IBM Spectrum Control 543 Administrators Guide
IBM Spectrum Control 543 Administrators Guide
5.4.3
Administrator's Guide
IBM
SC28-3131-03
Note:
Before using this information and the product it supports, read the information in “Legal notices” on
page 147.
This edition applies to version 5, release 4, modification 3 of IBM Spectrum Control (product numbers 5725-F93 and
5725-G33) and to all subsequent releases and modifications until otherwise indicated in new editions.
This edition replaces SC28-3131-02.
© Copyright International Business Machines Corporation 2014, 2021.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM Corp.
Contents
iii
Enabling TLS 1.1 and 1.0 for IBM Spectrum Control ports................................................................. 51
Configuring Db2, AIX, and Linux for IPv6-only environment................................................................... 52
Chapter 2. Administering..................................................................................... 55
Administering resources and data sources...............................................................................................55
Storage systems................................................................................................................................... 55
Hypervisors and VMware data sources............................................................................................... 60
Switches and fabrics............................................................................................................................ 61
Servers and Storage Resource agents................................................................................................. 64
SMI-S providers.................................................................................................................................... 77
SNMP agents........................................................................................................................................ 79
Starting and stopping the IBM Spectrum Control servers........................................................................80
Starting the servers by using the GUI.................................................................................................. 80
Starting the servers by using scripts....................................................................................................81
Stopping the servers by using the GUI................................................................................................ 82
Stopping the servers by using scripts.................................................................................................. 82
Checking the version and license of IBM Spectrum Control.................................................................... 83
Checking IBM Spectrum Control status.................................................................................................... 83
Troubleshooting problems with the IBM Spectrum Control component and servers....................... 84
Packaging and sending log files from the System Management page................................................84
Increasing the memory allocation for the Data server............................................................................. 88
Increasing the memory allocation for the Data server that is running on AIX................................... 88
Increasing the memory allocation for the Data server that is running on Linux................................ 89
Increasing memory allocation for Data server that is running on Windows.......................................89
Changing passwords.................................................................................................................................. 90
Changing passwords by using the password tool................................................................................90
Changing passwords on AIX and Linux systems using the Command Line Interface (CLI)...............96
Changing passwords on Windows systems from the Command Line Interface (CLI) .......................97
Granting local administrative privileges to a domain account................................................................. 97
Collecting diagnostic information about IBM Spectrum Control..............................................................98
Service tool overview........................................................................................................................... 98
Packaging log files from the command line and sending them to IBM Support.............................. 100
Creating a compressed file for a Storage Resource agent ............................................................... 101
How to customize the service tool.....................................................................................................102
Administering the IBM Spectrum Control database...............................................................................104
Backing up the database....................................................................................................................104
Restoring the database...................................................................................................................... 109
Disaster recovery............................................................................................................................... 110
Maintaining and improving the performance of the database..........................................................110
Repository copy tool.......................................................................................................................... 113
Administering Db2................................................................................................................................... 115
Using the command line on UNIX and Linux..................................................................................... 115
Manually starting Db2 on Windows................................................................................................... 115
Manually stopping Db2 on Windows................................................................................................. 115
Starting the IBM Data Studio full client ............................................................................................ 116
Monitoring Db2 .................................................................................................................................. 116
iv
Specifying the tablespace size for IBM Spectrum Control............................................................... 127
agent.config file.................................................................................................................................. 128
Log files.................................................................................................................................................... 129
Default locations of log files...............................................................................................................129
Script parameters.................................................................................................................................... 130
Opening IBM Spectrum Control on Windows operating systems ......................................................... 133
Opening IBM Spectrum Control GUIs and CLIs................................................................................ 133
Accessing administration tools..........................................................................................................134
Windows services used by IBM Spectrum Control.................................................................................136
Frequently Asked Questions................................................................................................................... 137
Protocols and standards..........................................................................................................................137
Web Based Enterprise Management................................................................................................. 137
Storage Management Initiative Specification................................................................................... 138
Service Location Protocol.................................................................................................................. 139
Simple Network Management Protocol.............................................................................................139
Fibre Channel Methodologies of Interconnects................................................................................ 140
Index................................................................................................................ 153
v
vi
About this guide
IBM Spectrum Control manages storage infrastructure by centralizing, automating, and simplifying the
management of complex and heterogeneous storage environments. This guide provides task-oriented
administration information that helps you to obtain optimal product performance.
Publications
A number of publications are provided with IBM Spectrum Control.
The following section describes how to access these publications online.
Table 1. Locations of publications for IBM Spectrum Control and related products
Product Online location
IBM Spectrum Control To search across all publications or to download PDF versions of
individual publications, go to the product documentation at
https://www.ibm.com/docs/en/spectrum-control/5.4.3.
IBM Redbooks
The IBM Redbooks® are publications about specialized topics.
You can order publications through your IBM representative or the IBM branch office serving your locality.
You can also search for and order books of interest to you by visiting the IBM Redbooks home page at
http://www.redbooks.ibm.com.
Getting support
For help with resolving issues with IBM Spectrum Control, you can contact IBM Support or use IBM self-
help resources.
To get help from IBM Support and report issues with IBM Spectrum Control, complete these steps:
1. Log in to the IBM Support portal. If you don't have an IBM ID, go to Create your IBM account and
complete the form.
2. Click Open a case.
3. Complete the form.
4. Click Submit case.
Optionally, you can contact IBM Support by phone. In the U.S., call 1-800-426-4968. For other countries,
go to https://www.ibm.com/planetwide/.
When you open a case or contact IBM Support by phone, have the following information ready:
• The version, release, modification, and service level number of IBM Spectrum Control that you're using.
• The communication protocol (for example, TCP/IP), version, and release number that you're using.
• The activity that you were doing when the problem occurred, including the steps that you followed
before the problem occurred.
• The exact text of any error messages.
For more information about how to get support and use self-help resources for IBM Spectrum Control,
see Getting support.
https://host_name:port/srm
Required user name for initial logon after installation on a single server when only
the common user is defined
After you install IBM Spectrum Control in a single-server environment, the required user name for the
initial logon is the common user name that was defined for the IBM Spectrum Control installation.
Required user name for initial logon after installation on multiple servers and IBM
Spectrum Control reports are remote
After you install the software on multiple servers, and IBM Spectrum Control reports are remote, you
must use the user name that was defined for the installation of the IBM Spectrum Control server.
Chapter 1. Configuring 3
installation_dir/wlp/usr/servers/webServer directory, is used as the primary WebSphere®
Application Server Liberty server for user authentication in IBM Spectrum Control.
The Device server also runs on WebSphere Application Server Liberty, and it is only configured with
the File-based user repository. If the web server is down, the Device server is used as the backup
server to perform the user authentication and allows the common user name that was provided during
IBM Spectrum Control installation and the tpcFileRegistryUser user ID to log on to IBM
Spectrum Control.
You can add an LDAP repository and disable the operating system repository after you install IBM
Spectrum Control; this configuration is completed in IBM Spectrum Control . The LDAP repository
configuration settings are not propagated to the Device server. Therefore, if the web server is not
running, the authorized LDAP users cannot log in to IBM Spectrum Control. The backup user
authentication mechanism that is based on Device server allows the common user name that was
entered during the IBM Spectrum Control installation, and the tpcFileRegistryUser user ID to be
used to log on to IBM Spectrum Control .
If the computer is correctly configured with the Windows domain, the operating system repository
also contains the domain users and groups that are managed by the Windows domain.
IBM Spectrum Control integrates with third party modules on the Linux and AIX operating systems for
local user authentication. IBM Spectrum Control only supports the default module configuration
settings with the AIX or Linux operating systems. The customization of configuration settings or using
additional modules is not supported by IBM Spectrum Control.
The LDAP repositories that are supported by IBM Spectrum Control depend on WebSphere Application
Server Liberty support. For more information, about the LDAP repositories that are supported, see
http://www.ibm.com/support/docview.wss?uid=swg27036471.
WebSphere Application Server Liberty cannot resolve users or groups that are present in more than one
repository in the federated repositories framework. Because of this limitation, you must select either the
operating system repository or the LDAP repository for user authentication and authorization in IBM
Spectrum Control. If you upgraded from an earlier version of IBM Spectrum Control with both the
operating system repository and an LDAP repository configured, you can keep using both repositories.
However, it is recommended that you select either the operating system repository or the LDAP
repository.
The following table shows which user repositories are checked for IBM Spectrum Control authentication
configurations when accessing IBM Spectrum Control using the IBM Spectrum Control GUI, the CLI, or
the REST API:
Authorizing users
After IBM Spectrum Control is installed, you can assign roles to the user groups that are contained in the
authentication repository. Roles determine the functions that are available to the users that are in a group.
The authentication repository can be an operating system repository or a Lightweight Directory Access
Protocol (LDAP) repository. When IBM Spectrum Control is installed, the following user and groups are
automatically configured for authentication to the product:
• User: tpcFileRegistryUser
Role-based authorization
Roles determine the functions that are available to users of IBM Spectrum Control. When a user ID is
authenticated to IBM Spectrum Control through the GUI, CLI, or APIs, membership in an operating
system or LDAP group determines the authorization level of the user.
The following table shows the IBM Spectrum Control roles and their authorization levels:
Administrator This role has full access to all monitoring and administrative
functions. At least one group must have the Administrator role.
Note: When IBM Spectrum Control is first installed, the
following operating system groups are assigned the
Administrator role:
• Windows: Administrators
• UNIX and Linux: root
• AIX: system
External Application If you assign the External Application role to the user, you must
also assign one or more service classes to the user.
This role does not enable users to log in to the IBM Spectrum
Control GUI.
Chapter 1. Configuring 5
Tips:
• To determine the role of the user who is logged in, click the user icon In the upper-right corner of
any page in the GUI.
• If a user belongs to multiple groups and the groups have different roles, the role with the highest level
of authorization is granted to the user. For example, if a user belongs to a group that is assigned the
Administrator role and also belongs to a group that is assigned a Monitor role, the user is granted the
authorization of the Administrator role.
• If a user is not a member of a group that is assigned a IBM Spectrum Control role, no access is granted
to that user.
• If assigned the Monitor role, a user can only open and view logs from the Data Collection page for the
selected resource.
Nested groups are not supported: Adding active directory or any other type of domain user group to a
local operating system group is not supported in IBM Spectrum Control. You can configure IBM Spectrum
Control to authenticate domain IDs that rely on the operating system to perform the authentication
operation against the active directory, but it cannot resolve nested groups.
Alternatively, you can configure LDAP authentication to perform queries against active directory user
repositories and assign domain groups directly to roles within IBM Spectrum Control.
Chapter 1. Configuring 7
When IBM Spectrum Control is installed, default repositories are created, which allow you to control user
access to the product.
Related tasks
“Changing from operating system to LDAP authentication” on page 12
You can configure IBM Spectrum Control to communicate with an external LDAP repository. For example,
IBM Tivoli Directory Server or Microsoft Active Directory. This makes IBM Spectrum Control available to a
larger set of users and groups. You are able to log in to IBM Spectrum Control with one set of credentials.
Table 4. Product actions that are available only to users with the Administrator role
Function Actions that require the Administrator role
Single dashboard • Adding and removing resources
view of the storage
• Administering connections
environment that
you can use to • Scheduling data collection
manage storage • Changing and viewing the automated probe schedule
systems,
• Viewing and editing history retention settings
hypervisors,
servers, and Fibre • Modifying license settings
Channel fabrics.
Performance • Scheduling performance monitors
monitoring for
• Starting or stopping performance monitors
storage systems
and Fibre Channel
networks.
Capacity and usage • Scheduling probes
monitoring of
• Starting or stopping probes
resources.
• Modifying Storage Resource agents
• Enabling automatic zoning
Chapter 1. Configuring 9
Table 4. Product actions that are available only to users with the Administrator role (continued)
Function Actions that require the Administrator role
Predefined Reports • Creating, deleting, and editing reports
• Predefined • Configuring the email server
capacity reports • Emailing reports
allow users to
quickly create • Saving reports to the file system
reports about
capacity
anomalies and
shortfalls, which
can be scheduled
and sent by email
or saved to the
user's file
system, or both.
• Predefined
inventory reports
allow users to
quickly create
reports about
their storage
resources, which
can be scheduled
and sent by email
or saved to the
user's file
system, or both.
Managing authentication
The IBM Spectrum Control installation program establishes a default authentication configuration using
the federated repositories feature of the WebSphere Application Server Liberty. You can configure and
manage IBM Spectrum Control for LDAP authentication as a post-installation activity.
Important: WebSphere Application Server Liberty cannot resolve users or groups that are present in
more than one repository in the federated repositories framework. Because of this limitation, you must
select either the operating system repository or the LDAP repository for user authentication and
authorization in IBM Spectrum Control. If you upgraded from an earlier version of IBM Spectrum Control
with both the operating system repository and an LDAP repository configured, you can keep using both
repositories. However, it is recommended that you select either the operating system repository or the
LDAP repository.
Chapter 1. Configuring 11
Changing from operating system to LDAP authentication
You can configure IBM Spectrum Control to communicate with an external LDAP repository. For example,
IBM Tivoli Directory Server or Microsoft Active Directory. This makes IBM Spectrum Control available to a
larger set of users and groups. You are able to log in to IBM Spectrum Control with one set of credentials.
When you change the authentication configuration, IBM Spectrum Control is available to users and groups
in other repositories.
Important: WebSphere Application Server Liberty cannot resolve users or groups that are present in
more than one repository in the federated repositories framework. Because of this limitation, you must
select either the operating system repository or the LDAP repository for user authentication and
authorization in IBM Spectrum Control. If you upgraded from an earlier version of IBM Spectrum Control
with both the operating system repository and an LDAP repository that is configured, you can keep using
both repositories. However, it is recommended that you select either the operating system repository or
the LDAP repository.
1. Back up the ldapregistry.xml file in the installation_dir/wlp/usr/servers/
webServer/registry/ directory.
2. Log on as an administrator to the IBM Spectrum Control GUI.
3. Click Settings > User Management.
4. Click Edit Authentication.
5. On the Authentication Configuration page, select LDAP.
6. Click Download Files.
7. Save and extract the ldapExamples.zip file to the computer where you run your browser.
8. Use the information to edit the XML template file for your vendor.
For example, if your LDAP server is IBM Tivoli Directory Server, edit the IBMDirectoryServer.xml
file and if your LDAP server is Microsoft Active Directory, edit the
ActiveDirectoryServerDefault.xml file.
Edit the following parameters:
id
The unique identifier for the LDAP repository, which identifies the repository in the realm, for
example, LDAP1.
host
The hostname of the primary LDAP server. The hostname is either the IP address or the computer
name in a domain name system (DNS).
sslEnabled
Indicates whether SSL is used to connect to the LDAP server.
Important: If you set this parameter to true, and set the port parameter to the LDAP server
secure communications port, when you upload the edited XML template file, IBM Spectrum
Control downloads the SSL certificate from the LDAP server. Then, it is added to the Web server
keystore. You must restart the Web server.
port
The port number for the LDAP server. By default, the port number for secure communication is
636, and for non-secure communication is 389.
Tip: Depending on the configuration of your LDAP server, you can specify a different port number.
baseDN
The baseDN (Distinguished Name) is the starting point for searches for users in the LDAP
directory server. For example, if you have a DN value of cn=John Doe, ou=rochester, o=ibm,
c=us, you can specify the LDAP base entry as any of the following options:
• ou=rochester, o=ibm, c=us
• o=ibm, c=us
• c=us
Chapter 1. Configuring 13
bindDN=""
bindPassword=""
If you are not sure whether an anonymous bind satisfies the required functions, contact your
LDAP server administrator.
Attention: No single value for the bindDN parameter is correct for every Active Directory
Server or for every LDAP server. The correct value for the bindDN parameter depends on
the configuration of your Active Directory Server or your LDAP server. If you are unsure
about the correct value to use for the bindDN parameter, contact your LDAP server
administrator.
If you are using Active Directory as your LDAP repository and you know the
Active_Directory_user's_samAccountName_value, but you want the Active Directory user
full distinguished name in order to use that value as the bindDN parameter, run the
following command on the Active Directory machine:
Example:
Chapter 1. Configuring 15
If your change from LDAP authentication to Local OS authentication is successful, you are logged out
of the IBM Spectrum Control GUI. You can log into the GUI using your local operating system
credentials. You cannot log into the GUI using your LDAP credentials.
If your change from LDAP authentication to Local OS authentication is not successful, click Discard.
After the confirmation, your previous LDAP authentication is restored and you are returned to the User
Management page.
You have changed from LDAP authentication to local operating system in IBM Spectrum Control. You can
log on to the IBM Spectrum Control GUI with your local operating system credentials.
Enabling secure communication between IBM Spectrum Control and the LDAP
repository
You can use the Secure Socket Layer (SSL) protocol to secure the communication between IBM Spectrum
Control and the LDAP repository that you are using for user authentication. The SSL protocol provides
security and data integrity for communications over Transmission Control Protocol/Internet Protocol
(TCP/IP) networks.
You added an LDAP repository to the federated repositories for IBM Spectrum Control and your system is
operating properly with non-secure communication between IBM Spectrum Control and the LDAP
repository. Before you implement the following procedure, add the SSL certificate from the LDAP server to
the IBM Spectrum Control web server keystore or the connectivity between IBM Spectrum Control and
the LDAP server fails.
