EMC Solutions Enabler Symmetrix Array Management CLI Version 7.0 Product Guide Contents

Total Page:16

File Type:pdf, Size:1020Kb

EMC Solutions Enabler Symmetrix Array Management CLI Version 7.0 Product Guide Contents EMC® Solutions Enabler Symmetrix® Array Management CLI Version 7.0 Product Guide P/N 300-002-939 REV A06 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com Copyright © 2005 - 2009 EMC Corporation. All rights reserved. Published April, 2009 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date regulatory document for your product line, go to the Technical Documentation and Advisories section on EMC Powerlink.For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners. 2 EMC Solutions Enabler Symmetrix Array Management CLI Version 7.0 Product Guide Contents Preface Chapter 1 Introduction SYMCLI introduction ........................................................................................................ 16 SYMCLI usage tips............................................................................................................. 17 Obtaining SYMCLI help.............................................................................................. 17 Referencing devices and objects ................................................................................ 18 Environment variables: Altering the command line response.............................. 19 Presetting the names and IDs..................................................................................... 19 Time-saving command input tips ............................................................................. 19 Truncated output ......................................................................................................... 20 Compatibility mode: Preserving old Solutions Enabler scripts ............................ 20 Chapter 2 Discovery Discovering configuration and status data .................................................................... 22 Performing discovery.................................................................................................. 22 CLARiiON assisted discovery ................................................................................... 23 Is the database file synchronized?............................................................................. 24 Scanning for new devices ........................................................................................... 24 Connectivity authorization......................................................................................... 25 VMware virtual disk mapping support.................................................................... 25 Synchronizing configuration updates with the database............................................. 27 Sync operations ............................................................................................................ 27 SYMAPI configuration database file ............................................................................... 28 Database file location................................................................................................... 28 Changing the current database file ........................................................................... 29 Access modes................................................................................................................ 29 Command modes: Online and offline....................................................................... 29 Database configuration information ......................................................................... 31 Chapter 3 Configuration Data Configuration data: Layer by layer ................................................................................. 34 SCSI inquiries...................................................................................................................... 35 Example: SCSI device information............................................................................ 35 Example: Devices listed by array ID ......................................................................... 36 Example: Devices without capacity .......................................................................... 36 Example: Devices with WWN.................................................................................... 37 Contents 3 Contents Example: Colon formatted WWN ............................................................................. 37 Example: Pdevfile format ........................................................................................... 37 HBA information.......................................................................................................... 38 Mapping information .................................................................................................. 39 Device identifiers ......................................................................................................... 40 Storage array data .............................................................................................................. 42 List arrays...................................................................................................................... 42 Symmetrix configuration data ................................................................................... 43 Viewing application registrations with Symmetrix access .................................... 44 Hosts connections to Symmetrix arrays ................................................................... 45 Viewing storage capacities to hosts........................................................................... 46 Director configuration data ........................................................................................ 46 Taking RA directors offline ........................................................................................ 50 Taking front-end director ports offline..................................................................... 50 Symmetrix external locks............................................................................................ 50 SYMAPI semaphores................................................................................................... 53 LRU cache management group.................................................................................. 53 Viewing network services........................................................................................... 54 Viewing memory board information........................................................................ 55 Mainframe CU image .................................................................................................. 55 Enginuity patches......................................................................................................... 55 Environmental data ..................................................................................................... 56 Device pools.................................................................................................................. 61 DATA devices and SAVE devices ............................................................................. 64 Thin device information.............................................................................................. 66 Showing pool details ................................................................................................... 67 RDF group information............................................................................................... 69 Symmetrix devices ............................................................................................................. 70 Device emulation ......................................................................................................... 70 Device type overview.................................................................................................. 71 List of devices ............................................................................................................... 72 Device service states .................................................................................................... 79 Device emulation type................................................................................................. 80 Filtering device data with sympd.............................................................................. 80 Filtering Symmetrix device data................................................................................ 81 Detailed device configuration data ........................................................................... 84 Releasing device external locks.................................................................................. 85 CLARiiON devices............................................................................................................. 86 Example: CLARiiON devices..................................................................................... 86 Disk-level data ...................................................................................................................
