Deployment guidelines and limitations for Storage Resource agents
You must consider the following guidelines and limitations when you manage Storage Resource agents in your environment.
- Multiple Storage Resource agents that are probing or scanning the same storage resources
- Platforms that support the deployment of Storage Resource agents
- Product functions that are not available for storage devices monitored by Storage Resource agents
- Required authority for deploying Storage Resource agents
- Orphan zones
- Firewalls and Storage Resource agents deployments
- Deploying Storage Resource agents on multiple computers
- Communication between the IBM Spectrum® Control server and a Storage Resource agent
- Daemon and non-daemon services
- Port numbers for Storage Resource agents deployed as a daemon service
- Authentication between the IBM Spectrum Control server and a Storage Resource agent
- Replacing default SSL certificates
- Storage Resource agents on the same computer
- Time zones for computers monitored by Storage Resource agents
- Connections for Linux® and AIX® operating systems by using Remote Shell protocol (RSH)
- Deployments on Windows™ - NetBIOS setting
- Deployments on Windows - User Account Control (UAC) remote restrictions
- Multiple Storage Resource agents that are probing or scanning the same resources
- If multiple Storage Resource agents are set up to probe or scan the same storage resources, the Storage Resource agents that was added to IBM Spectrum Control first is used for the probe or scan. Therefore, only data that is gathered by the first Storage Resource agent is shown.
- Platforms that support the deployment of Storage Resource agents
- For a list of platforms on which you can deploy Storage Resource agents, see the
IBM Spectrum Control interoperability matrix and go to the Agents,
Servers and Browsers section. - Product functions that are unavailable for resources that are monitored by Storage Resource agents
- Before you deploy a Storage Resource agent, ensure that the product functions you want to use on
the monitored resources are available for those agents. The following functions are not available
for resources that are monitored by Storage Resource agents:
- Certain relational database monitoring. For list of relational databases that can be monitored
by Storage Resource agents, see the
IBM Spectrum Control interoperability matrix and go to the Agents,
Servers and Browsers section. - The reporting of HBA, fabric topology, or zoning information for fabrics that are connected to hosts that are running Linux on IBM® System z® hardware. These limitations also apply to Storage Resource agents on all guest operating systems for VMware configurations.
- Certain relational database monitoring. For list of relational databases that can be monitored
by Storage Resource agents, see the
- Required authorities for deploying and running Storage Resource agents
- Before you can create deployment schedules and deploy Storage Resource agents on target
computers, you must meet the following requirements:
- To create deployment schedules, you must be logged in to IBM Spectrum Control with a user ID that has the Administrator role. For information about user roles, see Authorizing users.
- To deploy Storage Resource agents on target computers, you must provide a user ID that has administrative rights on those computers. You enter this ID when you create a deployment schedule. IBM Spectrum Control uses this ID to log on to the target computers and install and configure the necessary runtime files for the agents.
- On the Linux or AIX operating systems, the user must have root authority. By default, an agent runs under the user 'root'.
- On the Windows operating systems, the user must have Administrator authority and be a member of the Administrators group. By default, a Storage Resource agent runs under the 'Local System' account.
- Orphan zones
- Storage Resource agents do not collect information about orphan zones. An orphan zone is a zone that does not belong to at least one zoneset.
- Firewalls and Storage Resource agent deployments
- Before you can deploy a Storage Resource agent on a computer, you must turn off the firewall on that computer. If you do not turn off the firewall, the deployment fails.
- Deploying Storage Resource agents on multiple computers
- If you deploy Storage Resource agents on multiple computers at the same time, the computers must
have the same administrative user ID and password. IBM Spectrum
Control uses these user credentials to log on to the
computers when you install Storage Resource agents.Tip: When you deploy Storage Resource agents on multiple computers, a globally unique identifier (GUID) is created for each computer (if one does not exist).
- Communication between the IBM Spectrum Control server and a Storage Resource agent
- The IBM Spectrum
Control server connects to a
monitored computer when a Storage Resource agent is deployed and whenever a data collection schedule
runs against that agent. During deployment, the server communicates with the target computer by using one of the following protocols:
- Windows server message block protocol (SMB)
- Secure Shell protocol (SSH)
- Remote execution protocol (REXEC)
- Remote shell protocol (RSH)
After deployment, the type of communication between the server and agent on that computer depends on whether you deployed the agent as daemon service or non-daemon service.
- Daemon and non-daemon services
- You can deploy a Storage Resource agent as a daemon or non-daemon service:
- A Storage Resource agent that is deployed as a daemon service runs in the background on the monitored computer and listens for requests from the IBM Spectrum Control server. Connectivity between the server and agent is established by using SSL. The server and agent have their respective certificates and no additional information is required besides those certificates and the security that is provided by the SSL protocol.
- A Storage Resource agent deployed as a service on demand (non-daemon service) runs as a stand-alone executable file on the monitored computer. Communication from the server to the agent uses the same protocol that was used during the deployment of the agent. Communication from the agent to the server uses SSL.
- A Storage Resource agent that is deployed as a daemon service on AIX, Linux, and Windows servers monitors disk paths in near real-time to detect errors. When deployed as a daemon service on an AIX server, the agent also monitors disk error events in near real-time.
