P9000 Remote Web Console User Guide

HP
P9000 Remote Web Console User Guide
Abstract
This guide explains how to set up and use the HP Remote Web Console to manage HP P9000 disk arrays over a LAN connection.
Topics include how to obtain storage system configuration and status information, send user-requested commands to the storage
system, install and launch P9000 program products, and troubleshoot storage system issues. The intended audience is a storage
system administrator or authorized service provider with independent knowledge of HP P9000 disk arrays.
HP Part Number: AV400-96402
Published: September 2011
Edition: Fifth
© Copyright 2010, 2011 Hewlett-Packard Development Company, L.P.
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial
Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under
vendor's standard commercial license.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express
warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall
not be liable for technical or editorial errors or omissions contained herein.
Acknowledgements
Microsoft®, Windows®, Windows® XP, Windows NT, and Windows Vista® are U.S. registered trademarks of Microsoft Corporation.
Adobe® is a trademark of Adobe Systems Incorporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
Export Requirements
You may not export or re-export this document or any copy or adaptation in violation of export laws or regulations.
Without limiting the foregoing, this document may not be exported, re-exported, transferred or downloaded to or within (or to a national resident
of) countries under U.S. economic embargo, including Cuba, Iran, North Korea, Sudan, and Syria. This list is subject to change.
This document may not be exported, re-exported, transferred, or downloaded to persons or entities listed on the U.S. Department of Commerce
Denied Persons List, Entity List of proliferation concern or on any U.S. Treasury Department Designated Nationals exclusion list, or to parties directly
or indirectly involved in the development or production of nuclear, chemical, biological weapons, or in missile technology programs as specified
in the U.S. Export Administration Regulations (15 CFR 744).
Revision History
Edition
Date
Description
First
October 2010
Applies to microcode version 70-01-01-00/00 or later.
Second
November 2010
Applies to microcode version 70-01-24-00/00 or later.
Third
January 2011
Applies to microcode version 70-01-62-00/00 or later.
Fourth
May 2011
Applies to microcode version 70-02-01-00/00 or later.
Fifth
September 2011
Applies to microcode version 70-02-5x-00/00 or later.
Contents
1 Overview..................................................................................................9
Overview................................................................................................................................9
Manage the storage system...................................................................................................9
GUI feature highlights...........................................................................................................9
Emphasis on performance..............................................................................................10
Wizards and task management......................................................................................10
Reporting.....................................................................................................................10
Help............................................................................................................................10
Remote Web Console CLI........................................................................................................11
Remote Web Console components............................................................................................11
2 Setting up Remote Web Console................................................................12
Setup workflow......................................................................................................................12
Cable connection requirements.................................................................................................12
Enabling IPv6 communication .................................................................................................12
Configuring IPv6 communication in Windows 7.....................................................................12
Configuring IPv6 communication in Solaris 10.......................................................................13
Setting up SSL encryption.........................................................................................................13
Creating a keypair.............................................................................................................13
Creating a private key (.key file)......................................................................................13
Creating a public key (.csr file) ......................................................................................14
Acquiring a self-signed certificate ...................................................................................15
Creating a signed and trusted certificate...............................................................................15
Uploading the signed certificate to the SVP......................................................................15
Setting the web browser to accept self-signed certificates....................................................16
Blocking HTTP communication to the storage system...............................................................19
Releasing HTTP communication blocking ..............................................................................19
Setting up the client machine ...................................................................................................20
Requirements for client machines..........................................................................................20
Requirements for Windows-based computers.....................................................................20
Requirements for UNIX/Linux-based computers..................................................................21
Configuring a Windows 2003/2008 Server machine............................................................22
Setting up TCP/IP for a firewall............................................................................................22
Configuring the web browser...............................................................................................22
Downloading Adobe Flash..................................................................................................22
Installing and configuring JRE..............................................................................................22
Configuring JRE............................................................................................................23
Preparing for using the Report Configuration Tool.......................................................................23
Requirements for using the Report Configuration Tool..............................................................23
Installing the Report Configuration Tool on a computer............................................................23
3 Getting started using Remote Web Console.................................................25
Logging in to Remote Web Console..........................................................................................25
Initial super-user login.........................................................................................................25
Normal login....................................................................................................................25
Changing your password....................................................................................................26
Adding your SVP to the trusted sites zone—for Windows server...............................................26
Remote Web Console restrictions..............................................................................................27
General restrictions............................................................................................................27
Web browser restrictions while using Remote Web Console.....................................................27
Unsupported actions in Remote Web Console........................................................................28
Applying changes made in Remote Web Console..................................................................28
Contents
3
Refreshing data after a Auto LUN or Quick Restore operation..................................................28
Refreshing data after operations performed with another application........................................28
Using applications other than Remote Web Console...............................................................29
Using Remote Web Console on UNIX...................................................................................29
Unsupported actions in UNIX version of Remote Web Console............................................29
Using Remote Web Console.....................................................................................................29
4 Setting up and managing user accounts......................................................30
Workflow for user management................................................................................................30
Using authentication server and authorization server...................................................................30
Enabling authorization server cooperation.............................................................................31
User groups...........................................................................................................................32
Roles................................................................................................................................34
Built-in groups...................................................................................................................35
Creating a new user group.................................................................................................37
Managing user accounts.........................................................................................................37
Creating a user account......................................................................................................37
Changing a user’s password...............................................................................................39
Changing a user’s permissions............................................................................................39
Disabling a user account....................................................................................................40
Deleting a user account......................................................................................................40
Changing the user group configuration......................................................................................40
Changing a user group name..............................................................................................40
Changing a user group's permissions...................................................................................41
Changing the resource groups assigned to a user group.........................................................41
Deleting a user group.........................................................................................................42
Managing the certificates of HP Systems Insight Manager............................................................42
Required role for single sign-on............................................................................................42
Importing a tool definition file into HP Systems Insight Manager...............................................43
Registering the certificates for single sign-on..........................................................................43
Deleting the certificates for single sign-on..............................................................................44
Removing a tool definition file from HP Systems Insight Manager..............................................44
Using SMI-S function with Remote Web Console user account.......................................................45
Account lock policy.................................................................................................................45
Session timeout......................................................................................................................45
5 Configuring the Remote Web Console environment.......................................46
Configuration overview............................................................................................................46
Creating a login message........................................................................................................46
Setting e-mail notification for SIMs or SNMP traps......................................................................47
Configuring e-mail notification.............................................................................................47
Sending a test e-mail..........................................................................................................48
Setting time periods................................................................................................................49
Saving a copy of Remote Web Console configuration files...........................................................50
Restoring a Remote Web Console configuration from backup.......................................................51
Setting syslog notification for SIMs............................................................................................52
Configuring syslog notification.............................................................................................52
Sending a test syslog..........................................................................................................53
6 License keys.............................................................................................54
Overview..............................................................................................................................54
License key types....................................................................................................................54
Using the permanent key.........................................................................................................55
Using the term key..................................................................................................................55
Using the temporary key..........................................................................................................56
Using the emergency key.........................................................................................................56
4
Contents
Using the meter key................................................................................................................56
Calculating the effective term of the meter key............................................................................56
Grace Period status with meter key............................................................................................58
Estimating licensed capacity....................................................................................................58
Program products and licensed capacity...............................................................................58
Calculating licensed capacity for a normal volume.................................................................60
Calculating licensed capacity for an external volume..............................................................60
Calculating pool capacity ..................................................................................................60
Installing and uninstalling program products...............................................................................61
Installing program products using a license key code..............................................................61
Installing program products using a license key file.................................................................61
Enabling or disabling a license............................................................................................61
Uninstalling program products.............................................................................................62
Insufficient license capacity......................................................................................................62
Exceeded capacity after LDEV, a pair, or pool volume is deleted..............................................62
License key expiration.............................................................................................................63
7 Viewing and managing the storage system..................................................64
Overview..............................................................................................................................64
Viewing storage system information...........................................................................................64
Viewing basic information...................................................................................................64
Viewing specific information................................................................................................64
Viewing other information...................................................................................................65
Viewing port locations........................................................................................................65
Status icons for certain resources..........................................................................................65
Viewing Remote Web Console data using an external application ...........................................66
Using reports to verify system changes.......................................................................................66
Creating a configuration report............................................................................................66
Viewing a Remote Web Console report................................................................................67
Deleting a configuration report............................................................................................67
Creating a configuration report using the Report Configuration Tool..............................................67
Preparing a script file.........................................................................................................68
Executing a script file regularly............................................................................................71
Execution example and explanation of script files...................................................................71
Error in executing Report Configuration Tool..........................................................................72
Managing tasks.....................................................................................................................74
Tasks window....................................................................................................................74
Managing your tasks..........................................................................................................74
Stalled tasks......................................................................................................................75
Setting the status refresh interval of the Tasks window.............................................................75
8 Troubleshooting........................................................................................76
General troubleshooting..........................................................................................................76
Checking alerts......................................................................................................................76
Logon errors...........................................................................................................................77
Java application errors............................................................................................................77
No-response errors.................................................................................................................79
Incorrect display errors............................................................................................................81
UNIX operation errors.............................................................................................................83
Other errors...........................................................................................................................84
Clearing the Java and web browser caches...............................................................................84
Firefox web browser problems on UNIX.....................................................................................85
Downloading trace files using the FD Dump tool.........................................................................85
Saving Java log and trace files.................................................................................................86
Contents
5
9 Support and other resources......................................................................87
Contacting HP........................................................................................................................87
Subscription service............................................................................................................87
Documentation feedback....................................................................................................87
Related information.................................................................................................................87
HP websites......................................................................................................................88
Conventions for storage capacity values....................................................................................88
Typographic conventions.........................................................................................................88
A Storage configuration reports.....................................................................90
Reports in table view ..............................................................................................................90
Disk Adapters report..........................................................................................................90
Host Groups report............................................................................................................91
Hosts report......................................................................................................................92
Logical Device Expansions report.........................................................................................92
Logical Devices report........................................................................................................93
LUNs report......................................................................................................................94
MP Blades report...............................................................................................................95
MP Blade Details report......................................................................................................95
Parity Groups report...........................................................................................................95
Ports report.......................................................................................................................96
Spare Drives report............................................................................................................97
Storage System Summary report..........................................................................................97
Reports in graphical view .......................................................................................................98
Cache Memories report......................................................................................................99
Channel Adapters report....................................................................................................99
Physical View report.........................................................................................................100
B Report Configuration Tool Command Reference (raidinf commands)..............102
raidinf
raidinf
raidinf
raidinf
raidinf
raidinf
command list and command description conventions.......................................................102
commnd....................................................................................................................102
add report.................................................................................................................104
delete report..............................................................................................................105
download report........................................................................................................105
get reportinfo.............................................................................................................106
C Remote Web Console GUI reference (main window)...................................108
Remote Web Console main window........................................................................................108
Column Settings window...................................................................................................110
Using the main window and wizard...................................................................................111
Main window controls......................................................................................................112
Buttons......................................................................................................................112
Table.........................................................................................................................112
Filtering.....................................................................................................................113
Tooltip.......................................................................................................................113
Storage Systems window.......................................................................................................114
Edit Storage System window..................................................................................................118
Confirm window (Edit Storage System).....................................................................................119
Edit Information Display Settings window.................................................................................119
Resource Lock Properties window............................................................................................120
Tasks window......................................................................................................................121
Task Properties window.........................................................................................................123
Suspend Tasks window..........................................................................................................123
Resume Tasks window...........................................................................................................124
Delete Tasks window.............................................................................................................125
Disable Auto Delete window..................................................................................................125
6
Contents
Enable Auto Delete window...................................................................................................126
Reports window....................................................................................................................127
Create Configuration Report window.......................................................................................128
Delete Reports window..........................................................................................................128
User Groups window............................................................................................................129
Window when User Group is selected.....................................................................................131
Create User wizard...............................................................................................................133
Create User window.........................................................................................................133
Confirm window (Create User)...........................................................................................134
Change Password wizard......................................................................................................135
Change Password window................................................................................................135
Confirm window (Change Password)..................................................................................136
Edit User wizard...................................................................................................................136
Edit User window.............................................................................................................136
Confirm window (Edit User)...............................................................................................137
Add Users wizard.................................................................................................................138
Add Users window...........................................................................................................138
Confirm window (Add Users).............................................................................................140
Remove Users window...........................................................................................................141
Delete Users window.............................................................................................................142
Create User Group wizard.....................................................................................................142
Create User Group window...............................................................................................142
Confirm window (Create User Group).................................................................................143
Edit User Group wizard.........................................................................................................145
Edit User Group window...................................................................................................145
Confirm window (Edit User Group).....................................................................................145
Delete User Groups window...................................................................................................146
Assign Resource Groups wizard..............................................................................................146
Assign Resource Groups window.......................................................................................146
Confirm window (Assign Resource Groups).........................................................................149
Assign Roles wizard..............................................................................................................150
Assign Roles window........................................................................................................150
Confirm window (Assign Roles)..........................................................................................152
Alerts window......................................................................................................................153
Alert Properties window.........................................................................................................154
Edit SIM Syslog Server Settings wizard....................................................................................155
Edit SIM Syslog Server Settings window..............................................................................155
Confirm window (Edit SIM Syslog Server Settings)................................................................157
D Remote Web Console GUI reference (secondary windows)..........................158
Remote Web Console secondary window................................................................................158
Opening Remote Web Console secondary windows.............................................................160
Remote Web Console secondary windows and Modify mode................................................160
About window.....................................................................................................................161
License Key window..............................................................................................................162
License Key list.................................................................................................................163
Status and icons..............................................................................................................164
Alerts window......................................................................................................................165
Login Message window.........................................................................................................167
E-mail Information window.....................................................................................................167
Report Display dialog boxes..................................................................................................169
Common elements...........................................................................................................169
Port dialog box................................................................................................................171
LUN dialog box...............................................................................................................172
LDEV dialog box..............................................................................................................173
Contents
7
LDEV Status dialog box.....................................................................................................175
Glossary..................................................................................................177
Index.......................................................................................................180
8
Contents
1 Overview
This document helps you set up Remote Web Console for the P9500 storage system, set up end-user
machines and web browsers, and establish user accounts and permissions. It explains GUI features
and provides basic navigation information.
Unless otherwise specified, the term P9000 in this guide refers to the following disk array:
•
P9500 Disk Array
The GUI illustrations in this guide were created using a Windows computer with the Internet Explorer
browser. Actual windows may differ depending on the operating system and browser used. GUI
contents also vary with licensed program products, storage system models, and firmware versions.
Complete information for performing specific tasks in Remote Web Console is contained in the
P9500 program product user guides.
Overview
HP Remote Web Console provides a unified GUI for managing and optimizing the P9500 storage
system. You access the system in Remote Web Console from any PC with a web browser. Besides
the GUI, Remote Web Console provides a CLI to allow scheduling of storage system events.
Remote Web Console can be set up in either Microsoft Windows or UNIX environments. This
section describes essential features.
Manage the storage system
With Remote Web Console, you can perform the following functions:
•
Provision the storage system.
•
Set up data replication for restoring lost data.
•
View and manage the configuration of the storage system.
•
Monitor and tune performance.
•
Acquire logs for actions and commands performed on the storage system.
GUI feature highlights
Remote Web Console allows you to set up and manage more than one storage system with a
use-case in mind. Whether creating LDEVs or pools, adding host groups or LUN paths, enabling
performance monitoring, or creating pairs for replication—these and all storage system tasks are
made simpler because the GUI seamlessly crosses the underlying P9500 program product
functionality. The use of wizards for major use-case tasks makes it possible to complete the set of
tasks in one procedural flow, with a minimum of steps and a minimum of clicks.
A sample GUI main window follows.
Overview
9
Figure 1 Remote Web Console GUI
Emphasis on performance
Operations you perform are executed in the background. This means you can start the next operation
without waiting for the previous one to complete.
Wizards and task management
Wizards are provided for each main task. The wizard guides you through all the sub-tasks that
you would ordinarily perform one-at-a-time. For example, the Create V-VOLs wizard guides you
through a series of screens in which you create the LDEVs for the V-VOLs, then add LUN
paths—which includes selecting LDEVs, selecting host groups, and mapping LUNs.
Remote Web Console also provides a window checking on the tasks you have committed to the
system. The Task window provides detailed information about each task and shows the priority
and status of each task you are tracking.
Reporting
Remote Web Console provides views of various aspects of your storage system. In addition to
these views, you can generate a report for specific areas of the system. Reports can be generated
for a summary of the system data, ports, Channel Adapters, and disk adapters. A total of 20
configuration reports can be generated. Reports are formatted in either CSV or HTML. You see the
reports to find out whether storage system configurations have changed properly.
The Report Configuration Tool enables you to create a configuration report by using a command
prompt. You can automate creation or deletion of configuration reports. To do this, first you should
write script files (.bat files) to create and delete reports, and you should use Windows Task
Scheduler to execute the script files at regular intervals.
Help
Remote Web Console online help provides procedural information for setting up and managing
the storage system. Links to the major storage system tasks, search functions, and glossary are
included.
10
Overview
Remote Web Console CLI
The Remote Web Console CLI allows you to perform commands on the storage system using the
command prompt. To use the Remote Web Console CLI, you need to install certain files on the
Remote Web Console computer.
The Remote Web Console CLI can be used to perform only specific operations of specific program
products. For details on the Remote Web Console CLI, see the HP P9000 Spreadsheet Guide.
Remote Web Console components
The following figure shows an example of the Remote Web Console computer and SVP
configuration.
Figure 2 Remote Web Console and SVP configuration
Remote Web Console CLI
11
2 Setting up Remote Web Console
This chapter provides Remote Web Console requirements and setup procedures.
Setup workflow
The following workflow describes the setup tasks for Remote Web Console:
•
The HP representative attaches the SVP in your storage system to the LAN. Remote Web
Console is already set up on the SVP and is therefore ready for access by client machines.
•
Ensure that the correct LAN cabling and connections are in place. See “Cable connection
requirements” (page 12).
•
Set up network connections. See “Enabling IPv6 communication ” (page 12), as needed. Also,
you can set up additional communications security for remote operations with SSL. See “Setting
up SSL encryption” (page 13).
•
Set up the Remote Web Console computer(s). See “Setting up the client machine ” (page 20).
•
Set up user accounts. See “Setting up and managing user accounts” (page 30).
•
Configure Remote Web Console options. See “Configuring the Remote Web Console
environment” (page 46).
•
Install license keys for program products. See “License keys” (page 54).
Requirements for the various elements are included in the following sections.
Cable connection requirements
Ensure that the following LAN cable and connection requirements are met:
•
Thinnet coaxial cable. For twisted-pair connections, contact HP Technical Support for assistance.
•
The total length of the LAN cables must not be greater than 185 meters (607 feet).
Enabling IPv6 communication
If Internet Protocol Version 6 (IPv6) addresses are used within the storage system LAN, you may
need to enable IPv6 communication on the SVP. For Windows 7 and Solaris 10, it is possible to
enable IPv4 (standard) communication, IPv6 communication, or both. You determine which protocol
to use based on the IP addresses that are used within the LAN. The same communication options
should be selected for both the Remote Web Console computer and the SVP.
If you use IPv6 to display the Remote Web Console main window when both IPv4 and IPv6 are
available, IPv6 addresses are displayed in the Remote Web Console secondary window but
actually IPv4 communication is used.
For information on how to configure IP communication from an SVP, contact HP Technical Support.
The following sections give brief instructions on configuring IPv6 communication in Windows 7
and Solaris 10 environments.
Configuring IPv6 communication in Windows 7
Procedure 1 To configure a Remote Web Console computer to use IPv6 for communication between
an SVP:
1.
2.
Select Control Panel > Network and Sharing Center > Manage network connections.
Select and right-click the network where the SVP resides, and then click Properties in the pop-up
menu.
Click Continue if the User Account Control dialog box appears. Otherwise, the Networking
dialog box appears.
12
Setting up Remote Web Console
3.
Select the Internet Protocol Version 6 (TCP/IPv6) check box.
Optionally, clear the Internet Protocol Version 4 (TCP/IPv4) check box.
4.
Click OK to close the dialog box.
Configuring IPv6 communication in Solaris 10
Procedure 2 To configure a Remote Web Console computer to use IPv6 for communication between
an SVP:
1.
2.
Start the console.
Execute the following command:
ipconfig network-interface-name inet down
Setting up SSL encryption
In order to improve security of remote operations from a Remote Web Console SVP to a storage
system, you can set up Secure Sockets Layer (SSL) encrypted communication. By setting SSL
encryption, the Remote Web Console user ID and password are encrypted.
This document uses the following SSL terms:
•
Secure Sockets Layer: SSL is a protocol first developed by Netscape® to securely transmit
data over the Internet. Two SSL-enabled peers use their private and public keys to establish a
secure communication session, with each peer encrypting transmitted data with a randomly
generated and agreed-upon symmetric key.
•
Keypair: A keypair is two mathematically-related cryptographic keys consisting of a private
key and its associated public key.
•
Server Certificate: A Server Certificate (also called a Digital Certificate) forms an association
between an identity (in this case the SVP server) and a specific keypair. A Server Certificate
is used to identify the SVP server to a client so that the server and client can communicate
using SSL. Server Certificates come in two basic types:
◦
Self-signed: You generate your owned self-signed certificate and the subject of the
certificate is the same as the issuer of the certificate. If the Remote Web Console computers
and the SVP are on an internal LAN behind a firewall, you may find that this option
provides sufficient security.
◦
Signed and Trusted: For a Signed and Trusted Server Certificate, a Certificate Signing
Request (CSR) is sent to and certified by a trusted Certificate Authority (CA) such as
VeriSign® (http://www.verisign.com/).
If you enable SSL, you must make sure that the key pair and associated server certificate do not
expire. If either the key pair or the server certificate expires, users will be unable to connect to the
SVP. Server certificates require the use of a host name instead of an IP address.
Creating a keypair
To enable SSL, you must create a keypair consisting of a public and a private key. The instructions
use Windows XP as an example.
If you are using Solaris, download software for creating a keypair such as OpenSSL (http://
www.openssl.org/), and follow the manufacturer’s instructions.
The program (openssl.exe) for creating private and public keys is available on the CD-ROM for
SSL communications provided with this product.
Creating a private key (.key file)
A private key is required to create an SSL keypair. The following procedure is for the Windows
XP operating system.
Setting up SSL encryption
13
Prerequisite
You will need the CD-ROM for SSL, which is provided by HP. It includes openssl.exe,
SSLeay32.dll, and libeay32.dll. Copy the entire contents of the openssl folder to your
drive of choice
Procedure 3 To create a private key (.key file) in a Windows XP environment:
1.
2.
3.
Release the read-only attribute from the openssl folder.
Open a command prompt.
Navigate to the directory where you copied the folder, and execute the following command:
openssl genrsa -out server.key 1024
This will create a file called server.key in the openssl folder. This file becomes the private
key.
Creating a public key (.csr file)
A public key is required to create an SSL keypair. The following procedure is for the Windows XP
operating system.
Prerequisite
You will need the CD-ROM for SSL, which is provided by HP. It includes openssl.exe,
SSLeay32.dll, and libeay32.dll. Copy the entire contents of the openssl folder to your
drive of choice.
Procedure 4 To create a private key (.key file) in a Windows XP environment:
1.
2.
Open a command prompt.
Navigate to the directory where you copied the folder, and execute the following command:
openssl req -sha256 -new -key server.key -config openssl.cnf -out server.csr
NOTE: This command uses SHA-256 as a hush algorithm. MD5 or SHA-1 is not recommended
for a hush algorithm due to its low security level.
3.
Enter the following information in the prompt:
•
Country Name (two-letter code)
•
State or Province Name
•
Locality Name
•
Organization Name
•
Organization Unit Name
•
Common Name
If you are going to create a self-signed certificate, enter the IP address of the web server
(SVP). If you are going to obtain a signed and trusted certificate, the server name must
be the same as the host name of the storage device.
•
Email Address
•
Challenge password (optional)
•
Company name (optional)
An example of a command prompt when you create a public key is shown in the following figure.
14
Setting up Remote Web Console
Figure 3 Creating a public key
Acquiring a self-signed certificate
To acquire a self-signed certificate, open the command prompt and execute the following command
C:\openssl> openssl x509 -req -sha256 -days 10000 -in server.csr -signkey server.key -out server.crt
This command uses SHA-256 as a hush algorithm. MD5 or SHA-1 is not recommended for a hush
algorithm due to its low security level.
This creates a server.crt file in the openssl folder, which is valid for 10,000 days. This is
the signed private key, which is also referred to as a self-signed certificate.
Creating a signed and trusted certificate
If you want to create a signed and trusted certificate, you need to create a certificate signing
request (CSR), send that file to a Certificate Authority (CA), and request that the CA issue a signed
and trusted certificate. Each certificate authority has its own procedures and requirements, and
there is generally a cost for doing so. The signed and trusted certificate is the signed public key.
Uploading the signed certificate to the SVP
To use SSL-encrypted communication, you must update and upload the private key and the signed
Server Certificate (public key) to the web server (SVP).
Procedure 5 To update and upload both the private key and the signed Server Certificate (public
key) to the web server (SVP):
1.
2.
Log off from all Remote Web Console web client sessions on the SVP.
In the web browser of your Remote Web Console computer, specify the following URL:
http://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi
3.
4.
5.
6.
7.
In the Tool Panel dialog box, click Update Certificate Files. If the SSL encrypted communications
is set up and the Security Alert dialog box appears, click OK. The Security Alert dialog box
for the certificate may also appear. In this case, click View Certificate, confirm the certificate
is correct, and then click Yes.
Enter the user ID and password for the administrator, then click Login. The upload dialog box
for Update Certificate Files appears.
Enter both the public key certificate file name in the Certificate file (.crt file) box and the private
Key file (.key file) box. You can enter the file names directly or by clicking Browse.
Click Upload on the upload dialog box of Update Certificate Files. The execution of Update
Certificate Files confirmation dialog box appears.
Click OK to begin the certificate update. Once complete, the web server restarts and a dialog
box appears.
It may take 30 or 60 minutes for the web server to restart. In this case, the Update Certificate
Files Completion dialog box does not appear and an internal server error occurs, but the
setting is actually completed.
Setting up SSL encryption
15
8.
Click OK. If the Security Alert dialog box for the certificate appears, click View Certificate to
confirm that the certificate is correct, and click Yes.
If an error occurs during the certificate update, an error message will appear. Solve the problem,
and restart from the logging in to Update Certificate Files.
Setting the web browser to accept self-signed certificates
If using a self-signed certificate, the web browser will display a warning message when it connects
to an SSL-enabled SVP. To avoid this message, import the certificate to the web browser.
These sample instructions assume the use of Internet Explorer 8.0.
Procedure 6 To import the certificate to the web browser:
1.
Log on to the Remote Web Console SVP using a secure connection (specify the URL using
https).
The Security Alert dialog box appears.
Figure 4 Security Alert dialog box
2.
3.
Click Continue to this website (not recommended) in the Security Alert dialog box.
Click the Page > Security Report.
The Certificate Invalid dialog box appears.
Figure 5 Certificate Invalid dialog box (example)
4.
5.
16
Click View certificates.
Click the General tab in the Certificate window.
Setting up Remote Web Console
Figure 6 Certificate window
6.
Click Install Certificate (I).
The Certificate Import Wizard (Welcome to the Certificate Import Wizard) dialog box appears.
Figure 7 Certificate Import Wizard dialog box (Welcome to the Certificate Import Wizard)
7.
Click Next.
The Certificate Import Wizard (Certificate Store) dialog appears.
Setting up SSL encryption
17
Figure 8 Certificate Import Wizard dialog box (Certificate Store)
8.
Select Automatically select the certificate store based on the type of certificate and click Next.
The Certificate Import Wizard (Completing the Certificate Import Wizard) dialog box appears.
Figure 9 Certificate Import Wizard dialog box (Completing the Certificate Import Wizard)
18
Setting up Remote Web Console
9.
Click Finish.
The message The import was successful is displayed. Click OK.
The certificate is imported to the web browser.
Figure 10 Root Certificate Store dialog box (example)
The certificate is imported to the web browser.
Blocking HTTP communication to the storage system
If the web server (SVP) supports SSL (HTTPS), the HTTP setting tool allows you to block access to
port 80. In that case, the connection used to import the certificate from the web browser to the
web server (SVP) will take place on port 443 (HTTPS).
If you are using Command View Advanced Edition to Remote Web Console, blocking HTTP
communication might interfere with that access. Make sure the Command View Advanced Edition
are able to use SSL communication to Remote Web Console.
Procedure 7 To block HTTP communication:
1.
2.
3.
Log off from all Remote Web Console web clients attached to the SVP.
Start both the Remote Web Console web client and your web browser.
Specify the URL as follows:
https://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi
4.
5.
6.
7.
In the Tool Panel dialog box, click Set up HTTP Blocking.
Enter the user ID and password for the storage administrator, then click Logon. The Set up
HTTP Blocking appears.
Click OK. A confirmation dialog box appears.
Click OK to implement HTTP blocking. When the configuration change is complete, the SVP
will reboot. Once the reboot is complete, the HTTP Communications Blocked dialog box will
appear. If you want to cancel the operation and return to the logon dialog box, click Cancel.
It may take 30 or 60 minutes for the web server to restart. In this case, the Release HTTP
Blocking Complete dialog box does not appear and an internal server error occurs, but the
setting is actually completed.
8.
Click OK. You will return to the logon dialog box.
Releasing HTTP communication blocking
Procedure 8 To release the HTTP communication blocking:
1.
2.
3.
Log off from all Remote Web Console web clients attached to the SVP.
Start both the Remote Web Console web client and your web browser.
Specify the URL as follows:
https://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi
4.
5.
In the Tool Panel dialog box, click Release HTTP Blocking.
Enter the user ID and password for the root storage administrator, then click Logon. The Release
HTTP Blocking dialog box appears.
Setting up SSL encryption
19
6.
7.
8.
Click OK. A configuration dialog box appears.
Click OK to release HTTP blocking. When the configuration change is complete, the SVP will
reboot. Once the reboot is complete, the Release HTTP Blocking Complete dialog box appears.
If you want to cancel the operation and return to the logon dialog box, click Cancel.
Click OK.
Setting up the client machine
The Remote Web Console administrator is responsible for setting up the web client on Remote
Web Console computers. This includes the following:
•
“Requirements for client machines” (page 20)
•
“Configuring a Windows 2003/2008 Server machine” (page 22) (if applicable)
•
“Setting up TCP/IP for a firewall” (page 22)
•
“Configuring the web browser” (page 22)
•
“Downloading Adobe Flash” (page 22)
•
“Installing and configuring JRE” (page 22)
Requirements for client machines
This section explains the requirements for Remote Web Console computers on supported versions
of the Windows and UNIX/Linux operating systems.
General requirement
A maximum of 32 Remote Web Console users can access the same storage system concurrently.
Requirements for Windows-based computers
Table 1 Requirements for Remote Web Console computers in Windows operating systems
Item
Requirement
Processor (CPU)
Pentium 4 640 3.2 GHz or better
(Recommended: Core2Duo E6540 2.33GHz or better)
Memory (RAM)
2 GB or more
Recommended: 3 GB
Available hard drive space
500 MB or more
Monitor
True Color 32-bit or better
Resolution: 1280 x 1024 or better
Keyboard and mouse
You cannot use the mouse wheel feature.
Ethernet LAN card for TCP/IP network
100BASE-T
1000BASE-T
Table 2 Software requirements for Windows
Operating system
Flash Player
Web browser
Java Runtime Environment
Flash Player 10.1
Internet Explorer 8.0
JRE 6.0 Update 20 (1.6.0_20)
Windows Server 2003 Flash Player 10.1
(SP2 )1
Internet Explorer 8.0
JRE 6.0 Update 20 (1.6.0_20)2
Windows Server 2003 Flash Player 10.1
R2 (SP2)1
Internet Explorer 8.0
JRE 6.0 Update 20 (1.6.0_20)2
1
Windows XP (SP3)
20
Setting up Remote Web Console
2
Table 2 Software requirements for Windows (continued)
Operating system
Web browser
Java Runtime Environment
Windows Server 2008 Flash Player 10.1
(SP2) 3, 4
Internet Explorer 8.0
JRE 6.0 Update 20 (1.6.0_20)2
Windows Server 2008 Flash Player 10.1
R2 3, 4
Internet Explorer 8.0
JRE 6.0 Update 20 (1.6.0_20)2
Internet Explorer 7.0
JRE 6.0 Update 16 (1.6.0_16)2
Internet Explorer 8.0
JRE 6.0 Update 20 (1.6.0_20)2
Internet Explorer 8.0
JRE 6.0 Update 20 (1.6.0_20)2
Windows Vista
3, 4
Windows 7 (Notes 2
and 3)
Flash Player
Flash Player 10.1
Flash Player 10.1
1
Only 32-bit version is supported.
2
Use the JRE that is provided by Oracle, Inc.
3
Only 64-bit version is supported.
4
When the SVP supports Internet Protocol Version 6 (IPv6), you can specify IPv6 addresses.
NOTE:
None of the operating systems listed are supported as a guest OS in a virtual server.
To set up a different version, see “Installing and configuring JRE” (page 22).
Requirements for UNIX/Linux-based computers
Table 3 Requirements for Remote Web Console computers in UNIX/Linux environments
Item
Requirement
Processor (CPU)
Pentium 4 640 3.2 GHz or better
(Recommended: Core2Duo E6540 2.33 GHz or better)
Memory (RAM)
2 GB or more
Recommended: 3 GB
Available hard drive space
500 MB or more
Monitor
Resolution: 1280 x 1024 or better
Keyboard and mouse
You cannot use the mouse wheel feature.
