Data Protection Advisor 6.1 SP2 Installation and Administration Guide
Data Protection Advisor 6.1 SP2 Installation and Administration Guide
REV 06
Copyright ©2005 - 2015 EMC Corporation. All rights reserved. Published in the USA.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without
notice.
The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect
to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular
purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries.
All other trademarks used herein are the property of their respective owners.
For the most up-to-date support, product, and licensing information to EMC Online Support at http://support.EMC.com.
For technical support, go to EMC Online Support and select Support. There are several options, including one to create a service
request. To create a service request you must have a valid support agreement. Contact your EMC sales representative about obtaining
a valid support agreement or with questions about your account.
Your suggestions will help us to improve the accuracy, organization, and overall quality of user publications. To provide feedback,
please email [email protected].
3
4 DPA 6.1 SP2 Installation and Administration Guide
Contents
Chapter 1 Installation
Overview..................................................................................................... 10
System requirements .................................................................................. 10
Datastore storage................................................................................. 11
Permissions .......................................................................................... 11
Port settings.......................................................................................... 11
Ports required for installing any DPA Application service ....................... 13
Additional Ports required for installing any clustered DPA Application
service .................................................................................................. 14
Ports required for installing any DPA Datastore service.......................... 14
Ports required for installing any DPA Agent service ................................ 15
Installation and configuration overview ...................................................... 15
Configuring virtual infrastructure memory and CPU................................ 17
OS resource optimization ...................................................................... 18
DPA installation .......................................................................................... 18
Installing the Datastore service ................................................................... 19
Installing the Application service................................................................. 21
DPA Agent installation................................................................................. 22
Installing the DPA Agent ........................................................................ 23
Command line installation .......................................................................... 23
Datastore Replication installation................................................................ 28
Configuring Datastore Replication ......................................................... 28
Datastore Replication best practices ..................................................... 29
Application server clustering installation..................................................... 29
Adding an Application object to a cluster during installation ................. 30
Restrictions and recommendations for clustering .................................. 30
Migration from co-hosted to split-installation .............................................. 31
Before you begin: .................................................................................. 31
Procedure ............................................................................................. 31
Upgrades .................................................................................................... 32
Upgrade prerequisites........................................................................... 32
Upgrading by using the Patch Installer .................................................. 34
DPA postinstallation steps .......................................................................... 35
............................................................................................................. 36
Chapter 2
Schedules............................................................................................. 45
System settings..................................................................................... 46
Data Collection Agents .......................................................................... 46
Server ................................................................................................... 47
Replication analysis .............................................................................. 49
Agentless Discovery .............................................................................. 49
Manage Data Collection Defaults........................................................... 50
Customizing business information .............................................................. 50
Using the vtl templates ......................................................................... 50
Importing and exporting custom report templates and custom control
panels................................................................................................... 53
Datastore Replication administration .......................................................... 53
Configuring Datastore Replication after deployment .............................. 53
Carrying out Datastore server failover .................................................... 53
Integrating Slave Datastore after it has been offline .............................. 54
Reconfiguring Datastore servers ............................................................ 55
Stopping Datastore Replication ............................................................. 55
Clustering administration............................................................................ 56
Adding an Application object to a cluster after DPA deployment ............ 56
Removing an Application object from a cluster ...................................... 57
Windows considerations ....................................................................... 57
Backup of the Datastore server.................................................................... 57
Exporting the DPA Datastore server to a file ........................................... 58
Exporting the DPA Datastore server to Pipe............................................ 58
Importing the DPA Datastore server ....................................................... 58
DPA command line operations .................................................................... 59
Sourcing the DPA config file for UNIX users............................................ 59
DPA Server CLI commands..................................................................... 59
Command and option abbreviations ..................................................... 59
dpa application commands................................................................... 60
dpa datastore commands ..................................................................... 65
dpa service commands ......................................................................... 69
Loading historical backup job data ............................................................. 71
Job summary reports ............................................................................. 72
................................................................................................................... 72
Chapter 5 Uninstallation
Uninstalling the software .......................................................................... 130
Silent uninstallations .......................................................................... 130
Uninstalling through user interface on Windows.................................. 130
Agent-only uninstallation .................................................................... 130
Chapter 6 Troubleshooting
Troubleshooting installation...................................................................... 132
DPA installation failure on Solaris ....................................................... 132
DPA Datastore server on Linux or Solaris failure to start after installation ...
132
DPA web console start failure on Windows Server 2012....................... 132
Postinstallation memory tuning........................................................... 133
Error messages during upgrades ......................................................... 133
Viewing log files........................................................................................ 133
Viewing install log file ......................................................................... 133
Viewing server log files........................................................................ 134
Viewing agent log files ........................................................................ 134
Managing log files............................................................................... 134
Enabling alternative log rotation on VMs running Windows ................. 134
Erroneous memory data in installer log file.......................................... 134
Running a DPA Agent request in debug mode using DPA web console . 134
Default modtest deletion schedule...................................................... 135
Troubleshooting data collection ................................................................ 135
Data collection troubleshooting first actions ....................................... 136
Data collection troubleshooting second actions .................................. 136
Preparing a log file for submission to EMC Support.............................. 136
Troubleshooting client discovery for replication analysis ........................... 137
Client discovery using remote execution.............................................. 137
Client discovery with agent.................................................................. 138
General client discovery ...................................................................... 139
Synchronizing Incorrect Recovery Point times...................................... 140
Troubleshooting report output failure ........................................................ 141
Troubleshooting report generation or publishing problems........................ 141
Synchronizing the system clock................................................................. 142
CHAPTER 1
Installation
9
Installation
Overview
All of EMC® Data Protection Advisor (DPA) deployments include the following
installations:
◆ DPA Datastore server and a DPA agent on one host
◆ DPA Application server and a DPA agent on another host
When installing DPA the installation wizard takes you step by step through placement of
these components.
Installing the Application and Datastore servers on a single host is not supported. You can
connect multiple Application servers to the same Datastore server, where each additional
Application server is on its own host. You can install additional DPA Agents for system
monitoring and remote data collection. Clustering of the Application server is available to
provide load balancing, quality of service separation, and high availability.
"Migration from co-hosted to split-installation" on page 31 provides information on
migrating from a co-hosted deployment to a split-installation.
System requirements
DPA has the following basic minimum system requirements. The EMC Data Protection
Advisor Software Compatibility Guide provides a comprehensive list of system
requirements.
◆ Split-server installation only
Combined DPA Application and Datastore servers on one host is not supported
◆ 8GB RAM, 2 cores / CPUs per Application and Datastore server
◆ 18GB for the Application server
◆ 20GB for the Datastore Server
◆ The DPA Application server and DPA Datastore servers must not be used to run other
applications. The DPA Application server host and DPA Datastore server host
resources must be dedicated to DPA.
If running DPA in a virtualized environment the allocated CPU and memory must be
reserved for the DPA servers
The DPA installer has a soft threshold of 7892 MB and a hard threshold of 5844 MB.
The soft threshold allows the installation to continue, but the hard threshold does not.
Automatic sizing and tuning of internal DPA resource usage takes place during
installation.If resources (CPU, Memory) are taken away from the installation by other
applications performance of DPA could be adversely affected.
◆ Operating systems
• Support for 64-bit operating systems only
• Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2
• Red Hat Linux ES/AS 5, 6.0, 6.2, 6.4
• Run the Update Agent (up2date) to ensure that the latest operating system patches
are installed
• SUSE Linux 11 x86
Run the Update Agent (up2date) to ensure that the latest operating system patches
are installed
libaio is recommended to be installed on the system and available in the system
<filepath>LD_LIBRARY_PATH</filepath> for performance gains
The DPA Application server host and DPA Datastore host should not be used to run other
applications. That is, the DPA Application server host and DPA Datastore host resources
must be dedicated to DPA.
Datastore storage
For performance reasons, the installation of the DPA Datastore server on NAS-based file
systems, such as CIFS or NFS shares is not recommended because these file systems
might not have the bandwidth to manage the required I/O.
Although the standard datastore file system layout is adequate for most deployments, you
can distribute different file systems across different file systems to optimize performance
during installation under Advanced installation options.
Permissions
Ensure that you have the following permissions before you install the software to avoid
installation failure:
◆ Windows:
• Administrator privileges (domain or local with full access)
• If User Account Control (UAC) is enabled, use Run As Administrator
◆ UNIX / Linux:
• Root user
• If using security software to manage access to the root account, ensure the
permissions allow the creation of new users after you become root. This must
include the ability to create default home directories for the account to be created.
Port settings
To ensure communication between the DPA Server and DPA Agents, configure the firewalls
in the network to allow communication on these ports, as shown in Figure 1 on page 12.
Additional firewall configuration can be required for other ports depending on what you
plan to monitor. "Environment discovery in DPA" on page 73 provides more information.
System requirements 11
Installation
HTTP 9004 TCP inbound Used for UI, CLI and REST API communications
HTTPS 9002 TCP inbound Used for UI, CLI and REST API communications over SSL
DPA Agent 3741 TCP inbound Protocol port used by DPA to send control data and
manage the DPA Agent
The table below details the ports that must be available and free to use on the local host.
These ports are user for intra-application communication and are not used for
communication external to the host. These ports are referenced by DPA using the standard
loopback address: 127.0.0.1
Table 2 Ports required for installing any DPA Application service on local host using loopback
address
System requirements 13
Installation
Additional Ports required for installing any clustered DPA Application service
The table below details the ports that must be available and free to use on the local host.
These ports are used for inter-application node communication and are used for
communication external to the host. These ports are referenced by DPA using a standard
IP address, called the bind address.
Note that UDP Multicast ports are associated with a UDP Multicast Address that is
specified during installation or via the DPA CLI.
Table 3 Additional ports for clustered DPA Application service on local host using bind address
JGROUPS-UDP-LOCK5 5201 UDP Multicast Used for synchronization events between cluster
nodes
JGROUPS-UDP-FD 54200 UDP Multicast Used for resource handling between cluster nodes
JGROUPS-UDP-FD-LOCK5 4201 UDP Multicast Used for resource synchronization between cluster
nodes
Table 4 Ports required for installing the DPA Datastore services on local host using bind address
PQSQL 9003 TCP inbound Used for listening to connections to DPA Agents
DPA Agent 3741 TCP inbound Protocol port used by DPA to send control data and
manage the DPA Agent
DPA Agent 3741 TCP inbound Protocol port used by DPA to send control data and
manage the DPA Agent
Action Comments
Provide at least two hosts for DPA must not be installed on servers already running other applications.
DPA server installation: For installation in a production environment, you need one host for the
One for the initial DPA Application service and a separate host for the Datastore service. EMC
Application server, and one recommends that you use a dedicated server with at least 2GB of
for the Datastore server. temporary space. The EMC Data Protection Advisor Software Compatibility
Guide provides more information.
Provide a host for DPA Agent If the DPA server resides on a Linux or Solaris host and you are performing
installation (optional). client discovery of Windows hosts, at least one DPA Agent must be
installed on a Windows proxy host. "Command line installation" on
page 23 provides more information.
Ensure that DPA and all its If you do not define exceptions for DPA components or associated files,
components are configured the antivirus software occasionally shuts down DPA or quarantines DPA
as exceptions in any antivirus files.
software.
Configure VLAN and shared • Allocate a dedicated VLAN for use by the DPA Application servers.
directory if installing multiple • Provision a load-balancing switch in front of that VLAN and configure an
clustered Application servers. IP address to be used for Application server communications
• Configure a shared directory that will be accessible by all Application
servers. DPA will use this shared directory for writing scheduled reports
and other temporary files that all Application servers need to access.
Check VMware or Hyper-V DPA has been certified to work on a Linux or Windows virtual machine in a
requirements. VMware or Hyper-V environment. The EMC Data Protection Advisor
Software Compatibility Guide provides more information.
Configure virtual "Configuring virtual infrastructure memory and CPU" on page 17 provides
infrastructure memory and more information.
CPU.
Action Comments
Install the host operating The EMC Data Protection Advisor Software Compatibility Guide lists the
system on the DPA Server and required architectures and patches.
Agent host and then install all
required patches.
Install all required software When monitoring applications or devices remotely, you might need to
on the Agent host after the install additional software on the Agent host. For example, the EMC
DPA 6.1 Application server is NetWorker client must be installed on the Agent host if the Agent will be
ready. used to monitor EMC NetWorker remotely. For more information see
Chapter 3, "Environment discovery in DPA."
If DNS is not enabled in the DPA and SharePoint integration requires the IP address and FQDN to
environment, add the IP enable you to publish reports to SharePoint and to configure the
address and FQDN of the SharePoint port. The SharePoint port is configurable. The default port, if
SharePoint server on the DPA no port is specified, is 80. You can set the port by using a standard URL in
Application server’s hosts the existing URL field in the SharePoint settings dialog. Table 20 on
file. page 49 provides information.
