DD OS 4.9 Command Reference Guide Backup Recovery Systems Division Data Domain LLC 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 762-0007-0001 Revision A March 26, 2010 Copyright © 2010 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC and Data Domain are registered trademarks, and Global Compression is a trademark of EMC Corporation 2 Contents About This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . .37 Chapter Summaries . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Related Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Access to Related Documents at Data Domain . . . . . . . 40 Access Data Domain Documents . . . . . . . . . . . . . . 41 Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Contacting Data Domain . . . . . . . . . . . . . . . . . . . . . . . . 42 1 About the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . .43 CLI Shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Recall Commands . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Delete Characters . . . . . . . . . . . . . . . . . . . . . . . . . 44 Command Completion . . . . . . . . . . . . . . . . . . . . . . . 45 Cursor Movement . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Transpose Characters . . . . . . . . . . . . . . . . . . . . . . . 45 2 adminaccess . . . . . . . . . . . . . . . . . . . . . . . . . . .47 About the adminaccess Command. . . . . . . . . . . . . . . . . . 48 adminaccess Command Options . . . . . . . . . . . . . . . . . . . 48 add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 add host-list . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 add ssh-keys . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 DD OS 4.9 Command Reference Guide 3 authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . .49 authentication add cifs . . . . . . . . . . . . . . . . . . . .49 authentication del cifs . . . . . . . . . . . . . . . . . . . . .50 authentication reset cifs . . . . . . . . . . . . . . . . . . .50 authentication show . . . . . . . . . . . . . . . . . . . . . .50 certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50 certificate show . . . . . . . . . . . . . . . . . . . . . . . . .50 del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 del ssh-keys . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 disable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52 reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52 reset ssh-keys . . . . . . . . . . . . . . . . . . . . . . . . . . .52 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52 show ssh-keys . . . . . . . . . . . . . . . . . . . . . . . . . . .53 trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53 trust add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54 trust copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54 trust del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54 trust show . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54 4 Contents web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 web option reset . . . . . . . . . . . . . . . . . . . . . . . . 54 web option set http-port . . . . . . . . . . . . . . . . . . . 54 web option set https-port . . . . . . . . . . . . . . . . . . 55 web option set session-timeout . . . . . . . . . . . . . . 55 web option show . . . . . . . . . . . . . . . . . . . . . . . . 55 adminaccess Examples . . . . . . . . . . . . . . . . . . . . . . . . . 56 Configuring adminaccess . . . . . . . . . . . . . . . . . . . . . 56 Add a Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Add an Authorized SSH Public Key . . . . . . . . . . . . . 56 Return Command Output to a Remote Machine . . . . . . 57 3 alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59 About the alerts Command . . . . . . . . . . . . . . . . . . . . . . 59 alerts Command Options . . . . . . . . . . . . . . . . . . . . . . . 60 add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 clear . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 del. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 show alerts-list . . . . . . . . . . . . . . . . . . . . . . . . . 61 show all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 show current . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 show daily . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 show history . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 alerts Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 DD OS 4.9 Command Reference Guide 5 Configuring alerts . . . . . . . . . . . . . . . . . . . . . . . . . .63 Add to the Email List . . . . . . . . . . . . . . . . . . . . . .63 Remove from the Email List . . . . . . . . . . . . . . . . .63 Managing alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . .63 Test the Email List . . . . . . . . . . . . . . . . . . . . . . .63 Display the Email List . . . . . . . . . . . . . . . . . . . . . .63 Display the Email List and Administrator Email . . . . .64 Display Current Alerts . . . . . . . . . . . . . . . . . . . . .64 Display Current Alerts and Recent History . . . . . . . .64 Display the Alerts History . . . . . . . . . . . . . . . . . . .65 Important Notices. . . . . . . . . . . . . . . . . . . . . . . . . . . . .65 4 alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 About the alias Command . . . . . . . . . . . . . . . . . . . . . . .67 alias Command Options . . . . . . . . . . . . . . . . . . . . . . . . .68 add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68 del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68 reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68 alias Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69 Add an Alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69 5 authentication . . . . . . . . . . . . . . . . . . . . . . . . . 71 About the authentication Command. . . . . . . . . . . . . . . . .71 authentication Command Options . . . . . . . . . . . . . . . . . .71 disable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71 6 Contents domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 domain reset . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 domain set . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 domain show . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 groups add . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 groups del . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 groups reset . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 groups show . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 servers add . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 servers del . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 servers reset . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 servers show . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 6 autosupport . . . . . . . . . . . . . . . . . . . . . . . . . . . .75 About the autosupport Command . . . . . . . . . . . . . . . . . . 75 autosupport Command Options . . . . . . . . . . . . . . . . . . . 77 add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 del. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 DD OS 4.9 Command Reference Guide 7 reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 reset all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 reset schedule . . . . . . . . . . . . . . . . . . . . . . . . . .78 reset support-list . . . . . . . . . . . . . . . . . . . . . . . .78 send . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79 set schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80 show all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80 show history . . . . . . . . . . . . . . . . . . . . . . . . . . . .81 show report . . . . . . . . . . . . . . . . . . . . . . . . . . . .81 show schedule . . . . . . . . . . . . . . . . . . . . . . . . . .81 show support-list . . . . . . . . . . . . . . . . . . . . . . . .81 test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82 autosupport Examples . . . . . . . . . . . . . . . . . . . . . . . . . .82 Configuring autosupport . . . . . . . . . . . . . . . . . . . . . .82 Schedule the Autosupport Report . . . . . . . . . . . . . .82 Managing autosupport. . . . . . . . . . . . . . . . . . . . . . . .82 Run the Autosupport Report . . . . . . . . . . . . . . . . .82 Display the autosupport Email List . . . . . . . . . . . . .83 Display the autosupport History . . . . . . . . . . . . . . .83 7 cifs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 About the cifs Command . . . . . . . . . . . . . . . . . . . . . . . .86 cifs Command Options. . . . . . . . . . . . . . . . . . . . . . . . . .86 add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86 add /backup . . . . . . . . . . . . . . . . . . . . . . . . . . . .87 add /ddvar . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87 8 Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 option show . . . . . . 89 hosts reset . . . . . . . . . . . . . . . . . . 95 set authentication nt4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 hosts add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 set nb-hostname . . . . . . . 88 hosts del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 hosts show . 88 del /ddvar . . . . . . . . . 95 set authentication workgroup . . . . . . . . . . . . 94 reset clients . . . . . . . . . 94 set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .del. . . . . . . . . . . . . . . . . . . . . . .9 Command Reference Guide 9 . . . . . . . . . . . . . . . . . . . . . . 89 option reset . . . . . . . . . . . . . . . . . . . . . . . . . . 87 del /backup . . . . . 96 set wins-server . . . . . . . . . . . . . . . . . . . . 95 set authentication active-directory . . . 88 hosts . . . . . . . . . . . . . . . . . . 93 reset . . . . . . . . . . . . . 88 enable . . . . . . . . . . . . . . . . . . 89 option set . . . . . . . . . . . . . 88 disable . . . . . . . . . . . . . 94 reset authentication . . . . . . . . . . . 89 nb-lookup . . . . . . . 94 reset nb-hostname . . . . . . . . . . . . . . . . . 94 reset wins-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 DD OS 4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 troubleshooting list-groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 troubleshooting users . . . . . 101 cifs Examples. . . . . . . . . 105 About the cluster Commands . . . . . . . . . . . . . . . .98 share show . . . . . . . . . . . . . . . . . . 100 troubleshooting groups . . . . . . . . . . . . . . . . . . . . . . . . . . . .96 share destroy . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98 share modify . . . . . . . . .99 show config . . . . . . . . . . . . 106 cluster Command Options . . . . . . . . . .share . . . . . .98 share enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99 show active . . . . . . . . . . . . . . . . . . . . . . .99 show clients . . . . . . . . . . . . . . . . . . . . . . . . 102 Add a Share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 status . . . . . . . . . . . . . . . . . . . . . . . 100 show stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 troubleshooting list-users . . . . . . . . . . . . . . . . . . . . . . . . . .96 share create . . . . . . . . . . . . . . . . . . . . . . . . . . .99 show detailed-stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 10 Contents . . . . . 103 8 cluster . . . . 101 troubleshooting performance . . . . . . . . . . . . . .98 share disable . . . . . . . . . 102 Allow Class C Network Access to a Share . . . . . . . . . . . . . . . . . . . . . . . . 100 troubleshooting domaininfo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 troubleshooting . . . . . . . . . . . 114 set mailserver . . . . . . . . . . 107 run . . . . . . . . . . . . . . . . . . . . . . . . . 113 set admin-email . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 set location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 set timezone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 reset . 108 show config . . . . . . . . . . . . . . . . . . . . . 115 DD OS 4. . . . . . . . . . . . . . . . . . . . . . . . . . 106 alerts . . . . . . . . . . . . . . . 107 destroy . . . . . . . . . . . 115 setup . . 109 status. . . . . . . . . . . . . . . . . . . . . . . . 112 reset location . . . . . . . . . . . . . . . . . 112 reset mailserver . . . . . . . . . . . . . 106 create . . . . . . . . 112 set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 reset timezone . . . . . . . . . . . . . 111 About the config Command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 set admin-host . . . 109 9 config . . . . . . . . . . . . . . . . .add . . . . . . . . . . 111 config Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 Command Reference Guide 11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Set the Timezone . . . . . . . . . . . . . . . . . . . 121 beacon. . . . . . . . . . . . . . 116 show mailserver . . . . . . . . . . . . . . . . . . . 117 10 disk . . . . . . . . . . . 117 show timezone . . . 122 fail . . . . . . . . . . . . . . . . . . . . . 120 add dev . . . . . . . . . . . . . . 117 Configuring config . . . . . . . . . . . . . . . . . 116 show all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 show admin-email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 disk Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 show location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 About the disk Command . . . . . . . . . . . . . . . . 116 show admin-host . . . . 120 add enclosure . . . . . . . . . . . . 123 12 Contents . 122 expand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 add . . . . . . . . .show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 config Examples . . . . . . . . . . . . . . 123 multipath option set monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 port enable . . . . 128 show detailed-raid-info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 multipath failback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 show performance . . . . . . . 125 multipath resume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 set. . . . . . . . . . . . . . . 126 rescan . . . . . . . . . . . . . . . . . . . . . . . . . . 124 multipath option reset auto-failback . . . . . . . . . . . . . . . . . . 128 show hardware . . . . . . 123 multipath option set auto-failback . . . . . . . . . . . . . 132 show reliability-data . . . . . . 125 port . . . . . . 125 multipath show stats . . 124 multipath reset stats . . . . . . . . . . . . . . . . 126 port show summary . . . . . . . . . . . . . . . 127 reset . . . . . . . . . . . . . . . . . . . . . . . . 129 show failure-history . . . . 126 port show stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 show raid-info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 multipath show history . . . . . . . 125 multipath suspend . . . . . . . . 127 set spindle-group . . . . . . 124 multipath option reset monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 DD OS 4. . . . . . . 125 multipath status . . . . . . . . . .multipath . . . . . . . . . . . . . . . . . . .9 Command Reference Guide 13 . . . . . . . . . . . . . . . 124 multipath option show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 enclosure Command Options. . . . . . . . . . . . . . . . . . . 138 show . . . . 142 show topology . . . . . . . . . . . . . 148 filesys Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 beacon. . . . . . . . . . . . . . . . . . . . . . . .status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 About the enclosure Command . . . . . . . . . . 141 show summary . . . . . . . . . . . . . . . . . . . . . . . . 145 Display the Enclosure Temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 show fans . . . . . . . . . . . . . . . . . . 133 unfail . . . . . . . . . . . . . . . . . . . 138 show all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 11 enclosure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 enclosure Examples . . . . . . . . . . . . . . . . . . . 135 disk Examples . . . . . . . . . 135 Important Notices. . . . . . . . . . . . . . . . . 135 Add an Expansion Shelf . . . . . . . . . . . . . . . . . . 144 test topology . . . . . . . . . . . . . . . . . . . . . . . . 140 show powersupply . . . . . . . . . . . . . . . . . 147 About the filesys Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 12 filesys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 14 Contents . . . . . . . . . . . . . . . . . . . . . 138 show controllers . . . . . . . . 142 show temperature-sensors . . . . . . . . . . . . . . . . 143 test . . . . . . . . . . . . . . . . . 150 clean show config . . . . 155 encryption algorithm set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 encryption show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 encryption disable . . 156 encryption lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 clean stop . . . . 156 encryption algorithm show . . . . . . . . . . 155 encryption algorithm reset . . . . . . . . . . . 151 clean start . . . . . . 157 encryption passphrase . . . 158 fastcopy . . . . 153 disable . . . . . . . . . . . . . . . . . . .clean . . . . 152 clean watch . . . . . . . . . . . . . . . . . . .9 Command Reference Guide 15 . . . . . . . . . . . . . . . . . . . . . . . . . . 148 clean reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 destroy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 clean set throttle . . . . . . . . . . . . 149 clean set schedule . . . . . . . . . 157 encryption unlock . . . . . . . . . . . . . . . . . 151 clean show schedule . . . . . . . . . . . 156 encryption enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 DD OS 4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 enable . . . . . . 151 clean show throttle . . . . . . . . . . . . . . . 154 encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 clean status . . . . . . . . . . . . . . . . 168 retention-lock status . . . . . . . . . . . . . . . . . . . . . . 171 filesys Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 retention-lock . . . . . . . . . . 167 retention-lock option set . . . . . . . . . . . . . . . . . . . 160 option set global-compression-type . . . . . . . . . . . . . . . 165 retention-lock disable . . . 164 Client-Side Retention Lock File Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 option show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 option reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 show uptime . . . . . . . . . . . . . . 160 option set local-compression-type . . . . 168 show space . . . . . . . . . . . . . . 167 retention-lock option reset . . . . . . . 170 status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 option enable report-replica-as-writable . . . . . . . . . . . . . . . . . . . . 166 retention-lock enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 option set staging-reserve . . 168 show compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 16 Contents . . . . . . . . . . . . . . . . . . . . . . .option . . . 159 option disable report-replica-as-writable . . . . . . . . . . . . . . . . 163 restart . . 171 sync . . . . . . . . . . . . . . . . . . 161 option set marker-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 retention-lock option show . . 168 retention-lock reset . . . . . . . . . . . . . . . . . . . . . . . 172 Additional Notes . . . . . . . . . . . 180 14 license . . . . . . . . . . . . . . . . . . 183 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 add . 176 13 help . . . . . . . . . . . . . . . . . . 173 Local Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Add a License . . . . . . . . . . . . 184 DD OS 4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Replicator Destination Read/Write Option. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 help Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 license Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Retention Lock and Filesys Destroy . . . . . . . . . . . . . . . . 173 Global Compression . . . . . . . . . . . . . . . . . . . . . . . . . . 181 license Command Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Retention Lock Procedure . . 174 Tape Marker Handling . . . . . . . . . . . . . . .9 Command Reference Guide 17 . . . . . 179 About the help Command . . . . . . . . . . . . . . . . . . . . 175 Retention Lock and Replication . 176 Retention Lock and Fastcopy . . 181 About the license Command . 179 help Command Options . . . . . . . . . . 174 Disk Staging. . . . . . . . . . . 183 reset . . . . . . . . . . . . 171 Performing Retention Lock File Control Commands on the Client Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 del. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 send . . . . 186 host. . . . . . . . . . . . . . . . . . . . . . . . . . 187 host enable . . . . . . . . . 195 About the migration Command . . . . . . . . . . . . . . 186 host add . . . . . . . . . . . . 195 migration Command Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 receive . . . . . . . . . . . . . . . . . . . . . . . 186 host del . 187 host show . . . . . . . . . . . . . . . . . . . . . 188 view . . . . . . . . 191 Archive Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 watch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 About the log Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 abort . . . . . . . . . . . . . 188 list . . . . . . . . . . . . . . . . . . . . . . . . 191 log Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 18 Contents . . . . . . . . . . . . . . . . . .15 log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 log Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 show stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 16 migration . . . . . . . . . . . . . . 200 status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 commit . . . . . . . 187 host reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 host disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 watch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Understand a Log Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 destroy . . . . . . . . . . . . . . . . 206 aggregate add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 config ifname netmask . . . . . . . . . . 206 net Command Options . . . . . 202 17 net . . . . . . . . . . . . . . . . . . . . . . 209 config ifname dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 aggregate del . . . 211 config ifname type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 aggregate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 config ifname up | down . . . . .9 Command Reference Guide 19 . . . . . . . . 210 config ifname ipaddr . . 205 About the net Command. . . . 207 aggregate reset . . . . . . . . . . . . . . . . 210 config ifname mtu . . . . . . 213 DD OS 4. . . . . . 208 config ifname 0 . . . . . . . . . . . . . . 207 aggregate show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .migration Examples . . . . . . . . . . . . . . . . . . 209 config ifname duplex speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 config ifname autoneg . . . . . . 202 Migrate Between Source and Destination . . . . 212 create . . . . . . . . . . . . . . . 212 create virtual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 config. . . . . . . . . . . . . . . . . . . . . . . 212 create interface . . . . 202 Migrate with Replication . . . . . . . . . . . . . . 213 disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .ddns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 hosts del . . . . . . . . . 215 failover add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 ddns disable . . . . . . . . . . . . . . . . . . . . . 215 ddns status . . . . . . . . . . . 214 ddns register . . . . . . . . . . . . . . . . . 215 failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 reset . . . . . . . . . 220 lookup . . 217 failover show . . 218 hosts . . . . . . . . . . . . . 221 20 Contents . . . . . . . . . 214 ddns del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 hosts add . . . . . . . . . . 220 iperf server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 hosts show . . . 215 ddns show . . . . . . 214 ddns enable . . 219 hosts reset . . 216 failover del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 failover reset . . . . 214 ddns add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 iperf client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 failover modify . . . . . . . . . 215 enable . . . . . . . . 215 ddns reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 iperf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 tcpdump . . . . . . . . . . . . . . . . . . . . . . . . 222 set hostname . . . . 231 18 nfs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 set dns . . . . . . 224 show settings . . . . . . . . . . . . . . . . . . . . 223 show domainname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Important Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Sample Failover Workflow . . . . . . 233 nfs Command Options . . . . . . .9 Command Reference Guide 21 . . . . . . . . . . . . . . . . . . 223 show hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Supported Interfaces . . . . . . . 226 tcpdump capture . . . . 222 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Sample Aggregation Workflow. . . . . . . . . . . . . . . . . . . . . . . . 234 DD OS 4. . . . 225 show stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 show all . . . . . . . . . . 226 tcpdump del . . . . . . . . . . . . 227 net Examples . . . . . . . . . . . . . . . . . 223 show config . . . . . . 234 add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .set. . . . . . . . . . . . . . . . 233 About the nfs Command . . . . . . 224 show hardware . . . . . . . . . . . . . . . . . 230 Considerations for Ethernet Failover and Net Aggregation . . . . . . . . . . . . . . . . . . . . . 221 set domainname . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 show dns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 show active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 del timeserver. . . . . . . 244 22 Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 19 ntp . . . . . . . . . . . . . . . . 235 enable . . . . . . . . . . . . . . . . . . . . . . . . . 235 disable. . . . 236 reset stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 ntp Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 reset . . . . . . . . . . 243 reset timeservers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 show histogram . . 239 Add or Delete NFS Clients . . . . . . . . . . . . . . . . . . 242 disable. . . . . . . . . . 242 enable . . 242 add timeserver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 reset . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 status . . . 238 nfs Examples. . . . . . . . . . 236 show clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 show detailed-stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 show stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 reset clients . . . . . . . . . . . 243 show . . . . . . . . . . . . . . 241 About the ntp Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 destroy . . . . . . . . . . . . . .9 Command Reference Guide 23 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 20 ost . . . . . . . . . 