Ethernet LAN card for TCP/IP network
100BASE-T
1000BASE-T
Table 4 Software Requirements for UNIX
Operating system
Flash Player
Web browser
Solaris 101
Flash Player 10.1
Firefox 3.6.8 (32 bit) JRE 6.0 Update 20 (1.6.0_20) (32 bit)
Red Hat Enterprise Linux
AS Ver 5.51
Flash Player 10.1
Firefox 3.6.8 (32 bit) JRE 6.0 Update 20 (1.6.0_20) (32 bit)2
1
Only 64-bit version is supported.
2
Use the JRE that is provided by Oracle, Inc.
NOTE:
Java Runtime Environment
2
None of the operating systems listed are supported as a guest OS in a virtual server.
Setting up the client machine
21
Configuring a Windows 2003/2008 Server machine
If you are using a Windows Server 2003/2008 machine and Internet Explorer, the following
options must be set in Internet Options before logging in to an SVP:
•
Navigate to Tools > Internet Options, click Advanced, and clear the Do not save encrypted
pages to disk check box.
•
Navigate to Tools > Internet Options, click Security and register the URL of the SVP.
For more information on configuring these settings, see the Internet Explorer help documentation.
Setting up TCP/IP for a firewall
If a firewall exists between the Remote Web Console computer and the SVP, the TCP/IP ports must
be set up according to the following table.
When attaching Remote Web Console to multiple storage systems, the installer must log in to the
SVP of each storage system using separate Remote Web Console sessions and separate web
browser instances.
Table 5 Firewall configuration
Protocol
Port number
Direction of communication
HTTP
80
From the Remote Web Console web client to SVP
HTTPS
443
RAID Manager
31001
RMI
1099
RMI
51099
RMI
51100
SMI-S
427
SMI-S
5989
SNMP1
161
RAID Manager
34001
SNMP Trap1
162
1
From SVP to the Remote Web Console web client
Required if you use a Remote Web Console web client as an SNMP manager.
Configuring the web browser
To configure the client web browser, note the following:
•
The browser must allow first-party, third-party, and session cookies.
•
Pop-up blocker and plug-ins must be disabled.
Consult your browser’s documentation for instructions.
Downloading Adobe Flash
Download Adobe® Flash® Player from http://get.adobe.com/jp/flashplayer/ and install it.
Installing and configuring JRE
You can download and install JRE from the Java website at http://www.oracle.com/technetwork/
java/archive-139210.html.
22
Setting up Remote Web Console
In a Windows environment, you can verify that JRE was successfully installed if you are able to
view the Java icon in the Control Panel. You should be able to launch the Java Control Panel by
double-clicking the Java icon.
In a UNIX or Linux environment, you can verify that JRE was successfully installed if you are able
to open the ControlPanel.html file, which is located in the JRE root directory.
On the JRE of each Remote Web Console computer, Java log file trace and logging should be
enabled and caching should be disabled. The Java log file can help you troubleshoot an issue
when an application error occurs in the Remote Web Console web client. Disabling the caching
feature can help prevent unexpected complications when the microcode is updated. See the http://
www.oracle.com/technetwork/java/archive-139210.html website for more information on
configuring JRE through the Java Control Panel.
Configuring JRE
After installing the JRE file on UNIX workstations, you must set the file path for the installation
directory.
In a B Shell, issue the following command:
PATH=$PATH:[JRE installation directory path]/jre/bin
export PATH
In a C Shell, issue the following command:
setenv PATH ${PATH}:[JRE installation directory path]/jre/bin
Preparing for using the Report Configuration Tool
Requirements for using the Report Configuration Tool
The following three components are required to use the Report Configuration Tool.
A Windows computer
The Report Configuration Tool runs on a Windows 2000, Windows Server 2003, or Windows
Server 2008 computer.
You can specify both an IPv4 address and an IPv6 address on the computer for the Report
Configuration Tool. You can also connect the computer to the SVP over an IPv4 proxy server. When
you use the proxy server, you specify a name and a port number of the proxy server as the
HTTP_PROXY environment variable on the Windows computer.
An example of the command is shown below.
SET HTTP_PROXY=http://proxy.xx.co.jp:8080
A user account for exclusive use of the Report Configuration Tool
If you want to use the Report Configuration Tool, you must create a user account that should only
be used with the Report Configuration Tool. Assign only the Storage Administrator (Initial
Configuration) role to the user account for the Report Configuration Tool.
For details on user accounts, see “Setting up and managing user accounts” (page 30).
The Report Configuration Tool program
The Report Configuration Tool is contained in CD-ROM Disc 2, which is named Host PP. For detailed
information about how to install the Report Configuration Tool, see “Installing the Report
Configuration Tool on a computer” (page 23).
Installing the Report Configuration Tool on a computer
Procedure 9 To install the Report Configuration Tool on a computer:
1.
Insert the Report Configuration Tool installation media into the CD-ROM drive.
Preparing for using the Report Configuration Tool
23
2.
3.
Execute setup.exe in the folder /program/Config_Report_CLI/Win32.
Specify a directory to install the Report Configuration Tool on when you are asked to enter
the directory to install it on.
The Report Configuration Tool is installed.
Note that the directory where the Report Configuration Tool is installed is not specified as an
application path. When necessary, specify the directory as the application path.
24
Setting up Remote Web Console
3 Getting started using Remote Web Console
This module describes logging in to Remote Web Console and restrictions when using Remote
Web Console. For instructions on navigating to storage system information, see “Viewing and
managing the storage system” (page 64). For more information on the GUI, see “Remote Web
Console GUI reference (main window)” (page 108) and “Remote Web Console GUI reference
(secondary windows)” (page 158).
Logging in to Remote Web Console
There are two kinds of login for Remote Web Console:
•
One-time only login used by the super-user who is the first person to access Remote Web
Console in order to create user accounts
•
Normal login for other Remote Web Console and storage system administrators
Initial super-user login
This section describes the login procedure for the administrator who first sets up Remote Web
Console and logs in to it for the first time. You will use a built-in ID and password, which is set up
with all permissions.
Once logged in, you must change the password to the built-in account to prevent unwarranted
login.
Procedure 10 To log in using the built-in user ID and password:
1.
In your web browser, specify the URL for your SVP:
https://IP-address-or-host-name-of-SVP/.
2.
3.
Log in using the user ID arrayadmin and the password array4dm1n.
Change the password for this account by clicking Settings > User Management > Change
Password.
NOTE: If your system administrator makes any changes to user accounts of the support personnel,
the changes must be reported to the support personnel. If the changes are not reported, the support
personnel cannot log in to the SVP and perform maintenance operations.
Normal login
This login procedure is for all users other than the super-user.
Procedure 11 To log in to a storage system in Remote Web Console:
1.
In your web browser, specify the following URL:
https://IP-address-or-host-name-of-SVP/
NOTE: When connecting to a second storage system, you must start a new web browser
instance and log in to the system's URL.
2.
The following actions might be required to open the login dialog box depending on your
environment:
•
If a message appears informing you that the enhanced security configuration is enabled
on the computer, select In the future, do not show this message and click OK.
•
If the SVP is set to support SSL-encrypted communication and security messages appear,
make sure the certificate is right and follow the instructions on the dialog box.
•
If a message appears stating that certain websites are blocked, follow instructions in
“Adding your SVP to the trusted sites zone—for Windows server” (page 26).
Logging in to Remote Web Console
25
3.
4.
5.
6.
Type the user ID and password.
Click Login.
If the Security Information dialog box appears, click Yes.
If a local storage area dialog box of Adobe Flash Player Setting appears, click Allow to open
the Remote Web Console main window. The cache function of Flash Player optimizes the
process of Remote Web Console. Denial of the request might delay the processing speed of
Remote Web Console.
Figure 11 Flash Player Local Storage area dialog box
NOTE: If login fails three times with the same user ID, Remote Web Console stops responding
for one minute. This is for security purposes and not a system failure. Wait, then try again.
Changing your password
When the administrator gives you a user ID and password, you should change the password.
Procedure 12 To change your user account password:
1.
2.
Log in to Remote Web Console with the user ID and password given to you by the administrator.
Click Settings > User Management > Change Password to change your password.
Adding your SVP to the trusted sites zone—for Windows server
If you are using Remote Web Console on a Windows Server 2003/2008 computer, the following
message may appear during login. In this case, the SVP must be added to the trusted sites zone.
Figure 12 Internet Explorer message (this may appear when you log in to the SVP)
To add the SVP to the trusted sites zone:
1. Click Add in the message dialog box. The Trusted Sites dialog box opens.
26
Getting started using Remote Web Console
2.
3.
4.
In Add this Web site to the zone, enter the URL of the SVP that you want to log in. For example,
if the host name is host01, the URL is http://host01. If the IP address is 127.0.0.1,
the URL is http://127.0.0.1.
Click Add to add the URL of the SVP to the Web sites list.
Click Close to close the dialog box.
Remote Web Console restrictions
This section lists actions that are restricted within Remote Web Console, and within the browser
when using Remote Web Console:
•
“General restrictions” (page 27)
•
“Web browser restrictions while using Remote Web Console” (page 27)
•
“Unsupported actions in Remote Web Console” (page 28)
•
“Applying changes made in Remote Web Console” (page 28)
•
“Refreshing data after a Auto LUN or Quick Restore operation” (page 28)
•
“Using Remote Web Console on UNIX” (page 29)
•
“Unsupported actions in UNIX version of Remote Web Console” (page 29)
General restrictions
To avoid an error condition, do not perform any of the following options while using Remote Web
Console:
•
Do not change the local storage area value in the Adobe Flash Player settings.
•
Do not change the clock time of the Remote Web Console computer while you are logged in
to the SVP.
•
Do not adjust your computer display while using Remote Web Console (for example, changing
the screen resolution or by using the Remote Desktop feature of Microsoft).
•
Do not use screen savers that change the screen resolution automatically.
•
Do not allow the Remote Web Console computer to enter standby or hibernate mode when
using Remote Web Console; otherwise, you must restart Remote Web Console.
•
If applicable, disable the auto login function of any web-based software or website.
•
You cannot use the Home, End, or Delete key for Remote Web Console operations.
•
You cannot use function keys.
Web browser restrictions while using Remote Web Console
It is a best practice not to use your web browser menus, shortcuts, or other options when logged
in to Remote Web Console.
•
If you use Back, Next, or web browser shortcut keys such as F5 and Esc, you will be logged
out of Remote Web Console and any settings will be canceled.
•
Do not use the web browser close functions such as the button, the Close option in the File
menu, or the Alt + F4 shortcut. To close Remote Web Console, click Logout or File > Close in
the Remote Web Console menu.
•
Do not change the web browser settings such as Tools > Folder options of Internet Explorer.
If you do so and see unexpected results, close the web browser and log in to Remote Web
Console again.
•
Do not disable Flash Player because Flash Player is necessary for Remote Web Console and
works as an add-on to a web browser. If you use Internet Explorer, do not change the settings
in Tools > Manage Add-ons.
Remote Web Console restrictions
27
•
Other web browser functions that cannot be used include character encoding, text size, the
zoom function, the Ctrl + F search function, and the Ctrl + A select all function
•
If you use Shift + Tab shortcut to move the focus in reverse, the focus may not move from web
browser to the Flash Player. Use only Tab to move the focus to the Flash Player.
Unsupported actions in Remote Web Console
The following actions are not supported in Remote Web Console.
•
A right-click cannot be used in the Remote Web Console main window to open a pop-up
menu. If you right-click, the Flash Player pop-up menu opens instead.
•
The copy (Ctrl+C) and paste (Ctrl+ V) shortcuts cannot be used to copy and paste text to a
text box in Remote Web Console.
•
No drag-and-drop operation is available in Remote Web Console.
•
The mouse wheel feature may not function in the Remote Web Console secondary window.
•
The zoom in and zoom out function of the web browser cannot be used in the Remote Web
Console window. When you hold down on the Ctrl key and use the mouse wheel, a part of
the Remote Web Console window may not be displayed because of the zoom in and zoom
out function of the web browser.
Applying changes made in Remote Web Console
When applying changes in Remote Web Console, be aware of the following behavior:
•
When an internal process is being executed on the SVP (for example, a configuration change,
option check, or an operational information acquisition), Remote Web Console processing
might be temporarily delayed.
•
If you request a change to the storage system configuration in the secondary window while
another change is being made, an error message appears.
If the error occurs while you are logging in or clicking Apply to implement changes, wait for
a few minutes, and then retry the operation.
If the error occurs while you are either switching between Modify and View mode, or switching
tabs, wait for a few minutes and then click Refresh on the File menu and then retry the
operation.
•
After the microcode is upgraded or downgraded on the SVP (Web server), you must clear
Java and Web browser caches on the Remote Web Console computer. For details, see
“Clearing the Java and web browser caches” (page 84)
•
When you use Remote Web Console on Windows, the Add or Remove Programs window in
the Windows’ control panel might or might not display Remote Web Console. Remote Web
Console works fine in both cases.
Refreshing data after a Auto LUN or Quick Restore operation
When the Auto LUN or Business Copy or Business Copy Z Quick Restore operation is being
performed, a Remote Web Console window may display old information (that is, before the
operation) on logical volume (LDEV) configurations. In this situation, wait until the Auto LUN
operation or Quick Restore operation completes, and then click File > Refresh or File > Refresh All
to update the Remote Web Console window.
Refreshing data after operations performed with another application
It may take time to refresh the information in Remote Web Console when you have performed an
operation on the storage system using another application, such as RAID Manager.
28
Getting started using Remote Web Console
Using applications other than Remote Web Console
When you click Refresh or Refresh All while changing configuration from another application such
as RAID Manager, it may take some time to refresh the information in the Remote Web Console
window.
Using Remote Web Console on UNIX
There are required actions and additional restrictions when you use Remote Web Console on
UNIX.
Unsupported actions in UNIX version of Remote Web Console
The following actions are not supported in UNIX version of Remote Web Console:
•
You cannot change the window size.
•
You cannot drag and drop objects in the Auto LUN or LUN Manager windows.
•
If you select the Remote Web Console window icon when you are using Auto LUN, the window
may be fully or partially obscured behind the Remote Web Console window. Before you can
use the Remote Web Console window, close the window by clicking the button. This
terminates the process. If you want to continue the process, click the Auto LUN window to
bring it to the foreground.
•
The Close button ( ) on the Auto LUN window remains active even if you click Apply and
processing is being executed. If you click the button after clicking Apply, the window closes
but processing continues.
•
The word Loading... only appears on the message dialog box of the Auto LUN window
for the first operation. This message does not appear after the first operation.
Using Remote Web Console
After logging in, the Remote Web Console main window appears. You can navigate from the
menu, the tree, or General Tasks. Precise instructions for performing an operation can be found
in the program product user guides. Also, see “Remote Web Console GUI reference (main window)”
(page 108) and “Remote Web Console GUI reference (secondary windows)” (page 158).
Using Remote Web Console
29
4 Setting up and managing user accounts
When Remote Web Console is set up on the SVP and you have set up client machines, you can
create users and define their roles. This chapter provides information for setting up user accounts.
Workflow for user management
The administrator creates user accounts for all users. You use Remote Web Console to create the
account. The basic workflow for creating users follows:
•
Connect client machines to an authentication server, if used. An authentication server allows
users to log in to Remote Web Console with the same password as the one used for other
applications in a system. If an authentication server is not used, a user enters a dedicated
password for Remote Web Console.
Review “Using authentication server and authorization server” (page 30) for information and
instructions.
•
Review “User groups” (page 32) to understand the user groups, resource groups, and roles
you assign new (or existing) users. User groups consist of specific permissions for performing
Remote Web Console actions.
•
Create a user group. Refer to “Creating a new user group” (page 37). There is also a user
group called “built-in group” that is previously provided.
•
Create new users and assign permissions. See “Creating a user account” (page 37).
•
Inform users about their accounts.
•
Change, disable, or delete user passwords and permissions.
Using authentication server and authorization server
When an authentication server is used, a user can log in to Remote Web Console with the same
password as the one used for other applications in a system. The authentication server requirement
must be configured for each user.
The following shows workflow of authentication for users in the case of using or not using the
authentication server.
Figure 13 A workflow when the authentication server is not used
Figure 14 A workflow when the authentication server is used
If an authorization server works together with an authentication server, the user groups registered
in the authorization server can be assigned to a user for Remote Web Console.
30
Setting up and managing user accounts
Figure 15 A workflow when an authentication server and an authorization server are used in
combination
You can use the authentication server without having awareness of host names and port numbers,
if you register the information of the authentication server to an SRV record in the DNS server. If
you register the multiple numbers of authentication servers to the SRV record, you can determine
the authentication server to be used based on the priority that has been set in advance.
Connecting an authentication server
Procedure 13 To connect authentication and authorization servers:
1.
2.
3.
4.
5.
Click Setting > Environmental Setting > View External Authentication Server Properties.
Click Setup Server to open the Setup Server window.
Select a type of the authentication server to use.
Specify options to connect to the authentication server. If you use more than one authentication
server or an authorization server, specify options for each of the servers.
To test the connection, click Connect Test.
An error message will display if the connection fails.
6.
7.
Click Finish.
Specify a task name and click Apply.
NOTE: When the authentication server and the authorization server cannot be used even with
the proper settings, a problem might exist in the configuration file setting or the network. Contact
the server administrator or the network administrator.
After you finish setting up the authentication and authorization servers and confirm that you can
use the servers, save a copy of server configurations for connecting the authentication server to a
file. For details on saving a copy, see “Saving a copy of Remote Web Console configuration files”
(page 50).
Enabling authorization server cooperation
Using user groups from the authorization server in Remote Web Console
Create a user group with the same name as the user group shown in the value of the memberOf
attribute for each user in Active Directory. After entering the user group name, click Check and
verify that the entered user group name is registered in the authorization server. Create a user
group for every one of the groups mentioned in a user's memberOf attribute.
For more information on how to create a user group, see “Creating a new user group” (page 37).
Registering the Remote Web Console user group to the authorization server
To register the Remote Web Console user group with the authorization server, set the distinguished
name (DN) of the user group with the same name as the Remote Web Console user group to the
Using authentication server and authorization server
31
value of the memberOf attribute value for each user. In other words, the user group you add to
the Remote Web Console should match the group name in the Active Directory.
CAUTION: When a user account belongs to more than one group, note the cautions in “User
groups” (page 32). If one user needs to use different user groups for different purposes, then create
local user accounts in Remote Web Console, not using an authorization server.
NOTE: The DN of the user group to be set in Active Directory must be between 1 and 250
characters. You can register a maximum of 20 user groups at one time.
User groups
An administrator must create the Remote Web Console user accounts and add each user to a
built-in group. Whether a registered user has privileges beyond those granted by membership in
the Remote Web Console group is determined by any other user groups(s) to which the user
belongs. A user can belong to more than one group.
Roles and user groups
The operations that are allowed for each user depends on the role of the user. The roles are not
set in individual user attributes, but at the user group level. There are two ways to change the
operations that are allowed for users:
•
Move the user to another user group.
For more information, see “Changing a user’s permissions” (page 39).
•
Change the roles assigned to the user group of which the user is a member.
For more information, see “Changing a user group's permissions” (page 41).
Resource groups and user groups
The resources that users can manipulate depend on the resource groups. Resource groups are not
assigned at the individual user level, but at the user group level. There are two ways to change
the resources that are allowed to users:
•
Move the user to another user group.
For more information, see “Changing a user’s permissions” (page 39).
•
Change the resource groups assigned to the user group of which the user is a member.
For more information, see “Changing the resource groups assigned to a user group” (page 41).
For more information about resource groups, see the HP P9000 Provisioning for Open Systems
User Guide or the HP P9000 Provisioning for Mainframe Systems User Guide.
User registration example
A sample configuration follows:
•
Setting operations that affect the security of the whole system must be done by the administrator.
•
The setting operations on the Resource Group 10 must be done by User A.
•
The setting operations on the Resource Group 20 must be done by User B.
To implement the above configuration, assign users to user groups as shown in Table 6 (page 33).
32
Setting up and managing user accounts
Table 6 User registration example
User
Roles to be assigned to the user group
Resource group to be assigned
to user group
Administrator User Group 1
Security Administrator (View & Modify)
All Resource Groups Assigned1
User A
User Group 10
Storage Administrator2
Resource Group 10
User B
User Group 20
Storage Administrator2
Resource Group 20
1
2
User group to be
registered
For the user group that is assigned the Security Administrator role, All Resource Groups Assigned is automatically set to
Yes.
There is more than one type of storage administrator. For more information, see “Roles” (page 34)
CAUTION: When assigning a user to multiple user groups, the operations allowed to the roles
of each user group are enabled on any of resource groups assigned to each user group.
User groups
33
Roles
More than one role is readily available. You cannot create custom roles. The following table shows
the roles and permitted operations.
Role
Permitted operations
Security Administrator (View Only)
• Viewing information about user accounts and encryption keys
Security Administrator (View & Modify)
• Configuring user accounts
• Creating encryption keys and configuring encryption settings.
• Configuring the certificate used for the SSL communication
• Configuring the Fibre Channel authentication (FC-SP)
• Configuring resource groups
Audit log Administrator (View Only)
• Viewing audit log information and downloading audit logs
Audit log Administrator (View & Modify)
• Configuring audit log settings and downloading audit logs
Storage Administrator (View Only)
• Viewing storage system information
Storage Administrator (Initial Configuration)
• Configuring settings for storage systems
• Configuring settings for SNMP
• Configuring settings for e-mail notification
• Configuring settings for license keys
• Viewing, deleting, and downloading storage configuration reports
Storage Administrator (System Resource
Management)
• Configuring settings for CLPR
• Configuring settings for MP Blade
• Deleting tasks and releasing exclusive locks of resources
• Completing SIMs
• Configuring attributes for ports
• Configuring LUN security
• Configuring Performance Control
Storage Administrator (Provisioning)
• Configuring caches
• Configuring LDEVs, pools, and virtual volumes
• Formatting and shredding LDEVs
• Configuring external volumes
• Configuring alias volumes for Parallel Access Volumes
• Configuring Thin Provisioning
• Configuring ESAM
• Configuring LUSE
• Configuring host groups, paths, and WWN
• Configuring Auto LUN, except splitting Auto LUN pairs when using
RAID Manager
• Configuring access attributes for LDEVs
• Configuring LUN security
34
Storage Administrator (Performance
Management)
• Configuring monitoring
Storage Administrator (Local Copy)
• Performing pair operations for local copy
Setting up and managing user accounts
• Starting and stopping monitoring
Role
Permitted operations
• Configuring environmental settings for local copy
• Splitting Auto LUN pairs when using RAID Manager
Storage Administrator (Remote Copy)
• Performing pair operations for remote copy
• Configuring environmental settings for remote copy
Support Personnel
Configuring SVP
This role is for HP service representative.
User Maintenance
Configuring SVP
CAUTION: If a user has All Resource Groups Assigned set to Yes, the user can access all resources
in the storage system. For example, if a user is a security administrator and a storage administrator
taking care of certain resources, has all resource groups assigned, and has the roles of Security
Administrator (View & Modify) and Storage Administrator (View & Modify), the user can edit the
storage for all resources. If this is a problem, HP recommends registering the following two user
accounts to Remote Web Console and using these accounts for different purposes:
•
A user account of the security administrator that has All Resource Groups Assigned set to Yes.
•
A user account of the storage administrator who does not have all resource groups assigned
and has only some of the resource groups assigned.
CAUTION: For the user groups whose roles are other than the Storage Administrator role, All
Resource Groups Assigned is automatically set to Yes. If you delete all roles except the Storage
Administrator role, reassign resource groups to the user group because All Resource Groups
Assigned is automatically set to No. To assign resource groups to the user group, see “Changing
the resource groups assigned to a user group” (page 41).
Built-in groups
More than one built-in user group is available. You cannot change the setting of roles or resource
groups assigned to built-in groups. Table 7 (page 36)shows the built-in roles and resource groups.
For more information about resource groups, see the HP P9000 Provisioning for Open Systems
User Guide or the HP P9000 Provisioning for Mainframe Systems User Guide.
User groups
35
Table 7 Roles configured in built-in groups
Built-in Group
Role
Resource group
Administrator
• Security Administrator (View & Modify)
All Resource Groups
Assigned
• Audit log Administrator (View & Modify)
• Storage administrator (Initial Configuration)
• Storage Administrator (System Resource
Management)
• Storage Administrator (Provisioning)
• Storage Administrator (Performance Management)
• Storage Administrator (Local Copy)
• Storage Administrator (Remote Copy)
• User Maintenance
System
• Security Administrator (View & Modify)
• Audit log Administrator (View & Modify)
All Resource Groups
Assigned
• Storage Administrator (Initial Configuration)
• Storage Administrator (System Resource
Management)
• Storage Administrator (Provisioning)
• Storage Administrator (Performance Management)
• Storage Administrator (Local Copy)
• Storage Administrator (Remote Copy)
Security Administrator (View Only)
• Security Administrator (View Only)
• Audit log Administrator (View Only)
All Resource Groups
Assigned
• Storage Administrator (View Only)
Security Administrator (View & Modify)
• Security Administrator (View & Modify)
• Audit log Administrator (View & Modify)
All Resource Groups
Assigned
• Storage Administrator (View Only)
Audit Log Administrator (View Only)
• Audit log Administrator (View Only)
• Storage Administrator (View Only)
Audit Log Administrator (View & Modify) • Audit log Administrator (View & Modify)
• Storage Administrator (View Only)
All Resource Groups
Assigned
All Resource Groups
Assigned
Storage Administrator (View Only)
• Storage Administrator (View Only)
meta_resource
Storage Administrator (View & Modify)
• Storage Administrator (Initial Configuration)
meta_resource
• Storage Administrator (System Resource
Management)
• Storage Administrator (Provisioning)
• Storage Administrator (Performance Management)
• Storage Administrator (Local Copy)
• Storage Administrator (Remote Copy)
Support Personnel
• Storage Administrator (Initial Configuration)
• Storage Administrator (System Resource
Management)
• Storage Administrator (Provisioning)
36
Setting up and managing user accounts
All Resource Groups
Assigned
Table 7 Roles configured in built-in groups (continued)
Built-in Group
Role
Resource group
• Storage Administrator (Performance Management)
• Storage Administrator (Local Copy)
• Storage Administrator (Remote Copy)
• User Maintenance
Maintenance
• Storage Administrator (View Only)
• User Maintenance
All Resource Groups
Assigned
Creating a new user group
This section explains how to create a user group.
Prerequisites
•
You must have the Security Administrator (View & Modify) role to perform this task.
•
A user group name consists of 1 to 64 characters including alphanumeric characters (ASCII),
spaces and the following symbols: ! # $ % & ' ( ) + - . = @ [ ] ^ _ ` { } ~
Procedure 14 To create a new user group
1.
2.
3.
4.
5.
6.
7.
8.
In the tree, click Administration > User Groups.
In the User Groups tab, click Create User Groups to open Create User Group window.
Enter a user group name.
If you use an authorization server, click Check and verify that the entered user group name is
registered in the authorization server.
Click Next to open the Assign Roles window.
Select the roles to assign to the user group, and click Add.
Click Next to open the Assign Resource Groups window.
Select the resource groups to assign to the user group, and click Add.
NOTE: If you select a role other than the storage administrator in the Assign Roles window,
you do not need to select resource groups because all the resource groups are assigned
automatically.
9.
Click Finish.
Clicking Next allows you to add a user.
10. Specify a task name and click Apply.
Managing user accounts
This section provides instructions for managing user accounts.
Creating a user account
This section explains how to create a user account and register the account to a user group with
appropriate permissions.
Managing user accounts
37
Prerequisites
•
You must have the Security Administrator (View & Modify) role to perform this task.
•
You can log in to SVP and RAID Manager with user accounts that are created by Remote Web
Console. You must have the Support Personnel role to log in to SVP.
•
The allowable characters and length of user names and passwords depend on the applications
(Remote Web Console, SVP, and/or RAID Manager) that the user is using. The user names
and the passwords must meet the requirements of all applications when the user uses multiple
applications.
Table 8 User name and password for Remote Web Console
Item
Length in
characters
Characters that can be specified
User name
1 to 256
• Alphanumeric (ASCII code) characters
• Following symbols:
#$%&'*+-./=?@^_`{|}~
Password
6 to 256
• Alphameric (ASCII code) characters
• All symbols
• Spaces
Table 9 User name and password for logging in to SVP
Item
Length in
characters
Characters that can be specified
User name
1 to 128
• Alphanumeric (ASCII code) characters
• Following symbols:
!#$%&'-.@^_`{}~
Password
6 to 127
• Alphanumeric (ASCII code) characters
• All symbols
• Spaces
Table 10 User name and password for logging in to RAID Manager
Item
Length in
characters
Characters that can be specified
User name
1 to 64
• Alphanumeric (ASCII code) characters
• Following symbols (see Note below):
-.@_
Password
6 to 63
• Alphanumeric (ASCII code) characters
• Following symbols (see Note below):
-.@_
NOTE: When you use a Windows computer for RAID Manager, you can also specify a backslash
(\). When you use a UNIX computer for RAID Manager, you can also specify a slash (/).
Procedure 15 To create a user account:
1.
38
In the tree, click Administration→User Groups.
Setting up and managing user accounts
2.
3.
4.
5.
6.
7.
8.
In the User Groups tab, select a user group to which to add a user. This is dependent on which
permissions you want to give to the user.
In the Permission tab, confirm that the displayed permissions are appropriate for the user.
Click the User tab and then Create User to open the Create User dialog box.
Enter a user ID (user name).
Select Activate or Lock for the account. If you select Lock, the user of this account is disabled
and cannot log in to Remote Web Console.
To use an authentication server, select External. To authenticate users with only Remote Web
Console, select Local.
If you select Local, enter the password of this user account in two places.
For a password, all alphanumeric characters and symbols can be used. The length must be
between 6 to 256.
9. Click Finish.
10. Specify a task name and click Apply.
Changing a user’s password
This section explains how to change (reissue) the password of other users.
Prerequisites
•
You must have the Security Administrator (View & Modify) role to perform this task.
•
The target user must not use the authentication server. If the user uses the authentication server,
perform the applicable procedure for the authentication server.
Procedure 16 To change a user's password:
1.
2.
3.
4.
5.
6.
In the tree, click Administration→User Groups.
In the User Groups tab, select a user group to which the user belongs.
Click the User tab, select the user, and then click Change Password. The Change Password
dialog box opens.
Specify a new password of the user in two places.
Click Finish.
Specify a task name and click Apply.
Changing a user’s permissions
A user’s permissions are determined by their user group. You change the permissions by changing
the user group to which the user is assigned. A user can belong to multiple user groups.
For example, one user has the security view permission and you want to change this to the storage
modify permission. In this case, add this user to the storage modify build-in group and then remove
the user from the security view build-in group. If you change permissions of a logging in user, the
change takes effect from the next time the user logs in.
Prerequisites
•
You must have the Security Administrator (View & Modify) role to perform this task.
•
A user must belong to at least one user group.
Procedure 17 To change the permission of a user:
1.
2.
3.
4.
5.
In the tree, click Administration→User Groups.
In the User Groups tab, select a user group to add the user and then click Add Users.
In the Add User dialog box, select a user and click Add.
Click Finish.
Specify a task name and click Apply.
Managing user accounts
39
6.
7.
8.
In the tree, click Administration > User Groups.
In the User Groups tab, click a user group to remove the user from.
Click the User tab, select the user to remove from this user group, and then click More
Actions→Remove Users.
9. Click Finish.
10. Specify a task name and click Apply.
Disabling a user account
Disable a user account when you want to temporarily prevent the user from logging in to Remote
Web Console.
Prerequisites
•
Log in as a user that is different from the user whose account you want to disable.
•
You must have the Security Administrator (View & Modify) role to perform this task.
Procedure 18 To disable a user account:
1.
2.
3.
4.
5.
6.
In the tree, click Administration→User Groups.
In the User Groups tab, click a user group which the user belongs to.
Click the User tab, select the user and then click Edit User to open the Edit User dialog box.
Click the Account check box and click Lock.
Click Finish.
Specify a task name and click Apply.
To allow the user to log in to Remote Web Console, perform the operation above and click Activate
instead of Lock in the Edit User dialog box.
Deleting a user account
Delete a user account when the account is no longer in use. Built-in users accounts cannot be
deleted. The user account remains to be active while logging in Remote Web Console, if you delete
the user account.
Prerequisite
•
You must have the Security Administrator (View & Modify) role to perform this task.
Procedure 19 To delete a user account:
1.
2.
3.
4.
In the tree, click Administration→User Groups.
In the User Groups tab, click a user group to which the user belongs.
Click the User tab, select the user(s) and then click More Actions > Delete Users to open the
Delete User dialog box.
Specify a task name and click Apply.
Changing the user group configuration
Changing a user group name
This section explains how to change the name of a user group.
Prerequisites
40
•
You must have the Security Administrator (View & Modify) role to perform this task.
•
The names of built-in groups cannot be changed.
•
A user group name consists of 1 to 64 characters including alphanumeric characters (ASCII),
spaces and the following symbols: ! # $ % & ' ( ) + - . = @ [ ] ^ _ ` { } ~
Setting up and managing user accounts
Procedure 20 To change the user group name:
1.
