Modifying Cluster Settings; Configuring Cluster Event Notifications - Dell DL4000 User Manual

Tape library
Hide thumbs Also See for DL4000:
Table of Contents

Advertisement

Modifying Cluster Settings

Configuring Cluster Event Notifications

Modifying the Cluster Retention Policy
Modifying Cluster Protection Schedules
Modifying Cluster Transfer Settings
Modifying cluster settings
After adding a cluster, you can easily modify basic settings (for example, display name), protection
settings (for example, protection schedules, adding or removing volumes, and pausing protection), and
more.
To modify cluster settings:
1.
Do one of the following:
In the Core Console, click the Machines tab, and then select the cluster that you want to modify.
In the left navigation area, select the cluster that you want to modify.
2.
Click the Configuration tab.
The Settings page appears.
3.
Click Edit to modify the settings on this page for the cluster described as follows:.
Text Box
Display Name
Host Name
Repository
Encryption Key
Configuring cluster event notifications
You can configure how system events are reported for your cluster by creating notification groups. These
events could be system alerts or errors.
To configure cluster event notifications:
1.
Do one of the following:
In the Core Console, click the Machines tab, and then select the cluster that you want to modify.
In the left navigation area, select the cluster that you want to modify.
2.
Click the Configuration tab, and then click Events.
144
Description
Enter a display name for the cluster.
The name for this cluster is displayed in the Core Console. By default, this is
the host name for the cluster. You can change this to something more
descriptive, if needed.
This setting represents the host name for the cluster. It is listed here for
informational purposes only and cannot be modified.
Enter the Core repository associated with the cluster.
NOTE: If snapshots have already been taken for this cluster, this setting is
listed here for informational purposes only and cannot be modified.
Edit and select an encryption key if necessary.
This specifies whether encryption is to be applied to the data for every volume
on this cluster to be stored in the repository.

Advertisement

Table of Contents
loading

Table of Contents