Beruflich Dokumente
Kultur Dokumente
ibm.com/redbooks
International Technical Support Organization IBM System Storage Productivity Center Deployment Guide July 2008
SG24-7560-00
Note: Before using this information and the product it supports, read the information in Notices on page vii.
First Edition (July 2008) This edition applies to Version 3, Release 3, Modification 1 of TotalStorage Productivity Center Basic Edition (product number 5608-B01) and IBM System Storage Productivity Center (product number 2805-MC2).
Copyright International Business Machines Corporation 2008. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The team that wrote this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 1. System Storage Productivity Center introduction . . . . . . . . . . . . . . . . . . . . 1.1 SSPC overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.1 SSPC solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.2 TPC Basic Edition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.3 SSPC hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.4 SSPC deployment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 TPC Basic Edition versus Standard Edition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 When do you need SSPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3.1 DS8000 management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3.2 SVC management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3.3 Building an SSPC server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.4 Architecture of SSPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.4.1 TPC Basic Edition components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.5 TPC key concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 2. Planning for SSPC install. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1 Collecting configuration information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 SSPC and TPC Basic Edition relationship . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 SSPC server options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.1 Options for SSPC server hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.2 SSPC software options and licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4 Planning for the future . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4.1 Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4.2 Server sizing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.5 Building a SSPC like server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.6 SVC requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.7 Existing TPC environment and integration of SSPC . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.8 DS8000 Element Manager GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.9 Redundant SSPCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.9.1 Single SSPC instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.9.2 Dual SSPC instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 3. SSPC initial setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1 Initial SSPC setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 Change the host name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2.1 Change the host name in Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2.2 Change host name in DB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2.3 Stop and start services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix ix xi xi 1 2 2 3 4 4 4 5 5 6 6 6 7 8
13 14 16 16 16 18 18 18 19 19 20 20 21 22 22 22 25 26 37 37 40 41
iii
3.3 Connect SVC Master Console to SVC Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Chapter 4. Building an SSPC server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.1 SSPC build basics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.1.1 Installation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 Install IBM DB2 Enterprise Server Edition V9.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2.1 Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3 Installation of TPC V3.3.1 Basic Edition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4 SVC Console and CIMOM Agent V4.2.1 installation . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4.1 PuTTY installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4.2 SVC Console and CIMOM Agent installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4.3 Connect SVC Master Console to SVC Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . 45 46 46 47 47 55 62 63 66 73
Chapter 5. Managing your SSPC appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 5.1 Securing your SSPC server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 5.1.1 Application security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 5.1.2 Operating system security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 5.1.3 Network security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 5.2 Upgrading your SSPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 5.3 Integrating your SSPC with an existing TPC environment . . . . . . . . . . . . . . . . . . . . . 102 5.3.1 Rollup reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 5.4 Backing up your SSPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Chapter 6. TPC Basic Edition functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.1 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.2 Data Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.3 Database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.4 Graphical user interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.5 Command-line interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3 Using TPC BE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.1 Starting the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.2 Using the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.3 Collecting data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.4 Adding CIMOM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.5 DS8000 CIMOM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.6 Adding in-band Fabric agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.7 Adding out of band Fabric agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.8 Probe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4 Topology Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.1 Topology Viewer overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.2 Data Path Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.3 Managing storage subsystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.4 Managing fabrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5 Element Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5.1 Storage subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5.2 Switch Element Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5.3 Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5.4 External tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 106 106 106 107 108 109 109 109 109 113 115 116 121 128 128 136 141 141 148 148 158 163 164 175 179 182
Chapter 7. Upgrading SSPC and using additional functions . . . . . . . . . . . . . . . . . . . 187 7.1 Upgrading SSPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 7.1.1 TPC BE upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 iv
IBM System Storage Productivity Center Deployment Guide
7.1.2 SVC GUI and CIMOM upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2 Installing Agent Manager and deploying agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2.1 Agent Manager installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2.2 Device server and Data server registration with the Agent Manager . . . . . . . . . 7.2.3 Deploying Data and Fabric agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.3 Additional Standard Edition functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.3.1 Collecting storage usage and trending information. . . . . . . . . . . . . . . . . . . . . . . 7.3.2 Determining the availability of storage resources . . . . . . . . . . . . . . . . . . . . . . . . 7.3.3 Storage provisioning using SAN Planner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.3.4 Enterprise rollup reporting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 8. DS8000 GUI under Element Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.1 Launch DS8000 GUI from SSPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2 What is new in the new DS8000 GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2.1 Creating Extent Pools using the Automatic function . . . . . . . . . . . . . . . . . . . . . . 8.2.2 Delete Extent Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2.3 Make Extent Pools: manual action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2.4 Add capacity to an Extent Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2.5 Remove capacity from Extent Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2.6 Make volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2.7 Assign Parallel Access Volumes (PAV) (alias volumes) . . . . . . . . . . . . . . . . . . . 8.2.8 Dynamic Volume Expansion on System z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2.9 Dynamic Volume Expansion on Open Systems . . . . . . . . . . . . . . . . . . . . . . . . . Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Other publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How to get Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
192 192 192 205 208 210 210 210 211 215 227 228 230 232 245 250 258 265 270 275 281 284 289 289 289 289 289 290
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Contents
vi
Notices
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs.
vii
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. These and other IBM trademarked terms are marked on their first occurrence in this information with the appropriate symbol ( or ), indicating US registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at http://www.ibm.com/legal/copytrade.shtml The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both:
AIX Chipkill DB2 DS6000 DS8000 IBM Passport Advantage Redbooks Redbooks (logo) System Storage System Storage DS System x System z Tivoli TotalStorage WebSphere z/OS
The following terms are trademarks of other companies: Novell, SUSE, the Novell logo, and the N logo are registered trademarks of Novell, Inc. in the United States and other countries. Oracle, JD Edwards, PeopleSoft, Siebel, and TopLink are registered trademarks of Oracle Corporation and/or its affiliates. Java, JRE, JVM, Sun, and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft, SQL Server, Windows Server, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel Xeon, Intel, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others.
viii
Preface
IBM System Storage Productivity Center (SSPC) is the next step in the IBM storage strategy. This solution comprises hardware and software, combining device configuration capabilities for the IBM System Storage DS8000 and IBM System Storage SAN Volume Controller (SVC) in an easy-to-use hardware console. SSPC extends the manageability of these devices with the introduction and integration of IBM TotalStorage Productivity Center Basic Edition V3.3.1. Consolidating several hardware and software components on a single tested system helps support consistent interoperability. This IBM Redbooks publication will provide an overview of IBM System Storage Productivity Center (SSPC). It contains the information required to set up your SSPC server by taking you through the initial customization of the server and then defining and launching Element Managers through IBM TotalStorage Productivity Center (TPC) Basic Edition. Details on using the functions of TPC BE are provided as well as upgrading your SSPC server (and TPC BE) to a fully functional TPC Standard Edition. Managing IBM TotalStorage DS8000 using TPC V3.3.1 is also covered in this book.
ix
Mary Lovelace is a Consulting IT specialist at the International Technical Support Organization. She has more than 20 years of experience with IBM in large systems, storage and Storage Networking product education, system engineering and consultancy, and systems support. She has written numerous Redbooks on TotalStorage Productivity Center and z/OS storage products. Martin Jer is a Certified IT Storage Specialist in New York, working as a pre-sale advisor for enterprise storage topics. He has more than 30 years of experience with IBM large systems, storage systems, tape systems, and virtualization systems. His area of expertise is in the design of storage solutions for mainframe and open systems. Patrick Ji is an IBM Certified IT Architect working in Australia. He is also a Master Certified IT Architect by The Open Group. He has over 10 years experience in the IT industry. His background includes multiple IT domains, including storage, security, networks, Windows, UNIX, databases, and programming. He also had three years of trading experience before commencing his career in the IT industry. By combining business skills with IT skills, he assists medium to large companies optimize IT strategies, delivering innovative solutions and maximizing business values through IT investment. Danijel Paulin is an IT Specialist in IBM Croatia, providing storage technical support. He has nine years of experience in mainframe and storage environments. Before joining IBM Croatia in 2003, he worked for a large bank in Croatia and was responsible for z/OS and storage administration. His areas of expertise include IBM high-end disk and tape storage subsystems and disaster recovery solutions using the capabilities and features of IBM storage products. Thanks to the following people for their contributions to this project: Sangam Racherla International Technical Support Organization, San Jose Center Bob Haimowitz International Technical Support Organization, Raleigh Center Rich Conway Dave Bennin Don Brennan International Technical Support Organization, Poughkeepsie Center Yan Chu Nancy Hobbs Bryant Lee Miki Walter SSPC Team, San Jose Jason Turner SSPC Product Manager, Austin, Texas Ivo Gomilsek Infrastructure IT Architect for Storage Solutions in CEMAAS IMT Mike Griese Worldwide Technical Support Management for IBM TotalStorage Productivity Center
Comments welcome
Your comments are important to us! We want our books to be as helpful as possible. Send us your comments about this book or other IBM Redbooks in one of the following ways: Use the online Contact us review Redbooks form found at: ibm.com/redbooks Send your comments in an e-mail to: redbooks@us.ibm.com Mail your comments to: IBM Corporation, International Technical Support Organization Dept. HYTD Mail Station P099 2455 South Road Poughkeepsie, NY 12601-5400
Preface
xi
xii
Chapter 1.
Status dashboard IBM System Storage DS8000 GUI integration with TPC Basic Edition The IBM System Storage Productivity Center (machine type 2805) includes the following pre-installed software: Microsoft Windows 2003 Server Fix Pack 2 DB2 Enterprise Server Edition V9.1 with Fix Pack 2 IBM TotalStorage Productivity Center Basic Edition V3.3.1 IBM System Storage SAN Volume Controller (SVC) Console and CIMOM Agent V4.2.1 In addition, the DS8000 Storage Manager GUI can now be utilized inside the TPC GUI environment. This provides the administrator with additional features inherent to TPC. New DS8000 systems at the Release 3 level utilize TPC for remote Web access.
To use these features, the customer must purchase the appropriate software license. These features are pre-installed on SSPC and are activated through license files. TPC for Replication is not preloaded, although it can be installed on the SSPC server.
Storage Reporting
Basic Asset & Capacity Reporting Storage reporting on the relationships of computers, file systems and DS8000 LUNs/volumes Capacity Analysis/Predictive Growth Customized and Detailed Capacity Reporting including Chargeback and Database Reporting
Performance Management
Performance Reporting/Thresholds Volume Performance Advisor Recommend DS8000 configuration based on performance workloads Fabric performance reporting and monitor
Figure 1-1 Comparison between TPC Standard Edition and Basic Edition
Note: Keep in mind that TPC software is licensed by capacity. If an existing TPC customer adds a new DS8000, they will likely need to purchase additional TPC capacity if they do not have enough spare capacity. If you are an existing TPC customer and not able to upgrade to V3.3.1 in time for your new DS8000 installation, you have the following options: Assuming you cannot upgrade TPC in time, you can temporary install TPC V3.3.1 on a minimally sized server solely to access the new DS8000 GUI. Once you upgrade your production TPC server to V3.3.1, the temporary TPC server can be decommissioned. You can configure the DS8000 using the GUI directly from the HMC. You can use the DS8000 CLI. If the new DS8000 is going into a location without TPC, you may consider purchasing SSPC for that new location.
O ptional C om ponent DB
A gent M anager
TP C GUI
A gents
C IM O M A gents
O ut of B and Fabric A gents
D evice S erver
TP C B asic E dition
Unlike TPC Standard Edition, TPC Basic Edition does not include TPC for Data. Therefore, you cannot deploy Data agents with TPC Basic Edition. Like TPC Standard Edition, TPC Basic Edition uses CIMOM agents and Out of Band Fabric agents to gather information and provide configuration changes in your storage and fabric devices.
TPC database
TPC database runs on IBM DB2 Enterprise Server Edition V9.1. It provides a central repository for all TPC collected data.
TPC GUI
In the TPC environment, you have the following three ways to invoke the TPC GUI: Invoking the TPC GUI installed on SSPC Using the Java Webstart GUI by pointing your Internet browser to SSPC Installing the TPC GUI on your own workstation.
Data server
The Data server hosts the control points for product scheduling functions, configuration, event information, reporting, and graphical user interface support. It coordinates the communication with agents and the data collection from agents that scan file systems and databases to gather storage demographics and populate the TPC database with results.
Automated actions can be defined to drive functions, such as file system extension, data deletion, TSM backup or archiving, or event reporting when defined thresholds are encountered. The Data server is the primary contact point for all user interface functions. The Data server also includes functions that schedule data collection and discovery for the Device server.
Device server
The Device server discovers storage subsystems and SAN fabrics, and then it gathers information about storage subsystems and SAN fabrics and analyzes their performance. The Device server controls the communication with agents and the data collection from agents that scan SAN fabrics. It is also responsible for the creation and monitoring of replication relationships between storage devices.
Agent Manager
The TPC Data agents and Fabric agents gather host, application, and SAN fabric information and send it to the Data server and the Device server. Agent Manager is used to manage Data agents and Fabric agents. The architecture of Agent Manager is based on Tivoli Common Agent Services (CAS). The Common Agent Services provides a way to deploy agent code across multiple user machines or application servers throughout the enterprise. The deployed agent code collects data from and performs operations on managed resources on behalf of TPC. In TPC Standard Edition, Agent Manager is used to deploy and manage both Data Agents and Fabric agents to the managed servers. Because TPC for Data is not included in the TPC Basic Edition, only Fabric agents can be deployed and managed by Agent Manager in TPC Basic Edition.
CIMOM agent
CIMOM agent uses Web-Based Enterprise Management (WBEM) and Storage Management Initiative - Specification (SMI-S) architecture. Web-Based Enterprise Management is a initiative of the Distributed Management Task Force (DMTF) with the objective to enable the management of complex IT environments. It defines a set of management and Internet standard technologies to unify the management of complex IT environments.
The three main conceptual elements of the WBEM initiative are: Common Information Model (CIM): CIM is a formal object-oriented modeling language that is used to describe the management aspects of systems. xmlCIM: This is a grammar to describe CIM declarations and messages used by the CIM protocol. HTTP and HTTPS: These specification are used as a way to enable communication between a management application and a device that both use CIM. Storage Management Initiative - Specification (SMI-S) was launched by the Storage Networking Industry Association (SNIA) in mid-2002 to create and develop a universal, open interface for managing storage devices, including storage networks. In the SMI-S model, the CIM for storage management is fully adopted and enhanced to standardize the management interfaces so that management applications can provide cross device management. The TPC design follows the SMI-S architecture. Figure 1-3 shows how the CIMOM agent works in a TPC environment.
CIM Client ( TPC ) CIM message is transferred between the CIM client and the CIMOM by http/https encoded with XML CIMOM Provider CIMOM uses the Provider to translate CIM message into proprietary message to communicate with the Storage Devices Proprietary message to communicate between the Provider and the Storage Devices Storage Devices
Figure 1-3 SMI-S architecture for TPC
In the SSPC environment, the CIMOM agent or the SVC clusters is integrated into SSPC. The CIMOM agents of DS8000 are embedded into DS8000 HMC consoles. Therefore, in the SSPC environment, there is no extra CIMOM hardware required for SVC and DS8000.
