GUI Administration Guide HPE Alletra 6000 Series HPE Nimble Storage Flash Arrays

Content
Search Results
Index
Loading, please wait ...

Loading

  • The GUI
    • Accepting a Self-Signed Certificate When Logging in to the Array OS Using Firefox
    • Using the GUI
    • GUI Icons
  • Array Overview
    • The Array
    • Array Features
    • Array Management
      • Cloud Accounts and Arrays Using Data Services Cloud Console
      • Enable HPE Alletra 6000 Arrays to Work with Data Services Cloud Console
      • Enable HPE Flash Arrays to Use Data Services Cloud Console
      • Disable HPE Flash Arrays from Data Services Cloud Console
      • Addressing Possible Data Services Cloud Console Connection Issues
    • IOPS and MiB/s Limits on Volumes and Folders
    • Horizontal Scaling
      • Relationship of Groups, Pools, Arrays, Folders, and Volumes
      • Pools
    • Feature Support on iSCSI and Fibre Channel Arrays
    • Integration
    • Wellness and DNA
    • Access Controls
      • User Permissions
      • CHAP Accounts
      • iSCSI Initiator Groups
      • Fibre Channel Initiator Groups
      • VLAN Segmentation and Tagging
        • VLANs and Initiator Groups
  • Major Workflows
    • Updating the Array OS Workflow
    • Provisioning Storage Volumes and Performance Policies Workflow
    • Setting Up Replication Workflow
    • Creating a vVol Datastore Workflow
    • Restoring Snapshot Data from Clones Workflow
  • Hardware and Software Updates
    • Upgrades and Updates
      • Hardware Upgrades
      • Updates
    • Find the Array OS Version
    • Download and Update the Array OS without Internet Access
    • Download and Update the Array OS with Internet Access
    • Verify the Array OS Update
  • Network Configuration
    • Network Configuration Profiles
      • Create a Draft Network Configuration Profile
      • Activate a Network Configuration Profile
      • Delete a Draft Network Configuration Profile
    • IP Addresses
      • Configure IP Addresses
    • Subnets
      • Subnet Traffic Types
      • Subnet Traffic Assignments
      • IP Address Zones in Subnets
      • Configure a Subnet
      • Delete a Subnet
    • Routes
      • Configure a Static Route
      • Delete a Static Route
      • Configure the Default Gateway
    • Network Interfaces
      • Configure an iSCSI Interface
      • Unconfigure an iSCSI Interface
      • Set a Fibre Channel Interface Administrative State
    • Fibre Channel Interfaces
    • iSCSI Host Connection Methods
      • Automatic iSCSI Host Connections
      • Manual iSCSI Host Connections
        • Set the iSCSI Host Connection Method to Manual
    • VLAN Support and VLAN Tagging
      • About VLANs
        • Target Subnet List
      • About VLAN Tagging
        • Tagged and Untagged VLAN Subnets
          • Configure VLAN Tagging
          • Remove VLAN Tagging
          • Move an Array from One Tagged VLAN to Another
  • Array Groups
    • Multiprotocol Array Groups
    • Group Leader Array
    • Backup Group Leader Array
      • Secondary Management IP Address and Backup Group Leader
      • Methods for Setting Up a Secondary Management IP Address to Use for a Backup Group Leader
    • Adding Arrays to a Group
      • Add an Unconfigured Array to a Group
      • Add a Configured Array to a Group (Group Merge)
      • Pre-Merge Tasks
      • Merge Two Groups
      • Post-Merge Tasks
    • Group Information
    • Default Group Settings
      • Modify Global Security Policies
      • Modify the Default Inactivity Timeout
      • Modify the Default Space Reservation
      • Modify the Date, Time, and Timezone
      • Modify DNS Settings
  • Initiator Groups
    • iSCSI Initiator Groups
      • Create an iSCSI Initiator Group
