HP StorageWorks Reference Information Storage System Version 1.
Legal and notice information © Copyright 2004-2006 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
Contents About this guide . . . . . . . . . . . . . . . . . . . . . . . . . Intended audience . . . . . . . Related documentation . . . . . Document conventions and symbols HP technical support . . . . . . Subscription service . . . . . . Other web sites . . . . . . . . Providing feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Appliance Configuration . . . . . Firewall Settings . . . . . . . . . . . SSL Configuration . . . . . . . . . . Available certificate signing requests Creating a certificate signing request Deleting a certificate signing request Installing and generating a certificate Installing and generating a certificate Software Version . . . . . . . . . . Displaying Software Version . . . . . . . . . . . . . . . . . . . . . . on the on the . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Rescheduling all reprocessing schedules . . . . . . . Editing reprocessing schedules . . . . . . . . . . . Changing the reprocessing status . . . . . . . . . Using the Reprocessing Utility . . . . . . . . . . . Viewing reprocessing history logs . . . . . . . . . Repository-level retention . . . . . . . . . . . . . . . Searching for and editing a repository retention period Editing domain retention periods . . . . . . . . . . Changing the retention processing status . . . . . .
Displaying reports and log files Archive Request file specifications . . . Settings description . . . . . . . Sample file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Audit Log . . . . . . . . . . . . . . . . . . . . . . . . . . . Enabling the Audit Log feature . . . . . . . .
Starting selective archiving . . . . . . . . . . . Status View . . . . . . . . . . . . . . . . . . Monitoring View . . . . . . . . . . . . . . Deleting end-user deleted items on the RISS . . . . Location of deleted items . . . . . . . . . . Configuring deletion retention . . . . . . . . Scheduling deletion from RISS . . . . . . . . End-user delete security . . . . . . . . . . . OWA RISS . . . . . . . . . . . . . . . . . . System requirements . . . . . . . . . . . . Multiple mail stores . . . . . . . . . . .
Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Email Miner agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figures 1 PCC user interface . . . . . . . . . . 2 Performance Graph: Store Rate . . . . . 3 Performance Graph: Free Memory . . . 4 Domain Configuration . . . . . . . . . 5 New LDAP connection . . . . . . . . . 6 Create DAS job . . . . . . . . . . . . 7 Mapping information . . . . . . . . . 8 Advanced options . . . . . . . . . . 9 Assign a job to a portal . . . . . . . . 10 Account Manager view . . . . . . . . 11 Editing user account information . . . . 12 Viewing group account information . . .
55 Server Definition . . . . . . . . . 56 Processing options . . . . . . . . 57 Message and Title fields . . . . . 58 Logging options . . . . . . . . . 59 Options . . . . . . . . . . . . 60 Server Status . . . . . . . . . . 61 Specify mail user processing options 62 Import users . . . . . . . . . . . 63 Synchronize with Address Book . . 64 Include resource database . . . . 65 Creating a mail restriction . . . . . 66 Basics . . . . . . . . . . . . . 67 Content . . . . . . . . . . . . 68 Size . . . . . . . .
Tables 1 Document conventions . . . . . . . . . . . 2 RIM applications for users . . . . . . . . . 3 RIM applications for administrators . . . . . 4 Views for common system administration tasks . 5 Views accessible from left menu . . . . . . . 6 Smart cell life cycle states . . . . . . . . . 7 Link to Overview . . . . . . . . . . . . . 8 Application Events features . . . . . . . . . 9 Appliance Statistics features . . . . . . . . 10 Storage Status view features . . . . . . . .
55 Journal Mining features . . . . . . . . . 56 Link to System Insight Management view . 57 Tags in . . . . . . . . . . . 58 Tags in . . . . . . . . . . . 59 User accounts on customer servers . . . . 60 User accounts for journal mining . . . . . 61 Append to a CSV file . . . . . . . . . 62 CSV Columns . . . . . . . . . . . . . 63 Summary report . . . . . . . . . . . . 64 SetAdmin.exe . . . . . . . . . . . . . 65 Mail Attender rule to delete temporary items 66 Architecture . . . . . . . .
About this guide This guide provides information about: • Administering the HP StorageWorks Reference Information Storage System (RISS) • Administering the HP StorageWorks Reference Information Manager (RIM) Intended audience This guide is intended for: • HP StorageWorks Reference Information Storage System (RISS) administrators • HP StorageWorks Reference Information Manager (RIM) administrators Related documentation In addition to this guide, HP provides the following RISS and RIM documentation.
Document conventions and symbols Table 1 Document conventions Convention Element Medium blue text: Related documentation Cross-reference links and email addresses Medium blue, underlined text (http://www.hp.
HP technical support Telephone numbers for worldwide technical support are listed on the HP support web site:http://www.hp.com/support/. Collect the following information before calling: • • • • • • Technical support registration number (if applicable) Product serial numbers Product model names and numbers Applicable error messages Operating system type and revision level Detailed, specific questions For continuous quality improvement, calls may be recorded or monitored.
About this guide
1 RISS overview This chapter describes key concepts involving the HP StorageWorks Reference Information Storage System (RISS) and Reference Information Manager (RIM). It contains the following topics: • RISS, page 17 • RIM, page 17 RISS RISS is a fault-tolerant, secure system of hardware and software that archives files and email messages for your organization, and lets you search for archived documents.
RISS overview
2 Introduction to Platform Control Center (PCC) This chapter introduces the Platform Control Center (PCC) administration tool for monitoring and troubleshooting the RISS and user accounts.
Figure 1 PCC user interface User interface orientation tips To orient yourself, pay attention to the different ways a view is characterized. • Link text: A navigation link leading to a view is a general description of the view. Most links to a view are from the left menu. • HTML name: Each PCC view has a descriptive HTML name, which is displayed in the browser.
Views for common tasks Table 4 Views for common system administration tasks Task View Check overall system health and performance Overview on page 25 Check smart cell health and performance Appliance Statistics on page 27 Monitor system status and RAID support System Status on page 30 Start, stop, and restart system servers Appliance Control on page 31 Check the RISS configuration RISS configuration on page 35 Display firewalled ports enabled in the system Firewall Settings on page 36 View sof
Left menu item Description System Status on page 30 View summary, by server, of system capacity and performance. Appliance Control on page 31 Start, stop, or restart one or more servers on the system. Performance Graph on page 32 Graph system storage and indexing rates and system performance. General Configuration views RISS configuration on page 35 Display hardware and configuration information about the RISS system.
Monitoring and reporting PCC monitors the system and reports on its health and activity. PCC provides reports on: • system health • system performance • smart cell states Hosts in the system (and their services) are organized into groups of the same type, called host groups. For example, to view all smart cell hosts, display the status of the host group SMARTCELL Servers in the System Status view. Hosts and services are monitored by polling, which is set up outside the PCC, in System Insight Manager.
Life cycle state Definition Importance RESTORE The cell is a target for data restoration from another smart cell. The cell is not available for document storage, search, or retrieval. maintenance DISCOVERY The meta server and smart cell are determining the cell’s start state (the state following DISCOVERY), based on expected states of the cell and its mirror smart cell. The cell is not available for document storage, search, or retrieval.
3 System Status This chapter discusses the information that is found in the system status views. It includes the following topics: • • • • • Overview, page 25 Storage Status, page 29 System Status, page 30 Appliance Control, page 31 Performance Graph, page 32 Overview The Overview provides a high-level look at system health. It displays the following information: • • • • • • • Critical events that are occurring in a system service or application.