2.
3.
4.
5.
6.
In the tree, click Administration→User Groups.
In the User Groups tab, select the user group and then click More Actions→Edit User Group
to open the Edit User Group window.
In the Edit User Group window, enter a new user group name.
If you use an authorization server, click Check and verify that the entered user group name is
registered in the authorization server.
Click Finish.
Specify a task name and click Apply.
Changing a user group's permissions
This section explains how to change the permissions that are assigned to the user groups.
Prerequisites
•
You must have the Security Administrator (View & Modify) role to perform this task.
•
The permissions of a built-in group cannot be changed.
Procedure 21 To change the permissions of a user group:
1.
2.
3.
4.
5.
In the tree, click Administration→User Groups.
In the User Groups tab, select the user group and then click More Actions→Assign Roles.
In the Edit Role Assignment window, change roles to be assigned to the user group.
•
Select roles to add, and then click Add.
•
Select a role to remove, and then click Remove.
Click Finish.
Specify a task name and click Apply.
CAUTION: For the user groups whose roles are other than the Storage Administrator, All Resource
Groups Assigned is automatically set to Yes. If you delete all the roles except the Storage
Administrator, reassign resource groups to the user group because All Resource Groups Assigned
is automatically set to No. To assign resource groups to the user group, see “Changing the resource
groups assigned to a user group” (page 41).
Changing the resource groups assigned to a user group
This section explains how to change the resource groups that are assigned to the user group.
Prerequisites
•
You must have the Security Administrator (View & Modify) role to perform this task.
•
Create a resource group to be assigned to the user group in advance.
•
You cannot change the resource groups of the user group that has All Resource Groups
Assigned set to Yes.
•
You cannot change resource groups of the built-in group.
Procedure 22 To change a resource group that is assigned to a user group:
1.
2.
In the tree, click Administration→User Groups.
In the User Groups tab, select a user group to change the resource group, and click Assign
Resource Groups.
Changing the user group configuration
41
3.
4.
5.
In the Assign Resource Groups window, change resource groups to be assigned to the user
group.
•
Select the resource group to add, and click Add.
•
Select the resource group to remove, and click Remove.
Click Finish.
Specify a task name and click Apply.
Deleting a user group
Delete a user group when the user group is no longer needed.
Prerequisites
•
You must have the Security Administrator (View & Modify) role to perform this task.
•
You cannot delete built-in groups.
•
A user group cannot be deleted if there are users that belong to only the user group to delete.
Procedure 23 To delete a user group:
1.
2.
3.
In the tree, click Administration→User Groups.
In the User Groups tab, select user groups that you want to delete, and click More
Actions→Delete User Groups.
Specify a task name in the Delete User Groups window, and click Apply.
Managing the certificates of HP Systems Insight Manager
Remote Web Console supports single sign-on from HP Systems Insight Manager. A user who logs
in to HP Systems Insight Manager can operate Remote Web Console main window by simply
clicking Remote Web Console in the Tool menu of HP Systems Insight Manager. The user is not
required to enter user ID and password into Remote Web Console, because the user is already
logged in to HP Systems Insight Manager.
To implement single sign-on using HP Systems Insight Manager, you need to import a Remote Web
Console tool definition file into HP Systems Insight Manager, and register certificates of HP Systems
Insight Manager to SVP.
To stop using single sign-on function, delete the certificate from SVP, and then remove the tool
definition file from HP Systems Insight Manager.
Required role for single sign-on
All users who are allowed to log in to HP Systems Insight Manager can also log in to Remote Web
Console. The user group for Remote Web Console depends on what kind of role the user has when
the user logs in to HP Systems Insight Manager.
Table 11 User group of Remote Web Console user after single sign-on
Role for HP Systems Insight
Manager
User group of Remote Web Console
Administrator
Administrator User Group
Operator
• Storage Administrator (View & Modify)
• Audit Log Administrator (View & Modify)
User
• Audit Log Administrator (View Only)
• Security Administrator (View Only)
42
Setting up and managing user accounts
User accounts registered to HP Systems Insight Manager are different from the user accounts for
Remote Web Console. To implement single sign-on, you do not need to register user accounts of
HP Systems Insight Manager to Remote Web Console. If a user logs in with both ways (to log in
directly to Remote Web Console, and to log in with single sign-on from HP Systems Insight Manager),
make sure that the role of the user account registered to HP Systems Insight Manager matches the
role of Remote Web Console. If they do not match, the user has only the role of HP Systems Insight
Manager.
Importing a tool definition file into HP Systems Insight Manager
To implement single sign-on, you need to import a Remote Web Console tool definition file into
HP Systems Insight Manager.
Procedure 24 To import a Remote Web Console tool definition file into HP Systems Insight Manager:
1.
Download a Remote Web Console tool definition file from the following URL. Some Web
browsers may display the content of the tool definition file. In this case, save the displayed
content as an XML file by using the web browser.
https://IP-address-or-host-name-of-SVP/RWCTool.xml
2.
Execute the following command to import the XML file into HP Systems Insight Manager:
HP-SIM-installation-directory\bin>mxtool –af definition-file-path-of-the-tool
An example follows:
C:\Program Files\HP\Systems Insight Manager\bin>mxtool –af C:\tmp\RWCTool.xml
Registering the certificates for single sign-on
To implement single sign-on, the certificates of HP Systems Insight Manager must be registered to
SVP before a user logs in to HP Systems Insight Manager.
Whoever belongs to one of the following user groups is allowed to register the certificates of HP
Systems Insight Manager to SVP:
•
Administrator User Group
•
System User Group
•
Security Administrator (View & Modify) User Group
When you register a certificate, you can set an alias name for the certificate.
Procedure 25 To register certificates to SVP:
1.
Specify the following URL to open the Register Certificate window:
https://IP-address-or-host-name-of-SVP/cgi-bin/utility/sceEntry.cgi
2.
Enter the IP address or the host name of the HP Systems Insight Manager for which you want
to implement single sign-on.
NOTE:
3.
The IP address must be an IPv4 address.
Click Search. The information of the certificate appears on the Register Certificate window.
Managing the certificates of HP Systems Insight Manager
43
Figure 16 Register Certificate window
4.
5.
6.
7.
Verify the certificate. If the certificate has some incorrect information, click Cancel to go back
to the Register Certificate window.
If necessary, enter an alias name of the certificate into the Alias Name box. By default, the
IP address or the host name that you specified in the Register Certificate window is displayed
in the Alias Name box.
Enter the user name and password of Remote Web Console.
Click Register.
Deleting the certificates for single sign-on
Procedure 26 To delete certificates from SVP:
1.
Specify the following URL to open the Delete Certificates window:
https://IP-address-or-host-name-of-SVP/cgi-bin/utility/sceDelete.cgi
Figure 17 Register Certificate window (before retrieving)
2.
3.
4.
Select the check box of the certificates which you want to delete. To display the certificate,
click Detail. The IP address, the host name, or the alias name which you specified when you
registered the certificate(s), appears on the list in the Delete Certificates window.
Enter administrator, which is the user name and password of Remote Web Console.
Click Delete.
Removing a tool definition file from HP Systems Insight Manager
To remove a Remote Web Console tool definition file from HP Systems Insight Manager, execute
the following command:
44
Setting up and managing user accounts
HP-SIM-installation-directory\bin>mxtool –r -f definition-file-path-of-the-tool
An example follows:
C:\Program Files\HP\Systems Insight Manager\bin>mxtool –r -f C:\tmp\RWCTool.xml
Using SMI-S function with Remote Web Console user account
P9500 storage systems support the SMI-S function developed by SNIA. Storage administrators can
use the SMI-S function by using SMI-S compliant management software.
Prerequisite
SMI-S Provider program product is installed.
Procedure 27 To use the SMI-S function:
1.
Create a Remote Web Console user account in the management software.
The user must belong to either of the following built-in user groups.
•
Storage Administrator (View & Modify) User Group
The user has full permissions to access the SMI-S function from the management software.
•
Storage Administrator (View Only) User Group
The user has read only permissions to access the SMI-S function from the management
software.
2.
In the management software, specify the storage system that the management software should
access.
•
IP address: Specify the IP address of the storage system.
•
Protocol: Specify HTTPS.
•
Port: Specify 5989.
•
Namespace: Specify root/hitachi/smis or interop.
For details on SMI-S, see http://www.snia.org/.
Account lock policy
The user account is automatically locked after three unsuccessful logins to Remote Web Console
or RAID Manager. The account is locked for 60 seconds.
Session timeout
A session timeout occurs if the system receives no user operation for one minute due to a network
error.
Using SMI-S function with Remote Web Console user account
45
5 Configuring the Remote Web Console environment
This chapter provides instructions for setting customized behaviors on Remote Web Console,
including timeout and polling periods, email notifications, and so on. Also, instructions are included
for saving your Remote Web Console configuration settings and restoring them as needed.
Configuration overview
You can set up Remote Web Console as follows:
•
Create a message to display on the Remote Web Console login screen. See “Creating a login
message” (page 46).
•
Configure e-mail notification when certain system failures occur. See “Configuring e-mail
notification” (page 47).
•
Establish times for timeouts and polling limits. You can also hide the Alerts tab. See “Setting
time periods” (page 49).
•
Save Remote Web Console configuration settings, which are used if it becomes necessary to
restore the settings. See “Saving a copy of Remote Web Console configuration files” (page 50).
•
Restore configuration settings. See “Restoring a Remote Web Console configuration from
backup” (page 51)
•
Configure syslog notification when certain system failures occur. See “Setting syslog notification
for SIMs” (page 52).
Creating a login message
A login message is displayed in the Remote Web Console login window. You can use login
message to broadcast system messages and/or warnings. The following figure shows an example.
Figure 18 Warning banner on the login window
Prerequisite
•
You must have the Security Administrator (View & Modify) role to perform this task.
Procedure 28 To create a login message:
46
1.
Click Settings > Security > Login Message. The Remote Web Console secondary window
opens.
2.
Click
to change to Modify mode.
Configuring the Remote Web Console environment
3.
Enter the message in the window.
Alphanumeric characters and symbols can be used in the message. The maximum length of
the message is 2,048.
4.
Click Apply.
Setting e-mail notification for SIMs or SNMP traps
You can specify notification by email to key users when system failures occur. Failures reported in
the e-mail are the same as the SIMs displayed in the Alerts window or reported by SNMP traps.
•
You can configure e-mails for any SIMs caused by software licensing events or Thin Provisioning
threshold events.
•
With SNMP traps, e-mail notification eliminates the need for checking for failures in SNMP
manager.
You can also send a test e-mail.
SIMs failures reported by e-mail typically require user action. These SIMs are caused either by
reaching the trigger levels configured by the user, or by a software license needing user attention.
The following SIMs are reported by e-mail:
Table 12 SIM reference codes reported by e-mail
Reference code
Description
Alert level
SIM22 SIM23
SIM13
7F
F7
xx
Expiration
7F
F8
xx
Exceeded the licensed capacity
SERIOUS
7F
F9
xx
Program product invalidated by the expiration of the
prerequisite program product
SERIOUS
60
00
xx
Exceeded the pool usage threshold
Failure with
paired volumes
MODERATE
60
2x
xx
Pool blockade
Snapshot Pool
MODERATE
62
0x
xx
Exceeded the pool usage warning threshold
62
1x
xx
Exceeded the pool usage system threshold
Thin Provisioning MODERATE
Pool
MODERATE
62
2x
xx
Pool became full.
MODERATE
62
6x
xx
Exceeded the pool usage depletion threshold
MODERATE
63
0x
xx
Exceeded the Thin Provisioning volume usage
threshold
MODERATE
License key
SERIOUS
Configuring e-mail notification
Prerequisites
•
You must have the Storage Administrator (Initial Configuration) role to perform this task.
•
You must have a mail server that supports the Simple Mail Transfer Protocol (SMTP).
•
If a firewall is used, port 25 must be used.
Procedure 29 To configure settings for e-mail notice:
1.
Click Settings > Environmental Setting > E-mail Information. The E-mail Information window
opens.
2.
3.
Click
to change to Modify mode.
Select Enable in Mail Notice.
Setting e-mail notification for SIMs or SNMP traps
47
4.
5.
6.
7.
8.
Select IPv4, IPv6, or Host Name, and enter the IP address or host name of the mail server.
In SMTP-AUTH, select Enable to use SMTP authentication or Disable not to use SMTP
authentication. Enter the account and password for SMTP authentication if you select Enable.
Enter From Address (required) and Return Address (optional).
In To Address, add an e-mail address:
1. Select a blank row in the list.
2. Enter an e-mail address in the text box.
3. Select To, Cc, or Bcc for the attribute.
4. Click Update.
Repeat step 7 for all e-mail addresses.
To delete an e-mail address, select the target address in the list and click Delete. You can
choose multiple addresses and delete them at once.
To change an e-mail address, select the target address in the list and perform the same
operation for adding an address.
9.
Click Apply to apply the settings to the storage system.
Sending a test e-mail
After configuring e-mail notification, you should send a test e-mail to confirm your settings.
Prerequisites
•
You must have the Storage Administrator (Initial Configuration) role to perform this task.
•
Configuration of the mail server must be completed.
Procedure 30 To send a test e-mail:
1.
Click Settings > Environmental Setting > E-mail Information. The E-mail Information window
opens.
2.
3.
4.
5.
6.
Click
to change to Modify mode.
Make sure that Mail Notice is set to Enable and that the settings in the window are correct.
Click Test Send. A confirmation message appears.
Click OK.
Confirm that mail clients received the e-mail with the reference code 7FFFFF.
An example of a test e-mail follows:
Date: FRI 03 OCT 2009 10:10:10 +9000 (JST)
To: p9500_alarm@xxx.com
From: xxxx@itg.hitachi.com
Reply-To: xxxx@itg.hitachi.com
Subject: P9500 Report
Date : 03/10/2009
Time : 10:09:30
Machine : HP-P9500(Serial# 64019)
RefCode : 7FFFFF
Detail: This is Test Report.
The fields in the test e-mail follow.
Table 13 Details of e-mail for system failures notice
48
#
Item
Description
1
Date
Date and time when an e-mail was sent. This timestamp comes from the mail server.
2
To
E-mail address of the receiver.
Configuring the Remote Web Console environment
Table 13 Details of e-mail for system failures notice (continued)
#
Item
Description
3
From
E-mail address of the sender.
4
Reply-To
E-mail address to which replies from the receivers will be sent. Optional.
5
Subject
E-mail title. Cannot be changed.
6
Date
Date when a system failure occurred.
7
Time
Time when a system failure occurred.
8
Machine
Name and serial number of the storage system.
9
RefCode
Reference code. The same code as the one reported by SNMP traps.
10
Detail
Failure details. The same information as the one reported by SNMP traps.
See the HP P9000 SNMP Agent User Guide for reference codes and failure details.
Setting time periods
You can set the following Remote Web Console time periods:
•
Polling period for monitoring who is changing information while others are viewing
•
Time interval for monitoring disk controller and disk array unit status
•
Time period that a user is logged out of the SVP because of a network error
•
Time period when no changes are made that access the RMI server and the user is released
from Modify mode as a result
You can also specify whether to show or hide the Alerts tab.
Prerequisite
•
You must have the Storage Administrator (Initial Configuration) role to perform this task.
Procedure 31 To set the Remote Web Console environment parameters:
1.
Start a web browser and enter the following URL to open the tool panel:
http://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi
2.
3.
4.
5.
6.
Click Control Panel to open the Control Panel.
Enter the user ID and password and click Login.
Click the Set Env. tab to open the Set Env. dialog box.
Specify the Remote Web Console parameters as required.
Click Submit.
7.
8.
Click Exit (
) to close the Control Panel.
Log out of the Remote Web Console SVP and then log in again to make the new parameters
take effect.
Back up the Remote Web Console configuration file by downloading the file from the SVP.
9.
Remote Web Console environment parameters are described in the following table.
Table 14 Environment parameters
Item
Description
RMI time-out period
If the user cannot access the SVP for a certain period of time because of a network error, the
RMI time-out logs the user out of the SVP.
• The value of the RMI time-out period must be greater than the value set for the smallest polling
period, either for checking exclusive lock or for checking obstacles (see below for those
Setting time periods
49
Table 14 Environment parameters (continued)
Item
Description
parameters). For example, specify a value of the RMI time-out period to satisfy the following
condition:
RMI time-out period > min [A, B]
where
A = Polling period for checking exclusive lock
B = Polling period for checking obstacles, and min [A, B] indicates the minimum value selected
from A and B.
• The default is 1 minute. You can specify 1 minute, 5 – 60 minutes in 5-minute increments,
70 to 120 minutes in 10-minute increments, or One day (24 hours).
• This parameter cannot be disabled.
RMI time-out period
for Modify
If a user is in Modify mode but does not make any changes that access the RMI server for a
specified period of time, Modify mode is released, and the View mode appears.
• The default time period is 30 minutes. You can specify between 10 and 60 minutes in
10-minute increments, or between 120 and 360 minutes in 60-minute increments.
• Specify NO to disable this parameter.
Polling period for
checking exclusive
lock
Specify the polling period for monitoring who is changing information while in Modify mode
when other users are viewing the storage system information in View mode. The Locked and
Unlocked icons are automatically updated either when a user who is in Modify mode either
logs out from Remote Web Console or changes to View mode.
• The shorter the time period you specify, the more frequently the Lock/Unlock status is updated,
but this does increase network traffic.
• The default time period is 35 seconds. You can specify 5 to 60 in 5-second increments, or
70 to 120 in 10-second increments.
• Specify NO to disable this parameter.
Polling period for
checking obstacles
Specify a time interval to monitor the Disk Controller and Disk Array Unit status, which is indicated
by the Alerts window or the Remote Web Console secondary window.
• The default time period is 110 seconds. You can specify 5 to 60 seconds in 5-second
increments, and 70 to 120 seconds in 10-second increments for the parameter.
• Specify NO to disable this parameter.
• We recommend that you select NO when Option to hide Alerts window check box is selected.
Option to hide Alerts Specify whether to display the Alerts window. If the Hide Alerts window check box is selected,
window
the Alerts tab does not appear.
• By default, the check box is cleared.
• We recommend that you select NO for Polling period for checking obstacles when the Option
to hide Alerts window check box is selected.
Saving a copy of Remote Web Console configuration files
You can save a copy of various Remote Web Console configurations to a file and download it.
You can use the backup to restore a configuration if it becomes necessary.
Prerequisites
You must have one of the following permissions, depending on the configuration you are backing
up:
50
Configuring the Remote Web Console environment
Table 15 Remote Web Console configuration files
Configuration file
Description
Required role
User list
User account information registered to the Remote Web
Console.
Security Administrator (View
Only)
Env. parameters
The parameters settings in the Set Env. window.
Storage Administrator (Initial
Configuration)
Audit log setting
Settings made in the Syslog and Audit Log Transfer windows. Audit Log Administrator (View
Only)
External
authentication
Connection to the authentication server.
Security Administrator (View
Only)
External application
Connection to the authentication application.
Storage Administrator (Initial
Configuration)
Command View
Advanced Edition
Setting
Connection to Command View AE Device Manager.
Storage Administrator (Initial
Configuration)
Procedure 32 To download configuration files:
1.
Start a web browser and enter the following URL to open the tool panel:
http://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi
2.
3.
4.
5.
Click Control Panel to open the Control Panel.
Enter the user ID and password and click Login.
Click the Download tab to open the Download dialog box.
Click the files to be downloaded. You can only download the file that you have permission
to.
6. Click Submit. The Download File dialog box shows the list of the file to be downloaded.
7. Click Download. The File Download dialog box opens.
8. Click Save. The Save As dialog box opens.
9. Specify the name of a folder to save the compressed file, and then click Save to start
downloading.
10. Decompress the downloaded file (*.tgz) as required. To decompress the *.tgz file, use the
tool supporting the tar and gzip.
Restoring a Remote Web Console configuration from backup
You can restore a Remote Web Console configuration from the backup you created previously
(see “Saving a copy of Remote Web Console configuration files” (page 50)).
Prerequisites
You must have one of the following permissions, depending on the configuration you are restoring.
Table 16 Restoring configuration files
Configuration file
Description
Required role
User list
User account information registered to the Remote Web
Console.
Security Administrator (View &
Modify)
Env. parameters
The parameters settings in the Set Env. window.
Storage Administrator (Initial
Configuration)
Audit log setting
Settings made in the Syslog and Audit Log Transfer windows. Audit Log Administrator (View &
Modify)
External
authentication
Connection to the authentication server.
Security Administrator (View &
Modify)
Restoring a Remote Web Console configuration from backup
51
Table 16 Restoring configuration files (continued)
Configuration file
Description
Required role
External application
Connection to the authentication application.
Storage Administrator (Initial
Configuration)
Command View
Advanced Edition
Setting
Connection to Command View AE Device Manager.
Storage Administrator (Initial
Configuration)
Procedure 33 To restore the configuration files:
1.
Start a web browser and enter the following URL to open the tool panel:
http://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi
2.
3.
4.
5.
6.
7.
8.
9.
Click Control Panel to open the Control Panel.
Enter the user ID and password and click Login.
Click the Restore tab to open the Restore dialog box.
Click the files and click Browse to specify the directory of the file. You can only restore the
file that you have permission to.
Click Next.
Click the configuration files to restore.
Click Submit.
If the Password check dialog box opens, enter User ID, Password, and Re-enter Password of
the storage administrator on the backup user list, and click Submit on the Password check
dialog box.
The Restore File dialog box opens.
10. Confirm the restoring process has been completed successfully.
11. Click Close to close the dialog box.
Setting syslog notification for SIMs
You can be notified in syslog format when storage system failures occur. Failures notified in syslog
format are the same as failures reported by SIMs displayed in the Alerts window or failures reported
by SNMP traps.
Configuring syslog notification
You can configure settings so that system storage failures will be notified in syslog format.
Prerequisites
•
You must have Storage Administrator (Initial Configuration) role to perform this task.
•
You must have a server that supports syslogs.
•
If a firewall is used, a port must be opened to transfer syslogs.
Procedure 34 To configure settings for syslog notification:
1.
2.
3.
4.
5.
6.
52
Click Settings > Environmental Setting > Edit Syslog Server Settings.
Select Enable, and specify IP Address and Port Number to transfer syslogs to a primary server.
Select Enable, and specify IP Address and Port Number to transfer syslogs to a secondary
server.
Specify any name in Location Identification Name to identify the storage system.
Click Finish.
Specify a task name and click Apply.
Configuring the Remote Web Console environment
Sending a test syslog
After configuring syslog notification, you should send a test syslog to verify your settings.
Prerequisites
•
You must have Storage Administrator (Initial Configuration) role to perform this task.
•
Complete the configuration of the syslog server
Procedure 35 To send a test syslog:
1.
2.
3.
4.
5.
6.
7.
Click Settings > Environmental Setting > Edit Syslog Server Settings.
Make sure that the severs are set to Enable and that the settings in the window are correct.
Check Send a test message.
Enter a name in Location Identification Name field to identify the storage system.
Click Finish.
Specify a task name and click Apply.
Confirm that the syslog servers received the following log:
"RefCode:7FFFFF, This is Test Report."
Setting syslog notification for SIMs
53
6 License keys
Accessing program product functionality requires a license key. This chapter provides information
on license keys and instructions for installing, disabling, enabling, and uninstalling license keys.
Overview
When you install a license key, it is also enabled. Functionality for the program product you installed
is available for use in Remote Web Console.
The license key can be disabled, for example, to stop the day-count a term key. For example, if
you have a 365-day term key for a program product, the license server starts the count the day
you install the key. However, you may not use the license immediately, in which case you can
disable the key. Disabling stops the count. You can enable the key when ready to use it.
This chapter provides the following information in the order it is required:
•
“License key types” (page 54). Lists the key types; explains whether keys are permanent or
temporary; shows the term limit, if any; and the provides the estimated license capacity, if
required.
•
“Using the permanent key” (page 55). Explains that you can conserve the permanent key
when you are not using it.
•
“Using the term key” (page 55). Explains that you can conserve the term key when you are
not using it.
•
“Using the temporary key” (page 56). Explains that you can conserve the temporary key when
you are not using it.
•
“Using the emergency key” (page 56). Explains that you can conserve the emergency key
when you are not using it.
•
“Using the meter key” (page 56). Explains that you can conserve the meter key when you are
not using it.
•
“Estimating licensed capacity” (page 58). Provides information and instructions for calculating
license capacity according to your system and organization requirements.
•
“Installing and uninstalling program products” (page 61). Provides instructions for installing,
disabling, enabling, and uninstalling keys.
•
“Insufficient license capacity” (page 62) and “License key expiration” (page 63) provide
information for dealing with these situations.
License key types
To use a particular program functionality, you must enter a unique license key in Remote Web
Console. License keys are provided when you purchase program products. The following table
describes the license key types.
Table 17 License key types
54
Type
Description
Expiration
Estimating licensed
capacity
Temporary
For trial use (Try & Buy).
120 days
Not required
Permanent
For purchase.
No limit
Required
Term
For purchase. Days are deducted when the program
product is first activated with the Term key.
365 days
Required
License keys
Table 17 License key types (continued)
Type
Description
Expiration
Estimating licensed
capacity
Emergency
For emergency use. Use this key when:
30 days
Not required
• The temporary key or the term key is set to expire in
the near future and you cannot get the permanent key
in time because of special circumstances (for example,
a licensed server has crashed or there are problems
with the communication infrastructure).
• You do not intend to purchase the program product
but you need to undo a configuration change that was
made during the lifetime of the temporary key or the
term key.
If you forcibly install an emergency key to an program
product that has already has a permanent, term, or meter
key, the license of that program product will expire in 30
days.
Meter
For purchase (prepaid licensed capacity). With the
permanent license key, install an excess amount of the
permanent licensed capacity as the meter licensed
capacity. The meter licensed capacity reduces daily by
subtracting an excess amount of the permanent licensed
capacity from the meter licensed capacity.
The remaining Required
meter licensed
capacity / (the
used capacity
- permanent
licensed
capacity)
When you log in to Remote Web Console, a warning message appears if 45 days or less remain
before the expiration. See “Using the meter key” (page 56) for details.
Using the permanent key
You can purchase the permanent key to use a program product indefinitely. You must estimate a
licensed capacity required for using the program product and purchase a license key for the amount
of the required capacity.
•
If the license capacity is not enough, Not Enough License is displayed in the status field of the
License Key window, and the program product is not enabled.
•
If the capacity of the usable volume exceeds the licensed capacity while the storage system
is running, for example, an LDEV was additionally installed, Grace Period is displayed in the
status field of the License Key window. You can continue to perform the same operation as
the case where Installed is displayed, but the deficient amount of license must be purchased
within 30 days.
•
If the deficient amount of license is not installed, Not Enough License is displayed, and the
program product is disabled.
Using the term key
You can purchase the term key to use the program product for a specific number of days. You
must estimate a licensed capacity required for using the program product and purchase a license
key for the amount of the required capacity.
•
Not Enough License or Grace Period displays in the status field of the License Key window if
there is a deficiency of the license capacity.
•
You can enable or disable the term key for each program product. Unlike the temporary key
and the emergency key, the number of days the term key is enabled is counted as the number
of effective days of the term key rather than the number of elapsed days from the date of
installation.
Using the permanent key
55
•
The number of effective days is decremented by one day when the date is changed.
For example, if the term key is set to be enabled for 150 days at the time of installation and
the term key is disabled for 100 days and a total of 250 days have elapsed since the
installation, the number of remaining effective days of the term key is 215 days. This is
determined by subtracting 150 days from 365 days. By disabling the term key on the days
when the program product is not used, you can prevent the unnecessary decrease of the
period in which the term key can be used.
•
If the term key is expired, Not Installed displays in the status filed of the License key window,
and the program product is disabled.
Using the temporary key
You can use the temporary key for trial purposes. The effective term is 120 days from the time of
installation of the temporary key. The effective term is not increased even if the temporary key is
reinstalled during the effective term.
If the temporary key expires, you cannot reinstall the temporary key for 180 days. Expired displays
in the status field of the License Key window, and the program product is disabled.
Using the emergency key
You can use the emergency key if the license key cannot be purchased if an emergency such as
a system failure or a communication error.
You can also use the emergency key if the configuration of the program product that is installed
by the temporary key remains in the changed status and cannot be restored to the original status.
For example, if you do not plan to purchase the program product after using the temporary key
for trial purposes, you can restore the changed configuration to the original status by temporarily
enabling the program product by the emergency key.
CAUTION:
•
If the emergency key is installed in the program product in which the permanent key, the term
key or the meter key is installed, the effective term of the license key is 30 days. However,
because the emergency key can be reinstalled during the effective term, the effective term can
be restored to 30 days.
•
In other scenarios, the emergency key can be installed only once.
Using the meter key
The meter key is used for the program product in which the permanent key is installed if the used
capacity exceeds the licensed capacity of the permanent key.
For installing the meter key, the permanent key must be installed in advance. If another key than
the permanent key is installed, the meter key cannot be installed.
The licensed capacity of the meter key is checked at 13:00 every day based on the time of the
SVP. At this step, the used capacity per day is subtracted from the licensed capacity of the meter
key. If another function is being used, the check might be delayed.
Calculating the effective term of the meter key
The effective term of the meter key is calculated from the following three types of capacities.
•
The used capacity
•
The licensed capacity of the permanent key
•
The remaining licensed capacity of the meter key
The calculation formula is as follows.
56
License keys
Effective term = remaining licensed capacity of meter key / (used capacity
- licensed capacity of permanent key)
If the used capacity is within the licensed capacity of the permanent key, the license of the meter
key is not used, and the expiration date for use is not displayed. An example is shown next.
Example of licensed capacity of permanent key >= used capacity
The meter license is not used. Therefore, the licensed capacity of the meter key is not subtracted.
Meter is displayed in the key type field, and Installed is displayed in the status field.
Example of licensed capacity of permanent key + licensed capacity of meter
key >= used capacity
The meter license is used, and the licensed capacity of the meter key is subtracted. Meter is displayed
in the key type field, and Installed is displayed in the status field.
If the used capacity is 4TB, the licensed capacity of the permanent key is 3TB, and the licensed
capacity of the meter key is 2TB, the effective term is 2 days.
Remaining licensed capacity of meter key / (used capacity - licensed
capacity of permanent key)
= 2TB / (4TB - 3TB)
= 2 days
Example of licensed capacity of permanent key + licensed capacity of meter
key < used capacity
The meter license is used, and the licensed capacity of the meter key is subtracted. Meter is displayed
in the key type field, and Grace Period is displayed in the status field.
Calculating the effective term of the meter key
57
Restore the license status from the Grace Period status to the Installed status by any of the following
methods.
•
Add the licensed capacity of the meter key.
•
Add the licensed capacity of the permanent key.
•
Decrease the used capacity.
Grace Period status with meter key
With the license of the meter key, the amount of the licensed capacity of the permanent key
exceeding the used capacity is subtracted. In the “Example of licensed capacity of permanent key
+ licensed capacity of meter key < used capacity”, Grace Period is displayed in the status field of
the License Key window. The duration of the Grace Period is 30 days. The license for the deficient
amount must be purchased within the 30 days.
In the Grace Period term, the operation can be performed in the same manner as the Installed
status. However, as the license capacity of the meter key continues to be subtracted, the subtraction
continues even if the license capacity of the meter key becomes a negative value. For example:
•
If the licensed capacity of the meter key is -10TB and 20TB of license capacity is installed,
the remaining licensed capacity becomes 10TB.
•
If the licensed capacity is a negative value and more licensed capacity of the permanent key
than the used capacity is installed, the meter license is deleted.
If the license key for the deficient amount is not installed within the 30 days, the status is changed
to Not Enough License, and the program product is disabled. If more licensed capacity of the
permanent key than the used capacity is installed, the meter license is deleted.
Estimating licensed capacity
The licensed capacity is volume capacity that you are licensed to use with the program product.
You need to estimate the amount of capacity which you want to use with the program product
before you purchase the permanent key, the term key, or the meter key.
Program products and licensed capacity
There are three licensed capacity types, depending on the program product. The following table
describes the licensed capacity types.
Table 18 Licensed capacity types
Type
Description
Used capacity
The licensed capacity is estimated using one of the following capacity that the program
product will use. The capacity to be used for estimation differs depending on the program
product.
• Normal volumes (LDEVs)
• External volumes mapped to the storage system
• Pools
Mounted capacity
The licensed capacity is estimated using the capacity of created LDEVs in the storage system.
External volumes and virtual volumes are not included in the capacity.
Unlimited capacity
You can use the program product regardless of the volume capacity.
The following table lists the program products and the licensed capacity.
58
License keys
Table 19 Program products and licensed capacity
Option name
Licensed capacity
Notes
Open Systems Array Management
Mounted Capacity
Used only for open-system devices (including LUN
Manager, Open Volume Management, Volume
Shredder, Cache Residency, Data Retention, Database
Validator, Cache Partition).
Mainframe Array Management
Mounted Capacity
Used only for open-system devices (including Virtual
LVI, Cache Residency Z, Volume Security for
Mainframe, Volume Security Port Security Option,
Volume Retention.
Performance Monitor
Mounted Capacity
Auto LUN requires Performance Monitor.
Auto LUN
Auto LUN V2
Mounted Capacity
Continuous Access Synchronous
Used capacity for
normal volumes1
Continuous Access Synchronous Z
Used capacity for
normal volumes 1
Continuous Access Journal
Used capacity for
normal volumes1
Continuous Access Journal requires Continuous Access
Synchronous.