1. Log in to the IBM Spectrum Control GUI as an LDAP user with the Administrator role.
2. In the menu bar, go to Settings > User Management.
3. On the User Management page, click Edit Authentication.
4. On the Authentication Configuration page, click Advanced Configuration Options.
Depending on the LDAP user account that you used to log into the IBM Spectrum Control GUI, you
might have to explicitly log into the Liberty Admin Center as the Common User or the file-based user.
5. On the Server Config page, click LDAP User Registry.
6. Change the value in the Ldap ssl enabled field from false to true.
7. Change the value of the Port field to the LDAP server port that listens for secure communications.
The typical value is 636. Depending on your LDAP server configuration, you can specify a different port.
If you do not know which port to use, contact your LDAP server administrator.
8. Click Save and log out of the Liberty Admin Center.
9. On the Authentication Configuration page, click Cancel.
Secure communications are established between IBM Spectrum Control and the LDAP repository with
SSL protocol.
Related tasks
“Exporting SSL certificate from the IBM Security Directory Server to a file” on page 17
To secure communications between IBM Spectrum Control and IBM Security Directory Server, you must
export the SSL certificate to a file. The file that is created can then be added to the keystore for IBM
Spectrum Control.
“Exporting SSL certificate from the Microsoft Active Directory to a file” on page 18
To secure communications between IBM Spectrum Control and Microsoft Active Directory, you must
export the SSL certificate from the Microsoft Active Directory to a file. The file that is created can then be
added to the web server keystore for IBM Spectrum Control.
“Adding the SSL certificate for the LDAP server to the web server keystore that uses the IKEYCMD
command” on page 18
Disabling secure communication between IBM Spectrum Control and the LDAP
repository
You can disable the Secure Socket Layer (SSL) protocol between IBM Spectrum Control and the LDAP
repository at any time using the IBM Spectrum Control GUI.
1. Log in to the IBM Spectrum Control GUI as an LDAP user with Administrator role.
2. In the menu bar, go to Settings > User Management.
3. On the User Management page, click Authentication Configuration.
4. On the Authentication Configuration page, click Advanced Configuration Options.
Depending on the LDAP user account that you used to log into the IBM Spectrum Control GUI, you
might have to explicitly log into the Liberty Admin Center as the Common User or the file-based user.
5. On the Server Config page, click LDAP User Registry.
6. Change the value of the Ldap ssl enabled field from true to false.
7. Change the value of the Port field to the LDAP server port that listens for non-secure communications.
The typical value is 389. Depending on your LDAP server configuration, you can specify a different port.
If you do not know which port to use, contact your LDAP server administrator.
8. Click Save and log out of the Liberty Admin Center.
9. On the Authentication Configuration page, click Cancel.
Exporting SSL certificate from the IBM Security Directory Server to a file
To secure communications between IBM Spectrum Control and IBM Security Directory Server, you must
export the SSL certificate to a file. The file that is created can then be added to the keystore for IBM
Spectrum Control.
Important: This topic is an example of exporting the SSL certificate from the IBM Security Directory
Server to a file.
If your LDAP server is the IBM Security Directory Server verify that the Web Administration tool is
installed with your IBM Security Directory Server because it includes the correct IBM Key Management
(iKeyman) utility.
For more information about exporting the SSL certificate from the LDAP server, see your LDAP
administrator and the documentation for your specific LDAP server product.
1. Open the IBM Key Management utility in your IBM WebSphere Application Server directory structure.
2. Select Key Database File > Open.
3. Complete the following steps:
a) In Key database type field, select CMS.
b) In the File Name field, click Browse and go to the location of the key database (.kdb) file that is
associated with your IBM Security Directory Server.
c) Click Open.
d) Click OK.
4. On the Password Prompt page, enter the correct password for the key database file and click OK.
5. In the Personal Certificates list, select the certificate that is the SSL certificate for the IBM Security
Directory Server and click Extract Certificate.
6. Select Base64-encoded ASCII data as the data type and provide a Certificate file name, Location,
and click OK.
The SSL certificate is exported from IBM Security Directory Server to a file so it can be added to the web
server keystore for IBM Spectrum Control.
Chapter 1. Configuring 17
Exporting SSL certificate from the Microsoft Active Directory to a file
To secure communications between IBM Spectrum Control and Microsoft Active Directory, you must
export the SSL certificate from the Microsoft Active Directory to a file. The file that is created can then be
added to the web server keystore for IBM Spectrum Control.
Important: This topic is an example of exporting the SSL certificate from the Microsoft Active Directory to
a file.
You can use the Certification Authority tool to export the SSL certificate.
For more information about exporting the SSL certificate from the LDAP server, see your LDAP
administrator and the documentation for your specific LDAP server product.
1. Open the Certification Authority tool.
2. Select Certification Authority > Issued Certificates.
3. Select your current SSL certificate for the Microsoft Active Directory and open the certificate.
4. On the Certificate page, click the Details tab and click Copy to File.
5. In the Certificate Export Wizard, select Base-64 encoded X.509 (.CER) and click Next.
6. Provide a file name and click Next.
7. Review your settings to verify that you have the correct Base-64 encoded X.509 (.CER) file and click
Finish.
The SSL certificate is exported from Microsoft Active Directory to a file so it can be added to the web
server keystore for IBM Spectrum Control.
Adding the SSL certificate for the LDAP server to the web server keystore that uses the
IKEYCMD command
To secure communications between the IBM Spectrum Control server and the LDAP server, you must add
the SSL certificate from the LDAP server to the web server keystore for IBM Spectrum Control.
Tip: Contact your LDAP administrator and obtain the SSL certificate for your LDAP server. The SSL
certificate must be in the form of a Base64-encoded file.
You can use the IBM Key Management (IKEYCMD) command to add the LDAP SSL certificate to the IBM
Spectrum Control web server keystore.
1. Copy the Base64-encoded file to the location of your IBM Spectrum Control server.
2. Log on to the IBM Spectrum Control server with administrative privileges.
3. Open a command prompt and go to installation_dir/jre/bin directory.
4. Choose one of these options to add the SSL certificate for the LDAP server to the keystore for the web
server:
• For Windows operating systems:
Where the label value is for the LDAP SSL certificate you are adding to the IBM Spectrum Control web
server keystore. The password value is the password that is associated with the keystore. The default
value for this password is default. The LDAP SSL certificate value is the Base64-encoded file that
contains the SSL certificate from your LDAP server.
5. Restart the IBM Spectrum Control web server.
6. Choose one of these options to verify that the SSL certificate for LDAP was added to the keystore for
the web server:
The SSL certificate from the LDAP server was added to the IBM Spectrum Control web server keystore to
enable secure communications.
Related tasks
“Starting and stopping the IBM Spectrum Control servers” on page 80
You can start and stop the IBM Spectrum Control servers in the GUI or by running scripts. Note: IBM
Spectrum Control servers start automatically on Windows, Linux, or AIX® operating systems when the
operating system is started.
“Exporting SSL certificate from the IBM Security Directory Server to a file” on page 17
To secure communications between IBM Spectrum Control and IBM Security Directory Server, you must
export the SSL certificate to a file. The file that is created can then be added to the keystore for IBM
Spectrum Control.
“Exporting SSL certificate from the Microsoft Active Directory to a file” on page 18
To secure communications between IBM Spectrum Control and Microsoft Active Directory, you must
export the SSL certificate from the Microsoft Active Directory to a file. The file that is created can then be
added to the web server keystore for IBM Spectrum Control.
In this scenario, you want to provide access to LDAP users that reside in a different node of the LDAP
structure than your LDAP groups. You also want to prevent authorization of LDAP users and groups that
are not associated with IBM Spectrum Control.
In this scenario, the LDAP users use the following distinguished names:
• LDAP user 1: cn=LDAPUser1,ou=MarketingUsers,dc=storage,dc=company,dc=com
• LDAP user 2: cn=LDAPUser2,ou=SalesUsers,dc=storage,dc=company,dc=com
• LDAP user 3: cn=LDAPUser3,ou=ManagementUsers,dc=storage,dc=company,dc=com
In this scenario, the LDAP groups use the following distinguished names:
• LDAP user 1 is a member of LDAP group 1:
cn=LDAPGroup1,ou=MarketingGroups,dc=storage,dc=company,dc=com
• LDAP user 2 is a member LDAP group 2:
cn=LDAPGroup2,ou=SalesGroups,dc=storage,dc=company,dc=com
• LDAP user 3 is a member of LDAP group 3:
cn=LDAPGroup3,ou=ManagementGroups,dc=storage,dc=company,dc=com
In this scenario, LDAPUser1 and LDAPUser2 are in different nodes of the LDAP structure than the
associated LDAP groups, LDAPGroup1 and LDAPGroup2. You need to find and map LDAPGroup1 and
LDAPGroup2 to the IBM Spectrum Control roles and be able to log in to IBM Spectrum Control as the
LDAPUser1 and LDAPUser2.
When you configure IBM Spectrum Control for LDAP authentication and you encounter this scenario, set
the baseDN value in your LDAP XML template file to dc=storage, dc=company, dc=com.
Chapter 1. Configuring 19
In following example, this baseDN value is common to all LDAP users and groups.
Example of the LDAP XML template file that implements this baseDN value:
<server description="IBM Web Server">
<ldapRegistry activedFilters="active_dir_server" baseDN="dc=storage,dc=company,dc=com"
bindDN="cn=Administrator,cn=users,dc=storage,dc=company,dc=com" bindPassword="password"
host="ldap.storage.company.com" id="LDAP1" ignoreCase="true"
ldapType="Microsoft Active Directory"
port="389" realm="TPCRealm" sslEnabled="false">
</ldapRegistry>
<federatedRepository>
<primaryRealm allowOpIfRepoDown="true" name="TPCRealm">
<participatingBaseEntry name="dc=storage,dc=company,dc=com"/>
<!-- The next two entries must NOT be changed -->
<participatingBaseEntry name="o=TPCRealm"/>
<participatingBaseEntry name="o=OSRealm"/>
</primaryRealm>
</federatedRepository>
</server>
When you use this example LDAP XML template file, you also are able to find and map LDAPGroup3 to an
IBM Spectrum Control role. This behavior enables LDAPUser3 to log in to IBM Spectrum Control, which is
not part of the successful outcome. Use the ldapEntityType element within the ldapRegistry
element so you can only find and map LDAPGroup1 and LDAPGroup2 to IBM Spectrum Control roles.
Tip: Whenever you modify the ldapRegistry element, in the LDAP XML template file, verify that the
XML file is valid by opening it in a web browser and checking the results.
This is the previous example of the LDAP XML template file that was edited to use the ldapEntityType
element within the ldapRegistry element:
<server description="IBM Web Server">
<ldapRegistry activedFilters="active_dir_server" baseDN="dc=storage,dc=company,dc=com"
bindDN="cn=Administrator,cn=users,dc=storage,dc=company,dc=com" bindPassword="password"
host="ldap.storage.company.com" id="LDAP1" ignoreCase="true" ldapType="Microsoft Active Directory"
port="389" realm="TPCRealm" sslEnabled="false">
<ldapEntityType name="Group">
<objectClass>group</objectClass>
<searchBase>ou=MarketingGroups,dc=storage,dc=company,dc=com</searchBase>
<searchBase>ou=SalesGroups,dc=storage,dc=company,dc=com</searchBase>
</ldapEntityType>
<ldapEntityType name="PersonAccount">
<objectClass>user</objectClass>
<searchBase>ou=MarketingUsers,dc=storage,dc=company,dc=com</searchBase>
<searchBase>ou=SalesUsers,dc=storage,dc=company,dc=com</searchBase>
</ldapEntityType>
</ldapRegistry>
<activedLdapFilterProperties groupFilter="(&(cn=%v)(objectcategory=group))"
groupIdMap="*:cn" groupMemberIdMap="memberof:member" id="active_dir_server"
userFilter="(&(sAMAccountName=%v)(objectcategory=user))"
userIdMap="user:sAMAccountName"/>
<federatedRepository>
<primaryRealm allowOpIfRepoDown="true" name="TPCRealm">
<participatingBaseEntry name="dc=storage,dc=company,dc=com"/>
<!-- The next two entries must NOT be changed -->
<participatingBaseEntry name="o=TPCRealm"/>
<participatingBaseEntry name="o=OSRealm"/>
</primaryRealm>
</federatedRepository>
</server>
When you use the LDAP XML template that implements the ldapEntityType element, it prevents you
from finding and mapping LDAPGroup3 to IBM Spectrum Control role. However, you can find and map
LDAPGroup1 and LDAPGroup2 to IBM Spectrum Control roles and LDAPUser1 and LDAPUser2 can log
in to IBM Spectrum Control.
Chapter 1. Configuring 21
where IP is the IP address, and port is the port number. If you determine that the Common Information
Model Object Manager (CIMOM) is not the cause of the problem, you can use the command-line interface
(CLI) to increase the timeout values for the Device server.
For those storage systems that use native interfaces to connect to IBM Spectrum Control you see this
error message:
HWN020103E The external process exceeded the timeout limit and was cancelled.
The following storage systems use native interfaces to connect to IBM Spectrum Control:
• System Storage® DS8000®
• SAN Volume Controller
• The XIV®
• IBM Spectrum Accelerate
• Storwize® V3500
• Storwize V3700
• Storwize V7000
• Storwize V7000 Unified
• IBM FlashSystem® devices that run IBM Spectrum Virtualize
• IBM Spectrum Scale
• IBM Cloud Object Storage
1. Run the getdscfg command to determine the current values of the timeout properties. From the
command prompt, enter the following command:
where:
• user is an IBM Spectrum Control user ID.
• password is the password for the IBM Spectrum Control user ID.
• host is the host name or IP address, and port is a valid port number for the HTTP service of the
Device server. The default value for port is typically 9550.
• timeout_property is one of the following strings:
– httpTimeout
– CIMClientWrapper.Timeout
– Probe.Timeout.Array
– Probe.Timeout.LMM
– Discovery.Timeout
– CIMOMManager.TestConnectionTimeout
Important: Timeout properties are displayed in milliseconds. If the value is 0 (zero), it means that
there is no timeout.
For the storage systems that use the native interface, the timeout_property strings are:
– NAPI.Timeout.TestConnection
– NAPI.Timeout.Probe
– NAPI.Timeout.EventPoll
2. Run the setdscfg command to increase the timeout value. Run the following command:
This command changes the probe configuration to use cached configuration data from the storage
system, which reduces the duration of the probe run. However, the information that is collected by the
probe might be slightly out of date.
Router configuration
Configure the routers in the network to enable general multicasting or to allow multicasting for the SLP
multicast address and port, 239.255.255.253, port 427. The routers of interest are the ones associated
with subnets that contain one or more storage devices that are to be discovered and managed by IBM
Spectrum Control.
To configure your router hardware and software, refer to your router and configuration documentation.
Environment configuration
This section provides information about the configuration of your environment.
It might be advantageous to configure SLP DAs in the following environments:
Chapter 1. Configuring 23
• In environments where there are other non-IBM Spectrum Control SLP UAs that frequently perform
discovery on the available services, an SLP DA must be configured. This action ensures that the existing
SAs are not overwhelmed by too many service requests.
• In environments where there are many SLP SAs, a DA helps decrease network traffic that is generated
by the multitude of service replies. It also ensures that all registered services can be discovered by a
given UA. The configuration of an SLP DA is recommended when there are more than 60 SAs that need
to respond to any given multicast service request.
Where myhost.com is the name of the server that is hosting the CIM agemt, and port is the port number of
the service, for example 5989.
Note: slptool is installed with a CIM agent. Run the command from the computer that is hosting the
CIM agent.
SLP discovery
A common problem with SLP discovery is due to IP multicasting being disabled on the network router.
Communication between the SLP SA and UA is done with IP multicasting. Follow these recovery
procedures when there are SLP discovery problems and IP multicasting is disabled on the network router.
Note: The storage systems that use native interfaces, for example, DS8000, XIV, SAN Volume Controller,
and Storwize V7000 do not use SLP discovery.
There are two recovery procedures when there are SLP discovery problems and IP multicasting is
disabled on the network router:
1. Configure one DA for each subnet within the environment.
2. Enable IP multicasting on the router which is disabled by default. Here is a list of common router
configurations for multicasting:
• Internet Group Management Protocol (IGMP) is used to register individual hosts in particular
multicast groups and to query group membership on particular subnets.
• Distance Vector Multicast Routing Protocol (DVMRP) is a set of routing algorithms that use a
technique called reverse path forwarding. These algorithms provide the best solution for how
multicast packets are to be routed in the network.
• Protocol-Independent Multicast (PIM) comes in two varieties: dense mode (PIM-DM) and sparse
mode (PIM-SM). The dense mode and sparse mode routines are optimized for networks where either
a large percentage of nodes requires multicast traffic (dense) or a small percentage of nodes
requires the sparse traffic.
• Multicast Open Shortest Path First (MOSPF) is an extension of OSPF. It is a link-state unicast routing
protocol that attempts to find the shortest path between any two networks or subnets to provide the
most optimal packet routing.