• For new non-migrated A DPA license is required to log in to DPA after installation.
installations, obtain DPA For information on required DPA licenses or on purchasing licenses
licenses for all for your DPA installation, contact your EMC sales representative.
components that will be
monitored.
• For upgraded 6.x and
service pack and migrated
5.x installations, existing
licenses will be migrated.
Provide the Solutions Enabler • A minimum of one gatekeeper per HBA per Symmetrix is required.
(SE) licenses. • One SE host can discover all VNX/CLARiiON arrays through the IP
address. For VNX/CLARiiON discovery, EMC recommends installing
Solutions Enabler on the DPA server.
• The EMC Data Protection Advisor Software Compatibility Guide
describes the versions of Solutions Enabler required for storage array
discovery.
2. Install DPA
Install the DPA software. Install the DPA server and Agent according to the installation instructions.
"Configuring virtual infrastructure memory and CPU" on page 17 provides
more information.
Configure Symmetrix and "Configuring storage arrays for replication analysis" on page 78 provides
VNX/CLARiiON array for more information. The steps in this section apply only if you are
discovery. monitoring a storage array, database, or Microsoft Exchange Server for
replication analysis.
Provide the SE host used to The EMC Data Protection Advisor Software Compatibility Guide describes
discover Symmetrix or the versions of SE that storage array discovery requires, and the software
VNX/CLARiiON storage arrays. that you must installation the SE host. The host must be able to connect to
the Symmetrix array by a SAN connection. The host must have the TCP port
443 or 2163 enabled for the VNX/CLARiiON connection.
Action Comments
Ensure that the ports Chapter 3, "Environment discovery in DPA," lists the protocols and default
between the DPA Agent host DPA ports that communication between the Agent and the monitored
and the monitored server or device or server require.
devices are open and
communication is possible
over the protocol.
Ensure that the DPA Chapter 3, "Environment discovery in DPA," lists the default settings for
credential used to connect to the DPA credentials that are installed with DPA.
the monitored device or
server is sufficient, or have
the new credential details
ready.
Set up monitoring of EMC RecoverPoint agent host and Application host requirements are listed
RecoverPoint, if applicable. in Chapter 3, "Environment discovery in DPA."
Discover and configure • If a remote agent is used to import hosts, the DPA server must be able
Application Host import, if to resolve the agent host.
you are monitoring Microsoft • If application discovery is performed without an agent, "Configuring
Exchange or a database. application hosts for monitoring" on page 78 provides more
information.
Prepare the details of the "User and system settings" on page 38 provides more information.
policies that DPA will monitor For replication analysis, the Data protection policy details consist of:
for compliance. • The type or replication, (SRDF/S, SRDF/A, MirrorView, RecoverPoint,
and so forth.).
• Whether the replication is Point-in-Time or continuous.
• The replication target destination.
For data protection reporting, the policies are:
• Chargeback Policies - For financial cost analysis of data protection
operations.
• Protection Policies - To analyze compliance with recovery time objective
(RTO) and recovery point objective (RPO) data protection targets.
OS resource optimization
General tuning
During installation, the installer tunes the DPA Datastore service for the host environment
on which it is being deployed. This tuning assumes that the host is dedicated to DPA and
takes into account resources such as Disk Space, Total Memory, and CPU cores. If other
applications are installed on this host and also using these resources DPA performance
will be degraded. If during the lifetime of the DPA Datastore service any of these physical
resources are increased or decreased, execute the dpa datastore tune command on the
Datastore server. "dpa datastore tune" on page 69 provides more information.
Hardware issues
For deployments where optimal performance is a concern, the type and quality of the
hardware you use for your Datastore server drastically impacts the performance of the
Datastore service. Following are some guidelines to consider when commissioning
hardware for your Datastore server:
◆ Disk types - Fast Ultra-320 SCSI disks are the best option. You can also use the
high-end Serial ATA (SATA) drives. With SATA, each disk is substantially cheaper and
with that you can afford more spindles than with SCSI on the same budget.
◆ RAM - RAM is directly proportionate to the disk cache. This greatly impacts
performance considering that memory I/O is faster than disk I/O.
◆ RAID Controller - Ensure that the RAID controller can keep up with eight fast HDDs.
◆ Disk configuration - The optimum configuration is RAID 1+0 with as many disks as
possible and with your transaction log on a separate disk or stripe. RAID 5 is not a very
good option for databases unless you have more than 6 disks in your volume.
A typical high performance configuration contains:
◆ Two disks in mirror for the OS and DPA Datastore binaries
◆ Two disks in mirror for the Datastore transaction log
◆ Four disks in RAID 10 for the Datastore data files
Note: Make sure that operating system partitions and RAID stripe boundaries are aligned
and undertaken when the partitions are created.
Usually, the performance is better when you have more RAM and disk spindles in your
system. This is because with the extra RAM you will access your disks less. And the extra
spindles help spread the reads and writes over multiple disks to increase throughput and
to reduce drive head congestion.
For production purposes the DPA Application service and the DPA Datastore service
should be placed onto different hardware. Not only does this provide more hardware
dedicated to the Datastore service, but the operating system's disk cache will contain
more Datastore data and not any other application or system data.
DPA installation
The DPA installation involves two stages:
Procedure
1. Double-click the DPA server binary to start the installation.
2. Click Next.
3. Read and accept End User License Agreement. Scroll to the end of the agreement to
activate the option to accept the terms of the License Agreement terms. Click Next.
4. In the Installation Options screen, select to install Datastore service, click Next.
5. If you do not perform an advanced installation, click Next and follow the installation
wizard.
To perform an advanced installation, select the Show Advanced Installation Options
checkbox in the Advanced Installation screen, click Next, and follow the installation
wizard.
The Advanced Options are:
• Do not register DPA services: Prevent the registration of the Datastore service with
the operating system manager. This will prevent the Datastore service from being
started after host reboot. You must use of the DPA Command Line Interface to
install the service with the operating system.
• Do not start DPA services: Prevent the starting of the Datastore services after
installation. Use of the DPA Command Line Interface will be required to start the
service.
• Install with advanced datastore layout: Configure the datastore service with the
required file systems distributed across different disks to optimize performance.
Selecting Advanced Installation Options also enables you to configure Datastore
Replication and select a replication role for this server later on in the installer.
6. When prompted, choose the installation folder. Choose the default location or browse
to another folder location.
7. Review the Pre-Installation Summary, the disk space information in particular, and
click Install.
The installation proceeds.
8. If there is not enough disk space, cancel the installation or choose a different drive to
install DPA on.
9. When prompted, select the IP addresses that the Datastore server should listen on for
connections from the DPA Application server.
10. When prompted, enter the IP address of the DPA Application server that will use the
Datastore server from step 6, and then click Add and Next.
If you are installing a single DPA Application server provide just the one address for
that server.
If you are installing multiple DPA Application servers in a clustered configuration,
enter IP addresses for each DPA Application server.
11. If you are configuring Datastore Replication, select Enable datastore replication and
select the replication role for this server (either MASTER or SLAVE). Click Next.
a. If you selected MASTER as the role for this server, then provide the IP address or
FQDN of the server that will be configured to be a Slave Datastore server.
b. If you selected SLAVE as the role for this server, then provide the IP address or
FQDN of the Master Datastore server.
c. When prompted, specify the name or IP address of the DPA Application server host
to enable communication between the DPA Agent and the Datastore server. By
default, the Agent communicates with the Application server specified earlier in
the wizard. If you are installing multiple clustered Application servers, provide the
IP address for the load-balancing switch that will be placed in front of the
Application server clusters. Click Next.
12. When the DPA Datastore server installation is complete, click Done.
Procedure
The Application service installation process is similar to installing the Datastore service.
1. Double-click the DPA server binary to start the installation.
2. Click Next.
3. Read and accept End User License Agreement. Scroll to the end of the agreement to
enable the option to accept the terms of the License Agreement terms. Click Next.
4. In the Installation Options screen, select to install Application service, click Next.
5. If you do not perform an advanced installation, click Next and follow the installation
wizard.
The Advanced Options are:
• Do not register DPA services: Prevents the registration of the service with the
operating system service manager. This option prevents the DPA services from
being started after a host reboot. You must use the DPA Command Line Interface to
install the service with the operating system.
• Do not start DPA services: Prevents the DPA services from being started after
installation. Use of the DPA command line interface is required to start the service.
• Install the DPA services as clusterable: Configures the DPA service to discover and
join any present DPA cluster. "Application server clustering installation" on
page 29 provides more information.
If you would like to add an Application Object to a cluster, select Install the DPA
services as clusterable and follow the steps in the wizard.
At the prompt for a common location for Application servers for reports, ensure
that you specify a common directory that is shared across all nodes. The Shared
Directory for reports is required when you run multiple Application nodes. If
installing on Windows, ensure that you configure the required common and shared
UNC folder and enter the Domain username and password with access to that
specified directory. "Prerequisites" on page 21 provides more information.
The rest of the installation is similar to the Datastore server installation.
6. When prompted, choose the installation folder. Choose the default location or browse
to another folder location.
7. Review the Pre-Installation Summary, the disk space information in particular, and
click Install.
The installation proceeds.
If there is not enough disk space, cancel the installation or choose a different drive to
install DPA on.
Note: A Datastore connection failure error might occur if the relevant firewalls required
to communicate between Application server and the Datastore server are not open.
"Port settings" on page 11 provides port information.
8. In the Connect to Remote DPA Datastore step, enter the IP address for the DPA
Datastore server previously installed.
The installation resumes.
9. When prompted, specify the name or IP address of the DPA Application server host
with which the DPA Agent will communicate. By default the Agent communicates with
the local Application server with IP address 127.0.0.1. In a clustered configuration
provide the IP address of the load balancing switch placed in front of the Application
servers. Click Next.
The DPA Application service installation is now complete.
10. Click Done.
After the installation is complete, start the DPA Server and license the Server. "DPA
postinstallation steps" on page 35 provides more information.
where option is one of the options listed for a silent or an interactive installation in
Table 7 on page 24.
◆ Windows
install.exe [option]
where option is one of the options listed for a silent or an interactive installation in
Table 7 on page 24.
Ensure that you perform the steps provided in "DPA postinstallation steps" on page 35.
Option Description
-i [swing | console | Specify the user interface mode for the installer:
silent] swing - Graphical interface
console - console only
silent - no user interaction
-D Shows the installer name-value pairs that might be set on the command line (using the -D option) to
<name>=”<value>" override default installer values, or placed in a response file and used with the -f option.
Example:
-D <variable name>="<value>"
Where:
<variable name> and <value> descriptions are included in the following tables.
VAR_AGENT_APPLICATION_ADDRES DPA Server FQDN or IP Valid IP Address or For multiple application servers and
S Address to manage the hostname for cases where the datastore
Datastore Agent service is communicatong with
In case of linux IPv6, linux IPv6 application server(s), this
<IPv6Address>%<Interface value will be empty. Otherwise the
_Id_Of_Datastore_Agent> default value is the same as
VAR_DATASTORE_CLIENTS_ADDRES
SES
Procedure
1. Provision two new servers with a supported operating system. The DPA Software
Compatibility Guide provides information on supported operating systems.
Use the original DPA server hostname and IP address on the new server that you
provision as the Application server.
2. Install the DPA Datastore service on the new server that uses a new IP address and
hostname. "Installing the Datastore service" on page 19 provides information. Note
the following observations:
• Ensure that you install the same version that was on your original DPA server and
that you noted in "Before you begin:" on page 31.
• You might have to perform a full installation and then an upgrade to a patch by
using the Patch Installer, if the version previously installed was a patch version. If
you need upgrade to a patch, "Upgrading by using the Patch Installer" on
page 34provides information.
• If necessary, contact EMC Technical Support to access the same version that was
on your original DPA server.
3. Install the DPA Application service on the new server that has the original DPA server
IP address and hostname. "Installing the Application service" on page 21 provides
information.
• Ensure that you install the same version that was on your original DPA server and
that you noted in "Before you begin:" on page 31.
• You might have to perform a full installation and then an upgrade to a patch by
using the Patch Installer, if the version previously installed was a patch version. If
you need upgrade to a patch, "Upgrading by using the Patch Installer" on
page 34provides information.
• If necessary, contact EMC Technical Support to access the same version that was
on your original DPA server.
4. Verify that the versions on the new Application and Datastore servers match the
versions on the previous cohosted server:
a. On the Application server, run the dpa app ver command from the services/bin
directory.
b. Check that the version output from step a on page 32 matches the version output
from "Before you begin:" on page 31.
5. Confirm that you can login to DPA on the new Application server. "DPA postinstallation
steps" on page 35 provides more information.
6. Import the DPA Datastore backup that you took in "Before you begin:" on page 31. Use
the dpa datastore import command to import the Datastore. "Importing the DPA
Datastore server" on page 58 provides more information.
7. Log in to the DPA web console and confirm that objects are restored. For example,
verify that:
• Objects have been restored by checking that the storage arrays in your original DPA
server appear in the new DPA server Object Library.
