Professional Documents
Culture Documents
Data Protection Advisor 6.0 Installation and Administration Guide
Data Protection Advisor 6.0 Installation and Administration Guide
Version 6.0
Copyright 2005 - 2013 EMC Corporation. All rights reserved. Published in the USA.
Published April 2013
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without
notice.
The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect
to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular
purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries.
All other trademarks used herein are the property of their respective owners.
For the most up-to-date regulatory document for your product line, go to EMC Online Support (https://support.emc.com).
CONTENTS
Chapter 1
Chapter 2
18
18
18
18
20
22
22
23
23
24
26
26
28
29
30
33
35
35
35
36
36
36
37
37
38
38
38
3
Contents
Chapter 3
Getting started
Logging into DPA .........................................................................................
Changing the default password .............................................................
Licensing the DPA Server.............................................................................
Expired licenses ....................................................................................
Removing a license ...............................................................................
Chapter 4
42
42
42
42
43
46
47
47
47
47
48
48
50
50
50
50
51
51
51
52
52
53
54
55
56
56
56
57
58
59
60
60
61
63
63
64
65
66
66
67
67
68
68
68
69
69
69
Contents
Chapter 5
Chapter 6
Chapter 7
84
84
84
85
86
87
88
88
88
89
Datastore maintenance
Backing up the datastore ............................................................................
Exporting the DPA datastore to a file .....................................................
Exporting the DPA datastore to Pipe ......................................................
Importing the DPA datastore .................................................................
DPA Datastore performance optimization ....................................................
General tuning ......................................................................................
Chapter 9
78
78
80
80
80
81
81
81
82
82
Chapter 8
74
74
74
74
75
75
75
76
92
92
92
92
93
93
Troubleshooting
Troubleshooting installation........................................................................ 96
DPA 6.0 Installation and Administration Guide
Contents
Appendix A
Appendix B
Index
106
107
107
108
109
110
111
111
112
113
114
116
120
120
121
125
129
131
131
131
132
133
CHAPTER 1
Migrating from DPA 5.x to DPA 6.0
This chapter describes the process of migrating DPA 5.x installations to DPA 6.0. It
contains the following sections:
Overview................................................................................................................... 8
DPA 5.x customizations............................................................................................. 9
Installing DPA 6.0.................................................................................................... 12
Installing the DPA Migration Tool ............................................................................. 12
Launching the DPA Migration Tool ........................................................................... 12
Using the DPA Migration Tool .................................................................................. 13
Redirecting existing 5.x collectors to the new server ................................................ 15
Decommissioning the DPA 5.x system ..................................................................... 15
Troubleshooting...................................................................................................... 15
Overview
DPA versions earlier than version 5.5.1 cannot be upgraded to 6.0. Instead, upgrade
earlier versions to DPA 5.5.1 or later and, thereafter migrate your recently updated DPA 5.x
data to a new DPA 6.0 server using the DPA Migration Tool.
During the migration process, your DPA 5.x system remains fully operational.
Do not install DPA 6.0 on an existing DPA 5.x server. They cannot co-exist because of port
conflicts.
The DPA Migration Tool is a standalone application that analyzes all of your existing DPA
5.x data, alerts you to any potential migration issues, and provides an estimate as to how
long the migration will take. The DPA Migration Tool enables you to select the DPA 5.x data
that you want to migrate (you can choose not to migrate old data that is no longer of
value). In addition, the DPA Migration Tool can be used to change the platform of your DPA
system. For example, you can use the DPA Migration Tool to migrate the data from a
Windows DPA 5.x system to a Linux DPA 6.0 system.
DPA 6.0 no longer supports 32 bit operating systems for the DPA Server platform,
Therefore the target DPA 6.0 Server or Datastore must be a 64 bit operating system.
Note that the DPA 6.0 target system can also be a virtual machine.
Nodes
Scheduled Reports
If you are currently running DPA version earlier than DPA 5.5.1, upgrade your installation to
DPA 5.5.1 or later before using the DPA Migration Tool.
To move from DPA 5.x to DPA 6.0 system:
1. Install DPA 6.0 server on new hardware.
2. Install the DPA Migration Tool on DPA 5.x.
3. Run the DPA Migration Tool to analyze the DPA 5.x data, select what data to migrate,
and then to copy and merge the DPA 5.x data to the new DPA 6.0 system.
4. Redirect all 5.x collectors to the new DPA 6.0 server. You can either install new 6.0 DPA
agents or redirect the existing 5.x collectors.
5. Migrate configuration, datamine, and replication analysis to ensure the latest and
newer data has been captured prior to decommissioning the old DPA 5.x server.
6. Decomission the DPA 5.x server.
The migration process should not place a noticeable load on your DPA 5.x system.
Depending on the size of the datamine, the migration process could take from several
hours to several days. To reduce the amount of time to move data into your DPA 6.0
system, EMC recommends limiting the amount of historical data that is migrated.
Unsupported migration
There are some aspects of the DPA 5.x system that cannot be migrated to DPA 6.0. These
have to be manually migrated.
These include:
Custom report data sources and operators - The Custom report data sources and
operators cannot be automatically migrated. If your DPA 5.x system contains custom
data sources or operators (provided by engineering or Professional Services), the DPA
Migration Tool identifies them.
Analysis rules and assigned analysis - The DPA 6.0 Analysis Engine is based on a
different architecture than the DPA 5.x Analysis Engine. Therefore, existing analysis
rules cannot be automatically migrated to DPA 6.0. Existing analysis rules will have to
be manually recreated as analysis policies in DPA 6.0.
Datamine maintenance plans - DPA 6.0 does not have a database maintenance plan.
In DPA 6.0, data that is collected has a retention period that is set as part of the data
gathering configuration. The retention period is fully configurable.
Custom scripts accessing the DPA database schema and scripts using the DPA 5.x API
Custom scripts accessing the DPA 5.x APIs - DPA 6.0 has a new REST API that is not
backward compatible with the DPA 5.x APIs. The new REST API provides all of the
functionality of the earlier API. However, any custom scripts that were created to
access the DPA 5.x APIs have to be modified to take advantage of the new REST API.
Also, DPA 6.0 does not provide the dpa_apitool, as the new REST API can be used with
any standard REST client.
DPA 5.x customizations
Custom scripts accessing the dpabkupjob tool - The dpabkupjob tool continues to be
provided with DPA 6.0. However, there are some CLI parameter changes that might
affect custom scripts that use the tool.
Direct access to the DPA 5.x datamine - DPA 6.0 does not provide any direct access to
the DPA datastore. Any custom report that uses the Database Query data source to run
SQL queries against the DPA datamine will no longer work in DPA 6.0.
Collector Errors
Agent Errors
Table 2 on page 10 lists the changed and reports removed in 6.0 that existed in 5.8.
Table 2 List of changed and removed reports (page 1 of 2)
Changed and removed reports
Audit Log
Access Log
Analysis Event Details for Media Management Analysis Event Details for Performance
Analysis Event Details for Service Level
Management
10
NetApp Configuration
vFiler Configuration
Cluster Status
11
If you use iAnywhere, the DPA Migration Tool must be installed on the 5.x server.
Do not close the Command Prompt window that is running in the background when
installing the DPA Migration Tool. Closing this closes the DPA Migration Tool.
The DPA Migration Tool package name for each operating system is shown Table 3 on
page 12
Linux 32 bit
DPA-Migrator-Linux-x86-6.0.0.bin
Linux 64 bit
DPA-Migrator-Linux-x86_64-6.0.0.bin
DPA-Migrator-Solaris-SPARC64-6.0.0.bin
Windows 32 bit
DPA-Migrator-Windows-x86-6.0.0.exe
Windows 64 bit
DPA-Migrator-Windows-x86_64-6.0.0.exe
Windows
1. Double-click DPA-Migrator-<Windows>-<platform>-<build number>.exe, for example
DPA-Migrator-Windows-x86_64-6.0.0.243.exe
2. Follow the installation wizard.
Unix/Linux
Note: When installing and running the DPA Migration Tool, you must have a running X
server setup. If X server is not running, the user interface fails to launch and the DPA
Migration Tool is installed with only the default values.
1. Run chmod +x DPA-Migrator-<platform>-<version>.bin,for example
DPA-Migrator-Linux-x86_64-6.0.0.243.bin.
2. Run DPA-Migrator-<platform>-<version>.bin.
12
13
14
Troubleshooting
If the DPA Migration Tool encounters a problem, information about the problem is
displayed in the DPA Migration Tool console. In addition to the console output, the DPA
Migration Tool has extensive logging capabilities. The dpa6migration.log file contains a
record of the DPA 5.x data that was read and lists the DPA Migration Tools transactions
with the DPA 6.0 server. This log file contains the information you need to troubleshoot the
problem.
15
While contacting EMC Support for troubleshooting migration issues, send the
dpa6migration.log file and the DPA Migrator database file, dpa6migration.h2.db. If there
is a problem migrating the configuration data, then export the DPA 5.x configuration to a
WDS file using the DPA 5.x GUI and send that to EMC Support as well.
16
CHAPTER 2
Installation and Uninstallation
This chapter describes how to install the DPA server and agent. It includes the following
sections:
Overview.................................................................................................................
System requirements ..............................................................................................
Pre-installation Checklist.........................................................................................
Verifying connectivity ..............................................................................................
Pre-installation worksheet.......................................................................................
Installing DPA Server ...............................................................................................
Split or Enterprise installation .................................................................................
Complete or single-server installation .....................................................................
Installing the DPA Agent ..........................................................................................
Command line installation ......................................................................................
Silent installation....................................................................................................
Clustering ...............................................................................................................
Starting and stopping DPA services .........................................................................
Uninstalling the software ........................................................................................
18
18
20
22
24
26
26
28
29
30
33
36
38
38
17
Overview
DPA supports two system configurations:
Complete server - The server and datastore are installed on the same system. An agent
is also installed to manage the system. This option is recommended only for proof of
concepts, testing DPA or running in a laboratory scenario.
All production installs should be split application server / datastore server.
Split server/datastore - The split server and datastore servers are installed on two
different systems. Two agents are installed: one on the server system and one on the
datastore system. When deploying this configuration, install the datastore first and
then the server. EMC does not recommend installation of the DPA datastore on NAS
storage (CIFS or NFS shares) because NAS and CIFS shares may not have the capacity
to manage the I/O. The datastore can be stored on direct attached or SAN storage
devices.
One DPA Application communicates with one DPA Datastore. System requirements
The DPA Server and Replication Analysis can be installed on 64-bit Linux, Solaris, and
Windows. The DPA Agent can be installed on 32-bit and 64-bit AIX, HP-UX, Linux, Solaris,
and Windows. The DPA web console runs from any browser with the Flash plugin installed.
The EMC Data Protection Advisor Software Compatibility Guide provides a comprehensive
listing of system requirements.
