emc ionixtm storage configuration advisor - … · emc smi-s provider for symmetrix and clariion...

128
EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com EMC ® Ionix TM Storage Configuration Advisor Version 3.0 Administration Guide P/N 300-011-605 REV 06

Upload: lamthuy

Post on 19-Jul-2018

228 views

Category:

Documents


0 download

TRANSCRIPT

  • SCA_Admin Guide.book Page 1 Monday, March 25, 2013 1:47 PM

    EMC IonixTM Storage Configuration AdvisorVersion 3.0

    Administration GuideP/N 300-011-605

    REV 06

    EMC CorporationCorporate Headquarters:

    Hopkinton, MA 01748-91031-508-435-1000www.EMC.com

  • SCA_Admin Guide.book Page 2 Monday, March 25, 2013 1:47 PM

    Copyright 2013 EMC Corporation. All rights reserved.

    Published April 2013

    EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.

    THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

    Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.

    For the most up-to-date regulatory document for your product line, go to the Technical Documentation and Advisories section on EMC Powerlink.

    For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com.

    All other trademarks used herein are the property of their respective owners.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide2

  • Contents

    SCA_Admin Guide.book Page 3 Monday, March 25, 2013 1:47 PM

    Preface 11

    Chapter 1 Initial Setup Administration overview ...................................................................................... 16 Access and login to the console ............................................................................ 17

    Licensing support ............................................................................................. 18Permanent license............................................................................................. 20

    EMC Support Matrix out-of-date message ......................................................... 21 Create a new Security Administrator account.................................................... 22 Modify emcsrv user account password............................................................... 24

    Chapter 2 User Management Overview.................................................................................................................. 26 Manage users........................................................................................................... 26 Manage roles............................................................................................................ 27

    Assign role ......................................................................................................... 27Edit users ........................................................................................................... 28

    Manage authentication .......................................................................................... 28 Change Lockbox password ................................................................................... 30

    Chapter 3 System Administration System notifications................................................................................................ 32 Shutting down and rebooting SCA...................................................................... 33 Reconfigure network parameters ......................................................................... 34

    Reconfigure the network parameters and reinitialize lockbox.................. 34

    Chapter 4 Manage User-defined Groups User-defined groups............................................................................................... 38

    System groups................................................................................................... 38Static user-defined groups............................................................................... 38Dynamic user-defined groups ........................................................................ 38Subgroups.......................................................................................................... 38User-Defined Groups view ............................................................................. 38

    Chapter 5 Discovery Overview.................................................................................................................. 40

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide 3

  • Contents

    SCA_Admin Guide.book Page 4 Monday, March 25, 2013 1:47 PM

    Manage access profiles ........................................................................................... 41Profile types ....................................................................................................... 42

    Manage initial discovery policies ......................................................................... 43Creating initial discovery policies .................................................................. 43Discovery policy execution results ................................................................. 43Discovery view.................................................................................................. 44

    Manage rediscovery policies ................................................................................. 45 Configure host resolution ...................................................................................... 46 Configure non-discovered objects ........................................................................ 47 Manage object inventory........................................................................................ 48 Manage Discovery Managers status..................................................................... 48 To remove the discovered hosts ............................................................................ 49

    Chapter 6 EMC Support Matrix Administration EMC Support Matrix overview............................................................................. 52 Match to EMC Support Matrix.............................................................................. 53

    Automatic matching ......................................................................................... 53Manual matching .............................................................................................. 53Bulk matching.................................................................................................... 54

    Updating and installing EMC Support Matrix Data.......................................... 56Remote update and installation ...................................................................... 58Local update and installation.......................................................................... 59Restoring previously installed ESM data ...................................................... 60

    Chapter 7 Database Administration Database Administration overview...................................................................... 64 Back-up repositories ............................................................................................... 65

    Manually back-up discovered objects, Sybase and Lockbox repositories 65 Restore repositories................................................................................................. 67

    Restore only Sybase repository ....................................................................... 67Restore all repositories ..................................................................................... 67

    Retention policy....................................................................................................... 69

    Chapter 8 Install Providers Overview .................................................................................................................. 72 EMC SMI-S Provider for Symmetrix and CLARiiON ....................................... 73

    Windows installation........................................................................................ 73Linux installation .............................................................................................. 74

    Adding CLARiiONs to the EMC SMI-S Provider for discovery...................... 76In-band CLARiiONs......................................................................................... 76Using the TestSMiProvider application to add Symmetrix and CLARiiON arrays to the EMC SMI-S Provider ................................................................. 77

    Brocade SMI agent .................................................................................................. 80Brocade SMI Agent for EOS (McDATA) ....................................................... 80

    HiCommand for Hitachi arrays ............................................................................ 80 Troubleshooting Hitachi and HP array discovery.............................................. 80

    SSL configuration causing discovery to fail .................................................. 80

    Appendix A Troubleshooting Overview .................................................................................................................. 82 General provider configuration issues................................................................. 83 ESX server issues ..................................................................................................... 84

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide4

  • Contents

    SCA_Admin Guide.book Page 5 Monday, March 25, 2013 1:47 PM

    Brocade and McDATA provider issues ............................................................... 84McDATA guides............................................................................................... 84No elements detected with Brocade and McDATA CIMOMs................... 84Brocade provider not sending events............................................................ 85Brocade provider stops sending events ........................................................ 85Brocade provider consuming memory and CPU ........................................ 85Error message: Operation Not Supported .................................................... 86

    EMC SMI Provider for Symmetrix and CLARiiON .......................................... 86Provider versions.............................................................................................. 86Identifying EMC SMI Provider version numbers........................................ 86Changing the EMC SMI Provider password................................................ 86Obtaining the EMC SMI Provider log files ................................................... 87Modifying the EMC SMI Provider log severity ........................................... 87Restarting the EMC SMI Provider ................................................................. 87EMC SMI-S Provider Tools ............................................................................. 89Logging troubleshooting data ........................................................................ 92Disabling statistical information gathering .................................................. 92Solutions Enabler configuration error regarding RA Directors................. 93Discovery errors related to timing out .......................................................... 94VCMDB devices................................................................................................ 95Starting the cimserver on Linux ..................................................................... 95Database errors in the log................................................................................ 95Connection failed message.............................................................................. 96Error opening gatekeeper device ................................................................... 96Array DM errors caused by EMC SMI Provider/Solutions Enabler related issues .................................................................................................................. 96

    IBM CIM Agent for Open DS API...................................................................... 100Install provider administration utility......................................................... 100Set provider log level ..................................................................................... 100Collect provider log files ............................................................................... 100Restart IBM DS provider ............................................................................... 100Clean up all Indication subscriptions .......................................................... 100

    Troubleshooting Hitachi arrays .......................................................................... 101Supported providers and agents.................................................................. 101SSL configuration causing discovery to fail ............................................... 102Device Manager version does not support an automatic refresh of the array data ................................................................................................................... 102Verifying that Device Manager is accessible .............................................. 102Verifying discovered data ............................................................................. 103

    Troubleshooting host discovery.......................................................................... 104Host Discovery failure due to stale entry ................................................... 104Supported HBA, driver, and firmware versions ....................................... 104Discovering HBA path data .......................................................................... 104Common reasons for discovery failure with Windows hosts.................. 106Prerequisites for host discovery ................................................................... 106Failure to open WMI sessions....................................................................... 106Improper credentials...................................................................................... 108Configuring sudo............................................................................................ 109Configuring PowerBroker............................................................................. 111Discovery of a UNIX host failing due to an RSA authentication exception 113

    General SMI issues ............................................................................................... 113Error message: HTTP Error (401 Unauthorized) ....................................... 113Error message: Cannot connect to . Connection failed...... 114Error message: Unable to reach element..................................................... 114

    Troubleshooting the gdpm DM .......................................................................... 116