246 ost Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 ifgroup enable . . . . . 247 disable . . . . . . . . . . 250 lsu . . . 250 lsu delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 ifgroup reset . . . . . . . . . . . . 248 ifgroup add interface . 248 ifgroup del interface . . .ntp Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 enable . . . . . . . . . . . . . . . . . 245 About the ost Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 ifgroup status . . . 248 ifgroup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Add an NTP Server . . . . . . . . . . . . . . . 250 lsu show . . . . . . 251 DD OS 4. . . 249 ifgroup show config . . . . . . . . . . . . . . . . . . . . . . . . 249 ifgroup disable . . . . 250 lsu create . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 21 replication . . . . . 256 show . . . . . . . . .opt-dup . . . . . . . . . . . . . . 252 opt-dup show image-history . . . . . . . . . . . . . . . . . . . 252 opt-dup show history . . . . . . 257 show histogram . . . . . . . . . . . . 254 opt-dup show stats . . . . . . . . . 261 About the replication Command . . . . . . . . . . . 252 opt-dup show active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 reset user-name . . . . . . . . . . . . . . . . . . . . . 255 option set boost . . . . . . . . . . . . . . . 256 reset stats . . . . . . . . 255 option show . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 show connections . . . . . . . . . 252 opt-dup reset stats . . . . . . . . . . . . . . . . 258 show image-duplication active . . . . . . . . . . . . . 255 reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 opt-dup option reset . . . . . . . . . . . . . . 256 set user-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 show user-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 opt-dup show performance . . . . . . 251 opt-dup option show . . . . . . . . . . . . . . . . . . . . . . . . . . 254 option . 262 24 Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 show stats . . . . . 259 status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 opt-dup option set low-bw-optim . . 255 option reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 reauth . . . . . . . . . . . . . . . . . . . . . 267 modify connection-host . . . . . . . . . . . . . . . . . . . . . 269 option set bandwidth . . . . . . . . . . . . . . . . . . 269 option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 Command Reference Guide 25 . . . . . . . . . . . . . . . . 270 option show . . . . . . . . . . . 272 DD OS 4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 resync . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 break . . . . . . . . . . . . . 270 option set listen-port . . . . . . 264 disable . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 modify . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 modify low-bw-optim . . . . . . . . . . . . . . . . . . . . . . .replication Command Options . . . . 271 recover. . . . . . . . . . . . . . . . . . . . . . . . 265 initialize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 abort . . 268 modify connection-host port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 modify source-host or destination-host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 option set delay . . . . . . . . . 263 abort recover . . . . . . . . . . . . . . . . . . . . . . 265 enable . . . . . . . . . . . . 269 option reset . . . . . . . . . . . . . . . . . . . . . 263 abort resync . . . . . . . . . . . . . . . . . . . . 263 add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 throttle show . . . . 291 Create Many-to-One Directory Replication . . . . . . . . . . . . . . . . . . . . 287 watch .show . . . . . . . . . . . . . . . . . . . . 288 Limitations . . . . 274 show history . . . . . . . . . 274 show detailed-stats . . . . . . . . . . . . 272 show detailed-history . . . . . . . . . . . . . . . . 284 throttle del . . . . . . . . . . . . . 286 throttle reset . . . . . . . 289 Create Collection Replication . . . . . . 272 show config . . . . . . . . . . . . . . . 292 Create a Pool Replication . . . . . . 284 sync status . . . . . . . . . . . . 292 26 Contents . . . . . . . . . . . . . . . . . . . . . . 289 Create a Directory Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 throttle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Configuring Replication . . . . . . . . . . . . . 284 throttle add . . . . . . . . . . . . . . . . . . . . . 290 Create Bi-Directional Directory Replication . . . . . . . . . . . . . . . . . . 279 status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Configuring Replication Pairs . . 282 sync . . . . . . . . . . . . . . . . . 274 show performance . . . . . . . . . . . . . . . . . . . 286 throttle set . . . . . . . . . . . . . . . . . . . 275 show stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 Create One-to-Many Directory Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 Create Cascaded Directory Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 replication Examples. . . . . . . . . . . . . 294 Recover from a Full Replication Destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 About the route Command . . 306 add . . 307 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Managing Delta Replication . . . . . . . . . . . .9 Command Reference Guide 27 . . . . . . . . . . . . . . . . . . . . . . . . . . 306 del. . . . . . . . . . . . . . . . . . . . . . . . 308 show table . . . . . . . . . . . . . . . 305 route Command Options . . . . . . . . . . . . . . . . 299 Determining Whether Delta Replication Increases Compression . . . . . . . . . . . . . 307 show config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 trace . . . . . . . . . . . . . . . . . . 296 Change the Destination Listen Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Managing Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 Set Replication Bandwidth and Network Delay . . . . . . . . . . 293 Delete a Replication Pair . . . . . . . . . . . . . . . 300 Example where Delta Replication Improves Throughput . . . . . . 308 route Examples. 309 DD OS 4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Suspend and Resume Replication . . . . 307 set. . . . 294 Replace a Directory Source—Same Directory Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 show gateway . . . . . . . . 309 Add a Route . . . . . . . . . . . 306 reset . . . . . . . . . . . . . . . . . . . . . . . . . . 302 22 route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311 snapshot Command Options . . . . . . . 324 add trap-host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 snmp Command Options . . . . . . . . . . . . . . . . . . . 317 reset . . . . . . . . . . . . . . . . . . . . 309 Set a Default Gateway . . . . 318 snapshot Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311 About the snapshot Command. . . . 312 Names of Snapshots Created by a Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 add ro-community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319 Schedule a Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 expire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316 modify . . . . . . . . . . . . . 309 23 snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Delete a Route . 323 About the snmp Command . . . . . . 325 28 Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 list . . . . . . . . . 317 rename . . . . . . . . . . . . . . . . . . 314 del . . . . . . . . . . . . . . . . 318 show . . . . . . . . . . . . . . 313 create . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 add . . . . . . . . . . . . . . . . . . . . 319 24 snmp . . . . . . . . . . . . . . . . . . . . 324 add . . . . . . . . . . . . . . . . . . . . . . . . 324 add rw-community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 show trap-hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 del rw-community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 reset rw-community . . . . . . . . . . . . . . . . . . . . . . . . . 325 del trap-host . . . . . . . . . . . . . . . . .9 Command Reference Guide 29 . . . . . . . . . 329 show sysContact . . 326 reset sysContact . . . . . . . . 327 set. . . . . . . . . . . . . . . . . . . . . . . . . . . 329 status. . . . . . . . . . . . . 327 reset trap-hosts . . . . . . . . . . . . . 328 show . . . . . . . . . . . . . . . . . . . . . . . . . 325 del ro-community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 disable . . . . . . . . . . . . . . . . . . . . 328 show config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 show rw-communities . . . . . . . . . . . . . . . . . . 327 set sysContact . . . . . 330 25 support . . . 327 set sysLocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 About the support Command . . . . 331 support Command Options . . . . . . . . 326 reset ro-community . . . . . . . . . . . . . . . . 326 reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Important Notices . . . . 329 show sysLocation . . . . . . . . . . . . 328 show ro-communities . . . . . . . . . . . .del. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 reset sysLocation . . . . . . . . . 331 DD OS 4. . . . . . . . . . . . . upload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 26 system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 About the system Command . . . . . . . . . . . . . . . . . . . . . 334 system Command Options . . . . . . . . . . . . . . . . . . . . . . 334 headswap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 option reset . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 option set . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 option show . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 poweroff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 sanitize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 sanitize abort . . . . . . . . . . . . . . . . . . . . . . . . . . 337 sanitize start . . . . . . . . . . . . . . . . . . . . . . . . . . 337 sanitize status . . . . . . . . . . . . . . . . . . . . . . . . . 337 sanitize watch . . . . . . . . . . . . . . . . . . . . . . . . . 337 set date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 30 Contents show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 show all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 show date . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 show detailed-stats . . . . . . . . . . . . . . . . . . . . . 339 show detailed-version . . . . . . . . . . . . . . . . . . . . 341 show hardware . . . . . . . . . . . . . . . . . . . . . . . . 342 show meminfo . . . . . . . . . . . . . . . . . . . . . . . . . 342 show modelno . . . . . . . . . . . . . . . . . . . . . . . . . 343 show nvram . . . . . . . . . . . . . . . . . . . . . . . . . . 343 show performance . . . . . . . . . . . . . . . . . . . . . . 344 show ports . . . . . . . . . . . . . . . . . . . . . . . . . . . 348 show serialno . . . . . . . . . . . . . . . . . . . . . . . . . 349 show stats . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 show uptime . . . . . . . . . . . . . . . . . . . . . . . . . . 351 show version . . . . . . . . . . . . . . . . . . . . . . . . . . 351 status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354 Upgrade by Using HTTP . . . . . . . . . . . . . . . . . . . 355 Examples for system . . . . . . . . . . . . . . . . . . . . . . . . . 356 Display System Statistics . . . . . . . . . . . . . . . . . . . . 356 Set the System Date and Time . . . . . . . . . . . . . . . . 356 Display System Performance . . . . . . . . . . . . . . . . . . 356 Display a Banner. . . . . . . . . . . . . . . . . . . . . . . . . . 357 27 user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359 About the user Command . . . . . . . . . . . . . . . . . . . . . . 359 user Command Options . . . . . . . . . . . . . . . . . . . . . . . 360 add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 DD OS 4.9 Command Reference Guide 31 change. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 change password . . . . . . . . . . . . . . . . . . . . . . . . 361 change priv . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 disable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 password aging option reset . . . . . . . . . . . . . . . . 362 password aging option set . . . . . . . . . . . . . . . . . . 362 password aging option show . . . . . . . . . . . . . . . . 362 password aging reset . . . . . . . . . . . . . . . . . . . . . 362 password aging set . . . . . . . . . . . . . . . . . . . . . . 363 password aging show . . . . . . . . . . . . . . . . . . . . . 363 password strength show . . . . . . . . . . . . . . . . . . . 363 password strength reset . . . . . . . . . . . . . . . . . . . 364 password strength set . . . . . . . . . . . . . . . . . . . . 364 reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 show active . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 show detailed . . . . . . . . . . . . . . . . . . . . . . . . . . 365 show list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 user Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Add a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Remove a User . . . . . . . . . . . . . . . . . . . . . . . . . . . 366 Change a Password. . . . . . . . . . . . . . . . . . . . . . . . . 366 Change a Privilege Level . . . . . . . . . . . . . . . . . . . . . 366 Reset to the Default User . . . . . . . . . . . . . . . . . . . . 366 32 Contents Display Current Users . . . . . . . . . . . . . . . . . . . . . . 367 Display All Users. . . . . . . . . . . . . . . . . . . . . . . . . . 368 28 vtl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 About the vtl Command . . . . . . . . . . . . . . . . . . . . . . . 370 Options for the vtl Command . . . . . . . . . . . . . . . . . . . 371 add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 cap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 cap add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 cap del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 del. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 drive add . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 drive del . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 export . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 group add . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 group create . . . . . . . . . . . . . . . . . . . . . . . . . . 376 group del . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 group destroy . . . . . . . . . . . . . . . . . . . . . . . . . 377 group modify . . . . . . . . . . . . . . . . . . . . . . . . . 377 group rename . . . . . . . . . . . . . . . . . . . . . . . . . 379 group show . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 group use . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 DD OS 4.9 Command Reference Guide 33 import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 Rules for the Number of Tapes Imported . . . . . . . . 381 initiator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 initiator reset address-method . . . . . . . . . . . . . . 381 initiator reset alias . . . . . . . . . . . . . . . . . . . . . . 381 initiator set address-method . . . . . . . . . . . . . . . . 382 initiator set alias . . . . . . . . . . . . . . . . . . . . . . . . 383 initiator show . . . . . . . . . . . . . . . . . . . . . . . . . . 383 option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 option disable . . . . . . . . . . . . . . . . . . . . . . . . . . 384 option enable . . . . . . . . . . . . . . . . . . . . . . . . . . 385 option reset loop-id . . . . . . . . . . . . . . . . . . . . . . 385 option set loop-id . . . . . . . . . . . . . . . . . . . . . . . 385 option show . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 pool add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 pool del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 pool show . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 port disable . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 port enable . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 port show detailed-stats . . . . . . . . . . . . . . . . . . . 387 port show hardware . . . . . . . . . . . . . . . . . . . . . . 388 port show stats . . . . . . . . . . . . . . . . . . . . . . . . . 388 port show summary . . . . . . . . . . . . . . . . . . . . . . 389 reset hba . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 34 Contents show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 show config . . . . . . . . . . . . . . . . . . . . . . . . . . 389 show element-address . . . . . . . . . . . . . . . . . . . 390 show stats . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 slot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 slot add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 slot del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 tape. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392 tape add . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392 tape del . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393 tape modify retention-lock . . . . . . . . . . . . . . . . 394 tape modify writeprotect . . . . . . . . . . . . . . . . . 395 tape move . . . . . . . . . . . . . . . . . . . . . . . . . . . 395 tape show . . . . . . . . . . . . . . . . . . . . . . . . . . . 396 Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 Add a VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 Move Tapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 Manually Import and Export Tapes . . . . . . . . . . . . . . 398 Important Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 Tape Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401 Tape Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . 401 Data Structures . . . . . . . . . . . . . . . . . . . . . . . . . . 402 Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 DD OS 4.9 Command Reference Guide 35 A MIB Reference . . . . . . . . . . . . . . . . . . . . . . . . 403 About the MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 MIB Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Top-Level Organization of the MIB . . . . . . . . . . . . . . . . . 404 The MIB in Text Format . . . . . . . . . . . . . . . . . . . . . . . . 405 Entries in the MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 Important Areas of the MIB . . . . . . . . . . . . . . . . . . . 408 Alerts (.1.3.6.1.4.1.19746.1.4) . . . . . . . . . . . . . . . . . 408 Data Domain MIB Notifications (.1.3.6.1.4.1.19746.2) . . 409 Filesystem Space (.1.3.6.1.4.1.19746.1.3.2) . . . . . . . . 428 Replication (.1.3.6.1.4.1.19746.1.8) . . . . . . . . . . . . . 430 NFS (.1.3.6.1.4.1.19746.1.9) . . . . . . . . . . . . . . . . . . 432 CIFS (.1.3.6.1.4.1.19746.1.10) . . . . . . . . . . . . . . . . . 434 VTL (.1.3.6.1.4.1.19746.1.11) . . . . . . . . . . . . . . . . . 436 36 Contents About This Guide This guide explains how to manage the Data Domain® system with an emphasis on procedures using the Command Line Interface (CLI). This preface describes individual chapters, related documentation, conventions, and audience, and provides contact information. Chapter Summaries The DD OS 4.9 Command Reference Guide includes the following chapters: About the CLI adminaccess alerts Gives general CLI information, including shortcuts. See “About the CLI” on page 43. Manages the HTTP, FTP, Telnet, and SSH services. See “adminaccess” on page 47. Creates alerts for system problems. Alerts are emailed to Data Domain and to a userconfigurable list. See “alerts” on page 59. Creates aliases for Data Domain system commands. See “alias” on page 67. Manages NIS users, domains, groups and servers. See “authentication” on page 71. Generates a system status and health report. Reports are emailed to Data Domain and to a user-configurable list. See “autosupport” on page 75. alias authentication autosuppport DD OS 4.9 Command Reference Guide 37 See “license” on page 181. See “migration” on page 195. About This Guide cluster config disk enclosure filesys help license log migration net nfs 38 . Displays file system status and statistics. and RAID layout and usage. Manages a Data Domain Global Deduplication Array. See “enclosure” on page 137. See “disk” on page 119. Displays NFS status and statistics. Displays the network status and sets up failover and aggregation. status.cifs Manages Common Internet File System access on a Data Domain system and displays CIFS status and statistics for a Data Domain system. which consists of one or two Data Domain systems. See “help” on page 179. See “cifs” on page 85. resets. See “filesys” on page 147. usage. See “log” on page 185. Moves all data from one Data Domain system to another. Displays a list of all Data Domain system commands and detailed explanations for each command. Displays disk statistics. and saves Data Domain system configuration settings. See “nfs” on page 233. copies. and manages the clean feature that reclaims physical disk space held by deleted data. See “net” on page 205. See “cluster” on page 105. Displays and administers the Data Domain system log file. Shows. Identifies and displays information about the Data Domain system and expansion shelves. reliability indicators. See “config” on page 111. Displays current licensed features and allows adding or deleting licenses. Manages file system snapshots. faults. A snapshot is a read-only copy of the Data Domain system file system from the directory /backup. Allows a Data Domain system to be a storage server for Symantec’s NetBackup OpenStorage feature. See “ost” on page 245. Displays Data Domain system status. replication route snapshot snmp support system user vtl MIB DD OS 4. See “vtl” on page 369. See “ntp” on page 241. Administers user accounts for the Data Domain system. Manages the Replicator for mirroring of backup data from one Data Domain system to another. See “route” on page 305. Sends log files to Data Domain Technical Support. manages.ntp ost Manages Data Domain system access to one or more time servers. Manages Data Domain system network routing rules. See “system” on page 333. Creates. See “snapshot” on page 311. Displays data about the Data Domain MIB. See “support” on page 331. See “snmp” on page 323. Enables or disables SNMP access to a Data Domain system. adds community strings. See “replication” on page 261. and reboots a Data Domain system.9 Command Reference Guide 39 . and gives contact and location information. halts. See “user” on page 359. disables. and statistics. See “MIB Reference” on page 403. and deletes Virtual Tape Libraries (VTLs) on a Data Domain system. and enables. which is shipped with your Data Domain system. and powering it on.Related Documents The Data Domain system Installation and Setup guide. under Integration Documentation. under Product Documentation. provides instructions for installing your Data Domain system.com/documentation provides access to three categories of documents that are related to use of Data Domain products: • • • End-user documents. These matrices include the following information: About This Guide 40 .9 Initial Configuration Guide for additional information.9 Administration Guide DD OS 4. under Compatibility Matrices. Matrices that show which components are compatible with each other. DD690g. and so forth) The Data Domain Hardware Overviews for each platform family Data Domain Hardware Guide (for older platforms) • • Access to Related Documents at Data Domain The Documentation page at https://my.datadomain. Guides for how to integrate Data Domain systems with backup applications. connecting it to an administrative console.9. refer to the DD OS 4. After you have completed installing and powering on your system.9 Initial Configuration Guide Data Domain Expansion Shelf Hardware Guide Data Domain OpenStorage (OST) Administration Guide The Data Domain system Installation and Setup guides for each of the supported platforms (for example DD880. The following Data Domain system documentation provides additional information about the use of the system: • • • • • • Data Domain Software Release 4.x Release Notes DD OS 4. To view compatibility matrices. Click Compatibility Matrices. b. Click Integration Documentation. b.com/documentation. perform the following steps: a. click View under Documentation. Select the desired title from product menu and click View. c. Click the desired title. Log into the support portal at https://my. Select the desired title from the list and click View. Select the Data Domain model from the Platform list and click View. c. On the row for the correct Data Domain operating system (DD OS) version. To view integration-related documents. b. DD OS 4.datadomain.9 Command Reference Guide 41 . 3. click Product Documentation and then perform the following steps: a. To view user documents. 4. perform the following steps: a. 2.• • • • • Data Domain hardware product numbers Data Domain operating system (DD OS) versions Backup software versions Backup software server and client operating system versions Hardware driver versions Access Data Domain Documents 1. Select a vendor from the Vendor menu. command options.9 Command Reference Guide for complete descriptions of DD OS commands. Commands the user types at the command prompt (#). Command variables the user types at the command prompt (#). contact your contracted support provider or visit us online at https://my... Audience This guide is for system administrators who are familiar with standard backup software packages and general backup administration.) (bracket) arguments in the CLI. Typeface or Symbol Monospace Usage Commands.. Contacting Data Domain To resolve issues with Data Domain products. {arg1 | arg2} Pipe (|) and curly braces ({}) Choose (pipe) between a required argument (curly braces) in the CLI. Monospace bold Monospace italic bold Enter: # config setup # log view file_name Italic Book titles and variables.. Brackets ([]) One or more (list with [arg1.] and ellipses commas and ellipses) optional (.datadomain. parameters. 42 About This Guide . Examples Use the config command to manage the Data Domain system configuration settings.Conventions The following table describes the typographical conventions used in this guide. and computer output. Refer to theDD OS 4. . arg2.com. 9 Command Reference Guide 43 . fi sh can be typed for the command filesys show. Partial command matching is supported—only the unique letters of a command need be typed. then the command explanation appears. To find a keyword used in a command option. enter a question mark (?) at the CLI prompt. Use the up and down arrow keys to move through a displayed command buffer history list. the question mark followed by the keyword password displays all Data Domain system command options that include password. Use the SSH or Telnet (if enabled) utilities to access the command prompt. If the keyword matches a command. To display a detailed explanation of a particular command. To list CLI commands. To list the options for a particular command. Enter a slash character (/) and a pattern to search for to highlight lines of particular interest. such as net. Help pages are available through the help command. Use the q key to exit. enter the command with no options at the prompt. option descriptions. For example. for example. • • • • • • DD OS 4. enter the help command followed by a command name. and in many cases usage examples. The following are some general tips for using the CLI: • Each command also has an online help page that provides the complete command syntax.1 About the CLI A Data Domain system can be administered through a command line interface. enter a question mark (?) or the help command followed by the keyword. 