Application Events features Table 8 Application Events features Feature Description Event Information describing the event or error, including the service or application name. Machine The name of the server on which the event is occurring. IP The IP address of the server on which the event is occurring. Date The date of the event. Level The status of the event. In Application Events, the only status shown is critical.
NOTE: If the number of documents shown is –1, the values cannot be read. Appliance Statistics The Appliance Statistics area provides status, health, and storage information about the RISS smart cells. You can click a tab to view information about smart cells in all domains or smart cells in a particular domain. The Appliance Statistics area also shows the IP addresses of free smart cells in the system. Each smart cell’s life cycle state is color-coded.
Appliance Statistics features Table 9 Appliance Statistics features Feature Description RISS Appliance The RISS appliance name, IP address, and document storage rate. Domain The name of the domain. Group Name A smart-cell group identifier generated automatically by RISS. This number is unique across all systems. Smartcell IP The IP address of the smart cell. Smartcell Role A smart cell can be Primary, Secondary, Replica-1, or Replica-2. State The current life cycle state of the smart cell.
Storage Status The Storage Status view provides detailed document storage information for each domain. Table 10 Storage Status view features Feature Description Appliance Store The number of documents and store rate per domain, and the allocated space on the system for storage and replication. The dark area on the right side of the storage bar graph shows the point at which storage space is 90 percent full. NOTE: The storage bar graph shows only assigned and allocated smart cells for all active domains.
System Status The System Status view provides hardware and system information for all hosts in the system. Table 12 System Status view features Feature Description Status The icon in front of the host name displays the status of the host machine. • A green check icon indicates the server is started and healthy. • A gray icon indicates that JBoss and the RISS applications on the server have stopped.
Table 13 Link to System Status view Origin Link left menu System Status Appliance Control Use the Appliance Control view to start, stop, or restart one or more servers on the system. This view is useful to show the start, stop, and pending status of a server. However, you should use it only when necessary — for example, when you are upgrading a host or before a planned power outage. The Appliance Control view should be used only by system administrators or HP service representatives.
Starting, stopping, and restarting servers on the system 1. In the Action drop-down list, select the action to perform: • Start: Start a single machine, start all machines, or start all machines in a selected server group. • Stop: Stop a single machine, stop all machines, or stop all machines in a selected server group. • Restart: Stop and immediately start a single machine, or stop and immediately start all machines or all machines in a selected server group.
Example: Appliance Store graph An example of an appliance store or indexing performance graph is shown below. This graph charts the Domain1 store rate for today at five minute intervals. Figure 2 Performance Graph: Store Rate Example: System Monitoring graph An example of a system monitoring performance graph is shown below. This graph charts the free memory on the database server at hourly intervals over the past 24 hours.
Creating performance graphs 1. Click the System Monitoring tab or the Appliance Store and Indexing tab for the category of graph that you want to create. 2. Select a graph type: • For System Monitoring, select Idle CPU Usage, Free Memory, or Active Thread Count. • For Appliance Store and Indexing, select Store Rate, Index Rate, Doc Count, or Index Count. 3.
4 Configuration This chapter contains the following information: • • • • RISS configuration, page 35 Firewall Settings, page 36 SSL Configuration, page 36 Software Version, page 39 RISS Configuration The RISS Configuration view is an administrative tool that displays hardware and configuration information about the RISS. This view is divided into two parts: • Information about the services enabled in each domain is in the upper portion of the view.
Firewall Settings The Firewall Settings view shows the firewall settings for the PCC server and the RISS HTTP portals, and their virtual IP (VIP) addresses. It includes the following information: Table 19 Firewall ports Feature Description Virtual IP The virtual IP address. Port The port number. Service The service running on the port. Type The transfer protocol used on the port: TCP or UCP Inbound/Outbound Shows if the firewall is enabled or disabled on the port’s inbound and outbound traffic.
Available certificate signing requests Table 22 Available certificate signing requests (CSRs) in the RISS system Feature Description Machine Type The host for which the CSR has been generated. The host is either a PCC or HTTP portal. Virtual IP The virtual IP address of the host. Creation Date The date the CSR was created. Path The path to the CSR. The CSR files are always placed on the PCC host. Creating a certificate signing request To create a certificate signing request (CSR): 1.
Installing and generating a certificate on the PCC portal Follow these steps to generate and install a certificate for the RISS PCC portal. 1. Create a certificate signing request (CSR) for the PCC: a. Log in to the PCC Web interface and go Configuration > SSL Configuration. b. Complete the CSR generation form. c. Log out of the PCC Web interface. This generates two files on the PCC: • /opt/keys/pccCert.pm (the certificate request) • /opt/keys/pcckey.pem (the RSA private key) 2.
b. Copy the certificate to the PCC: scp httpCertSigned.pem root@[external ip address of PCC]:/opt/keys/ httpCertSigned.pem 5. Import the certificate into the Apache server on each HTTP portal: usr/local/bin/ssl_cert_update.pl -http -cert /opt/keys/httpCertSigned.pem -key /opt/keys/httpkey.pem 6. From the PCC console, restart all services on the HTTP portal by issuing the following command: /opt/bin/restarthttp You can also restart the services using Appliance Control in the PCC Web interface.
Configuration
5 Account Synchronization Use this view to configure dynamic account synchronization (DAS), which automatically creates and updates email user accounts on the RISS, and imports groups and group memberships. You can define multiple configurations that track sets of users from one or more LDAP servers for specific RISS domains.
Creating and running DAS jobs The basic steps for creating and running a DAS job are as follows: 1. Create an LDAP connection. See Creating LDAP server connections on page 42. 2. Create the job. When you create a new job, you assign the job a name and an LDAP connection, and set up the job query in the LDAP server. See Creating jobs on page 43. 3. Assign the job to an HTTP portal. See Assigning HTTP portals on page 45. 4. Run the job. See Running DAS jobs on page 45.
Creating jobs To create a DAS job: 1. In the DAS Available Jobs area, click New JOB. 2. Name the job you are creating by entering it in the Job Name box. Click Next Step. Figure 6 Create DAS job 3. From the drop-down list, select the LDAP connection you want to use with the job. If you need to create the LDAP connection, click Create New LDAP Connection and see Creating LDAP server connections on page 42 for further instructions. 4. Click Next Step. Figure 7 Mapping information 5.
Figure 8 Advanced options 1. Complete the advanced options form by entering the following information: • Group Name: Not used at this time. • USNChanged: Active Directory’s unique sequence number (USN). Active Directory increments the USN for each change in any of its user accounts. When DAS finds a larger USN, it extracts new information. For initial setup, set USNChanged to 1 so DAS extracts all users. Thereafter, do not change this value. • Delete USNChanged: USN in deleted users directory.
Assigning HTTP portals Before running a DAS job, assign an HTTP portal on which to run the job. Only one job can be assigned to an HTTP portal. If all HTTP portals are being used, reassign the HTTP portal from another job. To assign an HTTP portal to a job: 1. Click Assign Job. Figure 9 Assign a job to a portal 2. Complete the form by entering the following information: • DAS server IP: IP of the DAS HTTP portal where DAS runs the configuration. • Configuration Enabled: Select Yes to enable.
