Risk Mitigation Solution Reports > Risk Mitigation Detail Reports
  
Version 10.2.00
Risk Mitigation Detail Reports
Several risk mitigation reports include charts that enable drilldowns to details for each of the rules. This layered approach, with increasing levels of detail, enables different stages of analysis. These reports are driven by Risk Mitigation Rules.
Backup Job Size Variance
Client Consecutive Failure
Client Overall Status Summary
Clients with No Recent Backups
Compliance RTO RPO
Hot Array Ports
Hot LUNs by Read IO
Hot LUNs by Read Response
Hot LUNs by Write IO
Hot LUNs by Write Response
NetBackup Disk Pool Forecast
Thin Pool Forecast
Backup Job Size Variance
Explore your data center using APTARE customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Solutions > Risk Mitigation > Risk Mitigation Analysis
Click the Backup Job Size Variance sector.
Use this report to identify aberrations in backup job sizes, period over period, which may be an indicator of backup issues.
Client
Client of the backup job.
Average Job Size for Prior Period
Average size for backup jobs in the previous period. The period for comparison is defined in the risk mitigation rule.
Prior Time Period
Prior time period of the selected period over period. The period for comparison is defined in the risk mitigation rule.
Average Job Size for Current Period
Average size for backup jobs in the current period. The period for comparison is defined in the risk mitigation rule.
Current Time Period
Current time period of the selected period over period. The period for comparison is defined in the risk mitigation rule.
Job Size Variance %
The difference in the average job size, expressed as a percentage, for the period over period. The period for comparison is defined in the risk mitigation rule.
Client Consecutive Failure
Explore your data center using APTARE customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Solutions > Risk Mitigation > Risk Mitigation Analysis
Click the Client Consecutive Failure sector.
Use this report to identify consecutive backup failures for the last 14 days.
Backup Server
Server from which the backup is executed.
Client
Client of the backup job.
Message
Failure message for the client that has not been backed up.
Today
Today’s backup status.
Yesterday
Yesterday’s backup status.
Day 3 - 14 Status
Each column lists the backup status to aid in identifying when the consecutive failures occurred.
 
Client Overall Status Summary
Explore your data center using APTARE customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Solutions > Risk Mitigation > Risk Mitigation Analysis
Click the Client Overall Status sector.
Use this report to assess the protection status of clients to ensure that compliance objectives are met. The data reflects historical data for the last 14 days.
Client
Client of the backup job.
# of Jobs
Number of backup jobs for the client.
Overall Status
Client backup status. Possible values: Failed, Failed and Incomplete, Successful, Successful and Failed, Successful and Failed and Incomplete, Successful and Warnings and Failed, Successful and Warnings and Failed and Incomplete.
Risk Level
Risk level, determined by the number of failed and incomplete jobs and also the job type.
# of Failed Jobs
The number of failed jobs for the client during the last 14 days.
# of Warning Jobs
The number of warnings for jobs for the client during the last 14 days.
# of Incomplete Jobs
The number of incomplete jobs for the client during the last 14 days.
# of Successful Jobs
The number of successful jobs for the client during the last 14 days.
First Attempt
Date and time of the first backup attempt.
Last Attempt
Date and time of the last backup attempt.
Job Types
Type of backup, such as scheduled, catalog, or full.
Exit Codes
Exit codes returned by the backup software.
Written
Amount of data written to the backed up copy.
Compliance RTO RPO
Explore your data center using APTARE customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Solutions > Risk Mitigation > Risk Mitigation Analysis
Click the Compliance RTO RPO sector.
To remain in compliance for Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO), use this report to help determine how long it will take to restore data if a recovery is required. Historical data for the last 14 days provides the details, such as the size and duration of the backups.
Client
Client of the backup job.
Restore Plan
Examples: No Backup, Full Backup.
Last Successful Full
Date and time of the last successful full backup of client data.
Full Size
The amount of data backed up during the last successful full backup.
Full Duration
The time it took to successfully complete the last full backup of client data.
Last Incremental After Full
Date and time of the last incremental backup after the successful full backup.
# of Increments After Full
The number of incremental backups that completed after the successful full backup.
Incr Size After Full
The amount of data backed up during the incremental backup.
Incr Duration After Full
The time it took to successfully complete the last incremental backup after the successful full backup of client data.
Last Incremental
Date and time of the last incremental backup of client data.
# Increments
Number of increments for the client.
Incr Size
The amount of data backed up during the last incremental backup for the client.
Incr Duration
The time it took to successfully complete the incremental backup of client data.
Recovery Date
The date and time of the expected completion of full data recovery, based on historical times and sizes.
Clients with No Recent Backups
Explore your data center using APTARE customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Solutions > Risk Mitigation > Risk Mitigation Analysis
Click the Clients No Recent Backups sector.
Use this report to ensure that clients’ data is sufficiently protected. Historical data for the last 14 days provides the details of the last backups.
Client
Client of the backup job.
Product
Name of the backup software used to back up the client.
Days Since Last Backup
The number of days since the client's last backup.
Primary IP Address
Client's primary IP address.
Host Type
Indicates the type or role of the host, such as VM Guest.
Last Backup
Date and time of the last backup.
Job Status
The status of the client's last backup job.
Job Type
The job type, such as Backup or Restore.
 