• Data collection is running successfully by checking that recent data is visible in
reports that you run since migrating to the new DPA server.
Upgrades
The Patch Installer is used for all upgrades and as well as for applying Generally Available
and non-Generally Available patches. The DPA 6.1 SP1 Release Notes includes supported
upgrades and migration paths.
Note the following:
◆ Upgrade from DPA 6.0 to DPA 6.1SP 1 is not supported.
1. Upgrade to 6.0 latest patch.
2. Upgrade to 6.0 SP1 latest patch.
3. Upgrade to 6.1 SP1 latest patch.
◆ If you have upgraded or migrated to 6.1, delete the browsing history/cache in your
browser before using 6.1.
◆ If you are running DPA 6.1 patch 117, you must upgrade to the latest 6.1 patch before
upgrading to 6.1 SP1
Upgrade prerequisites
◆ Backup the DPA Datasore by using the dpa ds export command."Datastore Replication
administration" on page 53 provides more information.
◆ Stop the DPA Datastore and Application servers. Good practice is to perform a
complete backup of the host running DPA Application and Datastore servers.
◆ Clear the browser cache.
◆ Ensure that you have admin/root privileges.
◆ Ensure that required 6.x package is installed on your system. The upgrade packages
supported on the Patch Installer are not full package releases.
◆ Take note of the DPA 6.x build installed on your system by running dpa app ver and
recording the output. This output is important when verifying package installation.
◆ Stop the DPA Application service. You must stop the Application service because when
the services are on separate machines, the installer cannot stop the services. Then
perform the Patch Installer installation on the Datastore server first, followed by the
Application server.
◆ When applying the Patch installer to clustered environments, stop the DPA Application
service on all objects and then apply the Patch installer first to the Datastore server
and then to one of the Application objects. You must stop the Application service
because when the services are on separate machines, the installer cannot stop the
services. Start the patched DPA Application. Confirm initialization completed and that
you can login to the DPA web console before applying patches to the remaining
clustered Application objects.
◆ If you are upgrading from a release prior to 6.1 SP1 ensure that you review and edit the
retention period on collection requests. Data collection requests contain a different
default retention period in 6.1 SP1 from previous DPA versions.
◆ If you are upgrading from a version prior to DPA 6.1 SP1 and if you are currently using
DPA for RMAN reporting through an existing DPA backup license, contact your EMC
Account Representative for the DPA for Enterprise Applications license. The DPA for
Enterprise applications license allows you to expand the number of RMAN servers
being reported in DPA when you upgrade to DPA 6.1 SP2.
Before upgrading DPA 6.x Datastore server with Advanced Layout on Windows
If you are upgrading a 6.x Datastore server on a Windows system using the Patch Installer
with Advanced Layout, you must run two extra commands manually to allow the local
service user access to the /data and /pg_xlog directories which are located outside of the
dpa installation root.
You must have administrative privileges to perform this procedure.
The 6.1 SP2 the Datastore service does not run under the local system user, but rather
under the local service user. The /data and /data/pg_xlog directories are actually
symlinks leading to other directories outside the dpa installation directory. This pertains
to problem numbers DPA-25875 and DPA-26033.
1. Open a command prompt, running with administrative privileges.
2. Run the commands:
icacls "<full path to data location>" /t /grant "LOCALSERVICE:(OI)(CI)F"
icacls "<full path to pg_xlog>" /t /grant "LOCALSERVICE:(OI)(CI)F"
Where:
Upgrades 33
Installation
• <full path to data location> is the path name to the /data directory, including the
drive letter
• <full path to pg_xlog location> is the path name to the /pg_xlog directory, including
the drive letter
Where:
• <full path to data location> is the path name to the /data directory, including the
drive letter
• <full path to pg_xlog location> is the path name to the /pg_xlog directory, including
the drive letter
7. If you have a clustered environment and are using a shared report directory, back up
the shared report directory.
8. Patch the Datastore server. Follow the installation steps as directed in
InstallAnywhere. Ensure that the existing DPA installation directory is specified
correctly on the Patch Installer. You must install the DPA 6.1 Patch Installer package in
the same installation directory as your existing DPA package.
9. Patch a single Application object. Follow the installation steps as directed in Install
Anywhere. Ensure that the existing DPA installation directory is specified correctly on
the Patch Installer. You must install the DPA 6.1 upgrade package in the same
installation directory as your existing DPA package.
10. Wait for the files to be deployed under the <install_dir> services\applications folder.
"DPA postinstallation steps" on page 35 provides more information.
11. Confirm the upgrade package installation of the Application object. Compare the build
numbers shown when you run dpa app ver to the build numbers you noted before the
upgrade. "Upgrade prerequisites" on page 32 provides information.
If the output indicates any version other than DPA 6.1 SP2, contact EMC Technical
Support and reference DCE-1742.
12. Perform the steps provided in"DPA postinstallation steps" on page 35.
13. Patch the DPA Agent without uninstalling the existing Agent package. Follow the
installation steps as directed in Install Anywhere. Agent Patch Installer is displayed in
the banner. You must patch the DPA Agent on the DPA Datastore and DPA Application
servers.
Ensure that the existing DPA Agent installation directory is specified correctly on the
Patch Installer. You must install the DPA 6.1.2 Agent Patch Installer package in the
same installation directory as your existing DPA Agent package. Advanced options and
the IP/FDQN from the existing DPA Agent are carried over to the 6.1.2Agent.
When the Agent Patch Installer runs, it stops the Agent Service, overwrites all the
Agent files, except for the configuration files which remain unchanged, and then
restarts the DPA Agent service.
14. If working in a clustered environment, repeat step 10 through step 14 for remaining
Application objects.
Administering DPA
37
Administering DPA
Managing licenses
Expired licenses
If a license expires, a license violation warning appears in the report title for reports run
from all objects enabled by the expired license. In addition, new objects cannot be added
in the web console for module components enabled by an expired license.
Removing a license
Removing a license causes a license violation warning to appear when running reports
against objects for that license. New objects of that type cannot be added in the web
console until a replacement license is supplied.
If you are using temporary licenses that have an expiration date, the License Expiration
dialog appears to notify you of the expiration of your temporary licenses. Permanent
licenses do not display.
To add new licenses, to go Admin > System and then click Manage Licenses.
To disable the automatic temporary license expiration dialog pop-up at login, go to User
Properties > Show License Expiration and uncheck the box.
Application owner application owner Can perform all reporting functions and modify
credential settings.
Four roles are supplied by default with DPA: Administrator, Application Owner, Engineer,
and User. These each have predefined permissions and settings which cannot be
changed. You can create users, edit profiles to customize preferences and web console
appearance, and delete users.
LDAP authentication
DPA supports Microsoft Active Directory and OpenLDAP as LDAP servers. DPA allows the
integration of a Lightweight Directory Access Protocol (LDAP) server in the environment so
that user passwords do not need to be stored in the DPA database. When a user logs in,
DPA communicates with the LDAP server, verifies that the user exists, and authenticates
the password against that user stored in LDAP.
To enable LDAP authentication, select Admin > Users & Security > Manage External
Authentication.
Anonymous bind
When binding anonymously to the LDAP server, DPA connects to the LDAP server without
having to connect as a specific named user. This allows basic user authentication.
When authenticating a user using an anonymous bind, DPA must pass the Distinguished
Name (DN) of the user to the LDAP server to authenticate it. DPA must determine the full
DN of the user when the user logs in.
An example of a DN for a user is:
CN=Mark,CN=Users,DC=eng,DC=company,DC=com
You must specify the DN in the External Name field when creating an LDAP authenticated
user. When the user logs in to DPA, the username is authenticated against the LDAP
server.
The disadvantage of using the anonymous bind method of authentication is that every
user you want to log in must be predefined in DPA along with the DN of each user. It is
sometimes difficult to determine the DN of each user and it is possible to make typing
mistakes that might cause authentication to fail. The alternative is to use a
non-anonymous bind.
Non-anonymous bind
If you use a non-anonymous bind, DPA connects to the LDAP server as a named user
before attempting to authenticate users who log in to the application. By connecting as a
named user, DPA has access to search the directory for users. You do not need to specify
the DN of each user who you want to have access to the application when creating user
definitions. The username and password field in DPA LDAP configuration must be that of a
a user with read access to the base level DN.
You must specify a Base Name when configuring LDAP authentication. This is the point in
the directory where DPA starts searching for a user. When a user logs in, DPA searches the
Base Name point and below in the tree in an attempt to locate the user. This means that
you do not need to know the full path to each user inside the directory.
You must also specify an Identification Attribute in DPA LDAP configuration. This is the
attribute that DPA matches the provided login name against when searching the directory.
For example, with Active Directory integration this is often set to sAMAccountName, which
is the typical login name property for a user.
When DPA finds the correct user in the directory, DPA attempts to authenticate with the
password provided at login.
Auto-Login
Another advantage of using a non-anonymous bind to connect to an LDAP server is the
ability to use the Auto-Login feature. With Auto-Login, you do not need to define user
entries in DPA for each user requiring access to the application. Access is granted based
on the existence and group membership of a user in the LDAP directory.
Note: The Auto-Login feature is supported when connecting to a Microsoft Active Directory
server only. Do not attempt to use this feature with an LDAP server other than Microsoft
Active Directory.
If there are members of multiple groups in LDAP, and multiple groups have been defined in
the Group Mapping table, they are granted the role that is mapped to the first group in the
list of which they are a member. The groups that map to a role with greater permissions
should be highest in the list.
If using the Auto-Login feature, do not create a user definition in the application before
attempting to log in. The first time the user logs in, DPA authenticates the username and
password, and then attempts to determine the role that should be granted based on the
values specified in the Default User Role and Group Mapping fields. If a role cannot be
determined, the user is not granted access to the application. If the role can be
determined, DPA automatically creates a user definition and the user is permitted to log
in.
Users who are removed from LDAP are no longer granted access. If a user’s group
membership is changed in LDAP, the role is re-evaluated at next login and is updated.
LDAP Examples
The following examples show various ways to configure DPA LDAP integration with a
Windows Active Directory server. These examples assume the following AD configuration:
◆ LDAP Server: ad.lab.emc.com
◆ LDAP Domain Administrator Login:
CN=admin123,OU=MSP01,DC=lab,DC=emc,DC=com
◆ LDAP OU's where DPA users may exist:
◆ OU=Admin,OU=MSP01,DC=lab,DC=emc,DC=com
◆ OU=Users,OU=MSP01,DC=lab,DC=emc,DC=com
◆ OU=Users,OU=MSG02,DC=lab,DC=emc,DC=com
All DPA Users are in organizational units below lab.emc.com
Example User:
◆ LDAP Object: CN=John Smith, OU=Admin,OU=MSP01,DC=lab,DC=emc,DC=com
◆ LDAP Login Name: smithj (the sAMAccountName property)
◆ LDAP Group Membership:
◆ CN=msp01admin, OU=MSP01,DC=lab,DC=emc,DC=com
• CN=exchadmin, OU=MSP01,DC=lab,DC=emc,DC=com
• CN=dpaadmin, OU=MSP01,DC=lab,DC=emc,DC=com
◆ DPA Role: Administrator
Digital certificate
DPA uses a self-signed digital certificate for identification and encryption. This certificate
expires in five years. To use a certificate that is signed by your own Certificate Authority,
you must:
1. Export a certificate request (CRT) file.
2. Ask your Certificate Authority administrator to create a signed certificate in Base-64
Encoded X.509 (CER) format.
3. Import the signed certificate into DPA.
The Online Help provides more information on adding digital certificate.
Time periods
When you run a report or create a scheduled report, you must decide the period of time
over which the report is run, for example right now or last week. Several predefined time
periods are provided by default and you can create custom time periods.
To create a custom time period, select Admin > System > Manage Time Periods.
Schedules
Schedules are used to define when to run a scheduled report or generate a dashboard
view block, or to define the backup window specified in the Protection Policy. Several
predefined schedules are provided by default and you can also create custom schedules.
A schedule is made up of components that define when each schedule produces certain
results or runs certain reports. The Schedule Editor provides two ways to create schedules:
◆ Basic editor - allows you to create schedules on a weekly basis only and edit the day
and time of the schedule.
◆ Advanced editor - allows you to create more complex schedules by manually editing
the schedule parameters.
Schedules created in the basic editor can be edited using the advanced editor. However,
schedules created and saved in the advanced editor cannot be edited in the basic editor.
To create a schedule, select Admin > System > Manage Schedules.
System settings
This section describes how to modify the default system settings for DPA Agents, the
server, and the Datastore server. To view or edit system settings, select Admin > System >
Configure System Settings.