Editing or deleting jobs To edit or delete an active or configured job: 1. In the DAS Available jobs area, click the name of the job you want to edit or delete. 2. To edit the job, click Edit and edit the job mapping. Click the Advanced Options icon ( information about job options. ) to edit advanced options. See Creating jobs on page 43 for 3. To delete the job, click Delete. Managing available HTTP portals To start, stop, or restart the HTTP portals from the Account Synchronization view: 1.
6 Account Manager (AM) Use the Account Manager (AM) view to provision and update user accounts. This chapter contains the following topics: • • • • AM overview, page 47 Managing user accounts, page 49 Managing groups, page 52 Managing repositories, page 54 Table 26 Link to Account Manager view Origin Link left menu User Management > Account Manager Account Manager overview Use Account Manager (AM) to view and update user accounts and repositories for unusual circumstances on the RISS.
Figure 10 Account Manager view The total number of users and groups for the domain(s) is shown in the upper right corner of the view.
Account Manager view features Table 27 Account Manager view features Feature Description Search button Use the search feature to find users, groups, or repositories. The search function uses the “Like” SQL database capability. For example, in the User panel, you could enter jack to match users jackdoe or jacksmith. Entering %doe would match users jackdoe, janedoe, or maryjanedoe. Entering %ja% would match users jadams, jackdoe, janedoe, jacksmith, or maryjanedoe. Searches are not case sensitive.
Editing user information To edit user information: 1. Click the User radio button, then click the user name that you want to edit. See Account Manager view features on page 49 for information on searching for a user. 2. In the RISS Account and LDAP Information form that appears, clear the check box labeled Deactivate this check box and then edit the user entries. Figure 11 Editing user account information 3. Edit the relevant user entries. 4. Click the Save Now! button.
Feature Description Local Password The password in the RISS system for a selected user. Active Directory users who are imported into the system through DAS are not required to have a local password. However, local users must have one. First Name First name of the selected user. Last Name Last name of the selected user. Email Contact (Required.) Email address for the selected user. Mail To Me Address (Required.) Email destination when the selected user clicks Mail To Me for an archived document.
Feature Description RISS Admin Select this check box to grant the user administrative privileges on the PCC. It’s best to create a new, local account for the administrator. Be sure to also define a local password. Compliance Select this check box if the user is authorized to view all recipients (including BCC addressees) in the repositories to which the user has access. This function is generally limited to compliance officers.
Members are displayed by username or groupname, if the group includes nested groups. Nested groups are not expanded. 4. Click Exit to exit the form. Group account information Table 29 Group account information Feature Description RISS Account Information Groupname The name of the group. Email Contact The email address of the group. Comments The system administrators’ comments on the selected account. Domain The RISS domain to which the group belongs.
Managing repositories Use the Repositories panel to change the routing rules or retention periods for a repository, or to add repositories. You could, for example, add a repository to provide a container for special routings (email addresses or email domains). You cannot delete a repository in Account Manager. Adding repositories To add a repository: 1. Click Add repository. 2. Complete the RISS Repository information form that appears. See Editing repository information on page 54. 3.
Repository information Table 30 Repository information Feature Description Name (Required.) The name of the selected repository. Domain The RISS domain to which the selected repository belongs. Select the domain from the drop-down list; the selection limits the scope of the Search and A-to-Z filter buttons. Retention The amount of time that messages and documents are retained in the repository. The time period is shown in days. For example, 2556 days is 7 years.
Account Manager (AM)
7 Other user management features This chapter explains how to use the Manual Account Loader and Error Recovery user management features. The chapter contains the following topics: • Manual Account Loader, page 57 • Account Error Recovery, page 58 Manual Account Loader Manual Account Loader (MAL) is a batch tool used to load users into the RISS when the Exchange or mail server is not using LDAP. If the Exchange server is using LDAP, use dynamic account synchronization (DAS) instead.
The loading process takes about one hour for 50,000 accounts. 6. To verify the results, open the Account Manager. Error Recovery The Account Error Recovery view displays account synchronization activities that have not been performed successfully.
Repairing synchronization errors To repair synchronization activity errors, identify the activities that you want to reattempt or delete. Click an entry to display more information about an activity, including its Java User Management Services (UMS) database entry (only shown if a UMS database entry matches the activity). You will need to decide the order in which to reattempt or delete the activities. To repair or delete synchronization errors: 1.
Other user management features
8 Data management This chapter discusses the following topics: • • • • • Replication, page 61 Smartcell Cloning, page 63 Reprocessing , page 65 Repository level retention, page 67 Database and data backup, page 69 Replication NOTE: This view is available only if a replicated system is configured. Use the Replication view to monitor and to start or stop replication for a domain on a remote system. Replication status is updated after each polling cycle.
Database Replication The top part of the Replication view describes the database replication. Table 35 Database Replication features Feature Description Local Server/Source Server The replication and primary systems if you are logged into the replicated system. Local Server/Target Server The primary and replication systems if you are logged into the primary system. Replication Set The database and related RISS applications that are being duplicated.
Data Replication Flow The bottom part of the Replication view displays the flow of replicated data. You can also suspend or resume the replication process from this area. Table 37 Data Replication Flow Feature Description Domain The domain name and group ID of the domain being replicated, and the following information: • The IP addresses of the smart cells being duplicated, the status of the replication, and the number of stored and indexed documents being copied. A check icon indicates normal operation.
Cloning view features Table 39 Cloning view features Feature Description Source The IP address of a smart cell without a viable mirror. If all smart cells have viable mirrors, the Source displays No Broken Groups Found. If more than one smart cell needs a mirror, a Change Source button appears below the automatically selected IP address. Free Cells The number of smart cells currently in the FREE state. This number is decreased by one after a cloning operation starts.
A check icon indicates the cloning operation is proceeding normally. An X icon appears if the cloning operation has failed. Reprocessing The Reprocessing view displays each domain and shows whether reprocessing is enabled, when reprocessing is scheduled, and a history log report. Most reprocessing occurs as an automated and transparent background process that does not require any operational effort other than passive monitoring.
Changing the reprocessing status You can enable or disable a reprocessing schedule of a specific domain or all the domains listed. To change a reprocessing schedule: 1. In the Reprocessing view, locate the domain whose schedule you want to enable or disable. 2. Complete any of the following tasks to change the status: Figure 15 Change the reprocessing status • To enable reprocessing for a specific domain, select the corresponding Reprocessing Status check box.
Repository-level retention RISS archives emails and other documents in one or more repositories. A repository is a virtual collection of documents associated with a given user by routing rules (storing) and access control lists (ACLs) (retrieving). You can use the Retention view to configure document retention periods for domains and repositories. For example, you can remove expired stored data or remove access to stored data for specific repositories based on user-defined retention policies.
Figure 18 Edit repository retention period 5. Change the retention period in the Retention text box. Retention periods are shown in days. 6. Click Save Now!. NOTE: You can view user repositories on replica domains, but you cannot edit them. Retention periods and other fields cannot be edited and action buttons are unavailable when you select a domain that is a replica of another domain. Editing domain retention periods To view or edit a domain’s retention period: 1.
Figure 19 Edit domain retention period 3. Click Save Retention Now!. 4. To ensure that retention is enabled, verify that the domain’s Retention Status check box is selected. If selected, the text Enabled appears next to the check box. Changing the retention processing status You can enable or disable retention processing for a specific domain or all the RISS domains. To change the retention processing status: 1. Locate the domain whose retention processing you want to enable or disable. 2.