048. CLI Shortcuts Recall Commands Ctrl+P or Down Arrow Ctrl+N or Up Arrow Retrieve the previous command from the history buffer. Write. entering syst(Tab) sh(Tab) st(Tab) displays the command system show stats. Delete the character before the cursor (same as Delete key). Any Data Domain system command that accepts a list. Retrieve the next command from the history buffer.073. such as a list of IP addresses.099. About the CLI .776 bytes • • Note: The one exception to displays in powers of 2 is the system show performance command. spaces.511.576 bytes 1 GiB = 230 bytes = 1. in which the Read.741.627. Tab completion works for the first three levels of command components.• The Tab key completes a command entry when that entry is unique. or both. and Replicate values are calculated in powers of 10 (1 KB = 1000). Commands that display the use of disk space or the amount of data on disks compute amounts using the following definitions: 1 KiB = 210 bytes = 1024 bytes 1 MiB = 220 bytes = 1. accepts entries separated by commas. For example.824 bytes 1 TiB = 240 bytes = 1. Delete all characters from the cursor to the end of the line. Delete Characters Ctrl+D Ctrl+H Ctrl+K 44 Delete the character at the cursor. 9 Command Reference Guide 45 . Move the cursor back one character. DD OS 4. Transpose Characters Ctrl+T Transpose the character at the cursor with the preceding character. Move the cursor forward one character. Delete all characters from the cursor to the beginning of the line. Move the cursor to the end of the line.Ctrl+U Ctrl+W Delete all characters on the line. Command Completion Tab or Ctrl+I Complete a partially typed keyword if enough characters are entered to uniquely identify it. Cursor Movement Ctrl+A Ctrl+B Ctrl+E Ctrl+F Move the cursor back to the start of the line. 46 About the CLI . Display hosts. Remove client administrative access to the DD system through a specified protocol. and the SSH key file. Manage Web options. Set the given access list to the factory defaults. or delete an SSH key from the key file. FTP. Disable a service.2 adminaccess The adminaccess command creates access control lists for the use of HTTP.9 Command Reference Guide 47 . Manage and display authentication. Page 48 Page 49 Page 50 Page 51 disable enable reset Page 51 Page 51 Page 52 show trust web Page 52 Page 53 Page 54 DD OS 4. Display the host or CA certificate. Manage trust with a given host. or remove the authorized SSH keys file from the Data Domain system. Enable a service. Telnet. The adminaccess command has the following options: add authentication certificate del Add hosts to a protocol or add an SSH public key. and SSH administrative protocols on the Data Domain system. status. spaces. For FTP. The FTP. the host-list can contain hostnames. or an asterisk (*) wildcard with a domain name. class-C IP addresses. and SSH administrative protocols on the Data Domain system. 48 adminaccess . a host is a fully-qualified domain hostname.conf file is updated. such as *.About the adminaccess Command The Data Domain system adminaccess command allows remote hosts to use the FTP.allow and /etc/hosts. class-C IP address. SSH. or the word all. HTTP. HTTPS. An asterisk (*) by itself means no restrictions. For HTTP/HTTPS. and Telnet protocols have hostmachine access lists that limit access. this command is available only to Data Domain system administrative users. • • • For HTTP and HTTPS. an IP address range. IP address with either netmasks or length. TCP wrappers are used and /etc/hosts. Telnet. or both. Except as noted for specific command options. FTP and Telnet are disabled.com.deny files are updated. By default. For SSH. and SSH.yourcompany. The SSH protocol is open to the default user sysadmin and to all Data Domain system users added with the user add command. HTTP. For multiple hosts. HTTPS. Apache's mod_access is used for hostbased access control and the /usr/local/apache2/conf/httpd-ddr. enter a list of entries separated by commas. adminaccess Command Options add add host-list adminaccess add {ftp | telnet | ssh | http | https} host-list Use this command to add hosts to a protocol. Telnet. trusted domain. to the SSH authorized keys file on the Data Domain system. and FTP using Windows domain group credentials. Refer to Add an Authorized SSH Public Key for more information. Use the key ~/. and the user name in double quotation marks. For administrative access. The SSH. The operation allows users to log in without giving a password. Telnet. or FTP command that accesses the Data Domain system must include the domain name. The command also gives user-level access (no administrative operations allowed) to all other users from the domain.” Users from both group names are always accepted as administrative users. a backslash. On the remote machine. Telnet. CIFS must be enabled and the Data Domain system must be part of a Windows domain. create a public key using the ssh-keygen command. created on a remote machine. Note: For this command to work.add ssh-keys adminaccess add ssh-keys [user username] Use this command to add an SSH public key. the user must be in either the standard Windows “Domain Admins” group or in a group that you create named “Data Domain.9 Command Reference Guide 49 .pub as generated on the remote machine by ssh-keygen as input to the add ssh-keys command. authentication authentication add cifs adminaccess authentication add cifs Use this command to allow Windows domain users who have no local account on the Data Domain system to access the system through SSH. Users must be from the domain that includes the Data Domain system or a related.ssh/id_dsa. DD OS 4. authentication reset cifs adminaccess authentication reset cifs Use this command to reset the Windows user access to the default of requiring a local account for administrative access to the Data Domain system. # adminaccess authentication show CIFS authentication: disabled certificate certificate show adminaccess certificate show {ca | host} Use this command to display the host or CA certificate. For example: # adminaccess certificate show ca Cert Type Root CA Subject dd120-18. authentication show adminaccess authentication show Use this command to display the current value of the setting that allows a Windows administrative user to access a Data Domain system when no local account exists. This command is available to all users.com Valid From Tue Oct 14 13:39:35 2008 Valid Until Thu Oct 7 12:39:35 2038 Finger Print D6:E2:7B:55:F8:90:E9:27 50 adminaccess . For example.datadomain.authentication del cifs adminaccess authentication del cifs Use this command to prevent authentication against a Windows domain and to allow administrative access only for those users who have local user accounts on the Data Domain system. Users may delete their own keys. You can enter a list that is separated by commas. DD OS 4.del del adminaccess del {ftp | telnet | ssh | http} host-list Use this command to remove hosts (IP addresses. del ssh-keys adminaccess del ssh-keys lineno [user username] Use this command to delete an SSH key from the key file. This command is available to administrative users only. This command is available to administrative users only. By default. spaces. HTTP. hostnames. Disabling FTP or Telnet does not affect entries in the access lists. HTTP and HTTPS allow users to log in through the Web-based graphical user interface. HTTP. you must also add host machines to the access lists. or asterisk (*)) from the FTP. To use FTP and Telnet. SSH. or Telnet access lists. the SSH. If all services are disabled.9 Command Reference Guide 51 . The lineno is a line number as displayed by the adminaccess show ssh-keys command. enable adminaccess enable {http | https | ftp | telnet | ssh | all} Use this command to enable a protocol on the Data Domain system. Administrators may delete any user’s keys. Use adminaccess show ssh-keys to get the line number value for the key to delete. and HTTPS services are enabled and FTP and Telnet are disabled. or both. disable adminaccess disable {http | https | ftp | telnet | ssh | all} Use this command to disable a service on the Data Domain system. the Data Domain system is accessible only through a serial console or keyboard and monitor. This command is available to administrative users only. Administrators can reset SSH keys for themselves (by omitting the user option) or for other users. An N/A in the Allowed Hosts column means that the service does not use a list. Regular users can only reset the SSH keys for their own account. An asterisk means all hosts are allowed. This command is available to administrative users only. reset ssh-keys adminaccess reset ssh-keys [user username] Use this command to remove the authorized SSH keys file for a user specified user or for the operator account from the Data Domain system. but currently has no hosts in the list. show show adminaccess show Use this command to display every access service available on a Data Domain system.reset reset adminaccess reset {ftp | telnet | ssh | http | all} Use this command to reset the FTP. and Telnet protocols to their default states and clear the access lists of host entries. HTTP. whether or not the service is enabled. A dash (-) means that the service can have a list. every SSH connection needs password authentication. For example: # adminaccess show Service Enabled ------------ssh yes telnet no ftp no http yes https yes ------------52 Allowed Hosts ------------* ------------adminaccess . and a list of hostnames that are allowed access through each service that uses a list. After you remove the file. SSH. Doing so can cause Global Deduplication Array management to fail. you can view the trust relationships and their details by using the adminaccess trust show command. As nodes are added to the Global Deduplication Array by using the cluster add command. You can view these trust relationships with the trust commands. the sysadmin password is not required for setting up the management of the external Data Domain system (because the trust has been already established). trust You can add trust between Data Domain systems for group and Global Deduplication Array management purposes. DD OS 4. • Group management in the Enterprise Manager is based on trust relationships between nodes. If you add the trust relationship from the DD OS command line.9 Command Reference Guide 53 . The trust commands let administrators manage trust relationships. Web options: Option --------------http-port https-port session-timeout --------------- Value ----80 443 10800 ----- show ssh-keys adminaccess show ssh-keys [user username] Use this command to display the SSH key file with a line number for each entry. Global Deduplication Array management is also based on trust relationships.This command is available to administrative users only. There are two scenarios where trust relationships are used. • Note: Do not delete trusts that involve Global Deduplication Array nodes. Administrators can view the SSH key files of any user. when a Data Domain system is imported into the EM for group management. Regular users can only view their own SSH key file. This command is available to all users. trust copy adminaccess trust copy {source | destination} hostname Use this command to copy the trust to or from the given host. web web option reset adminaccess web option reset [http-port | https-port | sessiontimeout] Use this command to reset all Web options or the specified Web option to their default values.trust add adminaccess trust add hostname [type mutual] Use this command to establish trust with the given host. 54 adminaccess . web option set http-port adminaccess web option set http-port port-number Use this command to set the http access port for the Web client. Port 80 is set by default. trust show adminaccess trust show hostname Use this command to show the list of trusted Certificate Authorities (CAs). The type mutual option establishes mutual trust with that host. The type mutual option removes the mutual trust from that host. trust del adminaccess trust del hostname [type mutual] Use this command to remove trust from the given host. web option set https-port adminaccess web option set https-port port-number Use this command to set the https access port for the Web client. web option set session-timeout adminaccess web option set session-timeout timeout-in-secs Use this command to set the Web client session timeout. web option show adminaccess web option show Use this command to show the current values for the Web options. Port 443 is set by default.9 Command Reference Guide 55 . The output of this command may look like: # adminaccess web Option --------------http-port https-port session-timeout --------------option show Value ----80 443 10800 ----- DD OS 4. 10800 seconds is set by default. dd10 in this example. 3. On the remote machine. jsmith > ssh-keygen -d Generating public/private dsa key pair. On the remote machine.pub 56 adminaccess .com To add a range of IP addresses to the Telnet access list: adminaccess add telnet 10. Press Enter to accept the file location and other defaults.adminaccess Examples Configuring adminaccess Add a Host To add the host srvr24 to the Telnet access list: adminaccess add telnet srvr24. Enter file in which to save the key (/home/jsmith/.24. create the public and private SSH keys.20.0/24 Add an Authorized SSH Public Key The following steps create a key on a UNIX-based system and then write the key to a Data Domain system: 1. 2.yourcompany. The public key created under /home/jsmith/.ssh/id_dsa.yourcompany.ssh (in this example) is id_dsa. The Data Domain system asks for the user’s password before accepting the key: jsmith > ssh -l sysadmin dd10 “adminaccess add sshkeys user jsmith” \< ~/.pub. write the public key to the Data Domain system.com To add all hosts in a domain to the Telnet access list: adminaccess add telnet *.ssh/id_dsa): . For example.9 Command Reference Guide 57 . ssh -l sysadmin dd10 filesys status sysadmin@dd10’s password: The filesystem is enabled You can create a file with a number of Data Domain system commands. a file named cmds11 could contain the following commands: filesys status system show uptime nfs status The login and the returned data look similar to the following: ssh -l sysadmin dd10 < cmds11 sysadmin@dd10’s password: The filesystem is enabled 3:00 pm up 14 days 10 hours 15 minutes 1 user. and returns output from the command filesys status.Return Command Output to a Remote Machine Using SSH.00. see Add an Authorized SSH Public Key on page 56 to eliminate the need for a password.00 Filesystem has been up 14 days 10:13 The NFS system is currently active and running Total number of NFS requests handled = 314576 To use scripts that return output from a Data Domain system. DD OS 4. the following command connects with the machine dd10 as user sysadmin. asks for the password.00. load average: 0. Output from all the commands is returned. 0. For example. 0. with one command on a line. and then use the file as input to the login. you can have output from Data Domain system commands return to a remote machine at login and then automatically log out. 58 adminaccess . Page 60 Delete an email address from the alert mailing list. Alerts are sent with either a WARNING or a CRITICAL severity. Alerts of WARNING severity are sent to the recipients specified in the autosupport email list (see autosupport on page 75). The full list of traps sent are described in the snmp chapter (and are also documented in the MIB). Alerts happen whenever the Restore Protection Manager discovers a problem with software or a monitored hardware component. The alerts command has the following options: add del clear reset show test Add an email address to the alert mailing list. or the alert mailing list. alert history. Clear one or more active alerts. All alerts are sent as email (either immediately or via the Daily Alert Summary) and a subset of alerts are also sent as SNMP traps. DD OS 4. such as current alerts. Alerts of CRTICAL severity are sent to the recipients specified in the alerts email list.3 alerts Use the alerts command to manage the alert email list. add your email address to both lists. To receive both WARNING and CRITICAL alerts. Send a test email. Reset the alert mailing list to the default. Page 60 Page 60 Page 60 Page 61 Page 62 About the alerts Command The alerts command manages who receives email notification for system alerts. Display alert information.9 Command Reference Guide 59 . This command is available to administrative users only. The email-list is a list of email addresses that are separated by commas.datadomain. clear alerts clear alert-id alert-id-list Use this command to clear a specified alert. or both. del alerts del email-list Use this command to delete email addresses from the list. By default. After adding to the list. The email-list is a list of email addresses that are separated by commas. reset alerts reset Use this command to set the email alerts list to the factory default of autosupport-alert@autosupport. always use the alerts test command to test for mailer problems.com. or hyphens. spaces. The alert-id-list is a list of active alert IDs separated by commas. This command is available to administrative users only. spaces. This command is available to administrative users only. the list includes an address for Data Domain support staff. This command is available to administrative users only. 60 alerts .alerts Command Options add alerts add email-list Use this command to add email addresses to the list that receives system alert emails. or both. spaces. the display reports the most recent date of a system reboot. show daily alerts show daily Use this command to display current alerts and the alerts events history for the last 24 hours.9 Command Reference Guide 61 . Enter a slash character (/) and a pattern to search for and highlight lines of particular interest. Each type of alert maintains only one message in the current alerts list. The list of current alerts includes all alerts that are not corrected. not every reboot. show all alerts show all Use this command to display the alerts email list and the administrator email address. An alert is removed from the display when the underlying situation is corrected. Use the up and down arrow keys to move through the log. which includes an address for Data Domain support. show current alerts show current Use this command to display alerts for all situations that have not been dealt with. For example.show show alerts-list alerts show alerts-list Use this command to display the alerts email list. For example. Look in the system log files for current and previous messages. Use the q key to exit. along with the current list of active alerts. Addresses that you add to the list appear as local or fully-qualified addresses exactly as you enter them. DD OS 4. an alert about a fan failure is removed when the fan is replaced with a working unit. always use this operation to test for mailer problems. The event history file includes one line (date and reason) for every system alert. which hold messages for up to ten The alerts history lists alerts messages from all of the existing weeks. Enter a slash character (/) and a pattern to search for and highlight lines of particular interest. Use the up and down arrow keys to move through the log. 62 alerts . messages system log files. After adding addresses to the email list. test alerts test [email-addr] Use this command to send an email to all addresses on the alerts list or to one or more specified addresses.show history alerts show history Use this command to display the alerts events history file. Use the q key to exit. com Remove from the Email List To remove an email address from the alerts list. use the command: alerts del jsmith@yourcompany. use the alerts show alerts-list command.com Display the Email List To display all email addresses in the alerts list.com admin12
[email protected]. The display is similar to the following: # alerts show alerts-list Alerts email: autosupport@datadomain. use the command: alerts add
[email protected] Managing alerts Test the Email List To test for the address
[email protected] Examples Configuring alerts Add to the Email List To add the email addresses
[email protected] Command Reference Guide 63 .com to the alerts email list.com DD OS 4.com: alerts test
[email protected] and bjones@yourcompany. bjones@yourcompany. com admin@yourcompany. ----------------------------------There is 1 active alert. use the alerts show current command.com No active alerts.----------------------------------There is 1 active alert.Display the Email List and Administrator Email To display all email addresses on the alerts-list.com Alerts email autosupport@datadomain. Display Current Alerts To display current alerts. The command returns entries similar to the following: # alerts show current Alert Id Alert Time Description ----------------------------------47 Wed Sep 23 07:46 Space in Data Collection is 100% full (exceeds 100% threshold).com admin12 jsmith@company. Display Current Alerts and Recent History To display the current alerts and the alerts history over the last 24 hours.----------------------------------42 Nov 12 18:54 Rear fan #1 failure: Current RPM is 0. 64 alerts . use the alerts show daily command. use the alerts show all command: The administrator address appears twice: # alerts show all The Admin email is: admin@yourcompany. The display is similar to the following: # alerts show daily Current Alert ------------Alert Id Alert Time Description -------. nominal is 8000 -------. which generates an alerts email. fan. Enter a slash character (/) and a pattern to search for and highlight lines of particular interest. Use the q key to exit.9 Command Reference Guide 65 . The display is similar to the following: # alerts show history Alert Time Description -------------------------------Nov 11 18:54:51 Rear fan #1 failure: Current RPM is 0. use the alerts show history command.Recent Alerts and Log Messages -----------------------------Nov 5 20:56:43 localhost sysmon: EMS: Rear fan #2 failure: Current RPM is 960. Consider adding pager email addresses to the alerts email list so that someone is informed immediately about system problems. For example. multiple fan failures can cause a system to begin overheating. nominal is 8000 -------------------------------- Important Notices The alerts feature sends an email whenever a critical component in the system fails or is known. Use the up and down arrow keys to move through the display. to be out of the acceptable range. and CPU in the Data Domain system is monitored. Temperature extremes are also monitored. DD OS 4. nominal is 8000 Display the Alerts History To display the history of alerts messages. Each disk. through monitoring. nominal is 8000 Nov 11 18:54:53 system rebooted Nov 12 18:54:58 Rear fan #2 failure: Current RPM is 0. 66 alerts . and display command aliases for the Data Domain system command set. Each user can view and use aliases only for those commands that are available at that user's permission level. The default aliases and their corresponding Data Domain system commands are: date df hostname ifconfig iostat netstat nfsstat passwd ping poweroff reboot DD OS 4. Page 68 Page 68 Page 68 Page 68 About the alias Command The alias command allows you to add. Show the list of aliases.9 Command Reference Guide system show date filesys show space net show hostname net config system show detailed-stats net show stats nfs show stats user change password net ping system poweroff system reboot 67 . and display command aliases. delete. delete.4 alias Use the alias command to create. Reset the list of aliases to the default. Remove an alias. The alias command has the following options: add del reset show Add a command alias. show alias show Use this command to display all aliases and their command definitions. reset alias reset Use this command to return to the default alias list."). The new alias is available only for the user that adds the alias. removing all user-added aliases. Give the name for the alias and then give the complete Data Domain system command enclosed in double quotation marks (". 68 alias ... del alias del Use this command to delete an alias by name.sysstat traceroute uname uptime who system show stats route trace system show version system show uptime user show active alias Command Options add alias add Use this command to add a command alias. 9 Command Reference Guide 69 .alias Examples Add an Alias The following command adds an alias named rely for the Data Domain system command that displays disk reliability statistics: # alias add rely "disk show reliability-data" DD OS 4. 70 alias . The authentication command has the following options: disable domain enable groups reset servers show status Disable the NIS client. and server names.9 Command Reference Guide 71 . NIS adds a global directory which authenticates users from any host on the network. which keeps a centralized repository of users. Manage NIS groups. Page 71 Page 72 Page 72 Page 72 Page 73 Page 73 Page 74 Page 74 About the authentication Command The authentication nis command allows the Data Domain system to participate in an active Network Information Service (NIS) domain.5 authentication Use the authentication command to manage NIS users. Manage NIS servers. authentication Command Options disable authentication nis disable Use this command to disable the NIS client. Enable the NIS client. Manage NIS domains. Display NIS status. Display NIS information. groups and servers. domains. Reset NIS to the default settings. groups. This command is available to administrative users only. DD OS 4. domain set authentication nis domain set domain [servers server-list] Use this command to set the NIS domain name and optionally to add NIS servers to the server-list.domain domain reset authentication nis domain reset Use this command to reset the NIS domain name. This command is available to administrative users only. The display is similar to the following: # authentication nis domain show NIS domain is "datadomain. This command is available to administrative users only. 72 authentication . groups groups add authentication nis groups add group-list priv {user | admin} Use this command to add the privileges for NIS users in the group-list as administrators or users. domain show authentication nis domain show Use this command to display the NIS domain name. This command is available to administrative users only.com". This command is available to administrative users only. enable authentication nis enable Use this command to enable the NIS client. This command is available to administrative users only. This command is available to administrative users only. groups reset authentication nis groups reset Use this command to delete all added NIS groups. groups show authentication nis groups show Use this command to display lists of both NIS user groups and NIS admin groups.9 Command Reference Guide 73 . servers servers add authentication nis servers add server-list Use this command to add NIS servers to the server-list. This command is available to administrative users only. This command is available to administrative users only. DD OS 4. reset authentication nis reset Use this command to delete the NIS configuration and set it to the default.groups del authentication nis groups del group-list priv {user | admin} Use this command to delete the privileges for NIS users in the group-list as administrators or users. servers del authentication nis servers del server-list Use this command to delete NIS servers from the server-list. servers show authentication nis servers show Use this command to display a list of NIS servers. The display is similar to the following: # authentication nis servers show NIS Servers: dd120-18 sysadmin@dd120-19# authentication nis show NIS Summary: Domain: datadomain. This command is available to administrative users only.servers reset authentication nis servers reset Use this command to reset the NIS servers to their default settings. The display is similar to the following: # authentication nis servers show NIS Servers: dd120-18 show authentication nis show Use this command to display the NIS configuration.com Servers: dd120-18 Admin Groups: User Groups: Enabled: No Status: N/A (NIS Disabled) status authentication nis status Use this command to display the NIS status. 