You are on page 1of 368

EMC Data Protection Advisor

Version 5.8

Report Reference Guide


P/N 300-012-558 REV A03

FOR OPERATORS RUNNING REPORTS FROM DPA

EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103


1-508-435-1000 www.EMC.com

Copyright
Copyright 2005-2011 EMC Corporation. All rights reserved. Published December, 2011 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date regulatory document for your product line, go to the Technical Documentation and Advisories section on EMC Powerlink. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners.

For more information


EMC support, product, and licensing information can be obtained as follows. Product information For documentation, release notes, software updates, or for information about EMC products, licensing, and service, go to the EMC Powerlink website (registration required) at http://Powerlink.EMC.com. Technical support For technical support, go to EMC Customer Service on Powerlink. To open a service request through Powerlink, you must have a valid support agreement. Please contact the EMC sales representative for details about obtaining a valid support agreement or to answer any questions about the account.

Your comments
Comments and suggestions about our product documentation are always welcome. To provide feedback, please email SSGdocumentation@emc.com

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Contents

Chapter 1

Backup Application Reporting


Capacity planning reports ..................................................................................... Backup reports .................................................................................................. Media reports .................................................................................................... Change management reports ................................................................................ Backup Application Change Overview......................................................... Chargeback reports................................................................................................. Chargeback Overview ..................................................................................... Compliance and risk mitigation reports.............................................................. Configuration reports............................................................................................. Server Configuration........................................................................................ Storage Server Configuration ......................................................................... Disk Pools .......................................................................................................... Disk Volume Configuration ............................................................................ Storage Unit Configuration............................................................................. Lifecycle Policy Configuration ....................................................................... Lifecycle Policy Destination ............................................................................ Client Configuration ........................................................................................ Group Configuration ....................................................................................... Schedule Configuration ................................................................................... Job Configuration ............................................................................................. Pool Configuration ........................................................................................... Jukebox Configuration..................................................................................... iSNS Configuration .......................................................................................... NetBackup Catalog Backup Configuration .................................................. Retention Policy ................................................................................................ TSM Lan-free Server Configuration............................................................... Data protection reports .......................................................................................... Overviews.......................................................................................................... Job reports.......................................................................................................... Client reports..................................................................................................... Group reports .................................................................................................... NetWorker group reports ................................................................................ Backup Exec group reports ............................................................................. Restore reports .................................................................................................. Exposure reports............................................................................................... Change ratio reports......................................................................................... Deduplication reports ...................................................................................... Clone reports .....................................................................................................
EMC Data Protection Advisor Version 5.8 Report Reference Guide

16 16 18 19 19 21 21 24 25 25 27 27 28 28 28 29 29 31 32 32 32 35 35 35 36 37 38 39 40 42 43 44 44 44 45 47 49 49
3

Contents

Staging reports................................................................................................... 53 Errors reports ..................................................................................................... 55 Migration reports .............................................................................................. 55 Reclamation reports .......................................................................................... 59 Moves report ..................................................................................................... 62 Expiration reports ............................................................................................ 63 Storage Pool Copies report ............................................................................. 65 Delete Volumes ................................................................................................. 66 DB Backup reports ............................................................................................ 66 TSM Backup Set report..................................................................................... 67 TSM Command Event Details......................................................................... 68 Maintenance Job reports .................................................................................. 68 Licensing reports ..................................................................................................... 71 Media management reports................................................................................... 72 Overviews .......................................................................................................... 72 Detailed media reports..................................................................................... 74 Performance reports................................................................................................ 76 Backup client performance .............................................................................. 76 Device performance and utilization............................................................... 77 Resource utilization reports................................................................................... 80 Backup Device Utilization ............................................................................... 80 Client Occupancy by Client............................................................................. 80 TSM resource utilization reports .................................................................... 80 HP Data Protector database utilization reports............................................ 80 Return on investment reports................................................................................ 81 Deduplication ROI Trend................................................................................. 81 Deduplication Cost Savings ............................................................................ 82 Scheduling reports .................................................................................................. 83 Job Schedule....................................................................................................... 84 Client Schedule.................................................................................................. 84 Job Distribution ................................................................................................. 85 Job Distribution by Media Server ................................................................... 85 Size Distribution................................................................................................ 85 Size Distribution by Media Server.................................................................. 85 Active Job Distribution..................................................................................... 85 Active Clone Job Distribution ......................................................................... 85 Job Forecast ........................................................................................................ 85 Job Forecast versus Actual Summary ............................................................ 86 Job Forecast versus Actual............................................................................... 86 Group Forecast .................................................................................................. 87 Device Schedule (utilization) .......................................................................... 87 Device Schedule (mounts) ............................................................................... 87 Shared Device Schedule (mounts) .................................................................. 88 TSM Storage Pool Migration Schedule .......................................................... 88 TSM Storage Pool Reclamation Schedule...................................................... 88 Service level management reports ........................................................................ 89 Status reports ........................................................................................................... 92 Device status ...................................................................................................... 92 Mount Requests................................................................................................. 93 Client Occupancy report .................................................................................. 93 Client Status report ........................................................................................... 94 Client Usage Statistics ...................................................................................... 94 Server Error Summary ..................................................................................... 94 TSM reports........................................................................................................ 95 TSM Lan-free Server Status ............................................................................. 99

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Contents

TSM Client Occupancy Details....................................................................... 99 TSM Client Occupancy Summary.................................................................. 99 HP Data Protector database status reports ................................................. 100 NetBackup status reports .............................................................................. 100 Avamar Domain Footprint ............................................................................ 100 Backup server status ...................................................................................... 101

Chapter 2

Recoverability Reporting
Introduction ........................................................................................................... Recoverability reports .......................................................................................... Exposures Summary ...................................................................................... Detailed Exposures......................................................................................... Unprotected Nodes ........................................................................................ Obsolete Recovery points .............................................................................. Replication Process View............................................................................... Exclusion Details ............................................................................................ Server to Storage Configuration................................................................... Server to Storage Topology ........................................................................... Storage to Server Topology ........................................................................... RDF Configuration for Symmetrix............................................................... RDF Configuration for DG............................................................................ RDF Performance ........................................................................................... Remote Replication RPO Forecast for SRDF/A......................................... MirrorView configuration ............................................................................. Masking configuration................................................................................... Replication Configuration ............................................................................. Capacity Planning reports ................................................................................... Capacity Overview for Block........................................................................ Capacity Overview for File ........................................................................... Storage Array Raw Capacity......................................................................... Storage Pool Capacity .................................................................................... Drilling down from Capacity reports .......................................................... Change Management ........................................................................................... Change Overview........................................................................................... Change Details ................................................................................................ 104 105 105 105 105 105 105 106 106 106 106 106 106 106 106 106 106 106 107 107 107 107 107 107 108 108 108

Chapter 3

EMC Data Domain Reporting


Running reports for Data Domain ..................................................................... 110 Asset management reports................................................................................... 111 Capacity planning reports ................................................................................... 112 Change management reports .............................................................................. 113 Change Overview........................................................................................... 113 Change Details ................................................................................................ 113 Configuration reports........................................................................................... 114 File Server Exports.......................................................................................... 114 Filesystem Configuration .............................................................................. 114 VTL access group configuration................................................................... 114 Performance reports ............................................................................................. 115 Resource utilization reports ................................................................................ 116 Daily compression statistics .......................................................................... 117 Status reports......................................................................................................... 118 Troubleshooting reports....................................................................................... 119

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Contents

Chapter 4

Virtualization Reporting
Running virtualization reports ........................................................................... 122 Running DPA reports from VMware vSphere .................................................. 123 Registering the plug-in................................................................................... 123 Viewing the plugin reports............................................................................ 123 Capacity planning reports ................................................................................... 124 Change management reports .............................................................................. 125 Chargeback reports ............................................................................................... 126 Compliance and risk mitigation reports ............................................................ 127 Configuration reports ........................................................................................... 128 Data protection reports......................................................................................... 129 Performance reports.............................................................................................. 130 Resource utilization reports................................................................................. 131 Scheduling reports ................................................................................................ 132 Service level management reports ...................................................................... 133 Status reports ......................................................................................................... 134

Chapter 5

Database Reporting
Introduction ........................................................................................................... 136 Capacity planning reports ................................................................................... 137 Top Ten Largest Tables by size ...................................................................... 137 Top Ten Largest Tables by Row Count......................................................... 137 Top Ten Growing Tables................................................................................. 138 Change management reports .............................................................................. 139 Database Change Overview .......................................................................... 139 Detailed change reports ................................................................................. 139 All Database Change Details......................................................................... 140 Configuration reports ........................................................................................... 142 Server Configuration ...................................................................................... 142 Resource utilization reports................................................................................. 148 Datafile Utilization.......................................................................................... 148 Datafile Utilization Trend .............................................................................. 149 Tablespace Utilization .................................................................................... 149 Memory Usage ................................................................................................ 149 Status reports ......................................................................................................... 150 Connection Status ........................................................................................... 150 Process Status................................................................................................... 150

Chapter 6

HP EVA Reporting
Introduction ........................................................................................................... 154 Asset management reports .................................................................................. 155 Disk Summary ................................................................................................. 155 Disk Configuration ......................................................................................... 155 Disk Array Configuration.............................................................................. 156 Fibre Channel Port Configuration ................................................................ 156 LUN Configuration......................................................................................... 156 Status reports ......................................................................................................... 158 Disk Status........................................................................................................ 158 Disk Array Status ............................................................................................ 158 Fibre Channel Status....................................................................................... 159 Card Status ....................................................................................................... 159 LUN Status....................................................................................................... 159

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Contents

Chapter 7

ACSLS Server Reporting


Running reports for an ACSLS server ............................................................... Asset management reports.................................................................................. Tape Drive Summary ..................................................................................... Tape Drive Configuration.............................................................................. Tape Library Summary .................................................................................. Tape Library Configuration .......................................................................... Data protection reports ........................................................................................ Resource utilization reports ................................................................................ Tape Library Aggregate Utilization ............................................................. Tape Library Aggregate Utilization Trend.................................................. Tape Library Utilization................................................................................. Tape Library Utilization Trend ..................................................................... Status reports......................................................................................................... ACSLS Server Status ...................................................................................... ACSLS Port Status .......................................................................................... ACSLS ACS Status.......................................................................................... ACSLS Lock Status ......................................................................................... ACSLS Errors .................................................................................................. Tape Drive Status Summary ......................................................................... Tape Drive Status............................................................................................ Tape Library Status Details ........................................................................... Tape Library Volume Status .......................................................................... Tape Library Slot Status ................................................................................. Tape Library Cartridge Access Ports (CAP) Status ................................... Licensing reports................................................................................................... License Summary ........................................................................................... License Details ................................................................................................ Expired Licenses ............................................................................................. 162 163 163 163 163 164 165 166 166 166 166 167 168 168 169 169 170 170 171 171 171 172 172 173 174 174 174 174

Chapter 8

RecoverPoint Reporting
Introduction ........................................................................................................... Asset management reports.................................................................................. Fibre Channel Port Configuration................................................................ Change management reports .............................................................................. RecoverPoint Change Overview .................................................................. RecoverPoint Change Details ....................................................................... Chargeback reports............................................................................................... Chargeback Summary.................................................................................... Chargeback Details......................................................................................... Configuration reports........................................................................................... Consistency Group Details............................................................................ Consistency Group Copy Details ................................................................. Replication Set Configuration....................................................................... RPA Details...................................................................................................... Splitter Details................................................................................................. Performance reports ............................................................................................. Consistency group performance .................................................................. RPA performance............................................................................................ Resource utilization reports ................................................................................ Journal Utilization .......................................................................................... Status reports......................................................................................................... Fibre Channel Port Status.............................................................................. Network Interface IP ......................................................................................
EMC Data Protection Advisor Version 5.8 Report Reference Guide

176 177 177 178 178 178 179 179 179 180 180 181 182 183 183 185 185 185 187 187 188 188 188
7

Contents

Events Overview ............................................................................................. 188 Consistency Group Copy Status ................................................................... 189 RPA Active Consistency Groups .................................................................. 189 Volume Details................................................................................................. 190

Chapter 9

EMC File Storage Reporting


Running reports for EMC File Storage............................................................... 192 Asset Management reports .................................................................................. 193 Disks.................................................................................................................. 193 Disk arrays ....................................................................................................... 194 Fibre Channel ports ........................................................................................ 194 Filesystems ....................................................................................................... 195 Cards ................................................................................................................. 195 Hosts ................................................................................................................. 195 iSCSI Adapters................................................................................................. 196 LUNs ................................................................................................................. 196 Memory ............................................................................................................ 197 Network Interface ........................................................................................... 197 Processor........................................................................................................... 198 Capacity planning reports ................................................................................... 199 Change management reports .............................................................................. 200 EMC File Storage Changes Overview.......................................................... 200 EMC File Storage Change Details................................................................. 200 Configuration reports ........................................................................................... 201 EMC File Storage............................................................................................. 201 Fileserver Exports ........................................................................................... 203 Filesystem......................................................................................................... 203 iSCSI Portals..................................................................................................... 206 Imported and Exported LUNs ...................................................................... 206 Shared Memory ............................................................................................... 206 Performance reports.............................................................................................. 207 System Utilization Overview ........................................................................ 207 Fileserver .......................................................................................................... 207 Filesystem performance reports.................................................................... 208 LUN performance overviews........................................................................ 208 Memory utilization ......................................................................................... 208 Network interface performance reports ...................................................... 209 Processor reports ............................................................................................. 209 Status reports ......................................................................................................... 210 Disk status ........................................................................................................ 210 Fibre Channel Port Status .............................................................................. 210 Filesystem status reports................................................................................ 210 Host Status ....................................................................................................... 212 EMC File Storage Card Status ....................................................................... 212 LUN Status....................................................................................................... 212 Network interface reports.............................................................................. 213 Memory Status ................................................................................................ 213 Processor Status............................................................................................... 213 Troubleshooting reports ....................................................................................... 214

Chapter 10

NetApp Reporting
Running reports for a NetApp file server.......................................................... 216 Asset management reports .................................................................................. 217

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Contents

Disks ................................................................................................................. Fibre Channel ports ........................................................................................ Filesystems....................................................................................................... Hosts................................................................................................................. iSCSI Adapters ................................................................................................ LUNs ................................................................................................................ Memory............................................................................................................ Capacity and disk overviews........................................................................ Network Interface........................................................................................... Capacity planning reports ................................................................................... Disk reports ..................................................................................................... Filesystem reports........................................................................................... Change management reports .............................................................................. Configuration reports........................................................................................... Fileserver Exports ........................................................................................... LUN Mappings ............................................................................................... Imported and Exported LUNs...................................................................... Aggregate Configuration............................................................................... Mirror Configuration ..................................................................................... Remote Mirror Configuration....................................................................... NetApp Configuration................................................................................... NetApp Configuration Comparison............................................................ vfile Server Configuration............................................................................. NetApp Configuration File reports ............................................................. Licensing reports................................................................................................... Performance reports ............................................................................................. Disk reports ..................................................................................................... Fibre Channel port reports ............................................................................ Fileserver operation reports .......................................................................... LUN reports..................................................................................................... Mirror reports.................................................................................................. Network interface performance reports...................................................... Processor reports............................................................................................. Resource utilization reports ................................................................................ Aggregate Utilization..................................................................................... Disk................................................................................................................... Process.............................................................................................................. Status reports......................................................................................................... Aggregate Status............................................................................................. Disk Status ....................................................................................................... Fibre Channel Port Status.............................................................................. Filesystem Status ............................................................................................ Host Status....................................................................................................... iSCSI Adapter Status ...................................................................................... LUN Status ...................................................................................................... Mirror Status ................................................................................................... Cluster Status .................................................................................................. Network Interface Status............................................................................... Process Status .................................................................................................. Processor Status .............................................................................................. Qtree Status ..................................................................................................... Troubleshooting reports.......................................................................................

217 218 218 219 220 220 220 220 221 222 222 222 223 224 224 224 224 224 225 225 225 225 225 225 227 228 228 228 229 229 229 230 230 231 231 232 232 233 233 233 234 234 235 235 235 235 236 237 237 237 237 238

Chapter 11

EMC Disk Library Reporting

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Contents

Running reports for EMC Disk Library ............................................................. 240 EMC Disk Library versions ........................................................................... 240 Asset management reports .................................................................................. 241 Disk Summary ................................................................................................. 241 Fibre Channel Configuration......................................................................... 241 Host Configuration ......................................................................................... 241 Memory Configuration .................................................................................. 242 Network Interface Details.............................................................................. 242 Processor Configuration................................................................................. 242 Tape Drive Summary...................................................................................... 242 Tape Library Summary................................................................................... 243 Configuration reports ........................................................................................... 244 EDL Configuration Options .......................................................................... 244 File Server Exports .......................................................................................... 244 Change management reports .............................................................................. 245 Change Overview ........................................................................................... 245 Change Details................................................................................................. 245 Performance reports.............................................................................................. 246 Tape Drive Performance Summary .............................................................. 246 Replication performance................................................................................ 246 Resource utilization reports................................................................................. 247 Deduplication ratios and storage utilization .............................................. 247 System Resource Utilization Overview ....................................................... 248 Fibre Channel utilization ............................................................................... 248 Network interface utilization ........................................................................ 249 Processor utilization ....................................................................................... 249 Memory usage ................................................................................................. 249 Status reports ......................................................................................................... 250 Status Overview .............................................................................................. 250 Disk Status........................................................................................................ 250 Environmental Summary............................................................................... 250 Tape Drive Status ............................................................................................ 251 Tape Library Status Summary....................................................................... 251 Network Interface Status ............................................................................... 252 EDL Failover Status ........................................................................................ 252 Licensing reports ................................................................................................... 254 License Summary ............................................................................................ 254 License Details ................................................................................................. 254 Expired Licenses.............................................................................................. 254

Chapter 12

FalconStor Reporting
Running reports for FalconStor........................................................................... 256 Asset management reports .................................................................................. 257 Disk Summary ................................................................................................. 257 Fibre Channel Configuration......................................................................... 257 Host Configuration ......................................................................................... 258 Memory Configuration .................................................................................. 258 Network Interface Configuration ................................................................. 258 Processor Configuration................................................................................. 259 Tape Drive Summary...................................................................................... 259 Tape Library Summary................................................................................... 260 Tape Library Configuration........................................................................... 260 Configuration reports ........................................................................................... 262 FalconStor VTL Configuration Options....................................................... 262

10

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Contents

Memory Configuration.................................................................................. Change management reports .............................................................................. Change Overview........................................................................................... Change Details ................................................................................................ Performance reports ............................................................................................. Network interface utilization........................................................................ Tape Drive Performance Summary.............................................................. Resource utilization reports ................................................................................ Tape Library Utilization Trend ..................................................................... Tape Library Volume Utilization Trend....................................................... Status reports......................................................................................................... Status Overview.............................................................................................. Disk Status ....................................................................................................... Hardware Status ............................................................................................. Tape Drive Status............................................................................................ Tape Library status ......................................................................................... Tape Library Empty Volume count.............................................................. Network Interface status ............................................................................... FalconStor VTL Failover Status .................................................................... Troubleshooting reports....................................................................................... Network Interface Errors by Interface......................................................... Aggregate Network Interface Errors ...........................................................

262 263 263 263 264 264 264 266 266 266 267 267 267 267 268 269 270 270 271 272 272 272

Chapter 13

NetApp Virtual Tape Library Reporting


Running reports for a NetApp Virtual Tape Library....................................... Asset management reports.................................................................................. Host Configuration ........................................................................................ Network Interface Configuration................................................................. Tape Library Summary .................................................................................. Tape Library Configuration Details ............................................................. Performance reports ............................................................................................. Tape Drive Performance Summary.............................................................. Tape Drive Performance by Drive................................................................ Tape Drive Performance by Node................................................................ Resource utilization reports ................................................................................ System resource utilization overview.......................................................... Network interface utilization........................................................................ Status reports......................................................................................................... Host Status....................................................................................................... Network Interface Status............................................................................... Troubleshooting reports....................................................................................... Network Interface Errors by Interface......................................................... Aggregate Network Interface Errors ........................................................... 274 275 275 275 276 276 277 277 277 277 278 278 278 279 279 279 280 280 280

Chapter 14

Tape Library Reporting


Running reports for tape Libraries..................................................................... Asset management reports.................................................................................. Tape Library Summary .................................................................................. Tape Library Configuration .......................................................................... Tape Drive Summary ..................................................................................... Tape Drive Configuration.............................................................................. Fibre Channel ports ........................................................................................ 282 283 283 283 283 284 284

EMC Data Protection Advisor Version 5.8 Report Reference Guide

11

Contents

Fans ................................................................................................................... 284 Power Supply Units........................................................................................ 285 Thermometers.................................................................................................. 285 Resource utilization reports................................................................................. 286 Status reports ......................................................................................................... 287 Tape library components................................................................................ 287 Troubleshooting reports ....................................................................................... 291 Tape Library Errors ......................................................................................... 291

Chapter 15

Fibre Channel Switch Reporting


Running reports for Fibre Channel switches .................................................... 294 Asset management ................................................................................................ 295 Fibre Channel Port Configuration ................................................................ 295 Host Configuration ......................................................................................... 295 Configuration......................................................................................................... 296 Fibre Channel Device Configuration ........................................................... 296 Fibre Channel Device Mapping .................................................................... 296 Resource utilization reports................................................................................. 297 Fibre Channel Port Utilization ...................................................................... 297 Status reports ......................................................................................................... 298 Fibre Channel Port Status .............................................................................. 298 Host Status ....................................................................................................... 298 Environmental Summary............................................................................... 298 Fan Status ......................................................................................................... 298 PSU Status ........................................................................................................ 299 Thermometer Status ....................................................................................... 299 Troubleshooting reports ....................................................................................... 300

Chapter 16

IP Switch Reporting
Running reports for IP switches.......................................................................... 302 Asset management reports .................................................................................. 303 Network Interface Configuration ................................................................. 303 Performance reports.............................................................................................. 304 Network Interface Performance by Interface.............................................. 304 Network Interface Performance by Node ................................................... 304 Aggregate Network Interface Performance ................................................ 305 Resource utilization reports................................................................................. 306 Interface Utilization Summary...................................................................... 306 Status reports ......................................................................................................... 307 Network Interface Status ............................................................................... 307 Network Interface Link Pair.......................................................................... 307 Network Interface Link Pair Autonegotiation Status ................................ 308 Network Interface Link Pair Duplex Status ................................................ 308 Troubleshooting reports ....................................................................................... 309 Network Interface Errors by Interface ......................................................... 309 Network Interface Errors by Node............................................................... 309 Aggregate Network Interface Errors............................................................ 309

Chapter 17

Xsigo Reporting
Running Xsigo reports.......................................................................................... 312 Asset management reports .................................................................................. 313

12

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Contents

Fibre Channel Port Configuration................................................................ Fan Configuration .......................................................................................... PSU Configuration ......................................................................................... Thermometer Configuration......................................................................... Host Configuration ........................................................................................ Infiniband Port Configuration...................................................................... Network Interface Configuration................................................................. Status reports......................................................................................................... Fibre Channel Port Status.............................................................................. Hardware Status Reports .............................................................................. Host Status....................................................................................................... Infiniband Port Status .................................................................................... Network Interface Status............................................................................... Processor Status .............................................................................................. Virtual to Physical Port Mapping................................................................. Performance reports ............................................................................................. Fibre Channel performance reports ............................................................. Network interface performance reports...................................................... Processor reports............................................................................................. Infiniband performance reports ................................................................... Virtual Port Queue Depth Summary ........................................................... Troubleshooting reports....................................................................................... Network Interface Errors by Interface......................................................... Aggregate Network Interface Errors ........................................................... Fibre Channel Port Errors by Port................................................................ Aggregate Fibre Channel port errors...........................................................

313 313 314 314 314 315 315 316 316 316 317 317 317 318 318 320 320 321 321 321 322 323 323 323 323 323

Chapter 18

System Reporting
Gathering data....................................................................................................... Asset management reports.................................................................................. Card Configuration ........................................................................................ Disk................................................................................................................... Fibre Channel HBAs....................................................................................... Filesystem ........................................................................................................ Configuration reports........................................................................................... Network IP Configuration ............................................................................ Performance reports ............................................................................................. Disk performance ........................................................................................... Fibre Channel performance........................................................................... Network performance.................................................................................... Resource utilization reports ................................................................................ System Resource utilization .......................................................................... Filesystem utilization reports ....................................................................... Memory utilization reports ........................................................................... Process utilization reports ............................................................................. Processor utilization reports ......................................................................... Status reports......................................................................................................... Disk Status ....................................................................................................... Fibre Channel Status ...................................................................................... Filesystem Status ............................................................................................ Host Status....................................................................................................... Memory Status ................................................................................................ Network Interface Status............................................................................... Process Status .................................................................................................. 326 327 328 328 329 329 333 333 334 334 334 335 336 336 336 337 337 337 339 339 339 340 340 340 341 341

EMC Data Protection Advisor Version 5.8 Report Reference Guide

13

Contents

Processor Status............................................................................................... 341 Troubleshooting reports ....................................................................................... 342 Network Interface ........................................................................................... 342 Fibre Channel................................................................................................... 342

Chapter 19

Analysis Event Reporting


Analysis reports..................................................................................................... 344 Analysis Events Overview reports ............................................................... 344 Analysis Event Details.................................................................................... 344 Analysis Events During Backup ................................................................... 344 Capacity planning reports ................................................................................... 346 Compliance reports............................................................................................... 347 Configuration reports ........................................................................................... 348 Data protection reports......................................................................................... 349 Media management reports................................................................................. 350 Performance reports.............................................................................................. 351 Service level management reports ...................................................................... 352 Status reports ......................................................................................................... 353 Resource utilization reports................................................................................. 354

Chapter 20

Data Protection Advisor Reporting


Error reports........................................................................................................... 356 Collector Errors ............................................................................................... 356 Collector logs ................................................................................................... 356 Server Logs....................................................................................................... 357 History reports....................................................................................................... 358 Analysis Engine History ................................................................................ 358 Scheduled Report History ............................................................................. 358 Report History ................................................................................................. 359 Request History............................................................................................... 359 Performance reports ............................................................................................. 361 Listener Performance...................................................................................... 361 Analysis Engine Performance ....................................................................... 361 Publisher Performance ................................................................................... 361 Security reports...................................................................................................... 363 Access Log report............................................................................................ 363 Audit Log report ............................................................................................. 363 Audit Log Details report ................................................................................ 364 Status reports ......................................................................................................... 366 License Details ................................................................................................. 366 Process Status................................................................................................... 366

Index

367

14

EMC Data Protection Advisor Version 5.8 Report Reference Guide

1
Backup Application Reporting

This section describes the reporting capabilities of DPA for backup reporting. These reports are based on data gathered from the backup server and include the following:

Capacity planning reports ............................................................................................ 16 Change management reports ....................................................................................... 19 Chargeback reports ........................................................................................................ 21 Compliance and risk mitigation reports ..................................................................... 24 Configuration reports .................................................................................................... 25 Data protection reports.................................................................................................. 38 Licensing reports ............................................................................................................ 71 Media management reports.......................................................................................... 72 Performance reports....................................................................................................... 76 Resource utilization reports.......................................................................................... 80 Return on investment reports....................................................................................... 81 Scheduling reports ......................................................................................................... 83 Service level management reports............................................................................... 89 Status reports .................................................................................................................. 92

Backup Application Reporting

15

Backup Application Reporting

Capacity planning reports


Capacity planning reports show the growth of the backup environment over time, which allows planning for future growth. There are two types of capacity planning reports:

"Backup reports" on page 16, which show growth in the number of jobs that were backed up, and the amount of data backed up in those jobs. "Media reports" on page 18, which show growth in the number of volumes and the amount of data managed by the backup server.

Backup reports

To access the capacity planning reports for backup, right-click the backup server, client, or group against which to generate the report. Select Capacity Planning > Backup. The following are types of capacity planning reports based on backup information:

Data Data reports are based on the amount of data that has been backed up. These reports allow users to see trends in the amount of data that is being backed up over time calculated in a number of different ways.

Jobs Job reports are based on the number of jobs that are backed up by the backup application. Set the Archive Flag field to display in the report if backup job is an archive job. This field is not set by default, and is only set by the IBM Tivoli Storage Manager (TSM) and Symantec NetBackup modules.

Migration Migration reports describe the migration jobs on the TSM Server. Migration is a TSM Server process that moves data from one storage pool to the next storage pool that is defined in the hierarchy. The process is based on the migration thresholds defined for the storage pools. This data is returned only for TSM servers.

Reclamation Reclamation reports display information on the reclamation processes that are running on the TSM Server. Reclamation is a TSM Server process that automatically defragments media by consolidating unexpired data onto other media when the free space on media reaches a defined level. This data is returned only for TSM Servers.

Garbage collection The garbage collection reports display information on the data retrieved by EMC Avamar during the scheduled garbage collection process. Garbage collection is an Avamar process that removes expired and unused chunks of data.

16

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 1 on page 17 describes all of the available reports.


Table 1 Backup capacity planning reports Report name Data Backed Up Daily Description Displays the total amount of data backed up each day in a bar chart.

Data Backed Up Daily by Device Displays the total amount of data backed up each day for each device. Note: This report is available for EMC NetWorker servers only. Data Backed Up Weekly Displays the total amount of data backed up each week in a bar chart.

Data Backed Up Daily by Server From a group of backup servers, this report displays a bar chart that shows the amount of data backed up each day calculated by backup server. Data Backed Up Weekly by Server Data Backed Up Daily by Media Server Data Backed Up Weekly by Media Server Number of Jobs Backed Up Daily Number of Jobs Backed Up Weekly Number of Jobs Backed Up Daily by Server Number of Jobs Backed Up Weekly by Server Number of Jobs Backed Up Daily by Media Server Number of Jobs Backed Up Weekly by Media Server Daily Migration by Storage Pool Daily Reclamation by Storage Pool Garbage Collection Data Recovered From a group of backup servers or clients, this report displays a bar chart that shows the amount of data backed up each week calculated by backup server. Displays the total amount of data backed up each day in a bar chart calculated by media server. Displays the total amount of data backed up each week in a bar chart calculated by media server. Displays the number of jobs that are backed up each day on the nodes selected. Displays the number of jobs that are backed up each week on the nodes selected. From a group of backup servers or clients, this report displays the number of jobs backed up each day, calculated by server. From a group of backup servers or clients, this report displays the number of jobs backed up each week, calculated by server. Displays the number of jobs that are backed up each day, calculated by media server. Displays the number of jobs that are backed up each week, calculated by media server. Displays details on the total size of migration jobs that have occurred in the last day. Displays details on the total size of reclamation jobs that have occurred in the last day. Displays the total data recovered from Avamar garbage collection jobs over the time period.

To view the report, select Capacity Planning > Backup > Garbage Collection > Data Recovered from the navigation tree menu.

Capacity planning reports

17

Backup Application Reporting

Media reports

The Media Capacity Planning reports display the growth in both the amount of data stored and the number of volumes under management. To view the Media Capacity Planning reports, select Capacity Planning > Media from the server, client, or group to generate the report as described in Table 2 on page 18.

Table 2

Media Capacity Planning reports Report name Media Count Media Count by Pool Media Count by State Description Displays the number of volumes managed by the backup servers selected over time. Displays the number of volumes managed by the backup servers selected calculated by pool over time. Displays the number of volumes managed by the backup servers calculated by state over time. The state is one of the following values: Full Empty Partial Suspended Displays the number of volumes in a specific state in each individual pool trended over time. Displays a trend report that shows the number of volumes in each jukebox trended over time. Volumes that are offline are not displayed. Displays a trend report that shows the number of volumes calculated by pool in each jukebox. Volumes that are offline are not displayed. Displays a trend report that shows the state of volumes in each jukebox. The state is one of the following values: Full Empty Partial Suspended Displays a trend report breaking down the contents of each jukebox by pool and state. This allows users to identify pools with very few empty tapes. Displays a trend report that shows the amount of data that is stored on media. Displays a trend report that shows the total amount of data stored on media calculated by pool. Displays a trend report that shows the total amount of data stored on media calculated by jukebox. Only online media is included in this report. Displays a trend report that shows the total amount of data in each jukebox calculated by location.

Media Count by Pool and State Media Count by Location

Media Count by Pool and Location Media Count by State and Location

Media Count by Pool and State and Location Media Usage Media Usage by Pool Media Usage by Location

Media Usage by Pool and Location

18

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Change management reports


Change management reports show configuration changes that occur on the backup server over a given time. Change management reports display details of all of the configuration changes between the start time and end time of the report time window.

Backup Application Change Overview

To run the Backup Application Change Overview control panel, right-click a backup server or group of backup servers to generate the report. Select Change Management > Overviews > Backup Application Configuration Changes. The Backup Application Change Summary displays a summary of changes in configuration for the following components of a backup server:

Devices Groups Jobs Clients

For each category, a bar displays the number of items that were added, removed, or modified over the reports time period. To view more details on the configuration changes, right-click the report in the control panel, and select one of the following reports:

Device Configuration Change Details Group Configuration Change Details Job Configuration Change Details Client Configuration Change Details

The Backup Application Change Details button displays details of changes for all components of the backup application over the time period. Alternatively, right-click a node in the navigation tree and select Change Management > Backup > report name from the navigation tree to run a detailed change management report. Table 3 on page 19 describes the change management reports available.
Table 3 Change management reports (page 1 of 2) Report Server Configuration Change Details Group Configuration Change Details Schedule Configuration Change Details Client Configuration Change Details Job Configuration Change Details Description Displays any backup servers that were added, removed, or modified during the reporting period. Displays any groups that were added, removed, or modified on the backup server during the reporting period. For Symantec NetBackup servers only, shows the changes to backup schedules. Displays any clients that were added, removed, or modified on the backup server during the reporting period. Displays any jobs that were added, removed, or modified on a clients configuration on the backup server during the reporting period.

Change management reports

19

Backup Application Reporting

Table 3

Change management reports (page 2 of 2) Report Device Configuration Change Details Storage Unit Configuration Change Details Pool Configuration Change Details Media Location Changes Audit User Changes Description Displays any devices that were added, removed, or modified on the backup server during the reporting period. For Symantec NetBackup servers only, shows storage units that have been added, removed, or modified on the backup server during the reporting period. Displays any backup pools that were added, removed, or modified on the backup server during the reporting period. Identifies volumes whose locations have changed during the reporting period. For Avamar servers only, shows information about changes made by users to Avamar objects.

Table 4 on page 20 describes a sample of the fields available from the detailed change reports.
Table 4 Detailed Configuration Changes report fields Field Server Client Change Description Name of the server on which the backup application resides. Name of the backup application or device. Indication of whether the object was: Added Deleted Modified Description of what changed if Modified was indicated. Timestamp of the change.

Difference Noted

Table 5 on page 20 describes a sample of the fields available from the Audit User Change details report.
Table 5 Audit User Changes Details report fields Field Server Domain Name User Object Operation Start Time End Time Description IP address or host name of the Avamar server on which the backup application resides. Name of the domain where the object was changed. Identifier of the user who made the change. Name of the object type that was changed, for example, schedule, user, group, domain, dataset, or client. Description of the change. Time the change started. Time the change took effect.

20

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Chargeback reports
Chargeback reports provide the ability to perform a financial cost analysis for the backups and restores that have taken place in a customers environment. A cost is calculated for each backup client. That cost can be charged back to the business unit that is responsible for that client or set of clients. Table 6 on page 21 describes the standard reports provided with the product use chargeback models based on the inputs.
Table 6 Chargeback Input fields Input field Number of Backups Backup Size Number of Restores Restore Size Number of Tapes Data Retained Description Number of backups that have been performed by that client during the reporting period. Amount of data backed up on that client during the reporting period. Number of restores that have occurred on that client during the reporting period. Total amount of data restored by that client during the reporting period. Number of tapes used by that client during the backup process. Total amount of data stored for that client on the backup server.

In addition, a backup client can be assigned a chargeback cost center from the Node Properties dialog box. Chargeback costs can then be totalled against a cost center in reports. If a node is not assigned a cost centre, a "default cost center" is used in reports. The EMC Data Protection Advisor Administration Guide contains more information on configuring chargeback reporting for nodes. To generate a chargeback report, right-click any of the following to run the report:

Group Client Job Device

Chargeback Overview

To run the Chargeback Overview control panel, right-click a group, client, job, or device in the navigation tree and select Chargeback > Overview.

Chargeback reports

21

Backup Application Reporting

Table 7 on page 22 describes the reports displayed in the Chargeback Overview control panel.
Table 7 Chargeback Overview reports Report Chargeback Summary Description Displays the total value for each chargeback input and the total chargeback cost for the time period.

Cost Breakdown by Cost Centre Displays the total chargeback cost for each cost center in the nodes selected over the time period. Total Cost Breakdown Chargeback History Displays the total chargeback costs for retention, tape, backup, and restore as a pie graph. Displays the aggregate monthly chargeback cost for the last three months.

Right-click the Chargeback Summary or Cost Breakdown by Cost Centre report to drill down and view the Chargeback Details by Cost Centre or Chargeback Details by Client reports. Chargeback Details by Cost Centre report This report displays the totals for each of the chargeback inputs, and the total chargeback cost, by cost centre. Table 8 on page 22 describes the fields in the Chargeback Details by Cost Centre report.
Chargeback Details by Cost Centre Field Cost Centre Num. Backups Backup Size Num. Restores Restore Size Data Retained Num. Tapes Total Cost Description Cost center as defined in a clients Node Properties dialog box. Number of backups performed for that cost center. Gigabytes of data backed up for cost center. Number of restores performed for cost center. Gigabytes of data restored for cost center. Gigabytes of data stored for cost center. Total number of tapes used for cost center. Total of all chargeback costs for that cost center.

Table 8

To view chargeback details by cost centre for a specific client or node, select Chargeback > Chargeback Details by Cost Centre in the navigation tree. Right-click a row in the Chargeback Details by Cost Centre report and select Client Details to display a Chargeback Details by Client report. This drill-down report displays charge details for all clients that have been assigned that cost center.

22

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Chargeback Details by Client

This report displays the total chargeback costs for backups, restores, data stored, and number of tapes used by backup client. Table 9 on page 23 describes the fields in the Chargeback Details by Client report.
Chargeback Details by Client Field Server Client Num Backups Backup Size (MB) Cost Per Num Backups Cost For Num Backups Cost Per GB Backed Up Cost For GB Backed Up Backup Cost Num Restores Restore Size (MB) Cost Per Num Restores Cost For Num Restores Restore Cost Data Retained (MB) Cost Per GB Retained Retention Cost Cost Per Tape Used Num Tapes Tape Cost Total Cost Policy Used Cost per GB Restored Cost for Data Restored Description Name of the server on which the backups or restores occurred. Name of the client on which the backups or restores occurred. Total number of backups performed. Total size of the backups. Cost per Backup (derived from the chargeback policy). Total cost for all number of backups. Cost per gigabyte backed up (derived from the chargeback policy). Total cost for all gigabytes backed up. Total backup cost (number of backups and gigabytes backed up). Total number of restores performed. Total size of all restores. Cost per restore (derived from the chargeback policy). Total cost for all number of restores. Total restore cost (number of restores and gigabytes restored). Total of all data stored. Cost per gigabyte stored (derived from the chargeback policy). Total cost of storing data. Cost per tape used for backup (derived from the chargeback policy). Total number of tapes used. Total cost of tape usage. Aggregate of all chargeback costs. Chargeback policy used to calculate chargeback costs for this node. Cost per gigabyte restored (derived from the chargeback policy). Total cost for all gigabytes restored.

Table 9

To view chargeback details by client for a specific client or node, select Chargeback > Chargeback Details by Client in the navigation tree.

Chargeback reports

23

Backup Application Reporting

Compliance and risk mitigation reports


Compliance and risk mitigation reports display backup and restore statistics to allow administrators to measure data protection risk and policy compliance. For example, DPA provides backup and restore KPI, strike rate, and daily success rate reports. Table 10 on page 24 describes the available compliance and risk mitigation reports.
Table 10 Compliance and risk mitigation reports Report Backup and Restore KPIs Description Displays success rates and total gigabytes for backups and restores, and percentages of data and number of backups restored. Displays percentage of daily successful backups measured against the target success rate. Displays numbers of clients that have not been backed up for one or more days consecutively. Displays the time since the last successful backup of the client compared to the client's recovery point objective.

Daily Success Rate Against Target Strike Summary Unprotected Clients

DPA also provides several reports to measure compliance for specific data protection regulations. Table 11 on page 24 describes these compliance and risk mitigation reports.
Table 11 Compliance and risk mitigation reports Report FDA Unsuccessful Clients Client Configuration Changes HIPPA Media to be Recycled Media to be Destroyed Policy Configuration Changes Sarbanes Oxley Most Exposed jobs SEC Clients without Full Backup Displays clients that have not received a full backup for the report period. Displays the last successful job for backup clients. Displays media that is eligible for recycling. Displays media that should be destroyed due to high numbers of mount or relabel operations, or due to age of the media. Displays the servers added, removed, and modified for backup groups. Displays details of backups that were unsuccessful. Displays changes to configuration for all backup clients. Description

To view compliance and risk mitigation reports, right-click a backup application and select Compliance and Risk Mitigation from the navigation tree.

24

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Configuration reports
Configuration reports display information on the configuration of the backup application. Two control panels summarize the following:

Configuration of a group of backup servers in the environment. Configuration of an individual backup server.

To analyze the configuration of multiple backup servers, right-click a group node in the navigation tree and select Configuration > Overviews > Backup Configuration Summary control panel. The control panel shows the following information:

Number of backup servers being monitored. Breakdown of the number of backup servers by backup application. Number of clients configured on each backup server. Breakdown of the client operating systems being backed up. Number of devices configured on each backup server. Breakdown of the type of devices used in the environment.

To look in more detail at the configuration of an individual backup server, select the backup server and select Configuration > Overviews > Backup Server Summary from the navigation tree. The control panel shows the following information:

Number of clients configured on the backup server. Number of groups configured on the backup server. Number of devices configured on the backup server. Number devices configured as writeable versus read-only.

In addition to reporting on high-level backup server configuration data, you can view the individual backup server components configuration details. "Server Configuration" on page 25 contains more information.

Server Configuration

To view configuration details of an individual backup server or group of backup servers, right-click that server or group. Select Configuration > Backup > Server > Backup Server Details from the navigation tree. The Backup Server Details report displays a row for each backup server and contains the information described in Table 12 on page 25.

Table 12

Backup Server Details (page 1 of 3) Field Server Application Version OS Type TSM only Description Name of the backup server. Backup application that runs on that server, for example, NetWorker. Version of the backup application that runs on that server. Operating system on which the application is running.

Configuration reports

25

Backup Application Reporting

Table 12

Backup Server Details (page 2 of 3) Field Port Password Set Install Date Restart Date Authentication on Password Expiration Period Invalid Sign-on Attempt Limit Min Password Length Registration Availability Accounting Activity Log Retention Activity Summary Retention Period License Audit Period Last License Audit License Compliance Scheduler Max Sessions Max Scheduled Sessions Event Record Retention Client Action Duration Schedule Randomization Percentage (%) Scheduling Mode Description Server port address. Indication of whether the password has been set for the server. Date and time when the server was installed. Last date and time when the server was started. Indication of whether password authentication is set on or off. Period, in days, after which the administrator or client node password expires. Number of invalid sign-on attempts before a node is locked. Minimum number of characters for the password. Web authorization timeout. Indication of whether client node registration is open or closed. Indication of whether the server is enabled or disabled. Whether an accounting record is generated at the end of each client node session. Number of days information is retained in the activity log, or the size of the log. Number of days information is retained in the SQL Server activity summary table. Period, in days, after which the license manager automatically audits the TSM license. Date and time when the last license audit occurred. Whether central scheduling is running (active or inactive). Maximum number of client/server sessions. Maximum number of client/server sessions available for processing scheduled work. Number of days central scheduler event records are retained. Duration of the period during which the client processes the schedule defined. Percentage of the startup window that is used for executing scheduled events in client-polling mode. Frequency with which clients poll the server to obtain scheduled work, in client-polling mode. If the value in this field is Client, the polling frequency is determined by the client node. Maximum number of times that a client scheduler retries after a failed attempt to execute a scheduled command. If the value in this field is client, the client node determines the maximum number of retries.

Log Mode

26

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 12

Backup Server Details (page 3 of 3) Field Database Backup Trigger Description Number of minutes between attempts by the client scheduler to retry after a failed attempt to contact the server or to execute a scheduled command. If the value in this field is Client, the client node determines the number of minutes between retries. Central scheduling modes supported by the server. Mode for saving recovery log records. The mode is either roll-forward or normal. TSM automatically runs a backup of the database if the database backup trigger is enabled. Receivers for which event logging has begun. Indication of whether the server is a configuration manager. Interval that elapses before the managed server requests a refresh of any changes from a configuration manager. Indication of whether cross definition of servers is allowed. Indication of whether context messaging is enabled or disabled. Indication of whether server-free data movement is on, off, or not supported. Amount of data, in megabytes, that is copied in a single instance of server-free data movement. Time the server was last refreshed with configuration changes from the configuration manager. Total capacity, in megabytes, of the storage pool. Amount, in megabytes, of the pool that is available for storage.

Active Receivers Configuration Manager Refresh Interval Cross Define Subfile Client Context Messaging Server Free Status TOC Load Retention Machine GUID Archive Retention Protection Last Refresh Capacity Usable Capacity

Storage Server Configuration

The NetBackup Storage Server Configuration report displays information on the NetBackup storage server configuration settings. To run this report, select Configuration > Backup > Server > Storage Server Configuration from the navigation menu.

Disk Pools

The NetBackup Disk Pool Configuration report displays information on disk pools configured by NetBackup. To run this report, select Configuration > Backup > NetBackup Disk Pools from the navigation menu. Table 13 on page 27 describes the fields that display in this report.
Table 13 NetBackup Disk Pools fields (page 1 of 2) Field Server Pool Pool ID Description Name of the NetBackup Server Name of the pool Identifier for the disk pool

Configuration reports

27

Backup Application Reporting

Table 13

NetBackup Disk Pools fields (page 2 of 2) Field Storage Servers Server Type Disk Storage Type Raw Size (GB) Capacity (GB) Volume Count System Tag Low Water Mark High Water Mark Comment Percentage of dirty pages to trigger a cache flush Percentage of dirty pages to stop a cache flush Type of NetBackup server: master or client Type of disk storage unit Raw size of the disk pool Effective capacity of the disk pool Number of volumes in the pool Description

Disk Volume Configuration

The NetBackup Disk Volume Configuration report shows the configuration information of disk volumes on a NetBackup Server. To run this report, select Configuration > Backup > NetBackup Disk Volumes from the navigation menu. Table 14 on page 28 describes the fields that display in this report.

Table 14

NetBackup Disk Volume Configuration Fields Server Volume ID Path Pool Disk Type Capacity OK on Root Read on Write Description Name of the NetBackup Server. Identifier for the disk volume. Path to the volume. Pool to which the volume belongs. Type of underlying disk. Capacity, in megabytes, of the disk. Indication of whether the volume can be mounted on the root filesystem. Indication of whether the disk can perform reads on write-mounted volumes.

Storage Unit Configuration

The Storage Unit Configuration report displays configuration information on NetBackup storage units. To run this report, select Configuration > Backup > NetBackup Storage Units > Storage Unit Configuration from the navigation menu.

Lifecycle Policy Configuration

The Lifecycle Policy Configuration report displays details on NetBackup Lifecycle Policies.

28

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

To run this report, select Configuration > Backup > NetBackup Lifecycle Policy from the navigation menu.

Lifecycle Policy Destination

The Lifecycle Policy Destination report displays details on NetBackup Policy Destinations To run this report, select Configuration > Backup > NetBackup Lifecycle Policy from the navigation menu.

Client Configuration

To view the configuration of backup clients on a backup server, right-click that server or client and select Configuration > Backup > Clients > Client Details from the navigation tree. The report displays details on the configuration of all physical hosts configured on a server and includes the fields described in Table 15 on page 29.
Client Configuration (page 1 of 3) Field Server Client OS Type OS Version Software Version Active Remote IP NetWorker only Priority Parallelism Server Network Interface Browse Policy Retention Policy Directive Backup Command Executable Path Client Identifier Scheduled Backup Comment Save Operations File Inactive Threshold Priority of the NetWorker client. Number of jobs that can run in parallel on this client. Network interface on the server or media server to which the client connects when running backups. Browse policy of the NetWorker client. Retention policy of the NetWorker client. Directive files of the NetWorker server. Commands available on the NetWorker client. Path to the NSR executables on this client. Unique identifier for a NetWorker instance on a host machine. Indication of whether the client is enabled for scheduled backup. User remarks for the client. Save operation instructions in the form KEYWORD:TOKEN=STATE. Number of days a file has not been accessed before it is counted as inactive. Zero indicates that no inactivity statistics were collected. Description Name of the backup server on which the client is configured. Name of the client. Type of client operating system. Version of the client operating system. Version of the backup software running on the client. Indication of whether the client is active. IP address of the client.

Table 15

Configuration reports

29

Backup Application Reporting

Table 15

Client Configuration (page 2 of 3) Field File Inactive Alert Remote User Application Information NDMP NDMP Name Dedup Backup Dedup Node SCSI VCB Proxy Node Archive Services Remote Access Index Path Owner Notification Hard Links Short Filenames BMR BMR Options Backup Type CPUs Enabler in Use Licensed Applications Licensed PSPs Resource ID TSM only Contact Registration Time Last Access Time Password Set Time Text string of information that identifies the client nodes administrator. Time of registration. Time last accessed. Time that the password was set. Description Percentage of space that can be occupied by inactive files before a notification is generated. Zero indicates that no alert will be sent. Username that is used for either remote commands on the client or to access application-specific data. Any application information for the client. Indication of whether the client is an NDMP client. Logical name that is assigned to the array in NDMP NAS array configurations. Indication of whether the client is a deduplication client. Name of the deduplication node Indication of whether the client is a SCSI backup client. Indication of whether the client is a VCB backup client. Proxy client where the saves were run. Indication of whether archive services are available for the client. List of remote users permitted to recover files from the client. Path to the client's index directory on the server. Notification action used to send status message contents to the client owner. Indication of whether hard link processing is enabled on the Windows client. Indication of whether short file name processing is enabled on the Windows client. Indication of whether Bare Metal Recovery protection is enabled. List of Bare Metal Recovery options. Backup client type. Number of processors in the client machine. Indication of whether the client is using up a license count. List of licensed applications used by the client. List of licensed EMC PowerSnap platforms used by the client. Identifier for the client.

30

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 15

Client Configuration (page 3 of 3) Field Invalid Password Count Compression Archive Delete Allowed Backup Delete Allowed Node Locked Registering Administrator Client Option Set Aggregation URL Node Type Password Expiration Period Keep Mount Point Max Mount Points Auto Rename Filespaces Validate Protocol GUID Group Transaction Max Data Read Path Description Number of invalid password entries. Indication of whether compression is enabled. Indication of whether archive deletion is permitted. Indication of whether backup deletion is permitted. Indication of whether the client node is locked. Name of the administrator who registered the client. Option set for the client specified on the TSM server. Indication of whether client file aggregation is enabled when backing up. URL for the web client. Type of client node: client, server, NAS. Number of days after which a password expires. Indication of whether the client can keep mount points during a session. Maximum number of mount points permitted for a client in a session. Whether TSM prompts the client to rename file spaces when the client system upgrades to a client that supports Unicode. Indication of whether if the client has data validation enabled. Globally unique identifier of the client node. Maximum number of files or directories that can be contained in a transaction group. Transfer path when sending data: LAN path only LAN-free path only Any path Transfer path when receiving data: LAN path only LAN-free path only Any path Initiator of session: server or client, or server only. High-level address of the NAS file server (IP address or domain name). Low-level address of the NAS file server (port number). Indication of whether collocation is enabled for the client.

Data Write Path

Session Initiation Client HLA Client LLA Collocation Group name

Group Configuration

To obtain information on the group configurations on the backup server, right-click a group in the navigation tree and select Configuration > Backup > Groups > Group

Configuration reports

31

Backup Application Reporting

Configuration. This report displays information on each group configured on the backup server, including whether or not the group is active. The following additional information appears for groups on NetWorker servers:

Scheduled start time of the group. Parallelism and client retry settings. Group level and schedule settings.

For Symantec NetBackup servers, all of the configuration parameters for a policy are displayed.

Schedule Configuration

To report on schedule configuration information for the backup server, right-click that server. Select Configuration > Backup > Schedule > Schedule Configuration from the navigation tree. To report on job information that is configured for backup on each backup client, right-click that server. Select Configuration > Backup > Jobs > Job Configuration from the navigation tree. A tabular report displays the details about which jobs are backed up on each client within each group and with what schedule.

Job Configuration

Pool Configuration

To report on pool information configured for backup on each backup client, right-click that server. Select Configuration > Backup > Pool > Pool Configuration from the navigation tree. Pool Configuration report displays the details about which jobs are backed up on each client within each group and with what schedule, as shown in Table 16 on page 32. This report returns data for NetWorker, NetBackup, and TSM.

Table 16

Pool Configuration report (page 1 of 4) Field Server Pool Name Pool Type Description Hostname of backup server on which the pool is located. Name of the pool. Type of storage pool. This field is populated by TSM and NetWorker only. Valid values include: Primary Primary storage pool in TSM Copy Copy storage pool in TSM Any Either primary or copy storage pool in TSM Backup Backup storage pool in NetWorker Archive Archive storage pool in NetWorker Description of the backup pool.