Discovery function
TPC also implemented a discovery function. It can help administrators to automatically discover the storage devices running in the same environment. Based on the SMI-S architecture, the TPC discovery function is implemented using the Service Location Protocol (SLP). Figure 1-4 shows a typical SLP deployment in the TPC environment. SLP User Agent (UA) is a process working on the behalf of the users to establish contact with network services. The UA queries and retrieves service information from Service Agents (SAs). In the TPC environment, the SLP UA runs within the TPC process. SLP SA is a component working on behalf of one or more network services to broadcast the availability of services. SA replies to the service requests of UA and provides requested information about the services registered with the SA.
TPC Discovery Procedure: 1. UA embedded within TPC sending out multicast
messages to the network and targeting all SLP SAs within the multicast range with a single User Datagram Protocol (UDP) message 2. SA embedded within the CIMOM receives a service request, compares its own registered services with the requested service, and returns matches to the UA using a unicast reply message.
TPC SLP UA
1 2
SLP SA CIMOM
Figure 1-4 Discovery architecture
To locate a service in the TPC environment, you define a service type you want in the TPC GUI. Based on the general description of the services you have specified, TPC invokes SLP UA to send out multicast messages to the whole network and targeting all SLP SAs within the multicast range. When an SLP SA receives a service request, it compares its own registered services with the services requested and returns matches to the UA using a unicast reply message. The SLP UA follows the same procedure and sends repeated multicast messages until no new replies are received. The resulting set of discovered services, including their service URL and any service attributes, are returned to TPC.
10
Agent M anager
Agent M anager DB
SSPC
SSPC DB
Server
Figure 1-5 Agent Manager overview
Agent Manager is the central component managing agents deployed in the environment. It maintains its own database to keep the information about the managed agents. Common Agent is installed on the systems to be managed. It is responsible for managing Subagent on the system at the request of a managing system. Subagent is used to provide system level function; this can be a Data agent or a Fabric agent. By default, SSPC allows you to deploy Fabric agents on managed servers. If you upgrade your SSPC to TPC Standard Edition, you can also deploy Data agents on managed servers. The Fabric agents are installed on computer systems that have fiber optic connectivities through HBAs into the SAN fabrics that you want to manage and monitor. The Fabric agents collect fabric topology information, port state information, and zoning information. The Fabric agents can also identify other SAN-attached devices if they are in the same zone. Using operating system calls, the agents also collect information about the machine on which they are installed. We recommend having a minimum of one Fabric agent installed per fabric zone. The Data agents collect information from the machines or hosts on which they are installed. The agents collect asset information, file and file system attributes, and any other information needed from computer systems. Data agents can also gather information about database managers installed on the servers, Novell NDS tree information, and NAS device information. Data agents are typically installed on all servers in the SAN that you want to collect information from. This is because each server has a unique set of files and file systems that TPC cannot track without an agent.
11
12
Chapter 2.
13
5. When registering your Windows software running on the SSPC server, you will be asked the name of the person who the software will be registered to and the name of the organization that owns the SSPC server. During initial power-on of the SSPC server, you will be prompted to enter the Windows Server 2003 Product Key. The key is listed on a sticker labeled Windows SVR Ent 2003 and is located on the outside of the top cover of the SSPC server. Record this value before the server is installed in the rack. Record the information in Table 2-2.
Table 2-2 Windows 2003 software registration information Field Administrators name ________________________ Organization Windows Server 2003 product key ________________________ Entry Notes This is the name of the person who will be registered for the Windows Server 2003 software. This is your company name. Needed during initial configuration of the SSPC server.
6. You will need information about the network configuration of the SSPC server, such as the host name (MANNODE is the default and may not have to be changed) and the IP address. Gather the required information listed in Table 2-3.
Table 2-3 IP address and host name Field SSPC SSPC IP address Subnet Mask IP address or host name Host Name:________________ IP address: ____.____.____.____ IP address: ____.____.____.____
14
Field Default Gateway Preferred DNS Preferred DNS name suffix Example: sspc.ibm.com Alternate DNS Alternate DNS name suffix Example: ibm.com
IP address: ____.____.____.____
7. SSPC provides an improved DS8000 and SVC configuration. Using TPC installed on your SSPC server, you can add, manage, and launch the element managers for administering storage subsystems. From a planning perspective, you should record the IP addresses of the element managers to be launched in Table 2-4.
Table 2-4 DS8000 and SVC device information Device type DS8000 SVC Other DS8000 SVC Other DS8000 SVC Other DS8000 SVC Other DS8000 SVC Other DS8000 SVC Other Attached device System Name/ Host Name __________________ System Name/ Host Name __________________ System Name/ Host Name __________________ System Name/ Host Name __________________ System Name/ Host Name __________________ System Name/ Host Name __________________ IP address IP address: ____.____.____.____ IP address: ____.____.____.____ IP address: ____.____.____.____ IP address: ___.____.____.____ IP address: ____.____.____.____ IP address: ____.____.____.____
8. There is no antivirus installed in the SSPC. You can install antivirus packages like Norton or McAfee to meet your companys security policy. You should also consider backup and recovery procedures for the SSPC, as described in Chapter 5, Managing your SSPC appliance on page 83. 9. There is no HBA installed in the SSPC because the TPC Server does not require an HBA. When upgrading to TPC Standard Edition or TPC for Data customers, you need HBAs in the computers being monitored, but there is not a requirement for one in the SSPC.
15
License considerations
IBM System Storage Productivity Center Version 1.1 consists of one IBM System Storage Productivity Center server (machine type 2805) and one license of IBM TotalStorage Productivity Center Basic Edition V3.3.1 software, which comes pre-installed on the 2805 server. IBM TotalStorage Productivity Center Basic Edition is licensed per management server and is not based on capacity. If you order one license of TPC Basic Edition, you are then entitled to install and use the TPC Basic Edition code on one system only. There is no limit as to the number of DS8000 clients you are entitled to. The SVC Master Console client is recommended to two clients due to this CIMOM limitation. If you want two SSPC servers, you need to order two licenses of TPC Basic Edition. You are then entitled to install and use the TotalStorage Productivity Center Basic Edition server code on two systems. Existing TPC installations can use their existing TPC server and TPC software license to perform the remote configuration of new DS8000s using the GUI once TPC is upgraded to V3.3.1. The TPC installation must have IP connectivity to the new DS8000. Keep in mind that TPC software is licensed by capacity. If an existing TPC customer adds a new DS8000, they will likely need to purchase additional TPC capacity if they do not have enough spare capacity.
16
The hardware of the SSPC server is a Machine Type 2805-MC2. It is an IBM System x x3550 1U high rack-mounted server. It has one Quad-Core Intel Xeon Processor E5310 (1.60 GHz 8 MB L2 1066 MHz 80 W), 4 GB of memory, two 3.5" hard disk drives of 146 GB 15K rpm SAS HDD in a RAID 1, optical drive CD-ROM, and dual integrated 10/100/1000 Mbps Ethernet. This hardware configuration is sized for the TPC Basic Edition. TPC Basic Edition is TPC for Disk without the Disk performance function and TPC for Fabric. TPC Basic Edition does not include TPC Data and there is no Agent Manager.
1800 9100
17
2.4.1 Licenses
All distributed software licenses include Software Maintenance (Software Subscription and Technical Support) for a period of 12 months from the date of acquisition, providing a streamlined way to acquire IBM software and ensure technical support coverage for all licenses. Extending coverage, for a total of three years from date of acquisition, may be elected. TPC Basic Edition is licensed per management server and is not based on capacity. IBM TotalStorage Productivity Center Basic Edition can be configured to access any number of DS8000 GUIs. In most environments, a single SSPC can manage all the DS8000s within the enterprise. Even in large enterprise environments, the SSPC is sized to handle the Topology Viewer, along with asset and capacity reporting.
18
You order one IBM System Storage Productivity Center (machine type 2805) and one license of TPC Basic Edition software, which comes pre-installed on the 2805 server. The 2805 server license does not include the software license. The separate purchase of the TPC Basic Edition software license is required. You are entitled to use the software on the 2805 server and no other system. If you want to run TPC Basic Edition server code on any other server, you are required to first disable the code on the 2805 server.
Supported platforms
IBM System Storage Productivity Center (machine type 2805) is only offered with the Microsoft Windows 2003 Enterprise Edition operating system. Consequently, only the Microsoft Windows version of IBM TotalStorage Productivity Center server is supported on that server. IBM TotalStorage Productivity Center code is supported on Windows, AIX, and Linux. The purchase of the TPC Basic Edition license does entitle the customer to install the server code on any of the supported operating systems. However, the SSPC (2805) server is only supported when running Microsoft Windows 2003 Enterprise Edition.
19
You can install TPC Basic Edition on your OEM Windows 2003 Enterprise Edition server. You can choose a server with CPU, memory, and hard drive compatible with the IBM SSPC server. IBM SSPC server hardware is listed in 2.3.1, Options for SSPC server hardware on page 16. The procedure to install the SSPC software is described in Chapter 4, Building an SSPC server on page 45.
Java versions
The TPC Basic Edition has the IBM V1.4.2 JRE in the source code. Your OEM server may not support the IBM V1.4.2 JRE. During install, you may encounter the error message shown in Figure 2-4. To fix this Java error, you have to download and install the Version 1.4.2 Java from the SUN Microsystem Web site.
20
Existing TPC installations can use their existing TPC server and upgrade to TPC V3.3.1 and use the existing TPC software license to perform the management of new DS8000s using the GUI and TPC functions. TPC software is licensed by capacity. If you add a new DS8000, you may need to purchase additional TPC capacity. If you have TPC running on an AIX or Linux server and want the Element Manager for the new DS8000, you can upgrade to TPC V3.3.1 and use the Element Manager in TPC V3.3.1 on the AIX or Linux server. Only the SVC Master Console needs to run on a Windows server.
21
LAN
SVC Cluster
If the temporary outage is not acceptable in your environment, you may need dual SSPC configuration. By introducing the second SSPC, the single point of failure can be removed. In the situation where the first SSPC instance is not working, you can use the second SSPC to manage your storage subsystems.
22
If one SSPC stops working, you can go to the second SSPC and manage your systems from there. This is equivalent to having have two remote controllers for your television. If one remote controller stops working, you may simply use the other remote controller.
SSPC SSPC
LAN
SVC Cluster
23
24
Chapter 3.
25
In Figure 3-2 on page 27, check the I accept the agreement button and click Next to continue.
26
The next window is the Regional and Language options, as shown in Figure 3-3. Check Customize to update the Regional and Language Options.
27
The next window is the Regional and Language Options, as shown in Figure 3-4. In the Regional Options tab, you can specify the format of numbers, currencies, dates, and time. After you have updated the Custom and Details, click Next to go to Figure 3-8 on page 30. Update the Regional and Language Options for your installation environment.
Figure 3-5 on page 29 shows the Languages tab. Click Details to take you to the Text Services and Input Languages window, as shown in Figure 3-6 on page 29.
28
In the Text Services and Input Languages window, select the language for the SSPC from the drop-down menu. In the Installed services window, select the keyboard languages for the SSPC, as shown in Figure 3-6.
29
Figure 3-7 shows the options of the Advanced tab. After you have made all the necessary language changes, click Apply to continue.
In Figure 3-8, enter the name of this SSPC server and your organization. The default host name is MANNODE. In our installation, we chose SSPC for the server name.
Figure 3-9 on page 31 is where you enter the product license key information, as mentioned in 2.1, Collecting configuration information on page 14.
30
The Windows Server 2003 Product Key is listed on a sticker labeled Windows SVR Ent 2003 located on the outside of the top cover of the SSPC. It was recorded in 2.1, Collecting configuration information on page 14. Enter this value now and click Next to continue.
The next window is the Licensing Modes window, as shown in Figure 3-10. We accepted the defaults and click Next to continue. For detailed information, refer to the Microsoft Web site on Licensing Overview for Windows Server 2003: http://www.microsoft.com/windowsserver2003/howtobuy/licensing/overview.mspx
31
The next window is the Computer Name and Administrator window shown in Figure 3-11. Here is where you enter the SSPC host name and Administrator password. Install this Windows Operating System for SSPC using MANNODE as the host name, as this is the name used when building the SSPC image. Change the server name after the initial customization. Fill in the space to the left of Computer name as MANNODE. Note that the Administrator password is passw0rd by default. You must use the default of passw0rd when you first log in to the SSPC even if you specify another password here.
Figure 3-12 shows the Computer Name and Administrator Password fields filled in. Enter MANNODE in the Computer name field. This is the host name for the SSPC. Click Next to continue.
32
The next window is the Date and Time Settings window. Update the Time Zone and Date & Time fields to reflect your SSPC server environment. Click Next to continue.
The next steps are to set up the network. You need the information in Table 2-3 on page 14 to set up the IP address, net mask, default gateway, and DNS of the SSPC server. In the Networking Settings window shown in Figure 3-14, select the Custom settings button and click Next to continue.
33
The next window is Networking Components, as shown in Figure 3-15. Click Internet Protocol (TCP/IP) and then click Properties to continue.
In Figure 3-16, check the Use the following IP address and Use the following DNS server address buttons. Enter the IP address, Subnet mask, Default Gateway, Preferred DNS server, and Alternate DNS server information that you noted in Table 2-3 on page 14. Click Advanced to continue.
Clicking the DNS tab provides the option to enter the DNS server addresses, in order of use and Append these DNS suffixes (in order): information, as shown in Figure 3-17 on page 35. You can list the DNS servers by IP address that the server will query to resolve the DNS
34
domain names. You can also specify the DNS suffixes that will be searched, in the order they are listed. When all the information is entered, click OK to continue.
The next window is the Workgroup or Computer Domain, as shown in Figure 3-18. We selected the default of a workgroup named WORKGROUP and click Next to continue.
The next window shows that you have successfully completed the Windows Setup, as shown in Figure 3-19. Click Finish to restart the SSPC in order for the options you specified to take effect.
35
When the SSPC reboot is complete, you will see the main IBM System Storage Productivity Center window, as shown in Figure 3-20.
36
37
The System Properties window appears. Click the Computer Name tab, as shown in Figure 3-22.
In the Computer Name window, click the Change button, as shown in Figure 3-23 on page 39.
38
Enter the new host name in the Computer name field, as shown in Figure 3-24. In our environment, we want to change the name to SSPCSRV. Update the Workgroup information for your installation if necessary and click OK to continue.
39
A pop-up window informs you that you must reboot the system for the computer host name change to take effect, as shown in Figure 3-25. Click OK to continue.
In addition, you will receive a pop-up menu asking you to restart the system. Click Yes to start the reboot of the computer.
The steps to change the host name in DB2 are: 1. Update the DB2 command. 2. Stop and then restart stop the IBM WebSphere Application Server V6 - Device server and IBM TotalStorage Productivity Center - Data server services.
Update DB2
Changing the host name in DB2 involves entering several DB2 commands. To open a command prompt window, select Start Run and enter cmd in the Run window. Click OK to continue, as shown in Figure 3-28 on page 41.
40
Change to the directory where your DB2 is installed. By default this is C:\Program Files\IBM\SQLLIB. Enter the following commands, as shown in Figure 3-29: db2extsec /u db2users /a db2admns db2start
Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp.
C:\Documents and Settings\Administrator>cd \Program Files\IBM\SQLLIB C:\Program Files\IBM\SQLLIB>db2extsec /u db2users /a db2admns DB2EXTSEC: processing completed successfully. C:\Documents and Settings\Administrator>db2start SQL1063N DB2START processing was successful.