74 authentication . a Reset the Autosupport Report schedule. In a Global Deduplication Array.a.b Send autosupport messages.a Display autosupport information. DD OS 4. About the autosupport Command The autosupport command automatically generates two reports on state of the system: the Autosupport Report and the Daily Alert Summary.b Reset the email list. The autosupport command has the following options: add del reset reset all reset schedule reset supportlist send set schedule show test Add entries to the autosupport list.9 Command Reference Guide 75 .a Delete entries from the autosupport list.m. b.a Reset autosupport parameters. The Autosupport Report is sent daily at 6:00 a. this command can be run on the master controller only.a Reset all autosupport parameters. Page 77 Page 77 Page 78 Page 78 Page 78 Page 78 Page 79 Page 80 Page 80 Page 82 a.a.6 autosupport Use the autosupport command to manage the system report. Schedule Autosupport Reports. This time is configurable. In a Global Deduplication Array. (local time for your system) to the autosupport email list. Test the autosupport email list. the autosupport email list and schedule set on the master controller are automatically propagated to the worker controller. The worker controller has a cluster information section and contains the cluster configuration. 76 autosupport . This time is not configurable. If the situation is not fixed.m. A failed fan should be replaced as soon as is reasonably possible. The Daily Alert Summary contains messages from alerts show current (see ‘Display Current Alerts on page 64) about non-critical hardware situations. the Data Domain system sends a Daily Alert Summary email to the autosupport email list. and some disk space usage numbers. An example is a fan failure. Using autosupport from the master controller in a Global Deduplication Array. The next sections display output from numerous Data Domain system commands and entries from various log files. extensive and detailed internal statistics and information are included to aid Data Domain in debugging system problems. but that should be dealt with soon. two additional sections are present: cluster information. Every morning at 8:00 a. and detailed cluster information.The first section of an Autosupport Report gives system identification and uptime information. Specifically. At the end of the report. (local time for your system). The purpose of this report is to highlight hardware or other failures that are not critical. it displays recent alerts and log messages above the severity level WARNING from the “messages” log file. the message also appears in the Daily Alert Summary. but the system can continue operation. licenses. Non-critical hardware problems generate email messages to the autosupport list. The second section shows Global Deduplication Array alerts. The first section shows the Global Deduplication Array configuration and status from the cluster show config and cluster status commands. and system performance. spaces. or both. use: # autosupport del jsmith@yourcompany. The email-list is a list of email addresses that are separated by commas. To add the email address
[email protected] del autosupport del email-list Use this command to delete email addresses from the list. (The autosupport email list contains the autosupport@autosupport. this command is run on the master controller only. The email-list is a list of email addresses that are separated by commas. use the command: # autosupport add
[email protected] Command Reference Guide 77 .com address by default. For example. to remove an email address from the list.) This command is available to administrative users only.com DD OS 4. In Global Deduplication Arrays.autosupport Command Options add autosupport add email-list Use this command to add email addresses to the list that receives system reports. or both. This command is available to administrative users only. In Global Deduplication Arrays. spaces. this command is run on the master controller only.datadomain.com to the list. reset reset all autosupport reset all Use this command to set all autosupport parameters to the factory defaults. In Global Deduplication Arrays. In Global Deduplication Arrays. this command is run on the master controller only. In Global Deduplication Arrays. This command is available to administrative users only. This command is available to administrative users only. 78 autosupport . this command is run on the master controller only and the email list and schedule set on the master controller are automatically propagated to the worker controller. reset support-list autosupport reset support-list Use this command to set the email list to the factory defaults. reset schedule autosupport reset schedule Use this command to set the system report schedule to the default (daily 0600). this command is run on the master controller only and the email list and schedule set on the master controller are automatically propagated to the worker controller. This command is available to administrative users only. use the command: # autosupport send djones@yourcompany. • • To send an autosupport message to djones@yourcompany. Enclose the command that is to generate output in double quotation marks.com. autosupport sends the output of the command to the address.send autosupport send [email-addr] [cmd "cmd"] Use this command to run the system report and email the results to either a single address (using the email-addr option) or all addresses on the autosupport list. • With an email address and a Data Domain system command. use: # autosupport send
[email protected] Command Reference Guide 79 . autosupport sends the command output to the autosupport list. When neither email addresses nor a command is specified. then an autosupport message is generated and sent to all email addresses in the autosupport list.com cmd “net show stats” DD OS 4.com To send the output of net stats show to djones@yourcompany. With only a command. Use a dash (-) between days for a range of days. show show all autosupport show all Use this command to display all autosupport parameters. For example. The display is similar to the following: # autosupport show all The Admin email is: admin@yourcompany.. the following command runs the report automatically every Tuesday at 4 a...com Autosupport is scheduled to run "Sun" at "0600" 80 autosupport .com
[email protected]. This command is available to administrative users only. 2400 is not a valid time. The schedule operation can specify a day (one or two numerals) or a day of the week (three letters) at a specific time (0000). Use 24-hour military time. mon 0000 is midnight between Sunday night and Monday morning.m: # autosupport set schedule tue 0400 The most recent invocation of the scheduling operation cancels the previous setting. this command is available only on the master controller. day time Use three letters (such as mon for Monday).]] time Use this command to set the verbose system report to run at a given frequency and a given time.com The Autosupport email list is: autosupport@datadomain. The default display includes only the Data Domain support address and the system administrator address (as given in the initial system configuration). Any additional addresses that you add to the list also appear.set schedule autosupport set schedule [daily | never | day1[. In a Global Deduplication Array. For example: tue-fri. Enter a forward slash (/) and a pattern to search for and highlight lines of particular interest. Use the up and down arrow keys to move through the log. Enter a forward slash (/) and a pattern to search for and highlight lines of particular interest. show schedule autosupport show schedule Use this command to display the system report schedule. Use the q key to exit. Use the q key to exit. Use the up and down arrow keys to move through the log.9 Command Reference Guide 81 . DD OS 4. The command returns entries similar to the following: # autosupport show history Nov 10 03:00:19 scheduled autosupport Nov 11 03:00:19 scheduled autosupport Nov 12 03:00:19 scheduled autosupport show report autosupport show report Use this command to run and display the normal system report.show history autosupport show history Use this command to display the event history file. which includes the date for each Autosupport Report. The display is similar to the following: # autosupport show schedule Autosupport is scheduled to run "Sun" at "0600" show support-list autosupport show support-list Use this command to display the autosupport email list. but not send email. 82 autosupport .m. After adding addresses to the email list.. Enter a slash character (/) and a pattern to search for and highlight lines of particular interest. always use this operation to test the new addresses. use the following command: # autosupport set schedule tue 1500 To schedule the system report for 2 p. send the system report to the specified address.m.1 to Data Domain Support. use: # autosupport send support@datadomain. use: # autosupport set schedule mon. Use this command with only an email address. Use the q key to exit.1" Managing autosupport Run the Autosupport Report Use the autosupport show report command to manually run and immediately display the Autosupport Report.fri 1400 To send a copy of the log file messages.test autosupport test [email-addr] Use this command with no email address to test-run the system report and email the results to all addresses on the autosupport list. every Monday and Friday. autosupport Examples Configuring autosupport Schedule the Autosupport Report To schedule the system report for every Tuesday at 3 p. Use the up and down arrow keys to move through the display.com cmd "log view messages. 0. 14:31.The display is similar to the following. At the end of the report. The operation displays entries from all of the messages system logs. The first section gives system identification and uptime information: # autosupport show report ========== GENERAL INFO ========== GENERATED_ON=Wed Feb 11 13:17:48 UTC 2009 VERSION=Data Domain OS 4. Use the J key to scroll down through the file. which hold messages for up to ten weeks.00 load The next sections display output from numerous Data Domain system commands and entries from various log files.com Display the autosupport History To display all autosupport messages. Display the autosupport Email List The autosupport email list includes an address for Data Domain support. average: 0.00.yourcompany.9 Command Reference Guide 83 . extensive and detailed internal statistics and information appear to aid Data Domain in debugging system problems.0. 2 users.00. Addresses that you add to the list appear as local or fullyqualified addresses exactly as you enter them.6. 0.com
[email protected] UPTIME= 1:17pm up 124 days.com LOCATION=Bldg12 room221 rack6 ADMIN_EMAIL=admin@yourcompany. and the Q key to exit. DD OS 4. use the autosupport show history command. The default display is similar to the following: # autosupport show support-list Autosupport Email List autosupport@datadomain. To display all email addresses in the alerts list. use the command autosupport show support-list.0-62320 SYSTEM_ID=Serial number: 22BM030026 MODEL_NO=DD560 HOSTNAME=dd10. the K key to scroll up. The command returns entries similar to the following: # autosupport show history Nov 10 03:00:19 scheduled autosupport Nov 11 03:00:19 scheduled autosupport Nov 12 03:00:19 scheduled autosupport 84 autosupport . Display the IP address for a specified NetBIOS name. ntfs-acls support. The cifs command includes the following options: add del disable enable hosts nb-lookup option Add a CIFS backup or administrative client. Disable CIFS clients from connecting to a Data Domain system.9 Command Reference Guide 85 . destroy. such as the log level. Delete a CIFS client. Page 86 Page 87 Page 88 Page 88 Page 88 Page 89 Page 89 reset Page 95 set Page 95 share Page 96 DD OS 4. enable. or display the CIFS options. or set the WINS server IP address to none. or modify a share. Set various CIFS options. reset an option to its default. disable. Add or remove an lmhosts mapping. set the NetBIOS hostname to none. Enable CIFS clients to connect to a Data Domain system. Set the authentication mode. or display share configurations for all shares or for a specified share. or reset it to the default. and the maximum number of open files. set the NetBIOS hostname. or set the WINS server IP address. remove CIFS client access. Create. Reset CIFS authentication mode to workgroup.7 cifs The cifs command manages CIFS (Common Internet File System) data access between a Data Domain system and Windows clients. com. except when adding the name of an individual client. and displays status and statistics for CIFS clients. which is for administrative use only. The client-list can contain class-C IP addresses. or collect data for CIFS performance analysis. Show whether or not CIFS is enabled.show Show active and allowed CIFS clients. Enter an asterisk (*) to add all clients on the network. The cifs command sets the authentication mode and CIFS options. Page 96 status troubleshooting Page 100 Page 100 About the cifs Command The cifs command. enables and disables access to a Data Domain system from media servers and other Windows clients that use the CIFS protocol. hostnames. a space. IP addresses with either netmasks or length. such as *. or both. or an asterisk (*) followed by a domain name. When entering the client list for the cifs add command: • • Separate clients in the list by a comma. cifs Command Options add Note: Data Domain recommends using the cifs share create command instead of the cifs add command. • 86 cifs .yourcompany. show the CIFS configuration. List CIFS users and groups. or show CIFS statistics. 9 Command Reference Guide 87 . Enter an asterisk (*) to add all clients on the network.add /backup cifs add /backup client-list Use this command to specify the CIFS backup clients that can access a Data Domain system’s /backup directory. Note: After a CIFS client name has been added. When entering the client list for the cifs del command: • • Separate clients in the list by a comma.yourcompany. or an asterisk (*) followed by a domain name. • DD OS 4.com). a space. hostnames. except when deleting the name of an individual client. or both. it needs to be configured to access the Data Domain system. Data Domain integration documents explain how to configure the client.com. The /backup directory is the target directory for compressed backup server data.datadomain. it must be enabled via the cifs enable command. Go to the Documentation > Integration Documentation page at the Data Domain Support Web site (https://my. which contains Data Domain system core and log files. Select the vendor for the client’s operating system and then select the appropriate tuning document. IP addresses with either netmasks or length. add /ddvar cifs add /ddvar client-list Use this command to specify the administrative clients that can access a Data Domain system’s /ddvar directory. If CIFS is not enabled on the Data Domain system. del Note: Data Domain recommends using the cifs share destroy command instead of the cifs del command. such as *. The client-list can contain class-C IP addresses. One IP address can have multiple hostnames. which contains Data Domain system core and log files. del /ddvar cifs del /ddvar client-list Use this command to specify administrative clients to remove from the list of clients that can access a Data Domain system’s /ddvar directory.del /backup cifs del /backup client-list Use this command to specify clients to remove from the list of CIFS backup clients that can access a Data Domain system’s /backup directory. enable cifs enable Use this command to enable the CIFS service on the Data Domain system and give clients CIFS access. hosts hosts add cifs hosts add ipaddr host-list Use this command to add an lmhosts mapping. thereby preventing CIFS clients from connecting to it. 88 cifs . The lmhosts file is a local text file that maps IP addresses to NetBIOS names. disable cifs disable Use this command to disable the CIFS service on the Data Domain system. DD OS 4. which is to remove all IP address and NetBIOS hostnames from the lmhosts file. option option reset cifs option reset name Use this command to reset the specified option to its default value.hosts del cifs hosts del ipaddr Use this command to remove the lmhosts mapping for the specified IP address. hosts reset cifs hosts reset Use this command to reset the lmhosts mapping to the default.9 Command Reference Guide 89 . hosts show cifs hosts show Use this command to display lmhosts mappings. nb-lookup cifs nb-lookup nb_hostname Use this command to display the IP address for the specified NetBIOS name when CIFS is enabled. the SAMBA idmap rid/tdb is used. such as dd admin group1. 90 cifs . Use the windows grp-name option to add groups or to map a default group number. These default group mappings are configured on a system: • • "dd admin group1" is mapped to the Windows group "Domain Admins. option set “dd admin groupn” cifs option set "dd admin groupn" ["windows grp-name"] Use this command to allow system administrative access via SSH. option set idmap-type cifs option set idmap-type {rid | none} Use this command to set the CIFS idmap-type. to a different Windows group name. • • When this option is set to rid (the default)." “dd admin group2” is not mapped to any group. Note: This option can be set to none only when ACL support is enabled using the cifs option set ntfs-acls {enabled | disabled} command. Telnet. and FTP for groups that exist on a Windows domain controller if CIFS administrative access is enabled on the Data Domain system with the adminaccess command.option set The cifs option set commands set the following CIFS options: option set allowtrusteddomains cifs option set allowtrusteddomains {enabled | disabled} Use this command to allow user access from domains that are trusted by the domain that includes the Data Domain system. The default value is disabled. all CIFS users are mapped to a local UNIX user named cifsuser belonging to the local UNIX group users. When the option is set to none. Note: A log level of 10 degrades system performance. Please reset the log level to 1 after debugging an issue. where value is an integer from 16384 to 65536. option set loglevel cifs option set loglevel value Use this command to set the level of detail in messages sent to the CIFS log file. the system uses 128. The system default is 0. option set maxopenfiles cifs option set maxopenfiles value Use this command to set the maximum number of open files. for example. Multiple interfaces must be separated by a space and enclosed within double quotation marks. "eth0 eth2". Use this command to restrict the CIFS server access to specified interfaces. where value is an integer from 128 to a suggested maximum of 10000. the CIFS server listens on all Data Domain system NIC-active interfaces. where value is an integer from 0 (zero) to 10. DD OS 4. The actual maximum is limited by the system resources.9 Command Reference Guide 91 .option set interfaces cifs option set interfaces value Use this command to set the interfaces network interfaces on which the CIFS server listens for client connections. The value is a list of interface names. option set maxxmit cifs option set maxxmit value Use this command to set the maximum transmit size. The default value is 10000. which sends the least-detailed level of messages. Because each open file requires a certain amount of memory. The default value is 16644. If value is set to less than 128. By default. the server could run out of memory if value is set too high. You can add the Data Domain system to any OU in the AD (active directory). When ACL support is disabled. The default value is disabled. which is Computers. use the cifs set authentication activedirectory command to join the domain. If CIFS is running. the system has limited ACL support in that you can set ACLs that can be represented in UNIX permission bits. For example: # cifs option set organizational-unit "Computers/Servers /ddsys units" # cifs set authentication active-directory YourCompany. After setting this option. 92 cifs . instead of the default OU.com Note: If the Data Domain system’s account is already in the default Computers or in another OU.option set ntfs-acls cifs option set ntfs-acls {enabled | disabled} Use this command to enable (the default) or disable ACL support. which allows anonymous connections. disable CIFS services. the computer account does not change to the newly specified organizational unit when the domain is rejoined. restrict-anonymous cifs option set restrict-anonymous {enabled | disabled} Use this command to control anonymous connections. option set organizational-unit cifs option set organizational-unit value Use this command to set the organizational-unit (OU). Note: CIFS must be disabled to set this option. 9 Command Reference Guide 93 . Increase memory for SMBD to avoid looping.option set smbd-mem-limit cifs option set smbd-mem-limit value Use this command to set the amount of memory available for SMBD connections. DD OS 4. New connections also slow down operations. Some backup applications open more SMBD sessions and connections if the system does not process SMBD operations as fast as expected. option show cifs option show Use this command to display the CIFS options.000. which might be the case when there is a large number of file deletions. The value is an integer from 52428800 to 1073741824 with a default value of 209715200. The value is an integer from 52428800 to 1073741824 with a default value of 157286400. option set winbindd-mem-limit cifs option set winbindd-mem-limit value Use this command to set the memory available for user accounts when the number of user accounts approaches 30. the backup and ddvar shares are also removed. which is none. which is none. which is workgroup. reset nb-hostname cifs reset nb-hostname nb_hostname Use this command to reset the NetBIOS hostname to the default. which does not grant access to any client. In addition. reset wins-server cifs reset wins-server Use this command to set the WINS server IP address to the default. reset clients cifs reset clients Use this command to reset the CIFS client access list for the backup and administrative clients (shared backup and ddvar) to the default. 94 cifs .reset reset authentication cifs reset authentication Use this command to reset the CIFs authentication to the default mode. set authentication nt4 cifs set authentication nt4 domain{[dc1[dc2. Only use this command to join NT4 domains. The entries in the domain controller list entries can be separated by commas. • (Optional) Specify multiple domain controllers (dc).. ask your domain administrator. Note: If you set NetBIOS hostname using the command cifs set nb-hostname. The Data Domain system automatically adds a host entry to the DNS server. If you do not know the domain type.9 Command Reference Guide 95 .: • The realm must be a fully qualified name. or both..]]/ | *} Use this command to set the authentication to the active directory. Note: Data Domain does not recommend specifying a domain controller. Instead. DD OS 4.. Otherwise. spaces. you are prompted for a user account. or a user in a domain that is a trusted domain of your company. so it is not necessary to manually create the DNS host entry for the Data Domain system.]]/ | *} Use this command to set the authentication mode to the NT4 domain. the entry is created for NetBIOS hostname instead of the system hostname. use set authentication active-directory instead. specify all controllers by entering an asterisk (*). To join an Active Directory domain (Windows 2000 and later). Enter either a user on your company’s domain. When you enter this command.set set authentication active-directory cifs set authentication active-directory realm {[dc1[dc2. This user must have permission to create accounts in your company’s domain. the system hostname is used.. Note: /backup subdirectory is not supported in Global Deduplication Array. If CIFS clients are using NetBIOS. 96 cifs . a WINS server may be needed to resolve NetBIOS names to IP addresses. set nb-hostname cifs set nb-hostname nb_hostname Use this command to set the NetBIOS hostname. max-connections The maximum number of connections to the share that are allowed at one time. set wins-server cifs set wins-server ipaddr Use this command to set the WINS server IP address. Note the command options: share-name path A descriptive name for the share. The path to the target directory.set authentication workgroup cifs set authentication workgroup workgroup Use this command to set the authentication mode to workgroup for the specified workgroup name. share share create cifs share create share-name path path {max-connections number | clients "client-list" | browsing {enabled | disabled} | writeable {enabled | disabled} | users "user-names" |comment "comment"} Use the share create command to add a share. in which case only the listed names can access the share. unless one or more user names are specified.160.client-list A comma-separated list of clients that are allowed to access the share. use: "host1. such as @group1. Note: All administrative users have write privileges. even if writable is disabled A comma-separated list of user names.host2" "host1.