the policy is pushed out to the Agent itself, and it is executed independently at the host level. Policies View

* The “WLA” policies set are for perfomance gathering. Data Collection Policy Considerations When adding new hosts: * Create Discovery DCPs for each one-hour time slot within the window. * Distribute hosts evenly among the one-hour time slots. * Mix large, medium, and small hosts (as defined by the number of Host Devices) in each time slot.

Schedule daily collections during an off-peak window whenever possible; especial ly host “Discovery.” Monitoring ControlCenter The Command History view shows all of the actions that users have taken through the ControlCenter Console. You will see administrative tasks such as adding a new user, adding a user to the Administrators group, or editing data collection policies. You will see object management tasks also, such as editing a zone set, creating new array devices, or discovering a new database.

Page 30: Control Center Knowledge Share

Command History View

The Command History view shows all of the actions that users have taken through the ControlCenter Console. You will see administrative tasks such as adding a new user, adding a user to the Administrators group, or editing data collection policies. You will see object management tasks also, such as editing a zone set, creating new array devices, or discovering a new database.

The display shows the name of the action, the status the object it was executed on, the user who executed it, and the time. If all of your users are logging in as different users—not using the common eccadmin account—this will accurately show you every change that they make through ControlCenter. Command History Data Retention

Log Collect ion Wizard

* Log Collection Wizard collects log data about managed objects in the ControlCenter environment. * Two versions of the software allows for seamless collaboration between customers and support.

Page 31: Control Center Knowledge Share

The Log Collection Wizard (LCW) is a graphical user interface that also collects log data about managed objects in the ControlCenter environment. It is installed automatically on the ControlCenter Server host. You can launch it using the desktop icon. The version installed with your ControlCenter environment is a full-featured version that interacts

with your software. EMC customer service representatives have an internal version of the software that can be run independently of any ControlCenter software. The internal version can be used to demo the product to customers or to create instruction fi les that customers can load in to their Log Collection Wizards. Log Collect ion Wizard Communicat ion * Communicates with Master Agents in the environment to collect log files. * Automatically installed with ControlCenter Server.

Log Collect ion Wizard User Interface * Users create new or use existing instruction xml files to filter log data based on log types, file name, or host. * Send zipped log file collection to EMC FTP Server. * Attach important files to zipped log file collection results for additional troubleshooting information. The Log Collection Wizard communicates with Master Agents in the environment to collect log

files. The Wizard is automatically installed on the host with the ControlCenter Server during the initial ControlCenter implementation. The user operating the Wizard makes selections based on the types of log data to be collected, the commands are sent to the Master Agents on the hosts that contain the managed object agent, the logs are collected, and then zipped into a log file archive on the ControlCenter Server host.

Page 32: Control Center Knowledge Share

Symmetrix Configuration Overview * Symmetrix configuration is a component of the ControlCenter Symmetrix Manager * More than one tool can configure a Symmetrix: – ControlCenter Console – Solutions Enabler, or SYMCLI – Symmetrix Management Console

* Prerequisites: – ControlCenter . EMC ControlCenter Symmetrix Agent . Solutions Enabler installed on agent host . Symmetrix Manager License – Solutions Enabler or Symmetrix Management Console . Configuration capability has been available since Solutions Enabler 4.1 . Configuration Manager License . Symmetrix Management Console License if using GUI

The Configurat ion changes allowed in the ControlCenter Console are listed above. Each of these configuration changes is considered a Change Class. We will look at each of these change classes in more detail during the course of this lesson. * Logical Device – Create and Delete Symmetrix Devices. * Meta Device Configuration – Create/Dissolve Symmetrix Meta Volumes. * Device Mapping (SDR or Symmetrix Device Reallocation) – Map Symmetrix Devices to Front End Ports. * Device Type Definition – Convert device types: Standard, Business Continuance Volumes (BCVs), or Dynamic Real location Volumes (DRVs). * Device Attribute Definition – Give Symmetrix devices the Dynamic RDF or Double Checksum

attribute. * Device Protection Definition – Add a mirror to an unprotected device or drop a mirror from a 2-way mirrored device. * SRDF Device Definition – Create static SRDF Device pair definitions from existing Symmetrix devices. * Port Flag Settings - Modify SCSI or Fibre Channel front-end director flags. * Symmetrix Attributes – Change global Symmetrix attributes such as maximum number of hypers per disk, the RAID type to enable, SRDF settings, and others. * Save Pool – Create and Populate Save Pools. * SRDF/A Attributes – Change the SRDF/A checkpoint frequency, cache size, and other factors The Command Line interface also allows the following configuration changes.

* Enable/Disable Dynamic RDF - If enabled the Dynamic RDF attribute can be set on non-RDF devices. * Enable/Disable FBA multi access cache - Must be enabled to create Celerra FBA devices. * Restrict access to the VCMDB device - If enabled, you deny database access to all hosts except those whose HBAs have been masked to the VCMDB device. Device masking could then be performed only by those select hosts. * Change device emulation - Change allowed between FBA emulations types only. * Reserve physical disks as dynamic spares - Disks with no hypers must be available. Dynamic spare is invoked against a failed disk.

Symmetrix Configuration Process * Configuration change requests are sent from the ControlCenter Console to the primary Storage Agent for Symmetrix. * Symmetrix Agent sends the change requests to the Symmetrix via Solutions Enabler API over the SCSI/FC interface.

Page 33: Control Center Knowledge Share

* The steps in a configuration change session are as follows: – Submit – Validate – Prepare

– Commit – Database Refresh

* Configuration change sessions cannot be aborted via the ControlCenter Console.

Accessing Symmetrix Configurat ion Options

Symmetrix Configuration is part of the Storage Allocation task set in ControlCenter. Symmetrix configuration options can be accessed one of three ways: * Select Storage Allocation from the task bar. Highlight the Symmetrix which you intend to reconfigure. From the menu bar choose Configure> Symmetrix. * Select Storage Allocation from the task bar. Highlight the Symmetrix which you intend to reconfigure. Short cut icons are available for SDR and Meta Device Configuration.

* Right-click on the Symmetrix which you intend to reconfigure. From the menu choose Configure.

Page 34: Control Center Knowledge Share

Symmetrix Management Console Context Launch Some ControlCenter Configuration Commands handled by SMC

Tip: You can group tasks (if they are the same kind

of tasks) to improve time, as things easy as creating metadevices, could take several minutes if many. Remember that at this time, the symm will be locked.

Symmetrix Configuration Considerations: * Configuration changes should be performed by advanced users. * Planning is key. – Determine requirements. – Understand the proposed reconfiguration prior to change. – Ensure that critical data is safely preserved. * If possible, s top I/O activity on all Symmetrix devices to be altered prior to commit. * Determine if the configuration change requires devices to be unmapped. * Ensure SCSI timeouts are set according to Host Connectivity Guide.

Solutions Enabler has a command that verifies that a configuration change can be performed on the Symmetrix Unit: * symconfigure verify –sid # > Command verifies that all requirements for the host and Symmetrix are correct. Such a verification cannot be performed from the ControlCenter Console. Configuration Log and Lock SYMAPI Log: A record of all the SYMAPI calls (Issued via SYMCLI or via ControlCenter) is kept in the SYMAPI Log files. The SYMAPI log file (symapi-yyyymmdd.log) is typically found in the /var/symapi/log directory in a UNIX environment, or under C:\Program Files\EMC\SYMAPI\log in a Windows environment. As indicated earlier configuration changes initiated via the

ControlCenter Console are directed to the Primary Symmetrix Agent which in turn initiates SYMAPI (Solutions Enabler) calls. The configuration related SYMAPI calls are recorded in the SYMAPI log file on the Host where the Primary Symmetrix is running. The information in the SYMAPI log files is useful during troubleshooting. The primary Symmetrix Agent for a given array is easily determined via the tabular Agents view. Configuration Lock: The Symmetrix configuration lock is acquired and held for the duration of a Configuration Session in order to prevent simultaneous configuration changes. The Symmetrix Lock Number “15” is the Configuration Lock. A configuration change cannot be initiated if the lock is unavailable. The Failure to acquire the lock will result in a popup error message in the

ControlCenter Console and is a lso recorded in the SYMAPI log file. Using SYMCLI one can release the Configuration Lock via symcfg –lockn 15 release [-force]. This should be done with extreme caution. Please call the EMC Support for help in a such a situation.

Page 35: Control Center Knowledge Share

Symmetrix Optimizer uses the same configuration change mechanism to perform swaps of hyper volumes. Symmetrix Optimizer needs to acquire the Configuration Lock as well when it is performing a Swap operation. If a Swap operation is in progress, a configuration change cannot be initiated and vice versa. While planning a configuration change ensure that there are no conflicts with Symmetrix Optimizer. Symmetrix Optimizer can be disabled if necessary. Identify ing the Primary Agent

When changing the symm configuration, there is no

versioning, so the only way to recover it, would be by hand.

Logical Dev ice Configuration

* Select these parameters – Number of devices – Device emulation – FBA only (open systems) – Device configuration (protection) – SAVE Device? * Considerations – Free (unconfigured) space must be available on physical disks with less than the maximum allowed number of hyper volumes – A Valid SSID (sub-system identifier) must be assigned to the new devices i f the Symmetrix

serves both open systems and mainframe – Devices can be destroyed via ControlCenter only for DMX Symmetrix (5670+) Device Configurat ion: To create new devices, launch the Logical Device Configuration dialog from the Configure menu. ControlCenter tries to acquire the lock on the Symmetrix. Once the lock is acquired, a warning message is displayed. In order to successfully create new devices, all the devices on the Symmetrix (excluding Vir tual Devices) must be in a Ready state. If a device in not in a Ready

state, chances are that there are some problems with the Symmetrix and thus a Configuration Change wil l not be allowed. Click OK to continue wi th the Logical Device Configuration process. The Logical Device Configuration input screen is displayed.

Page 36: Control Center Knowledge Share

Viewing Unconfigured Space

Device Configurat ion

The Logical Device Configuration input window allows you to build a list of devices that you would like to configure.

Choose the number of volumes to create. ControlCenter only allows you to create FBA Devices. You can specify the size in MB or Cylinders. The drop down list shows you the device sizes that already exist on the Symmetrix. The recommendation is to choose the size from the drop down list, but you can enter a different size. Choose the Configuration (Protection Type) from the drop down list. If the devices being configured are to be used as SAVE devices, select ‘Yes’ in the SAVE device Type option. If the Symmetrix model doesn’t support SAVE devices then the SAVE device type option is not shown on the dialog. Click Add to create an entry in the Requested Configuration table. You can change the parameters and click Add again to build a list of different device types. Click Execute to submit the configuration change.

Page 37: Control Center Knowledge Share

Dev ice Configurat ion Input à

Dev ice Configurat ion – Result à

New devices will be in the Unmapped Devices folder The Configuration session initiated via the Console goes through a number of steps described earlier in the lesson. * Submit * Validate

* Prepare * Commit

After the Commit is finished, the Configuration Lock on the Symmetrix is released and then ControlCenter initiates a Database refresh to update the ControlCenter Repository with the most

up-to-date information about the Symmetrix. Meta Device Configuration. ControlCenter allows the following: * Concatenated Meta Volumes: – Create or Dissolve – Add members – Remove members

* Start removal from the tail member * Striped Meta Volumes: – Create or Dissolve – Add member

* Must have an identical Meta-BCV available on the Symmetrix to successfully add a member to a striped meta while preserving data. * Only supported on certain microcode levels – Consult EMC in advance.

* EMC Recommends adding al l members in the same session rather than adding more members later. – Remove members are Not allowed – Stripe width: * EMC recommends using a two (2) cylinder (960 KB) stripe width. * In a DMX Symmetrix, the stripe width is preset at two (2) cylinder (960 KB).

Page 38: Control Center Knowledge Share

You can remove members [dissolve] (always last member) of a concatenated meta. But you must defrag it before, in order to be sure that the data is not standing on it. When dealing with metas, always the meta ID is the meta head ID. Meta Device Configuration – Considerations * All member devices must have the same type of: – Protection – Emulation (FBA only) – Attribute (BCV or Standard)

* Devices must be unmapped before they can be formed as members of a meta. * Changes to the attribute of a meta are done by changing the attribute of the meta head. * Only the meta head is mapped to a front end port. Meta Performance Considerations * Capacity: – Larges t capacity supported without RPQ – 1.1 TB. – Larges t capacity possible – 16 TB. * Number of Members: – Larges t number possible – 255. – Larges t number tested by Performance Group – 48.

– EMC generally recommends creating smaller meta volumes rather than very large meta volumes. * Meta volumes with four, eight and sixteen members are preferred. * Choice of members: – Member count even divisor or multiple of Disk Director count. – Spread members evenly across DA ports and processors. – Avoid members on the same physical disk. – RAID-S/Parity RAID – Choose members from different RAID groups.

EM

C C

ontr

ol C

ente

r K

now

ledg

e S

hare

- J

uly

17th

200

9, G

asto

n B

enet

rix @

EM

C C

orpo

ratio

n, A

rgen

tina.

Page 39: Control Center Knowledge Share

Display Disk Location of Unmapped Devices

Before creating a Meta device, it is a good idea to look at the back-end locations of the devices that you intend to use as meta members. Ensure that the devices do not share the same physical disks and that they are spread as evenly as possible across Disk Directors and ports. It is especially important to make sure the devices do not share the same disk if you are creating a striped Meta, since you wil l lose the effectiveness of striping the data to multiple physical drives. The Visual storage view (Change the Target Panel to Visual Storage – Storage Allocation pull down) of the unmapped devices show you the back-end locations as shown in the slide.

Creating Meta Volumes

Device Mapping (Symmetrix Dev ice Reallocation) * ControlCenter allows the following: – Mapping and unmapping of open system devices to Fibre Channel (FA) or SCSI (SA) ports only. – Move/Copy devices between front-end director ports. – Modify/Specify SCSI Target ID/LUN assignments. * Considerations: – Unprotected standard devices cannot be mapped.

Page 40: Control Center Knowledge Share

* Unprotected BCVs can be mapped. * Unprotected gatekeeper devices (smaller than 20 cylinders) can be mapped. – Determine the front-end director port to which the host is attached. * Devices should be mapped to more than one port in multipath and clustered environments. – Ensure that the selected Target ID and LUN is appropriate for the host. – Reconfigure the host to enable it to recognize the new device.

Remember that after adding devices to a port or changing their LUN numbers, you may also need to execute some OS-specific commands to get the host to recognize the new devices. Device Mapping via the Command Line interface provides these additional features as well: * Open Systems or Mainframe (FBA and CKD) * Specify Virtual bus (vbus) address if volume set addressing is used in HP-UX * Specify CKD device number - OS/390 host * Update VCMDB with WWN of HBA to allow access to device being mapped. Determine Array Port

Map Dev ice

Page 41: Control Center Knowledge Share

Copy Dev ice to Another Port

You frequently want to map the same device to more than one array port to create redundant paths. Use the copy feature of the SDR dialog for this purpose. Locate the device under the Host Directors part of the tree on the left panel—remember, it is already mapped to at least one port.

Then click the additional port you would like to copy the device to in the right panel and click Copy. The same device can be copied to any number of ports by repeating this procedure. Change Dev ice Address

You should always check the device address, or LUN number, before committing your changes. Many hosts have restrictions regarding these numbers. Gaps in the numbering is frequently disallowed. You can find the automatically assigned address with the device itself in the right panel under the Host Directors part of the tree. Just click the number to change it.

Execute SDR: Once you have made the changes in the dialog, click Continue to review. You can make several changes to the mapping configuration and then commit them in one event. If everything looks good, click Execute to begin the configuration change. Most changes do take some time, as the popup alert shown here suggests. Newer arrays with faster processors naturally take less time to execute changes. The progress of the change is displayed in the lower part of the window. Once the change is complete, you can use the Properties view to examine the characteristics of the device. The detailed view shows all of the ports that the device has been mapped to.

Page 42: Control Center Knowledge Share

Execute SDR Reconfigure Hosts After SDR Operation – Solaris 2.6: disks; devlinks; devalias

– Solaris 2.8: devfsadm – Solaris 2.9 /usr/sbin/update_drv * HP Hosts: Execute the following commands: ioscan -fnC disk ; insf -e * IBM AIX Hosts: Execute the following command: cfgmgr -v * Windows hosts: Add /

Remove Hardware. Hosts have to be reconfigured to recognize the new devices that are available for access. Remember to perform LUN masking in a Fibre Channel switched environment. The commands to reconfigure hosts are Operating System specific. For Solaris 2.8 and higher, the devfsadm command can be used as well. In a Solaris environment, the sd.conf file should be appropriately configured as well. A disk label might also have to be applied with the format command. The update_drv command (available in Solaris 9 and higher) performs a dynamic reload operation on any loaded driver (such as the sd driver), forcing it to reread the configuration file, an operation which normally would have required a

reboot in previous versions. It is very useful in a production environment where the host needs more disks presented to it, but rebooting it is not an option. In Topology view, you can see the hosts and their connections with Storage Systems.

Device Type and Device Attribute Definit ion * Device type definition: – Allows you to convert between Standard, BCV and DRV device definitions * Device attribute definition: – Allows you to give device the following attributes.

Page 43: Control Center Knowledge Share

* Double Checksum * Dynamic SRDF (R1 or R2 or Both) * Ineligible devices will be filtered out by the Console – Mapped devices – System devices, Save devices, RAID-S, Parity RAID, SRDF, TDEV, VDEV, TDEV, COVD – BCV or STD devices in a synchronized state, Meta members.

The Command Line interface allows the setting of the following additional attributes as well: * WORM (Write Once Read Many) * VCMDB * SCSI3 Persistent Reserve (For SUN Cluster 3.0 environments) Device Type Definit ion To change the device type definition, go to the

configuration menu by any of the methods discussed earlier and choose Device Type Definition. After the configuration lock is acquired, the Device Type Definition dialog shown above will appear. Just click on the devices you want to change and click the BCV, DRV, or STD buttons. Changing the device type definition does not alter the protection of the device. Clicking the Execute button starts the configuration session.

Note: To convert a device to a DRV, it must be configured as Unprotected. A BCV cannot be converted to a DRV directly, it must be converted to an STD first. Device Attribute Definition To change the device attribute definition, use the configuration menu

to launch the Device Attribute Definition dialog shown above. To add or remove an attribute, cl ick in the cells under the attribute column. Light blue colored cells indicate pending changes. Dynamic R1 and R2 can

both be assigned to the same device if desired. If a device is capable of both Dynamic R1 and R2, i t can be either the source or target of remote synchronization. It can also participate in an SRDF swap operation, or become a Cascaded SRDF R21 device. * option only available to use with Oracle DBs.

Page 44: Control Center Knowledge Share

Device Protection Definition

The Device Protection Definition dialog allows you to remove a mirror from a mirrored device, or add a mirror to an unprotected device. No other protection types can be manipulated using this dialog. When turning a mirrored device into an unprotected device, one of the mirror hypers is split off

as a new device. It has a new device number and appears in the Unmapped devices folder of the array. The original device type changes from 2-Way Mirror to Unprotected. The original device retaind its data, but the new device does not. When turning an unprotected device into a mirrored device, a new hyper is created and added as a mirror. Enough unconfigured space must exist on the array to mirror the device. You do not get to choose the disk to use for this, the Enginuity code determines the best location for the hyper. You cannot just join two unprotected devices into a mirrored pair. The new mirror is synchronized with the original device, preserving its data. As with the other configuration commands, ineligible devices are filtered from the dialog to

prevent you from accidentally selecting the wrong thing. Device Protection Definition Dialog

The example at the bottom of this illustration shows a BCV that has been unprotected. Each mirror becomes an independent device, with a new device number being generated for the additional mirror. Bring up the Device Protection Definition dialog to change the protection of a device. The ControlCenter Console only shows devices on which the Device Protection changes can be made. It filters out all RAID-5, RAID-6, and Mapped 2-Way Mirrored devices.

Page 45: Control Center Knowledge Share

The pending changes are shown in blue italics. Click Execute to commit the configuration change. SRDF Dev ice Definit ion

The SRDF Device Definition configuration adds the R1 attribute to a local device and the R2 option to a remote device, making them a linked SRDF pair. This option creates static SRDF

Device pairs only. As we have seen, the Dynamic SRDF attribute is enabled in the Device Attribute Definition dialog, not the SRDF Device Definition dialog. Only mirrored, RAID-5, RAID-6, or Unprotected devices can be made into static SRDF pairs. A matched pair of eligible devices must exist on both of the arrays. Both devices match if they have the same Meta configuration (if Metas), size, emulation (FBA or CKD), and protection. As always, ineligible devices are filtered from the display. Additionally, the array must have SRDF directors, be linked to the remote array, and SRDF RA groups must already have been created (by command line). A configuration lock has to be acquired for both arrays. You can not delete or edit a static SRDF

device pair relationship using ControlCenter.