      • Edit an iSCSI Initiator Group
      • Delete an iSCSI Initiator Group
      • Add an Initiator to an iSCSI Initiator Group
      • Delete an Initiator from an iSCSI Initiator Group
    • Fibre Channel Initiator Groups
      • Target Driven Zoning
        • TDZ Enablement Considerations
      • Create a Fibre Channel Initiator Group
      • Edit a Fibre Channel Initiator Group
      • Delete a Fibre Channel Initiator Group
      • Add an Initiator to a Fibre Channel Initiator Group
      • Delete an Initiator from a Fibre Channel Initiator Group
    • Initiator Group Access Control Lists
      • Add an Initiator Group ACL to a Volume
      • Remove an Initiator Group ACL from a Volume
  • Volumes
    • Clones, Replicas, and Snapshots
    • Logical versus Physical Space
    • Space Management
      • Volume Reserve
      • Thin Provisioning
      • Volume Usage Limits
    • A Note on Defragmentation
    • Cloning Space Considerations
    • Protecting Data Using Snapshots
    • Create a Volume
    • Edit a Volume
    • Change the State of a Volume
    • Clone a Volume from a Snapshot
    • Restore a Volume from a Snapshot
    • Delete a Volume
    • Delete a replicated volume from downstream
    • Volume Pinning
      • Pinnable Flash Capacity
      • Volume Pinning Caveats
      • Pin and Unpin a Volume
      • Unable to Pin a Volume
    • Performance Policies
      • Create a Performance Policy
      • Create a Performance Policy with Deduplication Enabled
      • Disassociate a Volume from a Performance Policy
      • Edit a Performance Policy
      • Delete a Performance Policy
    • Group Scoped iSCSI Target
  • VMware Virtual Volumes
    • vCenter Server
      • Register a vCenter Plugin with vCenter Server
  • Folders
    • Relationship of Folders, Pools, and Volumes
    • Create a Folder
    • Edit a Folder
    • Delete a Folder
  • Deduplication
    • Deduplication on Hybrid Arrays
    • Pool-Level Deduplication (Default)
    • Managing Deduplication Capacity
    • Domains
      • Enable All-Volume (Pool-Level) Deduplication
      • Enable Deduplication Determined by Performance Policy
      • Enable Per-Volume Deduplication
      • Disable Per-Volume Deduplication
    • Storage Efficiency Reporting
  • Storage Pools
    • Pool Considerations
    • Create a Storage Pool
    • Add or Remove Arrays from a Storage Pool
    • Merge Storage Pools
    • Volume Moves
      • Move a Volume from One Storage Pool to Another
      • Move a Volume from One Folder to Another
      • End a Volume Move in Progress
    • Delete a Storage Pool
  • Data Protection
    • Volume Collections
      • Volume Collections and Multiple Replication Partners
      • Create a Volume Collection
      • View Volume Collection Details
      • Protect a Standalone Volume
      • Edit a Volume Collection
      • Delete a Volume Collection
    • Protection Templates
      • Create a Protection Template
      • Edit a Protection Template
      • Delete a Protection Template
  • Snapshots
    • Snapshots Overview
      • Snapshots and Daylight Savings Time
    • Snapshot Consistency
    • Snapshot Rate Limits
    • Volume and Snapshot Usage
      • Pending Deletions and Snapshot Usage
    • Automatic and Manual Snapshots
      • Take a Manual Snapshot
    • Modify a Snapshot
    • Delete a Snapshot
    • Hidden Snapshots
    • Snapshot Framework
    • Managed and Unmanaged Snapshots
      • Managed Snapshots
      • Unmanaged Snapshots
      • Risks Associated with Unmanaged Snapshots
      • Preventing Unmanaged Snapshots
    • NSs Snapshots
    • Working with Online Snapshots
      • Identify Online Snapshots Using the OS GUI
      • Migrate Data From an Online Snapshot to a New Volume
  • Replication
    • What is Replication?