Table 42 DB Backup History Feature Description Status General status of the backup server and each of its services. • A check icon indicates normal operation. • A ! icon indicates a problem or inactive service. Completion Time Completion time of the backup. Size Size of the backup. The size shown for local backups is the size of the DB2 backup only. It does not include any transaction log files. Therefore, the size of the local backup is smaller than the size of the kickstart or tape backups.
2. Log on to the database system. 3. If the database server was reinstalled, run one of the following commands to restore the /db2/VolBack partition from either the version stored on the kickstart server or tape backups. NOTE: This will delete the content of the VolBack directory. • /opt/bin/backup/db2BackupUtility -restore_from_kickstart • /opt/bin/backup/db2BackupUtility -restore_from_tape 4. To restore the database, make sure the database is up by issuing the command: su – db2udb –c db2start 5.
Data management
9 Reporting This chapter includes information about the following topics: • • • • Event Viewer, page 73 SNMP Management, page 74 Email Reporter, page 75 LogFile Sender, page 77 Event Viewer The Event Viewer shows the critical and recovery events that have occurred in system services or applications. You can also use the Event Viewer to search for events by type. The following information is displayed in the Event Viewer.
You must enter criteria for all searches except Show All Alerts. The search function uses the “Like” SQL database capability. For example, you could enter sc to match host names sc-s1-172-1.company.com or sc-s2-204-1.company.com. Entering %204% would match hosts sc-s2-204-1.company.com, or ms-s0-204-1.company.com. Searches are not case sensitive. 3. Click Submit. Other Event Viewer features You can change the number of events displayed on each Event Viewer page by following these steps: 1.
A server can be deleted from the list by clicking the radio button in front of the server entry, then clicking Delete Server. NOTE: If you do not have a monitoring management server, you can receive SNMP event notifications via email. See Receiving SNMP events by email on page 75. Selecting SNMP traps In the Trap Manager Service area, select the SNMP events, or traps, to be monitored. When one of the traps fails, a notification is sent to the SNMP monitoring management server and/or email recipient.
Table 47 Links to Email Reporter view Origin Link left menu Reporting > Email Reporter Detailed email reports The following information is provided in detailed email reports. Table 48 Detailed Email Reports Feature Description VERSION Provides information about the RISS software version from the Overview. See RISS Version on page 28. EMAILMINER_ METRICS Provides statistics collected by RIM for Messaging. See Mining Overview on page 80.
7. Click Schedule. The Email Report information appears in the Current Active Schedules portion of the view. If you want to delete a recipient, select the recipient, then click Delete. Logfile Sender The Logfile Sender view lets you select log files to email. For example, you would send log files to HP technical support to assist in troubleshooting. To send a log file: 1. Enter the recipient’s email address in the Email Address field. You can enter only one email address. 2. Select a log file to send.
Reporting
10 External access The PCC left menu contains links to two external functions that are not managed within the PCC: • RIM Management on page 79, which accesses the Reference Information Manager (RIM) email mining system • System Insight Management on page 83, which accesses the HP Systems Insight Manager RIM Management This view provides an entry point to the email mining system. It also displays an overview showing the mining system status for each domain.
Mining Overview This view provides information about the mining system for each domain, including service status and health. Table 51 Mining Overview view features Feature Description Header The header shows the name of the email miner (for example,. EM-S0-110-1), and the version of the RIM for Messaging software (for example, 1.05.0000). Statistics Collected The date and time that the statistics were collected (for example, 5/11/2006 2:10:17 PM).
Configured Tasks The Configured Tasks section displays configuration information about tasks that have been created and modified using the Scheduler program. Table 54 Configured Tasks features Feature Description Task Name The name of the task. Status The following status types can be displayed: • The task is enabled. The task is disabled. • The Task Information summary displays the yellow icon if all configured tasks are disabled. Otherwise, the summary displays the green icon.
Feature Description Process Information • Status: No error conditions for any journal mining process on the journal mailbox. A journal mining process is in a retry state. A journal mining process is in a failed state. • Active: The number of journal mining processes that were executing at the time statistics were collected. • Failed: The number of journal mining processes that were in a failed state at the time statistics were collected.
Synchronize Deleted Items The Synchronize Deleted Items section contains the following areas described in Journal Mining: • Process Information • Message Statistics • Processes in Failed Or Retry State See Journal Mining on page 81 for information on these areas.
External access
11 PST Importer This chapter contains the following topics: • • • • PST Importer overview, page 85 Installing PST Importer, page 86 Using PST Importer, page 87 Archive Request file, page 85 PST Importer overview PST Importer allows system administrators to: • Load legacy (pre-RISS 1.0) PST files into RISS. • Scan PST files to ensure RISS finds and archives new messages. • Provide optional tombstoning of messages in PST files.
Installing PST Importer Installation requirements Before installing PST Importer, verify that you meet the following requirements. Client hardware requirements Client machine with 512 MB RAM and 200 MB free disk space. Client software requirements • Windows 2000 or later. Highly recommended: Windows XP. • Outlook 2000 or later. Highly recommended: Outlook 2003. NOTE: If you use Outlook 2003, also install Service Pack 1 for the Outlook plug-in to work correctly.
Using PST Importer Archive Request Loader Use Archive Request Loader to create or validate an Archive Request file. This tool also generates an output log file, detailing issues that occurred during the load process. Before adding a file to PST.MDB, Archive Request Loader performs the following tasks: • • • • • Verifies accessibility to file with appropriate access rights. Obtains hash of file to be inserted. Queries PST.MDB for duplicate entry using generated hash.
Figure 21 Creating a new file 3. Click Add, and select the PST files. Only files in the Select Files To Process list are imported. In the file you are creating, the corresponding XML tags are and . 4. To import PST files larger than 150 MB, edit the following setting in RISS PST Importer.ini to reduce performance degradation and increase throughput: [PSTLaunchMgr] MaxProcesses=1 5. If necessary, select PST files you do not want to process, and click Remove. 6.
• Audit Repository: Name of repository that receives the PST Importer log file created during the import process. The XML tag is . 8. To indicate mining and tombstone settings, select the applicable check boxes: • Use TNEF: If selected, stores submitted messages in TNEF format. The XML tag is . • Distribute To All Recipients: If selected, PST Importer sends a copy of the document to all addresses specified in the message.
Validating file from command line Enter the HPPSTInit command with parameters to validate an Archive Request file: /HPPSTInit /i ArchiveRequestFileName.xml /o LoadLogFileName.log [/c] [/v5] Parameter Description /i Required. Name of input file to be processed. Replace ArchiveRequestFileName.xml with the full UNC path and XML file name. /o Required. Name of Archive Request Loader log file to which diagnostic and processing information is written. Replace LoadLogFileName.
Figure 22 PST Import Monitor 2. PST Import Monitor displays basic data about the PST process status. To view specific processing information, see the following: Item Information area: • Total: Total number of items found in the PST files so far. • Processed: Number and percentage of items processed and submitted to RISS. • Rejected: Number and percentage of items that PST Importer could not process due to errors. The PST Importer log file contains error information explaining why the item was rejected.
NOTE: Collecting statistics impacts performance. • To reset a failed process, select Failed under Active Processes to display a list of all failed processes. Right-click the failed process, then click Reset, as shown in the following figure. Figure 23 Resetting process Depending on the reasons the process failed, resetting a failed process might not correct the problem. However, PST Importer tries to reprocess it as directed.
The log file is delivered to the repository specified by in the Archive Request file. The log file is sent as an email attachment. Upon successful submittal, the file is deleted. If a mining process terminates and is retried, a separate log file is generated. Use the Web Interface to determine the processing history of a PST file. To change the verbosity level, modify the following RISS PST Importer.