Setting Description
Data Collection Agent Port Port on which the data collection agent listens for requests
Log Level Verbosity level when the data collection agent writes to the log
file. For example, selecting Fatal writes only critical errors to
the log file
Max Log File Size (MB) Maximum size to which a log file can grow before the creation
of a new log file (in MB). To set no limit for the size of the log
file, set this value to 0
Max Number of Log Files Maximum number of log files maintained on the system. If a
new file is created because the maximum file size of the
current log file is exceeded, the oldest log file is removed.
Max Forward Queue Length Maximum number of requests stored by the agent locally if the
Server is offline.
Max Forward Queue Size (MB) Maximum total size of all requests stored by the DPA data
collection agent locally if the Server is offline (in MB).
Reload Data Collection Agent Allows you to manually reload the data collection agent. This is
done automatically when configuration changes are made in
the DPA web console that affect a data collection agent.
Remove Data Collection Agent Removes the selected data collection agent.
Make Agent Default Makes the selected data collection agent the default host.
Additional server settings configure global agent and email settings. The server settings
are described in Table 17 on page 47.
Setting Description
Binary Multiplier Switching this global setting on, defaults all Agents to use the
binary multiplier. Binary multiplier converts all incoming data
as 1024 KB= 1MB. Applies to NetWorker agents only where
the incoming data from Backup server is converted as 1000 KB
= 1MB. Binary Multiplier is ignored when monitoring other
applications.
Timeout(s) Time out setting that the server uses when talking to the
agent. The default is 120 seconds.
Mail Server Hostname Mail server to which email messages are forwarded when sent
from DPA.
Mail From Address E-mail address assigned to email messages sent from DPA.
Global Logging Settings Global logging settings for the Analysis Engine, Configuration,
Listener, Publisher, Recoverability Analysis, Reporter, and
REST API. Settings can be INFO, DEBUG, WARN, ERROR, and
FATAL.
Global SharePoint Server SharePoint Server settings required to publish the report or
Settings control panel to Microsoft SharePoint as a CSV, image (png),
PDF, HTML, or XML file.
Ensure that you create the "Shared Documents" path and
folder for publication. For example:
http://sharepoint-2013/sites/demo/Shared Documents
Data Deletion Schedule to delete data gathered from your environment. The
default is 9 a.m. to 5 p.m. every day.
Server
The default data deletion schedule is from 9:00 a.m. to 5:00 p.m daily.
Default collected data retention periods are user-configurable within the Manage Data
Collection Defaults.
Table 19 on page 48 provides information on default system-generated data retention
periods. Default system-generated data retention periods are not user-configurable.
Replication analysis
The replication analysis settings configure client-server time difference. The settings are
described in Table 20 on page 49.
Setting Description
Client-server Time Difference The time offset you calculated Client-server Time Difference (in
seconds or minutes).
Display dirty recovery points in The recovery points that you do to want DPA to use for RPO
Replication Status Diagram calculations like replicas that are used for reporting or test
and Topology Reports systems.
You can define the dirty recovery points in the data protection
policy.
Symmetrix and CLARiiON Log Log level settings for Symmetrix and CLARiiON. Settings are
Level INFO and DEBUG.
Support Symmetrix Masking Option to render Out of Memory exceptions obsolete and
Reports prevent memory issues when dealing with the Masking Config
and LUN Mapping reports data.
Days to keep Temporary Files Days the system maintains the temporary files. The files are
stored under installationDir\services\agent\tmp\output. The
default is 14. Older files are deleted at a nightly process.
Agentless Discovery
The Agentless Discovery settings are described in Table 21 on page 49.
Setting Description
Agent Response Timeout The time that DPA waits for response from the agent before
timeout.
Telnet/SSH Login Prompt The time that DPA waits for Telnet/SSH session to be created
Timeout before timeout.
Telnet/SSH Handshake The time that DPA waits for Telnet/SSH handshake before
Timeout timeout.
Delete files created on the Defines if temporary files will be deleted from the analyzed
client during agentless object at the end of the discovery.
discovery The default is that the files will be deleted.
Sudo Program Path The sudo program path for Agentless discovery settings. The
default path is /usr/local/bin/sudo. The sudo command can
also be located in either /sbin or /usr/sbin.
◆ controlpanel.css is for generating control panels using CSS. Does not contain the date
and version at the bottom.
◆ pivot.controlpanel.css is for generating pivot tables in control panels using CSS.
◆ CSS is for generating Dashboards and control panels that maintain their layout when
published.
Table 22 on page 51 lists the VTL templates.
chart.vtl Used by chart renderers that produces an image for the HTML output Default
such as Area, Bubble, Column, Line, Pie, Topology, and 3D
controlpanel.css.vtl Using CSS the Dashboard reports are placed using absolute controlpanel.css
positioning so that it resembles the layout in the UI. Does not work in
some older mail clients
email.attach.vtl Used when sending the report as an attachment to the email N/A
email.image.embed.vtl Used for embedding the report inside of the email N/A
email.notification.vtl Used for creating the notification that can be sent out after a report N/A
was published
healthstatus.controlpanel.c Same as healthstatus.vtl except this uses CSS. Also does not contain N/A
ss.vtl the date and version at the bottom
reportcard.controlpanel.css. Same as reportcard.vtl except this uses CSS. Also does not contain the N/A
vtl date and version at the bottom
table.controlpanel.css.vtl Same as table.vtl except this uses CSS. Also does not contain the date N/A
and version at the bottom
table.pivot.controlpanel.css Same as table.pivot.vtl except this uses CSS. Also does not contain pivot.controlpanel.css
.vtl the date and version at the bottom
timeline.controlpanel.css.vt Same as timeline.vtl except this uses CSS. Also does not contain the N/A
l date and version at the bottom
timeline.vtl Used for timeline charts. HTML gets embedded in the VTL Default
Example - Part 1: Add a message and your company details to the table VTL template
If you are required to send daily or weekly reports in HTML format to your customers, and
you accomplish this with scheduled reports, then you can add custom text (such as a
message or company contact information) to the scheduled report by creating a custom
VTL template. The custom text displays for all HTML reports using this template.
1. In the styles or vtltemplates directory on the DPA Server, copy the table template
(table.vtl) and rename it. For example, if you are creating a VTL template for table
reports for the company EMC, use the naming standard of table.<companyName>.vtl
then rename the table template to table.emc.vtl
2. Open the VTL in your text editor.
3. Using HTML tags, add text similar to the following within the body.
<body bgcolor="$background"><font face="Arial, Verdana, Helvetica, Sans-serif"
color="$foreground">
<body>
Dear customer,
<p>
Your daily system status report is below.
<p>
Thank you,<br>
EMC Corporation
<p>
US Phone:1-800-555-5555<br>
Email:[email protected]<br>
Website: www.EMC.com
<p>
<table>
...
</table>
</body>
Importing and exporting custom report templates and custom control panels
You can import and export custom report templates and custom control panels from DPA
5.5.1 and later into DPA from a WDS file through the Custom Templates section. Importing
and exporting to XML is not supported. You cannot import or export system templates. The
imported reports must be supported on DPA 6.1.
You can import and export custom report templates and custom control panels to fulfill
the following needs:
◆ Import custom reports from DPA 5.x.
◆ Import custom reports that were created by another DPA system.
◆ Export custom reports as an alternate backup.
The EMC Data Protection Advisor online help system provides more information on how to
import and export custom report templates.
3. Reconfigure the Application server to point to the new Master Datastore. Type:
dpa.sh app con -m <hostname/IP of new MASTER>
3. Create an empty directory on the Slave Datastore into which to copy the Master
Datastore file set.
4. Use the appropriate platform command to copy the files to the empty directory on the
Slave Datastore.
5. Import the Slave Datastore. Type:
<DPA_HOME>/emc/dpa/services/bin/dpa.sh ds rep --import /tmp/import
where <DPA_Home> is the location of the DPA installation. The status of the Slave
Datastore at this point is STARTED.
bin/dpa.sh ds rep
Clustering administration
Adding an Application object to a cluster after DPA deployment
You can modify a DPA Application object that was installed as a stand-alone object (the
default) to be part of a cluster after DPA is deployed and operational using the DPA CLI.
1. On the Application server, type dpa application stop to stop the Application
service. The Application service must be stopped before adding to a cluster.
2. On the Application server, type dpa application promote --bind
<ip_address> to promote the Application to a running cluster, where <ip_address>
is the IP address of the Application server. If this server has multiple IP addresses, you
should specify the IP address that you want to use for communication with the other
clustered Application servers.
If running on Windows, type:
dpa application promote --bind <ip_address> --user (DOMAIN\username) --path <path>
where:
• <ip_address> is the IP address of the Application server. If this server has multiple
IP addresses, you should specify the IP address that you want to use for
communication with the other clustered Application servers.
• (DOMAIN\username) is the user account that has read and write access to the
shared folder. If omitted the local system user is used. This user account must
have the Log on as a service Windows permissions enabled.
• <path> is the path that is shared among the clusters.
3. Type the following command on the Datastore server to set the number of connections
per Application server:
dpa ds tun -c <value> <memory>MB|GB
where <value> is 150 per Application server, and <memory> is the amount memory in
MB or GB that is available on the Application server.
4. If you are not running Windows, proceed to step 5 on page 57 . If running on Windows,
uninstall and install the Application service to modify the Windows service to run the
DPA Application node using the domain user. Run the following commands:
dpa app uninstall
dpa app install --user (DOMAIN\username) --password (password)
where:
• (DOMAIN\username) is the user account with which to run the Application service.
The Log on as a service Windows permissions must also be enabled.
• <password> is the password for the user specified.
Windows considerations
◆ If the password for the Domain user is changed, you must uninstall and reinstall the
DPA Application node. Run the following commands:
dpa app uninstall
dpa app install --user (DOMAIN\username) --password (password)
where:
• (DOMAIN\username) is the user account with which to run the Application service.
The Log on as a service Windows permissions must also be enabled.
• <password> is the password for the user specified.
The exported Datastore file is saved to the same directory where the export command was
run.
To save the exported Datastore file to a specific directory, specify the location at the end of
the command line. For example, the following command line exports the file to C:\
because that is the location specified:
C:\Program Files\EMC\DPA\services\bin>dpa datastore export C:\
DPA supports backup up to Avamar using ds export and pipe it directly to Avamar. For
more information, see the Avamar documentation on how to pipe a backup into Avamar
using "named pipes."
. ./dpa.config
UNIX/Linux:
dpa.sh <service_part> <command> [options]
The dpa server start/stop/restart command apply to whichever services are installed on
the current host only. For example, running dpa server stop on the DPA Datastore does not
stop services running on the DPA Application server.
--add -a
--bind -b
--cluster -c
--delete -d
--help -h
--master -m
ping -p
--pipeline -p
--platform -p
tune -t
After you start, stop, or restart a service, it might take a number of minutes to complete
and might not result in an immediate state change.
Command options
--master <IP_address> — Identifies the Datastore serverserver with which to communicate.
The Application service must be stopped for this command to operate.
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
--bind (-b) — Specifies the IP address to announce the Application service on
Examples
dpa app -b 192.168.1.10
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Examples
dpa application demote
dpa app demote
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Examples
Command Options
--help (-h) — Displays help screen
--version — Displays tool version information
--quiet — Displays warnings and errors only
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
--bind (-b) — Specifies the IP address to announce the Application service on
--user (-u) (DOMAIN\username) — Windows only; points to the user account that has read
and write access to the shared folder. If omitted the local system user is used.
--path (-p) <path> — Windows only; path that is shared among the clusters.
Examples
dpa application promote -b 192.168.1.10
dpa app promote -b 192.168.1.10 -u DOMAIN\pault -p \\mymachine.emc.com\shared
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Note: The DPA services must be running if you want to start the DPA web console.
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Examples
# dpa application status
EMC Data Protection Advisor
The status of the Application Service is RUNNING
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Note: Restart the Datastore server for the new parameters to be applied. Subsequently,
restart the connecting Application service.
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Command options
--platform — Include platform version info
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Examples
# dpa application version
[INFO] Version for Apollo EAR is 1.0.0.3304
[INFO] Version for Controller RAR is 6.0.0.69338
[INFO] Version for DPA EAR is 6.0.0.69338
[INFO] Version for Remotex EAR is 1.0.0.3304
[INFO] Version for UI WAR is 6.0.0.local
After you start, stop, or restart a service, it might take a number of minutes to complete
and might not result in an immediate state change.
Command options
--bind <IP_address> — Set the bind address for the Datastore service. The default is
127.0.0.1
--bind cannot be specified with --add or --delete.
Examples
dpa datastore --add 192.168.1.10
dpa ds con --bind 192.168.1.1
Command options
--pipeline — Export to pipe
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Examples
C:\Program Files\EMC\DPA\services\bin>dpa datastore export C:\
Where <file name> is a previously exported Datastore file. The import command replaces
the existing Datastore server contents with the contents contained in the Datastore export
file.