Permissions
Observe the following to avoid installation failure:
You must have Administrator privileges (local or domain with full access) to install
DPA.
If User Account Control is enabled on the host, the installer must be launched by Run
As Administrator.
Port settings
DPA uses TCP ports 3741, 9002, and 9003 by default for communication (other port
numbers can be specified during installation). To ensure communication between the
server and agents, the firewalls in the network must be configured to allow
communication on these ports. During installation, these ports are checked to see if they
are in use. If they are, the Installer prompts you to enter alternate port numbers.
In addition, while installing the DPA Application services, Datastore service, and Agent
service ensure that the following ports are free. Installation halts if these ports are not
free.
18
Port
Port Type
HTTP
9004
TCP
HTTPS
9002
TCP
MANAGEMENT_NATIVE
9999
TCP
MANAGEMENT_HTTP
9005
TCP
MESSAGING
5445
TCP
MESSAGING_THROUGHPUT
5455
TCP
OSGI
8090
TCP
REMOTING
4447
TCP
TXN_RECOVERY
4712
TCP
TXN_STATUS
4713
TCP
Port
Port Type
POSTGRES - PQSQL
9003
TCP
Port
Port Type
AGENT - HTTP
3741
TCP
Overview
19
Pre-installation Checklist
This section contains a checklist of the activities you need to perform in preparation for
DPA installation and data monitoring. It also includes a summary of the installation and
data monitoring activities.
Table 7 on page 20 provides a worksheet that can be used to capture the networking
details for convenience of installation.
Table 7 Pre-installation worksheet (page 1 of 3)
Complete
Action
Comments
Install DPA
Install the DPA software.
Install the DPA server and agent as per the installation instructions.
To scale the requirements to your site, consult the EMC Data Protection
Advisor Server Sizing Calculator available from your EMC Sales
representative.
EMC recommends that you use a dedicated server. DPA should not be
installed on servers already running some other application. For
installation in a production environment, you need one host for the
Application Service and a separate host for the Datastore Service.
If the DPA server resides on a Oracle Solaris host and you are performing
client discovery of Windows hosts, at least one DPA agent must be
installed on a Windows proxy host.
20
Chapter 4, "Discovering the environment," lists the default settings for the
DPA credentials that are installed with DPA.
Action
Comments
The steps in this section apply only if you are monitoring a storage array,
database, or Microsoft Exchange Server for replication analysis.
Set up monitoring of
RecoverPoint (if applicable).
EMC RecoverPoint agent host and application host requirements are listed
in Chapter 4, "Discovering the environment."
Pre-installation Checklist
21
Action
Comments
If a remote agent is being used to import hosts, the DPA server must be
able to resolve the agent host.
If application discovery is being performed without an agent, Windows
host discovery uses Remote Procedure Calls (RPC) for Replication
Analysis and WMI for System Information. Unix hosts are discovered
using SSH or telnet/ftp (root or sudo).
Application hosts in a VMware environment are discovered using VI-SDK
by individual ESX credentials or vCenter credentials."Verifying
connectivity" on page 22 describes how to check connectivity for RPC and
WMI, and provides an example sudoers file.
For replication analysis, the Data protection policy details consist of:
The type or replication, (SRDF/S, SRDF/A, MirrorView, RecoverPoint,
etc.).
Whether the replication is PIT or continuous.
The replication target destination.
Verifying connectivity
This section describes how to check whether connectivity is established for RPC and WMI,
and provides an example sudoers file for sites requiring the use of sudo over root user.
RPC Communication
To check the RPC connection:
1. Open the Run dialog box from the Windows Start menu.
2. Type:
net use \\<servername>\admin$ /user:<username>
WMI Communication
To check the WMI connection:
1. Open the Run dialog box from the Windows Start menu.
2. Type WBEMtest and click Connect in the Windows Management Instrumentation Tester
dialog box.
3. In the Connect field, type \\<servername>\root\cimv2.
4. In the Credentials fields, type the username and password used to connect to the
application host you are monitoring.
22
7. Click Apply. If WMI can connect, data from the application host is displayed.
Sudo
If security requirements do not allow for root credentials to be supplied to DPA, sudo is a
workaround tool that can temporarily elevate a user's credentials to root for specific
commands configured in the sudoers file. A user can log in to a Unix host as a non-root
user, and use sudo to run SCSI commands successfully to discover storage related
information for the host. The following is an example of what needs to be added to the
sudoers file
# sudoers file.
#
# This file MUST be edited with the 'visudo' command as root.
#
# See the sudoers man page for the details on how to write a sudoers
file.
#
# Host alias specification
# User alias specification
User_Alias CMGU=cmguser
# Cmnd alias specification
Cmnd_Alias CMGEMC=/<homedir>/IllumAgent/l4magent
# Defaults specification
# User privilege specification
root ALL=(ALL) ALL
CMGU ALL=NOPASSWD:CMGEMC
# Uncomment to allow people in group wheel to run all commands
# %wheel ALL=(ALL) ALL
# Same thing without a password
# %wheel ALL=(ALL) NOPASSWD: ALL
# Samples
# %users ALL=/sbin/mount /cdrom,/sbin/umount /cdrom
# %users localhost=/sbin/shutdown -h now
#cmguser ALL=(ALL) NOPASSWD: ALL
Pre-installation worksheet
The following worksheet can be used to capture the connectivity details required when
configuring data collection through the Discovery Wizard in DPA.
Table 8 Connectivity details worksheet (page 1 of 3)
Item
Value
Network Configuration Information for DPA Server or agent (if agent is remote to DPA server)
Hostname
IP Address
Network mask
Primary DNS server address
Pre-installation worksheet
23
Value
24
Value
25
The server package name for each operating system is shown in Table 9 on page 26.
Table 9 Installation packages
Environment
DPA-Server-Solaris-SPARC64-6.0.0.bin
Windows 64 bit
DPA-Server-Windows-x86_64-6.0.0.exe
Linux 64 bit
DPA-Server-Linux-x86_64-6.0.0.bin
Install the Datastore Service first and then, install the Application Service. Installation of
the Application service before the Datastore Service results in failure of Application
service installation.
The following procedure explains performing a split installation in a Windows 64-bit
environment.
26
Do not start DPA services: Suppresses the automatic start of the services after
installation. You can restart the services through the command line.
Install with advanced datastore layout: allows you to configure the DPA Service
with the required filesystems distributed across different disks to optimize
performance.
6. When the DPA Advisor installation is complete, click Done.
27
28
The first time you access the DPA web console, you might see a message indicating
that the DPA Server is starting. This is due to some initialization after the initial install.
You might experience a delay of approximately 10 minutes before you receive a
message indicating that the DPA Server is up.
AIX
DPA-Agent-AIX-PPC64-6.0.0.bin
HP-UX IA64
DPA-Agent-HP-UX-IA64-6.0.0.bin
HP-UX PA64
DPA-Agent-HP-UX-PA64-6.0.0.bin
Linux 32 bit
DPA-Agent-Linux-x86-6.0.0.bin
Linux 64 bit
DPA-Agent-Linux-x86_64-6.0.0.bin
DPA-Agent-Solaris-SPARC64-6.0.0.bin
DPA-Agent-Solaris-x86_64-6.0.0.bin
Windows 32 bit
DPA-Agent-Windows-x86-6.0.0.exe
Windows 64 bit
DPA-Agent-Windows-x86_64-6.0.0.exe
The following procedure explains installing the DPA Agent a Windows environment.
1. Launch the installation.
2. Click Next.
3. Read and accept End User License Agreement. Click Next.
4. Choose an installation folder.
5. Verify the Pre-Installation Summary and click Install.
6. Choose the Agent installation options:
Do not start DPA Agent service - this option prevents starting of the DPA Agent
service after installation. If you select this option, you must manually start the DPA
Agent from the command line.
If you have selected Do not start DPA Agent service, click Next.
Type the fully qualified domain name or the IP address of the DPA Server with
which the DPA Agent will communicate.
Agent will be used to monitor Oracle Database - select this option to monitor an
Oracle database with the DPA Agent.
If you select this option, specify the directory where the Oracle Database device
driver files can be found by the DPA Agent.
Installing the DPA Agent
29
7. Click Next.
8. Type the fully qualified domain name or the IP address of the DPA Server with which
the DPA Agent will communicate. Click Next.
9. Click Done to complete the installation.
Unix/Linux
./install.bin [option]
Windows
install.exe [option]
30
Option
Description
-?
-i [swing | console |
silent]
Description
-D
<name>="<value>"
Shows the installer name-value pairs that might be set on the command line (using the -D option) to
override default installer values, or placed in a response file and used with the -f option.
Quotes must be used around the value.
Example:
-D <variable name>="<value>"
Where:
<variable name> and <value> descriptions are as follows:
Variable Name
Description
Possible values
DebugInfo
Yes and No
installDir
Installation location
Valid path
installSet
Complete | Server |
Datastore | Agent
AgentName
AgentPort
Integer
AgentConcurrency
Integer
AgentLoglevel
AgentStatusperiod
Integer
AgentAuthdifftime
Integer
AgentMaxlistenerqueuelength
Integer
AgentServertimeout
Integer
AgentInitFileName
31
32
Description
Variable name
Description
Possible values
AgentLogFileDir
Valid path
AgentLogFileName
AgentPFileDir
Valid path
AgentUseLocalSystem
Yes | No
AgentUserDomain
AgentInitFileDir
Valid path
AgentUserName
AgentUserPassword
Existing password
AgentServerName
AgentStart
Yes | No
AgentNetWorkerInstalled
Yes | No
AgentNetWorkerRoot
AgentNetWorkerDir
Valid directory
AgentNetWorkerCanNondefault
Yes | No
AgentSupportOracle
Yes | No
AgentSupportNetWorker
Yes | No
AgentMaxLogFiles
Integer
AgentMaxLogFileSize
Integer
AgentRemoteExecDir
Valid directory
ServerStart
Yes | No
Description
Variable name
Description
Possible values
ServerUserDomain
ServerUserName
User name for user in server service con- Existing user name
text
ServerUserPassword
Existing password
ServerUseLocalSystem
Yes | No
ServerName
Name of server
ServerPort
Integer
ServerWebPort
Integer
DatastoreStart
Yes | No
DatastoreListenAddress
DatastorePort
Integer
DatastoreHostName
DatastoreDataDir
Valid path
DatastoreTxLogDir
Valid path
DatastoreSupportIPv4
Yes | No
DatastoreSupportIPv6
Yes | No
-uninstall
Uninstalls DPA
-f <response filename>
Silent installation
A silent installation is an installation that can be performed without having to manually
type values to prompts. To perform a silent installation, a response file is created that
contains the values that are to be entered during the installation. The installation software
uses the values contained in this response file to perform the installation.