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide 5

  • Contents

    SCA_Admin Guide.book Page 6 Monday, March 25, 2013 1:47 PM

    Guidelines for analyzing troubleshooting data.......................................... 116 Troubleshooting an offline array Domain Manager......................................... 117 Trap Adapter, Indication Adapter and INCHARGE_OI ................................. 118

    How to check for an indication flood........................................................... 118 Using SNMP........................................................................................................... 120

    Cisco SNMP Rediscoveries not invoked on configuration changes........ 120 Troubleshooting user interface conditions ........................................................ 121

    Unable to see the Close button for Find window....................................... 121Default value for the UDG refresh period................................................... 121Discovery status permanently stays in running state................................ 121Discovery status: One or more element discoveries failed ....................... 122Discovery status: No elements detected...................................................... 122Out of memory errors: The user interface hangs, stalls, or slows down 122UI logs for troubleshooting............................................................................ 123Unable to open UI Browser to the appliance .............................................. 124Unable to see any data in the UI even after creating profiles and policies 124Progress bar for loading data hangs for a long time in any view............ 124Unable to sort or filter by 'Last Successful' Time of Discovery in the Discovered Objects view................................................................................ 125Object Details and Maps not showing the real-time environment.......... 125Paths shown in maps do not match the Path Details tab .......................... 125

    Useful commands and utilities............................................................................ 126Utilities.............................................................................................................. 126Commands ....................................................................................................... 126

    Using discovery logs............................................................................................. 127Sending logs and repository files to Customer Support ........................... 128

    Rediscovery scenarios for user-defined groups................................................ 128

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide6

  • Title Page

    Tables

    SCA_Admin Guide.book Page 7 Monday, March 25, 2013 1:47 PM

    1 SCA role privileges ......................................................................................... 272 Host resolution parameters ........................................................................... 463 Required providers and agents................................................................... 1014 Useful utilities................................................................................................ 1265 Useful commands.......................................................................................... 1266 Domain Manager logs .................................................................................. 1277 Logs and repository files for diagnosis...................................................... 128

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide 7

  • Tables

    SCA_Admin Guide.book Page 8 Monday, March 25, 2013 1:47 PM

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide8

  • Title Page

    Figures

    SCA_Admin Guide.book Page 9 Monday, March 25, 2013 1:47 PM

    1 Login screen with the default license ................................................................................. 172 Default license expiry screen ............................................................................................... 183 Default license expiry screen ............................................................................................... 184 Login screen with the evaluation license ........................................................................... 195 Evaluation license expiry screen ......................................................................................... 196 Login screen with the permanent license .......................................................................... 207 EMC Support Matrix out-of-date message ........................................................................ 218 Administration screen .......................................................................................................... 229 System Notifications dialog box ......................................................................................... 3210 Edit settings menu on the vSphere client .......................................................................... 3411 Virtual machine properties window on the vSphere client ............................................ 3512 Access Profiles view .............................................................................................................. 4113 Back-up Repository dialog box ........................................................................................... 6514 Historical data retention policy dialog box ....................................................................... 6915 Example of how to start the TestSmiProvider application ............................................. 7716 Indications menu ................................................................................................................... 91

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide 9

  • Figures

    SCA_Admin Guide.book Page 10 Monday, March 25, 2013 1:47 PM

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide10

  • SCA_Admin Guide.book Page 11 Monday, March 25, 2013 1:47 PM

    Preface

    As part of an effort to improve and enhance the performance and capabilities of its product lines, EMC periodically releases revisions of its hardware and software. Therefore, some functions described in this document may not be supported by all versions of the software or hardware currently in use. For the most up-to-date information on product features, refer to your product release notes.

    If a product does not function properly or does not function as described in this document, please contact your EMC representative.

    Audience This document is part of the EMC Ionix Storage Configuration Advisor documentation set, and is intended for use by system administrators and analysts.

    Relateddocumentation

    Related documents include:

    EMC Ionix Storage Configuration Advisor 3.0 Non-EMC Software

    EMC Ionix Storage Configuration Advisor 3.0 Hardware Replacement Guide

    EMC Ionix Storage Configuration Advisor 3.0 Product Security Defaults

    EMC Ionix Storage Configuration Advisor 3.0 Support Matrix

    EMC Ionix Storage Configuration Advisor 3.0 Online Help

    EMC Ionix Storage Configuration Advisor 3.0 Release Notes

    EMC Ionix Storage Configuration Advisor 3.0 Performance and Scalability Guidelines

    EMC Ionix Storage Configuration Advisor 3.0 Installation Quick Start

    EMC Ionix Storage Configuration Advisor 3.0 Installation Guide

    EMC Ionix Storage Configuration Advisor 3.0 User Guide

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide 11

  • Preface

    SCA_Admin Guide.book Page 12 Monday, March 25, 2013 1:47 PM

    Conventions used inthis document

    EMC uses the following conventions for special notices.

    Note: A note presents information that is important, but not hazard-related.

    CAUTION!A caution contains information essential to avoid data loss or damage to the system or equipment.

    IMPORTANT!An important notice contains information essential to operation of the software.

    Typographical conventionsEMC uses the following type style conventions in this document:

    Normal Used in running (nonprocedural) text for: Names of interface elements (such as names of windows, dialog boxes, buttons,

    fields, and menus) Names of resources, attributes, pools, Boolean expressions, buttons, DQL

    statements, keywords, clauses, environment variables, filenames, functions, utilities

    URLs, pathnames, filenames, directory names, computer names, links, groups, service keys, file systems, notifications

    Bold Used in running (nonprocedural) text for: Names of commands, daemons, options, programs, processes, services,

    applications, utilities, kernels, notifications, system call, man pages

    Used in procedures for: Names of interface elements (such as names of windows, dialog boxes, buttons,

    fields, and menus) What user specifically selects, clicks, presses, or types

    Italic Used in all text (including procedures) for: Full titles of publications referenced in text Emphasis (for example a new term) Variables

    Courier Used for: System output, such as an error message or script URLs, complete paths, filenames, prompts, and syntax when shown outside of

    running text

    Courier bold Used for: Specific user input (such as commands)

    Courier italic Used in procedures for: Variables on command line User input variables

    < > Angle brackets enclose parameter or variable values supplied by the user

    [ ] Square brackets enclose optional values

    | Vertical bar indicates alternate selections - the bar means or

    { } Braces indicate content that you must specify (that is, x or y or z)

    ... Ellipses indicate nonessential information omitted from the example

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide12

  • Preface

    SCA_Admin Guide.book Page 13 Monday, March 25, 2013 1:47 PM

    Where to get help EMC support, product, and licensing information can be obtained as follows.

    Product information For documentation, release notes, software updates, or for information about EMC products, licensing, and service, go to the EMC Powerlink website (registration required) at:

    http://Powerlink.EMC.com

    Technical support For technical support, go to EMC Customer Service on Powerlink. To open a service request through Powerlink, you must have a valid support agreement. Please contact your EMC sales representative for details about obtaining a valid support agreement or to answer any questions about your account.

    Your comments Your suggestions will help us continue to improve the accuracy, organization, and overall quality of the user publications. Please send your opinion of this document to:

    [email protected]

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide 13

    http://powerlink.emc.com

  • Preface

    SCA_Admin Guide.book Page 14 Monday, March 25, 2013 1:47 PM

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide14

  • SCA_Admin Guide.book Page 15 Monday, March 25, 2013 1:47 PM

    1

    This chapter describes the necessary steps for setting up and maintaining the EMC Ionix Storage Configuration Advisor (SCA) environment. Topics include:

    Administration overview.............................................................................................. 16 Access and login to the console.................................................................................... 17 EMC Support Matrix out-of-date message................................................................. 21 Create a new Security Administrator account ........................................................... 22 Modify emcsrv user account password ...................................................................... 24

    Initial Setup

    Initial Setup 15

  • Initial Setup

    SCA_Admin Guide.book Page 16 Monday, March 25, 2013 1:47 PM

    Administration overviewAfter SCA hardware installation and software initialization (as described in the EMC Ionix Storage Configuration Advisor Installation Guide), you can begin to administer SCA for your environment.

