Docu86400 - ViPR SRM 4.1.1 Compliance Guide
Docu86400 - ViPR SRM 4.1.1 Compliance Guide
Docu86400 - ViPR SRM 4.1.1 Compliance Guide
Version 4.1.1
Compliance Guide
302-004-178
01
Copyright © 2016-2017 EMC Corporation All rights reserved.
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners.
Published in the USA.
EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com
Figures 7
Tables 9
This chapter provides an overview of the ViPR SRM compliance features. It also
describes all of the out-of-the-box compliance policies and rules.
l Compliance introduction..................................................................................... 12
l Feature summary ............................................................................................... 12
l What is a policy?................................................................................................ 13
l Accessing compliance reports and configuration ............................................... 14
l List of predefined compliance policies................................................................ 14
l Summary of predefined rules, scopes, and criteria............................................. 15
Compliance Features 11
Compliance Features
Compliance introduction
The ViPR SRM compliance module contains policies that test conditions in your
infrastructure. Reports are generated that show the current violations to the policies.
The compliance module can determine compliance to the following types of business
goals:
l Does your storage infrastructure comply with industry best practices and the
specific business practices of your enterprise? If not, which components are not in
compliance?
l Are the current combinations of hardware, software, and firmware releases in your
infrastructure in compliance with the EMC support matrix interoperability
requirements? If not, which components need updating?
l What recent configuration changes were made throughout the infrastructure?
Breach reports
A breach is a violation of a rule in a compliance policy. You can find breach reports on
the ViPR SRM Console, under Operations > Compliance. The breach reports indicate
the policy and rule that was breached and the components involved in the breach.
Feature summary
Storage administrators and compliance officers use the ViPR SRM compliance module
to check for configuration errors and interoperability issues in the storage
infrastructure.
Main features
Basic compliance functions are:
l Out-of-the-box policies validate important configurations like EMC Support Matrix
interoperability, EMC VPLEX configurations, EMC ViPR Controller configurations,
I/O path redundancy and fabric zoning.
l Customized policies and rules can validate against your installation's business rules
and practices.
l Breach reports on the ViPR SRM Console show violations to the compliance
policies.
l Email and/or SNMP notifications of breaches are easily configured, and enabled or
disabled.
Additional features
The compliance module provides the following ancillary functionality:
l Tracks significant configuration changes in the data center and validates policies
when a change occurs.
l Provides drill-down features for analysis and troubleshooting. Start with summary
level reports by policy or severity, click to see a list of specific breaches, and click
again to see all details about a breach, including a link to the devices involved.
l Provides recommendations that help storage administrators troubleshoot the data
center objects and revalidate the data center to ensure compliance.
Recommendations are easily edited to make them site-specific.
Flexibility features
The following configuration options provide flexibility:
l The scheduling features can set up the policies to run automatically at scheduled
times. Alternatively, you can run a policy manually on-demand.
l Enable/disable capabilities exist at three levels:
n By entire policy, including all of the rules in the policy.
n By each rule.
n By individual criteria in a rule.
l A scope filter in each policy defines the set of data center objects to validate. If
needed, you can create sets of similar policies with different criteria values for
different scope filters.
l A copy feature makes it easy to copy and alter an existing policy to create a new
policy for a different scope.
What is a policy?
The compliance module is organized around policies.
A compliance policy is a collection of rules with a common purpose. A policy defines
the objects to test, the conditions to test, and, optionally, a schedule for automatic
executions of the policy.
You can enable and disable an entire policy, individual rules within each policy, or
individual configurations within some rules.
The following figure shows the components in a policy.
Figure 1 Parts of a compliance policy
A scope uses a filter to define the components that the policy applies to.
The rules define specific conditions to test. Rules may contain configurable
parameters, which let you use the same rules in multiple policies with different
configurations. For example, two policies might contain the same rules, with different
parameter settings and different scopes.
The schedule is optional and defines the frequency for automatic runs of the policy.
Administrators can also run a policy manually.
The compliance module is installed with predefined policies, scopes, and rules. You can
also create custom policies, scopes, and rules.
What is a policy? 13
Compliance Features
Before running a policy, you must assign a scope to it, configure and enable the rules,
and enable the policy.
Items Location
Breach reports Operations > Compliance > Breach Reports
Configuration Administration > Modules > Storage Compliance
Includes policy configuration,
ESM Matching, and new rule
creation
EMC Best Practice Enforces that there are no orphaned zones, masking, mapping
Configuration entries or stranded hosts, i.e. hosts without fully established
paths to any volume.
EMC Support Matrix Enforces best practices for interoperability based on EMC
Support Matrix.
High Availability Physical Enforces best practices for the physical connectivity to ensure
Connectivity high availability, optimal path traversal and avoiding I/O
congestion.
Host Configuration Enforces best practices for hardware, software and pathing
configuration on a host.
VPLEX Configuration Enforces VPLEX best practices for software and pathing
configuration.
Note
Policies and the individual rules within each policy must be enabled to make them
operational.
l Regular
expression or
comma
separated list of
values if IN is
selected.
l Value for
STARTS_WITH
or ENDS_WITH.
l Value for
STARTS_WITH
or ENDS_WITH.
33 Host port fan- Number of target ports Criteria operator: LE Zoning Best
in zoned in to an initiator port Criteria value: Practices
should not exceed N. Number mentioning
Scope: Physical hosts and the maximum target
ESX servers ports that can be
zoned to an initiator
port.
The following topics provide general guidelines for configuring compliance policies and
rules.
For configuration guidelines for each of the predefined policies, see Configuration
Guidelines for Predefined Policies on page 35. For information about creating
custom policies, scopes, and rules, see Create New Policies and Scopes on page 83.
Configure a policy
To prepare a compliance policy to run and validate your environment, the policy must
be configured and enabled.
