Skip to content

Proximity – Monitoring Services


Monitoring Services on Your Proximity Dashboard

Your Proximity Dashboard provides monthly summary information for the following services:
  • Backups – the color-coded Backups gauge provides a monthly count of completed Unified Commvault®, Navisite Cloud Director® (NCD) Commvault, and custom virtual machine (VM) backups (if configured) for your configuration items (CIs).

  • Replication – the color-coded Replication gauge provides a monthly summary of protected Zerto Virtual Protection Groups (VPGs), if configured. Zerto Virtual Replication is a hypervisor (or virtual machine monitor)-based replication application that allows you to automatically and continuously replicate application data and VM images, as well as system configurations and dependencies, in order to facilitate disaster recovery.

Click the summary count at the center of each gauge to navigate to the "Backups" or "Replication" tab of the Proximity Services page.

The gauges represent completed Backups and protected VPGs using color-coded status values.
Status values for backups include:
  • Completed
  • Failed
  • Completed with Errors
  • Running
  • Killed
  • Delayed
  • Not Attempted
  • Skipped
  • Failed to Start
  • Not Synchronized
  • Synchronized
  • Any Status
  • Started
  • Completed with Warnings
  • System Failed
  • Committed
  • Unknown
Replication status values include:
  • Healthy
  • Warning
  • Erroneous

Viewing Backup Information

Completed VM backup jobs are listed on the "Backups" tab of the Proximity Services page. To view your backup information:
  1. Click Services in the Proximity navigation pane at the left side of the page.

  2. Select the "Backups" tab.

Monthly usage and backup job summary information is provided in an overview panel at the top of the "Backups" tab.



To hide or display the overview panel, click the "Toggle overview panel" icon at the upper right corner of the panel, as illustrated above.

To view detail information for points in time on an overview panel graph, hover your mouse cursor over points on the graph.

The gauge and graph elements of the overview panel allow you to view a larger version of the element in a pop-up window by clicking on the element's "magnifying glass" icon, as illustrated below.



To add or remove graph data for a "zoomed" graph element, click the corresponding legend entry below the graph.

Below the summary information, the "Backups" tab list provides the following information about each completed backup:
  • Job ID
  • Platform – indicates the backup data source (e.g., Unified Commvault, NCD).
  • Client Name
  • Subclient Name
  • Retention Policy – the retention policy dictates how long the backup data is stored.
  • Backup Type – backup types include:
    • Full – The first backup performed is a full disk backup. It is the only full backup performed, and becomes the baseline to which all subsequent backups are applied.
    • Incremental – Daily backups (performed after the initial full backup) are incremental, including only data that is new or has changed since the previous backup.
    • Synthetic Full – Weekly backups apply the incremental backups to the full backup to compose a synthetic full backup. This backup is then used as the base for future incremental backups.
  • Frequency
  • Usage – the amount of disk space used for the backup job, rounded to the nearest 100 MB. Hover your mouse cursor over the "Usage" column value to view the exact usage value.
  • Status – backup status values include:
    • Completed
    • Failed
    • Completed with Errors
    • Running
    • Killed
    • Delayed
    • Not Attempted
    • Skipped
    • Failed to Start
    • Not Synchronized
    • Synchronized
    • Any Status
    • Started
    • Completed with Warnings
    • System Failed
    • Committed
    • Unknown
  • Start Date
  • End Date

Filtering and Searching Your Backups

To filter your list to display backup jobs for a particular month in the previous six months, select the desired month from the drop-down menu above the list. By default, the list displays backup jobs for the current month.

To perform a real-time search on your list of backups, enter the desired search terms in the "Search" field above the list. Proximity automatically filters the displayed list based on your entered search terms. You can search and filter your list based on any of the displayed column values in the list.

Downloading Your List of Backups

To download your displayed backup list as a comma-separated value (CSV) file, click the Download icon above the list. The CSV file contains the list data as it is currently displayed in the list (i.e., any search and filter operations performed on the list are reflected in the downloaded file).

