Search within this manual
Search all Support content
OnCommand® Insight 7.2
Assurance User Guide for the Java UI
OnCommand Insight Assurance features
Policy management
Modifying default global policies to control performance
General policy types and their hierarchies
Reviewing global general policies
Setting and managing switch thresholds and performance alerts
Setting switch performance thresholds
Switch threshold types and formulas
Reviewing and confirming alerts
Changing or disabling switch thresholds
Customizing global general policies
Setting violation notifications
Changing the severity levels for violation types
Creating and changing SAN path policies
Defining and reviewing SAN path policies
Global path policies
Specific host and path policies
Creating global SAN path policies
Defining the global Fibre Channel storage policy
Defining global volume type exceptions for Fibre Channel
Defining global volume capacity exception policies for Fibre Channel
Defining global tape policies for Fibre Channel
Defining global backend path policies for Fibre Channel
Defining the global storage policy for iSCSI
Defining global volume type exceptions policies for iSCSI
Defining global volume capacity exceptions policies for iSCSI
Creating specific path policies
Creating host policies
Reviewing SAN path policies
Editing SAN path policies
Disabling global path policies
Removing SAN path policies
Policies reference
Modify Policy wizard - first page
Modify Policy wizard - select option page
Modify Policy wizard - settings page
Modify Policy wizard - confirmation page
Policies view
SAN Path Policies view
Settings for FC global policies
Settings for Global Policies
Settings for iSCSI global policies
Violation Notification settings
Violation Severity settings
Monitoring changes in your environment
Types of changes you can monitor in your environment
Filtering the list of changes
Troubleshooting with topology and change history
Creating an HTML report of changes
Monitoring changes reference
Changes main view
Changes detail view
Datastores view
File Systems detail view
VMDKs detail view
Virtual Machines view
Allocating capacity
Identifying unused capacity
Avoiding over-commitment problems
Violation management
General violation analysis and correction
General violation types
Filtering the displayed severity levels
Analyzing general violations
Analyzing data store latency violations
Analyzing host port balance violations
Analyzing storage port balance violations
Analyzing storage pool capacity violations
Analyzing storage pool utilization violations
Dismissing violations
SAN path violations analysis and correction
Investigating SAN path violations
Reviewing paths related to a violation
Correcting SAN path violations
SAN path violation types and suggested solutions
Analyzing path outage violations
Analyzing a missing path redundancy violation
Analyzing a missing path
Reviewing system changes linked to a SAN path violation
Clearing multiple path violations quickly
Identifying violations associated with planned tasks
Setting virtualization policy and monitoring VM violations
Violations related to VMs
Analyzing VM violations: Missing virtual cluster path
Violations reference
Alerts view
Analyze Storage Pools dialog box
Port Balance Violations view
Reservation Violations view
SAN Path Violations view
Violation Changes view
Topology view
Violations Browser
Violations Browser tree
Violations List
Violation Event view
Impact Details view
VMDK Performance view
Analyzing and managing vulnerabilities
Viewing vulnerabilities data
OnCommand Insight Applications Dashboard
Researching vulnerabilities
Establishing vulnerability thresholds
Managing thin provisioning using vulnerabilities
Orphaned Volumes vulnerability
Spare Disks vulnerability
Adding hosts to application groups
Vulnerabilities main view and types
Disconnected Switch Port Zone Members vulnerability for Fibre Channel
Disconnected WWN Zone Members vulnerability for Fibre Channel
Duplicate Backend Volume Assignments vulnerability
High Fabric Port Usage vulnerability for Fibre Channel
High Volume Allocation vulnerability
Incomplete Application Volume Sharing vulnerability
Inconsistent Volume Member Disks RPM vulnerability
Local Replica for Undefined Volumes vulnerability
Low Fabric Port Usage vulnerability for Fibre Channel only
Orphaned Volumes vulnerability
Replication Capacity Mismatch vulnerability
Shared Volume Masking vulnerability
Spare Disks vulnerability
Unused Masked Volumes vulnerability
Volume and Replica Share Same Disk vulnerability
Volume with Members on Same Disk vulnerability
Volumes have LUNs with value greater than 255 vulnerability
Copyright information
Trademark information
How to send comments about documentation and receive update notifications