Description TSM only Device Class Estimated Capacity

Device class associated with the storage pool. Amount of estimated space of the backup pool.

32

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 16

Pool Configuration report (page 2 of 4) Field High Mig. Pct Description Value at which the TSM Server automatically starts migration for this storage pool. This value is determined when the number of volumes containing data reaches this percentage of the total number of volumes in the storage pool. The total number of volumes includes the maximum number of scratch volumes. Value at which the TSM Server stops migration for this storage pool. This value is determined when the number of volumes that contains data reaches this percentage of the total number of volumes in the storage pool. Primary storage pool to which files are migrated. Primary storage pool as a target for reclaimed data from this storage pool. Maximum size for a physical file that the server can store in the storage pool. Overflow location for the storage pool. Indicates that the migration process leaves a cached copy of a file in this storage pool after migrating the file to the next storage pool. Indication of whether the server attempts to keep data that belongs to a single client node, group of client nodes, or client file space stored on as few volumes as possible. Value at which the TSM Server reclaims a volume, based on the percentage of reclaimable space on a volume. Number of offsite volumes to have their space reclaimed during reclamation for this storage pool. Maximum number of scratch volumes that the server can request for this storage pool. Valid values are between 0 and 100,000,000. Number of days that must elapse after all files are deleted from a volume before the volume can be rewritten or returned to the scratch pool. User ID of the user who updated the pool. Date and time that change is made to the backup pool. Data format to use to back up files to this storage pool and restore files from this storage pool. Names of copy storage pools where the server simultaneously writes data. Indication of whether a cyclic redundancy check (CRC) validates storage pool data when audit volume processing occurs on the server.

Low Mig. Pct

Next Storage Pool Reclaim Storage Pool Max Size Threshold Overflow Location Cache Migrated Files

Co-Locate

Reclamation Threshold Offsite Reclamation Limit Max Scratch Volumes

Delay Period for Re-use

Updated by Updated Storage Pool Data Format Copy Storage Pools CRC Data

Configuration reports

33

Backup Application Reporting

Table 16

Pool Configuration report (page 3 of 4) Field Access Description Specifies how client nodes and server processes (such as migration and reclamation) can access files in the storage pool. Valid values include: READWrite Specifies that client nodes and server processes can read and write to files stored on volumes in the storage pool. READOnly Specifies that client nodes can only read files from the volumes in the storage pool. UNAVailable Specifies that client nodes cannot access files stored on volumes in the storage pool.

NetWorker only Enabled Archive Label Template Retention Policy If selected, an indication of whether the pool is enabled and considered for selection. If selected, an indication of whether the pool is set for archiving. Template that is to be used when labeling volumes in this pool. Retention policy associated with the backup pool. Retention policies determine how long a volume is protected from being overwritten. Groups that are required to enter into the backup pool. Clients that are required to enter into the backup pool. jobs that are allowed in the backup pool. Levels that are required to enter into the backup pool. Devices on which volumes are allowed to be mounted. Indication of whether file index entries are generated for the backup pool. Indication of whether automated verification is performed while data is being written to a volume from the backup pool. Indication of whether recyclable volumes can be used by other pools. Indication of whether backup pool can recycle volumes from other pools. Selection factor when a request is made for a writable volume. Preferred type is considered first within a priority level. Number of parallel sessions per device allowed when saving to this backup pool. Class of mount requests for media belonging to the pool or for media being added to this pool. Indication of whether this pool uses WORM tapes and only WORM tapes. Indication of whether any tapes labelled in this WORM pool are initialized as DLWROM tapes, assuming that they are in DLWORM capable drives.

Groups Clients Jobs Levels Devices Store Index Entries Auto Media Verify Recycle To Pools Recycle From Pools Vol Type Pref Max Parallelism Mount Class Worm Pool Create DLT Worm

34

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 16

Pool Configuration report (page 4 of 4) Field Barcode Prefix NetBackup only Pool Host Pool User Pool Group Host on which the backup pool resides. Users allowed to access the backup pool. Group to which the backup pool belongs. Description Barcodes with this prefix value are selected for the pool.

Jukebox Configuration

To display information on the configuration of any tape libraries managed by the backup application, right-click the backup server. Select Configuration > Backup > Jukebox > Jukebox Configuration from the navigation tree. The Jukebox Configuration report displays details on how many slots and how many drives are contained in each library, and the host that controls the jukebox if the jukebox is in a shared environment. To display information on the configuration of any device managed by the backup application, right-click the backup server. Select Configuration > Backup > Device > Device Configuration from the navigation tree. The Device Configuration report includes details on the type of device, the host to which it is attached, and whether it is configured as read-only.

iSNS Configuration

To display information about the names of the iSNS servers configured on a node, right-click the node. Select Configuration > iSCSI > iSNS Servers from the navigation tree. The iSCSI iSNS Configuration report includes details about the name of the node and the iSNS server for the node. This report is available for HP Data Protector and Symantec NetBackup.

NetBackup Catalog Backup Configuration

NetBackup Catalog Backup Configuration reports include the following:


"NetBackup Catalog Backup Configuration" on page 35. "NetBackup Catalog File Backup Configuration" on page 36

The NetBackup Catalog Backup Configuration report returns information on the configuration of backups of the NetBackup Catalog. To run the report, select Configuration > Backup > NetBackup Catalog > Catalog Backup Configuration from the navigation tree. Table 17 on page 35 describes the fields that display in the NetBackup Catalog Backup Configuration report.
Table 17 NetBackup Catalog Backup Configuration report (page 1 of 2) Field Server Schedule Type Media Server Media 1 Type Description Name of the NetBackup master server. Type of schedule that the catalog backup is following. Name of the NetBackup media server to which the catalog will be backed up. Type of media to which the catalog will be backed up. Examples include disk and removable media for the first backup.

Configuration reports

35

Backup Application Reporting

Table 17

NetBackup Catalog Backup Configuration report (page 2 of 2) Field Media 1 Target Media 1 Density Media 1 Last Written Media 1 Allocated Media 2 Type Media 2 Target Media 2 Density Media 2 Last Written Media 2 Allocated Description Either the media ID on which the backup will occur or the pathname for a disk-based backup for the first backup. Density of the destination media for the first backup. Last time that the first piece of media was written to. Time that the first piece of media was allocated. Type of media to which the catalog is backed up. Examples include disk and removable media for the second backup. Either the media ID on which the backup will occur or the pathname for a disk-based backup for the second backup. Density of the destination media for the second backup. Last time that the second piece of media was written to. Time that the second piece of media was allocated.

NetBackup Catalog File Backup Configuration

The NetBackup Catalog File Backup Configuration report returns information on the files that are scheduled for backup as part of the NetBackup Catalog Backup process. To run the report, select Configuration > Backup > NetBackup Catalog > Catalog File Backup Configuration from the navigation tree. Table 18 on page 36 describes the fields that display in the NetBackup Catalog File Backup Configuration report.

Table 18

NetBackup Catalog File Backup Configuration report Field Server Path Name Description Name of the NetBackup Server. Path to the catalog file that is backed up.

Retention Policy

The Avamar Retention Policy report displays information about the configuration of Avamar retention policies. It includes all default and user-created retention policies for all domains created on an Avamar server. To run the report, select Configuration > Backup > Retention Policy > Retention Policy Configuration from the navigation tree. Table 19 on page 36 describes the fields that display in this report.

Table 19

Retention Policy Configuration report (page 1 of 2) Field Server Domain Name Name Enabled Read Only Description Name of the Avamar server. Name of the domain associated with the retention policy. Name of the retention policy. Indication of whether the policy is active. Indication of whether is read only or writeable.

36

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 19

Retention Policy Configuration report (page 2 of 2) Field Expiration Date Duration Duration Type Override Num Days Daily Kept Num Weeks Weekly Kept Num Months Monthly Kept Num Years Yearly Kept Description Date the policy expires. Duration that data should be backed up. Unit of duration, for example, days, weeks, or months. Indication of whether the policy overrides basic retention. Number of days of daily backups to retain. Number of weeks of weekly backups to retain. Number of months of monthly backups to retain. Number of years of yearly backups to retain.

This report is available for Avamar.

TSM Lan-free Server Configuration

This report shows configuration details for TSM LAN-free servers monitored by DPA. Similar fields to the TSM Server Configuration report are displayed. To view the report, go to Configuration > Backup > TSM > TSM LAN Free Server Configuration.

Configuration reports

37

Backup Application Reporting

Data protection reports


Data protection is the main category for reports that present information about the backups that have taken place on a backup server. Data protection includes reports on any restores that have already occurred, and the current exposure of any backup clients.
Note: Size Offset and Size Scanned Offset values are gathered by the backup modules, but by default are not displayed in the reports. Size Offset is the number of bytes that should be added to or subtracted from the Size field to return the job size in bytes. Size Scanned Offset is the number of bytes that should be added to or subtracted from the Size Scanned field to return the job size in bytes.

Data protection reports break down into the categories detailed in Table 20 on page 38.
Table 20 Data protection report categories (page 1 of 2) Report "Overviews" on page 39 "Job reports" on page 40 "Client reports" on page 42 "NetWorker group reports" on page 44 "Backup Exec group reports" on page 44 "Restore reports" on page 44 "Exposure reports" on page 45 "Change ratio reports" on page 47 "Deduplication reports" on page 49 "Clone reports" on page 49 "Staging reports" on page 53 "Errors reports" on page 55 "Migration reports" on page 55 "Reclamation reports" on page 59 "Moves report" on page 62 "Expiration reports" on page 63 "Storage Pool Copies report" on page 65 Description Summarizes the backups that have processed. Details the jobs that have been backed up. Displays cumulative information at a client level. Displays the status and history of NetWorker group runs on the backup server. Displays the status and history of Backup Exec groups on the backup server. Details restores that were run on the backup server. Details how long backup clients and applications are exposed to data loss. Details the ratio of data backed up to data protected for backup clients. Displays the size of data scanned against the size of data backed up for deduplication operations. Displays the information on cloning and duplication operations for NetWorker and NetBackup. Displays the information on staging operations for NetWorker servers. Details about the errors that have occurred during the backup process. Displays information on the migration processes that are running on the TSM Server. Displays information on the reclamation processes that are running on the TSM Server. Displays information on the data move processes that are running on the TSM Server. Displays information on the expiration processes that are running on the TSM Server. Displays information on the storage pool copy processes that are running on the TSM Server.

38

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 20

Data protection report categories (page 2 of 2) Report "DB Backup reports" on page 66 "Delete Volumes" on page 66 "TSM Backup Set report" on page 67 "TSM Command Event Details" on page 68 "Maintenance Job reports" on page 68 Description Displays information on the DB (catalog) backup processes that are running on the TSM Server. Displays information on the delete volume processes that are running on the TSM Server. Displays information on the backup sets on the TSM Server. Displays information on command events that have been run on a TSM Server. Displays information on maintenance jobs that have occurred on the Symantec PureDisk or EMC Avamar Server.

Overviews
Table 21

The overviews category includes high-level reports about the backup and restore process and are described in Table 21 on page 39.
Report Overviews Report "Backup Summary report" on page 39 "Restore Job Summary" on page 39 "Report Card" on page 40 "Job Summary" on page 40 Description Ccontrol panel that contains reports about the backups that occurred on specified nodes. Summary of the restores that have occurred on the nodes specified in the report. High-level report that indicates which clients were backed up. Summary of all of the jobs that have occurred on the nodes specified in the report.

Backup Summary report

To display the Backup Summary control panel, right-click the server on which to report. Select Data Protection > Overviews > Backup Summary from the navigation tree. The control panel includes reports that show:

Number of backups that have completed, succeeded, and failed Amount of data that was backed up both in total and cumulatively over time

Restore Job Summary

The Restore Job Summary report details the total number of restores that have occurred on a client, and the total amount of data that has been restored. The Restore Summary report displays identical information as for the Job Summary report, as shown in Table 22 on page 40. To view the Restore Job Summary reports, select Data Protection > Overviews > Restore Summary from the navigation tree. To display restore details for any of the columns, click the value in the column. A Detailed Job report displays information on the jobs that have been restored.

Click the Size (GB) column to view the Restore Top Ten Largest Clients report. Click the Success Rate (%) column to view the Restore Top Ten Least Successful Clients report.

To view the Restore Details on the restores that have occurred, select Data Protection > Restores > Restore Details.

Data protection reports

39

Backup Application Reporting

Report Card

The Backup Report Card displays


Information about each client that was backed up over the reporting period. Number of successful and unsuccessful jobs on a daily basis.

Use this report to easily identify clients that have repetitive failures, or more importantly, clients that have not been backed up at all. For each day in the specified reporting period, a cell displays the backup status of each client:

If the cell for a client is completely green, all backups were successful for that client on that day. If the cell is completely red, all backups failed for that client on that day. If there is a mix of red and green, the proportion represents the percentage of backups that failed on that client on that day. If a cell is white, no backups occurred for that client on that day.

To display the number of jobs that have succeeded and failed, move the cursor over any cell in the Report Card. To display the Backup Save Set Summary report for a client on a particular day, click a cell within the Report Card. Job Summary The Job Summary report displays a summary of all backups that were processed on a backup server or client over the period specified. Table 22 on page 40 describes the columns shown in the report.
Job Summary report Column Completed Succeeded Failed Missed Active Size Size Offset Description Total number of jobs that have completed over the reporting period. Number of jobs that were successful over the reporting period. Number of jobs that failed over the reporting period. Number of jobs that were missed over the reporting period (TSM only). Number of jobs associated with the reporting period that are in either a queued or running state. Total amount of data that has been backed up over the reporting period. Number of bytes that should be added or subtracted from the Size field to return the save set size in bytes. By default, this field does not appear. Success rate of backups over the reporting period.

Table 22

Success Rate

To display the details of any of the columns, click the columns value in the column. A Detailed Job report displays information on the save sets that have been backed up.

Job reports

To view detailed information about the jobs that have been backed up, right-click the server or group of servers against which to run the report. Select Data Protection > Jobs > report type from the navigation tree.

40

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

The Job Detail reports are described in Table 23 on page 41.


Table 23 Job reports Report Job Summary All Jobs Failed Jobs Missed Jobs Successful Jobs Active Jobs Vault Jobs Description Summarizes all backups that were processed on a backup server or client over the period specified. Details all jobs that have been processed. App Type is returned only for TSM. Details all failed jobs. App Type is returned only for TSM. Details backup jobs that were missed. This report is available only for TSM. Details all successful jobs. App Type is returned only for TSM. Displays the status of all jobs that are currently running or queued and waiting to start. Details any vault jobs that have taken place. Vault job reports are displayed only for Symantec NetBackup servers.

The appearance of each of the detailed job reports are similar. To run additional reports, after running a Detailed Job report, select a row in the table. Right-click to display a menu that has the report options described in Table 24 on page 41.
Table 24 Detailed job reports (page 1 of 2) Report Alerts During Backup Average Job Run Description Displays the results of any Analysis Engine alerts generated on the client during the backup. Displays information on the average statistics for a backup of the selected job on that client since records began. Only successful jobs of the same backup level are considered. Displays details about the last successful backup of the same client and job. Enables users to compare different runs of the job. Displays details about the last five runs of the same client and selected job. Displays the details of all known backups of the selected client and job. Displays information about the error messages associated with a failed backup job. Displays information about files that were not successfully backed up during a backup of a job. Files may have been missed because they were in use by another application at backup time. Displays information about the media associated with the vault. For NetBackup displays details about the configuration and status of the disk media associated with the vault. To run this report, right-click the Vault Job Details report and select Vault Job Disk Media Details.

Last Successful Backup Last 5 Runs Full Job History Errors Open Files

Vault Media Details Vault Job Disk Media Details

Data protection reports

41

Backup Application Reporting

Table 24

Detailed job reports (page 2 of 2) Report Media Details Description Displays details about which media volumes stored a job, including pool, jukebox, and Ssot details. Users can then identify which tapes are required for restore and whether they are online or offline. For NetBackup displays details about the configuration and status of the disk media used to backup jobs. To run this report, right-click the Backup Job Details report and select Disk Media Details. If DPA is gathering system performance information on a backup client, allows users to drill down to see the what was happening with CPU, memory, and network interface utilization of the client during the backup. If DPA is gathering system performance information on the backup server and client, allows users to view what was happening on the client, backup server, and tape drives during the backup process. For NetBackup, drill down report that displays previously failed jobs that have been restarted. To run this report, drill down from Successful Backup Jobs to a failed job. For NetBackup, drill down report that displays previously failed clone jobs that have been restarted. To run this report, drill down from a Successful Clone Jobs to a failed clone job. Displays job details for backup jobs for a single volume.

Disk Media Details

Host Utilization During Backup

Client, Server, Tape Drive Utilization Failed Restarted Jobs

Failed Restarted Clone Operations

Backup Job Details for Specific Volume

Client reports

Client reports are similar to job reports. However, instead of presenting information at a detailed job level, all of the jobs processed on a client are rolled up to present information on a per-client basis. To generate these reports, select Data Protection > Clients > report name (where report name is the report to run) from the navigation tree. Table 25 on page 42 describes the client reports.
Table 25 Client reports (page 1 of 2) Report Client Summary Description Displays: Number of clients completed Number of clients succeeded Number of clients partially succeeded Number of clients failed Number of clients are active Client success rate Displays the status of all clients that were backed up during the reporting period. Displays information on all clients for which backups failed during the reporting period.

All Clients Failed Clients

42

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 25

Client reports (page 2 of 2) Report Missed Clients Successful Clients Partially Successful Clients Description Displays information on all clients for which backups were missed during the reporting period. This report is available only for TSM. Displays information on the status of all successfully backed-up clients processed during the reporting period. Displays information on all clients for which backups were partially successful during the reporting period. A client is partially successful if it had at least one failed job and one successful job. Displays information on all clients that have at least one queued or running job. Displays the ten clients that have backed up the most amount of data during the reporting period.

Active Clients Top 10 Largest Clients

Clicking any of the fields in the Client Summary report displays more details for the clients that fall into each category. The status of a client over the reporting period is determined in the following way:

Successful, which indicates that all jobs processed on the client during the reporting period were successful. Failure, which indicates that all jobs processed on the client during the reporting period were failures. Partially Successful, which indicates that some jobs succeeded and some failed during the reporting period.

It is possible to configure reports to not include job failures that were successful at a later date. To enable this behavior, a DPA administrator can configure a system-wide option: 1. Select File > System Settings from the menu. The System Settings dialog box appears. 2. Click Client Reporting. 3. Select Successful Retries Discount Earlier Failures. The Retry time limit specifies a time limit within which a failed job can be cancelled. For example, if the limit is set to 12 hours, then a job failing on one day is not discounted by a job that succeeds three days later. 4. Click OK.

Group reports
Table 26

Table 27 on page 44 describes the available reports.


Networker group reports Report Backup All Jobs for Group Run Backup Successful Jobs for Group Run Backup Failed Jobs for Group Run Description Drill down report that displays backup job details for a specific group run. Drill down report that displays backup job details for successful jobs in a specific group run. Drill down report that displays backup job details for failed jobs in a specific group run.

Data protection reports

43

Backup Application Reporting

NetWorker group reports

The NetWorker group reports display the state of all groups on the NetWorker server. From these group reports users can run historical reports about the success and failure of groups. To run a group report: 1. Right-click the group. 2. Select Data Protection > Group from the navigation tree. Table 27 on page 44 describes the available reports.

Table 27

Networker group reports Report Group Status All Groups Description Displays the status of all groups on the backup server at the end of the reports time period. Displays a history of all the group runs processed on the backup server during the reporting period.

After running the All Groups report, drill down on the group run and display the backup details. Right-click on a group and select Job Summary.

Backup Exec group reports

Group reports for Backup Exec display the status of all groups on the Backup Exec server, including success or failure. To run a group report: 1. Right-click the Backup Exec node. 2. Select Data Protection > Groups > Group Summary from the navigation tree. Table 28 on page 44 describes the available reports.

Table 28

Backup Exec group reports Report Group Summary Description Displays: Number of groups completed Number of groups succeeded Number of groups failed Number of groups active Displays the status of all groups on the backup server at the end of the reports time period. Displays a history of all the group runs processed on the backup server during the reporting period.

Group Status All Groups

As done in all summary reports, click on a column in the Group Summary report to drill down and view a detailed report on successful, failed, or active groups.

Restore reports

The detailed Restore report shows all restores that have run on a backup server. To run the Detailed Restore report, select Data Protection > Restores > Restore Details from the navigation tree.

44

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Note: Restore information from NetWorker is gathered by monitoring the sessions that have been completed on the NetWorker server. Depending on how busy the NetWorker server is and how frequently the collector is polling for jobs, information on restores that have occurred may have been removed from NetWorker before DPA gathers the data. This means that it is possible that not all restores are reported.

Restore Media Details Restore Job Disk Media

Right-click the Restore Details report. Select Restore Media. The Restore Media Details report displays details about the media that was used to restore jobs. The Restore Job Disk Media report for NetBackup displays details about the configuration and status of the disk media used to restore backup jobs. To run this report, right-click the Backup Restore Details report and select Restore Job Disk Media Details.

NetWorker Bootstraps

For NetWorker servers, a bootstrap report displays the details of all bootstrap backups processed on the backup server during the reporting period. To run the NetWorker Bootstraps report, select Data Protection > Restores > NetWorker Bootstraps from the navigation tree.

Exposure reports

Exposure reports display clients and filesystems that have not had backups in addition to reports that show the duration since a client had its last successful backup (known as its exposure). Table 29 on page 45 describe the exposure reports.

Table 29

Exposure reports Report "Exposure Details Report" on page 46 Description For a backup client or group of clients, this report details the following: Recovery point for that client Current exposure Average exposure Estimated restore time If gathering filesystem information from a client, this report displays filesystems on a client that were not backed up by the backup process. When run for a client or group of clients, this report identifies which clients were not backed up during the reporting period. Identifies the clients which generate the most failed backups.

"Filesystems Not Backed Up" on page 47 "Clients Not Backed Up" on page 47 "Top Ten Most Unreliable Clients" on page 47

Data protection policies are used in exposure reporting to calculate:


Whether a backup ran in its backup window. Whether an Application or host is meeting its restore time objective (RTO) and recovery point objective (RPO).

Data protection reports

45

Backup Application Reporting

The Exposure Details report uses a data protection model based on the inputs described in Table 30 on page 46.
Table 30 Data Protection Policy fields Input Field Restore Time Objective Recovery Point Objective Use Historical Restore Performance if Available Assert restore will take Description Specifies the Restore Time Objective (RTO) for a client or application. Specifies the Recovery Point Objective (RPO) for a client or application. If specified, exposure reports will calculate the estimated restore time based on historical restore information. Specifies a percentage of the time taken to perform the backup of the client or the application. If historical information is not available, this will be used as a measure of the restore performance in calculating the estimated restore time. Specifies the time period for offline media to be brought back from offsite, and put into a tape library. When exposure reports are run, the media used in the backups are analyzed and the location of the media determined. If any of the media are offline, this delay is factored into the calculation to determine the estimated restore time.

Off-Line Data Overhead

Refer to the EMC Data Protection Advisor Administration Guide for information on configuring data protection policies for nodes. Exposure Details Report The Exposure Details report displays information about the time since the last successful backup for the filesystems of a client. Run this report against a backup client, and not against the backup server itself. To run the Exposure Details report, select Data Protection > Exposure > Exposure Details from the navigation tree. Table 31 on page 46 describes this report.
Table 31 Exposure Details fields Field Recovery Point Objective Description Determined by analyzing all jobs processed on a client and by determining the time of the last successful backup of each job on that client.The earliest end time is used as the recovery point, as this determines the point at which that client can be fully recovered. Amount of time that has elapsed between the recovery point and the current time. This allows users to see at a glance how long the machine has been exposed to changes in the environment. The earliest end time of all jobs is used as the recovery point, as this determines the point at which that client can be fully recovered. RTO as specified in the Data Protection Policy. Calculated by: Using historical recovery data to estimate a restore time, if historical data usage is enabled on that nodes Data Protection policy and there exists at least 30 days of data. or Using the Assert Restore will take input from the Data Protection Policy. The Off-line Data Overhead time is added if specified and the backup media is offline when the report is run.

Current Exposure

Restore Time Objective Estimated Restore Time

Run the report against a group of client filesystems or databases to calculate an exposure for an application, business unit, office, or other group of objects.

46

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

The Exposure Details report uses the Horizontal Bar Chart Renderer. This provides a graphical display of an applications recovery point and estimated restore time in comparison to its Restore Time Objectives and Recovery Point Objectives. Filesystems Not Backed Up If you are gathering information on the filesystems configured on a backup client, use the Filesystems Not Backed Up report to display a list of those filesystems that have not had a successful backup during the reporting period. To run the Filesystems Not Backed Up report, select Data Protection > Exposure > Filesystems Not Backed Up from the navigation tree. Clients Not Backed Up You can view a list of clients configured on a backup server that were not successfully backed up during the reporting period. Use this report to identify scheduling problems on the backup application or clients that continue to have repetitive failures. To run the Clients Not Backed Up report, select Data Protection > Exposure > Clients Not Backed Up from the navigation tree. Top Ten Most Unreliable Clients The Top Ten Most Unreliable Clients report shows the clients that generate the greatest number of failed backups, and the percentage of all failures for the client. To run the Top Ten Most Unreliable Clients report, select Data Protection > Exposure > Top Ten Unreliable Clients from the navigation tree.

Change ratio reports

Backup applications like EMC Avamar and Symantec PureDisk employ a data deduplication algorithm in which only unique blocks of data are backed up, significantly reducing the amount of data that needs to be backed up in an environment. The change ratio reports show the ratio of the amount of data that has been backed up compared to the amount of data that is protected. The reports allow you to analyze the rate of data change within your environment, and understand the efficiency of your backup application. There are reports available for viewing these metrics at the job level, at backup client level, or aggregated over multiple clients. By analyzing the rate of data change in your environment and the efficiency of your backup application, you can determine how much you would benefit from using a backup application that uses data deduplication. Table 32 on page 48 shows the

Data protection reports

47

Backup Application Reporting

information returned by the change ratio reports about data protected and data backed up in your environment.
Table 32 Change ratio fields Field Protected Description Amount of data on the backup client that is being protected. For applications such as NetWorker and NetBackup, this is determined by looking at the last full backup of the client. For applications like Avamar, the statistics are derived directly from the application. Amount of data that was backed up on the last incremental backup of the backup client. For Avamar and TSM, this value is taken from the last backup of the client, as both products perform only incremental backups. Ratio of the last incremental size to the amount of data that is protected. In environments in which very little data changes, this value would be expected to be low. For applications such as NetWorker, this value would typically be in the range of 1015%. For applications such as Avamar, this value would be expected to be significantly lower. Calculated by analyzing all of the incremental backups that have occurred on the client over the reporting period, and dividing the total data backed up by the number of the backups that have taken place. This value allows you to see if there is a significant discrepancy between the last incremental backup and the overall average. Ratio of the average incremental size to the amount of data that is protected. For backup applications such as NetWorker, this would typically be in the range of 1015%. For applications such as Avamar, this value would be expected to be significantly lower. Total amount of data that has been backed up on this client over the reporting period. This includes full backups and incrementals. Ratio of the total amount of data that has been backed up to the amount of data that has been protected. For applications such as NetWorker and NetBackup, this value would be expected to be a multiple of the amount of data protected. For backup applications such as Avamar, this value should be a significantly smaller number than the amount of data protected.

Last Incremental Size

Last Incremental Rate

Average Incremental Size

Average Incremental Rate

Total Size Size Rate

Data Change Ratio Overview

The Data Change Ratio Overview control panel contains the Aggregate Data Change Ratio report, and two reports that display the total data protected compared to average incremental, and data protected compared to total size for the specified time period. The Aggregate Data Change Ratio report displays the ratio of data backed up to data protected, as described in Table 32 on page 48, and aggregated over all of the backup clients. To run the Aggregate Data Change Ratio report from the navigation tree, select Data Protection > Change Ratios > Aggregate Data Change Ratio. To drill down to view change ratio data by client or job, right-click in the Aggregate Data Change Ratio report. Select Data Change Ratio by Client or Data Change Ratio by job.

48

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Data Change Ratio by Client

The Data Change Ratio by Client report displays the ratio of data backed up to data protected, as described in Table 32 on page 48, and totalled for the backup client selected from the navigation tree. To drill down and view change ratio data or job data, right-click in the Data Change Ratio by Client report. Select Data Change Ratio by Job.

Data Change Ratio by Job

The Data Change Ratio by Job report displays the ratio of data backed up to data protected. This ratio is calculated for each backup job on the client selected from the navigation tree as described in Table 32 on page 48 job. DPA reports on deduplication operations that have taken place on backup servers. The deduplication process scans backup data and uses an algorithm to back up only the changes that have occurred since the last backup in a highly compressed form. The Deduplication Overview control panel displays the following for deduplication backup clients and for the overall deduplication ratio distribution in the environment:

Deduplication reports

Top ten best compression ratios Top ten worst compression ratios

To view the overview, select Data Protection > Dedup > Backup Deduplication Overview. To view deduplication ratios for a client, select Data Protection > Dedup > Dedup Details by Client from the navigation tree, or right-click in the Deduplication Overview and select Backup Client Deduplication Ratio Details.

Clone reports

DPA reports on cloning and duplication processes that have occurred. In this guide, the word cloning is used to describe NetWorker and Backup Exec cloning operations, NetBackup duplication operations, and Avamar and PureDisk replication operations.
Note: DPA does not report on cloning operations for Backup Exec 9.1 jobs.

The clone reports are:


"Clone Summary" on page 49 "Clone Operations" on page 51 "Cloned Backups" on page 51 "Uncloned Backups" on page 52 "Active clones" on page 52 "Clone Job Disk Media Details" on page 52 "Clone Job Media Details for Clone Job" on page 53 "Backup Data Domain Clone Details" on page 53

Clone Summary

The Clone Summary report displays a summary of all the cloning operations that have occurred on a server.

Data protection reports

49

Backup Application Reporting

To run the Clone Summary report, select Data Protection > Clones > Clone Summary from the navigation tree. Table 33 on page 50 lists the fields in the Clone Summary report.
Table 33 Clone Summary fields Field Completed Successful Failed Size Job Coverage Description Number of cloning operations that were completed during the period specified. Number of cloning operations that were successful during the period specified. Number of cloning operations that failed during the period specified. Total amount of data in megabytes that has been cloned during the period specified. Percentage of backup jobs that were successfully cloned.

Click the fields in the Clone Summary report to display the following reports:

"Successful Clones report" on page 50 "Failed Clones report" on page 51

Successful Clones report The Successful Clones report provides details on successful cloning operations. Table 34 on page 50 lists the fields in the Successful Clones report.
Table 34 Successful Clones fields Field ID Backup Application Server Media Server Clone Job Name Client Clone ID Status Description Application ID of the backup job. Name of the backup application that cloned the job, for example, NetWorker, NetBackup. Name of the backup server on which the clone occurred. Name of the media server to which the backup was cloned. Name of the cloned job. Name of the client on which the clone occurred. Identifier for the cloned backup job. Status of the clone operation: Success Failed Error code (if available) from the backup application. Amount, in megabytes, of data that was backed up. Number of bytes that should be added or subtracted from the Size field to return the job size in bytes. Time the clone operation started writing. Time the clone operation completed.

Error Code Size Size Offset Start Time End Time

50

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

To run the Successful Clones report, click in the Successful column of the Clone Summary Report. Failed Clones report The Failed Clones report provides details on failed cloning operations. The Failed Clones report returns the same fields as are returned in the Successful Clones report, described in Table 34 on page 50. To run the Failed Clones Report, click in the Failed column of the Clone Summary report. Clone Operations The Clone Operations report displays information on all cloning operations. To run the Clone Operations report, do one of the following:

Select Data Protection > Clones > Clone Operations from the navigation tree. Click in the Completed column of the Clone Summary report.

The Clone Operations report returns the same fields that are returned in the Successful Clones report, as described in Table 34 on page 50. Cloned Backups
Table 35

The Cloned Backups report provides details on jobs that have been cloned. Table 35 on page 51 describes the fields in the Cloned Backups report.
Cloned Backups fields Field Server Media Server Group Schedule Client Job Status Description Name of the backup server on which the clone occurred. Name of the Media Server to which the job was cloned. Name of the group/policy in which the cloned job occurred. Name of the schedule under which the clone ran. Name of the client on which the job was cloned. Name of the cloned job. Status of the cloned job: Success Failed Status of the clone attempt: Success Failed Level of the cloned job. Amount of data backed up (MB). Number of files cloned. Time the job started writing. Time the cloned job completed. Identifier that uniquely identifies the cloned job on the backup server on which the job ran. Time that the clone operation started. Time that the clone operation ended.

Clone Status

Level Size Num Files Start Time End Time App job Id Clone Start Time Clone End Time

Data protection reports

51

Backup Application Reporting

To run the Cloned Backups report, select Data Protection > Clones > Cloned Backups from the navigation tree. Uncloned Backups The Uncloned Backups report provides details on backup jobs that have not been cloned. To run the Uncloned Backups report, do one of the following:

Select Data Protection > Clones > Uncloned Backups from the navigation tree Click in the Job Coverage column of the Clone Summary report.

Table 36 on page 52 lists the fields in the Uncloned Backups report.


Table 36 Uncloned Backups fields Field Id App Job Id Server Group Schedule Client Job Status Description ID of the backup job. Unique identifier of the cloned job on the backup server on which it ran. Name of the backup server on which the clone occurred. Name of the group/policy in which the cloned job occurred. Name of the schedule under which the clone ran. Name of the client on which the jobs were cloned. Name of the cloned job. Status of the cloned job: Success Failed Error code (if available) from the backup application. Level of the cloned job. Amount, in megabytes, of the data backed up. Time the clone started queuing. Time the job started writing. Time the cloned job completed.

Err Code Level Size Queue Start Start Time End Time

Clone Job Disk Media Details

The Clone Job Disk Media Details report for NetBackup displays details about the configuration and status of the disk media used to backup jobs that have been cloned. To run this table report, right-click the Clone Job Details report and select Clone Job Disk Media Details.

Active clones

The Active Clone Jobs Details report provides information on the active backup jobs that have been cloned during a specified period. To run the Active Clone Job Details report, select Data Protection > Clones > Active Clones Details from the navigation tree.

52

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 38 on page 53 describes the fields in the Active Clone Jobs report.
Table 37 Active Clone Jobs fields Field Server Media Server Clone ID Status Description Name of the backup server on which the clone occurred. Name of the media server to which the job was cloned. Identifier for the cloned job. Status of the cloned job: Success Failed Started Time the clone started queuing. Time the job started writing.

Queue Start Start Time

Clone Job Media Details for Clone Job Backup Data Domain Clone Details

This report returns media details for a specific clone job. This report is a drill-down report from the Clone Job Details report. This report returns clone job details for a specific backup job. Only available for clone jobs performed on Data Domain. This report is a drill-down report from the Backup Jobs Details report. DPA allows users to report on staging processes that have occurred on a NetWorker server. Staging is a process whereby existing backups are migrated from local to other storage devices. The staging reports are:

Staging reports

"Staging Summary" on page 53 "Staging Details" on page 54

Note: These reports are available only for NetWorker.

Staging Summary

The Staging Summary report displays a summary of all the staging operations that have occurred on a NetWorker server. To run the Staging Summary report, select Data Protection > Staging > Staging Summary from the navigation tree. Table 38 on page 53 describes the fields in the Staging Summary report.

Table 38

Staging Summary fields Field Completed Successful Failed Total Staging Size (MB) Description Number of staging operations that were completed during the period specified. Number of staging operations that were successful during the period specified. Number of staging operations that failed during the period specified. Total amount of data in megabytes that has been staged during the period specified.

Data protection reports

53

Backup Application Reporting

The fields in the Staging Summary report can be clicked to display the following reports:

"Successful Staging Operations" on page 54 "Failed Staging Operations" on page 54 "Staging Details" on page 54

Successful Staging Operations The Successful Staging Operations report provides details on successful operations. To run the Successful Staging Operations report, click in the Successful column of the Staging Summary report. The Successful Staging Operations report returns the fields described in Table 39 on page 54.
Table 39 Successful Staging Operations fields Field Id Backup Application Server Process Id Storage Pool Input Volumes Output Volumes Status Description ID of the backup job. Backup application on which the staging operation occurred. Hostname of the backup server. Unique identifier used to identify the process. Name of the storage pool from which data has been staged. Name of the volume from which data has been staged. Name of the volume to which data has been staged. Completion status of the staging process: Success Failed Amount, in megabytes, of the data staged. Number of bytes that should be added or subtracted from the Size field to return the amount of data in bytes. Number of items that were staged. String that contains the errors that occurred. Error code associated with the error string. Time that the staging operation started. Time that the staging operation ended.

Size Size Offset Num Items Errors Error Code Start Time End Time

Failed Staging Operations The Failed Staging Operations report provides details on the staging operations that have failed. To run the Failed Staging Operations report, click in the Failed column of the Staging Summary report. The fields returned for this report are the same as those described in the Successful Staging Operations report, which are described in Table 39 on page 54. Staging Details The Staging Details report provides details on all staging operations.
54

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

To run the Staging Details report, do one of the following:


Select Data Protection > Staging > Staging Details from the navigation tree. Click in the Completed column of the Staging Summary report.

The fields returned for this report are the same as those described in the Successful Staging Operations report, which are described in Table 39 on page 54. Staging Meda Details This report returns details on the media used in a particular staging operation. To view the report, right-click in the Staging Details report to view the media details for that row.

Errors reports

Error reports analyze backups that have completed with errors. To run the errors reports: 1. Right-click the backup server for group against which to run the report. 2. Select Data Protection > Errors > report (where report is the report to run) from the navigation tree. Table 40 on page 55 describes the error reports.
Table 40 Error reports Report Top 10 Unreliable Clients Error Summary Error Distribution Error Details Open Files Restore Job Error Details Description Identifies those clients on a backup server or in a group that have failed most frequently during the reporting period. Shows in a summary report the distribution of job failures by error code in a pie chart. Shows in a bubble chart the distribution of failed jobs by error code over time. Shows in a tabular report the details of all failed jobs including the error message. Show in a tabular report the details of any files that could not be backed up during the backup process. Shows information on restores that have not completed due to error. To access this report, drill down on a failed restore job from the Restore Details or Failed Restores report. Shows information on specific restore jobs that have not completed due to error.

Restore Job Error Details for Specific Job

Migration reports

The TSM module enables reporting of migration jobs on the TSM Server. Migration is a TSM Server process that moves data from one storage pool to the next storage pool as defined in the hierarchy, and based on the migration thresholds defined for the storage pools. The following reports display information about the TSM migration process:

"TSM Migration Summary" on page 56 "TSM Daily Migration by Storage Pool" on page 58 "TSM Storage Pool Migration Schedule" on page 58

Data protection reports

55

Backup Application Reporting

TSM Migration Summary

The TSM Migration Summary report displays a summary of all the TSM Migration jobs that have occurred on a server. To run this report, select Data Protection > Migration > Migration Summary from the navigation tree. This report returns the information described in Table 41 on page 56.

Table 41

TSM Migration Summary report Field Completed Succeeded Failed Size Items Description Number of migration jobs that have completed. Number of migration jobs that have succeeded. Number of migration jobs that have failed. Total size of the migration jobs. Total number of items migrated from the storage pool.

The fields in the TSM Migration Summary report can be clicked to display the following additional reports:

"TSM Migration Jobs" on page 56 "TSM Successful Migration Jobs" on page 57 "TSM Failed Migration Jobs" on page 57 "TSM Migration Errors" on page 57 "TSM Migrated Size by Storage Pool" on page 57 "TSM Migrated Item Count by Storage Pool" on page 58

TSM Migration Jobs The TSM Migration Jobs report displays details of all TSM migration Jobs. To run this report, do one of the following:

Select Data Protection > Migration > Migration Jobs from the navigation tree. Click the Completed field in the TSM Migration Summary report.

This report returns the information described in Table 42 on page 56.


Table 42 TSM Migration report (page 1 of 2) Field Server Storage Pool Input Volume Output Volume Status Description Name of the TSM Server. Name of the storage pool from which data has been migrated. Name of the volume from which data has been migrated. Name of the volume to which data has been transferred. Completion status of the migration process: Success Failed Amount, in megabytes, of the data migrated. Total number of items migrated from the storage pool.

Size Num Items

56

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 42

TSM Migration report (page 2 of 2) Field Error Flag Description Indication of whether the process returned any errors. Note: Even if the process was successful, it could have errors associated with it. Start Time End Time Time the process started. Time the process completed.

TSM Successful Migration Jobs The TSM Successful Migration Jobs report displays details on successful TSM migration Jobs that have occurred on the last day. To run this report: 1. Select Data Protection > Migration > Migration Summary from the navigation tree. 2. In the TSM Migration Summary report, click the Succeeded field. This report returns the information described in Table 42 on page 56. TSM Failed Migration Jobs The TSM Failed Migration Jobs report displays details on all failed TSM migration Jobs. To run this report: 1. Select Data Protection > Migration > Migration Summary from the navigation tree. 2. In the TSM Migration Summary report, click the Failed field. This report returns the information described in Table 42 on page 56. TSM Migration Errors The TSM Migration Errors report displays information on the errors related to a specific migration Job. To run this report: 1. Run the TSM Failed Migration Jobs report. 2. Right-click, and select Error Details. This report returns the information described in Table 43 on page 57.
Table 43 TSM Migration Errors report Field Message ID ID Error Description Message ID string corresponding to the error. Unique identifier of the migration process. Error message string.

TSM Migrated Size by Storage Pool The TSM Migrated Size by Storage Pool report displays the total amount of data migrated by storage pool over the period specified.

Data protection reports

57

Backup Application Reporting

To run this report: 1. Select Data Protection > Migration > Migration Summary from the navigation tree. 2. In the TSM Migration Summary report, click the Size field. This report returns the information described in Table 44 on page 58.
Table 44 TSM Migrated Size by Storage Pool report Field Server Storage Pool Size Description Name of the TSM Server. Name of the storage pool. Total size of the migration jobs that ran on the storage pool.

TSM Migrated Item Count by Storage Pool The TSM Migrated Item Count by Storage Pool report displays details on the total number of items migrated by storage pool over the period specified. To run this report: 1. Select Data Protection > Migration > Migration Summary from the navigation tree. 2. In the TSM Migration Summary report, click the Item field. This report returns the information described in Table 45 on page 58.
Table 45 TSM Migrated Item Count by Storage Pool report Field Server Storage Pool Items Description Name of the TSM Server. Name of the storage pool. Total number of items migrated from the storage pool.

TSM Daily Migration by Storage Pool

The TSM Daily Migration by Storage Pool report displays details on the total size of migration jobs that have occurred in the last day. To run this report, select Capacity Planning > Backup > Migration > Daily Migration by Storage Pool from the navigation tree. This report returns the information described in Table 46 on page 58.

Table 46

TSM Daily Migration by Storage Pool report Field Server Storage Pool Size Description Name of the TSM Server. Name of the storage pool. Total size of the migration jobs that were run on the storage pool.

TSM Storage Pool Migration Schedule

The TSM Storage Pool Migration Schedule report displays in a candle chart all of the migration jobs that have occurred, grouped by storage pool.

58

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

To run this report, select Scheduling > Backup > Storage Pool Migration Schedule from the navigation tree. This report returns the information described in Table 47 on page 59.
Table 47 TSM Storage Pool Migration Schedule report Field Server Storage Pool Input Volume Output Volume Start Time End Time Description Name of the TSM Server. Name of the storage pool from which data has been migrated. Name of the volume from which data has been migrated. Name of the volume to which data has been transferred. Time the process started. Time the process completed.

Reclamation reports

DPA includes a number of reports that display information on the reclamation processes that are running on the TSM Server. Reclamation is a TSM Server process that automatically defragments media by consolidating unexpired data onto other media when the free space on media reaches a defined level. The following reports display information about the TSM reclamation process:

"TSM Reclamation Summary" on page 59 "TSM Daily Reclamation by Storage Pool" on page 62 "TSM Storage Pool Reclamation Schedule" on page 62

TSM Reclamation Summary

The TSM Reclamation Summary report displays a summary of all the TSM Reclamation jobs that have occurred on a server. To run this report, select Data Protection > Reclamation > Reclamation Summary from the navigation tree. This report returns the information described in Table 48 on page 59.

Table 48

TSM Reclamation Summary report Field Completed Succeeded Failed Size Items Description Number of reclamation jobs that have completed. Number of reclamation jobs that have succeeded. Number of reclamation jobs that have failed. Total amount of data that has been reclaimed. Total number of items reclaimed.

The fields in the TSM Reclamation Summary report display the following additional reports:

"TSM Reclamation jobs" on page 60 "TSM Successful Reclamation jobs" on page 60 "TSM Failed Reclamation jobs" on page 60 "TSM Reclamation Errors" on page 61

Data protection reports

59

Backup Application Reporting

"TSM Reclaimed Size by Storage Pool" on page 61 "TSM Reclaimed Item Count by Storage Pool" on page 61

TSM Reclamation jobs The TSM Reclamation jobs report displays details on all TSM reclamation jobs that have occurred in the last day. To run this report, do one of the following: 1. Select Data Protection > Reclamation > Reclamation jobs from the navigation tree 2. Click the Completed field in the TSM Reclamation Summary report. This report returns the information described in Table 49 on page 60.
Table 49 TSM Reclamation jobs report Field Server Storage Pool Input Volume Status Description Name of the TSM Server. Name of the storage pool from which data has been reclaimed. Name of the volume from which data has been reclaimed. Completion status of the reclamation process: Success Failed Amount, in megabytes, of the data reclaimed. Total number of items reclaimed from the storage pool. Indication as to whether the process returned any errors. Note: Even if the process was successful, it could have errors associated with it. Start Time End Time Time the process started. Time the process completed.

Size Num Items Error Flag

TSM Successful Reclamation jobs The TSM Successful Reclamation jobs report displays details on successful TSM reclamation jobs that have occurred in the last day. To run this report: 1. Select Data Protection > Reclamation > Reclamation Summary from the navigation tree. 2. In the TSM Reclamation Summary report, click the Succeeded field. This report returns the information described in Table 49 on page 60. TSM Failed Reclamation jobs The TSM Failed Reclamation jobs report displays details on failed TSM reclamation jobs that have occurred in the last day. To run this report: 1. Select Data Protection > Reclamation > Reclamation Summary from the navigation tree.

60

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

2. In the TSM Reclamation Summary report, click the Failed field. The TSM Failed Reclamation jobs report returns the information described in Table 49 on page 60. TSM Reclamation Errors The TSM Reclamation Errors report displays information on the errors for a specific reclamation job. To run this report: 3. Run the TSM Failed Reclamation jobs report. 4. Right-click, and select Error Details. This report returns the information described in Table 50 on page 61.
Table 50 TSM Reclamation Errors report Field Message ID Error Description Message ID string corresponding to the error. Error message string.

TSM Reclaimed Size by Storage Pool The TSM Reclaimed Size by Storage Pool report displays details on the total amount of data reclaimed by storage pool over the period specified. To run this report: 1. Select Data Protection > Reclamation > Reclamation Summary from the navigation tree. 2. In the TSM Reclamation Summary report, click the Size field. This report returns the information described in Table 51 on page 61.
Table 51 TSM Reclaimed Size by Storage Pool report Field Server Storage Pool Size Description Name of the TSM Server. Name of the storage pool. Total size of the reclamation jobs that ran on the storage pool.

TSM Reclaimed Item Count by Storage Pool The TSM Reclaimed Item Count by Storage Pool report displays details on the total number of items reclaimed by storage pool over the period specified. To run this report: 1. Select Data Protection > Reclamation > Reclamation Summary from the navigation tree. 2. In the TSM Reclamation Summary report, click the Item field.

Data protection reports

61

Backup Application Reporting

This report returns the information described in Table 52 on page 62.


Table 52 TSM Reclaimed Item Count by Storage Pool report Field Server Storage Pool Items Description Name of the TSM Server. Name of the storage pool. Total number of items reclaimed from the storage pool.

TSM Daily Reclamation by Storage Pool

The TSM Daily Reclamation by Storage Pool report displays details on the total size of reclamation jobs that have occurred in the last day. To run this report, select Capacity Planning > Backup > Reclamation > Daily Reclamation by Storage Pool from the navigation tree. This report returns the information described in Table 53 on page 62.
TSM Daily Reclamation by Storage Pool report Field Server Storage Pool Size Description Name of the TSM Server. Name of the storage pool. Total size of the reclamation jobs that ran on the storage pool.

Table 53

TSM Storage Pool Reclamation Schedule

The TSM Storage Pool Reclamation Schedule report displays in a candle chart all of the reclamation jobs that have occurred, grouped by storage pool. To run this report, select Scheduling > Backup > Storage Pool Reclamation Schedule from the navigation tree. This report returns the information described in Table 54 on page 62.
TSM Storage Pool Reclamation Schedule report Field Server Storage Pool Input Volume Output Volume Start Time End Time Description Name of the TSM Server. Name of the storage pool from which data has been reclaimed. Name of the volume from which data has been reclaimed. Name of the volume to which data has been transferred. Time the process started. Time the process completed.

Table 54

Moves report

DPA includes a report that displays information on the data move processes running on the TSM server.

62

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

To view the move details for a TSM server, select Data Protection > Moves > Moves from the navigation tree. This report returns the information described in Table 55 on page 63.
Table 55 Moves report Field ID Server Process ID Status Description Identifier that uniquely identifies this process on the server on which it ran. Name of the TSM Server. Unique identifier used by the TSM Server to identify the process. Completion status of the data move process: Success Failed Name of the volume from which data has been moved. Name of the volume to which data has been moved. Name of the storage pool from which data has been moved. Total number of items moved from the storage pool. Amount, in megabytes, of data that has been moved. Files that were not moved because they cannot be read. Bytes that were not moved because they cannot be read. Indication of whether the process returned any errors. Note: Even if the process was successful, it could have errors associated with it. Start Time End Time Time the process started. Time the process completed.

Input Volume Output Volume Storage Pool Num Items Size Un-readable Files Un-readable Bytes Error Flag

TSM Move Errors

The TSM Move Errors report displays information on any errors related to a specific data move. To run this report, right-click in the TSM Moves report and select TSM Move Errors. This report returns the information described in Table 56 on page 63.

Table 56

TSM Move Errors Field Message ID ID Error Description Message ID string corresponding to the error. Unique identifier of the migration process. Error message string.

Expiration reports

DPA includes a report that displays information on the expiration processes that run on the TSM Server.

Data protection reports

63

Backup Application Reporting

To view the expiration details for a TSM server, select Data Protection > Expirations > Expirations from the navigation tree. This report returns the information described in Table 57 on page 64.
Table 57 Expirations report Field ID Server Process ID Status Description Identifier that uniquely identifies this process on the server on which it ran. Name of the TSM Server. Unique identifier used by the TSM Server to identify the process. Completion status of the expiration process: Success Failed Details of the TSM Server nodes on which expiration is occurring. This includes: Node name Filespace name Filespace ID Domain name Management class Type of file being expired, for example, BACKUP or ARCHIVE. Objects that were scrutinized during the expiration process. Backup objects that were deleted during the expiration process. Archive objects that were deleted during the expiration process. Database volumes that were deleted during the expiration process. Recovery plans that were deleted during the expiration process. Number of errors during the expiration process. Number of items deleted during the expiration process. Amount, in megabytes, of data that was deleted. Indication of whether the process returned any errors. Note: Even if the process was successful, it could have errors associated with it. Start Time End Time Time the process started. Time the process completed.

Node Details

Objects Examined Backup Objects Deleted Archive Objects Deleted DB Volumes Deleted Recovery Plans Deleted Num Errors Num Items Size Error Flag

TSM Expiration Errors

The TSM Expiration Errors report displays information on any errors related to a specific expiration job. To run this report: 1. Select Data Protection > Expiration > Expiration Errors from the navigation tree. 2. In the TSM Moves report, right-click and select TSM Expiration Errors.

64

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

This report returns the information described in Table 58 on page 65.


Table 58 TSM Expiration Errors Field Message ID ID Error Description Message ID string that corresponds to the error. Unique identifier of the migration process. Error message string.

Storage Pool Copies report

DPA includes a report that displays information on the storage pool copy processes on the TSM server. To view the storage pool copy details for a TSM server, select Data Protection > Storage Pool Copies > Storage Pool Copies from the navigation tree. This report returns the information described in Table 59 on page 65.

Table 59

Storage pool copies report Field ID Server Process ID Input Volume Output Volume Storage Pool Copy Storage Pool Status Description Identifier that uniquely identifies this process on the server on which it ran. Name of the TSM Server. Unique identifier used by the TSM Server to identify the process. Name of the volume from which the storage pool has been copied. Name of the volume to which the storage pool has been copied. Name of the storage pool from which data has been copied. Name of the storage pool to which data has been copied. Completion status of the expiration process: Success Failed Indication of whether the process returned any errors. Note: Even if the process was successful, it could have errors associated with it. Size Num Items Unreadable bytes Unreadable Files Start Time End Time Amount, in megabytes, of data that was copied. Total number of items copied from the storage pool. Bytes that were not copied because they cannot be read. Files that were not copied because they cannot be read. Time the process started. Time the process completed.