Configuring a policy includes the following:
l Set the policy's scope
l Configure rules and rule criteria
l Enable/disable rules and rule criteria
l Optionally configure a run schedule
Note
It is mandatory that you configure a scope for each policy and that all enabled rules
have criteria values. After those required values are configured, you can enable the
policy and run it.
Procedure
1. Go to Administration > Modules > Storage Compliance, and then click Policy
& Rules Management.
The list of compliance policies appears.
Note
2. To configure a policy, click the checkbox in the first column, and then click Edit.
Alternatively, click the row and select Edit from the context menu.
Configure a policy 25
Configure Compliance Policies and Rules
Note
You can keep the policy disabled for now, and easily enable it later from the
main Compliance page.
5. (Optional) Click Show Members to verify the defined scope against your
environment.
The system generates a list of discovered objects that match the scope criteria.
6. Click the Rules tab.
The tab lists the rules in the policy. Disabled rules appear in faded type.
Use buttons at the bottom of the page to add or delete rules in the policy,
enable or disable rules, and edit (configure) rules.
Configure a policy 27
Configure Compliance Policies and Rules
7. Configure a rule:
a. Select a rule by clicking the checkbox in the first column, and click Edit.
The Edit Rule page, specific to the selected rule, shows the criteria in the
rule that need configuration.
Note
Configure a policy 29
Configure Compliance Policies and Rules
Note
Note
EQ 5773.155.107
STARTS_WITH 5773
9. Click Save.
All changes on any of the tabs for the policy are saved.
10. To run the policy that you just configured, click the policy name and choose
Run Now from the context-sensitive action menu.
l Create scopes that are specific to various groups, such as all Hypervisors, all AIX,
and so on. Use each scope in a separate policy, with scattered schedules.
The recommendations are configurable for each usage of a rule within a policy.
Procedure
1. Go to Administration > Modules > Storage Compliance, and then click Policy
& Rules Management.
2. In the right pane, click the policy that contains the rule whose recommendation
you want to edit, and select Edit.
3. Click the Rules tab.
4. Click in the first column to select the rule, and then click Edit.
5. Edit the Recommendation field.
6. Click Save.
7. Click the Scope tab, and select a scope if one is not already assigned.
You can not save any edits on the policy unless a scope is assigned.
8. Click Save.
Note
a. From a Rules tab, click a box in the first column to select a rule, and then
click Edit at the bottom of the page.
b. In the Criteria for Selected Rule box, check to enable or uncheck to disable a
criterion.
For example:
Run a policy
When a policy runs, it validates enabled criteria in enabled rules against the objects
defined by the policy scope.
There are three ways to run a policy:
l A policy runs automatically using the configured schedule in the policy.
l A policy can run on demand by administrators with the Run Now action.
l A policy runs automatically when a configuration change occurs that is relevant to
the policy.
Configuration changes are detected by the compliance system and relevant
policies are automatically revalidated, capturing violations as early as possible.
The last validation time for a policy is the last scheduled or manual run. The last
validation time is not updated when validation occurs due to a change event.
To run a policy manually, use the following procedure.
Procedure
1. Go to Administration > Modules > Storage Compliance > Policy & Rules
Management.
2. In the right pane, click the policy and select Run Now.
The Last Run column value changes to Running... and then to the time
completed.
3. Go to User Interface > Operations > Compliance > Breach Summary to see
the results of the run.
Results
A policy run generates active breaches for violations to the rules in the policy. A policy
run also produces resolved (inactive) breaches for previous violations that are now
resolved.
The following topics provide guidelines for configuring the scopes and rule criteria for
each of the predefined policies.
5876*,8.1.0*
Symmetrix Port Flag Settings In the Criteria For Selected Rule field:
validator
l Select Yes or No in the drop-down lists for whether a
bit setting should be enabled or not.
l Uncheck any options that do not need to be validated.
l Make sure to scroll down to see the full list of options.
Schedule tab
Set an appropriate schedule for automatic runs of this policy.
l All Hosts
l All ESX Servers
l All Fabrics
Rules tab
Enable each rule that you want to implement. The rules in this policy do not have any
user configurable criteria.
Schedule tab
Set an appropriate schedule for automatic runs of this policy.
Schedule tab
Set an appropriate schedule for automatic runs of this policy.
Li*,Mi*,Sol*,AIX*
Supported Array Microcode If you enabled this rule in the Array Configuration policy,
Version disable it here.
Otherwise, on the Criteria For Selected Rule tab:
l In the drop-down list, select the IN operator.
l Enter the first few characters of the array microcode or
firmware followed by a wildcard character. You can
specify multiple values delimited by commas. For
example:
5876*,8.1.0*
Supported Solutions Enabler You might want to leave this rule Disabled. In many cases,
Version this rule should be applied to specific hosts and not to all
hosts.
Schedule tab
Set an appropriate schedule for automatic runs of this policy.
Supported HBA Vendor Model Consider leaving these rules disabled because they are
Driver and Firmware implemented in other policies. If you enable these rules,
configure values to match in their Criteria For Selected
Supported Multipath Software
Version
Rule fields, as follows:
l To specify an exact string, select the EQ operator and
Supported Solutions Enabler
type the value.
Version
l To specify a pattern using a wildcard, select the IN
operator and type a value that includes an asterisk (*) in
place of one or more characters.
l To specify multiple values, select the IN operator and
type a set of values separated by commas.
l To specify the starting string of the value, select the
STARTS_WITH operator and type the string.
l To specify the ending string of the value, select the
ENDS_WITH operator and type the string.
Schedule tab
Set an appropriate schedule for automatic runs of this policy.
devtype='VirtualStorage'
Rules tab
Enable each rule that you want to implement. The following table describes the user
configurable criteria for the rules that have them.
Schedule tab
Set an appropriate schedule for automatic runs of this policy.
Rules tab
Enable the rule. This policy does not have any user configurable criteria.
Schedule tab
Set an appropriate schedule for automatic runs of this policy.
Host Port Fan-In In the Criteria For Selected Rule field, enter the desired
number of ports.
