beautypg.com

5 storage service provisioning, 6 managing storage catalog entities – HP Matrix Operating Environment Software User Manual

Page 4

background image

5 Storage service provisioning......................................................................28

Provisioning a storage service..................................................................................................29
Manually assigning a volume to a storage service.......................................................................30
Viewing a storage service........................................................................................................30
Editing the configuration of a storage service.............................................................................31
Editing basic properties (metadata) of a storage service...............................................................31
Deactivating a storage service..................................................................................................31
Deleting a storage service........................................................................................................31

6 Managing storage catalog entities..............................................................33

Managing arrays....................................................................................................................33

Viewing and modifying array properties (Overview tab) .........................................................33
Viewing array storage pools (Storage Pools tab).....................................................................33
Viewing array volumes (Volumes tab)....................................................................................33
Viewing array ports (Ports tab).............................................................................................34
Viewing array host entries (Hosts tab)...................................................................................34
Viewing and modifying array capabilities settings (Capabilities tab).........................................34
Viewing and modifying array security settings (Security tab)....................................................34
Removing an array.............................................................................................................35

Managing storage pools.........................................................................................................35

Viewing and modifying storage pool properties (Overview tab)...............................................35
Viewing storage pool volumes (Volumes tab).........................................................................36
Viewing and modifying storage pool security settings (Security tab)..........................................36
Removing a storage pool....................................................................................................36

Managing volumes.................................................................................................................37

Viewing and modifying volumes settings (Overview tab) ........................................................37
Viewing volumes presentations (Presentations tab)..................................................................37
Viewing and modifying volumes security settings (Security tab) ................................................37
Removing a volume............................................................................................................38

Managing networks................................................................................................................38

Viewing and modifying network settings (Overview tab) .........................................................38
Viewing network endpoints (Endpoints tab)...........................................................................39
Viewing network zones (Zones tab)......................................................................................39
Viewing and modifying network capability settings (Capabilities tab).......................................40
Viewing and modifying network security settings (Security tab).................................................40
Removing a network...........................................................................................................41

Managing security..................................................................................................................41

Create security roles...........................................................................................................41
Grant privileges.................................................................................................................42
Create security groups........................................................................................................42
Grant permissions..............................................................................................................43
Managing roles.................................................................................................................43

Viewing and modifying role settings (Overview tab)...........................................................44
Viewing and modifying role privileges (Privileges tab)........................................................44
Viewing and modifying role users and groups (Users and Groups tab).................................44
Viewing and modifying role security settings (Security tab)..................................................45
Deleting a role..............................................................................................................45

Managing security groups...................................................................................................45

Viewing and modifying security group settings (Overview tab)............................................45
Viewing and modifying security group access control settings (Access Control tab).................46
Viewing security group objects (Objects tab).....................................................................46
Viewing security group effective permissions settings (Effective Permissions tab)......................46
Deleting a security group...............................................................................................47

Resynchronizing resources........................................................................................................47
Quarantining resources...........................................................................................................47

4

Contents