Page 46: Control Center Knowledge Share

Use any of the methods described previously to launch the SRDF Device Definition dialog. The Select Symmetrix Screen will pop up first. Choose the Local and Remote Symmetrix from the Drop down lists. Only those arrays in your environment that are physically connected by SRDF links will appear here. Choose the RA Group Number from the list (cannot create a new RA Group). Choose what SRDF type(R1 or R2) the local device will be. -The Configuration Lock is acquired and the Warning message shown in Step 2 on the slide will

pop up.- From the Select Local R1 Device Column select the device that becomes the R1. Before you pick a device from the Select Local column, the Select Remote R2 Device column will be empty. Once you select a device from the Select Local column, eligible devices are displayed on the Select Remote R2 Device column. Pick a device from the Select Remote R2 Device column and click Add to add this pairing into the Selected RDF pairs table. When an SRDF Device Pair is created, the previously separate devices are synchronized with the same set of data. You have the choice of invalidating (or losing) the data on either the local or the remote device. The device that is being invalidated must be unmapped or in a Write Disabled or Not Ready state.

Port Flag Settings

The Port Flag Settings dialog is used to change the communications protocol settings on Symmetrix array ports.

* Change settings of SCSI or Fiber Channel Host Director ports * Considerations: – Settings may have to be changed when adding hosts to existing switched configurations or for preparing an unused port for host connectivity. – EMC recommends that you temporarily suspend I/O activity to the affected ports when setting front-end port attributes. – Incorrectly changing the port flags can render your Symmetrix storage system inaccessible. Be

certain of the results of any change before resetting any of these flags. Port Flags Settings – Host Policy * Select the host from Host Policy list. * Select the host director port to which the host must be added. * Click on Add to add to the Selected list. * Click Next.

This port flag attribute, is a bit to change, that will allow better communications with client

servers, like HP-UX, Windows Cluster (MSCS), Solaris with Veritas Volume Manager, and other applications in operating systems, or some specific Platforms. Another option is to use “heterogeneous” bit setting.

When choose Port Flags Settings from the configuration menu, you see a Default Settings dialog

like the one above. You can use i t to choose the standard settings for certain operating system configurations. Just choose the policy and the port and click Add. If none of these settings suits your needs, hit Next without making any changes here.

Page 47: Control Center Knowledge Share

Port Flags Settings – Review/Manual Edit

The second part of the Port Flags Settings dialog gives you a chance to make detailed edits to the flag settings. Every flag which is appropriate for the type of port can be edited here by clicking in the box.

A bullet indicates the flag is set. An empty box means it is not set. Settings that can not be edited are in gray. The two tabs choose the Fibre or SCSI flags for each port. Delete Logical Devices

Use the Delete Logical Device configuration menu to delete one or more devices. This is one of the few configuration menu dialogs that does not allow you to choose the devices within the dialog. All of the devices selected on the console when the menu was launched will be deleted! If you right-clicked on a single device to launch the dialog, only that device is deleted. If you

selected multiple devices and right-clicked, all of them are deleted. If you selected a Symmetrix and right-clicked, all eligible devices on the array are deleted! Be espec ially careful with this command.

Page 48: Control Center Knowledge Share

Set Symmetrix Attributes Note: Different options are available with different versions of Enginuity.

Symmetrix Virtual Provisioning * Increased Speed and Ease of Provisioning * Improved Capacity Utilization * Improved Performance

Symmetrix Virtual Provisioning allows administrators to allocate storage devices to hosts quickly and easily. Virtual—or “thin”—devices are allocated from a common storage pool, making it easy to provision for tiered service levels. Because the devices only consume storage when written to, they greatly improve capacity utilization. You can initialize an application with a large amount of virtual storage, and add more physical storage to the pool as the application grows. Virtual provisioning can also improve the performance of applications, since the data is automatically striped across al l of the hardware in the pool. Virtual provisioning was introduced in Enginuity 5773. Only DMX-4 or later arrays support virtual provisioning.

Virtual Provisioning Architecture * Virtual (“thin”) Device: – Must be bound to a Thin Pool. – Presented to host with a fixed capacity. – Initial ly, no disk storage al located. – Writes to virtual device stored in Thin Pool * Data (“thin”) Pool: – Collection of regular (non-virtual) devices. – Virtual device writes striped across data Devices.

* Data Devices: – Protection: RAID-1, RAID-5, RAID-6. – All Data Devices in a pool must have the same protection.

Page 49: Control Center Knowledge Share

Virtual Provisioning Storage Allocation Terminology

Managing the capacity utilization of thin devices and thin pools is an important task in ControlCenter. If a pool becomes completely utilized, the thin devices bound to it will not be able to allocate new storage tracks. When this happens, writes that require new s torage tracks will return a write failure to the host. Other I/O operations will still succeed, however.

The free or available space in the pool represents all of the tracks that have not been allocated to the thin devices. If your pool is over-subscribed, you will have to watch this measure carefully, since you have promised more storage to the thin devices than the pool can provide. Virtual Provisioning Dev ices Support:

Thin devices and data devices have a maximum size of 64 gigabytes—the same limit any devices in a Symmetrix with this level of Enginuity have. Of course, EMC recommends a smaller, more flexible device size. Thin devices can be mapped and masked, but data devices are never

mapped or masked to a host. Thin devices are not protected—they depend on the protection of the devices in the data pool, which can be RAID-1, RAID-5, or RAID-6. Thin devices can be replicated to other thin or virtual devices, but never to a fully-provisioned device. You can use TimeFinder/Snap to replicate a thin device to a Snap vir tual device. You can make a thin Clone of a thin device. Or you can use SRDF for remote replication if both the R1 and R2 devices are thin. If a large thin device is needed, you can create a meta device of thin devices. Regular devices and thin devices cannot be combined in the same meta.

Page 50: Control Center Knowledge Share

Thin Pool Generic Alert: A new alert has been added to the Storage Agent for Symmetrix to monitor the used capacity of thin pools. It is measuring the used capacity

against the total capacity of the pool. The alert will trigger at any of the thresholds shown here, and display a message showing the exact

utilization. Since the Solutions Enabler processes monitoring the arrays detect this event, the alert should arrive in the Console within minutes of a change in the pool’s utilization. The alert is enabled by default, and monitors all thin pools on the array. Virtual Provisioning Properties Views

Thin pools are displayed as a data device in a blue rectangle. Thin Pool properties show the total capacity, used capacity, and free capacity of the pool. The subscribed

capacity is labeled “Total Capacity Allocated” in this view. Virtual Provisioning Free Space View

The storage summary graph now

includes measures showing the Thin Pool Available, Thin Pool Used, and pool Over Subscription. The sum of all of the components included in this bar graph except for the Over Subscription

represents the configured storage of the array.

Page 51: Control Center Knowledge Share

Thin Prov isioning Implementation Steps 1. Create Data Devices (SMC) 2. Create Thin Pool, populate with Data Devices, enable Data Devices (SMC) 3. Create Thin Device, bind to Thin Pool (SMC) 4. Map, Mask Thin Device as normal (ControlCenter or SMC)

Create Data Devices To create data devices, right-cl ick on the array and choose Device Configuration > Create Device (SMC) from the menu. This will launch the Symmetrix Management Console dialog for creating devices. Choose the Data Device tab for thin pool devices. The Save Device tab is for TimeFinder/Snap or SRDF

Delta Set Extension devices. Commit Configuration Changes

Device creation tasks require a configuration change. When you confirm a Symmetrix Management Console operation that requires a configuration change, the task will just be added to the My Active Tasks tab of the Config Session view. After adding one or more tasks, you will need to switch to the Config Session view and commit your tasks. The Symmetrix Management

Console does not always switch to this view automatically, so you should get in the habit of checking here for any uncommitted changes.

Page 52: Control Center Knowledge Share

Create Thin Pool To create a thin pool, right-click on the array and choose the Device Pool Management >

New Thin Pool (SMC) menu. This menu will launch the Symmetrix Management Console dialog for creating thin pools. The Save options in this menu are for TimeFinder/Snap or SRDF Delta Set

Extension pool management, so avoid them if you are looking for virtual provisioning tasks. Creating a thin pool does not require a lengthy configuration change procedure. Clicking OK will commit the change, and post a success or failure notification. You will not have to turn to the Config Session view after leaving this dialog. Enable Data Devices

After creating the thin pool, you might like to view it before leaving Symmetrix Management Console. Locate the pool under the Pools folder

under the array in the left panel of the Console. Click on it to show the general properties, thin devices, and data devices. You can click on an individual data or thin device to view its properties in the bottom of the dialog. If you did not choose to automatically enable the data devices in the Create Device dialog or in the Create Pool dialog, you will have to enable them manually. Click the Data Devices tab of

the pool properties display and select all of the devices to be enabled. Then right-click and choose the Device Pool Management > Enable Device menu.

Create Thin Dev ice, Bind to Thin Pool à

Page 53: Control Center Knowledge Share

To create thin devices, right-click on the array and choose Device Configuration > Create Device (SMC) from the menu. This will launch the Symmetrix Management Console dialog for creating devices. Choose the Thin Device tab for thin pool devices. Creating a thin device is a configuration change, just like any device creation. Remember to use the Config Session dialog of Symmetrix Management Console to commit your changes.

Verify Thin Device in SMC

Save Pools

* Use Logical Device Configuration dialog to create new Save devices. * Use Save Pool dialog to create new Save Pools. * Assign Snap Save Pools to Snap sessions with Create Snap Session dialog. * Assign DSE Save Pools to RA Groups with Set SRDF/A Configuration dialog.

Save Pools are used to record data for two Symmetrix business continuity operations. Data is stored for TimeFinder/Snap devices in a Save Pool when a track of data differs from the source that the Snap is replicating. Many Snap devices can use the same pool to help share the storage resources. SRDF/A can be configured to cache writes on the local array’s Save Pool disks. This feature is known as Delta Set Extension and it helps recover from temporary bursts of writes or link failures. Delta Set Extension was made available wi th Enginuity 5772. Each of these technologies has its own type of Save Pool. Active SNAP sessions can cause many writes to the associated Save Pool. You might want to create separate Save Pools to prioritize the performance characteristics. You might assign many low priority SNAP sessions to the default pool, but assign only a few high priority sessions to a

different pool. The devices in the high priority pool will have less contention for disk resources because there are fewer sessions competing for them. The down side of partitioning the Save devices into different pools is that a single session can not borrow from another pool if the present pool runs out of space. You might end up wasting disk space if you have more than one Save Pool.

EM

C C

ontr

ol C

ente

r K

now

ledg

e S

hare

- J

uly

17th

200

9, G

asto

n B

enet

rix @

EM

C C

orpo

ratio

n, A

rgen

tina.

Page 54: Control Center Knowledge Share

ß Creating and Edit ing Save Pools

Delet ing Save Pools and Dev ices à

SRDF/A Attributes

Page 55: Control Center Knowledge Share

SRDF/A transmits data in time-consistent sets called “cycles.” The data on the remote site is consistent as of the last completed cycle. The Set SRDF/A Attributes dialog allows you to set the minimum cycle time from 5 to 59 seconds. Under normal circumstances, the remote site should be updated consistently at time periods equal to the Cycle Time. However, if too many writes arrive at the local array to be transmitted to the remote in one cycle, the cycle time temporarily

elongates to accommodate the load. Cycle writes are kept in cache. If cache fills, SRDF/A sessions begin to drop or terminate. ** Use the SRDF/A Group Priority to prioritize the RA groups. Groups wi th higher priorities drop first when cache fills. Associating an SRDF/A Delta Set Extension Pool enables this feature for the RA Group. When a large number of writes fills cache, additional writes are written to the pool. By writing to the pool the session does not need to be dropped, but performance will be reduced as the writes now

have to be retrieved from disk. If the Transmit Idle feature is enabled for the RA Group, the session will not drop when all the links between the sites fail. Instead, the local array just elongates the cycle time as it does when an overload of writes arrives. If a Delta Set Extension pool has been assigned, the writes are stored in the pool. Otherwise they fill cache. Either way, when the fixed amount of space is filled, the sessions drop. Delta Set Extension pools and the Transmit Idle feature are available on arrays having Enginuity 5772 or higher. Releasing Reservations

Since reserved devices are omitted from ControlCenter configuration dialogs, there is no direct way to override a reservation. However, you can use the Console to release device reservations, and then return to the configuration dialog to modify the device.

Page 56: Control Center Knowledge Share

CLARiiON Configuration via ControlCenter * Configuration changes supported via ControlCenter Console: – Create, Defrag and Delete RAID Groups – Bind and Un-Bind LUNs – Create, Expand, Destroy and Modify MetaLUNs

– Create SnapView snapshots – LUN Masking * Create/Delete Storage Groups. * Add/Remove LUNs to/from Storage Groups. * Attach hosts to a Storage Group. – Edit Storage Processor network settings. Accessing CLARiiON Configurat ion Options

New RAID Group

Bus, Enclosure and Disk number are part of the disk name.

Page 57: Control Center Knowledge Share

New RAID Group Properties

Defragment RAID Group

Fragmentation in a RAID Group occurs as you unbind and rebind LUNs on a RAID Group

creating gaps. Fragmentation causes performance issues by spreading contiguous data to multiple regions of disk. Defragment a RAID Group to compress these gaps and provide more contiguous free space across the disks. De-fragmenting a RAID

Group does not affect the arrangement of data within the LUNs. It is not equivalent to de-fragmenting a filesystem mounted on a CLARiiON LUN. If no deleted LUNs, no need to defrag. Delete RA ID Group

Before you can delete a RAID Group, you must unbind all the LUNs and Private LUNs (part of a MetaLUN) on it or you get an error as shown in this

example. Just right-click on the RAID Group, and choose Delete RAID group from the Configure menu.

Page 58: Control Center Knowledge Share

Bind LUNs A LUN is a host-addressable storage unit created from a RAID Group. A RAID Group can

have many LUNs, but they all share the same protection type. You set the protection type wi th the firs t LUN you bind. All additional LUNs must be of the same protection. This is the equivalent than creating a Hyper(meta) in

Symm Arrays. Expand MetaLUN ->

ß Expand MetaLUN Properties.

a Properties View of some regular and a MetaLUN in the Console. The MetaLUN head along with its associated Components and Private LUNs (LUNs that are part of a MetaLUN) are shown. Note that the Size column shows the total meta capacity and the capacity of each private LUN, but the Actual User

Capacity column has N/A for the private LUN size. The Actual User Capacity only shows a value for the

MetaLUN head since it is the user-accessible device. You can select the size you want to show to the OS.

Page 59: Control Center Knowledge Share

Properties of LUNs:

Modify and Destroy MetaLUN à You can modify some of the parameters of a MetaLUN by using the Modify MetaLUN option of the Configure menu. It is not possible to change the Element Size Multiplier or Alignment

Offset when modifying a MetaLUN. You can also delete the MetaLUN by using the Destroy MetaLUN option. When deleting a MetaLUN all the members are unbound (deleted from the RAID Group) and the data will be

lost. SP Network Settings and Managing SnapShots à The final CLARiiON configuration task that can be

completed using ControlCenter is managing SnapView snapshots. By right clicking on the array in the Tree Panel and selecting Storage Agent > CLARiiON > Explore one can perform a variety of tasks for SnapView Snapshots.

Page 60: Control Center Knowledge Share

These tasks include: •Editing Snapshot Cache Properties. •Exploring Snapshot Sessions. •Exploring LUNs that a Snap session can be executed against. •Exploring a Snapshot. •Creating New Snapshot session.

These are the possible Snapshot management tasks available in ControlCenter. Tasks such as activating and terminating a Snapshot session cannot be done using ControlCenter.

SAN Management Overv iew * SAN Management tasks are performed via SAN Manager – Licensed ControlCenter application with comprehensive SAN Management capabilities

– Use the ControlCenter Console to: *Discover and display an end-to-end topology view of the SAN *Monitor the heath and performance of the SAN *Manage zoning operations of the switched fabrics in the SAN *Perform storage device masking operations on storage arrays in the SAN – Please refer to the EMC ControlCenter Support Matrix for a comprehensive list of all the switches and storage arrays supported by SAN Manager. SAN Manager

Deployment – Example.

ß Switched Fabric Definitions.

Page 61: Control Center Knowledge Share

A single switch, or several physically connected switches, form a Fabric. The switches in a single fabric can route data between any of the connected ports, no matter what switch they are on. A Zone can be created to isolate traffic between a Host Bus Adapter (HBA) and an Array Port. The switches in the Fabric enforce isolation so that traffic from either end point can go only to the other endpoint and not the other switch ports. When an HBA initiates a connection, the only entity to reply is the zoned array port, which identifies the devices mapped to it. A Zone may not

extend beyond the Fabric. A set of Zones within a Fabric is referred to as a Zone Set. In ControlCenter, a single Zone Set defines all of the Zones in a Fabric—there is only one Zone Set active at any time. SAN Manager Zoning Operations * Create/Manage Zones and Zone Sets * Import Zone Set: – Active and Inactive Zone Sets can be imported from the switch * Activate Zone Set: – A planned Zone Set is pushed to the switch and activated

* Reactivate Zoning: – Reactivate the active Zone Set from ControlCenter onto the fabric * Considerations: – As a best practice import Active Zone Set before modificat ion – SAN Manager retains copy of last active Zone Set for fail-back. Connect ivity Area of the Tree Panel

The Active Zone Set can be imported manually from the fabric, or you can use the

Fabric Validation Data Collection Policy import it automatically. The Fabric Validation policy wil l periodically compare the active fabric zone set. If a difference is found between it and the Active Zone Set in ControlCenter, the policy can automatically re-import it, or it can send an alert to

notify you that a difference was found.

The Planned Zone Sets folder is used for editing zone sets. You can create new zone sets from scratch here, or make a copy of an existing zone set and make a few minor edits to it. When it is ready, you can make it active in the fabric. The Planned Zones folder is the place to store zones you might want to reuse in several zone sets. Create them once there, and then use them whenever needed. The Switches folder shows the physical switches in the fabric, and the Unzoned Ports folder has the physical ports that have been discovered that have not yet been zoned.

It is a best practice to work on copies of active zone sets, in order to modify them and then activate it, instead of modifying the original one, that could not be done.

Page 62: Control Center Knowledge Share

Import Active Zone Set

Task Lists and Tasks

Create New Zoning Policy

Page 63: Control Center Knowledge Share

Enable Default Zoning

Creating a New Zone

Creating a New Zone Set

Page 64: Control Center Knowledge Share

To create a new zone set from scratch, drill down into a Fabric, right-click on the Planned Zones Folder and choose New > Zone Set. In the new dialog, type in a new Zone Set name, then pick the zones of interest from the Available Zones column. Click Add to add these zones to the Zones in Zone Set column. Any zone in any Zone Set in the fabric or in the Planned Zones folder can be selected. You can choose to activate the Zone Set immediately (use the check box). If the Activate Zone Set immediately box is unchecked, the new Planned Zone Set appears in the

Planned Zone Sets folder. If the box is checked you are prompted to setup a task to activate this Zone Set. Right-clicking on an existing Zone Set allows you to edit the Zone Set to change the zones which are members of the Zone Set. You can also right-click on an existing zone set and choose Create Zone Set As to create a copy. The copy is made in the Planned Zone Sets folder and has exactly the same zones as the original. You then edit the planned zone set to make changes.