You can simulate a breach by setting the number lower than
the known Fan-In ports.
Minimum Number of Members This rule generates a large number of breaches when only a
in Zone small number of SAN objects are discovered.
Single Initiator Zoning This rule generates a large number of breaches when only a
small number of SAN objects are discovered.
Storage Port Fan-Out In the Criteria For Selected Rule field, enter the number
of ports.
You can simulate a breach by setting the number lower than
the known ports.
Zone must Contain a Host Port This rule generates a large number of breaches when only a
small number of Host objects are discovered.
Zone must Contain a Storage This rule generates a large number of breaches when only a
Port small number of Array objects are discovered.
Schedule tab
Set an appropriate schedule for automatic runs of this policy.
The following topics describe how the ViPR SRM reports identify breaches to your
compliance policies and how you can resolve those breaches.
Breach status
A breach status is either ACTIVE or INACTIVE.
The breach reports show a status for each breach.
l An ACTIVE status means that the breach condition still existed at the last run of
the policy.
l An INACTIVE status means that the breach existed during the timeframe covered
in the report (the default for most reports is one week), but the breach was not
found at the last run of the policy. The breach was resolved.
INACTIVE breaches age out of reports.
Run a policy
When a policy runs, it validates enabled criteria in enabled rules against the objects
defined by the policy scope.
There are three ways to run a policy:
l A policy runs automatically using the configured schedule in the policy.
l A policy can run on demand by administrators with the Run Now action.
l A policy runs automatically when a configuration change occurs that is relevant to
the policy.
Configuration changes are detected by the compliance system and relevant
policies are automatically revalidated, capturing violations as early as possible.
The last validation time for a policy is the last scheduled or manual run. The last
validation time is not updated when validation occurs due to a change event.
To run a policy manually, use the following procedure.
Procedure
1. Go to Administration > Modules > Storage Compliance > Policy & Rules
Management.
2. In the right pane, click the policy and select Run Now.
The Last Run column value changes to Running... and then to the time
completed.
3. Go to User Interface > Operations > Compliance > Breach Summary to see
the results of the run.
Results
A policy run generates active breaches for violations to the rules in the policy. A policy
run also produces resolved (inactive) breaches for previous violations that are now
resolved.
Breach status 45
Use Compliance Reports
An All Active Breaches report appears, filtered by the parameters of the bar
that you clicked.
3. To see the detailed message for a specific breach, click the breach row and
scroll down.
The detail appears below the All Active Breaches report. The blue band in the
top report indicates the row that you clicked.
4. To see details about the device involved in a breach, click the link in the Device
column.
The link takes you to the device's home page, where you can explore all aspects
of the device. In the following report, you can see that ports have not yet been
assigned to any zones.
Column Description
Severity Severity of the breach, using a symbol in the first column and text in the second
column.
Device Device that the breach is associated with. The device names in this column are
links to the device home page.
Column Description
Affected The names of specific objects involved in the breach.
Objects
Last The last time the breach was detected (the last run time of the policy or the last
Modified time the rule was executed as a result of a configuration change).
Time
State ACTIVE or Resolved. Resolved breaches age out of the Inactive Breaches
report.
3. In the Platform filter dialog, select one or more platforms to report on.
4. Click Apply.
The report now displays only breaches that affect devices associated with the
selected platforms.
Also note that the Platform group filter changed color to indicate that this filter
is currently applied to the report results.
5. Click another group filter, such as the Business Unit filter.
6. Select one or more values, and click Apply.
Note
If a filter dialog is empty, it means that your installation is not populating that
field.
The breach report now displays only breaches that affect the selected
platforms for the selected business units.
Also note that both the Platform and Business Unit group filters have changed
color.
7. To cancel a filter, click the group filter icon, and then click Cancel.
The report lists all defined policies, including predefined policies and custom-
defined policies. The columns show:
l State of the policy
n Green checkmark—Enabled
n Red X—Disabled
l Name of the policy
l Description of the policy
l Number of rules associated with the policy
l Number of active breaches for the policy
l Last Run—Time when the policy was last run (validated). Last run might be
a scheduled run or a manual run. It does not include validations triggered by
configuration changes.
2. Click a policy row and scroll down to see the View Rules report for that policy.
A blue band in the first report indicates the policy you clicked.
The View Rules report lists the rules associated with the selected policy. The
columns show:
l State of the rule (Enabled or Disabled)
l Rule name
l Description of the rule
l The type of object that the rule was applied to
l Severity assigned to breaches of the rule. Severity levels are for reporting
and classification purposes only.
l Number of active breaches on the rule
3. Click a rule row to view the breaches associated with the selected rule.
The following topics show how to set up and use the configuration change tracking
feature to identify configuration changes in your environment.
Fabric Zone Set Added Zone Set added in a fabric Authorized Zone
Membership Types
Minimum Number of
Members in Zone
Minimum Number of
Members in Zone
Path Management
Software
Path management
interoperability for EMC
arrays
/APG/Backends/Compliance-Backend/generic-compliance/conf/
compliance-change-events-config.xml
Most change tracking events in this file are installed as enabled. Several are
disabled (commented out), including:
l Zone addition/removal
l Zone member addition/removal
l LUN masking
l LUN mapping
b. Use the XML commenting structure to comment out the lines that you want
to disable, or, remove the commenting structure to enable events that are
currently commented out.
c. Save the file.
d. Restart the Compliance-Backend.
2. To increase the interval for running the change tracking process:
a. Open the following file.
/APG/Backends/Compliance-Backend/generic-compliance/conf/
config-scheduler.properties
##ChangeGenerator Scheduler:
c. Change the scheduler value to your desired interval for running the change
tracking process. The default scheduling cycle is every one hour from the
time the Compliance-Backend is started. You can increase that interval.
d. Save the file.
The new schedule is implemented.
2. Click a change event row to view details about the breaches that were
generated due to the change.