To properly configure the routers for multicasting, see the reference and configuration documentation
from the router manufacturer.
cd installation_dir\cli
Where:
user_ID
Is the user ID.
password
Is the password for the user.
host
Is either the host name or IP address of the system that is running IBM Spectrum Control.
port
Is a valid port number for the HTTP service of the Device server (the default is 9550).
value
Is the local IP address, which must be used for subscription for CIM Indications for CIM agents.
4. Verify that the command was successful by entering this command:
Chapter 1. Configuring 25
local computer system. The fully qualified host name must be listed before the short name in each entry
that is associated with systems managed by IBM Spectrum Control.
The HOSTS file is in the %SystemRoot%\system32\drivers\etc\ directory. To change the HOSTS file,
follow these steps:
1. Open the HOSTS file in a text editor.
2. Add, remove, or modify the host entries. In the following example of a HOSTS file, the short name is
incorrectly listed before the fully qualified host name. This can cause address resolution problems in
IBM Spectrum Control.
3. In the following example, the order of the host names has been changed so that the fully qualified host
name is placed before the short name. The host names must be entered in the order that is shown so
IBM Spectrum Control can locate the host. Use this format for any hosts that are associated with IBM
Spectrum Control.
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
192.168.123.146 jason.groupa.mycompany.com jason
Note: Host names are case-sensitive. This is a WebSphere requirement. For example, if your computer
shows the name as JASON (uppercase), then you must enter JASON in the HOSTS file.
Chapter 1. Configuring 27
• To create deployment schedules, you must be logged in to IBM Spectrum Control with a user ID that
has the Administrator role. For information about user roles, see “Authorizing users” on page 4.
• To deploy Storage Resource agents on target computers, you must provide a user ID that has
administrative rights on those computers. You enter this ID when you create a deployment
schedule. IBM Spectrum Control uses this ID to log on to the target computers and install and
configure the necessary runtime files for the agents.
The user under which a Storage Resource agent (daemon or non-daemon) runs must have the
following authorities on the target computers:
• On the Linux or AIX operating systems, the user must have root authority. By default, an agent runs
under the user 'root'.
• On the Windows operating systems, the user must have Administrator authority and be a member of
the Administrators group. By default, a Storage Resource agent runs under the 'Local System'
account.
Orphan zones
Storage Resource agents do not collect information about orphan zones. An orphan zone is a zone that
does not belong to at least one zoneset.
Firewalls and Storage Resource agent deployments
Before you can deploy a Storage Resource agent on a computer, you must turn off the firewall on that
computer. If you do not turn off the firewall, the deployment fails.
Deploying Storage Resource agents on multiple computers
If you deploy Storage Resource agents on multiple computers at the same time, the computers must
have the same administrative user ID and password. IBM Spectrum Control uses these user
credentials to log on to the computers when you install Storage Resource agents.
Tip: When you deploy Storage Resource agents on multiple computers, a globally unique identifier
(GUID) is created for each computer (if one does not exist).
Communication between the IBM Spectrum Control server and a Storage Resource agent
The IBM Spectrum Control server connects to a monitored computer when a Storage Resource agent
is deployed and whenever a data collection schedule runs against that agent.
During deployment, the server communicates with the target computer by using one of the following
protocols:
• Windows server message block protocol (SMB)
• Secure Shell protocol (SSH)
• Remote execution protocol (REXEC)
• Remote shell protocol (RSH)
After deployment, the type of communication between the server and agent on that computer
depends on whether you deployed the agent as daemon service or non-daemon service.
Daemon and non-daemon services
You can deploy a Storage Resource agent as a daemon or non-daemon service:
• A Storage Resource agent that is deployed as a daemon service runs in the background on the
monitored computer and listens for requests from the IBM Spectrum Control server. Connectivity
between the server and agent is established by using SSL. The server and agent have their
respective certificates and no additional information is required besides those certificates and the
security that is provided by the SSL protocol.
• A Storage Resource agent deployed as a service on demand (non-daemon service) runs as a stand-
alone executable file on the monitored computer. Communication from the server to the agent uses
the same protocol that was used during the deployment of the agent. Communication from the
agent to the server uses SSL.
• A Storage Resource agent that is deployed as a daemon service on AIX, Linux, and Windows servers
monitors disk paths in near real-time to detect errors. When deployed as a daemon service on an
AIX server, the agent also monitors disk error events in near real-time.
errclear -d H -N disk_name 0
For example, if you fixed an error on hdisk4, and want to display the new status immediately, run the
following command:
errclear -d H -N hdisk4 0
If you do not reset the status indicator for the disk, the status changes automatically after a few
hours.
For information about the errclear command, see the product documentation at http://
www.ibm.com/support/knowledgecenter/ssw_aix_71/com.ibm.aix.cmds2/errclear.htm.
Port numbers for Storage Resource agents deployed as a daemon service
The following port numbers are used by Storage Resource agents that are deployed as daemon
service:
• 9567 (For the Storage Resource agent that is deployed on the same server as IBM Spectrum
Control.)
• 9510 (For Storage Resource agents that are deployed on remote servers.)
Storage Resource agents that are deployed as a non-daemon service do not use a port.
Authentication between the IBM Spectrum Control server and a Storage Resource agent
IBM Spectrum Control requires the correct authentication information (user name, password, port,
certificate location, or passphrase) for monitored computers each time it communicates with Storage
Resource agents on those computers. If the authentication information changes for a host computer
on which a Storage Resource agent is deployed, the authentication information for that agent must be
updated by using the Modify Agents > Update Credentials action on the Servers page in the GUI.
Replacing default SSL certificates
IBM Spectrum Control provides default SSL certificates for communication between the Data server
and Storage Resource agent.
IBM Spectrum Control Version 5.2.2 uses SSL certificates with 2048-bit encryption keys whereas
previous versions of IBM Spectrum Control used 1024-bit encryption keys. If you upgrade IBM
Spectrum Control from a version earlier than 5.2.2, your SSL certificates are not updated
automatically. If you want to use 2048-bit encryption keys with previous versions of IBM Spectrum
Control, you must replace the default SSL certificates with custom SSL certificates.
For information about how to replace SSL certificates, see “Replacing default SSL certificates for the
Data server and Storage Resource agents with custom SSL certificates” on page 36.
Storage Resource agents on the same computer
You cannot deploy a Storage Resource agent on a computer where a Storage Resource agent is
already installed and pointing to the same Data server. You can deploy a Storage Resource agent on
the same computer as another Storage Resource agent if those agents communicate with different
Data servers and use different ports when you listen for requests.
Chapter 1. Configuring 29
Time zones for computers that are monitored by Storage Resource agents
The time zones of computers that are monitored by Storage Resource agents are shown as Greenwich
mean time (GMT) offsets in IBM Spectrum Control reports. For example, a computer in Los Angeles
shows the following time zones in the By Computer report in Asset reporting:
(GMT-8:00) GMT-8:00
Connections for Linux and AIX operating systems by using Remote Shell protocol (RSH)
If RSH is configured to use a user ID and password, the connection fails. To successfully connect to a
system by using RSH, you must set up the .rhosts file (in the home directory of the account). RSH
must be configured to accept a login from the system that is running your application.
Deployments on Windows operating systems - NetBIOS setting
To install a Storage Resource agent on Windows targets, the Enable NetBIOS over TCP/IP option
must be selected in the Control Panel settings for the computer's network connections properties. To
set this option, complete the following steps:
1. Open Windows Control Panel. For information about how to open Windows Control Panel, see
“Accessing administration tools” on page 134.
2. Select Network and Dial-Up Connections > some_connection > Properties > Internet Protocol
(TCP/IP) > Advanced > WINS > Enable NetBIOS over TCP/IP.
To determine whether these ports are not blocked for inbound requests, see the documentation for
your firewall.
To determine whether security policies are blocking the connection ports, open Administrative Tools.
For information about how to open Administrative Tools, see “Accessing administration tools” on page
134..
Depending on whether your policies are stored locally or in Active Directory, follow these directions:
Policies that are stored locally
For policies that are stored locally, complete the following steps:
1. Open Windows Administrative Services.
2. Click Local Security Policy > IP Security Policies on Local Computer.
Policies that are stored in Active Directory
For policies that are stored in Active Directory, examine the IP security policies and edit or remove
filters that block the ports:
• Click Administrative Tools > Default Domain Security Settings > IP Security Policies on
Active Directory.
• Click Administrative Tools > Default Domain Controller Security Settings > IP Security
Policies on Active Directory.
For all Windows systems, the Server service must be running to connect to a Windows system by
using the Windows protocol.
The following table lists the ports that are reserved for NetBIOS. Ensure that these ports are not
blocked.
Port Description
135 NetBIOS Remote procedure call. (Not currently used.)
137 NetBIOS name service.
138 NetBIOS datagram. (Not currently used.)
139 NetBIOS session (for file and print sharing).
445 CIFS (on Windows XP).
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Policies\System
Note: The Storage Resource agent only supports either DES-EDE3-CBC encryption or no encryption for
the private key used in SSH protocol communication between the server and agent. The default
encryption that is used in the ssh-keygen command on UNIX is always DES-EDE3-CBC. However, with
Windows Cygwin, the ssh-keygen command generates a key with AES-128-CBC encryption if a
passphrase is specified. If there is no passphrase, the private key is generated without encryption. For
more information about encryption, see https://www.openssl.org/docs/man1.0.2/apps/enc.html.
Chapter 1. Configuring 31
1. Telnet to the remote machine using the root user ID.
2. To create an SSH certificate on AIX, you must first install the following packages (if not already
installed):
openssl.base.openssh.base.client
openssh.base.server
cd ~/.ssh
4. Enter ssh-keygen -t rsa. Accept the default names (for example, id_rsa).
5. Enter the passphrase.
6. Two files are created:
id_rsa
The private key.
id_rsa.pub
The public key.
7. Create an authorized_key file in the same location as id_rsa.pub by entering the following
command:
8. Copy the id_rsa (private key) to your server machine. For example, to copy the id_rsa file
to :\keys\id_rsa on the IBM Spectrum Control server (user responses are in boldface type):
# ssh-keygen
Generating public/private rsa key pair.
Enter file in which to save the key (//.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
You identification has been save in //.ssh/id_rsa.
Your public key has been save in //.ssh/id_rsa.pub.
The key fingerprint is:
xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx root@server
# cat id_rsa >> authorized_keys
# ls -l
total 24
-rw-r–r– 1 root system 1743 Oct 15 09:40 authorized_keys
-rw--– 1 root system 1743 Oct 15 09:39 id_rsa
-rw-r–r– 1 root system 399 Oct 15 09:39 id_rsa.pub
#
chmod +r /etc/passwd
chmod +r /etc/group
chmod 777 /var
Chapter 1. Configuring 33
$ ssh-host-config
*** Info: It's not possible to use the LocalSystem account for services
*** Info: that can change the user id without an explicit password
*** Info: (such as passwordless logins [e.g. public key authentication]
*** Info: via sshd) when having to create the user token from scratch.
*** Info: For more information on this requirement, see
*** Info: https://cygwin.com/cygwin-ug-net/ntsec.html#ntsec-nopasswd1
*** Info: If you want to enable that functionality, it's required to create
*** Info: a new account with special privileges (unless such an account
*** Info: already exists). This account is then used to run these special
*** Info: servers.
*** Info: Note that creating a new user requires that the current account
*** Info: have Administrator privileges itself.
*** Info: User 'cyg_server' has been created with password 'password'.
*** Info: If you change the password, please remember also to change the
*** Info: password for the installed services which use (or will soon use)
*** Info: the 'cyg_server' account.
*** Info: The sshd service has been installed under the 'cyg_server'
*** Info: account. To start the service now, call `net start sshd' or
*** Info: `cygrunsrv -S sshd'. Otherwise, it will start automatically
*** Info: after the next reboot.
ssh localhost
or
ssh host_name
If localhost does not work, use the short host name. If you receive a message indicating that the
authenticity of localhost cannot be established, answer Yes to the question "Are you sure you want
to continue connecting?" When prompted for your account password on localhost, enter the
password you use when logging in to the computer.
4. Set the TEMP environment variable. For information about setting the environment variable, see
http://www.cygwin.com/cygwin-ug-net/setup-env.html.
Here is an example of setting the environment variable:
a. Click My Computer > Properties > Advanced > Environment Variables.
b. Under System variables, find out the value of TEMP. For example, "C:\WINNT\TEMP"
c. Set the TEMP environment variable to point to the Cygwin format of TEMP in the ~/.bashrc
file. For example run the following command:
export TEMP=/cygdrive/c/WINNT/temp
Uncomment and modify this line in the ~/.bashrc file from the default:
# export TEMP=/tmp
to
export TEMP=/cygdrive/c/WINNT/temp
The Cygwin sshd service must be added as a service that starts automatically. To verify this step, click
Start > Settings > Control Panel > Administrative Tools > Services. Look for CYGWIN sshd in the
name list. Verify that it is started and configured to start automatically.
Creating the certificate
To create a certificate for SSH protocol, complete the following steps:
1. Run this command:
cd ~/.ssh
2. Generate the public and private keys with a passphrase. The passphrase is required.
From the Bash shell prompt, here is an example of the input and output (user responses are in
boldface type):
Chapter 1. Configuring 35
Administrator ~/.ssh
$ openssl genrsa -des3 -out key 1024
Generating RSA private key, 1024 bit long modulus
..........................................++++++
.........................................................................++++++
e is 65537 (0x10001)
Enter pass phrase for key:passphrase
Verifying - Enter pass phrase for key:passphrase
Administrator ~/.ssh
$ chmod 600 ~/.ssh/key
$ ssh-keygen
Generating public/private rsa key pair.
Enter file in which to save the key (/home/Administrator/.ssh/id_rsa): key_pairs
Enter passphrase (empty for no passphrase):passphrase
Enter same passphrase again:passphrase
Your identification has been saved in key_pairs.
Your public key has been saved in key_pairs.pub.
The key fingerprint is:
SHA256:ew0Octa24Qw917tRqPcn9hETlRakksKcTgGrPkh4UZs Sheila@IBM243-PC0CJ5EF
The key's randomart image is:
+---[RSA 2048]----+
| . ... .o+|
| . o + o . .o.|
| . E . * o ... |
| . . . oo. .. ..|
| . o .. S.B . oo.|
| o o + O B . oo|
| . o . * o +. |
| . . .o+o|
| ..o+|
+----[SHA256]-----+
Administrator ~/.ssh
$ cat id_rsa.pub >> authorized_keys
$
3. Copy the id_rsa (private key) to the IBM Spectrum Control server.
4. To connect to the remote system by using the private key, enter the following information in the GUI,
when you install the Storage Resource agent:
• User
• Certificate Location (c:\keys\id_rsa)
• Passphrase
Replacing default SSL certificates for the Data server and Storage Resource
agents with custom SSL certificates
IBM Spectrum Control provides default SSL certificates for communication between the Data server and
Storage Resource agent. You can replace the default SSL certificates. You must use the script that is
provided by IBM Spectrum Control to generate new SSL certificates. You cannot use any third-party tools
to generate the custom SSL certificates.
Overview of replacing default SSL certificates for the Data server and Storage
Resource agents
IBM Spectrum Control uses SSL certificates for communication between the Data server and Storage
Resource agents. IBM Spectrum Control provides default SSL certificates for this communication. If you
want to generate new certificates, you can replace the default SSL certificates with updated SSL
certificates.
Data server certificate
The IBM Spectrum Control Data server uses the TPCDataServer.jks and server.pwd files for
communication with the Storage Resource agents. If you use custom SSL certificates, you must
replace these files.
installation_dir/data/sra/tools/certs
Where installation_dir is the directory where the IBM Spectrum Control servers are installed. The default
directory is /opt/IBM/TPC for Linux or UNIX or C:\Program Files\IBM\TPC for Windows.
To replace the default SSL certificates, follow these steps:
1. Create the custom SSL certificates.
The createSRACerts script creates the custom SSL certificates.
The syntax is:
createSRACerts
output_directory rootCAPassword
server_key_password server_store_password
agent_password
output_directory
Directory where the certificates are created. You must provide a valid directory. The script creates
the sra_certs_out subdirectory and places the certificate files in that subdirectory.
Chapter 1. Configuring 37
rootCAPassword
Root CA password (root certificate authority password). You can enter a new root certificate
authority password or you can enter the default root certificate authority password:
s5umEvApR6cafruhustu.
server_key_password
Server key password. You can enter a new server key password or you can enter the default server
key password: drUtaxahaswefraf9uth.
server_store_password
Server store password. You can enter a new server store password or you can enter the default
server store password: wr4d5Xekaqafehet5u2a.
agent_password
Agent password. You can enter a new agent password or you can enter the default agent password:
jawUchezuthew6azEjef.
Important: The createSRACerts script strictly assumes the order of the command line parameters
output_directory, rootCAPassword, server_key_password, server_store_password, and
agent_password. For example, if you want to pass the rootCAPassword parameter to the script,
the rootCAPassword parameter must be the second argument to the script and you must also pass
the output_directory parameter as the first argument to the script.
Another example: If you want to pass the server_store_password parameter to the script, the
server_store_password parameter must be the fourth argument to the script and you must also
pass the server_key_password parameter as the third argument, the rootCAPassword parameter
as the second argument, and the output_directory parameter as the first argument to the script.
