Symantec 5.1 manual What you can do with CommandCentral Storage, Storage network technologies

Page 15

Getting started with the CommandCentral family

15

About Veritas CommandCentral Storage

 

For more information about the hotfix deployment mechanism, see the

CommandCentral Administrator’s Guide.

What you can do with CommandCentral Storage

Symantec strives to help you manage the integrity of your information by enabling you to maintain the right balance of information security and availability. Symantec delivers market-leading technology, insight, and expertise in the areas of information security, data management, systems management, storage management, and application performance management.

With Symantec’s unmatched breadth and depth, your IT organization can better align with business objectives and address the issues of cost, complexity and compliance. Symantec is uniquely positioned to help keep your business up, running, and growing, no matter what happens.

CommandCentral Storage provides a single, centralized, consistent storage management console to simplify the complex tasks involved in deploying, provisioning, managing, and growing a multi-vendor networked storage environment.

Managing the storage network: introduction

Many organizations—as they adopt e-commerce, supply chain management, compliance, and other data-intensive applications—find that their data is exploding. More and more storage is needed to digitize manuals, corporate records, and other paper-based information, and to hold ever-increasing multimedia content.

If all that volume and complexity weren’t enough of a management challenge, today’s business environments demand that data be available immediately, continuously, and from anywhere—to multiple applications and to hundreds, thousands, or even millions of customers, business partners, and employees.

Storage network technologies

Historically, enterprises have relied heavily on parallel SCSI technology to provide the performance required for their enterprise data storage needs. More recently, however, some enterprises are finding that the restrictions imposed by SCSI architecture are too costly for SCSI to continue as a viable solution.

To overcome these restrictions, many enterprises have turned to a network-attached storage (NAS) model that enables storage arrays to reside directly on the main user network, where disk accesses may be made directly rather than through the server’s network connection. However, this model can add a significant load to the network, which frequently is already starved for bandwidth.

Image 15
Contents Veritas CommandCentral Getting Started Guide Legal Notice CommandCentral Getting Started GuideSymantec Corporation Stevens Creek Blvd Cupertino, CA Contacting Technical Support Technical SupportLicensing and registration Customer serviceAdditional enterprise services Maintenance agreement resourcesThis document includes the following topics About the CommandCentral familyAbout Veritas CommandCentral Storage What’s new in CommandCentral Storage Management and discoveryEnhanced agentless discovery of storage resources Discovery of replication objects for HP EVA storage arrays Improved Data Module file scanningReporting Sybase ASE 15 supportAdded in-context performance reports for certain objects New sample ad hoc reports InstallationAdded the Switch Port Usage Trend report VxVM volumesRed Hat Linux 5.0 support Reduced media and install footprint for the managed hostOther enhancements Windows Server 2008 supportHotfix deployment mechanism Ability to set new managed hosts in unmanaged stateWhat you can do with CommandCentral Storage Managing the storage network introductionStorage network technologies Storage virtualization Storage administrator requirementsData collection Discovery of storage resourcesVersatile displays of information about storage resources Policies for managing resourcesStorage provisioning About Veritas CommandCentral Storage Change ManagerWhat you can do with CommandCentral Storage Change Manager How CommandCentral Storage Change Manager works About Veritas CommandCentral Enterprise ReporterReport types and scopes Inclusion of custom storage object attributes Whats new in CommandCentral Enterprise Reporter 5.0 MP1Data rollup enhancements Inclusion of NetApp unified storage device dataData rollup view enhancements Storage tier rule builder enhancementsReporting enhancements Data source preparation enhancementsNetApp Volumes Dashboard customization with selected reportsNew package and metrics Security enhancements What you can do with CommandCentral Enterprise ReporterSSL mode Report access enhancementsHow CommandCentral Enterprise Reporter works Getting CommandCentral up and running System requirements for CommandCentralSupported operating systems for CommandCentral Installation overview Web browser support for the CommandCentral ConsoleComponent Operating systems supported Where to find more information about CommandCentral CommandCentral on the WebGetting help About CommandCentral Storage documentation About CommandCentral documentationAbout CommandCentral Storage Change Manager documentation Commenting on product documentation About CommandCentral Enterprise Reporter documentationStoragemanagementdocs@symantec.com Page Database and Veritas NetBackup are examples of applications FlexVol volumes. See also volumeSee CommandCentral Storage Alarm Service See CommandCentral Storage Alert ManagerSee Command Central Configuration Utility To configuration settingsSee Symantec Product Authentication Service See Symantec Product Authorization ServiceUsers can monitor, define, and modify policies Service commands and queriesVirtualization servers Kernel-to-kernel broadcastsData to users through a standard Web browser Groups. Contrast with unconfigured storageSee CommandCentral Storage Console See CommandCentral Storage databaseExtended discovery Data is stored in the CommandCentral Storage databaseThat store data. Also storage device Also OS handleInformation about them. See also discovery Feature. See also discoveryAt least one FC switch and may also contain zones Has occurred for one or more objects on the storage networkExplorer was known as the Mgex explorer Displays the correct object typeGroup On specific applicationsPage Was known as the Agent Accessibility from specified SAN-attached hostsSee Veritas NetBackup Available storagePage Component such as an IP address or mounted file system That acts as a virtual subvolume with special attributesTypes for storage, networking, and application services Extent pool storage arraySeveral managed hosts Routinely whenever an in-band explorer executesTo peripheral devices such as disk and media drives Storage device fixed disk attached to a Scsi busSee device Language or protocolSee also hard zoning See SANConsole Task Status tab Symantec Product Authentication ServiceMark that is recorded between backup images on a tape Between themA wide range of applications in multiplatform environments SecuritySee NetApp unified storage See VailSee virtual fabric They were fabric capableCorresponds to the system’s host name. See also IP address Applications as if it were a physical computerAggregate’s disks and RAID groups. See also aggregate See Veritas Volume ManagerSee CommandCentral Storage Web Engine An extent pool. See also extent poolCommandCentral Glossary