33
serverName=<DPA_servername>
<variable name>=<value>
...
where
<variable name>=<value> are a list of system settings and instructions that can be set
during installation. Table 11 on page 30 describes the available installer variable
names.
Unix systems
install.bin -i silent -f <response filename>
Windows systems
install.exe -i silent -f <response filename>
where
<response filename> is the name of the response file that you created. If the default
response file name was used, installer.properties, you do not need to specify -f
command line switch or the file name.
The following behavior applies to using the response file with the installer command line
options:
34
The path to the response file might be either absolute or relative to the directory in
which the installer resides.
If a response file is specified and exists, all other command line options are ignored.
If an installer properties file is specified but does not exist, the default properties file,
if present, will be used. Otherwise, any supplied command line options will be used.
If no additional options were specified, the installer runs using the default settings.
where
<path> is the location in which you want to install the pfiles.
For example, the following command sets the pfile_location on Solaris to /var/tmp:
./install.bin console D options.AgentPFileDir=/var/tmp
where
<path> is the location in which you want to create the log files.
The following example sets the logfile location to /var/log/EMC/DPA:
./install.bin console D options.AgentLogFileDir=/var/log/EMC/DPA
"Viewing log files" on page 96 provides more information on log file locations.
On Windows:
1. Go to <install-dir>\Program Files\EMC\DPA\services\applications
2. Check the \RAR, \EAR, and \WAR application folders for .deploying, .deployed, or
.failed file extensions.
Alternatively, open the Task Manager to view status.
On Windows or UNIX:
If both services are installed, in the command prompt, run the dpa svc status
command
After DPA installation
35
If just the Datastore or the Agent is installed, in the command prompt,run the
individual app and ds commands.
Clustering
Clustering is the ability for Application nodes to dynamically start, share workload with
other Application nodes, and be stopped as demand decreases. Clustered Application
nodes provide many benefits:
Workload partitioning
You can add new nodes to running clusters to improve performance due to load. If you
install a DPA Application Note, which detects and joins other Application Nodes to join a
cluster, youll enjoy zero downtime and power-on-demand. You can also monitor clustered
servers using DPA.
Do not register DPA services: suppresses the registration of the service with the OS
thus preventing them from starting after a host reboot
Do not start DPA services: suppresses the automatic start of the services after
installation
Install the DPA services as clusterable: Allows you to configure the DPA service to
discover and join any DPA cluster in your environment
Select Install the DPA services as clusterable and follow the steps in the wizard.
36
and re-install DPA choosing the Install the DPA services as clusterable.
37
When uninstalling, a warning indicating that the uninstaller will remove the features that
were installed during product installation appears indicating the the database will be
removed.
Silent uninstallations
On Unix/Linux machines, start a command shell, navigate to the _uninst directory and
type the following command:
./_uninst/<uninstall command> -i silent
38
CHAPTER 3
Getting started
This chapter describes how to log in to the DPA web console, change the initial password,
and load the license required to enable the software. It contains the following sections:
Getting started
41
Getting started
For example:
http://<server_name>:9004
or
https://<server_name>:9002
where <server_name> is the name or IP address of the server or localhost. If you chose a
different port number during the installation of the DPA server, change 9002 to that port
number.
Use administrator for both the user and password.
If this is the first time you are running DPA, you are prompted to add a license. Navigate to
and select the license file or files that have been sent by EMC. For specific information on
purchasing licenses for your DPA installation, contact your EMC sales representative.
Expired licenses
If a license expires, a license violation warning appears in the report title for reports run
from all objects enabled by the expired license. In addition, new objects cannot be added
in the web console for module components enabled by an expired license.
42
Getting started
Removing a license
Removing a license will cause a license violation warning to appear when running reports
against objects for that license. New objects of that type cannot be added in the web
console until a replacement license is supplied.
43
Getting started
44
CHAPTER 4
Discovering the environment
This chapter describes the steps you must take before running the Discovery Wizard to
discover the applications and devices in your environment. It contains the following
sections:
46
47
47
48
51
60
63
64
66
67
68
69
70
70
70
71
45
46
Step
Description
Install licenses
Check that the licenses to monitor your device, host, or environment have
been purchased and installed. See "Checking which licenses have been
installed"on page 47.
If you are monitoring the object from a host other than the DPA server
host, you need to install the remote agent. See "Installing the DPA
Agent"on page 29.
Install third-party
binaries or configure
the object for
monitoring
After at least ten minutes of letting the request run, run a report from the
object that should include data (for example, Backup Job Summary or a
configuration report).
Monitoring hosts
DPA can monitor database hosts and Microsoft Exchange Server for replication analysis.
Use the Discovery Wizard to configure application hosts for monitoring in DPA.
PHCO_24504
PHSS_36004
PHCO_31923
PHCO_35743
PHKL_34805
Linux
Retrieving VDISK information on Red Hat and SUSE Linux requires the following library to
be installed on the host: libstdc++.so.6.
Object_Type - Identifies the type of object (case sensitive). Host, DataDomain, EDL,
NearStore, TapeLibrary, EMC File Storage, RecoverPoint, HPEVA, FibreChannelSwitch,
XSIGOSwitch.
IP_Address - (optional). Identifies the object if it cannot be resolved from its name.
Time_Zone - (optional) The object's time zone as a UTC offset, for example -05:00. If a
time zone is not specified, the hosts will be imported without a time zone setting.
Checking which licenses have been installed
47
Platform - Identifies the operating system of the object (case sensitive): LINUX, HP,
SOLARIS, WINDOWS, AIX, or UNKNOWN
The following must be enabled to ensure communication between the monitored host and
the recoverability process:
Discovering
EMC VNX/CLARiiON storage arrays must be monitored remotely from an agent running on
a different host (such as the DPA server).
DPA discovers all of the storage arrays that are being managed and creates objects in the
object library inventory.
You will need to supply the name of the host on which EMC Solutions Enabler is installed.
48
2. Install Solutions Enabler on the DPA server or any supported host able to connect to
the VNX/CLARiiON array through HTTPS.
Note: A Solutions Enabler license is not required to discover VNX/CLARiiON.
3. Create a text file with the following CLARiiON information, one line per VNX/CLARiiON:
<SPA IP> <SPB IP> <Username> <Password>
where
<SPA IP> is the IP address of the first controller (SP-A).
<SPB IP> is the IP address of the second controller (SP-B)
<username> and <password> are the account name and password of a
VNX/CLARiiON user with view permissions.
The first field must be the first VNX/CLARiiON controller, followed by the second
controller.
4. If the Base license of Solutions Enabler exists, run the following command on the
Solutions Enabler host to register the VNX/CLARiiON:
symcfg disco -clar -file <filename>
5. If the Base license of Solutions Enabler does not exist, copy the ClarApiDiscovery
executable file from the following directory:
Windows
C:\Program Files\EMC\DPA\services\agent\win-x86\policyimport-clar\
Linux/Unix
/opt/emc/dpa/services/agent/<OS - e.g.
win-x86_64>/policyimport-clar/
Unix
./ClarApiDiscovery REGISTER -file=<filename>
49
7. If the VNX/CLARiiON is listed, you are ready to run the Discovery Wizard in DPA and
configure the VNX/CLARiiON.
Discovering
EMC VPLEX storage arrays can be monitored from the DPA Server or remotely from any host
that has DPA agent installed.
DPA discovers all of the storage arrays that are being managed and creates objects in the
object library inventory.
50
1. Use the Discovery Wizard to create the host object for the Solutions Enabler host that
is connected to the storage array replicated with RecoverPoint.
2. Discover the arrays attached to the host.
3. Configure the Symmetrix or VNX/CLARiiON arrays using the Discovery Wizard.
4. Import replication policy data from the storage arrays.
5. Configure the EMC RecoverPoint appliances data monitoring, as described in
"Monitoring EMC RecoverPoint"on page 63.
6. Ensure that the RecoverPoint Configuration request has been assigned to the
RecoverPoint appliance object that handles replication for the storage array. Run this
request.
7. After the RecoverPoint Configuration request is run and sufficient time has passed,
DPA should have begun gathering replication analysis data for RecoverPoint. Reports
can be run from the storage array objects and the Replication Analysis area will show
the mapping of storage and recovery points.
The database hostname and instance name if the CommVault database is remote to
the server.
51
Before you start the Discovery Wizard, you will need to know the resolvable hostname or IP
address of the NetWorker server.
52
omnirpt patch
HP has released a patch for Data Protector 6.1 that must be installed on a Data Protector
6.1 installation before it can be supported by DPA.
Table 13 on page 53 lists the required patch ID by platform.
Table 13 HP Data Protector 6.1 patch IDs
Platform
Patch ID
Windows
DPWIN_00417
HPUX PA-Risc
PHSS_39512
HPUX IA64
PHSS_39513
Linux
DPLNX_00077
Solaris
DPSOL_00371
The patch is available for General Release from HP from www.hp.com. Type the patch ID
into the Search field of the HP home page. You are directed to the patch download page.
53
AGENT_TSM_LIBMGRUSERNAME
AGENT_TSM_LIBMGRPASSWORD
elm.conf
rc.edt
On Windows, an environment variable called EDT_DIR is set by EDT. DPA looks up the
location specified in EDT_DIR.
On Unix, DPA looks first in /opt/GESedt-acsls/bin for elm.conf. If not found, on AIX
DPA looks in /usr/lpp/dtelm/bin. On other flavours of Unix/Linux, DPA looks in
/opt/OMIdtelm/bin.
If the elm.conf file is not present in these directories, the registry variable (Windows) or
environment variable (Unix) AGENT_TSM_ELMCONF_FILENAME can be set to the location
of elm.conf if required.
DPA reads from the rc.edt file at the following location:
54
On Unix, DPA looks first in /opt/GESedt-acsls/SSI for rc.edt. If not found, on AIX DPA
looks in /usr/lpp/dtelm/bin. On other flavours of Unix/Linux, DPA looks in
/opt/OMIdtelm/bin.
If the rc.edt file is not present in these directories, the registry variable (Windows) or
environment variable (Unix) AGENT_TSM_RCEDT_FILENAME can be set to the location of
rc.edt if required.
Note: Because a TSM environment using EDT requires the agent to read from these files to
collect configuration data, the agent must be on the same server as the TSM server.
55
While installing the DPA Agent, you are prompted to specify if you want to utilize the Agent
to monitor Oracle and if so, provide the location of the Oracle client libraries. This action
sets a registry setting (on Windows) or modifies an environment variable in the dpa.config
file (on Unix). If you change the location of the libraries after the install process is
completed, then you need to perform these steps manually.
Manually configuring DPA Agent to monitor Oracle database and (or) Oracle RMAN
Note: The registry key is created if you have selected Oracle database to be monitored
option selected while installing the DPA Agent.
If the registry key is not created, you must create it manually.