Important: During the script generation, the script prompts you twice for the pass phrase for
tpcrootca.key. If you enter a new root certificate authority password on the command line when
you run the script, enter that same new root certificate authority password at each prompt. If you
enter the default root certificate authority password on the command line when you run the script or
you do not enter the root certificate authority password on the command line at all when you run the
script, enter the default root certificate authority password at each prompt.
The following example creates the SSL certificates by using the default passwords and placing the
certificate files in the sra_certs_out subdirectory of the current working directory:
createSRACerts .
The following examples create the SSL certificates by using the default passwords and placing the
certificate files in C:\Temp\sra_certs_out\ on Windows and in /tmp/sra_certs_out/ or UNIX
or Linux.
Windows
createSRACerts C:\temp
UNIX or Linux
./createSRACerts.sh /tmp
The following examples create the SSL certificates by using new passwords for the root certificate
authority password and the server key password and placing the certificate files in the C:\Temp
\sra_certs_out\ directory on Windows and in the /tmp/sra_certs_out/ directory on UNIX or
Linux:
Windows
UNIX or Linux
output_directory/sra_certs_out/server
By default, the output_directory is the directory where the createSRACerts script is run:
installation_dir/data/sra/tools/certs
TPCDataServer.jks
server.pwd
installation_dir/data/sra/certs
Replace the certificate files for the local Storage Resource agent that runs on the IBM Spectrum
Control server.
The new Storage Resource agent certificates are created on the IBM Spectrum Control server in
the following directory:
output_directory/sra_certs_out/agent
By default, the output_directory is the directory where the createSRACerts script is run:
installation_dir/data/sra/tools/certs
certs.zip
Copy the Storage Resource agent certificate file to the following directory on the IBM Spectrum
Control server:
installation_dir/data/sra/server_operating_system
Where server_operating_system is the operating system on which the IBM Spectrum Control Data
server is installed.
Extract the Storage Resource agent certificate file in the following directory on the IBM Spectrum
Control server:
installation_dir/agent
Chapter 1. Configuring 39
Replace the certificate files for the remote Storage Resource agents that run on computers other
than the IBM Spectrum Control server
The new Storage Resource agent certificates are created on the IBM Spectrum Control server in
the following directory:
output_directory/sra_certs_out/agent
By default, the output_directory is the directory where the createSRACerts script is run:
installation_dir/data/sra/tools/certs
certs.zip
Copy the Storage Resource agent certificate file to the following directories on the IBM Spectrum
Control server:
installation_dir/data/sra/remote_agent_operating_system
installation_dir/agent
Replace the certificate files in the locations used for future installations of remote Storage
Resource agents.
The new Storage Resource agent certificates are created on the IBM Spectrum Control server in
the following directory:
output_directory/sra_certs_out/agent
By default, the output_directory is the directory where the createSRACerts script is run::
installation_dir/data/sra/tools/certs
certs.zip
Copy the Storage Resource agent certificate file to the following directories on the IBM Spectrum
Control server:
installation_dir/data/sra/future_remote_agent_operating_system
SRA_image_install_directory/sra/agent_operating_system
SRA_image_install_directory/sra/agent_operating_system
Note: The SRA_image_install_directory value is the directory where the Storage Resource agent
image was extracted and agent_operating_system is the directory that is named for the
operating system that is running on the computer where you intend to install the Storage
Resource agent.
d. Install the Storage Resource agent with the wanted options.
5. Start the Data server and Storage Resource agents.
For more information about starting or stopping IBM Spectrum Control services, see “Starting and
stopping the IBM Spectrum Control servers” on page 80.
Chapter 1. Configuring 41
For the Windows system: Click Start > Settings > Control Panel > Administrative Tools > Services.
Stop the following service: IBM Spectrum Control Storage Resource Agent - directory. directory is
where the Storage Resource agent is installed. The default directory is installation_dir\agent.
For the UNIX or Linux system, run the following commands:
cd /opt/IBM/TPC/agent/bin/
./agent.sh stop
3. Create one of the following files in the root directory for the agent. These files can be empty. Any
content in these files is ignored.
REGISTERSRA
The file name must be uppercase with no file extension. This file causes the agent to run a probe
and then register with the server. This file will use the existing Globally Unique Identifier (GUID).
REGISTERSRA_REGENGUID
The file name must be uppercase with no file extension. This file causes the agent to regenerate a
new Globally Unique Identifier (GUID), run a probe, and then register with the server.
4. Delete the contents of the agent_installation_directory/logs directory. This clears any
existing log messages so that you can view new messages that are logged.
5. Create the master image copies of this system.
6. When a new system is preinstalled from this image and then started, the REGISTERSRA or
REGISTERSRA_REGENGUID file is run. The Storage Resource agent automatically registers with the
new IBM Spectrum Control server. You can then use the GUI to manage the Storage Resource agent
deployment. For example, to confirm that the Storage Resource agent was deployed successfully, go to
the Servers page and refresh the list.
domain mydivision.mycompany.com
nameserver 123.123.123.123
If NIS is installed, the /etc/irs.conf file overrides the system default. It contains the following
information:
hosts = bind,local
The /etc/netsvc.conf file, if it exists, overrides the /etc/irs.conf file and the system default. It
contains the following information:
hosts = bind,local
export NDORDER=bind,local
The order option indicates the order of services. The sample entry specifies that the resolver library
should first consult the name server to resolve a name and then check the /etc/hosts file. It is
recommended to set the resolver library to first check the name server, bind file, and then the hosts file
(hosts) for better performance and security on all your servers. You must have the DNS and BIND
software installed for this configuration to work.
The multi option determines whether a host in the /etc/hosts file can have multiple IP addresses.
Hosts that have more than one IP address are said to be multihomed, because the presence of multiple
IP addresses implies that the host has several network interfaces.
The nospoof option takes care of not permitting spoofing on this machine. IP-Spoofing is a security
exploit that works by tricking computers into a trust relationship that you are someone that you really are
not. In this type of attack, a machine is set up to look like a legitimate server and then issue connections
and other types of network activities to legitimize end systems, other servers, or large data repository
systems. This option must be set ON for all types of servers.
domain mydivision.mycompany.com
nameserver 123.123.123.123
A short name is used if the /etc/nsswitch.conf file contains a line that begins as follows and if
the /etc/hosts file contains the short name for the computer:
hosts: files
/etc/init.d/inetsvc stop
/etc/init.d/inetsvc start
Chapter 1. Configuring 43
Checking for a fully qualified host name for Windows systems
Verify the fully qualified host name on Windows operating systems.
1. Choose one of these options:
Option Description
Windows Server 2012 a. On the Dashboard page, hover the mouse over the lower left corner of
the page next to the Server Manager taskbar button, and then click
Start.
b. Click Control Panel, and then click System.
c. Click Change Settings, click Change, and then click Change again.
Windows Server 2012 a. Click Start > Control Panel > System and Security.
R2, Windows Server b. Click System, and then click Change Settings.
2016, Windows Server
2019 c. On the Computer Name tab, click Change.
2. In the Computer name field, enter the fully qualified host name, and then click More.
3. Verify that the Primary DNS suffix field contains a domain name, and then click OK.
agent_host|user|password|certificate|passphrase
You can update the password or passphrase in encrypted format or plain text format. If you want to
update the password or passphrase in encrypted format, then you can use the tpctool. For example,
go to this directory and run the tpctool:
cd installation_dir/cli
tpctool encrypt string_to_be_encrypted
This generates an encrypted string. Place this string in the data file to be imported and add @ENC@ to
the end of the encrypted string. For example,
agent_host|usera|encrypted_password@ENC@|certificate|
encrypted_passphrase@ENC@
encrypted_password is the encrypted string for the password and encrypted_passphrase is the
encrypted string for the passphrase.
3. Import the data file.
Chapter 1. Configuring 45
DS8000 events
Events sent by the HMC to the IBM Spectrum Control server
SNMP trap notifications
SNMP traps sent from the switches and other resources
CIM indications
Indications sent by the SMI-S providers (CIM agents).
Servers (agents)
Job results and registration
IBM Spectrum Control GUI
Any request.
CIM indications
A CIM indication is an event that occurs on a managed object, for example, the completion or failure of an
operation. The CIM indications are managed by the CIM object manager. IBM Spectrum Control uses the
SMI-S providers for the managed objects to gather information about the resource.
Manually customize CIM indications on a IBM Spectrum Control system that has multiple IP addresses. To
configure IBM Spectrum Control to receive CIM indications in an IPv4, IPv6, and dual stack (IPv4 and
IPv6) environment, see “Configuring IBM Spectrum Control with multiple IP addresses” on page 25.
The manual customization task does not apply to storage devices that use the native interfaces.
Replacing the default SSL certificate for the Device, Alert, or Web
server
To replace the default SSL certificate for the Device, Alert, or Web server, use the IBM Key Management
(iKeyman) utility.
If you have strong security requirements, you might want to replace the default certificate for the Web
server so that you can securely connect to the Web server while you use the https protocol. When you
replace the existing certificate, it can remove web browser certificate error warnings.
Tip: If you want to use a self-signed certificate, complete steps 1-6, sub steps a-g, and steps 7 and 8.
If you want to use a certificate signed by an external certificate authority, complete steps 1- 6, sub steps
h-v, and steps 7 and 8.
1. Log on to the server where IBM Spectrum Control is installed. Ensure that you log on with the
appropriate user privileges.
2. Open the /jre/bin directory where IBM Spectrum Control is installed.
3. Enter the iKeyman utility command.
For Windows operating system, enter the following command:
ikeyman.exe
./ikeyman
Chapter 1. Configuring 47
After you have the signer certificate for the external certificate authority in the keystore, complete
the following tasks to receive the new certificate signed by the external certificate authority:
q. Select Personal Certificates and click Receive.
r. Provide the File Name and Location values of the file that contains your new certificate from the
external certificate authority and click OK.
s. Select the old self-signed certificate with the default label and click Rename.
t. Enter a new label for the old self-signed certificate and click OK.
u. Select your new certificate from the external certificate authority and click Rename.
v. Enter default as the new label for the new certificate from the external certificate authority and
click OK.
7. In the iKeyman utility, click Key Database File > Exit.
8. Stop and start the Device, Alert, or Web server.
Related tasks
“Starting and stopping the IBM Spectrum Control servers” on page 80
You can start and stop the IBM Spectrum Control servers in the GUI or by running scripts. Note: IBM
Spectrum Control servers start automatically on Windows, Linux, or AIX® operating systems when the
operating system is started.
Where device_server_keystore_password is the Device server keystore password and the default value
for this password is default.
For AIX or Linux operating system, enter the following command:
./keytool -exportcert -alias default
-keystore installation_dir/wlp/usr/servers/deviceServer/resources/security/key.p12 -storetype pkcs12
-storepass device_server_keystore_password -file deviceServer.cert
Where device_server_keystore_password is the Device server keystore password and he default value
for this password is default.
5. Enter the following command to delete the previous IBM Spectrum Control Device server SSL
certificate from the IBM Spectrum Control data collector trusted certificates.
For Windows operating system, enter the following command:
Chapter 1. Configuring 49
You can start and stop the IBM Spectrum Control servers in the GUI or by running scripts. Note: IBM
Spectrum Control servers start automatically on Windows, Linux, or AIX® operating systems when the
operating system is started.
Where installation_dir is the location where IBM Spectrum Control is installed, extracted_image_dir is
the location where the IBM Spectrum Control installation image is extracted, and machine_FQDN is the
fully qualified domain name of the machine where you installed IBM Spectrum Control. For example,
myserver.mycompany.com.
If your installation_dir or extracted_image_dir location contains spaces, use double quotes around
those paths.
For example:
"C:\Program Files\IBM\TPC\data\sra\tools\openssl\openssl" req
-config C:\Downloads\SC-Image\SC\scripts\export\openssl.cfg
-new -newkey rsa:2048 -x509 -nodes -keyout "C:\Program Files\IBM\TPC\export\conf\export.key"
-out "C:\Program Files\IBM\TPC\export\conf\export.cert" -days 3650
-subj /C=us/O=ibm/OU=exportServer/CN=myserver.mycompany.com
For the AIX or Linux operating systems, enter the following command:
installation_dir/data/sra/tools/openssl/openssl req
-config extracted_image_dir/scripts/export/openssl.cfg
-new -newkey rsa:2048 -x509 -nodes -keyout installation_dir/export/conf/export.key
-out installation_dir/export/conf/export.cert -days 3650
-subj /C=us/O=ibm/OU=exportServer/CN=machine_FQDN
Where installation_dir is the location where IBM Spectrum Control is installed, extracted_image_dir is
the location where the IBM Spectrum Control installation image is extracted, and machine_FQDN is the
fully qualified domain name of the machine where you installed IBM Spectrum Control. For example,
myserver.mycompany.com.
4. Start the Export server.
Related tasks
“Starting and stopping the IBM Spectrum Control servers” on page 80
Enabling TLS 1.1 and 1.0 for IBM Spectrum Control ports
To enable TLS 1.1 and 1.0 for IBM Spectrum Control ports, update the java.security file (Alert, Data,
Device, and Web server) and the server.config file (Export server).
IBM Spectrum Control ports have TLS 1.1 and 1.0 disabled by default for increased security. Therefore,
IBM Spectrum Control will not be able to communicate with resources that do not support TLS 1.2. If you
want to upgrade your resources to a version that supports TLS 1.2, contact your vendor. You can also re-
enable TLS 1.1 and 1.0 for IBM Spectrum Control ports.
1. Stop all IBM Spectrum Control servers.
2. Open the installation_dir/jre/lib/security/java.security file.
3. To enable TLS 1.1 and 1.2 in the Alert, Data, Device, and Web server, remove the "TLSv1.1 ," text
from the jdk.tls.disabledAlgorithms line.
BEFORE:
jdk.tls.disabledAlgorithms=MD5withRSA, DH keySize < 1024, TLSv1, TLSv1.1 , EC keySize < 224, anon, NULL
AFTER:
jdk.tls.disabledAlgorithms=MD5withRSA, DH keySize < 1024, TLSv1, EC keySize < 224, anon, NULL
To enable TLS 1.0, 1.1, and 1.2 in the Alert, Data, Device, and Web server, remove the "TLSv1,
TLSv1.1 ," text from the jdk.tls.disabledAlgorithms line.
BEFORE:
jdk.tls.disabledAlgorithms=MD5withRSA, DH keySize < 1024, TLSv1, TLSv1.1 , EC keySize < 224, anon, NULL
AFTER:
jdk.tls.disabledAlgorithms=MD5withRSA, DH keySize < 1024, EC keySize < 224, anon, NULL
"secureProtocol": "TLSv1_1_method"
To enable only TLS 1.0 in the Export server, change the "secureProtocol" value from
"TLSv1_2_method" to "TLSv1_method".
For example:
"secureProtocol": "TLSv1_method"
To enable TLS 1.0, 1.1, and 1.2 in the Export server, change the "secureProtocol" value from
"TLSv1_2_method" to "".
For example:
Chapter 1. Configuring 51
"secureProtocol": ""
You cannot configure the Export server such that only TLS 1.1 and 1.2 are enabled.
6. Restart the IBM Spectrum Control servers.
For IPv6 support, the AIX operating system must have level TL 5300–06 installed.
To configure the AIX operating system for IPv6, complete the following steps:
1. Obtain the most recent versions of openssh and openssl packages for AIX and install them. Some
older version of openssh does not work in an IPv6-only environment.
2. Change sshd (Secure Shell Daemon) on AIX system to accept IPv6 connections.
a. In the /etc/ssh/sshd_config file, uncomment the line "ListenAddress:".
b. Restart sshd with the following commands:
stopsrc -g ssh
startsrc -g ssh
c. From another IPv6 system, verify that you contact AIX over IPv6 (by using ssh).
3. In SMIT, set the IPv4 address to 0.0.0.0 for all interfaces. Save the file.
4. Edit the /etc/resolv.conf file to use IPv6 DNS server or servers.
To get Db2 on AIX operating systems to work on IPv6 systems, complete the following steps:
1. Identify the host name that is used by Db2 in the db2nodes.cfg file:
# cat ~db2inst1/sqllib/db2nodes.cfg
0 myhost 0
#
2. Edit the /etc/hosts file and make sure that the host name found in the db2nodes.cfg file resolves
to an IPv6 address. Use the vi editor to verify that the host name is not on any line with an IPv4
address. In particular, ensure that the host name is not listed as an alias for the IPv4 loopback address
127.0.0.1.
# vi /etc/hosts
127.0.0.1 loopback localhost
::1 localhost
2001:db8:0:0:209:6bff:fe09:63fa myhost.mydomain myhost
3. Stop Db2 and set Db2 to use IPv6 addressing. Restart Db2.
a. Source the Db2 profile:
. ~db2inst1/sqllib/db2profile
b. Stop Db2:
db2stop
db2set
db2start
In some installations, the AIX server does not have a graphical console that is attached to the server. In
this situation, you can select another system with an X11 server to display the IBM Spectrum Control
installation and IBM Spectrum Control application. The X11 server must have IPv6 configured and an SSH
client installed. Open an SSH connection from a shell on the X11 server desktop with the -X option to
permit forwarding of X11 applications from the remote AIX server. Start the IBM Spectrum Control
installation program or application from the SSH shell.
ssh -X my_IPv6_host
/opt/IBM/TPC/gui/TPCD.sh
To get Db2 on Linux systems to work in an IPv6-only environment, follow these steps:
1. Install Db2 in dual-stack configuration.
2. Stop Db2 and set Db2 to use IPv6 addressing:
a. As the root user from the Linux command-line, run this command:
su - db2inst1
db2stop
db2set
db2start
Chapter 1. Configuring 53
54 IBM Spectrum Control: Administrator's Guide
Chapter 2. Administering
Administer IBM Spectrum Control and its components to ensure that your storage environment is being
monitored as intended. Some administering tasks include stopping and starting product services,
increasing memory allocation, monitoring the health of product components, and managing storage
resources and data sources. You can use the Db2 command-line interface or IBM Data Studio to
administer Db2.
