3.Copy the cimom.mcdata.exclude property. How you copy the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, select the text and then right-click the selected text. Then, select Copy.

4.Return to the Advanced page (Options > Storage Essentials > Manage Product Health. Then, click Advanced in the Disk Space tree).

5.Paste the copied text into the Custom Properties field. How you paste the text depends on your Web browser. If you are using Microsoft Explorer or Netscape Navigator, right-click the field and select Paste.

6.Make your changes in the Custom Properties field. Make sure the property is not commented out by removing the hash (#) symbol in front of the property.

7.Add the Worldwide Names corresponding to the switches you want to exclude from discovery. Separate additional Worldwide Names with a comma, as shown by the following example:

cimom.mcdata.exclude=1000080088A07024,1000080088A0D0B6

where 1000080088A07024 and 1000080088A0D0B6 are the Worldwide Names for McDATA and Connectrix switches.

8.When you are done, click Save.

While AppStorManager is restarting, users are not able to access the management server. The AppStorManager service must be running for the management server to monitor elements.

Viewing Log Messages

Use the View Logs page to obtain the status of the following:

Discovery

Building the Topology (Applies to Discovery from HP SE)

Get Details for Discovery from HP SE and Discovery Data Collection for Discovery from HP SIM

Backup Details

During these operations, the management server displays its status at regular intervals. To view logs for these operations:

1.Do one of the following:

Discovery from HP SIM - Click Tasks & Logs > View Storage Essentials Log.

Discovery from HP SE - Click Discovery > View Logs.

2.To obtain the latest status, click the Get Latest Messages button.

If the software is unable to discover or obtain information about a device, the log messages might provide some information as to where the problem occurred.

For example, if a host was not discovered, the log messages might indicate the provider configuration for that device was never created. This could mean the software was given the wrong user name and/or password for that host. As a result, the software logged onto the host with a guest account, which does not have enough permissions to start WMI.

52 Discovering Filers, Tape Libraries, Switches and Storage Systems