    IMPORTANT!The Security Administrator privilege for the Admin user is the highest privilege in SCA. Only as a Security Administrator can you manage users including user roles. The Administrator role allows you to manage all tasks except User Management.

    SCA allows you, the Admin user, to set up and manage the following tasks:

    System notifications

    Discovery management including management of:

    Access Profiles

    Object inventory

    Initial discovery policies

    Rediscovery policies

    Host resolution parameters

    Non-discovered hosts

    Managers status

    Database administration including administration of:

    Retention policies

    Backup repository schedules

    User-defined group management Create static and dynamic user-defined groups

    User management (Security Administrator role only), includes management of:

    User authentication

    Users Add, delete and modify users

    User roles Assign privileges

    Change Lockbox Passcode

    EMC Support Matrix administration (For computing interoperability information), includes:

    Manual matching

    Bulk matching

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide16

  • Initial Setup

    SCA_Admin Guide.book Page 17 Monday, March 25, 2013 1:47 PM

    Access and login to the consoleThis section describes the necessary steps to access and log in to SCA. It also provides information about the licensing support.

    SCA is provided with a default Admin with Security Administrator privileges for initial login. The Security Administrator is the only administrative role that can add and modify users, as well as perform normal administrative tasks. After logging in to the system, ensure that you create other users with administrative and non-administrative roles as described in Chapter 2, Manage roles on page 27.

    Initial loginTo access and log in to SCA:

    1. Open Windows Internet Explorer (IE) or Firefox browser.

    Note: Make sure your screen resolution is set to at least 1024 x 768.

    For IE users, launch the browser from the Windows Desktop icon or Start > Programs menu each time you access an SCA console. Performance issues can occur when using either the File > New Window menu option, or the Ctrl + N shortcut key to launch a browser in which to run an SCA console.In addition, make sure you disable pop-up blockers.

    2. Type the URL for the SCA appliance: https:///sca.

    The EMC Ionix Storage Configuration Advisor login screen opens, as shown in Figure 1 on page 17.

    Figure 1 Login screen with the default license

    3. Type the username and password of the default Security Administrator:

    Username: admin

    Password: 123456qw

    Access and login to the console 17

  • Initial Setup

    SCA_Admin Guide.book Page 18 Monday, March 25, 2013 1:47 PM

    4. Click Login to display the SCA Dashboard.

    The website security certificate dialog box appears. Select Yes to continue.

    Note: If you select Always trust content from this publisher, the security certificate does not appear for subsequent login.

    CAUTION!After initial login, it is highly recommended that you log in to the Admin with Security Administrator role account, and change the default admin password to protect the security of your system. Create a new Security Administrator account on page 22 provides instructions.

    Licensing supportThis section provides information about the SCA licensing support.

    Default LicenseThe default license is provided along with the SCA with a 30-day validity period. The 30-day period starts when you log in to the application for the first time. During the evaluation period, you can register for the extension of the evaluation license or permanent license. In the login screen click To register click here. The product registration screen is displayed as shown in Figure 2 on page 18.

    Figure 2 Default license expiry screen

    On expiry of the default license period, you will be directed to the Product Registration screen instead of the usual Login screen as shown in Figure 3 on page 18, where you will be able to type the evaluation or permanent license key for an extension of the license.

    Figure 3 Default license expiry screen

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide18

  • Initial Setup

    SCA_Admin Guide.book Page 19 Monday, March 25, 2013 1:47 PM

    Evaluation licenseYou can extend the validity of the default license by procuring an extended evaluation license key. The evaluation license will be valid for a period of 15, 30, 45, or 60 days. The evaluation license is valid from the day you type the evaluation license key for license extension. On expiry of the evaluation license period, you are directed to the Product Registration screen where you can type another evaluation or permanent license key, as applicable.

    The Login screen with the evaluation license appears as shown in Figure 4 on page 19.

    Figure 4 Login screen with the evaluation license

    When the evaluation license expires you are directed to the Product Registration screen instead of the Login screen as shown in Figure 5 on page 19.

    Figure 5 Evaluation license expiry screen

    Type the license keypermanent or evaluation licensefor 15, 30, 25, or 60 days, as applicable.

    Access and login to the console 19

  • Initial Setup

    SCA_Admin Guide.book Page 20 Monday, March 25, 2013 1:47 PM

    Permanent license You can request for a permanent license to the application. On entering the permanent license key in the Product Registration screen, you will be able to access the application indefinitely.

    Figure 6 Login screen with the permanent license

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide20

  • Initial Setup

    SCA_Admin Guide.book Page 21 Monday, March 25, 2013 1:47 PM

    EMC Support Matrix out-of-date messageWhen you log in to the SCA appliance, if the ESM data is out-of-date, a message is displayed as shown in Figure 7 on page 21. This indicates that the ESM data installed on the appliance must be upgraded for validation to be done against the latest interoperability information.

    To update ESM data, download the SCA EMC Support Matrix update from Powerlink and install it on the appliance.

    Updating and installing EMC Support Matrix Data on page 56 describes how you can update the ESM data.

    Figure 7 EMC Support Matrix out-of-date message

    EMC Support Matrix out-of-date message 21

    http://Powerlink.EMC.comhttp://Powerlink.EMC.com

  • Initial Setup

    SCA_Admin Guide.book Page 22 Monday, March 25, 2013 1:47 PM

    Create a new Security Administrator accountThe Admin user with Security Administrator role is the default user provided with SCA. This role cannot be edited, disabled, or deleted. However, the Admin password can be changed to Admin user with a Security Administrator user role, thereby creating a Security Administrator account for that user.

    To create a new Security Administrator account:

    1. Log in to SCA with username: admin and password: 123456qw.

    2. From the SCA Dashboard, click Administration to display the Administration menu functions, as shown in Figure 8 on page 22.

    Figure 8 Administration screen

    3. Click Manage Users.

    4. Click Create Users in the Manage Users screen.

    5. In the Create User dialog box, type:

    First Name:

    Last Name:

    Email:

    For User Role, select Security Administrator from the drop-down list.

    6. Type User Authentication information:

    a. Select desired Authentication Method from the drop-down list.

    b. Type the username.

    c. Type the password and then retype the password.

    IMPORTANT!Ensure that you make a note of the username and password you provide here. After you type it, there is no other way to retrieve the information.

    7. Click OK to create the user and return to the Manage Users screen.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide22

  • Initial Setup

    SCA_Admin Guide.book Page 23 Monday, March 25, 2013 1:47 PM

    8. Log out of SCA.

    9. Ensure that you can:

    a. Log in again with the new Security Administrator credentials.

    If you cannot log in, use the default username admin and password 123456qw to log in.

    b. Select the user in Administration > Manage Users screen.

    c. Click Edit and reset the password.

    d. See the Administration options on the Administration screen, as shown in Figure 8 on page 22.

    e. Select User Administration.

    If you cannot see the Administration options or if the User Administration button is disabled, then you may not have selected the User Role and Permissions correctly. To fix the mistake:

    a. Log out of the system.

    b. Log in again as admin with password 123456qw.

    c. Go to Manage Users.

    d. Select the new administrator from the list and click Edit.

    e. Select Security Administrator for User Role.

    f. Select Create Policies and Security Administrator for Permissions.

    g. Click OK to save the changes.

    h. Repeat steps 5, 6, and 7.

    Create a new Security Administrator account 23

  • Initial Setup

    SCA_Admin Guide.book Page 24 Monday, March 25, 2013 1:47 PM

    Modify emcsrv user account passwordemcsrv is a default user account in the appliance with Security Administrator privileges. You cannot edit or delete this account.