The Zoning Policy dialog box is used to create and modify zoning policies. Zoning policies are used to set a standard for how zones are named and configured. Users most often use Zoning policies to automatically name their zones in a way that indicates what the end points are. When creating a new zone the user can select the appropriate Zoning Policy or use the default Zoning Policy for that fabric. Zoning policies specify the following characteristics of new zones: * Zoning Type— Whether the new zone will use switch port zoning (Port zoning) or end port zoning (WWN zoning). You cannot create a zone with mixed zoning when a zoning policy is applied. * Maximum # of Host Ports—The maximum number of host ports (ports connected to host

devices) that can be included in the new zone (end port zoning only). * Maximum # of Storage Ports—The maximum number of storage ports (ports connected to storage devices) that can be included in the new zone (end port zoning only). * Zone Name Format —An expression that determines the name of the new zone. To set the default zoning policy for a fabric, right-click on the fabric and use the Zoning > Set Default Zoning Policy menu. ** When creating new zones, have in mind this Zoning Policies, as they give a big help, as naming convention is normally Host+HostPort+Storage+StoragePort (%H_%Hp_%A_%Ap) Adding a Zone to a Planned Zone Set

Page 65: Control Center Knowledge Share

Activate Zone Set, Compare to Active Zone Set

After creating a Planned Zone Set with the desired members, the next step is to activate the Zone Set to apply these changes to the switched fabric. Right-click on the planned zone set and choose Zoning > Activate Zone Set. The Zone Set is moved to the Active Zone Set Folder and Marked as Active. A copy of the zone set remains in the Planned Zone Set Folder and marked a Copy of Active. The Zone Set that was active before is

moved to the Planned Zone Set folder and marked as Last Active. If you need to undo these changes, you can activate this Last Active set again. As part of the activate process, you can compare the proposed Zone Set with the Active Zone Set. Use the Show drop down to show Changes Only, Zones Added Only, Zones Removed Only, Zones Modified only or All Zones. A Green plus indicates an added zone, an Amber minus indicates a removed zone, the blue inequality icon represents a modified zone. Click Continue to continue with the Activate Zone Set process. Either of these methods prompts the user with the choice to Execute or Cancel. Click Execute to

activate the Zone Set. This forces the user to create a task in a task list. The progress of the task can be followed in the target panel. Compare Active Zone Set to Active Fabric This safety feature is useful in environments where some

administrators might be using other tools to change the fabric. Let’s use a scenario to illustrate the issue.

Page 66: Control Center Knowledge Share

Reactivate Zone Set

Use this feature when you know that the Active Zone Set in ControlCenter is the correct one for your environment, but you suspect that someone has made an improper change to the fabric using another tool. It is especially useful if your Fabric Validation Data Collection Policy is set to

Compare but do not import. In this setting, the policy sends alerts when a difference is found in the fabric, but does not import it. After being alerted to the issue, you can carefully check the situation and manually reactivate the zone set if necessary. Cisco VSA N Support * ControlCenter has monitoring and management of Cisco Vir tual SANs – Creating, editing, renaming, or deleting a VSAN. – Move members between VSANs. – Distributing and committing a planned VSAN. – Zone editing within a VSAN.

– Suspending a distributed and committed VSAN.

VSAN 1 is the default VSAN and VSAN 4094 is reserved for ports that have been isolated when their VSAN was deleted. These VSANs always exist and cannot be deleted. Only VSANs 2 through 4093 can be manipulated. Up to 256 VSANs can be configured in a switch. At install, all ports belong to VSAN 1. Ports can be added or removed to other VSANs non-disruptively. In a multi-vendor VSAN, using interoperabili ty mode 0 or 1, it is assumed that the master switch is a Cisco MDS, and configured as the principal switch. Domain IDs must be set to static and persistent FCIDs must be set to dynamic.

Fabrics containing Cisco switches have a different folder layout in the Console Tree Panel. At the top level is a Switches folder to identify the physical hardware, and a VSANs folder that contains all of the active VSANs. You cannot edit the VSANs or their membership in this folder—it

Page 67: Control Center Knowledge Share

represents the active state in the fabric. Use the Planned VSANs folder to create and edit copies of the active VSANs, and then make them active. VSA N Display in the Console

Within a VSAN folder, you see familiar Zone Set and Zone folders that you can use to view the active state of the fabric and make changes. Fabric management within a VSAN is exactly the same as without VSANs.

Creating a VSA N

Adding Ports to a New VSA N.

Page 68: Control Center Knowledge Share

CISCO VSA N - Distributing and committ ing * To distribute and commit a planned VSAN to a fabric: – Right-click a planned VSAN and select VSAN, Distribute and Commit. – Click Execute.

Remember, this only commits the VSAN object and port membership information. To make zonin

changes, drill down into the VSAN folder and make the changes using the Zone Set folders. SAN Manager – Storage Dev ice Masking * Device masking can be performed on: – Symmetrix: * VCMDB (Volume Configuration Management Database) Management * Search and Replace Masking (HBA change) * SID (Source ID) Lockdown – CLARiiON: * Manage Storage Groups

– HP StorageWorks HSG arrays – HP XP arrays Unlike an environment in which the host is directly connected to the storage and sees only the volumes to which it is directly connected, the SAN environment introduces new challenges. Multiple hosts can be connected to the same s torage array port, providing one host the ability to see, use, and potentially corrupt other hosts' storage areas. Storage Device Masking (SDM) addresses this problem by using a unique masking policy engine that resides on the storage itself, and management software that resides on the client hosts. Storage device masking allows you to specify the storage array devices that a specific host and host port can access. The SAN Manager implementation of SDM enables you to perform device masking for four types

of storage arrays in the SAN: * Symmetrix * CLARiiON * HP StorageWorks * HP XP CLARiiON masking is similar, but is handled through the creation of Storage Groups. Masking View: This view is applicable to Symmetrix and HP StorageWorks arrays. Use i t to view or modify storage device masking configurations.

A user can right click on any device from this view and modify the masking configuration of that device.

Page 69: Control Center Knowledge Share

Masking View

Symmetrix Dev ice Masking

To modify masking configurations for a host attached to a Symmetrix array, right-click the Host and choose Masking > Modify Masking Configurations from the menu, or highlight the host and choose Masking > Symmetrix> Modify Masking Configurations from the Storage Al location menu.

The Modify Masking Configuration window will open. To change the masking configuration, check the box to the left of the device name and choose the Grant or Remove button. The change you requested appears in blue. ControlCenter fea tures include the ability to mask the same logical device to multiple domains or groups using the same storage port in HDS/HP XP third part arrays. In other words, you can make the same device available to multiple hosts that are zoned to the same port. This capability is available in the native array management tools and now ControlCenter supports it as well. Multiple logical devices can be masked to multiple domains or groups at a time. Multiple

devices can also be unmasked with just one operation. The ControlCenter Storage Agent for HDS is required to per form device masking on these arrays.

Page 70: Control Center Knowledge Share

HDS/HP XP Dev ice Masking

Review Changes, Enable Dynamic LUN Addressing

After making your masking changes and clicking the Continue button, the Modify Masking Configuration dialog summarizes your changes. You can use the buttons on the right to edit or delete any of the masking changes you made in the previous page of the dialog.

With Enginuity 5772, you can enable Dynamic LUN Addressing using the check box at the top of the dialog. Without this feature, the host addresses the device using the LUN assigned when the device was mapped to the array port. This turns out to be somewhat inflexible if more than one host is zoned to this port. You may have difficulty assigning additional storage to the port in a way that maintains a consecutive list of LUN addresses on each host. With Dynamic LUN Addressing enabled, you can override the LUN address chosen during mapping. This allows you to select LUN addresses that are appropriate for each host, even when several hosts are zoned to the same array port. You can enable the feature independently for each HBA and array port pair.

To set the LUN address, click the Set Dynamic LUN Address button at the top of the dialog. The dialog that appears shows the System LUN addresses—set during masking—and the Host LUN addresses. The Host LUN addresses are consecutively ordered by default, but you can click on values to manually change them. Once the device is masked however, you cannot change the LUN address without unmasking the device and starting over.

Page 71: Control Center Knowledge Share

Symmetrix VCMDB Management * Make Active: – Activates the configuration for a selected storage array * Backup: – Backs up the current configuration to a file you select

* Restore: – Restores the VCM database from a file you select * Initialize: – Initial izes the VCM database and saves the current configuration to a file you select. Symmetrix Device masking is performed by making changes to the Volume Configuration Management Database (VCMDB) on the array. The VCMDB is a file residing on a Symmetrix logical device that is used to store access configuration data used for masking logical devices from hosts. The VCM database exists on a special system resource logical device, referred to as the VCMDB device.

Information stored in the VCM database includes host and storage World Wide Names, S ID Lock and Volume Visibi lity settings, and native logical device data, such as the front-end directors and the director ports to which they are mapped. The VCMDB must be activated to make changes to the masking configuration take effect. From the ControlCenter Console, you can backup, restore and initialize the VCMDB as well. The VCMDB must be initialized before use, usually when the Symmetrix is first configured. ControlCenter forces you to backup the VCMDB if you try to initialize it. Backups of the VCMDB are stored on the ControlCenter Server host. Symmetrix VCMDB Commands

To make a backup of the VCMDB, right-click on the Symmetrix array and choose Masking >

VCMDB Management >Backup or highlight the Symmetrix and choose Masking > Symmetrix > VCMDB Management > Backup from the Storage Allocation menu. To restore the VCMDB, use the Console to locate the backup in the VCMDB Backups folder under the Symmetrix. Right-c lick, and choose Restore from the menu. The VCMDB Backup will appear in the VCMDB Backups folder on the ControlCenter Server. You can find it under a folder identified by the Symmetrix ID: <CC INSTALL ROOT>\ecc_inf\data\<ECC Server Hostname>\data\backup\<Symmetrix ID>

Page 72: Control Center Knowledge Share

Symmetrix Replace Masking Replacing masking transfers access configurations from

one host port or unidentified port to another. This is useful when replacing an existing host port with a new one. Swapping access is performed on one host port pair at a time, and in one

Symmetrix storage array at a time. The host port receiving new masking configurations cannot have existing masking configurations in the VCM database of the Symmetrix array in which access is being swapped. Right-click on an HBA or a Host and choose Masking > Replace Masking from the menu, or highlight an HBA or a Host and choose Masking>Symmetrix> Replace Masking from the Storage Allocation menus. In the Replace Masking dialog, choose the existing HBA from the panel on the left, and the storage array and the new HBA from the panels on the right. Click Add Action to make this edit. Make some more edits if needed, and then Continue to approve of and execute the edits. You can not manually enter a WWN in this dialog, ControlCenter must have discovered the HBA

before you try to replace it. This works well if you install the new HBA in the host and then let the Host Agent discovery it before launching this dialog. The VCMDB can be activated as part of the Replace masking operation, but the New HBA must be zoned separately via SAN Manager. Editing CLARiiON Storage Groups In a CLARiiON array AccessLogix must

be enabled on the CLARiiON array and then device mas is done as follows: 1. Create a Storage Group 2. Add LUNS into the Storage Group 3. Connect a host to the Storage

Group ControlCenter terminology is Bind/Unbind hosts) Highlight one or more LUNs, right-click, and choose Add to Storage Group from the menu to launch the Storage Group Configuration Wizard.

Page 73: Control Center Knowledge Share

Storage Group Configuration Wizard

The next step in the Storage Group Configuration Wizard is to add LUNs to the storage group. The LUNs you clicked on are already added, but you might want to choose a few more from the panel on the left. Once the LUNs are added you can Bind/Unbind hosts (Connect/Disconnect a Host from a Storage Group in Navisphere terminology). Note that the Bind process will be successful only if the Host is

properly registered with the Storage Array. EMC Recommends that any server attached to a CLARiiON array should run the Navisphere Host agent and a ControlCenter Host Agent. The last step is a review. Click Execute or Execute Later. Setup the task and task list. Once the task is executed successfully, the masking process is complete. Properties of LUNs and Storage Groups

In this example, once the MetaLUN has been added to the Storage Group the Properties view in the console shows the MetaLUN head belongs to the CLARiiON storage group WIN2-CX200. The

second Properties view shows the LUNs in Component 0 of the MetaLUN, the Storage Group field is N/A as only the MetaLUN head is presented to the Storage Group.

Page 74: Control Center Knowledge Share

1) Establish

2) Split

3) Restore

Ti meFinder Mi rror

STD BCV

10GB 10GB

Establish

I/O

Split

ABC

ABC

I/O

CLARiiON – Remove LUNs from Storage Group

Business Continuance – Symmetrix * Symmetrix Manager license provides Business Continuance operations – Provides GUI support for: * TimeFinder/Mirror * TimeFinder/Clone * TimeFinder/Snap operations * SRDF/S and SRDF/A – Use to: * Monitor SRDF, SRDF/A and TimeFinder activities * Manage device groups

* Manually execute local and remote SRDF, SRDF/A and TimeFinder commands for ad-hoc replication requirements * Manipulate Quality of Service (QoS) settings for devices * Create/Delete Dynamic SRDF device pairs – Storage Agent for Symmetrix must be deployed. TimeFinder/Mirror Operations * Identify appropriate Standard and BCV volumes * Create Device Group: – Add Standard devices – Associate BCVs

* Perform TimeFinder/Mirror operations: – Establish – Split – Restore * Monitor status in TimeFinder View. TimeFinder/Mirror operations in ControlCenter starts with identifying standard and Business Continuity Volumes (BCV) that can be used to replicate data. You can add the devices to a device group, and then perform synchronization opera tions on the devices. Finally, you can view the status of the synchronization in a TimeFinder view.

TimeFinder/Mirror options can be found under the Data Protection Task. There are several ways the menu can be accessed Right-click the array and choose Data Protection > TimeFinder. Select the array and switch to the Data Protection task. Then use the TimeFinder menu. You can also use the quick access icons on the Data Protection task.

Page 75: Control Center Knowledge Share

Accessing TimeFinder/Mirror Options

Identify Relevant Volumes

We need a similarly configured BCV on the array to copy this filesystem. You can drag al l the host devices to the Properties view and examine the ones that are marked as BCV. To be eligible to replicate the filesystem, the BCV must be the same size, same emulation (CKD, FBA), and if

the standard device is a meta, the BCV must also be a meta constructed the same way. So you should be searching for a BCV with these characteristics. A matching BCV is illustrated on this page. For safety, we might also drag the BCV to a TimeFinder view to verify that it does not already have a relationship with another s tandard. If it does, the data on the BCV might be an important copy that someone is relying on. To identify the standard and BCV devices you have chosen, you should put them in a device group. You can easily execute commands against all of the devices in the group, and it will help identify them as being In Use to the other users. Device groups can also be managed by Solutions

Enabler and the Symmetrix Management Console.

Page 76: Control Center Knowledge Share

To create a new group, Right-click on the host, an array, or the device and choose Data Protection > Device Groups > Create. Choose the Symmetrix from the drop-down list – this should be automatically selected because the wizard was launched from a right click context. Choose type of device that the non-BCVs of the group will be. You can choose Regular (this example), or one of the SRDF types (R1, R2, or R21)

Device Group Wizard

In the second page of the dialog, choose the host name where the group will be created. Device groups in ControlCenter can only be created on a host which has a Storage Agent for Symmetrix or Solutions Enabler installed and can access to the array. When you use this dialog to create a device group, it will interface with the Solutions Enabler software to create the group on the host. Then choose an existing or new group to edit, and click the Edit Members button to select the standard devices (only) to add to the group (which type depends on the type of group you created in the previous page). You can only add devices that match the group type you selected

when you started.. If you right-clicked on one or more devices to launch the dialog, those will already be selected. Dev ice Group Wizard – Associate BCVs You can search in host devices, for the device you want to

use for the mirror/clone operations. Select two devices of same size, source must be STD Volume, target can be STD or BCV.

Page 77: Control Center Knowledge Share

The different types of BCVs that appear in this dialog are actually BCVs in different locations. You can also choose other devices in this part of the dialog: * BCV: This refers to local BCVs. i.e. BCVs in the same Symmetrix. You can choose a number of sets of local BCVs to create several copies of the standard data. * BRBCV: If the BCVs you chose in the BCV section are also R1 devices, then you can use this section to associate BCVs from the remote array to your group. The remote BCVs will replicate

the R2 volume on the remote array. This feature lets you manipulate copies of the data on both the local and remote array all from the same device group. * RBCV: This option is available only if the standards added to the group are R1 or R2 devices. The BCV sets you are choosing here are actually on the remote array, and will replicate the remote SRDF device. * VDEV: Virtual devices used with TimeFinder/Snap. We will cover this later in the lesson. * Gatekeepers: For performance reasons, you may occasionally want to associated a gatekeeper device wi th a group. Commands issued to the group will use that gatekeeper device, leaving any other gatekeepers on the host available to process other commands.

TimeFinder/Mirror Establish

Dragging the BCV devices from the group to a TimeFinder view shows their status. Since the device (number 091 in this example) has never been synchronized with the standard, there is no information in the STD column. A few other devices have been added to the view as examples—you can see that they have been synchronized at some time in the past. An Establish operation synchronizes the data on the standard devices to the BCV devices. A simple way to establish pairs is to right-cl ick on the device group and choose Data Protection >

TimeFinder > Establish from the menu. Click the things you want to establish in the dialog (if you had clicked on multiple BCVs, you could now choose a subset of them), and the options. Host considerations prior to an Establish operation: * Establish is a non-disruptive operation to the Standard device. I/O to Standard devices can proceed during establish. Applications need not be quiesced during the establish operation. * The Establish operation will set a Not Ready status on the BCV device. Hence all I/O to the BCV device must be stopped before the Establish operation is performed. A Full Establish is required the first time a BCV and a Standard device are established. Make sure the incremental box is unchecked. You can use the Incremental option on subsequent operations. With this option, only the changed data is copied.

The Optimize option chooses the pairing of standards and BCVs according to optimum data flow within the Symmetrix. The chief concern is to ensure that a standard and its paired BCV are on separate Disk Directors. Exact Pairing pairs each standard with a BCV based on their label number in the device group: DEV001 with BCV001, for example.

Page 78: Control Center Knowledge Share

TimeFinder View You can see that the devices are in a Sync in Progress state and that there are BCV Invalid tracks owed from the

STD device to the BCV. The time left column estimates the time until complete synchronization based on the time take so far. When the synchronization is complete, the status will read Synchronized, and the invalid tracks will

be zero. The device group name is also shown along with

information about Mirror Quality of service settings, etc. TimeFinder/Mirror Split A Split operation suspends the mirroring between a standard and BCV, creating a point-in-time copy at the

moment of the split. Right-click on the BCV or device group and choose Data > TimeFinder > Split from the menu. Click the objects you would like to split and the options. There are several things to consider if you want an uncorrupted point-in-time data copy. Data writes are

typically buffered in the host’s memory at the application layer and the file system layer. Applications will return a write complete before data is actually written to disk. Host memory buffers must be flushed to disk prior to splitting a BCV, to ensure that the data on the BCV is identical to that on the Standard at the time the split command was issued. Without a flush, buffered data is not available on the Standard and hence will not be available on the BCV. Ideally, you should stop the applications and offline the devices before performing the Split.

Until the State has changed to Synchronized, it is not possible to Split the standard and BCV unless the Force option is used, in which case the val idity of the data on the BCV is uncertain.

Page 79: Control Center Knowledge Share

TimeFinder/Mirror Restore

A Restore operation synchronizes the BCV data to the standard, and leaves the devices synchronized. There are several things to consider before performing a restore operation. Restore is a recovery operation. Data on the BCV will overwrite the data on the standard device. All I/Os to the standard device should be stopped and the device must be taken offline prior to a restore operation. Although it has the source data, the BCV is still the device that goes to a Not-Ready status to its host. All I/Os to the BCV devices must be stopped and the devices must be offline before issuing the res tore command. Operations on the standard volumes can resume as soon as the restore operation is initiated, while the synchronization of the standards from the BCV is still in progress. Any reads from the standard that has not yet been copied will come from the good mirror—the BCV.

The Restore operation can be incremental or full. Incremental restore is the default.

TimeFinder/Snap Operations

* Identify volumes of interest. * Identify appropriate VDEVs.

* Create Device Group: – Add Source devices

– Associate VDEVs

* Perform TimeFinder/Snap operat ions: – Create – Activate

– Terminate – Restore

Page 80: Control Center Knowledge Share

Using TimeFinder/Snap to perform virtual copying operations provides a space-saving method of creating instant, point-in-time copies of logical volumes. Snapping to a virtual device (VDEV) creates the appearance of copying volumes by simply copying the original data from changed tracks and the pointers to that data. The TimeFinder/SNAP operation uses two types of devices: VDEV and SAVE. A VDEV device contains pointers to the changed data, while a SAVE device holds the actual data that has been changed.

Snapping to virtual devices uses a copy-on-firs t-write technique as a way to conserve disk space when making copies. Only writes to tracks on the source device or target vir tual device cause any incremental storage to be consumed. The space savings using virtual devices can be significant when you consider that most applications change only a small percentage of data on a volume. However, you can expect performance degradation that varies according to application characteristics and I/O profile. TimeFinder/Snap operations allow you to copy data from a single source device to as many as fifteen target devices. The target of a copy operation is a Symmetrix virtual device, and the copy

operation (also referred to as a virtual snap) performs a copy of those tracks identified by track pointers on a virtual device. Copying occurs only when there are writes to the source or target devices. The snap pair state remains CopyOnWrite until you terminate the copy session or all tracks have been wri tten to. Accessing TimeFinder/Snap Options: TimeFinder/Snap falls under the Data Protection Task. TimeFinder/Snap Options can be accessed by right-clicking on the array, and choosing Data Protection > Snap from the menu. Or you can select the array, switch to the Data Protection task anduse the Snap menu. You can use the Snap view under the Data Protection task to monitor your TimeFinder/Snap synchronization.