41
In the Services window, scroll down to locate the services, as shown in Figure 3-30.
Figure 3-30 Locate IBM WebSphere Application Server V6 - DeviceServer and IBM TotalStorage Productivity Center - Data server
Point your mouse to the IBM WebSphere Application Server V6 entry, right-click it, and click Stop to stop the WebSphere services, as shown in Figure 3-31 on page 43.
42
Repeat this process for the IBM TotalStorage Productivity Center - Data server service, as shown in Figure 3-32.
Figure 3-32 Stop IBM TotalStorage Productivity Center - Data server service
43
You need to restart the IBM WebSphere Application Server V6 - Device server and IBM TotalStorage Productivity Center - Data server services. Again, locate the services, highlight the service you want to start with your mouse, right-click it, and select Restart. Once the services successfully restart, you have changed the host name and can log in to the TotalStorage Productivity Center console.
44
Chapter 4.
45
46
In this chapter, we install TPC without Agent Manger. As a result, the Data agent and Fabric agent cannot be deployed. If deploying agents is required in your environment, refer to Chapter 7, Upgrading SSPC and using additional functions on page 187.
4.2.1 Steps
DB2 is installed using a setup wizard. The setup wizard leads you through the entire installation process. To install DB2, follow these steps: Log on with a user ID with Administrator authority on Windows. Insert the DB2 product CD into the CD-ROM drive or use the unzipped DB2 installation image. AutoRun starts the LaunchPad. The DB2 installation program (see Figure 4-1 on page 48) should start within 15 - 30 seconds if you have AutoRun mode set on your system. If the installation program does not start, do one of the following steps: Use a command prompt to change to the root of the DB2 install CD and enter db2setup.exe. Use Windows Explorer, open the root of the CD, and double-click db2setup.exe.
47
Select Install a Product and click Install Now under DB2 Enterprise Server Edition, as shown in Figure 4-2.
The DB2 Setup wizard window is presented (see Figure 4-3 on page 49). Click Next to continue. 48
IBM System Storage Productivity Center Deployment Guide
The next window is the License Agreement, as shown in Figure 4-4. Select I accept the terms in the license agreement and click Next.
49
The next window allows you to select the installation type, as shown in Figure 4-5. Select Typical as the installation type and click Next to continue.
In the next window, shown in Figure 4-6, select Install DB2 Enterprise Server Edition on this computer and click Next to continue.
By default, DB2 setup wizard installs DB2 Enterprise Server Edition in the folder C:\Program Files\IBM\SQLLIB. If you do not want the default folder, you can type in the directory of your 50
IBM System Storage Productivity Center Deployment Guide
choice, as shown in Figure 4-7. In our installation, we accept the default. Click Next to continue.
By default, DB2 uses db2admin as the DB2 administrator user ID. If you do not want to use db2admin, you can type the user ID of your choice. In our installation, we accepted the default. By default, Use the same user name and password for the remaining DB2 services is checked. We accept the default. In Figure 4-8, type the password for db2admin and record it. Click Next to continue.
51
In the Configure DB2 instances window, the default instance is DB2. Leave the default instance unchanged and click Next (see Figure 4-9).
By default, Prepare the DB2 tools catalog is unchecked. TPC does not require DB2 tools, so we accept the default. If you later need DB2 tools for other applications, you can install DB2 tools separately. In Figure 4-10, make sure that Prepare the DB2 tools catalog is unchecked and click Next.
52
By default, Set up your DB2 server to send notifications is checked. In our installation, we uncheck it. If notification is required in your environment, you can enable it. In Figure 4-11, uncheck Set up your DB2 server to send notifications and click Next.
By default, Enable operating system security is checked. It creates two user groups: one is the DB2 administrators group and one is the DB2 users group, as shown in Figure 4-12. DB2ADMNS is the default group name for the DB2 administrators group. DB2USERS is the default group name for the DB2 users group. In our installation, we accept the default. If you do not want the default group name, you can type the group name of your choice. Click Next to continue.
Figure 4-12 DB2 Administrators and Users group Chapter 4. Building an SSPC server
53
In Figure 4-13, verify the DB2 installation information and click Install to continue.
Clicking the Install button starts the DB2 installation. Wait until the installation is finished (Figure 4-14).
When installation process is finished, click Finish, as shown in Figure 4-15 on page 55. Reboot your server to complete the DB2 installation. 54
IBM System Storage Productivity Center Deployment Guide
55
Once the installer is invoked, the Select a language window is displayed, as shown in Figure 4-16. Select a language from the drop-down list and click OK to continue. This is the language that is used for installing this product.
The next window is the Software License Agreement window, as shown in Figure 4-17. Read the terms of the license agreement. If you agree with the terms of the license agreement, select I accept the terms of the license agreement and click Next.
The next window is the Select the type of installation window, as shown in Figure 4-18 on page 58. You can install the IBM TotalStorage Productivity Center components using Typical installation or Custom installation. The Typical installation requires a minimum amount of input from the user who installs TotalStorage Productivity Center. You install the components in groups on the local computer by selecting Servers, Agents, Clients and Register with the agent manager. The following list gives the components installed by each group: Servers installs the database schema, Data server, and Device server. Agents installs the Data agent and Fabric agent. (You can only select it when you have previously installed Agent Manager.) Clients installs the TotalStorage Productivity Center GUI and CLI.
56
Register with the agent manager registers the Device server and Data server with the Agent Manager. (You can only select it when you have previously installed Agent Manager.) In the Custom installation, you can select the components required in your environment from the following list: Create database schema Data server GUI Data Agent (if you have Agent Manager installed) Device server CLI Fabric agent (if you have Agent Manager installed) Agent Manager Registration (if you have Agent Manager installed) You can only select Data Agent, Fabric agent, and Agent Manager Registration if you have installed Agent Manager previously. If you select Data Agent or Fabric agent, the Agent Manager Registration box is checked automatically. The two installation modes also handle passwords differently. The following list gives the passwords required for TPC installation: Database administrator user ID and password for Data server and Device server to connect to the database. Database user ID and password to create database schema. Host authentication password for Fabric agents to communicate with Device server. Host authentication password is also used for TPC rollup reporting. Data server Account Password for the Data server service. When you supply this password, the TPC installation program uses the password you supplied to create the Data server service account on Windows. Date server service runs under this service account. The WebSphere Application Server admin ID and Password is the user ID and password required by the Device server to communicate with embedded WebSphere. This is only used at installation time. In the Custom installation, you are allowed to specify passwords for each password request listed above. In the Typical installation, you can only specify one user ID and password. The installation program uses the same password for each password request listed above. In general, we recommend that for a production environment you use Custom installation for installing IBM TotalStorage Productivity Center. Custom installation allows you to see what components are being installed as well as set different passwords for user IDs.
57
In our installation, we select Custom installation, as shown In Figure 4-18, and click Next.
Select Create database schema, Data Server, Device server, GUI, and CLI, and click Next (Figure 4-19). In the default SSPC installation, there is no Agent Manager installed. Therefore, Data Agent and Fabric agent cannot be installed.
58
During the DB2 installation, you created the DB2 administrator name and password (Figure 4-8 on page 51). In Figure 4-20, type the DB2 administrator name and password you created and click Next.
In Figure 4-21, type the same DB2 administrator name and password and click Next. Note that the Create local database is checked and has a database name of TPCDB.
59
As shown in Figure 4-22, the installation program can pick up the Data server name and Device server name itself. Verify that the server names are correct. The default server port is 9549. This is assigned to the Data server and port 9550 is assigned to the Device server. Verify the ports are available on your server. If the ports are not available, you can specify a different server port, for example, 9569, which means the Device server is assigned the next higher port number, which is 9570 in this case. You need to enter an operating system group name to associate with the TPC superuser. This group must exist on your operating system before you install TPC. This group provides full access to the TPC product. You can assign a user ID to this group on your operating system and log in the TPC GUI using this user ID. By default, the Administrators group is automatically assigned to the TPC superuser. In our installation, we accept the default. Enter the password of your choice in Host authentication password and keep your password in a safe place. You will need this password when you deploy Fabric agents. This password is used by Fabric agents to communicate with the Device server. You will also need this password if you configure rollup reporting. The master TPC server uses this password to collect information from this server to generate rollup reports. Data server Account Password is used when the TPC installation program creates a user ID for Data server service account on Windows. During installation, TPC installation program creates a user account called TSRMsrv1. The password you supplied will be the password for TSRMsrv1. After the installation is finished, the Data server runs under the user account TSRMsrv1. Type a password of your choice. The WebSphere Application Server admin ID and password is the user ID and password required by the Device server to communicate with embedded WebSphere. This is only used at installation time. Type a user ID and password of your choice. Click Next to continue.
60
The next window is a summary of the parameters you have specified in the wizard. In Figure 4-23, verify the installation information and click Install.
In Figure 4-24, installation starts. Wait until the next window appears.
61
When TPC disk2 is required (Figure 4-25), provide the directory of TPC disk 2 and click OK.
When the TPC installation is finished (Figure 4-26), click Finish and reboot your server.
62
The Putty Setup Wizard Welcome window appears, as shown in Figure 4-28. Click Next.
63
By default, PuTTY is installed in the directory C:\Program Files\IBM\PuTTY. To choose a different directory, click Browse and select a different directory. After selecting the destination directory, click Next (Figure 4-29).
The PuTTY installation program creates shortcuts in the Start Menu folder. PuTTY is the default folder for the shortcuts. To choose a different folder, click Browse and select a different folder. In our installation, we accept the default. Click Next to continue, as shown in Figure 4-30.
64
In Figure 4-31, you can select additional tasks you want to perform. By default, only Associate .PPL files (PuTTY Private Key) with Pageant and PuTTYgen is selected. In our installation, we accept the default. Click Next to continue, as shown in Figure 4-31.
Verify the installation information and click Install, as shown in Figure 4-32.
In Figure 4-33 on page 66, click Finish button and the installation is finished.
65
66
The next window is the License Agreement, as shown in Figure 4-35. Select I accept the terms of the license agreement and click Next.
By default, SVC Console is installed in c:\Program Files\IBM\svcconsole. To choose a different directory, click Browse and select a directory.
67
After selecting the destination directory, click Next, as shown in Figure 4-36.
In Figure 4-37 on page 69, you are prompted for a PuTTY private key. The generation of the PuTTY private key is not part of the installation program. You can leave the installation program in its current state, go to PuTTY key generation program to generate PuTTY keys, and then go back to the installation program. To generate PuTTY keys, you need to perform the following steps on your server: 1. Start the PuTTY Key Generator by selecting Start Programs PuTTY PuTTYgen. 2. Click SSH2 RSA as the type of key to be generated. The default value for Number of bits in a generated key is 1024. Accept the default value. 3. Click Generate. 4. Move the cursor around the blank area of the Key section to generate a random number. 5. Click Save public key to save the public key. 6. Click Save private key to save the private key. When prompted to confirm that you want to create the key without a passphrase, click Yes. 7. Close the PuTTY Key Generator. After you generate the PuTTY keys, go back to the installation program. Click Browse to locate the PuTTY private key and click Next to continue.
68
In Figure 4-38 on page 70, you are prompted for the CIMOM communication protocols. The default configuration is to use both HTTP and HTTPS. The default port number for HTTP is 5988 and the default port number for HTTPS is 5989. Verify that the ports are available in your server. If the ports are not available, you can specify different ports.
69
In our installation, we accept the default. Click Next to continue, as shown in Figure 4-38.
Figure 4-39 lists the default port number for the embedded WebSphere Application Server. Verify the listed ports are available in your server. If the ports are not available, you can specify different ports. In our installation, we accept the default. Click Next in Figure 4-39.
70
Figure 4-41, shows that the installation is successful. Click Next, as shown in Figure 4-41.
71
After you click the Next button in Figure 4-41 on page 71, the postinstall.txt document is displayed, as shown in Figure 4-42. This document provides you the information about what to do next. Go through the document and close the window when you are finished reading it.
72
The installation tasks are finished. Your server has the same software installation as the IBM SSPC solution.
73
After you successfully log in, you have a navigation tree on the left side of your Web browser. Click Users, which shows that you only have one default user after your initial installation, which is superuser (see Figure 4-45). If you are serious about security and do not want to use the default login name and password, you can use the Add a User function to add users of your choice.
74
After you finish your user account setup, click Clusters. It shows you the clusters managed by this SVC Master Console (see Figure 4-46). At this moment, there are no SVC clusters because you have not added any SVC clusters into your SVC Master Console. Click the GO button next to the Add a Cluster function.
75
In Figure 4-47, type the IP address of your SVC cluster. It is important that you do not check Create (Initialize) Cluster function unless you really need to initialize your clusters. It will erase all your current cluster configuration. After you type the IP address, click OK to continue.
When the security alert in Figure 4-48 pops up, click Yes to accept it
In Figure 4-49 on page 77. type the login name and password of your SVC cluster and click OK.
76
In Figure 4-50, click Browse in the Add Key section to load the public key you created during the SVC Master Console installation. The details about public key generation is shown in Figure 4-37 on page 69.
77
After you locate the public key, type a unique ID of your choice (see Figure 4-51). This ID is going to be used in the SVC clusters to identify your SVC Master Console. In the Access Level, select administrator. Then click the Add Key button.
78
In Figure 4-52, it shows that the SVC cluster is successfully added to the SVC Master Console.
79
In Figure 4-53, select the SVC cluster you added and click the GO button next to the Launch the SAN Volume Controller Console function.
The SVC cluster management console appears, as shown in Figure 4-54 on page 81. It provides you with a navigation tree. You can navigate to the functions you want and change configurations based on your requirements.
80
Figure 4-55 shows an error message we received during our installation. By default, the installation wizard configures all the required Windows command paths.
81
SVC CIMOM is using the plink.exe program to send commands to SVC over the SSH protocol. As plink.exe is used without full path specification in the command, it has to be located in the system path. You have two options: 1. Add a path where plink.exe is installed to the system PATH variable. 2. Copy plink.exe to the directory that is already included in the system PATH variable, for example, C:\WINDOWS. For some reason in our installation, the path of PuTTY was not configured properly. If you run into the same error message, you may need to check your Windows command path and make sure the PuTTY directory is in your Windows command path. We copied plink.exe to C:\WINDOWS and the error was resolved.
82
Chapter 5.
83
Log in to TPC with a user ID that belongs to the Windows Administrators group, and in the Navigation Tree, select Administrative Services Configuration Role-to-Group Mappings. You can see the roles available in Figure 5-1 on page 85.
84
Operating system groups are used in role-based authorization. If you need to create a role, you just pick an operating system group and map it to a role listed in Table 5-1 on page 84. When a user logs into TPC, TPC verifies the group membership of the user. Based on the operating system group membership, TPC assign the user permissions. Figure 5-1 shows the configuration of Role-to-Group Mapping after the initial setup. The only group assigned is the Administrators group, which is assigned to the Superuser role in TPC. This is because we specified the Administrators group to have the Superuser role during TPC installation (see Figure 4-22 on page 60).This configuration gives every user in the Administrators group the Superuser role. One of the first tasks you should perform after installing IBM TotalStorage Productivity Center is to assign roles to individuals who will use the product. Because the Administrators group has already mapped to the Superuser role, what you need to create a TPC superuser ID is to create an OS user ID and add this user to the Administrators group. When the user authenticates with TPC, the users membership in Administrators group gives the user the TPC Superuser privilege. Based on the requirement of your environment, you may also need to create users with different permissions, such as Fabric Operator or Disk Administrator. You need to perform the following steps to create an user ID with a specific TPC role: 1. Create an operating system user ID. 2. Create an operating system group. 3. Add the user ID to the operating system group. 4. Map the group to a TPC role.