Restart the Agent service if you have changed the dpa.config file to include the Oracle
client path.
56
The Backup Exec Credentials must use the username and password of a Windows
administrator account on the Backup Exec server.
Select Admin > System > Manage Credentials to modify the Backup Exec Credentials that
are created after you have used the Discovery Wizard to create a Backup Exec object.
The agents host must be able to successfully resolve the NetBackup Media Servers.
The NetBackup Master Server must be able to successfully resolve the agents host.
Unix
If the NetBackup Master Server is running on a Unix computer, the name of the host on
which the agent is running must be added to the bp.conf file on the NetBackup Master
Server. To add the host:
1. Open /usr/openv/netbackup/bp.conf for editing and add the following line:
SERVER = Agenthost
where Agenthost is the agents hostname. The agents hostname must be resolvable
by the Master Server.
2. Restart NetBackup on the Master Server for the changes take effect.
57
Windows
If the NetBackup Master Server is running on a Windows computer, add the name of the
agent host through the NetBackup Administration Console:
1. Launch the NetBackup Administration Console and open the Master Server Properties
dialog box.
2. Click Servers and add the name of the agents host to the list of additional servers that
are allowed to access the Master Server.
3. Click OK.
4. Restart the NetBackup services to activate the changes.
Note: It is important that the line is inserted at the correct location in the file,
otherwise it might not take effect.
If you are monitoring PureDisk with an agent installed on the PureDisk server, add
the following line:
-A INPUT p tcp m tcp -dport 3741 j ACCEPT
If you are monitoring PureDisk from an agent running on a different host, add the
following line:
-A INPUT p tcp m tcp -dport 10085 j ACCEPT
58
2. If the DPA agent is installed on the PureDisk server, add the following line to the rules
file (three columns separated by a tab):
tcp
{controller_host_ip}
3741
This allows connections from the controller host to the DPA agent on port 3741 on the
PureDisk server.
3. If the DPA agent is installed on a remote host, add the following line to the rules file
(three columns separated by a tab):
tcp
{agent_host_ip}
10085
This allows connections from the agent host to the postgres database on port 10085
on the PureDisk server.
You can specify a single host or an entire subnet (by including a /mask), as in the
following example:
tcp10.64.205.0/24
10085
Monitoring Databases
This section describes how to monitor Oracle, SQL Server, and PostgreSQL databases.
Monitoring Databases
59
Monitoring Oracle
An Oracle database can be monitored from an agent running on the same host as the
Oracle server, or from an agent running on a different host, such as the DPA server.
V_$INSTANCE
V_$PROCESS
V_$DATABASE
V_$PARAMETER
DBA_DATA_FILES
V_$SYSTEM_PARAMETER
V_$DATAFILE
V_$SESS_IO
V_$SESSION
DBA_FREE_SPACE
Any user with the SYSDBA role will have these privileges by default, so it is recommended
that you specify a user that has the SYSDBA role when configuring the database for
monitoring.
If you do not want to use a user with the SYSDBA role to connect, then a separate user can
be created and explicitly granted permissions on those tables, as the following example
shows:
CREATE USER limited_user IDENTIFIED BY password;
GRANT CREATE SESSION TO limited_user;
GRANT SELECT ON V_$INSTANCE TO limited_user;
GRANT SELECT ON V_$PROCESS TO limited_user;
GRANT SELECT ON V_$DATABASE TO limited_user;
GRANT SELECT ON V_$PARAMETER TO limited_user;
GRANT SELECT ON DBA_DATA_FILES TO limited_user;
GRANT SELECT ON V_$SYSTEM_PARAMETER TO limited_user;
GRANT SELECT ON V_$DATAFILE TO limited_user;
GRANT SELECT ON V_$SESS_IO TO limited_user;
GRANT SELECT ON V_$SESSION TO limited_user;
GRANT SELECT ON DBA_FREE_SPACE TO limited_user;
GRANT SELECT ON DBA_TABLESPACES TO limited_user;
GRANT SELECT ON DBA_EXTENTS TO limited_user;
Replication analysis
To monitor an Oracle database for replication analysis, the agent must connect to the
database as an Oracle user able to perform selects on the following tables and views:
60
Dba_data_files
Dba_temp_files
Dba_tablespaces
V_$datafile
V_$logfile
V_$controlfile
V_$log_history
V_$archived_log
V_$instance
V_$database
V_$parameter
Dict
dba_tab_columns
When monitoring Oracle on a Windows platform, the operating system user specified in
the Credential must belong to the group ORA_DBA. On Unix, if Unix authentication is used,
no further definition is required in the database.
Agent requirements
The agent needs to be able to connect to the SQL Server master database in order to
gather the data required. The agent can either:
Use SQL Server Authentication using the credentials of the request (if set).
Use SQL Server Authentication using the credentials against an explicit master
database in the list of databases to be monitored (if set)
Monitoring Databases
61
If these are not set, the agent uses Windows Authentication using the logon ID of the
agent process.
If none of these are sufficient to connect to the master database, the request will not
gather data.
The user must be mapped to the database with the public role.
The user must be explicitly granted the VIEW SERVER STATE and VIEW DEFINITION
privileges (SQL Server 2005 only).
The VIEW SERVER STATE privilege is granted at the server level. The VIEW DEFINITION
privilege might be granted at the server level (under the name VIEW ANY DEFINITION)
or at the database, schema, or individual object level.
However, to grant VIEW DEFINITION privileges for only the specific databases that you want
to monitor, connect to the SQL Server as an administrator and run:
GRANT VIEW SERVER STATE TO [login\domain]
GRANT VIEW DEFINITION ON DATABASE :: <dbname> TO <username>
Replication analysis
The DPA server must connect as a database user with connect privileges for all of the
databases and write privilege for the TEMPDB database. For Windows authentication, the
user must be able to connect to all SQL Server databases and should have write privilege
for the TEMPDB database.
Monitoring PostgreSQL
A PostgreSQL database can be monitored from an agent running on the same host as the
PostgreSQL database or from an agent running on a different host, such as the DPA server.
config_file
data_directory
dynamic_library_path
external_pid_file
hba_file
ident_file
krb_server_keyfile
log_directory
log_filename
preload_libraries
unix_socket_directory
The following items are also unavailable unless you are connecting as a super user:
In the datafile configuration table, the full path to the datafiles cannot be shown, as
the path of the file is found in the data_directory parameter. The string (postgres data
directory) is shown instead.
In the connection status table, the f_command and f_status fields will not be
populated with the right information. These fields will be set to <insufficient
privileges>.
63
Description
Host
Disk
Fibre Channel
HBA
File system
Memory
NetInt
Process
Processor
Unix
To perform system monitoring on Unix computers, install an agent on the host that is to be
monitored. It is not possible to gather system information remotely from Unix computers.
Windows
To gather performance data from a Windows host, Windows Management Infrastructure
(WMI) must be installed on the Windows host you are monitoring.
It is possible to gather all system monitoring information remotely from Windows
computers, with the exception of Fibre Channel HBA information. To gather Fibre Channel
HBA information, the agent must be installed on the computer. "Monitoring a Windows
host remotely"on page 65 provides more details on the steps required to monitor a
Windows host remotely.
To set up system monitoring for a system on which an agent is installed, assign the system
monitoring requests to the host or group to monitor.
64
To monitor a Windows host from another Windows computer, the DPA agent service must
run as administrator on the computer performing the monitoring. During the agent
installation, type the name and password of an Administrator account on the local
computer and the agent service is automatically configured for that user. If this was
entered incorrectly during installation, modify the agent service login parameters so that
the agent service runs as an Administrative account rather than the Local System account.
65
Monitoring the Oracle SL24 Tape Autoloader and SL48 tape library
Configure the Remote Management Interface (RMI) to enable SNMP for the Oracle
StorageTek SL24 Tape Autoloader or SL48 Tape Library. To enable SNMP:
1. In the RMI, navigate to Configuration > Network.
2. Ensure the SNMP Enabled checkbox is enabled.
3. The Community Name string must be contained in the credentials used to connect to
this Tape Library in DPA.
4. Click Submit and review the changes.
67
> snmpmibcapset
The SNMP Mib/Trap Capability has been set to support
FE-MIB SW-MIB FA-MIB SW-TRAP FA-TRAP
FA-MIB (yes, y, no, n): [yes]
SW-TRAP (yes, y, no, n): [enter]
FA-TRAP (yes, y, no, n): [enter]
SW-EXTTRAP (yes, y, no, n): [enter]
>
Monitoring IP switches
When you are specifying a hostname, ensure the name of the switch is resolvable on the
agents host.
File Servers
DPA monitors the EMC File Storage.
Note: EMC File Storage is interchangeably referred to as Celerra File Storage.
68
1. Log in to the EMC File Storage Manager web browser interface as an administrator.
(You can also use the command line interface to create a DPA administrator.)
2. Navigate to Security > Administrators.
3. Create a new administrator, with a username of DPA, for example.
4. Select Local Only Account and type and confirm a password for the administrator.
5. Select a Primary Group of at least opadmin level of privilege. DPA does not need
greater privileges than those assigned by opadmin.
6. Enable the following client access options:
XML API v2 allowed
Control Station shell allowed
7. Click OK.
The DPA Credential used to connect to the EMC File Storage must contain the username
and password of the EMC File Storage administrator you created.
Backup appliances
DPA monitors and EMC Data Domain.
where <string> is the selected community string (for example, public). If SNMP is
already enabled, you will have to disable and re-enable SNMP for the new string to
take effect.
If you are not using a community string of public, you must change the community string
used in the EMC Data Domain Credential.
SNMP settings can also be set through the System Settings tab of the EMC Data Domain
Enterprise Manager interface.
Backup appliances
69
Monitoring backup servers in a Veritas Cluster Server and Microsoft Cluster Server
environment
To monitor backup servers in Veritas Cluster Server (VCS) and Microsoft Cluster Server
(MSCS) environments, an Agent must be installed within the clustered environment so
that at only one version of the Agent is running on a physical host. This Agent should be
configured within the DPA Server as the name of the Cluster Alias itself rather than that of
the physical host that it is running on.
Supported platforms
70
The EMC Data Protection Advisor Software Compatibility Guide provides more information
on supported platform versions.The following Knowledge Base article, available to all
customers with an account, provides information on configuring DPA to monitor clustered
servers:
http://solutions.emc.com/emcsolutionview.asp?id=esg117911
If the Knowledge Base article is insufficient to configure DPA to monitor your clustered
environment, please contact your EMC Professional Services representative. EMC Support
is unable to assist with configuring clustered environments.
71
72
CHAPTER 5
Monitored objects and groups
This chapter describes objects, groups, and smart groups. It contains the following
sections:
Objects ...................................................................................................................
Groups....................................................................................................................
Object attributes .....................................................................................................