Identify Relevant Volumes

Let us illustrate TimeFinder/Snap by using another example. We want to make a point in time copy of the file systems /istdata on the host DMX800IBM1. We use the Relationship view to determine that the filesystem resides on devices 026 and 027, and a Properties view to show the device properties.

Page 81: Control Center Knowledge Share

Dragging the host’s two virtual devices to the Properties view shows their properties also. Fortunately, they are the same size as the devices we need to copy. Even though they do not technically store the data, the virtual device must be configured as the same size as the device you want to replicate. The next step is to create a Device Group, add the source devices and associate the virtual devices.

You have already seen the dialog for these actions, so this course will not show them again. While ControlCenter will allow you to perform TimeFinder/Snap operations on devices individually EMC recommends that you create Device Groups and then perform TimeFinder/Snap actions on the Device Groups. TimeFinder/Snap Create

Drag the new group containing the source and virtual devices into a Snap view. You can see from the Snap view that there is no Snap session for the devices in our group (035, 036),

because the Pair State column is NotCreated. Despite being put in a device group, the Symmetrix does not recognize a pairing relationship between the virtual devices and the sources until a Snap session is created. A session for a Snap pair originates when you issue the Create command and ends when you issue the Terminate command. A device cannot par ticipate in two sessions simultaneously unless it is a source device that has multiple target devices. To pair an existing target device with a different source device, you need to first terminate the target’s original session. To ensure that you do not copy over previously copied data, each snap operation results in putting a hold on the target device.

You can see from the dialog that you can choose a different Snap save pool for every device pair. The Create procedure is a non-disruptive operation to the source device. I/O to source devices can proceed during the Create operation. Before the Create can be performed, the VDEV needs to be in its normal status of Not Ready, therefore all I/O to the VDEV needs to be stopped, and all previous Snap sessions to the VDEV need to be terminated before the Create operation is performed. The Create operation marks the VDEV as Held, preventing it from being used in another Snap session. The VDEV remains in the Not Ready state after the session is created.

Page 82: Control Center Knowledge Share

TimeFinder/Snap Activate

Now that the Snap session has been created, the Pair State column of the Snap view is Created. The virtual devices are in the Held state, and can not be used in a different Snap session until this one is terminated. The Held state is indicated in the Parameters column of the device Properties view.

To identify the point-in-time copy, use the Activate command. Once activated, any writes to the source device cause the original data to be copied to the Save device to preserve the disk image as it was at the point of activation. Use the Activate option from the Snap menu to activate the session. The VDEV devices go to the Ready state after the Activate command. The host can now read and write the virtual device. TimeFinder/Snap Restore

With the Snap session activated, the Pair State changes to CopyOnWrite. The Source Protected Tracks column measures the number of Symmetrix tracks on the source that have not yet changed. As post-activate writes are made to the source, this number will drop. The Status of the virtual devices shown in the Properties view changes from Not Ready to Ready to indicate that the VDEVs can now be accessed by the host.

Page 83: Control Center Knowledge Share

You can use the Restore command to restore data from a virtual device to various locations: * An incremental restore to the original source device * An incremental restore to a BCV that is split from the original source device but which still has an incremental relationship with that source. * A full restore to any unrelated standard or BCV device The Restore operation can be incremental or full. Incremental restore is the default,

In this example, we highlight device groups and from the Menu Bar choose Snap > Restore. Confirm that you want to perform a restore. After a TimeFinder/Snap Restore

Because restoring back to a device replaces what is on that device with the data from the VDEV, there is always the risk you can lose data from the target device. To address this issue, the Snap Restore command creates two sessions. The two sessions have states of Copy-on-Write (Activated Snap session) and Restored (Snap Restored session).

TimeFinder/Snap Terminate

Terminating a copy session removes any hold on the target device and deletes pair information about the terminated pair from the Symmetrix unit. The VDEV will return to the Not Ready state and be inaccessible to the host.

Page 84: Control Center Knowledge Share

STD STD / BCV

10GB 10GB

Create

I /O Act ivat e

A’’’B’’C’

A’’B’C

Backup

I /O

1) Create

2) Activate

3) Terminate

Time Finder C lone

Term inat e

When you select a device pair session from the Console to Terminate, the two sessions, Activated and Restored, will appear in the Terminate dialog box. The restored session must be terminated before the original session. TimeFinder/Clone Operations * Identify source volumes of interest

* Identify appropriate target volume The TimeFinder Clone feature allows you to make copies of data simultaneously on multiple target devices from a single source device. The data is available to a target’s host once the session is activated. You can copy data from a single source device to as many as sixteen target devices. Any device can be either the source or the target in a Clone synchronization. They must be the same size, and be constructed the same if Meta devices. Unlike a BCV mirror copy, which must be completely synchronized with its source and then split to access the data, the Clone copy activation makes data on the Clone immediately accessible to its host, even while copying is occurring in the background.

The following TimeFinder Clone commands are available in ControlCenter: * Create Clone Copy - Create the relationship between the source and target devices. * Activate Clone Copy - Activate the copy operations. * Terminate Clone Copy - End the rela tionship between the source and target devices. Accessing TimeFinder/Clone Options

TimeFinder/Clone also fal ls under the Data Protection

Task. The Options can be accessed by right-clicking on the array and choosing Data Protection > Clone from the menu. You can also select the array, choose the Data Protection task and use the Clone menu.

In this example, we would like use TimeFinder/Clone to copy the data on two BCV devices to a pair of R1 devices. All four of the devices are shown in the Properties view to verify that they are the same size, and that the destination devices are not in the Held state. Before a Clone session can be executed, the source and target must be first identified and paired. The Create command is used for this purpose. Launch the Create dialog from the Clone menu. Select a source device from the Select Source Device panel and a corresponding device from the Select Target Device panel. Note that after you select a source device, all corresponding target devices of the same size and emulation type

are displayed in the other window. Click Add to add your pair to the Pairs panel. When you finish adding pairs, click Execute. You can choose three modes of copy when you create a Clone session. In No Copy mode, no additional copying is done. Data is copied to the Clone on a first access basis only: the first time data is read from the Clone, or the first time data is written to the Clone or source, the relevant

Page 85: Control Center Knowledge Share

track is copied to the Clone. In Pre-Copy mode, all tracks of data are copied from source to Clone when the pair is in Created state. After Activation, the additional copying terminates, leaving only the copy on first access to synchronize the devices. In Copy mode, all tracks are copied from source to Clone after Activation. The copy on first access process is also used to address data that has not been copied yet. Once a Clone copy session has been created, the target devices are in a Held state and no data

is transferred until you activate the session.

TimeFinder/Clone Create

TimeFinder/Clone Activate

With the Clone session created , the destination devices are marked as Held in the parameters column of the Properties view. The destination devices are set to Not Ready. Dragging the devices to a Clone view (use the Data Protection task to get a Clone view) shows the paired relationship. The Pair State column of the Clone view will be Created at this point.

No data will be transferred until you activate the session. The Activate command is used for this purpose. To activate a Clone copy session, launch the Activate dialog from the Clone menu. A list of unactivated Clone sessions is displayed. Check those sessions that you want to activate, and click Execute to activate the checked sessions.

EM

C C

ontr

ol C

ente

r K

now

ledg

e S

hare

- J

uly

17th

200

9, G

asto

n B

enet

rix @

EM

C C

orpo

ratio

n, A

rgen

tina.

Page 86: Control Center Knowledge Share

If the No Copy option is selected when the pair is created, then activating them should change the state to Copy on Access, indicating that data is copied from the source to the clone on any first write or read of the destination, or on any first write to the source. If Copy had been chosen, the pair state reflects a status of CopyInProg while the contents are copied from the Clone Source to Target. Once all the data is copied the state changes to Copied.

TimeFinder/Clone Terminate

You can see that the Pair State has changed to CopyOnAccess, indicating that the pairs are active. The destination devices are Ready (read/write) again, so the point-in-time copy can be accessed. As accesses force data to be copied from source to target, the Source Protected Tracks values will decrease, and the % Copied value will increase. To ensure that you do not copy over previously copied data, each Clone operation results in putting a hold on the target device. Terminating a copy session removes any hold on the target device and deletes pair information about the terminated pair from the Symmetrix. The target host can no longer reference data on the source device through indirection (indirect target tracks

that provide visibility to source tracks). When terminating a pair relationship, no conflicts exist if the pair is in the Created state or the Copied state. However, stopping a copy session for a pair whose state is CopyOnAccess or CopyInProg may end the session prematurely if an application has not finished accessing data, or if writes to the source device are ongoing. Terminating a pair while CopyInProg requires the Symforce flag. To terminate a Clone copy session, launch the Terminate dialog from the Clone menu, check the boxes of the pairs you want to terminate, and click the Execute button.

After TimeFinder/Clone Terminate

Page 87: Control Center Knowledge Share

SRDF Operations * Identify SRDF volumes of interest * Create Device Group * Perform SRDF operations – Failover – Update Source

– Fail Back – Split – Establish

– Restore – Mode Change – Suspend Link – Resume Link – Swap

– Create Dynamic Pairs – Delete Dynamic Pairs – Advanced

SRDF creates and maintains a mirror image of one or more logical volumes on a remote Symmetrix array. Before you can use SRDF, the local and remote Symmetrix arrays must each be set up with at least two Remote Link Directors (RLD) through which the two arrays are linked. The Symmetrix array being mirrored is designated as the source (R1); the Symmetrix array maintaining the remote mirror is designated as the target (R2). Data is transferred across the SRDF link from the source to the target array. By maintaining real-time copies of data in different

physical locations, SRDF enables you to perform the following operations wi th minimal impact on normal business processing: * Disaster recovery * Recovery from planned outage * Remote backup * Data center migration Accessing SRDF Options

SRDF commands fall under the Data Protection Task. SRDF Options can be accessed by right-

clicking the array and choosing Data Protection > SRDF from the menu. You can also select the array and the Data Protection task and use the SRDF menu. Some of the quick access icons in the Data Protection task initiate SRDF dialogs.

Page 88: Control Center Knowledge Share

You can monitor SRDF activity using an SRDF View, located in the Data Protection pull-down. This view displays: * Local and Remote Device Number and Symmetrix ID and Device Group name * Read and write state of the Devices * Pair State: Synchronized, Suspended, Split, Failed Over, etc. * SRDF Mode: Synchronous, Semi-Synchronous, Adaptive copy etc.

* Domino : On or Off * Invalid track information * Quality of Service settings If a Symmetrix is dragged into the view, the status of every SRDF Volume in the array is shown. In this example, the SRDF view the same device group used in the previous example is shown. The screen is split three ways to show all the columns of information. SRDF View

Identify Relevant Volumes

Let us illustrate basic SRDF tasks with an example. The Relationship view shows us that our filesystem /istdata has been created on SRDF R1 volumes. When the SRDF pairs are synchronized, writes to the filesystem are being transferred to the paired devices on another Symmetrix. While ControlCenter allows you to perform SRDF operations on devices individually,

Page 89: Control Center Knowledge Share

EMC recommends that you create device groups and then perform SRDF actions on the device groups. You can see from the tree panel that a device group has been created for these devices previously. An SRDF Failover is invoked in the event of a disaster or in order to perform maintenance on the production site.

A failover leads to a Write Disabled state on the Source side. If possible, ensure that a clean, consistent, coherent point in time copy which can be used with minimal or no recovery is available on the Target side. Ideally, you would stop all applications, unmount filesystems, and disable volume groups to be sure the source devices are not being written to. Failover can be invoked via ControlCenter from either the source or target side. In this example, the Failover is invoked from the a host attached to the Source side Symmetrix. The device group resides on the source side host. Assuming that the host considerations have been taken care of Failover is invoked by right-clicking on the device group and choosing Data Protection > SRDF > Failover from the menu. The Failover operation makes the R1 Devices Write Disabled and the R2 Devices Ready. The Pair

State goes to Failed Over. SRDF Failover

SRDF Fail Back

Page 90: Control Center Knowledge Share

An SRDF Fail Back is invoked in order to move operations back to the primary site after a disaster or maintenance has been performed on the Source Symmetrix. The Fail Back process compares the track tables for each affected volume in each Symmetrix and proceed to update the Source volumes with the changed data that has occurred on the Target Symmetrix. After Fail Back is invoked, the Source volumes are re turned to a Ready state and the Target volumes to a Write Disabled state. Synchronization starts in the background. Production

work can be resumed on the Source Symmetrix immediately, any updated tracks on the Target volumes which haven’t been transferred back to the Source volumes is read back across the SRDF link in the event that they are required by the resumed production applications. A performance overhead will be incurred by this ‘read across the link’ operation. Until the synchronization has completed, the Target Symmetrix cannot provide disaster recovery protection. Make sure that applications are properly quiesced and volume groups deactivated before you Fail Back.

Assuming the host considerations have been taken care of we will perform the Fail Back. In this example, the Fail Back is perform from the Source side by right-clicking on the device group and choosing Data Protection > SRDF >Fail Back. The R1 Devices become Ready and the R2 Devices become Write Disabled. SRDF Split, Establish/Restore

SRDF allows concurrent operations on the Source and Target devices simultaneously. The SRDF Split operation will suspend the SRDF link and makes both the source and target devices Ready as well. After a spli t, you can either perform an Establish to preserve source side changes or a Restore to preserve the target side changes. Both of these operations

puts the pair back into regular Synchronized mode (after synchronization) with the source Ready and the target write disabled. SRDF Mode Control

Page 91: Control Center Knowledge Share

Right-clicking on a group, device, or array and choosing Data Protection >SRDF>Mode Control from the menu brings up the Mode Control dialog. Use this panel to change the way the devices are synchronized. Synchronous and Asynchronous are the main modes—the devices must be in one of these modes.

Synchronous mode forces every write to the R1 be sent to the R2 and acknowledged before acknowledging a successful write to the host. Synchronous mode is the safest because a write is only committed when it has been copied to two arrays. However, it is the slowest of all the modes because each write is held up while the remote copy is done. Domino Effect is an option with Synchronous mode. With Domino Effect enabled, and link failure or other reason that prevents writes from being copied to the R2 side force the R1 device to be Not Ready. This prevents the host applications from writing any data that can not be copied to both the local and remote array. Adaptive Copy is more of a bulk load copy scheme. Writes are queued up at the R1 side and

written to the R2 side whenever link availability allows. Adaptive Copy Disk mode queues the writes on the physical disks, and marks them to be copied to the R2 side. When link availability allows, the entire disk track is read back into cache and copied. Adaptive Copy Write Pending mode queues the writes in cache as write pendings. When link availability allows, the smaller, individual writes are copied. This mode can require significant amounts of cache. The Adaptive Copy Skew is a per-device threshold to limi t the queue size. When the number of writes for a device hits the Skew, it reverts back to Synchronous mode, slowing the writes down. Create Dynamic SRDF Dev ice Pairs

The Dynamic SRDF attribute can be selected when a device is first configured, or after it is configured using the Device Attribute Definition configuration dialog. Dynamic SRDF devices can be paired wi th similar devices on a remote array for replication. Unlike static SRDF definitions, the pairing rela tionship can be undone and changed without a configuration change. Dynamic SRDF must be enabled on the Symmetrix when the array is firs t configured, or it can be enabled using Solutions Enabler.

Page 92: Control Center Knowledge Share

In the example, two devices on the local array have been chosen to be paired with two similarly- numbered devices on the remote array. The Properties view Configuration column shows that they are currently not SRDF devices, but the Dynamic RDF Capability column shows that they can become either R1s or R2s. To configure them for SRDF, launch the Create Dynamic Pair dialog by right-clicking on the

Symmetrix and choosing Data Protection > SRDF >Create Dynamic Pair from the menu. Then choose the source and target array from the pull-down lists, and the RA group number. Also choose the type of local device. Click OK to assign individual pairs. Create Dynamic SRDF Dev ice Pairs

In the next page of the Create Dynamic Pair dialog, choose pairs of devices to become SRDF-capable.

Choose a device in the local column and a list of eligible devices will appear in the remote column. Eligible devices are the same size as the local device, be the same configuration if a Meta device, are marked as being Dynamic SRDF capable, and not already a member of an SRDF pair. Click the remote device and click Add to define the pair. Repeat for any other pairs you would like to create. Then choose the initial synchronization mode to place the devices in: Synchronous, Adaptive Copy, or Asynchronous. Also choose which device (R1 or R2) to invalidate and lose the data. After the changes have been made, the Properties view shows the Status of the R2s Write

Disabled, the Configuration of all devices is an SRDF type, and the Parameters column shows Dynamic SRDF.

Page 93: Control Center Knowledge Share

SRDF/Asynchronous

SRDF/Asynchronous is a disas ter recovery solution that provides good application response time while consistently replicating data. Database disas ter recovery depends on consistent data: data that has been written to tablespaces and logs in order. Synchronous mode guarantees consistent

replication, but cannot be used over long distances due to the performance penalty. The adaptive copy modes can be used over long distances, but writes might be transmitted in any order. SRDF/Asynchronous marks incoming writes as par t of a “delta set:” for a fixed period of time, all writes received go into the current delta set. Writes received after the time expires go into the next delta set. In this way, the writes in a particular set are known to be consistent as of the time that the set expired, even though the Symmetrix does not log the exact time that each write is received. In other words, the delta set that expired at 16:35:00 contains a group of writes; we cannot tell what order they arrived in, but we know that they represent the exact state of changes to the database as of 16:35:00.

While set N is being built, the previous set (N-1) is being transferred across the SRDF links. At the receiving site, the incoming writes are also marked as being part of set N-1. The writes may be transferred in any order that is efficient for the RDF directors. If a disaster occurs to stop set N-1 from being completed, it must be discarded since the writes within the set are not ordered. When the transferring N-1 set is finished transferring (the fixed cycle time expires), it is marked as a complete set (N-2) and the tracks marked for destage. If a disaster occurs, se t N is completely lost and set N-1 must be discarded since it is incomplete. However, set N-2 represents a consistent write set as of the time it expired, which was at most two cycles in the past. Using the default cycle time of 30 seconds, this means that the R2

devices will have a consistent, recoverable database that is at most one minute out of date with respect to the source database.

Page 94: Control Center Knowledge Share

SRDF/A informat ion in SRDF view

SRDF/A pairs are managed much like other SRDF pairs. You can issue fail over, fail back, split, establish, and restore commands using the dialogs we have already seen. This example shows the status of some SRDF/A devices in the SRDF View. You can see several indicators that these

are SRDF/A pairs. The Columns relevant to SRDF/A are: * Pair State: Consistent or Inconsistent * Asynch. SRDF: Should be Yes for SRDF/A devices * Consistency Protection: Enabled or not * R2 Consistent: Yes or No * Uncommitted tracks * R1/R2 Time Log * Mode: Asynchronous indicates SRDF/A mode.

SRDF/A Disable

Page 95: Control Center Knowledge Share

When performing SRDF/A Disable or Enable actions, it must be performed against all volumes in the assigned SRDF/A RA Group. This can be done by: * Creating a Device Group containing all of the SRDF/A devices and then performing the SRDF/A Enable or Disable action. * Performing the SRDF/A Enable or Disable action against the SRDF/A RA Group. * Selecting all the SRDF/A volumes and then performing the Disable or Enable SRDF/A action.

After performing an SRDF/A Disable action, the SRDF view shows that Consistency Protection is Disabled for the SRDF/A devices. The Pair State and R2 Consistent fields will also change as updates are performed against the R1 devices. Disabling SRDF/A reverts the volumes back to their normal Primary mode of operation (Synchronous or Adaptive Copy). Cascaded SRDF

AS you can see in

this example, you can cascade SRDF devices to have 2 replicated volumes besides original. This is a new feature, before it was done by the use of TimeFinder in the middle of two SRDF Sessions.

Enginuity 5773 has introduced Cascaded SRDF synchronization. A Cascaded SRDF configuration consists of a Primary Site (Site A) replicating to a Secondary Site (Site B) and then replicating the same data to a Tertiary Site (Site C). A single device at the Secondary Site has both R1 and R2 features to continuously pass data to the Tertiary Site.

The core benefit behind a “Cascaded” configuration is its inherent capability to continue replicating from the Secondary Site to the Tertiary Site in the event that the Primary Site goes down. This enables a faster recovery at the Tertiary Site. Cascaded SRDF uses the dual role R21 device on the Secondary Site. This can help reduce the number of devices required for a 3-site “No Data Loss” extended distance replication solution. Synchronous mode is not supported on both legs of a Cascaded SRDF configuration. Asynchronous or Adaptive Copy modes must be used for one or both of the legs. This table shows all of the supported Cascaded SRDF configurations.