@group1" • The user names list can include group names. any white space (blank or tab) characters are treated as part of the user name because a Windows user name can have a space character in the name. For example.10. the default).host2" "host1. The share can be writable (enabled.9 Command Reference Guide 97 . which is the default). or not seen (disabled) by Web browsers. The list must be enclosed in double quotation marks. Examples of valid client lists include: "host1. which must be proceeded by the at (“@”) symbol. For example.116" DD OS 4.116" The share can be seen (enabled. not by spaces. Group names and user names should be separated only by commas. browsing writeable user-names comment A descriptive comment about the share. There can be spaces inside the name of a group.10. No blanks or tabs (white space) characters are allowed. by default. or not writable (disabled). The list must be enclosed in double quotation marks.user2" or "user1. "user1. but there should not be spaces between groups. Other than the comma delimiter.24.24.160. • All users in the client list can access the share. You can specify the clients by host name or IP address. 160.user2.Examples of invalid client lists include: "host1 " "host1 .user2" "user1.user3" "user1.@group1" " user-with-one-leading-space.user2" "user1.host2" "host1.116" Examples of valid user names lists include: "user1.24. 98 cifs . share modify cifs share modify share {max-connections number |clients "client-list" | browsing {enabled | disabled} |writeable {enabled | disabled} | users "user-names"} Use this command to modify a share configuration with the same configuration options as in the cifs share create command. share enable cifs share enable share share Use this command to enable a share. 10.116" "host1 10.user-with-two-trailing-spaces "user-with-a middle-space.24.160. share disable cifs share disable share share Use this command to disable a share.@CHAOS\Domain Admins" " share destroy cifs share destroy share share Use this command to delete a share. share show cifs share show share Use this command to display share configurations for all shares. Note: /backup subdirectory is not supported in Global Deduplication Array. Note: Use the cifs share show command to show client access information for custom shares. To remove a user list for the share. specify "usernames".9 Command Reference Guide 99 . DD OS 4. show show active cifs show active Use this command to display all active CIFS clients.except for its path. show config cifs show config Use this command to display the CIFS configuration. Modifications apply to new connections only. You cannot change the path for an existing share. show clients cifs show clients Use this command to display all allowed CIFS clients for the default /ddvar administrative share and the default /backup data share. See the share create command for a description of the command variables. or for a specified share. show detailed-stats cifs show detailed-stats Use this command to display statistics for every individual type of SMB operation. and print a list of operating systems with their client counts. The list counts the number of different IP addresses that are connected from each operating system. Specifically. writes. show stats cifs show stats Use this command to display statistics for SMB reads. In some cases the same client may use multiple IP addresses. and total operations. troubleshooting troubleshooting domaininfo cifs troubleshooting domaininfo Use this command to report domain information. status cifs status Use this command to display whether the CIFS service is enabled or disabled on the system. The next table describes the client statistics. Miscellaneous clients Yes means that the displayed list of clients is incomplete. Note: In the output display. Maximum connections This value is the maximum number of connections since the last reset. display CIFS client statistics. No means that the list is complete. it useful when you want to check the connectivity between the Data 100 cifs . the entry "Windows 2002 Service Pack 2 2600" is more commonly known as Windows XP. DD OS 4.Domain system and the domain or when you suspect that. enter these commands in succession: # cifs troubleshooting performance # support upload bundle troubleshooting users cifs troubleshooting user username Use this command to list details for a specified user.9 Command Reference Guide 101 . you have authentication issues. troubleshooting list-groups cifs troubleshooting list-groups Use this command to list all CIFS groups. troubleshooting groups cifs troubleshooting group groupname Use this command to list details for a specified group. troubleshooting performance cifs troubleshooting performance Use this command to collect tcpdump and ddfs traces for CIFS performance analysis. troubleshooting list-users cifs troubleshooting list-users Use this command to list all CIFS users. due to domain connectivity. If you are having performance problems. On the Data Domain system. add the list of clients that can access the system. browse to \\dd\backup and create the share directory. 3. for example. such as \\dd\backup\dir2. enter: # cifs share create user5 path /backup/user5 max-connections 5 clients "db1.cifs Examples Add a Share 1. To give Data Domain system administrative access to a Windows group named backup-admin and to map the Data Domain system "dd admin group1" to the group. use the Data Domain system name as the domain name.160.24. enter: # cifs share create share6 path /backup/share6 clients * users "sysadmin" Note: When mapping share6.domain.host2" users "domain\user5. 4. which are the clients that were given access to the system. 6. set share directory permissions or security options. To create a share named user5 and allow a maximum of five client connections with client access for a client named db1. use dd1\sysadmin. For example: # cifs share create dir2 path /backup/dir2 clients "host1.com" comment "user5 backups" To create a share named share6 and limit access to the share to the built-in CIFS user sysadmin. create the share and add users. On the Data Domain system. enter: # cifs option set "dd admin group1" "windows backup-admin" 102 cifs . For example: # cifs share create backup path /backup clients "10. On the CIFS client.116" 2.domain\user6" 5. On a CIFS client. 168. To add a subnet by using CIDR notation: # cifs share create test path /backup clients "192.0/255.Allow Class C Network Access to a Share To allow class C network access to a share.255.4.255.0/255.5.192.255.4.168.252.0/255.9 Command Reference Guide 103 .168.0/22" To add a subnet by using a class C network subnet mask: # cifs share create test path /backup clients "192.0.4.0" DD OS 4.255.255.168. use CIDR notation or the class C network's address and subnet mask to specify the client.0" To add two class C network subnets: # cifs share create test path /backup/test clients "192. 104 cifs . A standard Global Deduplication Array is comprised of two controllers. see the Data Domain Global Deduplication Administration Guide. Destroy filesystem on all controllers and separate all controllers from the Global Deduplication Array. Execute CLI commands locally on specific controllers.8 cluster The cluster command manages a Data Domain Global Deduplication Array. as opposed to running them for the Global Deduplication Array.9 Command Reference Guide 105 . The first controller is known as the master controller. The master controller manages the worker controller. add alerts create destroy Add controllers to a Global Deduplication Array. Create a new Global Deduplication Array (master controller only). Page 106 Page 106 Page 107 Page 107 run Page 108 show config status Page 109 Page 109 DD OS 4. Show the status of the file system and the network connectivity of Global Deduplication Array controllers. The cluster command includes the following options. Note: For more information. and the second as the worker controller. Show active alerts in the Global Deduplication Array. Display Global Deduplication Array membership information. even if there are no active alerts. An example summary of the number of alerts for each controller follows: Alerts from node “dd880-1.About the cluster Commands Only two of the cluster commands are allowed on the worker controller: cluster destroy and cluster show config. alerts cluster alerts show Use this administrative command to show active alerts in the Global Deduplication Array. storage capacity.com” (Serial No: 8DDXXXXXXX) 106 cluster . The second controller must be identical to the master controller in terms of DD OS software. If there is an alert for a controller. All of the controllers added to the Global Deduplication Array must have a Global-Deduplication license. Except for cluster status and cluster show config. The file system must be disabled on the master controller. To add the first controller. use the cluster create command. The second controller must have a pristine file system. cluster Command Options add cluster add node-name [license license-code] After creating a Global Deduplication Array. the alert time and a description of the problem are given. enter this administrative command from the master controller to add the second controller to the Global Deduplication Array. the cluster commands are for administrative use only. and hardware model.company. Each controller reports its alert status. The file system must be in a pristine state.com" (Serial No: 8DD6927005) No active alerts.datadomain.datadomain.9 Command Reference Guide 107 .An example from a two-controller Global Deduplication Array follows: sysadmin@dd690-43(Master:1)# cluster alerts show Alerts from node "dd690-43. The name you assign is the name by which the Global Deduplication Array is identified within the CLI and Data Domain Enterprise Manager.---------------. This command reboots all of the controllers in the Global Deduplication Array. This command must be executed on the master controller. Alerts from node "dd690-44.---------------. All of the controllers are converted to single-controller functionality. destroy cluster destroy cluster-name Use this administrative command to destroy the filesystem on all of the array’s controllers and to separate the controllers from the Global Deduplication Array.------------------------4 Thu Sep 24 11:13 Encl 2 (50050CC100100D33) Disk 15 has failed and should be replaced -------.com" (Serial No: 8DD6927006) Alert Id Alert Time Description -------. DD OS 4.------------------------There is 1 active alert. This command must be executed on the master controller. create cluster create cluster-name Use this administrative command to create a new Global Deduplication Array. run cluster run [host [host-list | all | worker ] cmd command Administrators can use this command to execute CLI commands for specific controllers locally. Global commands work for the entire array. • • command is the one of the local commands that you want to run on one or more of the array’s controllers. host-list is the list of hosts, represented by IP addresses or host names. Items are separated by commas. Below is an example of the output for the command net show hardware: # cluster run host all cmd net show hardware Command output from host dd690-43.datadomain.com: Data Domain OS 4.9.0.0-130539 Port Speed Duplex Supp Speeds Hardware Address Physical Link Status ---- -------- ------ ----------- ----------------- -------- --eth0 1000Mb/s full 10/100/1000 00:15:17:65:9a:a8 Copper yes eth1 1000Mb/s full 10/100/1000 00:15:17:65:9a:a9 Copper yes [...] ---- -------- ------ ----------- ----------------- -------- --Command output from host dd690-44.datadomain.com: Data Domain OS 4.9.0.0-130539 Port Speed Duplex Supp Speeds Hardware Address Physical Link Status ---- -------- ------ ----------- ----------------- -------- --eth0 1000Mb/s full 10/100/1000 00:15:17:65:c5:cc Copper yes eth1 1000Mb/s full 10/100/1000 00:15:17:65:c5:cd Copper yes [...] ---- -------- ------ ----------- ----------------- -------- --108 cluster show config cluster show config All users can run this command on any controller of the Global Deduplication Array to display array membership information. The following information is shown for each controller in the Global Deduplication Array: • • • • • • • Name: for example, dd880-1.company.com Serial Number Role: Master or Worker Management Interface: the IP address of the management interface for the controller. Data Interface: the IP address of the data interface. Replication Interface: the IP address of the replication interface. Global Deduplication Array Interface: the IP address of the Global Deduplication Array interconnect between the array’s controllers. Number: the number assigned to the controller; for example, 1, 2. • status cluster status [node node-name | all] All users can run this command to show the status for a specific controller or for all controllers in the Global Deduplication Array. You can run this command on the master controller only. If you enter cluster status without any options, a summary of the array’s status is displayed for each controller. This summary provides the following information: • Filesystem status, such as: The filesystem is enabled and running. • • Name: For example, dd880-1.company.com Role: Master or Worker 109 DD OS 4.9 Command Reference Guide • Interface Status, such as: Master: 3 up, 3 down Worker: 3 up, 3 down • Filesystem Status, such as: Filesystem up and running (Up) Filesystem has encountered a problem (Down) • Alerts: the number of alerts for each controller If you enter the cluster status command for a specified controller, only that controller’s status is displayed. To show the status of each controller in the Global Deduplication Array separately, enter: # cluster status all 110 cluster 9 config Use the config command to manage the Data Domain system configuration settings. The config command has the following options: reset set setup show Reset configuration settings. Configure configuration settings. Change multiple configuration settings. Display current configuration. Page 112 Page 113 Page 115 Page 116 About the config Command The config setup command brings up the same prompts as the initial system configuration. You can change any of the configuration parameters. All of the config operations, with the exception of show, are available only to administrative users. Note: You can also use other Data Domain system commands to change individual configuration settings. An example of an individual command that sets only one of the configuration possibilities is nfs add to add NFS clients. DD OS 4.9 Command Reference Guide 111 config Command Options reset reset location config reset location Use this command to reset the location description to the system default of a null entry. This command is available to administrative users only reset mailserver config reset mailserver Use this command to reset the mail server used by the Data Domain system to the system default of a mail. This command is available to administrative users only. reset timezone config reset timezone Use this command to reset the time zone used by the Data Domain system to the system default of US/Pacific. This command is available to administrative users only. 112 config set set admin-email config set admin-email email-addr Use this command to give the required address for alerts and autosupport emails to other recipients. The system needs only one administrative email address. Use the autosupport and alerts commands to add other email addresses. This command is available to administrative users only. For example, use the command: # config set admin-email
[email protected] The Admin Email is:
[email protected] To check the current setting, use the config show admin-email command. set admin-host config set admin-host host Use this command to set the machine from which you can log into the Data Domain system to see system logs and use system commands. The host name can be a simple host name, a host name with a fully-qualified domain name, or an IP address. The host is also added to the FTP and Telnet lists and (if the features are licensed) to the CIFS and NFS lists for access to /ddvar and /backup. This command provides a quick way to add authentication privileges. This command is available to administrative users only. For example, to set the administrative host to admin12.yourcompany.com, use: # config set admin-host admin12.yourcompany.com The System Admin host is admin12.yourcompany.com To check the current setting, use the config show admin-host command. DD OS 4.9 Command Reference Guide 113 set location config set location "location" Use this command to change the description of a Data Domain system’s location. A description of a physical location helps identify the machine when viewing alerts and autosupport emails. If the description contains one or more spaces, the description must be in double quotation marks. This command is available to administrative users only. For example, to set the location description to row2-num4room221, use : # config set location "row2-num4-room221" The system location is row2-num4-room221 To check the current setting, use the config show location command. set mailserver config set mailserver host Use this command to change the SMTP mail server used by the Data Domain system. This command is available to administrative users only. For example, to set the mail server to mail.yourcompany.com, use: # config set mailserver mail.yourcompany.com The Mail (SMTP) server is: mail.yourcompany.com To check the current setting, use the config show mailserver command. 114 config set timezone config set timezone zonename Use this command to set the system clock to a specific time zone. The default setting is US/Pacific. For the change to take effect for all currently running processes, you must reboot the Data Domain system. This command is available to administrative users only. For example, to set the system clock to the time zone that includes Los Angeles, California, USA, use: # config set timezone Los_Angeles To display time zones, enter a category or a partial zone name. The categories are Africa, America, Asia, Atlantic, Australia, Brazil, Canada, Chile, Europe, Indian, Mexico, Mideast, Pacific, and US. The following examples show the use of a category and the use of a partial zone name: # config set timezone us Ambiguous timezone name; matching... US/Alaska US/Eastern US/Michigan US/Aleutian US/East-Indiana US/Mountain US/Arizona US/Hawaii US/Pacific US/Central US/Indiana-Starke US/Samoa # config set timezone new Ambiguous timezone name; matching ... America/New_York Canada/Newfoundland setup config setup Use this command to change multiple essential configuration settings. The command displays the current value for each setting. Press the Enter key to retain the current value for a setting. This command is available to administrative users only. Many other Data Domain system commands change configuration settings. For example, the user command adds another user account each time a user is added. DD OS 4.9 Command Reference Guide 115 The display is similar to the following: # config show admin-email The Admin Email is: rjones@yourcompany. The display is similar to the following: # config show location The System Location is: bldg12 rm 120 rack8 116 config . if you gave one.com show admin-host config show admin-host Use this command to display the administrative host from which you can log into the Data Domain system to see system logs and use system commands.com show all config show all Display all config command settings show location config show location Use this command to display the Data Domain system location description.yourcompany.show show admin-email config show admin-email Use this command to display the administrative email address that the Data Domain system uses for email from the alerts and autosupport commands. The display is similar to the following: # config show admin-host The Admin Host is: admin12. use: # config set timezone Los_Angeles To find all time zones that include a match for new..9 Command Reference Guide 117 .show mailserver config show mailserver Use this command to display the name of the mail server that the Data Domain system uses to send email. The display is similar to the following: # config show timezone The Timezone name is: US/Pacific config Examples Configuring config Set the Timezone To set the time zone for the Pacific coast of the U. America/New_York Canada/Newfoundland DD OS 4.S. use: # config set timezone new Ambiguous timezone name.A.. matching .com show timezone config show timezone Use this command to display the time zone used by the system clock.yourcompany. The display is similar to the following: # config show mailserver The Mail (SMTP) server is: mail.. 118 config . Fail a disk and force reconstruction. DD OS 4. commands also include entries for all enclosures. Command output examples in this chapter show systems with 15 disk drives. or spindlegroup. Manage and display multipath information. usage. Display disk information. Assign a LUN group to the disk. Expand Data Domain system storage capacity. and reliability statistics.9 Command Reference Guide 119 . Each Data Domain system model reports on the number of disks actually in the system. Clear the disk performance statistics. Rescan all disks to look for newly removed or inserted disks or LUNs. disk enclosure. Flash a disk ID LED. logical (RAID) layout. Display the disk status. Show disk port information.10 disk Use the disk command to manage and display disk information The disk command has the following options: add beacon expand fail multipath port rescan reset set show status unfail Add a disk. On a Data Domain system that has one or more Data Domain external disk shelves. Page 120 Page 122 Page 122 Page 123 Page 123 Page 126 Page 127 Page 127 Page 127 Page 128 Page 133 Page 135 About the disk Command The Data Domain system disk command manages disks and displays disk locations. Unfail a disk and spare it. and RAID groups. disk Command Options add add dev disk add devdisk_id spindle-group 1-16 Use this command to add a new LUN to the current volume. The devid# format is the word dev and the number as seen in output from the disk show raid-info command. the LUN disk-id is assigned to the given spindle-group. Spindle-group 1 is the default spindle-group. Disk 12 in the first external shelf is labeled as 2. 9. 4. depending on the model. Each disk in an external shelf has two LEDs at the right edge of the disk carrier. to add a LUN with a devid# of 2 as shown by the disk show raid-info command. For example. The bottom LED is amber and glows steadily when the disk has failed. use: 120 disk . If the keyword spindle-group is specified.disk-id. use the disk rescan command and then use the disk show raid-info command. By default.12. A Data Domain system has 3. Each disk has two LEDs. 8. or 15 disks. The designated spindlegroup must be within the range of 1 through 16.12. The disk-identifying variable used in disk commands (except gateway-specific commands) is in the format enclosure-id. A Data Domain system is always enclosure 1 (one). For example. 12. A green or blue LED indicates disk activity. 7.disks. The top LED is green and flashes when the disk is accessed or when the disk is the target of a beacon operation. optionally assigning it to the specified spindle-group. To get the devid#. See the Data Domain Expansion Shelf Hardware Guide for details about disks in external shelves. and an amber or red LED indicates a failure or attention condition. An enclosure is a Data Domain system or an external disk shelf. disk 12 in a Data Domain system is labeled as 1. the device is assigned to the default spindle-group (1). . DD OS 4.# disk add dev2 To add a new LUN and assign it to a spindle-group... and so forth all the way up to 7 for the sixth added shelf. proceeding... Once the disk is added.. add enclosure disk add enclosure enclosure-id Use this command to add a Data Domain expansion shelf disk storage unit.... When creating new spindle-groups.... the filesystem should be re-started to load-balance correctly Notes: The disk add command adds a disk to the filesystem. destroy the filesystem. To remove an enclosure.. Are you sure? (yes|no|?) [no]: yes ok. when creating new spindle-groups. Please enter sysadmin password to confirm 'disk add': This command may take several minutes to complete. Once the disk is added.. please wait.9 Command Reference Guide 121 ... it cannot be removed from the filesystem without destroying the filesystem.] disk add device.. The enclosure-id is always 2 for the first added shelf.. The Data Domain system always has the enclosureid number of 1 (one). use: # disk add dev2 spindle-group 7 The 'disk add' command adds a disk to the filesystem.. 3 for the second. it cannot be removed from the filesystem without re-installing the restorer or destroying the filesystem. disk add device. the filesystem should be re-started to load-balance correctly.. Also. [success] This device has created a new spindle-group 7. [ ..... 3 expand disk expand Use this command to expand disk usage from eight disks plus one spare to 14 disks plus one spare for the DD510 and DD530. and there is at least one spare disk. (To check all disks in an enclosure. use the enclosure beacon command. For example.) This command is available to administrative users only. (To verify this. the in use line must show at least eight disks as in use. or six disks plus one to 11 disks plus one spare for the later Data Domain systems. Expansion can occur only when the first nine disks are not in a degraded state.disk-id Use this command to cause the LED on the right (that signals normal operation) on the target disk to flash. enter the disk status command. and the spare line must show at least one disk as spare. In the output. Press Ctrl+c to turn off the command. to flash the LED for disk3 in a Data Domain system.beacon disk beacon enclosure-id.) 122 disk . use: # disk beacon 1. fail disk fail enclosure-id. DD OS 4. DO NOT move a disk from one carrier to another. See show detailed-raid-info to list the available spares. A failed disk is automatically removed from a RAID disk group and is replaced by a spare disk (when a spare is available).9 Command Reference Guide 123 . This command works on gateway models only. Spare disks are supplied in a carrier for a Data Domain system or a carrier for an expansion shelf.disk-id Use this command to set a disk to the failed state. Enabling auto-failback means the primary path is used whenever it is available. with the exception of the DD120 and DD140. The command asks for a confirmation before carrying out the operation. The disk use changes from spare to in use and the status becomes reconstructing. which have only three disks (and no spare) so only one disk can be failed. This command is available to administrative users only. This command is available to administrative users only. Up to two disks in the head unit can be failed at the same time in most Data Domain systems. multipath option set auto-failback disk multipath option set auto-failback {enabled | disabled} Use this command to enable or disable auto-failback policy. This command is available to administrative users only. Always replace a failed disk as soon as possible. This command works on gateway models only. Disabling auto-failback means the user has to manually failback to the primary path when it becomes available again. multipath multipath failback disk multipath failback Use this command to manually force all disks to use the primary path. This command is available to administrative users only. This command is available to administrative users only. This command is available to administrative users only. multipath option show disk multipath option show Use this command to show whether multipath configuration monitoring and auto-failback are disabled or enabled. failures in paths to disk devices do not trigger alerts. multipath option reset monitor disk multipath option reset monitor Use this command to disable multipath configuration monitoring. even if the secondary path is still usable. When multipath configuration monitoring is enabled. 