Table 57 Tags in Tag Description Version number associated with this Archive Request format. Current version is 1.0. Exchange server used when accessing the GAL for address resolution. Mailbox on Exchange server used when accessing the GAL for address resolution. DNS name or IP address of the RISS SMTP portal used to submit messages to RISS. Port number used with . This setting is optional. The default is 25.
Table 58 Tags in Tag Description Path and file name of imported file. Wildcards are allowed and are expanded prior to processing. UNC paths are supported and highly recommended. Type of import processing to be performed on the . PST is the only processing type supported in the current release.
E:\PSTFiles\Persist Search Results.pst PST E:\PSTFiles\ComplianceSearch_001.pst PST E:\PSTFiles\Outlook.
12 Audit Log The Audit Log feature provides a surveillance system log for companies that are required to prove they are adhering to surveillance processes. This chapter describes how to enable the Audit Log feature, set retention periods, monitor status, and grant user access to the repository. For information on performing Audit Log repository queries, see the Audit Log section in the HP StorageWorks Reference Information Storage System User Guide.
NOTE: The user’s personal repository must be in the same domain as the Audit Log repository. 9. Click Add The repository is added to the user’s direct repositories. 10. Click the Save Now! button. Monitoring status Use the PCC RISS Configuration view (Configuration > RISS Configuration) to check whether the Audit Log feature (AuditLog Service) is enabled for a specific domain.
13 Backup system administration The optional RISS backup system is the final line of defense in the integrated RISS data-protection strategy. The RISS backup system uses Tivoli Storage Manager (TSM) to create backups of RISS data. This chapter describes the processes involved in accessing the RISS backup server, configuring TSM, and managing smart cells, and contains detailed procedures for maintaining and labeling backup files and media.
• Use a remote console program like VNC. (Use the PCC’s IP address.) • Use the command line shell from the Tivoli administrative console program (dsmadmc, with admin as the user name and admin as the password). The availability of these options depends on the access mode that is configured for your RISS. Discuss this with your HP service representative. Smart cell data backups After a RISS storage domain has been configured for backup, each smart cell group in that domain performs a backup every hour.
are first stored after they are backed up or archived. A copy group is used to define how many versions of a file are kept and how long client data is retained. The figure below shows how these categories are related. Figure 27 Policy domain structure How RISS configures TSM The RISS backup server is initially configured with the script /usr/local/tsmBackup/configTiv init from the PCC machine.
• A path is defined for each library. In the path, the device parameter specifies the device alias name of the library’s robotic mechanism. • The devices that belong to each library are defined. For each device a path is defined that contains the device alias and the previously defined library name. A path is the connecting element for the server, library, and device. (See the Tivoli Administration Guide on “Defining Devices and Paths” at http://publib.boulder.ibm.com/infocenter/tivihelp/ v1r1/index.
Figure 28 Library properties 4. Click the Volumes link to see a list of volumes that are assigned to that library. 5. In the Select Action list, select Add Volumes, and then click Go. 6. Select None of the volumes are labeled, and then click Next. 7. Select Search for all eligible volumes in the library’s regular slots, and then click Next. 8. Depending on whether or not your library has a barcode reader, select the appropriate option. (See the figure below.
Figure 30 Server process list Adding and labeling new media (command line) The Add Volumes wizard mentioned in Adding and labeling new media (Web interface) on page 102 gathers information to build the necessary Tivoli command. The command can be issued on the command line manually (for example, if the Web interface is not available). The following command (which includes no line break) is equivalent to the procedure that was described in the previous section: LABEL libvol LIB.
More information about this topic is available at the Tivoli Online Information Center under these headings: • http://publib.boulder.ibm.com/infocenter/tivihelp/v1r1/index.jsp?topic=/com.ibm.itsmcw.doc/ anrwgd53235.htm • http://publib.boulder.ibm.com/infocenter/tivihelp/v1r1/index.jsp?topic=/com.ibm.itsmcw.doc/ anrwgd53264.htm • http://publib.boulder.ibm.com/infocenter/tivihelp/topic/com.ibm.itsmcw.doc/anrwrf53237.
Figure 31 Provisioner status 3. Determine which smart cells failed and can be restored: a. In the MBean view for the primary controller, click the button next to ListBrokenGroups. Groups that failed and have not been recovered are listed. b. Copy GroupIDs and Roles of broken groups. c. Click Back to MBean view. 4. Restore the smart cell: After you determine which smart cell you want to restore, begin the other Provisioner operation, RestoreSmartCellUsingGroupIDAndRole.
Preparing the backup server for disaster recovery The following steps and procedures describe how to restore the backup server (not the entire RISS system) in case the server itself or storage volumes are lost or destroyed. Restoring the backup server involves performing backups of the primary storage pools and the backup server database and configuration, and then storing this data off-site.
NOTE: The commands that begin with tsm: INTERNAL> were issued from the Tivoli command line interface (dsmadmc) from the PCC machine. The Administrative Command Line is also installed on the backup server. To start it, click Start > Programs > Tivoli Storage Manager > Administrative Command Line. 1. Set the configuration for DRM as suggested on pages 758 to 762 in the TSM Administrator’s Guide. a. Enable backup for the storage pool that holds the smart cell group data: tsm: INTERNAL>set drmprimstgpool SP.
Volume TAPE.3 was used for the database backup. 4. Move backup volumes off-site: a. This command should list the volumes TAPE.2 and TAPE.3: tsm: INTERNAL>query drmedia * wherestate=mountable tsm: INTERNAL>move drmedia * wherestate=mountable Volumes TAPE.2 and 3 were moved to the exit port of the library; their state was set to notmountable. b. This marks the state of the two volumes as courier: tsm: c.
Example: Recovering the server from a disaster This example is based on the previous example, assuming that the backup server was destroyed and has to be rebuilt from the media that is stored off-site (TAPE.2 and 3, the recovery plan file). To simulate destruction of the backup server, simply reinstall it after you remove the two remaining volumes (TAPE.1 and 4) from the server and establish a fresh system.
RECPLAN.RECOVERY.SCRIPT.NORMAL.MODE.CMD m. Return the volumes that were used to restore the database and storage pool by issuing the following commands: tsm: able INTERNAL>update volhist TAPE.3 devcl=DC.TAPE ormstate=mount- This sets the correct state for the volume containing the database backup. tsm: INTERNAL>move drmedia * wherestate=mountable This sets the state of the backup volumes to non-mountable and ejects them. They can now be returned to the off-site vault. n.
Backup system administration
14 Configuring Outlook or Lotus Notes This chapter contains the following information: • Configuring your system for Exchange and Outlook, page 113 • Configuring your system for Domino and Lotus Notes, page 143 Configuring your system for Exchange and Outlook The email miner can be configured to minimize the impact on the Exchange server, or to maximize mining throughput, depending on the customer’s requirements and hardware configuration. Typically there is a 10% impact on well configured mail servers.
Table 59 User accounts on customer servers For User type and mailbox location Default last name, user logon (password), alias* Group membership or permissions Mailbox mining Domain user and mailbox on Exchange servers Appuser, appuser (skyline); alias=appuser Administrators, Exchange Domain Servers Journal mining Active Directory user and mailbox on Exchange servers LocalJournalUser, LocalJournalUser (skyline); alias=LocalJournalUser User Dynamic Account Synchronization Active Directory user on
Cache related registry settings For [HKLM\Software\Hewlett-Packard\Outlook PlugIn\Cache]: • AttachmentsOnly=True: Indicates whether the Offline Cache Manager should cache only those archived messages that contain one or more attachments. The default is True. Changing this to False causes the Offline Cache Manager to cache all messages, whether or not attachment(s) exist. This is a user-configurable setting.