Creating Cascaded SRDF Relationships

• Create one SRDF relationship and a normal device • Add SRDF Mirror to middle device to make it an R21

Page 96: Control Center Knowledge Share

Although an R21 device is treated as a distinct device type, there is no command to create one. Instead, you will add an SRDF mirror to an existing SRDF device to create a cascaded relationship. This makes the middle device an R21.

Start with an SRDF pair and a regular device. Each device should be on one of the three Symmetrix arrays involved in the relationship. Then use the Add SRDF Mirror command to add the regular device as a mirror to the middle SRDF device. If the middle device is already and R2,

you wil l add the regular device as an R2 mirror. If the middle device is an R1, you will add the regular device as an R1 mirror. Once the configuration is complete, the middle device will appear as an R21. In either configuration, two of the devices are dynamica lly changing their SRDF type; the Regular device becomes an SRDF device, and the middle device has an additional SRDF relationship added. For this reason, the devices used to create Cascaded SRDF relationships must have the Dynamic SRDF R1 or R2 feature enabled.

Configuring Cascaded SRDF Relat ionships

In this example, we will configure a Cascaded SRDF relationship using the devices shown here. In this test environment, only two arrays are being used. Device 33 will become the R21 device. In a realistic environment, you would follow these same steps with devices that are on three different arrays. Notice that all of the devices are Dynamic SRDF R1 and R2 capable. This is necessary for the R21 device, since it cannot be configured as a static R21 device. The R1 and R2 devices only need to be Dynamic R1 or Dynamic R2 capable.

Page 97: Control Center Knowledge Share

We will start by creating the SRDF relationship between device 22 and device 33. This can be done using the Create Dynamic Pair feature. The first step of the dialog prompts the user for the source and target arrays, and the RA group to use. The user will create the R1 device on the local array, and the R2 device on the remote array. Configuring Cascaded SRDF Relat ionships

The next step of the

dialog is to choose the R1 and R2 devices from the arrays, and the synchronization mode. Finally, the user will choose one of the two devices to invalidate, or overwrite during synchronization. The resulting SRDF

View shows that the R1 and R2 devices are now paired in Synchronous mode.

Creating R21 Devices The next step is to add an SRDF mirror to one of the devices. In this case, the user has chosen to add device 33 as a mirror to device 44. After selecting

device 44 and choosing the Add RDF Mirror (SMC) option from the SRDF Configuration menu, the user is presented with a ControlCenter dialog displaying all of the Symmetrix Management Console hosts that can perform the task on the array. The Storage Agents

for Symmetrix have created this l ist by querying the Solutions Enabler processes that support both ControlCenter and Symmetrix Management Console. The user will choose a host from the list, and if necessary, change the port used for secure web communications. Creating R21 Dev ices The next dialog is a Symmetrix Management Console dialog. Using

this dialog, the user will select the RDF group and device to be the mirror of device 44.

Page 98: Control Center Knowledge Share

Device 44 is already selected as the target Device Range in the dialog. The user has chosen RDF Group six. Choosing a mirror type of R2 means that device 44 wil l be the R2 device and the remote device will be the R1. The user used the dialog to select device 33 as the remote device. The RDF mode for this pair has been set to Asynchronous. Creating R21

Dev ices Returning to controlCenter, you can view the result of the Symmetrix Management Console configuration. Device 44 has become an R2, and device 33 has become an R21. TimeFinder/SRDF Quality of Service

Internal TimeFinder or SRDF synchronization can have an impact on overall Symmetrix

performance. Although priority is given to any immediately needed host I/O request, a large business continuity synchronization will still cause a lot of traffic at the back-end. This additional traffic, even if low priority, will consume resources needed by host applications. TimeFinder/SRDF Quality of Service utility helps reduce performance problems caused by business continuity synchronization. It does this by inserting delays in between each scheduled track copy for TimeFinder or SRDF. The delay causes the business continuity task to take much longer, but by slowing down the rate of additional traffic, resources are freed up. There are two configurable delays in Quality of Service: TimeFinder and SRDF. For a non-BCV,

the TimeFinder delay controls how much time is inser ted between copying tracks from the source to target. Only the source volume setting is considered: for example, the setting for the Standard is considered for an Establish, and the setting for the BCV is considered for a restore. For a BCV, the TimeFinder delay controls how much time is inserted between copying tracks from the BCV to its mirror after a split (if the BCV is mirrored).

Page 99: Control Center Knowledge Share

The SRDF delay controls how much time is inserted between copying tracks using SRDF. Again, the source volume’s settings are the ones observed. Non-SRDF devices can not have their SRDF setting changed.

Host Management * Capability licensed by Automated Resource Manager * Management tasks on remote hosts can be performed via ControlCenter – Explore Windows and UNIX hosts – Extend File Systems – Mount/Unmount File Systems – List all Files and Directories – Backup a UNIX File System using tar – Execute shell commands on UNIX hosts

– Perform storage related commands – Explore and manage users, groups, services, registries, processes, and other non-storage entities – …. and many more tasks. Execute Command – UNIX

Alerts - Overview * Why Alert? - Data availability – Monitor and report on events that could lead to application outages – Every ControlCenter agent can monitor a number of metrics * 34 agents and 700+ aler ts

* Alert categories – Health * Examples - Database instance up/down, Symmetrix service processor down, Connectivity device port status – Capacity * Examples - File System Space, File/Directory Size Change – Performance * Examples – Symmetrix Total Hit %, Host CPU Usage * Alert Matrix available on EMC Powerlink website

Page 100: Control Center Knowledge Share

Define an Alert Define Alert Instance The Alert Life Cycle refers to the sequence of typical events in an aler t’s life. It starts when an

alert is defined with the configured parameters shown in this illustration. We will discuss these parameters in detail later, but a quick glance shows that the alert can be configured to detect when an event happens or a critical measure meets some threshold. The condition of an event alert is either “True” or “False,” while the condition of a threshold alert is a numeric value that is compared against a measure. In either case, you can configure up to five severity levels. You can also choose which Console Views display the alert information. Before and After settings can be specified to handle short spike aler ts. For most alerts, you can specify a schedule to control how frequently the objects are monitored. Some alerts are marked as “Agent Controlled.” The schedule is controlled by the agent in that

case. An optional management policy can be used to route the alert to certain Console users—the default is for all Console users to see the aler t. A management policy can also deliver an alert by email or SNMP. An optional autofix can be added to provide some kind of resolution. An autofix runs on the agent host when the alert first triggers. The Source and Apply To tabs of the aler t configuration are used together to specify what objects the alert definition monitors.

Alert Triggers Once an alert is defined, the agent will monitor the metric based on the schedule. When the event has occurred or the measure is found to be within one of the thresholds, the alert triggers or becomes active. Several things can happen when an alert first triggers. The Alerts View or At A Glance View might be updated to display the new aler t, if those options were selected in the alert definition. A management policy might restrict what Console users see

this information. In the Alerts View, the “Created” column will be set to the date and time the alert triggered. If a management policy that specifies email or SNMP delivery is speci fied, the email or SNMP trap will be sent. If one or more autofix scripts are specified, they will run on the agent host that detected the alert. If more than one agent can monitor the same object, the one currently designated as the “Primary” executes the autofix. Load balancing and failover might make any of the agents that can monitor the object a primary agent.

During the time the aler t is active, it can be actively managed by ControlCenter users. A user can acknowledge the alert, assign ownership, attach a note, or perform other tasks to help document the resolution process.

Page 101: Control Center Knowledge Share

Alert Updates At the next scheduled monitoring time, the agent checks the condition again. If the measure is still at one of the thresholds and it has changed value, the alert will be updated. Several things might happen during an update.

The record in the Alerts View or At A Glance View will be updated with new information—a new record is not created during an update. When the measured value changes, the “Last Modified” column in the Aler ts View is updated with the current date and time. You can use the “Last Modified” column to quickly tell how recently something has changed. But be warned: the “Last Modified” time will also change when any property of the active alert changes, including when a user performs a management action. A management policy will execute again during an update. If a Console user is specified by the policy, this simply means that the Alerts and At A Glance Views will be updated with any changed information. If email or SNMP is specified, a new message or trap will be sent that carries the

new measure value and severity information. This helps keep users notified about the status of the measured value. An autofix is never run during an update. It is only run when the aler t is first triggered. Remember, an update happens when the measure changes. If the measure of a threshold alert has not changed, the events on this page will not happen. Since “True/False” aler ts do not have measured values, an update never happens for such alerts. The Aler t Life Cycle of a True/False alert includes Trigger and Clear, but not Update. Alert Cleared

An alert might self-clear during a monitoring period if the condition is no longer met. This typically happens with threshold alerts when the measure is no longer within any of the thresholds, though not all threshold aler ts self-clear. An alert can be manually cleared by a user also. Several things happen when an alert is cleared. The alert is removed from the Aler ts View and the At A Glance View. The alert is logged in the Alert History View. The complete history of the alert is available in this view, including the first trigger time, times of severi ty changes, and time when cleared. Any notes applied during management are also viewable. Alerts are retained in the Alert History View

for a time period specified in the Alert Data Retention policy. By default, this policy retains the history information indefinitely. Once the aler t has been cleared it is eligible to Trigger again, starting the alert lifecycle over. Threshold alerts typically sel f-clear when the value is no longer within a threshold, but True/False alerts do not typically self-clear. They remain active even when the event is no longer detected. Only by manually clearing these alerts will they become inactive.

Page 102: Control Center Knowledge Share

Configuring A lerts * Alert Definitions – Defined alerts – State: enabled/disabled * Alert Templates

– List of all possible metrics for which an alert can be define * Autofixes – Scripts that run automaticall when an alert triggers – Requires Automated Resour Manager or StorageScope li * Management Policies – Notify CC User – Send e-mail – Notify SNMP * Alert Data Retention

Alert Definit ion * List of active alerts currently defined * Enabled alert – Red “Bell” * Disabled alert – Gray * Many aler ts for most agents are pre-defined and enabled when agent is installed. * Refer to EMC ControlCenter Aler ts Matrix for a

breakdown of all alerts. The Usage view of any defined alert shows i f a particular alert is enabled in the Is Alert Enabled? column. The Usage view is one of the choices under the ECC Administration pull down. A red bell indicates an enabled alert as well. The Properties view of a defined alert shows if a Management Policy is associated with an aler t definition, when it was modified and who modified it. Both of these views can be exported into a CSV

file which can then be imported into an spreadsheet like Microsoft Excel. Exporting these two views prior to making changes is extremely useful to record of the state of the alert definitions. To modify an existing alert definition, right click on the aler t and select Edit Alert. The Aler t editor interface pop-ups. The interface has five tabs. * The Properties tab gives you information about the aler t. The information on the properties page cannot be edited. * Alert Type: The four types are Count, Interval, Rate and State. * Alert Category: Alerts could be Health, Capacity or Performance related from object types of

Host, Storage, Connectivity etc. * Last Modified: When was this alert definition last modified. * Who Modified: The ControlCenter Console user who last modified the aler t definition. * Description: Gives you a brief description of the alert. The online help wil l provide more information on the aler t.

Page 103: Control Center Knowledge Share

Alert Definit ions – Usage and Propert ies Views

Each alert definition has a unique descriptor. The unique descriptor is assigned automatically by ControlCenter, it star ts at 00 for the first definition of a specific alert, and is incremented for new definitions of the same alert. The Director Status Alert is an example of a State Aler t.

Editing an Alert Definit ion

Source and Condit ions

Page 104: Control Center Knowledge Share

Source Tab: The information to be specified in the Source tab depends on the specific alert. For the Director Status Alert shown in this example, you can establish which objects should be monitored. The recommendation is to leave the Source tab at the default value of the asterisk wildcard. The Apply To tab (discussed in the next slide) allows a more granular filtering of the specific objects that one needs to monitor.

Condit ions Tab: There are five levels of severity that can be configured for each alert definition: (1) Fatal, (2) Critical, (3) Warning, (4) Minor, (5) Informational. Thresholds could be set up for each of the severity levels. For each severity level, the notifications can be sent to the Aler ts View and the At A Glance View or, alternately, to the At A Glance View only. If both the Alerts view and At A Glance view boxes are unchecked, the alert does not trigger for that severity level. The Before and After values are used to control alert spikes—situations in which a resource

temporarily exceeds a trigger value, and then quickly falls within acceptable ranges again, or a resource briefly goes offline, and then comes back online. Use these fields to prevent being inundated with false aler ts. Before specifies how many consecutive times the alert conditions must be met before ControlCenter sends a notification or alert. After an alert or notification has triggered, ControlCenter uses the value in After to determine how many consecutive times the conditions must be false before ControlCenter removes the alert or notification. The aler t schedule determines how often ControlCenter evaluates the alert definition. Actions and Apply To

Actions Tab:

The Actions Tab is used to specify the alert schedule and optionally to assign a Management Policy and an Autofix. We will discuss Management Policies and Autofixes shortly. Some Alerts will not allow the specification of a schedule, the schedule for such alerts is controlled by the agent. The schedule is chosen via the drop down list. The list will show all the pre-defined schedules. Schedule definitions can be edited and new schedules can be created if necessary. The schedule determines hooften an agent monitors a specific metric for threshold violations.

Page 105: Control Center Knowledge Share

Apply To Tab: This tab is used to specify the objects, such as hosts, storage arrays, or network components, to which the aler t definition applies. You can either select individual objects or al l valid objects monitored by the agent by checking the Apply this alert to all applicable. box. If the Apply this

alert to all applicable box is checked, then any new objects which are discovered in ControlCenter inherit the alert definition automatically. Finally, before saving the new definition (OK button) to enable the aler t, make sure that the Alert Definition Enabled? box is checked. Creating Alert Definit ion from Template

Alert Definitions are created from aler t templates. Right click and select the Alert Template Æ New option to create a new Alert Definition. The new alert definition interface window will pop up. This interface is almost identical to the edit alert interface. The only difference is that the Unique Descriptor is not shown. The Unique descriptor will be automatically generated by ControlCenter and appended to the name of the new alert definition when it is saved. This example shows a Capaci ty Type alert template from the Database Agent for Oracle using the

Free % of Tablespace Alert Definition Template. The Actions Tab: As previously shown, the Actions Tab is used to specify the aler t schedule and optionally to assign a Management Policy and an Autofix. We will discuss Management Policies and Autofixes shortly. Some Alerts will not allow the specification of a schedule, the schedule for such alerts is controlled by the agent. The schedule is chosen via the drop down list. The list will show all the pre-defined schedules. Schedule definitions can be edited and new schedules can be created if

necessary. The schedule determines how often an agent monitors a speci fic metric for threshold violations.

Page 106: Control Center Knowledge Share

Apply To Tab: This tab is used to specify the objects, such as hosts, database instances, storage arrays, or network components, to which the alert definition applies. You can either select individual objects or all valid objects monitored by the agent by checking the Apply this alert to al l applicable. box. If the Apply this aler t to all applicable box is checked, then any new objects which are discovered in ControlCenter inherit the aler t definition automatically.

Management Policies: * What should ControlCenter do when an alert triggers? * Possible actions:

– Display alert in the Console of a specific ControlCenter user – Send an e-mail message – Notify a SNMP management framework – Set up loops – Set up wait intervals * Create new or edit existing management policies * Same policy can apply to multiple aler ts Management Policies control the way alert notification is handled. If no Management Policy is assigned to an alert notification to all Console Users Alerts View or At A Glance View.

Management Policies a llow alert notifications to specified Console users, to a Framework application via SNMP, or to an email address. You can also set up looping features to repeat the notifications a fixed number of times, and insert timed wait steps between the notifications. To create a new Management Policy right-click the Management Policies Folder under Administration > Alert Management and select New.

Page 107: Control Center Knowledge Share

Creating/Edit ing a Management Policy

To edit the policy, drag action icons from the left of the dialog to the main display. If you are specifying a Console User or Email recipient, remember that you can only specify one name in an icon box. You can use “*” to mean all Console users, but otherwise avoid wildcards. For multiple recipients, drag multiple boxes. The SNMP icon does not have any configurable parameters. You

can edit the SNMP receiver parameters in the Integration Gateway Agent’s configuration file. A management policy may be used by more than one alert. If you change a management policy, make sure your changes are appropriate for all the alerts to which the management policy is attached. ControlCenter executes the management policy steps in the sequence they appear in this dialog box, from top to bottom. ControlCenter executes the management policy steps when the alert first triggers, and again whenever the value of a threshold aler t changes. The use of the loop and wait functionality is not recommended as an escalation policy. Once begun, the management policy executes all of the steps whether the alert is cleared or not. Keep

the management policy simple; specify Console users, e-mail recipients and SNMP receivers only. Assigning Management Policy to Alerts

Management polices can either be assigned with a right click on the alert folder from the tree panel or in the Actions tab of

the alert definition. The Management Policy is displayed in the properties view for the alert.

Page 108: Control Center Knowledge Share

Management Policy – E-mail & SNMP Notificat ion

Autofixes * Types of autofixes – System defined – User defined

* User defined autofix – Create the autofix definition within the Console – Create the autofix script on the host * Attach the autofix to the alert through the Edit Alert dialog box * Autofixes always run on the agent that detects the alert An autofix is a script or other program that the agent runs when the alert first triggers. A few System autofixes exist for Windows hosts. Two of them manipulate the Windows

Event Log and are tied to the Host Agent for Windows Event Log alerts. The other System autofix restarts a Windows Service, and is related to the Service Failure alert. Any other autofixes have to be defined by the user. Do this by specifying the name of the executable and any parameters to pass and attaching it to the alerts. You must also install the executable on the agent host. The autofix will be executed by the agent that detects the alert condition. If multiple agents monitor the same object, any one of the agents could be the primary at the time the event occurs. Remember to install the executable on all of them.

An autofix can created by right-clicking the Autofixes folder and select ing New. Parameters can be passed from ControlCenter to the Autofix scripts. The parameters are: * &METRIC is the alert name. * &LEVEL is the severity level of the alert, in string format: Fatal, Critical, Warning, Minor, and Information. * &KEY is the alert key (or managed object that the alert is acting on.) On UNIX and Windows, if the alert has more than one key, then append a number to &KEY for each key you want to pass, for example: &KEY1, &KEY2, and so on. * &VALUE is the value at which the alert triggered.

Page 109: Control Center Knowledge Share

Creating a User Defined Autofix

Attaching an Autofix to an alert

UNIX Autofix Example:

* /usr/ecc/autofixes/vgextendfs &METRIC &LEVEL &KEY &VALUE #!/usr/bin/ksh TIME=`date` print "$TIME" >> /tmp/vgautofix.out print "Metric: $1 Filesystem Free Size: $4 %" >> /tmp/vgautofix.out if [ $2 = 'F ATAL' ] then print "Severity: $2 F ilesystem $3 has been increased by 4 MB" >> /tmp/vgautofix. out else print "Severity: $2 F ilesystem $3 has not been increased" >> /tmp/vgautofix.out fi * Output from vgautofix.out Thu Jan 17 14:13:23 EST 2006 Metric: MAR.FileSystem.Space.PctFreeSpace Filesystem Free Size: 10.032552 % Severity: MINOR Filesystem /istda ta has not been increased

EM

C C

ontr

ol C

ente

r K

now

ledg

e S

hare

- J

uly

17th

200

9, G

asto

n B

enet

rix @

EM

C C

orpo

ratio

n, A

rgen

tina.

Page 110: Control Center Knowledge Share

Setting Thresholds

You can also create aler t definitions using the Edit Thresholds dialog box. The Edit Thresholds dialog box allows you to create or modify multiple alert definitions at one time. In addition, the dialog box shows the category for each metric. The category determines in which At A Glance

view chart a notification will display (for example, Storage System Performance or Host Capacity). To access the Edit Thresholds dialog box, right-c lick any object and select Alert Thresholds, Edit Thresholds. Using the edit threshold window will create a new alert in the tree panel for each unique alert level specified. In this example, the Total Hit% Metric for Symmetrix ‘156 is being set. The Critical level has been changed to 20. Clicking OK results in the creation of a new aler t definition in the Alert Definition folder for the Storage Agent for Symmetrix. The resulting definition is shown in the next slide.

The result of setting thresholds is the creation/alteration of the alert definition. In the previous slide, the Total Hit% threshold for Symmetrix ‘156 was changed. This sl ide shows the Alert Definition which was created as a result of setting the threshold.