Displaying/Hiding Backup List Columns

To display or hide columns in your list of backups, click the Select Table Columns icon above the list. The Select Table Columns pop-up window appears.



Click to select or deselect the desired table column names for the displayed list, and click SET COLUMNS to change the list display.

Viewing Replication Information

Protected Zerto virtual protection groups (VPGs) are listed on the "Replication" tab of the Proximity Services page. To view your replication information:
  1. Click Services in the Proximity navigation pane at the left side of the page.

  2. Select the "Replication" tab.


Current protected-VPG summary information is provided in an overview panel at the top of the "Replication" tab.



Note: The "Average RPO" graph is provided in the overview panel for NCD Zerto users only.

To view the "Actual RPO" (recovery point objective) value for a particular VPG, click the "Actual RPO" drop-down menu and select the desired VPG from the list, as illustrated above.

To hide or display the overview panel, click the "Toggle overview panel" icon at the upper right corner of the panel, as illustrated above.

To view detail information for points in time on an overview panel graph, hover your mouse cursor over points on the graph.

The gauge and graph elements of the overview panel allow you to view a larger version of the element in a pop-up window by clicking on the element's "magnifying glass" icon, as illustrated below.



To add or remove graph data for a "zoomed" graph element, click the corresponding legend entry below the graph.

Below the summary information, the "Replication" tab list provides the following information about each protected VPG:
  • Name
  • # VMs – the number of protected VMs in the VPG
  • Protection Status – "Meeting SLA," "Not Meeting SLA," or "Other"
  • State
  • Protected Site – the name of the primary datacenter containing the VPG resources being replicated. Click the hyperlinked datacenter name to log in to the Zerto Service Portal for that site.
  • Recovery Site – the name of the disaster recovery (DR) datacenter containing the replicated VPG resources. Click the hyperlinked datacenter name to log in to the Zerto Service Portal for that site.
  • ZORG – your Zerto Organization name
  • Actual RPO

Filtering and Searching Your VPGs

To filter your list to display VPGs according to their status, select "Meeting SLA," "Not Meeting SLA," "All," or "Other" from the drop-down menu above the list. By default, the list displays all VPGs.

VPG status conditions reflected by the "Other" selection may include:
  • Deleting
  • Failing Over
  • History Not Meeting SLA
  • Initializing
  • Moving
  • Recovered
  • RPO Not Meeting SLA
Click here to view a detailed list of Zerto VPG status conditions.

To perform a real-time search on your list of replications, enter the desired search terms in the "Search" field above the list. Proximity automatically filters the displayed list based on your entered search terms. You can search and filter your list based on any of the displayed column values in the list.

Downloading Your List of VPGs

To download your displayed VPG list as a comma-separated value (CSV) file, click the Download icon above the list. The CSV file contains the list data as it is currently displayed in the list (i.e., any search and filter operations performed on the list are reflected in the downloaded file).

Displaying/Hiding Replication List Columns

To display or hide columns in your list of replications, click the Select Table Columns icon above the list. The Select Table Columns pop-up window appears.



Click to select or deselect the desired table column names for the displayed list, and click SET COLUMNS to change the list display.

Viewing Virtual Protection Group (VPG) Details

To view a VPG's details, click the desired entry in the "Replication" tab list. The Replication Details page appears.


The Replication Details page provides the following information about the selected VPG:
  • Protection Status
  • State
  • Actual RPO
  • Protected Site
  • Recovery Site
  • # VMs
  • ZORG
The Replication Details page also provides a table listing all VMs in the selected VPG. The table provides the following information about each protected VM:
  • VM Name
  • Provisioned Storage
  • Used Storage
  • Used Journal Storage
  • IOPS
  • Throughput
  • WAN

Searching Your Protected VM List

To perform a real-time search on your list of protected VMs, enter the desired search terms in the "Search" field above the list. Proximity automatically filters the displayed list based on your entered search terms. You can search and filter your list based on any of the displayed column values in the list.

Downloading Your List of Protected VMs

To download your displayed VM list as a comma-separated value (CSV) file, click the Download icon above the list. The CSV file contains the list data as it is currently displayed in the list (i.e., any search operations performed on the list are reflected in the downloaded file).