85
In the next window, right-click Users, and select New Users (Figure 5-3).
In Figure 5-4 on page 87, enter the required information (user ID, password, and description) and click Create to create a new Windows user account called diskadmin.
86
After you create a new user, the next step is to create a new group. In the Computer Management window, right-click Groups and select New Group (Figure 5-5).
87
In Figure 5-6, type Disk Administrators as the group name and add diskadmin to this group, and then click Create.
Type Disk Administrators as the group name for the Disk Administrator role and click OK to continue (Figure 5-8 on page 89).
88
In the TPC Role-to-Group Mappings window, you can see the Disk Administrators group is added to the Disk Administrator role. Click the disk icon in the menu bar to save the change (Figure 5-9), and then close the TPC GUI.
89
Log in to TPC using the newly defined user ID diskadmin. Now you see the TPC window shown in Figure 5-10. Compare this TPC window with the TPC window you have when you log in with the TPC Superuser role (Figure 5-1 on page 85). You can see Fabric Manager and Tape Manager functions are not available in the new window. This is because you are now a disk administrator and you are not allowed to manage Fabric or Tape. Also, you have fewer Configuration functions because you are now only a disk administrator instead of a TPC superuser. In summary, only disk administrator related functions are available in TPC when you log in using diskadmin.
90
91
If you enter an incorrect password, the user ID is locked, or the password in the DS8000 has expired, you will get the login error message HWNEM0104E, as shown in Figure 5-13 on page 93. You can set up the user IDs and the password in the DS8000. You can also setup the authority of each user in the DS8000. You will need one user and password to set up the Element Manager. The user ID and password for the Element Manager is stored in the TPC database. Any subsequent login from the Element Manager within TPC uses that one stored user ID and the privileges associated with it. For the duration of a TPC session, if you log in to the DS8000 through the Element Manager, and then close out the DS8000 GUI and log back in to the Element Manager with a different account on the DS8000, the privileges of the first account to log in are retained. You must close out the TPC session to disassociate the first account to log in from the DS8000 GUI. If your entry in the Element Manager is using an ID with administrator privileges in the DS8000, anyone logging in through the Element Manager will have administrator privileges for the duration of the TPC session. If you do not want anyone to log in with administrator rights, you have two options: You can remove the entry in the Element Manager, as shown in Figure 5-15 on page 95, or you can change the entry in the Element Manager to an user ID with only Monitor rights, as shown in Figure 5-16 on page 96.
92
If your user ID has only Monitor authority and you try to change the configuration, you will get an error message, as shown in Figure 5-14 on page 94.
93
Figure 5-14 User with Monitor authority tried to make changes in the DS8000 Element Manager
Figure 5-15 on page 95 shows the option to Remove Element Manager through the Select action drop-down menu.
94
Figure 5-16 on page 96 shows the option to Modify Element Manager through the Select action drop-down menu.
95
After selecting to Modify Element Manager, you are presented the window where you can modify the DS8000 Element Manager specifics (see Figure 5-17 on page 97).
96
Figure 5-17 Pop-up window to modify the Element Manager user entry
97
Firewall
C o rp o ra te In te rn a l N e tw o r k
SSPC
SSVCC SVVC
O h r S o r0 D tSe8 0 t0 0a g e D S800 D e v ic e s
98
Table 5-2 Best solution for you requirements Best solution TPC for Disk TPC for Data TPC for Fabric TPC Standard Edition When you need Disk performance management A way to measure and forecast storage growth A way to rationalize/classify storage data for ILM A tool to manage SAN configuration, availability, and performance Managing provisioning, zoning, configuration, monitoring, and problem determination A consolidated view of storage infrastructure, including Disk, SAN, and capacity A way to manage IBM and heterogeneous storage from a single tool Provisioning of storage (both IBM and heterogeneous)
License installation
TPC Basic Edition uses the same software package as the TPC Standard Edition. Because the software package has already installed on your system after the TPC Basic Edition is installed, when you upgrade your TPC Basic Edition, all you need is to order and install the required license to unlock the functions in the software. The license is installed using the same installation program you used to install the software. When you install TPC Basic Edition, the license for TPC Basic Edition is automatically installed. If you decide to upgrade later, you can use the following procedure to install the license key. The following procedure upgrades your SSPC to TPC for Disk. It is the same procedure if you upgrade to other TPC products, except you use the CD for other TPC products. 1. Run the installation program setup.exe using the CD of TPC for Disk. 2. When the Select a language window is displayed, select a language from the drop-down list and click OK (see Figure 4-16 on page 56). 3. When the Software License Agreement window is displayed. Read the terms of the license agreement. If you agree with the terms of the license agreement, select I accept the terms of the license agreement. Click Next (Figure 4-17 on page 56). 4. In Figure 5-19 on page 100, select Installation licenses. This option will allow you to install the license from the CD that has the TPC for Disk license. You do not have to install the TPC for Disk software since you already have the software packages installed on the SSPC or during the install of TPC Basic Edition.
99
5. In Figure 5-20, the message tells you that you have successfully installed the license. Click Next to continue. When the window disappears, reboot your computer.
When your server comes back from reboot, you have TPC for Disk functions available on your server. Figure 5-21 on page 101 shows the TPC Navigation Tree before TPC for Disk is installed. Figure 5-22 on page 101 shows the TPC Navigation Tree after TPC for Disk is installed. In Figure 5-22 on page 101, under IBM TotalStorage Productivity Center Disk Manager Reporting, you can see a new function, Storage Subsystem Performance, that has been added. TPC Basic Edition does not provide performance reporting.
100
101
We have shown the scenario of upgrading from TPC Basic Edition to TPC for Disk. For detailed information about the upgrade procedure, refer to 7.1, Upgrading SSPC on page 188.
Asset reports
In the Asset category, the following reports can be generated: Agents: To view information about Data agents and Device agents that are associated with subordinate servers in your environment. Computers: To view information about the hosts and computers that are monitored by subordinate servers in your environment.
102
Storage Subsystems: To view information about the storage subsystems that are monitored by subordinate servers in your environment. Disk/Volume Groups: To view information about the disk and volume groups that are monitored by subordinate servers in your environment. Disks: To view information about the disks that are monitored by subordinate servers in your environment. File Systems or Logical Volumes: To view information about the file systems or logical volumes that are monitored by subordinate servers in your environment. LUNs: To view information about the LUNs that are monitored by subordinate servers in your environment. Fabrics: To view information about the fabrics that are monitored by subordinate servers in your environment.
Capacity reports
In the Capacity category, the following reports can be generated: Disk Capacity: To view disk capacity information about the computers and storage subsystems that are monitored by subordinate servers in your environment. Filesystem Capacity: To view file system capacity information about the file systems that are monitored by subordinate servers in your environment. Filesystem Free Space: To view information about the available storage space on file systems that are monitored by subordinate servers in your environment. Filesystem Used Space: To view information about the used storage space on file systems that are monitored by subordinate servers in your environment.
103
SQL Server: To view storage capacity information for the SQL Server databases that are monitored by subordinate servers in your environment. UDB: To view storage capacity information for the UDB/DB2 databases that are monitored by subordinate servers in your environment. Refer to 7.3.4, Enterprise rollup reporting on page 215 for detailed information about creating rollup reports.
104
Chapter 6.
105
6.1 Overview
IBM TotalStorage Productivity Center Basic Edition (TPC BE) is a new edition of the TPC family that comes preinstalled on the System Storage Productivity Center (SSPC) server. The TPC family consists of different infrastructure management components that helps you manage, configure, and tune your data storage infrastructure. The new edition TPC BE provides most of the features that are available in TPC for Disk and TPC for Fabric components except from performance management and reporting. TPC BE provides the following functions: Device discovery Disk subsystem management Discovery Monitoring Provisioning (for example, volume creation and configuration) Fabric management Discovery Monitoring Provisioning (for example, zone control and planning) Tape management Discovery Monitoring Topology viewer and Storage Health Management Reporting TPC BE provides a basic storage resource management solution. It extends existing management of a single storage system, providing capabilities such as storage reporting, monitoring, policy-based management, and storage provisioning. TPC BE centralizes management of network storage devices that implement the SNIA Storage Management Interface Specification (SMI-S), which includes the IBM System Storage DS family and IBM System Storage SAN Volume Controller (SVC). It is designed to help reduce storage management complexity and cost and help improve data availability through open standards (SMI-S). TPC BE can be easily upgraded to TPC Standard Edition, which provides advanced features, such as performance reporting, file-level capacity utilization, best practices-based configuration management, and wizard driven end-to-end storage provisioning.
6.2 Architecture
The TPC BE consist of several key components. In this topic, we describe each of these components and show how they are related.
6.2.1 Services
The Data server and Device server run as services on the server they are installed on.
106
Data server
The Data server component is the control point for product scheduling functions, configuration, event information, reporting, and GUI support. It coordinates communication with agents and data collection from different agents that scan and gather information and populate the database with the results. The Data server is the primary contact point for GUI user interface functions. It also includes functions that schedule data collection and discovery for Device server. Data server has the following services: Server: The component that directs all the operations of Data Manager Scheduler: The process on the server that receives requests from the scheduler GUI: The process within the GUI that enables you to generate report requests and to create and run jobs Agent: The process on the server that receives requests from agents
Device server
The Device server component discovers storage subsystems and SAN fabrics, and gathers information about storage subsystems and SAN fabrics. The Device server controls the communication with agents and the data collection from agents that scan SAN fabrics. It is also responsible for the creation and monitoring of replication relationships between storage devices. Device server has the following main services: SAN planner: The component that provides SAN planning functions Fabric manager: A service that provides fabric management functions Disk manager: A service that provides storage subsystem management functions Disk monitor: A service that monitors the storage subsystems Element manager: A service that provides the ability to manage element managers Discovery: A service that provides discovery and probe functions Tape manager: A service that provides tape management functions
107
CIMOM
The Common Information Model Object Manager (CIMOM) provides a means by which a device can be managed by common building blocks rather than proprietary software. If a device is a CIMOM compliant, TPC can manage it, because TPC is also CIMOM compliant. Actually, the CIMOM is an interpreter between TPC and the device. There is an SNIA SMI-S interface using an XML transport for data and command interchange from TPC to the CIMOM. From the CIMOM to the device layer, there are proprietary interfaces provided by the device vendor to convert those commands and answers from the SNIA XML language to a language that device can understand: For storage, CIMOMs are needed for storage asset information, provisioning, alerting, and performance monitoring. For fabric, CIMOMs are only used for performance monitoring. For tape libraries, CIMOMs are used for asset and inventory information. The CIMOM can be a separate installation or can be imbedded in the device itself. After the CIMOM is installed and configured, TPC can communicate with a device.
6.2.3 Database
A single database instance serves as the repository for all TPC components. It is a single DB2 database instance.
108
Application
You can start the GUI: As an application on the SSPC server As an TPC Client on any workstation
109
To start the TPC BE GUI on the SSPC server, open the TPC BE GUI by selecting Start Programs IBM TotalStorage Productivity Center Productivity Center. You can also double-click the Productivity Center icon from desktop. After you start the GUI, you must enter the TPC user ID and password see (Figure 6-1). To start the TPC BE GUI from any workstation in your environment, you must install the TPC Client from TPC installation CDs, which are shipped with SSPC. To install it, run the TPC installer and choose to install GUI.
After entering a valid TPC user ID and password, the main TPC BE window is opened, as shown in Figure 6-2 on page 111.
110
111
TPC Basic Edition has the IBM V1.4.2 JRE in the source code. Your OEM server may not support the IBM V1.4.2 JRE. During install, you may encounter the error message shown in Figure 6-4. To fix this Java error, you have to download and install Java Version 1.4.2 from the Sun Microsystems Web site.
4. Click the link TPC GUI (Java Web Start). It starts downloading the TPC BE GUI (Figure 6-5).
5. After the TPC BE GUI is downloaded, you will be asked if you would like to have TPC GUI integrated into your desktop environment. You can double-click the TotalStorage Productivity Center GUI icon on your desktop and start it. You can start Java Web Start by selecting Start Programs IBM Java Web Start V1.4.2. It open Java Web Start Application Manager, where you can manage Java applications (Figure 6-6 on page 113).
112
113
The ability to switch between perspectives provides you with a single interface for quickly accessing different tools to monitor and manage your storage devices. You can switch perspectives using the Enterprise Management or Element Management button that appears in the TPC BE toolbar (Figure 6-7).
The following perspectives are currently available: Enterprise Management Element Management
Enterprise Management
This perspective contains the TPC BE user interface and all its related functions. You can use this perspective to perform such tasks as configuration, data collection, policy management, alerting, and reporting. The tree-based navigation system lets you see a hierarchical organization of the product features in the left pane while viewing detailed reports and informations in the right pane. The left pane is called the Navigation Tree, and the right pane is called the Content Pane. When you start TPC BE, the Enterprise Management perspective is opened and the Navigation Tree is expanded to show all the high level functions. You can drill down on an element in the tree by clicking it or by clicking the expand icon. When you right-click a node, a pop-up (context) menu displays, which lets you perform additional actions for the node. If the Navigation Tree gets too large, or if you want to return it to its original state, right-click the major nodes of the tree and select Collapse Branch or Expand Branch. If you right-click the IBM TotalStorage Productivity Center node and select Collapse Branch, the entire Navigation Tree collapses. Then, right-click the main IBM TotalStorage Productivity Center 114
IBM System Storage Productivity Center Deployment Guide
node and select Expand Branch to return the Navigation Tree to its original state, expanded only to show the main functions. The Content Pane opens on the right side of the main window. When you select a node in the Navigation Tree, the corresponding function window opens in the Content Pane. You can use the windows that open in the Content Pane to define and run the different functions (for example, monitoring jobs, alerts, and reports) available within TPC BE. The information shown on the pages in the Content Pane will vary, depending on the function you are working with.
Element Management
This perspective enables you to add, manage, and launch the Element Managers that are visible to TPC BE. For example, use DS8000 Element Managers to access the DS8000 Storage Manager for configuring and administering the associated DS8000 storage subsystems. Figure 6-8 shows the Element Management perspective.
115
There are different collection jobs for the type of information collected and from which types of elements the information is retrieved. TPC BE uses the following collection jobs:
Discovery jobs locate data sources and collects basic information about these data
sources. TPC BE discovery jobs run against CIMOMs and out of band Fabric agents. When a discovery job is run against a storage subsystem CIMOM, the job locates all storage subsystems behind this CIMOM and retrieves all information the CIMOM holds for these systems. The discovery job, however, does not cause the CIMOM to log in to the storage subsystems and retrieve more detailed information. When a discovery job is run against a fabric, the job retrieves all available information for the fabric if it is supported by the switches.
Probe jobs collect detailed statistics on all the assets of the managed infrastructure, such as computers, disk controllers, fabrics, storage subsystems, and LUNs. Probe jobs can also discover information about new or removed disks. Probe jobs can be directed against any element in the managed infrastructure.
Note: TPC BE probe jobs do not collect all the information of the managed infrastructure, such as file systems, because TPC BE does not require Agent Manager, and therefore Fabric agents and Data agents are not deployed.