Continuous Access Journal Z
Used capacity for
normal volumes1
Continuous Access Journal Z requires Continuous
Access Synchronous Z.
Cont Access Journal 3DC & 4x4 Open
MF
Unlimited
Cont Access Journal 3DC & 4x4 Open MF is required
when you run the 3-Data Center (3DC) system using
Continuous Access Synchronous and Continuous
Access Journal, or when you run the 3DC system using
Continuous Access Synchronous Z and Continuous
Access Journal Z.
Business Copy/Snapshot
Used capacity for
normal volumes1
Business Copy Z
Used capacity for
normal volumes1
Compatible FlashCopy
Used capacity for
normal volumes1
Thin Provisioning
Used capacity
(Total pool
capacity)
Smart Tiers
Used capacity
(Total pool
capacity)
Parallel Access Volumes
Used capacity for
normal volumes
Hyper Parallel Access Volumes
Unlimited
Hyper Parallel Access Volumes requires Parallel Access
Volumes.
Compatible XRC
Used capacity for
normal volumes
For controller emulation types 2105 and 2107 only.
Mainframe Fibre Data Migration
Used capacity for
external volumes
Compatible High Performance FICON
®Connectivity
Unlimited
Estimating licensed capacity
59
Table 19 Program products and licensed capacity (continued)
Option name
Licensed capacity
External Storage
Used capacity for
external volumes
High Performance FICON Connectivity
Unlimited
Resource Partition
Unlimited
1
Notes
If you use V-VOLs of Thin Provisioning as P-VOLs or S-VOLs of Business Copy/Continuous Access Synchronous/Continuous
Access Journal, the license capacity of Business Copy/Continuous Access Synchronous/Continuous Access Journal is
calculated using the page capacity allocated to the Thin Provisioning V-VOLs (i.e., used pool capacity).
Calculating licensed capacity for a normal volume
The calculation of the normal volume capacity depends on the volume emulation type. Use the
formula in the following table to estimate capacity for purchase.
Table 20 Methods for calculating capacity of a normal volume
Volume emulation type
Formula for calculating capacity of a normal volume
3380-x
720 KB X (number of user cylinders)
3390-x
870 KB X (number of user cylinders)
OPEN-x
Same as the capacity specified when creating the volume
Note: In the left column of this table, "x" indicates a number or a letter. For example, OPEN-x refers to emulation types
such as OPEN-3 and OPEN-V.
An example is provided in the following table.
Table 21 Example of estimating capacity for purchase
Item
Value
Volume emulation type
3390-3
Number of user cylinders
3,339
Number of volumes
2,048
Total capacity of all the volumes
870 KB X 3,339 X 2,048 = 5,949,296,640 KB
5,949,296,640 KB / 1,024 = 5,809,860 MB
5,809,860 MB / 1,024 = 5,673.70 GB
5,673.70 GB / 1,024 = 5.54 TB
Estimated capacity for purchase
At lease 6 TB
Calculating licensed capacity for an external volume
Use the following equation to calculate the licensed capacity for an external volume:
External Volume Capacity (KB) = Volume Capacity (number of blocks) X 512 (bytes) / 1,024
Calculating pool capacity
The license capacity of Thin Provisioning is calculated using the total capacity of the Thin Provisioning
pool. If you use Thin Provisioning V-VOLs as P-VOLs or S-VOLs of Business Copy/Continuous Access
Synchronous/Continuous Access Journal, the license capacity of Business Copy/Continuous Access
Synchronous/Continuous Access Journal is calculated using the page capacity allocated to the
Thin Provisioning V-VOLs (that is, used pool capacity).
For more information on calculating pool capacity, see the HP P9000 Provisioning for Open
Systems User Guide.
60
License keys
Installing and uninstalling program products
To activate the program products on Remote Web Console, the program products must be installed
using license keys.
Installing program products using a license key code
Any Storage Administrator with modify permission can install license keys.
Procedure 36 To install a program product by using the license key code:
1.
Click Settings > Environmental Setting > License Key. The License Key window opens.
2.
3.
4.
Click
to change to Modify mode.
Select Key Code in Mode.
In Key Code, enter the license key code. You cannot copy and paste text from other
applications.
Click Install. The Status column changes to Install.
Click Apply. The status changes to Installed.
5.
6.
If installation fails, an error message window appears. To display the error details in the dialog
box, select the failed option and then click Detail.
Installing program products using a license key file
You can install multiple program products in a single procedure using a license key file. The license
key files are provided by HP.
The required time for installing a license key file depends on the number of license keys included
in the file. A file with 30 license keys can take about three minutes to install. A file with 1000
license keys can take about 60 minutes to install.
Prerequisite
•
The license key file name can be up to 200 alphanumeric characters but cannot include the
following symbols: ", \, ;, :, ,, *, ?, <, >, |, /,.
Procedure 37 To install program products using the license key file:
1.
Click Settings > Environmental Setting > License Key. The License Key window opens.
2.
3.
4.
Click
to change to Modify mode.
From Mode, click File. The Browse button becomes available.
Click Browse to display the dialog box, and then select the license key file (file extension is
plk) to be used for installing options on the displayed window. The selected file name appears
in the File Name text box.
Click Install.
Click Apply. The status changes to Installed.
If installation fails or an error occurs during the installation, a message appears listing the
failed options. To display the error details in the dialog box, select the failed option and then
click Detail.
5.
6.
7.
Enabling or disabling a license
The term key can be enabled or disabled. You can also enable the license when you install more
than one program product at once, however, some program products are not available because
the requirements for these program products are not satisfied. In such a case, satisfy the requirements
first, then enable the license.
Procedure 38 To enable or disable the license:
1.
Click Settings > Environmental Setting > License Key. The License Key window opens.
Installing and uninstalling program products
61
2.
3.
4.
5.
6.
Click
to change to Modify mode.
Select a desired program product in the list.
In License Status, select Enable or Disable.
Click Set. The Status column changes to Install or Install(Disabled).
Click Apply. The status changes.
Uninstalling program products
Procedure 39 To uninstall program products on the Remote Web Console:
1.
Click Settings > Environmental Setting > License Key. The License Key window opens.
2.
3.
4.
5.
6.
7.
Click
to change to Modify mode.
Select the desired option that you want to uninstall in the list.
From Mode, click Key Code.
Click Uninstall. The status changes to Remove.
Click Apply. The status changes from Installed to Not Installed.
On rare occasions, a program product option that is listed as Not Installed but still has available
licensed capacity (shown as XX TB) might remain in the list. In this case, select that option and
select Uninstall to reset the information.
Insufficient license capacity
If the license capacity becomes insufficient, a message appears when you log in to Remote Web
Console.
If you add LDEVs and the available amount of volume capacity exceeds the licensed capacity,
Grace Period appears under the Status column in the License Key window. In this case, you need
to purchase an additional license within 30 days to cover the capacity shortage.
If you use Thin Provisioning, the licensed capacity might become insufficient because the used
capacity of Thin Provisioning pools could increase even though you did not add any volumes. You
need to purchase an additional license within 30 days to cover the capacity shortage. For details
on how to calculate pool capacity, see the HP P9000 Provisioning for Open Systems User Guide.
In the meter license, for reducing the amount exceeding the permanent license capacity among
the used capacity ((permanent license capacity) + (meter licensed capacity) < (used capacity)), if
the meter licensed capacity becomes insufficient, Grace Period is displayed in the status column
on the License Key screen. In this case, you need to purchase an additional license within 30 days
to cover the capacity shortage.
The meter will continue to be reduced during the grace period. To stop the reduction, you will have
to reduce the used capacity to the permitted license capacity. All negative TB-days license must
be covered by an additional meter based license.
Exceeded capacity after LDEV, a pair, or pool volume is deleted
When the licensed capacity exceeds the mounted capacity after you reduce the number of LDEVs,
pairs or pools, Grace Period or Not Enough License might remain under the Status column in the
License Key window. In this case, use the Available button to refresh the status.
Procedure 40 To refresh the license status:
62
1.
Click Settings > Environmental Setting > License Key. The License Key window opens.
2.
3.
4.
5.
Click
to change to Modify mode.
In Mode, click Available.
Click Install. The Status column changes to Install.
Click Apply. The status changes to Installed.
License keys
License key expiration
When the license key of program product A expires, the license key of program product B is
disabled if program product B requires an enabled program product A. In this scenario,
Installed(Disabled) appears for program product B in the Status column of the License Key window.
After that, when you enable program product A, program product B is enabled automatically. If
Installed(Disabled) remains for program product B in the Status column, enable program product
B in the License Key window.
Once your license key expires, no new configuration settings can be made, and no monitoring
functions can be used with Performance Monitor. Configuration settings made before the expiration
of the license key remain in effect. You can cancel configuration changes for some program
products.
•
Configuration changes for Performance Monitor may be cancelled on the Port Control window
from the SVP (not from your Remote Web Console computer).
•
Configuration changes for the following program products can be cancelled from the SVP
(not from your Remote Web Console computer):
•
◦
Business Copy Z
◦
Business Copy/Snapshot
◦
Continuous Access Synchronous Z
◦
Continuous Access Synchronous
◦
Continuous Access Journal Z
◦
Continuous Access Journal
◦
Cont Access Journal 3DC & 4x4 Open MF
◦
Auto LUN
◦
External Storage Access Manager
Configuration changes for the following program products cannot be deleted:
◦
Mainframe Array Management
◦
Open Systems Array Management
◦
Parallel Access Volumes
◦
Hyper Parallel Access Volumes
License key expiration
63
7 Viewing and managing the storage system
This chapter describes how to navigate to storage system information, create and download system
configuration reports, and manage Remote Web Console tasks.
Overview
This chapter explains how to do the following in Remote Web Console:
•
Perform basic navigation to storage system information. See “Viewing storage system
information” (page 64).
•
Create, download, and delete system configuration reports. A total of 20 different reports can
be generated. See “Using reports to verify system changes” (page 66).
•
Manage the queued operations you have performed in Remote Web Console. This includes
a discussion on tasks, and suspending, resuming and deleting tasks. See “Managing tasks”
(page 74).
Viewing storage system information
This section describes high-level system information available in Remote Web Console, how to
view information in another application, shows how to create reports and how to manage tasks.
Storage system information appears immediately when you start Remote Web Console.
Viewing basic information
The main window shows basic information about the storage system.
Viewing specific information
You can view more specific information when you make a selection in the resource tree in the
left-hand pane.
64
Viewing and managing the storage system
Viewing other information
You can also find other system information such as port statuses and data regarding used and
unused resources. This information displays in a Remote Web Console secondary window.
1. Click Settings > Environmental Setting > License Key. Java starts.
2. If a message appears and asks if you want to run the Java application, click Run and the
Remote Web Console secondary window opens.
3. In the Remote Web Console secondary window, click File→Reports. The Report Display dialog
box opens.
4. Click the tab to display the Report Display dialog box.
5. To save information in the dialog box, click Export. In the dialog box that opens, enter location
and file name, then click Save.
Viewing port locations
You can view port locations by clicking Actions > Component > View Port Location.
Figure 19 Port location window
Each cluster has up to 16 printed circuit boards (PCBs) and the name of each PCB appears on the
header of the port list. The icons show the port name, port LED status, and equipment information
of port.
•
: This port is equipped and currently used. The cable is properly set. This port is available
for the operation.
•
: This port is equipped and available for the operation.
•
: This port is not equipped or not available.
Status icons for certain resources
The status of certain resources is indicated by the following icons:
Status
Description
The resource can be used normally.
The resource is in the following status.
• The resource can be used, but has a limit on I/O performance and so on.
• The status of the resource is changing.
Viewing storage system information
65
Status
Description
• The status of the resource is being confirmed.
• The resource has sub-resources of different status.
For example, parity groups are in this status if the statuses of logical volumes in the parity
groups are not the same.
In this case, the sub-resources might be blocked. Confirm the status of sub-resources.
The resource is in the following status.
• The resource cannot be used because the resource is blocked due to a failure or maintenance
operations.
• The status of the resource is unknown.
Restore the resource to the normal status.
Viewing Remote Web Console data using an external application
You can load and view data that is displayed in Remote Web Console in an external application,
such as HP Systems Insight Manager.
Prerequisites
•
The SVP must be configured to load Remote Web Console data to another application. Contact
your service representative.
•
To add an application, information about the application must be specified in the application
information file. Contact your service representative to ask about how to obtain the application
information file.
Procedure 41 To launch another application to view Remote Web Console data:
1.
2.
Open a Remote Web Console window and select rows that you want to view in another
application.
Click Settings→Launch Application→Application Name. The application starts with the selected
data.
Using reports to verify system changes
This section explains Remote Web Console reports and provides instructions for creating, viewing,
and deleting reports.
You can create reports in Remote Web Console of your storage system’s physical configurations
and logical settings. Doing this provides a copy of the settings when you intend to make changes.
If you make a similar report after the changes, then you can compare the reports to verify that new
settings were made as intended.
Remote Web Console reports can be saved in a CSV or HTML file. Tables in the HTML version of
the configuration report are sortable.
See “Storage configuration reports” (page 90) for descriptions of the individual reports.
Creating a configuration report
You can create up to 20 configuration reports, then view or download them.
Procedure 42 To create a configuration report:
1.
2.
3.
66
From General Tasks, click Create Configuration Report.
Specify a task name and click Apply. This task name will be used as the report name in the
Reports window. This process takes approximately 10 minutes to complete.
Click Refresh View to update the Reports window. The created report appears in the list.
Viewing and managing the storage system
Viewing a Remote Web Console report
Adobe Flash Player is necessary to view reports. For details on Flash Player, see “General
restrictions” (page 27).
Prerequisite
•
Users that create the report or users with the Storage Administrator (Initial Configuration) role
can view the report.
To download and view a report:
1.
2.
3.
4.
5.
6.
In the Remote Web Console tree, click Storage Systems→Reports.
Specify the report to download.
Click Download Reports.
Specify a folder in which to save a .tgz file.
Extract the downloaded .tgz file.
Display the report in the following ways:
For an HTML format report:
Open html\index.html in the extracted folder.
For a CSV format report:
Open a csv file in the csv folder in the extracted folder.
To display a report in the Reports window:
You can view only HTML format reports in the Reports window. You can view CSV format reports
in the previous procedure.
1. Click Storage Systems→Reports.
2. Click the report name to display in the Reports window.
The report is displayed in the Reports window.
In the Reports window, click the reports name in the list at the left, and you can view the report
at the right.
For details about each report, see “Storage configuration reports” (page 90).
Deleting a configuration report
You can delete a report when you no longer need it, or to make room in the Reports window when
the 20-report limit is about to be reached.
Prerequisite
•
You must have the Storage Administrator (Initial Configuration) role to perform this task.
Procedure 43 To delete a report:
1.
2.
3.
4.
In the tree, click Storage Systems→Reports.
Specify the report to delete.
Click Delete Reports.
Click Apply.
Creating a configuration report using the Report Configuration Tool
You can create a configuration report by using a command prompt if you use the Report
Configuration Tool. If you prepare a script file containing a series of commands and schedule a
task in Windows to execute the script at regular intervals, you can automate creation and deletion
of the configuration report.
Creating a configuration report using the Report Configuration Tool
67
Preparing a script file
Before creating a configuration report by using the Report Configuration Tool, you must write a
series of commands in script files. When writing scripts, you need to write several commands in
a script file. When you run the Report Configuration Tool, the commands in the script files execute
sequentially and then a configuration report is created or deleted. For details on the commands
for the Report Configuration Tool, see “Report Configuration Tool Command Reference (raidinf
commands)” (page 102).
Two examples of scripts are shown below. You can refer to these examples and create a script
file that suits your needs.
•
“Script example for creating a configuration report”
•
“Script example for downloading a configuration report”
Script example for creating a configuration report
This script logs the user in, deletes a configuration report, creates a configuration report, and logs
the user out, using the Report Configuration Tool.
For each command other than a logout, this example performs 3 retries at intervals of 2 minutes,
assuming that communication errors and other errors can occur. In addition, the delete report
command is executed with the -fill option before the add report command, so that the script
does not terminate when 20 configuration reports are accumulated in the web server (SVP).
REM
REM
REM
SET
SET
SET
SET
SET
REM
SET
REM
SET
SET
Create Report Script(CreateReport.bat)
USER=<Username for Remote Web Console>
PASS=<Password for Remote Web Console>
SERVER=<Hostname or IP address of SVP>
REPORT_NAME=DailyConfigurationReport
LOOP=2
LOOP:0-2 3Times
TIMEOUT=121
TIMEOUT 2[minutes]=120[s]
RAIDINF_PATH="C:\Program Files\raidinf"
/a CNT_LOGIN=0
:LOGIN_RETRY
REM ############################# LOGIN %CNT_LOGIN%
SET /a CNT_LOGIN=%CNT_LOGIN% + 1
%RAIDINF_PATH%\raidinf -login %USER% %PASS% -servername %SERVER%
if ERRORLEVEL 1 (
if %CNT_LOGIN% GTR %LOOP% GOTO :ABEND
CALL :SLEEP
GOTO LOGIN_RETRY
)
SET /a CNT_DEL=0
:DEL_RETRY
REM ############################# DELETE %CNT_DEL%
SET /a CNT_DEL=%CNT_DEL% + 1
%RAIDINF_PATH%\raidinf delete report -servername %SERVER% ^
-report %REPORT_NAME% -fill
if ERRORLEVEL 1 (
IF %CNT_DEL% GTR %LOOP% GOTO :ABEND
CALL :SLEEP
GOTO :DEL_RETRY
)
SET /a CNT_ADD=0
:ADD_RETRY
REM ############################# ADD %CNT_ADD%
68
Viewing and managing the storage system
SET /a CNT_ADD=%CNT_ADD% + 1
%RAIDINF_PATH%\raidinf add report -servername %SERVER% -report ^
%REPORT_NAME%
if ERRORLEVEL 1 (
IF %CNT_ADD% GTR %LOOP% GOTO :ABEND
CALL :SLEEP
GOTO ADD_RETRY
)
GOTO :END
EXIT /B
:SLEEP
REM
REM ############################# SLEEP with %TIMEOUT% sec
REM
ping 127.0.0.1 -n %TIMEOUT% > NUL
EXIT /B
:ABEND
REM ############################# ABEND
ECHO "Create Report Script was ABEND"
:END
REM ############################# Logout
%RAIDINF_PATH%\raidinf -logout -servername %SERVER%
Script example for downloading a configuration report
This script logs the user in, downloads a configuration report, and logs the user out, using the
Report Configuration Tool.
For each command other than logout, this example performs 3 retries at intervals of 2 minutes,
assuming that communication errors and other errors can occur. The downloaded configuration
report is accumulated for 3 generations in the C:\Reports folder by names from
Report_DailyConfigurationReport_1.tgz to
Report_DailyConfigurationReport_3.tgz. In addition, if the script for creating a
configuration report fails, generation copy is terminated so that the past configuration reports may
not be overwritten.
REM
REM Download Report Script(DownloadReport.bat)
REM
SET USER=<Username for Remote Web Console>
SET PASS=<Password for Remote Web Console>
SET SERVER=<Hostname or IP Address of SVP>
SET REPORT_NAME=DailyConfigurationReport
SET LOOP=2
REM LOOP:0-2 3Times
SET TIMEOUT=121
REM TIMEOUT 2[minutes]=120[s]
SET TARGETFOLDER=C:\Reports\tmp
SET REPORTFOLDER=C:\Reports
SET RAIDINF_PATH="C:\Program Files\raidinf"
REM
REM Create Report Folder
REM
IF NOT EXIST %REPORTFOLDER% (
MKDIR %REPORTFOLDER%
IF NOT EXIST %TARGETFOLDER% (
MKDIR %TARGETFOLDER%
)
)
SET /a CNT_LOGIN=0
:LOGIN_RETRY
Creating a configuration report using the Report Configuration Tool
69
REM ####################################### Login %CNT_LOGIN%
SET /a CNT_LOGIN=%CNT_LOGIN% + 1
%RAIDINF_PATH%\raidinf -login %USER% %PASS% -servername %SERVER%
if ERRORLEVEL 1 (
IF %CNT_LOGIN% GTR %LOOP% GOTO :ABEND
CALL :SLEEP
GOTO LOGIN_RETRY
)
SET /a CNT_DL=0
:DL_RETRY
REM ####################################### Download %CNT_DL%
SET /a CNT_DL=%CNT_DL% + 1
%RAIDINF_PATH%\raidinf download report -servername %SERVER% ^
-report %REPORT_NAME% -targetfolder %TARGETFOLDER%
if ERRORLEVEL 1 (
IF %CNT_DL% GTR %LOOP% GOTO :ABEND
CALL :SLEEP
GOTO :DL_RETRY
)
REM ####################################### Create Error Check
IF EXIST %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz (
IF EXIST %TARGETFOLDER%\Report_%REPORT_NAME%.tgz (
GOTO :FC_CHECK
) else (
GOTO :CHECK_END
)
) else (
GOTO :CHECK_END
)
:FC_CHECK
FC /B %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz ^
%TARGETFOLDER%\Report_%REPORT_NAME%.tgz > NUL
if ERRORLEVEL 1 (
REM
) else (
DEL %TARGETFOLDER%\Report_%REPORT_NAME%.tgz
GOTO :END
)
:CHECK_END
REM ####################################### Migrate Reports
IF EXIST %TARGETFOLDER%\Report_%REPORT_NAME%.tgz (
IF EXIST %REPORTFOLDER%\Report_%REPORT_NAME%_2.tgz (
COPY %REPORTFOLDER%\Report_%REPORT_NAME%_2.tgz ^
%REPORTFOLDER%\Report_%REPORT_NAME%_3.tgz
)
IF EXIST %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz (
COPY %REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz ^
%REPORTFOLDER%\Report_%REPORT_NAME%_2.tgz
)
IF EXIST %TARGETFOLDER%\Report_%REPORT_NAME%.tgz (
COPY %TARGETFOLDER%\Report_%REPORT_NAME%.tgz ^
%REPORTFOLDER%\Report_%REPORT_NAME%_1.tgz
DEL %TARGETFOLDER%\Report_%REPORT_NAME%.tgz
)
)
GOTO :END
EXIT /B
:SLEEP
REM ####################################### SLEEP with %TIMEOUT%
ping 127.0.0.1 -n %TIMEOUT% > NUL
70
Viewing and managing the storage system
EXIT /B
:ABEND
REM ####################################### ABEND
ECHO "Download Report Script was ABEND"
:END
REM ####################################### Logout
%RAIDINF_PATH%\raidinf -logout -servername %SERVER%
Executing a script file regularly
For executing the created script file regularly, register it as a task of Windows.
The following procedure uses the Windows schtasks command to register the script files created
at “Preparing a script file” (page 68) as tasks of Windows.
Registration example
•
Create a configuration report at 21:00 every day (CreateReport.bat).
•
Download a configuration report at 22:00 every day (DownloadReport.bat).
Operation procedure
1.
Store the two script files in the C:\Reports folder.
C:\Reports
CreateReport.bat
DownloadReport.bat
2.
Run the Windows schtasks command to register the two script files as a task of Windows.
Make sure that the <Username for Windows> parameter of this command is a user who
has write permissions to the following two folders.
•
C:\Reports folder
•
The log folder in the installation folder of the Report Configuration Tool
schtasks /create /tn CreateReport /tr "C:\Reports\CreateReport.bat" /sc DAILY /st 21:00:00 /ru <Username
for Windows> /rp <Password for Windows>
schtasks /create /tn DownloadReport /tr "C:\Reports\DownloadReport.bat" /sc DAILY /st 22:00:00 /ru
<Username for Windows> /rp <Password for Windows>
3.
Run the schtaks /Query command to confirm that the Windows task is registered.
C:\>schtasks /Query
Task name
Time of next execution
Status
================== ======================== ===============
CreateReport
21:00:00, 2011/05/17
DownloadReport
22:00:00, 2011/05/17
Execution example and explanation of script files
If the script file for creating a configuration report and the script file for downloading a configuration
file are executed for the first time, the Report_DailyConfigurationReport_1.tgz file is
created in the C:\Reports folder.
C:\Reports
CreateReport.bat
DownloadReport.bat
Report_DailyConfigurationReport_1.tgz
On the second day, Report_DailyConfigurationReport_1.tgz is renamed
Report_DailyConfigurationReport_2.tgz, and
Report_DailyConfigurationReport_1.tgz is newly created.
From the third day on, Report_DailyConfigurationReport_1.tgz and
Report_DailyConfigurationReport_2.tgz are renamed
Creating a configuration report using the Report Configuration Tool
71
Report_DailyConfigurationReport_2.tgz and
Report_DailyConfigurationReport_3.tgz, and
Report_DailyConfigurationReport_1.tgz are newly created. Since
Report_DailyConfigurationReport_3.tgz is overwritten, the reports for three days are
always accumulated in the C:\Reports folder.
C:\Reports
CreateReport.bat
DownloadReport.bat
Report_DailyConfigurationReport_1.tgz
Report_DailyConfigurationReport_2.tgz
Report_DailyConfigurationReport_3.tgz
<-Generated today
<-Generated yesterday
<-Generated two days ago
Error in executing Report Configuration Tool
When using the Report Configuration Tool, you might see Remote Web Console error codes and
other error codes that are unique to the Report Configuration Tool. For Remote Web Console error
codes, see HP P9000 Remote Web Console Messages. The error codes unique to the Report
Configuration Tool and the corresponding actions are as follows.
Error code
Error message
Cause of error and action
Return value
EW_COMERR
A certificate does not become
effective.
A certain period of time elapsed after a
login. Log in again.
131
A command was entered before a login.
Log in and then enter the command.
131
Please login again.
EW_COMERR
Login is necessary.
Please login again.
EW_ENFILE
No such folder.
Please refer to the help.
EW_ENOMEM
Memory allocate error.
Allocation of internal memory fails.
Terminate unnecessary programs or reboot
the server.
245
You cannot use the report name specified
by the -report option. Check the report
name and specify a new one.
131
131
Please refer to the help.
The hyphen (-) is not added to the option
parameter. See “Report Configuration Tool
Command Reference (raidinf commands)”
(page 102) and specify a new parameter.
Argument too long.
Either of the following causes is possible.
131
Please refer to the help.
• The length of a parameter of the
command exceeds 256 bytes.
Please other program terminate.
EW_INVOPA
Report name reserved.
Please check input '-report'
parameter.
EW_INVOPT
EW_LNGARG
The specified folder to download to is not
131
found. See “Report Configuration Tool
Command Reference (raidinf commands)”
(page 102) and specify the parameter again.
Invalid option.
• The length of all the parameters of the
command exceeds 1,021 bytes.
See “Report Configuration Tool Command
Reference (raidinf commands)” (page 102)
and specify a new parameter.
EW_MAXAPP
Maximum application start.
Please check starting application.
EW_MAXARG
Maximum argument.
Please refer to the help.
72
Viewing and managing the storage system
The maximum number of SVPs that you can 131
connect simultaneously is exceeded. Log out
of unnecessary SVPs and reconnect.
The number of parameters of the command 131
exceeds 10. See “Report Configuration Tool
Error code
Error message
Cause of error and action
Return value
Command Reference (raidinf commands)”
(page 102) and specify a new parameter.
EW_REQOPT
Required option list.
The option and parameters necessary for
131
the entered command are not entered. See
“Report Configuration Tool Command
Reference (raidinf commands)” (page 102)
and specify a new option and parameters.
Please refer to the help.
EW_SYSERR
System error.
Please call to service center.
EW_SYSERR
Install path is too long.
Specify the install path with up to
240 bytes.
EW_SYSERR
Certificate file invalid.
Please call to service center.
EW_SYSERR
The file is illegal.
Please move 'raidinfcer' file from
the installation directory.
An internal error occurred. Contact HP
Technical Support.
131
The installation path exceeds 240 bytes.
Specify within 240 bytes.
131
Updating certificate file fails. Contact HP
Technical Support.
131
The installation directory includes one file
that will overlap with another file to be
created by the Report Configuration Tool.
Because of this, the Report Configuration
Tool cannot start.
131
Remove the overlapping file from the
installation directory.
EW_SYSERR
Log file invalid.
Please call to service center.
EW_UNWCMD
Unknown command.
Please refer to the help.
EW_UNWOPT
Unknown option.
Please refer to the help.
EW_UNWOPT
Invalid environment value.
Please confirm the setting of
HTTP_PROXY.
EW_WEBERR
Web access error.
EW_WEBERR
Server name can not be resolved.
The syntax of the entered command is not
valid. See “Report Configuration Tool
Command Reference (raidinf commands)”
(page 102) and input a new parameter.
230
The entered option and parameter are not
valid. See “Report Configuration Tool
Command Reference (raidinf commands)”
(page 102) and input a new option and
parameter.
252
Unable to connect to the proxy server
252
specified by the environment variable. Check
the proxy server name.
An internal error occurred while connecting 131
Please confirm the setting of server. to the server. Check the setting of the server.
Please check the setting of server
name.
EW_WEBERR
The log file cannot be accessed. Contact HP 131
Technical Support.
Server is no response.
Input argument server is incorrect
or server is not ready.
The server specified by the -servername 131
option does not exist. Check the server name
and specify a new server.
No response from the server specified by
131
the -servername option. Make sure that:
• The correct server name is specified.
• The settings of the server are correct.
EW_WEBERR
Web access error.
Please check your network
equipment and cables.
An internal error occurred while connecting 131
to the server. Check the network devices and
cables.
Creating a configuration report using the Report Configuration Tool
73
Error code
Error message
Cause of error and action
EW_WEBERR
Web access error.
An internal error occurred while connecting 131
to the proxy server. Check the settings of the
proxy server.
Please confirm the setting of proxy
server.
EW_WEBERR
Proxy server name can not be
resolved.
Please check the setting of proxy
server name.
EX_CMDRJE
The control command rejected.
Return value
Unable to connect to the proxy server
131
specified by the environment variable. Check
the proxy server name.
The execution of the entered command was 221
rejected by the server.
Check the error messages of Remote Web
Console.
Managing tasks
This section describes tasks and the Tasks window, and provides instructions for managing tasks.
Because Remote Web Console operations are executed in the background, you are able to start
the next task immediately after performing the previous one. One way you keep track of your tasks'
progress is by entering a task name during each Remote Web Console procedure. Then you track
a task's status and other information using the Tasks window.
•
Each procedure you perform requires a task name. For example, when you provision or
configure the system, create a pair, or any other procedure, you are required to assign a
name for the task.
•
Each task is queued and then processed by the storage system in the order of its arrival.
Only one task is executed at the same time, except for the following. In the case of the following
operations, the next task may be executed before the current task completes or fails.
•
Create LDEVs
•
Format LDEVs
•
Shred LDEVs
•
Shrink Pool
•
Edit Encryption
Tasks window
The Tasks window can display 384 tasks, including up to 128 tasks whose statuses are In Progress,
Waiting and Suspended, and up to 256 tasks whose statuses are Completed and Failed. If the
number exceeds these limits, the oldest completed tasks are automatically removed from the window.
Managing your tasks
Remote Web Console allows you to suspend, resume, cancel, and prevent tasks from being
automatically deleted.
Prerequisite
74
•
Users that execute the task or users with the Storage Administrator (System Resource
Management) role can view the task details.
•
Users with storage modify permission can delete, suspend, or resume tasks, and enable or
disable auto deletion of tasks.
Viewing and managing the storage system
Procedure 44 To modify a task:
1.
2.
3.
4.
In the tree, click Storage Systems→Tasks. The list of tasks appears.
In the list, click the task or tasks that you want to modify.
On the bottom right corner of the window, click the corresponding button for the task you
want to perform.
•
Click Delete Tasks to delete or cancel a task.
•
Click Suspend Tasks to suspend a queued task.
•
Click Resume Tasks to resume a suspended task.
•
Click More Actions→Enable Auto Delete to have tasks automatically deleted from the task
list when they are completed.
•
Click More Actions→Disable Auto Delete to keep tasks in the task list even when they are
completed.
Verify the displayed settings and click Apply.
Stalled tasks
If a queued task is not performed over a reasonable period, check the following:
•
Did the task fail? Click failed to view the reason. then delete the task, correct the problem and
try the task again.
•
Are too many tasks in the task list because Auto Delete is disabled? Click Enable Auto Delete
to remove tasks from the window.
•
Is another program changing the storage system configuration? Check this by observing
whether Resource Lock is displayed for too long a time. If so, verify that another program is
running and then wait until its changes are completed.
•
The percentage of progress of an ongoing task may not change if some sort of operation is
in progress.
Setting the status refresh interval of the Tasks window
The Tasks window automatically updates every 60 seconds by default. This interval can be changed
using the following procedure.
Procedure 45 To change the refresh interval:
1.
2.
3.
Click Settings→Environmental Setting→Edit Information Display Settings.
Specify the interval for Task Screen Refresh Interval. If No Update is specified, the Tasks
window will not be automatically updated. In this case, to refresh the window, you must use
Refresh View or Refresh All.
Click Apply.
Managing tasks
75
8 Troubleshooting
This chapter provides information for identifying and correcting problems with Remote Web Console.
General troubleshooting
A system administrator is responsible for the operation and normal maintenance of the Remote
Web Console web client. Here are some guidelines for troubleshooting the Remote Web Console
web client:
•
Check the cabling and the LAN. Verify that both the computer and LAN cabling are firmly
attached, and that the LAN is operating properly.