124 disk . which means disk multipath show history is not updated. Multipath configuration monitoring is disabled by default. The auto-failback option is enabled by default. multipath option reset auto-failback disk multipath option reset auto-failback Use this command to switch over to the primary path once it becomes available. failures in paths to disk devices trigger alerts and log multipath events.multipath option set monitor disk multipath option set monitor {enabled | disabled} Use this command to enable multipath configuration monitoring. The autofailback option is supported on gateway systems only. logging of multipath events is not done. When multipath configuration monitoring is disabled. Multipath configuration monitoring is disabled by default. The auto-failback option is supported on gateway systems only. If monitoring is disabled. for the specified enclosure only. multipath show stats disk multipath show stats [enclosure enc-id] Use this command to show statistics for all paths of all disks by default. multipath suspend disk multipath suspend port port-id Use this command to disallow I/O on specified initiator port. multipath show history disk multipath show history Use this command to show the history of multipath events.multipath reset stats disk multipath reset stats Use this command to clear the statistics of all paths to all disks in all expansion shelves.9 Command Reference Guide 125 . multipath resume disk multipath resume port port-id Use this command to allow I/O on specified initiator port. This command is available to administrative users only. This command is available to administrative users only. This command is available to administrative users only. or optionally. This command does not drop the FC link. DD OS 4. multipath status disk multipath status [port-id] Use this command to show multipath configurations and run time status. and to stop traffic on particular ports during scheduled maintenance of the SAN or storage array. and so forth. For each port.port port enable disk port enable port_id Use this command to enable the specified initiator port. the following information is shown: • • • • • • • Port number Command aborts Target resets Bus resets Host resets Device additions Device removals port show summary disk port show summary Use this command to show disk port information. port show stats disk port show stats Use this command to show disk port information. For each port. This command is available to administrative users only. the following information is shown: • • • • • Port number Connection type Link speed Connected enclosure IDs Status • Online disk 126 . This command is available to administrative users only. reset disk reset performance Use this command to reset disk performance statistics to zero. please wait. See show detailed-raid-info for displaying disk statistics. set set spindle-group disk set devdisk_id spindle-group 1-16 Use this command to assign a LUN group to the disk. proceeding.datadomain. the following message appears: Contact your contracted support provider or visit us online at https://my. Please enter sysadmin password to confirm 'disk set': This command may take several minutes to complete.• • Offline Disabled When a port is listed as disabled.com rescan disk rescan Use this command to check for new internal or external storage of all types.9 Command Reference Guide 127 . The result will be effective after the filesystem is restarted. This command is available to administrative users only. For example: # disk set dev1 spindle-group 8 The 'disk set' command assigns a lun-group to the disk/lun. This command is available to administrative users only. Are you sure? (yes|no|?) [no]: yes ok. DD OS 4. Disk dev1 has been added to spindle-group 8. The display may include a model ID. The firmware revision on each disk. The Data Domain convention for computing disk space defines one gigabyte as 230 bytes. The display for a Data Domain system has the columns: Disk LUN Port WWN system as a disk. 128 . Each LUN accessed by the Data Domain The LUN number given to a LUN on the thirdparty physical disk storage system. The manufacturer’s serial number for the disk.show show hardware disk show hardware Use this command to display the disks on a Data Domain system. The data storage capacity of the disk when used in a Data Domain system. disk Manufacturer/ Model Firmware Serial No. A label that identifies the manufacturer. The manufacturer’s model designation. giving a different disk capacity than the manufacturer’s rating. The world-wide number of the port on the storage array through which data is sent to the Data Domain system. RAID type. The firmware level used by the third-party physical disk storage controller. Capacity The enclosure and disk numbers. The display of disk information for a Data Domain system has the columns: Disk (enc/disk) Manufacturer/ Model Firmware Serial No. or other information depending on the vendor string sent by the storage array. The serial number from the third-party physical disk storage system for a volume that is sent to the Data Domain system. the display does not include information about individual disks. (Present for gateway systems only. show detailed-raid-info disk show detailed-raid-info Use this command to display RAID disk groups and disk status within each group. the base-2 equivalent of Gigabytes.88 GiB 232. Note: GiB = Gibibytes.) The display for disks in a Data Domain system is similar to the following: # disk show hardware Manufacturer/Model ----------------------Hitachi HDP725025GLA380 Hitachi HDP725025GLA380 Hitachi HDP725025GLA380 ----------------------Firmware -------GM2OA52A GM2OA52A GM2OA52A -------Serial No.1 1.2 1. RAID groups usually have a spare disk. The short example below does not include a spare disk.88 GiB 232.3 ---------- 3 drives present.Capacity Spindle-Group The amount of data in a volume sent to the Data Domain system. The spindle-group for this LUN.88 GiB ---------- Disk (enc/disk) ---------1.9 Command Reference Guide 129 . -------------GEL230RB0DMU8B GEL230RB0DRTSB GEL230RB0DTH8B -------------Capacity ---------232. DD OS 4. On a gateway system. 6 1.03 GiB) Raid Group (ext3_1):(raid-5)(33.2 1.8 ---Spare Disks Disk ---Unused Disks 1 disk group present Status ----------------State Additional Status ----------------- -----------in use (dg0) in use (dg0) in use (dg0) in use (dg0) in use (dg0) in use (dg0) in use (dg0) in use (dg0) ------------ ----------------- -----------1.1 1.Status: normal .9 Spare Note: MiB = Mebibytes.Status: normal . show failure-history disk show failure-history Use this command to display a list of serial numbers for all disks that have ever been failed in the Data Domain system.double redundant protection Disk ---1. the base-2 equivalent of Megabytes.2 1. Use the disk show hardware command to display the serial numbers of current disks.5 1.7 1. TiB = Tebibytes.3 1.4 1. 130 disk . the base-2 equivalent of Terabytes.# disk show detailed-raid-info Disk Group (dg0) Raid Group (ext3):(raid-0)(33.1 1.92 GiB) .3 ---State -----------in use (dg0) in use (dg0) in use (dg0) ---------------------------Additional Status ----------------- Raid Group (ppart):(raid-6)(412.03 GiB) .double redundant protection Disk ---1. MiBytes/s Busy The enclosure and disk numbers.111 MiB/s. The display is similar to the following: # disk show performance Disk Read Write Cumul. The average percent of time that each disk has at least one command queued. See reset for reset details.037 -----------------------------Cumulative 0.1 56 20 0. 0 % busy Busy ---0 % 0 % 0 % ---- Note: MiBytes = MiB = Mebibytes. the base-2 equivalent of Megabytes. DD OS 4.037 1. The average number of sectors per second written to each disk.3 57 20 0.037 1. (enc/disk) sects/s sects/s MiBytes/s -----------------------------1.2 57 20 0. Each column displays statistics averaged over time since the last disk reset performance command or since the last system power cycle. The average number of megabytes per second written to each disk. Disk (enc/disk) Read sects/s Write sect/s Cumul.show performance disk show performance Use this command to display disk performance statistics for each disk. The average number of sectors per second written to each disk. Command output from a gateway Data Domain system lists each LUN accessed by the Data Domain system as a disk.9 Command Reference Guide 131 . which disks have failed from a RAID point of view. Reconstruction is done on one disk at a time. The percentage is the average amount completed for all disks that are currently undergoing reconstruction.3 in use (dg0) ------------------------------3 drives are operational 3 drives are "in use" 1 disk group total 1 disk group present 132 disk .show raid-info disk show raid-info Use this command to display the RAID status and use of disks. the output line x drives are undergoing “reconstruction” includes a percentage of reconstruction that is completed. During reconstruction. The display for disks in a Data Domain system is similar to the following: # disk show raid-info Disk State Additional Status ------------------------------1. the disks waiting for reconstruction show as spare or hot spare until reconstruction starts on the disk. disks and LUNs that the system does not access show the State of unknown. and the progress of a disk group reconstruction operation. For a gateway Data Domain system.2 in use (dg0) 1. If more than one disk is to be reconstructed. When a spare disk is available. the Data Domain system file system automatically replaces a failed disk with a spare and begins the reconstruction process to integrate the spare into the RAID disk group. The disk use changes from spare to in use and the status becomes reconstructing. spare disks available for RAID.1 in use (dg0) 1. It displays the number of disks in use and failed. The number of mapped-out defective sectors. Disk ATA Bus CRC Err Reallocated Sectors Temperature The enclosure.1 0 0 1. The uncorrected raw UDMA CRC errors. but not currently in use by RAID.2 0 0 1.show reliability-data disk show reliability-data Disk reliability information details the hardware state of each disk. Note: The RAID portion of the display could show one or more disks as failed while the Operational portion of the display could show all drives as operating nominally. On a gateway Data Domain system. The current temperature of each disk in Celsius and Fahrenheit. The information is generally for the use of Data Domain support staff when troubleshooting.9 Command Reference Guide 133 .disk-id disk identifier. The allowable case temperature range for disks is from 5° centigrade to 55° centigrade. Temperature ----------25 C 77 F 23 C 73 F 23 C 73 F ----------- status disk status Use this command to report the overall status of disks in the system. the number of spare disks available. possibly because of operator intervention. the display shows only the number and state of the LUNs accessed by the Data Domain DD OS 4. The display is similar to the following: # disk show reliability-data Disk ATA Bus Reallocated (enc/disk) CRC Err Sectors -------------------------1.3 0 0 -------------------------3 drives operating normally. and whether or not a RAID disk group reconstruction is underway. A disk can be physically functional and available. Error indicates that some or all of its own storage is missing. If more than one disk is to be reconstructed.system operational 1 3 3 1 1 disk group drives are drives are disk group disk group total operational "in use" total present The first line can start with Normal. A brand-new head unit is in this state when foreign storage is present. or known. For a system that has been configured with some storage.system. A special case of a system that would have been Normal if the system had none of the following conditions that require user action: • RAID system degraded • Foreign storage present • Some of the disks are failed or absent Error Warning 134 disk . Use the disk add enclosure command to change the status to in use. Error. Normal A brand-new Data Domain system is normal if there is no configured storage attached. The remainder of the display is not valid for a gateway system. or Warning. the commands disk add or disk add enclosure have never been used on the system. foreign. Reconstruction is done on one disk at a time. The output of the disk status command is as follows: # disk status Normal . the disks waiting for reconstruction show as spare or hot spare until reconstruction starts on the disk. and all disks outside of the Data Domain system are not in any of the following states: in use. Note: The disks in a new expansion shelf recognized with the disk rescan command show a status of unknown. 9 Administration Guide for the detailed procedure. Any data residing on the disk will be difficult. DD OS 4. if not impossible to retrieve. Use the show summary command as well as the show raid-info command to confirm that auto-discovery is successful. Adding the enclosure is not reversible. Use the command when replacing a failed disk. disk Examples Add an Expansion Shelf The following high-level procedure gives the general steps needed to add an external shelf. An enclosure cannot be permanently removed after the disk add enclosure command has been used without losing the use of the file system.unfail disk unfail enclosure-id.disk-id Use this command to change a disk status from failed to available. See the DD OS 4. The new disk in the failed slot is seen as failed until the disk is unfailed. Caution: Use of this command repartitions the disk. This command is available to administrative users only. On the Data Domain system.9 Command Reference Guide 135 . Contact Data Domain Technical Support to permanently remove an enclosure. enter the following command with an enclosure-id of 2 for the first shelf and 3 for a second shelf: disk add enclosure 2 The Data Domain system file system automatically expands when the disk add enclosure command is entered. The Data Domain system auto-discovers an expansion shelf within a few minutes. The guide also provides directions for cabling the external shelves to the Data Domain system. Refer to the Data Domain Expansion Shelf Hardware Guide for instructions on installing hardware components to support external shelves to the Data Domain system model. output from all other disk commands returns information about the LUNs and volumes accessed by the Data Domain system.Important Notices On gateway Data Domain systems (that use third-party physical storage disk arrays other than Data Domain external disk shelves). the following command options are not valid: disk disk disk disk disk disk beacon expand fail unfail show failure-history show reliability-data With gateway storage. 136 disk . DD OS 4.9 Command Reference Guide 137 . previously installed shelf.11 enclosure Use the enclosure command to manage Data Domain expansion shelves. or both need spare disks and have none available. An enclosure is a Data Domain system or an attached expansion shelf. If a Data Domain system. If the disk add enclosure command fails for a new shelf. check that the shelf has at least 14 disks available for its own RAID group. disks from a newly installed shelf are allocated to the previously existing RAID groups (disk groups) as soon as the new shelf is recognized with the disk rescan command. Use the disk add enclosure command to add a shelf. Enclosure commands do not include adding a shelf. The enclosure command has the following options: beacon show test Flash all disk LEDs in an enclosure Display enclosure information Test the connections Page 138 Page 138 Page 144 About the enclosure Command Use the enclosure command to identify and display information about expansion shelves. This command is available to administrative users only. you will see an individual report. # enclosure show controllers Enclosure 1 Model ES20 Capacity 16 Slots WWN 50050CC1001010B1 Serial # 50050CC1001010B1 Number of Controllers 2 Controller A WWN 138 50050CC1010203CF enclosure . show controllers enclosure show controllers [enclosure-id] Use this command to display information and status for the ES20 enclosure and the shelf controller systems or a specific controller system. show show all enclosure show all [enclosure-id] Use this command to display the temperatures and the status of fans and power supplies. Press Ctrl+c to halt the command.enclosure Command Options beacon enclosure beacon enclosure-id Use this command to check that the DD OS and hardware recognize an enclosure. Note: The status of individual power supplies is displayed with the exception of 4xx models (including 560). For an enclosure connected to a 560. which are shown in aggregated status. The command causes the green (activity) LED on each disk in an enclosure to flash green. The number of usable drive slots in the enclosure.0 Gbps 50050CC1010371CF 0605 R02 IMS5846010371CF OK 12. this describes the enclosure and will not change if components are swapped.0 Gbps The first block of information in the output describes the physical ES20 enclosure shell: Enclosure The number listed here is the enclosure number assigned by DDOS. Model Capacity WWN Serial # Number of Controllers DD OS 4. this may be the same value as the WWN. This number matches the label located on the enclosure OPS Panel.0 Gbps 0. The number of shelf controllers currently inserted in the ES20 enclosure. This number is the argument that is passed to the command.0 Gbps 12.9 Command Reference Guide 139 . In this example. Depending on when the ES20 was manufactured. The serial number of the physical ES20 enclosure. As with the WWN. This value matches the serial number printed on the label on the back of the enclosure. The World Wide Name of the physical ES20 enclosure.Firmware Serial # Status HOST port EXP'N port Controller B WWN Firmware Serial # Status HOST port EXP'N port 0605 IMS5846010203CF OK 12. This identifier describes the enclosure itself and will not change when components within the enclosure are swapped. The product name of the enclosure. the enclosure is an ES20. The speed of the link on the HOST port of this shelf controller. The current status for this shelf controller. The serial number or this shelf controller. The speed of the link on the EXP'N port of this shelf controller. The firmware revision level for the firmware that resides on this shelf controller. there is a block for both Controller A and Controller B. A controller connects to the DDR or the shelf controller of the previous ES20 through the HOST port. The serial number is different for each shelf controller and is different from the Serial # for the enclosure.Following the enclosure information are one or two blocks that describe the inserted shelf controller modules: Controller A This identifies which shelf controller module the block of information is for. A controller connects to the shelf controller of the next ES20 in the chain through the EXP'N port. In the above example Controller A and B have different versions. WWN Firmware Serial # Status HOST port EXP'N port show fans enclosure show fans [enclosure-id] Use this command to display the current status of fans in all enclosures or in a specific enclosure. If this enclosure has both shelf controllers installed. This can be different for each shelf controller. The World Wide Name for this shelf controller. To show the status of all fans for a system: # enclosure show fans Enclosure 1 Fans Description -------------140 Level ------ Status -----enclosure . The WWN is different for each controller and is different than the WWN for the enclosure. starting with 1 (one) for the Data Domain system. which depends on the internal temperature and amount of cooling needed. either OK or Failed. The fan speed. The fan description for each power or cooling unit. show powersupply enclosure show powersupply [enclosure-id] Use this command to display the status USAF power supplies in all enclosures or in a specific enclosure. which are shown in aggregated status.9 Command Reference Guide 141 . For an enclosure connected to a 560. you will see an individual report. This report for shows the status of individual power supplies: # enclosure show powersupply Enclosure --------1 1 2 2 --------Description --------------Power Module #1 Power Module #2 Power Module #1 Power Module #2 --------------Status -----OK OK OK OK ------ This report for shows the aggregated status of all power supplies: # enclosure show powersupply Power Supply Status -----OK ------ DD OS 4. Note: The status of individual power supplies is displayed with the exception of 4xx models (including 560).Cooling fan #1 Cooling fan #2 -------------Enclosure Description Level Status medium medium ------ OK OK ------ The enclosure number. The fan status. -------------------------1 DD560 8F41214030 2 ES20 50050CC100123456 2 ES20 50050CC100123457 -------------------------------3 enclosures present. The CPU numbers depend on the Data Domain system model. Serial No.The status can be: OK Degraded Unavailable The power supply is operating normally. if a CPU temperature reaches 0° Celsius. The serial number for an expansion shelf is the same as the chassis serial number. The system is unable to determine the status of the power supply. the Data Domain system shuts down. which is the same as the enclosure WWN (worldwide name) and the OPS panel WWN. With newer models. show summary enclosure show summary Use this command to list known enclosures. 142 enclosure . if the CPU temperature reaches 80° Celsius. CPU temperatures may be shown in relative or ambient readings. and capacity (number of disks in the enclosure). the numbers are positive. the numbers are negative when the status is OK and move toward 0 (zero) as CPU temperature increases. Capacity -------15 Slots 16 slots 16 slots -------- show temperature-sensors enclosure show temperature-sensors [enclosure-id] Use this command to list the internal and CPU chassis temperatures for a system and the internal temperature for expansion shelves. The power supply is either manifesting a fault or not installed. With older models. model numbers. # enclosure show summary Enclosure Model No. serial numbers. A Status of Critical indicates that the temperature is above the shutdown threshold. the Data Domain system shuts down. A.ctrl.9 Command Reference Guide 143 .H:6.B.ctrl.B.H:7.B.B.E 3.H:3.E ------------- Error Message: ----------------No error detected DD OS 4.B.E 7.E 6.B.E 5.B. the temperature for CPU 0 is 97° Fahrenheit below the maximum: # enclosure Enclosure --------1 --------show temperature-sensors Description C/F --------------------CPU 0 Relative -54/-97 Chassis Ambient 23/73 --------------------Status -----OK OK ------ show topology enclosure show topology Use this command to show the layout of the SAS enclosures attached to a system.E ------------Serial # ---------------50050CC1001019AA 50050CC10010194D 50050CC100100FD1 50050CC100101A80 50050CC1001019E6 50050CC100101933 ---------------> > > > enc.A.B.E 7.A.H:4.H:4.E ------------WWN ---------------50050CC1001019AA 50050CC10010194D 50050CC100100FD1 50050CC100101A80 50050CC1001019E6 50050CC100101933 ---------------> > > > enc.H:5.E 5.H:6.E 2.H:2.A.B.A.H:3.A.A.port ------------3.B.E 4.E 6.A.A.A.port ------------2.H:7.port ------------4.B.A.In the following example.H:5.A.H:2.ctrl. The output of the command looks like the following sample: # enclosure show topology Port ---3a 3b 4a 4b ---Encl ---2 3 4 5 6 7 ---> > > > enc.B. test test topology enclosure test topology port duration minutes Test the connections in the enclosure topology. 144 enclosure . This command is available to administrative users only. The CPU relative values show that CPU 0 is 97° Fahrenheit below the maximum allowable temperature.enclosure Examples Display the Enclosure Temperature The following is an example of the temperature-sensors display. # enclosure show temperature-sensors Enclosure --------1 Description ---------------CPU 0 Relative CPU 1 Relative Chassis Ambient 2 3 --------Internal ambient Internal ambient ---------------C/F --------54/-97 -57/-103 32/90 33/91 31/88 -------Status -----OK OK OK OK OK ------ DD OS 4.9 Command Reference Guide 145 . 146 enclosure . Page 148 Page 153 Page 154 Page 154 Page 155 Page 158 Page 159 Page 163 Page 164 Page 168 Page 171 Page 171 DD OS 4. Manage and show file system options. destroying all data. Restart the file system. Reinitialize the file system. Display file system information. Disable file system operations. Encrypt and decrypt files system data. Sync all modified files to disk. Show whether or not the file system is running. Enable file system operations.9 Command Reference Guide 147 . Manage the retention-lock feature.12 filesys Use the filesys command to manage and display disk information The filesys command has the following options: clean destroy disable enable encryption fastcopy option restart retention-lock show status sync Manage and show file system cleaning. Fastcopy from source to destination. 1 MiB = 220 bytes = 1.About the filesys Command The filesys command allows you to display statistics. • • During the clean operation.073. For example. cleaning is self-throttling and gives up system resources in the presence of user traffic.824 bytes.741.511. The command also allows you to clear the statistics file and to start and stop the file system processes. The clean operation of the filesys command reclaims physical storage within the Data Domain system file system. and utilization of the Data Domain system file system.824 bytes 1 TiB = 240 bytes = 1. Data Domain recommends running a clean operation after the first full backup to a Data Domain system. filesys • 148 .741.099. The initial local compression on a full backup is generally a factor of 1. capacity.5. a command that displays 1 GiB of disk space as used is reporting a value of 230 bytes = 1.2 and reclaims a corresponding amount of disk space. Only a filesys clean command reclaims the physical storage used by files that are deleted and that are not present in a snapshot.15 to 1. the Data Domain file system is available for backup (write) and restore (read) operations.576 bytes 1 GiB = 230 bytes = 1.627. Note: All Data Domain system commands that display the use of disk space or the amount of data on disks compute and display amounts using base-2 calculations. An immediate clean operation gives additional compression by another factor of 1. Although cleaning uses a noticeable amount of system resources.073. status. 