• MaxFetchCount=50: Number of archived messages that are retrieved from the RISS at one time. This is an administrator/diagnostic setting and should be modified only at the direction of HP technical support. • LogToDisk=False: Replicates the status information reported in the RISS Offline Cache Status window to a log file on the local file system. The file that contains this information is stored in the plug-in installation folder with a CacheMgr_YYYYMMDD_HHMMSS.log file name.
• AdminMode=False: Indicates the machine is in Administrative mode. The default is False. When set to True , the user is restricted from changing user-configurable settings. • Version=X.XXXX: Plug-in version. This should never be modified. • LogFilePath=: A fully-qualified path name that instructs the plug-in to record certain diagnostic information to disk. This is a user-configurable setting.
The Options dialog box appears. 5. Click Archive Options. The Archive Options panel appears. 6. In the URL to Modify (Fetch URL) list, select the default URL to display it in the URL to Modify box, and edit the URL. Replace HOST with the DNS name associated with the virtual IP (VIP) web user interface for the system. 7. In the Search URL box, enter the RISS Internet address. Replace HOST with the DNS name associated with the VIP Web Interface for the system. 8. Click OK. 9. In Outlook, click Search Archive.
1. Log on to an Exchange server. 2. To start Exchange System Manager, select Start > Programs > Microsoft Exchange > System Manager. 3. Open the Servers folder. 4. For each server listed: a. Click the Server tab. b. Open a Storage Group. c. Right-click Mailbox Store, and select Properties. d. Click General. e. Select Archive all messages sent or received by mailboxes in this store. f. Click Browse. g. Select the journal user and mailbox where messages from the mailbox store are copied. h.
14. Click OK. The Properties dialog box closes. Publishing forms After the forms registry has been created, publish the form using Outlook. Perform the following steps on any computer with an Outlook client that can connect to the Exchange server. 1. Create an Outlook Profile accessing the Exchange server with the domain user (appuser). 2. Run Outlook using the profile created. 3. In Outlook, select Tools > Forms > Design a Form. 4.
Figure 32 Adding mailboxes using Mail Attender 3. In the window that appears, select the appropriate Exchange server and click OK to continue. 4. Choose an Outlook profile that can access the Global Address List (GAL) and click OK. Based on the previous selections, known mailboxes will populate the right pane. 5. Click the Settings view button to change to the Settings view. Figure 33 Settings view button 6. Double click the journal mailbox to bring up the properties dialog box. 7.
Figure 34 Mailbox Properties 8. Click OK when finished. This journal mailbox is now hidden and no processing rules can be applied to it. Repeat this process for the SMTP and System Attendant information stores. Set up Auto-Search To set up Auto-Search: 1. In the left pane, select the Information Stores root folder. The bottom of the right pane displays the Automated Information Store Searches window. 2. Right click in this pane and select New Auto-Search.
Figure 35 New Auto-Search The Edit Automated Search window appears. Make sure Search for Mailboxes is selected. 3. Click the Mailboxes tab. 4. Select the appropriate Exchange server, and then select the mailbox used to query the Exchange server. Click OK to complete the setup process and add the search. Every 24 hours the selected server will be searched for mailboxes and the Mailboxes information store will be updated with the results.
Figure 36 Scheduling an event 4. To select an event type, click the down arrow to see the types that are supported. Select an event type and click OK. Figure 37 Types of events A window appears indicating that a companion rule for this event has been created in the Mail Attender for Exchange database. This rule must be edited using the Mail Attender for Exchange console interface, in order to add the information stores that should be included in processing the scheduled event.
Each edit window is examined in the sections that follow. Figure 38 Enabling a scheduled event Editing selective archiving events The Selective Archiving Events window has a variety of configurable options: • Enabled check box: Use to enable or disable an event. The default value is Disabled. • SMTP Address: Select the SMTP Address check box and enter the RISS Virtual IP (VIP) used for SMTP.
After making the changes, click Apply, and then click Close to finalize the changes. Clicking the Advanced button allows changes to be made that override default settings in the RISS.ini initialization file. CAUTION: Any changes made this way should only be done under the supervision of HP technical support.
Figure 40 Journal Mining Event window • Enabled check box: Use to enable or disable an event. The default value is Disabled. • Number of Processes: Use to change the number of processes for each event from the default value of 1. • Frequency: Use the two Frequency check boxes to change the time interval between events from the default value of 2 minutes to any multiple of minutes, hours, or days. • SMTP Address: Select the SMTP Address check box and enter the RISS Virtual IP (VIP) used for SMTP.
deleted from the journal mailbox Inbox folder and moved to the Deleted Items folder after the messages have been archived on the RISS. • Clear Deleted Items: Select the Clear Deleted Items check box if you want to change the Clear Deleted Items default value from Yes to No. This value indicates whether messages should be cleared from the Deleted Items folder after the message has been archived on the RISS. Up to 250 messages will collect in the Deleted Items folder before it is cleared out.
Figure 42 Synchronize Deleted Items event window • Enabled check box: Use to enable or disable an event. The default value is Disabled. • Override: Select the Override check box if you want to change the Delete Non-Tombstone Items From Exchange Retention default value from No to Yes. After making the changes, click Apply, and then click Close to finalize the changes. Clicking the Advanced button allows changes to be made that override default settings in the RISS.ini initialization file.
3. Make any relevant changes, and click Apply and then Close to finalize the changes. A dialog box appears indicating that a companion rule for this event has been created in the Mail Attender for Exchange database. 4. Edit the rule in the Mail Attender for Exchange console interface so the information stores that should be included in the scheduled event processing are added. Deleting a scheduled event To delete a scheduled event: 1. Select the appropriate event and click Delete.
Figure 45 Rules 2. In the right pane, double click the rule (created by the RISS Scheduler) to be modified. This brings up the window used for editing rules. The General tab is used for changing the description and category. Figure 46 Edit Local Rule window 3. Enter a description. The description entered here must match the name of the event set up in the RISS Scheduler. Otherwise, the RISS Launch Manager will fail to complete processing when this rule is executed. 4. Click the Information Stores tab.
Figure 47 Add Information Stores window 5. If you want all mailboxes defined in the mailboxes information store folder to be processed, select All Known Mailboxes. If you want specific Mailboxes to be selected for processing, select the Mailboxes folder in the upper left pane. 6. Click the Conditions tab. The Edit Conditions window opens. Initially the template contains one condition. The rule looks for messages with a class of IPM.note.
Figure 48 Possible conditions 9. ClickOK to complete the addition of the new condition. Two conditions are now required for the rule to be processed. Click OK again to complete the editing of the rule. CAUTION: The actions sections of a template rule should never be changed without the specific guidance of HP technical support. Starting selective archiving After configuring the schedule, execute selective archiving for the rule.
Figure 49 Monitoring View window The first area shows the status of the Launch Manager Service. This service launches the enabled events defined in the Scheduler. From this area, you can start or stop the service. You can also set the refresh interval. The Launch Manager Service must be running for any event to be scheduled.