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
<import_file name> — File name of the exported file to import
Examples
# dpa datastore import datastore-2013-02-20-1205
EMC Data Protection Advisor
Datatstore imported from file : datastore-2013-02-20-1205
Imported to the datastore successfully
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Command options
--addSlave (-a) <hostname/IP of SLAVE> — Adds a Slave Datastore to a Master Datastore
--deleteSlave (-d) <hostname/IP of SLAVE> — Deletes a Slave Datastore from a Master
Datastore
--role (-r) MASTER — Redefines the role of Slave Datastore to Master Datastore
--role (-r) SLAVE <IP of MASTER> — Redefines the role of Master Datastore to Slave
Datastore
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Examples
# dpa datastore status
EMC Data Protection Advisor
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Note: Restart the Datastore for the new parameters to be applied. Subsequently, restart
the connecting Application service.
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Examples
# dpa service status
EMC Data Protection Advisor
The status of the Datastore Service is RUNNING
The status of the Application Service is RUNNING (STARTING ...)
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Command options
--help — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
IMPORTANT
To commit the data to the DPA server, the installed agent must have previously been
started and successfully registered with the DPA Server. However, it need not be currently
running in order to load the historical data.
Do not run this command twice within the same date span because doing so introduces
duplicate data into the database.
Each backup module has an equivalent executable in the installed Agent's bin directory,
<DPA_HOME>/agent/bin directory, where <DPA_Home> is the location of the DPA
installation.
The following example collects backup job data run on a NetWorker server:
Example <install_dir>/agent/bin/dpaagent_modnetworker -c -f jobmonitor -t
NetWorkerServer_IP -B "01/01/2012 00:00:00" –E "01/01/2012 00:00:00"
Running the executable with the -? parameter shows the valid command line options.
Module options applicable to the request (eg. timeformat) might also need to be specified
explicitly on the command line in order to ensure consistent behaviour with "normal" data
collection. Specifically, in the case of the DataProtector jobmonitor request, the
occupancy option must be specified explicitly if you want historic data to be included in
occupancy calculations. The DPA Data Collection Reference Guide provides more
information on options. The “Job Monitor” section provides more information on the
occupancy option.
To load historical backup data, run the agent binary from the command line with the
following parameters: You should specifically use:
◆ -f <function name> — Name of data gathering function to execute. Always jobmonitor.
Mandatory.
◆ -t <target host> — Host address of backup Application server. The default is localhost.
◆ -B <start time> — Start time from which to gather backup jobs. The format is
dd/mm/yyyy hh:mm:dd.
◆ -E <end time> — End time from which to gather backup jobs. The format is dd/mm/yyyy
hh:mm:dd.
The start and end times can also be in UNIX epoch time format.
If <start time> is specified and <end time> is not, <end time> is set to the current time.
This includes all the backup jobs that ended after <start time>.
If <end time> is specified and <start time> is not, <start time> is set to 0. This includes all
the backup jobs that end before <end time>.
◆ -i — TSM instance name (TSM only).
◆ -l <log file name> <log file path and name>- Name of the log file only or name and path
of log file to generate when running the command to load historical data.
The default log file location is the location from which the command is run.
◆ -U — Username to connect to the backup application (TSM and Avamar only).
◆ -P — Password to connect to the backup application (TSM and Avamar only).
◆ -c- Commit — Instructs the module to send the data to the DPA Server. Running the
command without the -c flag can be used for troubleshooting DPA data collection.
The following example collects backup job data run on an Avamar server:
Example:
dpaagent_modavamar.exe -f jobmonitor -t De-dup-muc.corp.emc.com -U viewuser -P
viewuser1 -c -B "01/01/2012 00:00:00" -l /tmp/mod_avamar.log
CHAPTER 3
Environment discovery in DPA
73
Environment discovery in DPA
Figure 2 Relationship between DPA Application nodes and DPA Agents monitoring applications
Step Description
Check licenses Check that the licenses to monitor your device, host, or environment have
been purchased and installed. See step 1 on page 75 .
Install the agent If you are monitoring the object from a host other than the DPA server
host, you need to install a DPA Agent. See "DPA Agent installation"on
page 22.
Install third-party This step is required for remote or agentless (proxy) data collection.
binaries or define the You might need to install binaries on the DPA host or the remote agent
object for monitoring host to connect to the monitored object. You also might need to define an
account or connection on the monitored object.
The following sections describes the prerequisite configuration for all
objects:
• "Configuring application hosts for monitoring"on page 78
• "Configuring storage arrays for replication analysis"on page 78
• "Monitoring data protection servers"on page 81
• "Monitoring Databases"on page 92
• "Monitoring EMC RecoverPoint"on page 96
• "Gathering data from operating systems"on page 97
• "Monitoring tape libraries"on page 100
• "Switches and I/O Devices"on page 101
• "File Servers"on page 103
• "Backup appliances"on page 103
• "Monitoring Oracle ACSLS"on page 104
• "Disk management servers"on page 104
• "Monitoring VMware environment"on page 104
Create or modify the A credential stores the information used to connect to the monitored
DPA credential object. You might need to modify the default credential or create a new
one with the account details from the previous step.
Run the Discovery Use the Discovery Wizard to define objects to be monitored. Select
Wizard Inventory > Object Library > Run Discovery Wizard.
Modify the data Because database maintenance plans are not migrated, these must be
collection default reviewed to set the retention times of the data per request.
settings Data collection requests are assigned to the object created by the
Discovery Wizard. If you want to modify the default data collection, select
Admin > Systems > Manage Data Collection Defaults.
Test data collection After at least 10 minutes of letting the request run, run a report from the
object that should include data (for example, Backup Job Summary or a
configuration report).
2. If you are performing discovery on a Linux host, ensure that the libstdc++.so.6 library
is installed on the host.
3. Ensure that you take note of the connectivity details outlined in Table 25 on page 76.
It is not necessary to run the Discovery Wizard for objects that have been migrated or if
you have migrated DPA 5.x connection settings.
Table 25 Connectivity details for configuring data collection through the Discovery Wizard (page 1
of 3)
Item Value
Network configuration information for DPA server or agent if agent is remote to DPA server
Hostname
IP Address
Network mask
Gateway Address
Time zone
Use SSL?
LDAP Version
Identification Attribute
Server Name/IP
SSH Credentials
RPC Credentials
WMI Credentials
RPA Credentials
Table 25 Connectivity details for configuring data collection through the Discovery Wizard (page 2
of 3)
Item Value
PostgreSQL Credentials
Table 25 Connectivity details for configuring data collection through the Discovery Wizard (page 3
of 3)
Item Value
4. Ensure that communication between the monitored host and the recoverability
process is enabled:
• For monitoring Windows servers remotely, RPC services must be enabled and
accessible to the recoverability agent.
• For UNIX / Linux remote application monitoring, SSHD must be enabled and
accessible to the recoverability agent.
• For UNIX / Linux remote application monitoring, FTP/Telnet services must be
enabled and accessible to the recoverability agent.
Port
DPA connects to the VNX/CLARiiON on TCP port 443. However, if the VNX/CLARiiON is
configured to use port 2163, use port 2163.
Discovering
EMC VNX/CLARiiON storage arrays must be monitored remotely from an agent that runs on
a different host, such as the DPA server. This is also known as the SE host or Connector.
The SE host can be used for discovery through a DPA Agent installed on it or through an
agentless mechanism that requires a privileged user's credentials.
DPA discovers all of the storage arrays that are being managed and creates objects in the
object library inventory.
You need to supply the name of the host on which EMC Solutions Enabler (SE) is installed.
3. Create a text file with the following CLARiiON information by specifying one line per
VNX/CLARiiON:
<SPA IP> <SPB IP> <Username> <Password>
where
• <SPA IP> is the IP address of the first controller (SP-A).
• <SPB IP> is the IP address of the second controller (SP-B).
• <username> and <password> are the account name and password of a
VNX/CLARiiON user with view permissions.
The first field must be the first VNX/CLARiiON controller, followed by the second
controller.
Give the complete path, including the file name, to the file as a parameter in the
<filename> option. The best location is one that is near the SE installation, so that
you can use and monitor it for future needs.
4. If the Base license of SE exists, run the following command on the Solutions Enabler
host to register the VNX/CLARiiON:
symcfg disco -clar -file <file name>
5. If the Base license of SE does not exist, copy the ClarApiDiscovery executable file from
the following directory to the SE host:
Windows
C:\Program Files\EMC\DPA\services\agent\win-x86\policyimport-clar\
Linux/UNIX
/opt/emc/dpa/services/agent/<OS - e.g. linux>/policyimport-clar/
to the SE host.
6. Run the following command:
Windows
ClarApiDiscovery.exe REGISTER -file=<file name>
UNIX
./ClarApiDiscovery REGISTER -file=<file name>
8. If the VNX/CLARiiON appears in the list, run the Discovery Wizard in DPA and configure
the VNX/CLARiiON.
Discovering
EMC Symmetrix storage arrays must be monitored remotely from an agent that runs on a
different host (such as the DPA server).
To configure multiple hosts and multiple storage arrays, use the Discovery Wizard. DPA
discovers all of the storage arrays that are being managed and creates objects in the
object library inventory.
You must supply the name of the host on which EMC Solutions Enabler is installed.
In order for Solution Enabler to see Device Groups which are stored locally by default on
Solution Enabler, you must open Global Name Services in Solution Enabler options file, as
follows:
1. Open option file under /./emc/API/symapi/config/
2. Find the line #SYMAPI_USE_GNS = ENABLE and unremark it so that it is:
SYMAPI_USE_GNS = ENABLE
Port
DPA connects to the VPLEX on TCP port 443.
Discovering
EMC VPLEX storage arrays can be monitored from the DPA Server or remotely from any host
that has DPA Agent installed.
DPA discovers all of the storage arrays that are being managed and creates objects in the
object library inventory.
Configuring storage arrays that use EMC RecoverPoint to gather replication data
If your VNX/CLARiiON or Symmetrix storage arrays are replicated with EMC RecoverPoint,
DPA provides replication analysis for RecoverPoint replication operations.
To perform replication analysis for RecoverPoint, you have to configure the VNX/CLARiiON
or Symmetrix storage arrays and the RecoverPoint host in DPA in the correct order.
To gather RecoverPoint replication data:
1. Use the Discovery Wizard to create the host object for the Solutions Enabler host that
is connected to the storage array replicated with RecoverPoint.
2. Discover the arrays attached to the host.
3. Configure the Symmetrix or VNX/CLARiiON arrays by using the Discovery Wizard.
4. Import replication policy data from the storage arrays.
5. Configure the EMC RecoverPoint appliances’ data monitoring, as described in
"Monitoring EMC RecoverPoint"on page 96.
6. Ensure that the RecoverPoint Configuration request is assigned to the RecoverPoint
appliance object that handles replication for the storage array. Run this request.
7. After the RecoverPoint Configuration request is run and sufficient time has passed,
DPA should have begun gathering replication analysis data for RecoverPoint. Reports
can be run from the storage array objects and the Replication Analysis area will show
the mapping of storage and recovery points.
To enable the Clone Operations report to display data when the source grid is selected as
the scope for the report, you must monitor the source Avamar grid using the Job Monitor
Note: The agent must be installed on a host that is in the same time zone as the Avamar
server.
Before you start the Discovery Wizard, you will need to know the resolvable hostname or IP
address of the Avamar server.
Before you start the Discovery Wizard, you will need to know the resolvable hostname or IP
address of the NetWorker server.
Note: The status request cannot be assigned when monitoring the HP Data Protector
server remotely, as it relies on a command (omnisv) that is only available on the Data
Protector server.
If you are monitoring a Data Protector environment that uses the Manager of Managers
option, you must configure DPA as if monitoring a remote Data Protector server.
To monitor HP Data Protector remotely, the HP Data Protector client software must be
installed on the agent’s host and the client must be configured on the Data Protector Cell
Manager so that it has permission to run reports. "Monitoring HP Data Protector
remotely"on page 85 provides information on testing connectivity from the agent host.
You can use the DP_OCCUPANCY_DB_PATH environment variable for the DPA Agent to
control where the occupancy data is stored when you run the jobmonitor request. If you
do not use the DP_OCCUPANCY_DB_PATH environment variable, then the system stores
the occupancy data in the temporary directory.
Ensure that you include the trailing backward slash (/) character in the above path.
4. Restart the DPA Agent.
Ensure that you include the trailing backward slash (/) character in the above path.
9. Restart the DPA Agent.
omnirpt patch
HP has released a patch for Data Protector 6.1 that must be installed on a Data Protector
6.1 installation before it can be supported by DPA.
Table 26 on page 85 lists the required patch ID by platform.
Platform Patch ID
Windows DPWIN_00417
Linux DPLNX_00077
Solaris DPSOL_00371
The patch is available for General Release from HP from www.hp.com. Type the patch ID
into the Search field of the HP home page. You are directed to the patch download page.
5. Add the user to a Data Protector User Group that has Reporting and Notifications and
See Private Objects permissions.