Page 111: Control Center Knowledge Share

Monitoring and Handling Alerts * Alerts View – Acknowledge – Assign – Notes – Filtering

– Chart View – Clearing * Alerts History View * At A Glance View

Active Alerts View

This shows the Alerts View. From this view you can quickly see the cause of the alert, which object is affected, and what the level of the alert is. For alerts, this is the main functional view and most of the management functions can be started from this view. Alerts can be displayed in the Alerts View in a number of different ways, a few are lis ted below: * Clicking the All Alerts button in the top right hand corner. The All Alerts button populates the Alerts View with all the active alerts. * Switch the target panel to Alert View by clicking the Alerts button in the taskbar. Then drag

selected objects into the target panel from the tree panel. Dragging selected objects into the target panel displays alerts that relate to those specific objects. This is one way to filter the number of alerts shown in the alerts view. * Right click any object that shows a s tatus icon and choose Alerts. This populates the target panel with the active alerts that are specific to that object. Description of the Columns: * Alert State: Yellow Bel l – New alert (Text will be in Bold font). Gray Bell – Acknowledged or Assigned Aler t (Text is in normal font). Note: A paper clip icon is shown here if a note is assoc iated with this alert. * Autofix State: If an autofix is associated with the alert then this column will indicate the status of the autofix

− Running – Wrench/Spanner icon − Success – Wrench/Spanner with green check − Failure – Wrench/Spanner with red X * Severity: Ranges from 1 to 5. 1 = Fatal, 2= Critical, 3 = Warning, 4 = Minor, 5 = Information * Object Name: Host, storage array, network component (such as a switch), or other managed object for which the alert triggered. * Message: A description of the condition that caused the alert. Look here for information about the specific resources affected.

Page 112: Control Center Knowledge Share

Active Alerts View

Active Alerts View Options

Acknowledging an Alert

Page 113: Control Center Knowledge Share

Assigning An Alert

Adding Notes to Alerts

Searching Alert Notes

Page 114: Control Center Knowledge Share

Clear ing an Alert

Alert History View

Alert History of a Particular Alert Instance

Page 115: Control Center Knowledge Share

Setting Alert Data Retention

Disabling an Alert Definition

Alert Chart View

Page 116: Control Center Knowledge Share

Filter ing Active Alerts

At A Glance View

At A Glance View – Health Drill Down

Page 117: Control Center Knowledge Share

At A Glance View – Capacity Drill Down

Alerts Discussion * There are over 700 alerts – Too few aler ts and problems will not be found – Too many aler ts and they will be ignored * We need to figure out which aler ts are best for each situation

– There are no formulaic “best practices” – Based on the environment including, other monitoring products, which agents are installed and the organizational structure of the group using ControlCenter * ControlCenter alerts are broadly divided into 3 areas – Health – Performance – Capacity Health Alerts * Array

– Hardware – Software * SAN (Connectivity Objects) – Device/Port Status – Zoning/Fabric * Host – Process/Service failure – PowerPath * Applications – Database Instance up/down – Backup application errors

* ControlCenter Server alerts

Capacity Alerts * Array

– Symmetrix virtual provisioning thin pool alert – CLARiiON Raid Group * Host – File system – Volume Group/Disk Group – Swap Space – Quota * Applications – Database tablespace – Backup data size change

Which Alerts Should You Enable? * Finding the most useful alerts requires understanding of – What problems have led to outages – How issues will appear from different perspectives – What alerts are available

Page 118: Control Center Knowledge Share

* Which alerts provide the most useful information? – Are all of them needed? – Are some redundant in this environment? * Are other tools being used for alerting? – Opera ting Systems – Applications

– Frameworks Framework Integration Architecture ControlCenter Framework Integration is SNMP based; ControlCenter is capable of forwarding alerts as SNMP version 1 traps to any SNMP Trap recipient. The standard SNMP Traps defined within the FibreAlliance MIB are used. The ControlCenter Integration Gateway agent is the interface between ControlCenter and the external framework application. It sends selected alerts as traps, and also responds to “get” requests for information. It can also be configured to write events to the Windows Application

Event log. This feature is used for Windows integration. Framework tools can be passive or active. Passive frameworks listen for traps from ControlCenter, and post them to an events display. Active frameworks typically listen for and post traps also, but they also query ControlCenter to show the status of every object. Active tools show the entire environment, while passive tools only show fault events. We discuss some of these topics in more detail in the next few slides. Supported Framework Applications

Integration Gateway Agent can send SNMP v1 traps to any receiver software, supported or not.

BMC Patrol and Microsoft Operations Manager or System Center Operations Manager are the only framework applications currently supported. These applications have been tested with ControlCenter, and you can download integration packages that will seamlessly adapt these products to display the ControlCenter alerts. There are other applications that EMC supplies integration packages for, but are not supported. These files are provided without support to help guide administrators when integrating ControlCenter into their application. The packages should work well for the versions specified in the release notes. If you have a different version or an unusual configuration, you may have to start with the package files and then do some manual editing of the configuration.

Any other software not shown here should still be able to receive traps from the Integration Gateway Agent if it conforms to SNMP version 1. You will have to configure the appearance of such software manually, since no integration packages exist.

Page 119: Control Center Knowledge Share

BMC Patrol is a supported framework application that can be modified by an integration package. Patrol is an active framework tool. This means it can receive traps from the Integration Gateway and post them in an event window, and also query the Integration Gateway to retrieve the status of all of the objects managed by ControlCenter. This gives Patrol the ability to display a dashboard of your entire ControlCenter environment—even the objects that currently have no faults.

The Integration Package for Patrol installs and configures the ecc3pi knowledge module. Patrol uses this tool to interpret traps and retrieve information from the Integration Gateway. This saves the Patrol administrator from having to investigate what information is returned by ControlCenter and then format it appropriately.

The main map of BMC Patrol shows the ControlCenter objects organized into groups. You will find default groups like “Storage,” “Connectivity,” and “Hosts.” Other groups match the user-defined

Page 120: Control Center Knowledge Share

ControlCenter groups. Drill down into one of these groups to show a status dashboard for all of the objects. Colored icons show the current aler t status of object. These colors correspond directly to the alert status in ControlCenter. Patrol also shows the individual traps received from the Gateway Agent in the Event Manager dialog. You can see the time, object name, and alert message for every trap sent.

Microsoft Operat ions Manager

Microsoft Operations Manager is another supported framework application that can be modified by an integration package. Microsoft Operations Manager does not use S NMP to receive information; it monitors the Windows Application Event Log. The Integration Gateway can be configured to write alerts to the log with an identifying tag. Operations Manager searches for events with the matching tag, and posts them in its interface. A similar architecture is used by Microsoft Systems Center Operations Manager. You will have to manually convert the AKM rules file supplied in the integration packages to the new XML format

used in Systems Center Operations Manager, but otherwise the installation is the same. These tools are passive-only: they simply display the alerts sent from the Integration Gateway Agent. They never poll the agent to find the status of the other objects.

Install Integrat ion Gateway Agent The Integration Gateway Agent is pushed to any host having a Master Agent, just like any other ControlCenter agent. A prompt asks for the network name of the framework application. Traps will be sent to this address. If the framework application uses a distributed configuration, make

Page 121: Control Center Knowledge Share

sure the address you enter here is of the trap collector, not the central application server. Ask the framework application administrator for the correct address to send traps to. You will notice that there is no way to choose the port or community string. At installation, the agent is configured to respond to “get” requests using port 1273 and community string “public,” and to send traps using the default port of 162 and community string “public.” To change these defaults, you can edit the configuration file after installation.

Greater customization of the parameters of the Integration Gateway can be done by editing the CNG.ini file (CSG.ini if the Gateway is on a Solaris host). Entries in this file specify the port number and community used by the framework software when querying the Gateway. The default port value for this software is 1273, not the traditional SNMP default of 161. This allows the Gateway to be installed on the same host as the framework application without a port conflict. Make sure you use the correct port number when attempting to read information from the Gateway.

You can configure the Gateway to write alerts to the Windows Application Event log by replacing using a value of “EMC_Alarms” in the “NT_EventLog_Key” setting. This is a required step for integration with Microsoft framework applications.

Page 122: Control Center Knowledge Share

The recipient address designated when the agent was installed is recorded in the “trap_cl ient_registra tion” setting. The entire setting shows the address of the recipient, the port (default 162), severity (default 10), and state (set to ACTIVE to enable sending of traps). If you need to change the recipient or port, simply edit those parameters in the file. To add additional receivers, just duplicate the line and edit the address. The severity setting can be used to filter the forwarding of traps by severity of the ControlCenter

alert. Remember to use ControlCenter to restart the Integration Gateway after making changes to the initializa tion file. Troubleshooting: If your framework

software does not show traps or managed objects as expected, there are several troubleshooting steps you can take. First, make sure the expected alerts appear in the ControlCenter Console. If the alert management policy includes at least one Console user, the event should be visible there. If it is not, then of course it will not be forwarded to the framework application.

You might check the Integration Gateway Agent log files listed above for any software errors. Network errors and issues that prevent proper startup will be captured there. Some of the integration packages include a program named “ecc3pi_test.exe” which will simulate several of the Integration Gateway traps. These traps are sent from the location of the Integration Package install (where the program is), not necessarily from the Integration Gateway agent. So it is a good test of the framework’s ability to receive a trap, but may not completely test the network between the Integration Gateway and the framework. When an active framework receives the simulated Cold Start trap, it will try to discover the ControlCenter managed objects at that address. If the Integration Gateway is not present on that

host, the application will discover an “empty” ControlCenter environment. This might have to be deleted from the application view. You might edit the configuration file to cause the Integration Gateway to record the events in the Windows Event Log as an additional troubleshooting step. By reading the Event Log, you can see what alerts the agent processed. The Integration Gateway also records all of the events that it attempts to forward in a file named “events.xml.” Any event listed there should have been forwarded to the framework receiver—if it did not arrive, check the address and port settings, the network connectivity, or the

framework software itself. The gateway INI file contains a parameter that controls the maximum size of this file. When the maximum size is reached, older entries are deleted.

Page 123: Control Center Knowledge Share

Integration Gateway Event Log: events.xml

StorageScope Features

• Reporting built around storage management use cases

• On-demand views show storage pain points • Scheduled reports delivered by File, Email, or Print • Different levels of customization • IT object (host, switch, storage) and file level data collections combined in one database

This is a more detailed look at the StorageScope architecture and its relationship to the other ControlCenter components. StorageScope is considered to be part of the Infrastructure tier, although it is shown on a separate host in this example.

The StorageScope Repository is populated with data from the ControlCenter Repository by the Extraction, Translation, and Load (ETL) process. Configuration and storage information about all of the hosts, applications, storage, and switches in the environment that are monitored by the

Page 124: Control Center Knowledge Share

agents are passed from one database to another. Certain data is time stamped to enable long term trend reports. By using this already-collected data, StorageScope avoids placing additional processing demands on the agent hosts. The ETL process typically runs once a day. The FLR Archiver performs the ETL process and also handles data requests from the user. It

uses the ControlCenter Web Server to publish the user interface as HTTP pages. If the FLR Archiver is installed on a separate host from the ControlCenter Server (which also uses the Web Server for HTTP publication), a separate Web Server instance is installed. The only data that is not collected from the ControlCenter Repository is file level data. File level data is collected by the Host Agents and sent directly to the FLR Archiver. The file level data is stored as temporary files until the next ETL process. After ETL is run, the file level data is loaded into the StorageScope Repository and viewable in the views and reports. The StorageScope Repository must be an Oracle 10g Release 2 database, just like the main

Repository. No other databases are supported with this release. It can be installed from the ControlCenter install CDs, or the customer can purchase and install their own Oracle instance. Installing Oracle from the ControlCenter CDs does not require any additional license or cost, but you will not have complete administrative control over the database. But even when using your own database to gain administrative control, be wary of per formance issues. StorageScope is a demanding data warehouse-type application that will have significant performance effects on any other application using the same Oracle server. In most small environments, the StorageScope Repository can be installed on the Infrastructure host.

The Repository and the StorageScope Repository instances share the same Oracle server in this case. In larger environments where many thousands of managed objects are cataloged, the performance demands requires the StorageScope Repository to be on its own dedicated server. The EMC ControlCenter Performance and Scalabili ty Guidelines have complete details on the StorageScope requirements. The FLR Archiver is automatically installed on the same host as the StorageScope Repository. If you purchase and install your own Repository, EMC implementation engineers will initialize a new

instance and install the FLR Archiver. Two licenses is required for full functionality of StorageScope. Most of the data collection and processing is available with the standard StorageScope license, but not the file level reporting capabilities. Those become active with the StorageScope File Level Reporting license, which can only be entered after the StorageScope license. The StorageScope File Level Reporting license allows two data collection policies to be enabled: The File Level Collection policy records file-by-file details of standard filesystems mounted on hosts.

Any Host Agent can enable a File Level Collection policy to collect data about its file systems or mounted shares. The File Level Collection for UNC Connection policy records file-by-file details of UNC shares

Page 125: Control Center Knowledge Share

accessed across a network. This policy only applies to the Host Agent for Windows.

The File Level Collection Data Collection Policy provides file scanning similar to the old StorageScope FLR and VisualSRM products. There are several scanning depth options available in the Source tab when creating the policy. The Scope of Data Collection changes how much detail is recorded in the Repository. An All Files and Folders scan loads everything, going

through all the files and folders on a per file system basis. Alternatively, you could opt for only a summary file scan. A Folders Only scan examines the folder contents to record the number of files, their storage utilization, type, owner, and other details. But it does not store the information for every file, it only summarizes the data by folder. You can also choose “Exceptional Files and Folders,” such as the top N largest or the top N oldest. You can enter the N value in the next line of the dialog.

Page 126: Control Center Knowledge Share

The demanding nature of the file level collections are made clear in the Performance and Scalability Guidelines. It shows the circumstances under which the StorageScope components can be installed with the other Infrastructure components and when they should be on a dedicated server. In most cases, environments classified as small and medium by the Performance and Scalability Guidelinescan have the StorageScope database and server installed on the infrastructure. Large

environments must use a dedicated server for StorageScope. When using a dedicated StorageScope server, the limit of the number of medium filesystems that can be added to File Level Data Collection Policies is 2,000. These scalabil ity guidelines assume that the highest level of collection detail is reserved for the critical filesystems. Seventy-five percent of the maximum allowed filesystems should be monitored using a Folders Only scope settings with no summary file type collection. Twenty percent can have the Folders Only scope with summary type collection, and only five percent can have All Files and Folders and file type summary.

When StorageScope is installed on the Infrastructure, the total number of filesystems allowed may be less than 2,000. Since the exact number depends on the power of the server and the size of the filesystems, make sure you ask the EMC team that installed ControlCenter what your limits are. In practice, you should turn on the “Folders Only” collections for all of your filesystems for some period to help identify the critical filesystems. Once you have studied the environment for a while, you can enable the higher details just on those filesystems that are in danger of running out of space.

The file level data collection policies can optionally collect information on file types. To determine the file type, the agent compares the filename extension to a list of user-defined types. You can manage the types in the Edit File Type Definitions option of the Reports menu in the ControlCenter Console. When adding extensions, separate them by commas and do not use a period—just enter the text that appears after the last period in the file name. You can use a star to mean any characters.

There is only one type definition list for all users, so consult your associates before changing an existing type. Since the type cataloging is done during a file level data collection policy execution, any changes to the type list will show up in the views, queries, and reports after the next policy execution and ETL process.

Page 127: Control Center Knowledge Share

The several reporting methods in StorageScope can be arranged from Novice to Expert in terms of difficulty and level of effort. Users can use one method to quickly spot trouble, and use a more detailed method to further investigate the issue. The Dashboard and SRM Views pages of the StorageScope interface provide quick, high-level information about your objects, their util ization, and storage trends. Reports show more detail

about the same things, and can show file level data as well. Built-in queries are similar to reports, but tend toward more tabular data.

Custom queries are fully configurable database queries. You can filter data from any of the object tables, and sort and summarize the output. The wizard interface gives you much of the power of a SQL query without having to actually know SQL. Use custom reports to query the StorageScope Repository and format

the output to meet your specific needs. You need to use the Business Objects Crystal Reports editor to create custom reports (not supplied with ControlCenter). Once you have a useful report, you can add it to the StorageScope

report list for automatic scheduling. Good knowledge of Crystal Reports is required for this option, and you may occasionally need some SQL programming as well.

Page 128: Control Center Knowledge Share

For the most complete reporting available, you can query the StorageScope

Repository with any SQL-based reporting tool. You have the complete details of every table of data this way, but of course you have to write the reporting solution from

scratch. You can go to the Snapshots page under the Utilities menu to view the built-in Snapshots or add a custom Snapshot. Any one of the 16 built-in Snapshots can be copied, modified, and then saved as custom snapshots, or you can create your own from scratch. The original built-in Snapshots can not be modified or deleted. The Snapshot Settings

dialog pictured at left prompts for a Type (Table or Chart), organization Category, and a Title. The data source of the Snapshot is the SQL query, which you will have to enter by hand. If you are not familiar with SQL coding or the

StorageScope Repository tables you might just make a slight change to the code of a copied Snapshot. Or you might capture the code from a Query you developed. If you are more familiar with SQL coding, you can use the EMC ControlCenter StorageScope Reference Guide to look up the names of the tables and columns when writing your own query.

The SRM Views pages provide high-level summary information about all of the objects in the StorageScope Repository. They show basic configuration summaries, high-level storage allocation, “Top 10” storage issues, and trend graphs. Use these pages as the firs t step in your investigation to spot problem areas.

Page 129: Control Center Knowledge Share

The Array views contain information about the properties, capacity, and usage of your storage arrays. The views also identify storage device capacity that can be reclaimed and the hosts to which

array storage is accessible. The Thin Pools View provides an enterprise summary about the number and usage of thin pools in the environment. This view gives very similar information as the Arrays View does

regarding total, used, and subscribed capacity for individual thin pools and the arrays on which the reside. Trending for these metrics are also displayed in the Enterprise Summary View. The Host views contain information about the storage capacity (internal and external) accessible to your hosts, the database applications residing on those hosts, and host file-level details. The Connectivity views provide information about the properties and port usage of the Fibre channel switches in your environment. The NAS views provide information about your NAS file servers, data movers and NAS file systems.

Except for the trend graphs, all the data in the SRM Views is from the most recent Extraction, Translation, and Load process. Unlike most of the rest of the reporting features of StorageScope, the SRM Views are not customizable in any way.

Page 130: Control Center Knowledge Share
Page 131: Control Center Knowledge Share

Other SRM Views * Hosts – 10 Hosts with Most Accessible Storage – 10 Hosts Using Most Accessible Storage * Hosts Applications – 10 Most Used Databases – 10 Least Used Databases – Databases Full in 6 Months * Hosts File Level Storage – File Systems

• 10 Most|Least Used • FS Full in 6 Months • 10 Most Dormant|Aged|Media|Temp

Cap – Folders/Directories

• 10 Most Dormant|Aged|Media|Temp Cap

– Files

• 10 Hosts Most Dormant|Aged|Media|Temp Cap

* Switches – 10 Switches with Most Used Ports – 10 Switches with Most Free Ports – Switches with No Free Ports in 6 Months * NAS File Servers – 10 File Servers with Most Used File

Systems – 10 File Servers with Least Used File Systems * NAS File Systems – 10 Most Used File Systems – 10 Least Used File Systems – File Systems Full in 6 Months * Thin Pools – 10 Most Utilized and Subscribed Pools – 10 Least Utilized and Subscribed Pools

Page 132: Control Center Knowledge Share
Page 133: Control Center Knowledge Share
Page 134: Control Center Knowledge Share
Page 135: Control Center Knowledge Share
Page 136: Control Center Knowledge Share
Page 137: Control Center Knowledge Share
Page 138: Control Center Knowledge Share
Page 139: Control Center Knowledge Share
Page 140: Control Center Knowledge Share
Page 141: Control Center Knowledge Share
Page 142: Control Center Knowledge Share
Page 143: Control Center Knowledge Share
Page 144: Control Center Knowledge Share

ControlCenter Real-t ime Performance Monitoring * Statistics can be displayed for: * Symmetrix - Overall performance, Host Directors, Host Director Ports, Disk Directors, Devices, Disks

* Switches - Switch ports . Performance statistics in approximately Real-Time . Historical chart of data can be kept for up to seven days . Measures that exceed performance aler t thresholds color-code the display The performance data is updated every few minutes according to the schedule in a data collection policy. This approximately real-time view is good for analyzing the current status of the components. As traffic ra tes change, you will quickly see the effects and might be able to pinpoint the source.

EM

C C

ontr

ol C

ente

r K

now

ledg

e S

hare

- J

uly

17th

200

9, G

asto

n B

enet

rix @

EM

C C

orpo

ratio

n, A

rgen

tina.