Error Flag

TSM Storage Pool Copy Errors

The TSM Storage Pool Copy Errors report displays information on the errors associated with specific storage pool copy jobs. To run this report, select Data Protection > Storage Pool Copies > Storage Pool Copy Errors from the navigation

Data protection reports

65

Backup Application Reporting

tree. In the TSM Moves report, right-click and select TSM Storage Pool Copy Errors. This report returns the information described in Table 60 on page 66.
Table 60 TSM Storage Pool Copy Errors Field Message ID ID Error Description Message ID string that corresponds to the error. Unique identifier of the migration process. Error message string.

Delete Volumes

DPA includes a report that displays information on the delete volume processes on the TSM Server. To view the delete volume details for a TSM server, select Data Protection > Delete Volumes > TSM Delete Volumes from the navigation tree. This report returns the information described in Table 61 on page 66.

Table 61

Deleted volumes report Field ID Server Process ID Volume Storage Pool Status Description Identifier that uniquely identifies this process on the server on which it ran. Name of the TSM Server. Unique identifier used by the TSM Server to identify the process. Name of the volume to delete. Name of the storage pool in which the volume to delete is located. Completion status of the delete volume process: Success Failed Number of items that were deleted. Amount, in megabytes, of the data deleted. Time the process started. Time the process completed.

Num Items Size Start Time End Time

DB Backup reports

DPA includes reports that display information on the DB (catalog) backup processes that are running on the TSM Server. Backup DB is a TSM Server process that backs up databases. The following reports display information about the TSM Backup DB process:

"DB Backups" on page 66 "DB Backup Errors" on page 67

DB Backups

The DB Backups report displays the details of the TSM Backup DB process.

66

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

To run this report, select Data Protection > DB Backups > DB Backups from the navigation tree. This report returns the information described in Table 62 on page 67.
Table 62 DB Backups report Field Server Process ID Output Volume Status Size Number of Items Errors Description Name of the backup server. Unique identifier used by the TSM Server to identify the process. Volume to which the backed up database (catalog) is transferred. Whether the process was a success or failure. Size, in megabytes, of the database (catalog) that was backed up. Number of items that were backed up. Indication of whether any errors were reported during the process. Note: Even if the process was successful, there could be errors. Start Time End Time Time the process began. Time the process finished.

DB Backup Errors

The DB Backup Errors report displays errors that occurred during the TSM Backup DB process. To run this report, select Data Protection > DB Backups > DB Backups Errors from the navigation tree. This report returns the information described in Table 63 on page 67.

Table 63

DB Backups Errors report Field Server Name Error Message ID Error Description Name of the backup server. Identifier of the error message. Error string returned by the process.

TSM Backup Set report

The TSM Backup Set Details report displays detailed information about backup sets. A backup set is a collection of active files that reside on a TSM server. To view the report, select Data Protection > Backup Sets > TSM Backup Set Details. from the navigation tree. Table 25 on page 42 describes the Backup Set details report.

Table 64

Backup Set Details report (page 1 of 2) Field Name Client Type Description Name of the backup set. Name of the client node. Type of data. Values include: File Image Application

Data protection reports

67

Backup Application Reporting

Table 64

Backup Set Details report (page 2 of 2) Field Create Time Retention Device Class Description Has Table of Contents Volumes Filespaces Description The date and time the backup set was created. Retention days. Name of the device class. Description specified by the user. Indication of whether a table of contents is available. A value of 1 means there is a table of contents. Names of the volumes containing the data, displayed in a comma-separated list. Names of the filespaces containing the data, displayed in a comma-separated list.

TSM Command Event Details

The TSM command events report displays information on command events generated by the TSM server. To run this report, select Data Protection > Command Events > TSM Command Event Details from the navigation tree. This report displays the information described in Table 65 on page 68.

Table 65

TSM command event details Field Server Backup Server Media Server Group Schedule Client Job Status Error Code Queue Start Time End Time Description Name of the TSM server that generated the command. Name of the backup server on which the command ran. Media server on which the command ran. Name of the group associated with the command event. Name of the schedule associated with the command event. Name of the backup client on which the command event ran. Name of the command that ran, or the names of the files backed up or restored (if available). Indication of whether the command ran successfully or not. Error code of the command result, if any. Time the command started queueing. Time the command ran. Time the command completed running.

Maintenance Job reports

DPA includes reports for viewing the status of maintenance jobs on the Symantec PureDisk server, and garbage collection jobs on an EMC Avamar server. Maintenance jobs include a range of operations that are not explicitly backup or restore jobs, for example, reclaiming database space or data mining operations.

68

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Maintenance Job Summary

The Maintenance Job Summary report displays a summary of all the maintenance operations that have occurred on a PureDisk server. To run this report, select Data Protection > Maintenance > Summary from the navigation tree. Table 66 on page 69 lists the fields in the Maintenance Job Summary report.

Table 66

Maintenance Job Summary fields Field Completed Successful Failed Success Rate (%) Description Number of maintenance operations that were completed during the period specified. Number of maintenance operations that were successful during the period specified. Number of maintenance operations that failed during the period specified. Percentage of maintenance jobs that were successful.

The fields in the Maintenance Job Summary report can be clicked to display the following reports:

"Maintenance Job Details" on page 69 "Successful Maintenance Job Details" on page 70 "Failed Maintenance Job Details" on page 70

Maintenance Job Details

The Maintenance Job Details report provides details on all maintenance jobs that have occurred on the PureDisk server during the specified period. To view this report, do one of the following: 1. Click in the Completed column of the Maintenance Job Summary report. 2. Select Data Protection > Maintenance > Data Protection > Maintenance > Maintenance Job Details from the navigation tree. Table 67 on page 69 lists the fields in the Maintenance Job Summary report.

Table 67

Maintenance Job Summary fields (page 1 of 2) Field Client Backup Application Schedule Job ID Job Job Type Object Status Err Code Size Description Name of the client on which the maintenance job occurred. Application on which the maintenance job occurred. Schedule used by the maintenance job. Unique identifier of the maintenance job. Name of the maintenance job. Category of maintenance jobs under which job is grouped. Data selection or object operated on by the maintenance job. Indication of whether the maintenance job was successful or not. Error code associated with the maintenance job. Size of data associated with the maintenance job, if any (for example, data reclaimed from database).

Data protection reports

69

Backup Application Reporting

Table 67

Maintenance Job Summary fields (page 2 of 2) Field Queue Start Start Time End Time Description Time the maintenance job was scheduled to run. Time the job started. Time the job completed.

Successful Maintenance Job Details

The Successful Maintenance Job Details report provides details on all maintenance Jobs that were successful on the PureDisk server during the specified period. To view this report, click in the Successful column of the Maintenance Job Summary report. The fields for this report are the same as those in the Maintenance Job Details report, listed in Table 67 on page 69. The Failed Maintenance Job Details report provides details on all maintenance Jobs that failed on the PureDisk server during the specified period. To view this report, click in the Failed column of the Maintenance Job Summary report.

Failed Maintenance Job Details

Maintenance Job Errors

To view details on individual errors that have occurred on a client: 1. Right-click in the Failed Maintenance Job Details report. 2. Select Maintenance Job Errors.

Avamar Garbage Collection Jobs

The Avamar Garbage Collection Jobs report provides details on the garbage collection jobs that have been in operation on the Avamar server. To view the report, select Data Protection > Maintenance > Garbage Collection Jobs from the navigation tree menu. The fields contained in the report are described in Table 68 on page 70.

Table 68

Avamar garbage collection jobs Field name Server Sub Name Node Count Processed Index Stripes Total Index Stripes Recovered Recovered Offset Description Name of the Avamar server. Name of the Avamar client. Number of Avamar nodes involved in the collection process. Number of index stripes processed by garbage collection. Total number of index stripes. Number of bytes recovered by the collection process. Number of bytes that should be added or deleted from the Recovered field to return the size of data recovered by garbage collection. Number of chunks deleted by the collection process. Status of the garbage collection process after completion. Identifier for the garbage collection process. Time the job started. Time the job ended.

Deleted Chunks Result ID Start Time End Time

70

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Licensing reports
Licensing reports display information on the licenses configured on backup servers. To run a license report: 1. Right-click the node on which the DPA server is running. 2. Select Licensing > report name (where report name is the report required to run) from the navigation tree. The reports that are installed with DPA are described in Table 69 on page 71.
Table 69 Licensing reports Report License Summary report License Details report Expired Licenses report Description Summarizes the number of different licenses installed on the backup server calculated by type. Displays all details of the licenses installed on the backup server. Details about backup clients and file servers are returned. Displays details of all the licenses that have expired on the backup server.

Licensing reports

71

Backup Application Reporting

Media management reports


Media management reports display information on the media configured on the backup application. The two types of media management reports include:

"Overviews" on page 72, which are high-level reports that summarize media utilization. "Detailed media reports" on page 74, which are detailed reports about individual volumes.

Overviews
Table 70

The Media Management Overviews include the reports described in Table 70 on page 72.
Media management overviews Report "Media Summary" on page 72 "Media Operations" on page 73 "Media Size Distribution" on page 73 "Media Age Distribution" on page 73 "Media retention distribution" on page 73 "Volume Expiration" on page 73 Description Control panel that contains reports that detail the number of volumes and usage broken by several statistics. Control panel that contains operational reports designed to assist with recycling and moving media. Displays a distribution of how much media is stored on each tape. Displays a distribution of each volumes age. Displays a distribution of volume retention. Displays a distribution report that shows when media is expected to expire.

Media Summary

The Media Summary control panel displays a snapshot of the current status of media on a backup server or group of backup servers. The control panel displays the reports described in Table 71 on page 72.
Media Summary reports (page 1 of 2) Report Media Count Media Usage Media Count by State Description Displays the total number of volumes configured on each backup server. Displays the total amount of data stored on media for each backup server. Displays the total number of volumes on each backup server calculated by state to show how many tapes are: Full Empty Partially Written to Suspended

Table 71

72

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 71

Media Summary reports (page 2 of 2) Report Media Count by Jukebox and State Offline/Online Media Count Media Count by Pool Description Displays the total number of volumes on each jukebox calculated by state, and indicates how many empty tapes are available in each jukebox. Displays the total number of volumes that are online and the total number of volumes that are offline. Displays the total number of volumes on the backup servers calculated by pool.

To run the Media Summary report, select Media Management > Overviews > Media Summary. Media Operations
Table 72

The Media Operations control panel displays operational reports with respect to media. It contains the reports described in Table 72 on page 73.
Media Operations reports Report Volumes Used by Jukebox Description Displays a count of the total number of volumes used in each jukebox over the reporting period. This report enables the planning of future tape usage based on historical usage. Displays the total number of volumes available for use by the backup application. This report includes volumes that are empty, partially empty, or expired. Displays a count of the total number of expired volumes that are offline. This report enables bringing them back from offline for reuse.

Available Volumes by Jukebox

Offline Expired Volumes

To display more details on the individual volumes: 1. Click the chart to display it in a separate window. 2. Right-click and choose from a menu option that allows users to run a tabular report that shows details on the volumes included in the Summary report. Media Size Distribution The Media Size Distribution report analyzes all the media configured on a backup server and presents a distribution report that allows users to identify how much data is being written to tape on average. The Media Age Distribution report analyzes all the media configured on a backup server. A distribution report identifies how old each tape is based on the last time to which the tape was written. This distribution report identifies media based on retention time of backup data. The Volume Expiration report plots when volumes are set to expire in the future. To use the Volume Expiration report, set the end time of the reports time window to a point in the future, for example, six months, and run the report. The report displays a bar chart that plots how many tapes are due to expire on specific days.

Media Age Distribution

Media retention distribution Volume Expiration

Media management reports

73

Backup Application Reporting

Detailed media reports


Table 73

The detailed media reports display detailed information on the media configured on backup servers. Detailed media reports can contain the fields described in Table 73 on page 74.
Detailed Media report fields (page 1 of 2) Field Server Volume ID State Description Name of the backup server. Name of the volume. State of the volume. Values include: Empty Full Partial Suspended Pool of the volume. Amount of data written to the volume. Percentage of the data on the volume that is reclaimable. This field is populated by TSM only. Indication of whether the volume is located in a tape library. Name of the tape library in which the volume is located. Location of the volume within a jukebox. Length of time that the tape will be retained. Time the volume was first labeled. Time the volume was first written. Time the volume was last written. Indication of whether the volume has expired. Date the volume is due to expire. Number of times the volume has been mounted. Number of times the volume has been relabeled. For cleaning tapes, the number of times the tape will be reused. This field is populated by NetBackup only. Barcode of the volume. Type of cartridge tape. Estimated capacity, in megabytes, of the tape. Name of the server that owns the volume. Date and time that the volume was created. Date and time that the volume was assigned Time that the volume was first mounted. Time that the volume was last mounted.

Pool Used Pct Reclaimable

Online Jukebox Slot Retention Period First Labeled First Written Last Written Expiry Flag Expiry Date Num Mounts Num Relabeled Cleanings Left

Barcode Cartridge Type Capacity Owner Created Assigned First Mount Last Mount

74

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 73

Detailed Media report fields (page 2 of 2) Field Status Vault Name Vault Sent Date Vault Return Date Vault Slot Vault Session Read Errors Write Errors Access Condition Description Status of the volume. Name of the NetBackup vault the volume is in. Date the volume was sent to the vault. Data the volume is to be returned from the vault. Slot the volume occupies in the vault. Vault session ID. Number of read errors. Number of write errors. Access rights to volume. Condition of the volume: Good Fair Poor HP Data Protector only.

The Detailed Media reports are described in Table 74 on page 75.


Table 74 Detailed Media reports Report All Online Offline Full Partial Empty Used Frozen Available Recall List Recycle List Cleaning Tapes Description Displays information on all media configured on a backup server. Displays detailed information on all media that is located in a tape library. Displays detailed information on all media not located in a tape library. Displays information on all tapes that have been marked as Full. Displays information on all tapes that have had some data written to them, but the tape is not full. Displays information on all tapes that are empty. Displays information on all tapes that have been written to during the reporting period. Displays information on all frozen tapes. Frozen tapes are only displayed for NetBackup servers. Displays information on all tapes that are either Empty or Partially Full or that have expired and are available for reuse. Displays details of all offline volumes that have expired and can be recalled for reuse. Displays details of all online volumes that have expired and can be recycled. Displays detailed information on all cleaning tapes. This report is available only from NetBackup servers.

Media management reports

75

Backup Application Reporting

Performance reports
Performance reports provide information to analyze the performance of backup clients and devices. The backup performance reports display information on the performance of backup clients and backup devices managed by the backup server and are located in the performance area of the navigation tree. The performance reports include:

"Backup client performance" on page 76 "Device performance and utilization" on page 77

Backup client performance

The starting point for analyzing client performance is to run the Backup Client Performance control panel. To run this report, right-click a backup client and select Performance > Overviews > Backup Client Performance from the navigation tree. The Backup Client Performance control panel contains the reports described in Table 75 on page 76.

Table 75

Backup Client performance reports Report Backup Client Performance Distribution Top 10 Fastest Clients Description Shows the average spread of client performance across all clients. Displays the top ten fastest clients based on the throughput of backup jobs that have run on the clients. In order to calculate the throughput of a client, only full backups that are more than 1 GB in size are considered. Incremental backups can spend a long time scanning a filesystem before sending data which can lead to an incorrect calculation of the overall throughput. Backups of less than 1 GB usually complete so quickly that the throughput calculated may not be accurate. If required, either of these parameters can be modified in the Report Editor. The report returns the name of the client, the throughput of the client, and the number of jobs that were used in the calculation of throughput. The Top 10 Fastest Clients report can be used to identify the Fastest machines in the environment to benchmark how fast backups are running. Displays the top ten slowest clients based on the throughput of backup jobs that have run on the clients. This report is calculated in the same way as the Top 10 Fastest Clients report. Displays the top ten backup servers with the slowest idle wait times. Displays the top ten backup servers with the slowest media wait time. Displays the top ten clients with the slowest idle wait time. Displays the top ten clients with the slowest media wait time.

Top 10 Slowest Clients

Top 10 Backups With Worst Idle Wait Times Top 10 Backups With Worst Media Wait Times Top 10 Clients With Worst Idle Wait Times Top 10 Clients With Worst Media Wait Times

76

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

The Top 10 reports display the average throughput on a client by analyzing the backup jobs that have taken place on the client. Only Full backups that were successful and over 1 GB in size are included in the throughput calculation.

Device performance and utilization

DPA provides device performance reports that show the throughput and performance of backup servers, storage nodes, and individual backup devices. All of the reports related to backup device performance and utilization are based on data gathered by the DPA collector. The reports use data gathered from one of three possible sources:

Backup application Operating system Fibre channel switch to which the tape drive is attached

Initially, the reports search to see if the backup application provides metrics related to device performance. If this is not available, the report will search if any tape drive performance information is available from the operating system. If the report cannot obtain statistics from the backup application or operating system, it will use performance statistics gathered from the Fibre Channel switch. For the performance reports to display information, the right components must be monitored:

To gather tape drive statistics from the operating system, the collector must be installed on the machine, and the tape drive performance request must be assigned. This information is available only on Solaris systems. To obtain tape drive performance statistics from the switch and correlate that with the backup device on the application, you must also: Have a collector on the host, and be able to successfully gather information from the host bus adapters (HBAs) configured on the host. Monitor the Fibre Channel switch to which the tape drives are connected, and monitor the tape library to which the drives belong. If data is not gathered from any of these areas, it will not be possible to correlate the performance data from the Fibre Channel switch back to the backup application.

Backup Device Performance Overview

The starting point for backup device performance is the Backup Device Performance Overview. To run this report, right-click a node from the navigation tree and select Performance > Overviews > Backup Device Performance. This overview contains three reports:

Aggregate Throughput Displays the total throughput of all devices on a host. To view the throughput of each individual device on the host: 1. Click and drag across an area of the chart with the mouse. 2. Right-click in the selected area. 3. Select Device Throughput by Device.

Average / Maximum Throughput For each device on the host, the graph will show the average and maximum throughput the device has achieved during the reporting period.

Performance reports

77

Backup Application Reporting

Device Utilization For each device on the host, the graph shows what percentage of time the device was in use.

78

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Device Performance Summary

To view a summary of device performance over the reporting period, right-click on a node in the navigation tree and select Performance > Device > Device Performance Summary. Table 76 on page 79 describes the fields on the Device Performance Summary report.
Device Performance Summary Field Average Read Throughput Max Read Throughput Average Write Throughput Max Write Throughput Read Activity (%) Write Activity (%) Total Activity (%) Description Average throughput of the drive during the reporting window, when performing read operations. Maximum throughput of the drive during the reporting window, when performing read operations. Average throughput of the drive during the reporting window, when performing write operations. Maximum throughput of the drive during the reporting window, when performing write operations. Percentage of time that the drive has spent performing read operations. Percentage of time that the drive has spent performing write operations. Percentage of time that the drive has spent performing read and write operations.

Table 76

Device Summary by Device

To view a summary of the performance on each individual drive, right-click the row in the Device Performance Summary and select Device Summary by Device. Alternatively, this report can be run from the Navigation by selecting Performance > Backup > Device > Device Performance Summary by Device. This report contains the same fields as the Device Performance Summary report, but calculated by individual drive.

Device Performance Throughput by Device

To view the throughput on a device over a period of time: 1. Right-click the host or device in the navigation tree. 2. Select Performance > Backup > Device > Device Throughput by Device.

Device Utilization

To view the utilization of drives over the reporting period: 1. Right-click the host or device in the navigation tree. 2. Select Resource Utilization > Backup > Device Utilization from the menu.

Performance reports

79

Backup Application Reporting

Resource utilization reports


Resource utilization reports display information on the utilization of devices managed by the backup server.

Backup Device Utilization

The Backup Device Utilization report shows, for each tape drive, the percentage of the reporting time that the drive was in use, either writing to or reading from the drive. The Client Occupancy by Client report displays a trend chart that shows the amount of physical and logical storage used over a period of time for each client. To run this report, select Status > Backup > Client Occupancy by Client from a host node in the navigation tree. This report returns data for TSM, NetBackup, NetWorker, PureDisk, and Data Protector.

Client Occupancy by Client

TSM resource utilization reports

In TSM environments, the resource utilization category contains additional reports that are specific to TSM. The TSM Database Utilization report is a trend chart that allows users to monitor the utilization of the TSM database and recovery log over time. To run this report, select Resource Utilization > Backup > TSM Database Utilization from the navigation tree. The TSM Storage Pool Utilization report plots the utilization of storage pools over time against the high migration point and low migration point values. This report allows users to see how close pool utilization is to the migration thresholds. To run the report, select Resource Utilization > Backup > Storage Pool Utilization from the navigation tree.

HP Data Protector database utilization reports


Table 77

DPA provides several reports that provide information on the utilization of the HP Data Protector internal databases. These reports are described in Table 77 on page 80
HP Data Protector Database Utilization reports Report Data Protector Database Usage Description Displays the usage in megabytes over time for the Data Protector internal databases. To run the report, select Resource Utilization > Backup > Database Usage. Provides a breakdown of database activity averaged over time, including files created per day, deleted per day, active file growth and total file growth, and whether the dynamics is considered low, medium, high, or critical. To run the report, select Resource Utilization > Backup > System Dynamics.

Data Protector System Dynamics

80

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Return on investment reports


The return on investment (ROI) reports for Avamar compare the costs of backing up an environment by traditional backup application compared to Avamar deduplication.

Deduplication ROI Trend

This report shows the ROI for an Avamar installation over time. The ROI is calculated by looking at how much it would cost to fully protect the environment by using a traditional backup application compared to the cost to fully protect the environment by using Avamar. When the report is run, you are prompted for two values:

Cost/GB for backups. This is the current cost to back up a single gigabyte of data in your environment. Purchase cost. The total cost of the Avamar installation. This is the cost against which the savings are balanced to show overall ROI.

Both values are in units of currency. For example, if the cost of the Avamar installation is $10,000 and the cost of carrying out backups is 1 cent per gigabyte, enter10,000 for Purchase cost and 0.01 for Cost/GB for backups. To obtain the best ROI information, run the report with a start time of when Avamar was first monitored and an end time of the current time. To view the Deduplication ROI Trend report, select ROI > Deduplication ROI Trend from the navigation tree.

Return on investment reports

81

Backup Application Reporting

Deduplication Cost Savings

This report shows the cost savings of an Avamar installation for each machine being backed up. The cost savings are calculated by looking at how much it would cost to fully protect each client by using a traditional backup application compared to the cost to fully protect each client by using Avamar. When the report is run, you are prompted for a Cost/GB for backups value. This is the current cost to back up a single gigabyte of data in your environment. The cost per gigabyte is in units of your currency. For example, if the cost of carrying out backups is 1 cent per gigabyte, enter 0.01 for Cost/GB for backups. To view the Deduplication ROI Trend report, select ROI > Deduplication Cost Savings from the navigation tree.

82

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Scheduling reports
Scheduling reports display information on when backup jobs were run and which devices were in use. The scheduling reports are calculated into reports about the scheduling of backups and the scheduling of devices as described in Table 78 on page 83.
Table 78 Scheduling reports Report "Job Schedule" on page 84 "Client Schedule" on page 84 "Job Distribution" on page 85 "Job Distribution by Media Server" on page 85 "Size Distribution" on page 85 "Size Distribution by Media Server" on page 85 "Active Job Distribution" on page 85 "Active Clone Job Distribution" on page 85 "Job Forecast" on page 85 "Job Forecast versus Actual Summary" on page 86 "Job Forecast versus Actual" on page 86 "Group Forecast" on page 87 "Device Schedule (utilization)" on page 87 Description Displays a candle chart that shows when individual jobs on a client or backup server were run. Displays a candle chart that shows when clients are actively performing backups. Displays the total number of jobs completed over time. Displays the total number of jobs completed over time calculated by media server. Displays the total amount of data completed over time. Displays the total amount of data being backed up, calculated by Media Server over time. Displays the total number of sessions that are active at any one time. Displays the number of active clone jobs running. Displays the jobs that are expected to run between two different times. Displays the difference between the forecasted jobs, and the jobs that actually were run. Displays the difference between the forecasted jobs and the jobs that actually were run. Displays when NetBackup groups are scheduled to run. Displays in a candle chart when devices are in use by analyzing performance information from the drives. This report does not return data for backup applications that do not provide device performance information, such as Symantec NetBackup. Displays in a candle chart when devices are in use by analyzing when volumes are loaded into the drives. This report can be used as an alternative report to the Device Schedule (performance) report for backup applications that do not provide performance information, such as Symantec NetBackup. Displays a candle chart that shows when shared devices are active by analyzing whether a tape was mounted in them at certain times. This report is used in shared device environments, Displays in a candle chart all of the migration jobs that have occurred, grouped by storage pool. Displays in a candle chart all of the reclamation jobs that have occurred, grouped by storage pool.

"Device Schedule (mounts)" on page 87

"Shared Device Schedule (mounts)" on page 88 "TSM Storage Pool Migration Schedule" on page 88 "TSM Storage Pool Reclamation Schedule" on page 88

Scheduling reports

83

Backup Application Reporting

Job Schedule

The Job Schedule report appears when backups of individual jobs are starting and completing. To display additional information on each job, move the cursor over a specific candle in the chart. Right-clicking the candle chart displays a menu with the following options:

Alerts During Backups Average Job Run Last Successful Backup Last 5 Runs Full Job History Errors Open Files Media Details Host Utilization During Backup Client, Server, Tape Drive Utilization

To display additional information, click the menu item to run a report. To display whether a job was completed within a backup window in the job schedule report, enable service level reporting. Service level reporting is a system-wide attribute and must be enabled by an administrator. The EMC Data Protection Advisor Administration Guide provides more information. If the Job Schedule report runs after SLA Reporting is enabled, the following occurs:

Jobs that completed within the backup window are marked in green Jobs that completed out of the window are marked in red.

Client Schedule

The Client Schedule report is similar to the Job Schedule report. The difference is that information on jobs is rolled up on a per-client basis so that a row is displayed for each client. Right-clicking the candle chart displays a menu with the following options:

Alerts During Backups Average Job Run Last Successful Backup Last 5 Runs Full Job History Errors Open Files Media Details Host Utilization During Backup Client, Server, Tape Drive Utilization

To run a report, click the desired menu item.

84

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Job Distribution

The Job Distribution report appears when jobs are completed on a backup server or on a set of clients. This report allows users to identify the busiest times during the backup window so that users can schedule backups at other times or plan outages. The Job Distribution by Media Server report is very similar to the Job Distribution report, except that it breaks down the information by the media server for which the backup was performed.
Note: This report is not available in NetWorker environments because it is not possible to determine to which media server a job was written after a backup completes.

Job Distribution by Media Server

Size Distribution

The Size Distribution report is similar to the Job Distribution reports but displays the amount of data that has been backed up over time on the graph. The Size Distribution by Media Server report is similar to the Size Distribution report except that it displays information on when data was backed up. This information is calculated by media server.
Note: This report is not available in NetWorker environments because it is not possible to determine to which media server a job was written after a backup completes.

Size Distribution by Media Server

Active Job Distribution Active Clone Job Distribution

The Active Job Distribution report shows how many jobs were in progress over time.

The Active Clone Job Distribution report shows how many clone jobs were in progress over a specified period of time. To run the Active Clone Job Distribution report, select Scheduling > Backups > Active Clone Job Distribution from the navigation tree.

Job Forecast

The Job Forecast report displays the jobs that are expected to run between two different times. To run the Job Forecast report, select Scheduling > Backups > Job Forecast from the navigation tree. This report shows only data for NetBackup. Table 79 on page 85 describes that fields that can be included in the Job Forecast report.
Table 79 Job Forecast report Field Server Client Job Group Description Name of the backed-up server. Name of the backed-up client. Name of the backed-up job. Name of the group associated with the schedule.

Scheduling reports

85

Backup Application Reporting

Table 79

Job Forecast report Field Schedule Start Time End Time Description Name of the schedule on the backup server. Start time from which to display the expected jobs. End time from which to display the expected jobs.

Job Forecast versus Actual Summary

The Job Forecast versus Actual Summary report displays the difference between the forecasted jobs and the jobs that actually were run. To run the Job Forecast versus Actual Summary report, select Scheduling > Backups > Job Forecast versus Actual Summary from the navigation tree.
Note: This report returns only data for NetBackup.

Table 80 on page 86 describes the fields that can be included in the Job Forecast versus Actual Summary report.
Table 80 Job Forecast versus Actual Summary report Field Expected Completed Success Failed Queued Running Missing Description Number of jobs that are forecasted. Number of completed jobs. Number of jobs that have completed successfully. Number of jobs that have completed with failures. Number of jobs that are in the queue. Number of currently running jobs. Number of jobs that are not accounted for.

Job Forecast versus Actual

The Job Forecast versus Actual report displays the difference between the forecasted jobs and the jobs that actually were run. To run the Job Forecast versus Actual report, select Scheduling > Backups > Job Forecast versus Actual from the navigation tree.
Note: This report returns only data for NetBackup.

Table 81 on page 86 describes the fields that can be included in the Job Forecast versus Actual report.
Table 81 Job Forecast versus Actual report (page 1 of 2) Field Server Group Schedule Client Description Name of the server backed up. Name of the group associated with the schedule. Name of the schedule associated with the forecasted job. Name of the backed-up client.

86

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 81

Job Forecast versus Actual report (page 2 of 2) Field Job Status Error Code Size Start Time End Time Scheduled Start Scheduled End Description Name of the backed-up job. Status of the back-ed up job. Error code, if any, associated with the job. Size of the job. Start time from which to display the expected jobs. End time from which to display the expected jobs. Time the back up of the job is scheduled to begin. Time the back up of the job is scheduled to end.

Group Forecast

The Group Forecast report displays when NetBackup groups are scheduled to run. To run the Group Forecast report, select Scheduling > Backups > Group Forecast from the navigation tree.
Note: This report returns only data for NetBackup.

Table 82 on page 87 describes the fields that can be included in the Group Forecast report.
Table 82 Group Forecast report Field Server Group Schedule Start Time End Time Duration Description Name of the backed-up server. Name of the group associated with the schedule. Name of the schedule on the backup server. Start time from which to display the expected groups. End time from which to display the expected groups. Length of time between the start time and end time for which to display expected groups.

Device Schedule (utilization)

The Device Schedule (utilization) report displays a candle chart that shows when devices on a backup server are in use. If the drive is performing read or write operations, the drive is determined to be busy. Some backup applications do not provide device performance information, and as a result, this report may not work on those applications. The Device Schedule (mounts) report is similar to the Device Schedule (utilization) report. However, the Device Schedule (mounts) report calculates whether a device is busy based on whether there is a volume mounted in the drive at certain times. This can then be used as an alternative to the Device Schedule (utilization) report for backup applications that do not provide performance information.

Device Schedule (mounts)

Scheduling reports

87

Backup Application Reporting

Shared Device Schedule (mounts)

The Shared Device Schedule (mounts) report is similar to the previous two reports. However, it can be used in shared storage environments to show the utilization of the underlying physical tape drive instead of looking at things from a host-centric view. This report will return no data in a non-shared environment. The TSM Storage Pool Migration Schedule report displays as all of the migration jobs that have occurred grouped by storage pool. To run this report, select Scheduling > Backup > Storage Pool Migration Schedule from the navigation tree. This report returns the information described in Table 83 on page 88.
TSM Storage Pool Migration Schedule report Field Server Storage Pool Input Volume Output Volume Start Time End Time Description Name of the TSM Server. Name of the storage pool from which data has been migrated. Name of the volume from which data has been migrated. Name of the volume to which data has been transferred. Time the process started. Time the process completed.

TSM Storage Pool Migration Schedule

Table 83

TSM Storage Pool Reclamation Schedule

The TSM Storage Pool Reclamation Schedule report displays in a candle chart all of the reclamation jobs that have occurred grouped by storage pool. To run this report, select Scheduling > Backup > Storage Pool Reclamation Schedule from the navigation tree. This report returns the information described in Table 84 on page 88.
TSM Storage Pool Reclamation Schedule report Field Server Storage Pool Input Volume Output Volume Start Time End Time Description Name of the TSM Server. Name of the storage pool from which data has been reclaimed. Name of the volume from which data has been reclaimed. Name of the volume to which data has been transferred. Time the process started. Time the process completed.

Table 84

88

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Service level management reports


The service level management reports display the success rate of backups in reports as described in Table 85 on page 89.
Table 85 Service Level Management reports Report "SLA Summary" on page 89 "SLA Summary by Client" on page 89 "Daily Success Rate" on page 89 Description High-level summary that shows the success rate of jobs that completed on the backup servers or clients selected. Detailed tabular report that shows success rate statistics on a per-client basis. Graph that displays the success rate of jobs over time.

SLA Summary

The SLA Summary report displays the following information on the backups of jobs that have taken place on the backup servers or clients against which the report ran. Table 86 on page 89 lists the Summary report fields.
SLA Summary report fields Field jobs Successful Within SLA % Successful % Within SLA Description Number of jobs that completed. Number of jobs that were successful. Number of jobs that completed successfully within their backup window. Percentage of jobs that were successful. Percentage of jobs that were successful within their backup window.

Table 86

By default, you cannot measure the success of jobs against a backup window in DPA. The contents of the Within SLA and % Within SLA columns are the same as the Successful and % Successful columns. To enable the success rate measurement against a backup window, a DPA administrator must enable SLA reporting. The EMC Data Protection Advisor Administration Guide provides information on how to enable SLA reporting. After SLA reporting is enabled, run the same report to display different results. SLA Summary by Client Daily Success Rate Backup Jobs With Last Resolution and Restore Jobs With Last Resolution The SLA Summary by Client report is similar to the SLA Summary report, except that it displays a breakdown of the success rate on a per-client basis. The Daily Success Rate report displays the success rate on a daily basis over time. DPA allows you to run a report that returns details of jobs and restores that failed. It is possible to attach information such as resolution, customer contact, and management contact for the failed backups, and then specify if these failed backups are included in SLA calculations. Resolving failed backups and restores consists of the following:

Run the Backup jobs With Last Resolution report or the Restore jobs With Last Resolution to locate the backups that failed.
Service level management reports
89

Backup Application Reporting

Right-click the returned data in the report to display a menu. Specify if the failed backups should be included in the SLA calculations.

Locating Failed jobs and Restores The Backup jobs With Last Resolution Report displays a list of all failed jobs on a backup server. To run this report, select Service Level Management > Backup jobs With Last Resolution from the navigation tree. The Restore jobs With Last Resolution Report displays a list of all failed restores on a backup server. To run this report, select Service Level Management > Restore jobs With Last Resolution from the navigation tree. These reports display job details along with the information that was entered on the most recent resolution record associated with the job. The Status field displays the resolved status of the job and not the original status of the job. The color of the job in the table reflects this as well. To edit the values of some of these fields, right-click the reports to display the dialog box. Table 87 on page 90 describes the fields that are included in the Backup jobs With Last Resolution and Restore Jobs with Last Resolution reports.
Table 87 Backup Jobs and Restore Jobs with Last Resolution fields Field Server Client Job Error Code Ran In Window Customer Contact Management Contact Resolution Include in Any Calculations Include in SLA Calculations Description Server from which the failed backup was run. Name of the backed-up client. Name of the backed-up job. Error code of the failed backup. Indication of whether a job was run in a window. Name of the customer associated with this failure. Name of the manager associated with this failure. Resolution of the failed backup. Indication of whether this backup will be included in any calculations. Indication of whether this backup will be included in SLA calculations.

Entering resolution details The service level management reports display the success rate of the backups. If you are running tests on reports or testing a backup application, you can exclude these failed backups in the SLA calculations. Review failed backups to determine whether to include or exclude backup failures from SLA calculations on a per-failure basis.

90

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

To specify inclusion of failed backups in SLA calculations and add additional resolution information: 1. Run a failed backup or failed restore report. 2. Right-click a row in the report table and select the Add Backup Resolution option from the menu.
Note: It is also possible to select multiple rows in a table report, and apply the same resolution details to multiple backup jobs simultaneously.

3. In the Status field, specify an updated status for the jobs to update.
Note: For example, if a job is reported as Failed in the Backup Application, it is possible to still process it as a success by modifying the status in this field. The original status of the job is not changed in the database, but the resolution record indicates that this job is processed as a success by other reports.

4. In the Reason field, select a common reason why a backup may have failed from the list of values.
Note: A user with administrative privileges can update the list of values in the Reason field by clicking Reason Editor. Use the Reason field to type details about a job without having to type the details in the Details field each time.

5. Complete any custom resolution fields that have been defined. Custom resolution fields are created by an administrator. For example, a field can act as a reference to an external ticketing system. The EMC Data Protection Advisor Administration Guide contains more information on custom resolution fields. 6. In the Include in Any Calculations field, select: Yes to include this backup in calculations such as chargeback calculations No to exclude this backup from all calculations. 7. In the Include in SLA Calculations field, select: Yes to include this backup in SLA calculations. No to exclude this backup from SLA calculations. 8. In the Customer Contact field, type the details of the customer related to the resolution. 9. In the Resolution field, type the details for the resolution of the backup.
Note: The Restriction field can contain 4,000 characters.

10. In the Management Contact field, type the details of the manager related to the resolution. 11. Click OK. The report displays the updated backup. Viewing resolution history You can view the multiple resolution records for each job. Each resolution record is stored in the database in sequential order. This allows the use of resolution records not just as a record of the final resolution for a job, but also as a history of all activities that were taken to try and resolve the job failure. To view the full resolution history for a job, right-click the job and select View Resolution History from the menu.

Service level management reports

91

Backup Application Reporting

Status reports
Status reports allow users to query the current status of devices managed by the backup server and any pending mount requests as described in Table 88 on page 92.
Table 88 Status reports Report "Device status" on page 92 "Mount Requests" on page 93 "Client Occupancy report" on page 93 "Client Status report" on page 94 "Client Usage Statistics" on page 94 "Server Error Summary" on page 94 "TSM reports" on page 95 "HP Data Protector database status reports" on page 100 "Avamar Domain Footprint" on page 100 "Backup server status" on page 101 Description Displays status information on the storage devices used by the backup software. Displays information on any mounts on which a device is waiting. Displays how much data is held for each client. Displays status information on backup clients for each backup server. Displays usage information on Avamar backup clients. Provides a summary count of common errors by server. Provide information on the status of the TSM Server database, recovery log, and filespaces. Provide information on the utilization and status of the HP Data Protector internal databases and components. Displays the clients that are backed up within an Avamar domain. Displays the utilization and used space of a backup server over time.

Device status
Table 89

The Device Status report displays status information on the storage devices used by the backup software as described in Table 89 on page 92.
Device Status report (page 1 of 2) Field Device Host Device Name Device Path Device Class Jukebox Device Type Read Only Status Description Host to which the device is attached. Logical name of the device. Device driver path for the device. Class of device; either disk or tape. Name of any tape library in which the device is located. Type of device, for example, Ultrium-2. Indication of whether the device is configured as read-only. Whether the device is up or down.

92

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 89

Device Status report (page 2 of 2) Field Errors Volume ID Activity Description Number of errors associated with the device (obtained from the backup application). Identifier of any volume loaded in the device. Current activity (if any) that the device is performing.

Mount Requests
Table 90

The Pending Mount Requests report displays information on any mounts for which a device is waiting as described in Table 90 on page 93.
Pending Mount Requests fields Field Server Type Volume Pool Number Outstanding Since Description Server for the outstanding request. Type of request; either read or write. If a specific volume is requested, the name of that volume. If the request is waiting for tapes from a pool, the name of the pool. Number of tapes that are pending. Amount of time that the mount request has been outstanding.

Client Occupancy report

The Client Occupancy report displays how much data is held for each client. To run this report, select Status > Backup > Client Occupancy from a backup server or client in the navigation tree. Table 91 on page 93 describes the fields that are included in the Client Occupancy report. This report returns data for TSM, NetBackup, NetWorker, PureDisk, and Data Protector.
Client Occupancy fields (page 1 of 2) Field Server Client Type Description Name of the server. Name of the client. Type of data stored. Values include: Backup Archive HSM Name of the client filespace. Storage pool that contains the client filespace. ID of the client filespace.

Table 91

Filespace Pool Filespace ID

Status reports

93

Backup Application Reporting

Table 91

Client Occupancy fields (page 2 of 2) Field Files Physical (MB) Description Number of active files. Amount of physical storage used. It is the total space taken up by data for the filespace. Physical space includes space that is no longer active itself, but is included in a set of data that is still active. Amount of logical storage used. Logical space is space used by active data.

Logical (MB)

The Client Occupancy by Pool report displays the total occupancy for each client, and the amount of data held in each storage pool for pools in which the client has data.

Client Status report

The Client Status report displays status information about the backup clients used by the backup software. To view the Client Status report, select Status > Client Status from the navigation tree. Table 92 on page 94 describes the fields for the Client Status Report.

Table 92

Client Status fields Field Server Client Responding Daemon Running Description Server on which the backup client resides. Name of the backup client. If selected, indicates that the backup client is responding. If selected, indicates that a daemon is running on the backup client.

Client Usage Statistics

The Client Usage Statistics report displays information on Avamar backup clients. To view the report, select Status > Backup > Client Usage Statistics from the navigation tree. The Backup Server Error Summary report provides a summary count of the most common errors a backup server has encountered. To view the report, select Status > Backup > Server Error Summary from the navigation tree. The Server Error Details report provides details on errors and warnings that have occurred on a backup server as described in Table 93 on page 94.
Table 93 Server Error Details fields Field Application ID Server Client Description Identifier for the process or session associated with the error. Server on which the error occurred. Client on which the error occurred.

Server Error Summary

94

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 93

Server Error Details fields Field Severity Description Severity of the error: Severe error Error Warning Code of error message, that consists of the message prefix, message number, and message type. Text of error message. Timestamp off error occurrence.

Error Code Error String Timestamp

TSM reports

There are a number of TSM-specific reports in the Status category that allow users in a TSM environment to view the status of the TSM database and recovery log, and TSM filespaces. To view the status of the TSM database volumes, select Status > TSM > TSM Database Volume Status from the navigation tree. Table 94 on page 95 describes the fields that are included in the TSM Database Volume Status report.
TSM Database Volume Status fields Field Server Object Description Name of the TSM Server. Object: Database Recovery Log Name of the first copy. Status of the first copy. Name of the second copy. Status of the second copy. Name of the third copy. Status of the third copy. Amount, in megabytes, of the available space. Amount, in megabytes, of allocated space. Amount, in megabytes, of free space.

Database Volume Status

Table 94

Copy 1 Name Copy 1 Status Copy 2 Name Copy 2 Status Copy 3 Name Copy 3 Status Available Space Allocated Space Free Space

Status reports

95

Backup Application Reporting

Database Usage

To view the status of the TSM database, select Status > TSM > TSM Database Usage from the navigation tree. Table 95 on page 96 describes the fields that are included in the TSM Database Usage report.
TSM Database Usage fields Field Available Space Assigned Capacity Usage Description Amount of available space. Amount of assigned capacity. Amount of used space in the TSM database.

Table 95

Recovery Log Usage

The TSM Recovery Log Usage report displays the status of the TSM recovery log. Information is available about the available space, allocated capacity, and usage for the recovery log. To run the report, select Status > TSM > TSM Recovery Log Usage from the navigation tree. Table 96 on page 96 describes the fields that are included in the TSM Recovery Log Usage report.

Table 96

TSM Recovery Log Usage fields Field Available Space Assigned Capacity Usage Description Amount of available space. Amount of assigned capacity. Amount of used space in the TSM recovery log.

TSM Filespaces

The TSM Filespaces report displays status information on filespaces configured on a TSM server. To run the report, select Status > TSM > TSM Filespace Details from the navigation tree. Table 97 on page 96 describes the fields that are included in the TSM Filespaces report.

Table 97

TSM Filespaces Field Server Client Filespace name Filespace ID Filespace Type Capacity Percentage Utilization Backup Start Backup End Delete Time Description Name of the TSM Server. Name of the backup client. Name of the filespace. Identifier for the filespace. Type of filespace, for example, NTFS. Size, in megabytes, that is allocated to the filespace. Percent of space currently used in the filespace. Time the last incremental backup of the filespace started. Time the last incremental backup of the filespace ended. Time the filespace was deleted.

96

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

TSM Filespace Summary

The TSM Filespace Summary report displays the total size of all filespaces configured on a TSM client, against the occupancy size and percentage occupied on the backup server. To run the report, select Status > TSM > TSM Filespace Summary from the navigation tree. Table 97 on page 96 describes the fields that are included in the TSM Filespace Summary report.

TSM Database Status report

The TSM Database Status report displays status information on the database configured on a TSM server. To run the report, select Status > TSM > TSM Database Status from the navigation tree. Table 97 on page 96 describes the fields that are included in the TSM Database Status report.

Table 98

TSM Database report Field Buffer Pool Hit Ratio (%) Package Cache Hit Ratio (%) Buffer Requests Num Sort Overflows Num Lock Escalations Last Reorganization Time Num Incremental Database Backups Description Buffer pool hit ratio. Package cache hit ratio. Number of total buffer requests. Number of sorts that ran out of heap memory. Number of times row locks were escalated to table locks. Date and time the database was last reorganized. Number of incremental database backups that have occurred since the last full database backup.

Last Full Database Backup Time Date and time of the last full database backup.

TSM Device Path Status

The TSM Device Path Status report displays information on device paths. To run this report, select Status > TSM > TSM Device Path Status from the navigation tree. Table 99 on page 97 describes the fields that are included in this report.
TSM Device Path Status report (page 1 of 2) Field Source Source Type Destination Destination Type Destination Library Destination Node Name Destination Device Destination External Manager Description Name of the path source. Type of path source. Name of the path destination. Path destination type. Name of the destination path library if the type is a drive. Name of the device in the destination path. Name of the destination path device. Name of the external library manager, if applicable.

Table 99

Status reports

97

Backup Application Reporting

Table 99

TSM Device Path Status report (page 2 of 2) Field LUN Initiator Destination Directory Online Last Updated By Last Update Time Description Logical unit name (LUN) through which the disk can be accessed by the source. Path initiator. Directory location of a file on the source. Indication of whether the path is online and available for use, or offline. User who last updated the path. Date and time of the last update.

TSM Top 10 Backups With Worst Idle Wait Times

The TSM Top 10 Backups With Worst Idle Wait Times report displays the top ten backup servers by job with the slowest idle wait times. To run this report, select Status > TSM > TSM Top 10 Backups With Worst Idle Wait Times from the navigation tree. The TSM Top 10 Backups With Worst Media Wait Times report displays the top ten backup servers by job with the slowest media wait times. To run this report, select Status > TSM > TSM Top 10 Backups With Worst Media Wait Times from the navigation tree. The TSM Top 10 Clients With Worst Idle Wait Times report displays the top ten clients with the slowest idle wait times. To run this report, select Status > TSM > TSM Top 10 Clients With Worst Idle Wait Times from the navigation tree. The TSM Top 10 Clients With Worst Media Wait Times report displays the top ten clients with the slowest media wait times. To run this report, select Status > TSM > TSM Top 10 Clients With Worst Media Wait Times from the navigation tree. The Backup Pool Status report displays information about the status of IBM TSM backup pools. To run this report, select Status > Backup Pools > Pool Status from the navigation tree. Table 100 on page 98 describes the fields that display in this report.

TSM Top 10 Backups With Worst Media Wait Times

TSM Top 10 Clients With Worst Idle Wait Times

TSM Top 10 Clients With Worst Media Wait Times

Backup Pool Status report

Table 100

TSM Backup Pool Status (page 1 of 2) Field Server Name Pool Name Pool Type Percent Utilized Percent Migrated Description Name of the TSM server that controls the storage pool. Name of the storage pool. Type of storage pool: Primary, Copy, or Active Data. Percentage of the storage pool that is utilized. Percentage of data in the storage pool that can be migrated.

98

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Table 100

TSM Backup Pool Status (page 2 of 2) Field Migration Process Running Migrated Data Migration Seconds Description Indication of whether at least one migration process is active for the storage pool. Amount of data in MB currently migrated from the storage pool. If migration is active, this indicates the amount of time elapsed since migration began. If migration is not active, this indicates the amount of time required to complete the last migration. If multiple parallel migration processes are used for the storage pool, this indicates the total time from the beginning of the first process until the completion of the last process. Indication of whether a reclamation process is active for the storage pool. Number of scratch volumes used in the storage pool. Utilization of the storage pool, as calculated by the storage pool space trigger, if any, for this storage pool. Amount of data that was removed from the storage pool by the reclamation process. This field also represents the amount of storage space that was saved in the storage pool as a result of server-side data deduplication

Reclamation Running Scratch Volumes Utilization by Space Trigger

Duplicate Data

TSM Lan-free Server Status

This report shows the status and operation details for TSM LAN-free servers monitored by DPA. Similar fields to the TSM Server Status report are displayed. To view the report, go to Status > Backup > TSM > TSM LAN Free Server Status.

TSM Client Occupancy Details TSM Client Occupancy Summary

This report shows occupancy details broken down by TSM client. To view the report, go to Status > TSM > TSM Client Occupancy Details. This report shows the total logical occupancy by client for backup sets, along with other client occupancy data. To view the report, go to Status > TSM > TSM Client Occupancy Summary.

Status reports

99

Backup Application Reporting

HP Data Protector database status reports


Table 101

DPA provides several reports that provide information on the utilization and status of the HP Data Protector internal databases and components. These reports are described in Table 101 on page 100.
HP Data Protector database reports Report Data Protector Database Status Description Displays the number of used records, total records, and capacity utilization for all tables in internal databases. To run the report, select Status > Backup > Data Protector > Database Status. Displays the number obsolete filenames and the estimated purge time for the Data Protector server. To run the report, select Status > Backup > Data Protector > Purge Preview. Displays the running status of all Data Protector database services. To run the report, select Status > Backup > Data Protector > Service Status. Displays the current size and number of files for Data Protector datafiles. To run the report, select Status > Backup > Data Protector > Datafile Usage. Displays the current size, maximum size, capacity utilization for Data Protector record files. To run the report, select Status > Backup > Data Protector > Record File Usage.

Data Protector Purge Preview

Data Protector Service Status

Data Protector Datafile Usage

Data Protector Record File Usage

NetBackup status reports


Table 102

DPA provides several reports that provide information on the status of NetBackup servers and components. These reports are described in Table 101 on page 100.
NetBackup status reports Report NetBackup Disk Pool Status Description Displays the status of the disk pool. To run the report, select Status > Backup > NetBackup > NetBackup Disk Pool Status Displays the status of the disk volume, including the: Space used in the volume Number or read and write mounts configured on the volume Number or read and write streams configured on the volume To run the report, select Status > Backup > NetBackup > NetBackup Disk Volume Status Displays the status of the NetBackup Storage Server. To run the report, select Status > Backup > NetBackup > NetBackup Storage Server Status

NetBackup Disk Volume Status

NetBackup Storage Server Status

Avamar Domain Footprint

The Avamar Domain Footprint report displays the clients that are backed up within an Avamar domain. To run the Avamar Domain Footprint report, select Status > Backup > Domain Footprint.

100

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Backup Application Reporting

Backup server status

This report shows the utilisation and used space of a backup server over time. To view the report, go to Status > Backup > Server Status.

Status reports

101

Backup Application Reporting

102

EMC Data Protection Advisor Version 5.8 Report Reference Guide

2
Recoverability Reporting

This chapter describes the recoverability reports, and reports specific to EMC VNX/CLARiiON and Symmetrix storage arrays. This chapter is divided into the following sections:

Introduction .................................................................................................................. 104 Recoverability reports.................................................................................................. 105 Capacity Planning reports .......................................................................................... 107 Change Management................................................................................................... 108

Recoverability Reporting

103

Recoverability Reporting

Introduction
Recoverability analysis is available in two forms:

DPA reports available from the reporting menu. Service Level Management (SLM) workspace, which is a GUI shows a graphical representation of recovery points and gaps in the data protection environment.

The reports available from the navigation tree provide an overall view of the replication environment. They summarize the exposures, exclusions, unprotected nodes and obsolete recovery points. The SLM workspace is used to drill down and view the status of replication operations and the storage mapping for nodes and individual arrays, filesystems, and applications. The EMC Data Protection Advisor Report User Guide provides more information on the SLM workspace. To view recoverability reports, right-click on the host or subnode in the navigation tree. If the appropriate data gathering requests have been assigned to the node, the recoverability reports are available from the reporting menu under Recoverability. To open the SLM workspace, select Tools > SLM Workspace from the menu. The EMC Data Protection Advisor Administration Guide describes how to configure recoverability data gathering for applications, hosts, and storage arrays.

104

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Recoverability Reporting

Recoverability reports
This section describes the recoverability reports available from the navigation tree. The reports available are:

"Exposures Summary" on page 105 "Detailed Exposures" on page 105 "Unprotected Nodes" on page 105 "Obsolete Recovery points" on page 105 "Replication Process View" on page 105 "Exclusion Details" on page 106 "Server to Storage Configuration" on page 106 "Server to Storage Topology" on page 106 "Storage to Server Topology" on page 106 "RDF Configuration for Symmetrix" on page 106 "RDF Configuration for DG" on page 106 "RDF Performance" on page 106 "Remote Replication RPO Forecast for SRDF/A" on page 106 "MirrorView configuration" on page 106 "Masking configuration" on page 106 "Replication Configuration" on page 106

Exposures Summary

The Exposures Summary report displays the gaps in recoverability by facility for managed backup objects in the environment. To run the report, select Recoverability > Exposure Summary from the navigation tree.

Detailed Exposures

The Detailed Exposures report provides details on each gap, including recoverability path, storage engine, and replication facility. To run the report, select Recoverability > Exposure Details from the navigation tree.

Unprotected Nodes

The Unprotected Nodes report displays all of the objects that are not fully recoverable. To run the report, select Recoverability > Unprotected Nodes from the navigation tree.