Deleting end-user deleted items on the RISS Mail items can be deleted by the end-user from the Exchange mail store and from the RISS in a coordinated fashion. Exchange 2000 and 2003 support a retention interval on end-user deleted items. If the interval was allowed to lapse, the deleted items would be permanently removed (hard deleted) from the Exchange mail store. To coordinate the deleted items, the delete rule is executed within the Exchange retention interval.
Configuring deletion retention To enable deletion retention on the Exchange server, the following settings are assigned to each Mailbox Store. To access the properties page, use Microsoft Exchange System Manager and navigate to each Exchange server’s mailbox store in each of its storage groups. Figure 50 Mailbox store 1. Right click the mailbox store and select Properties to display the Mailbox Store Properties dialog box. 2. Click the Limits tab and assign the values to the Deletion Settings.
Figure 51 Deletion settings Once applied, any subsequent deletions performed on mailboxes contained in the given mailbox store are retained for the number of days specified. NOTE: HP recommends that the Keep deleted items for (days): and the Keep deleted mailboxes for (days): parameters be set to 7. Scheduling deletion from RISS To schedule deletions, enable a scheduled event using Scheduler and establish a corresponding rule using Mail Attender.
• Ensure that a scheduled event selecting Synchronize Deleted Items for the event type exists. • Ensure that the event type Synchronize Deleted Items also exists. Synchronize Deleted Items launches PTDelItems.exe. It also removes tombstoned items from the RISS based upon user-initiated delete options within the Outlook User Interface. Creating a Mail Attender rule To create a Mail Attender rule: 1. In the Folders tab: a. Set the folders to be All Folders or another selection. b.
Table 62 CSV Columns Column Number Column Heading Column Value 1 Server Name [MAILBOX_SERVER_NAME] 2 Distinguished Name [MAILBOX_DN] 3 Store IED [MAILSTORE_EID] 4 Folder EID [FOLDER_EID] 5 Message EID [MESSAGE_EID] 6 Is In Dumpster [MESSAGE_IN_DUMPSTER] At the bottom of the dialog box, select the following items in the boxes: • No warning before performing this action • Apply once per item per execution Table 63 Summary report Count Which Items? Count Messages Total Items Counts? One
You can refresh existing administration and password values or create new values, provided that any change is also added to the RISS configuration. If the status line shows Failed to decrypt password when you open the SetAdmin dialog box, the password is corrupted and will not work with the PTDelItems program. You will need to refresh or create new administration and password values. Make sure they match the values on the RISS.
Multiple RISS systems Your HP service representative can initially set your OWA RISS configuration for multiple RISS servers, and set standard and specialized RISS URL templates. Any number of RISS servers can be listed. Installed RISS servers have standard URL addresses. To accommodate both standard and special RISS systems, the URL template for any given RISS can be added to the configuration file.
Configuring the asp.config file The asp.config file has several OWA configuration settings. RISS servers A typical system can have one or more RISS products. The RISS section of asp.config contains a list of RISS servers. The syntax for an entry is a keyname followed by the protocol and server name. The keyname identifies the server. If there is a special template in the next section, the keyname must be the same for the server and its corresponding template.
The default attachment limit for a 3 Ghz server is about 10 MB. (These limits are the default based on the configuration of the OWARISS site in the IIS Manager.) If the maximum attachment size is exceeded, the retrieval times out. If you anticipate attachments to be larger than these limits, the default ASP time-out can be adjusted. 1. Open the IIS Manager. 2. Navigate to and right-click the OWARISS site. 3. Select Properties. 4. Click Configuration. 5. Select the Options tab. 6.
2. Configure mail journaling. If the Domino mail servers are configured to journal messages, then the Email Miner should also be configured for journal mode. See the Domino documentation for more information. NOTE: The frequent deletion of emails from the Notes journal database can cause Notes to report the following error every time a message is removed from the journal: Folder is Larger Than Supported - Cannot Perform Operation. This error does not break anything but it can flood the Notes logs.
5. Click Edit Server Configuration. 6. In the Number of mailboxes field, enter 4. 7. Click Save & Close. Monitoring the gateway The gateway server plays a critical role in transferring messages to the RISS archive. Under normal circumstances, transfers occur without incident, but in any complex network there is always the possibility that unanticipated problems can come up. If undetected, a backup of messages on the gateway server can cause a backup of messages on the production mail servers.
Configuring Outlook or Lotus Notes
A Email Miner version P2.0 for Lotus Notes installation guide This appendix contains the following information about installing Email Miner version P2.
Frequently asked questions Architecture Table 66 Architecture Question Answer What version of Domino must my servers be running? Email Miner requires that your servers are running Domino 6.x or 7.0. What files are placed on my Domino server? Email Miner is self-contained within two Lotus Notes databases. There are no other files to be placed on the servers. How does Email Miner work? Email Miner uses a scheduled agent to perform all of the processing.
Permissions Table 67 Permissions Question Answer What access does Email Miner require to the mail databases? Email Miner only requires Editor access. Whose permissions is Email Miner using to access the mail databases? Whatever ID (Server/user) signed the Email Miner agent is the ID being used to process the mail databases. Can I sign the Email Miner agent with my server ID? Yes. This is a very common practice. Some companies also choose to use a generic administration ID to sign the agents.
Upgrade Table 70 Upgrade Question Answer How do I upgrade Email Miner? Within the installation database there is an upgrade procedure that will guide you through the upgrade steps. Must I upgrade every server (replica) of Email Miner? No. The upgrade only needs to be performed on one server, providing that the Email Miner database can properly replicate to all other replicas. What happens to the Email Miner data when I upgrade? Nothing. All of the data remains intact.
Email Miner Installation The installation database must be located on a Lotus Domino client and can reside in any directory within the Notes data structure. NOTE: If Email Miner already exists on the installation server, the installation database must be located within the directory where Email Miner resides.
NOTE: This field will be automatically populated with the name of the person performing the installation and LocalDomainServers. • Use Options to specify the installation options. Select Automatically create replicas if you want to create the Email Miner replicas during the Installation. If you do NOT select this option, the Email Miner replicas are not automatically created and must then be deployed manually.
Select the Method that you wish to use for the Server Definitions. Select the Server definition that is to be used. The drop-down list displays the current Server Definition documents found within the existing Email Miner database. Select Delete existing databases if you want the installation process to delete any existing Email Miner databases that might exist on the selected servers. If you do NOT select this option, the installation skips any servers that currently contain any Email Miner database. 3.
Enable e-mail miners The Email Miner agents that have been installed must be enabled to begin archive processing. The HP StorageWorks Reference Information Storage System Installation Guide contains the procedure to follow. Ask your HP service representative for a copy of this procedure. Error messages The Installation database can generate numerous error messages. Each error message is categorized as either expected or unexpected.
Table 72 Installation error messages Error number Error message Cause Action ERR0001 Could not find Server Definition for ’xxx’ The Server Definition for the specified server (’xxx’) cannot be found within Email Miner. Contact HP technical support. ERR0002 You must place the installation database on a Domino server The installation database does not currently reside on a server (KitType = 2). Move the installation database to a Domino server.
Email Miner version P2.
B Email Miner version P2.0 for Lotus Notes administration guide This appendix contains the following information about administering Email Miner version P2.
Mail server configuration There are two components for every mail server. • Server Definition The Server Definition defines the characteristics of each mail server. A Server Definition will automatically be created for each mail server during the Email Miner Installation. Each mail server must be included in a Server Definition and if one does not exist, Email Miner will email the administrators about the problem.