Page 145: Control Center Knowledge Share

Console Performance Monitoring

Console Performance Data Collect ion Policies

Overall Symmetrix Performance – Table

Page 146: Control Center Knowledge Share

Tabular performance numbers are either displayed in real-time or exponential formats. Real- time values are simply the last number read from the agent. Display of real- time values is the most accurate view of the object’s performance, but the values may tend to change frequently. Exponential values are averaged with the previous few values displayed, with an exponentially decreasing weight on numbers further in the past. The exponential display shows the overall trend of the measure but not the actual value read from the agent. Exponential values tend to be

more stable. Overall Symmetrix Performance – Chart

Setting/Editing Thresholds

You can view the performance of the Host Directors and their ports by selecting the Host Directors folder and all the sub folders. The user has chosen to display measures across the whole array, and also measures across sub-objects. The Host Directors folder has been displayed, showing the sum of the measures across all the host directors. Some individual host

directors have being displayed (named “Front End Directors” in the display) to show the breakdown across these objects. F inally, some host director ports are being displayed to show the I/O on the ports.

Page 147: Control Center Knowledge Share

Symmetrix Front-end Director/Port Statistics You might combine a view like this with a Relationship view.

Use the Relationship view to show which ports and directors your host is connected to, and then drag the objects into a Performance view to show the workload.

Symmetrix Back-end Director/Disk Statistics

Switch Port Statist ics – Table

Page 148: Control Center Knowledge Share

Switch Port Statist ics – Chart

Historical Chart

ControlCenter Performance Manager * Performance analysis tool useful for troubleshooting, tuning, and trend analysis of the enterprise storage environment * Data can be collected for Symmetrix, CLARiiON, HDS, NAS arrays, Fibre Channel Switches, Oracle Databases, and Hosts * Much more detai led measures than real-time Console performance monitoring—most complete

Symmetrix performance analysis available * Archive viewing is strictly historical—all charts are static displays of past performance events * Two ways to view performance archives: – Performance Manager tool – Detailed performance archive viewing tool * Contains many default char ts showing most commonly used performance measures * Custom charts can be created to focus on a particular application or group of devices – Automated reports – Selected Performance Manager reports in HTML format

Page 149: Control Center Knowledge Share

Archive Types Created by the WLA Daily Policy * Interval – Raw WLA Daily data; number of data points per hour determined by the WLA Daily Policy * Daily – One data point per hour (24 hours per archive) averaged from Interval data

* Weekly – One data point per hour (24 hours per archive) averaged from one week of Daily data * Monthly – One data point per hour (24 hours per archive) averaged from one month of Weekly data A sample Workload Analyzer Daily collection policy is displayed above. As with most data collection policies, the Actions and Apply To tabs can be used to specify the frequency of the collection and the managed objects it pertains to. An administrator has the flexibility to set different collection schedules for different managed objects of the same type.

Page 150: Control Center Knowledge Share

Data Collection Policy – Daily Collections

Getting Revolving Collect ions

An Analyst data collection policy is used to schedule a future Analyst collection. Most of the se ttings are very similar to the other policies, but the method used to set the schedule is not immediately obvious. None of the

timing features at the bottom of the Actions tab are directly editable, making it appear that only the frequency can be set here.

Page 151: Control Center Knowledge Share

Performance Manager * Displays archives in graphical format * Many useful graphs included as default views * Custom graphs can be created by combining any measures * Contains interface for customizing automated HTML repor ts * Can be launched directly from the Console if both are installed on the same host Performance Manager Communication

* Communicates directly with ControlCenter Repository to determine location of WLA Archiver Agents * Retrieves list of archives directly from Archiver * Loads chosen archive to the local system for viewing (temporary copy only) * Archive can be saved locally if needed

Page 152: Control Center Knowledge Share

Performance Manager – Accessing Data

Views Tab

Creating New Data Views

Page 153: Control Center Knowledge Share

Graph Data View

Metrics Tab

Links V iew

Page 154: Control Center Knowledge Share

Configuration Tab

Groups in Performance Manager

Saving Data and Graphs

Page 155: Control Center Knowledge Share

Automated HTML Reports * Created and stored automatically by the WLA Archiver Agent * Published by the EMC ControlCenter Performance Manager Reports service on the WLA Archiver Agent host * Viewed with a normal web browser

– Good for quick looks at common performance features – Publishes performance information to a wide audience without requiring widespread Performance Manager installs * Configurable – Add, remove graphs – Set thresholds to color reports according to severity of performance issue – Thresholds can also be used to trigger the creation of a report Automat ion Jobs

Automat ion Reports Login and Selection Page

Page 156: Control Center Knowledge Share

Automat ion Jobs – Reports

Storage Allocation Steps

Storage provisioning can be a complex process. There are many variables that come into play, and many steps that must be taken to successfully incorporate new storage into the management umbrella of an opera ting system, and made useable by a database or application. Before we start to analyze a planning task, we need to understand everything that is involved with allocating storage. The above image breaks the provisioning steps down into their basic parts.

Below we discuss what is happening at each phase: Array Management * Configure new volumes – This stage can be quite complex and includes such steps as carving off logical volumes from physical disks and combining multiple logical volumes into striped or concatenated meta volumes. The complexity does not lie in the steps, but in the thought process behind them, for example things like what device type and emulation, but also calculating the performance impact on cache, director and device resources. * Assign volumes to ports – The main considerations here include ensuring that the devices are assigned to a sufficient number of ports to support performance requirements, confirming that

the port flags are properly set according to the host that will use the devices, and ensuring that you do not exceed any LUN limits supported by the Director.

Page 157: Control Center Knowledge Share

Storage Array Management * Allocate volumes to Host – If Symmetrix Device Masking is being used, you will need to configure the VCM database to allow the Host HBA to have access to the mapped devices. * SAN Zoning – You must configure the SAN zoning to make sure that the Host HBAs have access to the array director ports where the devices are mapped. This step could include editing or creating new zones, updating the zoneset and activating the zone set to apply those changes.

Host Storage Management * Volume Management –This stage includes such tasks as editing configuration files, rescanning buses for the device, incorporating the new device into PowerPath control and editing volume groups. * File System Management - This step involves enabling existing filesystems to recognize the new storage that is now available. * Database/Application Management – The last step would be making the database or application capable of using the new filesystem space. The most common example here would be extending database tablespaces.

Adding New Storage to a Server * You are tasked with adding storage for a new application to a server in your environment. This implementation has the following requirements – This new application requires at least 3GB of storage – Storage must be striped across at least 8 array devices in order to support the expected performance demands – Storage must also be RAID-1 protected – The storage must be accessible via at least two distinct data paths with full redundancy * As a storage administrator, what information must you gather during the planning phase of this rollout?

* What planning must be done prior to the actual implementation? Implementing Local Replica Solution * As part of a new backup plan, you have been asked to implement a local replication solution for an existing application server. A new server has been purchased in order to act as a centralized backup host for several applications. * As a storage administrator, what information must you gather during the planning phase of this implementation? * What planning must be done prior to the actual implementation? Manual Storage Allocation

Storage provisioning can be a complex process. There are many variables that come into play and many steps that must be taken to successfully incorporate new storage into the management umbrella of an opera ting system and made useable by an database or application. The above image breaks the provisioning steps down into their basic parts. AutoPathing and Storage Prov isioning Services

Page 158: Control Center Knowledge Share

As we’ve seen, the provisioning of storage can be a constant challenge for administrators in a storage area network (SAN) environment. Al locating storage, whether it is for a new server or for an existing server, is often complex, time-consuming, and error-prone. Expert knowledge of multi-vendor storage arrays, SANs, and host system administration is required. Often, this expertise is lacking since skilled and trained personnel are in short supply. Even if skilled staff is available, a straightforward request for additional storage can take days to fulfill since storage,

SAN, and host-specific expertise often crosses different organizational boundaries within a data center. ARM’s Storage Provisioning Services (SPS) provides a complete end-to-end solution by automating allocation actions from array to SAN and host management with a few mouse clicks. It automates the search for unallocated disks and the selection of the appropriate available capacity based upon predefined policies. It then performs the complex tasks associated with storage provisioning in a heterogeneous SAN, including LUN masking, zoning, multipathing, and extension of file systems or volume groups. As a result, SPS enables users to provide “just-in-time” storage provisioning to meet their Service Level Agreements. Not only does SPS expedite

the entire storage provisioning process, it also reduces errors as staff with a lower level of experience can al locate storage based on business policies and best practices. SAN Manager provides automation to perform Zoning and LUN Masking in one step using the AutoPathing wizard. Storage Prov isioning Services Object ive * Challenges: – Respond quickly to end-user requirements for additional storage – Reduce administrative intervention for s torage-based alerts – Remove storage quickly * Automated Resource Manager

– Quick and easy policy-based storage allocation and deallocation – Automation based on your business rules and policies * SAN Manager – Quick and easy zoning and LUN masking using automation wizard * Meet time to provision, availability, and performance goals. SPS allows a storage administrator to quickly meet the challenges of supporting a highly available storage environment. Using ControlCenter Automated Resource Manager, administrators can now quickly response to end-user storage requirements by using easy to manage policy based allocation tasks.

Page 159: Control Center Knowledge Share

It also allows you to reduce the overall administrative time and costs by automating the most common management processes through the use of pools, policies and wizards all based on your business rules, policies and processes. SAN Manager AutoPath * Automates the allocation of devices to hosts

– Creates required Zones – Creates required number of paths requested – Activates updated Zone Set – Performs LUN Masking – Symmetrix – Devices must be mapped to front end ports – CLARiiON – Devices could be from the Mapped or Unmapped folders – Autopath can be used to allocate devices which have already been allocated to other hosts * Requires a SAN Manager license Starting AutoPath Wizard

Launching the Autopath wizard is really very easy. Simply select the mapped devices that you would like the host to have access to and the HBA that you would like to access those devices across. Next right click on one of the objects and from the dropdown list select Allocation Æ Autopath. At this point you need to complete the wizard process presented on the following pages. Note: When zoning Symmetrix devices, you must select devices that are currently mapped to front end ports because Autopath will not perform SDR changes. Clariion devices, however can be selected from the mapped or unmapped folders. Autopath requires a default zoning policy to be associa ted with each SAN Fabric that will affected by the Autopath actions. A warning as shown in step 3 will be shown if a default zoning policy

does not exist for the affected fabrics.

Page 160: Control Center Knowledge Share

AutoPath Wizard

The review allocation task screen gives you your last chance to look over the changes before executing them. Using the Specifications tab you can review the objects that are to be effected. Here you confirm the devices and the HBAs that will be effected. The Path Details tab allows you to do one last review of the paths between those objects that are to be defined. Once completed,

you can choose to execute now or save these changes in a task list to be executed later. SPS Overview * Enable “just in time” Storage Provisioning * Allocate storage based on business policies * Capture storage provisioning best practices to enable less experienced personnel to allocate storage * Array support – CLARiiON, Symmetrix, HP StorageWorks (HSG80) * Host support - Reconfiguration

– Windows, Solaris, HP-UX, IBM AIX, and VMware ESX Server 3.0.1

Page 161: Control Center Knowledge Share

SPS Steps - Preparat ion 1. Determine strategy for pool design 2. Determine strategy for allocation policy definitions 3. Storage Pools must be created and populated 4. Allocation Policies must be defined 5. Users must be created and permissions assigned

When planning and preparing for an SPS rollout you should follow the following steps. Determine strategy for pool design – This step is the sole objective that will be discussed in lesson 4, however the basic concept here is that you must decide how you want to split up your storage devices such that SPS tasks can pull storage and allocate it based on business processes. Determine strategy for allocation policy definitions – Like a pool strategy, you need to decide not only how your storage allocation policies will be created, but how they will be used for different provisioning tasks. Often these decisions are a direct result of the Pool design. For example, if the pools are designed by department, then the finance hosts will use allocation policies designed to pull devices from a pool reser ved for finance. If the pools are designed based on protection,

then hosts who need mirrored protection would use allocation policies pulling from pools made up of mirrored devices. Storage Pools must be created and populated – Here, the administrator must go through the manual task of building and populating storage pools based on the design strategy defined and adopted in step 1. Allocation Policies must be defined – Again, here the administrator must go through the manual task of building the policies that will be used when creating storage allocation tasks Users must be created and permissions assigned – The last step that must be performed is the assignment of permissions to those users who will have the right to create allocation tasks.

Though this step may seem simple and perhaps obvious at firs t glance, this is where SPS can truly change how businesses perform s torage allocation. Most application or database administrators currently request additional storage via e-mail , phone calls or face to face discussions. If a storage admin decides to grant the storage request, they must then, from scratch, provision that storage. With SPS you can assign to those DBAs and Application administrators the right to create SPS tasks that request not only how much storage they want, but which devices and the paths that they will use. You can then have the storage administrator approve, deny or edit those tasks. SPS Steps - Execut ion 1. Launch SPS Allocation Wizard

a. Select how much storage b. Which allocation policy c. Which host 2. Create Tasks and Task lists 3. Execute Task Lists When it is time to actually allocate storage to a host or filesystem, the process is broken down as follows: Launch SPS wizard – Launching the wizard is as simple as right clicking on a host and drilling down to Storage Allocation. Once the wizard has launched you will need to provide it will

information regarding how much storage you would like, which allocation policy you would like to use and which hosts to include (could be multiple hosts and might include backup hosts if BCVs are to be mapped as well)

Page 162: Control Center Knowledge Share

Create Tasks and add to task lists – Once you have specified what you want allocated, you will finish by saving this request as a task and place it into a task list. Task lists allow you to create multiple changes ahead of time and then execute them later during predetermined off-peak hours or scheduled down time. Execute task lists – Once you are ready to commit the changes, you simply need to execute the task lists and all the tasks within it will be run.

Storage Pools

Storage pools are groups of storage devices that SPS will search for available storage. The first step to using SPS is for the administrator to categorize storage devices and create storage pools for each category. Storage pools can be based on device ownership, device per formance, device type, devices assigned to specific geographic locations or data centers, or any other logical grouping that a customer would need. Once the pools are created, the administrator populates the pools wi th the appropriate devices or other nested pools. Nested pools can be used to

arrange the pools into any format that makes sense in the user environment. For example, a user may choose to use a format such as Data Center/Departments/Applications or Location/Application. The contents of the pool must be storage, but can be across arrays and array types. For example, an administrator can create a storage pool for a given business unit, such as Development. This particular business unit might only use HP StorageWorks storage. After storage pools are created, the administrator can create allocation policies that use these storage pools. Storage Pools - Rules

• A device can belong to only one pool at a time.

• A pool can contain either devices or other storage pools. • A storage device can be moved between pools. • A storage device remains in a pool, even after allocation. • A pool can contain devices across multiple arrays and array types. • A pool can contain specific devices or entire arrays.

To create a Storage Pool use the following steps: 1. Open the Storage Administration folder.

2. Right-click Storage Pools and select New >Storage Pool. 3. Rename the new storage pool folder to a descriptive pool name. 4. Add devices to the new pool by dragging and dropping the devices from the Console to the pool.

Page 163: Control Center Knowledge Share

Storage Pools – Creation

Allocat ion Policies SPS simplifies the provisioning process by enabling customers to provision storage based on business rules. These rules are specif ied within the ControlCenter allocation policies. Allocation

policies contain all of the general criteria for storage allocation requests. For example, a allocation policy for an OLTP application that requires premium-level storage could be created. This might mean that the application is only allocated RAID 1 storage with four paths between the host and array with remote replication support. Another allocation policy could be created for telemarketing file servers that require lower-level storage. This might mean that these file servers would only be allocated RAID 5 storage with two paths between the host and array with no replication support. Regardless of how you choose to create your policies they all must be configured with the following information:

• Replica class • Storage Pool • Type of storage • RAID Level • Number of paths

Allocat ion

Policies – Creation

Page 164: Control Center Knowledge Share

Allocat ion Policies – Policy Name and Options

• Storage Pool —Select the group of storage devices within which SPS will search for devices for each of the replicas. • Storage Type —Select the type of storage to be selected from the specified storage pool. • RAID Level —Select array-based protection level for the LUN to be chosen. Options, such as

RAID1 and RAID 5, vary depending on storage type selected. • Number of Paths —Select the number of paths to be created between the server and storage. For Symmetrix and CLARiiON systems, you can specify up to 32 paths. On HP StorageWorks arrays, specify one path since multipathing is not supported in this release. • Mapped Device Only (Symm only)—Selected when SPS should only search for devices that are already mapped to front-end array ports. This feature only applies to the Symmetrix system. • Zoned Storage Only —Selected when SPS should only search for devices on ports that are already zoned. This constraint is used to force new devices to come from arrays that are already in use or arrays that are prepared for use by pre-zoning them to the host. • Disable Host Actions —Selected when SPS should not run host commands. This can be used

when the Storage Administration and Host Administration are separate, and the host functions should not be done as automatically as par t of the automation process. Create New Storage Group (CLARiiON Only) – Selected when SPS should create a new storage group for Clariion device masking if a group does not currently exist. If this box is not selected the device will only be allocated if the target host iscurrently a member of an existing storage group.

Page 165: Control Center Knowledge Share

• Add Storage to Host(s) —The host(s) selected in the navigation tree when the wizard was launched. Additional hosts can be added via drag and drop from the Console. If multiple hosts are in this field, the same s torage will be allocated to each of the hosts. • Storage Policy —Select the Allocation Policy that applies to the specified host(s) and/or

application to run on the host based on business requirements. The Allocation Policies editor/crea tor can also be launched from this dialog box by clicking Edit or New. The default Allocation Policy is shown. • Amount to Allocate — Indicate the amount of storage needed. Available options are at most “x” GB, at least “y” GB, and a range. • Requested # of Devices: Range —Indicate a range for the number of devices that SPS should return for the allocation request. You can use these parameters to specify a single large volume (by specifying a range of 1 to 1) or a greater number of smaller volumes (by changing the “from” value to the number of volumes desired). Multiple devices might be selected if you plan to place the devices in a host logical volume group, for example.

SPS searches for storage devices and paths that will satisfy the se lected Allocation Policy and additional criteria. SPS displays the results of the query in the Details of Proposed Path window.

Page 166: Control Center Knowledge Share
Page 167: Control Center Knowledge Share

If the policy being used for this allocation task specifies a local or remote replica, the dialog on the left will appear. Here you can choose to define which host the BCV or R2 will be mapped to for recovery or backup purposes. It is important to note, however that this step is not mandatory. In the left window, select the local (or remote) replica. In the middle window, select the host that you would like the replica to be mapped to. Once you have made your selection, click on the add

button and confirm that the Primary device host and repl ica device host are correct before clicking the Next button to move on. After selecting Replica Hosts cl ick Next. The wizard will then begin searching for available devices and paths. If no suitable devices are found in the Storage Pool specified in the Allocation Policy selected then the dialog on the right will appear. This dialog is useful in finding out why no suitable devices were found. In this example the: We asked for at least 0.5 GB and enough BCV devices were not available to give us 0.5 GB, but the log shows that one BCV of 449 MB was available. So we could step the SPS Wizard back to at for “At Most” 0.5 GB.

Device Group Selection If replicas were assigned using this task, you have the ability here to specify which device group you would like to make these devices a member of. If you are performing this

provisioning tasks for the purpose of increasing the storage for an existing application, simply add them to the device group that applications current devices are a members of. If however you are allocating devices for a new application or filesystem, you might need to create a new device group prior to running the task wizard. The reason for this is that on this screen you cannot create new device groups, only assign devices to existing ones.

Page 168: Control Center Knowledge Share

Review Allocat ion Task

Execute Task Later

• Allows tasks to be batched • Multiple requests in a Task List get executed together

• Separate permissions to save and execute

With SPS, provisioning requests are processed by creating storage allocation tasks. When you create a task, you save it as part of a task list. You can group several tasks together in a task list. The advantage to this is seen during execution of the tasks. SPS groups similar actions within the tasks; for example, all Symmetrix disk reallocation (SDR) actions (mapping volumes to Symmetrix front end ports) wil l be grouped together and executed at the same time for tasks within the same task list. In addition, junior staff members can generate tasks to be reviewed and approved/executed by more senior staff.

Naming of the tasklists could be used effectively to organize work: wf_create Create all the tasks under this task lists wf_review Move the tasks to this task lists once the change control board approves i t wf_readytoexecute Move the tasks to this tasklist when it is ready to execute wf_execute Move the tasks to this task if they are executed Put the change control request ID in the task name. It will much easier to tie the requests and ControlCenter tasks. Reserved Volumes

Once provisioning tasks are saved, the volumes and their LUN IDs are reserved. This prevents the same volumes from being selected by another SPS request. The same volumes are unreserved after the task is executed. Volumes are also unreserved if a task is deleted. To review reserved volumes select the storage pools and select Show reserved volumes in the right-click menu. There are multiple ways to configure storage, including SPS and low-level commands within ControlCenter, array-specific tools, and SYMCLI. SPS is unaware of these changes until a task list is executed. Prior to execution a process is run to verify that reserved devices have not become allocated by other tools. To determine if there is a problem with some reserved volumes before your normal maintenance

window, follow these steps: 1. Right-click the target task list. 2. Select Rebuild Task List from the menu. 3. The Task List is rebuilt automatically. If there are problems, you will have time to edit the appropriate provisioning task in order to select a different storage volume.