•
Reboot the computer. Close any programs that are not responding. If necessary, reboot the
Remote Web Console computer and restart a Remote Web Console web client session.
•
Check for any general error conditions. For a complete list of Remote Web Console error
codes, see the HP P9000 Remote Web Console Messages.
•
Check the alert icon. Confirm the severity level of the storage system alert by clicking Alert on
the Remote Web Console main window. If you are unable to resolve an error condition,
contact HP Technical Support.
The following figure shows the workflow for troubleshooting.
Figure 20 Troubleshooting workflow
Checking alerts
The Remote Web Console main window displays an icon indicating whether service information
messages (SIMs) occurred in the storage system.
Procedure 46 To check details of a SIM:
1.
In the Remote Web Console main window, click Alert. The Alerts window opens.
Figure 21 Alert icon on Remote Web Console main window
76
Troubleshooting
2.
To check the details of each alert, select the list, and then click Detail.
The Detail dialog box displays the details of the error.
3.
If the following SIM reference codes appear, you must resolve the error:
•
601XXX and 602XXX (for Snapshot)
•
620XXX, 621XXX, 622XXX, 623XXX, 625XXX, 626XXX, and 630XXX (for Thin
Provisioning)
where XXX indicates the pool ID.
For details on how to resolve the error, see the HP P9000 Snapshot User Guide or the
HP P9000 Provisioning for Open Systems User Guide.
Logon errors
The following table describes logon errors.
Table 22 Logon errors
Error condition
Probable cause / Recommended action
1
The page is not displayed because of an Enter the URL of the desired SVP to the Trusted sites section of the
Invalid syntax error.
Internet Options dialog box.
2
Remote Web Console does not start even Close all the web browser windows and then clear the Java and web
though you try to start it many times.
browser cache.
3
A network error occurred when you
logged in to the Remote Web Console.
Close all dialog boxes and log in to the Remote Web Console again.
If the same error occurs, check the network environment.
Java application errors
The following table describes Java application errors.
Table 23 Java application errors
Error condition
Probable cause / Recommended action
1
One of the causes could be that the pop-up blocker function of your
web browser restricts Remote Web Console. Perform the same
operation on Remote Web Console. If the problem still remains after
you perform the operation multiple times, perform the following
actions:
Nothing happens after clicking the menu
on Remote Web Console. One minute
later, the application error
(20020,10800) occurs.
• Disable the pop-up blocker function of your web browser.
• Disable the pop-up blocker function of any browser plug-in/add-on.
If neither of the above can be performed in Internet Explorer, you can
open the window by clicking the Remote Web Console menu while
holding down the Ctrl key.
Another possible cause is that a Java application was not allowed to
start. If a message appears and asks if you want to run an application,
click Run.
If none of the above actions solves the problem, reinstall JRE.
2
When you click the Remote Web Console
menu, a message appears asking whether
to download the file
SJsvlSNStartServlet.do or
SJsvlAppStartServlet.do. One minute later,
the application error (20020,10800)
occurs.
The possible causes are that JRE is not installed in the Remote Web
Console computer, JRE installation failed, or the JRE add-on is disabled
on the web browser. Cancel the message asking about downloading,
and install JRE. If JRE is already installed, uninstall JRE and reinstall
it.
Logon errors
77
Table 23 Java application errors (continued)
Error condition
3
• The application errors (20020,10800
and 10,6027) occurs when clicking
the Remote Web Console menu.
Probable cause / Recommended action
Perform the same operation on Remote Web Console. If the problem
still remains after you perform the operation multiple times, the
probable causes are as follows:
• The application error (10,6027) occurs • Java on the Remote Web Console web client might have failed to
start due to timeout. Close all other applications in use and perform
and Remote Web Console terminates
the Remote Web Console operation again.
when clicking the Remote Web
Console menu.
• The version of Remote Web Console installed on the Remote Web
Console web client might not match the SVP version. Close all the
windows of your web browser and then clear the Java and web
browser cache.
• The Remote Web Console computer might have entered standby
or hibernate mode. Restart Remote Web Console computer.
• If a proxy server is used for network connections, the proxy cache
may be storing the older version of the program. If the problem
still remains after you clear the cache Java and web browser
caches, please contact your network administrator.
• The network connection between the SVP and the Remote Web
Console computer might be blocked by a firewall or some kind of
device. Check the firewall settings and contact your network
administrator.
If none of the above actions solves the problem, save the Java trace
file and log file on the Remote Web Console, and report to HP
Technical Support. Then restart the Remote Web Console.
4
Nothing happens after clicking the Remote Perform the same operation on Remote Web Console. If the problem
Web Console menu.
still remains after you perform the operation multiple times, close all
the Remote Web Console windows and clear the Java and web
browser caches.
5
The application error (1,7050) occurs
after clicking the Remote Web Console
menu.
The version of Remote Web Console installed on the Remote Web
Console computer might not match the SVP version. Close all the
windows of your web browser and then clear the Java and web
browser caches.
In addition, if a proxy server is used for network connections, the
proxy server cache may be storing the older version of the program.
If the problem still remains after you clear cache of both Java and
web browser, please contact your network administrator.
6
Java console is grayed out and does not
start when you try to open the Remote
Web Console secondary window (Java
application).
Restart the Remote Web Console computer, or terminate the Remote
Web Console process with the following method.
• For Windows:
Exit all applications using Java, and then terminate the javaw.exe
and javaws.exe applications through the Task Manager.
• For UNIX:
Exit all applications using Java, and then terminate javaw and
javaws with the kill command.
7
A message box remains displayed when Restart the Remote Web Console computer, or terminate the Remote
opening the Remote Web Console
Web Console process with the following method.
secondary window (Java application). The • For Windows:
Remote Web Console secondary window
Exit all applications using Java, and then terminate the javaw.exe
does not appear for a long time.
and javaws.exe applications through the Task Manager.
• For UNIX:
Exit all applications using Java, and then terminate javaw and
javaws with the kill command.
78
Troubleshooting
Table 23 Java application errors (continued)
Error condition
Probable cause / Recommended action
8
A message remains displayed when
opening the Remote Web Console
secondary window. and there is no
response.
The SVP may be set as an exception on the proxy setting of the web
browser. Make same setting on the Network Configuration dialog
box that can be opened from the General dialog box of the Java
Control Panel.
9
If you open the Java console dialog box
by selecting the Java icon on the system
tray while opening the Remote Web
Console secondary window (Java
application), the browser and Java
console may hang.
Do not open the Java console dialog box while opening the Remote
Web Console secondary window. If the browser and Java console
hang, restart the Remote Web Console computer.
10
The application error (20020,10800)
occurs after clicking the Remote Web
Console menu.
Perform the same operation on Remote Web Console. If the problem
still remains after you perform the operation multiple times, you might
have cancelled the displaying of the secondary window.
For example:
• You might have clicked Exit on the Security Warning window.
• You might have clicked Cancel on the Warning - Security window.
Close all the Remote Web Console windows and clear the Java and
web browser caches.
If the problem still remains after you clear both Java and web browser
caches, save the Remote Web Console trace file and the Java trace
file, and report to HP Technical Support.
11
The following message is displayed when You can continue to use Remote Web Console after selecting Yes.
you use Remote Web Console.
If the problem occurs in spite of repeating the operation, the following
reasons are possible.
• Java has discovered application
components that could indicate a
• The version of Remote Web Console installed on the Remote Web
security concern.
Console computer might not match the SVP version. Close all the
• Block potentially unsafe components
windows of your web browser and then clear the cache of both
from being run? (recommended)
Java and web browser.
• The application contains both signed • If a proxy server is used for network connections, the proxy server
and unsigned code. Contact the
cache may be storing the older version of the program. If the
application vendor to ensure that it has
problem still remains after you clear cache of both Java and web
not been tampered with.
browser, contact your network administrator.
12
In Internet Explorer, the following pop-up Third-party browser extensions of Internet Explorer might be enabled.
window appears when you open the
Disable third-party browser extensions as follows.
Remote Web Console secondary window.
1. In the Windows menu bar, click Tools > Internet Options, and then
"Internet Explorer has stopped working.
click the Advanced tab.
A problem caused the program to stop
2. In the Advanced tab, clear the Enable third-party browser
working correctly. Windows will close the
extensions (requires restart) check box.
program and notify you if a solution is
3. Restart Internet Explorer.
available."
13
In Internet Explorer, an application error The SmartScreen Filter function might be enabled when you use
(10,6027) occurs when you open the
Internet Explorer 8.0 or later.
Remote Web Console secondary window. Turn off SmartScreen Filter as follows.
1. In the Windows menu bar, click Safety > SmartScreen Filter > Turn
Off SmartScreen Filter.
2. Restart Internet Explorer.
No-response errors
The following table lists no-response errors.
No-response errors
79
Table 24 No-response errors
Error condition
Probable cause / Recommended action
1
The SVP (web server) might have been restarted. Wait for
approximately 10 minutes, and then restart Remote Web Console.
The following errors occur while you are
using Remote Web Console:
• 20121,107024
• 20121,107024 and 10,6027
2
3
An error (20121,107096) occurs
repeatedly while you are using Remote
Web Console.
The timeout error may occur on the Flash Player.
The following errors occur when using
Remote Web Console:
The probable causes are as follows:
• 20020,10800 and 10,6027
• 10,6027
Click
to close the Remote Web Console main window.
• The version of Remote Web Console installed on the Remote Web
Console computer might not match the SVP version. Close all the
windows of your web browser and then clear the cache of both
Java and web browser.
• The Remote Web Console computer might have entered standby
or hibernate mode. Restart Remote Web Console computer.
• If a proxy server is used for network connections, the proxy server
cache may be storing the older version of the program. If the
problem still remains after you clear cache of both Java and web
browser, please contact your network administrator.
If none of the above actions solves the problem, save the Java trace
file and log file on the Remote Web Console, and report to HP
Technical Support. Then restart the Remote Web Console.
4
Remote Web Console does not respond.
Remote Web Console may hang in the
following cases:
• The Remote Web Console main
window is grayed out even though the
Remote Web Console main window
does not display the percentage of the
progress, and you cannot perform any
operation for a long period of time.
When using the Remote Web Console main window, close the web
browser. When using the Remote Web Console secondary window,
exit Remote Web Console by pressing Ctrl+Alt+D.
If you cannot exit Remote Web Console, reboot the Remote Web
Console computer or restart Remote Web Console after exiting Remote
Web Console forcibly.
Remote Web Console main window:
• For Windows:
Exit all web browsers, and then terminate iexplorer.exe
• When you move a window displayed
through the Task Manager.
in front of the Remote Web Console
secondary window, the area behind
• For UNIX:
the window remains gray and does
Exit all web browsers, and then terminate firefox-bin using
not go back to normal for a long
the kill command.
period of time.
Remote Web Console secondary window:
• The entire Remote Web Console
window appears in gray and does not • For Windows:
go back to normal for a long period
Exit all applications using Java, and then terminate the javaw.exe
of time.
and javaws.exe through the Task Manager.
• You cannot perform any operation for
a long period of time even though the • For UNIX:
dialog box that says Loading... is
Exit all applications using Java, and then terminate javaw and
not displayed.
javaws with the kill command.
• The dialog box that says Loading...
opens when the window switches.
However, you cannot move the dialog
box or perform any operation for a
long period of time.
5
80
A network error occurred. There is no
response to an operation even after 30
minutes pass.
Troubleshooting
Restart the Remote Web Console computer. An operation may take
over 30 minutes depending on the use condition. For example, when
several Remote Web Console web clients are running, it may take a
long time.
Table 24 No-response errors (continued)
Error condition
Probable cause / Recommended action
6
An internal error occurs, or a web
browser ends abnormally.
Close all dialog boxes and log in to the Remote Web Console again.
If the same error occurs, restart the Remote Web Console computer.
7
During the Remote Web Console
operation, the Internet Explorer web
browser suddenly disappears.
Restart the Remote Web Console computer.
8
An error (1,4011) occurs while you are
using Remote Web Console.
The clock time of the Remote Web Console computer may have been
changed. Log in to Remote Web Console again.
9
The Remote Web Console computer is
suddenly rebooted.
Restart the Remote Web Console computer.
10
A Remote Web Console window is
forcibly closed during a time-consuming
process, such as LDEV formatting.
Close all windows, wait until processing finishes, and then restart
Remote Web Console.
11
A Remote Web Console window is closed Restart Remote Web Console. If you cannot log in, wait for one minute
incorrectly by:
and try again.
• Clicking
• Using commands such as File > Close
on the web browser, or
• Pressing the Alt and F4 keys.
12
13
During the Remote Web Console
operation, an add-on (Flash10e.ocx)
error occurs.
Restart the Remote Web Console computer.
If this error occurs repeatedly, reinstall Adobe Flash Player on the
Remote Web Console computer.
When you log out from the Remote Web The probable causes are as follows:
Console, an application error of Internet • Update programs may not have been applied to Internet Explorer
Explorer occurs.
on the Remote Web Console computer. Apply the latest update
program.
• Internet Explorer may be configured incorrectly.
Reinstall Internet Explorer on the Remote Web Console computer.
14
• When you click Refresh All or Refresh The probable causes are as follows:
View on the Remote Web Console
• Another application such as RAID Manager may be changing
main window, the percentage of
configuration. The window will be refreshed shortly after the
progress remains 99%.
configuration change ends.
• When you click Refresh All or Refresh • Auto LUN operations or Quick Restore operations may be in
View on the Remote Web Console
progress. The window will be refreshed shortly after the operations
secondary window, it displays the
end.
message "Loading" for a long time.
15
The Remote Web Console secondary
window disappears while you are using
the Remote Web Console secondary
window, and an error (20020-108000)
occurs.
Start up the Remote Web Console secondary window from the Remote
Web Console main window again. If this error occurs repeatedly,
close all the Remote Web Console windows that you open, and then
clear Java and web browser caches.
16
The Remote Web Console window turns
white and the following icon displays in
the center of the web browser when you
use Remote Web Console.
Restart the Remote Web Console computer.
Incorrect display errors
The following table lists incorrect display errors.
Incorrect display errors
81
Table 25 Incorrect display errors
Error condition
Probable cause / Recommended action
1
Only the Exit button, the Refresh and Refresh All
commands are effective when accessing the SVP
from the Remote Web Console.
The SVP might not be ready or perform some write
processes from the other system. Wait for a while, and
then click File > Refresh. If the SVP is not restored even
though you have clicked Refresh, click Refresh All.
2
Only the Exit button and the Refresh All command An error may have occurred in the SVP. Click File >
are effective when accessing the SVP from the Remote Refresh All. If the SVP is not restored even though you
Web Console.
have clicked Refresh All, log in to Remote Web Console
again.
3
You have clicked the Reports command, and then
you have opened the setting dialog box of the other
program product before the displaying processing
(acquiring information for the Report Display dialog
box) has not been finished. As a result, the Report
Display dialog box remains in the status of displaying
processing and does not reply.
Close the setting dialog box of the other program
product that is opened. After the processing of
displaying the Report Display dialog box has been
finished, reopen the setting dialog box for the program
product.
4
The commands in the Go menu are unavailable.
The required program product options might not be
installed or an error might occur on the window that
appears after clicking the command.
Make sure that all the required program product options
are installed. If they are installed, perform one of the
following operations.
• Click File > Refresh.
• Click File > Refresh All.
• Log in to Remote Web Console again.
5
When you switch windows from one window to the
Remote Web Console window, the Remote Web
Console window is not displayed.
Close all windows, and then log in to the Remote Web
Console again.
6
The items in a list are not synchronized with a scroll
bar.
Click the scroll buttons (
scroll bar.
7
A focus disappears from the edit box.
Close all dialog boxes, and then log in to the Remote
Web Console again.
8
The display of the web browser becomes incorrect,
because some GUI items such as labels and icons
cannot be loaded properly.
Log out from the Remote Web Console, and then log
in again. If this error occurs before you log in to the
Remote Web Console, close all dialog boxes and then
log in to the Remote Web Console.
9
The characters are unreadable because they are
overlapped or garbled.
Log out from the Remote Web Console, and then log
in again.
10
The characters are garbled in a window where a
tree is displayed.
Click File > Refresh.
11
Even though you have clicked Apply to change the
settings, the new settings are not displayed on the
Remote Web Console window.
Click File > Refresh.
12
The dialog box that says Loading... stays open
for a long period of time.
A Remote Web Console message dialog box other
than the dialog box that says Loading... might be
displayed behind this window. Press Alt key and Tab
key to switch the dialog box.
or
) above and below the
If the dialog box that says Loading... remains
displayed for several hours after you apply the settings
to the storage system, contact HP Technical Support.
82
Troubleshooting
Table 25 Incorrect display errors (continued)
Error condition
Probable cause / Recommended action
13
• When the question mark is displayed in the View
Tier Properties window, see the section describing
the window in the HP P9000 Provisioning for Open
Systems User Guide. If the problem still persists,
contact HP Technical Support.
A question mark (?) is displayed in a table and so
on.
• When the question mark is displayed in the Add
External Volumes window, see the section describing
the window in the HP P9000 External Storage for
Open and Mainframe Systems User Guide. If the
problem still persists, contact HP Technical Support.
• If the question mark is displayed in another window,
refresh the window. Contact HP Technical Support
if the question mark remains after you refresh the
window.
14
The product name, vendor name, and function name Contact HP Technical Support.
displayed in Remote Web Console are incorrect.
15
A part of the Remote Web Console window in not
displayed.
16
Following information does not display on the Remote Click File > Refresh.
Web Console windows.
If the problem continues, close all Remote Web Console
• Information on the storage system, such as ports windows, and then clear Java and Web browser
caches.
or HDDs
You may be using the zoom in and zoom out function
of the web browser. Do not this zoom in and zoom out
function of the web browser when using Remote Web
Console.
• Information configured with another Remote Web
Console computer
UNIX operation errors
The following table lists UNIX operation errors.
Table 26 UNIX operation errors
Error condition
Probable cause / Recommended action
1
If you click on the Remote Web Console secondary
window while a dialog box is open, the dialog box
disappears behind the Remote Web Console secondary
window.
Click on the dialog box once more.
2
If you click on the Remote Web Console secondary
Click on the Auto LUN window once more.
window while the Auto LUN window is displayed, the
window will disappear behind the Remote Web Console
secondary window.
3
The
button on the Auto LUN window remains active,
even if you click Apply and the processing is being
executed.
Click
to close the window. Even if the window
is closed, the processing will continue normally.
4
The web browser is incorrectly displayed because GUI
items, such as labels and icons, cannot be loaded
properly.
When you use Remote Web Console on the
Japanese version of Firefox, log out from Remote
Web Console once, and then log in to Remote
Web Console again. Enter the following
commands using the X Server Emulator.
Part of a button is outside the window.
• B Shell:
LANG=C
UNIX operation errors
83
Table 26 UNIX operation errors (continued)
Error condition
Probable cause / Recommended action
export LANG
• C Shell:
setenv LANG C
5
The web browser closes abnormally.
If a "java_vm" process and a "mozilla" process
remain abnormally due to the hanging of a Firefox
browser, Remote Web Console performance
becomes abnormal. If this occurs, delete the
abnormal processes first before continuing the
Remote Web Console operations.
Other errors
The following table lists other errors that might occur in Remote Web Console.
Table 27 Other errors
Error condition
Probable cause / Recommended action
1
The microcode on the SVP is upgraded.
Exit all web browsers on the Remote Web Console computer, and
then restart the browsers.
2
Remote Web Console processing is
temporarily delayed.
Internal processing (such as, configuration change, P.P. check, or
operational information acquisition) might be occurring on the SVP
(web server).
3
Remote Web Console processing is
delayed.
The local storage value for Adobe Flash Player might become smaller.
Do the following:
1. Right-click on the Remote Web Console main window and click
Settings to open the Adobe Flash Player Settings window.
2. In the local storage settings, move the slider until Unlimited appears
and then click Close.
3. Close Remote Web Console.
4. Restart Remote Web Console.
5. If the local storage confirmation dialog box appears, click Allow.
4
An error occurred because a digital
You can continue using Remote Web Console even though the digital
signature or security certificate is expired. signature for the Remote Web Console Java application is expired.
5
You specify IPv6 communication
addresses when you start Remote Web
Console.
However:
• IPv4 communication is used.
• IPv4 addresses are output to audit logs
for operations on the Remote Web
Console secondary window.
6
If you are unable to resolve an error
condition.
IPv4 has higher priority when both IPv4 communication and IPv6
communication can be used. As a result of this, IPv4 may be used
when you specify IPv6 communication addresses. Also, IPv4 addresses
may appear in audit logs.
For details on configuring only IPv6 communication, see “Enabling
IPv6 communication ” (page 12).
Perform the following operations and then contact HP Technical
Support:
• Copy the Remote Web Console detailed trace files onto floppy
disks using the FD Dump tool.
• Obtain the Java log and trace files.
Clearing the Java and web browser caches
When an error occurs on Remote Web Console, clear the Java and web browser cache to solve
the problem.
84
Troubleshooting
Clearing the Java cache
To clear the Java cache, click Delete the temporary files in the General dialog box of the Java
Control Panel.
Clearing the web browser cache
To clear the cache in Internet Explorer, click Tools > Internet Options, and then click the General
tab. Click Delete Files in the General dialog box.
To clear the cache in Firefox, click Edit > Preferences. In the displayed dialog box, click Advanced
> Cache, and then click Clear Cache.
Firefox web browser problems on UNIX
If a java_vm process or a Firefox web browser process becomes hung up, Remote Web Console
performance becomes abnormal. Delete the abnormal process and continue with Remote Web
Console operations.
When you use Remote Web Console on the Japanese version of the Firefox web browser, you
must use the X Server Emulator to properly configure the browser.
In a B Shell, enter the following command:
LANG=C
export LANG
In a C Shell, enter the following command:
setenv LANG C
When you use Remote Web Console on the Firefox web browser, movements of the focus may
differ from those of Internet Explorer. Examples are shown below.
•
When the Remote Web Console login window appears, the focus in not on the User Name
box. Even if the User Name box is emphasized, you cannot enter any character with your
keyboard.
•
When you move the focus by using the Tab key, the destination browser window does not
become active.
When you click Logout at the upper right in the Remote Web Console main window on Firefox
web browser, the Remote Web Console login window appears after the logout (with Internet
Explorer, the window closes after the logout).
Downloading trace files using the FD Dump tool
Use the FD Dump tool to download trace files onto a hard disk drive. The downloaded trace files
can be used for the following reasons:
•
For troubleshooting purposes. Use the FD Dump tool to download trace files from SVP and
give it to the HP service personnel.
•
For checking configuration. First click Refresh All command to refresh the configuration
information, and then use the FD Dump tool to download trace files.
Prerequisites
•
No other user (including SVP user) should be using the FD Dump tool.
•
No maintenance operation is being performed.
Procedure 47 To download trace files from the SVP:
1.
Start a web browser and specify the following URL to open the Tool Panel:
https://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgi
2.
Click Download Trace Files. The Login dialog box opens.
Firefox web browser problems on UNIX
85
3.
4.
5.
6.
7.
8.
9.
Enter the user ID and password and click Login. The Download Trace Files dialog box opens.
Select a file that you want to download.
•
Normal Trace includes all information about SVP and the minimum information about the
storage system. Select this when you have a less serious problem such as incorrect display.
•
Detail Trace includes all information about the storage system as well as the same
information as Normal Trace. Select this when Remote Web Console has a serious problem
(for example, Remote Web Console does not start) or when you need to determine if the
storage system has a problem.
•
Existing Trace indicates the trace file the last time you downloaded.
Click Next >>. A message appears confirming the execution of compression of the trace files.
Click OK. A file compression processing starts. When the file is compressed, the Download
Trace Files dialog box opens for starting download.
Click Download. The File Download dialog box opens.
On the File Download dialog box, click Save this file to disk, and then click OK. The Save As
dialog box opens.
Specify the download destination, and then click Save. When the file is downloaded
successfully, the Download complete dialog box opens.
Saving Java log and trace files
Before you contact your service representative, save the Java log and trace file on your Remote
Web Console computer, and then restart the web browser.
An example of the Windows trace and log file locations follows:
•
C:\Users\logon user
ID\AppData\LocalLow\Sun\Java\Deployment\log\*.trace
•
C:\Users\logon user ID\AppData\LocalLow\Sun\Java\Deployment\log\*.log
An example of the UNIX trace and log file locations follows:
86
•
user home directory\.java\deployment\log\*.trace
•
user home directory\.java\deployment\log\*.log
Troubleshooting
9 Support and other resources
Contacting HP
For worldwide technical support information, see the HP support website:
http://www.hp.com/support
Before contacting HP, collect the following information:
•
Product model names and numbers
•
Technical support registration number (if applicable)
•
Product serial numbers
•
Error messages
•
Operating system type and revision level
•
Detailed questions
Subscription service
HP recommends that you register your product at the Subscriber's Choice for Business website:
http://www.hp.com/go/e-updates
After registering, you will receive e-mail notification of product enhancements, new driver versions,
firmware updates, and other product resources.
Documentation feedback
HP welcomes your feedback.
To make comments and suggestions about product documentation, please send a message to
storagedocsfeedback@hp.com. Include the document title and manufacturing part number. All
submissions become the property of HP.
Related information
The following documents [and websites] provide related information:
•
HP P9000 External Storage for Open and Mainframe Systems User Guide
•
HP P9000 Provisioning for Open Systems User Guide
•
HP P9000 Remote Web Console Messages
•
HP P9000 Remote Web Console User Guide
•
HP P9000 SNMP Agent User Guide
•
HP P9000 Spreadsheet Guide
You can find these documents on the Manuals page of the HP Business Support Center website:
http://www.hp.com/support/manuals
In the Storage section, click Disk Storage Systems for hardware or Storage Software for software,
and then select your product.
Contacting HP
87
HP websites
For additional information, see the following HP websites:
•
http://www.hp.com
•
http://www.hp.com/go/storage
•
http://www.hp.com/service_locator
•
http://www.hp.com/support/manuals
•
http://www.hp.com/support/downloads
•
http://www.hp.com/storage/whitepapers
Conventions for storage capacity values
P9000 disk arrays use the following values to calculate physical storage capacity values (hard
disk drives):
•
1 KB (kilobyte) = 1,000 bytes
•
1 MB (megabyte) = 1,0002 bytes
•
1 GB (gigabyte) = 1,0003 bytes
•
1 TB (terabyte) = 1,0004 bytes
•
1 PB (petabyte) = 1,0005 bytes
•
1 EB (exabyte) = 1,0006 bytes
P9000 disk arrays use the following values to calculate logical storage capacity values (logical
devices):
•
1 KB (kilobyte) = 1,024 bytes
•
1 MB (megabyte) = 1,0242 bytes
•
1 GB (gigabyte) = 1,0243 bytes
•
1 TB (terabyte) = 1,0244 bytes
•
1 PB (petabyte) = 1,0245 bytes
•
1 EB (exabyte) = 1,0246 bytes
Typographic conventions
Table 28 Document conventions
Convention
Element
Blue text: Table 28 (page 88)
Cross-reference links
Blue, bold, underlined text
email addresses
Blue, underlined text: http://www.hp.com
Website addresses
Bold text
• Keys that are pressed
• Text typed into a GUI element, such as a box
• GUI elements that are clicked or selected, such as menu
and list items, buttons, tabs, and check boxes
Italic text
88
Support and other resources
Text emphasis
Table 28 Document conventions (continued)
Convention
Element
Monospace text
• File and directory names
• System output
• Code
• Commands, their arguments, and argument values
Monospace, italic text
• Code variables
• Command variables
Monospace, bold text
WARNING!
CAUTION:
IMPORTANT:
NOTE:
TIP:
Emphasized monospace text
Indicates that failure to follow directions could result in bodily harm or death.
Indicates that failure to follow directions could result in damage to equipment or data.
Provides clarifying information or specific instructions.
Provides additional information.
Provides helpful hints and shortcuts.
Typographic conventions
89
A Storage configuration reports
This appendix describes the configuration reports you can generate. To create, download, and
delete reports, see “Using reports to verify system changes” (page 66).
Reports are shown according to how they display in tables, graphs, and CSVs.
Reports in table view
This section describes the reports shown in table format, as seen in the following example. Report
icons ( ) are displayed before names of reports in table view. When the icons are not displayed
properly, refresh the window.
Figure 22 Table report (example: Ports)
•
Click each column header to sort tables in table reports.
•
When the table is reading a large amount of data, the table columns cannot be manipulated,
sorted, and resized, but it is possible to view already displayed items, select rows, and scroll.
Disk Adapters report
This report is about disk adapters. A record is created for each disk adapter.
Table 29 Disk Adapters report
Item
Description
DKA
Location of the disk adapter.
• "External" is displayed when the storage system has external
storages.
• "External (FICON DM)" is displayed when the storage system
has volumes for FICON DM.
Module
Module number.
Blank indicates that "DKA" is "External" or "External (FICON
DM)".
90
Storage configuration reports
Table 29 Disk Adapters report (continued)
Item
Description
Number of PGs
The number of the parity groups that the disk adapter controls.
• This item indicates the number of parity groups mapped to
external volumes if "DKA" is "External".
• This item indicates the number of parity groups mapped to
volumes for FICON DM if "DKA" is "External (FICON DM)".
Number of LDEVs (Total)
The number of the logical volumes belonging to the parity groups
that the disk adapter controls.
Number of LDEVs (Unallocated)
The number of the logical volumes that are accessible from the
host and belong to the parity groups controlled by the disk
adapter.
Total LDEV Capacity (MB)
Total capacity of the logical volumes belonging to the parity
groups that the disk adapter controls.
Unallocated LDEV Capacity (MB)
Total capacity of the logical volumes that are inaccessible from
the host and belong to the parity groups controlled by the disk
adapter.
Host Groups report
This report is about host groups. A record is created for each host group.
Table 30 Host Groups report
Item
Description
Port Location
Name of the port.
Host Group
Name of the host group.
Resource Group Name
Resource group name where the host group belongs.
Resource Group ID
Resource group ID where the host group belongs.
Number of LUNs
The number of LU paths defined to the host group.
Number of LDEVs
The number of the logical volumes accessible from the hosts in
the host group.
Number of PGs
The number of the parity groups having the logical volumes
accessible from the hosts in the host group.
Number of DKAs
The number of the disk adapters controlling the parity groups
where the logical volumes accessible from the hosts in the host
group belong.
Total LDEV Capacity (MB)
Total capacity of the logical volumes accessible from the hosts
in the host group.
This is the total capacity of LDEVs referred to in "Number of
LDEVs".
Port Security
Security of the port.
Host Mode
Host mode of the host group.
Host Mode Option
Host mode option of the host group.
Host mode options are separated by semicolons (;) when more
than one option is specified.
Number of Hosts
The number of the hosts in the host group.
Reports in table view
91
Hosts report
This report is about hosts. A record is created for each host. When a host is registered to more
than one port, more than one record shows information about the same host.
Table 31 Hosts report
Item
Description
Port Location
Name of the port.
Port Internal WWN
WWN of the port.
Port Security
Security of the port.
Host Group
Name of the host group.
Host Mode
Host mode of the host group.
Host Mode Option
Host mode option of the host group.
Host mode options are separated by semicolons (;) when more
than one option is specified.
Host Name
Name of the host that can access the LU path through the port.
HBA WWN
WWN of the host.
Logical Device Expansions report
This report is about LUN Expansion (LUSE). Information about one LUSE volume consists of contiguous
records.
You can sort only Top LDEVs in this report.
Table 32 Logical Device Expansions report
Item
Description
Top LDEV
Logical volume number of the first volume.
Member LDEVs
Logical volume number of the logical volume of the LUSE volume.
Emulation Type
Emulation type of the logical volume of the LUSE volume.
Total LDEV Capacity (MB)
Capacity of the LUSE volume.
Individual LDEV Capacity (MB)
Capacity of each logical volume of the LUSE volume.
Number of Member LDEVs
The number of the logical volumes of the LUSE volume.
PG
Parity group number of the parity group that the logical volumes
of the LUSE volume belong to.
If the number starts with "E" (for example, E1-1), the parity group
contains external volumes.
92
RAID Level
RAID level of the parity group where the logical volumes
comprising the LUSE volume belong.
Drive Type-Code
Type code of the drive of the parity group where the logical
volumes comprising the LUSE volume belong.
Drive Capacity
Capacity of the drives of the parity group where the logical
volumes comprising the LUSE volume belong.
SSID
SSID of the logical volume of the LUSE volume.
CMD Dev
Information about whether the LUSE volume is a command device.
Storage configuration reports
Logical Devices report
This report is about logical volumes. A record is created for each logical volume.
Table 33 Logical Devices report
Item
Description
LDEV ID
The logical volume number.
LDEV Name
The name of the logical volume.
Capacity (MB)
Capacity of the logical volume.
Emulation Type
Emulation type of the logical volume.
Resource Group Name
Resource group name where LDEV belongs.
Resource Group ID
Resource group ID where LDEV belongs.
PG
The parity group number of the parity group.
• If the number starts with "E" (for example, E1-1), the parity
group contains external volumes (External Storage).
• If the number starts with "M" (for example, M1-1), the parity
group contains volumes for FICON DM.
RAID Level
RAID level of the parity group where the logical volume belongs.
Drive Type/RPM
Drive type and round-per-minute (RPM) of the drive of the parity
group where the logical volume belongs.
A hyphen (-) is displayed as RPM when the drive is SSD.