Storage systems
Administer the storage systems that are monitored by IBM Spectrum Control. Administering actions
include adding and removing storage systems, updating credentials, and testing connections.
Updating the credentials for storage systems that run IBM Spectrum Virtualize
Change the credentials that IBM Spectrum Control uses to authenticate to IBM Spectrum Virtualize
storage systems.
In this documentation, IBM Spectrum Virtualize is used to refer collectively to IBM SAN Volume
Controller, IBM Spectrum Virtualize for Public Cloud, IBM Spectrum Virtualize as Software Only, and IBM
Storwize storage systems, and to IBM FlashSystem devices that run IBM Spectrum Virtualize.
You can update the IP address or host name, the user name, and the password.
1. In the menu bar, go to Storage > Block Storage Systems.
Information about monitored storage systems is displayed.
2. Right-click a storage system and click Connections > Modify Connection.
3. Update the following credentials as required and then click OK:
Authentication
You can use a user name and password or a private Secure Shell (SSH) key to log on to the storage
system. The authentication method that you select determines the options that are displayed.
User name/Password
The user name and password for logging on to the storage system.
Secure Shell (SSH)
Use an existing SSH key or upload a new key to the storage system. Select one of the following
actions:
Use an existing SSH key
Use an SSH key that was uploaded to the storage system by using a method other than
through IBM Spectrum Control, such as the storage system web interface.
SSH key
The location of the SSH key.
The default location is ${device.conf}\tpc_svc.pem, which represents the IBM
Spectrum Control default key file tpc_svc.pem. The tpc_svc.pem file is in the conf
directory where the Device server is installed.
Chapter 2. Administering 57
Secure Shell (SSH)
Use an existing SSH key or upload a new key to the storage system. Select one of the following
actions:
Use an existing SSH key
Use an SSH key that was uploaded to the storage system by using a method other than
through IBM Spectrum Control, such as the storage system web interface.
SSH key
The location of the SSH key.
The default location is ${device.conf}\tpc_svc.pem, which represents the IBM
Spectrum Control default key file tpc_svc.pem. The tpc_svc.pem file is in the conf
directory where the Device server is installed.
You can enter another location or select Browse to search for a key file. If you select
Browse, the following fields are displayed:
Select file
The location of the SSH key file. You can click Browse to search for a file.
Passphrase
The passphrase for the SSH key pair. If you do not have a passphrase, leave this
field blank.
The SSH key file is transferred from the computer where the web browser is located to
the computer where the IBM Spectrum Control server is located.
Upload a new SSH key
Provide the following information to upload an SSH key to the storage system:
SSH key
The location of the SSH key. The key must exist on the system where you are running
the IBM Spectrum Control user interface.
The SSH key must be in OpenSSH format or in PuTTY (.ppk) format that is not
password protected.
Passphrase
The passphrase for the SSH key pair. If you do not have a passphrase, leave this field
blank.
User name, Password
The name and password for a user that belongs to the storage system Security
Administrator role for the cluster that contains the storage system.
IBM Spectrum Control uses this value to configure the SSH key for the user that is
entered in the Associate user field. The user name that is entered in the User name
field must have privileges to modify other user accounts, otherwise IBM Spectrum
Control cannot configure the SSH key.
Associate user
The user that is associated with the SSH key. If the user name does not exist, it is
created and assigned to the storage system Administrator role.
You can click Get Users to retrieve all of the existing users from the storage system.
You must select a user that belongs to the storage system Administrator role.
The SSH key file is transferred from the computer where the web browser is located to both
the computer where the IBM Spectrum Control server is located and to the storage system.
Use different authentication credentials for file storage
Storwize V7000 Unified contains block-level and file-level data. If the credentials are different for
block storage and file storage, select this check box to define the credentials for file storage. The
options and fields that are displayed are described previously under Authentication.
Tip: If you use an SSH key to log on to the file module, the user that you associate with the key
must exist on the Storwize V7000 File Module.
Chapter 2. Administering 59
3. Click Remove to confirm that you want to remove the storage system.
Chapter 2. Administering 61
1. In the menu bar in the web-based GUI, go to Network > Switches or Network > Fabrics. Information
about monitored switches or fabrics is displayed.
2. Right-click a switch or fabric and click View Properties to view the key properties for the switch or
fabric.
Chapter 2. Administering 63
Encryption protocol
The protocol used for encryption.
SNMPv1 agent
SNMP version
The SNMP version of the agent.
Read community
The SNMP community string. The default is public.
Write community
The SNMP community string. The default is private.
Fixing deployments
Use the Servers page to monitor servers that are added to IBM Spectrum Control by deploying a Storage
Resource agent. You can identify agents that failed to deploy, investigate and resolve the problems that
caused the deployment failure, and deploy the agents again.
To use the Fix Deployment action, you must have Administrator privileges.
When you use the Fix Deployment action, the existing agent deployment on the server is automatically
overwritten when the agent is deployed again.
Use the following steps to identify and fix Storage Resource agents that failed to deploy:
1. Use the Status column on the Servers page to identify agents that failed to deploy. A status of Failed
deployment indicates that an error occurred when the agent was deployed.
2. Use the deployment log to investigate the problems that prevented the agent from deploying.
Tip: The Open Logs action is not available if you select multiple server rows. The Fix Deployment
action is available if you select a single server row or multiple server rows.
Chapter 2. Administering 65
Canceling deployments
Use the Servers page to cancel the deployment of Storage Resource agents.
To use the Cancel Deployment action, you must have Administrator privileges.
Check the Agent State column on the Servers page to identify the agent deployments that you can
cancel. You can cancel the agent deployment for servers with a status of Failed deployment or Pending
deployment.
1. In the menu bar, go to Servers > Servers.
2. Locate the servers with the agent deployments that you want to cancel.
3. Click a single or multiple servers with a status of Failed deployment or Pending deployment, and then
click Actions > Cancel Deployment.
The agent deployment is canceled for the servers with a status of Failed deployment or Pending
deployment. If you select servers that have other statuses, for example, Deploying, those servers are not
affected by the action.
When you cancel the agent deployments, the servers are removed from IBM Spectrum Control. To add the
servers again, click Deploy Agent.
To view information about a Storage Resource agent, complete the following steps:
Chapter 2. Administering 67
• The monitored server is busy with resource-intensive processing and you do not want to add any IBM
Spectrum Control jobs to that processing load.
To disable a Storage Resource agent, complete the following steps:
1. In the menu bar, go to Servers > Servers.
2. On the Servers page, right-click the server where the agent is deployed and select Modify Agents >
Disable.
3. Click OK to confirm that you want to disable the agent.
The state of the agent is changed to Disabled and remains in that state until it is enabled again. You
can disable agents on multiple servers at the same time.
When you disable a Storage Resource agent that is deployed as a daemon service, the service is shut
down, and the agent is disabled. IBM Spectrum Control no longer sends requests to the agent or contacts
it for job processing. A Storage Resource agent that is deployed as a non-daemon agent runs as a stand-
alone process. Because a service is not required for this type of agent, it is not necessary to shut down the
agent before it is disabled.
Chapter 2. Administering 69
2. Right-click a server and select Logs > Collect Agent Logs.
A message is displayed that shows the location where the service file is stored on the IBM Spectrum
Control server.
3. In a command line or other navigation tool, go to the directory where the service file is located and
unpack its contents.
If the collection of service data is successful, a message is displayed that shows the location of the
resulting service file (.zip). The file is stored in a directory on the same computer as the IBM Spectrum
Control server. The file is in the following default directories:
• Windows operating system: C:\Program Files\IBM\TPC\data\log\SRATraces
\agent_computer_name\TPCServiceInfo.zip
• UNIX or Linux operating system: /opt/IBM/TPC/data/log/SRATraces/agent_computer_name/
TPCServiceInfo.zip
Where agent_computer_name represents the name of the server on which a Storage Resource agent is
deployed. If an agent communicates with more that one installation of IBM Spectrum Control, a subfolder
is created for each installation.
If the collection of service data fails, an error message is displayed. For more information about why a
data collection failed, see the server log file or the services script. These files are in the following default
directories:
• Server log file (on the computer where the IBM Spectrum Control server is installed):
– Windows operating system: c:\Program Files\IBM\TPC\data\log
– UNIX or Linux operating system: /opt/IBM/TPC/data/log
• Services script file (on the server where the Storage Resource agent is deployed):
– Windows operating system: C:\Program Files\IBM\TPC\agent\service
\agent_computer_name\TPCServiceInfo.html
– UNIX or Linux operating system: /opt/IBM/TPC/agent/service/agent_computer_name/
TPCServiceInfo.html
Where agent_computer_name represents the name of the server on which the Storage Resource agent
is deployed.
cd <installation_location>
bin/Agent -help
Usage:
Agent -INSTALL
[-COMMTYPE DAEMON -AGENTPORT portnumber]
[-FORCE]
-INSTALLLOC pathname
-SERVERIP address[,address,...]
-SERVERPORT portnumber
[-USERID username -PASSWORD password -CERT file -PASSPHRASE phrase]
Agent -UNINSTALL
[-FORCE]
-SERVERNAME servername
Agent -UPGRADE
-INSTALLLOC pathname
Removing servers
You can remove servers that you no longer want to monitor with IBM Spectrum Control.
You can use the GUI to remove servers. If a Storage Resource agent is deployed to the server, the agent is
uninstalled.
When the server is removed, it is no longer monitored by IBM Spectrum Control. All the data that was
collected about the server is removed from the database repository.
Chapter 2. Administering 71
Tip: When you remove a server, it is only removed from IBM Spectrum Control. The server is not
physically deleted from the storage environment.
To remove a server, complete the following steps:
1. In the menu bar, go to Servers > Servers.
2. On the Servers page, right-click the server where the agent is deployed and select Remove.
3. Click Remove to confirm that you want to remove the server.
Chapter 2. Administering 73
Orphan zones
Storage Resource agents do not collect information about orphan zones. An orphan zone is a zone that
does not belong to at least one zoneset.
Firewalls and Storage Resource agent deployments
Before you can deploy a Storage Resource agent on a computer, you must turn off the firewall on that
computer. If you do not turn off the firewall, the deployment fails.
Deploying Storage Resource agents on multiple computers
If you deploy Storage Resource agents on multiple computers at the same time, the computers must
have the same administrative user ID and password. IBM Spectrum Control uses these user
credentials to log on to the computers when you install Storage Resource agents.
Tip: When you deploy Storage Resource agents on multiple computers, a globally unique identifier
(GUID) is created for each computer (if one does not exist).
Communication between the IBM Spectrum Control server and a Storage Resource agent
The IBM Spectrum Control server connects to a monitored computer when a Storage Resource agent
is deployed and whenever a data collection schedule runs against that agent.
During deployment, the server communicates with the target computer by using one of the following
protocols:
• Windows server message block protocol (SMB)
• Secure Shell protocol (SSH)
• Remote execution protocol (REXEC)
• Remote shell protocol (RSH)
After deployment, the type of communication between the server and agent on that computer
depends on whether you deployed the agent as daemon service or non-daemon service.
Daemon and non-daemon services
You can deploy a Storage Resource agent as a daemon or non-daemon service:
• A Storage Resource agent that is deployed as a daemon service runs in the background on the
monitored computer and listens for requests from the IBM Spectrum Control server. Connectivity
between the server and agent is established by using SSL. The server and agent have their
respective certificates and no additional information is required besides those certificates and the
security that is provided by the SSL protocol.
• A Storage Resource agent deployed as a service on demand (non-daemon service) runs as a stand-
alone executable file on the monitored computer. Communication from the server to the agent uses
the same protocol that was used during the deployment of the agent. Communication from the
agent to the server uses SSL.
• A Storage Resource agent that is deployed as a daemon service on AIX, Linux, and Windows servers
monitors disk paths in near real-time to detect errors. When deployed as a daemon service on an
AIX server, the agent also monitors disk error events in near real-time.
If the Storage Resource agent detects path status changes or disk errors, they are included in the
status of the disks and paths. You can define alerts so that you are notified of changes to the status
of the paths on monitored disks.
Only status changes for existing paths are detected. If a new path is added, or an existing path is
removed, the number of paths that is displayed is not updated immediately. The number of paths is
updated after the next scheduled probe collects data.
If a disk on an AIX server has an error status and you fix the error, you might want the new status of
the disk to be displayed immediately. To display the new status immediately, you must reset the
status indicator for the disk. To reset the status indicator, use the errclear command to clear the
error log. To clear the error log, use the following syntax:
errclear -d H -N disk_name 0
errclear -d H -N hdisk4 0
If you do not reset the status indicator for the disk, the status changes automatically after a few
hours.
For information about the errclear command, see the product documentation at http://
www.ibm.com/support/knowledgecenter/ssw_aix_71/com.ibm.aix.cmds2/errclear.htm.
Port numbers for Storage Resource agents deployed as a daemon service
The following port numbers are used by Storage Resource agents that are deployed as daemon
service:
• 9567 (For the Storage Resource agent that is deployed on the same server as IBM Spectrum
Control.)
• 9510 (For Storage Resource agents that are deployed on remote servers.)
Storage Resource agents that are deployed as a non-daemon service do not use a port.
Authentication between the IBM Spectrum Control server and a Storage Resource agent
IBM Spectrum Control requires the correct authentication information (user name, password, port,
certificate location, or passphrase) for monitored computers each time it communicates with Storage
Resource agents on those computers. If the authentication information changes for a host computer
on which a Storage Resource agent is deployed, the authentication information for that agent must be
updated by using the Modify Agents > Update Credentials action on the Servers page in the GUI.
Replacing default SSL certificates
IBM Spectrum Control provides default SSL certificates for communication between the Data server
and Storage Resource agent.
IBM Spectrum Control Version 5.2.2 uses SSL certificates with 2048-bit encryption keys whereas
previous versions of IBM Spectrum Control used 1024-bit encryption keys. If you upgrade IBM
Spectrum Control from a version earlier than 5.2.2, your SSL certificates are not updated
automatically. If you want to use 2048-bit encryption keys with previous versions of IBM Spectrum
Control, you must replace the default SSL certificates with custom SSL certificates.
For information about how to replace SSL certificates, see “Replacing default SSL certificates for the
Data server and Storage Resource agents with custom SSL certificates” on page 36.
Storage Resource agents on the same computer
You cannot deploy a Storage Resource agent on a computer where a Storage Resource agent is
already installed and pointing to the same Data server. You can deploy a Storage Resource agent on
the same computer as another Storage Resource agent if those agents communicate with different
Data servers and use different ports when you listen for requests.
Time zones for computers that are monitored by Storage Resource agents
The time zones of computers that are monitored by Storage Resource agents are shown as Greenwich
mean time (GMT) offsets in IBM Spectrum Control reports. For example, a computer in Los Angeles
shows the following time zones in the By Computer report in Asset reporting:
(GMT-8:00) GMT-8:00
Connections for Linux and AIX operating systems by using Remote Shell protocol (RSH)
If RSH is configured to use a user ID and password, the connection fails. To successfully connect to a
system by using RSH, you must set up the .rhosts file (in the home directory of the account). RSH
must be configured to accept a login from the system that is running your application.
Deployments on Windows operating systems - NetBIOS setting
To install a Storage Resource agent on Windows targets, the Enable NetBIOS over TCP/IP option
must be selected in the Control Panel settings for the computer's network connections properties. To
set this option, complete the following steps:
Chapter 2. Administering 75
1. Open Windows Control Panel. For information about how to open Windows Control Panel, see
“Accessing administration tools” on page 134.
2. Select Network and Dial-Up Connections > some_connection > Properties > Internet Protocol
(TCP/IP) > Advanced > WINS > Enable NetBIOS over TCP/IP.
To determine whether these ports are not blocked for inbound requests, see the documentation for
your firewall.
To determine whether security policies are blocking the connection ports, open Administrative Tools.
For information about how to open Administrative Tools, see “Accessing administration tools” on page
134..
Depending on whether your policies are stored locally or in Active Directory, follow these directions:
Policies that are stored locally
For policies that are stored locally, complete the following steps:
1. Open Windows Administrative Services.
2. Click Local Security Policy > IP Security Policies on Local Computer.
Policies that are stored in Active Directory
For policies that are stored in Active Directory, examine the IP security policies and edit or remove
filters that block the ports:
• Click Administrative Tools > Default Domain Security Settings > IP Security Policies on
Active Directory.
• Click Administrative Tools > Default Domain Controller Security Settings > IP Security
Policies on Active Directory.
For all Windows systems, the Server service must be running to connect to a Windows system by
using the Windows protocol.