Figure 56 Processing options • Use RISS email address to specify the email address for the RISS: domino@[email address of RISS SMTP interface]@[foreign domain] riss. Use the foreign domain set up during system installation. • Use Maximum queue size to specify the maximum number of messages that can be queued before no more messages are sent to the RISS. • Use Options to specify the processing options to be used when Email Miner encounters an error while processing.
Use Message to specify the message of the user’s confirmation dialog box that displays upon a successful deployment. • Select Query RISS to require a duplication document check before sending any document to the RISS. 4. Specify the Logging options: Figure 58 Logging options • Use Retention to specify how many days the log documents are to be retained. • Use Type to specify the type of logging that Email Miner should generate.
Figure 60 Server Status This view displays the server name, the last start/end time, and the processes that were executed. If opened during the execution of Email Miner, you will see the mail user currently being processed within the Process Information column. The mail users are processed alphabetically (by first name/last name).
Figure 62 Import users • Use Type to specify how Email Miner should locate the mail users. Select By mail server to import the users using the home server names. Select By specifics to import the users using specific group/user names. Use Options to specify the import options. Select Include mail-in databases to import mail-in database documents. Select Include resource databases to import resource database documents.
Figure 63 Synchronize with Address Book • Use Server for the server that is to process the synchronization. There should never be more than one synchronization document per server, because only one will be processed. Multiple synchronization documents are necessary when you need to synchronize multiple domains or to partially synchronize a domain. • Use Domain to specify the name of the domain being synchronized. Email Miner will use this value to qualify the address book documents.
Use Restrictions to specify the mail users to be restricted. 2. Enable the Synchronization Agent: You must enable the Email Miner Synchronization agent. If the agent is not enabled, the synchronization process will not occur. Make sure that you specify the server on which the Email Miner Synchronization agent is to run. You may choose any server on which this agent is to run, but it is recommended that you specify the server where the administrators make address book changes.
Figure 65 Creating a mail restriction • Use Status to specify the status of the Mail Restriction. Select Enabled to activate the Mail Restriction. This allows the Mail Restriction to be processed by the Email Miner agent. Select Disabled to deactivate the Mail Restriction. • Use Title to specify a title for the Mail Restriction. This value does not affect processing. • Use Priority to specify the priority of the Mail Restriction.
Select Size to locate using the document size. • Use Retention method to specify how to determine the age of the documents. Use Secondary retention method to specify the secondary method to be used in the event that the primary retention field does not exist. • Use Retention type to specify the document retention type. Select # of Days to specify a dynamic age. Use Retention amount to specify the age of the documents. Select Date range to specify a date range (start/end dates).
Figure 70 Exclude folders • • • • • • Select Include calendar entries to include calendar entries. Select Include foldered to include documents that exist in personal folders. Select Include protect from archive to include documents that are protected from archiving. Select Include stationery to include stationery documents. Select Include tasks to include to-dos. Select Include non-completed tasks to include tasks that have not been marked as completed.
Email Miner Synchronization agent The Email Miner Synchronization agent ensures that synchronization occurs between the journal and/or mail databases and the RISS. Email Miner Tombstone agent The Email Miner Tombstone agent creates a tombstone within the documents that have been selectively archived from the mail databases. This tombstone shows that the document has been successfully sent to the RISS. Error messages Email Miner can generate numerous error messages.
Either create a Server Definition document for the server, or include the server in an existing Server Definition document. If the problem persists, contact HP technical support. Log messages Email Miner can generate various messages that are placed within the log documents. Each log document containing one of these errors is marked with an exclamation point. The following table lists the log messages.
Log message number Log message Cause Action ERR0022 Only have ’xxx’ access to mail database for ’yyy’ The agent signer does not have sufficient access (where xxx is the access) to the mail database (where yyy is the user name). Alter the ACL of the mail database. ERR0023 Could not find mail database for ’xxx’ (yyy) The mail database for a user (where xxx is the user name and yyy is the file path) could not be located. Ensure that the mail database has not been moved/deleted.
C Collecting held messages for HP technical support The Get Held Messages Notes application recovers mail.box messages that are in the Hold state, so they can be used for RISS and RIM diagnostics. After the application recovers a held message from mail.box, it resubmits the message to the router several times, giving it another chance to be delivered. The number of retries can be configured. After the maximum number of retries, the message is saved in Get Held Messages and is not returned to mail.box.
Using the application The following steps should be taken after messages have accumulated: 1. Open Get Held Messages. 2. Examine the Held Mail views, looking for undeliverable messages that were found in mail.box. 3. Use the command File/Database/New Copy to create a complete copy of the database. The copy of the get_held_messages database (get_held_messages.nsf) can be sent to HP for diagnosis of the held messages.
Index Symbols status conditions definition, 23 A Account Error Recovery view, 58 Account Manager, 47 See also AM Account Manager Service, 26 account synchronization See DAS Account Synchronization view, 41 accounts, group, 53 accounts, user, 49 address book, Email Miner, 162 administrative privileges, RISS, 52 agents, Email Miner, 167 AM, 47 See also Account Manager about AM, 47 Account Manager window, 48 adding repositories, 54 adding users, 49 definition, 47 group panel, 52 user accounts, 49 Appliance C
E email Lotus Notes, 143 Microsoft Exchange, 113 email log files, 77 Email Miner about, 147 address book, synchronizing, 162 administration guide, 157 agents, 167 archiving, 164 description, 17 Document options, 165 error messages, 154, 168 frequently asked questions, 148 importing users, 161 installing, 151 mail server configuration, 158 processing options, 161 restrictions, 164 security, 157 Server Definition, 158 Server options, 167 Server Status, 160 upgrading, 150, 153 user configuration, 161 User opt
M Mail Attender for Exchange description, 17 mailbox mining, 113, 119 Manual Account Loader view, 57 memory host machines, 30 MIB, RISS, 74 Microsoft Exchange journal mining, 118 mailbox mining, 119 non-sticky ports, 124 publishing forms, 120 stub support, 119 user accounts, 113 Microsoft Outlook plug-in, installing, 114 Mining RIM Management, 79 Mining Overview view, 80 monitoring reports, 75, 75 monitoring, PCC, 23 N non-sticky ports, configuring, 124 notifications detailed email reports, 76 SNMP event
PST Importer about, 85 Archive Request file, 85, 93 Archive Request Loader, 87 description, 17 features, 85 FileSpec tag, 94 Header tags, 93 installing, 86 logs, 92, 92 process, 85 PST Import Monitor, 90 sample file, 95 Status Monitor report, 92 Q querying data, 17 R RAID controller, 30 registry keys Microsoft Exchange, 118 Outlook plug-in, 114 regulatory compliance, 52, 67, 97 related documentation, 13 Remote Authorization, RISS, 52 replicating smart cells, 61 replication suspending and resuming, 63 Re
stopping servers, 31 storage rate, 26, 29, 32 Storage Status view, 29 stub support, configuring, 119 stub, definition, 85 Subscriber’s choice, HP, 15 SUSPENDED smart cell state, 24 symbols in text, 14 SYNC_WAIT smart cell state, 23 synchronization, 41 synchronization errors, 26 repairing, 58 synchronizing address book, Email Miner, 162 system requirements Email Miner, 150 OWA RISS, 140 PST Importer, 86 System Status view, 30 U T W2 software, 39 web sites HP documentation, 15 HP storage, 15 HP Subscriber’