CIMOM discovery
To run the CIMOM Discovery job, go to Navigation Tree pane and expand Administrative Services Discovery. Right click CIMOM and click Run now (Figure 6-9 on page 117).
116
In the Notice window, click OK, and the CIMOM Discovery job is started (Figure 6-10).
117
To monitor the CIMOM Discovery job, expand Administrative Services Discovery CIMOM, right-click CIMOM, and select Refresh Job List from the drop-down menu (Figure 6-11). Then expand the CIMOM node of the Navigation Tree.
The entry for CIMOM discovery job is named with the time stamp of its starting time. While it is running, it has a blue circle outline to the left of the job name (Figure 6-12). If the job has completed successfully, a green square is shown in front of the job name.
118
A red circle indicates that the job has competed with errors (Figure 6-13). TPC uses also a yellow triangle to indicate that a job has completed with warnings.
After the job completes, the discovered CIMOMs are listed in the CIMOM table in the Content pane. You can check it if you expand Administrative Services Data Sources and click CIMOM Agents (Figure 6-14).
The CIMOM connection status can have different values. If the status is different than Success, you can check the CIMOM details by clicking the magnifying glass to the left of the listing. The information is shown in the Content pane. You can enter additional CIMOM information, such as the user name and password used for logging into the CIMOM, and you can also test CIMOM connectivity by checking Test CIMOM connectivity before updating (Figure 6-15 on page 120). If you select a specific CIMOM in the table, you can perform the following administrative actions by clicking the buttons in the toolbar above the CIMOM list: Test CIMOM connection: Check to ensure that communication to the CIMOM is working properly. Remove CIMOM: Remove the CIMOM from the function tree and repository database. The data discovered by the CIMOM will not be removed from the repository. Show managed devices: Show devices that are managed by the CIMOM.
Chapter 6. TPC Basic Edition functions
119
120
To add the CIMOM, you must specify the CIMOM IP address and the port on which the CIMOM is listening. It also requires a valid user name and password for authentication. The Interoperability Namespace within the CIMOM allows you to access the CIM Interop Schema and determines how TPC interacts with the CIMOM when retrieving information. You can also check the box to test CIMOM connectivity before adding it and to ensure that communication is working properly. After you click Save, the information you have input about the CIMOM is added to TPC so that TPC can communicate with the CIMOM.
The next step is to define a user ID and password that will be used by the CIMOM for managing the storage devices. You can use the default admin user or create a new user. This would be done either by using the DS8000 element manager or the DSCLI mkuser command. You need to create a user with at least operator authority, which allows the creation and removal of arrays and ranks and, of course, includes the ability to create, delete, and manage logical volumes.
DSCIMCLI
The last step is configure CIMOM using the DSCIMCLI utility. The DSCIMCLI utility, which configures the CIMOM, is available from the DS CIM agent Web site as part of the DS CIM agent installation bundle, and also as a separate installation bundle. The DSCIMCLI can be installed on the SSPC server. Perform these steps to install DSCIMCLI utility: 1. Download and extract the dscimcli.zip file onto your hard drive. 2. The top-level directories of the extracted contents represent the different operating systems (AIX, LINUX_RHEL3, LINUX_SLES9, or W2003). Set your DSAGENT_HOME environment variable to one of those directories depending on your platform. 3. Add the bin directory of the DSAGENT_HOME to your PATH environment variable.
121
Use the DSCIMCLI mkdev command to define an internal connection to the HMC. The key function of this command is to feed the DS8000 user ID and password to the CIMOM Agent, which it will need to manage the DS8000 (very similar to a DSCLI user connecting to the HMC for DS8000 management). You can optionally specify the address of the redundant HMC. Example 6-1 contains the command syntax.
Example 6-1 Defining HMC to CIMOM
C:\Documents and Settings\Administrator>dscimcli -s https://9.12.6.17:6989 mkdev 9.12.6.17 -type ds -user admin -password st0rage Device succesfully added. After you defined the internal connection to the HMC, you can check its status as well as the CIMOM configuration and CIMOM users. Example 6-2 contains the command syntax.
Example 6-2 Checking CIMOM status
C:\Documents and Settings\Administrator>dscimcli lsdev -l -s 9.12.6.17:6989 Type IP IP2 Username Storage Image Status Code Level Min Codelevel ===== =============== =============== ========= ================ ========== ============== ============== DS 9.12.6.17 mary IBM.2107-75BALB1 successful 5.3.0.991 5.1.0.309 C:\Documents and Settings\Administrator>dscimcli lsuser Username ========= superuser C:\Documents and Settings\Administrator>dscimcli lsconfig Property Current Value After Restart ============== =============================== =============================== insecureport 5988 5988 secureport 5989 5989 certificate certname certname enablesecure true true enableinsecure true true
Note: Use of DSCIMCLI utility is described in the book DS Open Application Programming Interface Reference, GC35-0516 After the CIMOM is configured, you can add it manually or it will be discovered automatically as long as it is in the same subnet as the TPC BE server. Figure 6-18 on page 123 shows the discovered DS8000 CIMOM and managed DS8000 storage subsystem.
122
Note: The DS8000 CIMOM default user ID is superuser and password is passw0rd.
123
To configure the IBM TS3500 Tape Library to work with the CIMOM agent for tape, you must connect to the Tape Library Specialist Web interface, enable the CIMOM interface, and set up SNMP traps. To start the Tape Library Web interface, open a Web browser and enter the IP address of the Tape Library Specialist. It opens the login Web page, as shown in Figure 6-19.
124
Enter the user ID and password. Under The Work Items in the left pane, expand Access and click SMI-S Agent (see Figure 6-20).
125
In the right pane, click the Enable SMI-S Agent button to enable it (Figure 6-21).
The window in Figure 6-22 shows you successfully enabled the agent.
126
To set up the IP address of CIMOM agent for Tape, expand Access and click SNMP destination. Enter the IP address of CIMOM agent and click Apply (see Figure 6-23).
127
To set up the SNMP traps, expand Access and click SNMP Settings. This action opens the SNMP Settings in the right pane, where you enable and set up SNMP traps (see Figure 6-24).
Note: For information about the version of SNMP traps, the Trap Community Name, and the Request Community Name, refer to the IBM TotalStorage SMI-S Agent for Tape on Linux Systems Installation Guide, GC35-0512. For the details how to set up IBM TS3500 Tape Library, refer to the IBM System Storage TS3500 Tape Library Operator Guide, GA32-0560.
128
129
3. Submit the job by selecting File Save in the menu bar. You can monitor the job by expanding Administrative Services Discovery Out of Band Fabric and clicking the job run entry (Figure 6-26).
130
In the Content Pane, you can examine the log by clicking the magnifying glass next to the job status (Figure 6-27). While the job is running, you can check its status by selecting Administrative Services Discovery Out of Band Fabric. Select the job run entry and right-click Out of Band Fabric. From the menu, you can choose Refresh Job List to refresh the status of the Discovery job, or Update Job Status to check and see if the job has finished.
131
4. To check discovered out of band agents, select Administrative Services Data Sources and click Out of Band Fabric. The Content Pane shows all discovered out of band agents (see Figure 6-28).
5. By clicking the magnifying glass to the left of the listing, you see general information for the selected switch (Figure 6-29 on page 133).
132
Note: If you have a Brocade Fabric, make sure you have enabled Advanced Brocade Discovery in the Out of Band Fabric agents definition and provide the user name and password, so that TPC can discover zoning information from the fabric.
133
2. Clicking the Add button opens a dialog box (Figure 6-31 on page 135) where you enter the host name or IP address of the switch to add. If you are adding a Brocade switch, you can enable the Advanced Brocade Discovery and enter the user name and password for the switch so that TPC can discover zoning information from the fabric.
134
3. Click OK and you see the Out Of Band Fabric agents (Figure 6-32).
4. You can check the Out Of Band Fabric agent details by clicking the magnifying glass to the left of the listing.
135
6.3.8 Probe
Probe jobs collect detailed information about the managed infrastructure in your environment, such as storage subsystems, tape libraries, and fabrics. Probe jobs can be directed against any of these components:
Storage subsystem probes collect detailed information about the configuration of storage
subsystems. It collects the data about storage pools, storage volumes, FC ports, disks, and host to volume assignments. A probe job needs to be run before volumes can be created on a storage subsystem.
Library probes collect detailed information about the configuration of the tape library. They collect the data about the tape library drives, changers, cartridges slots, and I/O ports. A probe job need to be run before a tape library can be monitored. Fabric probe jobs collect fabric topology and zoning information and basic identification information about the device attached to the fabric.
Creating probes
You can create any number of probes to gather information about different storage resources at different times. To create a probe, expand IBM TotalStorage Productivity Center Monitoring, right-click Probes, and click Create Probe (Figure 6-33).
136
In the right Content pane, select the What to PROBE tab (Figure 6-34).
137
In this tab, select an available infrastructure element against which the probe job will run and click the >> button to add it to your selection. We define a Probe job for each of the elements (fabric, tape libraries, and storage) in the infrastructure. It is also possible to define one Probe job for all of the elements in your infrastructure. First, we define a Probe for Storage Subsystems. Expand Storage Subsystems and select All Storage Subsystems, because we want to include all Storage Subsystems in our Probe job. This also includes all Storage Subsystems added in the future (Figure 6-35).
In the When to Run and Alert tabs, we set the schedule and alert options (Figure 6-36 on page 139).
138
In the upper right corner of the Content pane, select Enabled. Select File Save and in Save as window, specify a name for the Probe job (Figure 6-37).
We named our probe job Storage Subsystems. Click OK and the Probe job is submitted (Figure 6-38).
139
We repeat the steps for other infrastructure elements (fabrics and tape libraries). You can see all the created Probe jobs under the IBM TotalStorage Productivity Center Monitoring Probes (Figure 6-39).
Their names are built from the user ID that we used to log in to TotalStorage Productivity Center and the name we specified when saving the job definition. By expanding the name of the probe job, you see its status (Figure 6-40).
The blue circles next to the entries for the job runs indicate that the jobs are still running. The red circles indicates that the job run has completed with errors and if there is a yellow triangle, it indicates that a job run has completed with warnings. We can examine the logs in the Content Pane to find the reasons for the errors or warnings.
140
141
To start Topology Viewer, expand, in the Navigation Tree, IBM TotalStorage Productivity Center and click Topology. It opens Overview level, which is the default view (Figure 6-41). Overview level shows a global, highly aggregated view of the entire storage environment.
Groups level L0 focuses on groups of a particular type. You can select each group by expanding IBM TotalStorage Productivity Center Topology. The default groups are:
Computers: All discovered computer groups in your storage environment. Fabrics: All fabric groups in your storage environment. A fabric is a network of entities that are attached through one or more switches. The Topology Viewer also displays Virtual SANs (VSANs) and Logical SANs (LSANs). Switches: All switches in your environment. Storage: All storage subsystems and tape libraries in your environment. Other: All entities that are discovered in your environment but that do not fit in either the computer, fabric, or storage classes.
142
The groups level is the default level upon launching the Topology Viewer by clicking either Computers, Fabrics, Switches, Storage, or Other under the Topology node. The groups level shows one or more groups of entities that correspond to the topology class that you selected. Figure 6-42 shows the Storage group level.
143
Group level L1 focuses on one selected group and its related entities (for example, a group of
storage). To open group level L1, select the group of entities that you want to open and double click it. It opens group level L1 (Figure 6-43).
144
Individual entities can be shown by expanding the group box (Figure 6-44). It also displays lines representing connections between entities or between entities and groups.
145
Detail level L2 level focuses on individual entities (for example, a single computer, switch,
subsystem, or tape library) and the paths to the associated logical and physical entities. This level shows details all the way to the port level (Figure 6-45).
The Topology Viewer depicts the relationships among resources (for example, the disks comprising a particular storage subsystem). Detailed, tabular information (for example, attributes of a disk) is also provided (Figure 6-46 on page 147). With all the information that the Topology Viewer provides, you can more quickly and easily monitor and troubleshoot your storage environment and perform critical storage-management tasks.
146
As more of your resources are discovered and displayed in the Topology Viewer, it is not possible to see all the discovered resources in a single topology window. To make it easier for you to find the resources you want to view, TPC provides a tool called the minimap. The minimap allows you to shift the focus of the Topology Viewer to different areas within a particular view. The minimap is a small window that is initially located in the upper-right corner of any topology view (Figure 6-47).
The minimap provides a miniature representation of the current topology view. Clicking the minimap displays a multidirectional cursor that allows you to move the focus of the current topology view in any direction. As you drag the cursor around the minimap, the topology view will move accordingly. This makes navigating around complex topologies much easier. The minimap uses the following colors to indicate the aggregated health status of groups: Green (normal): All entities in the group are operating normally. Yellow (warning): At least one entity is operating normally, and one or more entities have a health status of warning, critical, unknown, or missing.
147
Red (critical): The status of all entities is either critical or warning. Gray (unknown): None of the entities in the group has a known health status. Black (missing): All of the entities of the group are missing.
148
To start with volume/virtual disk creation, expand IBM TotalStorage Productivity Center Topology and select Storage. It opens storage groups in the Topology Viewer pane in the right. Expand the subsystems group with the storage subsystem that you want to manage (Figure 6-49).
149
Right-clicking the selected storage subsystem opens a pop-up menu, as shown in Figure 6-50.
150
Select Manage Storage Subsystems, which opens the Storage Subsystems pane (Figure 6-51).
151
You can also open the pane by selecting the storage subsystem in the Topology Viewer table and, from the drop-down menu, select Manage Storage Subsystems (Figure 6-52).
From the Storage Subsystems pane, you can create volumes or virtual volumes for the selected storage subsystem. We show you how to create a DS8000 volume. To create the volume, select a DS8000 storage subsystem in the table and click the Create Volume button. It opens the create volume wizard (Figure 6-53 on page 153), where you define the volume characteristics, such as RAID level, volume size, and volume name.
152
Click Next to continue. The next window, shown in Figure 6-54, shows a list with all the available ports that TPC has located. The information about the ports come from various sources (from the switches and from the host definitions in the subsystems) and they are not ordered by fabrics or any other criteria. Select the ports you want to assign the volumes to and then click Next to continue.
153
Figure 6-55 shows the available DS8000 ports to assign to host ports. Select the ports you want to assign and click Next.
If there is no zoning or no active zone set for the selected ports, TPC will recognize that fact (Figure 6-56). You can perform the zoning function later.
154
The next window is a summary of the information you have entered (Figure 6-57). Click Finish.
TPC now creates the volume creation job, as shown in Figure 6-58.
155
You can monitor the job and examine the logs by clicking the entries and drilling into the job logs (see Figure 6-59 and Figure 6-60). To view the job, select Disk Manager Monitoring Jobs in the Navigation Tree pane.
156
The green squares and the entries in the job logs indicate that the job has completed successfully (Figure 6-61).
157
158
Right-click the selected fabric and, in the pop-up menu, select Manage Zone Control (Figure 6-63).
159
The Fabrics pane opens, where you manage your zone configuration (Figure 6-64).
160
You can also open the pane by selecting the fabric in the Topology Viewer table and, from the drop-down menu, select Manage Zone Control (Figure 6-65).
161
In the Fabrics pane, pressing the Zone configuration button opens the zoning page where you can change the active zone configuration or inactive zone definitions (Figure 6-66).
Click the Change button to open the zone definition page (Figure 6-67 on page 163).