The following table lists the ports that are reserved for NetBIOS. Ensure that these ports are not
blocked.
Port Description
135 NetBIOS Remote procedure call. (Not currently used.)
137 NetBIOS name service.
138 NetBIOS datagram. (Not currently used.)
139 NetBIOS session (for file and print sharing).
445 CIFS (on Windows XP).
For Windows , shares must be shared for the Guest or Everyone accounts, and password protected
sharing must be disabled. To disable password protected sharing, follow these steps:
1. Click Control Panel > Networking and Sharing Center.
2. Click Change advanced sharing settings.
3. Click the down arrow next to All Networks.
4. Select Turn off password protected sharing.
5. Click Save Changes.
6. Exit from the Control Panel.
Deployments on Windows - User Account Control (UAC) remote restrictions
To install Storage Resource agents remotely on a Windows operating system, you must disable the
User Account Control (UAC) remote restrictions on the Windows operating system. User Account
Control is a security component on Windows operating systems.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Policies\System
SMI-S providers
Administer SMI-S providers that are associated with storage resources that are monitored by IBM
Spectrum Control. SMI-S providers enable communication between IBM Spectrum Control and certain
types of storage systems and switches.
IBM Spectrum Control communicates with SMI-S providers to collect information about the following
resources:
• Non-IBM storage systems that are managed by SMI-S certified Common Information Model Object
Manager (CIMOM), such as Dell EMC storage systems other than Unity, Hitachi, and NetApp
• Switches: Brocade switches that are running with a version of Fabric OS earlier than 8.2.1, monitored
through Brocade Network Advisor
IBM Spectrum Control communicates directly with the following resources and does not require SMI-S
providers:
• System Storage DS8000
• SAN Volume Controller
• The XIV
• IBM Spectrum Accelerate
• Storwize family of storage systems
• IBM FlashSystem family of storage systems
• IBM Cloud Object Storage
• Dell EMC Unity
• Switches: Brocade switches that are connected to directly, that are running with Fabric OS 8.2.1 or later,
and that are monitored through REST API
• Switches: Cisco switches monitored through SNMPv3 or SNMPv1
Chapter 2. Administering 77
Where <IP> is the IP address of the system where the SMI agent is installed, and <port> is the port
number. By default, this is 5989 for a secure connection and 5988 for an unsecured connection.
Replacing an SMI agent for block storage systems, fabrics, and switches
You can replace the SMI agent for storage resources without interrupting the collection of performance
data or losing historical data.
Attention: Before you begin, check whether a probe job is already in progress for the resource or is
scheduled to occur while you replace the SMI agent. Plan the replacement during a time when the probe
job is not occurring.
You might want to replace a SMI agent for a storage resource for the following reasons:
• The SMI agent might need to be upgraded to support data collection for the storage resource.
• The SMI agent might run on a different operating system, network, or with a different IP address.
You can replace an SMI agent on a third-party block storage system, such as a Dell EMC storage system.
You cannot replace an SMI agent on IBM System Storage DS8000 (the DS8000 uses a native API (NAPI)
connection, rather than an SMI-S provider).
To replace an SMI agent, follow these steps:
1. Using the instructions that came with your SMI agent software, install the new SMI agent and add the
storage resource that it manages. The procedure varies, depending on the type of storage resource.
2. Choose one of the following procedures:
Type of storage resource Procedure for adding a storage resource to the SMI agent
configuration
To add a storage system See the topic about adding storage systems in the IBM Spectrum
Control User's Guide PDF, located in the IBM Spectrum Control
Knowledge documentation. To view the guide, go to the product
documentation at https://www.ibm.com/docs/en/spectrum-control/
5.4.3.
To add a fabric or a switch See the topic about adding fabrics and switches in the IBM Spectrum
Control User's Guide PDF, located in the IBM Spectrum Control
Knowledge documentation. To view the guide, go to the product
documentation at https://www.ibm.com/docs/en/spectrum-control/
5.4.3.
3. In IBM Spectrum Control, run the Add Device Wizard for the new SMI agent.
After the wizard discovers the storage resource, a message is displayed to confirm that the data source
(SMI agent) was added for monitoring. Close the window.
4. In the IBM Spectrum Control GUI, right-click the storage resource and click Connections > Test
Connection > [IP address of the new SMI agent].
Verify that the test was successful.
5. Remove the storage system or fabric switch from the old SMI agent.
6. Shut down the old SMI agent services or the device that runs the old SMI agent.
7. Restart the probe to continue the collection of asset, capacity, and configuration data for the resource.
8. Check the status of the probe and performance monitor to ensure that the data is being collected for
the storage resource.
The SMI agent is replaced. Depending on your resource or SMI agent, the old association of storage
resource and SMI agent might continue to display with the new association in the Connections menu. The
old SMI agent does not interfere with operation. It cannot be selected as an SMI agent for the storage
resource.
For more information, see SMI-S providers in the IBM Spectrum Control Knowledge documentation.
For information about the interoperability namespaces for storage systems, see the IBM Spectrum
Control interoperability matrix for storage systems.
For information about the interoperability namespace for switches and directors, see the IBM
Spectrum Control interoperability matrix for switches.
SNMP agents
SNMP agents are switches and directors that communicate with IBM Spectrum Control through SNMP.
IBM Spectrum Control uses SNMP to send queries across the IP network to management information
bases (MIBs) supported on switches and directors. IBM Spectrum Control uses the Fibre Alliance FC
Management MIB and the Fibre Channel FE MIB specifications. The queries are sent only to switches that
were added to IBM Spectrum Control for use as SNMP agents. Information is collected from each switch
that is configured to use SNMP. The SNMP discovery registers each switch.
You add a switch as an SNMP agent on the Network > Switches page. You can then perform actions on
the switch, including:
• running an immediate probe job, or scheduling a probe job to collect data from the switch at a specified
time
• viewing information about the switch, such as the condition of the switch, the status of the most recent
probe job, and other information
• modifying the connection information and credentials for the switch
• removing the switch so it is no longer managed by IBM Spectrum Control.
For information about adding switches to IBM Spectrum Control, go to the product documentation at
Adding fabrics and switches.
Chapter 2. Administering 79
Authentication protocol
The protocol or digest used for authentication to the switch.
Encryption protocol
The protocol used for encryption.
SNMPv1 agent
SNMP version
The SNMP version of the agent.
Read community
The SNMP community string. The default is public.
Write community
The SNMP community string. The default is private.
In the Overview section of the System Management page, the running icon is displayed next to the
server to indicate that it is running.
Chapter 2. Administering 81
Stopping the IBM Spectrum Control servers by using the GUI
Stop the IBM Spectrum Control Data server, Device server, or Alert server by using the System
Management page in the GUI.
1. In the menu bar, go to Home > System Management.
2. Click Component Servers in the Components section.
3. Click Stop Server next to the server that you want to stop.
Tip: To stop the Web server, use scripts that are provided with the product.
In the Overview section of the System Management page, the error icon is displayed next to the
server to indicate that it is stopped. While a server is stopped, some product functions are not available.
For example, if the Alert server is stopped, the ability to detect alert conditions on resources and send
notifications is not available.
Chapter 2. Administering 83
Troubleshooting problems with the IBM Spectrum Control component and
servers
If IBM Spectrum Control is not running or its performance has degraded, you can use the System
Management page of the IBM Spectrum Control GUI to assess the overall condition of the system. You
can also view the file system capacity and volume performance trends to help you anticipate future needs
and prevent problems.
To view file system capacity information, the Storage Resource agent on the IBM Spectrum Control server
must be running. In a multiple-server environment, a Storage Resource agent must be installed and
running on the secondary server to view file system capacity information for the secondary server.
To view performance information for storage system volumes, the storage systems must be managed by
IBM Spectrum Control and have performance monitors running.
The System Management page shows a high-level summary of the condition of the server or servers on
which IBM Spectrum Control is installed.
To troubleshoot problems with IBM Spectrum Control, complete the following steps:
1. In the menu bar, go to Home > System Management.
2. Use the System Management page to view the status of the IBM Spectrum Control system.
• Check the state of each component server and the DB2 database to verify that they are all running.
To examine the status and resource usage of component resources in detail and, if necessary, to
restart the Data server, Device server, or Alert server, complete the following steps:
a. Click Component Servers in the Components section. View the state, memory use, and
database connections for each component server.
b. Optional: If the Data server, Device server, or Alert server is not running, click the Start Server
button to restart the server. If the Device server is running, but one or more of its services are
not running, click the Start Services button to restart the services.
• If the performance of the IBM Spectrum Control is slow, examine the chart for available file system
space and the volume performance charts.
• Check whether there are any alerts for the server or servers on which IBM Spectrum Control is
installed. The Alerts link in the Overview section shows the number of alerts and the greatest alert
severity. Click Alerts in the Overview section to view the alerts.
3. Optional: You can also view the status of the product servers on Windows:
a) On the Windows desktop, click Start > Control Panel > Administrative Tools > Services.
Tip: For information about how to view information about services on different versions of
Windows, see https://www.ibm.com/docs/en/spectrum-control/5.4.3?topic=systems-accessing-
administration-tools.
b) On the Services window, locate the names of the server services. For example, the service for the
Alert server is IBM Spectrum Control - Alert Server.
c) View the Status column to determine if the service is running or stopped.
d) Optional: If a server is not running and you want to restart it, right-click the service name for that
server and click Start.
Packaging and sending log files from the System Management page
To provide trace information to IBM® Support about the performance of IBM Spectrum Control, you might
be asked to package and send a set of log files. One way to package and send the log files is from the
Spectrum Control System Management page.
To package and send IBM Spectrum Control log files, you must be assigned to the Administrator role and
open a support ticket with IBM Support. You can open a support ticket in IBM Spectrum Control as
described in the following procedure or on the IBM Support website. For information about how to open a
support ticket on the IBM Support website, go to Getting support.
Chapter 2. Administering 85
Depending on the environment, the size of the log file package can vary. Its size is determined by the
following factors:
• How frequently the product is used
• The number of resources that are monitored, the type of data that is being collected, and how
frequently that data is collected
• The length of time that the product has been up and running
For example, if the product monitors five storage systems over a period of three days, and collects asset
and performance each day, the size of the package might be 200 - 300 MB.
FTP Proxies
There are several ftp proxy types known. Each type is using a different
login procedure and needs different commands to connect to the target
ftp server.
-ftp_proxytype=0
no ftp proxy is used ( this is the default )
-ftp_proxytype=1
connect; USER <p_user>; PASS <p_passwd>;
SITE <server>; USER <user>; PASS <passwd>
-ftp_proxytype=2
connect; SITE <server>; USER <user>; PASS <passwd>
-ftp_proxytype=3
connect; USER <p_user>; PASS <p_passwd>;
OPEN <server>; USER <user>; PASS <passwd>
-ftp_proxytype=4
connect; OPEN <server>; USER <user>; PASS <passwd>
-ftp_proxytype=5
connect; USER <user>@<server>; PASS <passwd>
-ftp_proxytype=6
connect; USER <p_user>@<server>; PASS <p_passwd>;
USER <user>; PASS <passwd>
-ftp_proxytype=7
connect; USER <user>@<server> <p_user>;PASS <p_passwd>;
ACCT <passwd>
-ftp_proxytype=8
connect; USER <user>@<server> <p_user>;PASS <passwd>;
ACCT <p_passwd>
-ftp_proxytype=9
connect; USER <user>@<p_user>@<server>;PASS <passwd>;
ACCT <p_passwd>
-ftp_proxytype=10
connect; USER <user>@<p_user>@<server>;PASS <p_passwd>;
ACCT <passwd>
-ftp_proxytype=11
connect; USER <p_user>; PASS <p_passwd>;
USER <user>@<server>; PASS <passwd>
b) Based on the type of FTP proxy server that you use, copy and paste the appropriate section from
step 2a into ibmsdduu.config.
c) For the section that you pasted into ibmsdduu.config, provide information such as host name,
port, user ID, and password, as needed.
For example:
-ftp_proxytype=1
-ftp_proxyuser=my_user_id
-ftp_proxypw=my_password
Chapter 2. Administering 87
-ftp_proxyhost=ftp_proxy.my_company.com
-ftp_proxyport=21
Where:
• my_user_id and my_password represent the authentication credentials for connecting to the
FTP proxy server.
• ftp_proxy.my_company.com represents the DNS name of the FTP proxy server.
3. Save the file to installation_dir/services, where installation_dir represents the
directory where IBM Spectrum Control is installed.
The default installation directory is as follows:
• Windows: C:\Program Files\IBM\TPC
• Linux / AIX: /opt/IBM/TPC
4. Try to upload the log package or compressed file again.
If you still cannot automatically upload a log package in the IBM Spectrum Control GUI, you can try
uploading it manually. For information about how upload files to ECuRep manually, see the following
topics:
• FTP Transfer
• Upload through browser
Log packages are stored on the IBM Spectrum Control server at the following location:
installation_dir/wlp/usr/servers/webServer/apps/WebServer.ear/TPC-GUI.war/
serviceLog
Increasing the memory allocation for the Data server that is running on AIX
Increase the memory allocation for the Data server that is running on AIX.
To increase the memory that is allocated for the Data server, complete the following steps:
1. Log on as a user with root authority.
2. Stop the Data server. From the command line, run the following command:
/TPC_install_directory/scripts/stopTPCData.sh
where XXXX is the memory allocated for the Data server. The default is 1024m (1024 MB).
5. Increase the memory that is allocated for the Data server. For example, to increase the memory to
1536 MB, change the line to read as follows:
/TPC_install_directory/scripts/startTPCData.sh
Increasing the memory allocation for the Data server that is running on
Linux
Increase the memory allocation for the Data server that is running on Linux.
To increase the memory that is allocated for the Data server, complete the following steps:
1. Log on as a user with root authority.
2. Stop the Data server.
3. From the command line, run the following command:
/installation_dir/scripts/stopTPCData.sh
Where XXXX is the memory that is allocated for the Data server. The default is 1024m (1024 MB).
6. Increase the memory that is allocated for the Data server. For example, to increase the memory to
1536 MB, change the line to read as follows:
/installation_dir/scripts/startTPCData.sh
Chapter 2. Administering 89
a) Open Windows Services. For information about how to open Services, see “Accessing
administration tools” on page 134.
b) Right-click IBM Spectrum Control - Data Server and click Stop.
To restart the server, right-click the service and click Start.
Changing passwords
IBM Spectrum Control provides a GUI and non-GUI password tool; however, both tools achieve the same
purpose.
Attention: For Linux and AIX operating systems, it is recommended that you use the GUI
password tool. However, if you use the non-GUI password tool for future updates, then do not use
the GUI password tool to update your passwords on the same system at a later time or the IBM
Spectrum Control servers might not operate properly.
If you installed IBM Spectrum Control and used the same Db2® user ID and password for the items IBM
Spectrum Control requires, then when you change the Db2 password, you must also change the
passwords for the items that the Db2 password applies to.
The Db2 administrative password might also apply to the following items:
• The database administration user ID and password (for the Data or Device server to connect to the
database).
• The database user ID and password to create the database schema.
• The host authentication password (for the Storage Resource agents to communicate with the Device
server).
• The Storage Resource agent service login user ID and password (for Windows only, if this user ID does
not exist).
To run the password tool when you log in by using a domain user account, choose one of the following
methods:
• Right-click the changepasswords.bat file and select Run as administrator.
Or
1. Click Start > All Programs > Open Administrative Tools > Local Security Policy.
2. On the Local Security Policy window, disable User Account Control: Run all administrators in
Admin Approval Mode.
3. Restart your computer.
Single server installation where components use the same logon credentials
Use the password tool to change the password for IBM Spectrum Control when it is installed on a single
server and the Common User and the Db2 User are identical and use the same logon credentials. The
If necessary, change the Common User Windows domain password and run the password tool
again.
To change a password in the AIX or Linux operating system, follow these steps:
2. Log in as the root user.
a) Run the following command:
passwd username
Spectrum_Control_Installation_dir\service
Spectrum_Control_Installation_dir/service
changepasswords.bat
./changepasswords
5. Select Change the IBM Spectrum Control and DB2 Passwords and click OK..
6. Enter and then confirm the same new password that you entered when you changed the password in
the operating system in Step 1 or Step 2. Verify that the Restart servers option is selected.
7. Click OK.
Chapter 2. Administering 91
8. In the Confirm password change window, click Yes.
9. When the tool finishes, click Back To Main.
10. Click Exit program..
Tip: To verify that the password changes were successful, review the log file that is located in the
Spectrum_Control_installation_dir\service\log directory.
Related tasks
“Single-server installation where components use different logon credentials” on page 92
Use the password tool to change the passwords for IBM Spectrum Control when it is installed on a single
server and the Common User and the Db2 User are different and use different logon credentials.
“Multiple-server installation where Db2 is remote” on page 94
Use the password tool to change the passwords for IBM Spectrum Control when the IBM Spectrum
Control database repository and the IBM Spectrum Control servers are installed on different servers.
Related reference
“Stopping the IBM Spectrum Control servers by using scripts” on page 82
Run scripts to stop the IBM Spectrum Control servers on the Windows, Linux, or AIX operating systems.
“Changing passwords by using the password tool” on page 90
Use the password tool to change the passwords for Db2 and IBM Spectrum Control so that they can
continue to authenticate to one another whenever you change a password.