The columns show details of each breach, including the device on which the
breach occurred and the affected objects.
3. Click a breach row to display the detailed breach message and recommended
fix.
These details appear below the View Breaches report, on the same page.
The following topics describe how to configure and use the EMC Support Matrix
(ESM) policy to monitor your environment for compliance with the EMC Support
Matrix. ESM matching procedures are included.
MultiMatched The discovered attribute value is not definitive and matches to more than
one value in the EMC Support Matrix database. You need to resolve a
multimatch with a manual match. MultiMatched components are reported as
breaches.
Not Matched There was no discovered value or the discovered value does not match any
values in the EMC Support Matrix database. You need to resolve a not match
item with a manual match. Not Matched components are reported as
breaches.
Manual A ViPR SRM system administrator performed a manual match. If there are
multiple objects with the same unmatched value, a manual match on one of
them is automatically applied to all instances.
How should I use the EMC Support Matrix Active Breaches report?
This compliance policy generates the EMC Support Matrix Active Breaches report.
The report lists issues and provides detailed information for researching and fixing the
issues.
Unmatched and multimatched components are breaches. You can resolve match
issues by performing manual matches.
When components in the storage infrastructure do not comply with the EMC Support
Matrix database, the report identifies other breach types, such as interoperability and
path management breaches. You can research these breaches using the information
provided in the report. The E-LAB Interoperability Navigator is a useful resource for
researching supported configurations and upgrade requirements.
What about RPQs?
Your site might obtain a verified EMC Request Per Qualification (RPQ) that permits
alternate components in conflict with the EMC Support Matrix. In this case, you can
create a customized scope and apply it to this policy so that the nonconforming but
approved component does not continuously appear as a breach.
ESM matching
EMC Support Matrix (ESM) matching helps to reduce the gap between your
resources discovered by ViPR SRM and the ESM data in EMC E-LAB.
ESM matching is required for the interoperability rules in the ESM compliance policy
to produce meaningful results. After ESM matching is performed for all the objects in
your storage environment, interoperability rules can validate if your data center
resources are interoperable according to the EMC Support Matrix.
ESM matching is configured in the following ways:
Auto-matching
When the discovered values for a resource match the E-LAB values, the resource
is labeled as auto-matched. No further matching action is required for these
resources. Most resources are auto-matched.
Multi-matching
When the discovered values for a resource match several potential values in E-
LAB, the resource is labeled as multi-matched. These resources produce breach
errors and require manual matching to select a singe value from the list of multi-
matched values.
Manual-matching
When the discovered values for a resource do not match any value in E-LAB, the
resource is labeled Not matched. These resources produce breach errors and
require manual matching. Manual matching presents you with a list of E-LAB
values, and you manually select the correct value for the resource.
In the case where the same unmatched phrase occurs multiple times, a manual
match on one of the instances is automatically applied to all of the instances.
ESM matching 65
Configure and Use the EMC Support Matrix Policy
2. For a resource with the status Not Matched or Multi-matched, click the
pencil icon in the Matched To column.
The Match Value dialog appears.
3. Type an appropriate value, or start typing the value and then select from the
presented list.
You might need to research appropriate values.
4. Click OK.
Results
The status of the configuration item appears as Manual matched in the Matched
Methods column. If there are additional instances of the same unmatched discovered
value, the system matches all of them, and they are all now marked Manual matched.
Note
Updating the support matrix version could result in new breaches if elements in your
infrastructure are not in compliance with the newer version.
Procedure
1. Go to Administration > Modules > Storage Compliance > Match to EMC
Support Matrix.
2. Determine the Support Matrix version number currently in use from the
information message next to the Update Support Matrix button.
3. Obtain a newer version, if available.
Option Description
From Support l Log onto https://support.emc.com
Zone
l Click Downloads.
l For product name, type vipr srm.
l Select a release number.
l Search for the following file:
emc-support-matrix-compliance-version.pkg
From account Your account team might reach out to you when a new
team version is available.
4. Update the compliance package to use the newer version. Use one of the
following options:
Option Description
Use Package a. Go to Administration > Centralized Management > Packages Manage
Management
b. Click Upload, and browse to the new emc-support-matrix-compli
c. Go to SolutionPacks > Other Components.
d. For the emc-support-matrix-compliance row, click the Upgrade
block to use the newly uploaded package file.
Option Description
c. Click Update Support Matrix. The information message next to the but
support matrix version is available.
The next execution of compliance rules will use the new Support Matrix version.
5. To revert to a previous version, delete and reinstall isolated blocks as follows:
Note
Reverting is generally not recommended. The latest data is always better, and
the newer versions are qualified before releasing to customers.
new EMC Support Matrix Active Breaches report first thing each morning and again
mid-day.
Procedure
1. Log in to the ViPR SRM Console, and click Administration in the banner.
2. In the Administration navigation tree, click Modules > Storage Compliance >
Policy & Rules Management.
A table of storage compliance policies appears.
3. In the Name column, locate the policy named EMC Support Matrix .
4. Click the checkbox in the first column for that row, and then click Enable.
c. If needed, you can create a customized scope. For example, rather than
monitoring All Hosts, you might want to monitor only Linux hosts.
7. Enable the rules that you want to implement:
Procedure
1. Log into the Console.
2. Navigate to Operations > Compliance > Breach Summary > Active Breaches
by Policy > EMC Support Matrix.
The Support Matrix Active Breaches report appears.
3. To determine when the Support Matrix policy was last run, look in the Last
Modified Time column.
Note
To update the data in a compliance policy report, you must run the policy. The
policy runs on its scheduled time or on-demand from the Administration portal.
You can not run the policy and generate a new report from the User Interface
portal.
compliance policy. You need to perform manual matches for all Not Matched and
Multi-matched devices.
For example, the Message column in the following figure describes a host that needs
to be matched. A similar message could occur in several breaches in the report. If you
fix the match issue, all associated breaches will be fixed.