    • Snapshot Replication and Synchronous Replication
    • Replication Partners and How Replication Works
      • Create a Replication Partner
      • Modify a Replication Partner
      • Delete a Replication Partner
      • Test the Connection between Replication Partners
    • Link Management and Resynchronization with Synchronous Replication
    • Snapshot Replication and Volume Collections
    • Add Replication to a Volume Collection
    • Synchronous Replication
      • Synchronous Replication Prerequisites and Limitations
      • Out-of-Sync Volumes
      • Volume Names and Replication
      • Configuring Synchronous Replication: Serial Numbers and ACLs
      • Configuring Synchronous Replication on a Volume Collection
      • Unconfigure Synchronous Replication
      • Reconfigure Synchronous Replication
      • Resize a Volume Participating in Synchronous Replication
      • Automatic Switchover (ASO)
        • Install and Configure the Witness on a Linux server
          • Witness Library Dependecies
        • Run the Witness in a VMware based Virtual Machine
        • Set Up and Enable the Witness
        • Array Shutdown Order in Peer Persistence
          • Shutting Down the GL
          • Shutting Down the BGL
    • Synchronous Replication and Manual Failovers
      • Overview of Manual Failover Steps When Group Leader Is Unavailable
      • Overview of Manual Failover Steps When Backup Group Leader Is Unreachable
      • Add Synchronous Replication
    • Change Partnership from Snapshot Replication to Synchronous Replication within a Group
    • Replication Strategy
      • Replication and Folders
    • Pause and Resume a Replication in Progress
    • Replication Seeding
    • Replica Details
    • Replication Bandwidth Limits
      • Set Overall Bandwidth Limits for Replication
      • Remove Overall Bandwidth Limits for Replication
      • Configure Bandwidth Limitations for a Replication Partner
      • Modify Per-Partner Replication Bandwidth Limits
  • Security
    • Role-Based Access Control
      • Permission Levels
      • View User Information
      • Add a User Account
      • Edit a User Account
      • Change Your Account Information
      • Reset a User Account Password
      • Enable a User Account
      • Disable a User Account
      • Remove a User Account
    • Microsoft Active Directory and LDAP
      • Specifying an External Authentication Directory Service
      • Access Control with Active Directory
        • Guidelines for Working with Arrays and Active Directory
        • User Authentication and Logon
        • Preparing to Join an Array to Active Directory
        • Join an Active Directory Domain
        • Remove an Active Directory Domain
      • Access Control with LDAP
        • Guidelines for Working with Arrays and LDAP
        • Overview of the LDAP Workflow
        • Example of an LDAP Setup
        • Disconnect an LDAP Domain
      • Switch Between Active Directory and LDAP Using the GUI
      • Common Active Directory and LDAP Tasks
        • Supported Array Roles
        • Disable a Domain for Active Directory or LDAP
        • Enable a Domain for Active Directory or LDAP
        • Test the Domain Connection
      • How Group Roles Apply to Active Directory, LDAP
        • Array Group Names
        • Add a Group to a Domain
        • Remove an Active Directory or LDAP Group
        • Disable an Active Directory or LDAP Group
        • Enable an Active Directory or LDAP Group
        • Edit Active Directory Group or LDAP Information
    • CHAP Authentication
      • Create a CHAP Account for Volume Scoped Target Volumes
      • Create a CHAP Account for Group Scoped Target Volumes
      • Assign a CHAP User to a Volume
      • Modify a CHAP User Account
      • Remove CHAP User Access Control From a Volume
      • Delete a CHAP User
    • Login Banner
      • Edit the Login Banner
    • Multihost Access
      • Using MPIO
      • MPIO for Windows
      • MPIO for Linux
    • Multitenancy
    • Secure SMTP
      • Configure Email Alerts
    • Encryption of Data at Rest
      • Enable Encryption
    • External Key Manager Support
      • Setting Up An External Key Manager
    • Secure Sockets Layer Certificates
      • Create and Import a Custom Certificate or Certificate Signing Request
      • Delete Certificates
  • Monitoring Your Arrays
    • Monitor Capacity
    • Monitor Performance
    • Monitor Interfaces
    • Monitor Replication
    • Monitor Data Migration
    • Global Search
      • Search for Objects
      • Filter Objects
    • Syslog
      • Enable Syslog
      • Disable Syslog
    • Audit Log Management
      • Audit Log Panel
      • Facets Panel
      • Summary Table
      • User Management
    • Hosts
      • Monitor Host Administrative Data Using Cross-Stack Analytics for Hyper-V
      • Gather Host Diagnostics Information
  • Disaster Recovery
    • Handover Overview
    • Perform a Volume Collection Handover
    • Make a Replica Available to Applications
    • Promote a Volume Collection
    • Demote a Volume Collection
    • Claim a Volume
  • Array Administration
    • Configure Email Alerts
    • HPE Storage Diagnostics for Analytics
      • Enable DNA
      • Disable DNA
      • Manually Send DNA
      • Enable a Secure Tunnel
      • Configure a Proxy Server
    • Usage Analytics
      • Enable and Disable Usage Analytics
      • Usage Analytics and Software Updates
    • Change the Array Name
    • Set Up SNMP
    • Fail Over a Controller
    • Shut Down an Array
  • Alarm Management
    • Where to Find Alarm Information on the GUI
    • Acknowledge and Unacknowledge Alarms
    • Change an Alarm Reminder
    • Enable Alarms
    • Delete Alarms
  • Events
    • Event Severity Levels
    • View Events
  • Audit Logs
  • System Limits and Timeout Values
    • System Limits
  • Firewall Ports
    • Configure Firewall Ports