Drive Type-Code
Type code of the drive of the parity group where the logical
volume belongs.
Drive Capacity
Capacity of the drive of the parity group where the logical volume
belongs.
PG Members
List of the drive locations of the parity group where the logical
volume belongs.
Allocated
Information about whether the host can access the logical volume.
For mainframe volumes and multiplatform volumes, "Y" is
displayed unless the volumes are in the reserved status.
For logical volumes of a LUSE volume, "Y" is displayed if the LU
path is defined to the LUSE volume.
SSID
SSID of the logical volume.
CVS
Information about whether the logical volume is a customized
volume.
OCS
Oracle checksum.
LUSE
Information about whether the logical volume is a part of a LUSE
volume.
"On" is displayed when the logical volume is the first volume of
a LUSE volume.
"Off" is displayed when the logical volume is the second or later
volume of a LUSE volume, or not a part of a LUSE volume.
Attribute
Attribute of the logical volume.
Provisioning Type
Provisioning type of the logical volume.
Reports in table view
93
Table 33 Logical Devices report (continued)
Item
Description
Pool Name
Pool name.
• The name of the pool related to the logical volume is displayed
when "Provisioning Type" is "Dynamic Provisioning” (Indicates
Thin Provisioning).
• The name of the pool where the logical volume belongs is
displayed when "Attribute" is "Pool".
• Blank when other than those above.
Pool ID
Pool ID.
The ID of the pool is displayed in "Pool Name".
Current MPB
MP blade number of the MP blade that controls the logical volume
currently.
Setting MPB
The number of the MP blade that you specified to control the
logical volume.
Command Device : Security
Indicates whether Security is specified as the attribute for the
command device.
Blank when "Attribute" is not "CMDDEV".
Command Device : User Authentication
Indicates whether User Authentication is specified as the attribute
for the command device.
Blank when "Attribute" is not "CMDDEV".
Command Device : Device Group Definition
Indicates whether Device Group Definition is specified as the
attribute for the command device.
Blank when "Attribute" is not "CMDDEV".
LUNs report
This report is about LU path definitions. A record is created for each LU path.
Table 34 LUNs report
Item
Description
Port Location
Name of the port.
Port Internal WWN
WWN of the port.
Port Security
Security of the port.
Host Group
Name of the host group.
Host Mode
Host mode of the host group.
Host Mode Option
Host mode option of the host group.
Host mode options are separated by semicolons (;) when more
than one option is specified.
LUN
Logical unit number.
LDEV ID
Logical volume number.
Emulation Type
Emulation type of the logical volume.
Capacity (MB)
Capacity of the logical volume.
Capacity of the LUSE volume is displayed when the logical
volume is the first volume of the LUSE volume.
94
Storage configuration reports
MP Blades report
This is a report about MP blades. A record is created for each MP blade.
Table 35 MP Blades report
Item
Description
MP Blade ID
MP blade ID.
MP Blade Name
MP blade name.
Module
Module number.
Auto Assignment
Attribute of auto assignment for the MP blade.
Number of Resources (LDEV)
The number of logical volumes that the MP blade controls.
Number of Resources (Journal)
The number of journals that the MP blade controls.
Number of Resources (External Volume)
The number of external volumes that the MP blade controls,
including volumes for FICON DM.
Number of Resources (Total)
The total number of resources that the MP blade controls.
The sum of "Number of Resources (LDEV)", "Number of
Resources (Journal)", and "Number of Resources (External
Volume)".
MP Blade Details report
This is a detailed report on MP blades. One record contains information for each resource controlled
by an MP blade.
Table 36 MP Blade Details report
Item
Description
MP Blade ID
MP blade ID.
MP Blade Name
MP blade name.
Auto Assignment
Attribute of auto assignment for the MP blade.
Resource ID
ID of this resource that the MP blade controls.
Resource Name
The name of the resource that the MP blade controls. If
"Type" is LDEV and the LDEV name is set, the LDEV name
that is set is displayed.
Type
The type of the resource that the MP blade controls.
Parity Groups report
This report is about parity groups. A record is created for each parity group.
Table 37 Parity Groups report
Item
Description
PG
Parity group number.
• If the number starts with "E" (for example, E1-1), the parity
group contains external volumes (External Storage).
• If the number starts with "M" (for example, M1-1), the parity
group contains volumes for FICON DM.
Module
Module number (see Note 1 below).1
DKA
Name of the disk adapter that controls the parity group.1
Reports in table view
95
Table 37 Parity Groups report (continued)
Item
Description
RAID Level
RAID level of the parity group.
Resource Group Name
Resource group name where the parity group belongs.
Resource Group ID
Resource group ID where the parity group belongs.
Emulation Type
Emulation type of the parity group.
Number of LDEVs (Total)
The number of the logical volumes in the parity group.
Number of LDEVs (Unallocated)
The number of the logical volumes in the parity group that the
host cannot access.
Total LDEV Capacity (MB)
Capacity of the logical volumes in the parity group.
Unallocated LDEV Capacity (MB)
Capacity of the logical volumes in the parity group that the host
cannot access.
Drive Type-Code
Type code of the drive in the parity group.
• If the parity group contains external volumes (External
Storage), this displays the vendor, the model, and the serial
number of the storage system.
• Blank if the parity group contains volumes for FICON DM.
Drive Type/RPM
Drive type and round-per-minute (RPM) of the drive in the parity
group.1
A hyphen (-) is displayed as RPM when the drive is SSD.
Drive Capacity
Capacity of the drive in the parity group.1
RAID Concatenation #0
The number indicating a parity group #0 connected to this parity
group (see Note 2 below).2
RAID Concatenation #1
The number indicating a parity group #1 connected to this parity
group.2
RAID Concatenation #2
The number indicating a parity group #2 connected to this parity
group.2
Encryption
Information about whether the parity group is encrypted.
Encryption Key
Encryption key of the encrypted parity group.
This is blank if the parity group is not encrypted or if the parity
group contains external volumes.
1
2
This is blank if the parity group contains external volumes including volumes for FICON DM.
This is blank if the parity group is not connected with another parity group or if the parity group contains external volumes
including volumes for FICON DM.
Ports report
This report is about ports. A record is created for each port.
Table 38 Ports report
96
Item
Description
CHA
Name of the channel adapter.
Type
Package type of the channel adapter.
Port Location
Name of the port on the channel adapter.
Port Attribute
Port attribute.
Storage configuration reports
Table 38 Ports report (continued)
Item
Description
Port Internal WWN
WWN of the port.
FC Switch
One of the Fibre topology settings indicating the setting status of
the Fabric switch.
Connection Type
One of the Fibre topology settings.
• Point to Point
• FC-AL
Address (Loop ID)
Fibre port address and Loop ID of the port.
Port Security
Security of the port.
Speed
Data transfer speed of the port.
Resource Group Name
Resource group name where the port belongs.
Resource Group ID
Resource group ID where the port belongs.
Number of Hosts
The number of the hosts registered to the port.
Number of LUNs
The number of the LU paths defined to the port.
Number of LDEVs
The number of the logical volumes that can be accessed through
the port.
Number of PGs
The number of the parity groups having the logical volumes that
can be accessed through the port.
Number of DKAs
The number of the disk adapters controlling the parity group
having the logical volumes that can be accessed through the
port.
Spare Drives report
This report is about spare drives. A record is created for each spare drive.
Table 39 Spare Drives report
Item
Description
Drive Capacity
Capacity of the spare drive.
Drive Type-Code
Type code of the spare drive.
Location
Location of the spare drive.
Storage System Summary report
This report shows a summary of the storage system.
Table 40 Storage System Summary report
Item
Description
Storage System Type
Type of the storage system.
Full Serial Number
Serial number of the storage system.
IP Address
IP address of the SVP.
Micro Program Versions
Version of the following programs.
• Main
• SVP
Reports in table view
97
Table 40 Storage System Summary report (continued)
Item
Description
• SSVP
• HTP
• DKAF
• FCDG
• CUDG4
• RAM BOOT
• ROM BOOT
• CMBK
• Config
• HDD
• HDD (SVP)
• SSW
• SCHIP
• Battery
• Exp
• CMSSD (not output)
• Printout Tool
Number of CUs
The number of control units in the storage system.
Shared Memory Size (GB)
Capacity of the shared memory.
Cache Size (GB)
Capacity of the cache.
Number of DKAs
The number of disk adapters on the module.
System Options
List of the system options specified for the storage system.
Drive Capacity (TB)
Total capacity of drives in the storage system except for external
volumes.
Spare Drive Capacity (TB)
Total capacity of the spare drives in the storage system.
OPEN Volume Capacity (GB) (see Note below)
List of the capacity of the open volumes.
M/F Volume Capacity (GB) (see Note below)
The list of the capacity of the mainframe volumes and
multiplatform volumes.
Number of LDEVs (see Note below)
List of the numbers of the volumes in the following status.
• allocated
• unallocated
• reserved
• free
The list for open-systems and the list for mainframe-systems are
separate.
Note: You cannot sort the list.
Reports in graphical view
This section describes the reports that display as graphics. Graphic report icons ( ) are displayed
before names of reports in graphical view. When the icons or the graphics of the reports are not
displayed properly, refresh the window.
98
Storage configuration reports
Cache Memories report
This report shows cache memory including cache PCBs and DIMMs.
Figure 23 Cache Memories report
Total capacity of the cache memory and shared memory is displayed separately for each module.
Channel Adapters report
This report is about channel adapters.
Figure 24 Channel Adapters report
Reports in graphical view
99
It shows channel adapters, ports, and types of channel adapters. On the bottom of the view, you
can confirm the legend of ports (Installed or Not Installed).
Physical View report
This report shows disk controllers and disk units, and includes cache PCBs, MP blades, channel
adapters, disk adapters, data drives, and spare drives.
Figure 25 Physical View report (front view)
100 Storage configuration reports
Figure 26 Physical View report (back view)
Physical View report has two views, which are the Front view and the Back view. Each view shows
the disk controllers and disk units, so you can confirm where they are installed. If a module #1
exists, the information is displayed below the module #0 information. At the top of each view,
Storage System Type, Full Serial Number and Micro Version display. At the bottom of each view,
a legend displays showing SAS, SATA, SSD, Spare, Not Installed.
Reports in graphical view
101
B Report Configuration Tool Command Reference (raidinf
commands)
This topic explains raidinf commands.
raidinf command list and command description conventions
The following shows a list of raidinf commands and symbols used in the command reference
in this appendix.
Table 41 raidinf command list
Command
Description
raidinf add report
Creates a report.
raidinf delete report
Deletes a report.
raidinf download report
Downloads a report.
raidinf get reportinfo
Displays a list of reports.
Table 42 Description conventions of the command format
Symbol
Description
<>
Means that the item enclosed in this symbol is variable.
|
This symbol comes between multiple items and means "or".
Vertical bar
For example:
-A | -B
Specifies -A or -B.
[]
Square brackets
Means that the enclosed item can be omitted. If some items are delimited by
the vertical bar, specify one or omit all the items.
For example:
[ -A ]
Specifies nothing or specifies -A.
[ -a | -b ]
Specifies nothing or specifies -a or -b.
{}
The meaning differs depending on the enclosed item.
Curly brackets
• If items in curly brackets are delimited by vertical bars, one of the items
must be specified.
For example:
{ -A | -B |-C }
Specifies -A, -B, or -C.
• If curly brackets enclose items enclosed by square brackets, at least one
of the items must be specified.
For example:
{ [ -A ][ -B ][ -C ]}
Specifies one or more items from -A, -B, or -C.
raidinf commnd
The syntax of the raidinf commands and the basic format of the options and parameters are
explained below.
102 Report Configuration Tool Command Reference (raidinf commands)
Syntax
raidinf [-h] <action> <object> –servername <hostname/ipaddress> [{-report <report_name> | -report_id <report_id>}]
[-targetfolder <folder>] [-fill]
raidinf [-h] –login <user_name> <password> –servername <hostname/ipaddress>
raidinf [-h] –logout –servername <hostname/ipaddress>
Options and parameters
Option
Description
[-h]
Displays help for raidinf.
<action>
Specifies command operation. The following commands can be specified.
• get: displays a list of reports.
• add: creates a report.
• delete: deletes a report.
• download: downloads a report.
<object>
Specifies an operation target object. The following objects can be specified.
• Specify reportinfo to display a list of reports.
• Specify report to create, delete, or download a report.
-servername
<hostname/ipaddress>
Specifies the host name or the IP address of the Web server (SVP).
[{-report <report_name> |
-report_id <report_id>}]
• -report: specifies a report name within 32 characters. If you specify more
than 32 characters, the 33rd and subsequent characters are ignored.
• -report_id: specifies a report ID displayed by the report list. As a report
ID is a unique ID to each of the reports, a specific report can be identified
even if reports of the same name exist.
[-targetfolder <folder>]
Specifies a folder name to which a report is downloaded. The folder whose
name you specify must already exist and you have permissions to the folder.
[-fill]
Deletes a report only if the number of created reports is 20.
-login [<user_name>
<password>]
Executes a user authentication for Remote Web Console. Specifies a user name
and a password.
The user gets logged out automatically three minutes (180 seconds) after the last
command is entered.
Logs out of Remote Web Console.
-logout
Examples
This example authenticates user01 using the password xxxxxx.
# raidinf -login user01 xxxxxx -servername svp.xxx.co.jp
This example executes a logout.
# raidinf -logout -servername svp.xxx.co.jp
Display a help.
# raidinf -h
Model : RAIDINF/WindowsNT
Ver&Rev: 01-00-03/00
Usage:
raidinf [options]
raidinf <action> <object> [parameters]
Options:
-h
-login <user_name> <password>
Help/Usage
Specify LOGIN explicitly
raidinf commnd 103
-logout
Specify LOGOUT
<User authentification>
<option>
<parameters>
-login
<user_name> <password> -servername <hostname/ipaddress>
-logout
-servername <hostname/ipaddress>
<Report management>
<action> <object>
<parameters>
get
reportinfo -servername <hostname/ipaddress>
add
report
-servername <hostname/ipaddress>
[-report <report_name>]
download report
-servername <hostname/ipaddress> {-report
<report_name> | -report_id <report_id>} -targetfolder <folder>
delete report
-servername <hostname/ipaddress> {-report
<report_name> | -report_id <report_id>} [-fill]
Parameters:
-servername
<hostname/ipaddress>
IP address.
-report
<report_name>
-report_id
<report_id>
-targetfolder <folder>
-fill
of the server reports.
Specify the SVP hostname or
Specify the Report Name.
Specify the ReportID.
Specify the download folder.
Report is deleted only full
raidinf add report
The raidinf add report command creates a report.
If other users have already created 20 reports, a report creation by the logged in user becomes
an error.
Syntax
raidinf add report –servername <hostname/ipaddress> [-report <report_name>]
Options and parameters
Option
Description
servername
<hostname/ipaddress>
Specifies the host name or the IP address of the Web server (SVP).
[-report <report_name>]
Specifies a report name within 32 characters. If you specify more than 32
characters, the 33rd and subsequent characters are ignored.
If the report name is omitted, the default report name
YYMMDD-CreateConfigurationReport is specified. LatestReport
cannot be specified as a report name.
The hyphen (-) cannot be specified at the beginning of the report name.
Examples
This example creates a report with the default report name.
# raidinf add report -servername 10.213.74.121
ReportName
UserName
CreateTime
101009-CreateConfigurationReport user01
2010/10/09-12:43:10
This example specifies the report name 101009-CreateConfigurationReport and creates
a report.
# raidinf add report -servername 10.213.74.121 -report 101009-CreateConfigurationReport
ReportName
UserName
CreateTime
101009-CreateConfigurationReport user01
2010/10/09-12:43:10
104 Report Configuration Tool Command Reference (raidinf commands)
The respective items of the output example are explained below.
•
ReportName
The report name is displayed (within 32 characters).
•
UserName
The user name is displayed (within 16 characters). If the user name exceeds 16 characters,
an ellipsis (...) is displayed.
•
CreateTime
The time of creating a report is displayed (within 9 characters).
raidinf delete report
The raidinf delete report command deletes a report.
If multiple reports of the same name exist, the command deletes the oldest report. If the specified
report does not exist, the command does not do anything and is normally terminated.
Reports created using Remote Web Console can also be deleted.
Syntax
raidinf delete report -servername <hostname/ipaddress> {-report <report_name> | -report_id <report_id>} [-fill]
Options and parameters
Option
Description
servername
<hostname/ipaddress>
Specifies the host name or the IP address of the Web server (SVP).
{-report <report_name> |
-report_id <report_id>}
Specifies either -report or -report_id.
• -report: specifies a report name within 32 characters. If you specify more
than 32 characters, the 33rd and subsequent characters are ignored.
• -report_id: specifies a report ID displayed by the report list. As a report
ID is a unique ID to each of the reports, a specific report can be identified
even if reports of the same name exist.
[-fill]
Deletes the report only if the total number of reports is 20. In case of fewer
reports than 20, the specified report is not deleted even if it exists.
Examples
This example specifies the report name 101009-CreateConfigurationReport and deletes
the report.
# raidinf delete report -servername 10.213.74.121 -report 101009-CreateConfigurationReport
101009-CreateConfigurationReport is deleted in the SVP (Web server).
raidinf download report
The raidinf download report command downloads a report.
Reports created by Remote Web Console can also be downloaded. The report in process of
creation cannot be downloaded.
The name of the downloaded file is Report_report name.tgz. Note that the files are overwritten
if reports of the same name has already existed.
Example: the name of the downloaded file when the report name is
110309-CreateConfigurationReport
Report_110309-CreateConfigurationReport.tgz
raidinf delete report 105
Syntax
raidinf download report -servername <hostname/ipaddress> {-report <report_name> | -report_id <report_id>}
-targetfolder <folder>
Options and parameters
Option
Description
servername
<hostname/ipaddress>
Specifies the host name or the IP address of the Web server (SVP).
{-report <report_name> |
-report_id <report_id>}
Specifies either -report or -report_id.
• -report: specifies a report name within 32 characters. If you specify more
than 32 characters, the 33rd and subsequent characters are ignored.
If a special name LatestReport is specified as a report name, the report
created on the newest date is downloaded.
If multiple reports of the same name exist, the report of the newest date is the
target of download.
• -report_id: specifies a report ID displayed by the report list. As a report
ID is a unique ID to each of the reports, a specific report can be identified
even if reports of the same name exist.
-targetfolder <folder>
Specifies a folder name to which a report is downloaded. The folder whose
name you specify must already exist and you have permissions to the folder.
Examples
Downloads the most recently created report.
# raidinf download report -servername 10.213.74.121 -report LatestReport -targetfolder C:\tmp
Report_101009-CreateConfigurationReport.tgz is downloaded to C:\tmp.
This example specifies the report name 101009-CreateConfigurationReport and downloads
the report.
# raidinf download report -servername 10.213.74.121 -report 101009-CreateConfigurationReport -targetfolder
C:\tmp
Report_101009-CreateConfigurationReport.tgz is downloaded to C:\tmp.
raidinf get reportinfo
The raidinf get reportinfo command displays a list of reports.
Reports created using Remote Web Console are also displayed. The report in process of creation
is not displayed.
Syntax
raidinf get reportinfo –servername <hostname/ipaddress>
Options and parameters
Option
Description
servername
<hostname/ipaddress>
Specifies the host name or the IP address of the Web server (SVP).
Examples
Displays a list of reports.
# raidinf get reportinfo -servername 10.213.74.121
ReportName
UserName
CreateTime
ReportID
101009-CreateConfigurationReport user01
2010/10/09-12:43:10 33S3
106 Report Configuration Tool Command Reference (raidinf commands)
101008-CreateConfigurationReport user01
2010/10/08-11:22:31 33J3
101007-CreateConfigurationReport user01
2010/10/07-11:17:20 2344
101006-CreateConfigurationReport configuration... 2010/10/06-15:30:42 4n1j
The respective items of the output example are explained below.
•
ReportName
The report name is displayed (within 32 characters).
•
UserName
The user name is displayed (within 16 characters). If the user name exceeds 16 characters,
an ellipsis (...) is displayed.
•
CreateTime
The time of creating a report is displayed (within 9 characters).
•
ReportID
The report ID is displayed.
raidinf get reportinfo 107
C Remote Web Console GUI reference (main window)
This appendix describes the Remote Web Console main window and wizards.
Remote Web Console main window
Next and back buttons
Item
Description
(Back)
(Next)
Click to return to the previous window.
Click to advance to the next window.
Menu
Item
Description
File
• Refresh All: Acquires all the information about the storage system and updates both SVP
and Remote Web Console.
• Logout: Logs out from Remote Web Console.
Actions
Provides actions to the storage system such as creating LDEVs or performing replication
copy.
108 Remote Web Console GUI reference (main window)
Item
Description
Reports
• Task Management: Manages the tasks that will be applied to the storage system.
• Configuration Report: Creates and downloads the configuration report about the storage
system.
• Performance Monitor: Monitors performance of the storage system.
• Shredding Report: Downloads the shredding report.
Settings
• User Management: Manages user accounts of Remote Web Console, including changing
password.
• Resource Management: Manages resource groups.
• Security: Performs audit log or encryption key operations.
• Environmental Setting: Configures license key or refresh interval of the window.
View
Changes the font size in the window.
Alert
Indicates if the alert (SIM) occurs in the storage system. When you click Alert, the detail of
the alerts appears. Once an alert occurs, the alert continuously exists unless you complete
all SIMs on SVP.
•
: No alerts occur.
•
: Information in the service level occurred.
•
: Alerts in the warning level (Warning (Moderate) level) occurred.
•
: Alerts in the error level (Error (Serious) level) occurred.
•
•
Audit Log
Indicates how much the audit log files are stored. When you click Audit Log, you can
download the audit log files.
•
Resource Lock
: Alerts in the acute level occurred.
: No information can be retrieved from SVP.
: The audit log file is under the threshold.
•
: The audit log file exceeds the threshold.
•
: The audit log file has exceeded the threshold. Some data has been overwritten.
•
: No information can be retrieved from SVP.
Indicates if any user or program is applying a task to the storage system.
•
Resource Unlocked: No one is applying a task to the storage system.
•
Resource Locked: Other user or program is applying a task to the storage system.
•
: No information can be retrieved from SVP.
When the value of Top Status Indicator Refresh Interval is large (the default value is 60
seconds), this may not display the same status as Status on the Resource Lock Properties
window.
Logged in as
Displays the logged-in user name.
Logout
Logs out from Remote Web Console.
Refresh View
Refreshes the displayed window.
Help
Open the help about the displayed window.
Remote Web Console main window 109
Table
Item
Description
Filter
Open the filtering area.
ON
OFF
When filter is ON, the items in the table are narrowed down according to the specified
filtering conditions.
Select All Pages
Selects all pages when the table has multiple pages.
Item
Description
Options
Sets the table options.
• Column Settings: Specifies whether you display or hide table columns.
• Rows / Page: Specifies how many rows to display in one page.
• Capacity Unit: Specifies the capacity unit of LDEVs (If you change the capacity unit from
MB to GB, TB, or some other unit, the capacity is rounded down to two decimal places).
Goes back to the first page.
Goes back to the previous page.
Specifies the page number to display.
Moves to the next page.
Moves to the last page.
Column Settings window
110
Remote Web Console GUI reference (main window)
Setting fields
Item
Description
Restore Default Settings
Changes the selection of the displayed columns to the default.
Checkbox
Selects columns to display. And then, displays columns whose check boxes are set to on.
If you change the table header checkbox setting to on or off, all column settings are set to
on or off. However, the check boxes of the columns that need to be always displayed
become deactivated.
When you specify checkbox settings to off, the filter and sort that are set to the columns
are released.
Column Name
Displays column names of the table. If one column consists of two rows, the name of the
upper row is on the left of the vertical bar (|). The name of the lower row is on the right of
the vertical bar.
Using the main window and wizard
When you select an operation to perform, a wizard or secondary window appears.
Figure 27 Using the Remote Web Console main window
To perform an operation using the main window and a wizard:
1. Click a resource or function in the Explorer tree.
2.
If necessary, choose a tab and use a filter to narrow down the items in the table.
Remote Web Console main window
111
3.
Select an item in the table and click a button to open a wizard.
4.
5.
Set options in the wizard and click Finish to confirm the setting.
Enter a task name and click Apply to apply the setting to the storage system. The setting is
queued as a task and performed in order.
TIP: To open the task window after closing the wizard, select Go to tasks window for status
and click Apply in the wizard.
Figure 28 Using wizard buttons
6.
Open the task window to verify the result of the operation. A task can be suspended or
canceled if the processing of the task is not started.
Main window controls
Buttons
The following figure shows the buttons that appear on the main window.
Figure 29 Buttons in main window
Alert, Audit Log, and Resource Lock are updated every 60 seconds by default. To change the
refresh interval, click Settings > Environmental Setting > Edit Information Display Settings, then
change the value for Top Status Indicator Refresh Interval.
Table
The following figure shows the controls to view and filter the results in a main window table.
Figure 30 Table options in main window
To scroll through pages of the table, use the left and right arrows or type a page number into the
number field. To select all rows in the table, click Select All Pages. If filter is ON, the filtered rows
are selected. To sort the table, click the header of the column you want to sort.
Use the Options drop-down list to change the number of rows in a page or to change the capacity
unit to display.
To save the displayed information to a TSV file, click Export under More Actions. This action is
demonstrated in the following figure.
112
Remote Web Console GUI reference (main window)
Figure 31 Export button to save a TSV file
When you change a file name from the default, the file name may not contain an extension. Confirm
that the file name contains the .tsv extension to save a file.
Filtering
To filter the table, specify the conditions, click Apply, and then click ON.
Figure 32 Filtering in main window
Tooltip
When text is displayed in the main window, ellipses (...) may be displayed to show that the text
is truncated. If you place the mouse cursor over an ellipsis (...), the full text is displayed in a tooltip
(a small “hover box”).
Figure 33 Tooltip in main window
Remote Web Console main window
113
Storage Systems window
Hardware summary
Item
Description
Storage System
Name
Displays the device name of the storage system.
Storage System Type Displays the model type of the storage system.
Serial Number
Displays the serial number of the storage system.
IP Address
Displays the IP address of the SVP.
Contact
Displays the contact information such as personnel and telephone number where you can inquire
about the storage system.
Location
Displays the location of the connected storage system.
Microcode Version
• Main: Displays the version of the microcode installed in the connected storage system.
• SVP: Displays the version of the Remote Web Console installed in the SVP.
• RMI Server: Displays the version of the RMI server installed in the SVP.
114
Total Cache Size
Displays the total size of the cache memory in the storage system.
Edit Storage System
Allows you to edit the information in Storage System Name, Contact, and Location.
Remote Web Console GUI reference (main window)
Allocation summary
Item
Description
Internal / External
Switches the displayed items.
• Total: Displays information on both the internal volumes and external volumes.
• Internal Only: Displays information on only the internal volumes.
• External Only: Displays information on only the external volumes.
Open / Mainframe
• Total: Displays all the open-systems, mainframe-systems, and multi-platform volumes.
• Open Only: Displays only open-systems volumes.
• Mainframe Only: Displays mainframe-systems and multi-platform volumes.
Capacity Unit
Switches the displayed units of the capacity.
• Appropriate: Displays capacity in appropriate unit depending on the capacity of each item.
• TB/GB/MB: Displays capacity in the specified unit.
Physical Summary
Displays capacity of physical logical devices and the number of devices. This item displays
different information depending on whether open-systems or mainframe-systems.
For details on this item, see the table below about physical summary.
Virtual Summary
Displays capacity of virtual logical devices and the number of devices. This item displays different
information depending on whether open-systems or mainframe-systems.
For details on this item, see the table below about virtual summary.
Total THP
Subscription Rate
Displays the ratio of virtual logical device capacity to physical logical device capacity in the
pool volume of Thin Provisioning.
Total Number of
LDEVs
The total number of physical logical devices and virtual logical devices.
Storage Systems window
115
Physical Summary
#
Item
Description
1
Allocated
• When Open is selected from Open / Mainframe:
Displays the capacity of path-defined open system volumes (LDEVs) and the number
of logical devices that the host can recognize. This capacity includes all LDEVs
that comprise LUSE volumes, but does not include control cylinders.
• When Mainframe is selected from Open / Mainframe:
Displays the capacity of path-defined mainframe and multiplatform volumes and
the number of logical devices that the host can recognize. The volumes of #2, #3,
and #4 are not included. This capacity does not include control cylinders.
2
Reserved - Used THP
Pool
• When Total is selected in Internal / External:
Displays total capacity of pages that are actually used in pool volume of Thin
Provisioning and the number of logical devices. Pool volume of Snapshot is not
included in pool volume of Thin Provisioning. Control cylinder is not included in
the capacity.
• When the item other than Total is selected in Internal / External:
Displays the number of logical devices that are actually used in pool volume of
Thin Provisioning. However, capacity is not displayed.
3
Reserved - Unused THP
Pool
• When Total is selected in Internal / External:
Displays the capacity that is subtracted Used THP Pool value from total capacity
of pool volume of Thin Provisioning. Pool volume of Snapshot is not included in
pool volume of Thin Provisioning. Control cylinder is not included in the capacity.
The number of logical devices is not displayed.
• When the item other than Total is selected in Internal / External:
Capacity and the number of logical devices are not displayed.
4
Reserved - Other
• When Open is selected from Open / Mainframe:
Displays following total capacity and the number of logical devices of the volumes:
- Reserved volumes of Auto LUN V2
- Journal volumes
- System disk
- Pool volumes of Snapshot
- Quorum disk
The reserved volumes of Business Copy Z and reserved volumes of Auto LUN V2
that are defined paths are not included. Control cylinder is not included in the
capacity.
• When Mainframe is selected from Open / Mainframe:
Displays following total capacity and the number of logical devices of the volumes
of Mainframe and multiplatform.
- Reserved volumes of Auto LUN V2
- Journal volumes
- System disk
The reserved volumes of Business Copy Z is not included. Control cylinder is not
included in the capacity.
5
Available Space Unallocated
• When Open or Total is selected from Open / Mainframe:
Displays volume capacity and the number of logical devices from the open volumes
that are not defined paths. The volumes of #2, #3, and #4 are not included.
Control cylinder is not included in the capacity.
• When Mainframe is selected from Open / Mainframe:
116
Remote Web Console GUI reference (main window)
#
Item
Description
Capacity and the number of logical devices are not displayed.
6
Available Space - Free
Space
• When Open is selected from Open / Mainframe:
Displays free space that user can create Open volumes. Control cylinder is not
included in the capacity. The number of logical devices is not displayed.
• When Mainframe is selected from Open / Mainframe:
Displays free space that user can create Mainframe-systems and multiplatform
volumes. Control cylinder is not included in the capacity. The number of logical
devices is not displayed.
7
Physical Total
Displays total capacity of physical logical devices and the number of logical devices.
Control cylinder is not included in the capacity.
Virtual Summary
#
Item
Description
1
THP Allocated
• When total is selected in Internal / External:
Displays virtual volume capacity of Thin Provisioning that is defined paths and the
number of logical devices. Virtual volume of Snapshot is not included. Control
cylinder is not included in the capacity.
• When the item other than total is selected in Internal / External:
Capacity and the number of logical devices are not displayed.
2
THP Unallocated
• When total is selected in Internal / External:
Displays virtual volume capacity of Thin Provisioning that is not defined paths and
the number of logical devices. Virtual volume of Snapshot is not included. Control
cylinder is not included in the capacity.
• When the item other than total is selected in Internal / External:
Capacity and the number of logical devices are not displayed.
3
Other
• When total is selected in Internal / External:
Displays virtual volumes of other than Thin Provisioning and the number of logical
devices. Control cylinder is not included in the capacity.
• When the item other than total is selected in Internal / External:
Capacity and the number of logical devices are not displayed.
4
Virtual Total
Displays total capacity of virtual logical devices and the number of logical devices.
Control cylinder is not included in the capacity.
Storage Systems window
117
Edit Storage System window
Set the storage system information. The configured values are required to use SNMP agents. Make
sure to document the information, because the settings will be cleared when the SVP is replaced.
•
Enter a device name using up to 180 alphanumeric characters (ASCII codes), except for some
symbols, such as ", \, ;, :, ,, *, ?, <, >, |, /, ^, &, and %.
•
You can also use a space, except for before and after the device name.
CAUTION: If you want to change multiple parameters twice or more, wait until the currently
applied task finishes, and then perform the next setting change.
If you perform the next setting change (the next task) before the currently applied task finishes, only
the setting done by the next task will be applied, so the result might be different from what you
expected.
Setting fields
118
Item
Description
Storage System
Name
Enter the device name of the storage system.
Contact
Enter the contact information such as personnel and telephone number where you can inquire
about the storage system.
Location
Enter the location of the connected storage system.
Remote Web Console GUI reference (main window)
Confirm window (Edit Storage System)
Edit Storage System table
Item
Description
Storage System
Name
Displays the device name of the storage system.
Contact
Displays the contact information such as personnel and telephone number where you can inquire
about the storage system.
Location
Displays the location of the connected storage system.
Edit Information Display Settings window
Use this wizard to change the display parameters.
Setting fields
Item
Description
Top Status Indicator Refresh
Interval
Interval for the automatic updates of the icons on the upper-right corner of the Remote
Web Console main window.
Confirm window (Edit Storage System)
119
Item
Description
(Alerts, Audit log, and Resource You can specify 10–3600 seconds. The default value is 60 seconds.