If necessary, change the Common User Windows domain password and run the password tool
again.
To change a password in the AIX or Linux operating system, follow these steps:
2. Log in as the root user.
a) Run the following command:
passwd username
Spectrum_Control_Installation_dir\service
Spectrum_Control_Installation_dir/service
changepasswords.bat
./changepasswords
5. To change the Common User's password in IBM Spectrum Control, do the following in the password
tool:
a) Select Change IBM Spectrum Control Passwords and click OK.
b) Enter and then confirm the same new password that you entered when you changed the Common
User's password in the operating system in Step 1 or Step 2.
c) Click OK.
d) In the Confirm password change window, click Yes.
e) When the process is completed, click Back to Main.
6. To change the Db2 User's password in IBM Spectrum Control, do the following in the password tool:
a) Select Change DB2 password and click OK.
b) Enter and confirm the same new password as you entered when changing the Db2 User's password
in the operating system in Step 1 or Step 2. Verify that the Restart servers option is selected.
c) Click OK.
d) In the Confirm password change window, click Yes.
e) When the process is completed, click Back to Main.
7. Click Exit Program.
Tip: To verify that the password changes were successful, review the log file that is located in the
Spectrum_Control_installation_dir\service\log directory.
Related tasks
“Single server installation where components use the same logon credentials” on page 90
Use the password tool to change the password for IBM Spectrum Control when it is installed on a single
server and the Common User and the Db2 User are identical and use the same logon credentials. The
credentials are usually db2admin on a Windows operating system or db2inst1 on AIX and Linux operating
systems.
“Multiple-server installation where Db2 is remote” on page 94
Use the password tool to change the passwords for IBM Spectrum Control when the IBM Spectrum
Control database repository and the IBM Spectrum Control servers are installed on different servers.
Related reference
“Stopping the IBM Spectrum Control servers by using scripts” on page 82
Run scripts to stop the IBM Spectrum Control servers on the Windows, Linux, or AIX operating systems.
“Changing passwords on Windows systems from the Command Line Interface (CLI) ” on page 97
Chapter 2. Administering 93
Use the changepasswords.bat script to change the stored passwords of the user IDs used by IBM
Spectrum Control.
If necessary, change the Common User Windows domain password and run the password tool
again.
To change a password in the AIX or Linux operating system, follow these steps:
2. Log in as the root user.
a) Run the following command:
passwd username
Spectrum_Control_Installation_dir\service
Spectrum_Control_Installation_dir/service
changepasswords.bat
changepasswords
Spectrum_Control_Installation_dir\service
Spectrum_Control_Installation_dir/service
12. On Server B start the password tool by running the following command:
• For Windows operating system:
changepasswords.bat
changepasswords
13. To change the Common User's password in IBM Spectrum Control on Server B, do the following in the
password tool:
a) Select Change IBM Spectrum Control Passwords and click OK.
b) Enter and then confirm the same new password that you entered when you changed the Common
User's password in the operating system in Step 1 or Step 2.
c) Click OK.
d) In the Confirm password change window, click Yes.
e) When the process is completed, click Back to Main.
14. To change the Db2 User's password in IBM Spectrum Control on Server B, do the following in the
password tool:
a) Select Change DB2 password and click OK.
b) Enter and confirm the same new password as you entered when you changed the Db2 User's
password in the operating system on Server A in Step 1 or Step 2. Verify that the Restart servers
option is selected.
c) Click OK.
d) In the Confirm password change window, click Yes.
e) When the process is completed, click Back to Main.
15. Click Exit Program.
Tip: To verify that the password changes were successful, review the log file that is located in the
Spectrum_Control_installation_dir\service\log directory.
Related tasks
“Single server installation where components use the same logon credentials” on page 90
Use the password tool to change the password for IBM Spectrum Control when it is installed on a single
server and the Common User and the Db2 User are identical and use the same logon credentials. The
Chapter 2. Administering 95
credentials are usually db2admin on a Windows operating system or db2inst1 on AIX and Linux operating
systems.
“Single-server installation where components use different logon credentials” on page 92
Use the password tool to change the passwords for IBM Spectrum Control when it is installed on a single
server and the Common User and the Db2 User are different and use different logon credentials.
Related reference
“Stopping the IBM Spectrum Control servers by using scripts” on page 82
Run scripts to stop the IBM Spectrum Control servers on the Windows, Linux, or AIX operating systems.
“Changing passwords on Windows systems from the Command Line Interface (CLI) ” on page 97
Use the changepasswords.bat script to change the stored passwords of the user IDs used by IBM
Spectrum Control.
Changing passwords on AIX and Linux systems using the Command Line
Interface (CLI)
Use the changepasswords_noX.sh script to change the passwords for IBM Spectrum Control on an AIX
or Linux server that does not have the X Windows System installed.
Attention: It is recommended that you use the GUI password tool. However, if you use the non-
GUI password tool for future updates, then do not use the GUI password tool to update your
passwords on the same system at a later time or the IBM Spectrum Control servers might not
operate properly.
Before you use the changepasswords_noX.sh script, ensure that you know the existing passwords that
you want to change. Stop the IBM Spectrum Control servers.
Use the following steps to change the Db2 password in the Windows, AIX, or Linux operating systems.
Then, use the IBM Spectrum Control changepasswords_noX.sh script to update the IBM Spectrum
Control servers to use the new passwords.
To change a password in the AIX or Linux operating system, follow these steps:
1. Log in as the root user.
a) Run the following command:
passwd username
Spectrum_Control_Installation_dir/service
./changepasswords_noX.sh
4. Enter the corresponding option for the password that you want to change: tpc or db.
5. Enter the same new password that you entered when you changed the user password in the operating
system in Step 1.
6. When you are finished using the changepasswords_noX.sh script, enter quit in the prompt window.
-tpc -r
-i
-db
Required Parameters:
-sc OR -tpc
Changes the password stored for the user ID for IBM Spectrum Control.
-db
Changes the password stored for the database administrator user ID.
-p
Enter the new password.
-i
The new password is read from standard input, that is, you enter the password when prompted by the
changepasswords.bat script.
Optional Parameters:
-r
Restart the IBM Spectrum Control server services.
Chapter 2. Administering 97
6. For example, name the new group Administrators. Under Properties, add the user
Administrator, and the domain accounts or groups upon which you want the Group Policy in effect
for. For example, you can add TPC\storageadmin, TPC\storagegroup, and TPC\TestGroup. Click
OK.
7. Add these user rights to the domain account:
• Act as part of the operating system
• Log on as a service
In the Group Policy Object Editor, go to New Group Policy Object your_policy > Computer
Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignments.
In the content pane, select "Log on as a service" and double-click. Add the domain user for whom you
are granting user rights and click OK. Repeat this step for "Act as part of the operating system."
8. The group policy is now enforced for the Organizational Unit to include the domain accounts and
groups specified under the local Administrators group on each computer in the Organizational Unit. In
addition, the domain user has been granted the necessary rights. To verify the user rights, log in to a
domain computer and open the Computer Management console. Select Groups, double-click the
Administrators group, and verify the membership of the domain users.
Chapter 2. Administering 99
By default, the service data is collected in one of the following directories:
For Windows operating systems:
installation_dir\service\data
For Linux and AIX operating systems:
installation_dir/service/data
For more information about changing the default directory, see “How to customize the service tool” on
page 102.
You can run the service tool on IBM Spectrum Control regardless of whether you configured it on a single
server or on multiple servers. The service tool automatically recognizes the installed components and
collects service data about them. For more information about running the service tool for servers, see
“Packaging log files from the command line and sending them to IBM Support” on page 100.
Packaging log files from the command line and sending them to IBM Support
To provide trace information to IBM® Support about the performance of IBM Spectrum Control, you might
be asked to package and send a set of log files. You can run the service tool from the command line to
create the log package and then manually upload it to IBM Support.
To package IBM Spectrum Control log files, you must have administrator authority on Windows operating
systems or root authority on AIX and Linux operating systems.
Before packaging or sending the log files, you must first open a support ticket with IBM Support. For
information, see Getting support.
In order to run the service tool when you log in by using a Windows domain user account, you must grant
Db2 SYSADM authority to that Windows domain user account.
To run the service tool when you log in by using a domain user account, choose one of the following
methods:
• Right-click the service.bat file and select Run as administrator.
Or
• Click Start > All Programs > Open Administrative Tools > Local Security Policy.
• On the Local Security Policy window, disable User Account Control: Run all administrators in Admin
Approval Mode.
• Restart your computer.
The compressed file contains data about the following IBM Spectrum Control components: Alert server,
Data server, Device server, Web server, Storage Resource agent, DB2, CLI, and installation.
Tip: You can customize the service tool to collect data about specific IBM Spectrum Control components.
For more information, see “How to customize the service tool” on page 102.
To run the service tool for all components, follow these steps:
1. Log on to the system where IBM Spectrum Control is installed.
2. Go to the following directory:
Windows operating systems:
installation_dir\service\
Linux or AIX operating systems:
installation_dir/service/
3. Run the following program:
Windows operating systems:
service.bat
Linux or AIX operating systems:
service.sh
If . . . Then . . .
You are a US healthcare client Blue Diamond data upload instructions.
The log file is < 200 MiB Upload and attach the file to the case.
The log file is > 200 MiB Enhanced Customer Data Repository (ECuRep) -
Send data (FTP).
Related tasks
“Creating a compressed file for a Storage Resource agent ” on page 101
Run the service tool on Storage Resource agents that were deployed by using the web-based GUI to
create a compressed file that can be sent to IBM Software Support.
Related reference
“How to customize the service tool” on page 102
The default behavior of the service tool is to collect data about all IBM Spectrum Control components, but
you can use the service tool to collect data about specific components. You can also use command-line
parameters to specify a location to place the data that is collected, specify that the data is compressed, or
to specify both.
Specifying Javacore, Java heap dump. snap trace, and Java core dump file
collection
By default, the service tool collects all Javacore files, the most recent Java heap dump file, and the most
recent snap trace file for the Data server, Device server, Alert server, web server, and data collector. The
service tool can collect Java core dump files for these IBM Spectrum Control components, but it does not
by default. You can edit the following parameters in the installation_dir/service/
service.properties file in order to control which types of files and how many of each file type are
collected by the service tool:
coreFiles=0
Specifies how many Java core dump files are collected. The default value is 0 because Java core
dump files are generally very large. The valid values for this parameter are 0 or a positive integer. Any
other value results in the default behavior.
javaCoreFiles=-1
Specifies how many Javacore txt files are collected. The default value of -1 means that all Javacore txt
files are collected. The valid values for this parameter are 0 or a positive integer. Any other value
results in the default behavior.
heapDumpFiles=1
Specifies how many Java heap dump files are collected. The default is to collect the most recent Java
heap dump file. The valid values for this parameter are 0 or a positive integer. Any other value results
in the default behavior.
snapFiles=1
Specifies how many snap trace files are collected. The default is to collect the most recent snap trace
file. The valid values for this parameter are 0 or a positive integer. Any other value results in the
default behavior..
Backup types
To back up your database, choose one of the following options:
Offline (Default)
When the data is being backed up, you can neither access nor connect to the database.
Online
When the data is being backed up, you can access and connect to the database. Unlike the offline
option, the database remains available to you and the applications that use the database. To configure
this option, requires a good knowledge of Db2.
Logging types
In the event of a system failure, the log files are used to recover data. You can choose either circular
logging or archive logging.
The types of logging are:
Circular (Default)
This type of logging is used with IBM Spectrum Control for an offline backup.
Archive
This type of logging is used with an online backup. With archive logging, you can enable a rollforward
recovery of the database to a specific date and time. A good knowledge of Db2 is needed to manage
this type of logging.
Related concepts
“Comparison of database backup methods” on page 105
The method that you choose to back up your data determines whether IBM Spectrum Control remains
online or offline during the backup process.
Related information
Restore overview
Recover overview
IBM Redbook: IBM Tivoli Storage Productivity Center Beyond the Basics
5. Create a directory to store the backup of the IBM Spectrum Control database.
Tip: Choose a directory location that has enough free space to hold the number of backups that you
plan to retain. Use a separate file system rather than the file system that contains the IBM Spectrum
Control database. You can choose to use a location that is a remotely mounted Common Internet File
System (CIFS) or Network File System (NFS), so the backup data is secured to another server.
6. In the Db2 environment, run the following command to backup the IBM Spectrum Control database:
DB2 BACKUP DATABASE TPCDB USER user_name USING password TO location COMPRESS
product_installation_directory\eclipse.exe
.product_installation_directory/eclipse
3. On the New Connection page, select DB2 for Linux, UNIX and Windows and configure your IBM
Spectrum Control database connection parameters.
4. Click Next.
5. On the Database Administration - IBM Data Studio page, expand DB2 .
6. Right-click DB2 and select TPCDB > Back Up and Restore > Back Up.
7. On the Back up TPCDB page, confirm the details of your database.
8. Click Backup Type.
9. Click Backup Image and select File System as the media type.
10. Click Backup Options.
11. In the Backup options compression and throttle section, select the Compress backup image and
Throttle this utility to regulate the performance impact on the database workload check boxes.
12. Click Backup Performance.
product_installation_directory\eclipse.exe
.product_installation_directory/eclipse
3. On the New Connection page, select DB2 for Linux, UNIX and Windows and configure your IBM
Spectrum Control database connection parameters.
4. Click Next.
5. On the Database Administration - IBM Data Studio page, expand DB2 .
6. Right-click DB2 for Linux, UNIX and Windows and select TPCDB > Set Up and Configure >
Configure Database Logging.
7. On the Configure Database Logging TPCDB page, click Logging Type and select Archive.
8. Click Logging Size and enter your log file size information. For example, 2500.
9. Click Log Location and enter the DB2 log path information.
10. On theDatabase Administration - IBM Data Studio page, expand DB2 .
11. Right-click DB2 and select TPCDB and select Back Up and Restore > Back Up.
12. Click Backup Image and select File System as the media type.
13. Click Backup Options.
14. In the Backup options compression and throttle section, select the Compress backup image and
Throttle this utility to regulate the performance impact on the database workload check boxes.
15. Click Backup Performance.
You can increase the number of table spaces and buffers, from the default values, to improve
performance.
16. After you set all of the options, click Run or Preview Command to see the actual DB2 command that
is run as part of the backup.
The online database backup to a file system is run and the backup is complete.
Tip: You can also perform an online backup of the IBM Spectrum Control databases to a Tivoli Storage
Manager server. The significant difference between online and offline backup is the need to enable
archive logging on the databases. When you use the online method, it provides many backup and recovery
4. In the Db2 environment, run the following command to restore your backup of the IBM Spectrum
Control database:
DB2 RESTORE DATABASE TPCDB FROM location INTO TPCDB REPLACE EXISTING
Disaster recovery
Back up your database regularly to be prepared for disaster recovery if a disaster event occurs.
Disaster recovery is the rebuilding of a database or table space after a disaster event such as media or
storage failure, power interruption, or application failure occurs. If a disaster event occurs and a database
or table space is damaged or corrupted, you can restore one of your backups.
Related tasks
Restoring the database
Choose and then implement the Db2 restore method for restoring your backup of the IBM Spectrum
Control database.
Related reference
Backing up the database
Choose and then implement the Db2 backup method for securing the data that is collected and stored in
the database for IBM Spectrum Control.
Related information
Data recovery
Note: To monitor the progress of the database reorganization, redirect your output to a file.
DB2 - DB2-0
DB2DAS - DB2DAS00
DB2 JDBC Applet Server
DB2 License Server
DB2 Security Server
Windows Server 2012 a. On the Dashboard page, hover the mouse over the lower left
corner of the page next to the Server Manager taskbar button,
and then click Start.
b. On the Start page, right-click, and then click the All apps taskbar
button.
Open IBM Data Studio Administration client on Linux and AIX operating
systems
On the command line, issue the following command:
DS_install_dir/eclipse
where DS_install_dir is the directory where you installed the full client.
/opt/IBM/DS3.1.1/eclipse
Monitoring Db2
The minimum user authority level needed for monitoring IBM® Db2® instances is a user with Db2® system
maintenance authority (SYSMAINT).
To check and set SYSMAINT authority, follow these steps:
If the setup for the operating system group has not been done, you do not see a value set.
If the setup has been done, this example shows what you can expect to see:
b. After issuing the db2 update command, restart Db2 by running the following command from the
Db2 command prompt window or restarting the system:
This command might need to be issued a few times to stop all the database connections.
c. Run the following commands from the Db2 command prompt window:
db2stop
db2start
Collect information about zoning REST API or SMI agent SNMP agent
information and zone control
Check the IBM Spectrum Control interoperability matrix for switches for information about the switches
and directors that are supported by IBM Spectrum Control, and limitations that you need to know about
when you use these devices.
agent.sh command
The agent.sh command lets you start, stop, and restart the Storage Resource agent. You can also display
the status and version of the Storage Resource agent.
Note:
• You must have root authority to run this command.
• For Windows, the status, stop, and start functions are handled through the Windows Services panel.
agent.sh
status start stop restart
version versionall
Parameters:
status
Displays the current status of the Storage Resource agent. The status is returned is running or not
running.
start
Starts the Storage Resource agent.
stop
Stops the Storage Resource agent.
restart
Stop and then start the Storage Resource agent.
version
Displays the current version of the Storage Resource agent.
versionall
Displays the version of the Storage Resource agent and its related components.
dataCollector command
The dataCollector command is used to start and stop the data collector service.