162
The zone definition page lists the zones and zone sets for the fabric in the tables and provides management tasks such as add, remove, edit zones, and zone set. Make the changes and activate the zone set by clicking the Update and Activate button. Clicking the Update only button commits the changes to the zoning configuration definition and updates the database.
163
If the Element Managers have not been defined, the Launch Element Manager button is inactive in the menu (see Figure 6-69) and you have to provide the Element Manager information.
164
165
To add the DS8000 Element Manager, click Select action and, in the drop-down menu, select Add Element Manager (Figure 6-73).
This will bring up a window where you enter the user name and password for the DS8000 Element Manager that you want to manage, the IP address of the DS8000, port used for communication and the protocol. You also enter the name you want to associated with the DS8000 in the main DS8000 Element Manager window in the Display Name field (see Figure 6-74 on page 167). Click OK to continue.
166
The next window contains a message that the Element Manager has been successfully added (see Figure 6-75).
Click OK to see the DS8000 Element Manager you just defined in the table (Figure 6-76).
Figure 6-76 Defined DS8000 Element Manager Chapter 6. TPC Basic Edition functions
167
From the Select action drop-down menu, you can add another DS8000 Element Manager and modify, remove, or test existing ones (see Figure 6-77).
Selecting the Modify Element Manager option opens the Configure Element Manager window (Figure 6-74 on page 167), where you can change the user name, password, or IP address of the DS8000 Element Manager. The Add CIMOM Connection option allows you to manually associate a CIMOM with an Element Manager. The CIMOM that you associate with an Element Manager manages the same storage subsystem as that Element Manager. Use the Add CIMOM Connection window to define information about the CIMOM (Figure 6-78). Note: The DS8000 CIMOM can be also added manually or by a Discovery job within TPC when the CIMOM is in the same subnet as the TPC server.
Figure 6-78 Adding DS8000 CIMOM using the Configure Agent window
168
The ESS and SVC storage subsystems Element Managers open in a Web browser (Figure 6-80 and Figure 6-81 on page 170).
169
The DS8000 storage subsystems Element Manager open in the Element Management perspective (Figure 6-82).
170
The Element Management perspective is opened (see Figure 6-84). You can start the DS8000 Element Manager by clicking the link in the Name column, or selecting the name of the DS8000 Element Manager from the Select a view drop-down menu.
171
172
In the Topology Viewer pane, expand the Subsystems group and select the storage subsystem whose Element Manager you want to launch. Right-click it to open a pop-up menu and select Launch Element Manager (Figure 6-86).
173
Another way of launching Element Managers from the Topology Viewer is from the Subsystem table. Expand IBM TotalStorage Productivity Center Topology Storage and select the storage subsystem in the table whose Element Manager you want to launch, and from the Action drop-down menu, select Launch Element Manager (Figure 6-87).
174
175
Expand the Switches group in the Topology Viewer and select the switch (Figure 6-89).
To set the Element Manager for the switch, right-click the switch in the Topology Viewer and click Launch Detail Panel (Figure 6-90 on page 177).
176
In the panel, click the Set button, and in the Edit Element Manager window, enter the URL of the Element Manager or the fully qualified name of the executable file (see Figure 6-91).
177
Another way of launching Element Managers from the Topology Viewer is from the Subsystem table. Select the switch in the table that you want to launch the Element Manager from and, from the Action drop-down menu, select Launch Element Manager (Figure 6-93 on page 179).
178
179
The Tape Library Element Manager opens in a Web browser (Figure 6-95).
180
To launch Element Managers from the Topology Viewer, expand IBM TotalStorage Productivity Center Topology Storage (Figure 6-96).
181
In the Topology Viewer pane, expand the Tape Libraries group and select the tape library whose Element Manager you want to launch. Right-click it to open the pop-up menu and select Launch Element Manager (Figure 6-97).
182
As the external tools make use of the Element Manager code to launch external tools, and as they use the same configuration facility used for Element Managers, you can also add different Element Managers to the external tools, such as storage subsystems, tape library, or switches.
183
To add an external tool manually, go to the TPC Navigation Tree and expand IBM TotalStorage Productivity Center. Right-click External Tools and select Add Tool (Figure 6-100).
The Add External Tool window opens. Enter the external tool definitions (Figure 6-101).
You can add different Element Managers (Figure 6-102 on page 185) and start it by expanding IBM TotalStorage Productivity Center External Tools.
184
Right click the tool you want to launch and click Launch Tool to open the tool in Web browser (Figure 6-103).
185
186
Chapter 7.
187
188
To upgrade the TPC BE, start the installation program from the CD/DVD that has the licence you want to upgrade to. After accepting the license agreement, you are asked to select the installation, as shown in Figure 7-1. Select Installation licenses and click Next to continue.
189
The licenses are successfully installed when the window shown in Figure 7-2 appears. Click Next and exit the installer.
To activate the licenses, you must stop the TPC GUI (exit the TPC GUI application) and stop the TPC services. Stop Device server and then Data server (refer to Figure 7-3 and Figure 7-4 on page 191).
190
Start the services in reverse order, that is, first Data server and then Device server (refer to Figure 7-5 and Figure 7-6 on page 192).
191
Start the TPC GUI and TPC BE is successfully upgraded with the new components.
192
The Agent Manager installer expects to use the default JVM and SSPC does not have one. The JVM needs to be invoked from a command-line prompt and pointed to the TPC JVM. The command is: setupwin32 -is:javahome c\ProgramFiles\IBM\TPC\jre The Agent Manager installer opens the window where you choose the run time container for Agent Manager (Figure 7-7). Select the embedded version of the IBM WebSphere Application Server delivered with the Agent Manager. Click Next to continue. Note: TPC only supports an Agent Manager configured to run with the embedded version of the IBM WebSphere Application Server.
193
In the next window, specify the directory where Agent Manager will be installed (Figure 7-8). We accepted the default. Click Next to continue.
In the next window, specify the Agent Manager Registry database. Select the first option to use DB2 on the SSPC server (Figure 7-9 on page 195). Click Next to continue. Note: To ensure ease of installation, maintenance, and support, TPC only supports an Agent Manager configured to run a local DB2 database server.
194
In the next window, select a database software directory and database name for the Agent Manager database (Figure 7-10). Accept the defaults and click Next to continue.
Figure 7-10 Agent Manager database installation information Chapter 7. Upgrading SSPC and using additional functions
195
The Database User Information window opens (Figure 7-11). Specify the DB2 administrators user name and password. The DB2 on the SSPC is installed using the defaults of db2admin and passw0rd. Click Next to continue.
Figure 7-12 on page 197 shows the window where you specify the WebSphere Application Server connection information. Enter the information and click Next to continue. If you specify a host name, use the fully qualified host name. This value is used for the URLs for all Agent Manager services. We recommend that you use the fully qualified host name rather than an IP address. If you do not use the fully qualified host name, you will likely have problems with the agents connecting to the Agent Manager.
196
If you do not specify a fully qualified host name for the Agent Manager host, you will be presented a window similar to Figure 7-13. If you have specified an IP address or a short host name, the window contains the reasons why the fully qualified host name is preferred. Click Next to accept the specified value or click Back to change it.
197
The next window (Figure 7-14) shows you the WebSphere Application Server connection information. Accept the defaults and click Next.
The Security Certificates window (Figure 7-15) appears. You should choose to generate unique certificates for a secure environment. Click Next to continue.
The next window (Figure 7-16 on page 199) is the Define the Certificate Authority window. You should specify a password for the Security Certificates and record it. Click Next to continue.
198
The Set Passwords window gives you the option to specify the Agent Manager password and Agent Registration password (Figure 7-17 on page 200). Make sure you record these passwords. After entering the passwords, click Next to continue. Important: Agent Manager password is the resource manager registration password. This password is used to register the Data server or Device server with the Agent Manager. The default user name/password is manager/password, which cannot be changed here.
Agent Registration password is the password used to register the common agents (Fabric agent and Data agent). You must supply this password when you install the agents.
199
The summary window is displayed (Figure 7-18). Review the information. If you want to change any settings, click Back and return to the window where you set the value. When you are satisfied with the changes, click Next to continue.
An installation progress window (Figure 7-19 on page 201) displays the installation progress for IBM WebSphere Application Server. Wait for the installation to complete and click Next.
200
After IBM WebSphere Application Server has been installed and configured, you will see the summary information window for Agent Manager. This window indicates where Agent Manager will be installed and the size of the program. Review the information and click Next (Figure 7-20).
201
Several installation progress windows are displayed for the Agent Manager (Figure 7-21).
After the installation is complete, the Start the AgentManager Application Server window is displayed (Figure 7-22).
Select Yes, start AgentManager now and click Next to continue. The next window indicates that the WebSphere Application Server is starting the Agent Manager (Figure 7-23 on page 203).
202
When the Agent Manager is started, the Summary of Installation and Configuration Results window is displayed (Figure 7-24). This window indicates that the Agent Manager is successfully installed with all of its components.
203
Review the window and click Next. It opens the last installation panel with the Summary Information (Figure 7-25), which shows that the installation is complete and the Agent Manager application server has been started. Click Finish to exit the installation.
Verify install
After the installation wizard completes, we run the healthcheck.bat command to verify that the Agent Manager is running. This command is located in c:/Program Files/IBM/AgentManager/toolkit/bin. You must specify the Agent Registration password that you specified in Figure 7-17 on page 200. Example 7-1 shows the output of the command. Note the Health Check passed information at the bottom of the output. For more information about the healthcheck command, see the README file also located in the toolkit directory.
Example 7-1 HealthCheck command output
C:\Program Files\IBM\AgentManager\toolkit\bin>healthcheck -registrationPw passw0rd 1 file(s) copied. Tool Launcher is trying to instantiate Command line tool com.tivoli.cas.manager.tools.HealthCheck ... Command Line Tool com.tivoli.cas.manager.tools.HealthCheck succesfully instantiatied. Nov 16, 2007 5:15:06 PM EST Arguments passed to Command Line Tool: -HOST localhost -registrationPw passw0rd Nov 16, 2007 5:15:07 PM EST Initializing configuration with file:C:\Program Files\IBM\AgentManager\toolkit\bin\config\endpoint.properties Nov 16, 2007 5:15:07 PM com.tivoli.agentmgr.credentialmgr.ARSPKIClient getProxyConfiguration SEVERE: CTGEM0016E The ARS.port.public parameter cannot be NULL. Nov 16, 2007 5:15:07 PM com.tivoli.agentmgr.util.security.CRLTrustManager getCRL SEVERE: BTC1048E Nov 16, 2007 5:15:07 PM com.tivoli.agentmgr.client.proxy.WSDLClient$AddressCacheItem tryConnect INFO: NOTE ==>Connected to host=localhost on port=9511 Nov 16, 2007 5:15:07 PM com.tivoli.agentmgr.client.proxy.WSDLClient$AddressCacheItem directConnect INFO: Directly connected Nov 16, 2007 5:15:07 PM com.tivoli.agentmgr.credentialmgr.ARSPKIClient getProxyConfiguration SEVERE: CTGEM0016E The ARS.port.public parameter cannot be NULL. Nov 16, 2007 5:15:07 PM com.tivoli.agentmgr.util.security.CRLTrustManager getCRL SEVERE: BTC1048E Agent Manager Name: ibm-cdm:///CDM-ManagementSoftwareSystem/TivoliGUID=B05F0EE180E811DC8004001641EDB5FA,InstallPath=file%3A%2F%2F%2FC%3A% 2FProgram%20F iles%2FIBM%2FAgentManager,Feature=CTGEM Registration.domain = DomainName CA.keyRing.name = certs/CARootKeyRing.jks CA.Certificate.Root.Alias = rootcert
204
CA.Key.Root.Alias = rootkey CA.CRL.TimeToLive = 24 CA.CRL.filename = certs/CertificateRevocationList Registration.Agent.Reregistration.Policy = Any Registration.Agent.Certificate.Duration = 365 Registration.Manager.Certificate.Duration = 3600 CA.Certificate.graceTime = 1380 Config.Server.Host = SSPCPOK Config.Server.Port = 9512 Config.URI = /AgentMgr/ConfigurationUpdate CertManagement.Host = SSPCPOK CertManagement.Renewal.Port = 9512 CertManagement.Renewal.URI = /AgentMgr/CertificateRenewal CertManagement.CRL.Port = 9513 CertManagement.CRL.URI = /AgentMgr/CRLRequest CertManagement.Revoke.Port = 9512 CertManagement.Revoke.URI = false AgentQuery.Host = SSPCPOK AgentQuery.Port = 9512 AgentQuery.URI = /AgentMgr/AgentQuery CommonAgentQuery.URI = /AgentMgr/CommonAgentQuery AgentConfiguration.Host = SSPCPOK AgentConfiguration.Port = 9512 AgentConfiguration.URI = /AgentMgr/AgentConfiguration AgentManagerQuery.Host = SSPCPOK AgentManagerQuery.Port = 9511 AgentManagerQuery.URI = /AgentMgr/AgentManagerQuery Registration.Host = SSPCPOK Registration.Port = 9511 Registration.URI = /AgentMgr/Registration Status.timeToLive = 0 ARS.directory = C:/Program Files/IBM/AgentManager ARS.port.base = 9511 ARS.port.secure = 9512 ARS.port.public = 9513 ARS.URI.root = /AgentMgr ARS.security.enabled = true Status.Authorization.Required = true Access.restriction.revocation = true Access.restriction.Configuration = true Query.Agent.Max.Return = -1 Query.Database.Type = db2 ARS.version = 1.3.2.21 Key.Algorithm.Name = RSA Config.Listener.Manager = com.tivoli.agentmgr.spi.providers.makeAgentRegistryUpdate, com.tivoli.agentmgr.cert.AgentStatusChangeLis tener Config.Listener.Agent = com.tivoli.agentmgr.spi.providers.makeAgentRegistryUpdate Registration.Listeners.Manager.Request = com.tivoli.agentmgr.registration.AuthorizationValidator, com.tivoli.agentmgr.registration.AuthorizationT estOnly, com.tivoli.agentmgr.registration.AgentReregistrationTest Registration.Listeners.Manager.Issue = com.tivoli.agentmgr.registration.StoreCertificateListener Registration.Listeners.Agent.Request = com.tivoli.agentmgr.registration.SimplePWRequestValidator, com.tivoli.agentmgr.registration.Authorizatio nTestOnly, com.tivoli.agentmgr.registration.AgentReregistrationTest Registration.Listeners.Agent.Issue = com.tivoli.agentmgr.registration.StoreCertificateListener Nov 16, 2007 5:15:07 PM EST Health Check passed. Nov 16, 2007 5:15:07 PM EST Command Line Tool execution successful.
7.2.2 Device server and Data server registration with the Agent Manager
The Agent Manager is the central network element that, together with the distributed Agents, builds an infrastructure that is used by other applications to deploy and manage an agent environment. Each application uses a Resource Manager (Data server and Device server) to integrate into this environment.
205
Before activating Agent Manager and deploying agents, Device server and Data server must register with the Agent Manager. To register the Device server and Data server with the Agent Manager, follow these steps: Important: Make sure that this is the Agent Manger that you want to register. Once you register it with the Device server and Data server, you cannot unregister it. The only way to unregister it is to uninstall TPC. 1. Expand Administrative Services Configuration and select Agent Manager Registration in the Navigation Tree. Agent Manager Registration opens in the right pane (Figure 7-26).
