立即与支持人员聊天
与支持团队交流

Foglight for Storage Management Shared 6.0.0 - User Guide

Getting Started Configuring Agents to Monitor Storage Devices
Brocade SAN Switches Cisco SAN Switches Dell Compellent Arrays Dell EqualLogic PS Series Array Groups EMC CLARiiON CX Series Arrays (CLI) EMC CLARiiON, VNX, or VMAX Storage Arrays (SMI-S) EMC Isilon EMC VPLEX Hitachi Data Systems AMS, USP, and VSP HP EVA Storage Arrays HP 3PAR Arrays NetApp Filers Configuration Procedures
Managing Agents Using Foglight for Storage Management Monitoring Storage Performance Investigating Storage Devices Investigating Storage Components Investigating VPLEX Storage Troubleshooting Storage Performance Managing Data Collection, Rules, and Alarms Understanding Metrics Appendix: Supported Storage Devices Table

Path Property

CLARiiON monitoring using CLI displays a path property.

Figure 8. Path Property

3
Click Update.
4
Click Validate Connectivity before you close the Edit Agent Properties dialog box.

Status of Arrays

This view displays as part of the Status tab only when collecting arrays. The upper Status for Agent panel displays the success/failure in connecting to the array management host.

Each row in this panel displays whether the array is configured for collection, and the status of the last collection attempt to that array. Clicking on the status icon displays the popup that provides error information, if the status was not successful.

Managing Credentials

This tab displays the credentials for the selected agent.

From this tab you can create or select credentials. For procedures, see Assigning Credentials. You can also edit the password for a credential.

To delete an obsolete credential, remove obsolete mappings, or to manage lockboxes, use the Credentials dashboard. To access this dashboard, on the navigation panel, under Dashboards, click Administration > Credentials. For help with the dashboard, see the online help.

Editing existing credentials

4
From the Credentials tab, click Validate Connectivity to ensure that the storage device can be accessed with the changed credentials.
相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级