Hot Array Ports
Explore your data center using APTARE customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Solutions > Risk Mitigation > Risk Mitigation Analysis
Click the Hot Array Ports sector.
Use this report to identify heavily used array ports. The high activity on these ports may impact application performance.
Storage Array
The storage array identified with high port activity.
Vendor
Name of the storage array vendor.
Port
Name of the hot port.
Port Number
The number that identifies the hot port.
Port’s Nickname
An alternative name for the port, in some cases the WWN is used.
WWN
The port’s unique identifier, its worldwide name.
# of Hosts
The number of hosts accessing this port.
# of Logical Units
The number of array LUNs associated with this port.
Peak Data Transferred
The highest point of activity for this hot port.
Average Data Transferred
The average amount of data transferred during this reporting period.
Peak/Average Ratio
The transfer ratio is defined as peak divided by average.
 
Hot LUNs by Read IO
Explore your data center using APTARE customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Solutions > Risk Mitigation > Risk Mitigation Analysis
Click the Hot LUNs by Read IO sector.
Storage Array Name
Name of the storage array.
Logical Unit Name
Name of the LUN experiencing high volume of read activity.
Host Names
Comma-separated list of host names that are accessing the LUN.
Peak/Average Ratio
The ratio of the peak read I/O divided by the average read I/O.
Peak Read IO
The peak read I/O, which can be used to identify LUN overload.
Average Read IO
The average read I/O, which can be used to identify typical LUN activity.
Hot LUNs by Read Response
Explore your data center using APTARE customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Solutions > Risk Mitigation > Risk Mitigation Analysis
Click the Hot LUNs by Read Response sector.
Storage Array Name
Name of the storage array.
Logical Unit Name
Name of the LUN experiencing high volume of read response activity.
Host Names
Comma-separated list of host names that are accessing the LUN.
Peak/Average Ratio
The ratio of the peak read I/O response divided by the average read I/O response.
Peak Read Response
The peak read I/O response time, which can be used to identify LUN overload.
Average Read Response Time
The average read I/O response time, which can be used to identify typical LUN activity.
 
Hot LUNs by Write IO
Explore your data center using APTARE customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Solutions > Risk Mitigation > Risk Mitigation Analysis
Click the Hot LUNs by Write IO sector.
Storage Array Name
Name of the storage array.
Logical Unit Name
Name of the LUN experiencing high volume of write activity.
Host Names
Comma-separated list of hosts that are accessing the LUN.
Peak/Average Ratio
The ratio of the peak write I/O divided by the average write I/O.
Peak Write IO
The peak write I/O, which can be used to identify LUN overload.
Average Write IO
The average write I/O, which can be used to identify typical LUN activity.
Hot LUNs by Write Response
Explore your data center using APTARE customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Solutions > Risk Mitigation > Risk Mitigation Analysis
Click the Hot LUNs by Write Response sector.
Storage Array Name
Name of the storage array.
Logical Unit Name
Name of the LUN experiencing high volume of activity.
Host Names
Comma-separated list of hosts that are accessing the LUN.
Peak/Average Ratio
The ratio of the peak write response time divided by the average write response time.
Port Name
The WWN of the relevant port.
Average Write Response Time
The average write response time, which can be used to identify typical LUN activity.
NetBackup Disk Pool Forecast
Explore your data center using APTARE customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Solutions > Risk Mitigation > Risk Mitigation Analysis
Click the NetBackup Disk Pool Forecast sector.
This data is used to specifically identify NetBackup storage that may be at risk
Master Server
Master server name
Disk Volume Pool
Disk volume pool path and name.
First Period Available
First period’s available capacity.
Last Period Available
Last period’s available capacity.
Current Available
Current period’s available capacity.
Period Over Period Analysis of 85%
Period-over-period analysis of when the pool will reach 85% of its capacity.
Linear Analysis of 85%
Linear analysis of when the pool will reach 85% of its capacity.
 
Thin Pool Forecast
Explore your data center using APTARE customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Solutions > Risk Mitigation > Risk Mitigation Analysis
Click the Thin Pool Forecast sector.
This report uses multi-metric pool capacity for these vendors and products: EMC VMAX Thin Pools, EMC CLARiiON VNX Thin Pools, and HDS Journal Pools. This data is used to forecast storage that may be at risk
Array Family
Name of the array family.
Array Name
Name of the storage array.
Pool
Name of the storage pool.
RAID Type
RAID type, such as RAID-5(7+1).
Pool Size
Capacity of the storage pool.
Pool Available Capacity
Available = Pool Size - Pool Used Capacity.
Pool Used Capacity
The amount of storage pool capacity that is in use.
Pool Used %
The percentage of storage pool capacity that is in use. Used % = Pool Used/Pool Size.
Subscribed Size
The amount of the pool capacity that has been subscribed to applications.
Subscribed %
The percentage of the pool capacity that has been assigned to applications.
Over-Subscribed %
The amount of the storage pool that has been over-subscribed.
# of Days
Total number of days that data is available for this pool.
Last Available
Last available capacity for the selected time period. The amount of available capacity takes into account the storage that has been subscribed.
First Available
Last available capacity for the selected time period. The amount of available capacity takes into account the storage that has been subscribed.
Average Available
Average available capacity for the selected time period. The amount of available capacity takes into account the storage that has been subscribed.
Available Delta
The difference between the last and the first available values.
Available Delta %
The percentage of the difference between the last and the first available values.
Daily Usage Linear
Daily usage as per linear analysis.
Change % POP
Change in percentage, period over period.
Change % Linear
Change in the percentage as per linear analysis for the report period.
Daily Usage POP
Daily usage, period over period.
Linear Analysis
Provides a linear analysis of the period-over-period data.
POP Analysis
Evaluates period-over-period data to identify when storage is expected to be at risk.