    However, in order to avoid any potential security breach through this user account, use these steps to modify the default password for emcsrv:

    1. Log in as the root user.

    2. Type the following command:

    passwd emcsrv

    You are prompted to change the emcsrv user password.

    3. Type the new password, and when prompted to confirm it, retype the new password.

    The following message appears confirming that the new password has been updated successfully:

    passwd : all authentication tokens updated successfully.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide24

  • SCA_Admin Guide.book Page 25 Monday, March 25, 2013 1:47 PM

    2

    This chapter discusses creating and managing users including assigning user roles, and managing user authentication. Topics include:

    Overview ......................................................................................................................... 26 Manage users .................................................................................................................. 26 Manage roles ................................................................................................................... 27 Manage authentication.................................................................................................. 28 Change Lockbox password........................................................................................... 30

    User Management

    User Management 25

  • User Management

    SCA_Admin Guide.book Page 26 Monday, March 25, 2013 1:47 PM

    OverviewEMC Ionix Storage Configuration Advisor allows the Security Administrator to perform user management functions.

    User management consists of managing Users, User Authentication, and User Roles. SCA provides a default User and User Role. Additional Users and User Roles can be created by the Security Administrator and are managed from the SCA Console Administration tab.

    This section provides an overview of the Manage User features. The SCA online help provides field descriptions and definitions for User Management features.

    The default username is admin, and password is 123456qw. The admin user is assigned the Security Administrator role, and therefore has all necessary permissions for user management and administration. The admin user cannot be deleted or disabled.

    CAUTION!It is highly recommended that you do not use the default admin account. It is best to create a new Security Administrator account and change the admin password to protect the security of your system. Create a new Security Administrator account on page 22 provides instructions.

    Manage usersTo create additional users for the EMC Ionix Storage Configuration Advisor software:

    1. Log in with Security Administrator permissions.

    2. Click Administration to display the Administration tab.

    3. Under User Management, click Manage Users.

    4. In the Manage Users view, click Create User.

    Complete the Create User dialog box to add a new user. The online help provides field information.

    In addition, you can perform the following user assignments:

    Delete user When you delete a user, all policies and rules the user created, which are assigned to the user, are automatically assigned to users in the Administrator role.

    Edit users Edit users on page 28 provides more information on editing users.

    Enable and disable users.

    Manage user roles and permissions Manage roles on page 27 provides more information on Managing user roles.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide26

  • User Management

    SCA_Admin Guide.book Page 27 Monday, March 25, 2013 1:47 PM

    Manage rolesAll users must be assigned a user role and each user can only be assigned to one user role. User roles are used to group users with similar permissions and functions. SCA provides four levels of users including:

    Security Administrator A super user with administrator permissions who can manage users, user roles, user authentication, and view the audit log. (Similar to root in UNIX and Administrator in Windows.)

    Administrator A super user with full administrator permissions to the entire application, with the exception of User Management.

    User A regular user with full access to the entire application, but without administrator permissions or the ability to manage user-defined groups.

    Guest A user with view-only permissions who cannot make modifications or perform administrator tasks.

    The user role defines the possible permissions a user can have. User permissions can include all user role permissions, or a subset of the permissions, but a user cannot be granted more permissions than those available for a single user role. Table 1 on page 27 lists role privileges for each role.

    To access Manage Roles view, select Manage roles from the User Management options in the Administration tab.

    Assign role To assign a role to a user:

    1. Log in with Security Administrator permissions.

    2. Click Administration to display the Administration tab.

    3. Under User Management, click Manage Users.

    4. In the Manage Users view, if assigning a role to a new user, click Create User. If assigning a role to an existing user, select the user from the list and click Edit.

    Table 1 SCA role privileges

    Role privileges Role

    Security Admin Administrator User Guest

    User & Role Management

    Yes No No No

    Discovery Management Yes Yes No No

    UDG Management Yes Yes No No

    System Yes Yes No No

    DB Administration Yes Yes No No

    Policy Management Yes Yes Yes No

    Configuration Changes Annotation

    Yes Yes Yes No

    Breach Management Yes Yes Yes No

    View Only Operations Yes Yes Yes Yes

    Manage roles 27

  • User Management

    SCA_Admin Guide.book Page 28 Monday, March 25, 2013 1:47 PM

    5. In the Create/Edit User dialog box, for Role, select the desired user role.

    6. Click OK to assign the role to the user.

    The SCA online help provides full field information and step-by-step procedures for assigning roles and permissions.

    Edit users When creating a user, data is required for all fields. When editing user credentials, select Edit option from the menu.

    This dialog box opens with the Password and Re-enter Password fields blank. These fields are not marked as required fields. If you type any characters in either of these fields, the system considers this action as a password change request. If a password change is not required, remove any characters previously typed in the password fields leaving the fields empty.

    Proceed with editing any additional user changes, and then click OK to save the changes.

    Manage authenticationThe Manage Authentication feature allows you, the Security Administrator to specify how users are authenticated when they log in. You can select either the Lightweight Directory Access Protocol (LDAP), or Local as options for types of authentication.

    You set or edit user authentication options when either creating or editing a user.

    Manage LDAP settingsTo manage LDAP settings for your application:

    1. Select Manage Authentication from the User Management section of the Administrator tab to display the LDAP Authentication options.

    2. Type the following information:

    Domain Name Type the domain name of the LDAP server. For example, corp.yourcompany.com

    Server Type the IP address, fully qualified name, or hostname of the LDAP server.

    LDAP Port Type the port number of the LDAP server. The default is typically 389.

    Base Domain Name Type the base domain name of the LDAP server. For example, dc=corp,dc=emc,dc=com.

    Patterns Type the full domain controller information for parsing the formatted LDAP entries. For example, uid=jdoe,ou=it,dc=ldap,dc=corp.

    The SCA online help provides full field information and step-by-step procedures for assigning and managing User Authentication.

    To ensure LDAP authentication:

    Use the query dsquery user -name XXXX on a windows 2003 server to check the LDAP query string.

    Split the query string between Pattern and Base Domain Name as it would be concatenated as required for Authentication.

    Pattern would be unique for each user and should be provided in separate lines. Each pattern should not exceed 64 characters.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide28

  • User Management

    SCA_Admin Guide.book Page 29 Monday, March 25, 2013 1:47 PM

    If configured for UID, use UID instead of CN in pattern.

    Use Domain name provided during configuration for Login Domain field.

    Manage authentication 29

  • User Management

    SCA_Admin Guide.book Page 30 Monday, March 25, 2013 1:47 PM

    Change Lockbox passwordAn additional responsibility for the SCA AdminSecurity Administrator is to manage the Lockbox passcode.

    The SCA Lockbox contains the passwords for all users defined as local, and used for local user. The Lockbox password can only be changed by the Security Administrator. This responsibility makes the Security Administrator responsible for company security policy with regard to server configuration. The Lockbox passcode is used for Lockbox administration such as resetting the Lockbox in case of relevant changes made to the server configuration.

    The Lockbox verifies that the application trying to access it is running on the same machine. It does this by comparing various configurations of the machine on which the lockbox is running. As a result, an application running on the same machine as the lockbox does not need the passcode to manage users (Security Admin function).

    Note: The lockbox is created by SCA during the first run (and verified in consecutive runs). It is not created during setup authentication.

    To display the Lockbox password dialog box, select Change Lockbox Passcode from the User Management options in the Administration tab. The default lockbox password is: 1Passphrase!