If the Storage Resource agent detects path status changes or disk errors, they are included in the status of the disks and paths. You can define alerts so that you are notified of changes to the status of the paths on monitored disks.
Only status changes for existing paths are detected. If a new path is added, or an existing path is removed, the number of paths that is displayed is not updated immediately. The number of paths is updated after the next scheduled probe collects data.
If a disk on an AIX server has an error status and you fix the error, you might want the new status of the disk to be displayed immediately. To display the new status immediately, you must reset the status indicator for the disk. To reset the status indicator, use the errclear command to clear the error log. To clear the error log, use the following syntax:
errclear -d H -N disk_name 0For example, if you fixed an error on hdisk4, and want to display the new status immediately, run the following command:
errclear -d H -N hdisk4 0If you do not reset the status indicator for the disk, the status changes automatically after a few hours.
For information about the errclear command, see errclear Command.
- Port numbers for Storage Resource agents deployed as a daemon service
- The following port numbers are used by Storage Resource agents that are deployed as daemon service:
- 9567 (For the Storage Resource agent that is deployed on the same server as IBM Spectrum Control.)
- 9510 (For Storage Resource agents that are deployed on remote servers.)
- Authentication between the IBM Spectrum Control server and a Storage Resource agent
- IBM Spectrum Control requires the correct authentication information (user name, password, port, certificate location, or passphrase) for monitored computers each time it communicates with Storage Resource agents on those computers. If the authentication information changes for a host computer on which a Storage Resource agent is deployed, the authentication information for that agent must be updated by using the action on the Servers page in the GUI.
- Replacing default SSL certificates
- IBM Spectrum Control provides default SSL certificates for communication between the Data server and Storage Resource agent.
- Storage Resource agents on the same computer
- You cannot deploy a Storage Resource agent on a computer where a Storage Resource agent is already installed and pointing to the same Data server. You can deploy a Storage Resource agent on the same computer as another Storage Resource agent if those agents communicate with different Data servers and use different ports when you listen for requests.
- Time zones for computers that are monitored by Storage Resource agents
- The time zones of computers that are monitored by Storage Resource agents are shown as Greenwich
mean time (GMT) offsets in IBM Spectrum
Control reports.
For example, a computer in Los Angeles shows the following time zones in the By Computer report in
Asset reporting:
(GMT-8:00) GMT-8:00 - Connections for Linux and AIX operating systems by using Remote Shell protocol (RSH)
- If RSH is configured to use a user ID and password, the connection fails. To successfully
connect to a system by using RSH, you must set up the
.rhostsfile (in the home directory of the account). RSH must be configured to accept a login from the system that is running your application. - Deployments on Windows operating systems - NetBIOS setting
- To install a Storage Resource agent on Windows targets,
the Enable NetBIOS over TCP/IP option must be selected in the Control Panel
settings for the computer's network connections properties. To set this option, complete the
following steps:
- Open Windows Control Panel. For information about how to open Windows Control Panel, see Accessing administration tools.
- Select .
To determine whether these ports are not blocked for inbound requests, see the documentation for your firewall.
To determine whether security policies are blocking the connection ports, open Administrative Tools. For information about how to open Administrative Tools, see Accessing administration tools. .
Depending on whether your policies are stored locally or in Active Directory, follow these directions:- Policies that are stored locally
- For policies that are stored locally, complete the following steps:
- Open Windows Administrative Services.
- Click .
- Policies that are stored in Active Directory
- For policies that are stored in Active Directory, examine the IP security policies and edit or
remove filters that block the ports:
- Click .
- Click .
For all Windows systems, the Server service must be running to connect to a Windows system by using the Windows protocol.
The following table lists the ports that are reserved for NetBIOS. Ensure that these ports are not blocked.Port Description 135 NetBIOS Remote procedure call. (Not currently used.) 137 NetBIOS name service. 138 NetBIOS datagram. (Not currently used.) 139 NetBIOS session (for file and print sharing). 445 CIFS (on Windows XP). For Windows , shares must be shared for the Guest or Everyone accounts, and password protected sharing must be disabled. To disable password protected sharing, follow these steps:- Click .
- Click Change advanced sharing settings.
- Click the down arrow next to All Networks.
- Select Turn off password protected sharing.
- Click Save Changes.
- Exit from the Control Panel.
- Deployments on Windows - User Account Control (UAC) remote restrictions
- To install Storage Resource agents remotely on a Windows operating system, you must disable the User Account Control (UAC) remote
restrictions on the Windows operating system. User Account
Control is a security component on Windows operating
systems.Tip: To disable UAC restrictions, you must modify the computer registry. Serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if problems occur. For information about how to back up and restore the registry, see
http://support.microsoft.com/kb/322756/.To disable UAC remote restrictions, follow these steps:- Open the Windows Run window. For information about how to open the Run window, see Accessing administration tools.
- Enter regedit and click OK.
- Locate and click the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Policies\System - Double click the EnableLUA registry entry.
- In the Edit DWORD (32-Bit) dialog, change the value in the Value data field from 1 to 0.
- Click OK.
- Exit the registry editor.