Typically, this means adding the user to the admin group. However, to restrict a user
from inheriting other administrator privileges, create a new group with Reporting and
Notification and See Private Objects permissions and add the user to that group.
6. Verify that remote authentication privileges are set up correctly by running the
following command from the Agent’s host:
omnirpt -tab -report list_sessions -timeframe 06/01/01 12:00
06/01/30 12:00
If successful, this command returns a list of all the sessions that have run on the Data
Protector server during the time period specified. If an error indicating insufficient
permission to run reports appears, review the configuration settings on the Data
Protector server.
◆ On UNIX, DPA looks first in /opt/GESedt-acsls/bin for elm.conf. If not found, on AIX
DPA looks in /usr/lpp/dtelm/bin. On other flavours of UNIX/Linux, DPA looks in
/opt/OMIdtelm/bin.
If the elm.conf file is not present in these directories, the registry variable (Windows) or
environment variable (UNIX) AGENT_TSM_ELMCONF_FILE NAME can be set to the location
of elm.conf if required.
DPA reads from the rc.edt file at the following location:
◆ On Windows, DPA looks up the location specified in the environment variable
EDT_DIR.
◆ On UNIX, DPA looks first in /opt/GESedt-acsls/SSI for rc.edt. If not found, on AIX DPA
looks in /usr/lpp/dtelm/bin. On other flavours of UNIX/Linux, DPA looks in
/opt/OMIdtelm/bin.
If the rc.edt file is not present in these directories, the registry variable (Windows) or
environment variable (UNIX) AGENT_TSM_RCEDT_FILE NAME can be set to the location of
rc.edt if required.
Note: Because a TSM environment using EDT requires the agent to read from these files to
collect configuration data, the agent must be on the same server as the TSM server.
Note: The library must be for the same platform as the DPA Agent. Example, if a 64- bit
Windows DPA agent is installed, then you must use the 64-bit Windows Oracle library.
You can download the Oracle Database Instant Client for free at
http://www.oracle.com/technetwork/database/features/instant-client/index.html
While installing the DPA Agent, you are prompted to specify if you want to utilize the Agent
to monitor Oracle and if so, provide the location of the Oracle client libraries. This action
sets a registry setting (on Windows) or modifies an environment variable in the dpa.config
file (on UNIX). If you change the location of the libraries after the install process is
completed, then you need to perform these steps manually.
Manually configuring DPA Agent to monitor Oracle database and Oracle RMAN
◆ To manually configure the DPA Agent to monitor Oracle RMAN:
On Windows, set the HKLM/Software/EMC/DPA/Agent registry of value type REG_SZ
as follows:
Value name: ORACLE_CLIENT_PATH
Value data: <directory containing the Oracle client libraries - oci.dll>
Note: The registry key is created if you have selected the Oracle database to be monitored
option while installing the DPA Agent. If the registry key is not created, you must create it
manually.
Unix
If the NetBackup Master Server is running on a UNIX computer, the name of the host on
which the agent is running must be added to the bp.conf file on the NetBackup Master
Server. To add the host:
1. Open /usr/openv/netbackup/bp.conf for editing and add the following line:
SERVER = Agenthost
where Agenthost is the agent’s hostname. The agent’s hostname must be resolvable
by the Master Server.
2. Restart NetBackup on the Master Server for the changes take effect.
Windows
If the NetBackup Master Server is running on a Windows computer, add the name of the
agent host through the NetBackup Administration Console:
1. On the NetBackup Server, start the NetBackup Administration Console and open the
Master Server Properties dialog box:
• Select Netbackup Management > Host Properties> Master Servers.
2. Double-click Host in the right-hand panel.
3. In Master Servers Properties, Servers field, type the name of the agent host to the list
of additional servers that are allowed to access the Master Server.
4. Click OK.
5. Restart the NetBackup services. Alternatively, reboot the machine to activate the
changes.
Note: It is important that the line is inserted at the correct location in the file,
otherwise it might not take effect.
• If you are monitoring PureDisk with an agent installed on the PureDisk server, add
the following line:
-A INPUT –p tcp –m tcp –-dport 3741 –j ACCEPT
• If you are monitoring PureDisk from an agent running on a different host, add the
following line:
-A INPUT –p tcp –m tcp –-dport 10085 –j ACCEPT
2. If the DPA agent is installed on the PureDisk server, add the following line to the rules
file (three columns separated by a tab):
This allows connections from the controller host to the DPA agent on port 3741 on the
PureDisk server.
3. If the DPA agent is installed on a remote host, add the following line to the rules file
(three columns separated by a tab):
tcp {agent_host_ip} 10085
This allows connections from the agent host to the postgres database on port 10085
on the PureDisk server.
You can specify a single host or an entire subnet (by including a /mask), as in the
following example:
tcp10.64.205.0/24 10085
Note: Microsoft Exchange can only be monitored for replication analysis, and for system
information from the Exchange server host.
Monitoring Databases
This section describes how to monitor Oracle, SQL Server, and PostgreSQL databases.
Monitoring Oracle
An Oracle database can be monitored from an agent running on the same host as the
Oracle server, or from an agent running on a different host, such as the DPA server.
◆ libclntsh.so
◆ libocci.so
For example, if you install version 11.1 of Oracle, ensure the libclntsh.so is a symbolic link
to the libclntsh.so.11.1 library file.
Replication analysis
To monitor an Oracle database for replication analysis, the Agent must connect to the
database as an Oracle user able to perform selects on the following tables and views:
◆ DBA_DATA_FILES
◆ DBA_TEMP_FILES
◆ DBA_TABLESPACES
◆ V_$DATAFILE
◆ V_$LOGFILE
◆ V_$CONTROLFILE
◆ V_$LOG_HISTORY
◆ V_$ARCHIVED_LOG
◆ V_$INSTANCE
◆ V_$DATABASE
◆ V_$PARAMETER
◆ DICT
◆ DBA_TAB_COLUMNS
When monitoring Oracle on a Windows platform, the operating system user specified in
the Credential must belong to the group ORA_DBA. On UNIX, if UNIX authentication is
used, no further definition is required in the database.
Agent requirements
The Agent needs to be able to connect to the SQL Server master database in order to
gather the data required. The Agent can either:
◆ Use SQL Server Authentication using the credentials of the request (if set).
◆ Use SQL Server Authentication using the credentials against an explicit master
database in the list of databases to be monitored (if set)
◆ If these are not set, the Agent uses Windows Authentication using the logon ID of the
agent process.
If none of these are sufficient to connect to the master database, the request will not
gather data.
However, to grant VIEW DEFINITION privileges for only the specific databases that you want
to monitor, connect to the SQL Server as an administrator and run:
GRANT VIEW SERVER STATE TO [login\domain]
GRANT VIEW DEFINITION ON DATABASE :: <dbname> TO <username>
Replication analysis
The DPA server must connect as a database user with connect privileges for all of the
databases and write privilege for the TEMPDB database. For Windows authentication, the
user must be able to connect to all SQL Server databases and should have write privilege
for the TEMPDB database.
Monitoring PostgreSQL
A PostgreSQL database can be monitored from an Agent running on the same host as the
PostgreSQL database or from an Agent running on a different host, such as the DPA server.
However, DPA must not connect with the RecoverPoint user boxmgmt because user
boxmgmt is reserved for starting the RecoverPoint installation manager automatically.
Module Description
UNIX
To perform system monitoring on UNIX computers, install an Agent on the host that is to
be monitored. It is not possible to gather system information remotely from UNIX
computers.
# Defaults specification
# User privilege specification
root ALL=(ALL) ALL
CMGU ALL=NOPASSWD:CMGEMC
# Uncomment to allow people in group wheel to run all commands
# %wheel ALL=(ALL) ALL
# Same thing without a password
# %wheel ALL=(ALL) NOPASSWD: ALL
# Samples
# %users ALL=/sbin/mount /cdrom,/sbin/umount /cdrom
# %users localhost=/sbin/shutdown -h now
#cmguser ALL=(ALL) NOPASSWD: ALL
Windows
To gather performance data from a Windows host, Windows Management Infrastructure
(WMI) must be installed on the Windows host you are monitoring.
It is possible to gather all system monitoring information remotely from Windows
computers, with the exception of Fibre Channel HBA information. To gather Fibre Channel
HBA information, the agent must be installed on the computer. "Monitoring a Windows
host remotely"on page 99 provides more details on the steps required to monitor a
Windows host remotely.
To set up system monitoring for a system on which an agent is installed, assign the system
monitoring requests to the host or group to monitor.
7. Click Apply. If WMI can connect, data from the application host is displayed.
• To enable or disable SNMP alerts, select ON or OFF in the Alerts Enabled field.
• In the Manager field, type the SNMP server address.
• In the Public Name field, type the name of the read-only SNMP community.
• In the Private Name field, type the name of the read/write SNMP community.
3. Click Submit and review the changes.
4. Type the password and click Confirm. Redirect the browser if required.
5. Click Done to reboot.
Monitoring the Oracle SL24 Tape Autoloader and SL48 tape library
Configure the Remote Management Interface (RMI) to enable SNMP for the Oracle
StorageTek SL24 Tape Autoloader or SL48 Tape Library. To enable SNMP:
1. In the RMI, navigate to Configuration > Network.
2. Ensure the SNMP Enabled checkbox is enabled.
3. The Community Name string must be contained in the credentials used to connect to
this Tape Library in DPA.
4. Click Submit and review the changes.
Monitoring IP switches
When you are specifying a hostname, ensure the name of the switch is resolvable on the
Agent’s host.
File Servers
DPA supports monitoring EMC File Storage.
Backup appliances
DPA supports monitoring EMC Data Domain.
1. Log on to the EMC Data Domain appliance console using the sysadmin account.
2. Type the following command to check the existing configuration:
snmp show ro-communities
snmp add ro-community <string> hosts <host IP address>
where <string> is the selected community string (for example, public) and <host IP
address> is the IP address of the DPA Agent that you are using to monitor the Data
Domain. You will have to disable and re-enable SNMP for the new string to take effect.
snmp disable
snmp enable
If you are not using a community string of public, you must change the community
string used in the EMC Data Domain Credential.
3. Edit the EMC DPA Data Domain SSH Credential to specify an SSH username and
password configured on the Data Domain device. Go to Admin > System > Manage
Credentials in the DPA web console.
SNMP settings can also be set through the System Settings tab of the EMC Data Domain
Enterprise Manager interface.
◆ The Discovery Wizard can be used to add a vCenter server to DPA. Go to Admin >
System > Discovery Wizard > Virtualization Management.
◆ To add a vCenter server, you must provide the vCenter hostname and credentials for a
vCenter user with administrative privileges.
◆ You can select whether to monitor the vCenter host only or to also monitor the virtual
machines connected to the vCenter host.
• If you select to monitor virtual machines, DPA queries the vCenter Server and
displays a list of virtual machines. Note that the discovery process can take a while
if there are a large number of virtual machines configured on the vCenter server.
• For each virtual machine you can select whether you wish to discover the host in
DPA. Discovering the host adds the host to the DPA inventory.
• For each virtual machine selected for discovery, you can select whether to enable
Host System Monitoring., which gathers configuration, performance and analysis
data; and Replication Monitoring, which enables replication analysis.
• For each virtual machine selected for Host System Monitoring, you can specify
which DPA Agent should be used to monitor the virtual machine. You can change
the DPA Agent for multiple machines simultaneously by using CNTRL-Click or
SHIFT-Click to select multiple systems.
– Windows virtual machines can have Host System Monitoring performed using a
remote DPA Agent such as the DPA Agent installed on the DPA Server; or a local
agent, such as DPA Agent installed on each Windows virtual machine.
– UNIX / Linux virtual machines must have a DPA Agent installed on the virtual
machine for Host System Monitoring, on a local agent.
• You must provide Windows credentials for each Windows Virtual Machine being
monitored with a remote agent. The credentials can either be a local administrator
or a domain administrator. You can change the credential for multiple machines
simultaneously by using CNTRL-Click or SHIFT-Click to select multiple systems.
• Discovered virtual machines are displayed under the vCenter object in DPA and by
default will also be added to Configuration / Servers / Application Servers group.
You can change and add groups for the virtual machines to appear. Go to Admin >
System > Discovery Wizard > Destination Group.
◆ The final screen of the vCenter Discovery Wizard displays a summary of options
selected. Clicking Finish adds the objects to DPA and enables monitoring options
selected.
Monitoring backup servers in a Symantec Cluster Server and Microsoft Cluster Server
environment
To monitor backup servers in Symantec Cluster Server and Microsoft Cluster Server
(MSCS) environments, an Agent must be installed within the clustered environment so
that only one version of the Agent is running on a physical host. This Agent should be
configured within the DPA Server as the name of the Cluster Alias itself rather than that of
the physical host that it is running on.
Supported platforms
◆ Symantec Cluster Server is supported on Linux and Solaris
◆ MSCS is supported on Windows
The EMC Data Protection Advisor Software Compatibility Guide provides more information
on supported platform versions.