2. Click the Agent Manager Registration button. The Agent Manager Registration window opens (Figure 7-27 on page 207).
206
Enter the host name for the Agent Manager. If you specify a host name, use the fully qualified host name. We recommend that you use the fully qualified host name rather than an IP address. Leave the default ports. Port 9513 is the public port used for updates and port 9511 is the secured port used for registration. Enter the user ID and password used to register the Data server and Device server with the Agent Manager. Note: The default user ID used to register Data server and Device server is manager with the default password password. Enter the common agent password, which is used to register the common agents with the Agent Manager. Note: The agent registration password was specified when you installed the Agent Manager (Figure 7-17).
207
3. Click OK after you enter all the information. The Agent Manager Registration window shows the registered Agent Manager and successful registration (Figure 7-28).
Data agents collect information from the server on which they are installed. Asset information,
file and file system attributes, and any other information needed from the computer system is gathered. Data agents can also gather information about database managers installed on the server. You can create pings, probes, and scans to run against the servers that have Data agents installed.
Fabric agents use scanners to collect information. The scanners are written in O/S native
code, and communicate through the HBA to collect fabric topology information, port state information, and zoning information. They also can identify other SAN attached devices (if they are in the same zone). Using O/S system calls, they collect information about the system on which they are installed. Fabric agents are discovered during the agent install process, and do not need to be discovered separately; it is not possible to do so.
208
Local installation means that you must be logged on to the computer on which you want to install the agent code. You can install the Data agent and the Fabric agent in any order and you can install them both at one time. In any case, the TPC Installer will check if there is a Tivoli Common Agent already installed. If not, TPC installs this component.
You can perform the local installation process either interactively using a GUI or in unattended (silent) mode. This is useful in cases where you have to script the installation or where you do not have access to the GUI (for example, telnet access only). Local agent installation might be practical for a limited number of computers, but becomes rather elaborate and time-consuming as the number of managed computers grows.
Remote installation is the process of pushing the agent code from a central computer over
the network to any number of remote computers on which you would like to install the agents. The TPC Installer pushes the agent code to the target computers concurrently, so the software can be installed onto a large number of remote computers at one time. The supported operating systems for the target computers are Windows, UNIX, and LINUX. In a remote installation, the Tivoli Common Agent is only installed with the Data Agent. It has to be already present when you attempt to do a remote installation of the Fabric agent. Consequently, you always must install the Data Agent first when performing remote installations. However, you can also choose to install the Data Agent and the Fabric agent together. In this case, the TPC Installer manages the proper sequence. The remote installation of the Data Agent and the Fabric agent has to be performed from the server where the TPC Server is installed and running. A remote agent installation is always interactive. Note: Installation of Data agents and Fabric agents is described in detail in IBM TotalStorage Productivity Center Installation and Configuration Guide Version 3 Release 3.1, GC32-1774.
209
210
Volume Planner
The Volume Planner was formerly known as the Volume Performance Advisor (VPA) in previous versions of TPC. It plans and selects appropriate storage controllers, storage pools, and storage volumes (when using unassigned volumes) that satisfy the users inputs. It allows you to select controller type preferences, whether storage requests can be satisfied by multiple controller types, and RAID levels. The Volume Planner uses the current performance utilization of storage resources to determine whether a new volume should be allocated on a particular pool in a particular storage controller, so it is important to have a representative collection of performance data in your TPC DB2 repository. If multiple storage pools from different controllers can potentially satisfy your provisioning request, then the Volume Planner will use the rated utilization of the pools (the sum of the previous provisioning performance requirements, which might be greater than the current utilization) to break the ties and select a candidate storage pool. Note: Before using the Volume Planner to allocate storage based on performance characteristics, a Performance Monitor job must be run on the target subsystem. The more performance data in your TPC database, the better the recommendation by the Volume Planner.
211
Path Planner
The Path Planner allows the setup of multipath options. The Path Planner enables system administrators and SAN administrators to plan and implement storage provisioning for hosts and storage subsystems with multipath support in fabrics managed by TPC. Planning the paths between the host(s) and storage controller requires designing paths between hosts and storage subsystems that will be implemented through zones in the fabric. Note: IBM Subsystem Device Driver (SDD) must be installed on a host in order to invoke the Path Planner. The Path Planner is used for specifying multiple paths options between selected hosts and storage subsystems. Path Planner assists the administrator in the multipath tuning process through the selection of these policies: The Multipath Option specifies how the driver uses the paths between the host and the storage subsystem. The options are: Load Balancing sends Input/Output on all paths. Round Robin sends Input/Output on one path until a time interval expires (set in an SDD setting at the host) or stops to use another path. Fail-Over sends Input/Output on one path until a failure occurs and fails over (switches) to another path. The Specify number of paths option specifies the number of paths between each host and the storage subsystem. Use fully redundant paths. The Path Planner will check for redundant fabrics between each host and storage subsystem and create paths in each fabric. This requires at least two fabrics. Workload profiles provide the Path Planner with estimates of the required I/O traffic. These estimates are used to determine the number of paths required from each host to the storage subsystem and select the multipath driver path utilization. The number of paths and the driver multipath mode can be adjusted by the performance requirements specified through the selection of a workload profile. The Path Planner does not directly interact with the Zone Planner. It provides the path information that the Zone Planner uses. Each path is represented by a host port WWPN, target port WWPN, and a Volume ID for the volume on the target that is mapped to the host port. These paths are created when the Zone Planner is implemented.
212
Zone Planner
The Zone Planner allows the user to implement automatic zoning between ports on the selected hosts and subsystems in a fabric. All zoning is based on WWPNs. The Zone Planner will plan zoning configuration for new storage that is provisioned for use by a host. For example, it can be used when a new storage volume is created and assigned to a host. It can also be used with a volume that has already been created and is assigned to a host needing more storage. In these cases, the Path Planner and Volume Planner determine which host and storage need to be zoned together, providing the Zone Planner the exact set of ports which need to be zoned together. The Zone Planner then uses the zoning inputs for the planning. If the Volume and Path Planners are not used, the user may select the host and storage ports and then invoke the Zone Planner. The Zone Planner expects a list of host port and storage port pairs as input. If the Path Planner has been invoked prior to the Zone Planner, its output is used as input to the Zone Planner. If the subsystem/host are within the same fabric and Zone Planner is not checked, then existing zones or zone sets are used. If Zone Planner is checked, this creates a new zone or zone set. Note: For the Zone Planner to create zones, the host and subsystem must be within the same fabric.
213
For the case where the host and subsystem reside in more than one of the same fabrics, you are given two options. The first option is to create identical zones in all of the fabrics. The second option is to select specific fabrics to create identical zones in. The guidance policies used for zone planning are as follows: One zone per host bus adapter (HBA) One zone per host One zone per host port Auto zone: Largest zone that satisfies the validation policies The validation policies used for zone planning are as follows: No two controllers of different types should be in the same zone. Maximum number of zone members in a zone = N. Maximum number of zones in a fabric = N, where N is specified by the user. Figure 7-32 gives an overview of the Zone Planner.
214
A possible scenario utilizing this feature is an application on a host that is running slow. The system administrator wants to discover what the health of the associated I/O path for that application is. The questions that he might have are: Are all components along that path healthy? Are there any component level performance problems that might be causing the slow application response? The system administrator may also want to discover whether the I/O paths for two applications (on separate host LUNs) are in conflict with each other. They could be sharing a common component (like switch). After viewing the I/O paths for these two applications, he makes the required zoning or connectivity change to alleviate the problem.
215
For the TPC Server rollup feature, all servers must be at TPC V3.3. TPC versions prior to V3.3 (for example, TPC V2.3 or TPC V3.1) will not support the TPC Server rollup function.
Integrating SSPC
To integrate your SSPC into your existing TPC environment, an existing TPC server functions as a Master TPC server. The Master TPC server collects data from subordinate TPC servers and you can create rollup reports from the Master Server. Your SSPC server should function as a subordinate TPC server, providing data to the Master TPC server. Note: The ability to act as a Master Server and generate rollup reports is a function of TPC Standard Edition. The Master TPC server is required to use TPC Standard Edition. Rollup reports are generated through the TPC Navigation Tree. You can generate four categories of rollup reports: Asset: To view detailed statistics about agents, computers, storage subsystems, disk and volume groups, disks, file systems, logical volumes, LUNs, and fabrics that are monitored by subordinate servers. Database Asset: To view detailed statistics that have been collected by subordinate servers about the RDBMSs in your environment, including Oracle, SQL Server, Sybase, and UDB/DB2. Capacity: To view storage metrics related to the disk capacity, file system capacity, file system used space, and file system free space gathered by the subordinate servers in your environment.
216
Database Capacity: To view storage capacity, used space, and free space at the computer, computer group, database, instance, and TPC server level for RDBMSs that are monitored by subordinate servers. Note: To generate a full report of your environment, you need to deploy a Data agent and a Fabric agent on each server (that is fibre attached) that you want to manage. If a server does not have agents installed, the information for that server will be omitted from the rollup report you generate.
Asset reports
In the Asset category, the following reports can be generated: Agents: To view information about Data agents and Device agents that are associated with subordinate servers in your environment. Computers: To view information about the hosts and computers that are monitored by subordinate servers in your environment. Storage Subsystems: To view information about the storage subsystems that are monitored by subordinate servers in your environment. Disk/Volume Groups: To view information about the disk and volume groups that are monitored by subordinate servers in your environment. Disks: To view information about the disks that are monitored by subordinate servers in your environment. File Systems or Logical Volumes: To view information about the file systems or logical volumes that are monitored by subordinate servers in your environment. LUNs: To view information about the LUNs that are monitored by subordinate servers in your environment. Fabrics: To view information about the fabrics that are monitored by subordinate servers in your environment.
Capacity reports
In the Capacity category, the following reports can be generated: Disk Capacity: To view disk capacity information about the computers and storage subsystems that are monitored by subordinate servers in your environment. Filesystem Capacity: To view file system capacity information about the file systems that are monitored by subordinate servers in your environment.
217
Filesystem Free Space: To view information about the available storage space on file systems that are monitored by subordinate servers in your environment. Filesystem Used Space: To view information about the used storage space on file systems that are monitored by subordinate servers in your environment.
218
2. In the Add TPC Server window shown in Figure 7-36, type the required information for the subordinate TPC server. If you have installed the TPC V3.3.1 code, the Host Device server Port is the device server port you created in Figure 4-22 on page 60. The Host Authentication Password is the password you created in Figure 4-22 on page 60. Click Save after you type in the required information. If you selected the typical installation when you installed your TPC server software package, you were only asked for the user name and password once. This password will be both the DB2 administrator password and Host authentication password. You will use the same password when you log in to TPC as well when you are asked for the Host Authentication Password.
3. Click the Save button, and the Master TPC server tests the connection with the subordinate TPC server. If the testing is successful, the Master TPC server adds the subordinate TPC server to its TPC server list (Figure 7-37).
Figure 7-37 Subordinate TPC server is added to the TPC server list
219
4. Before generating a rollup report, you need to run discoveries, probes, and scans from the subordinate servers to gather information about their locally-monitored storage entities. Also, you need to run probes from the master server to gather information about its locally-monitored storage entities. Then you need to run TPC Server probes from the master server against the subordinate servers to collect their storage information for the rollup reports. To run TPC Server probes, select, in the Navigation Tree, IBM TotalStorage Productivity Center Monitoring TPC Server Probes and select Create TPC Server Probes (Figure 7-38).
220
5. In the Create TPC Server Probes window, select All TPC Servers and click >> (Figure 7-39).
221
6. After you click >>, All TPC Servers appears in the Current Selections pane. Click the When to Run tab (Figure 7-40).
7. To create a rollup report on a regular basis, you can schedule periodic probes in the When to Run window. In this example, we select Run Now to show the concept of a rollup report. After you select Run Now, click the disk icon on the menu bar to save the task (Figure 7-41 on page 223).
222
8. After you click the disk icon, a small window pops up asking for the name of the probe. Type the name of your choice and click OK (Figure 7-42).
9. The TPC Server Probe will be submitted. Click OK in the Notice window (Figure 7-43).
223
10.Go back to TPC Navigation Tree, where you can see a probe is running. Wait until the probe is finished, then you can generate a rollup report (Figure 7-44).
11.Figure 7-45 on page 225 shows the TPC Navigation Tree where selecting IBM TotalStorage Productivity Center Rollup Reports takes you to the different rollup reports you can generate.
224
225
226
Chapter 8.
227
Figure 8-2 is the main TPC BE window. You can launch Element Manager by pressing the Element Management button or by expanding Element Manager.
Figure 8-3 on page 229 shows the Element Manager window where you select the DS8000 for which you want to launch the GUI. Click the DS8000 that you want to configure.
228
229
Expand the arrow to the left of the Real-Time Manager. All the tasks are listed in Figure 8-5.
230
Figure 8-7 shows the bottom of the Extent Pool window. Clicking Select action selects the Create New Extent Pools... menu item.
Figure 8-7 Extent Pool bottom of window Chapter 8. DS8000 GUI under Element Manager
231
232
In Figure 8-9, choose, in the RAID Type drop-down menu, either a RAID 5 or RAID 10 configuration for the Extent Pool.
233
234
From the Type of Configuration drop-down menu, select Automatic, which lets the system provision ranks for the Extent Pool (see Figure 8-11).
235
In the DA Pair Usage drop-down menu (see Figure 8-12), select Spread among all pairs in the drop-down menu to allow the ranks to be spread among different Device Adapter (DA) pairs in the DS8000.
Figure 8-12 Select Spread of storage with Device Adapter pairs in the DS8000
236
The Number of extent pools drop-down menu shown in Figure 8-13 allows you select the kind of Extent Pools to create. Here we select Two extent pools (ease of management).
237
The next step is to select the ranks for these two Extent Pools. Figure 8-14 shows the available ranks. When you select the ranks, the bar graph to the right displays the available and the assigned ranks.
238
The Pool name prefix field shown in Figure 8-15 allows you to specify the name of the Extent Pool. The system automatically appends a number sequence to the name of the Extent Pool name starting with zero.
239
Figure 8-16 shows a final preview of the new Extent Pool to be created using the information provided in Figure 8-7 on page 231 through Figure 8-15 on page 239. By clicking Create All, the system will create the Extent Pools.
240
Figure 8-17 shows the progress and the result of Extent Pool creation.
241
Figure 8-18 shows, in the Extent pools window, the newly created Extent Pools named POOL_0 and POOL_1.
242
We can display the ranks to see what Extent Pool the ranks belong to, as shown in Figure 8-19.
243
You can download the rank information by clicking the Download spreadsheet button, as shown in Figure 8-20.
Figure 8-21 shows the Extent Pool and Rank relation. You will notice that by choosing Automatic, the system chooses the rank numbers sequentially. In this example, the first Extent Pool has ranks R9 to R12, and the second Extent Pool has ranks R13 to R16. R9 to R12 are (6+P+S) ranks, while R13 to R16 are (7+P) ranks, which have more capacity per rank. The two Extent Pools created have different capacities. In Figure 8-18 on page 242, you can see that Extent Pool POOL_0 has 3492 GB and Extent Pool POOL_1 has 4072 GB. If we want to have the same capacity in each Extent Pool, create one Extent Pool at a time and choose a balance of (6+P+S) and (7+P) ranks. Section 8.2.3, Make Extent Pools: manual action on page 250 describes the manual action that creates the Extent Pools.