Displaying/Hiding Protected VM List Columns

To display or hide columns in your list of protected VMs, click the Select Table Columns icon above the list. The Select Table Columns pop-up window appears.



Click to select or deselect the desired table column names for the displayed list, and click SET COLUMNS to change the list display.

Viewing Antivirus Scan Information

Completed CylancePROTECT® antivirus scans (if configured) for your configuration items (CIs) are listed on the "Antivirus" tab of the Proximity Services page.

CylancePROTECT is an integrated threat prevention solution that combines the ability to block malware infections with additional security controls that safeguard against script-based, fileless, memory, and external device-based attacks.

To view your antivirus scan information:
  1. Click Services in the Proximity navigation pane at the left side of the page.

  2. Select the "Antivirus" tab.

The "Antivirus" tab list provides the following information for each completed scan:
  • Is SafeTrue or False
  • ID – the CI's unique identifier
  • Name – the CI's name
  • Hostname – the CI's hostname
  • OS – the CI's operating system and version
  • IP Address – the CI's IP address
  • Policy – the name of the antivirus policy assigned to the CI

Filtering and Searching Your Antivirus Scans

  • To perform a real-time search on your completed antivirus scans, enter the desired search terms in the "Search" field above the list. Proximity automatically filters the displayed list based on your entered search terms. You can search and filter your list based on any of the displayed column values in the list.

  • To change the displayed order of your antivirus scans according to a particular column value, click the up/down arrow icons to the right of the desired column header.

  • To filter your antivirus scan list to include or exclude items with a particular column value, click the Filter icon to the left of the desired column header. In the resulting pop-up window, select/deselect the column value checkboxes as desired.


Downloading Your List of Antivirus Scans

To download your displayed antivirus scan list as a comma-separated value (CSV) file, click the Download icon above the list. The CSV file contains the list data as it is currently displayed in the list (i.e., any search and filter operations performed on the list are reflected in the downloaded file).

Displaying/Hiding Antivirus Scan List Columns

To display or hide columns in your list of antivirus scans, click the Select Table Columns icon above the list. The Select Table Columns pop-up window appears.



Click to select or deselect the desired table column names for the displayed list, and click SET COLUMNS to change the list display.

Viewing Intrusion Detection Information

If configured, devices protected by Alert Logic®'s Security-as-a-Service intrusion detection (ID) are listed on the "Intrusion Detection" tab of the Proximity Services page.

Alert Logic's Security-as-a-Service provides continuous network, system, and web application intrusion detection and protection.

To view your ID service information:
  1. Click Services in the Proximity navigation pane at the left side of the page.

  2. Select the "Intrusion Detection" tab.

The "Intrusion Detection" tab list provides the following information for each protected device:
  • Current StatusNew, OK, Warning, Error, Offline, or Unknown
  • ID – the protected device's unique identifier
  • Name – the protected device's name
  • TypeAgent, Appliance, or Host

Filtering and Searching Your Protected Devices

  • To perform a real-time search on your ID-protected devices, enter the desired search terms in the "Search" field above the list. Proximity automatically filters the displayed list based on your entered search terms. You can search and filter your list based on any of the displayed column values in the list.

  • To change the displayed order of your devices according to a particular column value, click the up/down arrow icons to the right of the desired column header.

  • To filter your device list to include or exclude items with a particular column value, click the Filter icon to the left of the desired column header. In the resulting pop-up window, select/deselect the column value checkboxes as desired.

Downloading Your List of Protected Devices

To download your displayed ID-protected device list as a comma-separated value (CSV) file, click the Download icon above the list. The CSV file contains the list data as it is currently displayed in the list (i.e., any search and filter operations performed on the list are reflected in the downloaded file).

Displaying/Hiding Protected Device List Columns

To display or hide columns in your list of ID-protected devices, click the Select Table Columns icon above the list. The Select Table Columns pop-up window appears.



Click to select or deselect the desired table column names for the displayed list, and click SET COLUMNS to change the list display.


Feedback and Knowledge Base