Lock)
Task Screen Refresh Interval
Interval for the automatic updates of the task window.
You can specify 10–3600 seconds, or No Update. The default value is 60 seconds.
No Update indicates the task window will be updated only when the user performs
Refresh View or Refresh All.
Resource Lock Properties window
Displays information about the user who locks the storage system.
Resource Lock Properties summary
Item
Description
Number of Resource Groups –
Locked
Displays the number of locked resource groups.
Number of Resource Groups –
Unlocked
Displays the number of unlocked resource groups.
120 Remote Web Console GUI reference (main window)
Resource Groups table
Item
Description
Resource Group Name (ID)
Displays resource group name and resource group ID that user can operate.
Status
Displays lock status of resource groups.
Locked: Locked user exists.
Unlocked: Locked user does not exist.
Lock User
Displays the user name who locks.
System
Displays the system that locked user is using.
Lock Start Time
Displays the time when the lock starts.
Unlock All
All locked resource groups are forcibly unlocked.
Tasks window
This window displays a list of tasks performed on the storage system.
This window displays up to 384 tasks, including up to 256 tasks whose statuses are Completed
and Failed, and up to 128 tasks whose statuses are In Progress, Waiting and Suspended.
Summary
Item
Description
Completed
Displays the number of completed tasks.
In Progress
Displays the number of tasks in progress.
Tasks window
121
Item
Description
Waiting
Displays the number of tasks waiting.
Suspended
Displays the number of suspended tasks.
Failed
Displays the number of tasks in which an error occurred.
Tasks tab
Item
Description
Task Name
Task name specified by a user when the user performed the task. If the user that executes
the task clicks the task name, the details of the task are displayed.
Status
Task status. If the user that executes the task clicks the status, the details of the status or
errors are displayed.
•
: Completed or Completed(Request)
•
: In progress
•
: Waiting
•
: Suspended
•
: Failed
Type
Displays the general name of the task
User Name
Displays the user name who performed the task.
Submission Time
Displays the date and time when the task was submitted.
Start Time
Displays the date and time when the task was started.
Blank indicates the task has not started yet.
End time
Displays the date and time when the task was completed.
Blank indicates the task has not completed yet.
Auto Delete
Enabled: Tasks will be automatically deleted when they are completed.
Disabled: Tasks will remain displayed until users delete them.
Suspend Tasks
Suspends the selected task so that the task will not be started even when the storage
system is ready. Only waiting tasks can be suspended.
Resume Tasks
Resume the selected task. The task status goes back to waiting.
Delete Tasks
Deletes the selected task from the window.
• The waiting or suspended tasks will be cancelled.
• The failed or aborted tasks can be deleted from the window.
• With the auto delete enabled, the oldest task is automatically removed from the
window when a new task is executed and the number of displayed tasks exceeds
the maximum.
• The task in progress cannot be deleted.
122
Disable Auto Delete1
The selected task will remain displayed after the task is completed.
Enable Auto Delete1
The selected task will be deleted when the task is completed and the number of displayed
tasks exceeds the maximum.
Export1
Displays the window for outputting table information.
Remote Web Console GUI reference (main window)
1
Appears when you click More Actions.
Task Properties window
This window displays details about a task performed on the storage system.
Suspend Tasks window
Use this window to suspend waiting tasks.
Task Properties window
123
Selected Tasks table
Item
Description
Task Name
Displays the task name specified by a user when the user performed the task.
Status
Displays the task status.
Type
Displays the general name of the task.
User Name
Displays the user name who performed the task.
Submission Time
Displays the date and time when the task was submitted.
Resume Tasks window
Use this window to resume suspended tasks.
Selected Tasks table
124
Item
Description
Task Name
Displays the task name specified by a user when the user performed the task.
Status
Displays the task status.
Type
Displays the general name of the task.
User Name
Displays the user name who performed the task.
Submission Time
Displays the date and time when the task was submitted.
Remote Web Console GUI reference (main window)
Delete Tasks window
Use this window to delete tasks. If you delete a waiting task, the task will be cancelled.
Selected Tasks table
Item
Description
Task Name
Displays the task name specified by a user when the user performed the task.
Status
Displays the task status.
Type
Displays the general name of the task.
User Name
Displays the user name who performed the task.
Submission Time
Displays the date and time when the task was submitted.
Disable Auto Delete window
Use this window to prevent a task from being automatically deleted from the task window.
Delete Tasks window
125
Selected Tasks table
Item
Description
Task Name
Displays the task name specified by a user when the user performed the task.
Status
Displays the task status.
Type
Displays the general name of the task.
User Name
Displays the user name who performed the task.
Submission Time
Displays the date and time when the task was submitted.
Enable Auto Delete window
Use this window to automatically delete completed tasks from the task window when the number
of displayed tasks reaches the maximum (384 tasks).
Selected Tasks table
126
Item
Description
Task Name
Displays the task name specified by a user when the user performed the task.
Status
Displays the task status.
Type
Displays the general name of the task.
User Name
Displays the user name who performed the task.
Submission Time
Displays the date and time when the task was submitted.
Remote Web Console GUI reference (main window)
Reports window
This window lists configuration reports about the storage system.
Summary
Item
Description
Number of Reports
Displays the number of created reports.
Reports tab
Item
Description
Report Name
Displays the task name specified when users created a report. If the user that created
the report clicks the report name, the HTML-format report is displayed.
User Name
Displays the user name who created the report.
Submission Time
Displays the date and time when the report was created.
Create Configuration Report
Creates a new report.
Download Reports
Downloads the created report in both HTML and CSV format.
Reports window
127
Item
Description
Delete Reports
Deletes the selected report.
Export
Displays the window for outputting table information.
Create Configuration Report window
Use this window to create configuration reports about the storage system.
Selected Reports table
Item
Description
Report Type
Displays the type of the report to be created.
Format
Displays the file format.
Delete Reports window
Use this window to delete configuration reports.
128
Remote Web Console GUI reference (main window)
Selected Reports table
Item
Description
Report Name
Displays the task name specified when users created a report.
User Name
Displays the user name who created the report.
Submission Time
Displays the date and time when the report was created
User Groups window
This window lists all user groups created in Remote Web Console.
Summary
Item
Description
Number of User Groups
Displays the number of user groups created in Remote Web Console.
User Groups window
129
User Groups tab
Item
Description
User Group Name
Displays the user group name.
User Group Type
Displays the user group type.
Built-in: Indicates a built-in user group.
User-created: Indicates a user group that users created.
Number of Users
Displays the number of users who belong to the user group.
Number of Roles
Displays the number of the roles that are assigned to the user group.
Number of Resource Groups
Displays the number of the resource groups that are assigned to the user group.
All Resource Groups Assigned Displays whether all the resource groups are assigned.
Yes: All the resource groups are assigned to the user group.
No: All the resource groups are not assigned to the user group.
Create User Group
Creates a new user group.
Add Users
Adds a created user to the selected user group.
Assign Resource Groups
1
Assigns the created resource groups to the selected user groups.
Assign Roles
Assigns the created roles to the selected user groups.
Delete User Groups1
Deletes the selected user groups.
Edit User Group1
Edits the user group name.
Export1
Displays the window for outputting table information.
130 Remote Web Console GUI reference (main window)
1
Appears when you click More Actions
Window when User Group is selected
Summary
Item
Description
Number of Roles
Displays the number of roles that are assigned to the selected user group.
Number of Resource Groups Displays the number of resource groups that are assigned to the selected user group.
Number of Users
Displays the number of users who belong to the selected user group.
User Group Type
Displays the user group type.
Built-in: Indicates a built-in user group.
User-created: Indicates a user group that users's created.
All Resource Groups
Assigned
Displays whether all the resource groups are assigned.
Yes: All the resource groups are assigned to the user group.
No: All the resource groups are not assigned to the user group.
Window when User Group is selected
131
Users tab
Lists all users who belong to the selected user group.
Item
Description
User Name
Displays the ID of the user who belongs to the user group.
Account Status
Displays the account status. The following statuses are available:
Enabled: The user can use the account.
Disabled: The user cannot use the account or log in to Remote Web Console.
Authentication
Displays the authentication method. The following methods are available:
Local: Does not use authentication server. Uses a dedicated password for Remote Web
Console.
External: Uses authentication server.
User Type
Displays the user type. The following types are available:
Built-in or User-created
Number of User Groups
Displays the number of the user groups where the user belongs.
Create User
Creates a new user account.
Change Password
Changes your password if you click this.
Changes the password of other users if you select a user and then click this.
Edit User
Changes the setting for authentication or for the account status.
You can set the password of the selected user if you change Authentication from External
to Local.
Delete Users1
Deletes the selected users.
Appears when you
Remove Users
Removes the selected user from the user group. The user account itself will not be deleted.
ExportAppears when you click More
Displays the window for outputting table information.
click More Actions.
Actions.
1
Appears when you click More Actions.
Roles tab
Lists the roles assigned to the selected user group, which determines the operations the user can
perform.
132
Item
Description
Roles
Displays the roles that are assigned to the user group.
Assign Roles
Assigns the created roles to the selected user groups.
Export
Displays the window for outputting table information.
Remote Web Console GUI reference (main window)
Resource Groups tab
Lists the resource groups that are assigned to the selected user group.
Item
Description
Resource Group Name (ID)
Displays the name and ID of the resource group assigned to the user group.
Number of User Groups
Displays the number of user groups that are assigned to the resource group.
Number of Parity Groups
Displays the number of the parity groups that are assigned to the resource group.
Number of LDEVs
Displays the number of the LDEVs that are assigned to the resource group.
Number of Ports
Displays the number of the ports that are assigned to the resource group.
Number of Host Groups
Displays the number of the host groups that are assigned to the resource group.
Assign Resource Groups
Assignment
Assigns the created resource groups to the user groups.
Export
Displays the window for outputting table information.
Create User wizard
Create User window
Use this window to create a new user account.
Create User wizard
133
Setting fields
Item
Description
User Name
Enter the user ID to be created.
The allowable characters and length of user names depend on the application that the
user is using. See the prerequisites in “Creating a user account” (page 37).
Account Status
Select the account status. The following statuses are available:
Enabled: The user can use the account.
Disabled: The user cannot use the account or log in to Remote Web Console.
Authentication
Select the authentication method. The following methods are available:
Local: Does not use authentication server. Uses a dedicated password for Remote Web
Console.
External: Uses authentication server.
Password
Enter the password that the user enters for login.
The allowable characters and length of passwords depend on the application that the
user is using. See the prerequisites in “Creating a user account” (page 37).
Re-enter Password
Enter the same password as above.
Confirm window (Create User)
Selected User table
Item
Description
User Name
Displays the user ID to be created.
Account Status
Displays the account status. The following statuses are available:
Enabled: The user can use the account.
Disabled: The user cannot use the account or log in to Remote Web Console.
Authentication
Displays the authentication method. The following methods are available:
Local: Does not use authentication server. Uses a dedicated password for Remote Web
Console.
External: Uses authentication server.
134
Remote Web Console GUI reference (main window)
Item
Description
Password
Displays the password that the user enters for login.
User Group Name
Displays the user group name where the user is added.
Change Password wizard
Change Password window
Use this wizard to change your password or other users' passwords.
Setting fields
Item
Description
User Name
Displays the target user ID.
Current Password
Enter the current password of your user account. Required only when you change your
own password.
New Password
Enter the new password that the selected user enters for login.
The allowable characters and length of passwords depend on the application that the
user is using. See the prerequisites in “Creating a user account” (page 37).
Re-enter New Password
Enter the same password as above.
Change Password wizard
135
Confirm window (Change Password)
Selected User table
Item
Description
User Name
Displays the target user ID.
Current Password
Displays the current password.
A hyphen (-) indicates no current password was specified.
New Password
Displays the new password.
Edit User wizard
Edit User window
Use this wizard to change the setting for authentication or for the account status.
136
Remote Web Console GUI reference (main window)
Setting fields
Item
Description
User Name
Displays the target user ID.
Account Status
Select the account status. The following statuses are available:
Enabled: The user can use the account.
Disabled: The user cannot use the account or log in to Remote Web Console.
Authentication
Select the authentication method. The following methods are available:
Local: Does not use authentication server. Uses a dedicated password for Remote Web
Console.
External: Uses authentication server.
Password
Enter the password that the user enters for login.
The allowable characters and length of passwords depend on the application that the
user is using. See the prerequisites in “Creating a user account” (page 37).
Re-enter Password
Enter the same password as above.
Confirm window (Edit User)
Selected User table
Item
Description
User Name
Displays the target user ID.
Account Status
Displays the account status. The following statuses are available:
Enabled: The user can use the account.
Disabled: The user cannot use the account or log in to Remote Web Console.
Authentication
Displays the authentication method. The following methods are available:
Local: Does not use authentication server. Uses a dedicated password for Remote Web
Console.
External: Uses authentication server.
Password
Displays the password that the user enters for login.
Edit User wizard
137
Add Users wizard
Add Users window
Use this wizard to add the created user account to the selected user group.
Available Users table
Lists all the candidate users who do not belong to the user group.
Item
Description
User Name
Displays the selected user name.
Account Status
Displays the account status. The following statuses are available:
Enabled: The user can use the account.
Disabled: The user cannot use the account or log in to Remote Web Console.
Authentication
Displays the authentication method. The following methods are available:
Local: Does not use authentication server. Uses a dedicated password for Remote Web
Console.
External: Uses authentication server.
Number of User Groups
Displays the number of the user groups where the user belongs.
Add button
Adds the selected users in the Available Users list to the Selected Users list.
138
Remote Web Console GUI reference (main window)
Remove button
Removes the selected users from the Selected Users list and relocates the selected users to the
Available User list.
Selected Users table
Lists users to be added to the user group.
Item
Description
User Name
Displays the selected user name.
Account Status
Displays the account status. The following statuses are available:
Enabled: The user can use the account.
Disabled: The user cannot use the account or log in to Remote Web Console.
Authentication
Displays the authentication method. The following methods are available:
Local: Does not use authentication server. Uses a dedicated password for Remote Web
Console.
External: Uses authentication server.
Number of User Groups
Displays the number of the user groups where the user belongs.
Add Users wizard
139
Confirm window (Add Users)
Selected User Group
Item
Description
User Group Name
Displays the user group name where the user is added.
Selected Users table
Item
Description
User Name
Displays the selected user name.
Account Status
Displays the account status. The following statuses are available:
Enabled: The user can use the account.
Disabled: The user cannot use the account or log in to Remote Web Console.
Authentication
Displays the authentication method. The following methods are available:
Local: Does not use authentication server. Uses a dedicated password for Remote Web
Console.
External: Uses authentication server.
Number of User Groups
Displays the number of the user groups where the user belongs.
140 Remote Web Console GUI reference (main window)
Remove Users window
Use this window to remove users from a user group.
Selected User Groups table
Item
Description
User Group Name
Displays the name of the user group from which the user is removed.
Selected Users table
Item
Description
User Name
Displays the selected user name.
Account Status
Displays the account status. The following statuses are available:
Enabled: The user can use the account.
Disabled: The user cannot use the account or log in to Remote Web Console.
Authentication
Displays the authentication method. The following methods are available:
Local: Does not use authentication server. Uses a dedicated password for Remote Web
Console.
External: Uses authentication server.
Number of User Groups
Displays the number of user groups from which the user is removed.
Remove Users window
141
Delete Users window
Use this window to delete users.
Selected Users table
Item
Description
User Name
Displays the target user ID.
Account Status
Displays the account status. The following statuses are available:
• Enabled: The user can use the account.
• Disabled: The user cannot use the account or log in to Remote Web Console.
Authentication
Displays the authentication method. The following methods are available:
• Local: Does not use authentication server. Uses a dedicated password for Remote
Web Console.
• External: Uses authentication server.
Number of User Groups
Displays the number of user groups from which the user is deleted.
Create User Group wizard
Create User Group window
Use this window to create a new user group.
142
Remote Web Console GUI reference (main window)
Setting fields
Item
Description
User Group Name
Enter the name of the user group to be created.
ASCII code characters, spaces, and the following symbols can be specified:
!#$%&'()+-.=@[]^_`{}~
Check
Check whether the entered user group name is registered to the authorization server
when you use an authorization server.
Confirm window (Create User Group)
Create User Group table
Item
Description
User Group Name
Displays the name of the user group to be created.
Number of roles
Displays the number of the roles that are assigned to the user group to be created.
Number of Resource Groups Displays the number of the resource groups that are assigned to the user group to be
created.
Number of Users
Displays the number of the users that belong to the user group to be created.
All Resource Groups
Assigned
Displays whether all the resource groups are assigned.
Yes: All the resource groups are assigned to the user group.
Create User Group wizard
143
Item
Description
No: All the resource groups are not assigned to the user group.
Assigned Roles table
Item
Description
Role
Displays the roles that are assigned the user group to be created.
Assigned Resource Groups table
Item
Description
Resource Group Name (ID)
Displays the name and ID of the resource group assigned to the user group to be created.
Number of User Groups
Displays the number of the user groups that are assigned to the resource group.
Number of Parity Groups
Displays the number of the parity groups that are assigned to the resource group.
Number of LDEVs
Displays the number of the LDEVs that are assigned to the resource group.
Number of Ports
Displays the number of the ports that are assigned to the resource group.
Number of Host Groups
Displays the number of the host groups that are assigned to the resource group.
Detail
Displays the detail of the selected resource group.
Selected Users table
NOTE:
This table is displayed only when users are added to the user group.
Item
Description
User Name
Displays the name of the users that belong to the user group to be created.
Account Status
Displays the account status. The following status are available:
Enabled: The user can use the account.
Disabled: The user cannot use the account or log in to Remote Web Console.
Authentication
Displays the authentication method. The following methods are available:
Local: Does not use authentication server. Uses a dedicated password for Remote Web
Console.
External: Uses authentication server.
Number of User Groups
Displays the number of the user groups where the user belongs.
144 Remote Web Console GUI reference (main window)
Edit User Group wizard
Edit User Group window
Use this window to change the name of a user group.
Setting fields
Item
Description
User Group Name
Enter the new name of the user group.
ASCII code characters, spaces, and the following symbols can be specified:
!#$%&'()+-.=@[]^_`{}~
Check
Check whether the entered user group name is registered to the authorization server
when you use an authorization server.
Confirm window (Edit User Group)
Edit User Group wizard
145
Selected User Group table
Item
Description
User Group Name
Displays the new name of the user group.
Number of Roles
Displays the number of the roles that are assigned to the user group.
Number of Resource Groups Displays the number of the resource groups that are assigned to the user group.
Number of Users
Displays the number of the users that belong to the user group.
All Resource Groups
Assigned
Displays whether all the resource groups are assigned.
Yes: All the resource groups are assigned to the user group.
No: All the resource groups are not assigned to the user group.
Delete User Groups window
Selected User Groups table
Item
Description
User Group Name
Displays the new name of the user group.
Number of Roles
Displays the number of the roles that are assigned to the user group.
Number of Resource Groups Displays the number of the resource groups that are assigned to the user group.
Number of Users
Displays the number of the users that belong to the user group.
All Resource Groups
Assigned
Displays whether all the resource groups are assigned.
Yes: All the resource groups are assigned to the user group.
No: All the resource groups are not assigned to the user group.
Assign Resource Groups wizard
Assign Resource Groups window
Use this window to assign created resource groups to the user group.
146
Remote Web Console GUI reference (main window)
Also use this window to assign created resource groups to the user group in the Create User Group
wizard.
Setting field
Setting field displays only when resource groups are assigned in the Create User Group wizard.
Item
Description
All Resource Groups
Assigned
Displays whether all the resource groups are assigned to the user group.
This item is set to Yes when the following roles are assigned in the Assign Roles window.
• Security Administrator (View Only)
• Security Administrator (View & Modify)
• Audit log Administrator (View Only)
• Audit log Administrator (View & Modify)
• Support Personnel
• User Maintenance
When this item is set to Yes, Unassigned Resource Groups table, Assigned Resource
Groups table, Add button, and Remove button are disabled.
Unassigned Resource Groups table
Lists the resource groups that are not assigned to the user group.
Item
Description
Resource Group Name (ID)
Displays the name and ID of the resource group assigned to the user group to be created.
Number of User Groups
Displays the number of the user groups that are assigned to the resource group.
Number of Parity Groups
Displays the number of the parity groups that are assigned to the resource group.
Number of LDEVs
Displays the number of the LDEVs that are assigned to the resource group.
Number of Ports
Displays the number of the ports that are assigned to the resource group.
Number of Host Groups
Displays the number of the host groups that are assigned to the resource group.
Detail
Displays the detail of the selected resource group.
Assign Resource Groups wizard
147
Add button
Adds the selected resource groups in the Unassigned Resource Groups list to the Assigned Resource
Groups list.
Remove button
Removes the selected resource groups from the Assigned Resource Groups list and relocates the
resource groups to the Unassigned Resource Groups list.
Assigned Resource Groups table
Lists the resource groups to be assigned to the user group.
148
Item
Description
Resource Group Name (ID)
Displays the name and ID of the resource group assigned to the user group to be created.
Number of User Groups
Displays the number of the user groups that are assigned to the resource group.
Number of Parity Groups
Displays the number of the parity groups that are assigned to the resource group.
Number of LDEVs
Displays the number of the LDEVs that are assigned to the resource group.
Number of Ports
Displays the number of the ports that are assigned to the resource group.
Number of Host Groups
Displays the number of the host groups that are assigned to the resource group.
Detail
Displays the detail of the selected resource group.
Remote Web Console GUI reference (main window)
Confirm window (Assign Resource Groups)
Selected User Group table
Item
Description
User Group Name
Displays the new name of the user group.
Assigned Resource Groups table
Item
Description
Resource Group Name (ID)
Displays the name and ID of the resource group assigned to the user group to be created.
Number of User Groups
Displays the number of the user groups that are assigned to the resource group.
Number of Parity Groups
Displays the number of the parity groups that are assigned to the resource group.
Number of LDEVs
Displays the number of the LDEVs that are assigned to the resource group.
Number of Ports
Displays the number of the ports that are assigned to the resource group.
Number of Host Groups
Displays the number of the host groups that are assigned to the resource group.
Detail
Displays the detail of the selected resource group.
Assign Resource Groups wizard
149
Assign Roles wizard
Assign Roles window
Use this window to add roles to the user group.
Unassigned Roles table
Lists roles that is not assigned to the user group.
150
Item
Description
Role
Displays roles.
Remote Web Console GUI reference (main window)
Add button
Adds the selected roles in the Unassigned Roles list to the Assigned Roles list.
Remove button
Removes the selected roles from the Assigned Roles list and relocates the selected roles to the
Unassigned Roles list.
Assigned Roles table
Lists roles to be assigned to the user group.
Item
Description
Role
Displays roles.
Assign Roles wizard
151
Confirm window (Assign Roles)
Selected User Group
Item
Description
User Group Name
Displays the new name of the user group.
All Resource Groups
Assigned
Displays whether all the resource groups are assigned.
Yes: All the resource groups are assigned to the user group.
No: All the resource groups are not assigned to the user group.
Assigned Roles
152
Item
Description
Role
Displays the roles that are assigned to the user group.
Remote Web Console GUI reference (main window)
Alerts window
Displays the list of alerts (SIM) that occurred in storage system.
Summary
Item
Description
Number of Uncompleted
Alerts
Displays the number of alerts that are not authenticated yet.
• Acute: Displays total number of Acute level alerts that are not authenticated yet.
• Serious: Displays total number of Serious level alerts that are not authenticated yet.
• Moderate: Displays total number of Moderate level alerts that are not authenticated
yet.
• Service: Displays total number of Service level alerts that are not authenticated yet.
• Total: Total number of above is displayed.
Alerts table
Item
Description
Error Code
Displays reference code of SIM. For details about reference codes, contact HP Technical
Support. For information about errors that need to be solved, see “Checking alerts”
(page 76).
Date
Displays the date when alerts occurred.
Alerts window
153
Item
Description
Error Level
Displays error level of alerts.
•
Service: No need to deal with immediately. Errors that are dealt with within
periodical maintenance.
•
Moderate: No need to deal with immediately. Errors that are dealt with within
periodical maintenance.
•
Serious: Contact the HP Technical Support. Take adequate measure as instructed,
report and solve the problem.
•
Acute: Contact the HP Technical Support. Take adequate measure as instructed,
report and solve the problem.
Status
If status alert remains, Uncompleted is displayed. If alert is removed by SVP, Completed
is displayed.
Detail
Displays the details of alert that is selected in the list.
Alert Properties window
Displays details of alert (SIM) that occurred in storage system.
When you select multiple alerts in Alert window, click back and Next button to change alert that
is displayed.
154 Remote Web Console GUI reference (main window)
Alert Properties
Item
Description
Error Code
Displays reference codes of SIM. For details about reference codes, contact HP Technical
Support. For information about errors that need to be solved, see “Checking alerts”
(page 76).
Date
Displays the date when alerts occurred.
Error Level
Displays error level of alerts.
•
Service: No need to deal with immediately. Errors that are dealt with within
periodical maintenance.
•
Moderate: No need to deal with immediately. Errors that are dealt with within
periodical maintenance.
•
Serious: Contact HP Technical Support. Take adequate measure as instructed,
report and solve the problem.
•
Acute: Contact HP Technical Support. Take adequate measure as instructed, report
and solve the problem.
Status
If status alert remains, Uncompleted is displayed. If alert is removed by SVP, Completed
is displayed.
Error Section
Displays overview of the error where the alert occurred.
Error Detail
Displays the more detail on the error.
Location
Displays where the error occurred. It differs according to the error code.
Edit SIM Syslog Server Settings wizard
Edit SIM Syslog Server Settings window
Use this window to configure syslog servers to report storage system failures to syslogs if SIMs
occur.
Edit SIM Syslog Server Settings wizard
155
Setting fields
Item
Description
Primary Server
Specify whether SIMs are reported to syslogs in the primary server.
• Enable: SIMs are reported to syslogs in the primary server.
• Disable: SIMs are not reported to syslogs in the primary server.
Primary Server - IP Address
Specify an IPv4 and IPv6 address of the primary syslog server.
• To specify an IPv4 address, select IPv4 and enter 4 numbers (0-255).
For example:
XXX.XXX.XXX.XXX (X indicates a digit)
• To specify an IPv6 address, select IPv6 and enter 8 hexadecimal numbers (0-FFFF).
For example:
YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY (Y indicates a hexadecimal digit)
Primary Server - Port
Number
Enter a port number of the primary syslog server.
Secondary Server
Specify if SIMs are to be reported to syslogs in the secondary server.
The default port number displays. You can also specify any port number.
• Enable: SIMs are reported to syslogs in the secondary server.
• Disable: SIMs are not reported to syslogs in the secondary server.
Secondary Server - IP
Address
Specify an IPv4 or IPv6 address of the secondary syslog server.
• To specify an IPv4 address, select IPv4 and enter 4 numbers (0-255).
For example:
XXX.XXX.XXX.XXX (X indicates a digit)
• To specify an IPv6 address, select IPv6 and enter 8 hexadecimal numbers (0-FFFF).
For example:
YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY (Y indicates a hexadecimal digit)
Secondary Server - Port
Number
Enter a port number of the secondary syslog server.
The default port number displays. You can also specify any port number.
Location Identification Name Specify any name to identify the storage system that notifies the syslog server of SIMs.
You can specify up to 32 letters and numbers of ASCII code characters and the following
symbols:
! " # $ % & ' ( ) = - ~^ | \ { } [ ] @ `: ; * + _ ? / < > .
You cannot specify commas (,) and spaces.
Send a test message
156
Sends a test SIMs to syslogs as you configure the servers.
Remote Web Console GUI reference (main window)
Confirm window (Edit SIM Syslog Server Settings)
Syslog Server table
Item
Description
Primary Server - SIM Transfer Displays whether SIMs are reported to syslogs in the primary server.
• Enable: SIMs are reported to syslogs in the primary server.
• Disable: SIMs are not reported to syslogs in the primary server.
Primary Server - IP Address
Displays an IP address of the primary syslog server.
Primary Server - Port
Number
Displays a port number of the primary syslog server.
Secondary Server- SIM
Transfer
Displays whether SIMs are reported to syslogs in the secondary server.
• Enable: SIMs are reported to syslogs in the secondary server.
• Disable: SIMs are not reported to syslogs in the secondary server.
Secondary Server - IP
Address
Displays an IP address of the secondary syslog server.
Secondary Server - Port
Number
Displays a port number of the secondary syslog server.
Location Identification Name Displays a name to identify the storage system that notifies the syslog server of SIMs.
Send a test message
Displays whether test SIMs are reported to syslogs.
• Yes: Test SIMs are reported to syslogs.
• No: Test SIMs are not reported to syslogs.
Edit SIM Syslog Server Settings wizard
157
D Remote Web Console GUI reference (secondary windows)
This appendix describes the Remote Web Console secondary windows.
Remote Web Console secondary window
The Remote Web Console secondary window is reset when you do any of the following:
•
Click Apply or Cancel.
•
Click Refresh or Refresh All on the File menu.
•
Switch tabs.
Item
Description
Title bar
Provides information about the connected storage system.
• IP indicates the IP address of the SVP.
• S/N indicates the serial number.
• D/N indicates the device name specified in the Edit Storage System window.
File > Reports
Opens the Report Display dialog box, which provides the basic configuration information on
the storage system.
File > Refresh All
Updates the information on the SVP. All information displayed on the Remote Web Console
secondary window is reacquired from the storage system. We recommend that you use this
command only when error recovery is required.
• Takes time until the processing has been completed.
• While updating, other users are not allowed to perform any operation on the Remote Web
Console windows. Maintenance of the storage system or the SVP operation by the service
personnel is not allowed, either.
• Available only for the user with the Storage Administrator (Initial Configuration) role.
• Available only when the user is in Modify mode.
158
Remote Web Console GUI reference (secondary windows)
Item
Description
• The information may not display correctly if SVP maintenance is in progress.
• Try this command if the configuration information displayed on the Remote Web Console
differs from the actual configuration information that can be recognized from the host.
File > Refresh
Displays the latest information on Remote Web Console.
The information might not display correctly when the exclusive lock is effective or SVP
maintenance is in progress.
File > Close
Closes the Remote Web Console secondary window.
Go menu
Indicates program product names.
Help menu
Home Page: Opens the HP website.
Documentation Home Page: Opens the website of the Remote Web Console manuals.
About: Opens the About dialog box to show the version of the storage system.
Normal
Warning
Abnormal
Unlocked
Locked
Indicates the storage system error status by color (blue: normal, yellow: warning, red: abnormal)
according to the host SIM status. If the SIM occurs but is not reported to the host, the status
remains the same.
The different status lamp icons (
: Normal,
when the C-track is accessing the SVP.
: Warning,
: Abnormal) are displayed
Indicates the operation mode of all currently logged-in users.
If all users are viewing the information in the view mode, the blue unlocked-shaped icon (
)
appears. If a user is operating in the Modify mode, the red locked-shaped icon (
) appears.
The status might not be displayed correctly when the exclusive lock is effective or SVP maintenance
is in progress.
View
Modify
Allows users to switch the operation mode between Modify and View. The button always shows
the current user operation mode. To change the modes, click the button.
You cannot switch to the Modify mode while any other user is operating in the Modify mode.
Make sure to confirm the exclusive lock icon before switching to the Modify mode.
Reset
Reset the remaining time for the Modify mode. Appears only when you are in Modify mode.
Logged in as
Shows the user ID of the currently logged-in user.
Logout
Apply
Closes the Remote Web Console secondary window.
Implements all the changes or settings displayed in blue bold italics. This button is available
only in Modify mode.
You can create and store up to 20,000 settings or operations before actually applying them to
the storage system. To avoid a possible error, do not apply more than 20,000 settings at a
time.
Cancel
Cancels the changes or settings made on the window. This button is available only in Modify
mode.
PP Status
Displays the SIM severity level. PP Status appears if a SIM occurs related to a program product
license because the license is expired or the licensed capacity is insufficient. However only the
storage administrator with the Storage Administrator role set to Enable will be able to see the
display.
PP Status can display any of the following SIM severity level statuses:
• If PP Status : Normal appears, no SIM has occurred. If any other status appears, view either
the License Key window or the Alerts window to identify which program product has a
problem. You may find that you need to consider purchasing the license.
• When multiple SIMs occur, only the SIM with the highest severity appears.
Remote Web Console secondary window
159
Opening Remote Web Console secondary windows
Some Remote Web Console operations are performed through secondary windows that use a Java
application. For this reason, whether you are using JRE 5.0 or 6.0, a message might appear and
ask if you want to run a Java Application. You might see slightly different dialog boxes depending
on your environment and configuration.
To use Remote Web Console, click Run in the following dialog box. If you select the Always trust
content from this publisher option before clicking Run, Remote Web Console is always allowed
to access the local files and you will not see this dialog box again.
Figure 34 Warning - Security dialog box when digital signature is expired (for JRE 5.0)
NOTE: The Remote Web Console digital signature has an expiration date and it might be expired
depending on the Remote Web Console version that you use. Even though the digital signature is
expired, you can continue using Remote Web Console.
Remote Web Console secondary windows and Modify mode
There is no Modify mode for the Remote Web Console main window. Main window and wizard
operations are queued as tasks and performed in order. However, when using a Remote Web
Console secondary window, you must be in Modify mode before changing any settings. Secondary
window operations are not queued or displayed in the task window.