1 KiB = 210 bytes = 1024 bytes.776 bytes filesys Command Options clean The filesys clean command reclaims physical storage occupied by deleted objects in the Data Domain file system.5 to 2.048. When there is a large replication lag. or both. (tue 0600).m. A default schedule runs the clean operation every Tuesday at 6 a. because what has not been replicated is not cleaned. consider changing the schedule to clean less often. You can change the schedule or you can run the operation manually with the filesys clean commands. Replication between Data Domain systems can affect filesys clean operations. The operation is available only to administrative users. such as the filesys disable command. If a source Data Domain system receives large amounts of new or changed data while replication is disabled or disconnected. The clean does not restart when the system and file system restart.• When the clean operation finishes. or that shuts down the Data Domain system. (tue 0600). it sends a message to the system log giving the percentage of storage space that was cleaned.9 Command Reference Guide 149 .m. Either manually restart the clean or wait until the next scheduled clean operation. If you want to increase file system availability and if the Data Domain system is not short on disk space. cleaning is not efficient and does not clean up much space. clean reset filesys clean reset {schedule | throttle | all} Use this command to set the clean schedule to the default of Tuesday at 6 a. Data Domain recommends running the clean operation once a week. such as a system power-off or reboot. the default throttle of 50%. Notes: Any operation that shuts down the Data Domain system file system. resuming replication may significantly slow down filesys clean operations. stops the clean operation. DD OS 4. .. to run the operation on the first and fifteenth of the month at 4 p.m..m. A day-name is three letters (such as mon for Monday). set multiple days in one command. mon 0000 is midnight between Sunday night and Monday morning. Turns off the clean schedule. The command has the following options: daily monthly never day-num day-name Runs the command every day at the given time. A new set schedule command cancels the previous setting.clean set schedule filesys clean set schedule {daily time} | (monthly day-num1[.day-num-2. Time is 24-hour military time.] time} Use this command to change the date and time when clean runs automatically. The default time is Tuesday at 6 a. use: tue-fri. (tue 0600).15 1600 clean set throttle filesys clean set throttle percent Use this command to set clean operations to use a lower level of system resources when the Data Domain system is busy. the following command runs the operation automatically every Tuesday at 4 p. For example.day-num-2. 2400 is not a valid time...m.. The command runs on the given day or days.: # filesys clean set schedule tue 1600 To run the operation more than once in a month. entered as integers from 1 to 31. Starts the command on a given day or days (from 1 to 31) at the given time. cleaning runs very slowly or not at all when 150 filesys . At a percentage of 0 (zero).] time} | never} | {day-num-1[. The command runs on the given day(s) at the given time. For example. use: # filesys clean set schedule monthly 1.. Use a dash (-) between days for a range of days. This operation is available only to administrative users. For example. The display is similar to the following: # filesys clean show schedule Filesystem cleaning is scheduled to run "Tue" at "0600".9 Command Reference Guide 151 . The display is similar to the following: # filesys clean show throttle 100 Percent Throttle DD OS 4. clean show schedule filesys clean show schedule Use this command to display the current date and time for the clean schedule. use: # filesys clean set throttle 30 clean show config filesys clean show config Use this command to display all file system cleaning settings.the system is busy. cleaning runs at 100% (uses resources as does any other process). When the Data Domain system is not busy with backup or restore operations. A percentage of 100 allows cleaning to use system resources in the usual way. For example. The default is 50. The display is similar to the following: # filesys clean show config 50 Percent Throttle Filesystem cleaning is scheduled to run "Tue" at "0600". to set the clean operation to run at 30% of its possible speed. clean show throttle filesys clean show throttle Use this command to display the throttle setting for cleaning. This command is available to administrative users only. When the command finishes. This command is available to administrative users only. 152 filesys . clean status filesys clean status Use this command to display the active or inactive status of the clean process.6% complete. consider using the filesys clean set throttle operation to reset the amount of system resources used by the clean process. When the clean process is running. the following command runs the clean process and reminds you of the monitoring command. The change in the use of system resources takes place immediately. Use 'filesys clean watch' to monitor progress. For example. This command is available to administrative users only. If the clean process is slowing down the rest of the system. The display is similar to the following: # filesys clean status Cleaning started at 2009/02/06 10:21:51: phase 6 of 10 64. # filesys clean start Cleaning started. Stopping the process means that all work done so far is lost. the command displays progress. a message is sent to the system log giving the amount of free space available. time: phase 1:06:32. The command uses the current setting for the scheduled automatic clean operation. total 8:53:21 clean stop filesys clean stop Use this command to stop the clean process. 2496 GiB free.clean start filesys clean start Use this command to manually start the clean process. Starting the process again means starting over at the beginning. This option removes any additional external storage that was added to the system using the disk add command and returns the system to the factory default state. Press Ctrl+c to stop monitoring the progress of a clean process. File access is disabled during this process.. The output is the same as output from the filesys clean status command. destroy filesys destroy [and-zero] [and-shrink] Use this command to delete all data in the Data Domain system file system and re-initialize the file system. the file system is zeroed prior to removing any storage. which can take many hours. The process continues. The 'filesys destroy' operation will take about a minute. This command is available to administrative users only. including all virtual tapes. This command also removes Replicator configuration settings. Are you sure? (yes|no|?) [no]: DD OS 4.9 Command Reference Guide 153 . The display includes a warning similar to the following: # filesys destroy The 'filesys destroy' command irrevocably destroys all data in the '/backup' data collection. Use the filesys clean start command to restart monitoring. When this option is used in conjunction with the and-zero option. and creates a newly initialized (empty) file system. Note: The and-zero option is not supported on Data Domain gateway systems. but continuously updates. This command is available to administrative users only. Deleted data is not recoverable.clean watch filesys clean watch Use this command to monitor an ongoing clean process. and-zero and-shrink This option writes zeros to all disks. but the reporting stops. Note: The file system in a Global Deduplication Array is treated as a single file system so the command output differs. After a filesys destroy. This command is available to administrative users only. enable filesys enable Use this command to start the Data Domain system file system. This command is available to administrative users only. All filesys options are returned to default. The file system is disabled after the filesys destroy command is run. this means retention-lock is not enabled and the min-retention-period as well as max-retention-period options are set back to default values on the newly created file system.Note: The file system in a Global Deduplication Array is treated as a single file system so the command output differs. all NFS clients connected to the system may need to be remounted. disable filesys disable Use this command to stop the Data Domain system file system. 154 filesys . Note: The file system in a Global Deduplication Array is treated as a single file system so the command output differs. which stops Data Domain system operations (including cleaning). Note: When filesys destroy is run on a system with retention-lock enabled: • • All data is destroyed. Run filesys enable (or replication commands) to enable the file system. allowing Data Domain system operations to begin. including retention-locked data. The Encryption at Rest feature protects stored data in these situations: • Theft or loss of a Data Domain system or its external storage hardware while in transit from one customer location to another Theft or loss of a disk drive from a Data Domain system or its external storage hardware Failure of a storage device in transit for replacement • • The encryption feature uses a passphrase to encrypt and decrypt the keys that. The data is physically stored in an encrypted manner and cannot be accessed on the existing Data Domain system or in any other environment without first decrypting it. DD OS 4. get used to encrypt and decrypt the data. you must restart the file system with the filesys restart command. changing the passphrase does not require re-encryption of any stored data. Thus. in turn. Caution: Unencrypted data that was stored before enabling this feature is not automatically encrypted. After running this command.9 Administration Guide. encryption algorithm reset filesys encryption algorithm reset Use this command to reset the algorithm to the default: aes_256_cbc. The encryption feature requires a separate license.9 Command Reference Guide 155 . For a description of how Encryption at Rest works.encryption The optional Encryption of Data at Rest feature encrypts all incoming data before being written to the physical storage media. see “Managing Encryption of Data at Rest” in the DD OS 4. be sure to enable encryption before you put the system into use. To protect all of the data on the system. and information about configuring and managing the feature. is the most secure algorithm. 156 filesys . The filesystem must be restarted to effect this change.encryption algorithm set filesys encryption algorithm set [aes_128_cbc | aes_256_cbc | aes_128_gcm | aes_256_gcm] Use this command to select the encryption algorithm. you must restart the file system with the filesys restart command. which selects AES in the Galois/Counter mode. After running this command. encryption enable filesys encryption enable Use this command to activate the encryption feature for new data written to the file system and specify a new passphrase. encryption disable filesys encryption disable Use this command to deactivate the encryption feature. encryption algorithm show filesys encryption algorithm show Use this command to print the encryption algorithm. you must restart the file system with the filesys restart command. The passphrase is 'mypassphrase'. After running this command. The aes_256_gcm option. but it is significantly slower than the Cipher Block Chaining (CBC) mode. The encryption feature is now enabled. Here is an example: # filesys encryption enable Enter new passphrase: Re-enter new passphrase: Passphrases matched. # filesys encryption lock Enter a second authorized user name: sysadmin2 Enter password: Enter the current passphrase: Enter new passphrase: Re-enter new passphrase: Passphrases matched. you must run filesys disable. Before you run this command. you need to know the user names and passwords for two accounts with system administration privileges. This command creates a new passphrase and destroys the cached copy of the current passphrase. The filesystem is now locked. so anyone who does not possess the new passphrase will not be able to decrypt the data. Here is an example: # filesys encryption show Encryption is enabled Algorithm: aes_256_cbc The filesystem is unlocked DD OS 4. Before running this command.encryption lock filesys encryption lock Use this command to prepare the Data Domain system and its external storage devices for shipment. you must run filesys disable. encryption show filesys encryption show Use this command to check the status of the encryption feature. To run this command. encryption passphrase filesys encryption passphrase change Use this command to change the passphrase.9 Command Reference Guide 157 . If the passphrase is incorrect. because regular fastcopy warns if the destination exists and then re-executes with the force option if allowed to proceed. Note: Users may want or need to use fastcopy force if they are scripting fastcopy operations to simulate cascaded replication. the major use case for the option. The system prompts you to enter the passphrase that was specified in the encryption lock command. The force option is useful for scripting.encryption unlock filesys encryption unlock Use this command to prepare the encrypted file system for use after it has arrived at its destination. src-path The location of the directory or file that you want to copy. It is not needed for interactive use. The destination for the directory or file being copied. See snapshot for snapshot details. because it is not interactive. the file system does not start and the system reports the error.snapshot. Use the snapshot list command to list existing snapshots. dest-path force 158 filesys . Snapshots always reside in /backup/. filesys fastcopy force causes the destination to be an exact copy of the source even if the two directories had nothing in common before. Allows the fastcopy to proceed without warning in the event the destination exists. enable the file system with filesys enable. After running this command. The first part of the path must be /backup. The destination cannot already exist. fastcopy filesys fastcopy [force] source src-path destination dest-path Use this command to copy a file or directory tree from a Data Domain system source directory to another destination on the Data Domain system. to copy the directory /user/bsmith from the snapshot scheduled-2007-04-27 and put the bsmith directory into the user directory under /backup. DD OS 4. option enable report-replica-as-writable filesys option enable report-replica-as-writable Use this command to set the reported read/write status of a replication destination file system to read/write. With CIFS. If you change either folder while copying. This command is available to administrative users only.Caution: If the destination has retention-locked files. Use the filesys disable command before changing this option and use the filesys enable command after changing the option. use: # filesys fastcopy source /backup/. aborting the moment they encounter retention-locked files. but not at a particular point in time. This command is available to administrative users only.snapshot/scheduled-2007-0427/user/bsmith destination /backup/user/bsmith Like a standard UNIX copy. option option disable report-replica-as-writable filesys option disable report-replica-as-writable Use this command to set the reported read/write status of a replication destination file system to read-only.9 Command Reference Guide 159 . there are no guarantees that the two are or were ever equal. With CIFS. filesys fastcopy makes the destination equal to the source. Use the filesys disable command before changing this option and use the filesys enable command after changing the option. For example. use the cifs disable command before changing the option and use the cifs enable command after changing the option. use the cifs disable command before changing the option and use the cifs enable command after changing the option. fastcopy and fastcopy force fail. This command is available to administrative users only. option set global-compression-type filesys option set global-compression-type {1 | 9} Use this command to set the global compression of data to either type 9 (new type) or type 1 (old type). This command is available to administrative users only. The options are as follows: global-compressiontype Remove a manually set global compression type. the command fails with an error message. and creates a newly initialized (empty) file system. Reset the file system to read-only. Only when a filesys destroy command is entered does the type used change to the default of 9. Also. replication stops. local-compression-type Reset the compression algorithm to the default of lz. if the compression type is different on each side of a directory replication pair. 160 filesys . The file system continues to use the current type. Caution: The filesys destroy command irrevocably destroys all data in the /backup data collection. including all virtual tapes. Enter the filesys disable and filesys enable commands for the change to take effect. If the file system is over 40% full.option reset filesys option reset {local-compression-type | marker-type | report-replica-as-writable | global-compression-type} Use this command on the destination Data Domain system to return file system compression to the default settings. marker-type report-replica-aswritable Return the marker setting to the default of auto. for example) and activate the change. Data Domain recommends the lz option. gz none option set marker-type filesys option set marker-type {auto | besr1 | cv1 | eti1 | hpdp1 | ism1 | nw1 | ssrt1 | tsm1 | tsm2 | none} Use this command to have a Data Domain system deal with markers inserted into backup data by some backup software. To enable the new setting. • The setting is system-wide and applies to all data received by a Data Domain system. No data compression occurs. This command is available to administrative users only. but more CPU cycles. This command is available to administrative users only. 161 DD OS 4. lz gzfast The default algorithm that gives the best throughput. use the filesys disable and filesys enable commands. Changing the algorithm affects only new data and data accessed as part of a clean operation. gzfast is the recommended alternative for sites that want more compression at the cost of lower performance. not current data. but also uses the most CPU cycles (up to twice as many as lz). use the following commands: # filesys option set global-compression-type 1 # filesys disable # filesys enable option set local-compression-type filesys option set local-compression-type {none | lz | gzfast | gz} Use this command to set the compression algorithm.9 Command Reference Guide . A zip-style compression that uses the least amount of space for data storage (10% to 20% less than lz).To change the setting (to type 1. A zip-style compression that uses less space for compressed data. Informix Onbar. such as x86 Intel or AMD. HP DP versions 5.5.0 with VTL and file system backups. compression is degraded for the data with different markers. and 6. compression and system performance are not affected. On 4.• If a Data Domain system is set for a marker type and data is received that has no markers.1. HP NonStop systems using ETI-NET EZX/BackBox. 5.5 systems and earlier. you may need to set this option manually. Check with your system administrator if you are not sure about the media server architecture configuration. Synectics backup express IBM Tivoli Storage Manager on media servers with “small-endian” processor architecture. Used when Informix database is backed up using onbar and its internal storage manager. this option should not be needed. such as SPARC or IBM mainframe. used for Symantec NetBackup family of products. CommVault Galaxy with VTL and file system backups. • The options are: auto Attempt to automatically determine what type of markers are in use (the default setting). If an external storage manager is used.or small-endian. Data with no markers. IBM Tivoli Storage Manager on media servers with “big-endian” processor architecture. Backup Express System Restore. which takes a sector level dump of a Windows drive. besr1 cv1 eti1 hpdp1 ism1 nw1 ssrt1 tsm1 tsm2 none 162 filesys . If a Data Domain system is set for a marker type and data is received with markers of a different type. PowerPC can be configured as either big. Legato NetWorker with VTL. The options are: globalcompression-type local-compressiontype marker-type report-replica-aswritable Display the current global compression type. Display the current reported setting on the destination Data Domain system.After changing the setting. Display the current marker setting. restart filesys restart Use this command to disable and enable the Data Domain system file system in one operation. Display the current compression algorithm. This command is available to administrative users only. This command is available to administrative users only DD OS 4. enter the following two commands to enable the new setting: # filesys disable # filesys enable option set staging-reserve filesys option set staging-reserve percent Use this command to reserve a percentage of total disk space for disk staging. option show filesys option show {local-compression-type | marker-type | report-replica-as-writable | global-compression-type} Use this command to show the file system option settings.9 Command Reference Guide 163 . The access control information of a retention-locked file may be updated. Once retention lock has ever been enabled on a Data Domain system. Applications that do not issue these commands do not trigger the retention lock feature. Notes: • A file must be explicitly committed to be a retention-locked file through client-side file commands before the file is protected from modification and premature deletion. • 164 filesys . Once a file is committed to be a retention-locked file. The retention period of a retention-locked file can be extended but not reduced. Also. A retention-locked file is always protected from modification and premature deletion.) Most archive applications and selected backup applications issue these commands when appropriately configured. regardless of a valid retention lock license and whether or not the retention lock feature is enabled. The retention lock feature supports a maximum retention period of 70 years and does not support the “retain forever” option offered by certain archive applications. Enabling the retention lock feature affects only the ability to commit non-retention-locked files to be retention-locked files and the ability to extend the retention period of retentionlocked files.retention-lock The retention lock feature allows the user to keep selected files from being modified and deleted for a specified retention period of up to 70 years. so please check with the appropriate vendor. The retention lock feature can be enabled only if there is a retention lock license. certain archiving applications may impose a different limit (such as 30 years) on retention period. it cannot be deleted until its retention period is reached. and its contents cannot be modified. you cannot rename non-empty folders or directories on that system (although you can rename empty ones). (See the section Client-Side Retention Lock File Control on page 165 for details. not the Data Domain system CLI.Client-Side Retention Lock File Control This section describes how files must be processed on the clientside interface to become retention-locked (and a UNIX interface is described in this section—your interface may differ). If the atime is set to a value that is larger than the current time plus the configured minimum retention period.m. Adding the minimum retention period of 12 hours to that date/time gives 200912190100. then the file is committed to be a retention-locked file. 200912181300) and the minimum retention period is 12 hours. suppose the current date and time is 1 p.9 Command Reference Guide 165 . The client-side commands are used to control the retention locking of individual files. Its retention date is set to the smaller of the atime value and the current time plus the configured maximum retention period. Therefore. Note: The commands listed in this section are to be used only on the client-side interface. These changes on the client side must be implemented in addition to the setup/configuration of the retention lock feature on the Data Domain system. The following (Unix) command can be used to set the atime: ClientOS# touch -a -t [atime] [filename] The format of atime is: [[YY]YY]MMDDhhmm[. on December 18th 2009 (that is. Create Retention-Locked Files and Set Retention Dates The user creates a file in the usual way and then sets the last access time (atime) of the file to the desired retention date of the file. the file becomes retention-locked: ClientOS# touch -a -t 201112312230 SavedData. if atime for a file is set to a value greater than 201112190100. Setting the atime for a non-retentionlocked file to a value less than the current time plus the configured minimum retention period is ignored without error.dat Note: The file must be completely written to the Data Domain system before it is committed to be a retention-locked file. DD OS 4.ss] For example. The command is typically: ClientOS# rm [filename] or ClientOS# del [filename] Note: If the retention date of the retention-locked file has not expired. set the file’s atime to a value greater than the current retention date. retention-lock disable filesys retention-lock disable Use this command to disable the retention lock feature. independent of the retention lock feature. The attempt will fail with a permission denied error. the retention date is set to the smaller of the new value and the current time plus the configured maximum retention period. if and only if. Identifying a Retention-Locked File and Listing a Retention Date To determine whether a file is a retention-locked file. The retention date for a retentionlocked file is its atime value. Otherwise. the delete operation will result in a permission denied error. the file is a retention-locked file.Extending the Retention Date To extend the retention date of a retention-locked file. This command is available to administrative users only. 166 filesys . you can set the atime of the file to a value smaller than its current atime. If the new value is less than the current time plus the configured minimum retention period. The user must have the appropriate access rights to delete the file. This can be listed by the following command: ClientOS# ls -l --time=atime [filename] Deleting an Expired Retention-Locked File Invoke the standard file delete operation on the retention-locked file to be deleted. the atime update is ignored without error. requiring a number followed by units. By default. These default values may be subsequently revised. to set the min-retention-period to 24 months. retention-lock option set filesys retention-lock option set {min-retention-period | maxretention-period} period Use this command to set the minimum or maximum retention period. This command is available to administrative users only.9 Command Reference Guide 167 . use: DD OS 4. with no space between. the min-retentionperiod is 12 hours and the max-retention-period is 5 years. The units are any of the following: • • • • • min hr day mo year The period should not be more than 70 years. For example. The limit of 70 years may be raised in a subsequent release. The default minretention-period is 12 hours and the default max-retentionperiod is 5 years. This command is available to administrative users only. The period is specified in a similar way as for snapshot retention.retention-lock enable filesys retention-lock enable Use this command to enable the retention lock feature. This command is available to administrative users only. any period larger than 70 years results in an error. retention-lock option reset filesys retention-lock option reset {min-retention-period | max-retention-period} Use this command to reset both the minimum and maximum retention periods to their default values. use the command: # filesys retention-lock reset /backup/dir1 Resetting retention lock raises an alert and logs the names of the retention-locked files that have been reset. For example. The possible values of retention lock status are enabled. the higher 168 filesys . the more often a backup is done for a particular file or file system. allow all files on the specified path to be modified or deleted (with the appropriate access rights). This command is available to administrative users only. disabled. On receiving such an alert. the user should verify that the particular reset operation is intended. or previously enabled. and file systems. that is. show show compression filesys show compression [filename] [last n {hours | days}] [no-sync] Use this command to display the space used by and compression achieved for files.