    IMPORTANT!It is the responsibility of the Security Administrator to change the Lockbox password to avoid security risks. Change the password the first time you access SCA after you assign the Security Administrator user role.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide30

  • SCA_Admin Guide.book Page 31 Monday, March 25, 2013 1:47 PM

    3

    This chapter discusses the following topic:

    System notifications ....................................................................................................... 32 Shutting down and rebooting SCA ............................................................................. 33 Reconfigure network parameters ................................................................................ 34

    System Administration

    System Administration 31

  • System Administration

    SCA_Admin Guide.book Page 32 Monday, March 25, 2013 1:47 PM

    System notifications You can complete the System Notifications dialog box to set up user notification of policy breaches. You can notify users of breaches through email or SNMP traps or both.

    To access the System Notifications dialog box, select System Notifications from the System Administration options in the Administration tab.

    Figure 9 System Notifications dialog box

    The SCA online help provides field descriptions and specific instructions for using this System Notification feature.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide32

  • System Administration

    SCA_Admin Guide.book Page 33 Monday, March 25, 2013 1:47 PM

    Shutting down and rebooting SCAThe command prompt shutdown and reboot procedures for the SCA appliance described here help ensure that the various Domain Managers are properly shut down and data is saved to the RPS files.

    WARNING

    You could risk data loss by not following these procedures for shutting down and rebooting the appliance.

    To shut down the SCA from the command prompt:

    1. Change the directory to /opt/emc/itcase with the following command:

    cd /opt/emc/itcase

    2. Execute the scaHalt shell script with the following command:

    ./scaHalt.sh

    To reboot the SCA from the command prompt:

    1. Change directory to /opt/emc/itcase with the following command:

    cd /opt/emc/itcase

    2. Execute scaReboot shell script with the following command:

    ./scaReboot.sh

    Shutting down and rebooting SCA 33

  • System Administration

    SCA_Admin Guide.book Page 34 Monday, March 25, 2013 1:47 PM

    Reconfigure network parametersYou can reconfigure the network parameters of the SLES SCA virtual machine.

    Reconfigure the network parameters and reinitialize lockbox

    1. Login into appliance console and run the command:

    /opt/emc/itcase/scaHalt.sh to shutdown SCA Appliance.

    2. Login into the vSphere client that manages the SLES SCA virtual machine.

    3. Select SLES SCA VM and right-click to select Edit Settings in the drop down menu.

    The SLES SCA VM Properties window appears.

    Figure 10 Edit settings menu on the vSphere client

    4. Navigate to Options > Settings list.

    5. Under vApp options select Properties.

    The right-hand side window displays vApp Property Configuration view.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide34

  • System Administration

    SCA_Admin Guide.book Page 35 Monday, March 25, 2013 1:47 PM

    Figure 11 Virtual machine properties window on the vSphere client

    6. Update the network properties with the new values

    7. Click OK.

    The Virtual Machine Properties window closes.

    8. Power on the SLES SCA VM.

    9. Log in into the SLES SCA console and run the command:

    /opt/emc/itcase/lockboxConf.shThe lockbox passcode prompt appears.

    10. Type the passcode.

    The following message appears indicating whether the lockbox was successfully re-initialized:

    cstadmin: Lockbox /opt/CST/xml initialized

    11. Run the scaReboot.sh script from /opt/emc/itcaseYou will now be able to use SLES SCA VM with the updated network parameters.

    Reconfigure network parameters 35

  • System Administration

    SCA_Admin Guide.book Page 36 Monday, March 25, 2013 1:47 PM

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide36

  • SCA_Admin Guide.book Page 37 Monday, March 25, 2013 1:47 PM

    4

    This chapter discusses the different types of user groups that can be created and managed in the appliance in the following topic:

    User-defined groups ...................................................................................................... 38

    Manage User-definedGroups

    Manage User-defined Groups 37

  • Manage User-defined Groups

    SCA_Admin Guide.book Page 38 Monday, March 25, 2013 1:47 PM

    User-defined groups The user-defined group feature provides you the ability to create groups. A group is a logical collection of managed objects such as hosts, arrays, switches, and fabrics. Logical grouping of managed objects allows you to perform operations on large sets of like or related managed objects. In addition to system groups, there are two types of user-defined groups: static and dynamic.

    Only Administrators can access and manage user-defined groups from the policy wizard when creating and editing a policy.

    Managing Objects chapter in the EMC Ionix Service Configuration Version 3.0 User Guide discusses how you can manage the various groups in detail.

    System groups System groups are groups automatically created by the system to contain all objects of a particular type. For example, All Hosts, All Arrays, All Switches, All Fabrics, All VMware ESX Hosts, All VMware vCenter Hosts, All VMware vClustered Hosts, and All VMware Virtual Hosts are system groups that contain all discovered objects of that type. The All Groups group is also a group created by the system as a container for all groups in the group tree. You cannot delete system groups and can only change the membership of a system group programmatically.

    Static user-defined groups

    A static user-defined group can contain managed objects (members) and other static and dynamic user-defined groups (subgroups). A static group changes only when you explicitly add or remove members and subgroups. An object can be a member of more than one static group. Static groups are intended for collections of managed objects that rarely change.

    Dynamic user-defined groups

    A dynamic group contains objects that meet user-defined criteria based on object attributes. At regular intervals (either the default interval of 15 minutes or some other user-specified interval), the system scans your Repository for discovered objects that meet the user-defined criteria and automatically adds and removes objects.

    Subgroups Both static and dynamic groups can be subgroups of a static group. However, a group cannot be a subgroup of two parent groups. A subgroup can only have one parent.

    User-Defined Groups view

    The User-Defined Groups view provides information and options that allow you to manage static and dynamic user-defined groups. The panel on the left displays all system and user-defined groups in the system. When you select a group in the panel, all objects and subgroups in that group appear in the table on the right.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide38

  • SCA_Admin Guide.book Page 39 Monday, March 25, 2013 1:47 PM

    5

    This chapter discusses the following topics:

    Overview ......................................................................................................................... 40 Manage access profiles .................................................................................................. 41 Manage initial discovery policies ................................................................................ 43 Manage rediscovery policies ........................................................................................ 45 Configure host resolution ............................................................................................. 46 Configure non-discovered objects ............................................................................... 47 Manage object inventory............................................................................................... 48 Manage Discovery Managers status............................................................................ 48 To remove the discovered hosts ................................................................................... 49

    Discovery

    Discovery 39

  • Discovery

    SCA_Admin Guide.book Page 40 Monday, March 25, 2013 1:47 PM

    OverviewThe Discovery functions of EMC Ionix Storage Configuration Advisor include managing and creating:

    Access profiles

    Initial discovery policies

    Rediscovery policies

    Host resolution configuration

    Object inventory

    This chapter provides an overview of SCA discovery. The SCA online help provides field descriptions and specific instructions for using these management features.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide40

  • Discovery

    SCA_Admin Guide.book Page 41 Monday, March 25, 2013 1:47 PM

    Manage access profilesThis section provides an overview of SCA access profile management features. An access profile is a set of user-specified properties that define the way in which an application makes a connection to objects in the network through a management interface. The access profile specifies the protocol and the required credentials for connecting to the management interface. For example, an RSH access profile contains the port number, username, and password for connecting to a remote shell (RSH) server.

    To open Access Profiles view, Figure 12 on page 41, select Manage Access Profiles from the Discovery options of the Administration tab.

    Figure 12 Access Profiles view

    One use of an access profile is to associate the profile with an initial discovery policy. When the initial discovery policy runs, the protocol and credentials in the access profile are used to initiate communication with the specified object types at the IP addresses specified in the initial discovery policy.

    You can designate any access profile as a global profile. A global access profile can be used with any initial discovery policy that does not specify specific access profiles. This means that when running initial discovery policies that use global profiles, the system tries each global profile until it finds one that is appropriate for the object specified in the initial discovery policy.

    The Discovered Objects tab lists all discovered objects and user-defined groups associated with the selected access profile.