A secondary window opens when you click a command from the Remote Web Console menu. To
make settings in a secondary window, you must change to Modify mode by clicking
. Modify
mode prohibits other users or programs from changing the storage system setting. As soon as you
close the secondary window, Modify mode is released.
Modify mode has a timeout period. If you do not access SVP before the end of the timeout period,
Modify mode is released. On some windows, the settings made but not yet applied to the storage
system will be canceled.
The secondary window displays the progress bar (shown in the following figure) indicating the
remaining time in the timeout period. To extend this period and remain in Modify mode, click
Reset.
Figure 35 Modify mode and remaining time in secondary window
The Modify mode default timeout period is 30 minutes, but can be changed by modifying RMI
time-out period for Modify.
160 Remote Web Console GUI reference (secondary windows)
If Modify mode is released due to a timeout, the current window will still be visible, but an error
message is returned when you click Apply, or when you try to refresh the window through File >
Refresh All
or Refresh View
.
About window
The About command provides storage system information.
Item
Description
Storage System Type Displays the product name of the connected storage system.
Full Serial Number
Displays the serial number of the connected storage system.
IP Address
Displays the IP address of the connected storage system (SVP).
Storage System
Name
Displays the device name of the connected storage system.
Contact
Displays the contact information of the administrator.
Location
Displays the location of the connected storage system.
Main Version
Displays the version of the microcode installed in the connected storage system.
SVP Version
Displays the version of the Remote Web Console Java application installed in the SVP of the
connected storage system. The Java application is downloaded at each time the Remote Web
Console computer connects to the SVP, so that the version is always consistent between the
Remote Web Console computer and SVP.
Server Version
Displays the version of the RMI server installed in the SVP of the connected storage system.
About window
161
License Key window
Use the License Key window to install and uninstall program products.
Item
Description
License Key list
Lists license keys (program products).
License Mounted
Capacity
Displays the capacity of created LDEVs in the storage system. When you install a program
product whose license capacity type is Mounted capacity, install more license capacity than the
mounted capacity.
License Install
Allows you to select one of the following modes for installing a license key:
• When Key Code mode is selected, use the Key Code text box to type the license key code
for the selected option to be installed. You cannot copy and paste text from other applications.
• When File mode is selected, use the File Name text box or the Browse button to enter the
name of the license key file. When you click Browse, a dialog box opens allowing you to
select the desired license key file.
• Select Available to update the license status when the license capacity is enough but the
license status still displays Grace Period or Not Enough License. The Available button can be
used only when the licensed capacity exceeds the mounted (or used) capacity because the
LDEVs are reduced, or because the pairs are deleted by a program product.
License Status
Allows you to enable or disable a program product. Select a program product, select Enable
or Disable, and click Set.
• Enable: You can use the program product. If you enable a program product with the term
key, the available days of term key will lessen one day when you set Enable. When the
setting is applied, Installed appears.
• Disable: You cannot use the program product. If you disable a program product with the
term key, the available days of term key will not lessen when you set Disable. When the
setting is applied, Installed (Disabled) appears.
162
Install
Install appears in the row of the selected program product. The program products are not
actually installed until you click Apply.
Uninstall
Remove appears in the row of the selected program product. The options are not actually
uninstalled until you click Apply.
Apply
Implements the settings to the storage system. The status of installed options changes to Installed,
and the status of uninstalled option changes to Not Installed.
Cancel
Cancels the settings.
Remote Web Console GUI reference (secondary windows)
License Key list
Item
Description
Product Name
The name of the product and icon indicating whether this is available.
Key Type
•
: Installed
•
: Not Installed
The license type:
• Permanent
• Term
• Temporary
• Emergency
• Meter
• Not Installed (when no license key is installed)
Permitted Volumes
The column shows the following information:
• Unlimited: The capacity is unlimited
• Unlimited (xx.xx TB): The capacity is unlimited and xx.xx indicates the used license capacity.
• XXTB: XX indicates the licensed capacity.
• XXTB(xx.xxTB): XX indicates the licensed capacity and xx.xx indicates the used license
capacity.
• XXTB+ZZTB:XX indicates the permanent licensed capacity of the program product, and ZZ
indicates the meter licensed capacity.
• XXTB(YY TB)+ZZ TB: XX indicates the permanent licensed capacity of the program product,
ZZ indicates the meter licensed capacity, and YY indicates the minimum licensed capacity.
For example, if this column displays 10 TB (0.52 TB), the licensed capacity is 10 TB and the
used license capacity is 0.52 TB.
The used license capacity is the capacity used by the program product.
Licensed capacities are calculated assuming that 1 KB = 1,024 bytes, 1 MB = 1,024 KB, 1 GB
= 1,024 MB, and 1 TB = 1,024 GB.
Term (days)
The number of days remaining before the expiration of a temporary key, an emergency key,
or a term key. After the temporary key has expired, the column shows the number of days that
remain before you can reinstall the temporary key.
In case of the meter key, the presumed number of days before the licensed capacity becomes
insufficient is displayed.
Status
The current status of a program product:
• Installed: The program product is available.
• Installed (Disabled): Installation is complete, but the license is set to disabled. This status might
appear if an error occurs after you install program product(s). Resolve the error and enable
the license. This status also appears when the license key of this program product is installed
but the license key of the prerequisite program product is expired.
• Not Installed: The program product is not installed.
• Not Enough License: Installation is complete, but the license capacity is insufficient. Not
Enough License might remain displayed when the licensed capacity exceeds the mounted
capacity after you reduce the number of LDEVs, or when the licensed capacity exceeds the
used capacity after you delete pairs or pools. In these cases, you can refresh the license
status by using the Available button.
• Grace Period: The licensed capacity is insufficient because LDEVs are added, or pairs have
been created by a program product. Also for a meter key, the licensed capacity also becomes
insufficient if the meter licensed capacity is consumed and becomes smaller than the used
amount (see “Using the meter key” (page 56) for details). The license expires in 30 days.
Please purchase the licenses before the license key expires. Grace Period might remain
displayed when the licensed capacity exceeds the mounted capacity after you reduce the
License Key window 163
Item
Description
number of LDEVs, or when the licensed capacity exceeds the used capacity after you delete
pairs or pools. In these cases, you can refresh the license status by using the Available button.
• Expired: The term has already expired for the temporary key. When the status is Expired,
you cannot reinstall the temporary key.
Status and icons
License key status
Icon
Key type
Permitted
volume
Term
(days)
Status
Not installed.
(Not Installed)
Not Installed
–
–
Not Installed
Installed with the Permanent key.
(Installed)
Permanent
Unlimited
–
Installed
(Note 2)
Installed
–
Installed
(Disabled)
or X TB
(Note 1)
Installed with the Term key and
set to enable.
(Installed)
Term
Unlimited
or X TB
(Note 1)
Installed with the Term key and
set to disable.
(Not Installed)
Term
Unlimited
or X TB
(Note 1)
Installed with the Temporary key.
(Installed)
Temporary
–
(Note 2)
Installed
Installed with the Emergency key.
(Installed)
Emergency
–
(Note 2)
Installed
Installed with the Meter key.
(Installed)
Meter
X TB+Z TB
(Note 2)
Installed
A Temporary key was installed,
but has expired.
(Not Installed)
Temporary
–
(Note 2)
Expired
A Term key or an Emergency key
was installed, but has expired.
(Not Installed)
Not Installed
–
–
Not Installed
Installed with the Permanent key
or the Term key, but the licensed
capacity was insufficient.
(Not Installed)
Permanent or
Term
X TB
–
Not Enough
License
The capacity insufficiency caused
by adding LDEVs.
(Installed)
Permanent or
Term
X TB
(Note 2)
Grace Period
The capacity insufficiency caused
by consuming the meter licensed
capacity.
(Installed)
Meter
X TB-Z TB
(Note 2)
Grace Period
Installed with the Temporary key,
and then reinstalled with the
Permanent key, but the license
capacity was insufficient.
(Installed)
Temporary
X TB
(Note 2)
Installed
Installed with the Permanent key,
then reinstalled with the
Emergency key.
(Installed)
(Note 2)
Installed
(Note 1)
(Note 1)
(Note 1)
Emergency
Unlimited
or X TB
(Note 1)
"–" indicates that nothing appears.
Note 1: X TB indicates a license capacity. (Y TB) might appears beside Unlimited or X TB, indicating the minimum
license capacity. In case of the meter key, X TB indicates the Permanent licensed capacity, and Z TB indicates the
meter licensed capacity.
164 Remote Web Console GUI reference (secondary windows)
License key status
Icon
Key type
Permitted
volume
Term
(days)
Status
Note 2: The Term column shows the number of days remaining before program product expiration.
Alerts window
Use the Alerts window to check the SIMs occurred in the storage system. To check the detail of
each alert, select a SIM in a list, right-click it and then click Detail.
The alert history is displayed in a list. A status indicator is displayed at the upper right of the main
window to show whether DKC or DKU is in bad condition.
Item
Description
Ref. Code
Displays the SIM reference code.
For the details about SIM reference codes, contact HP Technical Support.
Alerts window
165
Item
Description
For the SIM reference codes to be resolved, see “Checking alerts” (page 76).
Error Level
The error level. When the status becomes other than Normal, all SIMs must be completed
(resolved) from the SVP to restore the status to Normal.
• Normal: No error occurs and the status is good.
• Service: Does not require immediate attention and can be addressed during routine
maintenance.
• Moderate: Does not require immediate attention and can be addressed during routine
maintenance.
• Serious: Contact HP Technical Support. Follow up with HP Technical Support to verify that
the problem has been resolved.
• Acute: Contact HP Technical Support. Follow up with HP Technical Support to verify that the
problem has been resolved.
Status
Displays the status of the SIM.
• Complete: The SIM has been deleted from the SVP.
• Not Complete: The SIM has not been deleted.
Date
Displays the date that the SIM occurred.
Total Rows
Displays the total number of rows that are listed.
Detail dialog box
Item
Description
Ref.Code
Displays the SIM reference code.
Error Level
Displays the error level.
Status
Displays the status of the SIM.
• Complete: The SIM has been deleted from the SVP.
• Not Complete: The SIM has not been deleted.
Date
Displays the date that the SIM occurred.
Error Section
Displays the section of the selected row where the error occurred.
Error Detail
Displays more detail on the error of the selected row.
Location
Displays where the error occurred. It differs according to the reference code.
Previous
Provides information on the previous row.
Next
Provides information on the next row.
Close
Closes the dialog box.
166 Remote Web Console GUI reference (secondary windows)
Login Message window
Use the Login Message window to specify the login caution message that appears when Remote
Web Console users log in.
Item
Description
Login Message
You can enter alphanumeric characters (ASCII codes) and some symbols. You can enter up to
2,408 letters. The message that you enter in this text box will appear in the Remote Web Console
login window.
Apply
Implements all the changes or settings. This button is available only in Modify mode.
Cancel
Cancels the changes or settings. This button is available only in Modify mode.
E-mail Information window
Login Message window
167
Use the E-mail Information window to configure settings to report storage system failures (SIMs)
by e-mail. You can also send a test e-mail from this window.
Item
Description
Mail Notice
Specify whether to report system failures by e-mail.
• Enable: Reports system failures by e-mail.
• Disable: Does not report system failures by e-mail.
Mail Server
Set an IPv4 address, an IPv6 address, or a host name of the mail server.
• To set an IPv4 address, select IPv4 and enter four integers in the range of 0 to 255 (for
example, nnn.nnn.nnn.nnn, where n is a number).
• To set an IPv6 address, select IPv6 and enter eight hexadecimal numbers in the range of 0
to FFFF (for example, hhhh:hhhh:hhhh:hhhh:hhhh:hhhh:hhhh:hhhh, where h is a
hexadecimal digit). Enter 0 to omit a segment.
• To set a host name, select Host Name and enter up to 63 alphanumeric characters (ASCII
codes) and symbols, except for the following symbols and a space:
"\;:,*?<>|/#&+=[]'{}^
SMTP-AUTH
Specify whether to use SMTP authentication.
• Enable: Uses SMTP authentication.
• Disable: Does not use SMTP authentication.
Account and
Password
Set the account and password for SMTP authentication. Required when SMTP-AUTH is Enable.
Enter up to 255 alphanumeric characters and symbols (ASCII codes) for user ID and password,
except for the following symbols and a space:
"\;:,*?<>|/#&+=[]'{}^
From Address
Specify an e-mail address of the sender. Enter up to 255 alphanumeric characters (ASCII codes)
and symbols ( ! # $ % & ` + - * / ' ^ { } _ . ).
Return Address
Specify a Reply-To address of e-mail. If you specify this address, replies from the e-mail receivers
will be sent to this address. If you omit this address, replies from the e-mail receivers will be sent
to From Address. The available values are the same as those of From Address.
To Address
Specify e-mail addresses of the receivers and the attributes (To, Cc, or Bcc). Up to 32 addresses
can be specified. The available values are the same as those of From Address.
Test Send
When you click Test Send, test e-mails are sent to the e-mail addresses of the receivers. This
button is available only in Modify mode.
Apply
Implements all the settings. This button is available only in Modify mode.
Cancel
Cancels all the settings. This button is available only in Modify mode.
168 Remote Web Console GUI reference (secondary windows)
Report Display dialog boxes
The Report Display dialog box provides the basic configuration information of the storage system.
This dialog box opens separately from Remote Web Console window, so you can configure settings
while viewing the dialog box.
To open the Report Display dialog box, open the Remote Web Console secondary window, then
click File > Reports.
The information provided in the Report Display dialog box is updated:
•
When the tab is clicked on the Report Display dialog box and the displayed dialog box is
changed.
•
When the Refresh command is selected on the menu bar of the Remote Web Console main
window.
•
When the tab is clicked on the Remote Web Console windows during the operation of the
product option and the displayed window is changed.
•
When the Apply button is clicked on the Remote Web Console main window.
•
When the operation mode is changed from the View mode to the Modify mode on the Remote
Web Console main window.
Common elements
The Report Display dialog box contains the following items:
•
•
The title bar provides information about the connected storage system.
◦
IP indicates the IP address of the SVP.
◦
S/N indicates the serial number.
◦
D/N indicates the device name specified in the Information window.
To view the details about a LUSE volume in the LUN or LDEV dialog box, select a LUSE volume,
right-click, and select the Detail Information command. Detailed information about the LUSE
Report Display dialog boxes
169
volume appears. Items displayed in the dialog box are the same as the items displayed in the
LDEV list.
•
LDEV ID column displays the LDKC number, the CU number, and the LDEV number. These
numbers are separated by colons (:). The following symbols might appear at the end of the
LDEV number:
◦
# (for example, 00:00:01#) indicates that the LDEV is an external volume.
◦
V (for example, 00:00:01V) indicates that the LDEV is a Snapshot virtual volume.
◦
X (for example, 00:00:01X) indicates that the LDEV is a Thin Provisioning virtual volume.
◦
M (for example, 00:00:01M) indicates that the LDEV is a migration volume.
The icons in the LDEV ID column have the following meaning:
Table 43 Icons in the LDEV ID column
Icons
Description
Normal LDEV
Expanded (LUSE) volume
Reserved volume of Auto LUN
Variable-sized volume (CV)
Secured LDEV
Remote command device
Command device
Command device to which the command device security is applied
170
•
Use Export to save the displayed information as a comma-separated values (CSV) file.
•
Use Close to close the Report Display dialog box.
Remote Web Console GUI reference (secondary windows)
Port dialog box
The Port dialog box provides information on ports. The displayed information can be switched
using the Type list.
Item
Description
Type
Select a port type to view the port information on the Port list.
• Fibre: The information on only the Fibre ports is available.
• Mfibre: The information on only the Mfibre ports is available.
Port list
Displays the following when Fibre is selected in Type:
(when Fibre is
selected)
• Port ID: Port name.
• Type: Type of port. Fibre is displayed.
• Speed: Data transfer speed, in Gbps (gigabits per second), for Fibre Channel ports.
• Address (Loop ID): Address and loop ID of port.
• FC Switch: Indicates whether a Fabric switch is used. Enable or Disable is displayed.
• Connection Type: Topology. FC-AL or P-to-P is displayed.
• Attribute: Port attribute. Initiator, Target, RCU Target, or External is displayed.
• Internal WWN: WWN of DKC port.
• Resource Group Name (ID): Name and ID of the resource group where the port is assigned.
Port list
Displays the following when Mfibre is selected in Type:
(when Mfibre is
selected)
• Port ID: Port name.
• Type: Type of port. Mfibre is displayed.
• Attribute: Port attribute. HTP or FNP is displayed.
Report Display dialog boxes
171
Item
Description
• Internal WWN: WWN of Mfibre port.
• Resource Group Name (ID): Name and ID of the resource group where the port is assigned.
Port list
Displays the following when FCoE is selected in Type:
(when FCoE is
selected)
• Port ID: Port name.
• Type: Type of port. FCoE is displayed.
• Speed: Data transfer speed in Gbps (gigabits per second) for FCoE port. 10Gbps is displayed.
• Address (Loop ID): Address and Loop ID of port.
• FC Switch: Indicates whether a Fabric switch is used. Enable is displayed.
• Connection Type: Topology. P-to-P is displayed.
• Attribute: Port attribute. Target is displayed.
• Internal WWN: WWN of DKC port.
• Resource Group Name (ID): Name and ID of the resource group where the port is assigned.
LUN dialog box
The LUN dialog box provides information on the open-system volumes.
172
Item
Description
Port
Select the port for which information is to be listed.
Port ID
Displays the port name.
Group ID
Displays the group number of the host group.
LUN ID
Displays the LUNs (logical unit numbers) assigned to logical volumes.
•
: A logical volume to which an LU path is defined
•
: An expanded LU
•
: A remote command device
•
: A command device
•
: Command device security
Remote Web Console GUI reference (secondary windows)
Item
Description
LDEV ID
From the left the LDKC number, the CU number, and the LDEV number are displayed. For detailed
information, see Common Elements.
Emulation Type
Displays the emulation type.
For an expanded (LUSE) volume, the number of the LDEVs consisting of the LUSE volume appears
after the emulation type (for example, OPEN-V * 3).
Capacity
Displays volume capacity. For an expanded (LUSE) volume, the total capacity of the LDEVs
consisting of the LUSE volume is available.
RAID Level
Displays the RAID level.
Number of Paths
Displays the number of LU paths.
Resource Group
Name (ID)
Displays the name and ID of the resource group where the host group is assigned.
LDEV dialog box
The LDEV dialog box provides information about volumes.
Item
Description
CU or PG
Choose which information to display in the LDEV list.
• If you select LDKC:CU, two lists are available. You can select an LDKC from the list on the
left, and a CU from the list on the right.
• If you select PG, one list is available. You can select the parity group to display from the list.
CLPR
Displays the CLPR number and CLPR name.
LDEV ID
The LDKC number, the CU number, and the LDEV number. For details about icons, see
Table 43 (page 170).
Emulation Type
Displays the emulation type.
For an expanded (LUSE) volume, the emulation type of each LDEV is available.
MAX LBA
Displays the LDEV size recognized by a host.
Report Display dialog boxes
173
Item
Description
Capacity
Displays volume capacity. Open-system volumes are displayed in gigabyte (GB), mainframe
volume are displayed in cylinder (Cyl). For an expanded (LUSE) volume, the capacity of each
LDEV is available.
RAID Level
Displays the RAID level.
Protection
Displays the data protection level.
• SATA-W/V: Write & Verify method on SATA drives.
• SATA-E: Enhancing method on SATA drives.
• Standard: SAS drives, SSD, external volumes, or virtual volumes (V-VOLs).
Internal Volume
Information
Displays the hard disk type of internal volume as follows:
• Blank indicates SAS drive.
• An asterisk (*) indicates SATA drive.
• The dollar sign ($) indicates SSD.
• A hyphen (-) indicates external volume.
Parity Group ID
Displays the parity group.
Encryption
Indicates if the volume is encrypted or not.
• Enable: The volume is encrypted.
• Disable: The volume is not encrypted.
• A hyphen (-) appears when the volume is not an internal volume.
Number of Paths
Displays the number of LU paths.
Attribute
The attribute set for the volume as follows:
• Pool (X): The volume is set as a pool volume (pool-VOL), where X indicates pool ID.
• V-VOL: The volume is set as a virtual volume (V-VOL) for Snapshot.
• V-VOL: The volume is set as a virtual volume (V-VOL) for Thin Provisioning.
• Reserved LDEV: The volume is set as a reserved volume of Auto LUN.
• JNL Volume: The volume is set as a journal volume.
• System Disk: The volume is set as a system disk.
External Volume
Information
Information on the external volume appears in the format of Vendor/ Product name/ Serial
number/ Hard disk type. For an internal volume, "-/-/-/-" appears. For a migration volume,
"-/-/-/ " appears. The hard disk type appears as follows:
• Blank indicates SAS drives.
• An asterisk (*) indicates BD or SATA drive.
• The dollar sign ($) indicates SSD.
• A hyphen (-) indicates internal volume.
174
Number of External
Paths
Displays the number of LU paths that are set for the external volume.
Cache Mode
Displays the Cache Mode set for the external volume when it was mapped. For an internal
volume or a migration volume, a hyphen (-) appears.
Resource Group
Name (ID)
Displays the name and ID of the resource group where the LDEV is assigned.
Remote Web Console GUI reference (secondary windows)
LDEV Status dialog box
The LDEV Status dialog box provides information about the status of volumes.
Item
Description
Parity Group list
Allows you to select which disk group to display.
Parity Group ID
A parity group number belonging to the selected disk group.
LDEV Status
A status of all the volumes in the parity group.
• Normal: All volumes are in a normal status.
• Blocked: All volumes are in a blocked status.
• Format: All volumes are being formatted.
• Preparing Quick Format: All volumes are being prepared for Quick Format.
• Quick Formatting: Quick Format is in progress. When a parity group contains both the
Normal and Normal (Quick Format) statuses, the list also displays Normal (Quick Format).
• Correction Access: Access attributes of all volumes are being changed.
• Copying: Data in all volumes is being copied.
• Read Only: Hosts can only read the volumes.
• Shredding: The shredding operation is in progress.
• Unknown: The system does not recognize the status of any volumes.
• Warning: Some volumes are not in a normal status.
• -: No volumes in the parity group.
Page Switching area Displays up to 4,096 parity groups per page. When more parity groups are defined, use the
following functions to see the entire list:
• Page Number: Displays the current page number. It also allows you to display the desired
page.
• Previous: Displays the previous page.
• Next: Displays the next page.
Report Display dialog boxes
175
Item
Description
Status area
Displays the status of the disk group that you have selected in the Parity Group list.
• Normal: All volumes are in a normal status.
• Warning: Not all volumes are in a normal status.
Detail
When you select a parity group in the list and click Detail, all the LDEVs in the parity group are
displayed in the LDEV list on the right.
LDEV ID
From the left the LDKC number, the CU number, and the LDEV number are displayed.
Status
A status of a volume.
• Normal: The volume is in a normal status.
• Blocked: The volume is in a blocked status.
• Format: The volume is being formatted.
• Preparing Quick Format: The volume is being prepared for Quick Format.
• Quick Formatting: Quick Format is in progress.
• Correction Access: The access attribute of the volume is being changed.
• Copying: Data in the volume is being copied.
• Read Only: Hosts can only read the volume.
• Shredding: The shredding operation is in progress.
• Unknown: The system does not recognize the status of the volume.
Resource Group
Name (ID)
176
Displays the name and ID of the resource group where the LDEV is assigned.
Remote Web Console GUI reference (secondary windows)
Glossary
AL
Arbitrated loop.
AL-PA
Arbitrated loop physical address. A 1-byte value that the arbitrated loop topology uses to identify
the loop ports. This value becomes the last byte of the address identifier for each public port on
the loop.
bit
The basic unit of data in a binary numbering system (binary digit), represented by a 0 or a 1.
Eight bits equals one byte.
CHA
Channel adapter. A device that provides the interface between the array and the external host
system. Occasionally, this term is used synonymously with the term channel host interface processor
(CHIP).
CLI
Command-line interface. An interface comprised of various commands which are used to control
operating system responses.
CLPR
Cache logical partition.
Cnt Ac-J Z
The version of Continuous Access Journal that supports mainframe volumes.
Cnt Ac-S Z
The version of Continuous Access Synchronous that supports mainframe volumes.
command device
A volume in the disk array that accepts Continuous Access, Business Copy, or P9000 for Business
Continuity Manager control operations, which are then executed by the array.
CU
Control Unit. Used to organize the storage space attached to the disk controller ( DKC). You can
group similarly configured logical devices (LDEVs) with unique control unit images (CUs). CUs
are numbered sequentially. The disk array supports a certain number of CUs, depending on the
disk array model. Each CU can manage multiple LDEVs; therefore, both the CU number and the
LDEV number are required to identify an LDEV.
CVS
Custom volume size. CVS devices (OPEN-x CVS or 3390-x CVS) are custom volumes configured
using array management software to be smaller or larger than normal fixed-size OPEN or
mainframe system volumes. Synonymous with volume size customization (VSC). OPEN-V is a
CVS-based volume.
C-Track
Continuous Track. An HP software program that detects internal hardware component problems
on an array and automatically reports them to HP Support Services.
daemon
A process in UNIX systems that runs in the background, without any direct user console or terminal
interaction.
DKA
Disk adapter.
DKC
Disk controller.
DKU
Disk Unit.
emulation mode
The LDEVs associated with each RAID group are assigned an emulation mode that makes them
operate like OPEN system disk drives. The emulation mode determines the size of an LDEV or
volume.
OPEN-V: User-defined custom size
3390-3/3R: 2.838 GB
3390-9: 8.514 GB
3390-L: 27.844 GB
3390-M: 55.689 GB
3380-3 2.377 GB
FC-AL
Fibre Channel Arbitrated Loop.
Fibre Channel
A data transfer architecture designed for mass storage devices and other peripheral devices that
require high bandwidth.
Fibre Channel Loop
An enclosure that provides twelve-port central interconnect for Fibre Channel Arbitrated Loops
following the ANSI Fibre Channel drive enclosure standard.
177
FICON
Fibre connectivity. An FC layer 4 protocol used to map mainframe channel command and data
I/O operations onto standard FC infrastructure, protocol, and FC services.
HBA
Host bus adapter.
HDD
Hard disk drive.
IMPL
Initial microprogram load.
LCP
Local control port.
LDKC
Logical disk controller.
local disk
A disk in the local array. Sometimes refers to a disk in a local host.
LUN
Logical unit number. A LUN results from mapping a logical unit number, port ID, and LDEV ID to
a RAID group. The size of the LUN is determined by the emulation mode of the LDEV and the
number of LDEVs associated with the LUN.
LUSE
Logical Unit Size Expansion. The LUSE feature is available when the HP StorageWorks LUN
Manager product is installed, and allows a LUN, normally associated with only a single LDEV,
to be associated with 1 to 36 LDEVs. Essentially, LUSE makes it possible for applications to access
a single large pool of storage.
MPB
MSL to MicroProcessor Blade
MSCS
Microsoft Cluster Service.
OPEN-x
A general term describing any of the supported OPEN emulation modes (for example, OPEN-E).
There are two types of OPEN-x devices: legacy OPEN-x devices with a fixed size (such as OPEN-3,
OPEN-8, OPEN-9, and OPEN-E), and OPEN-V, which has a variable size and is a CVS-based
volume.
ORM
Online Read Margin
P-VOL
Primary volume.
path
A path is created by associating a port, a target, and a LUN ID with one or more LDEVs. Also
known as a LUN.
PCB
Printed circuit board.
PDEV
Physical device.
port
A physical connection that allows data to pass between a host and the disk array. The number
of ports on a disk array depends on the number of supported I/O slots and the number of ports
available per I/O adapter. The P9000 and XP family of disk arrays supports Fibre Channel (FC)
ports and other port types. Ports are named by port group and port letter, such as CL1-A. CL1 is
the group; A is the port letter.
RAID level
A configuration of disk drives that uses striping, mirroring, and parity to improve performance
and data availability and reliability.
RAID Manager
The CLI configuration and replication tool for the P9000 or XP disk array that system administrators
can use to enter RAID Manager commands from open-system hosts to perform Continuous Access,
Business Copy, Database Validator, and Data Retention operations, as well as provisioning
commands on logical devices.
RAID1/5
Specific RAID architectures.
RCU
Remote control unit.
Remote Web
Console
A browser-based program installed on the SVP that allows you to configure and manage the disk
array.
RIO
Remote I/O.
S-VOL
Secondary or remote volume. The copy volume that receives the data from the primary volume.
SAS
Serial Attached SCSI.
SATA
Serial Advanced Technology Attachment.
SIM
Service information message.
SVP
Service processor. A computer built into a disk array. The SVP, used only by an HP service
representative, provides a direct interface to the disk array.
178
Glossary
synchronous
Describes computing models that perform tasks in chronological order without interruption. In
synchronous replication, the source waits for data to be copied at the destination before
acknowledging that it has been written at the source.
UDP
User Datagram Protocol.
V-VOL
Virtual Volume.
VOL, vol
Volume.
volume
Volume on disk. An accessible storage area on disk, either physical or virtual.
VSC
Volume size customization. Also known as CVS.
WWN
World Wide Name. A unique identifier assigned to a Fibre Channel device.
179
Index
A
account lock policy, 45
adding SVP to trusted zone, 26
Adobe Flash, 22
Alerts function, 76
authentication server, connecting to, 30
authorization server, enabling cooperation, 31
B
Blocking HTTP communications, 19
built-in user, 25
C
cable connections, 12
Cache Memories report, 99
capacity, calculating, 60
capacity, estimating for license, 58
certificates, acquiring, 15
changing a user’s password, 39
changing permissions, 39
Channel Adapters report, 99
clearing cache, 84
client computer
setup, 20
UNIX requirements, 21
Windows requirements, 20
contacting HP, 87
conventions
document, 88
storage capacity values, 88
text symbols, 89
creating a report, 66
creating a user account, 37
D
deleting a report, 67
deleting a user account, 40
disabling a user account, 40
Disk Adapters report, 90
disk arrays
supported models, 9
display errors, 81
document
conventions, 88
related information, 87
documentation
HP website, 87
providing feedback, 87
downloading trace files,FD Dump tool, 85
E
e-mail notifications
setting up, 47
testing, 48
errors
180 Index
clearing, 84
display, 81
Java, 77
logon, 77
miscellaneous, 84
no response, 79
UNIX, 83
external application, viewing data, 66
external volume, calculating capacity, 60
F
FD Dump tool
downloading trace files, 85
Firefox problems on UNIX, troubleshooting, 85
firewall configuration, 22
G
groups, user, 32
GUI highlights, 9
H
help
obtaining, 87
Host Groups report, 91
Hosts report, 92
HP
technical support, 87
I
Insight Manager
about, 42
user group roles, 42
IPv6, configuring communications, 12
J
Java
clearing cache, 84
errors, 77
saving log and trace files, 86
JRE
configuring, 22
versions for UNIX, 21
versions for Windows, 21
L
license key
enabling or disabling, 61
estimating capacity, 58
expiration, 63
installing, 61
insufficient capacity, 62
removing, 62
types, 54
logging in, 26
Logical Device Expansions report, 92
Logical Devices report, 93
logon errors, 77
logon message, creating a, 46
LUNs report, 94
M
MP Blade Details report, 95
MP Blades report, 95
O
online help, 10
openssl.exe, 13
overview, 9
P
Parity Groups report, 95
password
allowable characters and symbols, 39
changing a user’s, 39
permissions, changing, 39
Physical View report, 100
port locations, 65
Ports report, 96
R
registering certificates, Insight Manager, 43
related documentation, 87
releasing blocked HTTP communications, 19
Report Viewer window, 67
reports
about, 10
Cache Memories, 99
Channel Adapters, 99
Disk Adapters, 90
downloading, 67
Host Groups, 91
Hosts, 92
Logical Device Expansions, 92
Logical Devices, 93
LUNs, 94
MP Blade Details, 95
MP Blades, 95
Parity Groups, 95
Physical View, 100
Ports, 96
Spare Drives, 97
Storage System Summary, 97
using, 66
requirements, client computer, 20
restrictions on UNIX, 29
S
session timeout, 45
setting time periods, 49
setting up client computer, 20
setup workflow, 12
signed certificates, 15
SIMs, checking, 76
Spare Drives report, 97
SSL-encrypted communications
blocking HTTP communications, 19
creating a private keypair, 13
creating a public keypair, 14
overview, 13
updating the certificate, 15
stalled tasks, 75
status refresh interval, 75
status, port, 65
storage capacity values
conventions, 88
Storage System Summary report, 97
storage system, applying changes to, 28
storage system, viewing, 64
Subscriber's Choice, HP, 87
SVP, adding to trusted sites, 26
symbols in text, 89
T
tasks
about, 74
managing, 74
TCP/IP, setting up a firewall, 22
technical support
HP, 87
service locator website, 88
term key, using, 55
text symbols, 89
time periods, setting, 49
tool definition file, 43
troubleshooting, 76
typographic conventions, 88
U
UNIX
errors, 83
requirements, 21
user accounts
creating, 37
deleting, 40
disabling, 40
workflow for creating, 30
user group
Roles, 34
V
viewing a report, 67
W
Web browser
accepting certificates, 16
clearing cache, 84
configuring, 22
restrictions, 27
websites
HP , 88
HP Subscriber's Choice for Business, 87
product manuals, 87
Windows requirements, 20
Windows Server 2003/2008 computer, configuring, 22
181
wizards, 10
182
Index
Download PDF
Similar pages