Figure 3 Example match issue in a breach report
Procedure
1. Navigate to the EMC Support Matrix match list.
a. Log in to the Console, and click Administration in the banner.
b. Click Modules > Storage Compliance > Match to EMC Support Matrix.
The match list is initially sorted to show the Not matched entries first.
2. Use these methods to find items in the list:
l Type a portion of the discovered value in the Search box, and press Enter.
l To sort the report by the values in a column, click in the header of a column.
3. (Optional) To see information about the devices associated with this
unmatched value, click the number in the Devices Affected column.
A dialog appears with known information. At the end, a table shows the affected
device names. Close the dialog to continue with the matching process.
4. To match an item, click Edit (the pencil icon) in the row.
5. In the dialog, type a portion of the discovered value to search the EMC Support
Matrix for a match .
For example, type SUN.
Note
Although the discovered value did not result in an automatch to any value in the
EMC Support Matrix, the discovered value in most cases is close to the Support
Matrix entry or at least contains useful hints.
7. After matching some components, rerun the EMC Support Matrix policy, as
follows:
a. In the left pane (still on the EMC M&R platform interface), click Policy &
Rules Management.
b. In the list of policies in the right pane, click the EMC Support Matrix row,
and select Run Now.
The Last Run column changes to indicate that the policy is currently running.
c. When the Last Run column displays the current date and time, click the web
browser Refresh button to refresh the window.
The refresh action updates the # of Breaches column.
Use the following general process for researching and fixing interoperability breaches:
1. Verify and correct the match values for each component listed in the breach
message.
The automatch feature makes the best assumption possible based on discovered
values but sometimes an automatched value is incorrect. Also, manual matches
can be erroneous.
2. After fixing match values, rerun the policy to determine if the breach is fixed.
3. If the breach still exists, use the tools in E-LAB Navigator to research the
incompatible component and obtain a list of possible compatible replacements.
4. If your site has a negotiated EMC RPQ that covers support for the incompatible
component, you can edit the policy, changing the scope to cover the component in
question and prevent the breach from appearing on subsequent report runs. The
process for creating a customized scope is described in another article.
To fix the base connectivity breach shown in the report above, use this procedure.
Procedure
1. Go to the Match List:
a. Log in to the Console, and click Administration in the banner.
b. Click Modules > Storage Compliance > Match to EMC Support Matrix.
Procedure
1. In a web browser, go to the EMC E-LAB Navigator at the following URL:
https://elabnavigator.emc.com/eln/elnhome
2. Scroll to the bottom of the E-LAB Navigator page and click Advanced Queries.
3. To create a query:
a. In the tool on the right side of the page, create a query name, and then click
Save.
b. Use the component tree on the right to fill in the query categories on the
left.
Use the values listed in the breach message, and make selections that match
the message as closely as possible.
For our example, we do not include the multipathing software that is listed in
the breach message, because we assume that it is the noncompliant
component causing the breach. We want this tool to provide us with valid
multipathing software for the combination of storage array and operating
systems.
The following figure shows the completed query that matches the first three
components that are listed in the breach message. Note that two storage
array entries are supplied, one that mentions Symmetrix and one that
mentions the S/N. These choices most closely match the breach message.
Note
The tab name includes the query name. Our query name is breach_example.
The result is a table that lists valid multipathing software for the provided
combination of components.
Note
If no results are reported, try eliminating other components from the list, or try
using less specific component choices.
Results
In this scenario, you researched the reason behind a path management interoperability
breach. The EMC E-LAB Navigator shows that the supported EMC PowerPath
versions for the combination of components are:
l PowerPath 5.7
l PowerPath 5.7 SP3
l PowerPath 5.7 SP4
Referring back to the breach report, you find that EMC PowerPath version 5.7 SP2 is
currently installed. You need to update the software to resolve this breach.
The report shows the four breaches that were fixed previously.
Results
The inactive breaches reports provide details about the breaches that were fixed
during the reporting period.
The following topics describe how to create customized policies and scopes.
Regardless of how you create the new policy, each policy must have a scope and all of
the enabled rules must have criteria values before you can enable and run the policy.
Procedure
1. Navigate to Administration > Modules > Storage Compliance > Policy and
Rlues Management.
2. To create a new policy by copying an existing policy:
a. Click the policy that you want to copy.
b. Click Copy.
c. Click OK to confirm the copy.
The new policy appears in the list of policies, with the name
Original_Policy_Name - copy.
d. To change the policy name:
a. Click the policy.
b. Select Edit.
c. On the Description tab, change the Policy Name field.
Note
The new scope is not associated with the policy unless you manually choose it
later.
Operator Description
& AND
I OR
= Equal To
6. (Optional) To verify the defined scope against your environment, click Show
Members.
The system generates a list of discovered objects that match the scope criteria.
7. Click Save.
The new scope is included in the list of predefined scopes on the Scope tab.
Any compliance policy can use the new scope.
property_name = 'value'
or
property_name = 'pattern'
where:
property_name
Is a property field in the database.
value
Is the value to match.
pattern
Is a string that uses wildcards to describe a set of values to match.
Complex construct
You can form complex scope criteria by combining basic constructs using the AND
(&), OR (|), and NOT (!) operators. For example:
devtype='Array'&vendor='EMC%'&sstype='Block'
device='mqqb080'|device='mqqb081'
!device=='mhmbd014_LDAP'
devtype='Array'&(vendor='EMC%'|vendor='Dell%')
%xxx...
Value ends with xxx...
%xxx...%
Value contains xxx...
Examples:
devdesc='Lin%' finds Linux and Linux 6.
device='%013' finds serverA013 and serverB013
device='%013%' finds dept013Server, serverA013, and 013serverB.
2. On the right side of the Expansion field, click the property selection helper icon.
For example, searching for port returns property names with port anywhere in
the name, alias, or description.
5. To scan descriptions, hover the cursor over the property names.
6. Take note of the database property names you need for your scope definition,
and click Cancel to exit.