    Manage access profiles 41

  • Discovery

    SCA_Admin Guide.book Page 42 Monday, March 25, 2013 1:47 PM

    The Access Profile view contains a list of the access profiles created in the system, and provides the following information:

    Profile Name

    Profile Type

    Global Profile

    Number of Discovered Objects

    Number of Initial Discovery Policies

    Description

    The Access Profile view also has options for creating and managing access profiles. The options include:

    Create Access Profile

    Edit Profile

    Delete Profile

    Copy Profile

    Profile types When you click Create Access profile, a profile type dialog box appears. Select the type of access profile you want to create. Profile types include:

    HiCommand

    SMI

    SNMP V1/V2

    SNMP V3

    SSH

    WMI

    VMware Infrastructure

    The SCA online help provides complete information and field definitions.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide42

  • Discovery

    SCA_Admin Guide.book Page 43 Monday, March 25, 2013 1:47 PM

    Manage initial discovery policiesInitial discovery is the process by which the objects in your environment are detected. An initial discovery policy specifies the IP addresses you want the system to scan to detect objects that are not yet in the Repository.

    Creating initial discovery policies

    Before you create an initial discovery policy and discover objects, you must create at least one access profile. A discovered object is associated with the access profile used to discover it. Other management services, such as provisioning, use the object's associated access profile.

    You can designate any access profile as a global profile. A global access profile can be used with any initial discovery policy that does not specify specific access profiles. This means that when an initial discovery policy that uses global profiles runs, the system tries each global profile until it finds one that is appropriate for the objects specified in the initial discovery policy.

    As an Admin you can perform the following tasks for discovery policies: create, delete, edit, enable/disable, manually run, view discovered objects, and view policy history details.

    The Create Initial Discovery Policy wizard includes the following steps:

    Policy Information

    Type IP Addresses

    Set Schedule

    Select Access Profiles

    IMPORTANT!Do not run an initial discovery policy for the first time on the night of change in Daylight Savings Time.

    Discovery policy execution results

    This dialog box provides detailed information about a specific execution of a specific initial discovery policy. The table contains one row for each object discovered when the policy was run. Information includes:

    Run Date

    Result Message

    IP Address

    Access Profile

    Object Name

    Object Type

    Status Message

    Manage initial discovery policies 43

  • Discovery

    SCA_Admin Guide.book Page 44 Monday, March 25, 2013 1:47 PM

    Discovery view Once you create initial discovery polices, Discovery view contains a list of these policies, and provides users the following information and options for creating and managing them:

    Information:

    Policy Name

    Status

    Last Started

    Next Scheduled

    Last Modified

    Schedule enabled

    Description

    Commands:

    Create Policy

    Edit

    Run Policy

    Enable

    Disable

    Delete

    You access the Manage Initial Discovery Policies view, from the Discovery options on the Administration tab. The SCA online help provides field descriptions and specific instructions for using the Manage Initial Discovery Policies features.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide44

  • Discovery

    SCA_Admin Guide.book Page 45 Monday, March 25, 2013 1:47 PM

    Manage rediscovery policiesRediscovery is the process by which the information about objects in the Repository is updated. Rediscovery policies specify what to rediscover (the policy scope) as well as the conditions under which you want the application to rediscover managed objects. Only discovered objects can be rediscovered.

    The policy scope consists of user specified user-defined groups. When the rediscovery policy runs, each managed object in the specified user-defined groups is evaluated to see if rediscovery of that managed object is necessary.

    The Administrator function of the SCA allows you to:

    Add a user-defined group to a rediscovery policy

    Create a rediscovery policy

    Delete a rediscovery policy

    Edit a rediscovery policy

    Enable and disable a rediscovery policy

    Manually rediscover specific objects

    Remove a user-defined group from a rediscovery policy

    IMPORTANT!Do not run rediscovery on the day or evening that Daylight Savings Time occurs. This includes running discovery when time changes to or from Daylight Savings Time.

    Select Manage Rediscovery Policies from the Discovery options of the Administration tab to display the Manage Rediscovery dialog box.

    The SCA online help provides field descriptions and specific instructions for using these management features.

    Manage rediscovery policies 45

  • Discovery

    SCA_Admin Guide.book Page 46 Monday, March 25, 2013 1:47 PM

    Configure host resolutionHost resolution is a feature that applies only to hosts that have not been discovered. It creates the instances of the hosts and their associated HBA port information based on zoning information. During host zoning, this feature maintains a naming convention in which the zone name contains the hostname.

    Host resolution uses templates to parse for the hostname. Zone members are checked for host ports, and the system creates the host with the specified ports. By default, the system attempts to use the fully qualified hostname and its IP addresses when creating the host. By default, hostnames that do not resolve through DNS are not created.

    Host resolution configuration parametersHost resolution can be configured using the parameters in Table 2 on page 46.

    To set these parameters, log in to SCA as root and edit the following file in this location:

    /opt/DMT/local/conf/storage-path-query-service/tes.properties

    After making the changes, stop and restart the discovery manager as follows:

    1. Stop the Discovery Manager by typing: sm_service stop SAN_Server_1

    2. Start the Discovery Manager by typing: sm_service start SAN_Server_1

    This forces the appliance to refresh the topology using the new configuration.

    Configuring the tes.zoneNameTemplates parameterZonename templates specify where to extract the hostname from the zonename.

    The tes.properties file is delivered with the following value for the tes.zoneNameTemplates parameter:

    tes.zoneNameTemplates = z_%h%|z_%h%_*|%h%_*|z_%h%_*_*|z_%h%_*_*_*

    You must configure this parameter for your environment.

    Table 2 Host resolution parameters

    Parameter Description Default value Comments

    tes.hostResolutionIsEnabled Enables and disables the feature. If set to false, no host will be created based on host resolution of hostnames based on zoning.

    true

    tes.validateHostWithDNS Specifies that TES should try to get the host IP address using DNS resolvers.

    true If set to "false," host resolution is disabled.

    tes.createHostOnlyIfDNSResolves Specifies that the host is created only if DNS resolves IP address of the host.

    true

    tes.zoneNameTemplates The templates for deducing the hostnames from a given zone name.

    N/A The consumer must configure this value to suit their environment.

    tes.allowedVendorCodes Specifies which WWN vendor codes can be considered host ports.

    0000C9|000A33|000E03|00109B|0090FA|00C0DD|00E08B|001B32

    The consumer is not expected to change the default, unless instructed otherwise.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide46

  • Discovery

    SCA_Admin Guide.book Page 47 Monday, March 25, 2013 1:47 PM

    Edit the value for the tes.zoneNameTemplates parameter using the following examples as a guideline:

    %h% Specifies where to extract the hostname from the zone name.

    * This wildcard matches any string, up to a delimiter.

    Example 1 tes.zoneNameTemplates = Zone_%h%_array101_port1

    Zone_server1_array101_port1 matches the template and "server1" is extracted as the hostname.

    Zone_server2_array101_port2 does not match the template because "port2" is part of the zone name but not part of the template. No hostname is extracted.

    Example 2 tes.zoneNameTemplates = Zone_%h%_array101_*

    Zone_server1_array101_port1 matches the template and "server1" is extracted as the hostname.

    Zone_server2_array101_port2 matches the template and "server2" is extracted as the hostname. Note that in this example the template specifies a wildcard character as the last element of the template.

    Multiple templates can be specified. Each template is separated by a pipebar (|) character. Each template is tried until the first successful match; the hostname is then extracted based on this match.

    Note: Host resolution and TES configured hosts are identified in the SCA Console with separate icons to indicate non-discovered hosts.

    Configure non-discovered objectsYou can manage non-discovered hosts by creating a host for discovery, and defining it by name, IP address, and operating system using the Manage Non-Discovered Objects from the Discovery options of the Administrator menu on the console.

    After defining the host, you can select paths that you want to associate with the host such as:

    WWN

    Fabric

    Connects to Switch

    Connects to Slot

    Connects to Port

    The online help shows step-by-step procedures for creating a user-defined host and defining the host with the Create Host wizard.