Smart groups ..........................................................................................................
74
74
75
75
73
Objects
DPA discovers the applications and devices in your data protection environment and
stores these logical and physical entities as objects in the object library. Discovered
objects are grouped into the following categories in the object library:
Applications
Hosts
Storage
Switches
The object library enables you to view objects and their attributes. To view the object
library, select Inventory > Object Library.
Groups
A group is a collection of objects. For example, you can create a group of objects that are
used by an application. This way, when you apply a policy to the group, the policy is
applied to all of the objects within the group.
Note: An object can however exist in more than one group.
Child groups
A child group is a group that contains components of a system, such as a file system. Child
objects are most often created and assigned automatically during the discovery process.
Child objects created automatically by DPA cannot be unassigned. You can create and
assign specific types of child objects (for example, file systems or backup clients) to
groups.
Configuration group
The Configuration group is created by default. The Configuration group is created with an
initial structure that groups the data protection environment into Servers, Switches, and
Storage. All data protection hosts, devices, and applications discovered by the Discovery
Wizard are first added to the Configuration group. Objects that are unassigned from the
Configuration group are not deleted. No data gathering is performed on objects that have
been unassigned from the Configuration group, even if the object is assigned to another
group.
74
Object attributes
Object attributes extend the information that DPA holds about an object. After an object
attribute is created, the attribute can be enabled and assigned a value from any valid
object.
When creating or editing an object, attributes are filtered to be associated with one or
more specific types of objects, and only to objects with an existing attribute that matches
a given value.
For example, an Asset Tag attribute might be created to represent an asset identifier for
the physical components of an operating environment (such as hosts, storage arrays, and
switches). The Asset Tag attribute need not be assignable to logical components like
database instances or processes.
In the attribute definition, the Asset Tag is configured to be associated with a subset of
physical object types. You can further configure this attribute to only be associated with
physical object types that have an attribute of Business Unit, for example.
Smart groups
Smart groups allow users with administrative privileges to create groups that are
populated dynamically with information from the results of DPA reports. A smart group
runs a custom report and then creates objects based on the results of the report.
The main benefit of smart groups is that they provide high levels of flexibility.
Administrators can set up smart groups to dynamically create lists of objects that match
specific business and technical criteria.
To create a smart group, select Inventory > Group Management. Click Create Group and
then Create Smart Group.
75
76
CHAPTER 6
User and system settings
This chapter describes how to change user and system configuration parameters. It
contains the following sections:
78
78
80
80
80
81
77
Default password
Privileges
Administrator
administrator
Application owner
application owner
Engineer
engineer
User
user
LDAP authentication
DPA allows the integration of a Lightweight Directory Access Protocol (LDAP) server in the
environment so that user passwords do not need to be stored in the DPA database. When
a user logs in, DPA communicates with the LDAP server, verifies that the user exists, and
authenticates the password against that user stored in LDAP.
DPA supports Microsoft Active Directory and OpenLDAP as LDAP servers. If you have
installed DPA on a Unix environment and are authenticating to a Microsoft Active Directory
LDAP server, you cannot connect to the Windows host using SSL.
To enable LDAP authentication, select Admin > Users & Security > Manage External
Authentication.
Anonymous bind
When binding anonymously to the LDAP server, DPA connects to the LDAP server without
having to connect as a specific named user. This allows basic user authentication.
When authenticating a user using an anonymous bind, DPA must pass the Distinguished
Name (DN) of the user to the LDAP server to authenticate it. DPA must determine the full
DN of the user when the user logs in.
An example of a DN for a user is:
CN=Mark,CN=Users,DC=eng,DC=company,DC=com
The DN must be specified in the Base Name field when defining a user. When the user logs
in to the application, their username is authenticated against the LDAP server.
78
The disadvantage of using the anonymous bind method of authentication is that every
user you want to log in must be predefined in the application along with the DN of each
user. It is sometimes difficult to determine the DN of each user and it is possible to make
typing mistakes that might cause authentication to fail. The alternative is to use a
non-anonymous bind.
Non-anonymous bind
If a non-anonymous bind is used, DPA connects to the LDAP server as a named user before
attempting to authenticate users who log in to the application. By logging in as a named
user, DPA has access to search the directory for users. This means that you do not need to
specify the DN of each user who you want to have access to the application when creating
user definitions.
This means that you do not need to know the full path to each user inside the directory. For
example, you could type a value like: John Citizen.
During authentication, DPA searches the repository for users named John Citizen, and
regardless of which Organization Unit (OU), they are in, it should find them.
When logging in to the application, DPA attempts to connect to the LDAP server with the
username and password specified in the LDAP settings, and searches the directory for that
user. Upon finding the user, it attempts to authenticate with the password typed at login.
Auto-Login
Another advantage of using a non-anonymous bind to connect to an LDAP server is the
ability to use the Auto-Login feature. With Auto-Login, there is no need to define user
entries in DPA for each user requiring access to the application. Access is granted based
on the existence and group membership of a user in the LDAP directory.
Note: Note: h-????The Auto-Login feature is supported when connecting to a Microsoft
Active Directory server only. Do not attempt to use this feature with an LDAP server other
than Microsoft Active Directory.
If there are members of multiple groups in LDAP, and multiple groups have been defined in
the Group Mapping table, they are granted the role that is mapped to the first group in the
list of which they are a member. The groups that map to a role with greater permissions
should be highest in the list.
If using the Auto-Login feature, do not create a user definition in the application before
attempting to log in. The first time the user logs in, DPA authenticates the username and
password, and then attempts to determine the role that should be granted based on the
values specified in the Default User Role and Group Mapping fields. If a role cannot be
determined, the user is not granted access to the application. If the role can be
determined, DPA automatically creates a user definition and the user is permitted to log
in.
Users who are removed from LDAP are no longer granted access. If a users group
membership is changed in LDAP, the role is re-evaluated at next login and is updated.
LDAP authentication
79
Digital certificate
DPA uses a self-signed digital certificate for identification and encryption. This certificate
expires in five years. To use a certificate that is signed by your own Certificate Authority,
you must:
1. Export a certificate request (CRT) file.
2. Ask your Certificate Authority administrator to create a signed certificate in Base-64
Encoded X.509 (CER) format.
3. Import the signed certificate into DPA.
The Online Help provides more information on adding digital certificate.
Time periods
When you run a report or create a scheduled report, you must decide the period of time
over which the report is run, for example right now or last week. Several predefined time
periods are provided by default and you can create custom time periods.
To create a custom time period, select Admin > System > Manage Time Periods.
Schedules
Schedules are used to define when to run a scheduled report or generate a dashboard
view block, or to define the backup window specified in the Protection Policy. Several
predefined schedules are provided by default and you can also create custom schedules.
A schedule is made up of components that define when each schedule produces certain
results or runs certain reports. The Schedule Editor provides two ways to create schedules:
Basic editor - allows you to create and edit schedules using a graphical editor that last
up to a week. These schedules repeat every week.
Advanced editor - allows you to create more complex schedules by manually editing
the schedule parameters.
Schedules created in the basic editor can be edited using the advanced editor. However,
schedules created and saved in the advanced editor cannot be edited in the basic editor.
To create a schedule, select Admin > System > Manage Schedules.
80
System settings
This section describes how to modify the default system settings for DPA agents, the
server, and the datastore. To view or edit system settings, select Admin > System >
Configure System Settings.
Description
Concurrency
Log Level
Verbosity level when the data collection agent writes to the log
file. For example, selecting Fatal writes only critical errors to
the log file
Maximum size to which a log file can grow before the creation
of a new log file (in MB). To set no limit for the size of the log
file, set this value to 0
Server
The server settings configure global agent and email settings. The server settings are
described in Table 17 on page 81.
Table 17 Server settings
Setting
Description
Binary Multiplier
Switching this global setting on, defaults all Agents to use the
binary multiplier.
It applies to NetWorker agents only and is ignored when
monitoring other applications.
Timeout(s)
Time out setting that the server uses when talking to the
agent. The default is 120 seconds.
System settings
81
Replication Analysis
The Replication Analysis settings configure client-server time difference. The settings are
described in Table 18 on page 82.
Table 18 Replication Analysis settings
Setting
Description
Dirty recovery points are the recovery points that the user does
not want DPA to use for RPO calculations like replicas that are
used for reporting or test systems.
The user can define the dirty recovery points in the data
protection policy.
Agentless Discovery
The Agentless Discovery settings are described in Table 19 on page 82.
Table 19 Agentless Discovery settings
82
Setting
Description
The time that DPA waits for response from the agent before
timeout.
Telnet/SSH Handshake
Timeout
CHAPTER 7
Policies and Rules
This chapter introduces the different DPA policies and how DPA policies enhance reporting
capabilities. It includes the following sections:
Overview.................................................................................................................
Policies ...................................................................................................................
Generating events from policies ..............................................................................
Rule Template .........................................................................................................
Applying a policy.....................................................................................................
84
84
88
88
89
83
Overview
DPA compares collected data in the datamine to a set of conditions to predict and monitor
alert situations that may happen. The set of conditions is defined by a rules and policies.
Policies
Data Protection Advisor policies are a collection of user data about how backup and
replication should operate in the environment (recoverability and data protection policies)
or about the cost of storage and data protection operations (chargeback policies).
Recoverability, backup, and service level management reports then show how the
operations in the environment compare to the policy settings, for example, gaps in the
recoverability chain for a storage array, or if a backup server is not meeting a Recovery
Point Objective.
DPA provides the following policy types:
Analysis policies - are a collection of one or more rules that are used primarily for
generating alerts.
Protection policies - are a collection of user data about how backup and replication
should operate in the environment. These policies consist of recoverability and
protection rules.
Chargeback policies - are used to determine the cost of storage and data protection
operations.
Data Collection policies - are used to determine what data to collect and how often
data should be collected. Each policy contains agent requests that collect data.
By default, protection and chargeback policies are off for all objects and groups.
Analysis policies
An analysis policy is a collection of one or more rules that is assigned to an object or
group. Rules contain the logic for when to issue an alert. DPA compares collected data in
the datastore to the conditions in the rule to trigger alerts. Event-based rules trigger an
alert in response to data that is streaming into the DPA server. Schedule base rules
periodically check whether to issue an alert. Alerts can contain dynamic textual
information and might include populated links to reports. Only analysis policies can
generate alerts.
84
Period - determines how often it should run within the selected schedule.
For example, a rule template can be created specifying the file system filling up rule and
should monitor for partitions whose utilization exceeds 90% in the next hour, every 30
minutes between 9 a.m. and 5 p.m.
A rule template contains multiple rules that apply to different object types. The Analysis
Engine only runs the rules that are applicable to a given object. For example, if the object
is a switch, then the Analysis Engine will only run the rules in the policy that apply to
switches.