Obsolete Recovery points

The Obsolete Recovery Points report shows the recovery points that have been rendered out of date by changes in the source. To view the report, select Recoverability > Obsolete Recovery Points from the navigation tree. The Replication Process View report displays a visualization of the recoverability of one or more backup objects. The Process View is the same as that viewed in the Service Level Manager workspace, described in EMC Data Protection Report User

Replication Process View

Recoverability reports

105

Recoverability Reporting

Guide. To view the recoverability visualization, select Recoverability > Replication Process View from the navigation tree.

Exclusion Details

The Exclusion Details report shows the gaps that have been excluded from recoverability reporting by client. To view the Exclusion Details report, select Recoverability > Exclusion Details from the navigation tree.

Server to Storage Configuration

The Server to Storage Configuration report shows the disk, volume, and engine (storage array) mappings for servers. To view the server-to-storage mappings, select Recoverability > Server to Storage Configuration from the navigation tree. To view server-to-storage mappings, select Recoverability > Server to Storage Topology from the navigation tree. The Storage to Server topology shows the mapping of filesytems to images. To view storage-to-server mappings, select Recoverability > Storage to Server Topology from the navigation tree. To view the RDF Configuration report, select Recoverability > RDF Configuration for Symmetrix from the navigation tree. To view the RDF Configuration for DG report, select Recoverability > RDF Configuration for DG from the navigation tree. To view the RDF Configuration report, select Recoverability > RDFG Performance from the navigation tree. To view the Remote Replication RPO Forecast report, select Recoverability > Remote Replication RPO Forecast for SRDF/A from the navigation tree.

Server to Storage Topology Storage to Server Topology

RDF Configuration for Symmetrix RDF Configuration for DG RDF Performance

Remote Replication RPO Forecast for SRDF/A MirrorView configuration Masking configuration

To run the MirrorView Configuration report, select Storage > Disk Storage > CLARiiON and right-click a MirrorView session or node from the navigation tree. To run the Masking Configuration report, select Storage > Disk Storage > <storage array> and right-click a Masking, Masking Views, or Storage Group node from the navigation tree. To run the Replication Configuration report, select Recoverability > Replication Configuration from the navigation tree.

Replication Configuration

106

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Recoverability Reporting

Capacity Planning reports


Several capacity planning reports are available for EMC VNX/CLARiiON and Symmetrix storage arrays. Right-click on a Storage Array or subcomponent node in the Navigation tree to view the reports.

Capacity Overview for Block

This report displays the used, unused, and user allocated distributions for block storage. To view the report, select Capacity Planning > Storage > Capacity Overview for Block. This report displays the used, unused, and user allocated distributions for file storage. To view the report, select Capacity Planning > Storage > Capacity Overview for File. This report displays the free raw capacity, used raw capacity, available raw capacity, and the forecast for the chosen time period (default: 1 month). Raw capacity is considered to be the total usable capacity of any disk that has not been put in a RAID group or block storage pool (not taking into account loss of space caused by the RAID protection or other overhead). To view the report, select Capacity Planning > Storage Array Raw Capacity.

Capacity Overview for File

Storage Array Raw Capacity

Storage Pool Capacity

This table reports shows the allocated, used, free, raw, and subscribed space for storage pools. To view the report, select Capacity Planning > Storage Pool Capacity.

Drilling down from Capacity reports


Application Usage Application Growth Storage Array Capacity Usage Graph Pool Capacity Usage Graph Storage Pool Application Growth

If you right-click on a Storage Array Raw Capacity or Storage Pool Capacity report, several drill-down reports are available that show capacity usage and growth. This report breaks down the used capacity on a storage pool or array by application. This trend chart shows the capacity growth by application on a storage array. This trend chart shows the total, available, and used capacity usage over the time period. This trend chart shows the user, used, and free capacity usage over the time period. Trend chart showing the capacity growth by application for a storage pool.

Capacity Planning reports

107

Recoverability Reporting

Change Management
Several capacity planning reports are available for EMC VNX/CLARiiON and Symmetrix storage arrays. Right-click on a Storage Array or subcomponent node in the Navigation tree to view the reports.

Change Overview

The Storage Array Change Overview report for EMC Symmetrix and VNX/CLARiiON shows the number of additions and modifications for the components of a storage array, as well as the details of the last ten changes. To view the report, right-click on the Symmetrix or VNX/CLARiiON and select Change Management > Storage > Change Overview.

Change Details

The Change Details report shows specific details of the changes made to the storage array over the time period. To view the report, right-click and select Change Management > Storage > Change Details.

108

EMC Data Protection Advisor Version 5.8 Report Reference Guide

3
EMC Data Domain Reporting

This chapter describes the reporting capabilities for EMC Data Domain storage appliances. The following reports are described:

Running reports for Data Domain..............................................................................110 Asset management reports ..........................................................................................111 Capacity planning reports ...........................................................................................112 Change management reports ......................................................................................113 Configuration reports ...................................................................................................114 Performance reports......................................................................................................115 Resource utilization reports.........................................................................................116 Status reports .................................................................................................................118 Troubleshooting reports ...............................................................................................119

EMC Data Domain Reporting

109

EMC Data Domain Reporting

Running reports for Data Domain


EMC Data Domain backup appliances appear in the navigation tree in a hierarchy under Storage > Disk Storage. The disk, filesystems, shares, and any virtual tape libraries or tape drives managed by the backup appliance appear as dependent nodes under the Data Domain host. To view reports for Data Domain, right-click on the host or dependent node in the navigation tree.

110

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC Data Domain Reporting

Asset management reports


Asset management reports provide configuration details on the physical components of Data Domain appliances. The asset management reports are listed in Table 103 on page 111.
Table 103 Asset management reports Report Disk Summary Disk Configuration Underlying Disk Details Battery Configuration Solid State Storage Configuration Host Configuration Network Interface Configuration Tape Library Summary Description Displays the number of disks and the total amount of disk space configured on Data Domain appliances. Displays the model, serial number, firmware revision and size for individual disks configured. Displays the mapping between physical disks and filesystems. Displays the name and type of batteries configured on an Data Domain appliance. Displays the size, window size, PCI error count, and error count for solid state storage devices configured on a Data Domain appliance. Displays the hostname, vendor, product, and OS class for hosts. Displays the media access control (MAC) address for network interfaces configured on an Data Domain appliance. Control panel that shows the following reports: Tape Library Model Summary Tape Library Firmware Summary Tape Library Slot Count Tape Library Drive Count Not all of the reports may be displayed for Data Domain. This report is returned only for Data Domain version 4.8. Returns detailed information on the configuration of virtual tape libraries configured on the appliance. This report is returned only for Data Domain version 4.8. Control panel that shows the following reports: Tape Drive Model Summary Tape Drive Firmware Summary Tape Drive Interface Summary Not all of the reports may be displayed for Data Domain. This report is returned only for Data Domain version 4.8. A detailed report that returns information on the configuration of virtual tape drives configured on the appliance. This report is returned only for Data Domain version 4.8.

Tape Library Configuration

Tape Drive Summary

Tape Drive Configuration

To view the report, select Asset Management > Hardware > Battery Configuration from the navigation tree. To view the report, select Asset Management > Hardware > Solid State Storage Configuration from the navigation tree. To view the report, select Asset Management > Tape Drive Configuration from the navigation tree.

Asset management reports

111

EMC Data Domain Reporting

Capacity planning reports


Capacity planning reports provide information on the utilization of components of the Data Domain appliance. These reports allow administrators to spot bottlenecks and areas of under utilization. The reports available are listed in Table 104 on page 112.
Table 104 Capacity planning reports Report Utilization Node Utilization Aggregate Utilization Underlying Disk Activity Description Displays the utilization of all filesystems on a file server or group of file servers over time. When run from a group node, displays the average filesystem utilization on each file server over time. Displays the aggregate filesystem utilization over time of all filesystems across all selected file servers. Displays the underlying disk activity of each filesystem.

112

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC Data Domain Reporting

Change management reports


The change management reports display the changes in tape library, tape drive, and share configuration that have occurred. The change management reports are available only for Data Domain version 4.8.

Change Overview

The Change Overview control panel summarizes the changes made to the Data Domain appliance. To view this report, right-click the Data Domain server and select Change Management > Change Overview.

Change Details

The Change Details report displays more detailed information on configuration changes. To view this report, right-click the Data Domain server or dependent node and select Change Management > Change Details.

Change management reports

113

EMC Data Domain Reporting

Configuration reports
Configuration reports display information on the filesystems configured on an Data Domain appliance, and network shares that have been exported. The configuration reports are available only for Data Domain version 4.8.

File Server Exports

DPA shows the network shares that have been exported from Data Domain. To run the report, right-click the Data Domain server and select Configuration > File Server Exports.

Filesystem Configuration

The Filesystem Configuration report displays the name and capacity of filesystems configured on Data Domain appliances. To run this report, select Configuration > Filesystem Configuration.

VTL access group configuration

The Access Group Configuration report displays information about the configuration of VTL access groups. A VTL access group is a collection of initiators (WWPNs or aliases) and the drives and changers they are allowed to access. To run this report, select Configuration > Access Groups > Access Group Configuration.

114

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC Data Domain Reporting

Performance reports
Performance reports provide performance information on Data Domain appliances, solid stage storage, and of data replication processes.
Table 105 Performance reports Report Disk Performance by Disk Disk Performance by Host Description Displays the performance on each individual disk. Displays the disk performance on each node in the group, when run from a group node, by aggregating the performance of all disks on each host. Displays the aggregate performance of all disks on all nodes from which the report has been run. Displays the read throughput and write throughput for Data Domain solid state storage devices. Displays information on the performance of filesystems on an Data Domain appliance.

Aggregate Disk Performance Solid State Storage Performance Fileserver Performance

Fileserver Performance by Node When run from a group, displays the performance for each individual file server in the group.

To view the report, select Performance > Disk > Solid State Storage Performance from the navigation tree.

Performance reports

115

EMC Data Domain Reporting

Resource utilization reports


Resource utilization reports provide information on the utilization of Data Domain components.
Table 106 Resource utilization reports (page 1 of 2) Report System Resource Utilization Description Provides an overview of resource utilization on a host, including reports that shows processor, memory, network interface, and filesystem utilization over time. Displays the average percentage of time each individual disk is busy on each file server. Displays the average percentage of time the disks are busy on each file server in the group, when run from a group node, by averaging the activity of all disks on each file server. Displays the average percentage of time that the disks are busy across all file servers from which the report has been run. Displays the utilization of all filesystems on a host or group of hosts over time. When run from a group node, displays the average filesystem utilization on a host over time by averaging the utilization across all filesystems on that host. Displays the underlying disk activity of each filesystem. Displays the aggregate filesystem utilization over time of all filesystems across all file servers selected in the report. Utilization overview that displays a summary of network interface performance for a host, and network interface performance calculated by node. Displays the network interface performance calculated by interface. Displays the network interface performance calculated by node. Displays the aggregate network interface utilization over time of all filesystems across all file servers selected in the report. Displays the utilization of Data Domain appliance processors, calculated by CPU. Displays the utilization of Data Domain appliance processors, calculated by node. Displays the aggregate processor utilization over time of all filesystems across all file servers selected in the report. Displays a trend chart that shows the utilization of each tape library volume over time.

Disk Activity by Disk Disk Activity by Host

Aggregate Disk Activity Filesystem Utilization Node Utilization

Underlying Disk Activity Aggregate Utilization Interface Utilization Summary

Network Interface Performance by Interface Network Interface Performance by Node Aggregate Network Interface Performance Processor Utilization by CPU Processor Utilization by Node Aggregate Processor Utilization Tape Library Volume Utilization Trend

116

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC Data Domain Reporting

Table 106

Resource utilization reports (page 2 of 2) Report Tape Library Empty Volume Count Deduplication Ratio Average Hourly Data Ingested Description Displays a count of all the empty volumes by tape library. Shows the ratio of data deduplicated against data backed up over the time period. Displays the average of all tape drives performance write speed values over the time period.

Daily compression statistics

DPA provides a compression statistics report for EMC Data Domain that shows the compression ratios for deduplication operations, including:

Deduplication ration Local compression factor Global compression factor Reduction

To view the report, go to Resource Utilization > Storage > Daily Compression Statistics.

Resource utilization reports

117

EMC Data Domain Reporting

Status reports
Status reports provide information on the current status of Data Domain components.
Table 107 Status reports Report Disk Status Description Displays the size, online status, error count, health status, temperature, recon percentage and resynch percentage for physical disks. Displays the capacity, used space, and utilization for filesystems. Displays whether the NFS or CIFS server on a Data Domain appliance is enabled or disabled. Displays the status of the physical disks that make up a filesystem. Summarizes the status of environmental components: fans, batteries, power supply units (PSUs), and thermometers. Displays the name, active status, and speed level of fans. Displays the name of active PSUs. Displays the name, active status, and temperature of thermometers. Displays the name and charge remaining of solid state storage batteries. Displays the state of each interface on the host, including whether it has a link with a switch, the speed at which it is running, and its duplex setting. If gathering information from switches and hosts, displays the port on a switch to which the host is connected. If gathering information from switches and from hosts, displays the port on the switch to which the interface card Displays the number of offline and online processors. Displays the status of replication processes between Data Domain appliances.

Filesystem Status Fileserver Status Underlying Disk Details Environmental Summary Fan Status PSU Status Thermometer Status Battery Status Network Interface Status

Network Interface Link Pair Network Interface Link Pair Duplex Status Processor Status Replication Status

To view the report, select Status > Hardware > Battery Status from the navigation tree. To view the report, select Status > Tape Library > Tape Library Status from the navigation tree. To view the report, select Status > Tape Drive > Tape Drive Status from the navigation tree.

118

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC Data Domain Reporting

Troubleshooting reports
Troubleshooting reports provide information on error rates and the types of errors that have occurred on an Data Domain appliance.
Table 108 Troubleshooting Report Network Interface Errors by Interface Aggregate Network Interface Errors Description Displays the errors on each individual network interface on a file server or group of file servers over time. Displays the total number of network interface errors over time across all file servers selected in the report.

Troubleshooting reports

119

EMC Data Domain Reporting

120

EMC Data Protection Advisor Version 5.8 Report Reference Guide

4
Virtualization Reporting

The reports that can be run on virtual machines and host servers are categorized into the following areas:

Running virtualization reports................................................................................... 122 Running DPA reports from VMware vSphere ......................................................... 123 Capacity planning reports .......................................................................................... 124 Change management reports ..................................................................................... 125 Chargeback reports ...................................................................................................... 126 Compliance and risk mitigation reports ................................................................... 127 Configuration reports .................................................................................................. 128 Data protection reports................................................................................................ 129 Performance reports..................................................................................................... 130 Resource utilization reports........................................................................................ 131 Scheduling reports ....................................................................................................... 132 Service level management reports............................................................................. 133 Status reports ................................................................................................................ 134

Virtualization Reporting

121

Virtualization Reporting

Running virtualization reports


DPA can gather configuration and status information on virtual machines and host servers in a virtualized environment. This allows customers to:

Automatically identify resources in the environment that are not being protected. View rapid changes that can occur in a virtual environment. Identify performance bottlenecks in the underlying physical infrastructure that might affect data protection activities. Identify better ways of scheduling backups to optimize performance.

Backup reports can be run against a VMware client just as they can for a backup application client in the navigation tree. Where backup reports are available from a VMware client, descriptions for these reports can be found in Chapter 1, "Backup Application Reporting." In the DPA navigation tree, virtual machines and hosts appear in a hierarchy of nodes under virtualization servers. Each virtualized environment is divided into virtualization managing hosts, virtualization servers, and virtual hosts. In the example, the VMware environment is divided into:

ESX Servers The physical ESX server that hosts virtual machines. Virtual Center The VCenter Server used to manage multiple virtualization servers. Virtual Host A virtual machine that runs on a virtualization server.

To run reports, right-click the node and select a report from the menu in the navigation tree.

122

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Virtualization Reporting

Running DPA reports from VMware vSphere


DPA is installed with a VMware plug-in. This plug-in allows you to view reports from a vSphere client that provide information on virtualization hosts and virtual machines.

Registering the plug-in

After you have configured a virtualization node in DPA, register the VMware plug-in from the DPA GUI to view reports from the infrastructure client. To register the plug-in: 1. Right-click the virtualization host that you created in the navigation tree. 2. Select Administration > Register VMware Plug-in from the menu. The Register dialog appears. 3. Type the username and password of a VMware administrator. DPA will connect to the VMware host and register the plug-in.
Note: If the plug-in has already been registered, the process will unregister the plug-in.

Viewing the plugin reports

After registering the plug-in, tabs are available from the vSphere client that was registered with the plug-in. The tabs display reports that differ according to whether a virtualization host or virtual machine is selected in the VMware hierarchy.

Running DPA reports from VMware vSphere

123

Virtualization Reporting

Capacity planning reports


Capacity planning reports show the growth of the backup environment over time, which facilitates planning for future growth. These reports display information as follows:

Jobs, which show growth in the number of Jobs that were backed up. Data, which show changes in the total size of Jobs that were backed up, and the amount of data backed up in those Jobs. Files, which show changes in the number of files backed up. Duration, which are candle charts that show changes in completion times for backup jobs.

Capacity planning reports can be run against virtual hosts just as they are for backup clients. Chapter 1, "Backup Application Reporting" describes the capacity planning reports available.

124

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Virtualization Reporting

Change management reports


Configuration changes in the virtual environment can be seen by running the Change Overview report. This summarizes all the changes that have occurred in the environment, categorized by type of change, such as disks added, and memory modified. This report also details the last ten changes that have occurred. To run the Change Overview report, select Change Management > Virtualization > Virtual Host Change Overview from a virtual host in the navigation tree. Drill-down reports are available from the Configuration Change Summary that allow you to view details of any of the changes that have occurred in the environment. To view the detailed reports, right-click in the Configuration Change Summary in the Change Overview. The following reports are available:

Virtual Host Change Details Virtual Host Configuration Change Details Virtual Host Disk Configuration Change Details Virtual Host Network Interface Configuration Change Details Processor Configuration Change Details Memory Configuration Change Details Network Interface Configuration Change Details Filesystem Configuration Change Details

Change management reports

125

Virtualization Reporting

Chargeback reports
Chargeback reports provide the ability to perform a financial cost analysis for the backups and restores that have taken place in a customers environment. A cost is calculated for each backup client and can be charged back to the business unit that is responsible for that client or set of clients. Chargeback reports can be run against virtual hosts just as they can for backup clients. Chapter 1, "Backup Application Reporting" describes the chargeback reports available.

126

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Virtualization Reporting

Compliance and risk mitigation reports


Compliance and risk mitigation reports display backup and restore statistics to allow administrators to measure data protection risk and policy compliance. For example, DPA provides Backup and Restore KPI, Strike Rate, and Daily Success Rate reports. Compliance reports can be run against virtual hosts just as they can for backup clients. Chapter 1, "Backup Application Reporting," describes the compliance reports available.

Compliance and risk mitigation reports

127

Virtualization Reporting

Configuration reports
DPA gathers information from VMware about the configuration of virtual machines on virtualization servers. This includes information such as the amount of CPU and memory that each machine has configured, and whether the virtual machine is active or down at that moment in time. To view the configuration for a virtual host, select Configuration > Virtualization > Virtual Host Configuration. Additional information is gathered about the configuration of virtual disks and network interfaces on virtual machines. To view the configuration for virtual disks and network interfaces, select Configuration > Disk > Virtual Host Disk Configuration and Configuration > Network > Virtual Host Network Interface Configuration.

128

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Virtualization Reporting

Data protection reports


All of the standard backup reports that can be run against a backup server or backup client in DPA can also be run against a virtualization server, to report on the success and failures of backups of virtual machines running on that server. The standard backup and data protection reports are described in Chapter 1, "Backup Application Reporting." This includes the ability to run exposure reports, such as the Backup Clients not Backed Up report, which will identify virtual machines that are not being backed up.

Data protection reports

129

Virtualization Reporting

Performance reports
Performance reports provide information to analyze the performance of backup clients and devices. The backup performance reports display information on the performance of backup clients and backup devices managed by the backup server. The performance reports for backup applications can be run against virtual hosts just as they can for backup clients. Chapter 1, "Backup Application Reporting,"describes the performance reports available. Performance reports are also available for the processors, network interfaces, and disks on virtual machines. To view the performance reports, select the virtual machine under Host in the navigation tree, and select one of the following:

Performance > Disk > Virtual Host Disk Performance Performance > Network Interface > Virtual Host Network Performance Performance > Processor > Virtual Host Processor Performance

130

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Virtualization Reporting

Resource utilization reports


DPA gathers a number of performance statistics about the virtualization server. Reports are available to show filesystem, processor, and memory utilization on a virtualization server. The reports provide visibility into performance bottlenecks on the physical machine, which may be the cause of backup performance issues. To view the utilization reports on a virtualization server physical machine, select one of the following from a virtualization server in the navigation tree:

Resource Utilization > Processor > Processor Utilization Resource Utilization > Memory > Memory Utilization Resource Utilization > Filesystem > Filesystem Utilization

In addition to the utilization metrics on the virtualization server, there are individual performance metrics for CPU and memory utilization on virtual machines that run on the server. These metrics identify the specific virtual machines that may be the cause of performance issues on the physical server. To view the processor and memory utilization reports on a virtual machine, select Resource Utilization > Processor > Virtual Host Processor Utilization or Resource Utilization > Memory > Virtual Host Memory Utilization from a virtualization server or virtual host in the navigation tree.

Resource utilization reports

131

Virtualization Reporting

Scheduling reports
The standard scheduling reports can be run from a virtualization server, which allows you to see whether backups on virtual machines are being backed up simultaneously. Multiple virtual machines on the same physical host being backed up at the same time may result in issues on the physical machine as described in "Resource utilization reports" on page 80. The scheduling reports available are described in Chapter 1, "Backup Application Reporting."

132

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Virtualization Reporting

Service level management reports


The service level management (SLA) reports display the success rate of backups. The SLA reports for backup applications can be run against virtual hosts just as they can for backup clients. Chapter 1, "Backup Application Reporting," describes the performance reports available.

Service level management reports

133

Virtualization Reporting

Status reports
DPA displays the ten virtual machines that have been running longest since startup. To view the report, select Status > Virtualization > Top Ten Longest Time Since Last Power On. The standard status reports for backup application components can be run against virtual hosts just as for backup clients. The status reports available are described in Chapter 1, "Backup Application Reporting."

134

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Database Reporting

The reports that can be run against databases are categorized into the following areas and are discussed in more detail:

Introduction .................................................................................................................. 136 Capacity planning reports .......................................................................................... 137 Change management reports ..................................................................................... 139 Configuration reports .................................................................................................. 142 Resource utilization reports........................................................................................ 148 Status reports ................................................................................................................ 150

Database Reporting

135

Database Reporting

Introduction
DPAgathers configuration and status information from a number of different database components, including the database server, databases, schemas, tables, indexes, and datafiles. A wide range of reports provide visibility into the configuration and status of the database and configuration changes that have occurred over time. DPA provides reports that allow you to:

Monitor the overall storage utilization of the database. Identify the largest tables and indexes within the database.

The DPA database can be monitored without any additional licensing required. The architecture of database products and the terminology used by different database vendors is not consistent. To provide a consistent reporting interface for a variety of database products, DPA uses standardized terminology to describe the database elements that are monitored. To view reports for backup databases, right-click the database or database group node in the navigation tree. To view reports on the DPA database, select DPA Server > Database in the navigation tree.

136

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Database Reporting

Capacity planning reports


Capacity planning reports allow you to analyze a database and identify the tables and indexes that are taking the most space. The capacity planning reports for databases include:

"Top Ten Largest Tables by size" on page 137 "Top Ten Largest Tables by Row Count" on page 137 "Top Ten Growing Tables" on page 138

Top Ten Largest Tables by size

The Top Ten Largest Tables by Size report displays the top ten largest database tables in megabytes. To run the this report, select Capacity Planning > Top Ten Largest Tables by Size from the navigation tree. Table 109 on page 137 describes the fields displayed in this report.

Table 109

Disk summary report Field Server Database Name Schema Name Table Name Number Rows Table Size Index Size Total Size Description Name of the machine that is hosting the database. Name of the database. Name of the schema. Name of the database table. Total number of rows in table. Total size of the table. Total size of the table index. Total size of the table and index.

Top Ten Largest Tables by Row Count

The Top Ten Largest Tables by Row Count report displays the top ten largest database tables in terms of number of rows. To run this report, select Capacity Planning > Top Ten Largest Tables by Row Count from the navigation tree. Table 110 on page 137 describes the fields that display in this report.

Table 110

Disk Configuration report Field Server Database Name Schema Name Table Name Number Rows Description Name of the machine that is hosting the database. Name of the database. Name of the schema. Name of the database table. Total number of rows in table.

Capacity planning reports

137

Database Reporting

Top Ten Growing Tables

The Top Ten Growing Tables report displays the top ten tables that have grown in size over the reporting period. To run this report, select Capacity Planning > Top Ten Growing Tables from the navigation tree. Table 111 on page 138 describes the fields displayed in this report.

Table 111

Top Ten Growing Tables report Field Server Database Name Schema Name Table Name Number Rows After Number Rows Before Number Rows Grown Description Name of the machine that is hosting the database. Name of the database. Name of the schema. Name of the database table. Number of rows in the table at the start of the time period. Number of rows in the table at the end of the time period. Percentage increase in number of rows.

138

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Database Reporting

Change management reports


The flexibility of current databases comes with the cost of additional complexity of configuration. Configuration changes can have unnoticed impacts on database performance and reliability. DPA reports for databases provide information on the changes over time to the database, table, index, and datafile and tracks configurations. Alerts can be raised as changes occur, or changes can be reported in daily or weekly reports that can be sent to administrators. Change management reports for databases include:

"Database Change Overview" on page 139 "Detailed change reports" on page 139 "All Database Change Details" on page 140

Database Change Overview

The Database Change Overview control panel contains reports that describe the number and type of changes to database components in your environment. To run the Overview, select Change Management > Overviews > Database Change Overview from the navigation tree. Table 112 on page 139 describes the reports displayed in this control panel.

Table 112

Database Change Overview Report Database Change Overview Last Ten Database Changes All Database Changes Description Displays the total number of changes for database components over the time period. Displays the ten most recent changes to the selected nodes. Opens the All Database Changes report that displays all changes to the selected nodes over the time period.

Detailed change reports

Right-click the Database Change Summary report to open a menu with more reports. These reports detail changes made to each database component:

Database Change Details Datafile Change Details Index Change Details Server Change Details Table Change Details Tablespace Change Details

Change management reports

139

Database Reporting

Table 113 on page 140 describes the fields displayed in these reports.
Table 113 Detailed Database Change reports Field Server Database Name Schema name Index Name Table Name Tablespace Name Datafile Name Change Description Name of the machine that is hosting the database. Name of the database. Name of the schema. Name of the table Index. Name of the table. Name of the tablespace. Name of the datafile. Type of change: Added Modified Deleted Describes the change made for Change Type of Modified. Timestamp of the change.

Difference Noted

All Database Change Details

The All Database Change Details report details about all changes made to the selected database nodes. To run the report, select Change Management > Database > All Database Change Details from the navigation tree. Table 114 on page 140 describes the fields displayed in these reports.

Table 114

All Database Change Details Field Server Type Object Change Description Name of the machine that is hosting the database. Type of database component that was changed, for example, server, or tablespace. Name of the database object that was changed. Type of change: Added Modified Deleted Describes the change made for Change Type of Modified. Timestamp of the change.

Difference Noted

Database Configuration Changed

The Database Configuration Changed analysis job sends an alert if the configuration of a database changes during the polling period (30 minutes). To receive an alert if the database configuration changes, assign the Database Configuration Changed analysis and an alert to a node in the navigation tree.

140

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Database Reporting

The EMC Data Protection Advisor Administration Guide contains more information on assigning analysis jobs to nodes.

Change management reports

141

Database Reporting

Configuration reports
Configuration reports display the configuration of components at a given point in time. Configuration reports are organized into the following categories:

"Server Configuration" on page 142 "Database Configuration" on page 143 "Tablespace Configuration" on page 144 "Datafile configuration" on page 145 "Logfile Configuration" on page 146

Server Configuration

The Server Configuration report displays details about configuration of the database servers. To run the Server Configuration report, select Configuration > Server Configuration from the navigation tree. Table 115 on page 142 describes the fields displayed in this report.

Table 115

Server Configuration report Field Server Vendor Product Version Max Connections Description Name of the database server. Name of the database vendor, for example, Oracle. Name of the database product, for example, PostgreSQL. Version of the database product. Maximum number of connections permitted to a database. Note: This field is returned only for Postgres. Status Current status of the database server: Started Mounted Open Open Migrate Total number of databases of that product and version. Total number of schemas belonging to database of that product and version.

Database Count Schema Count

Right-click a row in the Database Server Details report to open a menu, from which you can view the following reports for a database server:

"Database Server Parameters" on page 142 "Database Configuration" on page 143 Schema Configuration

Database Server Parameters

The Database Server Parameters report lists the name and value pairs for all configuration values defined for a database server.

142

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Database Reporting

Database Configuration

The Database Configuration report displays details about databases in your environment. To run the report, select Configuration > Database Configuration from the navigation tree. Table 116 on page 143 describes the fields displayed in this report.

Table 116

Database Configuration report Field Server Database Name Creation Date Description Name of the database server. Name of the database. Date the database was created. Note: This field is not returned for Postgres. Status Current status of the database: Restoring Recovering Recovery Pending Suspect Emergency Offline Online Total number of tables in the database. Total number of index tables in the database. Total number of partitions in the database. Total number of tablespaces in the database. Total number of datafiles in the database.

Num Tables Num Indexes Num Partitions Num Tablespaces Num Datafiles

Right-click the Database Configuration report to open a menu, from which you can view the following reports:

"Database Parameters" on page 143 "Table Details" on page 144 "Index Details" on page 144 "Partition Details" on page 144 "Tablespace Configuration" on page 144 "Datafile configuration" on page 145 "Logfile Configuration" on page 146

Database Parameters The Database Parameters report lists the name and value pairs for all configuration parameters defined for a database server.

Configuration reports

143

Database Reporting

Table Details The Table Details report lists the configuration details for database tables. Table 117 on page 144 describes the fields displayed in this report.
Table 117 Table Details Field Server Database Name Schema Name Table Name Is Partitioned Tablespace Name Number Rows Table Size Index Count Index Size Total Size Description Name of the database server. Name of the database. Name of the schema. Name of the table. Flag that indicates whether the table is partitioned. Name of the tablespace. Number of rows in the table. Size of the table in megabytes. Number of indexes for the table. Size of index tables in megabytes. Total size of table plus index tables.

Right-click the Table Details report to view the Index Details report or Partition Details report for a particular table. Index Details The Index Details report lists the configuration details for table indexes. The fields displayed in this report are the same as for the Table Details report, described in Table 117 on page 144. Partition Details The Partition Details report lists the configuration details for table partitions. The fields displayed in this report are the same as for the Table Details report, described in Table 117 on page 144. Tablespace Configuration The Tablespace Configuration report displays details about the configuration of tablespaces. To run the Tablespace Configuration report, select Configuration > Tablespace Configuration from the navigation tree. Table 118 on page 144 describes the fields displayed in this report.
Table 118 Tablespace Configuration (page 1 of 2) Field Server Database Name Tablespace Name Description Name of the database server. Name of the database. Name of the tablespace.

144

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Database Reporting

Table 118

Tablespace Configuration (page 2 of 2) Field Type Description Type of tablespace: Undo Temporary Permanent Current status of the tablespace: Offline Online Read only Flag that indicates whether the tablespace is read-only. Total number of tables in the tablespace. Total number of indexes in the tablespace. Total number of datafiles in the tablespace. Total size of datafiles in the tablespace. Total size used in datafiles in the tablespace.

State

Is Read Only Table Count Index Count Datafile Count Datafile Size Datafile Size used

Datafile configuration The Datafile Configuration report displays details about the configuration of datafiles. To run the Datafile Configuration report, select Configuration > Datafile Configuration from the navigation tree. Table 119 on page 145 describes the fields displayed in this report.
Table 119 Datafile Configuration (page 1 of 2) Field Server Database Name Tablespace Name Datafile Name Physical Name Max Size Size Increment Percent Increment Increment Type Description Name of the database server. Name of the database. Name of the tablespace. Name of the datafile. Filesystem path of file on the disk. Maximum permitted size of the datafile. Size, in megabytes the datafile is configured to grow. Size as a percentage the datafile is configured to grow. Indication of whether the datafile will grow by size or percentage.

Configuration reports

145

Database Reporting

Table 119

Datafile Configuration (page 2 of 2) Field Size Size Used State Description Maximum permitted size of the datafile. Current size used of the datafile. Status of datafile: Offline Online Recovering Recovery Pending Suspect Defunct System

Logfile Configuration The Logfile Configuration report displays details about the configuration of SQL Server log files. To run the Logfile Configuration report, select Configuration > Logfile Configuration from the navigation tree. Table 119 on page 145 describes the fields displayed in this report.
Table 120 Logfile Configuration (page 1 of 2) Field Server Database Name Logfile Name Physical Name Group Number Autogrowth Size Increment Percentage Increment Increment Type Size Used Description Name of the database server. Name of the database. Name of the log file. Path and filename of the log file. Group number associated with the log file (Oracle only). Indication of whether the log file is configured to grow automatically. Size, in megabytes the datafile is configured to grow. Size, as a percentage, the datafile is configured to grow (SQL only). Indication of whether the datafile will grow by size or percentage. Current size used of the log file.

146

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Database Reporting

Table 120

Logfile Configuration (page 2 of 2) Field Maximum Size Size State Description Maximum permitted size of the log file. Value of -1 indicates unrestricted growth. Maximum permitted size of the log file. Status of log file: Offline Online Recovering Recovery Pending Suspect Defunct System'

Configuration reports

147

Database Reporting

Resource utilization reports


Databases preallocate large amounts of space in datafiles to be used as required. However, as with any form of preallocation, this can lead to inefficient levels of storage utilization. DPA for databases provide information on datafile capacity and usage. This information includes providing accurate metrics and allocation of the correct amount of storage to each database for higher overall utilization. DPA provides two methods of measuring utilization: Current Utilization and Logical utilization.

Current utilization is a measure of the percentage of the existing data file that is occupied. Logical utilization is a measure of the percentage that the existing contents of the maximum size to which the datafile can grow. "Datafile Utilization" on page 148 "Datafile Utilization Trend" on page 149 "Tablespace Utilization" on page 149 "Memory Usage" on page 149

Resource utilization reports for databases include:


Datafile Utilization

The Datafile Utilization report displays details about the logical and actual utilization of datafile storage space. To run the Datafile Utilization report, select Resource Utilization > Database > Datafile Utilization from the navigation tree. Table 121 on page 148 describes the fields that are included in the Datafile Utilization report.

Table 121

Datafile utilization (page 1 of 2) Field Server Database Name Tablespace Name Datafile Name Size Size Used Description Name of the database server. Name of the database. Name of the tablespace. Name of the datafile. Current size of the database file. Current size used of the datafile.

148

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Database Reporting

Table 121

Datafile utilization (page 2 of 2) Field Current Utilization Description Current usage of the datafile as a percentage. Note: This field is available only for SQL Server and Oracle. Max Size Logical Utilization Maximum permitted size of the datafile. Logical usage of the datafile, as a percentage of the maximum permitted datafile size. Note: This field is available only for Oracle.

Datafile Utilization Trend

The Datafile Utilization Trend report displays datafile logical and actual utilization over time in a trend chart. To run the Datafile Utilization Trend report, select Resource Utilization > Database > Datafile Utilization Trend from the navigation tree.

Tablespace Utilization

The Tablespace Utilization report displays details about the logical and actual utilization of tablespaces. To run the Tablespace Utilization report, select Resource Utilization > Database > Tablespace Utilization from the navigation tree. This report returns the same fields displayed for the Datafile Utilization report, as described in Table 121 on page 148. To view the datafile utilization for datafiles in a tablespace, right-click the Tablespace Utilization Report and select Datafile Utilization.

Memory Usage

The Memory Usage report displays details about memory utilization by database processes over time. To run the Memory Usage report, select Resource Utilization > Process > Memory Usage from the navigation tree. The Memory Usage report is available only for Oracle databases.

Resource utilization reports

149

Database Reporting

Status reports
Status reports for databases show the current status of the database connections and processes. The reports include:

"Connection Status" on page 150 "Process Status" on page 150

Connection Status

The Connection Status report displays detailed information about operations performed on a database by applications. To run the Connection Status report, select Status > Database > Connection Status from the navigation tree. Table 122 on page 150 describes the fields that are included in the Connection Status report.

Table 122

Connection Status Field Server Connection ID Database Name Connect Time Status Command Client Host Client User Client PID Client Application Used CPU Used Memory Number Logical Reads Number Reads Description Name of the database server. Unique identifier for the connection to the database. Name of the database. Time that the connection was made. Status of the connection, for example, running, or idle. Last command that was executed or currently running on this connection. Originating host name for this connection. Originating username for this connection. Originating client process identifier (PID) for this connection. Name of originating application for the connection. Total CPU runtime used for this connection. Total memory used for this connection Total number of logical reads from the database cache from this connection. Total number of physical reads from the database from this connection.

Process Status

The Process Status report displays details about database processes and memory used. To run the Process Status report, select Status > Database > Process Status from the navigation tree. The Process Status report is available only for Oracle databases.

150

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Database Reporting

Table 123 on page 151 describes the fields that are included in the Process Status report.
Table 123 Process Status Field Hostname PID Process Name Process Command CPU Memory Description Name of the host on which the process is running. Process identifier. Name of the process. Full command line of the process. Percentage CPU that is being used by the process. Amount of memory that is being used by the process.

Status reports

151

Database Reporting

152

EMC Data Protection Advisor Version 5.8 Report Reference Guide

6
HP EVA Reporting

The reports that can be run against HP Enterprise Virtual Array (EVA) disk arrays are categorized into the following areas:

Asset management reports ......................................................................................... 155 Status reports ................................................................................................................ 158

HP EVA Reporting

153

HP EVA Reporting

Introduction
DPA gathers data from HP Enterprise Virtual Array (EVA) disk arrays through the HP Command View EVA Software. Monitoring of HP EVA requires additional licensing beyond that which is included in the standard DPA license. For more information on how to obtain licenses, contact an EMC Account Manager or Customer Support Engineer.

154

EMC Data Protection Advisor Version 5.8 Report Reference Guide

HP EVA Reporting

Asset management reports


Asset management reports provide information about the disks configured on an array. These reports include:

"Disk Summary" on page 155 "Disk Configuration" on page 155 "Disk Array Configuration" on page 156 "Fibre Channel Port Configuration" on page 156 "LUN Configuration" on page 156

Disk Summary

The Disk Summary report displays information about the number and size of the disks on all managed arrays. To run the Disk Summary report, select Asset Management > Disk > Disk Summary from the navigation tree. Table 124 on page 155 describes the fields displayed in this report.

Table 124

Disk Summary report Field Hostname Num Disks Total Size Description Hostname of the HP Command View software. Number of disks on the array. Total size of the disks on the array.

Disk Configuration

The Disk Configuration report displays details about the disks on the managed arrays, such as manufacturer, model, and serial number. To run the Disk Configuration report, select Asset Management > Disk > Disk Configuration from the navigation tree. Table 125 on page 155 describes the fields displayed in this report.

Table 125

Disk Configuration report (page 1 of 2) Field Hostname Sub Name Device Manufacturer Model Serial Number Firmware Revision Size Description Hostname of the disk array. Name of the disk array. Name of the device. Manufacturer of the disk. Model of the disk. Serial number of the disk. Version of firmware on the disk. Size of the disk.

Asset management reports

155

HP EVA Reporting

Table 125

Disk Configuration report (page 2 of 2) Field Enclosure Disk Number Bus Description Name of the enclosure. Identifier for the disk. Identifier for the bus.

Disk Array Configuration

The Disk Array Configuration report displays details about the managed disk arrays. To run the Disk Summary report, select Asset Management > Disk Array > Disk Array Configuration from the navigation tree. Table 126 on page 156 describes the fields displayed in this report.
Table 126 Disk array configuration report Field Hostname Disk Array Name Manufacturer Model Firmware Revision Volume Delay Description Hostname of the disk array. Name of the device. Manufacturer of the disk. Model of the disk. Version of firmware on the disk. Volume Repair Delay parameter of the disk array.

Fibre Channel Port Configuration

The Fibre Channel Port Configuration report lists the port number, port name, and mode for each Fibre Channel on that node. To run the Fibre Channel Port Configuration report, select Asset Management > Fibre Channel > Fibre Channel Port Configuration from the navigation tree. Table 127 on page 156 describes the fields displayed in this report.

Table 127

Fibre Channel configuration report Field Hostname Sub Name Port WWPN Internal Type Description Host on which the HBA is configured. Name of the disk array. Identifier for the FC port. World Wide Port Name associated with the FC port. Indication of whether the FC port is internal. Type of FC port.

LUN Configuration

The LUN Configuration report displays information about the LUNs configured on the disk arrays. To run the LUN Configuration report, select Asset Management > LUN > LUN Configuration from the navigation tree.

156

EMC Data Protection Advisor Version 5.8 Report Reference Guide

HP EVA Reporting

Table 128 on page 157 describes the fields displayed in this report.
Table 128 LUN configuration report Field Node Sub Name Name Size Volume Type Create Time RAID Level Description Name of the array on which the LUN exists. Name of the disk array. Identifier for the LUN. Size, in gigabytes, of the LUN. Volume on which the LUN resides, if applicable. Type of operating system to which the LUN is exported. Time that the LUN was created. RAID level of the LUN.

Asset management reports

157

HP EVA Reporting

Status reports
Status reports display a detailed status of a component at a point in time. These reports include:

"Disk Status" on page 158 "Disk Array Status" on page 158 "Fibre Channel Status" on page 159 "Card Status" on page 159 "LUN Status" on page 159

Disk Status

The Disk Status report displays information about the state of the disks in the array. To run the Disk Status report, select Status > Disk > Disk Status from the navigation tree. Table 129 on page 158 describes the fields displayed in this report.
Table 129 Disk Status report Field Hostname Sub Name Device Size State Allocated Status Description Name of the host on which the disk array is configured. Name of the disk array. Identifier for the disk. Size, in gigabytes, of the disk. Indication of whether the disk is online or offline. Current usage, in gigabytes, of the disk. Status of the disk, for example, good.

Disk Array Status

The Disk Array Status report displays information about the current state of the disk array. To run the Disk Array Status report, select Status > Disk Array > Disk Array Status from the navigation tree. Table 130 on page 158 describes the fields displayed in this report.

Table 130

Disk Status report Field Hostname Disk Array Name Status State Used Description Name of the disk array host. Name of the disk array. Status of the disk array. State of the disk array. Amount of space, in terabytes, used on the disk array.

158

EMC Data Protection Advisor Version 5.8 Report Reference Guide

HP EVA Reporting

Fibre Channel Status

The Fibre Channel Port Status report displays information about the type, status, and speed of the FC ports on the disk array. To run the Host Status report, select Status > Fibre Channel > Fibre Channel Port Status from the navigation tree. Table 131 on page 159 describes the fields displayed in this report.

Table 131

Fibre Channel port status report Field Hostname Sub Name Port WWPN Link Active Speed Internal Type Description Name of the disk array host. Name of the disk array. Identifier for the port. World Wide Port Name (WWPN) for the port. Indication of whether the port link is active. Speed of the port. Indication of whether if the port is internal. Type of port.

Card Status

The Card Status report displays information about the hardware cards installed. To run the Host Status report, select Status > Hardware > Card Status from the navigation tree. Table 130 on page 158 describes the fields displayed in this report.
Table 132 Card Status report Field Node Sub Name Adapter State Description Name of the disk array host. Name of the disk array. Identifier for the adapter. State of the adapter.

LUN Status

The LUN Status report displays information about the LUNs configured on the disk array. To run the LUN Status report, select Status > LUN > LUN Status from the navigation tree.

Status reports

159

HP EVA Reporting

The fields displayed in this report are described in Table 133 on page 160.
Table 133 LUN Status report Field Node Sub Name Name Online Used Num Copies State Access No Single Point of Failure Description Name of the disk array host. Name of the disk array. Identifier for the LUN. Indication of whether the LUN is online. Amount of space used on the LUN. Number of copies of the LUN. Current state of the LUN. Access permissions to the LUN (for example, read only, or read/write). Indication of whether no single point of failure exists for this LUN.

160

EMC Data Protection Advisor Version 5.8 Report Reference Guide

7
ACSLS Server Reporting

This section describes the reporting capabilities of the Automated Cartridge System Library Software (ACSLS) module and includes the following:

Running reports for an ACSLS server....................................................................... 162 Asset management reports ......................................................................................... 163 Data protection reports................................................................................................ 165 Resource utilization reports........................................................................................ 166 Status reports ................................................................................................................ 168 Licensing reports .......................................................................................................... 174

ACSLS Server Reporting

161

ACSLS Server Reporting

Running reports for an ACSLS server


In the DPA navigation tree, an ACSLS server is displayed as a node under Servers > Storage Management Servers > Sun StorageTek ACSLS. The name of the node is user-defined. When this node is created, the navigation tree automatically expands to show a list of library storage modules (LSMs) configured on that ACSLS server. To run a report, right-click the ACSLS node and select a report. To display the libraries and drives managed by the ACSLS server, expand the ACSLS node. To run reports against any of the managed components of an ACSLS, right-click the component and run a report against that component. The DPA ACSLS module monitors an ACSLS server and gathers information about the tape libraries and tape drives managed by ACSLS servers. Reports are available for the following components:

ACSLS server The host on which ACSLS software is installed. ACSLS port The port that ACSLS uses to communicate with the tape libraries. Automated cartridge system (ACS) Library storage module (LSM) The tape libraries managed by the ACSLS server. Tape drive The Tape drives contained in each LSM. Cartridge access port (CAP) The CAP in each tape library.

162

EMC Data Protection Advisor Version 5.8 Report Reference Guide

ACSLS Server Reporting

Asset management reports


Asset management reports provide details on the configuration of an ACSLS server. These ACSLS reports return information for both tape libraries and tape drives. These reports include:

"Tape Drive Summary" on page 163 "Tape Drive Configuration" on page 163 "Tape Library Summary" on page 163 "Tape Library Configuration" on page 164

Tape Drive Summary

To display a summary of the tape drives managed by the ACSLS server, select Asset Management > Tape Drive > Tape Drive Summary from the navigation tree to run the Tape Drive Summary control panel. Table 134 on page 163 describes the reports contained in this control panel.
Table 134 Tape Drive Summary report Report Tape Drive Model Summary Tape Drive Firmware Summary Tape Drive Interface Summary Description Bar chart that shows the number of tape drives by model. This information is not available for an ACSLS server. This information is not available for an ACSLS server.

Tape Drive Configuration

The Tape Drive Configuration report displays the model and serial number for all tape drives managed by the ACSLS server. Tape drive information also includes the name of the tape library in which the tape drives are members. Table 135 on page 163 describes the fields that are included in the Tape Drive Configuration report.
Table 135 Tape Drive Configuration report Field Hostname Library Name Description Name of the ACSLS server. Name of the tape library storage module (LSM) in which the tape drive is located. The name returned for this field is a combination of the ACS and LSM fields, for example 0,0. Name of the device. The name returned for this field is a combination of the ACS, LSM, Panel, and Drive fields, for example 0,0,1,1. Model of the device. Serial number of the device.

Device Name

Model Serial

Tape Library Summary

To display a summary of the tape libraries managed by the ACSLS server, run the Tape Library Summary control panel. Select Asset Management > Tape Library > Tape Library Summary from the navigation tree.

Asset management reports

163

ACSLS Server Reporting

Table 136 on page 164describes the reports provided by this control panel.
Table 136 Tape Library control panel reports Report Tape Library Model Summary Tape Library Firmware Summary Tape Library Slot Count Tape Library Drive Count Description Bar chart that shows the number of tape libraries by model. This report includes all libraries managed by the ACSLS server. This information is not available for an ACSLS server. Bar chart that shows the number of slots configured on each library. Bar chart that shows the number of tape drives configured on each library.

Tape Library Configuration

The Tape Library Configuration report displays a table report that contains details on each tape library managed by the ACSLS. All libraries return information on the following:

Vendor Model Serial number Number of slots CAPs Drives

To run this report and display more detailed information on ACSLS LSMs, select Asset Management > Tape Library >Tape Library Configuration from the navigation tree. Table 137 on page 164 describes the fields that are included in the Tape Library Configuration Report.
Table 137 Tape Library Configuration report Field Hostname Library Name Vendor Model Serial Num Slots Num Caps Num Drives Description Name of the ACSLS server. Name of the tape library storage module (LSM). The value for this field is a combination of the ACS and LSM fields, for example 0,0. Tape library vendor. Model of the tape library. Serial number of the tape library. Number of slots in the tape library. Number of cartridge access port. Number of drives in the tape library.

164

EMC Data Protection Advisor Version 5.8 Report Reference Guide

ACSLS Server Reporting

Data protection reports


DPA provides reports on the backup jobs that have occurred on ACSLS storage. To view the backup job reports, select Data Protection > Jobs > from the navigation tree. Table 137 on page 164 describes the backup job reports available.
Table 138 Data Protection reports Field Job Summary All Jobs Failed Jobs Successful Jobs Missed Jobs Active Jobs Description Summarizes that shows all jobs that have run and all active jobs. Detail of all jobs that have run. Detail of all failed jobs. Detail of all successful jobs. Detail of all jobs that did not run. Detail of all running jobs.

Click on a column in the Job Summary report to drill down and view detailed reports on completed, successful, failed, and active jobs.

Data protection reports

165

ACSLS Server Reporting

Resource utilization reports


Resource utilization reports show information about the percentage of slots that are occupied within a library managed by an ACSLS server. These reports include:

"Tape Library Aggregate Utilization" on page 166 "Tape Library Aggregate Utilization Trend" on page 166 "Tape Library Utilization" on page 166 "Tape Library Utilization Trend" on page 167

Tape Library Aggregate Utilization

To run the Tape Library Aggregate Utilization Report, select Resource Utilization > Tape Library Aggregate Utilization. This report displays a chart for the aggregate utilization across all tape libraries at a point in time. Table 139 on page 166 describes the field that is included in the Tape Library Aggregate Utilization Report.
Table 139 Tape Library Aggregate Utilization report Field Utilization Description The number of slots, as a percentage, that are occupied with tapes. This value is the combined utilization for all tape libraries managed by the ACSLS server.

Tape Library Aggregate Utilization Trend

To run the Tape Library Aggregate Utilization Trend report, select Resource Utilization > Tape Library Aggregate Utilization Trend from the navigation tree. This report displays a graph for the aggregate utilization across all tape libraries over a given time period. Table 140 on page 166 describes the field that is included in the Tape Library Aggregate Utilization Trend report.

Table 140

Tape Library Aggregate Utilization Trend report Field Utilization Description The total number of slots, as a percentage, that are occupied with tapes. This value is the combined utilization for all tape libraries managed by the ACSLS server.

Tape Library Utilization

To run the Tape Library Utilization report, select Resource Utilization > Tape Library Utilization. This report displays the utilization of each individual tape library at a point in time. Table 141 on page 166 describes the field that is included in the Tape Library Utilization report.
Table 141 Tape Library Utilization report Field Utilization Description Total number of slots, as percentage, that are occupied with tapes.

166

EMC Data Protection Advisor Version 5.8 Report Reference Guide

ACSLS Server Reporting

Tape Library Utilization Trend

To run the Tape Library Utilization Trend report, select Resource Utilization > Tape Library Utilization Trend from the navigation tree. This report displays the utilization of each individual tape library over a given time period. Table 142 on page 167 describes the field that is included in the Tape Library Utilization Trend report.

Table 142

Tape Library Utilization Trend report Field Library Utilization Description Total number of slots, as a percentage, that are occupied with tapes.

Resource utilization reports

167

ACSLS Server Reporting

Status reports
Status reports show the current state of the ACSLS server and its various components. These reports include:

"ACSLS Server Status" on page 168 "ACSLS Port Status" on page 169 "ACSLS ACS Status" on page 169 "ACSLS Lock Status" on page 170 "ACSLS Errors" on page 170 "Tape Drive Status Summary" on page 171 "Tape Drive Status" on page 171 "Tape Library Status Details" on page 171 "Tape Library Volume Status" on page 172 "Tape Library Slot Status" on page 172 "Tape Library Cartridge Access Ports (CAP) Status" on page 173

ACSLS Server Status

To run the ACSLS Server Status report, select Status > ACSLS > ACSLS Server Status from the navigation tree. This report displays information such as server, state, and the status of the requests (for example, current, pending, current mount, pending mount) of the ACSLS Server. Table 143 on page 168 describes the fields that are included in the ACSLS Server Status report.

Table 143

ACSLS Server Status report Field Server State Description Name of the host on which ACSLS is running. Current state of the ACSLS Software. The value is one of the following: Idle Idle pending Recovery Run Number of audit requests in progress on the server. Number of audit requests pending on the server. Number of mount requests in progress on the server. Number of mount requests pending on the server. Number of dismount requests in progress on the server. Number of dismount requests pending on the server. Number of eject requests in progress on the server. Number of eject requests pending on the server.

