About reports in Veritas Operations Manager 5.0
|Article:HOWTO79072|||||Created: 2012-08-24|||||Updated: 2012-08-24|||||Article URL http://www.symantec.com/docs/HOWTO79072|
In Veritas Operations Manager, you can generate a variety of reports for various purposes. The following are the broad categories under which the reports are grouped:
The Storage Utilization category reports provide information on the utilization of the various resources such as file systems, thin pools, enclosures, array volumes, and so on. For example the Array Volume Usage report shows array volume usage across all enclosures.
The Trend or Activity category reports provide information on the activity of a resource during a specified time duration. For example, the Uptime Analysis report displays the total time for which the selected service groups were online. Also, the report summarizes the events that affect the online availability of the service groups.
The Storage Reclamation category reports provide analysis of the storage that can be reclaimed from thin pools, or the storage that can be reclaimed from file systems under Veritas File System (VxFS). For example, the Underutilized LUNs managed by Storage Foundation report lists all LUNs for which available capacity is not fully utilized by Storage Foundation, whereas the Underutilized File Systems report lists the file systems for which the available capacity is not fully utilized.
The Environment category reports provide information about the Storage Foundation product versions, product usage, underutilized license details, and so on. For example, the Patch report provides consolidated information about patches applicable to each host in the datacenter.
The Inventory category reports provide various details about the resources in your datacenter, such as the mount point of a file system, or type and current state of a cluster, and so on. For example, the All Cluster report lists all the clusters in the datacenter, whereas the All Enclosures Report lists all the enclosures discovered in your datacenter.
Article URL http://www.symantec.com/docs/HOWTO79072