Symantec 5.1 manual What you can do with CommandCentral Storage Change Manager

Page 19

Getting started with the CommandCentral family 19

About Veritas CommandCentral Storage Change Manager

Identifies potential risks to your storage infrastructure based on best practice policies. With risks, storage administrators can identify the impacted storage resources and take the necessary action to remove the risk from your storage infrastructure.

Lets you view reports that provide an enterprise–wide view of the changes that occur in your data center.

Use CommandCentral Storage Change Manager as your enterprise solution for storage change and configuration management to ensure the availability of your storage infrastructure, manage service level agreements more effectively, and improve operational efficiency.

What you can do with CommandCentral Storage Change Manager

Storage administrators can use CommandCentral Storage Change Manager to monitor and manage changes to the storage infrastructure. With CommandCentral Storage Change Manager, you can do the following:

Monitor your storage resources and view detailed information about them. For example, you can view storage arrays and the LUNs that reside inside each array.

Track changes to your storage resources. For example, you can view information about an application that was added to a host.

Create custom policies. With custom policies, you can define the connectivity, configuration, and compliance requirements for your storage resources. Additionally, you can also define who should receive notifications of violations to the policy and you can define the target resolution time for violations.

Monitor violations against your custom policies. When a violation occurs, you can view the violation to determine the impacted storage resources, find the change that caused the violation, and take the necessary actions to resolve the violation.

Use best practice policies. These policies ship with CommandCentral Storage Change Manager and monitor storage changes against industry recognized best practices for storage management. For example, one best practice policy monitors clusters that host a service group to ensure that the cluster’s nodes have access to the same set of LUNs.

Monitor the risks that best practice policies identify. Similar to violations, CommandCentral Storage Change Manager generates a risk if a change breaches a best practice policy. You can view a description of each risk to identify impacted storage resources and then take the necessary action to resolve the risk.

Image 19
Contents Veritas CommandCentral Getting Started Guide Legal Notice CommandCentral Getting Started GuideSymantec Corporation Stevens Creek Blvd Cupertino, CA Contacting Technical Support Technical SupportLicensing and registration Customer serviceAdditional enterprise services Maintenance agreement resourcesThis document includes the following topics About the CommandCentral familyAbout Veritas CommandCentral Storage Management and discovery What’s new in CommandCentral StorageEnhanced agentless discovery of storage resources Discovery of replication objects for HP EVA storage arrays Improved Data Module file scanningSybase ASE 15 support ReportingAdded in-context performance reports for certain objects New sample ad hoc reports InstallationAdded the Switch Port Usage Trend report VxVM volumesRed Hat Linux 5.0 support Reduced media and install footprint for the managed hostOther enhancements Windows Server 2008 supportHotfix deployment mechanism Ability to set new managed hosts in unmanaged stateManaging the storage network introduction What you can do with CommandCentral StorageStorage network technologies Storage virtualization Storage administrator requirementsData collection Discovery of storage resourcesVersatile displays of information about storage resources Policies for managing resourcesStorage provisioning About Veritas CommandCentral Storage Change ManagerWhat you can do with CommandCentral Storage Change Manager How CommandCentral Storage Change Manager works About Veritas CommandCentral Enterprise ReporterReport types and scopes Inclusion of custom storage object attributes Whats new in CommandCentral Enterprise Reporter 5.0 MP1Data rollup enhancements Inclusion of NetApp unified storage device dataData rollup view enhancements Storage tier rule builder enhancementsReporting enhancements Data source preparation enhancementsDashboard customization with selected reports NetApp VolumesNew package and metrics Security enhancements What you can do with CommandCentral Enterprise ReporterSSL mode Report access enhancementsHow CommandCentral Enterprise Reporter works System requirements for CommandCentral Getting CommandCentral up and runningSupported operating systems for CommandCentral Web browser support for the CommandCentral Console Installation overviewComponent Operating systems supported CommandCentral on the Web Where to find more information about CommandCentralGetting help About CommandCentral Storage documentation About CommandCentral documentationAbout CommandCentral Storage Change Manager documentation Commenting on product documentation About CommandCentral Enterprise Reporter documentationStoragemanagementdocs@symantec.com Page Database and Veritas NetBackup are examples of applications FlexVol volumes. See also volumeSee CommandCentral Storage Alarm Service See CommandCentral Storage Alert ManagerSee Command Central Configuration Utility To configuration settingsSee Symantec Product Authentication Service See Symantec Product Authorization ServiceUsers can monitor, define, and modify policies Service commands and queriesVirtualization servers Kernel-to-kernel broadcastsData to users through a standard Web browser Groups. Contrast with unconfigured storageSee CommandCentral Storage Console See CommandCentral Storage databaseExtended discovery Data is stored in the CommandCentral Storage databaseThat store data. Also storage device Also OS handleInformation about them. See also discovery Feature. See also discoveryAt least one FC switch and may also contain zones Has occurred for one or more objects on the storage networkExplorer was known as the Mgex explorer Displays the correct object typeGroup On specific applicationsPage Was known as the Agent Accessibility from specified SAN-attached hostsSee Veritas NetBackup Available storagePage Component such as an IP address or mounted file system That acts as a virtual subvolume with special attributesTypes for storage, networking, and application services Extent pool storage arraySeveral managed hosts Routinely whenever an in-band explorer executesTo peripheral devices such as disk and media drives Storage device fixed disk attached to a Scsi busSee device Language or protocolSee also hard zoning See SANConsole Task Status tab Symantec Product Authentication ServiceMark that is recorded between backup images on a tape Between themA wide range of applications in multiplatform environments SecuritySee NetApp unified storage See VailSee virtual fabric They were fabric capableCorresponds to the system’s host name. See also IP address Applications as if it were a physical computerAggregate’s disks and RAID groups. See also aggregate See Veritas Volume ManagerSee CommandCentral Storage Web Engine An extent pool. See also extent poolCommandCentral Glossary