Groups
A group is a collection of objects. For example, you can create a group of objects that are
used by an application. This way, when you apply a policy to the group, the policy is
applied to all of the objects within the group.
Configuration group
The Configuration group is created by default. The Configuration group is created with an
initial structure that groups the data protection environment into Servers, Switches, and
Storage. All data protection hosts, devices, and applications discovered by the Discovery
Wizard are first added to the Configuration group. Objects that are removed from the
Configuration group are not deleted. Objects removed from Configuration group appear
under Objects Not In Groups.
Object attributes
Object attributes extend the information that DPA holds about an object. After a custom
attribute is created, the attribute can be enabled for any valid objects as per custom
attribute settings and a value can be assigned.
When creating or editing an object, attributes are filtered to be associated with one or
more specific types of objects, and only to objects with an existing attribute that matches
a given value.
For example, an Asset Tag attribute might be created to represent an asset identifier for
the physical components of an operating environment (such as hosts, storage arrays, and
switches). The Asset Tag attribute need not be assignable to logical components like
database instances or processes.
In the attribute definition, the Asset Tag is configured to be associated with a subset of
physical object types. You can further configure this attribute to only be associated with
physical object types that have an attribute of Business Unit, for example.
Smart groups
Smart groups allow users with administrative privileges to create groups that are
populated dynamically with information from the results of DPA reports. A smart group
runs a custom report and then creates objects based on the results of the report.
The main benefit of smart groups is that they provide high levels of flexibility.
Administrators can set up smart groups to dynamically create lists of objects that match
specific business and technical criteria.
Children of Smart Groups are not filtered by role permissions. Even if you are not allowed
to see some hosts in the inventory, you can still see them in the Smart Group. Hosts that
are filtered by role permission remain not viewable from internal Smart Groups, such as All
Hosts.
To create a smart group, select Inventory > Group Management. Click Create Group and
then Create Smart Group.
Observe the following consideration when creating Smart Groups: Avoid creating Smart
Groups that contain themselves, either directly or through other Smart Groups, when
expanded. The DPA web console hangs if Smart Groups are created under these
conditions. This is pertaining to problem DPA-26241.
Policies
Data Protection Advisor policies are a collection of user data about how backup and
replication should operate in the environment (recoverability and data protection policies)
or about the cost of storage and data protection operations (chargeback policies).
Recoverability, backup, and service level management reports then show how the
operations in the environment compare to the policy settings, for example, gaps in the
recoverability chain for a storage array, or if a backup server is not meeting a Recovery
Point Objective.
DPA provides the following policy types:
◆ Analysis policies - are a collection of one or more rules that are used primarily for
generating alerts. Alerts are displayed by default in the Advisor section. You can edit
the policy to send events to emails, scripts, SNMP traps, or Windows Event Logs.
"Generating events from policies"on page 124 provides more information.
◆ Protection policies - are a collection of user data about how backup and replication
should operate in the environment. These policies consist of recoverability and
protection rules. These are used primarily for generating alerts. Alerts are displayed
by default in Alerts and in the Replication Analysis of the Advisor section.
◆ Chargeback policies - are used to determine the cost of storage and data protection
operations for chargeback reports.
By default, analysis, protection, and chargeback policies are off for all objects and groups.
Analysis policies
An analysis policy is a collection of one or more rules that is assigned to an object or
group. Rules contain the logic for when to issue an alert. The analysis engine compares
monitored data to the conditions in a rule, and triggers alerts when a rule is matched.
Event-based rules trigger an alert in response to data that is streaming into the DPA server.
Schedule-based rules periodically compare data in the DPA Datastore server against rules
to detect a match. Alerts can contain dynamic textual information and might include
populated links to reports. Only analysis policies can generate alerts.
File system May Be Generates alerts if a file File system Max Predicted
Full In 2 Weeks system utilization will filling up Utilization - 100%
exceed 90% in the next 2 Number of hours
weeks. to forecast 336
Tape Pool May Be Generates alerts if there will Running out of Maximum
Out of Empty Tapes be no empty tapes empty tapes Predicted Count -
within 6 weeks available in a tape pool 0
within 6 weeks. Number of hours
to forecast - 1008
TSM Database May Generates an alert if the TSM Database Number of Hours
be Full in Two TSM Database is predicted Filling Up to Forecast - 336
Weeks to reach 100% usage within Maximum
2 weeks. Predicted
Utilization - 100
TSM Recovery Log Generates an alert if the TSM Recovery Number of Hours
May be Full in Two TSM Recovery log is Log Filling Up to Forecast - 336
Weeks predicted to reach 100% Maximum
usage within 2 weeks. Predicted
Utilization - 100
Change management
Change management analysis policies alert about changes in the environment. Table 29
on page 112 describes these jobs.
Tape Drive Serial Generates alerts if the serial Tape drive serial N/A
Number Changed number of a tape drive has number changed
changed.
Configuration
The configuration analysis policies monitor the environment for device or application
configuration issues. Table 30 on page 113 describes these jobs.
Table 30 Configuration
Data protection
The data protection analysis policies monitor the environment for exceptions related to
backup and recovery issues. Table 31 on page 114 describes the monitored jobs.
Full Backup Less Generates alerts if a Full Full backup Days of History
Than 50% of backup is less than 50% of smaller than - 14 days
Average Size its usual size. average Deviation -
50%
Full Backup Not Generates alerts if a host Full backup not Maximum
Succeeded for At has not had a successful occurred for many Days Not
Least 14 days full backup in the last 14 days Backed Up -
days. 14
Licensing
The licensing analysis policies monitor the environment and generate alerts about
licensing issues. Table 32 on page 115 describes these policies in more detail.
Table 32 Licensing
Performance
The performance analysis policies monitor the environment and generate performance
problem alerts. Table 33 on page 116 describes these jobs in detail.
Table 33 Performance
Backup Less Than Generates an alert if the Backup slower Days of history -
50% of Average performance of a backup than average 14
Speed job is 50% less than its Deviation - 50%
average over the last 2
weeks.
Fileserver Cache Hit Generates alerts if the Fileserver cache Minimum cache
Rate Below 80% cache hit rate of a fileserver hit rate low hit rate - 80%
drops below 80%.
Provisioning
The provisioning analysis policies generate alerts about events that might require
provisioning operations. Table 34 on page 116 describes the jobs.
Table 34 Provisioning
File system Peak Generates alerts if the peak File system Days to examine
Snapshot Usage snapshot usage over the snapshot space usage - 14
Below 80% last 14 days is less than under utilized Minimum peak
80%. snapshot usage -
80%
Resource utilization
Resource utilization analysis policies generate alerts about events that have occurred
because of resource utilization problems within the environment. Table 35 on page 117
describes these jobs in detail.
Disk Activity At Least Generates an alert if a disk Disk pegged Maximum Disk
90% For Last 30 on a host is greater than Busy Percentage
Minutes 90% busy for over 30 - 90%
minutes. Number of
minutes -
defaults to 30
minutes
File system File Generates an alert if the File system file Maximum file
Utilization High number of files on a file utilization high system file
system is greater than 90% utilization -
of the max number allowed. 90%
Status
Status category analysis policies generate alerts when there is concern of the current
status of a monitored device or application match. Table 37 on page 119 describes status
jobs.
Agent Log File Alerts on any message that Agent Log Messages N/A
Message appears in the agent log
files.
Fibre Channel Port Generates an alert if a Fibre Fibre Channel port N/A
Changed State Channel port has changed changed state
state.
Tape Drive Needs Generates an alert if a tape Tape drive needs N/A
Cleaning drive needs cleaning. cleaning
Tape Drive Not Generates an alert if a tape Tape drive not okay N/A
Okay drive is reporting a status
other than OK.
Tape Library Not Generates an alert if a tape Tape library not okay N/A
Okay library is reporting a status
other than OK.
Xsigo Fan Less Generates an alert if the Xsigo Fan Speed Percentage to
Than 90% of speed of a fan on a Xsigo Less than Expected Check -
Normal Speed Director falls below 90% of defaults to
the normal speed. 90%.
Troubleshooting
The troubleshooting analysis policies provide help for troubleshooting problems with the
environment. Table 38 on page 121 describes these jobs.
Disk Failed For More Generates an alert if a Disk failed for a Maximum
Than 48 Hours disk is in a failed state number of hours failure time -
for more than 48 hours. defaults to 48
hours
Protection policies
Protection policies are used to define service level agreements and exposure reporting to
calculate whether a backup ran in its backup window and to calculate whether an
application or host is meeting its recovery time objective (RTO) and recovery point
objective (RPO). Protection policies also determine how an application, host, or device
should be replicated or backed up. Policies are assigned to objects and consist of a set of
rules that dictate:
◆ For replication: the type of copy, the replication level, and the schedule.
◆ For backups: the level of backup and the schedule.
DPA reports then compare the protection policy for an object to the actual replication or
backup taking place to display the level of compliance with policy.
Recoverability checks
Recoverability checks are additional consistency checks that are performed by DPA on an
environment, if recoverability analysis is configured. A recoverability check verifies that
the storage and recoverability environment is configured to a user’s particular
requirement (for example, Disaster Recovery).
If enabled and an inconsistency is detected, a recoverability check generates an exposure
just like an exposure generated by a Protection Policy breach or a Recoverability request.
Recoverability check exposures are displayed in the Replication Analysis area and the
Exposure reports.
There are three system recoverability checks that identify gaps, as described in Table 39
on page 122.
Consistency Group Check Checks whether the devices of the recovery point are
configured in the same consistency group and the consistency
group is enabled. If no consistency group exists, a consistency
violation gap is generated for the recovery point.
Consistent Device Replication Checks whether the consistency option was used when the
Check images were created, when applicable. This is a best practice
check. If the consistency option was not used, then a
Consistency Violation gap is generated for the recovery point.
DR Host Visibility Check Checks whether the devices of a recovery point are mapped,
masked, and visible to the Disaster Recovery host. Otherwise, a
Consistency Violation gap is generated.
Chargeback policies
Chargeback reports provide the ability to perform a financial cost analysis for backups,
restores, and data protection replication operations in a customer’s environment. A cost is
calculated for each backup client and can be charged back to the business unit that is
responsible for that client or set of clients.
DPA calculates chargeback using two models: one for data backup and restore, and one
for the protection and replication of storage data by EMC RecoverPoint. Chargeback is
calculated for clients based on the inputs for each type.
Backup chargeback
Backup chargeback is broken out by cost per GB backed up and other backup costs.
Cost Per GB Backed Up uses the following inputs:
◆ Base Size - Baseline backup size in GB for base costing.
◆ Base Cost - Total cost for backup up to the base size specified.
◆ Cost of Each Additional GB - Additional cost per GB for backups greater than the base
size
Other Backup Costs are derived from the Chargeback Policy and use the following inputs:
◆ Cost Per Backup - the cost per backup (derived from the chargeback policy).
◆ Cost per GB Retained - the cost per gigabyte stored (derived from the chargeback
policy).
◆ Cost Per Restores - the cost per restore (derived from the chargeback policy).
◆ Cost per GB Restored - the cost per gigabyte restored (derived from the chargeback
policy).
◆ Cost Per Tape - the cost per tape used for backup (derived from the chargeback policy).
Storage chargeback
Storage chargeback is broken out by cost per GB stored, cost per GB replicated, and
snaps.
Cost Per GB Stored uses the following inputs:
◆ Cost Based On - chargeback calculated on either storage used or storage allocated.
◆ Base Size - Amount of base storage space allocated in GB
◆ Base Cost - A one-off price for the base size
◆ Cost of Each Additional GB - the price per GB after base size is exceeded
Cost Per GB Replicated uses the following inputs:
◆ Base Size - Amount of base storage space allocated in GB
◆ Base Cost - A one-off price for the base size
◆ Cost of Each Additional GB - the price per GB after base size is exceeded
Snaps uses the following inputs:
◆ Cost Per GB - the price per GB
A Chargeback Policy allows you to specify a value for each of these parameters. The total
cost for a client is calculated by adding each of the different cost elements. For example, if
you want to implement a chargeback model where you charge $5 for each backup that
took place and $0.20 for each GB that was backed up, then you can specify values for
these fields in the chargeback policy but not specify values for the other parameters.
Backup client objects are assigned a cost center, which allows Chargeback costs to be
calculated by cost center. A default cost center exists for objects that have not been
assigned a cost center.
Multiple chargeback policies can be created and different clients or groups of clients can
have different policies assigned to them. For example, if you wanted to calculate the
chargeback cost for one group of backup clients based on the number of backups
performed and another group based on the number of tapes used during the backup
process, two chargeback policies can be created and associated with each group of
clients.
Parameter Description
First occurrence Timestamp that details the time that this alert first occurred.
Last occurrence Timestamp that details the time that this alert last occurred.
Table 41 on page 126 describes the arguments that are passed to a script in an alert
action.