Create a policy
Create a new compliance policy, name the policy, and provide a description.
Procedure
1. Log on to the ViPR SRM Console, and click Administration > Modules >
Storage Compliance > Policy & Rules Management.
2. Click Create Policy.
3. On the Create Policy page, for Select Policy Template, select Empty Policy.
An empty policy will not contain any rules; we will create the rules from scratch.
4. Complete the Description tab:
a. For Policy Name, type a name for the policy. For example, type Linux HBA
Validation.
Create a scope
Create a scope to define the group of objects that this compliance policy should
monitor.
ViPR SRM provides built-in scopes that are useful for applying a policy to a general
object type, such as All Virtual Machines.
You can select one of these built-in scopes if they are adequate for your purpose. If
not, you can create a customized scope by defining a new filter.
Note
You can edit user-created scopes but not the built-in scopes. You can copy a built-in
scope, and then edit the copy.
The following steps show how to create a new, customized scope that is specific to
our example.
Procedure
1. Click the Scope tab.
For more information about supported wildcards, see Syntax for scope
criteria on page 86.
5. Click Show Members to show a list of results from the scope you defined.
6. Review the members and change the filter if the results are not what you
expected.
7. Click Close.
The new scope is added to the list of scopes.
8. Locate the new scope you just created, and click the check box to select it.
Create a scope 91
Create New Policies and Scopes
Note
If you click Save at this point, the system attempts to save the policy, which
generates an error because there are no rules in the policy.
Add a rule
A policy can have one or more rules. The rules criteria define the specific values to
monitor.
This procedure describes how to add an existing rule to a policy. To create a new rule,
see Create a new rule on page 108.
Procedure
1. Click the Rules tab.
2. Click Add Rule.
3. Using the drop-down list in the Name column, select Supported HBA Vendor
Model Driver and Firmware.
Note
For the purpose of this use case, we want to generate breaches for
noncompliant host HBAs. The breach message will describe discovered
values in the environment, and we will use that information to revise this rule
to validate against the current environment.
Add a rule 93
Create New Policies and Scopes
You can resolve this breach by updating the Supported Firmware criteria in the
HBA Validation rule to include or equal the value 5.4.0.
Note
Use the found value only if you consider it to be valid in your environment. If it is
not valid, then you need to upgrade the HBA to use different firmware, and
update the rule criteria accordingly.
6. Click Save.
7. Click the policy row and select Run Now.
8. Watch the Last Run column to notice when the policy is finished running.
Edit the rule to add all found values and rerun the policy
Edit the rule to include all of the found values for Linux HBAs in your current
environment (assuming that you want to enforce the current environment going
forward).
Procedure
1. Go to Administration > Modules > Storage Compliance > Policy & Rules
Management.
2. Right-click the Linux HBA Validation policy and select Edit.
3. Click the Rules tab.
4. Click to select the row for the Supported HBA Vendor Model Driver and
Firmware rule.
5. In the Criteria For Selected Rule field, complete the criteria fields for
Supported Model, Supported Firmware, and Supported Driver.
Use the found values you noted earlier from the Active Breaches report.
l To enter multiple values in a field, select the IN operator in the drop down
list and use a comma to separate values. For example, the following criteria
when used with the IN operator enforces two values:
5.4.0,3.92A2
8.2.0.3*,8.2.4
6. Click Save.
7. Right-click the HBA policy and select Run Now.
8. Watch the Last Run column to track when the policy is finished running.
9. Go to User Interface > Operations > Compliance > Breach Summary >
Breaches by Policy > HBA Validation Policy.
10. Review the policy's All Active Breaches report to make sure that no more
breaches are remaining.
If there are additional breaches, you can edit the rule again to add additional
values to the rule.
Results
When no additional breaches remain, you have successfully created a rule that
enforces the current running environment.
Summary
In this use case, you created a new compliance policy that monitors a group of hosts
for compliance with a customized set of drivers and firmware.
In the future, new versions of drivers and firmware are likely to become the preferred
versions. To handle that scenario, you know how to edit the policy's rule to change the
monitored values and keep the compliance policy current with business rules.
Summary 99
Create New Policies and Scopes
The following topics describe the components and construction of a compliance rule.
Note
Editing a rule definition means changing the underlying construction of the rule. This is
not the same thing as configuring the rule criteria, which is the feature that permits
reusing the same rule in different policies and for different scopes.
New rules
Administrators can use the graphical interface to create new rules. Some reasons for
creating a new rule are:
l To implement a new type of compliance checking that is not covered by any of the
predefined rules.
l To alter the basic construction of a predefined rule to accommodate your business
practices. Because the predefined rules are locked, you would copy the rule and
change the copy.
You can add a custom rule to any compliance policy. A rule can be used in multiple
policies.
When you release the drag, an Edit Component dialog appears. Configure the
component by completing the fields on the dialog.
l Use the ? icons on the dialog to learn about the parameters.
l Red asterisks indicate required parameters. You must supply a value for them;
otherwise you cannot save the configuration.
l Click OK to save the configuration and exit the dialog.
l To change parameters later, you can edit the component.
Connect components
To specify the processing flow and relationships between components, you connect
the symbols.
To connect components, click and drag from an output connection point on one
component to an entry connection point on another component. Connection points
are small yellow squares on the perimeter of a component. Release the drag when the
input connection point turns green.
Note
Remember to start the drag at an output connection point and drag to an entry
connection point.
l Output connection points are on the right side of a component. You can connect
multiple objects to the same output.
l Entry connection points are on the left side of a component.
Components might have multiple exit connection points. For example, components
with filters or conditional possibilities have multiple possible outcomes. To identify the
outcome that a connection point represents, hover the cursor over the yellow square
until a tooltip appears. The following example shows two possible outcomes from a
filter in the APG Data Retrieval component:
The processing flow is typically different for different outcomes. Depending on the
purpose of the rule, an empty result might end the flow altogether, or might lead to an
Active Breach or a Breach Resolution.