Protection policies
Protection policies are used to define service level agreements and exposure reporting to
calculate whether a backup ran in its backup window and to calculate whether an
application or host is meeting its recovery time and recovery point objectives (RTO, RPO).
Protection policies also determine how an application, host, or device should be
replicated or backed up. Policies are assigned to objects and consist of a set of rules that
dictate:
For replication: the type of copy, the replication level, and the schedule.
Policies
85
DPA reports then compare the protection policy for an object to the actual replication or
backup taking place to display the level of compliance with policy.
Recoverability checks
Recoverability checks are additional consistency checks that are performed by DPA on an
environment, if recoverability analysis is configured. A recoverability check verifies that
the storage and recoverability environment is configured to a users particular
requirement (for example, disaster recovery).
If enabled and an inconsistency is detected, a recoverability check generates an exposure
just like an exposure generated by a Protection Policy breach or a Recoverability request.
Recoverability check exposures are displayed in the Replication Analysis area and the
Exposure reports.
There are three system recoverability checks that identify gaps, as described in Table 20
on page 86.
Table 20 Recoverability checks
Recoverability check
Description
Chargeback policies
Chargeback reports provide the ability to perform a financial cost analysis for backups,
restores, and data protection replication operations in a customers environment. A cost is
calculated for each backup client and can be charged back to the business unit that is
responsible for that client or set of clients.
DPA calculates chargeback using two models: one for data backup and restore, and one
for the protection and replication of storage data by EMC RecoverPoint. Chargeback is
calculated for clients based on the inputs for each type.
Chargeback for backup applications uses the following inputs:
86
Number of Backups - the number of backups that have been performed by that client
during the reporting period.
Backup Size - the amount of data backed up on that client during the reporting period.
Number of Restores - the number of restores that have occurred on that client during
the reporting period.
Restore Size - the total amount of data restored by that client during the reporting
period.
Number of Tapes - the number of tapes used by that client during the backup process.
Data Retained - the total amount of data stored for that client on the backup server.
Size of data transferred - the amount of data replicated from primary storage by
RecoverPoint Appliances.
A Chargeback Policy allows you to specify a value for each of these parameters. The total
cost for a client is calculated by adding each of the different cost elements. For example, if
you want to implement a chargeback model where you charge $5 for each backup that
took place and $0.20 for each GB that was backed up, then you can specify values for
these fields in the chargeback policy but not specify values for the other parameters.
Backup client objects are assigned a cost center, which allows Chargeback costs to be
calculated by cost center. A default cost center exists for objects that have not been
assigned a cost center.
Multiple chargeback policies can be created and different clients or groups of clients can
have different policies assigned to them. For example, if you wanted to calculate the
chargeback cost for one group of backup clients based on the number of backups
performed and another group based on the number of tapes used during the backup
process, two chargeback policies can be created and associated with each group of
clients.
Policies
87
To configure remote data collection within DPA, configure the details when assigning
requests. If the Discovery Wizard created the objects, this configuration is already created.
However, if proxy or credential details have changed, modify the details as required.
Retention Periods on Requests are set on individual request using the Edit Request dialog
box. By default, the retention period is set to 365 days.
Rule Template
A rule is the set of instructions used by the DPA Analysis Engine to determine whether a
condition has been met and if an alert is generated. For example, the file system filling up
rule contains the set of rules to determine if any file systems will exceed the threshold at a
certain point in the future.
A rule is used by an Analysis job to perform analysis and alerting based on information
within the DPA database. When DPA is installed, a number of pre-defined rules are
installed that can monitor for common problems that may occur in the environment. You
can use these rules as the basis for creating analysis. DPA provides a rules editor that you
can use to create entirely new rules.
The term rule template is used to differentiate the rule definition from the rule instance.
The rule template defines the rule's logic. When a rule template is added to an analysis
policy, it becomes a rule instance (or a rule) that the Analysis Engine will run. Also, when
rule templates are added to a policy, users can specify the values for any parameters. This
allows rules to be reused by different policies.
For example
88
A Tier 1 policy might generate an alert when disk space is 80% utilized, while a Tier 2
policy can generate an alert when disk space is 90% utilized. This can be handled with the
same rule template that uses a parameter for utilization.
Applying a policy
Policies can be applied directly to a group or an object. Policies applied directly to an
object always take precedence. When a policy is set at the group level, objects in the
group that do not have their own policies inherit the group's policy. The best practice is to
apply the policy at the highest group level.
If an object is moved from one group to another group, the most recently applied policy is
implemented. For example, if an object is moved from Group A to Group B, the object
inherits the policy of Group B.
An administrator or any user with the Edit Node privileges can apply a policy to a group or
object.
Applying a policy
89
90
CHAPTER 8
Datastore maintenance
Datastore maintenance
91
Datastore maintenance
-m - sets the maximum export file size, where the file size is specified as <number>M|G
. If this option is not specified, the default export file size is 10 GB.
M - exports file size in megabytes
G - exports file size in gigabytes.
The exported datastore file is saved to the same directory where the export command was
run. If the maximum export file size is specified, then one or more export files are created
(they are identified as .part.1, .part.2, .part.3, and so on).
For example
Datastore maintenance
General tuning
During installation, the installer tunes the DPA Datastore Service for the host environment
on which it is being deployed. This tuning takes into account resources such as Disk
Space, Total Memory, and CPU cores. If during the lifetime of the DPA Datastore Service
any of these physical resources are increased or decreased, execute the following
command on the Datastore host:
dpa datastore configure --tune
Note: Restart the datastore for the new parameters to be applied. Subsequently, restart
the connecting application service(s).
Hardware issues
For deployments where optimal performance is a concern, the type and quality of the
hardware you use for your Datastore host server drastically impacts the performance of
the Datastore Service. Following are some guidelines to consider when commissioning
hardware for your Datastore host:
Disk types - Fast Ultra-320 SCSI disks are the best option. You can also use the
high-end Serial ATA (SATA) drives. With SATA, each disk is substantially cheaper and
with that you can afford more spindles than with SCSI on the same budget.
RAM - RAM is directly proportionate to the disk cache. This greatly impacts
performance considering the fact that memory I/O is very fast than the disk I/O.
RAID Controller - Ensure that the RAID controller can keep up with eight fast HDDs.
Disk configuration - The optimum configuration is RAID 1+0 with as many disks as
possible and with your transaction log on a separate disk or stripe. RAID 5 is not a very
good option for databases unless you have more than 6 disks in your volume.
93
Datastore maintenance
Note: Make sure that operating system partitions and RAID stripe boundaries are aligned
and undertaken when the partitions are created.
Usually, the performance is better when you have more RAM and disk spindles in your
system. This is because with the extra RAM you will access your disks less. And the extra
spindles help spread the reads and writes over multiple disks to increase throughput and
to reduce drive head congestion.
For production purposes the DPA Application Service and the DPA Datastore Service
should be placed onto different hardware. Not only does this provide more hardware
dedicated to the Datastore Service, but the operating system's disk cache will contain
more Datastore data and not any other application or system data.
94
CHAPTER 9
Troubleshooting
This chapter provides assistance on troubleshooting configuration and data gathering
problems that might be encountered in DPA. It also describes how to tune the server to
scale to your environment. It includes the following sections:
Troubleshooting installation.................................................................................... 96
Viewing log files...................................................................................................... 96
Troubleshooting data collection .............................................................................. 97
Troubleshooting client discovery for replication analysis ......................................... 99
Synchronizing the system clock............................................................................. 103
Troubleshooting
95
Troubleshooting
Troubleshooting installation
DPA installation failure on Solaris
DPA fails to install on Solaris SPARC 64-bit with the following error message:
The included VM could not be unarchived (TAR). Please try to
download the installer again and make sure that you download using
binary' modecopy. Please do not attempt to install this currently
downloaded copy.
Ensure that gnu tar is installed and available in the PATH ahead of the native Solaris
version before running the installer.
For example, through the command line,
1. cd /usr/sfw/bin/
2. ln -s gtar tar
If you are using Bourne shell, type,
export PATH=/usr/sfw/bin:${PATH}
IMPORTANT
The gtar version must be available on the Solaris host before executing the DPA 6.0
installer. Else, it will result in errors in the DPA 6.0 installation binaries.
This pertains to issue number DPA-21289.
96
Troubleshooting
Unix: /opt/emc/dpa/services/logs
Unix: <installdir>/agent/logs
The Discovery Wizard was successfully run to create the object to monitor.
Requests have been assigned to the object and the agent has been reloaded.
Sufficient time (fifteen minutes) has passed to allow the agent to gather data.
An appropriate report has been run that returns no data when data should exist for the
object.
Troubleshooting data collection
97
Troubleshooting
98
Troubleshooting
The DPA server and the storage array host meet the requirements as specified in the
EMC Data Protection Advisor Software Compatibility Guide.
Solutions
99
Troubleshooting
Solutions
Ensure the DPA server is resolvable from the Windows Proxy host.
The DPA server name might need to be added to the hosts file.
This occurs only when the credentials are configured to use sudo.
Add the following line to the sudoers file: Defaults env_keep +=
"ODMDIR"
Solution
100
Troubleshooting
Solution
Check that port 25011 from the host to the DPA server is not
blocked by a firewall.
Note: DPA will not display recovery data for this file system.
Client discovery failed with the error:
Please verify that you have enough disk space and
write permission.
or
Failed to unpack file on client <client_name>.
Ensure that there is enough disk space in the host's root file
system according to the system requirements.
When connecting to ECC 6.1, client discovery finished 1. Run a batch file containing the following command:
with error:
%ECC_INSTALL_ROOT%\tools\JRE\Nt\latest\bin
Error Import Clients for w2k3-96-52.dm1nprlab.com
\java -cp
finished with errors.
%ECC_INSTALL_ROOT%\ECCAPIServer\class;%ECC
_INSTALL_ROOT%\ECCAPIServer\ecc_inf\exec\e
Check previous error messages for further information.
ccapiclient.jar;
Unable to logon (Connection refused).
com.emc.ecc.eccapi.client.util.EccApiPopul
ateRandomPassword ApiClient
The additional classpath parameter is only required if the
command is not used from within the ECC classes directory.
101
Troubleshooting
Solution
Configure the DNS on the ESX properly or add the VM name and
IP to the ESX hosts file.
VNX/CLARiiON
To calculate the time offset between the VNX/CLARiiON and the DPA server:
1. Query the VNX/CLARiiON's time using the navicli command getsptime.
2. At the same time, query the connector's time.
3. If the connector time and the DPA server time are equal (no Time Zone difference):
TimeOffset = Connector time - VNX/CLARiiON time.
4. Otherwise, if there is a time difference also between the connector time and the DPA
server time:
TimeOffset = (DPA server time - Connector time) - VNX/Clariion's time.
5. Set the time offset for the request. "Configuring the time offset" on page 103 provides
information on this.
