Version numbers differ.............................................................................................................68
Components..........................................................................................................................69
Events and logs......................................................................................................................73
Logging configuration file........................................................................................................73
SSL protocol......................................................................................................................75
Prohibited commands.........................................................................................................75
Backward compatibility......................................................................................................76
Using friendly names...............................................................................................................76
Adding friendly names.......................................................................................................76
Using short names.............................................................................................................78
Viewing arrays..................................................................................................................79
Specifying the output..........................................................................................................79
Commands.......................................................................................................................81
Command modifiers...........................................................................................................83
Data filtering.....................................................................................................................86
Configure filtering.........................................................................................................86
Objects and counters.........................................................................................................86
HP EVA storage array....................................................................................................87
HP EVA virtual disk........................................................................................................87
HP EVA host connection.................................................................................................89
HP EVA physical disk.....................................................................................................90
HP EVA DR tunnels........................................................................................................91
Contents
5