Argument Description
$0 Event node.
$1 Event message.
$10 Source node (the node to which the analysis was assigned).
Rule Template
A rule is the set of instructions used by the DPA Analysis Engine to determine whether a
condition has been met and if an alert is generated. For example, the file system filling up
rule contains the set of rules to determine if any file systems will exceed the threshold at a
certain point in the future.
A rule is used by an Analysis job to perform analysis and alerting based on information
within the DPA database. When DPA is installed, a number of pre-defined rules are
installed that can monitor for common problems that might occur in the environment. You
can use these rules as the basis for implementing an analysis policy. DPA provides a rules
editor that you can use to create entirely new rules.
The term rule template is used to differentiate the rule definition from the rule instance.
The rule template defines the rule's logic. When a rule template is added to an analysis
policy, it becomes a rule instance (or a rule) that the Analysis Engine will run. Also, when
rule templates are added to a policy, users can specify the values for any parameters. This
allows rules to be reused by different policies.
For example A Tier 1 policy might generate an alert when disk space is 80% utilized, while a Tier 2
policy can generate an alert when disk space is 90% utilized. This can be handled with the
same rule template that uses a parameter for utilization.
Applying a policy
Policies can be applied directly to a group or an object. Policies applied directly to an
object always take precedence. When a policy is set at the group level, objects in the
group that do not have their own policies inherit the group's policy. The best practice is to
apply the policy at the highest group level. Policies cannot be applied to Smart Groups.
If an object is moved from one group to another group, the most recently applied policy is
implemented. For example, if an object is moved from Group A to Group B, the object
inherits the policy of Group B.
An administrator or any user with the Edit Node privileges can apply a policy to a group or
object.
CHAPTER 4
Uninstallation
129
Uninstallation
When uninstalling the DPA Datastore, a warning indicating that the uninstaller will remove
the features that were installed during product installation appears indicating that the
database will be removed.
Silent uninstallations
◆ On UNIX/Linux machines, start a command shell, navigate to the _uninstall directory
and type the following command:
./Uninstall_Data_Protection_Advisor -i silent
◆ On Windows machines, type the following command through the command line:
Uninstall_Data_Protection_Advisor.exe -i silent
Agent-only uninstallation
You cannot uninstall only the Agent from the DPA Application server or Datastore server
installation.
If you would like to upgrade the DPA Agent, upgrade the Agent only on the existing DPA
Application server or Datastore server installation. “” on page 24 provides information on
carrying out upgrades.
CHAPTER 5
Troubleshooting
131
Troubleshooting
Troubleshooting installation
DPA installation failure on Solaris
DPA fails to install on Solaris SPARC 64-bit with the following error message:
The included VM could not be unarchived (TAR). Please try to
download the installer again and make sure that you download using
’binary' modecopy. Please do not attempt to install this currently
downloaded copy.
Perform this procedure for installation of Solaris binaries for the DPA Agent, Server and
Migration Tools
Ensure that gnu tar is installed and available in the PATH ahead of the native Solaris
version before running the installer.
For example, through the command line,
1. cd /usr/sfw/bin/
2. ln -s gtar tar
If you are using Bourne shell, type,
export PATH=/usr/sfw/bin:${PATH}
IMPORTANT
The gtar version must be available on the Solaris host before executing the DPA 6.1
installer. Else, it will result in errors in the DPA 6.1 installation binaries.
◆ Internet Explorer in Windows server 2012 doesn't support Flash. The workaround for
this is to enable Desktop Experience in Windows server 2012.
Note: The following section describes the log file locations for a standard DPA installation.
If the default installation directory was changed during installation, the location of the log
directory will be different.
By default, logs informational, warnings, and error messages. These might not provide
enough information when troubleshooting complex problems. To change the log detail
level, select Admin > System > Configure System Settings.
Running a DPA Agent request in debug mode using DPA web console
The DPA Agent request in debug mode, also sometimes called a modtest, is a support
tool. If you are encountering problems with a Data Collection Defaults, an EMC Technical
Support Engineer might ask you to run the Agent request debug mode from the DPA web
console. You can run DPA Agent request in debug mode, download the zip file directly from
the DPA web console with no need of going to DPA Server to retrieve the zip file, and send
the zip file for analysis. The Agent request debug mode runs the selected request and
retrieves the output and the log messages, in debug log level, and stores that report xml
as a zip file to the following location: <DPA_HOME>\services\shared\modtests, where
<DPA_HOME> is the location of the DPA installation.
Consider the following when running DPA Agent request in debug mode using DPA web
console:
◆ The test cannot be run if the Collection Request is disabled.
◆ The test cannot be run if the Collection Request isn’t applicable on the object.
◆ If you are running Google Chrome: you should change the default security setting for
the URL to low:
Go to Trusted Sites, add the URL to Trusted Sites list, and set security to low.
To run a DPA Agent request in debug mode using DPA web console:
1. In the web console, select Inventory > Object Library.
2. In the Object Library, select the DPA server under All hosts.
3. In the host details window, select the Data Collection tab.
4. In Data Collection, select the Request.
5. Right-click Run and select Run in Debug.
6. Click Close to the a dialog box that appears confirming that the test is running.
7. Click History to view collected tests. The rows highlighted in orange indicate results
from a DPA Agent request in debug mode.
8. Click the test result. If a Windows Security Login appears, enter your DPA server
credentials and click OK.
9. Access the saved test result zip file in the default browser folder.
Alternatively, to access the successfully collected tests, go to
<DPA_HOME>\services\shared\modtests.
◆ An appropriate report has been run that returns no data when data should exist for the
object.
7. Set the Log Level of the process back to Info in System Settings.
8. Make a copy of the log for submission to EMC Support.
Problem Solutions
Client discovery fails: No authentication defined, or • Create a credential in DPA (Admin > System > Manage
unable to log in. Credentials) and assign it to the client.
• Check that the username and password supplied with the
credential is able to connect the client.
• Ensure su or sudo are not needed to connect, and if so that the
correct parameters are supplied in the credential.
Client Discovery fails: Failed to connect to client using • Check that the username and password supplied with the
RPC, or a specified logon session does not exist. credential is able to connect the client.
• Ensure you supplied the username along with the domain
name:
<domain>\<username > for remote computers, <computer
name>\<username> for local computers. In most cases
localhost\<username> can be used.
• Check if the host is accessible from the DPA server using the
admin share: \\hostname\Admin$
• If the error exists after you tried all the preceding actions,
change the Log on as value for the DPA server service from local
system to any other user with administrator privileges. A local
administrator also can be set.
Client Discovery failed: Failed to connect to client using • Check if the client's Name, IP, or Alias is defined correctly and
RPC. The network path was not found. reachable from the DPA server.
• Check if the host is accessible from the DPA server using the
admin share: \\hostname\Admin$
If the share is not accessible, check that it is not blocked by a
firewall.
Problem Solutions
Client Discovery failed: User does not have enough • Follow the system requirements for remote execution
privileges to get the device mapping information. permissions.
• Assign a user with administrator capabilities to the credential.
• Check that the user that connects to the client has write and
execute privileges to the path /var/tmp. (UNIX)
Client Discovery failed: Failed to send file for discovery Check for free disk space in /var/tmp.
to client using SCP
or
Failed to send file for discovery to client using FTP.
If the DPA Server is installed on Solaris host and you Ensure the DPA server is resolvable from the Windows Proxy host.
would like to run a request on a Windows host without The DPA server name might need to be added to the hosts file.
installing a local agent, you must run the request
trough a proxy (a Windows host that has an agent
installed on it).
If the proxy host does not resolve the DPA server name
correctly (DNS issues), the following error will appear in
the request history log:
"Error Running Request: No Data"
(The following error will also appear in the Agent Log:
Detail: get host by name failed in tcp_connect() )
Client Discovery fails: Error (977). Overlapped IO Verify that there is no antivirus software installed on the host.
operation in progress. Antivirus software might be blocking the irxsvs.exe operation.
Disable antivirus blocking by authorizing the irxsvs.exe file in the
anti-virus software.
Client discovery fails with the following error: Ensure that the following services are running: Server, Computer
<client_name> irx errMsg: Unable to connect Browser, and Workstation.
host:<client_name> with user:<domain>\<username>
using RPC irx output: Error (1203): No network provider
accepted the given network path.
When using sudo, the Host Config request might fail to This occurs only when the credentials are configured to use sudo.
return volume group information on AIX hosts with the Add the following line to the sudoers file: Defaults env_keep +=
following message: "ODMDIR"
SymMapVgShow exited with code 161
(SYMAPI_C_VG_NOT_AVAILABLE) SessionId: 0 - for
VG:<vg_name> with type: 2(AIX LVM) VolumeGroup
information will not be parsed.
Problem Solution
Client Discovery request is using remote execution 1. Ensure that the agent is installed on the host.
instead of using the installed agent. 2. Ensure that the DPA server is defined as the controller for the
agent.
3. Restart the agent service.
Problem Solution
Client discovery finished with warnings: • Check if the application is running and available for
Failed to discover application storage objects for connection.
application <application_name> on client • Check if the user configured in the DPA credential has enough
<client_name>. privileges to query the application's system data.
Client discovery failed: can’t connect to any IP. • Check that port 25011 from the host to the DPA server or port
135 from the Windows Proxy Collector is not blocked by a
firewall.
Client discovery finished with warnings: 1. Select Admin > System > Manage Credentials.
Home directory was not found for application. 2. Click Edit to edit the Credential.
Unsupported File System Type encountered: This file system type is not supported by DPA.
<filesystem_name>. To avoid this warning in the next client discovery, you can ignore
discovery for this file system.
Note: DPA will not display recovery data for this file system.
Client discovery failed with the error: Ensure that there is enough disk space in the host's root file
Verify that you have enough disk space and write system according to the system requirements.
permission.
or
Failed to unpack file on client <client_name>.
Client discovery finished with warnings: • Check if <home_dir> that was discovered exists on the client.
Can't find or no permission to execute file <home_dir>. • Check if the file sqlplus in the home directory that was
discovered has enough permissions for being executed by
DPA.
Client discovery finished with error: 1. In DPA, select Admin > System > Configure System Settings.
Timeout waiting for agent response on client 2. Select Server.
<client_name>.
3. Change the parameter Timeout(s) from the default 120 to a
larger value.
or
Check if the DPA server has two network cards enabled and the
client is able to reach both of them. If the client is not able to
reach one of the cards, disable this network card.
When connecting to ECC 6.1, client discovery finished 1. Run a batch file containing the following command:
with error: %ECC_INSTALL_ROOT%\tools\JRE\Nt\latest\bin
Error Import Clients for w2k3-96-52.dm1nprlab.com \java -cp
finished with errors. %ECC_INSTALL_ROOT%\ECCAPIServer\class;%ECC
Check previous error messages for further information. _INSTALL_ROOT%\ECCAPIServer\ecc_inf\exec\e
Unable to logon (Connection refused). ccapiclient.jar;
com.emc.ecc.eccapi.client.util.EccApiPopul
ateRandomPassword ApiClient
Problem Solution
SYMAPI and CLARAPI discovery requests fail when run 1. Run the discovery requests separately. Make sure that one
together for the first time on a Solaris DPA Server. CLARAPI or SYMAPI discovery is successful before running the
other.
2. After successful requests have been run sequentially first,
they can be run together.
Client discovery is not correctly resolving LUNs on Configure the DNS on the ESX properly or add the VM name and
VFMS on ESX 4.1. IP to the ESX hosts file.
When trying to correlate the virtual devices to the
remote storage they reside on, and the hosting ESX of
the virtual machine cannot resolve the name of the VM
(DNS configuration), the correlation fails and the
virtual devices are displayed as local devices.
Importing CLARiiON information request fails with the Run the SYMCLI command on the SE host for this CLARiiON:
following error message: symcfg sync -clar
"An error occurred while data was being loaded from a
Clariion ClarEventGet exited with code 3593
(SYMAPI_C_CLARIION_LOAD_ERROR) "
VNX/CLARiiON
To calculate the time offset between the VNX/CLARiiON and the DPA server:
1. Query the VNX/CLARiiON's time using the navicli command getsptime.
2. At the same time, query the connector's time.
3. If the connector time and the DPA server time are equal (no Time Zone difference):
TimeOffset = Connector time - VNX/CLARiiON time.
4. Otherwise, if there is a time difference also between the connector time and the DPA
server time:
TimeOffset = (DPA server time - Connector time) - VNX/Clariion's time.
5. Set the time offset for the request. "Configuring the time offset" on page 141 provides
information on this.
Symmetrix
To calculate the time offset between the Symmetrix and the DPA server:
1. Query the DPA server time.
2. At the same time, query the connector's time.
3. If the Connector time and DPA server time are not equal:
TimeOffset = DPA server time - Connector Time.
4. Otherwise, no time offset for Symmetrix needs to be set.
5. Set the time offset for the request."Configuring the time offset" on page 141 provides
information on this.