102
Troubleshooting
Symmetrix
To calculate the time offset between the Symmetrix and the DPA server:
1. Query the DPA server time.
2. At the same time, query the connector's time.
3. If the Connector time and DPA server time are not equal:
TimeOffset = DPA server time - Connector Time.
4. Otherwise, no time offset for Symmetrix needs to be set.
5. Set the time offset for the request."Configuring the time offset" on page 103 provides
information on this.
103
Troubleshooting
104
APPENDIX A
Analysis policy rule categories
This appendix contains information regarding all the analysis policy categories included in
DPA and contains the following sections:
106
107
108
109
110
111
111
112
113
114
116
105
Capacity planning
Capacity planning analysis policies create alerts about events that indicate that resources
might soon run out. Table 4 on page 106 describes these jobs.
Table 4 Capacity planning
106
Name
Description
Rule
Parameters
File system
filling up
Max Predicted
Utilization - 100%
Number of hours
to forecast 336
Less Than 25
Available Backup
Client Licenses
Running out of
backup client
licenses
Maximum client
licenses - 25
Pool is Filling Up
Pool is Filling
Up
Minimum Free
Space Allowed - 0
Days to Forecast 90
Pool is Filled Up
Pool is Filled
Up
Initial Consumed
Capacity - 3
Storage Array is
Filling Up
Storage Array
is Filling Up
Initial Consumed
Capacity - 2
Running out of
empty tapes
Maximum
Predicted Count 0
Number of hours
to forecast - 1008
TSM Database
Filling Up
Number of Hours
to Forecast - 336
Maximum
Predicted
Utilization - 100
TSM Recovery
Log Filling Up
Number of Hours
to Forecast - 336
Maximum
Predicted
Utilization - 100
Change management
Change management analysis policies alert about changes in the environment. Table 5 on
page 107 describes these jobs.
Table 5 Change management
Name
Description
Rule
Parameters
Backup Client
Configuration
Changed
Backup client
configuration
changed
N/A
Backup Device
Configuration
Changed
Backup device
configuration
changed
N/A
Backup Group
Configuration
Changed
Backup group
configuration
changed
N/A
Disk firmware
level changed
N/A
Disk serial
number changed
N/A
Object Operating
System Changed
Object operating
system changed
N/A
RecoverPoint Active
RPA Changed
RecoverPoint
Active RPA
changed
N/a
RecoverPoint RPA
Link Status
Changed
RecoverPoint RPA
Link Status
Changed
N/a
Tape drive
firmware level
changed
N/A
N/A
Change management
107
Configuration
The configuration analysis policies monitor the environment for device or application
configuration issues. Table 6 on page 108 describes these jobs.
Table 6 Configuration
108
Name
Description
Rule
Parameters
Backup Client
Inactive
Generates alerts if a
backup client is not
scheduled to run.
N/A
Fileserver export
and LUN on same
volume
Generates alerts if a
fileserver export is on
the same volume as
a LUN.
N/A
LUN on vol0
Generates alerts if a
LUN has been
configured on vol0.
Volume - vol0
Network
Autonegotiation
Mismatch
Generates alerts if
there is an
autonegotiation
mismatch between a
host and its switch
port.
IP autonegotiation
mismatch
N/A
Network Duplex
Mismatch
Generates alerts if
there is a duplex
mismatch between
object and switch.
IP duplex mismatch
N/A
Virtual Memory
Less Than 1.5x
Physical Memory
Generates alerts if
the amount of virtual
memory on a
computer is less than
1.5 times the amount
of physical memory.
N/A
Volume Priority
Not Normal
Generates alerts
when volume priority
is set to something
other than normal.
N/A
Data protection
The data protection analysis policies monitor the environment for exceptions related to
backup and recovery issues. Table 7 on page 109 describes the monitored jobs.
Table 7 Data protection (page 1 of 2)
Name
Description
Rule
Parameters
Application Restore
Time Estimate More
Than 12 Hours
Generates alerts if it is
estimated that it will take
more than 12 hours to
restore an application.
Application
restore time
estimate too high
Recovery time
objective - 12
hours
Application
Unprotected For 72
Hours
Application
recovery point
objective missed
Recovery point
objective - 72
hours
Backup Failed
Backup failed
N/A
Backup failed
many times
Maximum
failures - 2
Generates an Alert if a
backup Job is double its
size of its average size over
the last 14 days.
Backup larger
than average
Days of history
- 14 days
Deviation 100%
Backup Not
Succeeded For At
Least 3 Days
Backup not
occurred for many
days
Maximum days
not backed up
- 3
Backup Running at
Same Time as TSM
Server Operation
Backup Running
at Same Time as
Server Operation
None.
Alert is generated if a
backup spans more than 3
tapes.
Backup spans
multiple tapes
Maximum
number of
tapes - 3
Full backup
smaller than
average
Days of History
- 14 days
Deviation 50%
Maximum
Days Not
Backed Up 14
Data protection
109
Description
Rule
Parameters
Generates alerts if a
Remote Disk Mirror has not
been updated in at least 2
days.
Mirror not
updated for a
number of hours
Maximum
Exposure - 48
hours
More than 7
Backups Without A
Full
Too many
backups without a
full
Maximum Non
Fulls - 7
No NetWorker
Bootstrap
Generated in Last 48
Hours
No NetWorker
bootstrap
generated
Maximum
hours without
bootstrap defaults to 48
hours
TSM Database
Backup Running at
Same Time as TSM
Server Operation
Generates an alert if a
database backup process
completed while there was
other activity on the backup
server, including other
backups
TSM Database
Backup Running
at Same Time as
Server Operation
None.
TSM Database
Backup Occurred in
Last 24 Hours
TSM Database
Backup Occurred
Time - 24
Hours
Licensing
The licensing analysis policies monitor the environment and generate alerts about
licensing issues. Table 8 on page 110 describes these policies in more detail.
Table 8 Licensing
Name
Rule
Parameters
License expired
N/A
Generates an alert if a
license will expire in
the next week.
License nearing
expiration
Minimum days
before expiry defaults to 7 days
License Will
Expire in the
Next Week
110
Description
Performance
The performance analysis policies monitor the environment and generate performance
problem alerts. Table 9 on page 111 describes these jobs in detail.
Table 9 Performance
Name
Description
Rule
Parameters
Backup slower
than average
Days of history 14
Deviation - 50%
Generates an alert if a
backup has been running
for more than 18 hours.
Backup
overrunning
Fileserver cache
hit rate low
Minimum cache
hit rate - 80%
Full backup
succeeded but
slow
Minimum
expected speed 300 KB/sec
Provisioning
The provisioning analysis policies generate alerts about events that might require
provisioning operations. Table 10 on page 111 describes the jobs.
Table 10 Provisioning
Name
Description
Rule
Parameters
File system
snapshot space
under utilized
Days to examine
usage - 14
Minimum peak
snapshot usage 80%
Performance
111
Resource utilization
Resource utilization analysis policies generate alerts about events that have occurred
because of resource utilization problems within the environment. Table 11 on page 112
describes these jobs in detail.
Table 11 Resource utilization (page 1 of 2)
112
Name
Description
Rule
Parameters
Aggregate Snapshot
Utilization Above
90%
Generates an alert if an
aggregate snapshot
utilization is higher than a
specified threshold.
Aggregate
snapshot
utilization high
Maximum
aggregate
snapshot
utilization default is 90%
CPU Utilization At
Least 90% For Last
30 Minutes
CPU pegged
Maximum CPU
utilization defaults to 90%
Number of
minutes - 30
minutes
Disk pegged
Maximum Disk
Busy Percentage
- 90%
Number of
minutes defaults to 30
minutes
Fibre Channel
port utilization
high
Maximum
utilization 70%
Fibre Channel
port no BB
credits
N/A
Maximum file
system file
utilization 90%
File system
Snapshot Utilization
Above 90%
File system
snapshot
utilization high
Maximum file
system
snapshot
utilization defaults to 90%
File system
Utilization Above
90% and Increasing
File system
utilization high
and increasing
Maximum file
system
utilization defaults to 90%
Memory Utilization
Above 90%
Generates an alert if
memory utilization on a
host is greater than 90%.
Memory
utilization high
Maximum
memory
utilization defaults to 90%
Network Interface
Above 70% of Rated
Throughput
Generates an alert if a
network interface exceeds
70% of its rated
throughput.
Network
utilization high
Maximum
utilization defaults to 70%
Description
Rule
Parameters
RecoverPoint Journal
Utilization High
RecoverPoint
Journal
Utilization High
Warning
threshold
Critical
Threshold
RecoverPoint RPA
SAN Usage High
RecoverPoint
Journal
Utilization High
Warning
threshold
Critical
Threshold
RecoverPoint RPA
WAN Usage High
RecoverPoint
RPA WAN Usage
High
Warning
threshold
Critical
Threshold
RecoverPoint
Replication Lag High
RecoverPoint
Replication Lag
High
Time Lag
Warning
threshold
Time Lag Critical
Threshold
Data Lag
Warning
threshold
Data Lag Critical
Threshold
TSM Database
Utilization Higher
than 90%
TSM Database
Utilization High
Maximum
Database
Utilization 90%
TSM Expiration
Process Duration
Exceeds Expectation
Expiration
Process
Duration
Exceeds
Expectation
% Increase 25%
Period - 7
Max Duration 1
TSM Recovery
Log Utilization
High
Maximum
Recovery Log
Utilization 90%
Description
Rule
Parameters
Backup Succeeded
But Did Not Meet SLA
Requirements
Generates an alert if a
backup was successful
but outside of its
backup window.
N/A
113
Status
Status category analysis policies generate alerts when there is concern of the current
status of a monitored device or application match. Table 13 on page 114 describes status
jobs.
Table 13 Status (page 1 of 2)
114
Name
Description
Rule
Parameters
Backup Server
Errors
Generates an alert if a
backup server error is
logged (TSM only).
N/A
CPU Offline
CPU offline
N/A
Agent Heartbeat
Failed
Generates an alert if an
agent fails to send in its
heartbeat.
Agent heartbeat
failed
N/A
N/A
Disk Failed
Disk failed
N/A
EDL Failover
occurred
EDL Failover
Occurred
N/A
Fan Inactive
Fan inactive
N/A
N/A
Less than x% of
backup devices
available
Lowest
backup
device
availability defaults to
75%
More Than 3
Backup Devices
Unavailable
Many backup
devices unavailable
Maximum
number of
downed
devices - 3
Network Interface
Changed State
Generates an alert if
network interface gets a
link up or link down event.
Network interface
changed state
N/A
Object Restarted
Object restarted
N/A
Generates an alert if a
objects status changes to
anything except active.