Current Audit Request Pending Audit Requests Current Mount Requests Pending Mount Requests Current Dismount Requests Pending Dismount Requests Current Eject Requests Pending Eject Requests

168

EMC Data Protection Advisor Version 5.8 Report Reference Guide

ACSLS Server Reporting

ACSLS Port Status

To run the ACSLS Port Status report, select Status > ACSLS > ACSLS Port Status from the navigation tree. This report displays information on the status of the port that the ACSLS server uses to communicate with the tape library. The report displays the server, port, name, and the state of the port. Table 144 on page 169 describes the fields that are included in the ACSLS Port Status report.

Table 144

ACSLS Port Status report Field Server Port Name State Description Name of host on which ACSLS is running. Address of the ACSLS port, which is a combination of the ACS and Port fields. An example of data returned for this field is 0,0. Name of the ACSLS port; for example, /dev/mchanger1. State of the port. The value is either: Online Offline

ACSLS ACS Status

To run the ACSLS ACS Status report, select Status > ACSLS > ACSLS ACS Status from the navigation tree. This report displays information on the:

Status of each automated cartridge system (ACS) managed by the ACSLS server. Server, name, state, and the status of the requests of the ACS.

Table 145 on page 169 describes the fields that are included in the ACSLS ACS Status report.
Table 145 ACSLS ACS Status report Field Server Name State Description Name of the host on which ACSLS is running. Name of the ACS. Current state of the ACSLS software. Values include: Diagnostic Offline Offline Pending Online Recovery Number of audit requests in progress on the server. Number of audit requests pending on the server. Number of mount requests in progress on the server. Number of mount requests pending on the server. Number of dismount requests in progress on the server. Number of dismount requests pending on the server. Number of eject requests in progress on the server. Number of eject requests pending on the server.

Current Audit Requests Pending Audit Requests Current Mount Requests Pending Mount Requests Current Dismount Requests Pending Dismount Requests Current Eject Requests Pending Eject Requests

Status reports

169

ACSLS Server Reporting

ACSLS Lock Status

The ACSLS Lock Status report shows the status of all locks on drives and volumes. To run the report, select Status > ACSLS > Lock Status from the navigation tree. Table 146 on page 170 describes the fields that are included in the ACSLS Lock Status report.
ACSLS Lock Status report Field Server Lock ID Type Identifier Duration Pending Status User ID Description Name of the host on which the ACSLS is running. Identifier for the lock. Lock target type: drive or volume. Identifier for the target. Duration of lock in seconds. Number of locks pending on target. Status of the target, for example, in use. Identifier for the lock owner.

Table 146

ACSLS Errors

The ACSLS Errors reports show the errors that have occurred on ACSLS. To run the Application Error Summary report, select Status > Application > Application Error Summary from the navigation tree. This report displays the counts for the most common errors that have occurred. To run the Application Error Details report, select Status > Application > Application Error Details from the navigation tree. Table 147 on page 170 describes the fields that are included in the ACSLS Errors report.
Table 147 ACSLS Errors report Field Server Application ID Error Code Error String Source Category Timestamp Description Name of the host on which ACSLS is running. Identifier of the session or process that the error is associated with. Error code of the message: message prefix, message number, message type. Text of the error message. Source object for the error. Category of error. Time the error event began.

170

EMC Data Protection Advisor Version 5.8 Report Reference Guide

ACSLS Server Reporting

Tape Drive Status Summary

To view a summary of the tape drives managed by the ACSLS server, run the Tape Drive Status Summary control panel. Select Status > Tape Drive > Tape Drive Status Summary from the navigation tree. This control panel provides the reports described in Table 148 on page 171.
Tape Drive Status Summary control panel reports Report Tape Drive Status Description Shows the status of the tape drives managed by the ACSLS server in a bar chart. This report includes all libraries managed by the ACSLS server. Shows the available number of tape drives in a bar chart. This information is not available for an ACSLS server.

Table 148

Tape Drive State Tape Drive Cleaning Summary

Tape Drive Status

To view the status of tape drives managed by the ACSLS server, select Status > Tape Drive > Tape Drive Status from the navigation tree. To check the status of an individual tape drive, run the report from the individual drive in the navigation tree. The Tape Drive Status report lists the hostname, library name, and device name for each tape drive in the system. The Status field contains information about the health of the drive. The State field indicates if a tape drive is loaded with a volume. Table 149 on page 171 describes the fields that are included in the Tape Drive Status report.

Table 149

Tape Drive Status report Field Hostname Library Name Device Name Status State Description Name of the ACSLS server. Name of the tape library storage module (LSM). The value for this field is a combination of the ACS and LSM fields, for example, 0,0. Name of device. The value for this field is a combination of the ACS, LSM, Panel and Drive fields, for example, 0,0,1,1. Current status of a drive. State of a drive: In use Available

Tape Library Status Details

To run the Tape Library Status Details report and view the status of all tape libraries managed by the ACSLS server, select Status > Tape Library > Tape Library Status Details from the navigation tree. For each library on the system, the report displays the hostname, the number of volumes in the library, and the status of the library.

Status reports

171

ACSLS Server Reporting

Table 150 on page 172 describes the fields that are included in the Tape Library Status Details report.
Table 150 Tape Library Status Details report Field Hostname Library Name Status Num Volumes Description Name of the ACSLS server. Name of the tape library storage module (LSM). The value for this field is a combination of the ACS and LSM fields, for example, 0,0. Status of the library. Number of volumes in the library.

Tape Library Volume Status

To view information on the status of all volumes inside a tape library managed by the ACSLS server, select Status > Tape Library > Tape Library Volume Status to run the Tape Library Volume Status report. The report displays details about all the volumes managed by the ACSLS server, such as the amount of data stored on the volumes, their location, and location type. Table 151 on page 172 describes the fields that are included in the Tape Library Volume Status report.

Table 151

Tape Library Volume Status report Field Hostname Library Name Volume Location Location Type Pool Type Data Type Description Name of the ACSLS server. Name of the tape library storage module (LSM). The value for this field is a combination of the ACS and LSM fields, for example, 0,0. Identifier for the volume. Location of the volume in the library. Type of location where the volume resides, for example, storage or ejected. Pool in which the tape is located. Type of media. Type of tape: Data Cleaning Scratch Date that the volume was entered into the library. Last time the volume was accessed. Number of times the volume has been accessed. Maximum number of times a volume is used.

Entry Date Access Date Access Count Max Use

Tape Library Slot Status

To view information on the status of all slots inside a tape library managed by the ACSLS server, select Status > Tape Library > Tape Library Slot Status from the navigation tree. The report displays details about all the slots managed by the ACSLS

172

EMC Data Protection Advisor Version 5.8 Report Reference Guide

ACSLS Server Reporting

server, such as the library in which each slot is located, the location and status of the slot, and if any volumes are included in that slot. Table 152 on page 173 describes the fields that are included in the Tape Library Slot Status report.
Table 152 Tape Library Slot Status report Field Hostname Library Name Address Description Name of the ACSLS server. Name of the tape library storage module (LSM). The value for this field is a combination of the ACS and LSM fields, for example, 0,0. Unique address of the element inside the tape library. The value for this field is a combination of the ACS, LSM, Panel, Row, and Column fields, for example, 0,0,0,0,0. Status of the slot. Label of the volume.

Status Volume

Tape Library Cartridge Access Ports (CAP) Status

To view information on the status of all CAPs managed by the ACSLS server, select Status > Tape Library > Tape Library CAP Status from the navigation tree. The report displays details about all the CAPs managed by the ACSLS server. Table 153 on page 173 describes the fields that are included in the Tape Library CAP Status report.

Table 153

Tape Library CAP Status report Field Hostname Address Status Unlocked Open Description Name of the ACSLS server. Unique identifier of the CAP in the tape library. This value is a combination of the ACS, LSM, and CAP fields, for example, 0,0,0. Status of the CAP. Indication of whether the CAP is locked or unlocked. Indication of whether the CAP is open or closed.

Status reports

173

ACSLS Server Reporting

Licensing reports
DPA provides the following reports on ACSLS licenses:

"License Summary" on page 174 "License Details" on page 174 "Expired Licenses" on page 174

License Summary

The License Summary report shows the license count for each ACSLS instance. To view the report, select Licensing > License Summary from the navigation tree. The License Details report shows the details for the ACSLS installation licenses. To view the report, select Licensing > License Details from the navigation tree. Table 154 on page 174 describes the fields in the report.
License details report Field Node Product Identifier Code Instance Instances Valid Expires Description Name of the ACSLS server. Name of product (ACSLS). License identifier. License code. Instance of the license. Number of licensed cells. Indication of whether the license is valid. Expiration date of the license.

License Details

Table 154

Expired Licenses

The License Summary report shows the details of licenses that have expired. To view the report, select Licensing > Expired Licenses from the navigation tree.

174

EMC Data Protection Advisor Version 5.8 Report Reference Guide

RecoverPoint Reporting

The reports that can be run against RecoverPoint are categorized into the following areas and are discussed in more detail:

Introduction .................................................................................................................. 176 Asset management reports ......................................................................................... 177 Change management reports ..................................................................................... 178 Chargeback reports ...................................................................................................... 179 Configuration reports .................................................................................................. 180 Performance reports..................................................................................................... 185 Resource utilization reports........................................................................................ 187 Status reports ................................................................................................................ 188

RecoverPoint Reporting

175

RecoverPoint Reporting

Introduction
DPA gathers configuration, status, and performance information from a RecoverPoint system in your environment. Monitoring of RecoverPoint requires additional licensing beyond that which is included in the standard DPA license. For more information on how to obtain licenses for RecoverPoint reporting, please contact an EMC Account Manager or Customer Support Engineer. RecoverPoint components are displayed in the navigation tree in a hierarchy under Storage > Replication, with the managing host at the top level. RecoverPoint appliances (RPAs) and splitters are divided by site, if there is more than one site in your RecoverPoint system. Consistency group copies are mapped in the hierarchy to their consistency groups. To view reports for RecoverPoint, right-click the host, RPA, or RPA component node in the navigation tree.

176

EMC Data Protection Advisor Version 5.8 Report Reference Guide

RecoverPoint Reporting

Asset management reports


Asset management reports display details on the physical components of the RecoverPoint environment. The asset management reports for RecoverPoint include the Fibre Channel Port Configuration report.

Fibre Channel Port Configuration

The Fibre Channel Port Configuration report displays the port numbers and WWPNs of Fibre Channel interfaces for RecoverPoint Appliances. To run the report, select Asset Management > Fibre Channel Port Configuration from the navigation tree. Table 155 on page 177 describes the fields displayed in this report.

Table 155

Fibre Channel port configuration report Field Hostname Port Sub Name Sub Name 2 WWPN Description Name of the RecoverPoint system host. Port number. Name of the site at which the RPA is located. Name of the RPA. World wide port number (WWPN) for the Fibre Channel interface.

Asset management reports

177

RecoverPoint Reporting

Change management reports


Change management reports display details on changes to the components and settings in a RecoverPoint environment. Change Management reports for RecoverPoint include:

"RecoverPoint Change Overview" on page 178 "RecoverPoint Change Details" on page 178

RecoverPoint Change Overview

The RecoverPoint Change Overview control panel contains reports that describe the number and type of changes to RecoverPoint components in your environment. To run the Overview, select Change Management > RecoverPoint Change Overview from the RecoverPoint host in the navigation tree. The reports displayed in this control panel are described in Table 156 on page 178.

Table 156

RecoverPoint Change Overview Report Description

RecoverPoint Change Summary Displays the number of components added, deleted, or modified over the time period by component type. RecoverPoint Last Ten Changes Last ten changes in the RecoverPoint environment.

RecoverPoint Change Details

The RecoverPoint Change Details report displays the details of all changes to the RecoverPoint environment over a time period. To run the report, select Change Management > RecoverPoint Change Details from the RecoverPoint host in the navigation tree. Table 157 on page 178 describes the fields displayed in this report.

Table 157

RecoverPoint Change Details Field Server Type Object Change Description Name of the RecoverPoint host. Type of RecoverPoint component that was changed. Name of the component. Type of change: Added Modified Deleted Timestamp for the change.

Noted

178

EMC Data Protection Advisor Version 5.8 Report Reference Guide

RecoverPoint Reporting

Chargeback reports
DPA provides chargeback reports for RecoverPoint that provide a financial cost analysis for the storage operations that have taken place in a customers environment. The chargeback reports use models based on the following inputs:

Size of data protected The amount of data protected by RecoverPoint. Size of data transferred The amount of data replicated from primary storage by RecoverPoint appliances.

A cost based on these storage and transfer metrics is calculated for RecoverPoint hosts and can be charged back to the business unit that is responsible for that client or set of clients. The cost values per data protection and transfer are configured in a chargeback policy, which is then assigned to the RecoverPoint host or subnode. In addition, clients can be assigned a chargeback cost center from the Node Properties dialog box. Chargeback costs can then be totalled against a cost center in reports. If a node is not assigned a cost center, a default cost center is used in reports. The EMC Data Protection Advisor Administration Guide describes how to configure Chargeback Policies for storage. The following reports are available for chargeback reporting on RecoverPoint.

Chargeback Summary

The Chargeback Summary report shows:


Total amount of data protected and transferred. Total cost charged for all data protected and transferred Total overall cost.

This report may be run from a RecoverPoint host in the navigation tree to display the aggregate chargeback costs for all consistency groups configured on that host, or from one or more individual consistency groups. To run the Chargeback Summary report, select Chargeback > Chargeback Summary from the navigation tree.

Chargeback Details

The Chargeback Details reports breaks down the data protected and data transferred costs by server and consistency group. To run the Chargeback Summary report, select Chargeback > Chargeback Details from the navigation tree.

Chargeback reports

179

RecoverPoint Reporting

Configuration reports
Configuration reports display the configuration of components in a RecoverPoint environment. The reports are organized into the following categories:

"Consistency Group Details" on page 180 "Consistency Group Copy Details" on page 181 "Replication Set Configuration" on page 182 "RPA Details" on page 183 "Splitter Details" on page 183

Consistency Group Details

The Consistency Group Details report displays configuration details about consistency groups. To run the report, select Configuration > Consistency Group Details from the navigation tree. Table 158 on page 180 described the fields displayed in this report.

Table 158

Consistency Group Details Report (page 1 of 2) Field Server Name Production Copy Enabled Preferred RPA Reservation Support Compression Enabled Minimize Bandwidth Compression Level Minimize Lag Priority Description Name of the RecoverPoint system host. Name of the consistency group. Name of the production copy. Indication of whether the consistency group is active or not. Name of the RPA preferred to replicate this consistency group. Indication of whether reservation support is configured. Indication of whether compression is enabled. Indication of whether RecoverPoint should preserve bandwidth to maintain lag within its limits. Level of compression to use if enabled. A number between 1 and 10. Indication of whether RecoverPoint should use as much bandwidth as possible to minimize lag. Priority that determines the amount of bandwidth allocated to this consistency group relative to all other consistency groups. Possible values are: IDLE LOW NORMAL HIGH CRITICAL Indication of whether the consistency group should limit the amount of bandwidth it uses. Operating system of the hosts that write to the storage in the consistency group. If the hosts are not all running the same operating system, this value will be mixed.

Bandwidth Limited Hosts OS

180

EMC Data Protection Advisor Version 5.8 Report Reference Guide

RecoverPoint Reporting

Table 158

Consistency Group Details Report (page 2 of 2) Field Global Cluster Mode Description The global cluster mode for the copy group: None Manual Auto-data Auto-quorum (shared data) Manual (shared data) Indication of whether RecoverPoint should be allowed to slow or stop the host application when approaching a policy limit. Indication of whether data should be transferred even when the group is handled by a non preferred RPA. Indication of whether lag should be measured when writes reach the target RPA (as opposed to the journal). Indication of whether the system should optimize the lag for CDP. Indication of whether the CDP copy should perform fast first time initialization. Snapshot granularity for CDP as a text string: Dynamic Fixed per sec Fixed per write The maximum allowed lag size for CDP, if not using system optimization. The maximum allowed lag time for CDP in seconds, if not using system optimization. The maximum lag allowed in number of writes for CDP, if not using system optimization. Indication of whether the system should optimize the lag for CRR. Indication of whether the CRR copy should perform fast first time initialization. The snapshot granularity for CRR as a text string: Dynamic Fixed per sec Fixed per write The maximum allowed lag size for CRR, if not using system optimization. The maximum allowed lag time for CRR in seconds, if not using system optimization. The maximum lag allowed in number of writes for CRR, if not using system optimization.

Allow Regulation Transfer Data with Non Preferred RPA Measure Lag at Remote Appliance CDP System Optimized Lag CDP First Fast Time Init CDP Snapshot Granularity

CDP Lag Size CDP Lag Time CDP Lag Writes CRR System Optimized Lag CRR First Fast Time Init CRR Snapshot Granularity

CRR Lag Size CRR Lag Time CRR Lag Writes

To view the details of the copies that exist for a consistency group, right-click a row in the Consistency Group Details report, and select Consistency Group Copy Details.

Consistency Group Copy Details

The Consistency Group Copy Details report displays details about consistency group copies.

Configuration reports

181

RecoverPoint Reporting

To run the report, select Configuration > Consistency Group Copy Details from the navigation tree. Table 159 on page 182 describes the fields displayed in this report.
Table 159 Consistency Group Copy Details report Field Server Consistency Group Name Site Role Journal Compression Description Name or IP address of the management interface of the RecoverPoint cluster. Name of the consistency group. Name of the copy. Location of the copy. The role of the copy, for example, PRODUCTION, LOCAL REPLICA or REMOTE REPLICA. Level of compression enabled on the journal: None Medium High Time, in seconds, the replica image could be rolled back. Indication of whether the journal lag is set to be unlimited. The maximum journal lag, in megabytes, for a copy. Proportion of journal allocated for target-side log, specified as a percentage. The maximum size, in gigabytes, of the journal. The Reservations Policy to be applied to the Copy: Auto IF SCSI-2 SCSI-3 EMC PowerPath PowerPath (non-auto) Indication of whether the copy should allow distribution of snapshots that are larger than the capacity of the journal volumes.

Required Protection Window Journal Lag Unlimited Max Journal Lag Logged Writes Proportion Journal Size Limit Reservations Policy

Allow Distribution of Snapshots

Replication Set Configuration

The Replication Set Configuration report displays details about replication sets. To run the report, select Configuration > Replication Set Configuration from the RecoverPoint host in the navigation tree.

182

EMC Data Protection Advisor Version 5.8 Report Reference Guide

RecoverPoint Reporting

Table 160 on page 183 describes the fields displayed in this report.
Table 160 Replication Set Configuration report Field Server Name Consistency Group Name Size Description Name or IP address of the management interface of the RecoverPoint cluster. Name of the replication set. Name of the consistency group to which the replication set belongs. Size of the consistency group.

To view the volumes associated with a replication set, right-click a row in the Replication Set Configuration report and select Volume Configuration.

RPA Details

The RPA Details report displays details about RecoverPoint appliances. To run the report, select Configuration > RPA Details from the navigation tree. Table 161 on page 183 describes the fields displayed in this report.
Table 161 RPA Details report Field Server Site Name Status Repository Volume Remote Connection LAN LAN Connection WAN WAN Connection Data Link Volume Connections Description Name or IP address of the management interface of the RecoverPoint cluster. Site at which the RPA is located. Name of the RPA. Status of the RPA. Status of the repository volume. Status of the connection with the remote site. Status of the LAN interface. Status of the local connections. Status of the WAN interface. Status of the WAN connections. Status of data links on the RPA. Status of volume connections on the RPA.

Splitter Details

The Splitter Details report displays details about splitters. To run the report, select Configuration > Splitter Details from the navigation tree. Table 162 on page 184 describes the fields displayed in this report.

Configuration reports

183

RecoverPoint Reporting

Table 162

Splitter details report Field Server Site Name Type Description Name or IP address of the management interface of the RecoverPoint cluster. Site at which the splitter is located. Name of the splitter. Type of splitter: Host Fabric Array Status of the splitter. Status of the connections to the RPA from the splitter. Status of current access to the volume.

Status RPA Connections Volume Access

184

EMC Data Protection Advisor Version 5.8 Report Reference Guide

RecoverPoint Reporting

Performance reports
DPA provides reports that display the performance of consistency groups and RecoverPoint appliances. The performance reports display replication lag in a number of formats, and overall data throughput for consistency groups and RPAs. Performance data allows you to view the utilization trends, which can assist in determining infrastructure requirements or potential service impacts. The following are the performance reports:

"Consistency Group Throughput" on page 185 "Consistency Group Data Lag" on page 185 "Consistency Group Journal Lag" on page 185 "Consistency Group Time Lag" on page 185 "Consistency Group Transaction Lag" on page 185 "RPA Throughput" on page 186 "RPA writes" on page 186 "RPA latency" on page 186 "RPA compression" on page 186

Consistency group performance


Consistency Group Throughput

DPA provides reports on consistency group journal lag, consistency group throughput, and replication lag performance data for transactions, data, and time. The Consistency Group Throughput report displays the peak output rate by megabytes per second by consistency group over time. To run the report, select Performance > Consistency Group Throughput from the navigation tree.

Consistency Group Data Lag

The Consistency Group Data Lag report displays replication data lag by consistency group. To run the report, select Performance > Consistency Group Data Lag from the navigation tree.

Consistency Group Journal Lag

The Consistency Group Journal Lag report displays the journal lag in megabytes by consistency group over time. To run the report, select Performance > Consistency Group Journal Lag from the navigation tree.

Consistency Group Time Lag

The Consistency Group Time Lag report displays replication lag in seconds by consistency group over time. To run the report, select Performance > Consistency Group Time Lag from the navigation tree.

Consistency Group Transaction Lag

The Consistency Group Transaction Lag report displays replication lag in unprocessed transactions by consistency group over time. To run the report, select Performance > Consistency Group Transaction Lag from the navigation tree.

RPA performance

DPA provides reports on the replication performance of RecoverPoint appliances.


Performance reports
185

RecoverPoint Reporting

RPA Throughput

The RPA Throughput report displays the data throughput in megabytes per second broken down by SAN and WAN for each RPA. To run the report, select Performance > RPA Throughput from the navigation tree.

RPA writes

The RPA Writes report displays the number of write operations by RPA over time. To run the report, select Performance > RPA Writes from the navigation tree.

RPA latency

The RPA Latency report displays the replication lag time in milliseconds for data queued on a RecoverPoint appliance. To run the report, select Performance > RPA Latency from the navigation tree.

RPA compression

The RPA Compression report displays the data compression ratio achieved over time against RecoverPoint Appliance CPU utilization. To run the report, select Performance > RPA Compression from the navigation tree.

186

EMC Data Protection Advisor Version 5.8 Report Reference Guide

RecoverPoint Reporting

Resource utilization reports


Resource utilization reports for RecoverPoint include the Journal Utilization report.

Journal Utilization

The Journal Utilization report displays the percentage journal utilization (journal usage of total journal capacity) over time. To run the report, select Resource Utilization > Journal Utilization from the navigation tree.

Resource utilization reports

187

RecoverPoint Reporting

Status reports
Status reports show the current status of the RecoverPoint connections and components. The reports include:

"Fibre Channel Port Status" on page 188 "Network Interface IP" on page 188 "Events Overview" on page 188 "Consistency Group Copy Status" on page 189 "RPA Active Consistency Groups" on page 189 "Volume Details" on page 190

Fibre Channel Port Status

The Fibre Channel Port Status report displays the status of Fibre Channel interfaces in the environment. To run the Fibre Channel Port Status report, select Status > Fibre Channel > Fibre Channel Port Status from the navigation tree. Table 163 on page 188 describes the fields that are included in the Fibre Channel Port Status report.

Table 163

Fibre Channel Port Status Field Hostname Port Sub Name Sub Name 2 WWPN Description Name or IP address of the management interface of the RecoverPoint cluster. Name of the port. Name of the RPA. Name of the site at which the RPA is located. World wide port number for the Fibre Channel port.

Network Interface IP

The Network Interface IP report displays the details of network interfaces on RPAs. To run the report, select Status > Network Interface > Network Interface IP from the navigation tree.

Events Overview

The RecoverPoint Events Overview control panel displays reports that summarize the events that have occurred in a RecoverPoint environment over time. To run the Events Overview report, select, select Status > RecoverPoint > Events Overview from the navigation tree. Table 164 on page 188 displays the reports that are included in the Events Overview control panel.

Table 164

Events overview Report RecoverPoint Event Summary Last Ten Event Details Description Displays the totals by event type for RPAs and consistency groups. Displays details on the ten most recent events in the RPA environment.

188

EMC Data Protection Advisor Version 5.8 Report Reference Guide

RecoverPoint Reporting

Consistency Group Copy Status

The Consistency Group Copy Status report displays the operational status of consistency group copies. To run the report, select, select Status > RecoverPoint > Consistency Group Copy Status from the navigation tree. Table 165 on page 189 describes the fields that are included in the Consistency Group Copy Status report.

Table 165

Consistency Group Copy Status fields Name Server Consistency Group Name Enabled Active RPA Data Transfer Journal State Storage Access Current Protection Window Current Protection Window Status Predicted Protection Window Predicted Protection Window Status Average Compression Link Mode Journal Mode Journal Usage Latest Journal Image Journal Lag Description Name or IP address of the management interface of the RecoverPoint cluster. Name of the consistency group. Name of the copy. Indication of whether the consistency group copy is enabled or disabled. Name of the RPA that is currently active for this copy. Status of Data Transfer for this copy (for example, ACTIVE). Current state of journal (for example, DISTRIBUTING IMAGES TO STORAGE). Current status of access to the storage for this copy (for example, DIRECT ACCESS, or NO ACCESS). Time duration of the current protection window, for example, 1 hour 35 minutes. Status of the current protection window. Predicted protection window value, for example, 1 hour 35 minutes. Predicted protection window status. Average compression achieved, in MB/sec. Link mode for CDP and CRR operations, for example, CONTINUOUS, or CONTINUOUS ASYNC. Journal mode, for example, NORMAL. Current size, in gigabytes, of the journal. A timestamp of the most recent image. Size, in megabytes, of the journal lag.

RPA Active Consistency Groups

The RPA Active Consistency Groups report displays all of the consistency groups that are currently active for each RPA. To view the copies that exist for active consistency groups on an RPA: 1. Right-click a row in the RPA Active Consistency Groups report.

Status reports

189

RecoverPoint Reporting

2. Select Consistency Group Copy Status Details.

Volume Details

The Volume Details report shows the details of volumes managed by a RecoverPoint system. Table 166 on page 190 displays the reports that are included in the Volume Details report. To view the report, select Status > RecoverPoint > Volume Details from the navigation tree.

Table 166

Volume Details fields Name Server Name ID Vendor Product Model Size Consistency Group Copy Replication Set Volume Type Description Name or IP address of the management interface of the RecoverPoint cluster. Name of the volume. Identifier for the volume. Name of the vendor. Name of the product. Model of the volume. Size, in gigabytes, of the volume. Consistency group associated with the volume. Copy of the consistency group. Replication set associated with the volume. If the volume is a Journal, this value will be NULL. One of: Replication Set Journal Repository

190

EMC Data Protection Advisor Version 5.8 Report Reference Guide

9
EMC File Storage Reporting

Reports are organized into the following categories:


Running reports for EMC File Storage...................................................................... 192 Asset Management reports ......................................................................................... 193 Capacity planning reports .......................................................................................... 199 Change management reports ..................................................................................... 200 Configuration reports .................................................................................................. 201 Performance reports..................................................................................................... 207 Status reports ................................................................................................................ 210 Troubleshooting reports .............................................................................................. 214

EMC File Storage Reporting

191

EMC File Storage Reporting

Running reports for EMC File Storage


DPA provides the ability to monitor EMC File Storage Appliances. Monitoring any file server requires additional licensing beyond that which is included in the standard DPA license. For more information on how to obtain licenses for EMC File Storage reporting, contact an EMC Account Manager or Customer Support Engineer. When EMC File Storagemonitoring is enabled within DPA, file servers are displayed in the navigation tree under Storage with a node type of EMC File Storage. The navigation tree under the file server expands to display all of the subcomponents of the appliance. Some of the reports for EMC File Storage can be run only from one of the Data Mover, disk array, or filesystem nodes underneath the host node.

192

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC File Storage Reporting

Asset Management reports


Asset management reports show the physical configuration of a file server, including the following components:

"Disks" on page 193 "Disk arrays" on page 194 "Fibre Channel ports" on page 194 "Filesystems" on page 195 "Cards" on page 195 "Hosts" on page 195 "iSCSI Adapters" on page 196 "LUNs" on page 196 "Memory" on page 197 "Network Interface" on page 197 "Processor" on page 198

Different reports are available from the different components of a EMC File Storage. For example, to view the configuration for disk arrays on a EMC File Storage, select the Disk Array Configuration report from the EMC File Storage itself in the navigation tree. To view the configuration details for individual disks in a disk array, select the Disk Summary or Disk Configuration report from the Disk Array subnode under the EMC File Storage.

Disks
Table 167

Table 167 on page 193 describes the Disk Configuration reports.


Disk Configuration reports Report Disk Summary Disk Configuration Disk Array Configuration Description Summarizes the total number of disks on a file servers and the amount of storage capacity configured. Displays configuration information on each disk on a file server. Displays configuration information on disk arrays.

To run the Disk Summary report, select Asset Management > Disk > Disk Summary from the navigation tree. To run the Disk Configuration report, select Asset Management > Disk > Disk Configuration from the navigation tree. Table 168 on page 193 describes the fields that display for he disks configured on a file server in the Disk Configuration report.
Table 168 Disk Configuration fields (page 1 of 2) Field Hostname Device Manufacturer Description Name of the host on which the disk resides. Identifier for the disk from the operating system. Manufacturer of the disk.

Asset Management reports

193

EMC File Storage Reporting

Table 168

Disk Configuration fields (page 2 of 2) Field Model Serial Number Firmware Revision Size Enclosure Disk Number Bus Description Model of the disk. Serial number of the disk. Firmware version of the disk. Size of the disk in gigabytes. Identifier for the enclosure containing the disk. Disk number for the enclosure (015). Identifier for the disk bus.

Disk arrays

To run the Disk Array Configuration report, select Asset Management > Disk Array > Disk Array Configuration from the navigation tree. Table 169 on page 194 describes the disks configured on a file server as shown in the The Disk Array Configuration report.
Table 169 Disk Array Configuration Field Hostname Disk Array Name Manufacturer Model Firmware Volume Delay Num Devices Cache Page Size High Watermark Low Watermark Num Disks Num RAID groups Num Storage Groups Unassigned Cache Pages Num visible devices Description Hostname or IP address of the EMC File Storage. Identifier for the array. Manufacturer of the array. Model number of the array. Version of software of the array. Volume Repair Delay parameter. Number of logical devices. Size, in kilobytes, of cache page. Percentage of dirty pages to trigger a cache flush. Percentage of dirty pages to stop a cache flush. Number of physical disks that the array holds. Number of RAID groups that the array holds. Number of storage groups. Number of unassigned cache pages. Number of visible devices.

Fibre Channel ports

To run the Fibre Channel Port Configuration report, select Asset Management > Fibre Channel > Fibre Channel Port Configuration from the navigation tree. The

194

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC File Storage Reporting

report displays the information on the HBA configuration as described in Table 170 on page 195.
Table 170 Fibre Channel Port Configuration Field Hostname Port WWPN Description Host on which the HBA is configured. Identifier for the HBA. World Wide Port Name associated with the HBA.

Filesystems

For information on the configuration of filesystems on a file server, select Asset Management > Filesystem > Filesystem Configuration Summary from the navigation tree. The Filesystem Configuration Summary report displays the number of filesystems and total capacity in gigabytes for a EMC File Storage host. To view information on the hardware cards installed on a EMC File Storage, select Asset Management > Hardware > Card Configuration from the navigation tree to run the Card Configuration report. Table 171 on page 195 describes the HBA configuration information as shown in the report.
Table 171 Card configuration fields Field Node Sub Name Adaptor Type Serial Firmware Version Signature Memory Read Cache Write Cache Buffer size Description Name of EMC File Storage host node. Name of storage array. Identifier for the adaptor. Type of hardware adaptor Serial number of the adaptor. Firmware version of the adaptor. Unique number assigned to the Storage Processor by the manufacturer. Amount of memory on the card. Size of the card read cache. Size of the card write cache. Size of the buffer.

Cards

Hosts

To view information on the type of operating system and the version that is running on a file server, select Asset Management > Host > Host Configuration from the

Asset Management reports

195

EMC File Storage Reporting

navigation tree to run the Host Configuration report. Table 172 on page 196 describes the fields that are displayed in the Host Configuration report.
Table 172 Host Configuration report Field Host Id Hostname Vendor Sub Name Product OS Class Version Description Identifier or serial number of the host. The system ID for a file server is returned for this field. Name of the host. Vendor of the operating system, for example, EMC. Name of the Data Mover. Name of the product, for example, FAS760, R200. Class of operating system (for example, Appliance). Specific version of the operating system, for example, version 7.0.2, 6.5.2R1P9.

iSCSI Adapters

The iSCSI Adapter Configuration report provides details of any iSCSI adapters on the file server. As iSCSI adapters are logical entities on top of real network interfaces, the only information provided is the name of each adapter. To run the iSCSI Adapter Configuration report, select Asset Management > iSCSI > iSCSI Adapter Configuration from the navigation tree.

LUNs

The LUN Configuration report provides details of LUNs on the EMC File Storage. To run this report, select Asset Management > LUN > LUN Configuration from the navigation tree. Table 172 on page 196 describes the fields that display in this report.
Table 173 LUN configuration (page 1 of 2) Field Node Sub Name Name System Type LUN ID Size (GB) Serial Type Description Idle Delay Time (seconds) Idle Threshold Description Name of the EMC File Storage host node. Name of the storage array. Name of the LUN. Type of system, for example, CLARiiON. Identifier for the LUN. Size, in gigabytes, of the LUN. Serial number of the LUN. Type of LUN. User description of a LUN. Time, in seconds, spent idle waiting for a task. Maximum time spent idle before idle threshold action.

196

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC File Storage Reporting

Table 173

LUN configuration (page 2 of 2) Field Max Prefetch (KB) Prefetch Disable Prefetch Idle Count Description Maximum number of pages read ahead. Reading ahead is disabled. Maximum number of pages read ahead while idle.

Memory

The Memory Configuration report displays the total amount of physical memory and the total amount of virtual memory configured on the selected nodes. To run this report, select Asset Management > Memory > Memory Configuration from the navigation tree.

Network Interface

Detailed information on the configuration of network interfaces on a file server can be seen by running the Network Interface Configuration report. To run this report, select Asset management > Network Interface > Network Interface Configuration from the navigation tree. Table 174 on page 197 describes the fields that display in this report.

Table 174

Network Interface configuration report Field Hostname Sub Name Interface Description MAC Address MTU (B) Auto Neg Description Name of the host on which the network interface is located. Name of the storage array. Identifier for the network interface. Description of the interface type. Ethernet address for the network interface. Maximum transmission unit. Indication of whether the interface is set to autonegotiate with a switch.

Asset Management reports

197

EMC File Storage Reporting

Processor

Run the Processor Configuration report to view details on Data Mover processors, including the name, model, speed, and bus speed. To run the report, select Asset Management > Processor > Processor Configuration from the navigation tree.

198

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC File Storage Reporting

Capacity planning reports


The Capacity planning category provides reports that help users perform better capacity planning for growth in the environment. Table 175 on page 199 describes the utilization reports available.
Table 175 Capacity planning reports Report Utilization Node Utilization Aggregate Utilization Snapshot Utilization Description Displays the utilization of all filesystems on a file server or group of file servers over time. When run from a group node, displays the average filesystem utilization on each file server over time. Displays the aggregate filesystem utilization over time of all filesystems and across all file servers selected in the report. Displays the percent utilization of the allocated snapshot space.

To run these reports, select Capacity Planning > report from the navigation tree.

Capacity planning reports

199

EMC File Storage Reporting

Change management reports


Change management reports provide details on changes that have occurred on key configuration settings and files on a file server.

EMC File Storage Changes Overview

The EMC File Storage Changes Overview control panel shows the summary of changes (objects added, deleted, or modified) over the time period, and the last ten changes made in the EMC File Storage environment. To view the control panel, select Change Management > EMC File Storage Change Overview from the EMC File Storage host in the navigation tree. To view more details on environment changes, click All Changes to display the Configuration Change Details report.

EMC File Storage Change Details

The EMC File Storage Change Details report shows the object type, identifier, and change type (addition, deletion, or modification) for all changes by host and storage array. To run the Configuration Change Details report for EMC File Storage, select Change Management > EMC File Storage Change Details from the EMC File Storage in the navigation tree.

200

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC File Storage Reporting

Configuration reports
The Configuration category contains reports that detail the configuration of a EMC File Storage. The reports are grouped as follows:

"EMC File Storage" on page 201 "Fileserver Exports" on page 203 "Filesystem" on page 203 "iSCSI Portals" on page 206 "Imported and Exported LUNs" on page 206 "Shared Memory" on page 206

EMC File Storage


Data Mover

The EMC File Storage reports describe the configuration of Data Movers, storage pools, and volumes configured on the EMC File Storage. The Data Mover Configuration report shows the configuration of Data Movers on a EMC File Storage. To run the report, select Configuration > EMC File Storage > Data Mover Configuration in the navigation tree. Table 176 on page 201 displays the fields that display in this report.
Data Mover Configuration Field Server Data Mover Name Slot Role Unicode NTP servers Failover Policy Description Name or IP Address of the EMC File Storage. Logical name of Data Mover. Slot on EMC File Storage unit. Role of the Data Mover. Internationalization mode of the server if Unicode (or ASCII). IP addresses of NTP server hosts that the Data Mover uses to synchronize. Failover policy: None Manual Auto Retry List of Data Movers for which this Data Mover is a standby. List of standby Data Movers for this Data Mover.

Table 176

Standby For Standbys

Storage Pool

The Storage Pool Configuration report displays the configuration and options set for storage pools configured on a EMC File Storage.

Configuration reports

201

EMC File Storage Reporting

To run the report, select Configuration > EMC File Storage > Storage Pool Configuration from the EMC File Storage host or filesystem in the navigation tree. The fields in the report are described in Table 177 on page 202.
Table 177 Storage Pool Configuration Report Field Server Storage Pool Name Pool ID Description Disk Type Capacity (GB) Used Size (GB) Auto Size (GB) Description Hostname or IP address of the EMC File Storage that is being monitored. Name for the storage pool. Identifier for the storage pool. Description of the pool. Disk type used by the pool. Capacity, in gigabtyes, of the storage pool. Used space, in gigabtyes, of the storage pool. Indication of whether the storage pool is set to extend automatically. If enabled, the pool automatically extends with the unused disk volumes of the same profile, if available. Indication of whether a storage pool automatically attempts to grow or shrink member volumes. Indication of whether a storage pool attempts to create new member volumes before using existing space from current member volumes.

Dynamic Greedy

Volumes

The Volume Configuration report displays details on the volumes configured on a EMC File Storage. To run the report, select Configuration > EMC File Storage > Volume Configuration from the EMC File Storage host in the navigation tree. The fields in the report are described in Table 178 on page 202.

Table 178

Volume Configuration Report Field Server Volume Name Volume Type Description Hostname or IP Address of the EMC File Storage being monitored. Name of the EMC File Storage volume. One of the following: Disk Slice Stripe Meta Pool Size, in gigabytes, of the volume. Identifier for the volume. Storage pool associated with the volume. Storage system on which the volume is located.

Volume Size (GB) Volume ID Storage Pool Storage System

202

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC File Storage Reporting

Table 178

Volume Configuration Report Field LUN Disk Type Stripe Size (MB) Description Name of the LUN on the storage system to which the disk-based volume is mapped. Only populated for disk-based volumes. Type of disk volume. Size, in megabytes, of the stripe volume.

Virtual Data Movers

The Virtual Data Mover Configuration report displays the names of all the virtual Data Movers configured on a EMC File Storage. To run the report, select Configuration > EMC File Storage > Virtual Data Movers from the EMC File Storage host in the navigation tree.

Fileserver Exports

The Fileserver Exports report provides details of filesystems that are exported from a file server. To run this report, select Configuration > Fileserver > Fileserver Exports from the navigation tree. Table 179 on page 203 describes the fields in this report.

Table 179

Fileserver Exports Report Field Node Sub Name Name Export Type SetUID Permission Dedup Enabled Replication Enabled Backup Window Backup Window Start Time Backup Window End Time Description Name of the EMC File Storage host. Identifier for the storage array. Name of the filesystem to be exported. Name by which the filesystem is being exported. Type of export (CIFS or NFS). Indication of whether the SetUID flag is supported on the export (NFS only). Permissions on the export. Indication of whether deduplication is enabled on the export. Indication of whether replication is enabled on the export. Identifier for the backup window in which the export takes place. Start time for the backup window. End time for the backup window.

Filesystem

The filesystem reports can be run from the EMC File Storage to show details of all filesystems across the EMC File Storage, or run from individual Data Movers.

Configuration reports

203

EMC File Storage Reporting

The Filesystem Configuration report contains all of the settings for filesystems configured on a EMC File Storage. Table 180 on page 204 describes the fields in this report.
Table 180 Filesystem Configuration Report Field Hostname Filesystem Device Type Capacity Allocated Snapshot Capacity Description Name of the filesystems host. Name of the filesystem. Device name of the operating system for the filesystem, for example, /dev/vol0. Type of filesystem, for example, wafl.Qtree. Capacity of the filesystem. Total amount of space allocated for the Qtrees in a given volume. Amount of space in the volume that is reserved for storing snapshot data. If the total amount of data stored for snapshots is higher than the amount of space reserved for snapshots, additional space is claimed from the volume itself. Indication of whether the filesystem is temporarily unavailable. User NT credentials, where system matches UNIX UID/GID to Windows SID to create single common credential called an NT credential. Indication that the file performing read-ahead processing. Indication that the filesystem is read-only. Permission that allows well-formed writes to be sent directly to disk without being cached on the server. Indication of whether the virus checker protocol is enabled. Access checking policy: NT UNIX SECURE NATIVE MIXED MIXED_COMPAT All writes (through CIFS) to EMC File Storage are synchronous. Lock policy for the filesystem: nolock wlock rlock Notification to client of changes made to the directory structure. Notification to client when the filesystem is accessed. Notification to client when the filesystem is modified. Oppurtunistic locks are enabled. Number of subdirectories where change notification is applied.

Disabled NT credential

Prefetch Read only Uncached Virus scan Access policy

CIFS sync write Lock policy

CIFS notify CIFS notify on access CIFS notify on write CIFS op locks CIFS trigger level

204

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC File Storage Reporting

Filesystem Mounts

The Filesystem Mount Configuration report displays the configuration options for filesystems that are mounted on a EMC File Storage. To run the report, select Configuration > Filesystem > Filesystem Mount Configuration from the EMC File Storage host or filesystem in the navigation tree. Table 181 on page 205 describes the fields in this report.

Table 181

Filesystem Mount Configuration Report (page 1 of 2) Field Hostname Data Mover Filesystem Mount Point Disabled NT Credential Description Name or IP address of the EMC File Storage. Name of the Data Mover hosting the filesystem. Name of the filesystem. Pathname of the new mount. Indication of whether the filesystem mount is disabled. Indication of whether the EMC File Storage Network Server takes account of a user's Windows group memberships when checking an ACL for access through NFS. Indication of whether prefetch processing is enabled. Indication of whether the mount is read-only on the Data Mover. Indication of whether well-formed writes are sent directly to the disk without being cached on the server. Enabling this option improves performance for applications such as databases that have many connections to a large file. Indication of whether the virus checker protocol is enabled. Access-checking policy for the filesystem. The default policy is NATIVE. Access-checking policies apply only when the Data Mover's user authentication is set to the recommended default, NT. An access-checking policy defines the file and directory permissions that are applied (UNIX mode bits, Windows ACLs, or both) when a user attempts to access a filesystem in a mixed NFS and CIFS environment. The policies are: NT UNIX NATIVE SECURE MIXED MIXED_COMPAT Indication of whether the EMC File Storage Network Server performs immediate, synchronous writes to the disk, independent of the CIFS write protocol option. Policy for the locking behavior of NFSv2 and NFSv3 clients when accessing files locked by NFSv4 or CIFS clients: nolock, writelock, or rwlock. The default is nolock. Indication of whether CIFS client notification is enabled for changes made to the directory file structure in the filesystem. Indication of whether CIFS client notification is enabled whenever a user accesses the filesystem

Prefetch Read Only Uncached

Virus Scan Access Policy

CIFS Sync Write

Lock Policy

CIFS Notify CIFS Notify on Access

Configuration reports

205

EMC File Storage Reporting

Table 181

Filesystem Mount Configuration Report (page 2 of 2) Field CIFS Notify on Write CIFS Op Locks CIFS Trigger Level Description Indication of whether CIFS client notification is enabled whenever a user writes to the filesystem. Indication of whether opportunistic lock granting for CIFS client access is enabled on the filesystem. Specifies the deepest directory level to which the notification settings apply to the filesystem. The default setting is 512.

Filesystem-to-LUN Mapping

DPA visually represents the mapping between filesystems and back-end storage on the EMC File Storage in a topology graph, which allows users to identify where disks are shared across filesystems. The Filesystem to LUN Mapping report displays this topology. To run the report, select Configuration > Filesystem > Filesystem to LUN Mapping from the navigation tree.
Note: Unlike other report types, topology reports cannot be e-mailed, printed, or saved.

iSCSI Portals

The iSCSI Portal Status report displays information on the configuration of iSCSI adapters, including the adapter ID, IP address, and port number. To run this report, select Configuration > iSCSI > iSCSI Portal from the navigation tree.

Imported and Exported LUNs

The Imported LUNs report displays information on any LUNs that are imported to the selected nodes as disks. To run this report, select Configuration > LUN > Imported LUNs from the navigation tree. The Exported LUNs report displays information on any LUNs that are exported from the selected nodes as disks. To run this report, select Configuration > LUN > Exported LUNs from the navigation tree.

Shared Memory

The Shared Memory configuration report shows the physical memory available to each Data Mover managed by a EMC File Storage Server. To run this report, select Configuration > Memory > Shared Memory Configuration from the navigation tree.

206

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC File Storage Reporting

Performance reports
Performance reports are available for the following categories on a EMC File Storage:

"System Utilization Overview" on page 207 "Fileserver" on page 207 "Filesystem performance reports" on page 208 "LUN performance overviews" on page 208 "Shared Memory" on page 206 "Network interface performance reports" on page 209 "Processor reports" on page 209

System Utilization Overview

DPA provides a system utilization overview control panel that displays the aggregate utilization for processors, memory, and network interfaces for a EMC File Storage. To run the report, select Resource Utilization > System Resource Utilization from the navigation tree.

Fileserver

DPA provides reports that show the total number of inputs and outputs, and the amount of data that passes through a Data Mover. These reports allow administrators to view the workload on each Data Mover. Table 182 on page 207 describes the reports that analyze file server performance.
Table 182 Fileserver Performance Reports Report Description

Fileserver Performance Summary Provides a summary of the: Average number of read and write operations. Average amount of data transferred. Average transfer size for the time period. The results are broken out by each protocol (CIFS/NFS) that is being used to access data. Fileserver Operations Contains three reports that provide visibility into the number of IO operations occurring on a Data Mover over time. The first report displays the total number of operations taking place on the Data Mover over time. The second report shows how that traffic is split between the NFS and CIFS protocols. The third report shows the data broken down by read operation and write operation each protocol. Contains three reports that provide visibility into the amount of data that passes through a Data Mover over time. The first report shows the total throughput through the Data Mover. The second report shows how that traffic is split between the NFS and CIFS protocols. The third report shows how much data is being read versus written for each protocol. Displays the average read and write response times over time for NFS and CIFS operations.

Fileserver Throughput

File Server Average Response Times

Performance reports

207

EMC File Storage Reporting

To run these reports, select Performance > Fileserver > report from the navigation tree.

Filesystem performance reports


Table 183

DPA provides reports that show the performance characteristics of each filesystem as data is accessed. Table 183 on page 208 describes the filesystem performance reports.

Fibre Channel Reports Report Description

Filesystem Performance Summary Provides a summary for each filesystem of the average amount of data transferred, the average number of operations, and the average size of read and write transactions for the time period. Filesystem Operations Shows for each filesystem the total number of operations and the total number of read and write operations that have occurred over time. This report allows an administrator to see the type of operations that are occurring on each filesystem over time. Shows for each filesystem the total amount of data transferred, and the total amounts of read and write traffic over time. This report allows an administrator to identify times at which there are heavy read or write traffic on a filesystem.

Filesystem Throughput

To run these reports, select Performance > Filesystem > report from the navigation tree.

LUN performance overviews

DPA provides a LUN Performance Overview control panel that summarizes the data throughput and read/write activity for LUNs configured on EMC File Storage. Table 184 on page 208 describes the reports contained in the LUN Performance Overview control panel.
LUN performance overview Report Total Data Total Ops Read Data vs Write Data per LUN Read vs Write Ops per LUN Description Displays the total data throughput in megabytes per second by LUN over time. Displays the total number of operations per second by LUN over time. Displays the data read versus data written in megabytes per second by LUN over time. Displays the number of read operations versus write operations per second by LUN over time.

Table 184

To view the control panel, select Performance > LUN > LUN Performance Overview.

Memory utilization

The Memory Utilization report shows the memory utilization and memory in use over time for a Data Mover. To run this report, select Performance > Memory > Memory Utilization from the navigation tree.

208

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC File Storage Reporting

Network interface performance reports


Table 185

The network interface performance reports on a file server are described in Table 185 on page 209.
Network performance reports Report Interface Utilization Summary Description Provides two reports that show the maximum and average throughputs for all network interfaces by server, and the network interface performance by interface. Displays the amount of data per second, and the number of packets per second that are transferred through each network card on the file server or group of file servers. When run from a group node, displays the aggregate network interface performance data on each file server in the group, by adding together the total performance of all network interfaces on that file server. Displays the aggregate performance of all network interfaces on all file servers from which the report has been run.

Network Interface Performance by Interface Network Interface Performance by Node

Aggregate Network Interface Performance

To run a network performance report, select Performance > Network Interface > report on the navigation tree.

Processor reports

To run reports on overall CPU utilization on a file server, select Resource Utilization > Processor from the navigation tree. Table 186 on page 209 describes the Processor reports.
Processor reports Report Processor Utilization by CPU Processor Utilization by Node Description Displays the utilization of each individual CPU on a file server or group of file servers over time. When run from a group node, this report displays the average CPU utilization on a file server over time by averaging the utilization across on all processors on that file server. Displays the aggregate processor utilization over time of all processors across all file servers selected in the report.

Table 186

Aggregate Processor Utilization

Performance reports

209

EMC File Storage Reporting

Status reports
Status reports display a detailed status of a component at a given point in time. Status reports are grouped as follows:

"Disk status" on page 210 "Fibre Channel Port Status" on page 210 "Filesystem status reports" on page 210 "Host Status" on page 212 "EMC File Storage Card Status" on page 212 "LUN Status" on page 212 "Network interface reports" on page 213 "Processor Status" on page 213

Disk status

The Disk Status report contains information on the status of disks on a file server. Table 187 on page 210 describes the fields in this report. To run this report, select Status > Disk > Disk Status from the navigation tree.
Table 187 Disk Status report fields Field Node Device Size (GB) State Allocated (GB) Description Name of the file server on which the disk is configured. Identifier for the disk. Total capacity of the disk. Indication of whether the disk is OK. Usage of the disk in gigabytes.

Fibre Channel Port Status

The Fibre Channel Port Status report displays the status of Fibre Channel interfaces configured on a file server. To run this report, select Status > Fibre Channel > Fibre Channel Port Status from the navigation tree. Table 188 on page 210 describes the fields in this report.

Table 188

Fibre Channel Port Status report fields Field Hostname Port Link Active Speed Description Name of the file server that is being monitored. Identifier for the Fibre Channel interface. Indication of whether the interface has a connection with another device. Current speed at which the interface is running.

Filesystem status reports

DPA provides information on filesystems, quotas, and snapshots.

210

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC File Storage Reporting

Filesystem Configuration Summary

The Filesystem Summary report shows the total capacity and number of filesystems for a EMC File Storage. To run this report, select Status > Filesystem > Filesystem Summary from the navigation tree. The Filesystem Status report shows the capacity, used space, and utilization for individual filesystems. To run this report, select Status > Filesystem > Filesystem Status from the navigation tree.

Filesystem Status

Snapshot Status

The Snapshot Status report displays details on filesystem checkpoints created by EMC File Storage. To run the report, select Status > Filesystem > Snapshot Status. Table 189 on page 211 describes the fields in this report.

Table 189

Snapshot status report fields Field Filesystem Server Checkpoint ID Checkpoint Name Checkpoint Time State Filesystem Size (GB) Description Filesystem that was copied. Server that made the copy. Identifier for the checkpoint. Name of the checkpoint. Time checkpoint was made. Indication of whether the checkpoint is active. Size, in gigabytes, of the filesystem copy.

Quota status

The Quota Status report displays the details of quotas configured for filesystems on a EMC File Storage. To run the report, select Status > Filesystem > Quota Status from the navigation tree. Table 190 on page 211 describes the fields in this report.

Table 190

Quota status report fields Field Server Filesystem Path Files Used File Hard Limit File Utilization (%) Space Used Space Hard Limit (MB) Space Utilization (%) Status Name or IP address of the EMC File Storage Network Server. Description of the filesystem. Path of the tree. Number of files used on the tree. Number of files remaining after a file soft-limit breach but before the file hard-limit condition is triggered. Ratio of files used to a files hard limit. Amount of space used on the tree. Amount of space remaining after a space soft-limit breach but before the space hard-limit condition is triggered. Ratio of space used to a space hard limit as a percentage.