The asset, capacity, and performance metadata for the storage systems in your data centers is collected
by the data collector, analyzed, and then shown on the IBM Spectrum Control GUI. The data collector
service is part of the Device server. When you stop and start the Device server, the data collector stops
and starts automatically.
Note:
Important: Do not use the dataCollector command unless you are directed by IBM Support.
On Windows operating systems, you must have Administrator rights to stop or start the data collector
service. On AIX® or Linux operating systems, you must have root privileges to stop or start the data
collector service.
1. Log on to the server where the IBM Spectrum Control servers are installed.
2. Open a command window or shell script and go to the data collector directory.
Configuration files
Use the parameters in IBM Spectrum Control configuration files to help resolve problems.
The parameters in the configuration files are case-sensitive.
The default installation_dir for IBM Spectrum Control installations is as follows:
Windows operating systems:
c:\Program Files\IBM\TPC
Linux or AIX operating systems:
/opt/IBM/TPC
The default file locations for the configuration files for IBM Spectrum Control are as follows:
IBM Spectrum Control:
Windows operating systems:
installation_dir\config
Linux or AIX operating systems:
installation_dir/config
Data server:
Windows operating systems:
installation_dir\data\config
Linux or AIX operating systems:
installation_dir/data/config
Device server:
Windows operating systems:
installation_dir\device\conf
Linux or AIX operating systems:
installation_dir/device/conf
Storage Resource agent:
Windows operating systems:
installation_dir\agent\config\agent.config
Linux or AIX operating systems: operating systems:
installation_dir/agent/config/agent.config
Restriction: On Windows installations, if you installed IBM Spectrum Control by using a domain user
account, you must disable User Account Control to edit the configuration files.
Controller parameters
name
The Data Manager server name is the name of the host computer.
port
The port on which the server listens for requests. The default is 9549.
maxConnections
The maximum number of concurrent sockets that the server opens. The default is 500.
routerThreads
The number of threads that redirect incoming requests to the appropriate service provider. The
default is 1.
serviceThreads
The number of threads to allocate for the internal service provider of the server. The default is 2.
agentErrorLimit
The number of consecutive attempts to reach an agent before the agent is displayed as DOWN. The
default is 3. When an agent is in this state, no attempts to connect are made until either the agent
contacts the server or the agent status is manually changed to UP.
adminGroup
The name of the group a user must be a member of to perform administrative functions from the GUI,
the default isadm.
commEncrypted
The switch that secures communication between the Server or Agent and the Server/GUI by
encrypting the DataStream.
• 0 = Off. Do not encrypt the DataStream.
• 1 = On. Encrypt the DataStream.
FileSystemScan NFSTimeout
Determines the numbers of seconds that a Storage Resource agent waits for a status system call on a
Network File System (NFS) before it times out.
hostAlias
This parameter is displayed if the HOST_ALIAS is not specific and represents the name of the server.
The value for this parameter is used when multiple computers have the same name or the name
cannot be determined.
Logging parameters
logsKept
The number of server logs to keep. The default is 5.
messagesPerLog
The maximum number of messages in a log. When this number is reached the log is closed and a new
log is created. The default is 100,000.
Repository parameters
driver
The name of the JDBC driver to use, normally:
• Db2: COM.ibm.db2.jdbc.app.DB2Driver
Service parameters
name
Repeating section that indicates the service providers that are required to start.
The REQUIRED parameters are as follows:
• TStorm.server.svp.GuiSvp
• TStorm.server.svp.AgentSvp
• scheduler.Scheduler
scheduler.config file
The following information lists the parameters that are set in the scheduler.config file. These
parameters include concurrency parameters and jobs parameters.
Concurrency parameters
maxSubmitThreads
The maximum number of threads to create that handle the submission of jobs. The default is 3.
maxCompleteThreads
The maximum number of threads to create to handle job completions. Initially creates a pool of half
the number of threads specified that can grow to the maximum. The default is 3.
Jobs parameters
minutesAdvanced
The number of minutes in advance of scheduled time to begin the scheduling process. The default is
1. Use this option to allow for the processor time that is involved in scheduling a job so that the job
starts close to the scheduled time.
delayLimitMinutes
Number of minutes after scheduled start time that the Scheduler continues to attempt to start a job
for a selected resource, so that resource state is not in a down state or, connection status is not in a
failed state. The default is 120.
agent.config file
The agent.config file contains configuration parameters for the Storage Resource agent. These
parameters are set when the Storage Resource agent is installed. The parameters can also be changed
manually by editing the file.
The following list contains the parameters for the agent.config file.
Servername
Fully qualified host name of the system on which the Data server is installed.
Portnumber
Port on which the Data server listens for communications from the Storage Resource agent. By
default, the port is set to 9549.
IPAddress
IP address of the server on which the Data server is installed.
Script parameters
Script parameters provide specific information on the alert that triggered the script to be run.
The parameters that are passed to a script depend on the type of alert that was triggered. The following
table describes all the script parameters:
Windows Server 2012 a. On the Dashboard page, hover the mouse over the lower left
corner of the page next to the Server Manager taskbar button,
and then click Start.
b. On the Start page, right-click, and then click the All apps
taskbar button.
Windows Server 2012 a. On the Dashboard page, hover the mouse over the lower left
corner of the page next to the Server Manager taskbar button,
and then click Start.
b. On the Start page, right-click, and then click the All apps taskbar
button.
2. Click IBM DB2 > Command Line Tools > Command Window.
Windows Server 2012 a. On the Dashboard page, hover the mouse over the lower left
corner of the page next to the Server Manager taskbar button,
and then click Start.
b. On the Start page, right-click, and then click the All apps taskbar
button.
Windows Server 2012 a. On the Dashboard page, hover the mouse over the lower left
corner of the page next to the Server Manager taskbar button,
and then click Start.
b. On the Start page, right-click, and then click the All apps taskbar
button.
Windows Server 2012 On the Dashboard page, hover the mouse over the lower
left corner of the page next to the Server Manager taskbar
button, and then click Start.
Windows Server 2012 On the Dashboard page, hover the mouse over the lower
left corner of the page next to the Server Manager taskbar
button, and then click Start.
Windows Server 2012 On the Dashboard page, hover the mouse over the lower
left corner of the page next to the Server Manager taskbar
button, and then click Start.
Windows Server 2012 On the Dashboard page, hover the mouse over the lower
left corner of the page next to the Server Manager taskbar
button, and then click Start.
Windows Server 2012 On the Dashboard page, hover the mouse over the lower
left corner of the page next to the Server Manager taskbar
button, and then click Start.
Windows Server 2012 On the Dashboard page, hover the mouse over the lower
left corner of the page next to the Server Manager taskbar
button, and then click Start.
2. Click Run.
This forces the cluster into the Universal time zone. To get the time zone you want the cluster to be in,
run this command:
data\snmp\tivoliSRM.mib
device\snmp\fabric.mib
Accessibility features
The following list includes the major accessibility features in IBM Spectrum Control:
• Keyboard-only operation in the GUI.
• The IBM Documentation that includes the following accessibility features:
– The IBM Documentation is provided in XHTML 1.0 format, which is viewable in most web browsers.
With XHTML, you can view documentation according to the display preferences that are set in your
browser. XHTML supports screen readers and other assistive technologies.
– All documentation for IBM Spectrum Control is available in Adobe Portable Document Format (PDF)
by using the Adobe Acrobat Reader. To access PDFs, go to Printable documentation.
– All images in the IBM Documentation are provided with alternative text, so that visually impaired
users can understand the contents of the images.
• Interfaces that are commonly used by screen readers.
The setting for the automatic-refresh button in the screen reader is toggled to the ON position by
default. If you want the screen reader to read the previous text, complete the following steps:
1. Navigate to the Accessibility Settings Navigation region by using the arrow keys. The region is located
after the IBM Spectrum Control application title.
2. Click Enter to toggle the automatic-refresh button to the OFF position. (An alert sounds to make you
aware that the turn-off automatic-refresh toggle button was pressed.)
3. To move backward to the previously read text so that the screen reader can read it again, use the
arrow keys. You can move backwards and forwards through the page.
4. When you are ready to move on, click Enter to toggle the automatic-refresh button to the ON
position and to refresh the page. (An alert sounds to make you aware that the turn-on, automatic-
refresh toggle button was pressed.)
Tip: Alternatively, let the toggle setting persist, and refresh as needed by pressing the F5 key.
Keyboard navigation
Most of the features of the IBM Spectrum Control GUI are accessible by using the keyboard. For those
features that are not accessible, equivalent function is available by using the command-line interface
(CLI), except as noted in the product release notes.
You can use keys or key combinations to perform operations and initiate many menu actions that can also
be done through mouse actions. The following sections describe the keys or key combinations for
different parts of the GUI:
For navigating in the GUI and the context-sensitive help system:
• To navigate to the next link, button, or topic within a panel, press Tab.
• To move to the previous link, button, or topic within a panel, press Shift+Tab.
• To select an object, when the object is in focus, press Enter.
For actions menus:
• To navigate to the grid header, press Tab.
For license inquiries regarding double-byte character set (DBCS) information, contact the IBM Intellectual
Property Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically
made to the information herein; these changes will be incorporated in new editions of the publication.
IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in
any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of
the materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the
exchange of information between independently created programs and other programs (including this
one) and (ii) the mutual use of the information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758
U.S.A
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of International Business
Machines Corporation, registered in many jurisdictions worldwide. Other product and service names
might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web
at "Copyright and trademark information" at https://www.ibm.com/legal/us/en/copytrade.shtml.
Intel, Intel logo, Intel Xeon, and Pentium are trademarks or registered trademarks of Intel Corporation or
its subsidiaries in the United States and other countries.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or
its affiliates.
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive
licensee of Linus Torvalds, owner of the mark on a worldwide basis.
Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in the United States, other
countries, or both.
Red Hat® is a registered trademark of Red Hat, Inc. or its subsidiaries in the United States and other
countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VMware, the VMware logo, VMware Cloud Foundation, VMware Cloud Foundation Service, VMware
vCenter Server, and VMware vSphere are registered trademarks or trademarks of VMware, Inc. or its
subsidiaries in the United States and/or other jurisdictions.
You can view the glossary in the IBM Spectrum Control product documentation at https://
www.ibm.com/docs/en/spectrum-control.
A Cisco 122
commands
about this document viii agent.sh 123
accessibility features dataCollector 123
for IBM Spectrum Control 143 repocopy 113
adding comments, sending viii
CIM agents 77 common user, about 1
SMI-S providers 77 configuration
adding resources assigning roles to groups 4
canceling agent deployment 66 authorizing users 4
fixing agent deployment problems 64 configuration files
hypervisors 60 agent.config 128
modifying deployment schedules for agents 66 default locations 124
agent.config 128 encryption 125
agent.sh command for IBM Spectrum Control 124
syntax 123 scheduler.config 126
agents server.config 125
changing credential for a Storage Resource agent 69 TPCD.config 127
CIM agents 77 configuring
deploying Storage Resource agents 26 data retention 2
deployment considerations for Storage Resource agents
27, 72
enabling a Storage Resource agent 68
D
enabling or disabling scripts for a Storage Resource data collection
agent 70 configuring data retention 2
enabling or disabling the monitoring of fabrics by a data collector trusted certificates for IBM Spectrum Control
Storage Resource agent 71 48
preparing Storage Resource agents for installation 27, Data server
72 increasing memory 88
registering with a different server 72 increasing memory on AIX 88
SMI-S providers 77 increasing memory on Linux 89
testing the connection with the server where a Storage increasing memory on UNIX 89
Resource agent is deployed 68 increasing memory on Windows 89
uninstalling a Storage Resource agent 71 troubleshooting 84
viewing information about Storage Resource agents 66 Data Studio
viewing Storage Resource agent log files 67 data studio 116
Alert server database
troubleshooting 84 administering the IBM Spectrum Control database 104,
assigning roles 6 110
authentication mechanism, modify 7 reorganizing 111
authorizing users updating statistics 111
assigning roles 6 database backups
IBM Spectrum Control 104
B database maintenance tool
collecting statistics about the database 110
backup considerations customizing 112
Tivoli Storage Productivity Center 105 maintaining the database 110
Brocade 122 reorganizing tables in the database 110
dataCollector command 123
Db2
C command line 115
certificates monitoring 116
creating for Storage Resource agents 31 DB2
Cicso fabrics starting 136
removing 64 stopping 136
CIM agents Db2, stop 115
collecting logs 59 default certificates
Index 153
default certificates (continued) IBM Spectrum Control (continued)
replacing for Storage Resource agents 36 log files 129
Device server IBM Spectrum Control data collector
setting timeout values 21 starting 136
troubleshooting 84 stopping 136
disaster recovery 104, 106, 107 IBM Storage Community viii
Distributed Management Task Force (DTMF) 137 installing
domain account Storage Resource agent considerations 27, 72
how to grant local administrative privileges 97 Storage Resource agents 26
Storage Resource agents remotely 27, 72
Internet Engineering Task Force (IETF) 139
E interop namesapces 79
encryption 125 IPv6
Export server configuring
starting 136 AIX for IPv6 52
stopping 136 Db2 on AIX for IPv6 52
Db2 on Linux for IPv6 53
configuring Db2 on Linux 53
F configuring for AIX 52
configuring for Db2 on AIX 52
Fabric zone configuration 122
fabric.mib file 139
fabrics L
changing connection information 63
changing credentials 63 LDAP
connection information 63 managing user authentication in IBM Spectrum Control
removing 64 11
testing connection 64 LDAP authentication
updating connection information 62 advanced configuration 19
viewing information 61, 63 LDAP federated repositories framework
federated repositories alternative user authentication for federated
changing authentication for IBM Spectrum Control 12, repositories in IBM Spectrum Control 16
15 LDAP repository
configuring alternative user authentication for federated changing from LDAP to operating system authentication
repositories in IBM Spectrum Control 16 in IBM Spectrum Control 15
federated repository 7 LDAP server to a file
fibre channel exporting SSL certificate from IBM Security Directory
methodologies of interconnects 140 Server to a file 17
file system 106–108 exporting SSL certificate from Microsoft Active Directory
ftp 86 LDAP Server to a file 18
full disk encryption ldapEntityType element
support for 123 configuring 19
fully qualified host name license
checking for on AIX 42 check 83
checking for on Linux 43 license restrictions 8
checking for on Solaris 43 Linux
Windows, verify 44 IBM Data Studio, start 116
log files
for IBM Spectrum Control 129
G packaging 84
logon page
generate, default, Export server 50
terms and conditions, add 21
terms and conditions, show 21
H
historical trending M
configuring data retention 2
Management Information Base (MIB) files 139
hypervisors
memory
adding 60
increasing allocation for Data server on AIX 88
updating credentials 61
increasing allocation for Data server on Linux 89
increasing allocation for Data server on Windows 89
I memory allocation
Data server 88
IBM Spectrum Control
configuration files 124
Index 155
stopping (continued) T
agents (continued)
stopping 136 T11 FC-MI 140
Alert server technical forums viii
starting 136 terms and conditions
stopping 136 logon page, show 21
Data server testing connection
starting 136 fabrics 64
stopping 136 storage system 59
DB2 136 switches 64
Device server timeout values
port numbers 136 setting for Device server 21
starting 136 tivoliSRM.mib file 139
stopping 136 tools
stopping product servers 82 repository copy 113
stopping product services 82 TPCD.config 127
Storage management and reporting viii trademarks 149
Storage Management Initiative - Specification (SMI-S) 138 translations
Storage Networking Industry Association (SNIA) 138 browser locale requirement viii
Storage Resource agent traps for SNMP 139
changing credentials 69 troubleshooting 84
changing the Windows service logon 72
Storage Resource agents
creating certificates for 31
U
deploying 26 update, servers 48
deployment considerations 27, 72 updating connection information
enabling 68 fabrics 62
enabling or disabling scripts 70 switches 62
enabling or disabling the monitoring of fabrics 71 updating credentials
importing authentication information 44 fabrics 62
installing 26 hypervisors 61
registering with a different server 72 storage systems 55
replacing SSL certificates 36 switches 62
testing the connection with IBM Spectrum Control 68 uploading logs 86
uninstalling using GUI 71 user authentication
viewing information 66 configuring 3
viewing log files 67 managing in IBM Spectrum Control 11
storage subsystems Secure Socket Layer (SSL)
overview 55 disabling 17
storage system enabling 16
testing connection 59 users
storage systems assigning roles 5
removing 59 determining group membership 7
updating credentials 55
support viii
support tickets V
opening 84
version
Switch Performance Management 122
check 83
switches
changing connection information 62
changing credentials 62 W
connection information 62
removing 64 Web Based Enterprise Management (WBEM) 137
testing connection 64 Web server
updating connection information 62 troubleshooting 84
viewing information 61, 62 web server keystore
SYSMAINT authority adding SSL certificates to web server keystore 18
checking and setting 116 Windows
system maintenance authority host names, verify 44
checking and setting 116 IBM Data Studio, start 116
system management Windows service logon
saving trace logs 83 changing for a Storage Resource agent 72
toubleshooting 83
SC28-3131-03