PSU Inactive
PSU inactive
N/A
Description
Rule
Parameters
Publisher Hung
Publisher Queue
Hung
N/A
Server Log
Messages
N/A
N/A
N/A
Thermometer
Inactive
Generates an alert if a
thermometer becomes
inactive.
Thermometer
Inactive
N/A
Thermometer
Overheating
Generates an alert if a
thermometer on a device
indicates that it is
overheating.
Thermometer
overheating
N/A
Waiting For
Writable Tapes For
More Than 30
Minutes
Generates an alert if a
backup server has been
waiting more than 30
minutes for a writable tape.
Maximum
outstanding
devices defaults to 0
Minutes
before
alerting defaults to 30
minutes
Percentage to
Check defaults to
90%.
Status
115
Troubleshooting
The troubleshooting analysis policies provide help for troubleshooting problems with
there environment. Table 14 on page 116 describes these jobs.
Table 14 Troubleshooting (page 1 of 2)
116
Name
Description
Rule
Parameters
Generate an alert if a
backup failed on a client
while it experienced an
increase in network
errors.
N/A
Generate an alert if a
backup failed on a
client, while the CPU
utilization on the
computer was greater
than 90%.
Maximum
processor
utilization defaults to
90%
Generates an alert if a
backup failed on a client
whilst the memory
utilization on that client
was greater than 90%.
Maximum
memory
utilization defaults to 90
Generates an alert if a
backup failed on a client
whilst the CPU
utilization on the
backup server was
greater than 90%.
Maximum
processor
utilization defaults to
90%
Generates an alert if a
backup fails whilst the
memory utilization on
the backup server is
greater than 90%.
Maximum
memory
utilization defaults to
90%
N/A
Generates an alert if a
disk is in a failed state
for more than 48 hours.
Maximum
failure time defaults to 48
hours
Generates an alert if a
Fibre Channel port is
reporting errors.
N/A
Generates an alert if
more than 1% of all
frames going through a
Fibre Channel port have
errors.
Maximum
percentage
errors defaults to 1%
Description
Rule
Parameters
Network Interface
Reporting Errors
Generates an alert if
errors are being seen on
a network interface.
Network interface
reporting errors
N/A
Network Interface
Reporting Errors On
More Than 1%
Packets
Generates an alert if
more than 1% of the
packets travelling
through a network
interface have errors.
Network interface
reporting more than
x% errors
Maximum
percentage
errors defaults to 1%
Generates an alert if
there is an increase in
the number of errors
seen on a tape drive.
Include
Recoverable
Errors defaults to
False
Troubleshooting
117
118
APPENDIX C
Available command line operations
This appendix describes administrator utilities that are available from the command line:
120
131
131
132
119
If the application and datastore services are installed, use the dpa service command to
start, stop, or restart the services rather than the separate dpa application and dpa
datastore commands.
120
Abbreviation
--add
-a
--bind
-b
--cluster
-c
--delete
-d
--help
-h
--master
-m
--maxsize
-m
--ping
-p
--pipeline
-p
--platform
-p
--tune
-t
--uncompressed
-u
dpa application
dpa app
dpa datastore
dpa ds
dpa service
dpa svc
After you start, stop, or restart a service, it may take a number of minutes to complete and
may not result in an immediate state change.
Command options
--master <IP_address> Identifies the datastore to communicate. The application service
must be stopped for this command to operate.
--ping Pings the datastore service that has been defined. The Operation Mode in the
output identifies whether the application is within a cluster or standalone.
--tune <value> Tune the application memory utilization. Where <value> is the total host
memory in megabytes. The application service must be restarted for the new memory
utilization to take effect. The service must be stopped for this command to operate.
--cluster <IP_address> Identifies the cluster IP address to announce on
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Examples
dpa application configure --cluster 192.168.1.2
dpa app con --tune 8192
# dpa application configure --ping
EMC Data Protection Advisor
[INFO] Datastore Service : 127.0.0.1
[INFO] Operation Mode : STANDALONE
121
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
<Datastore_IP_Address> additional or override IP address for the datastore
<Datastore_FQDN> additional or override FQDN for the datastore
Examples
dpa application demote
dpa app demote 192.168.1.10
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Command options
--cluster <cluster> Set the cluster announce address for the application service
--help Displays the help screen
122
Examples
dpa application promote --cluster 192.168.1.1
dpa app promote 192.168.1.10
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
123
Examples
# dpa application status
EMC Data Protection Advisor
The status of the Application Service is RUNNING
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Command options
--platform Include platform version info
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Examples
# dpa application version
[INFO] Version for
Apollo
[INFO] Version for Controller
[INFO] Version for
DPA
[INFO] Version for
Remotex
[INFO] Version for
UI
124
EAR
RAR
EAR
EAR
WAR
is
is
is
is
is
1.0.0.3304
6.0.0.69338
6.0.0.69338
1.0.0.3304
6.0.0.local
datastore
datastore
datastore
datastore
datastore
datastore
datastore
datastore
datastore
datastore
configure [options]
export [options]
import [options] <import_filename>
install [options]
reindex [options]
restart [options]
start [options]
status [options]
stop [options]
uninstall [options]
After you start, stop, or restart a service, it may take a number of minutes to complete and
may not result in an immediate state change.
Command options
--bind <IP_address> Set the bind address for the datastore service. The default is
127.0.0.1
--bind cannot be specified with --add or --delete.
--add <IP_address> Add an application service node as a valid datastore client
--delete <IP_address> Remove an application service node as a valid datastore client
--tune <tune> Tune the datastore memory utilization. Where <tune> is the total host
memory in MB (megabytes) or GB (gigabytes). The datastore service must be restarted for
the new memory utilization to take effect.
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Examples
dpa datastore configure --add 192.168.1.10
dpa ds con --bind 192.168.1.1
dpa datastore con --tune 8192MB
125
When exporting to a file, a complete and consistent copy of the datastore will be
exported to the local file system in a location that can be optionally specified. The
default filename of the export is: datastore-<date_and_time>.part.<x>. Where <x> is the
part number of the export. A new part number is created if the export file is greater
than the maximum export file size. The default is 10 gigabytes. Use the --maxsize
option to adjust the maximum size.
When exporting to pipe, a complete and consistent copy of the datastore will be
streamed to a named pipe from where a Backup Manager can read the contents.
The datastore service must be installed and running for this command to operate. Any
existing filename present will be overwritten.
dpa datastore export [options]
Command options
--maxsize <number>M|G Set the maximum size of each export file part. Where
<number>M|G is in megabytes or gigabytes. For example, 15G is 15 gigabytes
--uncompressed Export in uncompressed format
--pipeline Export to pipe
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Examples
# dpa datastore export
EMC Data Protection Advisor
Datatstore exported to file :
C:\Users\Administrator\datastore-2013-02-20-1205
Exported from the datastore successfully
Command options
--uncompressed Import from uncompressed format
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
<import_filename> Filename of the exported file to import
Examples
# dpa datastore import datastore-2013-02-20-1205.part.1
126
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
127
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Examples
# dpa datastore status
EMC Data Protection Advisor
The status of the Datastore Service is RUNNING
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Command options
--help Displays the help screen
128
service
service
service
service
service
service
install [options]
restart [options]
start [options]
status [options]
stop [options]
uninstall [options]
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
129
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Examples
# dpa service status
EMC Data Protection Advisor
The status of the Datastore Service is RUNNING
The status of the Application Service is RUNNING (STARTING ...)
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
Command options
--help Displays the help screen
--version Displays the tool version information
--quiet Suppresses all output except for warning and error messages
130
Unix users
Unix users must source the DPA config file before running any of the command line
operations.
To source the config file, navigate to the etc folder of the DPA installation directory and run
the command as follows:
cd <DPA install dir>/agent/etc
. ./dpa.config
-r Name of report to be run. This is the name of the report, not the scheduled report.
-t Time period to run the report against (for example, Last Day).
-c Object type. Used to specify the type of object when reporting on more complex
object types, such as file systems.
-N Path to a file containing a list of objects. Each line in the file represents an object.
Each line should be in the format: object name, [type], [partOfObject].
Some file examples are:
auwysdmnivd1c
or
auwysdmnivd1c, Host
or
C:, Filesystem, auwysdmnivd1c
Unix users
131
or
C:, Filesystem, auwysdmnivd1c
D:, Filesystem, auwysdmnivd1c
E:, Filesystem, auwysdmnivd1c
-F Format in which you want the report to be displayed: csv, jpg, pdf, xml, html. The
format defaults to HTML if not specified.
-m E-mail address of the user you want to receive a report using email.
The following is the list of valid object types than can be used with the -c flag:
132
NetWorker - dpaagent_modnetworker
NetBackup - dpaagent_modnetbackup
Avamar - dpaagent_modavamar
Running the executable with the -? parameter shows the valid command line options. You
should specifically use:
-t <target host> Host address of backup application server. The default is localhost.
-B <start time> Start time from which to gather backup jobs. The format is
dd/mm/yyyy hh:mm:dd.
-E <end time> End time from which to gather backup jobs. The format is dd/mm/yyyy
hh:mm:dd.
The start and end times can also be in Unix epoch time format.
If <start time> is specified and <end time> is not, <end time> is set to the current time.
This includes all the backup jobs that ended after <start time>.
If <end time> is specified and <start time> is not, <start time> is set to 0. This includes all
the backup jobs that end before <end time>.
-c- Commit Instructs the module to send the data to the DPA Server. Mandatory.
The following example collects backup job data run between 20:15 to 23:15 on
10/09/2012 from a NetBackup server on NBUmaster:
Example:
133
134
INDEX
agent 38
Analysis policy 85, 88
attributes 75
options files 33
B
Backup Applications 51
Branch Elements 85
C
chargeback 86
Complete or single-server installation 28
Config file, sourcing 131
consistency group check 86
consistent device replication check 86
D
Discovering EMC VPLEX arrays 50
DR host visibility check 86
E
EMC ControlCenter
monitoring 48, 50
Enterprise installation 26
P
pfile 35
ports, replication analysis 48
PureDisk 58
R
Recoverability checks 86
RecoverPoint, monitoring for Storage Arrays 50
Remote Data Collection 87
Remote Windows host monitoring 65
reports, command-line 131
requests, data gathering 87
rules 85
S
schedules 80
silent installation 33
single-server installation 28
SNMP community string 66
Solutions Enabler 48
Split or Enterprise installation 26
Symantec NetBackup 57
System Monitoring Modules 64
Tape Libraries 66
Tivoli Storage Manager 54
I
Installation Package Names 12, 26, 29
Installing the Application Service 27
Installing the Datastore Service 27
IP Switches 68
L
LDAP
anonymous bind 78
UNIX environments
uninstalling the agent software 38
Using 13
Using the DPA Migration Tool 13
V
VMware, monitoring 70
X
Xsigo Director
configuring data monitoring 68
N
NetBackup
configuring authentication 57
NetWorker 52
135
Index
136