Status reports

211

EMC File Storage Reporting

Host Status

The Host Status report indicates the last time a file server rebooted. To run the report, select Status > Host > Host Status from the navigation tree.

EMC File Storage Card Status

The Card Status report provides status details of hardware cards installed on a EMC File Storage. To run this report, select Status > Hardware > Card Status from the navigation tree. Table 191 on page 212 describes the fields in this report.

Table 191

Card status report fields Field Node Sub name Adaptor State Used Memory Size Read Cache State Write Cache State Description Hostname or IP address of the EMC File Storage host. Name of the storage array. Label for the adaptor Operational state of the adaptor. Size in megabytes of memory in use. State of the read cache. State of the write cache.

LUN Status

The LUN Status report provides details of the LUNs that exist on a EMC File Storage. To run this report, select Status > LUN > LUN Status from the navigation tree. Table 192 on page 212 describes the fields in this report.
Table 192 LUN Status report fields (page 1 of 2) Field Node Sub Name Name Online Mapped Num Copies State No Single Point of Failure Auto Assignment Auto Trespass Private Description Hostname or IP address of the EMC File Storage host. Name of the storage array. Name of the LUN. Indication of whether the LUN is online. Indication of whether the LUN is mapped to any endpoints. Number of copies that exist of the LUN. Online state of the LUN. Indication of whether no single point of failure exists for the LUN. Indication of whether auto assignment is configured on the LUN. Indication of whether auto trespass is configured on the LUN. Indication of whether the LUN is private.

212

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC File Storage Reporting

Table 192

LUN Status report fields (page 2 of 2) Field Read Cache Variable Length Prefetch Write Cache Description Indication of whether a read cache is enabled on the LUN. Indication of whether variable length prefetching is enabled for the LUN. Indicate if a write cache is enabled on the LUN.

Network interface reports


Table 193

The reports that display the status of network interface cards (NICs) on a file server are described in Table 193 on page 213.
Network Interface reports Report Network Interface IP Network Interface Link Pair Auto negotiation Status Description Displays the settings for the Network Interface IP address. If gathering information from switches and from file servers, this report displays: Port on the switch to the interface card is linked. Auto negotiation settings on both sides of the link.

To run the Network Interface Status reports, select Status > Network Interface > report name from the navigation tree.

Memory Status

The Memory Status report shows the total and used amount of memory on Data Movers. To run the report, select Status > Memory > Memory Status from the navigation tree to run the Memory Status report.

Processor Status

The Processor Status report shows the total number of CPUs that are online and offline on the file server. To display the status of CPUs on a file server or group of file servers, select Status > Processor > Processor Status from the navigation tree to run the Processor Status report.

Status reports

213

EMC File Storage Reporting

Troubleshooting reports
Troubleshooting reports allow users to report on errors that have been detected on network interface cards on a file server. Table 194 on page 214 describes the reports that display errors on network interface cards.
Table 194 Troubleshooting reports Report Network Interface Errors by Interface Aggregate Network Interface Errors Description Displays the errors on each individual network interface on a file server or group of file servers over time. Displays the total number of network interface errors over time across all file servers selected in the report.

To run one of these reports, select Troubleshooting > Network Interface from the navigation tree.

214

EMC Data Protection Advisor Version 5.8 Report Reference Guide

10
NetApp Reporting

There are a number of reports that can be run against NetApp file servers. Reports are organized into the following categories:

Running reports for a NetApp file server................................................................. 216 Asset management reports ......................................................................................... 217 Capacity planning reports .......................................................................................... 222 Change management reports ..................................................................................... 223 Configuration reports .................................................................................................. 224 Licensing reports .......................................................................................................... 227 Performance reports..................................................................................................... 228 Resource utilization reports........................................................................................ 231 Status reports ................................................................................................................ 233 Troubleshooting reports .............................................................................................. 238

NetApp Reporting

215

NetApp Reporting

Running reports for a NetApp file server


DPA provides the ability to monitor NetApp file servers. The monitoring of file servers requires additional licensing beyond that which is included in the standard DPA license. For more information on how to obtain licenses for NetApp reporting, contact an EMC Account Manager or Customer Support Engineer. The NetApp module is also capable of gathering data on all Snap Vault and OSSV backups that have taken place on a file server. If monitoring Snap Vault and OSSV backups, it is possible to run the same backup-related reports as for any other backup application. When file server monitoring is enabled within DPA, file servers are displayed in the navigation tree with a node type of NetApp. The navigation tree under the file server expands to display a number of components of the file server. NetApp dynamic nodes include filesystems (both volumes and Qtrees), disks, network interfaces, and Fibre Channel ports.

216

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Reporting

Asset management reports


Asset management reports show the physical configuration of a file server, including the following components:

"Disks" on page 217 "Fibre Channel ports" on page 218 "Filesystems" on page 218 "Hosts" on page 219 "iSCSI Adapters" on page 220 "LUNs" on page 220 "Memory" on page 220 "Capacity and disk overviews" on page 220 "Network Interface" on page 221

Disks
Table 195

The Disk Configuration reports are described in Table 195 on page 217.
Disk Configuration reports Report Disk Summary Disk Configuration Disk Array Configuration Description Summary of the total number of disks on a file server and the amount of storage capacity configured. Displays configuration information on each disk on a file server. Displays configuration information on disk arrays on a file server.

To run the Disk Summary report, select Asset Management > Disk > Disk Summary from the navigation tree. To run the Disk Configuration report, select Asset Management > Disk > Disk Configuration from the navigation tree. The Disk Configuration report contains the information on the disks configured on a file server as described in Table 196 on page 217.
Table 196 Disk Configuration fields Field Hostname Device Manufacturer Model Serial Number Firmware Revision Size (GB) Description Name of the host on which the disk resides. Identifier for the disk from the operating system. Manufacturer of the disk. Model of the disk. Serial number of the disk. Firmware version of the disk. Size, in gigabytes, of the disk.

The Disk Array Configuration report contains the information on the disks configured on a file server.

Asset management reports

217

NetApp Reporting

To run the Disk Array Configuration report, select Asset Management > Disk > Disk Array Configuration from the navigation tree. Table 197 on page 218 describes the fields that are displayed in this report.
Table 197 Disk Array Configuration Field Host Name Disk Array Name Manufacturer Model Firmware Num Devices Cache Page Size High Watermark Low Watermark Num Disks Num RAID Groups Num Storage Groups Unassigned Cache Pages Num visible Devices Description Hostname or IP address of the file server. An identifier for the array. Manufacturer of the array. Model number of the array. Version of software of the array. Number of logical devices. Size, in kilobytes, of cache page. Percentage of dirty pages to trigger a cache flush. Percentage of dirty pages to stop a cache flush. Number of physical disks array holds. Number of RAID groups array holds. Number of storage groups. Number of unassigned cache pages. Number of visible devices.

Fibre Channel ports

The Fibre Channel Port Configuration report displays information on the HBA configuration. To run the Fibre Channel Port Configuration report, select Asset Management > Fibre Channel > Fibre Channel Port Configuration from the navigation tree. Table 198 on page 218 describes the fields that are displayed in this report.

Table 198

Fibre Channel Configuration Field Hostname Port WWPN Description Host on which the HBA is configured. Identifier for the HBA. World Wide Port Name associated with the HBA.

Filesystems

For detailed information on the configuration of filesystems on a file server, select Asset management > Filesystem > Filesystem Configuration from the navigation tree to run the Filesystem Configuration report.

218

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Reporting

Table 199 on page 219 describes the fields that are displayed in this report.
Table 199 Filesystem Configuration report Field Hostname filesystem Device Type Capacity (MB) Allocated (MB) Snapshot Capacity (MB) Description Name of the filesystems host. Name of the filesystem. Device name of the operating system for the filesystem (for example, /dev/vol0). Type of filesystem (for example, wafl.Qtree). Capacity, in megabytes, of the filesystem. Total amount of space, in megabytes, allocated for the Qtrees in a given volume. Amount of space, in megabytes, in the volume that is reserved for storing snapshot data. If the total amount of data stored for snapshots is higher than the amount of space reserved for snapshots, additional space is claimed from the volume itself.

To display the physical disks to which each filesystem is mapped, select Asset Management > Filesystem > Underlying Disk Details from the navigation tree to run the Underlying Disk Details report. The Filesystem Details report displays usage data such as allocated space, used space, and volume space reservation guarantee that displays true space wastage. The Volume Guarantee field contains the following values:

Volume, which indicates that all capacity for this volume is preallocated. File, which indicates that no capacity for this volume is preallocated. Capacity is allocated as required for storage of data, with the exception of LUNs and sparse files where the capacity is fully allocated on creation. None, which indicates that no capacity for this volume is preallocated. Capacity is allocated as required for storage of data.

Hosts

To view information about the data OnTAP version that is running on a NetApp file server, select Asset Management > Host > Host Configuration from the navigation tree to run the Host Configuration report. Table 200 on page 219 describes the fields that are displayed in this report.
Table 200 Host Configuration report (page 1 of 2) Field Host ID Hostname Vendor Description Identifier or serial number of the host. The system ID for a file server is returned for this field. Name of the host. Vendor of the operating system, for example, NetApp.

Asset management reports

219

NetApp Reporting

Table 200

Host Configuration report (page 2 of 2) Field Product OS Class Version Description Product, for example, FAS760, R200. Class of operating system, for example, Appliance. Specific version of the operating system, for example, version 7.0.2, 6.5.2R1P9.

iSCSI Adapters

The iSCSI Adapter Configuration report provides details of any iSCSI adapters on the file server. As iSCSI adapters are logical entities on top of real network interfaces, the only information provided is the name of each adapter. To run the iSCSI Adapter Configuration report, select Asset Management > iSCSI > iSCSI Adapter Configuration from the navigation tree.

LUNs

The LUN Configuration report provides details of any LUNs on the file server. To run this report, select Asset Management > LUN > LUN Configuration from the navigation tree. To run the Memory Configuration report, select Asset Management > Memory > Memory Configuration from the navigation tree. This report displays a summary of the total amount of physical memory and the total amount of virtual memory configured on the selected nodes. To view the details of the memory configuration on individual file servers, select Asset Management > Memory > Memory Configuration Details from the navigation tree to run the Memory Configuration Details report.

Memory

Capacity and disk overviews


Capacity overview

There are two specific reports that provide asset management information on file servers. The Capacity Overview report provides a waterfall-style model of capacity within one or more file servers. To run this report, select Asset Management > NetApp > Capacity Overview from the navigation tree. Each bar represents a different part of storage allocation from raw disks down to used storage. Table 201 on page 220 describes the separate bars.

Table 201

NetApp Capacity Overview (page 1 of 2) Bar Total Raw Description Total amount of raw disk. Amount of raw disk configured for data storage, RAID protection, and future growth. It also presents the amount of storage unavailable due to failed disks within the file server.

220

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Reporting

Table 201

NetApp Capacity Overview (page 2 of 2) Bar Configured Filesystem Available Description Amount of disk configured for filesystem in use and the amount of disk lost in filesystem overhead. Amount of filesystem space available to the user and lost due to snapshot reserve. Amount of available space that is used and is free.

Disk Overview

The Disk Overview provides an overview of how many different disk types are configured in a file server or group of file servers. To run this report, select Asset Management > NetApp > Disk Overview from the navigation tree.

Network Interface

The Network Interface Configuration report shows detailed information on the configuration of network interfaces on a file server. To run this report, select Asset management > Network Interface > Network Interface Configuration from the navigation tree. Table 202 on page 221 describes the fields that are displayed in this report.

Table 202

Network Interface report Field Hostname Interface MAC Address Autoneg Description Name of the host on which the network interface is located. Name of the network interface. Ethernet address for the network interface. Indicates that the interface is set to auto-negotiate with a switch.

Asset management reports

221

NetApp Reporting

Capacity planning reports


The Capacity planning category provides reports that help users perform better capacity planning for growth in the environment.

Disk reports

The Spare Disk Trend report provides details of how many spare disks are available for each file server over time. To run this report, select Capacity Planning > NetApp > Spare Disk Trend from the navigation tree. The Top 5 Least Spare Disks report provides details of the file servers with the lowest number of spare disks. To run this report, select Capacity Planning > NetApp > Top 5 Least Spare Disks from the navigation tree.

Filesystem reports

The reports described in Table 203 on page 222 show the utilization of filesystems on a file server. To run these reports, select Capacity Planning > report from the navigation tree.
Filesystem utilization reports Report Utilization (%) Node Utilization Aggregate Utilization Snapshot Utilization Underlying Disk Activity Description Displays the percentage of utilization of all filesystems on a file server or group of file servers over time. When run from a group node, displays the average filesystem utilization on each file server over time. Displays the aggregate filesystem utilization over time of all filesystems across all file servers selected in the report. Displays the percentage utilization of the allocated snapshot space. Displays the underlying disk activity of each filesystem.

Table 203

222

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Reporting

Change management reports


Change management reports provide details on changes that have taken place on key configuration settings and files on a file server. To display any changes in the configuration options on a file server during the report period, select Change Management > NetApp > Configuration Changes from the navigation tree. The Change Management > NetApp section of the navigation tree also has a number of additional reports that allow users to view changes in the settings of the following configuration files:

/etc/exports /etc/hosts /etc/hosts.equiv /etc/nsswitch.conf /etc/quotas /etc/rc /etc/resolv.conf /etc/snapmirror.conf /etc/usermap.cfg

Change management reports

223

NetApp Reporting

Configuration reports
Configuration reports detail the configuration of a file server and are available for the following areas on a NetApp file server:

"Fileserver Exports" on page 224 "LUN Mappings" on page 224 "Imported and Exported LUNs" on page 224 "Aggregate Configuration" on page 224 "Mirror Configuration" on page 225 "Remote Mirror Configuration" on page 225 "NetApp Configuration" on page 225 "NetApp Configuration Comparison" on page 225 "vfile Server Configuration" on page 225 "NetApp Configuration File reports" on page 225

Fileserver Exports

The Fileserver Exports report provides details of filesystems that are exported from a file server. To run this report, select Configuration > Fileserver > Fileserver Exports from the navigation tree.

LUN Mappings

The LUN Mappings report provides details of the mapping between LUNs and Fibre Channel WWNs or iSCSI IQNs, depending on the protocol used to access the LUN. To run this report, select Configuration > LUN > LUN Mappings from the navigation tree.

Imported and Exported LUNs

The Imported LUNs report displays information on any LUNs that are imported to the selected nodes as disks. To run this report, select Configuration > LUN > Imported LUNs from the navigation tree. The Exported LUNs report displays information on any LUNs that are exported from the selected nodes as disks. To run this report, select Configuration > LUN > Exported LUNs from the navigation tree.

Aggregate Configuration

The Aggregate Configuration report provides details of aggregates within a NetApp file server. To run this report, select Configuration > Aggregate > Aggregate Configuration from the navigation tree.

224

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Reporting

Mirror Configuration

The Mirror Configuration report provides details of mirrors on a file server. To run this report, select Configuration > Mirror > Mirror Configuration from the navigation tree.

Remote Mirror Configuration

The Remote Mirror Configuration report provides details of the configuration of the remote mirror pairs to the file server selected. To run this report, select Configuration > Mirror > Remote Mirror Configuration from the navigation tree.

NetApp Configuration

The NetApp Configuration report provides details of the configuration options set on a file server. To run this report, select Configuration > NetApp > Configuration from the navigation tree.

NetApp Configuration Comparison

The Configuration Comparison report provides a comparison between the configuration options of two or more file servers and highlights any differences. To run this report, select Configuration > NetApp > Configuration Comparison from the navigation tree. The vfile Server Configuration report provides information on the vfile servers configured for a file server. The vfile server is shown by its name or by its primary IP address when the name is not resolvable. To run this report, select Configuration > NetApp > vfile server Configuration from the navigation tree.

vfile Server Configuration

NetApp Configuration File reports

There are a number of reports in the Configuration > NetApp section of the navigation tree that allow users to view details about the following key configuration files on a file server:

/etc/exports /etc/hosts /etc/hosts.equiv /etc/nsswitch.conf /etc/quotas /etc/rc /etc/resolv.conf /etc/snapmirror.conf /etc/usermap.cfg

/etc/hosts Configuration /etc/hosts/ Configuration Comparison The Configuration > NetApp > /etc/* Configuration Comparison reports provide a comparison between a given configuration file of two or more file servers and highlights any differences.

Configuration reports

225

NetApp Reporting

Volume Priority Configuration

The Volume Priority Configuration report displays information on priority configuration for NetApp volumes. This report is available only on NetApp machines that run Data ONTAP 7.1 and later operating systems. To run this report, select Configuration > NetApp > Volume Priority Configuration from the navigation tree. Table 204 on page 226 describes fields in the Volume Priority Configuration report.

Table 204

Volume Priority Configuration fields Field Node Volume Active User Priority Description Name of the files on which the volume resides. Name of the volume. Indication of whether the priorities are active for the volume. Relative priority of user access to the volume. Values include: Very Low Low Medium High Very High Relative priority of system access to the volume. Values include: Very Low Low Medium High Very High Policy used to cache data on the volume. Values include: Keep, which attempts to keep volume data in cache, if possible. Reuse, which allows immediate overwriting of volume data in cache, if required. Default, which is the default policy for the file server. Number of reads that the user is allowed to make in a given time period. Number of reads that the system is allowed to make in a given time period.

System Priority

Cache Policy

User Read Limit System Read Limit

226

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Reporting

Licensing reports
Licensing reports display the licenses that are installed on a file server or group of file servers. To run License reports, select Licensing > License report from the navigation tree. These reports are described in Table 205 on page 227.
Table 205 Licensing reports Report License Summary License Details Expired Licenses Description Summary of the number of different licenses installed on the backup server broken down by type. Displays all details of the licenses installed on the backup server. Displays the installed licenses that have expired on the backup server.

Licensing reports

227

NetApp Reporting

Performance reports
The following performance reports are available for a NetApp file server:

"Disk reports" on page 228 "Fibre Channel port reports" on page 228 "Fileserver operation reports" on page 229 "LUN reports" on page 229 "Mirror reports" on page 229 "Network interface performance reports" on page 230 "Processor reports" on page 230

Disk reports
Table 206

The reports that enable users to analyze disk performance are described in Table 206 on page 228.
Disk Performance reports Report Disk Performance by Disk Disk Performance by Host Description Displays the performance on each individual disk on a file server or group of file servers. When run from a group node, this report displays the disk performance on each file server in the group by aggregating the performance of all disks on each file server. Displays the aggregate performance of all disks on all file servers from which the report was run.

Aggregate Disk Performance

To run these reports, select Performance > Disk > report from the navigation tree. To view disk performance from a filesystem perspective, select Performance > Filesystem > Underlying Disk Performance.

Fibre Channel port reports


Table 207

The Fibre Channel Port reports analyze Fibre Channel HBA performance, as described in Table 207 on page 228.
Fibre Channel reports Report Fibre Channel Port Performance by Port Fibre Channel Port Performance by Node Aggregate Fibre Channel Port Performance Description Displays the performance on each individual HBA on a file server or group of file servers. When run from a group node, this report displays the aggregate Fibre Channel performance on each file server in the group by summing the total performance of all HBAs on each file server. Displays the aggregate performance of all HBAs on all file servers from which the report was run.

To run these reports, select Performance > Fibre Channel > report from the navigation tree.

228

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Reporting

Fileserver operation reports


Table 208

Reports on file server operations are described in Table 208 on page 229.
Fileserver reports Report Fileserver Performance Description Displays the number of operations per second carried out on each file server broken down by protocol: NFS CIFS DAFS iSCSI HTTP FCP

Fileserver Performance by Node Displays the total number of operations, per second, carried out on each file server. Fileserver Cache Hit Rates Fileserver Cache Hit Rates by Node Fileserver Client Performance Fileserver Filesystem Performance Displays the aggregate node cache hit rate and name cache hit rate for all file servers selected in the report. When run from a group, displays the node cache hit rate and name cache hit rate for each individual file server in the group. Displays the total number of operations on a per-client basis. Displays information on the performance of filesystems on a given file server for volumes and Qtrees. Not all of the fields are returned for all filesystems.

LUN reports

The LUN reports provide information on the performance of individual LUNs and the type of data that LUNs contain on a file server. The available LUN reports are described in Table 209 on page 229.
Table 209 LUN reports Report LUN Performance by LUN LUN Performance by Node Aggregate LUN Performance Description Displays details on the performance of individual LUNs on a file server. Displays the aggregate performance of all LUNs on each individual file server. Displays the aggregate performance across all LUNs on all file servers.

Mirror reports
Mirror Performance

The Mirror category provides information on the performance of mirror operations on a file server. The Mirror Performance report displays the update speed of mirror operations on individual mirrors. To run this report, select Performance > Mirror > Mirror Performance from the navigation tree. The Remote Mirror Performance report displays the performance on the remote side of the mirror.

Remote Mirror Performance

Performance reports

229

NetApp Reporting

To run the Remote Mirror Performance report, select Performance > Mirror > Remote Mirror Performance from the navigation tree.

Network interface performance reports


Table 210

The network interface performance reports on a file server are described in Table 210 on page 230.

Network performance reports Report Network Interface Performance by Interface Network Interface Performance by Node Description Displays the amount of data per second and number of packets per second being transferred through each network card on the file server or group of file servers. When run from a group node, displays the aggregate network interface performance on each file server in the group, by adding together the total performance of all network interfaces on that file server. Displays the aggregate performance of all network interfaces on all file servers from which the report has been run.

Aggregate Network Interface Performance

To run a network performance report, select Performance > Network Interface > report on the navigation tree.

Processor reports

To run reports on overall CPU utilization on a file server, select Resource Utilization > Processor from the navigation tree. The processor reports are described in Table 211 on page 230.
Processor reports Report Processor Utilization by CPU Processor Utilization by Node Description Displays the utilization of each individual CPU on a file server or group of file servers over time. When run from a group node, this report displays the average CPU utilization on a file server over time by averaging the utilization across on all processors on that file server. Displays the aggregate processor utilization over time of all processors across all file servers selected in the report. Displays utilization of CPUs in a cluster pair configuration.

Table 211

Aggregate Processor Utilization Cluster Pair Joint CPU Utilization

230

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Reporting

Resource utilization reports


Resource utilization reports allow users to monitor the utilization of various components of a file server. Reports are available for the following:

"Aggregate Utilization" on page 231 "Disk" on page 232 "Process" on page 232

Aggregate Utilization

The Aggregate Utilization report is a trend chart that displays aggregate utilization information for NetApp file servers.

Resource utilization reports

231

NetApp Reporting

Table 212 on page 232 describes the fields included in the Aggregate Utilization by Aggregate report.
Table 212 Aggregate Utilization by Aggregate Field Node Name Utilization Snapshot Utilization Description Name of the file server on which this aggregate exists. Name of the aggregate. Utilization of the aggregate as a percentage. Snapshot utilization of the aggregate as a percentage.

Disk
Table 213

There are three reports available that allow users to analyze how busy the disks are on a file server, as described in Table 213 on page 232.
Disk reports Report Disk Activity by Disk Disk Activity by Host Description Displays the average percentage of time each individual disk is busy on each file server. When run from a group node, displays the average percentage of time the disks are busy on each file server in the group by averaging the activity of all disks on each file server. Displays the average percentage of time that the disks are busy across all file servers from which the report has been run.

Aggregate Disk Activity

To run these reports, select Performance > Disk > report name from the navigation tree.

Process

The CPU Utilization report allows users to report on the CPU utilization of each process on a file server over time. Use this to identify processes that are consuming too much CPU on a file server. To run this report, select Resource Utilization > Process > CPU Utilization from the navigation tree.

232

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Reporting

Status reports
Status reports display a detailed status of a component at a given point in time. Status reports are organized into the following categories:

"Aggregate Status" on page 233 "Disk Status" on page 233 "Fibre Channel Port Status" on page 234 "Filesystem Status" on page 234 "Host Status" on page 235 "iSCSI Adapter Status" on page 235 "LUN Status" on page 235 "Mirror Status" on page 235 "Cluster Status" on page 236 "Network Interface Status" on page 237 "Process Status" on page 237 "Processor Status" on page 237 "Qtree Status" on page 237

Aggregate Status

The Aggregate Status report provides status details of aggregates that reside on a file server. To run this report, select Status > Aggregate > Aggregate Status from the navigation tree. Table 214 on page 233 describes the fields that are displayed in the Aggregate Status report.

Table 214

Aggregate Status report fields Field Physical Space (GB) Allocated Space (MB) Used Space (GB) Description Overall capacity of the aggregate in gigabytes. Amount of space, in megabytes, allocated when creating volumes. Amount of space, in gigabytes, that contains actual data.

Note: Over-allocation is indicated if Allocated Space is higher than Physical Space.

Disk Status

The Disk Status report contains information on the status of disks on a file server as described in Table 215 on page 233. To run this report, select Status > Disk > Disk Status from the navigation tree.
Table 215 Disk Status report fields (page 1 of 2) Field Node Description Name of the file server on which the disk is configured.

Status reports

233

NetApp Reporting

Table 215

Disk Status report fields (page 2 of 2) Field Device State Use Description Identifier for the disk. Indication of whether the disk is online of offline. Use of the disk. Values include: Data Spare Parity

Fibre Channel Port Status

The Fibre Channel Port Status report displays the status of Fibre Channel interfaces configured on a file server. To run this report, select Status > Fibre Channel > Fibre Channel Port Status from the navigation tree. Table 216 on page 234 describes the fields that are displayed in this report.

Table 216

Fibre Channel Port Status report Field Hostname Port Link Active Speed Description Name of the file server being monitored. Identifier for the Fibre Channel interface. Indication of whether the interface has a connection with another device. Current speed at which the interface is running.

Filesystem Status

The Filesystem Status report displays the status of each filesystem on a NetApp file server, and the status of the disks on which the filesystem is dependant. To run this report, select Status > Filesystem > Filesystem Status from the navigation tree. Table 217 on page 234 describes the fields that are displayed in this report..

Table 217

Filesystem Status report Field Hostname Filesystem Used Space (MB) Used Files Used Snapshot Space (MB) Description Name of the filesystems host. Name of the filesystem. Amount of space that is currently used on the filesystem in megabytes. Number of files that are on the filesystem. Amount of snapshot space used on the filesystem in megabytes.

Underlying Disk Status

The Underlying Disk Status report shows the status of the underlying disks of each filesystem.

234

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Reporting

To run the Underlying Disk Status report, select Status > Filesystem > Underlying Disk Status from the navigation tree. Table 218 on page 235 describes the fields that are displayed in this report.
Table 218 Underlying Disk Status Report fields Field Filesystem node Filesystem Disk node Disk State Use Description Hostname of the file server. Name of the filesystem. Name of the filesystems host to which the disk is mapped. Name of the disks to which the filesystem is mapped. State of the disk. Use of the disk, either data, parity, or spare.

Host Status

The Host Status report indicates the last time a file server rebooted. To run the report, select Status > Host > Host Status from the navigation tree.

iSCSI Adapter Status

The iSCSI Adapter Status report provides status details of iSCSI adapters that reside on a file server. To run this report, select Status > iSCSI > iSCSI Adapter Status from the navigation tree.
Note: An Error field appears if the iSCSI adapter is not online.

LUN Status

The LUN Status report provides details of the LUNs that exist on a file server. To run this report, select Status > LUN > LUN Status from the navigation tree.
Note: If the LUN is mapped to at least one client, the Mapped field is selected.

Mirror Status

The Mirror Status report provides details on the status of mirrors on a file server.

Status reports

235

NetApp Reporting

To run this report, select Status > Mirror > Mirror Status from the navigation tree. Table 219 on page 236 describes the fields that are included in this report.
Table 219 Mirror Status Report fields Field Node Path Mirror Status Description Name of the file server. Name of the volume that is being mirrored. Status of the mirror: Active The mirror is up-to-date with data from the source. Updating The mirror is out-of-date compared to the source and is currently updating. Quiesced The mirror is out-of-date compared to the source and is not updating on a temporary basis. Broken The mirror is out-of-date compared to the source and is not updating on a permanent basis. Unsynchronized The mirror is out-of-date compared to the source and is not updating or scheduled to update due to a failure. Size, in kilobytes, of the last update. Current data exposure.

Update Size (KB) Exposure

The Remote Mirror Status report provides details on the status of the remote mirrors. To run this report, select Status > Mirror > Remote Mirror Status from the navigation tree.

Cluster Status

The Cluster Status report provides details on the file server clusters status. To run this report, select Status > NetApp > Cluster Status from the navigation tree.

State field values


Table 220

The possible values for the State field are described in Table 220 on page 236.
State Field Values Value Active Change pending Failed over Taken over partner resources Error Unknown Description File server and its partner are active. File server is in transition from one state to another. File server is no longer active and its resources are managed by its partner. File server is active and is managing it and its partner's resources. File server is in a state where it cannot take over its partner's resources. File server is in an unknown state.

236

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Reporting

Network Interface Status


Table 221

Table 221 on page 237. describes the reports that display the status of network interface cards on a file server.
Network Interface reports Report Network Interface Status Description Tabular report displaying the state of each interface on the file server, including: Indication of whether it has a link with a switch. Speed at which it is running. Duplex setting with which it is running. If gathering information from switches and from file servers, this report shows the port on a switch to which the file server is connected. If gathering information from switches and from file servers, this report displays the port on the switch to the interface card is linked and the auto negotiation settings on both sides of the link. If gathering information from switches and from file servers, this report displays the port on the switch to which the interface card is linked and the duplex settings on both sides of the link.

Network Interface Link Pair

Network Interface Link Pair Auto negotiation Status Network Interface Link Pair Duplex Status

To run the Network Interface Status reports, select Status > Network Interface > report name from the navigation tree.

Process Status

The Process Status report is a tabular report that displays the status of all processes on a file server at a certain point in time, along with the CPU utilization of a process at that time. To run this report, select Status > Process > Process Status from the navigation tree to run the Process Status report. When running the Process Status report from a node in the navigation tree, the report displays the status of any DPA processes that run on the selected nodes. The report does not show the status of any collectors that may be monitoring those nodes remotely. Run the Process Status report from the DPA Server node to view the status of all DPA processes across all machines. This allows you to identify any processes that are not running.

Processor Status

To display the status of CPUs on a file server or group of file servers, select Status > Processor > Processor Status from the navigation tree. The Processor Status report shows the total number of CPUs that are online and those that are offline. The Qtree Status report provides details of Qtrees that reside on a file server. To run this report, select Status > NetApp > QTree Status from the navigation tree.

Qtree Status

Status reports

237

NetApp Reporting

Troubleshooting reports
Troubleshooting reports allow users to report on errors that have been detected on network interface cards on a file server. The reports that display errors on network interface cards are described in Table 222 on page 238.
Table 222 Troubleshooting reports Report Network Interface Errors by Interface Network Interface Errors by Node Aggregate Network Interface Errors Description Displays the errors on each individual network interface on a file server or group of file servers over time. When run from a group node, displays the errors on all network interfaces on a per file server basis over time. Displays the total number of network interface errors over time across all file servers selected in the report.

To run one of these reports, select Troubleshooting > Network Interface from the navigation tree.

238

EMC Data Protection Advisor Version 5.8 Report Reference Guide

11
EMC Disk Library Reporting

This section describes the reporting capabilities of DPA for EMC Disk Library (EDL and EDL 3D). The following reports are described:

Running reports for EMC Disk Library .................................................................... 240 Asset management reports ......................................................................................... 241 Configuration reports .................................................................................................. 244 Change management reports ..................................................................................... 245 Performance reports..................................................................................................... 246 Resource utilization reports........................................................................................ 247 Status reports ................................................................................................................ 250 Licensing reports .......................................................................................................... 254

EMC Disk Library Reporting

239

EMC Disk Library Reporting

Running reports for EMC Disk Library


The EMC Disk Library host is located in the navigation tree under Storage > Disk Storage. To run reports, right-click the EMC Disk Library host node and select a report from the menu in the navigation tree. Expand the EDL node to display all the virtual and physical libraries and drives managed by the EDL host, and network shares that are exported from an EDL 3D. To run reports against any of the managed components of an EDL, right-click the component and run a report against that component.

EMC Disk Library versions

DPA provides reporting on both EMC Disk Libraries (EDL) and EMC 3D Disk Libraries (EDL 3D), which include additional features, such as deduplication that the earlier EDL 4000 (EMC DL) series do not. Reports are available only from the navigation tree if data is gathered for the selected node. This chapter describes the models of EDL for which a report is available. The EMC Data Protection Advisor Data Collection Reference Guide includes more information on the specific data returned for the different version of EDL.

240

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC Disk Library Reporting

Asset management reports


Asset management reports provide details on the physical configuration of an EDL. To display an overview of the physical aspects of an EDL, select Asset Management > Overview from the navigation tree. The Asset Management control panel appears with EDL configuration information. The Asset Management control panel provides an overview of the:

Number of processors on the unit Amount of physical and virtual memory Number of network interfaces Number of Fibre Channel ports Amount of disk capacity configured on the unit

The Asset management control panel is available for EDL and EDL 3D. The following reports are available within the asset management reports:

"Disk Summary" on page 241 "Fibre Channel Configuration" on page 241 "Memory Configuration" on page 242 "Network Interface Details" on page 242 "Processor Configuration" on page 242 "Tape Drive Summary" on page 242 "Tape Library Summary" on page 243

Disk Summary

To obtain more information on the configuration of disks on an EDL, select Asset Management > Disk > Disk Summary. The Disk Summary report displays the number of disks and the total amount of disk space configured on the EDL. For more details on individual disks, select Asset Management > Disk > Disk Configuration. The Disk Configuration table report displays the manufacturer, model, firmware revision, and size of each disk. The Disk Summary and Disk Configuration Details reports are available for EDL and EDL 3D.

Disk Configuration

Fibre Channel Configuration

To view configuration information on the Fibre Channel ports configured on an EDL, select Asset Management > Fibre Channel > Fibre Channel Port Configuration from the navigation tree. The Fibre Channel Configuration report displays the World Wide Name of each Fibre Channel interface in the EDL, and the mode (Initiator or Target). The Fibre Channel Configuration report is available for EDL and EDL 3D.

Host Configuration

To view information on the EDLs version unit, select Asset Management > Host > Host Configuration. The Host Configuration report displays the hostname, vendor, product, OS class, and host ID of the EDL. The Host Configuration report is available for all EDL versions.

Asset management reports

241

EMC Disk Library Reporting

Memory Configuration

To obtain the memory configuration of the EDL, select Asset Management > Memory > Memory Configuration. The Memory Configuration report displays the amount of physical and virtual memory configured on the machine. The Memory Configuration report is available for EDL and EDL 3D.

Network Interface Details

To report on the configuration of the network interface cards in an EDL, select Asset Management > Network Interface > Network Interface Configuration from the navigation tree. The MAC address and MTU are returned for EDL only. The Network Interface Configuration report is available for all EDL versions.

Processor Configuration

The Processor Configuration report displays the CPU configuration of the EDL. To run the report, select Asset Management > Processor > Processor Configuration from the navigation tree. The Processor Configuration report displays the hostname and processor number of each processor configured on the system. The report displays the make, model, and speed for EDL only. The Processor Configuration report is available for EDL and EDL 3D.

Tape Drive Summary

To display a summary of the tape drives managed by the EDL, select Asset Management > Tape Drive >Tape Drive Summary from the navigation tree. The Tape Drive Summary control panel contains the reports displayed in Table 223 on page 242.
Table 223 Tape Drive Summary report Report Tape Drive Model Summary Tape Drive Firmware Summary Description Bar chart that shows the number of tape drives broken down by model. Bar chart that shows the number of tape drives managed by the EDL broken down by the firmware versions they are running. Note: It is possible to gather data on only the firmware version of virtual tape drives, Physical tape drives are not reflected in this chart. Tape Drive Interface Summary This report returns no data when run from an EDL.

To obtain a more detailed view of the tape drives managed by an EDL, select Asset Management > Tape Drive > Tape Drive Configuration from the navigation tree. The Tape Drive Configuration report displays:

For all tape drives managed by the EDL, the make and model For virtual tape drives, the name of the EDL in which the tape drives are a member, and the firmware version of the drive. For physical tape drives, the serial number of the drive. Physical tape drives do not return information on the version of firmware they are running and the tape library in which they are a member.

242

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC Disk Library Reporting

The Tape Drive Summary control panel and Tape Drive Configuration report are available for EDL and EDL 3D.

Tape Library Summary

To view a summary of the tape library configuration on the EDL, select Asset Management > Tape Library > Tape Library Summary from the navigation tree. The Tape Library Summary control panel provides the reports described in Table 224 on page 243.
Table 224 Tape Library control panel reports Report Tape Library Model Summary Description Bar chart that shows the number of tape libraries broken down by model. This report includes all physical and virtual libraries managed by the EDL. Bar chart that shows the number of slots that are configured on each library. Bar chart that shows the number of tape drives that are configured on each library. Note: It is possible to map only virtual tape drives to tape libraries. Physical tape drives are not displayed in this chart.

Tape Library Slot Count Tape Library Drive Count

The Tape Library Configuration control panel is available for EDL and NetApp NearStore. To display more detailed information on tape library configurations, select Asset Management > Tape Library >Tape Library Details from the navigation tree. This report contains details on each tape library managed by the EDL.

All libraries display information on the vendor, model, and number of slots in the library Physical tape libraries display information on the serial number of the library Virtual tape libraries display information on the librarys firmware version and the number of drives configured in the library

The Tape Library Configuration report is available for all EDL versions.

Asset management reports

243

EMC Disk Library Reporting

Configuration reports
Configuration reports provide details on the configuration options of an EDL.

EDL Configuration Options

To display the configuration settings of an EDL, select Configuration > EDL > EDL Configuration Options from the navigation tree. The EDL Configuration report displays various configuration options, and indicates whether they are enabled. The EDL Configuration report is available for EDL only. The File Server Exports report displays configuration information on the shares that have been exported from the file server for client use. To display the file server exports of an EDL, select Configuration > File Server > File Server Exports from the navigation tree. The File Server Exports report is only available for EDL 3D.

File Server Exports

244

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC Disk Library Reporting

Change management reports


Change management reports provide information on changes made to the configuration of virtual tape libraries, tape drives, and shares on an EDL.

Change Overview

The Change Overview control panel displays a summary of changes made to the EDL environment, and the last ten changes made. To display the overview, select Change Management > Change Overview from the EDL host node.

Change Details

The Change Details report describes the changes made to the EDL environment, including the time the change was made and the type of change. To display the detailed report, select Change Management > Change Details.

Change management reports

245

EMC Disk Library Reporting

Performance reports
Performance reports provide information on the performance of virtual tape drives within an EDL. It is possible to report only on the performance of virtual tape drives in an EDL. It is not possible to report on the performance of physical tape drives that are attached to the unit.

Tape Drive Performance Summary

To run the Performance Summary report, select Performance > Tape Drive Performance Summary. The report displays information on the average and maximum write and read throughput of the drive over the reporting period.
Note: It is not possible to report on the performance of EDL 3D tape drives, only EDL 4000.

The Tape Drive Performance by Drive chart displays the tape drive performance over time. To run the Tape Drive Performance report, select Performance > Tape Drive Performance by Drive from the navigation tree. To see the performance on an individual drive, select Performance > Tape Drive Performance by Node from an individual node in the navigation tree. To view the aggregate tape drive performance across the complete EDL, select Performance > Aggregate Tape Drive Performance from the navigation tree.

Replication performance

DPA reports on the performance of replication operations on an EDL 3D.

The Source Performance report shows the amount of data that is being replicated from an EDL. The Target Performance Report shows the amount of data that is being replicated to an EDL. Run the Target Performance report to view the performance over time for all EDL units replicating to the target. The Replication Performance reports display the data throughput for replication sources and the target in megabytes per second.

To view the Replication Performance report, select Performance > Replication > Source Performance or Target Performance from the navigation tree.

246

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC Disk Library Reporting

Resource utilization reports


Resource utilization reports show information about the resource utilization of components within the EDL environment. The resource utilization reports are categorized as follows:

"Deduplication ratios and storage utilization" on page 247 "System Resource Utilization Overview" on page 248 "Fibre Channel utilization" on page 248 "Network interface utilization" on page 249 "Processor utilization" on page 249 "Memory usage" on page 249

Deduplication ratios and storage utilization

DPA provides several reports that describe the deduplication and data compression ratios achieved by EDL 3D units over time, and the amount of data queued for deduplication.

"Compression Ratio" on page 247 "Deduplication Ratio" on page 248 "Total Reduction Ratio" on page 248 "Dedupe Queue" on page 248 "Storage Utilization" on page 248

Compression Ratio

The Compression Ratio report displays the ratio for the size of data compressed against the original data size over time. To view the Compression Ratio report, select Resource Utilization > Storage > Compression Ratio.

Resource utilization reports

247

EMC Disk Library Reporting

Deduplication Ratio

The Deduplication Ratio report displays the ratio for the size of data deduplicated against the original data size over time. To view the Deduplication Ratio report, select Resource Utilization > Storage > Deduplication Ratio.

Total Reduction Ratio

The Total Reduction Ratio report displays the ratio for the size of data compressed and deduplicated against the original data size over time. To view the Total Reduction Ratio report, select Resource Utilization > Storage > Total Reduction Ratio.

Dedupe Queue

The Dedupe Queue report shows the amount of data waiting for deduplication, and the amount of data that will not be deduplicated, for EDL 3D libraries. To view the report, select Resource Utilization > Storage > Dedupe Queue from the navigation tree.

Storage Utilization

The Storage Utilization report displays the percentage of disk space that has been used to create virtual tapes within the EDL. To view the Storage Utilization report, select Resource Utilization > Storage > Storage Utilization.

System Resource Utilization Overview

The System Resource Utilization control panel displays system information for virtual tape libraries. The following reports are included in this control panel:

Processor Utilization Memory Utilization Network Interface Utilization Fibre Channel Port Performance

Note: Resource utilization reports are available for EDL only, not EDL 3D.

To run the System Resource Utilization control panel, select Resource Utilization > Overviews > System Resource Utilization from the navigation tree.

Fibre Channel utilization


Table 225

Fibre Channel utilization data for EDL is available in a number of reports, as described in Table 225 on page 248.
EDL Fibre Channel utilization Report Fibre Channel Port Utilization Fibre Channel Port Performance by Port Fibre Channel Port Performance by Node Aggregate Fibre Channel Port Performance Description Displays the percentage utilization of Fibre Channel ports over time. Displays the throughput performance on Fibre Channel ports broken down by port. Displays the throughput performance on Fibre Channel ports broken down by node. Displays the aggregate performance of all Fibre Channel ports on all nodes from which the report has been run.

To view the Fibre Channel utilization reports, select Resource Utilization > Fibre Channel > report name.
248

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC Disk Library Reporting

Network interface utilization


Table 226

Network interface utilization data for EDL is available in a number of reports, as described in Table 226 on page 249.
Network interface utilization Report Interface Utilization Summary Network Interface Performance by Interface Network Interface Performance by Node Aggregate Network Interface Performance Description Control panel that shows the average and maximum interface throughput and the interface performance by interface. Displays the network interface performance broken down by interface. Displays the network interface performance broken down by node. Displays the aggregate performance of all network interfaces on all nodes from which the report has been run.

To view the network utilization reports, select Resource Utilization > Network Interface > report name

Processor utilization

Processor utilization on an EDL can be viewed by:


Node Processor Aggregate utilization

Processor utilization over time can be used to determine resource constraints in an EDL environment. To view one of the processor utilization reports, select Resource Utilization > Processor > <report> from the navigation tree.

Memory usage

Memory usage for an EDL can be viewed at either a point-in-time or trend-over-time (memory utilization). To view the Memory Usage report, select Resource Utilization > Memory > Memory Usage from the navigation tree.

Resource utilization reports

249

EMC Disk Library Reporting

Status reports
Status reports show the current state of the EDL and components, and are described in Table 227 on page 250.
Table 227 Status reports Report "Status Overview" on page 250 "Disk Status" on page 250 "Environmental Summary" on page 250 Description Overview of EDL capacity and health. Status of disks on the unit. Status of PSUs, fans, and thermometers.

"Tape Drive Status" on page 251 Status of the tape drives. "Tape Library Status Summary" on page 251 "Network Interface Status" on page 252 "EDL Failover Status" on page 252 Status of the tape libraries. Status of the network interface. Status of EDLs configured for failover.

Status Overview

The Status Overview control panel shows the overall utilization of an EDL. To run the Status Overview, select Status > Overviews > Backup to Disk Status. The Status Overview control panel reports on capacity, usage, and health.

The Capacity report shows how much data is used against the capacity of the system. The Usage report breaks down the amount of data used into the following values: Dedupe Reduced is the amount of data that has been deduplicated. Waiting for Dedupe shows how much data is waiting to be deduplicated. Wont be Deduped shows how much data will not be deduplicated. System Meta Data shows how much data is reserved for the system Space Eligible for Truncation shows how much data has expired, but which has not been freed up yet.

The Health Status report summarizes the current health of the EDL environment and components.

Disk Status

To view the status of disks on the EDL, select Status > Disk > Disk Status from the navigation tree. The Disk Status report is available for EDL and EDL 3D.

Environmental Summary

To display an overview of the environmental status of the EDL, select Status > Hardware > Environmental Summary from the navigation tree. The Environmental Summary control panel displays the following information:

How many PSUs are active and inactive on the EDL. Whether any temperature sensors are overheating.

250

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC Disk Library Reporting

Whether any fans are inactive.

The Environmental Status reports are available for EDL and EDL 3D. Fan Status The Fan Status report displays specific details on fans in the EDL. To run this report, select Status > Hardware > Fan Status from the navigation tree. The Fan Status report displays:

Each fan in the system Indication of whether the fan is active Speed at which the fan is operating.

Figure 1

Fan Status

PSU Status

To gather more details on the status of Power Supply Units (PSUs) in the EDL, select Status > Hardware > PSU Status report from the navigation tree. The PSU Status report displays details on each power supply in the EDL and whether it is active. To gather more details on the status of temperature sensors in the EDL, select Status > Hardware > Thermometer Status Report from the navigation tree. The Thermometer Status report displays details on each temperature sensor in the EDL:

Thermometer Status

Indication of whether the temperature sensor is active Current temperature of the sensor Indication of whether the temperature sensor is overheating

To display a trend report that shows fluctuations in the temperature recorded by a thermometer over time, select the thermometer, right-click, and select Trend Thermometer Temperature from the menu.

Tape Drive Status

The Tape Drive Status report lists each tape drive in the system.

For virtual tape drives, this report displays its tape library. However, the tape library of which a physical tape drive is a member is not displayed. For all drives, the Status field shows the health of the drive. For physical tape drives, the State field also indicates whether the tape drive is loaded with a volume or not. This information is not available for virtual tape drives.

To run this report, select Status > Tape Drive > Tape Drive Status from the navigation tree. The Tape Drive Status report is available for EDL and EDL 3D.

Tape Library Status Summary


Table 228

To obtain a summary of the Tape Library status, select Status > Tape Library > Tape Library Status Summary from the navigation tree. The Tape Library Status Summary control panel includes the reports described in Table 228 on page 251.
Tape Library Summary reports (page 1 of 2) Report Tape Library Status Summary Tape Drive Status Tape Library Cap Status Description Shows how many libraries are OK, and how many are not OK. Displays how many tape drives are OK and how many are not. Contains no details when run from an EDL.
Status reports
251

EMC Disk Library Reporting

Table 228

Tape Library Summary reports (page 2 of 2) Report PSU Summary Thermometer Summary Fan Summary Description Shows the status of power supply units on the EDL. Shows the status of temperature sensors on the EDL. Shows the status of fans on the EDL.

The Tape Library Status control panel is available only for EDL. Tape Library Status Details To view the status of all tape libraries, select Status > Tape Library > Tape Library Status Details from the navigation tree. For each library on the system, the Tape Library Status Details report displays the status. The Tape Library Status Details report is available for EDL and EDL 3D. Tape Library Slot Status To view the status of any slots within any of the tape libraries, select Status > Tape Library > Tape Library Slot Status from the navigation tree. This report displays details about the volumes that are loaded into slots in each library on the EDL. For physical tape libraries, this report also contains information on the type of media. The Tape Library Slot Status report is available only for EDL.
Note: The Tape Library Slot Status report contains only details on the slots that have volumes loaded in them. Slots in a library that do not contain a volume are not displayed.

Tape Library Volume Status

To view the status of all volumes configured in an EDL, select Status > Tape Library > Tape Library Volume Status from the navigation tree. The Tape Library Volume Status report displays details about all the volumes configured on the EDL, the amount of data stored on them, and their location. The Tape Library Volume Status report is available for EDL and EDL 3D.

Network Interface Status

To view the status of the network interface on the EDL, select Status > Network Interface Status from the navigation tree. The Network Interface Status report displays the:

Hostname Interface Active status Speed of data transmission

The Network Interface IP Status report for EDL shows the status of network IP address on an EDL.

EDL Failover Status

The EDL Failover Status report shows the status details of EDL appliances configured for failover. To run the report, select Status > EDL > Failover Status from the navigation tree. Table 229 on page 253 describes the fields in the report.

252

EMC Data Protection Advisor Version 5.8 Report Reference Guide

EMC Disk Library Reporting

Table 229

EDL Failover status Field Hostname Secondary Type Self Check Interval (second) Heartbeat Interval (second) Recovery Setting State Description Name or address of the EDL host. Name or address of the failover partner. Failover configuration type. Interval, in seconds, between primary DL checks for software/hardware failure on itself. Interval, in seconds, between checks to see if primary has failed. Time until automatic recovery attempted. Current failover state of the EDL.

Status reports

253

EMC Disk Library Reporting

Licensing reports
The license reports show the licenses that are configured on an EDL.

License Summary

To view a summary of the licenses configured, select Licensing > License Summary from the EDL node. To view the details of licenses configured on an EDL, select Licensing > License Details from the EDL node. The Expired Licenses report shows all expired licenses. To view the report, select Licensing > Expired Licenses from the EDL node.

License Details

Expired Licenses

254

EMC Data Protection Advisor Version 5.8 Report Reference Guide

13
FalconStor Reporting

This section describes the reporting capabilities of DPA for FalconStor VTL devices. The following reports are described:

Running reports for FalconStor.................................................................................. 256 Asset management reports ......................................................................................... 257 Configuration reports .................................................................................................. 262 Change management reports ..................................................................................... 263 Performance reports..................................................................................................... 264 Resource utilization reports........................................................................................ 266 Status reports ................................................................................................................ 267 Troubleshooting reports .............................................................................................. 272

FalconStor Reporting

255

FalconStor Reporting

Running reports for FalconStor


The FalconStor host is located in the navigation tree under Storage > Disk Storage. To run reports: 1. Right-click the FalconStor VTL node. 2. Select a report from the menu in the navigation tree. 3. Expand the node to display all the virtual and physical libraries and drives managed by the FalconStor host. To run reports against any of the managed components of a FalconStor device, right-click the component and run a report against that component.

256

EMC Data Protection Advisor Version 5.8 Report Reference Guide

FalconStor Reporting

Asset management reports


Asset management reports provide details on the physical configuration of a FalconStor VTL. To display an overview of the physical aspects of a FalconStor VTL, select Asset Management > Overview from the navigation tree. The Asset Management control panel provides an overview of the:

Number of processors on the unit Number of host and host operating system types Amount of physical and virtual memory Number of network interfaces Number of Fibre Channel ports Amount of disk and file system capacity configured on the unit

The following reports are available within the asset management reports:

"Disk Summary" on page 257 "Fibre Channel Configuration" on page 257 "Host Configuration" on page 258 "Memory Configuration" on page 258 "Network Interface Configuration" on page 258 "Processor Configuration" on page 259 "Tape Drive Summary" on page 259 "Tape Library Summary" on page 260

Disk Summary

To obtain more information on the configuration of disks on a FalconStor VTL, select Asset Management > Disk > Disk Summary. The Disk Summary report displays the number of disks and the total amount of disk space configured on the FalconStor VTL.

Disk Configuration

For more details on individual disks, select Asset Management > Disk > Disk Configuration. The Disk Configuration report displays the manufacturer, model, firmware revision, and size of each disk. The Fibre Channel Configuration report displays the World Wide Name of each Fibre Channel interface in the FalconStor VTL, and the mode (Initiator or Target).

Fibre Channel Configuration

Asset management reports

257

FalconStor Reporting

To run this report, select Asset Management > Fibre Channel > Fibre Channel Port Configuration from the navigation tree. Table 230 on page 258 describes the fields that are displayed on this report.
Table 230 Fibre Channel port configuration Field Port WWPN Mode Figure 2 Description Port identifier, for example, Port 1. Worldwide port name allocated to this port. Mode in which the Fibre Channel port is configured.

Fibre Channel Configuration

Host Configuration

The Host Configuration report displays information on the FalconStor VTLs version unit. To run this report, select Asset Management > Host > Host Configuration. Table 231 on page 258 describes the fields displayed in this report.

Table 231

Host configuration Field Vendor Host ID Product Version OS Class Description Name of the host vendor. This is hardcoded to FalconStor Identifier of the host. Name of the product. This is hardcoded to VTL. Version of the server. Type of OS device. This is hardcoded to Appliance.

Memory Configuration

The Memory Configuration report displays the amount of physical and virtual memory configured on the machine. To run this report, select Asset Management > Memory > Memory Configuration. Table 232 on page 258 describes the fields displayed in this report.

Table 232

Memory Configuration Field Physical Virtual Description Amount of physical memory. Amount of virtual memory.