Disconnect components
To remove a connector, drag the end point of the line (at an entry connection point)
away from the component. When you release the drag, the line disappears.
Rearrange components
Rearrange components on the whiteboard by dragging them. If symbols are
connected, the end points of the connectors travel with the component.
Manage or edit a component
To manage or edit a component, hover the cursor over the component until a mini-
menu appears.
6. To view the data being captured for this rule, hover your cursor over the APG
Data Retrieval component until the mini-menu appears, and click the Edit
(pencil) icon.
Field Description
Name Contains an identifying phrase for this component. You will see
the phrase referenced in other components.
Filter Specifies an index into the APG database. In this case, the data
being retrieved relates to ports on fabric switches.
Properties Specifies the properties to retrieve from the filtered data. In this
case, the device and firmware properties are retrieved.
Note
10. Use the ? icons to learn about parameter usage and valid options.
11. Click OK on the Edit Component dialog to exit.
12. To view how the results of the comparison are configured, hover over the
comparator's outcome nodes.
Note
The Inactive Breach reports only display resolved breaches if they match a
previous Active Breach.
13. To view how the breach is configured, hover the cursor at the top of the Active
Breach component, and click Edit in the mini-menu.
The Edit Component dialog for the Active Breach component opens. Here is
the breach message:
When you release the drag, the Edit Configuration dialog for the new
component appears.
4. Type a name for the component, and click OK.
Each component has a name, which allows you to reference the output from
one component in another component.
Note
Attributes for the entire rule, such as a Rule Name, Severity, Type, and
Description, are provided at the end of this process, after you finish adding and
configuring components, and after you click Save.
When you release the drag, the Edit Configuration dialog for the new
component appears.
7. Configure the component.
You must supply values for all required parameters; otherwise, the system will
not save the configuration.
8. Click OK to save the configuration and exit the dialog.
9. Connect the components by dragging from the Default Entry output
connection point to the APG Data Retrieval input connection point.
10. Drag an Executor Service operation after APG Data Retrieval, and add the
proper connectors.
The Executor Service operation helps improve the performance of rule
validation. It is a required operation after APG Data Retrieval. It is highly
recommended to have only one Executor Service operation per rule.
Rule Type The category for this rule. Rules are listed by category in
the Add Rule list. You can use an existing type, or create a
new one.
Device Type The device type that this rule applies to, for descriptive
purposes. This value is used on the Operations >
Compliance > Policies > View Rules report, in the
Applies On column.
Note
You cannot edit locked rules. Instead, copy the rule and edit the copy.
d. Add the new component into the process flow by dragging a line between
connection points on the symbols.
l Start the drag from an outcome connection point, on the right side of a
symbol.
l Drag to an entry connection point on the left side of a symbol.
Note
Attributes for the entire rule definition, such as the rule name and rule description, are
assigned after you finish dragging and configuring the individual components and after
you click Save.
Note
Field Description
Name Required name for this component. The name may include spaces.
Operation components
The Operation components retrieve and manipulate data.
APG Data Retrieval
Use the APG Data Retrieval operation to retrieve properties from the APG database.
The property values are forwarded to the next component in the rule flow. The dialog
contains the following configuration fields:
OPER."name":property
APG Data Retrieval Retrieves the specified properties and forwards each set individually
to the next operation in the flow.
APG List Retrieval Retrieves the specified properties and forwards the results as a list
(array) to the next operation in the flow.
APG Group By Data Receives grouped data from a previous operation and processes each
Processing group.
APG Group By Retrieves the specified properties, groups them, and forwards the
Retrieval grouped data to the next operation in the flow.
APG List Group By Retrieves the specified properties, groups them, and forwards the
Retrieval grouped results as a list (array) to the next operation in the flow.
APG Result Set Counts the result set from a previous operation and sends the counter
Count value to the next operation.
Reference the count value in the next operation using the count
field.
APG Result Set Receives data from a previous operation, applies a filter, and forwards
Processing specified properties to the next operation.
APG Sub Query Receives data from a previous operation, applies a filter, applies a
Processor second filter to the result set from the first filter, and forwards
specified properties to the next operation.
Filter Describes the records to examine in the database. The default filter
chooses all records.
Properties Lists the property names to retrieve from the filtered records. Use
commas to separate multiple properties. Do not include spaces.
To research property names:
1.
Click the icon next to the property text box.
2. Click the APG tab.
Group-by Only available when the chosen Type uses groups. This is the property
name used to form the groups of result data.
OPER."name":property
Type:
Topology Data Retrieves the specified properties and forwards each set individually
Retrieval to the next operation in the flow.
Topology Group By Retrieves the specified properties, groups them, and forwards the
Retrieval grouped data to the next operation in the flow.
Topology Group By Receives grouped data from a previous operation and processes each
Data Processing group.
Properties The property names to retrieve from the filtered records. Use
commas to separate multiple properties. Do not include spaces.
To research property names:
1.
Click the icon next to the property text box.
2. Click the Topology tab.
Executor Service
This component adds multithreaded capability to the rule and helps improve the
performance of rule validation.
An Executor Service is required in every rule. It should be added after a APG Data
Retrieval or Topology Data Retrieval operation. It is highly recommended to have only
one Executor Service operation per rule.
Data Concatenation
This operation concatenates retrieved properties.
In the concatenated string, you can use constants except for comma and space; those
two are used as separators in DataConcatenateOperation.
For an example using concatenated strings, see the out-of-the-box rule called
Supported multipathing software. That rule concatenates the value of part and
version to create, for example, the value Powerpath 6.0.
Case
This operation sends data to each of multiple conditions until a condition is met.
