SANtricity 11 Manuals (CA08872-010)
Get started
System Manager setup
System Manager
Main interface
System Manager interface overview
View performance data
Performance graphs and guidelines
View graphical performance data
Manage interface settings
FAQs
What are the supported browsers?
What are the keyboard shortcuts?
How do performance statistics for individual volumes relate to the total?
Why does data display as zero in the graphs and table?
What does the Latency graph show?
What does the IOPS graph show?
What does the MiB/s graph show?
What does the Headroom graph show?
Where can I find more information about display preferences?
Pools and volume groups
Configure storage
Manage storage
Modify pool and group settings
Change configuration settings for a pool
Change configuration settings for a volume group
Enable or disable resource provisioning (existing volumes)
Manage SSD cache
Manage reserved capacity
Change capacity for snapshot group
Change capacity for snapshot volume
Change capacity consistency group member volume
FAQs
What are the differences between pools and volume groups?
Why would I want to manually configure a pool?
Why are capacity alerts important?
Why can’t I increase my preservation capacity?
Is there a limit on the number of drives I can remove from a pool?
What media types are supported for a drive?
Why are some drives not showing up?
How do I maintain shelf/drawer loss protection?
What is the optimal drive positioning for pools and volume groups?
What RAID level is best for my application?
What is secure-capable (Drive Security)?
What do I need to know about increasing reserved capacity?
Why can’t I choose another amount to decrease by?
Why do I need reserved capacity for each member volume?
How do I view and interpret all SSD Cache statistics?
What is optimization capacity for pools?
What is optimization capacity for volume groups?
What is resource provisioning capable?
What do I need to know about the resource-provisioned volumes feature?
Volumes and workloads
Manage volumes
Manage settings
FAQs
How does my selected workload impact volume creation?
Why aren’t these volumes associated with a workload?
Why can’t I delete the selected workload?
How do application-specific workloads help me manage my storage system?
How does providing this information help create storage?
What do I need to do to recognize the expanded capacity?
Why don’t I see all my pools and/or volume groups?
What is preferred controller ownership?
Hosts and host clusters
Configure host access
Manage hosts and clusters
Manage settings
Snapshots
Concepts
Workflow for creating snapshot images and volumes
Base volumes, reserved capacity, and snapshot groups
Create snapshots and snapshot objects
Manage snapshot images
Start snapshot image rollback for base volume
Start snapshot image rollback for snapshot consistency group member volumes
Resume snapshot image rollback
Manage snapshot consistency groups
Manage snapshot volumes
Convert snapshot volume to read-write mode
Mirroring
Async concepts
Sync concepts
Manage async mirror consistency groups
Suspend or resume synchronization
Re-sync mirror consistency group
Manage async mirrored pairs
Remove async mirror relationship
Change reserved capacity for mirrored pair volume
Complete mirrored pair for primary volumes created on legacy system
Manage sync mirrored pairs
Async FAQs
How does asynchronous mirroring differ from synchronous mirroring?
Why can’t I access my chosen mirroring feature?
What do I need to know before creating a mirror consistency group?
Asynchronous mirroring - What do I need to know before creating a mirrored pair?
What do I need to know before increasing my reserved capacity on a mirrored pair volume?
Why can’t I increase reserved capacity with my requested amount?
Why would I change this percentage?
Why do I see more than one reserved capacity candidate?
Why do I see Not Available values displayed in the table?
Why don’t I see all of my pools and volume groups?
Asynchronous mirroring - Why don’t I see all my volumes?
Asynchronous mirroring - Why don’t I see all the volumes on the remote storage system?
Sync FAQs
How does synchronous mirroring differ from asynchronous mirroring?
Synchronous mirroring - Why don’t I see all my volumes?
Synchronous mirroring - Why don’t I see all the volumes on the remote storage system?
Synchronous mirroring - What do I need to know before creating a mirrored pair?
What impact does synchronization priority have on synchronization rates?
Why is it recommended to use a manual synchronization policy?
Remote storage
Manage remote storage
Manage progress of remote storage imports
FAQs
What do I need to know before creating a remote storage connection?
Why am I being prompted to remove my remote volumes?
Why don’t I see all my volumes on my destination array?
What do I need to know about the remote volume in an import?
What do I need to know before starting a remote storage import?
Hardware components
Manage shelf components
Switch between front and back views
Manage controllers
Considerations for assigning IP addresses
Configure NTP server addresses
Configure DNS server addresses
Manage iSCSI ports
Configure iSCSI authentication
Enable iSCSI discovery settings
View iSCSI statistics packages
Manage drives
Controller FAQs
What is IPv6 stateless address auto-configuration?
Which do I choose — DHCP or manual configuration?
How do I configure my DHCP server?
Why do I need to change the controller network configuration?
Where do I get the network configuration?
When should I refresh the port configuration?
iSCSI FAQs
What happens when I use an iSNS server for registration?