Network Interface Configuration

The Network Interface Configuration reports shows the configuration of the network interface cards in a FalconStor VTL.

258

EMC Data Protection Advisor Version 5.8 Report Reference Guide

FalconStor Reporting

To run this report, select Asset Management > Network Interface > Network Interface Configuration from the navigation tree. Table 233 on page 259 describes the fields displayed in this report.
Table 233 Network Interface Configuration Field Name Ethernet Address Description MTU Description Identifier of the network interface. Ethernet address of the FalconStor VTL unit. Description of the interface. Size of the largest packet that a network protocol can transmit.

Processor Configuration

The Processor Configuration report displays the CPU configuration of the FalconStor VTL. To run the report, select Asset Management > Processor > Processor Configuration from the navigation tree. Table 234 on page 259 describes the fields displayed in this report.
Table 234 Processor Configuration Field Number Make Model Speed Description Number of the processor within the FalconStor VTL unit. Make of the processor. Model of the processor. Speed at which the processor is running.

Tape Drive Summary

To display a summary of the tape drives managed by the FalconStor VTL, select Asset Management > Tape Drive >Tape Drive Summary from the navigation tree. The Tape Drive Summary control panel contains the reports displayed in Table 235 on page 259.
Table 235 Tape Drive Summary report Report Tape Drive Model Summary Tape Drive Firmware Summary Description Bar chart that shows the number of tape drives broken down by model. Bar chart that shows the number of tape drives managed by the FalconStor VTL broken down by the firmware versions they are running. Note: It is possible to gather data on only the firmware version of virtual tape drives, Physical tape drives are not reflected in this chart. Tape Drive Interface Summary Bar chart that shows the number of interfaces managed by the FalconStor VTL.

Asset management reports

259

FalconStor Reporting

Tape Drive Configuration

To obtain a more detailed view of the tape drives managed by a FalconStor VTL, select Asset Management > Tape Drive > Tape Drive Configuration from the navigation tree Table 236 on page 260 describes the fields that display on this report.

Table 236

Tape drive configuration Field Name Make Model Serial Library Name Description Name of the tape drive. Make of the tape drive. Model of the tape drive. Serial number of the tape drive. This is not available for virtual tape drives. Name of the library in which the tape drive is located. Note: Physical tape drives do not return information on the tape library in which they are a member Virtual Firmware Indication of whether the tape drive is virtual. Firmware version of the tape drive. Note: Physical tape drives do not return information on the firmware version they are running.

Tape Library Summary

To view a summary of the tape library configuration on the FalconStor VTL, select Asset Management > Tape Library > Tape Library Summary from the navigation tree. The Tape Library Summary control panel provides the reports described in Table 237 on page 260.
Table 237 Tape Library control panel reports Report Tape Library Model Summary Description Bar chart that shows the number of tape libraries broken down by model. This report includes all physical and virtual libraries managed by the FalconStor VTL. Bar chart that shows the number of slots that are configured on each library. Bar chart that shows the number of tape drives that are configured on each library. Note: It is possible to map only virtual tape drives to tape libraries. Physical tape drives are not displayed in this chart.

Tape Library Slot Count Tape Library Drive Count

Tape Library Configuration

The Tape Library Configuration report contains details on each tape library managed by the FalconStor VTL.

All libraries display information on the vendor, model, and number of slots in the library. Physical tape libraries display information on the serial number of the library.

260

EMC Data Protection Advisor Version 5.8 Report Reference Guide

FalconStor Reporting

Virtual tape libraries display information on the librarys firmware version and the number of drives configured in the library.

Tape Library Details

To display more detailed information on tape library configurations, select Asset Management > Tape Library >Tape Library Details from the navigation tree.

Asset management reports

261

FalconStor Reporting

Configuration reports
Configuration reports provide details on the configuration options of a FalconStor VTL.

FalconStor VTL Configuration Options

To display the configuration settings of a FalconStor VTL, select Configuration > EDL >Configuration Options from the navigation tree. The FalconStor VTL Configuration report displays various configuration options, and indicates whether they are enable. The Memory Configuration report displays the amount of physical and virtual memory configured on the VTL device. To run this report, select Configuration > Memory > Memory Configuration.

Memory Configuration

262

EMC Data Protection Advisor Version 5.8 Report Reference Guide

FalconStor Reporting

Change management reports


Change management reports provide information on changes made to the configuration of virtual tape libraries, tape drives, and shares on an FalconStor VTL.

Change Overview

The Change Overview control panel displays a summary of changes made to the FalconStor VTL environment, and the last ten changes made. To display the overview, select Change Management > Change Overview from the FalconStor VTL host node.

Change Details

The Change Details report describes the changes made to the FalconStor VTL environment, including the time the change was made and the type of change. To display the detailed report, select Change Management > Change Details.

Change management reports

263

FalconStor Reporting

Performance reports
Performance reports provide information on the performance of virtual tape drives within an FalconStor VTL. It is possible to report only on the performance of virtual tape drives in an FalconStor VTL. It is not possible to report on the performance of physical tape drives that are attached to the unit.

Network interface utilization


Table 238

Network interface utilization data for FalconStor VTLs is available in a number of reports, as described in Table 238 on page 264.
Network interface utilization reports Report Interface Utilization Summary Network Interface Performance by Interface Network Interface Performance by Node Aggregate Network Interface Performance Virtual Network Interface Performance By Interface Virtual Network Interface Performance By Node Aggregate Virtual Network Interface Performance Description Control panel that shows the average and maximum interface throughput and the interface performance by interface. Displays the network interface performance broken down by interface. Displays the network interface performance broken down by node. Displays the aggregate performance of all network interfaces on all nodes from which the report has been run. Throughput, in kilobytes per second, displayed by network interface. Throughput, in kilobytes per second, displayed by node. Throughput, in kilobytes per second, aggregated across the selected nodes.

To view the network utilization reports, select Resource Utilization > Network Interface > report name.

Tape Drive Performance Summary

To run the Performance Summary report, select Performance > Tape Drive Performance Summary. The report displays information on the average and maximum write and read throughput of the drive over the reporting period. Table 239 on page 264 describes the fields that are returned.
Table 239 Tape Drive Performance Summary fields Field Name Read Speed Write Speed Library Virtual Type Description Name of the tape drive. Speed at which the tape drive reads data. Speed at which the tape drive writes data. Name of the library in which the tape drive is located. Indication of whether the tape drive is virtual.

Tape Drive Performance by Drive

The Tape Drive Performance by Drive chart displays the tape drive performance over time.

264

EMC Data Protection Advisor Version 5.8 Report Reference Guide

FalconStor Reporting

To run this report, select Performance > Tape Drive Performance by Drive from the navigation tree. Tape Drive Performance by Node Aggregate Tape Drive Performance To see the performance on an individual drive, select Performance > Tape Drive Performance by Node from an individual node in the navigation tree. To view the aggregate tape drive performance across the complete FalconStor VTL, select Performance > Tape Drive > Aggregate Tape Drive Performance from the navigation tree.

Performance reports

265

FalconStor Reporting

Resource utilization reports


Resource utilization reports show information about the resource utilization of components within the FalconStor VTL environment. Table 240 on page 266 describes the resource utilization reports.
Table 240 Resource utilization reports Report "Storage Utilization" on page 266 "Tape Library Utilization Trend" on page 266 "Tape Library Volume Utilization Trend" on page 266 Description Displays the percentage of disk space that has been used to create virtual tapes within the FalconStor VTL. Displays a trend chart that shows the utilization of each tape library over time. When run from a group object, this report displays a bar chart that shows the total utilization across all tape libraries.

Storage Utilization

The Storage Utilization report displays the percentage of disk space that has been used to create virtual tapes within the FalconStor VTL. To view the Storage Utilization report, select Resource Utilization > Storage > Storage Utilization.

Tape Library Utilization Trend

To run the Tape Library Utilization Trend report, select Resource Utilization > Tape Library Utilization Trend from the navigation tree. This report displays the utilization of each individual tape library over a given time period. Table 241 on page 266 describes the field that is included in the Tape Library Utilization Trend report.

Table 241

Tape Library Utilization Trend report Field Library Utilization Description Total number of slots, as a percentage, that are occupied with tapes.

Tape Library Volume Utilization Trend

To run the Tape Library Volume Utilization Trend report, select Resource Utilization > Tape Library Volume Utilization Trend from the navigation tree. This report displays the total utilization across all tape libraries.

266

EMC Data Protection Advisor Version 5.8 Report Reference Guide

FalconStor Reporting

Status reports
Status reports show the current state of the FalconStor VTL and components, and are described in Table 242 on page 267.
Table 242 Status reports Report "Status Overview" on page 267 "Disk Status" on page 267 "FalconStor VTL Failover Status" on page 271 "Hardware Status" on page 267 Description Overview of FalconStor VTL capacity and health. Status of disks on the unit. Status of FalconStor VTLs configured for failover. Status of PSUs, fans, and thermometers.

"Tape Drive Status" on page 268 Status of the tape drives. "Tape Library status" on page 269 "Network Interface status" on page 270 Status of the tape libraries. Status of the network interface.

Status Overview

The Status Overview control panel shows the overall utilization of a FalconStor VTL. To run the Status Overview, select Status > Overviews > Backup to Disk Status. The Status Overview control panel reports on capacity, usage, and health.

The Capacity report shows how much data is used against the capacity of the system. The Usage report breaks down the amount of data used into the following values: Dedupe Reduced is the amount of data that has been deduplicated. Waiting for Dedupe shows how much data is waiting to be deduplicated. Wont be Deduped shows how much data will not be deduplicated. System Meta Data shows how much data is reserved for the system Space Eligible for Truncation shows how much data has expired, but which has not been freed up yet.

The Health Status report summarizes the current health of the FalconStor VTL environment and components.

Disk Status

To view the status of disks on the FalconStor VTL, select Status > Disk > Disk Status from the navigation tree. The Disk Status report displays the name of each device, and whether the disk is online. To display an overview of the environmental status of the FalconStor VTL, select Status > Hardware > Environmental Summary from the navigation tree. The Environmental Summary control panel displays the following information:

Hardware Status

How many PSUs are active and inactive on the FalconStor VTL. Whether any temperature sensors are overheating. Whether any fans are inactive.
Status reports
267

FalconStor Reporting

Fan Status

The Fan Status report displays specific details on fans in the FalconStor VTL. To run this report, select Status > Hardware > Fan Status from the navigation tree. Table 243 on page 268 describes the fields that display on the Fan Status report.

Table 243

Fan status Field Name Active Speed Description Name of the hardware fan. Indication of whether the fan is active. Speed at which the fan is operating.

PSU Status

The PSU Status report displays details on each power supply unit (PSU) in the FalconStor VTL and whether it is active To run this report, select Status > Hardware > PSU Status report from the navigation tree. Table 244 describes the fields that display on this report.

Table 244

PSU status Field Name Active Description Name of the power supply unit. Indication of whether the power supply unit is active.

Thermometer Status

The Thermometer Status report displays details on each temperature sensor in the FalconStor VTL. To run this report, select Status > Hardware > Thermometer Status Report from the navigation tree. Table 245 on page 268 describes the fields that display on this report.

Table 245

Thermometer status Field Name Active Temperature Overheating Description Name of the temperature sensor. Indication of whether the temperature sensor is active. Temperature of the sensor. Indication of whether the sensor is hot which is determined by whether the reading reaches a certain number.

To display a trend report that shows fluctuations in the temperature recorded by a thermometer over time, select the thermometer, right-click, and select Trend Thermometer Temperature from the menu.

Tape Drive Status

The Tape Drive Status report lists each tape drive in the system.

268

EMC Data Protection Advisor Version 5.8 Report Reference Guide

FalconStor Reporting

To run this report, select Status > Tape Drive > Tape Drive Status from the navigation tree. Table 246 on page 269 describes the fields that display on this report.
Table 246 Tape drive status Field Name Status State Description Name of the tape drive. Current state of the drive. Indicates whether the tape drive is loaded with a volume or not. Note: This information is not available for virtual tape drives. Library Library in which the tape drive is located. Note: The tape library of which a physical tape drive is a member is not displayed. Virtual Type Indicates if the tape drive is virtual.

Tape Library status

To obtain a summary of the Tape Library status, select Status > Tape Library > Tape Library Status Summary from the navigation tree. The Tape Library Status Summary control panel includes the reports described in Table 247 on page 269.
Tape Library Summary reports Report Tape Library Status Summary Tape Library Status Details Tape Library Slot Status Tape Library Volume Status Description Shows how many libraries are OK, and how many are not OK. Shows the status for each library on the system. Shows the status of any slots within any of the tape libraries. Show the status of all volumes configured in a FalconStor VTL, including, the amount of data stored on the volumes, and their location. Shows a count of all empty volumes by tape library.

Table 247

Tape Library Empty Volume Count

Tape Library Status Details

To view the status of all tape libraries, select Status > Tape Library > Tape Library Status Details from the navigation tree. For each library on the system, the Tape Library Status Details report displays the status. To view the status of any slots within any of the tape libraries, select Status > Tape Library > Tape Library Slot Status from the navigation tree. This report displays details about the volumes that are loaded into slots in each library on the FalconStor VTL. For physical tape libraries, this report also contains information on the type of media.

Tape Library Slot Status

Status reports

269

FalconStor Reporting

Table 248 on page 270 describes the fields that display on this report.
Table 248 Tape library slot status Field Address Status Volume Type Description Address of the slot. Current status of the slot. Volume ID of the volume in the slot. Type of cartridge in the slot. This is not available for physical slots. Name of library in which the library slot is located. Indicates if the library slot is virtual.

Library Virtual Type

Note: The Tape Library Slot Status report contains only details on the slots that have volumes loaded in them. Slots in a library that do not contain a volume are not displayed.

Tape Library Volume Status

The Tape Library Volume Status report show the status of all volumes configured in a FalconStor VTL, including, the amount of data stored on the volumes, and their location. To run this report, select Status > Tape Library > Tape Library Volume Status from the navigation tree. Table 249 on page 270 describes the fields that are displayed on this report.

Table 249

Tape Library volume status Field Library Name Volume Size (GB) Virtual Location Type Description Library in which the library volume is located. Identifier of the volume loaded in the drive. Amount of space on the library volume.This fields is not available for physical volumes. Indicates if the library volume is virtual. Location of the library volume within the EDL unit. Type of location the volume is in. An example of data returned for this field is Storage.

Tape Library Empty Volume count

Shows the status of all volumes configured in a FalconStor VTL, including the amount of data on the volumes and the location. To run this report, select Status > Tape Library Empty Volume Count from the navigation tree.

Network Interface status

The Network Interface Status report for a FalconStor VTL shows the status of network IP address on a FalconStor VTL. To run this report, select Status > Network Interface Status from the navigation tree.

270

EMC Data Protection Advisor Version 5.8 Report Reference Guide

FalconStor Reporting

Table 239 describes the fields that display on this report.


Table 250 Network interface status Field Interface Link up Speed Description Name of the network interface. Indication of whether the interface has an active link. Speed, in megabytes per second, at which the network interface is running.

FalconStor VTL Failover Status

The FalconStor VTL Failover Status report shows status information about the failover state of FalconStor VTL devices. To run the report, select Status > EDL > Failover Status from the navigation tree. Table 251 on page 271 describes the fields in the report.

Table 251

FalconStor VTL Failover status Field Hostname Secondary Type Self Check Interval (second) Heartbeat Interval (second) Recovery Setting State Description Name or IP address of the FalconStor VTL host. Name or IP address of the FalconStor VTL device failover partner. Type of failover configuration. Interval, in seconds, between primary DL checks for software/hardware failure on itself. Interval, in seconds, between checks to see if primary has failed. Time until automatic recovery attempted. Current failover state of the FalconStor VTL.

Status reports

271

FalconStor Reporting

Troubleshooting reports
Troubleshooting reports summarize the error throughput of a network and Fibre Channel interfaces. This allows users to view channels of high or low utilization and error rates and to identify potential trouble spots.

Network Interface Errors by Interface

The Network Interface Errors by Interface report displays the error counts and discarded frame counts that are incoming and outgoing by network interface. To run the report, right-click the node or nodes and select Troubleshooting > Network interface > Network interface errors by interface.

Aggregate Network Interface Errors

The Aggregate Network Interface Errors report displays the error count and discarded frame count that are incoming and outgoing, aggregated over the group node or selected nodes. To run the report, right-click the node or nodes and select Troubleshooting > Network interface > Aggregate Network interface errors.

272

EMC Data Protection Advisor Version 5.8 Report Reference Guide

14
NetApp Virtual Tape Library Reporting

The following reports are described:


Running reports for a NetApp Virtual Tape Library .............................................. 274 Asset management reports ......................................................................................... 275 Performance reports..................................................................................................... 277 Resource utilization reports........................................................................................ 278 Status reports ................................................................................................................ 279 Troubleshooting reports .............................................................................................. 280

NetApp Virtual Tape Library Reporting

273

NetApp Virtual Tape Library Reporting

Running reports for a NetApp Virtual Tape Library


This section describes the reporting capabilities of NetApp virtual tape libraries (VTLs). In the DPA navigation tree, NetApp storage devices are displayed under Storage > Disk Storage. To run reports, right-click the NetApp host node and select a report from the menu in the navigation tree. Expand the node to display all the virtual and physical libraries and drives managed by the NetApp host. To run reports against any of the managed components of a NetApp VTL, right-click the component and run a report against that component.

274

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Virtual Tape Library Reporting

Asset management reports


Asset management reports provide details on the physical configuration of a VTL. The following reports are available within the asset management reports:

"Host Configuration" on page 275 "Network Interface Configuration" on page 275 "Tape Library Summary" on page 276 "Tape Library Configuration Details" on page 276

Host Configuration

To view information on the version unit of VTLs, select Asset Management > Host > Host Configuration. The Host Configuration report displays the hostname, vendor, product, OS class, and host ID of the VTL. To report on the configuration of the network interface cards in a VTL, select Asset Management > Network Interface > Network Interface Configuration from the navigation tree. The MAC address and MTU are not displayed for NetApp VTLs.

Network Interface Configuration

Asset management reports

275

NetApp Virtual Tape Library Reporting

Tape Library Summary

To view a summary of the tape library configuration on the VTL, select Asset Management > Tape Library > Tape Library Summary from the navigation tree. The Tape Library Summary control panel provides the reports described in Table 252 on page 276.
Table 252 Tape Library control panel reports Report Tape Library Model Summary Description Shows the number of tape libraries broken down by model. This report includes all physical and virtual libraries managed by the VTL. Shows the number of tape libraries broken down by the firmware version on the tape libraries. Note: It is only possible to gather firmware information from virtual tape libraries. Physical tape libraries are not displayed in this chart. Tape Library Slot Count Tape Library Drive Count Shows the number of slots that are configured on each library. Shows the number of tape drives that are configured on each library. Note: It is only possible to map virtual tape drives to tape libraries. Physical tape drives are not displayed in this chart.

Tape Library Firmware Summary

Tape Library Configuration Details

To display more detailed information on tape library configurations, select Asset Management > Tape Library >Tape Library Details from the navigation tree. This report contains details on each tape library managed by the VTL as follows:

All libraries display information on the vendor, model, and number of slots in the library. Physical tape libraries display information on the serial number of the library. Virtual tape libraries display information on the librarys firmware version and the number of drives configured in the library.

276

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Virtual Tape Library Reporting

Performance reports
Performance reports provide information on the performance of virtual tape drives within a VTL.
Note: It is possible to report only on the performance of virtual tape drives in a VTL. It is not possible to report on the performance of physical tape drives that are attached to the unit.

Tape Drive Performance Summary Tape Drive Performance by Drive Tape Drive Performance by Node

To run the Performance Summary report, select Performance > Tape Drive Performance Summary. The report displays information on the average and maximum write and read throughput of the drive over the reporting period. To view the performance of drives over time, run the Tape Drive Performance, select Performance > Tape Drive Performance by Drive from the navigation tree.

To see the performance on an individual drive, select Performance > Tape Drive Performance by Node from an individual node in the navigation tree. To view the aggregate tape drive performance across the complete NetApp VTL, select Performance > Aggregate Tape Drive Performance from the navigation tree.

Performance reports

277

NetApp Virtual Tape Library Reporting

Resource utilization reports


Resource utilization reports show information about the resource utilization of components within the VTL environment. The resource utilization reports are divided into:

"System resource utilization overview" on page 278 "Network interface utilization" on page 278

System resource utilization overview

The System Resource Utilization control panel displays system information for NetApp virtual tape libraries. The following reports are included in this control panel:

Processor Utilization Memory Utilization Network Performance Fibre Channel Port Performance

To run the System Resource Utilization control panel, select Resource Utilization > Overviews > System Resource Utilization from the navigation tree.

Network interface utilization


Table 253

Network interface utilization data for EDL is available in a number of reports, as described in Table 253 on page 278.
EDL network interface utilization Report Interface Utilization Summary Network Interface Performance by Interface Network Interface Performance by Node Aggregate Network Interface Performance Description Control panel that shows the average and maximum interface throughput and the interface performance by interface. Displays the network interface performance broken down by interface. Displays the network interface performance broken down by node. Displays the aggregate performance of all network interfaces, on all nodes, from which the report has been run.

To view the Network Interface Utilization reports, select Resource Utilization > Network Interface > report name.

278

EMC Data Protection Advisor Version 5.8 Report Reference Guide

NetApp Virtual Tape Library Reporting

Status reports
Status reports show the current state of the VTL and components as described in Table 254 on page 279.
Table 254 Status reports Report "Host Status" on page 279 "Network Interface Status" on page 279 Description Status of the host. Status of the network interface.

Host Status

To view the status of the host on the NetApp VTL, select Status > Host Status from the navigation tree. To view the status of the network interface on the VTL, select Status > Network Interface Status from the navigation tree. The Network Interface Status report displays the hostname, interface, active status, and speed of data transmission in megabytes per second.

Network Interface Status

Status reports

279

NetApp Virtual Tape Library Reporting

Troubleshooting reports
The following reports are available for NetApp VTL:

"Network Interface Errors by Interface" on page 280 "Aggregate Network Interface Errors" on page 280

Network Interface Errors by Interface Aggregate Network Interface Errors

To view the number of network interface errors for a VTL, select Troubleshooting > Network Interface Errors by Interface from the navigation tree. The Aggregate Network Interface Errors report displays information about the total number of errors that occurred coming in and going out of all VTLs over the specified time period. To run the Aggregate Network Interface Errors report, select Troubleshooting > Aggregate Network Interface Errors from the navigation tree. The fields displayed on this report are described in Table 255 on page 280.

Table 255

Aggregate Network Interface Errors report Field Errors In Errors Out Description Number of errors that occurred going in to the interface. Number of errors that occurred going out of the interface.

280

EMC Data Protection Advisor Version 5.8 Report Reference Guide

15
Tape Library Reporting

This section describes the reports for tape libraries and includes the following categories:

Running reports for tape Libraries ............................................................................ 282 Asset management reports ......................................................................................... 283 Resource utilization reports........................................................................................ 286 Status reports ................................................................................................................ 287 Troubleshooting reports .............................................................................................. 291

Tape Library Reporting

281

Tape Library Reporting

Running reports for tape Libraries


DPA monitors tape libraries. Tape Libraries are displayed in the navigation tree under the Tape Library node type. The tape library navigation tree expands to display any Fibre Channel interfaces, network interfaces, and tape drives that exist on the tape library.

282

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Tape Library Reporting

Asset management reports


Asset management reports provide details on the physical assets of the tape library.

Tape Library Summary


Table 256

To view an overview of the tape librarys configuration, run Asset Management > Tape Library > Tape Library Summary. The Tape Library Summary control panel includes the bar chart reports displayed in Table 256 on page 283.
Tape library reports Report Tape Library Model Summary Tape Library Firmware Summary Tape Library Slot Count Tape Library Drive Count Description Shows the number of tape libraries that are monitored, broken down by model. Shows the number of tape libraries that are monitored, broken down by the firmware version that is running on the library. Shows the total number of slots configured on the tape libraries that is being monitored. Shows the total number of tape drives configured on the tape libraries that is being monitored.

Tape Library Configuration

To display a more detailed report on the configuration of a tape library, run the Tape Library Configuration report. Select Asset Management > Tape Library > Tape Library Configuration from the navigation tree. This report displays the fields described in Table 257 on page 283.
Table 257 Tape library reports Field Hostname Vendor Model Firmware Serial Num Hands Num Slots Num Caps Num Drives Description Name of the tape library. Vendor of the tape library (for example, StorageTek or ADIC). Model of the tape library (for example, L700). Version of firmware running on the library. Serial number of the tape library. Number of robotic hands in the tape library. Only available on StorageTek libraries. Number of slots in the tape library. Number of cartridge access ports in the tape library. Number of tape drives in the tape library.

Tape Drive Summary

To view the configuration of tape drives within a tape library, run the Tape Drive Summary control panel. Select Asset Management > Tape Drive > Tape Drive

Asset management reports

283

Tape Library Reporting

Summary from the navigation tree. The reports in this control panel are described in Table 258 on page 284.
Table 258 Tape Drive Summary reports Report Tape Drive Model Summary Tape Drive Firmware Summary Tape Drive Interface Summary Description Bar chart that shows the total number of tape drives broken down by model. Bar chart that shows the total number of tape drives broken down by firmware. Bar chart that shows the total number of tape drives broken down by interface type.

Tape Drive Configuration

For more detailed information on the configuration of tape drives within a tape library, run the Tape Drive Configuration report. Select Asset Management > Tape Drive > Tape Drive Configuration from the navigation tree. This displays a tabular report that returns the fields described in Table 259 on page 284.
Table 259 Tape Drive Configuration report Field Hostname Device Name Make Model Firmware Serial Interface Type Description Name of the tape drives tape library. Name of the tape drive. Make of the tape drive, for example, Quantum. Model of the tape drive. Firmware revision on the tape drive. Serial number of the tape drive Interface type of the tape drive, ISCSI or Fibre Channel.

Fibre Channel ports

To report on the configuration of Fibre Channel ports on a tape library, run the Fibre Channel Port Configuration report. To run the Fibre Channel Port report, select Asset Management > Fibre Channel > Fibre Channel Port Configuration from the navigation tree. This report displays the fields described in Table 260 on page 284.

Table 260

Fibre Channel Port Configuration report Field Hostname Port WWPN Description Name of the tape library. Identifier for the port. World Wide Port Name associated with the port.

Fans

To view the configuration of fans configured in a tape library, run the Asset Management > Hardware > Fan Configuration report from the navigation tree. The

284

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Tape Library Reporting

Fan Configuration report is a tabular report that contains the fields described in Table 261 on page 285.
Table 261 Fan Configuration report Field Node Name Make Model Location Description Name of the tape library. Identifier for the fan. Make of the fan. Available only from StorageTek tape libraries. Model of the fan. Available only from ADIC tape libraries. Location of the fan. Available only from ADIC tape libraries.

Power Supply Units

To view the configuration of power supply units (PSU) configured on a tape library, run the PSU Configuration report. Select Asset Management > Hardware > PSU Configuration from the navigation tree. The PSU Configuration report is a tabular report that contains the fields shown in Table 262 on page 285.
Power Supply Unit Configuration report Field Node Name Make Location Description Name of the tape library. Identifier for the PSU. Make of the PSU. Available only from StorageTek tape libraries. Location of the PSU. Available only from ADIC Tape Libraries.

Table 262

Thermometers

To view the configuration of thermometers configured in a tape library, run the Thermometer Configuration report. Select Asset Management > Hardware > Thermometer Configuration from the navigation tree. The Thermometer Configuration report is a tabular report that contains the fields described in Table 263 on page 285.
Tape Library Thermometers Configuration report Field Node Name Make Model Location Description Name of the tape library. Identifier for the thermometer. Make of thermometer. Available only from StorageTek tape libraries. Model of thermometer. Available only from ADIC tape libraries. Location of the thermometer. Available only from ADIC tape libraries.

Table 263

Asset management reports

285

Tape Library Reporting

Resource utilization reports


The resource utilization reports show the slot utilization of the library at a point in time and trended over time. Table 264 on page 286 describes these reports.
Table 264 Resource utilization reports Report Tape Library Utilization Tape Library Utilization Trend Tape Library Aggregate Utilization Aggregate Tape Library Utilization Trend Description Displays a bar chart that shows the utilization of each tape library at a point in time. Displays a trend chart that shows the utilization of each tape library over time. When run from a group object, this report displays a bar chart that shows the total utilization across all tape libraries. When run from a group object, this report displays a trend chart that shows the total slot utilization across all tape libraries over time.

286

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Tape Library Reporting

Status reports
Status reports show the current state of the tape librarys components. To view the overall status of a library, run the Tape Library Status control panel. Select Status > Tape Library > Tape Library Status from the navigation tree. Table 265 on page 287 describes the reports in the Tape Library Status control panel.
Table 265 Tape Library Status control panel Report Tape Library Status Summary Description Displays a graph that shows the number of libraries for which the status is OK and the number of libraries for which the status is not OK. Displays how many tape drives are OK, and how many are not. Displays the status of any cartridge access ports. Summary that shows the status of power supply units on the tape library. Summary that shows the status of temperature sensors on the tape libraries. Summary that shows the status of fans on the tape libraries.

Tape Drive Status Tape Library Cap Status PSU Summary Thermometer Summary Fan Summary

Tape Library Status Details

To run a more detailed report on the status of a tape library, select Asset Management > Tape Library > Tape Library Status Details from the navigation tree. The Tape Library Status report describes the fields in Table 266 on page 287.
Tape Library Status Details Field Hostname Status Num Volumes Description Name of the tape library. Status of the library (for example, OK). Number of volumes residing in the library.

Table 266

Tape library components


Table 267

Table 267 on page 287 describes the tape library component status reports that are available for the components of a tape library.
Tape Library Component Status Component "Slot" on page 287 "CAP" on page 288 "Tape drive" on page 288 "Environmental" on page 289 Description Displays the number of available slots in the TLU. Available only on StorageTek tape libraries. Displays the status of Cartridge Access Ports (CAP). Available only for StorageTek tape libraries. Displays the status of tape drives within a tape library. Displays the status of fans, PSUs, and thermometers.

Slot

To view the status of all the slots within a StorageTek tape library, run the Tape Library Slot Status report.

Status reports

287

Tape Library Reporting

To run the report, select Asset Management > Tape Library > Tape Library Slot Status from the navigation tree. The Tape Library Slot Status report contains the fields described in Table 268 on page 288.
Table 268 Tape Library Slot Status report Field Hostname Address Status Volume Type Description Name of the tape library. Slot identifier. Status of the slot. Volume loaded within the slot. Type of slot.

CAP

To view a more detailed report on the status of the CAP on StorageTek tape libraries, run the Tap Library CAP Status report. To run this report, select Asset Management > Tape Library > Tape Library CAP Status from the navigation tree. The Tape Library CAP Status report contains the fields described in Table 269 on page 288.

Table 269

Tape Library CAP Status report Field Hostname Address Status Unlocked Open Description Name of the tape library. Identifier for the CAP. Status of the CAP (for example, OK). Indication of whether the CAP is unlocked. Indication of whether the CAP is open.

Tape drive

The Tape Drive Status Summary control panel displays an overview of the tape drives status in a tape library or group of tape libraries. To run this report, select Status > Tape Drive > Tape Drive Status Summary from the navigation tree. The control panel contains the reports described in Table 270 on page 288.

Table 270

Tape Drive Status Summary Field Tape Drive Status Tape Drive State Tape Drive Cleaning Summary Description Bar chart that displays the current status of each tape drive (for example, OK, or Not OK). Bar chart that indicates whether each tape drive is loaded or empty. Bar chart that displays how many tape drives require cleaning. This information is available only from ADIC tape libraries.

288

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Tape Library Reporting

Tape drive details

To view more details on the status of tape drives, run the Tape Drive Status report. Select Status > Tape Drive > Tape Drive Status from the navigation tree. This displays a tabular report that contains the information in Table 271 on page 289.
Tape Drive Status report Field Hostname Device Name Status State Volume Speed Loop ID Num Loads Cleaning Required Hard Write Errors Hard Read Errors Description Hostname of the tape library. Name of the tape drive. Status of the tape drive (for example, OK, Not OK). State of the tape drive (for example, Loaded, Empty). Identifier of any volume loaded in the tape drive. Available from drives in StorageTek libraries only. Speed at which the drive runs if the drive has a Fibre Channel interface. Fibre Channel Loop ID of the tape drive. Number of loads the tape drive has had. Available for drives in ADIC tape libraries only. Indication of whether the drive requires cleaning. Number of write errors that have occurred on the drive. Available from drives in ADIC tape libraries only. Number of read errors that have occurred on the drive. Available from drives in ADIC tape libraries only.

Table 271

Environmental

To display an overview of the environmental status on a tape library, run the Environmental Summary control panel. Select Status > Hardware > Environmental Summary from the navigation tree. The Environmental Summary control panel shows:

How many PSUs are active and inactive on the tape library. An indication of whether any temperature sensors are overheating. An indication of whether any fans are inactive.

Fan Status

Detailed environmental reports display specific details on the status of a tape library. For example, to obtain more details on fans, select Status > Hardware> Fan Status from the navigation tree to run the Fan Status report. To gather more details on the status of power supply units in the tape library, select the Status > Hardware > PSU Status report from the navigation tree. This report displays details on each power supply in the tape library and whether it is active. To gather more details on the status of temperature sensors in the tape library, select Status > Hardware > Thermometer Status Report from the navigation tree to run the Thermometer Status report. The report displays:

PSU Status

Thermometer Status

Details on each temperature sensor in the tape library. Indication of whether the sensor is active. Current temperature of the sensor. Indication of whether the sensor is overheating.
Status reports
289

Tape Library Reporting

Trend Thermometer Temperature To display a trend report that shows fluctuations in the temperature recorded by a thermometer over time: 1. Select the thermometer in the report. 2. Right-click, and select Trend Thermometer Temperature from the menu.

290

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Tape Library Reporting

Troubleshooting reports
Troubleshooting reports provide information on any errors generated by the tape library or its tape drives. There are two sets of reports in the troubleshooting category that assist with detecting tape library and tape drive errors.

Tape Library Errors

View errors that have occurred on StorageTek tape libraries by running the Tape Library Errors report. Select Troubleshooting > Tape Library > Tape Library Errors from the navigation tree. This report displays tabular details for each error message that occurred on the library. Table 272 on page 291 describes the fields in the report.

Table 272

Tape Library Errors Field Hostname Error Code Severity Error Action Count Timestamp Description Name of the tape library. Error code associated with the error. Severity of the error. Error message. Recommended action to resolve the error. Number of times the error occurred. Time that the error occurred.

Tape Drive Errors


Table 273

Report on tape drive errors for tape drives within ADIC tape libraries only. The available reports are described in Table 273 on page 291.
Tape Drive Error reports Report Tape Drive Errors Tape Drive Errors by Node Tape Drive Error Trend Description Shows a bar for each drive measuring the total number of errors on that drive. Shows the total sum of all the errors on each drive in the tape library. Shows the number of errors on each drive over time.

Troubleshooting reports

291

Tape Library Reporting

292

EMC Data Protection Advisor Version 5.8 Report Reference Guide

16
Fibre Channel Switch Reporting

Fibre Channel switch reports are categorized into the following areas:

Running reports for Fibre Channel switches ........................................................... 294 Asset management....................................................................................................... 295 Configuration................................................................................................................ 296 Resource utilization reports........................................................................................ 297 Status reports ................................................................................................................ 298 Troubleshooting reports .............................................................................................. 300

Fibre Channel Switch Reporting

293

Fibre Channel Switch Reporting

Running reports for Fibre Channel switches


DPA provides the ability to monitor Fibre Channel switches. If switch monitoring is configured correctly within DPA, the switches are displayed in the navigation tree under the node type of Fibre Channel switches. The navigation tree under the switch expands to display each of the interfaces on the switch.

294

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Fibre Channel Switch Reporting

Asset management
Asset management reports provide information on the physical components of all supported switches, including the switchs port information.

Fibre Channel Port Configuration

To view the configuration of the ports on the switch, select Asset Management > Fibre Channel > Fibre Channel Port Configuration from the navigation tree. Table 274 on page 295 describes the fields that display in the Fibre Channel Port Configuration report.
Fibre Channel Port Configuration report Field Hostname Port Description Name of the switch. Identifier for the port. If the port is named, the name of the port is used as the identifier. If the port is not named, the index for the port is used as the identifier. World Wide Port Name of the switch. Indication of whether the port is a Target or Initiator. Type of Fibre Channel port on the switch or HBA. Device name from which Fibre Channel port is visible on the operating system (only returned for HBAs).

Table 274

WWPN Mode Type OS Device

Host Configuration

For Brocade switches, additional information is provided about the fabric OS version that is running on the switch. To view this information, select Asset Management > Host > Host Configuration from the navigation tree.

Asset management

295

Fibre Channel Switch Reporting

Configuration
Configuration reports provide information on the configuration of the ports on the switch.

Fibre Channel Device Configuration

To view the configuration of the devices on the switch, select Configuration > Fibre Channel > Fibre Channel Device Configuration from the navigation tree. The fields displayed on the Fibre Channel Device Configuration report are described in Table 275 on page 296.
Fibre Channel Device Configuration report Field Hostname Device WWPN Description Name of the switch. Name of the device on the host where the HBAs are installed, for example, /dev/rmt/1n. World Wide Port Name of the switch.

Table 275

Fibre Channel Device Mapping

To view the information on the tape drives that are visible from a host through a Fibre Channel HBA, select Configuration > Fibre Channel > Fibre Channel Device Mapping from the navigation tree. The fields displayed on the Fibre Channel Device Mapping report are described in Table 276 on page 296.

Table 276

Fibre Channel Device Mapping report Field Hostname Device Tape Library Tape Drive Make Model Firmware Serial Description Name of the host in which the HBAs are installed. Name of the device on the host, for example, /dev/rmt/1n. Name of the tape library in which the device is physically present. Name of the tape drive within the library. Make of the tape drive. Model of the tape drive. Firmware version of the drive. Serial number of the drive.

296

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Fibre Channel Switch Reporting

Resource utilization reports


The resource utilization report shows the utilization of switch ports.

Fibre Channel Port Utilization

To display this information, select Resource Utilization > Fibre Channel Port Utilization from the navigation tree. The Fibre Channel Port Utilization report calculates the utilization for each port by analyzing the amount of data that passes through the switch as a percentage of its theoretical speed.

Resource utilization reports

297

Fibre Channel Switch Reporting

Status reports
Status reports provide information about the status of the following components of the Fibre Channel switch:

"Fibre Channel Port Status" on page 298 "Host Status" on page 298 "Environmental Summary" on page 298 "Fan Status" on page 298 "PSU Status" on page 299 "Thermometer Status" on page 299

Fibre Channel Port Status


Table 277

To display the current status of a switchs ports, select Status > Fibre Channel > Fibre Channel Port Status from the navigation tree. Table 277 on page 298 describes the fields that display for each port on a switch in this report.
Fibre Channel Port Status report Field Hostname Port Link Active Speed Description Name of the switch. Identifier for the port on the switch. Indication of whether there is any device linked to the port. Current speed at which the port is running.

Host Status

On Brocade, Cisco, and other switches that support the Fibre Alliance MIB, information on the last time the switch rebooted and environmental information about the status of PSUs, fans, and thermometers can be displayed. To view the last time that a switch was rebooted, select Status > Host > Host Status from the navigation tree.

Environmental Summary

To display an overview of the environmental status on a switch, select Status > Hardware > Environmental Summary from the navigation tree. The Environmental Summary control panel displays:

How many PSUs are active on the switch. Indication of whether any temperature sensors are overheating. Indication of whether any fans are inactive. Battery status.

Fan Status

To obtain more specific details on the environmental status of a switch, run the Detailed Environmental reports. For example, to obtain more details on fans, select Status > Hardware > Fan Status from the navigation tree. The Fan Status report shows for each fan in the system the active status and the speed.

298

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Fibre Channel Switch Reporting

PSU Status

To gather more details on the status of power supply units (PSU) in a switch, select Status > Hardware > PSU Status from the navigation tree. The PSU Status report displays details the node and name of each PSU, and whether it is active. To gather more details on the status of temperature sensors in a switch, select Status > Hardware > Thermometer Status Report from the navigation tree. The Thermometer Status report displays details on each temperature sensor in the switch including:

Thermometer Status

Indication of whether it is active. Current temperature. Indication of whether it is overheating.

To display a trend report that shows fluctuations in the temperature recorded by a thermometer over time, right-click the thermometer and select Trend Thermometer Temperature from the menu.

Status reports

299

Fibre Channel Switch Reporting

Troubleshooting reports
Troubleshooting reports provide information on errors that have occurred on the ports on a switch. The reports for Fibre Channel switch ports are described in Table 278 on page 300.
Table 278 Fibre Channel Port Troubleshooting reports Report Fibre Channel Port Errors by Interface Description Displays how many frame errors have occurred on each port, and the number of times that the port has run out of buffer-to-buffer credits on each individual port on a switch or group of switches over time. When run from a group node, this report displays the total number of frame errors and total number of times that the ports have run out of buffer-to-buffer credits on all ports on a switch over time. Displays the total number of frame errors, and total number of times that the ports have run out of buffer-to-buffer credits on all ports on all switches selected in the report over time.

Fibre Channel Port Errors by Node Aggregate Fibre Channel Port Errors

To run these reports, select Troubleshooting > Fibre Channel > report from the navigation tree.

300

EMC Data Protection Advisor Version 5.8 Report Reference Guide

17
IP Switch Reporting

The reports that can be run against IP switches are categorized into the following areas:

Running reports for IP switches................................................................................. 302 Asset management reports ......................................................................................... 303 Performance reports..................................................................................................... 304 Resource utilization reports........................................................................................ 306 Status reports ................................................................................................................ 307 Troubleshooting reports .............................................................................................. 309

IP Switch Reporting

301

IP Switch Reporting

Running reports for IP switches


DPA monitors IP switches. If switch monitoring is configured correctly within DPA, the IP switches are displayed in the navigation tree under the IP Switches node type. The navigation tree under the switch expands to display the interfaces associated with that switch. Reports are available for all interfaces for all switches, for all interfaces on one switch, and for individual interfaces:

To view information for all interfaces on all switches, right-click the IP Switches node in the navigation tree and run the report. To view information for all interfaces on one switch, right-click that switch in the navigation tree and run the report. To view information for one interface on one switch, right-click that interface in the navigation tree and run the report.

302

EMC Data Protection Advisor Version 5.8 Report Reference Guide

IP Switch Reporting

Asset management reports


Asset management reports provide information about the interfaces on a switch. These reports include "Network Interface Configuration" on page 303.

Network Interface Configuration

The Network Interface Configuration report displays information about all interfaces on a switch. To run the Network Interface Configuration report, select Asset Management > Network Interface > Network Interface Configuration from the navigation tree. Table 279 on page 303 describes the fields displayed on this report.

Table 279

Network Interface Configuration report Field Hostname Interface Description MAC Address Autonegotiation MTU Description Name of the switch. Name of the interface on the switch. Optional description for the interface. MAC address of the interface. Indicates that the interface will try to negotiate speed and duplex settings with the host that is connected to the interface. Size of the largest packet that a network protocol can transmit.

Asset management reports

303

IP Switch Reporting

Performance reports
Performance reports provide information about the performance of switches and interfaces. These reports include:

"Network Interface Performance by Interface" on page 304 "Network Interface Performance by Node" on page 304 "Aggregate Network Interface Performance" on page 305

Network Interface Performance by Interface

The Network Interface Performance by Interface trend chart shows the amount of data and the number of packets transferred through each interface on the switch. To run the Network Interface Performance by Interface report, select Performance > Network Interface > Network Interface Performance by Interface from the navigation tree. Table 280 on page 304 describes the fields displayed on this report.

Table 280

Network Interface Performance by Interface report Field Hostname Interface Data In Data Out Packets In Packets Out Description Name of the switch. Name of the interface on the switch. Amount of data, in kilobytes per second, the interface receives. Amount of data, in kilobytes per second, the interface sends. Number of packets the interface receives in 1000/s. Number of packets the interface sends in 1000/s.

Network Interface Performance by Node

The Network Interface Performance by Node report displays a trend chart that shows the total amount of data and the number of packets that has been sent through all interfaces on the switch. To run the Network Interface Performance by Node report, select Performance > Network Interface > Network Interface Performance by Node from the navigation tree. Table 281 on page 304 describes the fields displayed on this report.

Table 281

Network Interface Performance by Node report Field Hostname Data In Data Out Packets In Packets Out Description Name of the switch. Amount of data, in kilobytes per second, the node receives. Amount of data, in kilobytes per second, the node sends. Number of packets coming in to the node (1000/s). Number of packets going out of the node (1000/s).

304

EMC Data Protection Advisor Version 5.8 Report Reference Guide

IP Switch Reporting

Aggregate Network Interface Performance

The Aggregate Network Interface Performance trend chart shows the total amount of data and number of packets transferred by all interfaces and on all switches that the report is being run against. To run the Aggregate Network Interface Performance report, select Performance > Network Interface > Aggregate Network Interface Performance from the navigation tree. Table 282 on page 305 describes the fields displayed on this report.

Table 282

Aggregate network interface performance report Field Data In Data Out Packets In Packets Out Description Amount of data, in kilobytes per second, the node receives. Amount of data, in kilobytes per second, the node sends. Number of packets coming in to the node (1000/s). Number of packets going out of the node (1000/s).

Performance reports

305

IP Switch Reporting

Resource utilization reports


Resource utilization reports provide information about the throughput utilization of interfaces on a switch.

Interface Utilization Summary

The Interface Utilization Summary control panel reports provide information on the throughput of ports on a switch measured as a percentage of its maximum theoretical throughput. To run the Interface Utilization Summary report, select Resource Utilization > Network Interface > Interface Utilization Summary from the navigation tree. A control panel is displayed that includes the reports described in Table 283 on page 306.

Table 283

Interface Utilization Summary control panel Report Network Interface Utilization Average Network Interface Utilization Maximum Network Interface Utilization Description Trend chart that shows the percent of utilization of each port on a switch over the specified time period. Bar chart that shows the average utilization of each port on the switch over the specified time period. Bar chart that shows the maximum utilization of each port on the switch over the specified time period.

306

EMC Data Protection Advisor Version 5.8 Report Reference Guide

IP Switch Reporting

Status reports
Status reports provide information about the status of the components of an IP switch. These reports include:

"Network Interface Status" on page 307 "Network Interface Link Pair" on page 307 "Network Interface Link Pair Autonegotiation Status" on page 308 "Network Interface Link Pair Duplex Status" on page 308

Network Interface Status

The Network Interface Status report displays information about status of interfaces on a switch, such as:

Whether the interface has a link to a host. Speed at which the interface is running. Whether the interface is operating in full-duplex mode.

To run the Network Interface Status report, select Status > Network Interface Status from the navigation tree. Table 284 on page 307 describes the fields displayed on this report.
Table 284 Network Interface Status report Field Hostname Interface Link Up Speed Full Duplex Description Name of the switch. Name of the interface. If selected, indicates that the interface has a link with a switch. Speed, in megabytes per second, at which the interface is running. If selected, indicates that the interface is operating in full-duplex mode.

Network Interface Link Pair

The Network Interface Link Pair report displays information about connectivity between the interface on a switch and the host to which it is connected. For each interface on the switch, the report displays the host to which it is connected. For this report to perform correctly, data must be gathered from the host and from the switch. To run the Network Interface Link Pair report, select Status > Network Interface Link Pair from the navigation tree. Table 285 on page 307 describes the fields displayed on this report.

Table 285

Network Interface Link Pair report Field Host name Host port Switch name Switch port Description Name of the host. Name of the interface on the host. Name of the switch. Name of the port on the switch.

Status reports

307

IP Switch Reporting

Network Interface Link Pair Autonegotiation Status

The Network Interface Link Pair Autonegotiation Status report displays information about the autonegotiation status for both the switch and the network interface on the host machine to which it is connected. It allows users to identify when clients may be configured with different settings to the switch that can result in performance problems. To run the Network Interface Link Pair Autonegotiation Status report, select Status > Network Interface Link Pair Autonegotiation Status from the navigation tree. Table 286 on page 308 describes the fields displayed on this report.

Table 286

Network Interface Link Pair Autonegotiation Status report Field Local Name Local Port Local Autonegotiation Remote Name Remote Port Remote Autonegotiation Description Name of the host. Name of the interface on the host. If selected, indicates that the interface on the host is configured to autonegotiate speed and duplex settings with the switch. Name of the switch to which the host network interface is connected. Name of the interface on the switch to which the host is connected. If selected, indicates that the interface on the switch is configured to autonegotiate speed and duplex settings with the host.

Network Interface Link Pair Duplex Status

The Network Interface Link Pair Duplex Status report displays information about the duplex settings for both interfaces on a switch and the network interface on the host machine to which it is connected. This report allows users to identify when clients may be configured with different settings to the switch that can result in performance problems. To run the Network Interface Link Pair Duplex Status report, select Status > Network Interface Link Pair Duplex Status from the navigation tree. Table 287 on page 308 describes the fields displayed on this report.

Table 287

Network Interface Link Pair Duplex Status report Field Local Node Local Port Local Duplex Remote Node Remote Port Remote Duplex Description Name of the host. Name of the interface on the host. If selected, indicates the duplex setting for the interface on the host is set to full-duplex. Name of the switch. Name of the network interface on the switch. If selected, indicates that the duplex setting for the interface on the switch is set to full duplex.

308

EMC Data Protection Advisor Version 5.8 Report Reference Guide

IP Switch Reporting

Troubleshooting reports
Troubleshooting reports provide information about errors that have occurred for switches and interfaces. These reports include:

"Network Interface Errors by Interface" on page 309 "Network Interface Errors by Node" on page 309 "Aggregate Network Interface Errors" on page 309

Network Interface Errors by Interface

The Network Interface Errors by Interface report displays information about the number of errors received by and sent from the interface over a given time period. To run the Network Interface Errors by Interface report, select Troubleshooting > Network Interface Errors by Interface from the navigation tree. Table 288 on page 309 describes the fields displayed on this report.

Table 288

Network Interface Errors by Interface report Field Hostname Interface Errors In Errors Out Description Name of the switch. Name of the interface on the switch. Number of errors the interface receives. Number of errors the interface sends.

Network Interface Errors by Node

The Network Interface Errors by Interface report displays information about the total number of errors received by and sent from all interfaces on a switch over the specified time period. This report is only available at the node level. To run the Network Interface Errors by Interface report, select Troubleshooting > Network Interface Errors by Node from the navigation tree. Table 289 on page 309 describes the fields displayed on this report.

Table 289

Network Interface Errors by Node report Field Hostname Errors In Errors Out Description Name of the switch. Number of errors the interface receives. Number of errors the interface sends.

Aggregate Network Interface Errors

The Aggregate Network Interface Errors report displays information about the total number of errors received by and sent from all switches over the specified time period. To run the Aggregate Network Interface Errors report, select Troubleshooting > Aggregate Network Interface Errors from the navigation tree.

Troubleshooting reports

309

IP Switch Reporting

Table 290 on page 310 describes the fields displayed on this report.
Table 290 Aggregate Network Interface Errors report Field Errors In Errors Out Description Number of errors coming in to the interface. Number of errors going out of the interface.

310

EMC Data Protection Advisor Version 5.8 Report Reference Guide

18
Xsigo Reporting

The reports that can be run against Xsigo appliances are categorized into the following areas:

Asset management reports ......................................................................................... 313 Status reports ................................................................................................................ 316 Performance reports..................................................................................................... 320 Troubleshooting reports .............................................................................................. 323

Xsigo Reporting

311

Xsigo Reporting

Running Xsigo reports


Data Protection Advisor (DPA) gathers information from Xsigo I/O Director. Monitoring of Xsigo is enabled if you have purchased a DPA for Xsigo license. For more information on how to obtain licenses for DPA, contact an EMC Account Manager or Customer Support Engineer.

312

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Xsigo Reporting

Asset management reports


Asset management reports provide information about the physical and virtual components of the Xsigo appliance. These reports include:

"Fibre Channel Port Configuration" on page 313 "Fan Configuration" on page 313 "PSU Configuration" on page 314 "Thermometer Configuration" on page 314 "Host Configuration" on page 314 "Infiniband Port Configuration" on page 315 "Network Interface Configuration" on page 315

Fibre Channel Port Configuration

The Fibre Channel Port Configuration report displays address information on virtual and physical Fibre Channel ports. To run the Fibre Channel Port Configuration report, select Asset Management > Fibre Channel > Fibre Channel Port Configuration from the navigation tree. Table 291 on page 313 describes the fields that display in this report.

Table 291

Fibre Channel Port Configuration report Field Hostname Port Virtual WWPN WWNN Description Hostname or IP for the Xsigo appliance. Xsigo identifier for the port. Indication of whether the port is a virtual Fibre Channel port. World Wide Port Number. World Wide Node Name.

Fan Configuration

The Fan Configuration report displays information on the hardware fans inside the Xsigo appliance. To run the Fan Configuration report, select Asset Management > Hardware > Fan Configuration from the navigation tree. Table 292 on page 313 describes the fields that display in this report.

Table 292

Fan configuration Field Node Name Model Serial Location Description Hostname or IP of the Xsigo appliance. Identifier for the fan. Model of the fan. Serial number of the fan. Case location of the fan.

Asset management reports

313

Xsigo Reporting

PSU Configuration

The PSU Configuration report displays information on the power supply units on a Xsigo appliance. To run the report, select Asset Management > Hardware > PSU Configuration from the navigation tree. Table 293 on page 314 describes the fields that display in this report.