    Configure non-discovered objects 47

  • Discovery

    SCA_Admin Guide.book Page 48 Monday, March 25, 2013 1:47 PM

    Manage object inventoryThe Manage Object Inventory view allows you to view and manage discovered objects. A tab in the Manage Object Inventory view appears for the following:

    Hosts

    Fabrics

    Switches

    Arrays

    You can then select any object from one of the object tabs and display the object properties in the object details dialog box. In addition, you can select to rediscover the object.

    You can access the Manage Object Inventory view by selecting it from the Discovery option of the Administration tab.

    The SCA online help provides field descriptions and specific instructions for using these management features.

    IMPORTANT!With this release of SCA, you must refresh Object Details manually.

    Manage Discovery Managers statusThe Discovery Managers Status dialog box allows you to check the health (status) of Discovery Managers.

    Discovery Managers are responsible for discovery of:

    gdpm Manages user-defined objects and services.

    SANs Discovers fabrics, switches and zones

    Hosts Discovers hosts and HBAs.

    Paths Discovers paths.

    Arrays Discovers arrays, volumes, and LUNs.

    You can reach the Discovery Manager Status dialog box by clicking Discovery Managers Status in the Discovery menu of the Administration view. The status is updated manually, so you must click Check on the dialog box to get an updated view.

    Note: The first time you access the dialog box, the update is performed before the dialog box is displayed.

    A green status indicates that the Discovery Manager is connected. A yellow triangle indicates that the Discovery Manager is not connected.

    If the Discovery Manager is not connected, Appendix A, on page 81 provides more information.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide48

  • Discovery

    SCA_Admin Guide.book Page 49 Monday, March 25, 2013 1:47 PM

    To remove the discovered hostsTo remove the discovered hosts in SCA:

    1. Login into the SCA Appliance console with root privileges.

    2. Run the script /opt/emc/itcase/deleteHost.sh .

    Example: /opt/emc/itcase/deleteHost.sh linbgb112,linbge012

    The following are the limitations of the script:

    1. This script can not delete any hosts that has a space in its name. Since creating any VM with a space in its name is allowed, removing such a VM is not possible with this script.

    2. If there are multiple VMs with the same name, the script may not remove the VM that you intended to remove.

    To workaround the above two issues, remove the ESX that manages the VM (which you intended to remove). It will internally remove all its associated VMs. User can re-discover the ESX and VMs using Initial discovery policy.

    Note: If you click any reference to the removed hosts in the SCA UI, a message "Cannot retrieve details for selected element" is displayed.

    To remove the discovered hosts 49

  • Discovery

    SCA_Admin Guide.book Page 50 Monday, March 25, 2013 1:47 PM

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide50

  • SCA_Admin Guide.book Page 51 Monday, March 25, 2013 1:47 PM

    6

    This chapter discusses how you can bridge the gap between the discovered SAN environment and the EMC Support Matrix data that is used for computing interoperability information and update ESM data when required. Topics include:

    EMC Support Matrix overview.................................................................................... 52 Match to EMC Support Matrix..................................................................................... 53 Updating and installing EMC Support Matrix Data................................................. 56

    EMC Support MatrixAdministration

    EMC Support Matrix Administration 51

  • EMC Support Matrix Administration

    SCA_Admin Guide.book Page 52 Monday, March 25, 2013 1:47 PM

    EMC Support Matrix overviewThis chapter discusses how you can use and manage ESM data installed on the appliance.

    To ensure accuracy of interoperability information, SCA also requires that you update the EMC Support Matrix (ESM) data installed on the appliance once every month. If you have been assigned Security Administrator or Administrator access to the appliance, you can update ESM data on the appliance whenever required.

    ESM matching helps bridge the gap between the discovered SAN environment and the E-Lab data that is used for computing interoperability information. You can automatically match discovered data to a corresponding value available in the EMC Support Matrix. There can be different scenarios where automatic matching of discovered data is not possible. In such cases, you can manually match the discovered components to a component available in the EMC Support Matrix.

    The EMC Ionix Storage Configuration Advisor Online Help provides field descriptions and specific instructions for using these administrative features.

    The EMC Ionix Storage Configuration Advisor User Guide illustrates use case scenarios that help you understand how this feature is used.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide52

  • EMC Support Matrix Administration

    SCA_Admin Guide.book Page 53 Monday, March 25, 2013 1:47 PM

    Match to EMC Support MatrixThe ESM matching administrative feature allows you to:

    Automatically match discovered data to a value available in the EMC Support Matrix

    Manually match the discovered components to a component available in the EMC Support Matrix, in case automatic matching of discovered data is not possible

    Bulk match to deal with multiple objects with the same attribute-value pair

    Note: On upgrade to SCA 3.0 from SCA 2.0 or 2.1, or on a new installation of SCA 3.0, the matching window does not contain any data. It is populated only when one of the following occurs:- The EMC Support Matrix Compliance Report is generated.- An ESM policy rule is validated.

    Automatic matchingTo perform automatic matching:

    Click Match to EMC Support Matrix link in the EMC Support Matrix Administration section of the Administration tab. This displays the matching window.

    The data discovered for a component is matched automatically to the corresponding entries of ESM data. The Match Method column of that component displays an entry as Auto-EMC.

    Note: The Matching window displays the following elements:- Only the SAN elements that are added as scope to some ESM rule, policy, or ESM Compliance Report - Elements connected with the SAN elements described above.

    Manual matchingTo perform manual matching:

    1. Click Match to EMC Support Matrix from the EMC Support Matrix Administration section of the Administration tab.

    This displays the matching window.

    Note: The Matching window displays the following elements:- Only the SAN elements that are added as scope to some ESM rule, policy, or ESM Compliance Report - Elements connected with the SAN elements described above.

    2. The matching window displays the following columns:

    Object

    Attribute

    Matched

    Matched to

    Discovered Value

    Match to EMC Support Matrix 53

  • EMC Support Matrix Administration

    SCA_Admin Guide.book Page 54 Monday, March 25, 2013 1:47 PM

    Match Method

    Number of Breaches

    The EMC Ionix Storage Configuration Advisor Online Help provides field descriptions and specific instructions for using this Match to EMC Support Matrix feature.

    The Matched to column has the value as Not Matched for the components for which automatching is not performed by the system.

    3. Click the drop-down list arrow in the Matched To and select an appropriate value to perform the manual match..

    Note: If the component is obsolete, it is not displayed in the drop-down list.

    On completion of the manual match process for a component, the Match Method column of that component will display an entry as Manual.

    Bulk matchingIn a large SAN environment, it is advantageous to use the bulk matching feature.

    When automatching is not performed for a component, then that component has to be matched to a ESM value from the drop-down list manually. On manually matching a component, a pop-up window is automatically displayed if there are more attributes of the same type, which can be matched. This pop-up window provides an option to either select all the elements or select elements from a list, as required:

    The discovered value is same as the discovered value of the selected object for which matching was initiated.

    The matched value is same as the matched value of the selected object for which matching was initiated.

    Follow the steps to perform bulk matching:

    1. Click Match to EMC Support Matrix from the EMC Support Matrix Administration section of the Administration tab.

    This displays the matching window.

    2. Click on the arrow mark in the Matched to column for a component that has the value of the Matched to column as Not Matched, and select appropriate value from the drop-down list.

    The Bulk Matching pop-up window automatically appears with all the elements that have the same component with a similar discovered value.

    3. Select :

    Match all objects with the same type and discovered value.

    Perform step 5.

    or

    Match only the following objects.

    This activates the filter.

    4. Select:

    Check All to select all objects in the Bulk Matching window.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide54

  • EMC Support Matrix Administration

    SCA_Admin Guide.book Page 55 Monday, March 25, 2013 1:47 PM

    or

    Objects from the displayed list, as required.