Which registration methods are automatically supported for iSCSI?
How do I interpret iSER over InfiniBand statistics?
What else do I need to do to configure or diagnose iSER over InfiniBand?
Alerts
Manage SNMP alerts
Manage syslog alerts
Array settings
Configure array settings
Turn on storage system locator lights
Synchronize storage system clocks
Save storage system configuration
Configure add-on features
Drive security
Manage security keys
Switch from external to internal key management
Edit key management server settings
FAQs
What do I need to know before creating a security key?
Why do I need to define a pass phrase?
Why is it important to record security key information?
What do I need to know before backing up a security key?
What do I need to know before unlocking secure drives?
What is read/write accessibility?
What do I need to know about validating the security key?
What is the difference between internal security key and external security key management?
Access management
Concepts
Use directory services
FAQs
What do I need to know before adding a directory server?
What do I need to know about mapping to storage system roles?
Which external management tools may be affected by this change?
What do I need to know before configuring and enabling SAML?
What types of events are recorded in the audit log?
What do I need to know before configuring a syslog server?
The syslog server is no longer receiving audit logs. What do I do?
Certificates
Support
Collect diagnostic data
Manage AutoSupport
Workflow for the AutoSupport feature
Enable or disable AutoSupport features
Configure AutoSupport delivery method
Schedule AutoSupport dispatches
Manage upgrades
FAQs
What does unreadable sectors data show me?
What do the AutoSupport features do?
What type of data is collected through the AutoSupport feature?
How do I configure the delivery method for the AutoSupport feature?
What do I need to know before upgrading the SANtricity OS Software?
What do I need to know before suspending IOM auto-synchronization?
Why is my firmware upgrade progressing so slowly?
Unified Manager
Main interface
Storage systems
Settings import
Use batch imports
Upgrades
Upgrade software and firmware
Mirroring
FAQs
What do I need to know before creating a mirror consistency group?
What do I need to know before creating a mirrored pair?
Why would I change this percentage?
Why do I see more than one reserved capacity candidate?
Why don’t I see all my volumes?
Why don’t I see all the volumes on the remote storage system?
What impact does synchronization priority have on synchronization rates?
Why is it recommended to use a manual synchronization policy?
View audit log activity
By viewing audit logs, users with Security Admin permissions can monitor user actions, authentication failures, invalid login attempts, and the user session lifespan.
You must be logged in with a user profile that includes Security admin permissions. Otherwise, the Access Management functions do not appear.
-
Select Settings > Access Management.
-
Select the Audit Log tab.
Audit log activity appears in tabular format, which includes the following columns of information:
-
Date/Time
Timestamp of when the storage system detected the event (in GMT). -
Username
The user name associated with the event. For any non-authenticated actions on the storage system, "N/A" appears as the user name. Non-authenticated actions might be triggered by the internal proxy or some other mechanism. -
Status Code
HTTP status code of the operation (200, 400, etc.) and descriptive text associated with the event. -
URL Accessed
Full URL (including host) and query string. -
Client IP Address
IP address of the client associated with the event. -
Source
Logging source associated with the event, which can be SANtricity System Manager, CLI, Web Services, or Support Shell. -
Description
Additional information about the event, if applicable.
-
-
Use the selections on the Audit Log page to view and manage events.
Selection details
Selection Description Show events from the…
Limit events shown by date range (last 24 hours, last 7 days, last 30 days, or a custom date range).
Filter
Limit events shown by the characters entered in the field. Use quotes ("") for an exact word match, enter
OR
to return one or more words, or enter a dash ( — ) to omit words.Refresh
Select Refresh to update the page to the most current events.
View/Edit Settings
Select View/Edit Settings to open a dialog box that allows you to specify a full log policy and level of actions to be logged.
Delete events
Select Delete to open a dialog box that allows you to remove old events from the page.
Show/hide columns
Click the Show/Hide column icon to select additional columns for display in the table. Additional columns include:
-
Method
The HTTP method (for example, POST, GET, DELETE, etc.). -
CLI Command Executed
The CLI command (grammar) executed for Secure CLI requests. -
CLI Return Status
A CLI status code or a request for input files from the client. -
SYMbol Procedure
The SYMbol procedure executed. -
SSH Event Type
Secure Shell (SSH) events type, such as login, logout, and login_fail. -
SSH Session PID
Process ID number of the SSH session. -
SSH Session Duration(s)
The number of seconds the user was logged in. -
Authentication Type
Types can include Local user, LDAP, SAML, and Access token. -
Authentication ID
ID of the authenticated session.
Toggle column filters
Click the Toggle icon to open filtering fields for each column. Enter characters within a column field to limit events shown by those characters. Click the icon again to close the filtering fields.
Undo changes
Click the Undo icon to return the table to the default configuration.
Export
Click Export to save the table data to a comma separated value (CSV) file.
-