Recommended publications
  • Using the EMC SRDF Adapter for Vmware Site Recovery Manager
    Using the EMC SRDF Adapter for VMware Site Recovery Manager Version 5.0 • SRDF Overview • Installing and Configuring the SRDF SRA • Initiating Test Site Failover Operations • Performing Site Failover/Failback Operations Drew Tonnesen September 2017 VMAX Engineering Copyright © 2017 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date regulatory document for your product line, go to the Technical Documentation and Advisories section on support.emc.com. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners. EMC is now part of the Dell group of companies. Part number H10553.8 2 Using EMC SRDF Adapter for VMware vCenter Site Recovery Manager Contents Preface Chapter 1 Symmetrix Remote Data Facility Introduction ....................................................................................... 14 SRDF overview.................................................................................
    [Show full text]
  • Dropdmg 3.6.2 Manual
    DropDMG 3.6.2 Manual C-Command Software c-command.com February 16, 2021 Contents 1 Introduction 4 1.1 Feature List..............................................4 2 Installing and Updating 6 2.1 Requirements.............................................6 2.2 Installing DropDMG.........................................7 2.3 Updating From a Previous Version.................................7 2.4 Reinstalling a Fresh Copy......................................8 2.5 Uninstalling DropDMG.......................................9 2.6 Security & Privacy Access......................................9 3 Using DropDMG 13 3.1 Basics................................................. 13 3.2 Making a Bootable Device Image of a Hard Drive......................... 14 3.3 Backing Up Your Files to CD/DVD................................ 16 3.4 Burning Backups of CDs/DVDs................................... 17 3.5 Restoring Files and Disks...................................... 18 3.6 Making Images With Background Pictures............................. 19 3.7 Protecting Your Files With Encryption............................... 20 3.8 Transferring Files Securely...................................... 21 3.9 Sharing Licenses and Layouts.................................... 21 3.10 Splitting a File or Folder Into Pieces................................ 22 3.11 Creating a DropDMG Quick Action................................ 22 4 Menus 23 4.1 The DropDMG Menu........................................ 23 4.1.1 About DropDMG...................................... 23 4.1.2 Software
    [Show full text]
  • How to Disable Gatekeeper and Allow Apps from Anywhere in Macos Sierra
    How to Disable Gatekeeper and Allow Apps From Anywhere in macOS Sierra Gatekeeper, first introduced in OS X Mountain Lion, is a Mac security feature which prevents the user from launching potentially harmful applications. In macOS Sierra, however, Apple made some important changes to Gatekeeper that seemingly limit the choices of power users. But don’t worry, Gatekeeper can still be disabled in Sierra. Here’s how. Stand out at the party or promote your business with colorful powder coated and custom engraved Yeti tumblers from Perfect Etch. Traditionally, Gatekeeper offered three settings of increasing security: anywhere, App Store and identified developers, and App Store only. The first choice, as its name describes, allowed users to launch applications from any source, effectively disabling the Gatekeeper feature. The second choice allowed users to run apps from the Mac App Store as well as from software developers who have registered with Apple and securely sign their applications. Finally, the most secure setting limited users to running apps obtained from the Mac App Store only. While the secure options were good ideas for less experienced Mac users, power users found Gatekeeper to be too limiting and typically sought to disable it by setting it to “Anywhere.” In macOS Sierra, however, the “Anywhere” option is gone, leaving “App Store” and “App Store and identified developers” as the only two options. Disable Gatekeeper in macOS Sierra The Gatekeeper settings can be found in System Preferences > Security & Privacy > General. The Gatekeeper options are located beneath “All apps downloaded from:” with the choice of “Anywhere” missing. Thankfully, the “Anywhere” setting can be restored to Gatekeeper in Sierra with a Terminal command.
    [Show full text]
  • EMC Secure Remote Services 3.18 Site Planning Guide
    EMC® Secure Remote Services Release 3.26 Site Planning Guide REV 01 Copyright © 2018 EMC Corporation. All rights reserved. Published in the USA. Published January 2018 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. For the most up-to-date regulatory document for your product line, go to Dell EMC Online Support (https://support.emc.com). 2 EMC Secure Remote Services Site Planning Guide CONTENTS Preface Chapter 1 Overview ESRS architecture........................................................................................ 10 ESRS installation options ...................................................................... 10 Other components ................................................................................ 11 Requirements for ESRS customers......................................................... 11 Supported devices.....................................................................................