    Note: The filter is active only when the radio button 'Match only the following objects' is selected. Filtering is possible only on Object name.

    5. Click OK.

    The matched value will be set to the selected value for the selected object or for all the selected objects.

    Match to EMC Support Matrix 55

  • EMC Support Matrix Administration

    SCA_Admin Guide.book Page 56 Monday, March 25, 2013 1:47 PM

    Updating and installing EMC Support Matrix DataUpdate of ESM data on SCA is required once a month. All users are notified of this when they log in to the appliance. However, only Security Administrators and Administrators are allowed to update ESM data using the Update EMC Support Matrix wizard. The Update EMC Support Matrix wizard can be launched directly from the out-of-date ESM notification in the dashboard, the Update EMC Support Matrix link in the Administration tab or the hyperlinked out-of-date ESM message in the Breach Causes tab of the Investigate view.

    Before you can install the latest ESM data on SCA, you must download it to the appliance using one of the following methods:

    Remote UpdateDownload ESM data from a remote location.

    Local UpdateDownload the ESM data zip file from the client workstation you are using to access the appliance.

    An additional option, Restore, allows you to restore ESM data that was last backed up in the appliance.

    The Update EMC Support Matrix wizard handles both download and installation of ESM data.

    IMPORTANT!The ESM update process utilizes significant CPU resources. Avoid:- Updating ESM data while generating reports or running policies- Generating reports or running policies while ESM data update is in progress.

    Locking of user interface when accessed by multiple usersTo avoid any conflict in the ESM data update, only one user can access the Update EMC Support Matrix wizard at any given time.

    If a particular user (first user) has opened the Update EMC Support Matrix wizard and another user (second user) clicks Update EMC Support Matrix in the Administration tab, SCA displays the following message:

    The item you are trying to edit is locked by the .

    When the user clicks Close in the message box, the Update EMC Support Matrix wizard closes and the Administration screen appears, thereby locking the second user out of the ESM data update. This user interface lock feature ensures that there is no conflict in the ESM data update.

    This lock is released only when:

    The Update EMC Support Matrix wizard is closed due to some error condition or by the user

    The first user logs out of the SCA application

    Note: The user interface lock is NOT released when the browser session is closed through the Windows Task Manager or a system crash.

    The Apache Tomcat server is restarted

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide56

  • EMC Support Matrix Administration

    SCA_Admin Guide.book Page 57 Monday, March 25, 2013 1:47 PM

    Installing ESM data and restarting the Apache Tomcat serverRestarting the Apache Tomcat server is an essential step in the installation of ESM data. When you have reached the final step in the installation wizard, you are prompted to restart the Tomcat server now or later in a pop-up dialog box.

    Note: The web services will continue to use the old ESM data until you restart the Tomcat server.

    Restart Tomcat nowIf you opt to restart the Tomcat server immediately after installation by clicking Restart Now in the pop-up dialog box, a session time-out message appears and all active sessions of logged in users are terminated. Close your current SCA session and wait for two or three minutes before opening the new session which will use the latest ESM data.

    Restart Tomcat laterIf you click Restart Later in the pop-up dialog box, you can continue your current SCA session using the ESM data previously installed and not the latest installed version.

    SCA informs all users that Tomcat restart is pending for the ESM data update as follows:

    An ESM out-of-date notification appears when the user logs in. The Security Administrator or Administrator logging in after ESM update is prompted to complete the ESM update by restarting the Tomcat server.

    Breaches are generated for the pending Tomcat restart. Security Administrators or Administrators can click on the hyperlinked breach message for pending Tomcat restart in the Investigate view > Breach Causes tab to view the Tomcat restart server pop-up dialog box.

    Instead of restarting the Tomcat server from the user interface, you can also use these steps to manually restart the Tomcat server from the command line at your convenience:

    1. Log in to the appliance as root using any ssh client with the credentials:

    root/ChangeMe

    2. Type the following command to stop the monitoring services, monit:

    service monit stop

    3. Type the following command to stop the Tomcat services:

    service tomcat stop

    4. Type the following command to restart the Tomcat services:

    service tomcat start

    5. Type the following command to restart the monitoring services:

    service monit start

    6. Type the following command to ensure that all services that monit is attached to are running:

    monit summary

    If monit is not monitoring either Tomcat or Sybase, wait until the status changes to Running.

    Updating and installing EMC Support Matrix Data 57

  • EMC Support Matrix Administration

    SCA_Admin Guide.book Page 58 Monday, March 25, 2013 1:47 PM

    Remote update and installationYou can choose to update ESM data from the Remote Update server with or without a proxy server.

    Follow these steps to download ESM data from the Remote Update server and install it:

    1. Click Update EMC Support Matrix from the EMC Support Matrix Administration section of the Administration tab.

    The Update EMC Support Matrix wizard appears.

    Note: If another user has already initiated the update and installation process, you will not be allowed to proceed further. Locking of user interface when accessed by multiple users on page 56 explains how this user interface lock operates and under what conditions it is released.

    2. Select Remote Update and click Next.

    The Configure Proxy Settings dialog appears.

    3. Set the proxy server settings as required:

    No ProxySelected by default, retain this option when there are no firewall restrictions in your internet setup and the Remote Update server is accessible from the appliance.

    Skip step 4 if you select No Proxy.

    Use ProxySelect this option if you have firewall restrictions in your internet setup and the appliance cannot access the Remote Update server. Provide the following mandatory details for the proxy server:

    Proxy Host/IPThe host name or IP address of the proxy server. Port NumberThe port number of the proxy server. Proxy User NameThe username assigned to you for use of the proxy

    server. Proxy User PasswordYour user password for the proxy server.

    Note: The latest proxy host name or IP address provided by an appliance user are displayed.

    4. If you selected Use Proxy in step 3, click Test to check:

    If you have provided all the requisite information

    The validity of the proxy server details provided

    If you receive a connection failure message, check and correct the proxy server details provided. Then click Test again.

    5. Click Next when connection with the Remote Update server has been established successfully. The Install EMC Support Matrix dialog appears, displaying the following details:

    Current VersionThe version of the ESM data currently installed in the appliance.

    Last CheckedThe date and time when the currently installed ESM data was last accessed or modified.

    EMC Ionix Storage Configuration Advisor Version 3.0 Administration Guide58

  • EMC Support Matrix Administration

    SCA_Admin Guide.book Page 59 Monday, March 25, 2013 1:47 PM

    Version Available to InstallThe latest version of the ESM available in the Remote Update server for installation.

    6. Click Install.

    Note: When you click Install, all buttons (including Help) are disabled, forcing you to wait until the installation process is complete.

    7. Click Finish when backup of the previous ESM data and installation of the latest ESM data has been completed successfully.

    A pop-up dialog box appears, prompting you to restart the Apache Tomcat server.

    8. Click Restart Now to close the pop-up dialog box and restart the Tomcat server immediately.

    Note: The web services will continue to use the old ESM data until you restart the Tomcat server.

    or

    Click Restart Later to restart the Tomcat server at a more convenient time and continue working with the previously installed ESM data.

    Installing ESM data and restarting the Apache Tomcat server on page 57 explains the implications of each restart option for the Tomcat server.

    Local update and installationYou need to download the latest ESM data from http://Powerlink.EMC.com (Home > Support > Software Downloads and Licensing > Downloads E-I > Ionix Storage Configuration Advisor) to any drive on a client workstation or copy it to a CD or DVD. Using the SCA user interface, you can then install this ESM data on the appliance.

    Note: If the ESM file is copied to a CD or DVD, ensure that you mount it on the client workstation before you start the operation explained here.

    Follow these steps to install ESM data on the appliance from any client workstation:

    1. Click Update EMC Support Matrix from the EMC Support Matrix Administration section of the Administration