Table 293

PSU Configuration Field Node Name Model Serial Description Hostname or IP of the Xsigo appliance. Identifier for the PSU. Model of the PSU. Serial number of the PSU.

Thermometer Configuration

The Thermometer Configuration report displays information on the temperature monitors inside the Xsigo appliance. To run the report, select Asset Management > Hardware > Thermometer Configuration from the navigation tree. Table 294 on page 314 describes the fields that display in this report.
Table 294 Thermometer Configuration Field Node Name Location Description Hostname or IP of the Xsigo appliance. Identifier for the thermometer. Case location of the thermometer.

Host Configuration

The Host Configuration report displays information on the Xsigo appliance host. To run the report, select Asset Management > Host > Host Configuration from the navigation tree. Table 295 on page 314 describes the fields that display in this report.

Table 295

Host Configuration Field Hostname Vendor Product OS Class Version Host ID Host Name Description Hostname or IP of the Xsigo appliance. Appliance vendor. Product model. Type of appliance. Firmware version of appliance OS. Chassis serial number. Chassis name.

314

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Xsigo Reporting

Infiniband Port Configuration

The Infiniband Port Configuration report displays information on the Infiniband ports. To run the report, select Asset Management > Infiniband > Infiniband Port Configuration from the navigation tree. Table 291 on page 313 describes the fields that display in this report

Table 296

Infiniband Port Configuration Field Hostname Name Description Hostname or IP of the Xsigo appliance. Name of the port.

Network Interface Configuration

The Network Interface Port Configuration report displays information on the addresses of network interfaces. To run the report, select Asset Management > Network Interface > Network Interface Configuration from the navigation tree. Table 297 on page 315 describes the fields that display in this report.

Table 297

Network Interface Configuration Field Hostname Name MAC Address Autonegotiation Virtual Description Hostname or IP of the Xsigo appliance. Name of the network interface. Address for media access control of the interface (physical ports only). Indication of whether autonegotiation is enabled on the interface. Indication of whether the port is a virtual interface.

Asset management reports

315

Xsigo Reporting

Status reports
The status category provides reports that describe the active status and activity of components of the Xsigo appliance, and the mapping of virtual to physical interfaces. These reports include:

"Fibre Channel Port Status" on page 316 "Hardware Status Reports" on page 316 "Host Status" on page 317 "Infiniband Port Status" on page 317 "Network Interface Status" on page 317 "Processor Status" on page 318 "Virtual to Physical Port Mapping" on page 318

Fibre Channel Port Status

The Fibre Channel Port Status report displays the active status of physical and virtual Fibre Channel ports. To run the report, select Status >Fibre Channel > Fibre Channel Port Status from the navigation tree. Table 298 on page 316 describes the fields that display in this report.

Table 298

Fibre Channel Port Status Field Hostname Port Link Active Administrative Link up Speed Virtual Description Name or IP of the Xsigo appliance. Name of the port. Indication of whether the physical port is active. Indication of whether the port has been disabled by an administrator. Speed of the port in MB/sec. Indication of whether the port is virtual.

Hardware Status Reports

DPA reports on the active status of the hardware components in the Xsigo appliance. To run these reports, select Status > Hardware from the navigation tree. Table 299 on page 316 describes these reports.

Table 299

Hardware Status reports Report Description

Environment Summary overview Control panel that summarizes the status of all components in the hardware environment. Fan Status PSU Status Thermometer Status Shows the current and expected speed for case fans. Shows the active status for all Power Supply Units. Shows the current temperature for active thermometers, and if the hot temperature threshold that has been exceeded.

316

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Xsigo Reporting

Host Status

The Host Status report shows the active status and last boot time for Xsigo appliances. To run the report, select Status > Host > Host Status from the navigation tree. Table 300 on page 317 describes the fields that display in this report.
Table 300 Host status Field Hostname Last boot Status Description Name or IP of the Xsigo appliance. Time the appliance was last booted. Indication of whether the appliance is active.

Infiniband Port Status

The Infiniband Port Status report shows the active status and last boot time for Xsigo appliances. To run the report, select Status > Infiniband > Infiniband Port Status from the navigation tree. Table 301 on page 317 describes the fields that display in this report.

Table 301

Infiniband Port Status Field Hostname Linkup Speed Description Name or IP of the Xsigo appliance. Indication of whether the port is active. Speed of the port in MB/seconds.

Network Interface Status

The Network Interface Status reports provides details on the network interfaces on a Xsigo appliance. To run any of the reports, select Status > Network Interface from the navigation tree. The reports are shown in Table 301 on page 317.

Table 302

Network interface status reports (page 1 of 2) Report Network Interface Status Description Displays details on the active status of network interfaces.

Status reports

317

Xsigo Reporting

Table 302

Network interface status reports (page 2 of 2) Report Network Interface Link Pair Description Displays information about connectivity between the interface on a switch, and the host to which it is connected. For each interface on the switch, the report displays the host to which it is connected. For this report to perform correctly, data must be gathered from the host and from the switch. Displays information about the autonegotiation status for both the switch, and the network interface on the host machine to which it is connected. It allows users to identify when clients may be configured with different settings to the switch that can result in performance problems. Displays information about the duplex settings for both interfaces on a switch, and the network interface on the host machine to which it is connected. It allows users to identify when clients may be configured with different settings to the switch that can result in performance problems.

Network Interface Link Pair Autonegotiation Status

Network Interface Link Pair Duplex Status

Table 303 on page 318 describes the fields that display in this report.
Table 303 Network interface status report Field Hostname Interface Link Up Administrative Link up Speed Full Duplex Virtual Description Name or IP of the Xsigo appliance. Name of the interface. Indication of whether the interface is active. Indication of whether the port has been disabled by an administrator. Speed, in terabytes per second, of the interface. Indication of whether the interface is full duplex. Indication of whether the interface is virtual.

Processor Status

The Processor Status report shows the online and offline counts for Xsigo appliance processors. To run the report, select Status > Processor > Processor Status from the navigation tree.

Virtual to Physical Port Mapping

The Virtual to Physical Port Mapping report shows the mapping of physical to virtual ports on the Xsigo appliance. To run the report, select Status > Xsigo > Virtual to Physical Port Mapping from the navigation tree. Table 304 on page 319 describes the fields that display in this report.

318

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Xsigo Reporting

Table 304

Virtual to Physical Port Mapping Field Hostname Virtual Type Virtual Port Physical Port Description Name or IP of the Xsigo appliance. Indication of whether the virtual port is a virtual HBA or virtual network interface. ID of the virtual port. ID of the physical port.

Status reports

319

Xsigo Reporting

Performance reports
In any virtualized environment that attempts to reach high levels of efficiency, there is a requirement to run physical connections at suitable levels of utilization. This is usually carried out through the creation of multiple virtual connections on the physical connection. The cumulative throughput of the virtual connections is higher than that of the physical connection, resulting in over-allocation. The expectation is that the combined actual throughput of the virtual connections approaches the limit of the physical connection. The Xsigo module on DPA monitors a number of items associated with physical connections, including:

Throughput of the physical connection using Infiniband, Ethernet, and Fibre Channel. Individual throughput of each of the virtual connections on sophistical connection.

The performance reports show if a physical connection is reaching its utilization limit, and if so, which virtual connection or connections are causing this. It is also possible to see where physical connections are underutilized.

Fibre Channel performance reports


Table 305

The Fibre Channel performance reports are described in Table 305 on page 320. To run these reports, select Performance > Fibre Channel from the navigation tree.
Fibre Channel performance reports Report Fibre Channel Port Utilization Fibre Channel Port Performance by Port Fibre Channel Port Performance by Node Aggregate Fibre Channel Port Performance Virtual Fibre Channel Port Utilization Virtual Fibre Channel Port Performance by Port Virtual Fibre Channel Port Performance by Port Aggregate Virtual Fibre Channel Port Performance Description Percentage utilization of the physical port, displayed by port. Data, in megabytes per second, and frame (1000s/sec) throughput of the port, displayed by port. Data, in megabytes per second, and frame (1000s/sec) throughput of Fibre Channel ports, displayed by node. Data, in megabytes per second, and frame (1000s/sec) throughput of Fibre Channel ports, aggregated over the selected nodes. Percentage utilization of the physical port, displayed by port. Data, in kilobytes per second, and frame (1000s/sec) throughput of the virtual port, displayed by port. Data, in kilobytes per second, and frame (1000s/sec) throughput of virtual ports, displayed by node. Data, in kilobytes per second, and frame (1000s/sec) throughput of virtual ports, aggregated over the selected nodes.

320

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Xsigo Reporting

Network interface performance reports


Table 306

The network interface performance reports are described in Table 306 on page 321.

Network interface performance reports Report Network Interface Utilization Summary Network Interface Performance by Interface Network Interface Performance by Node Aggregate Network Interface Performance Virtual Network Interface Performance by Interface Virtual Network Interface Performance by Node Virtual Network Interface Performance Description Control panel that shows the maximum and average throughput by network interface, and performance in KB/sec by interface. Throughput, in kilobytes per second, displayed by network interface. Throughput, in kilobytes per second, displayed by node. Throughput, in kilobytes per second, aggregated across the selected nodes. Throughput, in kilobytes per second, displayed by network interface. Throughput, in kilobytes per second, displayed by node. Throughput, in kilobytes per second, aggregated across the selected nodes.

Processor reports
Table 307

The Processor Performance reports are described in Table 307 on page 321. To run these reports, select Performance > Processor from the navigation tree.
Processor reports Report Processor Utilization by CPU Processor Utilization by Node Aggregate Processor Utilization Description Percentage utilization of processor, displayed by CPU. Percentage processor utilization, displayed by node. Percentage processor utilization aggregated over the selected nodes.

Infiniband performance reports


Table 308

Table 308 on page 321 describes the Infiniband Performance reports. To run the reports, select Performance > Infiniband from the navigation tree.
Infiniband performance reports Report Infiniband Port Utilization Infiniband Port Performance by Port Infiniband Port Performance by Node Aggregate Port Utilization Description Percentage utilization of the Infiniband port or ports. Percentage utilization of the Infiniband port, displayed by port. Percentage utilization of the Infiniband port, displayed by node. Percentage utilization of the Infiniband port, aggregated over the selected nodes.

Performance reports

321

Xsigo Reporting

Virtual Port Queue Depth Summary

This report summarizes the queue activity for virtual ports on a Xsigo appliance. To run the report, select Performance > Xsigo > Virtual Port Queue Depth Summary from the navigation tree. Table 309 on page 322 describes the fields that display in this report
Virtual Port Queue Depth Summary report Field Hostname Port Type Port Average Queue Depth Maximum Queue Depth Minimum Queue Depth Description Name or IP of the Xsigo appliance. Indication of whether the port is a virtual network interface or HBA. Identifier for the port. Average depth of the ports I/O queue over the time period. Maximum depth of the ports I/O queue over the time period. Minimum depth of the ports I/O queue over the time period.

Table 309

322

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Xsigo Reporting

Troubleshooting reports
Troubleshooting reports summarize the error throughput of a network and Fibre Channel interfaces. This allows users to view channels of high or low utilization and error rates and to identify potential trouble spots.

Network Interface Errors by Interface

The Network Interface Errors by Interface report displays the error counts and discarded frame counts that are incoming and outgoing by network interface. To run the report, right-click the node or nodes and select Troubleshooting > Network interface > Network interface errors by interface.

Aggregate Network Interface Errors

The Aggregate Network Interface Errors report displays the error count and discarded frame count that are incoming and outgoing, aggregated over the group node or selected nodes. To run the report, right-click the node or nodes and select Troubleshooting > Network interface > Aggregate Network interface errors.

Fibre Channel Port Errors by Port

The Fibre Channel Port Errors by Port report displays the error counts and discarded frame counts that are incoming and outgoing by Fibre Channel port. To run the report, right-click the node or nodes and select Troubleshooting > Fibre Channel > Fibre Channel port errors by port.

Aggregate Fibre Channel port errors

The Aggregate Fibre Channel Port Errors report displays the error count and discarded frame count that are incoming and outgoing, aggregated over group node or selected Fibre Channel port nodes. To run the report, right-click the node or nodes and select Troubleshooting > Fibre Channel > Aggregate Fibre Channel port errors.

Troubleshooting reports

323

Xsigo Reporting

324

EMC Data Protection Advisor Version 5.8 Report Reference Guide

19
System Reporting

The system reporting reports are organized into a number of categories defined in this section:

Gathering data .............................................................................................................. 326 Asset management reports ......................................................................................... 327 Configuration reports .................................................................................................. 333 Performance reports..................................................................................................... 334 Resource utilization reports........................................................................................ 336 Status reports ................................................................................................................ 339 Troubleshooting reports .............................................................................................. 342

System Reporting

325

System Reporting

Gathering data
DPA can gather information from host operating systems, which allows users to report on the configuration, status, and performance of:

Backup servers Media servers Backup clients

The type of system information that can be gathered is defined in Table 310 on page 326.
Table 310 Operating system modules Module CPU Memory Disk Filesystem Fibre Channel HBA OS Version Network Interface Process Tape Drive Gathers information on... CPUs configured on the machine. Memory configured on the machine. Disks configured on the machine. Filesystems configured on the machine. HBAs configured on the machine. Version of the operating system. Network interfaces configured on the machine. Running processes on the machine. Performance of tape drives on the machine. Available only on Solaris hosts.

326

EMC Data Protection Advisor Version 5.8 Report Reference Guide

System Reporting

Asset management reports


Asset Management reports show the physical configuration of a machines components. The asset management control panel provides a high-level view of a machines configuration. To run this report, right-click the node and select Asset Management > Overview from the navigation tree. The Asset Management control panel displays:

Summary of the number of processors Amount of memory Number of network interfaces Number of Fibre Channel HBAs Disk and filesystem configuration on a machine

For more specific details on the hosts configuration, select one of the reports described in the following sections.

Asset management reports

327

System Reporting

Card Configuration

The Card Configuration report provides information about the cards configured for a node such as type, manufacturer, model, description, and serial number. To run the Card Configuration report, select Asset Management > Hardware > Card Configuration from the navigation tree. Table 311 on page 328 describes the fields that can be included in the Card Configuration report.

Table 311

Card Configuration report Field Node Type Description Name of the node. Type of the card: Fibre Channel iSCSI Network Manufacturer of the card. Model of the card. Name of the card. Description of the card. Serial number of the card. Version of the card hardware. Version of the card firmware. Name of the card driver. Version of the card driver.

Manufacturer Model Name Description Serial Hardware version Firmware version Driver name Driver version

Disk

There are two reports that provide information on disk configuration:


"Disk Summary" on page 328 "Disk Configuration" on page 328

Disk Summary

The Disk Summary report provides a summary of the total number of disks on a host and the total amount of storage capacity configured. To run the Disk Summary report, select Asset Management > Disk > Disk Summary from the navigation tree.

Disk Configuration

The Disk Configuration report provides a detailed tabular report that shows configuration information on each disk on a host.

328

EMC Data Protection Advisor Version 5.8 Report Reference Guide

System Reporting

To run the Disk Configuration report, select Asset Management > Disk > Disk Configuration from the navigation tree. The Disk Configuration report provides the information on the disks configured on a host as described in Table 312 on page 329.
Table 312 Disk Configuration report Field Hostname Device Manufacturer Model Serial Number Firmware Revision Size (GB) Description Name of the disks host. Identifier for the disk from the operating system. Manufacturer of the disk. Model of the disk. Serial number of the disk. Firmware version of the disk. Size, in gigabytes, of the disk.

Fibre Channel HBAs

For more detailed information on the configuration of Fibre Channel HBAs on a machine, select Asset Management > Fibre Channel > Fibre Channel Port Configuration from the navigation tree. Table 313 on page 329 describes the fields that can be included in this report.

Table 313

Fibre Channel Port Configuration fields Field Hostname Port WWPN Description Host on which the HBA is configured. Identifier for the HBA. World Wide Port Name associated with the HBA.

Filesystem

For more detailed information on the configuration of filesystems on a machine, select Asset management > Filesystem > Filesystem Configuration from the navigation tree. Table 314 on page 329 describes the fields that can be included in this report.
Table 314 Filesystem Report Field Hostname Filesystem Device Type Capacity Description Name of the filesystems host. Name of the filesystem. Operating system device name for the filesystem, for example, /dev/md0. Type of filesystem, for example, NTFS. Capacity of the filesystem.

To see which physical disks are mapped to which filesystem, run the Asset Management > Filesystem > Underlying Disk Details report.

Asset management reports

329

System Reporting

Note: The underlying disk details report is not available on HP-UX platforms.

Host

To view information on the operating system version of a host, run Asset Management > Host > Host Configuration from the navigation tree. Table 315 on page 330 describes the fields that can be included in this report.
Host Configuration report Field Hostname Vendor Product OS Class Version iSCSI Name Description Name of the host. Operating system vendor. Product, for example, Solaris, Microsoft Windows 2000 Server. Class of operating system, for example, UNIX, Windows. Specific version of the operating system. Node name for machines with iSCSI interfaces. Note: This field is not displayed for machines that do not have iSCSI interfaces.

Table 315

Memory

To display information about the memory configured on a host, run Asset Management >Memory > Memory Configuration from the navigation tree. The Memory Configuration report displays a summary of the total amount of physical memory and the total amount of virtual memory configured on the selected nodes. To view the details of the configuration of memory on individual machines, run the Asset Management > Memory > Memory Configuration Details report from the navigation tree. To view the shared memory settings, run the Shared Memory Configuration report. This data is available only from UNIX systems. To run this report, select Configuration > Memory > Shared Configuration Memory from the navigation tree. Table 316 on page 330 describes the fields that can be included in the Shared Memory Configuration report.

Table 316

Shared Memory Configuration (page 1 of 2) Field Hostname shmmax shmmni shmseg Description Name of the host. System-wide, maximum size, in megabytes, of a shared memory segment. System-wide, maximum number of shared memory segments. Maximum number of shared memory segments that can be simultaneously attached to a single process. Note: Not available on Solaris platforms.

330

EMC Data Protection Advisor Version 5.8 Report Reference Guide

System Reporting

Table 316

Shared Memory Configuration (page 2 of 2) Field msgmap Description Size of the free-space resource map used for assigning locations for new messages in shared memory. Note: Not available on Solaris and AIX platforms. msgmax msgmnb msgmni msgseg Maximum size, in bytes, of individual messages. Maximum total size, in bytes, of all messages that can be queued simultaneously on a message queue. Maximum number of message queues that can exist simultaneously on the system. System-wide maximum total number of message segments that can exist in all message queues at any given time. Note: Not available on Solaris and AIX platforms. msgssz Message segment size that is to be used when allocating message space in message queues. Note: Not available on Solaris and AIX platforms. msgtql Maximum number of messages that are allowed to exist on the system at any given time. Note: Not available on AIX. semmap Size of the free-space resource map used for allocating new System V IPC semaphores in shared memory. Note: Not available on Solaris, AIX, and HP-UX 11.23. semmni semmns Maximum number of sets of IPC semaphores that can exist simultaneously on the system. System-wide maximum number of individual IPC semaphores that can be allocated for users. Note: Not available on AIX. semmsl semopm Maximum number of semaphores per semaphore set. Number of semaphore operations that can be performed per semop call. Note: Not available on HP-UX. semume Maximum number of IPC semaphores that a given process can have undo operations pending on.

Network Interface

For more detailed information on the configuration of the network interfaces on a host, select Asset Management > Network Interface > Network Interface

Asset management reports

331

System Reporting

Configuration from the navigation tree. Table 317 on page 332 describes the fields that can be included in this report.
Table 317 Network Interface report Field Hostname Interface Description MAC Address Autonegotiation MTU Multicast Send Buffer Description Name of the host on which the network interface resides. Name of the network interface. Description of the interface. This description can only be gathered for network switches. Ethernet address for the network interface. Indication of whether auto negotiation is enabled on this interface. Size of the largest packet that a network protocol can transmit. If enabled, the interface can send data to more than one address at the same time. Amount of data that can be sent before receiving a reply. Note: If size is not specified on the interface, then the system-wide settings are used. Received Buffer Amount of data that can be received before sending a reply. Note: If size is not specified on the interface, then the system-wide settings are used. Simplex If enabled, the interface messages are filtered and not displayed.

Processor

For more detailed information on the configuration of CPUs on a machine, select Asset management > Processor > Processor Configuration report from the navigation tree. Table 318 on page 332 describes the fields that display in this report.
Processor Report fields Field Host Num Make Model Speed (GHz) Description Name of the host on which the processor is configured. Identifier for the processor. Make of the processor, for example, Intel. Model of the processor. Speed, in gigahertz, at which the processor is configured to run.

Table 318

332

EMC Data Protection Advisor Version 5.8 Report Reference Guide

System Reporting

Configuration reports
Configuration reports allow users to view the system configuration details.

Network IP Configuration

The Network IP Configuration report displays information about the configuration of the interfaces on a network. Run this report to view data such as IP address, host name, and gateway information. To run this report, select Configuration > Network > IP Configuration report from the navigation tree. Table 319 on page 333 describes the fields that can be included in this report.
Table 319 Network IP Configuration Field Hostname Interface Description Name of the host. Name of the interface. Note: For HP-UX, the interface name consists of the PPA path, module name plus instance number, and driver name in brackets. IP Address Network Mask Host Name Gateway Broadcast Boot Protocol IP address of the interface. There may be multiple IP addresses for each interface. Netmask of the interface. Hostname of the network interface. Gateway used by the interface. If selected, indicates that messages can be sent with no address and are sent to everyone listening. Boot protocol of the interface, for example, static, or DHCP.

Configuration reports

333

System Reporting

Performance reports
Performance reports allow users to analyze the performance of the disks, network interfaces, and Fibre Channel HBAs configured on a host. To obtain an overview of the performance on a host, view the System Performance control panel by selecting Performance > Overviews > System Performance from the navigation tree. This control panel displays an overview of disk, network interface, and Fibre Channel HBA performance on the host.

Disk performance
Table 320

There are three reports that can be used to analyze disk performance in more detail as described in Table 320 on page 334.
Disk Performance reports Report Disk Performance by Disk Disk Performance by Host Description Displays the performance on each individual disk on a host or group of hosts. When run from a group node, displays the disk performance on each node in the group by aggregating the performance of all disks on each host. Displays the aggregate performance of all disks on all nodes from which the report has been run.

Aggregate Disk Performance

To run these reports, select the report from the Performance > Disk menu of the navigation tree. To display disk performance from a filesystem, run the Performance > Filesystem > Underlying Disk Performance report.

Fibre Channel performance


Table 321

There are three reports, described in Table 321 on page 334, that allow users to analyze Fibre Channel HBA performance in more detail.
Fibre Channel HBA performance Report Fibre Channel Port Performance by Port Fibre Channel Port Performance by Node Aggregate Fibre Channel Port Performance Description Displays the performance on each individual HBA on a host or group of hosts. When run from a group node, displays the aggregate Fibre Channel performance on each node in the group, by summing the total performance of all HBAs on each host. Displays the aggregate performance of all HBAs on all nodes from which the report has been run.

To run these reports, select the report from the Performance > Fibre Channel menu on the navigation tree.

334

EMC Data Protection Advisor Version 5.8 Report Reference Guide

System Reporting

Network performance
Table 322

There are three reports, described in Table 322 on page 335, that allow users to analyze the network interface performance on a host.
Network performance reports Report Network Interface Performance by Interface Network Interface Performance by Node Aggregate Network Interface Performance Description Displays the performance on each network card on the host or group of hosts. When run from a group node, displays the aggregate network interface performance on each node in the group by summing the total performance of all network interfaces on that host. Displays the aggregate performance of all network interfaces on all nodes from which the report has been run.

To run these reports, select the report from the Performance > Network Interface menu on the navigation tree.

Performance reports

335

System Reporting

Resource utilization reports


The resource utilization category includes reports that allow users to analyze the resource utilization of components of a host as described in Table 323 on page 336.
Table 323 Resource Utilization reports Report "System Resource utilization" on page 336 "Filesystem utilization reports" on page 336 "Memory utilization reports" on page 337 "Process utilization reports" on page 337 "Processor utilization reports" on page 337 Description Control panel that provides an overview of resource utilization on a host. Allow users to analyze filesystem utilization on a host or group of hosts Allows users to display the memory utilization of the host. Allows users to display the CPU utilization and memory usage of processes that run on a host. Allows users to display the utilization of CPUs on the host.

System Resource utilization

The System Resource Utilization control panel provides an overview of resource utilization on a host, including reports that show the utilization over time of:

Processor Memory Network interface Filesystem

To view the System Resource Utilization control panel, select Resource Utilization > Overviews > System Resource Utilization from the navigation tree.

Filesystem utilization reports


Table 324

The reports that allow users to analyze filesystem utilization on a host or group of hosts are described in Table 324 on page 336.
Filesystem Utilization reports Report Filesystem Utilization Node Utilization Description Displays the utilization of all filesystems on a host, or group of hosts, over time. When run from a group node, displays the average filesystem utilization on a host over time by averaging the utilization across all filesystems on that host. Displays the aggregate filesystem utilization over time of all filesystems across all hosts selected in the report.

Aggregate Utilization

To run these reports, select Resource Utilization > Filesystem > report from the navigation tree.

336

EMC Data Protection Advisor Version 5.8 Report Reference Guide

System Reporting

Memory utilization reports


Table 325

The reports available to analyze memory utilization on a host are described in Table 325 on page 337.
Memory Utilization reports Report Memory Utilization by Node Memory Utilization Description When run from a group node, displays the utilization over time of memory on a per host basis. Displays the aggregate memory utilization over time of memory on all hosts selected in the report.

To run these reports, select Resource Utilization > Memory > report on the navigation tree.

Process utilization reports

The Process menu of the Resource Utilization reports allows users to report on the CPU utilization and memory usage of processes that run on a host. Use the process reports to identify processes that are consuming too much memory and CPU on a machine. The CPU Utilization report displays the CPU utilization of all processes that are run on a machine over the reports time period. To run the report, select Resource Utilization > Process > CPU Utilization from the navigation tree. To identify the processes on the CPU Utilization reports, position the mouse cursor over data series. A tooltip displays information on that point, including the process name. To simplify and limit the information being presented to a specific number of processes, launch the report toolbar, and click the Series icon to add or remove series from the graph.

CPU Utilization

Memory Utilization

To view the memory usage of processes running on a machine, select Resource Utilization > Process > Memory Utilization from the navigation tree. In addition to displaying CPU Utilization by process, this report also displays overall CPU Utilization on a host as described in Table 326 on page 337.
Processor Utilization reports Report Processor Utilization by CPU Processor Utilization by Node Description Displays the utilization of each individual CPU on a host or group of hosts over time. When run from a group node, displays the average CPU utilization on a host over time by averaging the utilization across all processors on that host. Displays the aggregate processor utilization over time of all processors across all hosts selected in the report.

Processor utilization reports


Table 326

Aggregate Processor Utilization

To run these reports, select them from Resource Utilization > Processor menu on the navigation tree.

Resource utilization reports

337

System Reporting

Process Status Report

If there is a point of interest in a Processor Utilization chart, such as a significant increase in CPU utilization, and you want to display the processes that were consuming that CPU, do the following: 1. Click in the report and drag the cursor over the area of interest. 2. Right-click in the highlighted area to open a menu. 3. Run the Process Status report to display the processes that were running on the machine at that time.

338

EMC Data Protection Advisor Version 5.8 Report Reference Guide

System Reporting

Status reports
Status reports show a detailed status of the component at a point in time. The Status reports are broken into a number of categories as described in Table 327 on page 339.
Table 327 Status reports Report category "Disk Status" on page 339 "Fibre Channel Status" on page 339 Filesystem Host Memory Network Interface Process Processor Description Displays the status of disks on a host. Displays the status of HBAs on a host. Displays the status of filesystems on a host. Displays status of the operating system. Displays the status of memory on the host. Displays the status of network interfaces on the host. Displays the status of processes on the host. Displays the status of CPUs on the host.

Disk Status
Table 328

Table 328 on page 339 describes the fields that display in the Disk Status report.
Disk Status report Field Node Device State Errors Description Name of the host on which the disk is configured. Identifier for the disk. Indication of whether the disk is OK or not. Indication of whether there are any errors on the disk.

To run the Disk Status report, select Status > Disk > Disk Status from the navigation tree.

Fibre Channel Status


Table 329

The Fibre Channel Status report displays the status of HBAs configured on a host. Table 329 on page 339 describes the fields that display in this report.
Fibre Channel Status report Field Hostname Port Link Active Speed Description Name of the host on which the HBAs are configured. Identifier for the HBA. Indication of whether the HBA has a connection with another device. Current speed at which the HBA is running.

To run the Fibre Channel status report, select Status > Fibre Channel > Fibre Channel Port Status from the navigation tree.
Status reports
339

System Reporting

Filesystem Status

The Filesystem Status report allows users to display the status of each filesystem on a host, and the status of the underlying disks on which the filesystem depends. Table 330 on page 340 describes the fields that display in this report.
Filesystem Status report Field Hostname Filesystem Used Space Used Files Description Name of the filesystems host. Name of the filesystem. Amount, in terabytes, of space that is currently used on the filesystem. Number of files that are on the filesystem.

Table 330

To run the Filesystem Status report, select Status > Filesystem > Filesystem Status from the navigation tree. Underlying Disk Status To display the status of a filesystems underlying disks, selecting Status > Filesystem > Underlying Disk Status report from the navigation tree. Table 331 on page 340 describes the fields that display in this report.
Table 331 Underlying Disk Status report fields Field Filesystem node Filesystem Disk node Disk State Description Name of the host on which the filesystem is located. Name of the filesystem. Name of the host on which the disks associated with the filesystem are stored. Identifier for the disks to which the filesystem is mapped. Status of the disk.

Host Status

The Host Status report returns information about the last time that the host rebooted. To run the report, select Status > Host > Host Status from the navigation tree. There are two reports available that allow users to monitor the status of memory on a machine:

Memory Status

Memory Status by Node Memory Status

Memory Status by Node Memory Status

When run from a group node, the Memory Status by Node report displays the current status of memory utilization on all nodes in the group. To display the overall memory status on a host or group of hosts, select Status > Memory > Memory Status. The Memory Status report is displayed.

340

EMC Data Protection Advisor Version 5.8 Report Reference Guide

System Reporting

Network Interface Status


Table 332

The reports that display the status of network interface cards on a host or group of hosts are described in Table 332 on page 341.
Network Interface report Report Network Interface Status Description Tabular report displaying the state of each interface on the host, including whether it has a link with a switch, the speed at which it is running, and its duplex setting. If gathering information from switches and hosts, this report shows the port on a switch to which the host is connected. If gathering information from switches and from hosts, this report displays the: Port on the switch to which the interface card is linked. Autonegotiation settings on both sides of the link. If gathering information from switches and from hosts, this report displays the: Port on the switch to which the interface card is linked. Duplex settings on both sides of the link.

Network Interface Link Pair Network Interface Link Pair Autonegotiation Status

Network Interface Link Pair Duplex Status

To run the Network Interface Status reports, select Status > Network Interface > report from the navigation tree.

Process Status

To view the status of all processes on a machine at a certain point, run the Process Status report. The Process Status report is a tabular report that displays each process that is running on a machine along with the CPU utilization and memory usage of that process at that time. To run the process status report, select Status > Process > Process Status from the navigation tree.

Processor Status

To obtain the status of CPUs on a host or group, run the Processor Status report. The Processor Status report displays a bar chart that shows the total number of CPUs that are online and the total number of CPUs that are offline on a host.

Status reports

341

System Reporting

Troubleshooting reports
Troubleshooting reports display the errors detected on network interface cards or Fibre Channel HBAs. Both report types are described in the following sections.

Network Interface
Table 333

There are three reports, described in Table 333 on page 342, available that display errors on network interface cards.
Network Interface Errors Report Network Interface Errors by Interface Network Interface Errors by Node Aggregate Network Interface Errors Description Displays the errors on each individual network interface on a host or group of hosts over time. When run from a group node, this report displays the errors on all network interfaces on a per-host basis over time. Displays the total number of network interface errors over time across all hosts selected in the report.

To run these reports, select Troubleshooting > Network Interface > report from the navigation tree.

Fibre Channel
Table 334

There are three reports, described in Table 334 on page 342, that display Fibre Channel HBA error information.
Fibre Channel HBA Error reports Report Fibre Channel Port Errors by Interface Fibre Channel Port Errors by Node Aggregate Fibre Channel Port Errors Description Displays the errors on each individual HBA on a host or group of hosts over time. When run from a group node, displays the errors on all HBAs on a per-host basis over time. Displays the total number of errors over time across all hosts selected in the report.

Run these reports by selecting Troubleshooting > Fibre Channel > report from the navigation tree.

342

EMC Data Protection Advisor Version 5.8 Report Reference Guide

20
Analysis Event Reporting

These reports are based on data gathered from the backup server or client and include the following:

Analysis reports............................................................................................................ 344 Capacity planning reports .......................................................................................... 346 Compliance reports...................................................................................................... 347 Configuration reports .................................................................................................. 348 Data protection reports................................................................................................ 349 Media management reports........................................................................................ 350 Performance reports..................................................................................................... 351 Service level management reports............................................................................. 352 Status reports ................................................................................................................ 353 Resource utilization reports........................................................................................ 354

Analysis Event Reporting

343

Analysis Event Reporting

Analysis reports
This section describes the reporting capabilities of DPA for analysis events.

Analysis Events Overview reports

The Analysis Events Overview control panel shows the severity, category, time of events, and the last five events on the backup server. To view this control panel, select Analysis > Analysis Event Overview from the navigation tree. Table 335 on page 344. describes the Analysis Events Overview reports.

Table 335

Analysis Events Overview reports Report Event Distribution by Severity Event Distribution by Category Event Distribution by Time Last 5 Events Description Pie chart that shows the number of events broken into severity. Pie chart that shows the number of events broken into category. Categories define the type of event that occurred. Bar chart that shows the number of events specified in a time frame. Detailed table that shows the last five events that have occurred.

Analysis Event Details

The Analysis Event Details report displays details such as the category, message, number of occurrences, and dates of the first and last occurrences of the analysis event for a defined time period. To run this report, select Analysis > Event Details from the navigation tree. Table 336 on page 344 describes the fields that display in this report.

Table 336

Analysis Event Details fields Fields Hostname Category Message Count First Occurrence Last Occurrence Description Name of the client on which the analysis event occurred. Category in which the analysis event occurred. Alert message generated by the analysis event. Number of times that the alert occurred. Date and time that the alert first occurred. Date and time that the alert last occurred.

Analysis Events During Backup

The Analysis Events During Backup report displays details about the analysis event for a defined time period. To run the Analysis Events During Backup report, right-click the report results for the Client Schedule report or Job Schedule report. Chapter 1, "Backup Application Reporting" contains information about the Client Schedule and Job Schedule reports. The Analysis Event Details report is described in Table 337 on page 345.

344

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Analysis Event Reporting

Table 337

Analysis Event Details fields Report Hostname Latest message Severity Group Count First occurrence Last occurrence Description Name of the client on which the analysis event occurred. Alert message generated by the analysis event. Severity of the alert. Name of the group for which the alert was generated. Number of times that the alert occurred. Date and time that the alert first occurred. Date and time that the alert last occurred.

Analysis reports

345

Analysis Event Reporting

Capacity planning reports


The Capacity Planning Analysis Events report displays analysis events and alerts generated in the capacity planning category. To run this report, select Capacity Planning > Events from the navigation tree. Table 338 on page 346 describes the fields that display in this report.
Table 338 Capacity Planning Analysis Events fields Field Hostname Message First Occurrence Last Occurrence Description Name of the client on which the analysis event occurred. Alert message generated by the analysis event. Date and time that the alert first occurred. Date and time that the alert last occurred.

346

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Analysis Event Reporting

Compliance reports
The Compliance Analysis Events report displays analysis events and alerts generated in the compliance category. This report can be added to the menu by an administrator to enable users to run it. Table 339 on page 347. describes the fields that display in this report.
Table 339 Compliance Analysis Events fields Field Hostname Message First occurrence Last occurrence Description Name of the client on which the analysis event occurred. Alert message generated by the analysis event. Date and time that the alert first occurred. Date and time that the alert last occurred.

Compliance reports

347

Analysis Event Reporting

Configuration reports
The Configuration Analysis Events report displays analysis events and alerts generated in the configuration category. To run this report, select Configuration > Events from the navigation tree. Table 340 on page 348 describes the fields that display in this report.
Table 340 Configuration Analysis Events fields Field Hostname Message First Occurrence Last Occurrence Description Name of the client on which the analysis event occurred. Alert message generated by the analysis event. Date and time that the alert first occurred. Date and time that the alert last occurred.

348

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Analysis Event Reporting

Data protection reports


The Data Protection Analysis Events report displays analysis events and alerts generated in the data protection category. To run this report, select Data Protection > Events from the navigation tree. Table 341 on page 349 describes the fields that display in this report.
Table 341 Data Protection Analysis Events fields Field Hostname Message First Occurrence Last Occurrence Description Name of the client on which the analysis event occurred. Alert message generated by the analysis event. Date and time that the alert first occurred. Date and time that the alert last occurred.

Data protection reports

349

Analysis Event Reporting

Media management reports


The Media Management Analysis Events report displays analysis events and alerts generated in the media management category. To run this report, select Media Management > Events from the navigation tree. Table 342 on page 350 describes the fields that display in this report.
Table 342 Media Management Analysis Events fields Field Hostname Event ID Severity Group Message First occurrence Last occurrence Count Description Name of the client on which the analysis event occurred. ID of the analysis event. Severity of the alert. Name of the group for which the alert was generated. Alert message generated by the analysis event. Date and time that the alert first occurred. Date and time that the alert last occurred. Number of times that the alert occurred.

350

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Analysis Event Reporting

Performance reports
The Performance Analysis Events report displays analysis events and alerts generated in the performance category. To run this report, select Performance > Events from the navigation tree. Table 343 on page 351 describes the fields that display in this report.
Table 343 Performance Analysis Events fields Field Hostname Message First occurrence Last occurrence Description Name of the client on which the analysis event occurred. Alert message generated by the analysis event. Date and time that the alert first occurred. Date and time that the alert last occurred.

Performance reports

351

Analysis Event Reporting

Service level management reports


The Service Level Management Analysis Events report displays analysis events and alerts generated in the service level management category. To run this report, select Service Level Management > Events from the navigation tree. Table 344 on page 352 describes the fields that display in this report.
Table 344 Service Level Management Analysis Events fields Field Hostname Message First occurrence Last occurrence Description Name of the client on which the analysis event occurred. Alert message generated by the analysis event. Date and time that the alert first occurred. Date and time that the alert last occurred.

352

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Analysis Event Reporting

Status reports
The Status Analysis Events report displays analysis events and alerts generated in the status category. To run this report, select Status > Events from the navigation tree. Table 345 on page 353 describes the fields that display in this report.
Table 345 Status Analysis Events fields Field Hostname Message First Occurrence Last Occurrence Description Name of the client on which the analysis event occurred. Alert message generated by the analysis event. Date and time that the alert first occurred. Date and time that the alert last occurred.

Status reports

353

Analysis Event Reporting

Resource utilization reports


The Resource Utilization Analysis Events report displays analysis events and alerts generated in the resource utilization category. To run this report, select Resource Utilization > Events from the navigation tree. Table 346 on page 354 describes the fields that display in this report.
Table 346 Resource Utilization Analysis Events fields Field Hostname Message First occurrence Last occurrence Description Name of the client on which the analysis event occurred. Alert message generated by the analysis event. Date and time that the alert first occurred. Date and time that the alert last occurred.

354

EMC Data Protection Advisor Version 5.8 Report Reference Guide

21
Data Protection Advisor Reporting

The reports that provide details on the performance, status, and security of DPA itself are categorized into the following areas and are discussed in more detail:

Error reports.................................................................................................................. 356 History reports.............................................................................................................. 358 Performance reports..................................................................................................... 361 Security reports............................................................................................................. 363 Status reports ................................................................................................................ 366

Data Protection Advisor Reporting

355

Data Protection Advisor Reporting

Error reports
Error reports provide information about errors that have occurred on the collector process. These reports include:

"Collector Errors" on page 356 "Collector logs" on page 356

Collector Errors

The Collector Errors report displays information about errors that have occurred on the collector process. To run the Collector Errors report, select DPA > Errors > Collector Errors from the DPA server in the navigation tree. Table 347 on page 356 describes the fields that display in this report.

Table 347

Collector Errors report Field Hostname Module Function Error ID Error Message Count First Occurrence Last Occurrence Description Name of the host running the Collector. Name of the module that generated the error. Name of the function that generated the error. ID number of the error. String describing the error. Number of times the error occurred. First time the error occurred. Last time the error occurred.

Collector logs

The Collector Logs report displays information about messages that have been logged by the collector process. To run the Collector Logs report, select DPA > Errors > Collector Logs from the DPA server in the navigation tree.

356

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Data Protection Advisor Reporting

Table 348 on page 357 describes the fields that display in this report.
Table 348 Collector Logs report Field Server Hostname Process Description Name of the server that is running the collector, always Data Protection Advisor. Name of the host from which the message was generated. Server process that generated the message: Controller Reporter Listener Publisher Analysis engine webapp Collector GUI Tool Installer Severity of message: Fatal Error Warn Info Identifier of the process that generated the message. Identifier of the thread from which the message generated. Any additional information about the message source. Code location that was the source of the error message (for C this is the module name, for Java this is the class name). Function in the code that was the source of the error message (relative to the Location field). First 2000 characters of the message. Timestamp of the message.

Level

Process ID Thread ID Context Location Function Message Timestamp

Server Logs

The Server Logs report displays information about messages that have been logged by DPA server processes. To run this report, select DPA > Errors > Server Logs from the DPA server in the navigation tree. The fields displayed in this report are the same as the Collector Logs report, described in Table 348 on page 357.

Error reports

357

Data Protection Advisor Reporting

History reports
The history reports provide information on the number of scheduled, running, and queued analyses and reports. These reports include:

"Analysis Engine History" on page 358 "Scheduled Report History" on page 358 "Report History" on page 359 "Request History" on page 359

Analysis Engine History

The Analysis Engine History report displays the details of analysis jobs that run from the Analysis Engine. To run the Analysis Engine History report, select DPA > History > Analysis History from the DPA server in the navigation tree. Table 349 on page 358 describes the fields that display in this report.

Table 349

Analysis Engine History report Field Server Analysis Name Ruleset Name View Object Status Total Time Scheduled Time Description Server on which the analysis jobs were run. Name of the analysis job. Name of the ruleset used by the analysis job. View on which the analysis job ran. Nodes on which the analysis job ran. Indication of whether the analysis job ran successfully or not. Total time taken for the analysis job to run. Time the analysis job was scheduled to run.

Scheduled Report History

The Scheduled Report History report displays details of scheduled reports that have been run from the Publisher. To run this report, select DPA > History > Scheduled Reports from the DPA Server node in the navigation tree. The fields displayed in this report are described in Table 350 on page 358.

Table 350

Scheduled Report History report (page 1 of 2) Field Scheduled Report Scheduled Time Server Report Name Control Panel Description Name of the scheduled report. Time the report was scheduled to run. Server on which the scheduled reports were run. Name of the report or control panel used by the scheduled report. Returns 1 if scheduled report is a control panel, or 0 if scheduled report is a report.

358

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Data Protection Advisor Reporting

Table 350

Scheduled Report History report (page 2 of 2) Field User View Object Status Total Time Description User that is running the scheduled report. View on which the scheduled report ran. Nodes against which the scheduled report ran. Whether the scheduled report ran successfully or failed. Total time taken for the scheduled report to run.

Report History

The Report History report displays details about reports that have been run from the Analysis Engine and the Publisher. To run the Report History report, select DPA > History > Report History from the DPA Server node in the navigation tree. Table 351 on page 359 describes the fields that display in this report.

Table 351

Report History report Field Id Server Report User View Object Status Period Total Time Datasource Time Num Datasource Values Num Result Values Start Time End Time Description Unique identifier for the report. Name of the DPA server. Name of the report. User who ran the report. Name of the view assigned to the object against which the report was run. Object or objects against which the report was run. Whether the report was successful. Duration of the time window selected for the report, in seconds. Total time taken for the report to run. Total time taken spent processing data sources. Total number of rows and fields returned from all data sources. Total number of rows and fields returned from the report after processing by any operators. Time the report started. Time the report finished.

Request History

The Request History report displays details about requests that have run for a node. To run the Request History report, right-click the node in the navigation tree that you want to view the request history for, and select DPA > History > Request History. The fields displayed in this report are described in Table 352 on page 360.

History reports

359

Data Protection Advisor Reporting

Table 352

Request History report Field Server Collector Module Function Target Status Error Message Report Size Start Time End Time Description Name of the DPA server host. Name of the host on which the Collector ran. Name of the module executed. Name of the function executed. Name of the host being monitored by the request. Whether the function was executed successfully or not. Messages logged for request. Size of the report returned. Time the request started. Time the request completed.

360

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Data Protection Advisor Reporting

Performance reports
The Performance category reports provide information on the current performance of key DPA server processes. These reports include:

"Listener Performance" on page 361 "Analysis Engine Performance" on page 361 "Publisher Performance" on page 361

Listener Performance

The Listener Performance report displays details about the performance of the Listener process. To run this report, select DPA > Performance > Listener Performance from the DPA Server node in the navigation tree. The fields displayed in this report are described in Table 353 on page 361.
Table 353 Listener Performance report Field Hostname Queue Length Queries Preprocessing Errors Processing Errors Listener Busy Errors Description Name of the host on which the listener is installed. Length of the listener queue. The number of database queries performed per second. The number of errors the listener encountered while parsing data received from collectors. The number of SQL server errors the listener encountered while inserting data into the database. The number of times the listener has sent a busy message back to a collector to tell it that it has reached Listeners maximum queue size.

Analysis Engine Performance

The Analysis Engine Performance report displays details about the number of analysis jobs scheduled and running on the DPA server. To run this report, select DPA > Performance > Analysis Engine Performance from the DPA Server node in the navigation tree. Table 354 on page 361 describes the fields that display in this report.

Table 354

Analysis Engine Performance report Field Server To running Waiting Assigned Description Server on which the analysis jobs are running. Number of analyses currently running. Number of analyses scheduled and queued to start. Number of analyses scheduled to run on the server.

Publisher Performance

The Publisher Performance report displays details about the number of reports scheduled and running on the DPA server.

Performance reports

361

Data Protection Advisor Reporting

To run this report, select DPA > Performance > Publisher Performance from the DPA Server node in the navigation tree. Table 355 on page 362 describes the fields that display in this report.
Table 355 Publisher Performance report Field Server To running Waiting Assigned Description Server on which the scheduled reports are running. Number of scheduled reports currently running. Number of reports scheduled and queued to start. Number of reports scheduled to run on the server.

Publisher Hung Analysis

The Publisher Hung analysis job can raise an alert if the Publisher queue does not change during the polling period (30 minutes). Assign the Publisher Hung analysis and an alert to a node in the navigation tree to receive an alert if the publisher queue hangs. The EMC Data Protection Advisor Administration Guide contains more information on assigning analysis jobs to nodes.

362

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Data Protection Advisor Reporting

Security reports
The Security Reports provide information on user access and configuration change history. These reports include:

"Access Log report" on page 363 "Audit Log report" on page 363

Access Log report

The Access Log report displays user login information. To run the Access Log report, select DPA > Security > Access Log from the DPA Server node in the navigation tree. Table 356 on page 363 describes the fields that are displayed in the Access Log report.

Table 356

Access Log report Field Start Time User Id Username Client Login Type Description Time that user logged in. Identifier of the user. Username of the user who performed the action on the DPA server. IP address of the client that performed an action on the DPA server. Mechanism used to authenticate the user. Methods include: Password Kerberos integrated login LDAP integrated login Indication of whether the action succeeded or failed.

Status

Audit Log report

The Audit Log report displays details about changes made to DPA, such as who made the changes, and when the changes were made. To run the Audit Log report, select DPA > Security > Audit Log from the navigation tree. Table 357 on page 363 describes the fields that display in the Audit Log report.

Table 357

Audit Log report (page 1 of 2) Field Date / Time User Id Username Client Description Date and time the change was made to DPA. Identifier of the user. Username of the user who performed the action on the DPA server. IP address of the client that performed an action on the DPA server.

Security reports

363

Data Protection Advisor Reporting

Table 357

Audit Log report (page 2 of 2) Field Object Type Description DPA item that was modified, created, or deleted. Values include: Node Attributes Control Panel Credential Menu Module Node Report Reportitemop Reportitemsource Ruleset Job Schedule Systemvariable Table Time Window View Userrole User Type of action performed on the DPA server. Values include: Add Assign Unassign Update Identifier of the object. Type of object that was modified, created, or deleted on the DPA server. Identifier of the node. Name of the node that was modified, created, or deleted on the DPA server. Identifier of the view. Name of the view that was modified, created, or deleted on the DPA server Indication of whether the action succeeded or failed. Indication of whether the user can drill down to display the Audit Details report.

Action Type

Object Id Object Name Node Id Node Name View Id View Name Status Has Details

Audit Log Details report

The Audit Log Details report is a drill-down report available from the Audit Log report that displays more detailed information about changes made to DPA. To run the Audit Log report, right-click in the Audit Log report and select Audit Log details. This report is available only for rows with the Has Details field selected. Table 358 on page 365 describes the fields that are included in the Audit Log Details report.

364

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Data Protection Advisor Reporting

Table 358

Audit Log Details Field Audit Log ID Object Type Description Unique ID for the change. Description of the object or part of the object that changed. For example, if a user is updated, the Object Type could be "user" if a field on the user object is updated, or "user attribute" if a user-specific attribute is updated. Name of the field on the object that changed. Old value for the field, or NULL if it was not set. New value for the field, or NULL if it is being reset.

Parameter Original Value New Value

Security reports

365

Data Protection Advisor Reporting

Status reports
Status reports display information about the status of the DPA server licensing and processes. Status reports are organized into the following categories:

"License Details" on page 366 "Process Status" on page 366

License Details

The License Details report displays information about the total and used number of DPA client and capacity type licenses. To run the License Details report, select DPA > Status > License Details from the DPA Server node in the navigation tree.

Process Status

The Process Status report displays information about the status and versions of the DPA processes. To run the Process Status report, select DPA > Status > Process Status from the DPA Server node in the navigation tree. Table 359 on page 366 describes the fields that display in this report.

Table 359

Process Status report Field Hostname Process Alive Product Major Version Minor Version Maintenance Version Build Number Last Start Last Config Update Description Name of the host on which the process is running. Name of the DPA process. Whether the process is running. Product name (for example, Data Protection Advisor). Major version of the process. Minor version of the process. Maintenance version of the process. Build number of the process. Last time the process started. Last time the process obtained its configuration (Collector only).

366

EMC Data Protection Advisor Version 5.8 Report Reference Guide

Index

A
ACSLS 161 asset management reports 163 resource utilization reports 166 running reports 162 status reports 168 Analysis Events capacity planning report 346 compliance report 347 configuration report 348 data protection report 349 details report 344 events during backup report 344 media management report 350 performance report 351 resource utilization report 354 service level management report 352 status report 353

clones reports 49 DB Catalog reports 66 delete volume reports 66 error reports 55 expiration reports 63 exposure reports 45 maintenance job reports 68 migration reports 55 moves reports 62 reclamation reports 59 restore reports 44 staging reports 53 storage pool copy reports 65

F
failed backups 89 entering resolution details 90 resolution 89 FalconStor asset management reports 257 change management reports 263 configuration reports 262 performance reports 264 resource utilization reports 266 running reports 256 status reports 267 troubleshooting reports 272 Fibre Channel switch 294 resource utilization reports 297 status reports 298 troubleshooting reports 300

B
backup reporting capacity planning reports 16 change management reports 19 chargeback reports 21 compliance and risk mitigation reports 24 configuration reports 25 data protection reports 38 licensing reports 71 media management reports 72 performance reports 76 resource utilization reports 80 scheduling reports 83 service level management reports 89 status reports 92

I
IP switch 302 asset management reports 137, 155, 177, 303, 313 performance reports 304 resource utilization reports 306 status reports 142, 158, 180, 307 troubleshooting reports 148, 187, 309

C
Client Usage Statistics report 94 Custom fields, resolution 91

D
Data protection reports change ratio reports 47

N
NetApp 192, 216
EMC Data Protection Advisor Version 5.8 Report Reference Guide
367

Index

asset management reports 193, 217 capacity planning reports 199, 222 change management reports 200, 223 configuration reports 201, 224 licensing reports 227 performance reports 207, 228 resource utilization reports 231 status reports 210, 233 troubleshooting reports 214, 238 network interface 302 Networker bootstrap reports 45

P
Product reporting error reports 356 performance reports 361 security reports 363 status reports 366 Publisher publisher hung alert 362

R
Recoverability reports 105 requests, node history 359

S
system reporting 326 asset management reports 327 performance reports 334 resource utilization reports 336 troubleshooting reports 342

T
tape library 281 asset management reports 283 resource utilization reports 286 status reports 287 troubleshooting reports 291

V
VTL 122, 240, 274 asset management reports 124, 241, 257, 275 configuration reports 244, 262 performance reports 246, 264, 277 resource utilization reports 247, 266, 278 running reports 110, 122, 240, 256, 274 status reports 250, 267, 279 troubleshooting reports 272

368

EMC Data Protection Advisor Version 5.8 Report Reference Guide

You might also like