    [Show full text]
  • Celerra NSX Data Sheet
    DATA SHEET EMC Celerra NSX Series IP Storage Reach new heights of availability and scalability with EMC Celerra NSX Meeting the information-sharing challenge Performance bottlenecks, security issues, and the high cost of data protection and management associated with deploying file servers using general-purpose operating systems become non-issues ® ® The Big Picture with the EMC Celerra NSX. NSX combines commodity CPUs with flexible and sophisticated Data Access in Real Time (DART) file-serving software into a purpose-built, scalable, clustered file server • Ensure no-compromise availability optimized for moving mission-critical data. through integrated advanced clustering, managed as a single device Unparalleled EMC Symmetrix® and CLARiiON® storage technologies, combined with Celerra’s • Receive advanced functionality at no extra impressive I/O system architecture, offer industry-leading availability, scalability, performance, cost with the most comprehensive suite of and ease of management. built-in features • Leverage EMC Celerra’s price/performance With Celerra NSX, you get distributed file services in a centrally managed information storage system. leadership to support large user commu- You can dynamically grow, share, and cost-effectively manage file systems with multi-protocol file nities with an intuitive, GUI-based, single access capabilities. And you take advantage of simultaneous support for NFS, CIFS, and iSCSI proto- point of management for up to eight file server nodes in an advanced clustering cols, concurrently, that
    [Show full text]
  • The Apple Ecosystem
    APPENDIX A The Apple Ecosystem There are a lot of applications used to manage Apple devices in one way or another. Additionally, here’s a list of tools, sorted alphabetically per category in order to remain vendor agnostic. Antivirus Solutions for scanning Macs for viruses and other malware. • AVG: Basic antivirus and spyware detection and remediation. • Avast: Centralized antivirus with a cloud console for tracking incidents and device status. • Avira: Antivirus and a browser extension. Avira Connect allows you to view device status online. • BitDefender: Antivirus and malware managed from a central console. • CarbonBlack: Antivirus and Application Control. • Cylance: Ransomware, advanced threats, fileless malware, and malicious documents in addition to standard antivirus. • Kaspersky: Antivirus with a centralized cloud dashboard to track device status. © Charles Edge and Rich Trouton 2020 707 C. Edge and R. Trouton, Apple Device Management, https://doi.org/10.1007/978-1-4842-5388-5 APPENDIX A THe AppLe ECOSYSteM • Malware Bytes: Antivirus and malware managed from a central console. • McAfee Endpoint Security: Antivirus and advanced threat management with a centralized server to track devices. • Sophos: Antivirus and malware managed from a central console. • Symantec Mobile Device Management: Antivirus and malware managed from a central console. • Trend Micro Endpoint Security: Application whitelisting, antivirus, and ransomware protection in a centralized console. • Wandera: Malicious hot-spot monitoring, jailbreak detection, web gateway for mobile threat detection that integrates with common MDM solutions. Automation Tools Scripty tools used to automate management on the Mac • AutoCasperNBI: Automates the creation of NetBoot Images (read: NBI’s) for use with Casper Imaging. • AutoDMG: Takes a macOS installer (10.10 or newer) and builds a system image suitable for deployment with Imagr, DeployStudio, LANrev, Jamf Pro, and other asr or Apple Systems Restore-based imaging tools.
    [Show full text]
  • EMC Solutions Enabler Symmetrix Array Management CLI Version 6.5 Product Guide Contents
    EMC® Solutions Enabler Symmetrix® Array Management CLI Version 6.5 Product Guide P/N 300-002-939 REV A05 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com Copyright © 2005 - 2008 EMC Corporation. All rights reserved. Published March, 2008 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners. 2 EMC Solutions Enabler Symmetrix Array Management CLI Version 6.5 Product Guide Contents Preface............................................................................................................................................................... 13 PART 1 Concepts and Procedures Chapter 1 Introduction SYMCLI introduction ........................................................................................................ 18 Symmetrix component overview..................................................................................... 19 Directors
    [Show full text]
  • H8716.2 EMC Symmetrix Vmaxe Storage System, Spec Sheet
    EMC SYMMETRIX VMAXe STORAGE SYSTEM EMC® Symmetrix® VMAXe™ with the Enginuity™ operating environment delivers a multi- controller, scale-out architecture with consolidation and efficiency for the enterprise. As the newest member of the Symmetrix series, VMAXe utilizes the same revolutionary EMC Virtual Matrix Architecture™ as EMC VMAX™ systems. SPECIFICATIONS ARCHITECTURE The Virtual Matrix Architecture enables IT departments to build storage systems that tran- scend the physical constraint of competing array architectures. The architecture allows scal- ing of system resources through common and fully redundant building blocks called VMAXe series engines. A single VMAXe engine provides the complete foundation for a high-availability storage array. Each VMAXe engine contains two Symmetrix VMAXe directors and redundant interfaces to the EMC Virtual Matrix™ interconnect. Each Symmetrix VMAXe director consolidates front-end, global memory, and back-end functions, enabling direct memory access to data for opti- mized I/O operations. Up to four VMAXe engines can be interconnected via a set of multiple active fabrics that provide scalable performance and high availability. VMAXe engines can be added non-disruptively to provide linear scale-out of Symmetrix system resources. A single-engine Symmetrix VMAXe can start with as little as 24 drives, scaling up to four engines supporting 1,080 drives for a maximum usable capacity of up to 1.5 petabytes. VMAXe engine one and VMAXe engine two can support up to 240 drives per engine. VMAXe engines three and four can support up to 300 drives per engine. A fully configured 1,080- drive system is comprised of four integrated system bays and three storage bays.
