Symantec 5.1 manual Affinity groups. See also storage view, Depend on what type of object it is

Page 36

36 CommandCentral Glossary

array virtual port

A logical—or, as it is commonly called, "virtual"—port defined for some array types

 

that support SMI-S 1.0.2 and earlier. When an array virtual port (or AVP) is defined,

 

the array can support LUN masking with multiple, heterogeneous hosts through

 

a single physical array port. Depending on the array vendor, array virtual ports

 

may also be known as host storage domains, array host groups, access groups,

 

and affinity groups. See also storage view.

attribute

A property of an object that describes something about the object—such as its

 

World Wide Name. The number and kind of attributes displayed for a resource

 

depend on what type of object it is.

Audit Log

A text file that contains a list of all changes made to the Hardware Abstraction

 

Layer—such as devices added and removed—and to the CommandCentral Storage

 

Alert Manager—such as modifications to policy and alert notification and changes

 

to configuration settings.

Authentication Service

See Symantec Product Authentication Service.

Authorization Service

See Symantec Product Authorization Service.

available storage

Configured storage that has not yet been apportioned into addressable units

 

(LUNs). This storage is typically part of RAID groups. Contrast with LUN storage.

BCV (business

An area of virtual storage that maps to a LUN on an EMC Symmetrix or DMX array

continuance volume)

and provides redundancy. Each BCV contains a copy of a standard device (STD).

binding

See LUN binding.

bridge

A device that connects and passes packets between two segments of a storage

 

network that use the same communications protocol. See also router.

broadcast address

An IP address specified for discovering hosts running the Hardware Abstraction

 

Layer (both Management Servers and managed hosts) within a subnet.

 

255.255.255.255 is a special IP address that CommandCentral Storage can use to

 

search for hosts within a subnet without crossing a subnet boundary.

bundle

A logical grouping consisting of up to 16 physical links. CommandCentral Storage

 

can discover, act upon, and display information about a bundle as if it were a

 

single link. Also called port bundle.

capacity

The amount of storage an object can allocate or use.

ccconfig

See Command Central Configuration Utility.

circuit breaker

A function in the Veritas Alert Manager that automatically limits the number of

 

notifications sent to a recipient within a specified time.

claimed storage

Storage for which at least one host’s operating system has created a device handle.

 

Contrast with unclaimed storage.

Image 36
Contents Veritas CommandCentral Getting Started Guide CommandCentral Getting Started Guide Legal NoticeSymantec Corporation Stevens Creek Blvd Cupertino, CA Technical Support Contacting Technical SupportCustomer service Licensing and registrationMaintenance agreement resources Additional enterprise servicesAbout the CommandCentral family This document includes the following topicsAbout Veritas CommandCentral Storage What’s new in CommandCentral Storage Management and discoveryEnhanced agentless discovery of storage resources Improved Data Module file scanning Discovery of replication objects for HP EVA storage arraysReporting Sybase ASE 15 supportAdded in-context performance reports for certain objects Installation Added the Switch Port Usage Trend reportVxVM volumes New sample ad hoc reportsReduced media and install footprint for the managed host Other enhancementsWindows Server 2008 support Red Hat Linux 5.0 supportAbility to set new managed hosts in unmanaged state Hotfix deployment mechanismWhat you can do with CommandCentral Storage Managing the storage network introductionStorage network technologies Storage administrator requirements Storage virtualizationDiscovery of storage resources Versatile displays of information about storage resourcesPolicies for managing resources Data collectionAbout Veritas CommandCentral Storage Change Manager Storage provisioningWhat you can do with CommandCentral Storage Change Manager About Veritas CommandCentral Enterprise Reporter How CommandCentral Storage Change Manager worksReport types and scopes Whats new in CommandCentral Enterprise Reporter 5.0 MP1 Data rollup enhancementsInclusion of NetApp unified storage device data Inclusion of custom storage object attributesStorage tier rule builder enhancements Reporting enhancementsData source preparation enhancements Data rollup view enhancementsNetApp Volumes Dashboard customization with selected reportsNew package and metrics What you can do with CommandCentral Enterprise Reporter SSL modeReport access enhancements Security enhancementsHow CommandCentral Enterprise Reporter works Getting CommandCentral up and running System requirements for CommandCentralSupported operating systems for CommandCentral Installation overview Web browser support for the CommandCentral ConsoleComponent Operating systems supported Where to find more information about CommandCentral CommandCentral on the WebGetting help About CommandCentral documentation About CommandCentral Storage documentationAbout CommandCentral Storage Change Manager documentation About CommandCentral Enterprise Reporter documentation Commenting on product documentationStoragemanagementdocs@symantec.com Page FlexVol volumes. See also volume See CommandCentral Storage Alarm ServiceSee CommandCentral Storage Alert Manager Database and Veritas NetBackup are examples of applicationsTo configuration settings See Symantec Product Authentication ServiceSee Symantec Product Authorization Service See Command Central Configuration UtilityService commands and queries Virtualization serversKernel-to-kernel broadcasts Users can monitor, define, and modify policiesGroups. Contrast with unconfigured storage See CommandCentral Storage ConsoleSee CommandCentral Storage database Data to users through a standard Web browserData is stored in the CommandCentral Storage database That store data. Also storage deviceAlso OS handle Extended discoveryFeature. See also discovery At least one FC switch and may also contain zonesHas occurred for one or more objects on the storage network Information about them. See also discoveryDisplays the correct object type GroupOn specific applications Explorer was known as the Mgex explorerPage Accessibility from specified SAN-attached hosts See Veritas NetBackupAvailable storage Was known as the AgentPage That acts as a virtual subvolume with special attributes Types for storage, networking, and application servicesExtent pool storage array Component such as an IP address or mounted file systemRoutinely whenever an in-band explorer executes To peripheral devices such as disk and media drivesStorage device fixed disk attached to a Scsi bus Several managed hostsLanguage or protocol See also hard zoningSee SAN See deviceSymantec Product Authentication Service Mark that is recorded between backup images on a tapeBetween them Console Task Status tabSecurity See NetApp unified storageSee Vail A wide range of applications in multiplatform environmentsThey were fabric capable Corresponds to the system’s host name. See also IP addressApplications as if it were a physical computer See virtual fabricSee Veritas Volume Manager See CommandCentral Storage Web EngineAn extent pool. See also extent pool Aggregate’s disks and RAID groups. See also aggregateCommandCentral Glossary