Page 169: Control Center Knowledge Share

Execute Task List

To execute a task list , simply right click on the task list from within the tree panel and select Execute Task List. After confirming the command you can view the list of steps and status for each task within the list as it is executing. If an error occurs during execution of a task list, you can be notified by a ControlCenter alert or by viewing the properties of the Tasklist. If an existing

Symmetrix configuration opera tion or Optimizer process has a current lock on the Symmetrix then the tasklist will fail. To check for locks on a Symmetrix use the following symcli command : symcfg –sid nn –lock –lockn ALL list You can then address the error (normally by waiting for the other task to complete) and execute the task list again by right clicking on the tasklist and selecting Re-Try Tasklist. Deallocation policies define the actions the Storage Provisioning Services wizard should perform when deallocating storage. Storage administrators can create different policies for storage with different needs or to control deallocation tasks performed by junior administrators. Use the Storage Provisioning Services wizard to deallocate storage from:

Hosts ; Host devices ; Host adapters ; Host ports ; Unidentified ports ; Storage ports ; Storage devices

Page 170: Control Center Knowledge Share

Deallocate Storage

Extend a File System: In the situation where a host volume group has additional free space, ARM can automatically extend the file system using the storage that is already al located to the host volume group.

Alternately, this may also be done manually from the ControlCenter Console. In the situation where a host volume group has no additional space, SPS can increase the size of the existing volume group by selecting additional LUNs and extending the file system. Please check the Support Matrix for the supported OS Platforms, FileSystem types and Array Devices on which SPS will extend File Systems. SPS determines the attributes of the storage currently being used and, in the background, will propose a policy to be applied to the new storage for the file system extension Other SPS functions include: * Extend Volume Group * Extend Logical Volume

Page 171: Control Center Knowledge Share

Storage Prov ision Services CLI * Allows the administrator to integrate the Storage Provisioning Services functions with third party software such as a workflow system. * Installed from ControlCenter CDs * SPS CLI examples:

– SPS allocate –host seawin-01 –allocpolicy finance –tasklist wf_create –task payroll_project -atleast 100 – SPS extendfs –host losbe089 –fs /dev –atleast 10 – SPS extendvg –host losbe089 –vg vg00 –atleast 20 – SPS extendlv –host losbe089 –vg vg00 –lv lv00 –atleast 200 * Additional SPS CLI commands available to: – Manage tasks and tasklists – Research hosts, filesystems, volume groups and logical volumes * Refer to Storage Provisioning Services Command Line Interface Reference Guide for more

details.

Page 172: Control Center Knowledge Share

Storage Pool Design is Critical * There are many possible options * No one is necessarily better than another – It all depends on the customer environment and their needs y We will examine some pros and cons of just 5 options to illustrate the point: – Line-of-Business-based Storage Pools

– Geographically-based Storage Pools – SAN-Fabric-based Storage Pools – Array-based Storage Pools – Service-Level-based Storage Pools

The next set of several slides attempt to show why the design of Storage Pools is critical for the successful implementation of the Storage Provisioning Services capability of EMC ControlCenter. First, there are many options from which to choose. Here we only list 5 possible ways to think about organizing and setting up Storage Pools. There are many others and they could also be used in any number of combinations if so desired. So the first reason to focus on Storage Pool

design is the large number of alternatives you can choose from. Second, each device can be placed in one, and only one, Storage Pool. The granularity of the Storage Pools that are chosen are going to impact the ease or difficulty with which this can be accomplished. If you have a Storage Pool that is to include every device in a specific storage array, it is easy to drag and drop the array itself into the Pool and the setup is done. However, if the Storage Pools are intended to contain only some of the devices from only some of the storage arrays in your Customer environment, each device or device range will have to separately be dragged and dropped into the chosen Storage Pool – clearly more effort and more error-prone too.

Third, changing from one Storage Pool design to another should be avoided. Moving the devices or arrays to a different pool organization is likely to be time-consuming and also error-prone. It is much better to have thought about what is the ‘right’ or most appropriate Storage Pool strategy before the implementation so as to minimize the chances of this happening. Changing the Storage Pool design will also necessi tate changing the Alloca tion Policies too, adding even more administrative workload that could have been avoided by good planning.

Page 173: Control Center Knowledge Share

The designs presented here are not the only possible Storage Pool design philosophies that are possible. There are many others of which we have chosen just these 5 to share and discuss wi th you. Consider them as indicating some of the reasons that every Customer should spend time up-front identifying what might be relevant alternative Storage Pool designs and then determining the pros and cons for them in order to make the most informed and long-lasting set of decisions about the Storage Pool that will be most appropriate to be deployed.

This first design is based on setting up Storage Pools which are aligned with specific Lines of Business (LoB). Four fictitious examples are given for illustration. The intention of this design is to place into each Storage Pool only those storage array devices which a specific LoB is expected to need to be provisioned over whatever is the next planning period. For example, the Sales Storage Pool will contain the specific storage array devices the Sales LoB will need to use once its growth demands more than the existing al location of storage devices. This includes storage array devices of the right quantities and with the correct characteristics

(e.g. STDs, BCVs and/or R1s for a Symmetrix array) to service the future provisioning needs of the Sales LoB. Clearly this approach to Storage Pool design is most likely to appeal, at least initially, to a Customer that is focused on the different LoBs that it has to service. The suggestion in the title of this slide is that this scenario might be most appealing or relevant for environments that have a single storage array or are restricted to a single geographic location – but in no way should that be considered as a hard and fast rule (it is more complex than that and the title is only trying to suggest an additional flavor concerned wi th the simplicity of the storage environment we wish you to consider the pros and cons of with this design).

Before you turn to the next page in the notes, please try to think of reasons why this design approach might be good and reasons why it might be bad, depending upon individual Customer circumstances, of course. When you have done that, move on and review the sample set of pros and cons we provide you with on the next slide.

Page 174: Control Center Knowledge Share
Page 175: Control Center Knowledge Share

This next design is based on setting up Storage Pools which are aligned to specific storage arrays. Several examples are given for illustration. The intention of this design is to have just one array per Storage Pool and to place all storage devices from an array in its designated Storage Pool. The diagram above depicts several array pools sub-pools within an array type pool within a location Storage Pool.

The Storage Pools would contain all storage array devices with any technical characteristics (e.g. STDs, BCVs and/or R1s for a Symmetrix array) that reside in the designated array. If provisioning requires storage devices from a specific array it is easy to identify the correct Storage Pools and the relevant Storage Management Policies that would have to be setup to support this. Clearly this approach to Storage Pool design is most likely to appeal, at least initially, to a Customer that is focused on managing the arrays themselves. For this design, you have to decide in advance from which storage array you wish to provision the storage capacity. The suggestion in the title of this slide is that this scenario might be most appealing or relevant for environments that have to satisfy multiple ser vice levels across LoBs, locations and/or SANs –

Page 176: Control Center Knowledge Share

but in no way should that be considered as a hard and fast rule (it is more complex than that and the title is only trying to suggest an additional flavor concerned wi th the simplicity of the storage environment we wish you to consider the pros and cons of with this design). Before you turn to the next page in the notes, please try to think of reasons why this design approach might be good and reasons why it might be bad, depending upon individual Customer

circumstances, of course. When you have done that, move on and review the sample set of pros and cons we provide you with on the next slide.

This last design is an outgrowth of the previous array-based Storage Pool design. It takes the definition of a Storage Pool to a lower level i.e. based on different service level characteristics that can be provided from the different storage arrays and different storage array types. Six fictitious examples are given for illustration of lower level sub-Pools within an array Storage Pool but they are likely only to represent a subset of any real Customer environment that used this type of Storage Pool design.

Page 177: Control Center Knowledge Share

The intention of this design is to place into each Storage Pool only those storage array devices that have the same stated technical characteristics e.g. for a Symmetrix: mirrored, high performance STD devices or unprotected high performance BCVs or striped meta STDs or striped BCV metas or unprotected R1s. This means only storage devices with the appropriate technical characteristics have to be placed in the appropriate service-level-based Storage Pool.

Clearly this approach to Storage Pool design is most likely to appeal, at least initially, to a Customer that wants explicitly to provision storage devices with known and different service level characteristics (performance, availability, security, etc.). Such Customers are likely already to have a strong awareness of and focus on the different service levels required for the data their LoB applications need to access and to be oriented to service management to meet agreed business needs for LoB application service levels. The suggestion in the title of this slide is that this scenario might be most appealing or relevant for environments that have a focus on provisioning storage that has different service levels whether from one location or one array or not – but in no way should that be considered as a

hard and fast rule (it is more complex than that and the title is only trying to suggest an additional flavor concerned with the simplicity of the storage environment we wish you to consider the pros and cons of with this design. Before you turn to the next page in the notes, please try to think of reasons why this design approach might be good and reasons why it might be bad, depending upon individual Customer circumstances, of course. When you have done that, move on and review the sample set of pros and cons we provide you with on the next slide.

Symmetrix Management Console (SMC)

* Independent, light-weight, web-based application – Simple and easy to use browser interface – Hosted on small Windows/Linux server – Enables remote access and management from nearly any client * Enables access, configuration, and basic operation of Symmetrix arrays

Page 178: Control Center Knowledge Share

– Supports all configuration capabilities of Solutions Enabler/CLI * Supports multiple generations of Symmetrix – Enginuity version 5x68 and newer * Provides day-one support of new Symmetrix features when released * Adding full-fea ture ControlCenter does not require management data to be migrated.

SMC Functionality * Access Management – Manage users, permissions/roles – Symmetrix Access Controls * Configuration Management – Create devices, map and mask devices, create device groups, set Symmetrix attributes * Replication Management – TF/Clone, TF/Mirror, TF/Snap, SRDF/S, SRDF/A, SRDF/DM, Open Replicator, Optimizer * Alerts and Monitoring – Monitor Device status, device attributes, operations status

– Monitor array alerts

Page 179: Control Center Knowledge Share
Page 180: Control Center Knowledge Share
Page 181: Control Center Knowledge Share
Page 182: Control Center Knowledge Share
Page 183: Control Center Knowledge Share

SMC Local User Accounts * The installation dialog includes the specification of the SMC Super User account – Default user "smc" with password "smc" * Password must be changed to avoid unauthorized access ! * Recommended to create other Administrators in place of Super User

– Can specify different Super User name in installation dialog * The speci fied user must have a valid login to the SMC Server host * Authentication done by the SMC Server host OS * Menu: Administration > Local User Accounts – List existing usernames in a table – Add new user information (name and password) – Edit user information (enter a new password) – Delete selected user account(s)

Page 184: Control Center Knowledge Share

Permiss ions and Roles * Menu: Administration > Permissions – List Symmetrix ID, Username, and Role entries – Add new permission entry – Edit permission entry (change role) – Delete permission entry

* Five Roles – Administrator, StorageAdmin and SecurityAdmin combined – StorageAdmin, full Symmetrix control – Monitor, view Symmetrix only, no manipulation of array – SecurityAdmin, add users and set permissions, no Symmetrix access – None, no access other than login (the default) * Super User – Created during installation – Only user with permission to set Symmetrix Preferences and LDAP-SSL – smc/smc username/password is a potential security hole if unchanged

Page 185: Control Center Knowledge Share
Page 186: Control Center Knowledge Share

EM

C C

ontr

ol C

ente

r K

now

ledg

e S

hare

- J

uly

17th

200

9, G

asto

n B

enet

rix @

EM

C C

orpo

ratio

n, A

rgen

tina.

Page 187: Control Center Knowledge Share

Let’s explore the creation of FBA Meta Devices. Right click on a S ymmetrix and choose FBA Meta Device Configuration, then choose Form Meta. In the example shown, the reservation filter is used to only show those devices reserved by the current SMC user. Four devices are listed in the unmapped devices list. Add all moves the devices to the Meta member column. The meta head can then be specified. As with al l configuration tasks, click on the Add to Config Session list

button. The actual commit of this action is done from ConfigSession view. When creating a meta, you can optionally use the “Auto Select” feature. The Auto select feature allows you to speci fy the number of metas, number of meta members per meta, and the meta heads only. The Symmetrix microcode automatically chooses the meta members from the available pool of unmapped devices.

Page 188: Control Center Knowledge Share
Page 189: Control Center Knowledge Share

Device Groups * SRDF and TimeFinder operations in SMC require Device Groups * All device groups in the default symapi_db.bin or GNS (if active) are available in SMC * Device Groups can be created, deleted, renamed and devices can be added and removed as needed

* SRDF and TimeFinder operations are invoked by selecting a device group and using the Replication option * Device Masking operation can also be invoked by selecting a device group * Devices can belong to multiple Device Groups The Devices types supported in SMC are shown on the slide. The STD Devices can be Regular (non SRDF Devices), SRDF R1s, or SRDF R2. Devices can be added as Clone Target devices on the local or the remote array, and remote Virtual devices can be added. The device group dialog displays only valid devices when choosing a device type. For instance, when adding remote Clone Target devices, only eligible devices configured on the remote array display in the dialog.

Page 190: Control Center Knowledge Share

Device Types in Dev ice Groups

Page 191: Control Center Knowledge Share

SMC Device Group creation is a multi-step process, similar to creating SYMCLI device groups using symdg, symld, and symbcv. The wizard is launched by right clicking the Device Group Folder and choosing the Device Group Management >Create Device Group option. In this example, we create a Device Group of Type RDF1 and associate local VDEVSs, local BCVs and remote clone targets.

The first step is to choose a name for the Device Group (DemoDG in this example), then the Device Group Type (RDF1 in this example because we want to add SRDF R1 STD devices). Click on STD in the Device Type Column and add the required R1 devices from the Available box to the Group Members box. The bottom of the wizard gives a summary of the selections that have been made. In the next sl ide, the local BCVs, VDEVs and the remote Clone target selections are made.

Page 192: Control Center Knowledge Share

SRDF Mode operations are shown in this slide. Right Click on an RDF device group and choose Replication >SRDF Settings . The dialog box shows the current mode and pair states. The mode can be changed by using the Set Mode pull down. The various options are shown on the slide. In this example the mode is being changed from Synchronous to Asynchronous.

SRDF Control operations are per formed by right clicking the RDF Device Group and choosing Replication > SRDF Control. A failover operation is shown. The same dialog box can be used for the other actions l ike Failback, Split, Establish, etc. The complete list of actions is displayed on the slide. The SRDF Control window has 2 pages. On page 1 the action (failover for example) and the device pairs are chosen. Choose options that relate to a specific action and to execute the action via the Finish button.

Page 193: Control Center Knowledge Share

SMC Device Group creation is a multi-step process, similar to creating SYMCLI device groups using symdg, symld, and symbcv. The wizard is launched by right clicking the Device Group Folder and choosing the Device Group Management >Create Device Group option. In this example, we create a Device Group of Type RDF1 and associate local VDEVSs, local BCVs and remote clone targets.

The first step is to choose a name for the Device Group (DemoDG in this example), then the Device Group Type (RDF1 in this example because we want to add SRDF R1 STD devices). Click on STD in the Device Type Column and add the required R1 devices from the Available box to the Group Members box. The bottom of the wizard gives a summary of the selections that have been made. In the next slide, the local BCVs, VDEVs and the remote Clone target selections are made.

Page 194: Control Center Knowledge Share

TimeFinder/Clone operations are performed by right clicking a device group and choosing Replication >TimeFinder/Clone. If clone pairs have not yet been created, the dialog box does not show any device pairings. The “Set exact pairs” option is not available for Clone operations. Device pairs have to be defined by using the Edit Pairs button, then the device pairs can be defined in the Add/Remove Clone pairs dialog. Once the device pairs are defined, the rest of the operations are similar to TimeFinder/Snap.

Page 195: Control Center Knowledge Share
Page 196: Control Center Knowledge Share

Click on “Find” tab and in the search box, type the string (LUN in this case) you are looking for.

Page 197: Control Center Knowledge Share

Once found the “LUN” (it mostly will be a Hyper, as we are talking in Symmetrix language), we will be able to view its contents. In this particular case, we are loking at a Meta, with 3 Hypers: One is the Meta head, the other two are meta devices. Note the M, as Meta head is marked with (M) and accompanied with the number of meta devices in it.

Also, have in mind that Hypers are normally of two sizes (per standardization) 16.96 and 56.9966 Gygabytes. On the right hand, we can see the LUN properties. Listed is the Meta head, ID 087, 16.96GB, allocated, and within its total Meta device size, 50.87 (3 LUNS in total).

Here the example is repeated, but with more LUNS or Hypers. Here we can see Meta head 5F4, with its 7 devices attached to it, making it a (M)7 of 135.64Gb total.

Page 198: Control Center Knowledge Share

To see the diference, we have listed a LUN here. You can appreciate that LUN B4A, has 5.62GB Size, and summarizes with the other LUNS, 11.24GB.

Page 199: Control Center Knowledge Share

LUNs are not the common standard for Symmetrix, as they do not use the disk completely as Hypers. Hypers use the cylinders of the disks, using even the las test cylinder of the disks, avoiding to leave MBs in disuse as is usual in LUNs.

That is why the 16.96 and 59.9966 sizes are so intrincanted.

You may want to have a spreadsheet were you have the free / unmapped Hypers, fi ltered by

size, device, etc. Documentation is always a must, as it will guide us for future configurations, as for systems recovery. Select Hyper “729”, right click, go to configure and SDR Device Mapping. SDR Stands for “Symmetrix Data”. If you need to add more than one disk, select the disks with “ctrl” key and follow the same steps.

In this case, ports 8C:1 & 9C:0, are the last octets from BACKUPSRV HBA ports.

Page 200: Control Center Knowledge Share

Select the device on the left and the HBA ports on the right. Hold control to select more than one.

Alert messages will be displayed for each of the HBAs to which we are adding the device (hyper). To check availability of addresses into this ports, run: symcfg list -sid 1098 -fa 08c -p 1 -addresses -available symcfg list -sid 1098 -fa 09c -p 0 -addresses -available Here is a preview of how the devices (Hyper) wil l be presented (allocated) to the selected storage HBA port. You can change the Address presented to the host, for better administration. (some systems do

not like hexa values.) Select the addresses with * from the list gathered before, from OS. Then, System will ask if you are sure to execute this.

Page 201: Control Center Knowledge Share
Page 202: Control Center Knowledge Share
Page 203: Control Center Knowledge Share

To make the storage visible to the host, you must complete the LUN Masking steps. To do so, go

to “Hosts” section in left pannel, right click on the desired host (host to which allocate the storage) and select “Masking > Modify Masking Configurations”. This will take you to the following screen. This can be also done from CLI, with the “symmaskdb” command. In this screen we will provide all the data needed to complete the masking.

• First select the ports (HBA ports) of the server to which attach the devices.

• Then, Select both HBA’s WWPN on upper left box, choose storae array, and select type

of device as desired. Finally, select the storage port to be assigned to.

• In bottom list, check the devices you will be adding, in pairs (as they are seen once per HBA port.)

• The is the completed list of tasks. Once we have this, click on “Grant” to execute the

tasks. At the end, Note the differences between the marked devices: This is telling us that the disks were previously assigned to another host/s, but they maybe still allocated or not. Please it is very important for you to validate that you are not assigning a device for second time to the same or another host.

Page 204: Control Center Knowledge Share

The thin line represents one previous assignment, the thick line represents more than one previous assignment. The disks you normally will be assigning/allocating, should not have this “underscore” mark on the devices list.

This list is an example, as you can also see that there are some devices with granted permissions to a host. At last, Verify in the detail that all the operations have been completed as desired. Finally, Verify on host with ioscan –fnC disk and insf –C disk, that the Hyper (or LUN) has been correctly assigned and visible to the Operating System. If this does not work, use ioscan as it, and the insf –C.

For basic troubleshooting, use: symmaskdb -sid 1098 list assignment -dev 10E8 symdev -sid 1098 show 10E8 | more To show how the device is mapped to the host and were could be a communication loss.

Page 205: Control Center Knowledge Share
Page 206: Control Center Knowledge Share

Thanks for reading.

~ THE END ~

EMC Control Center Knowledge Share - July 17th 2009, Gaston Benetrix @ EMC Corporation, Argentina.