    [Show full text]
  • Basics of Apple Device Security
    AN OVERVIEW FOR MAC, IPAD AND IPHONE Basics of Apple Device Security SMALL BUSINESS A well-planned cyberattack or an accidental download of 2 malware can mean the difference between a productive day and all work grinding to a halt. As hackers get more sophisticated, organizations concerned about their bottom line and security of their customer, employee or student data must stay on top of security. This guide is for anyone that has been tasked with Apple security concerns, like all IT security concerns, are real. managing Apple devices in your organization and wants to get serious about their organizational While Apple has invested a great deal in its security features security of their Apple devices, and offers basic and has rapidly become the leader in device and data privacy information for newcomers or a simple refresher for and security, no operating system is immune to security Apple management veterans. challenges. This means that administrators must not only respond quickly to security issues, but also proactively guard against them. 3 The basic building blocks Several factors work together to ensure the security of your organization’s hardware and data, and you can break them down into six main areas: Securing devices Apple native security Data encryption Keeping your physical devices Security systems already built-in The basics of encrypting data at Introduction secure and protecting those to macOS, iOS and iPadOS rest and data in transit using them to Apple Page 4 Page 7 Page 6 Security Compliance Secure monitoring Application
    [Show full text]
  • Using EMC SRDF Adapter for Vmware Site Recovery Manager
    Using EMC SRDF Adapter for VMware® Site Recovery Manager Best Practices Planning Abstract VMware Site Recovery Manager provides workflow and business continuity and disaster restart process management for VMware virtual infrastructure. The software leverages storage array replication and communicates to the replication management through a well-defined set of specifications. This white paper discusses the best practices for using VMware® Site Recovery Manager with EMC® SRDF® Adapter. September 2008 Abstract VMware Site Recovery Manager provides workflow and business continuity and disaster restart process management for VMware virtual infrastructure. The software leverages storage array replication and communicates to the replication management through a well-defined set of specifications. This white paper discusses the best practices for using VMware® Site Recovery Manager with EMC® SRDF® Adapter. Copyright © 2008 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names,
    [Show full text]
  • Proof, Not Promises: Creating the Trusted Cloud
    EMC’S VISION FOR TRUST IN THE CLOUD Proof, not Promises: Creating the Trusted Cloud EXECUTIVE SUMMARY Clouds and virtualization offer powerful new ways to manage and use digital information, but they also create new complexities for organizations in meeting the fundamental challenge of getting the right information to the right people over an infrastructure that they can trust. Why? Because clouds and virtualization irrevocably change the nature of control and visibility. Infrastructure becomes virtual, not physical. People access infrastructure from devices that are outside of IT’s direct control. Information moves with incredible speed across networks and the cloud, making it hard to know where sensitive information resides. And with an IT infrastructure that is virtual and shared via the cloud, organizations must learn new ways to achieve visibility into risks, threats, and compliance performance. The good news is forward-thinking businesses can clear these hurdles today. The formula for building trust in the cloud is to achieve control over and visibility into the cloud’s infrastructure, identities, and information. The technologies needed to establish this level of cloud control and visibility already exist. Organizations are applying these technologies in creative ways to build trusted clouds that can meet the most rigorous security and compliance requirements while delivering the flexibility, fluidity, and massive scale that hold such business promise for organizations worldwide. EMC PERSpecTIVE THE CHALLENGE Over the decades, IT architecture and platform strategies have evolved from mainframe to client-server to the Web. Still, one of the fundamental goals of IT organizations endures: that is, getting the right information to the right people over a trusted infrastructure so information can be leveraged for business advantage.
    [Show full text]
  • Cisco Identity Services Engine Administrator Guide, Release 1.4.1 First Published: April 04, 2016 Last Modified: July 01, 2016
    Cisco Identity Services Engine Administrator Guide, Release 1.4.1 First Published: April 04, 2016 Last Modified: July 01, 2016 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]