H1 HBA-1 M1
HBA-2 M1
HBA-3 M2
HBA-4 M2
H2 HBA-a M1
HBA-b M1
HBA-c M1
HBA-d M1
If an operation retrieves the device and model properties, and the Group-By field is
device, the data is grouped as follows:
First H1={M1, M1, M2, M2} is pushed to the next operation. Then H2={M1, M1, M1,
M1} is pushed.
Example rules
The following predefined rules use groupings in data retrieval operations:
l Multiple tenants accessing same virtual pool
l Uniform HBA hardware on host
l Several zoning-related rules
Condition components
Conditions provide a way to test values.
Comparator
A Comparator compares a retrieved property value to a user-defined or system-
defined value. The comparator result is a true or false value. A comparator has two
exit points: one is for the processing flow associated with the true result, and the
other is for the processing flow associated with the false result.
The component dialog contains the following configuration fields:
Type:
Uniform Property Ensures that all instances of the named property contain the same
Comparator configured value. The property name that needs to be uniform is
named in the Uniform Property parameter field.
MultiValue String Compares a string property value to a configured set of strings. The
Comparator result is true if the retrieved value matches any of the configured
string values.
Status The default state of the criterion to display in the rule's configuration.
The user can change the state.
l enabled — The criterion is active and considered when the rule is
run.
l disabled — The criterion is not considered when the rule is run.
Input-Type When Type is userDefined, this field defines the look of the
criterion field in the rule's configuration.
l DEFAULT — Shows a text box.
l BOOL — Shows a dropdown menu with Yes and No choices.
l CHECKBOX — Shows a set of checkboxes for the user to click
to select.
Uniqueness Comparator
A Uniqueness Comparator determines if a property value or set of property values is
unique within a given key. The key defines the set of retrieved entries to examine, and
the values define the properties to compare for uniqueness within the set.
An example predefined rule that uses a Uniqueness Comparator is the “A zone must
be unique” rule. The uniqueness comparator checks that the members of each zone
are unique. The key is the zone name. The values to check for uniqueness are the zone
member ids.
Action components
Actions are the end result of the processing flow.
A rule definition terminates with Active Breach and Resolve Breach actions.
Active Breach
Use this action to generate a breach that will appear in the breach reports. A
breach indicates that current conditions violate the rule. The parameters of this
component configure the breach message and breach attributes.
Resolve Breach
A resolve breach indicates that current conditions are in compliance to the rule.
l If a breach was previously reported for the same parameters, then the reports
show that the breach is resolved.
l No reporting activity occurs if there is no outstanding breach for the
parameter values used in the resolve breach.
b. Optionally edit the Subject field. The installed default uses property values
from the breach data to identify the device type and device name in the
subject line.
c. Optionally edit the Message field. The installed default uses property values
from the breach data to display information about a breach.
d. Click Test Action.
e. Wait for a message reporting either success or failure to send the email. It
might take a few minutes for the message to appear while the system
locates the mail server.
f. If the test is successful, click Ok. Otherwise, check the To field, and also
check the global mail server configuration, as follows:
l In the banner area of the Administration interface, click Global Settings
.
l On the SMTP Settings tab, verify all fields and edit as needed.
l Click Save.
6. To implement only one of the notification types (email or SNMP traps), edit the
alert definition and delete the unwanted action.
Note
Before you can enable the out-of-the-box alert definition, both the email and
the SNMP trap notification actions must be configured.
l Hover the pointer over the symbol for the unwanted action until a small
menu appears above the symbol, and select the Delete action (red minus
icon).
l Confirm the deletion, click Save, and then choose either Save and enable or
Save and disable.
| PolicyName=='new_policy_name'
To make a correction, right-click on the phrase that needs correcting in the box,
and select Edit expression.
2. In the right pane, click in the first column to select the Compliance-Breach-
Notifications alert definition.
3. Click Enable or Disable.
Results
All notifications for all breaches are enabled or disabled.
purgeduration=30
5. Click Save.
4. Click Save.
Results
Users assigned to the Storage Administrator Users role can perform management
tasks for compliance.
For example:
The following table provides detailed information about the out-of-the-box compliance
policies.
Default Zoning is Fabric should not Fabric {fabricname} has default zoning enabled.
Disabled have default
zoning enabled
Host port fan-in Host port fan-in Host port {hostport} on host {hostname} has a fan-
exceeded in of {faninvalue}, is greater than the desired state
{expected faninvalue}.
l A storage port was added to a zone in the
fabric, exceeding the maximum number of
storage ports allowed per hostport.
l An additional zone was activated, containing
the same host port and additional storage
ports.
Minimum number of Insufficient Zone {zone name} in fabric {fabric name} has too
members in Zone number of few zone members.
members in zone
Storage Port Fan- Storage Port Fan- Storage port {storageport} on array {arrayname} in
Out Out fabric {fabricname} has a fan-out of {fanout value},
is greater than the desired state {fanout expected
value}. A host port was added to a zone in the
fabric, exceeding the maximum number of host
ports allowed per storage port.
Symmetrix Port l WWN Bit is Symmetrix port does not have appropriate flag
Flag Settings Enabled settings.
l FCSW Bit is
Enabled
l VCM Bit is
Enabled
l C bit is
Enabled
l SC3 Bit is
Enabled
l SPC2 Bit is
Enabled
Unnecessary zone Unnecessary zone Zone {zone name} in fabric {fabric name} does not
have members of any fully established path and is
unnecessary.
Multiple tenants Multiple tenants The virtual pool {pool identifier} in ViPR Controller
accessing same accessing same host {hostname} is being accessed by tenants :
virtual pool virtual pool {tenant names}
Zone contains at Zone contains at Zone {zonename} is missing a host port (initiator).
least one host port least one host port
l One or more host ports were deleted from a
zone, leaving no host ports in the zone.
l A valid zone is used for array replication or
migration and does not contain host ports.
Zone Must Be Zone Must Be Fabric {fabric name} contains duplicate zones. A
Unique Unique zone was added or modified, resulting in multiple
zones with identical membership in active zone set.
Duplicate Zones: {zone names}