4 setting up information sources, 5 discovering volumes, 6 setting up authorities – HP XP P9000 Command View Advanced Edition Software User Manual
Page 4
4 Setting up information sources ........................................................... 53
About information sources .......................................................................................................... 53
Registering information sources ................................................................................................... 53
Registering information sources workflow ............................................................................... 54
Adding a Device Manager server ......................................................................................... 55
Adding an instance of HP StorageWorks P9000 for Business Continuity Manager Software or
P9000 mainframe agent ..................................................................................................... 56
When multiple BCM instances have overlapping configuration definition files ............................. 57
Restrictions when Replication Manager and HP StorageWorks P9000 for Business Continuity
Manager Software versions differ ......................................................................................... 57
Setting up Application Agent ...................................................................................................... 58
About application discovery ................................................................................................ 59
Adding an instance of Application Agent .............................................................................. 59
Setting Application Agent options ........................................................................................ 60
Settings for virtual hosts and cluster configurations ............................................................ 62
About concealing/revealing replica volumes ......................................................................... 62
Parallel verification count and number of backup servers ......................................................... 64
About VDI generation timeout .............................................................................................. 66
Refreshing Application Agent ............................................................................................... 66
5 Discovering volumes ........................................................................ 69
Discovering volumes (open systems) ............................................................................................ 69
Discovering volumes (mainframe) ................................................................................................ 69
About mainframe volume discovery ...................................................................................... 69
Volume scan ...................................................................................................................... 70
About volume scans ..................................................................................................... 70
Example volume scan procedure ................................................................................... 71
Types of volume scans .................................................................................................. 71
Setting volume ranges for volume scan ........................................................................... 71
Adding a volume range to a volume range list ................................................................. 72
Restrictions for adding volume ranges for volume scans ..................................................... 73
Deleting a volume range from a volume range list ............................................................ 73
Restrictions for deleting volume ranges ............................................................................ 73
Performing a volume scan ................................................................................................... 74
Distributing and managing disk configurations ....................................................................... 74
About distributing disk configurations ............................................................................. 74
Example disk list distribution scenario ............................................................................. 75
Prerequisites for distribution destination hosts (disk configuration definitions) ........................ 75
Conditions affecting displayed disk list information ........................................................... 75
Selecting targets for disk configuration distribution ........................................................... 76
Displaying disk configuration definition files .................................................................... 77
Editing disk configuration definition files ......................................................................... 78
Reviewing mainframe volumes .............................................................................................. 78
Reviewing paired DEVN list ........................................................................................... 78
Reviewing paired LDEV list ............................................................................................ 79
Reviewing unpaired DEVN list ....................................................................................... 79
Reviewing unpaired LDEV list ......................................................................................... 80
6 Setting up authorities ........................................................................ 81
Adding users and assigning permissions ...................................................................................... 81
About users, permissions, and roles ..................................................................................... 81
About user roles ................................................................................................................. 82
About permissions and user roles ......................................................................................... 84
4