244
245
From the Select Action drop-down menu, select Delete Pools, as shown in Figure 8-23.
246
Figure 8-24 shows the Delete Extent Pools window. The Volume IDs field shows NONE, as there are no volumes in the Extent Pools selected. Attention: Clicking Continue will commit the delete action, as shown in Figure 8-24.
Figure 8-24 Attention: Click Continue will commit the delete action
247
248
249
What if you try to delete an Extent Pool with volumes in it? Figure 8-27 is an example of deleting such a pool. Carefully read the warning message. If you click Continue, the Extent Pool and the volumes will be deleted, and the data in the volumes will be deleted.
250
251
In the Type of Configuration drop-down menu, select Manual, as shown in Figure 8-30.
252
In the Number of extent pools drop-down menu, select Single extent pool, as shown in Figure 8-31.
253
In the Create New Extent Pools window shown in Figure 8-32, select the ranks for this single Extent Pool and fill in the name of the Extent Pool prefix.
254
In the Server assignment drop-down menu, use the default server affinity, as shown in Figure 8-33. After all the information is entered, click OK to continue.
255
After verifying the required information, click Create All, as shown in Figure 8-34.
256
Figure 8-35 shows the progress and then the successful completion message.
257
Figure 8-36 shows the list of Extent Pools. Check the new Extent Pools just created.
258
Figure 8-37 shows the window where you select the Extent Pool to increase its capacity. Check the Extent Pool and then, under the Select Action drop-down menu, select Add Capacity to Pool.
259
Figure 8-38 shows the Type of Configuration menu, where you choose Automatic or Manual. Automatic will choose the next available rank and then add it to the pool. Manual will let you pick the rank. Here we chose Manual.
260
Choosing Manual will list the available ranks, as shown in Figure 8-39. Select the rank to be added to the Extent Pool.
261
Select the rank to be added to the Extent Pool, as shown in Figure 8-40. Click OK to continue.
Figure 8-41 on page 263 shows the validation window. Click Create All to perform the action.
262
Figure 8-42 through Figure 8-44 on page 264 show the progress and completion information.
Figure 8-42 Progress information Chapter 8. DS8000 GUI under Element Manager
263
264
265
Select the Extent Pool and, from the Select Action drop-down menu, select Remove Capacity from Pool, as shown in Figure 8-46.
266
267
Next, check one or more ranks to be removed, as shown in Figure 8-48. When you have checked the appropriate ranks, click Remove to continue.
Figure 8-49 on page 269 shows the validation window. Proceed with caution and validate that there are no volumes in the ranks. Click Continue to commit the delete action.
268
Figure 8-50 Progress message Chapter 8. DS8000 GUI under Element Manager
269
Once the capacity is removed, you will see the completion message, as shown in Figure 8-51.
270
In Figure 8-52, select the storage Image and the LCU. Under the Select Action drop-down menu, select Create.
271
Select the Extent Pool, as shown in Figure 8-53, and click Next to continue.
In the next window, define the base volume characteristics (see Figure 8-54 on page 273), select the volume type of mod 9, and the extent allocation method (whether you want rank striping or rotate extents). Here are the differences between the Rotate Volumes and Rotate Extents options: Rotate Logical Volumes: Each successive logical volume created is allocated on the next available rank in the extent pool. Extents allocated for a given logical volume are located on the selected rank. If the selected rank is full, or fills before the volume is fully provisioned, extent allocation proceeds to the next available rank until the volume is fully provisioned. Rotate Extents: Extents allocated to a logical volume are successively rotated through the ranks within an extent pool. Ranks that are full are skipped. Rotate Logical Volumes Algorithm (earlier versions): The volume is created before the current algorithms are implemented. These algorithms are variants of the Rotate Logical Volumes algorithm in that they attempt to localize the extents of a logical volume on a single rank. Logical volumes with this extent allocation method are treated as though they were created with the rotate logical volumes algorithm with respect to any operations that cause the allocation additional extents. This value is changed to the 1 if the volume is relocated such that its extents are reallocated.
272
Next, select the LCU, as shown in Figure 8-55, and click Next to continue.
273
Next, enter the number of volumes, starting addresses, and ascending or descending order. Click Next after entering the information to continue (see Figure 8-56).
Figure 8-56 Number of volumes to create, starting address, and Ascending or Descending order
Next, create the nicknames for the new volumes by specifying a prefix and suffix (see Figure 8-57 on page 275). The nickname is a description within the DS8000. It is not the VOLSER. The suffix number will be automatically incriminated. Click Next to continue.
274
275
Check the base volumes that need an alias, as shown in Figure 8-58.
276
Next, enter the starting address of the PAV, as shown in Figure 8-59. PAV usually starts from the 255 address of an LCU in descending order.
277
Next, enter the number of PAVs for a base volume, as shown in Figure 8-60. Here we enter three aliases for each base volume checked. The Add aliases button is in blue. You have to click it to add the aliases. It will then change to black. Click Next to continue.
Figure 8-60 Add the number of alias per base volume checked
278
Figure 8-61 shows the verification for creating the CKD volumes. Click Finish to create the base and alias volumes.
Figure 8-61 Click Finish to create the base and alias volumes
279
VOL SER
ID 0800 0801 0802 0803 08F4 08F5 08F6 08F7 08F8 08F9 08FA 08FB 08FC 08FD 08FE 08FF
Base/ Alias Base Base Base Base Alias Alias Alias Alias Alias Alias Alias Alias Alias Alias Alias Alias
280
Both a 3390-3 and 3390-9 can be expanded. If a 3390-3 is expanded past 3339 cylinders, the device type will be changed to a 3390-9. A 3390-9 can be expanded up to 65,520 cylinders. A SCSI LUN can be expanded up to the current supported size of 2,147,483,640 blocks.
281
The next step is to specify the new capacity, as shown in Figure 8-65. Click OK to continue.
You will see a window with considerations for volume expansion, as shown in Figure 8-66 on page 283. Click OK to continue.
282
After clicking OK, you will see the progress and completion message, as shown in Figure 8-67.
283
284
Check the volume that you want to expand, as shown in Figure 8-70. In the Select Action drop-down menu, select Increase capacity.
285
In Figure 8-71, you enter the new capacity of the LUN. In Open System, the largest capacity is 2 TB. You also have to make sure there is enough spare capacity in the Extent Pool for this expansion. The GUI lists the maximum size available in the pool.
You will see a window with considerations for volume expansion, as shown in Figure 8-72 on page 287. Click OK to continue.
286
After clicking OK, you will see the progress and completion message, as shown in Figure 8-73.
287
288
Related publications
The publications listed in this section are considered particularly suitable for a more detailed discussion of the topics covered in this book.
IBM Redbooks
For information about ordering these publications, see How to get Redbooks on page 289. Note that some of the documents referenced here may be available in softcopy only. TotalStorage Productivity Center V3.3 Update Guide, SG24-7490
Other publications
These publications are also relevant as further information sources: DS Open Application Programming Interface Reference, GC35-0516 IBM System Storage Productivity Center Introduction and Planning Guide, SC23-8824 IBM System Storage SAN Volume Controller Software Installation and Configuration Guide for Version 4.2.1, SC23-6628 IBM TotalStorage Productivity Center Users Guide Version 3 Release 3, GC32-1775
Online resources
These Web sites are also relevant as further information sources: IBM glossary http://www.ibm.com/ibm/terminology SSPC software updates http://www.ibm.com/systems/support/supportsite.wss/supportresources?brandind=50 00033&familyind=5356448&taskind=1 TPC server sizing Web site http://www-304.ibm.com/jct01004c/systems/support/storage/software/tpc/
289
290
Index
A
Administrator password 32 Agent Manager 78, 58, 107, 128 Agent registration password 199 Data agents 208 Data server registration 206 deploying agents 208 Fabric agents 208 HealthChack.bat 204 install 192 local agent installation 209 remote agent installation 209 WebSphere Application Server connection information 198 Agent Manager install 192 Agent Manager password 199 Agent Manager services 196 Agent Registration password 199 AIX server 21 antivirus 15 antivirus software 97 assign PAV alias 275 install 47 DB2 Host name change 40 DB2 install 47 DB2 user ID 196 db2admin user ID 47 DB2ADMNS group 47, 53 db2extsec command 41 db2start command 41 DB2USERS group 47, 53 Device server 8 discovery function 10 Discovery jobs 116 Disk Administrator role 88, 90 Disk Administrators group 89 DNS server addresses 34 DNS suffixes 34 DS8000 CIMOM DSCIMCLI utility 121 enabling 121 mkuser command 121 DS8000 Element Manager 165 modify 96 DS8000 Element Manager access 91 DS8000 GUI 2, 21, 227 Automatic function 232 create Extent Pools 240 create volume nicknames 274 Delete Pools 246 Download spreadsheet 244 Extent Pool and Rank relation 244 Extent Pool capacity 230, 244 Extent Pool delete 250 Extent Pool manual create 250 increase Extent Pool capacity 258 rank selection 238 Real-time manager 230 remove Extent Pool capacity 265 Rotate Extents 265 Type of configuration menu 260 DS8000 GUI access options 6 DS8000 GUI Dynamic Volume Expansion 281 DS8000 management 5 DS8000 maximum volume size 270 DS8000 password considerations 92 DS8000 Storage Manager 115, 165 DS8000 volume creation 152 assign ports 153 zone configuration 162 zone definition page 163 zoning 154 DSCIMCLI utility 121122 DVE open system LUN 284 Dynamic Volume Expansion 281
B
Basic Edition install 55 Brocade Fabric 133 build your own SSPC 19
C
CIM Interop Schema 121 CIMOM 108 CIMOM administrative actions 119 CIMOM agents 8, 116 CIMOM connection status 119 CIMOM manual add 120 Common Information Model 9 Computer name field 39 computer name MANNODE 32 create CKD volumes DS8000 GUI create CKD volumes 270 create Windows user 87
D
Data agents 208 data collection 116 Data Path Explorer 148, 214 Data server 7 database instance 108 DB2 administrator user ID 51
291
E
Element Management,TPC BE GUI Element Management 115 Element Manager 163 associate CIMOM 168 DS8000 launch 228 launching 21 Navigation Tree 170 Element Manager for DS8000 8 Element Managers launching 169 SVC and ESS 169 Enterprise Management 114 expired DS8000 password 91 Extent Pool Pool name 239 server affinity 255 External Tools 182
L
Library probes 136 license TPC capacity 18 license considerations 16 license files 188 license upgrade 99 Linux server 21
M
machine type 2805 2 MANNODE host name 32 messages HWNEM0104E 92 minimap 147 mkdev command 122 mkuser command 121
F
Fabric agents 11, 128, 208 in-band 108 Fabric agents, SSPC Fabric agents 8 fabric management 158 Fabric probe jobs 136 firewall considerations 98 fully qualified host name 196
N
NAS device information 11 Navigation Tree expand nodes 115 Topology Viewer 173 network security 98 Novell NDS tree information 11
O
Out of Band Fabric agents 9, 131, 134
G
generate PuTTY keys 68
P
Path Planner SDD 212 PAV 270, 275 performance upgrade kit 17 ping job 210 planning for SSPC 13 plink.exe program 82 probe 220 probe creation 136 probe job status 140 Probe jobs 116, 136 PuTTY 44, 62 PuTTY installation 63 PuTTY key generation program 68 PuTTY private key 68 PuTTY Windows command path 82
H
HealthCheck.bat 204 heartbeat 22 Host Authentication Password 219 Host Device server Port 219 host name change 37
I
IBM Passport Advantage 19 IBM V1.4.2 JRE 20, 112 initial setup 26 install DB2 47 IP address, SSPC setup IP address 34
J
Java Web based GUI 46 Java Web Start 111 JVM error 20, 112
R
Redbooks Web site 289 Contact us xi redundant SSPC 22 remote agent installation 209 Remove Element Manager option 94 role-based authorization 84 rollup report probe 220 rollup reporting 60, 215
K
key concepts 8
292
rollup reports TPC SE rollup reports 102, 216 types 102, 216 Rotate Extents 265, 272 Rotate Logical Volumes 272 Rotate Logical Volumes Algorithm 272
S
SAN Planner 211 Volume Planner 211 scan collection job 210 server sizing 19 Service Focal Point dialog 121 Service Location Protocol 10 SLP SA 10 SLP UA 10 SMI-S 9, 106 Software Maintenance 18 solution assurance review 19 SQL1012C error message 40 SQL1042C error message 37 SSH keys 44 SSPC architecture 6 backup and recovery 104 build your own 45 building your own SSPC 19 configuration information 14 console and keyboard 17 deployment 4 DS8000 management 5 dual configuration 22 heartbeat 22 host name change 37 initial setup 26 integrate existing environment 102 overview 2 performance upgrade kit 17 planning 13 pre-installed software 3 redundant 22 security considerations 84 software options 18 SVC master console 20 TPC Basic Edition code 16 upgrading 188 upgrading to SE 98 Windows 2003 Enterprise Edition 19 SSPC hardware 4 SSPC host name 32 SSPC Performance Upgrade Kit 188 SSPC redundancy 22 SSPC server software 6 SSPC server name 30 SSPC setup keyboard languages 29 host name in DB2 40
Licensing Modes 31 product license key information 30 Regional Options tab 28 TCP/IP settings 34 stop TPC services 41 Storage Pool Striping 270 storage subsystem Element Managers 164 storage subsystem probes 136 Subsystem Device Driver 212 superuser role 85 supported platforms 19 SVC postinstall.txt document 72 SVC clusters 44 connect to Master console 44, 73 SVC Console installation 66 IP address 44 SVC Console customization 62 SVC Console URL 73 SVC port number 69 SVC upgrade 192 switch data 132 Switch Element Manager 175
T
Tape Library CIMOM 123 enable SMI-S Agent 126 SNMP traps 128 Tape Manager 179 Topology Viewer 141 create volumes 152 Detail level L2 146 DS8000 volume creation 152 fabric management 158 Group level L1 144 Groups level L0 142 Manage Storage Subsystems 151 tabular information 146 zone configuration 162 TPC Agent Manager 57 Asset reports 102 Capacity reports 103 custom installation 57 Data server account password 60 Database Asset reports 103 default server port 60 Device server port 60 Host authentication password 60 password for install 57 typical installation 56 TPC Basic Edition 3, 1617 Agent Manager 7 components 7 Fabric agents 8 licensed by capacity 6 ordering 19 upgrade 3 Index
293
upgrade options 3 TPC BE architecture 106 CIMOM agents 116 data collection 116 Data server 107 Data Sources 107 DB2 user ID and password 196 Device server 107 External Tools 182 GUI 113 Java Web Start 111 overview 106 upgrading 188 upgrading to SE 188 TPC BE GUI Content Pane 114 DS8000 Element Storage Manager 115 Enterprise Management 114 Java Web Start 111 Navigation Tree 114 starting 110 TPC command-line interface 109 TPC database 7 TPC GUI 7, 46, 109 TPC license existing TPC license 19 TPC Limited Edition 4 TPC superuser 60 TPC superuser ID role 88 TSRMsrv1 user account 60
U
upgrade options 98
V
Volume Planner 211
W
WBEM initiative 9 WebSphere user ID 57 WebSphere Application Server connection 196 Windows Server 2003 Product Key 31 workgroup 35
Z
zone configuration 162 zone definition page 163 Zone Planner 213
294
Back cover