# filesys retention-lock option set min-retentionperiod 24mo retention-lock option show filesys retention-lock option show {min-retention-period | maxretention-period} Use this command to show the minimum and maximum retention periods. to reset the retention lock on all files in /backup/dir1. directories. retention-lock reset filesys retention-lock reset path Use this command to reset retention lock for all files on a specified path. In general. retention-lock status filesys retention-lock status Use this command to show retention lock status. and file systems. daily over the previous four full weeks and the current partial week.2 19. If there are many files. depending on the number of files.the compression.0 18.2 3. the base-2 equivalent of Gigabyte.0 -------------- Resource -----------------/backup: pre-comp /backup: post-comp /ddvar ------------------ Note: GiB = Gibibyte. show compression daily-detailed Use this command to display a slightly more detailed version of show compression daily. DD OS 4. it could take several hours. Note that the display on a busy system may not return for several hours. This command adds the rows GlobalComp Factor and Local-Comp Factor.7 -------Used GiB -------206.6 -------Avail GiB --------339. but uses a dash (-) instead. Note: Specifying a file name is not recommended.9 Command Reference Guide 169 . The output does not include global and local compression factors for the Currently Used row.1 0. Other factors may influence the display. directories. show space filesys show space Use this command to display the space available to and used by file system components.1 --------Use% ---1% 3% ---Cleanable GiB* -------------0. The display is similar to the following: # filesys show space Size GiB -------342. filesys show compression [summary | daily | daily-detailed] {[last n {hours | days | weeks | months}] | [start date [end date]]} show compression daily Use this command to display the space used by and compression achieved for files. Values are in gigabytes to one decimal place. The meta-data value is an estimate of index data. then use filesys clean schedule to run the operation more often. Remove old logs and core files to free space in this area. 95%. The display is in days. Virtual data is the amount of data sent to the Data Domain system from backup servers. and physical space still available for data storage. Warning messages go to the system log and an email alert is generated when the Use% figure reaches 90%. /backup: post-comp /ddvar The total amount of space available for data storage can change because an internal index may expand as the Data Domain system fills with data. show uptime filesys show uptime Use this command to display the amount of time that has passed since the file system was last enabled. the Data Domain system accepts no more data from backup servers. which includes system overhead. hours. 170 filesys . The index expansion takes space from the Avail GiB amount. and minutes. Also consider reducing the data retention period or splitting off a portion of the backup data to another Data Domain system. and 100%. At 100%. Display the amount of total physical disk space available for data. Do not expect the amount shown in the /backup: precomp line to be the same as the amount displayed in the Original Bytes line by the filesys show compression command. If Use% is always high. use the filesys clean show-schedule command to see how often the cleaning operation runs automatically. Display the approximate amount of space used by and available to the log and core files./backup: pre-comp Display the amount of virtual data stored on the Data Domain system. actual physical space used for compressed data. 23:28 status filesys status Use this command to display the state of the file system process. 1.The display is similar to the following: # filesys show uptime Filesys has been up 47 days. sync filesys sync Use this command to sync all modified files to disk. The display gives a basic status of enabled or disabled with more detailed information for each basic status. such as filesys disable. The display is similar to the following: # filesys status The filesystem is enabled and running If the file system was shut down with a Data Domain system command.9 Command Reference Guide 171 . Display the status of the retention lock license: DD OS 4. Add the retention lock license: # license add ABCD-EFGH-IJKL-MNOP 2. filesys Examples Retention Lock Procedure This example shows the use of the retention lock feature. [filesys disable] Note: The file system in a Global Deduplication Array is treated as a single file system so the command output differs. the display includes the command. For example: # filesys status The filesystem is disabled and shutdown. 200912181300. To show the maximum and minimum retention periods: # filesys retention-lock option show max-retentionperiod # filesys retention-lock option show min-retentionperiod 9.# license show 3.m. Adding the min retention period of 12 hours gives 200912190100.. that is. 172 filesys . respectively. If you want to reset both the minimum and the maximum retention periods to their default values: # filesys retention-lock option reset The minimum and maximum retention periods have now been reset to their defaults: 12 hours and 5 years. Activate the retention locking for the file on the client-side: ClientOS# touch -a -t 201112312230 SavedData. Display the status of the retention lock feature: # filesys retention-lock status 5. Thus. 8.dat Performing Retention Lock File Control Commands on the Client Operating System Suppose the current date/time is December 18th 2009 at 1 p. the file becomes retention-locked. Enable the retention lock feature: # filesys retention-lock enable 4. Set the maximum retention period for the Data Domain system: # filesys retention-lock option set max-retentionperiod 30year 7. if atime for a file is set to a value greater than 200912190100. Set the minimum retention period for the Data Domain system: # filesys retention-lock option set min-retentionperiod 96hr 6. 9 Command Reference Guide 173 .dat 2.1. Depending on the type of data stored. but uses more space. Local Compression A Data Domain system uses a local compression algorithm developed specifically to maximize throughput as data is written to disk. or you can set the system for no local compression. The default algorithm allows shorter backup windows for backup jobs.dat Additional Notes A Data Domain system that has become full may need multiple clean operations to clean 100% of the file system. DD OS 4. Current data remains as is until a clean operation checks the data. • Changing the algorithm affects only new data and data that is accessed as part of the filesys clean process. Put a retention lock on the existing file SavedData.dat by setting its atime to a value greater than the current time plus the minimum retention period: ClientOS# touch -a -t 200912312230 SavedData. The total space cleaned may always be a few percentage points less than 100.dat 4. as determined in the previous step. such as when using markers for specific backup software. ClientOS# rm SavedData. To delete an expired retention-locked file: Assuming the retention date of the retention-locked file has expired. To identify retention-locked files and list retention date: ClientOS# touch -a -t 202012121200 SavedData. the file system may never report 100% cleaned.dat ClientOS# ls -l --time=atime SavedData. Local compression options allow you to choose slower performance that uses less space. To extend the retention date of the file: ClientOS# touch -a -t 202012121230 SavedData.dat 3. especially if there is an external shelf. • Tape Marker Handling Backup software from some vendors inserts markers (tape markers.3. After changing the setting. The commands in this section change and display the reported setting of the destination file system. use the cifs disable command before changing the reported state and use the cifs enable command after changing the reported state. use the filesys disable and filesys enable commands. or other names are used) in all data streams (both file system and VTL backups) sent to a Data Domain system. The actual state of the file system remains as read-only. • A Data Domain system using type 1 global compression continues to use type 1 when upgraded to a new release. When using CIFS on the Data Domain system.0. A Data Domain system using type 9 global compression continues to use type 9 when upgraded to a new release. A DD OS 4. Global Compression DD OS 4. • Before changing the reported setting. With some backup software. • • Replicator Destination Read/Write Option The read/write setting of the file system on a Replicator destination Data Domain system is read-only.• To enable the new setting. Markers can significantly degrade data compression on a Data 174 filesys .0 or later Data Domain system can be changed from one type to another if the file system is less than 40% full. tag headers. Earlier releases use an algorithm called type 1 (one) as the default. Directory replication pairs must use the same global compression type. use the filesys enable command.0 and later releases use a global compression algorithm called type 9 as the default. use the filesys disable command. the file system must be reported as writable for restoring or vaulting data from the destination Data Domain system. the Data Domain system tape marker feature is not needed for either file system or VTL backups. However. such as Symantec’s NetBackup (NBU). where the system is viewed as a basic disk via a CIFS share or NFS mount point. OpenStorage lifecycle. is reduced by the amount of the staging reserve. marker-type commands allow a Data Domain system to handle specific marker types while maintaining compression at expected levels. When the amount of data stored uses all of the available space. or Legato’s NetWorker.. The amount of available space. the Data Domain System does not reclaim space from deleted files until a cleaning operation is done. The reason that some backup applications use disk staging devices is to enable tape drives to stream continuously. the system estimates the amount of space that will be recovered by cleaning and borrows from the staging reserve to increase the DD OS 4.. typically 20 to 30 percent. old backups can be deleted to make space. After the data is copied to tape. Note: When backing up a network-attached storage device using NDMP (not the Data Domain system NDMP feature). more than likely the data is still on disk and can be restored from it more conveniently than from tape. you reserve a percentage of the total space.9 Command Reference Guide 175 . the backup application is not in control of the data stream and does not insert tape markers. Should a restore be needed from a recent backup. it is retained on disk for as long as space is available. In normal operation. This delete-on-demand policy maximizes the use of the disk. The filesys option . This is not compatible with backup software that operates in a staging mode. When you configure disk staging. In such cases. Disk Staging Disk staging enables a Data Domain system to serve as a staging device.Domain system. to allow the system to simulate the immediate freeing of space. which is shown by the filesys show space command. the system is full. which expects space to be reclaimed when files are deleted. whenever a file is deleted. When the disk fills up. You use disk staging in conjunction with your backup software. The Data Domain disk staging feature does not require a license and is disabled by default. the fastcopy operation aborts the moment it encounters retention-locked files on the destination. Replication resync fails if the destination is not empty and if retention lock is currently or was previously enabled on either the source or destination system. All filesys options are returned to their defaults. This means that retention lock is not enabled and min-retention-period 176 filesys . Retention Lock and Replication Both Directory Replication and Collection Replication replicate the locked or unlocked state of files. The goal of disk staging is to configure enough reserve so that you do not run out before cleaning is scheduled to run. If you try to fastcopy to a destination that has retention-locked files. 2.available space by that amount. the space is actually recovered and the reserve restored to its initial size. Directory replication does not replicate minimum and maximum retention periods to the destination system. When cleaning runs. Retention Lock and Fastcopy Fastcopy does not copy the locked or unlocked state of files. Files that are retention-locked in the source are not retention-locked in the destination. Retention Lock and Filesys Destroy When filesys destroy is run on a system with retention lock enabled: 1. Since the amount of space made available by deleting files is only an estimate. All data is destroyed including retention-locked data. However: • • • Collection replication replicates minimum and maximum retention periods to the destination system. files that are retentionlocked in the source are retention-locked in the destination. the actual space reclaimed by cleaning may not match the estimate. That is. DD OS 4.9 Command Reference Guide 177 .as well as max-retention-period options are set back to their default values on the newly created file system. 178 filesys . About the help Command The help command with no object displays a list of all Data Domain system top-level commands by name. password: For example. If the keyword is the same as a command name.9 Command Reference Guide 179 .13 help Use the help command to display help files for Data Domain system commands. The search feature displays every one-line command option from every command in the Data Domain system command set that includes a match of a keyword. to find all commands that include the keyword # help password user add <user> [ password <password> ] [ priv {admin|user} ] Add a new user user change password [<user>] Change the password for a user Use the up and down arrow keys to move through a displayed help page. DD OS 4. Enter a slash character (/) to move forward and a question mark (?) along with a pattern to search for and highlight lines of particular interest. For details about the syntax of a command. the complete help page for the command displays. use help with a command name as the object. Use the q key to exit. All Data Domain system commands let you press the tab key to complete a unique entry. enter: # help adminaccess 180 help .help Command Options Any Data Domain system command or keyword can be used as an option to the help command. help Examples To list all of the Data Domain system commands by name. enter: # help To show the help for the command adminaccess. Delete a feature license. Enables gateway systems to support up to 145 TB of usable capacity. or the upgrade of a 7-disk DD610/DD630 to 12 disks. Identifies systems that are deployed for archive and nearline workloads. Delete all licenses. Enables either the upgrade of a 9-disk DD510/DD530 to 15 disks. The licensed features are: Feature Encryption Expanded Storage Description Enables the optional software that provides on-disk encryption of data-at-rest. Licenses the global deduplication feature. Allows the upgrade of capacity for the Data Domain system. add del reset show Add a feature license.9 Command Reference Guide . Use a system with the Symantec OpenStorage product. Display the current licenses and features. Page 183 Page 183 Page 183 Page 183 About the license Command The license command lists current licenses on the Data Domain system and adds or deletes licenses. Enables gateway systems to support up to 71 TB of usable capacity. 181 Gateway Expanded Storage Level 2 Gateway Expanded Storage Level 3 Global Deduplication Nearline OpenStorage (OST) DD OS 4.14 license The license command manages licenses for licensed features on a Data Domain system. Enable the use of a Data Domain system as a virtual tape library. Replication: one license key per controller in the Global Deduplication Array.Feature REPLICATION Retention-Lock VTL Description Enable replicating data from one Data Domain system to another. Prevent retention-locked files from being deleted or modified. 182 license . OST protocol: one license key for the master controller. The addition or deletion of a license feature takes effect immediately. for up to 70 years. Licensing for a Global Deduplication Array works as follows: • • • Global Deduplication Array membership: one license key per controller in the Global Deduplication Array. unless you use the local keyword. reset license reset Use this command to remove all licenses. In a Global Deduplication Array.license Command Options add license add license-key [. This command is available to administrative users only and is not available in a Global Deduplication Array. In a Global Deduplication Array. del license del license-key | license-feature Use this command to remove a current license by specifying the key or feature name. The code for each license is a string of 16 letters with dashes.. This command is available to administrative users only. Include the dashes when entering the license code. Running this command on the master controller in a Global Deduplication Array displays licenses for all nodes in the Global Deduplication Array. For DD OS 4. This command is available to administrative users only. This command is available to administrative users only.. show license show [local] Use this command to display the features licensed on the Data Domain system. Enter the license feature name or key (as shown with the license show command). you must run this command on the master controller.] Use this command to add one or more licenses for the same feature. Specify multiple licenses to license a feature on multiple nodes in a Global Deduplication Array. you must run this command on the master controller.9 Command Reference Guide 183 . use: # license add ABCD-EFGH-IJKL-MNOP To display current licenses. use: # license show ## -1 2 -License Key ------------------BCDE-FGHI-JKLM-NOPQ ABCD-EFGH-IJKL-MNOP ------------------Feature ----------------REPLICATION VTL ---------------- 184 license . The output of this command looks like the following: # license show ## -1 2 -License Key ------------------DEFA-EFCD-FCDE-CDEF EFCD-FCDE-CDEF-DEFA -----------------Feature ----------------REPLICATION VTL ---------------- License Key Feature The characters of a valid license key. license Examples Add a License To add a license. The name of the licensed feature. the local keyword has no effect.single nodes or worker controllers in a Global Deduplication Array. and general system messages go to the log directory (/ddvar/log)and into the file messages. Page 190 About the log Command The log command allows you to view Data Domain system log file entries and the log file contents. The log command has the following options: host list view watch Manage the process of sending log messages to another system. See Archive Log Files on page 192 for instructions on saving log files. Page 186 Page 188 Page 191 View the system log or another log file.15 log Use the log command to display and manage the log file. Messages from the alerts feature. A log entry appears for each Data Domain system command given on the system. The log files on the Data Domain system are rotated to provide easier management of log files.*. DD OS 4. List files in the log directory. the autosupport reports. Watch the system log or another log file scroll.9 Command Reference Guide 185 . info files are exported.log Command Options host Data Domain systems can send log messages to other systems which must be enabled to listen for network log messages.log files). all of the messages in the messages and kern.alert kern.* Send all messages at the notice priority and higher. Send all kernel messages (kern.notice *. see your vendor-supplied documentation for the receiving system. *. The Data Domain system sends the log in the standard syslog format. This command is available to administrative users only. For managing the selectors and receiving messages on a third-party system.info log files). For example. the following command adds the system log-server to the hosts that receive log messages: # log host add log-server 186 log . Send all messages from system startups (boot.* local7. host add log host add host-name Use this command to add a system to the list that receives Data Domain system log messages. The log host commands manage the process of sending log messages to another system. When remote logging is enabled.notice). Send all messages at the alert priority and higher (alerts are included in *. This command is available to administrative users only.host del log host del host-name Use this command to remove a system from the list of systems that receive Data Domain system log messages. DD OS 4. host enable log host enable Use this command to enable sending log messages to other systems. This command is available to administrative users only. This command is available to administrative users only. the following command removes the system logserver from the hosts that receive log messages: # log host del log-server host disable log host disable Use this command to disable sending log messages to other systems. For example. host reset log host reset Use this command to reset the log sending feature to the defaults of disabled and an empty list.9 Command Reference Guide 187 . This command is available to administrative users only. and messages from the clean process. You can use third-party software to analyze either set of messages. When the command is executed without the debug option. The output is similar to the following: # log host show Remote logging is enabled. • SPACE for disk space data lines. Each time the clean process runs. A space use message is generated every hour. All the messages are in comma-separated-value format with tags that you can use to separate out the disk space or clean messages. Messages about disk space use by Data Domain system components and data storage. generated from Data Domain system actions and general system operations.host show log host show Use this command to display the list of systems that receive log messages and the state of enabled or disabled. • CLEAN_HEADER for lines that contain headers for the clean operations data lines. Remote logging hosts log-server list log list [debug] Use this command to list the files in the log directory with the date each file was last modified and the size of each file. • SPACE_HEADER for lines that contain headers for the disk space data lines. the following files are listed: messages space.log The system log. The tags are: • CLEAN for data lines from clean operations. it creates about 100 messages. 188 log . Kernel information messages.9 Command Reference Guide 189 .When the command is executed with the debug option.error kern. List errors generated by the Data Domain Enterprise Manager operations. Debugging information created by the file system processes.log secure ssi_request windows Disk error messages. destroy.memstat Track users of the Data Domain Enterprise Manager graphical user interface.info network perf. Kernel error messages.log ddfs. Each instance produces a log with a unique ID number.id_number All of the actions taken by an instance of the . the following files are added to the list of files above: access boot. Messages from network connection requests and operations.info ddfs.log filesys destroy command. Memory debugging information for file system processes. disk-error-log error kern. Messages from the Data Domain Enterprise Manager when users connect with HTTPS. DD OS 4. Kernel diagnostic messages generated during the booting up process. Messages from unsuccessful logins and changes to user accounts. Messages about CIFS-related activity from CIFS clients attempting to connect to the Data Domain system. Performance statistics used by Data Domain support staff for system tuning. When viewing the log.3 messages.4 messages. With no filename.7 messages.6 messages. to list all of the files in the log directory. enter a slash character (/) to search forward or a question mark (?) to search backward for a pattern (for example. use the q key to quit.9 messages.1 space. use the up and down arrows to scroll through the file. use: # log list Last modified -----------------------Mon Mar 16 11:10:07 2009 Sun Jan 18 00:00:02 2009 Sun Jan 25 00:27:16 2009 Sun Feb Sun Feb 1 00:00:03 2009 8 00:00:03 2009 Size -------135 KB 1460 KB 177 KB 154 KB 799 KB 385 KB 247 KB 394 KB 644 KB 469 KB 10741 KB -------File ---------messages messages.5 messages. 190 log .For example. the command displays the current messages file.8 messages.2 messages. view log view [filename] Use this command to view the log files. a date) in the file.log ---------- Sun Feb 15 00:00:03 2009 Sun Feb 22 00:00:03 2009 Sun Mar Sun Mar 1 00:00:02 2009 8 00:00:02 2009 Sun Mar 15 00:36:23 2009 Mon Mar 16 11:00:02 2009 ------------------------ Note: KiB = Kibibytes = the binary equivalent of Kilobytes. Description: The restorer cannot find a replication throttle schedule.Severity: NOTICE . With no filename. Look for the file of log messages. run the replication throttle add command.datadomain. The log file includes information like this: Jan 31 10:28:11 syrah19 bootbin: NOTICE: MSGSMTOOL-00006: No replication throttle schedules found: setting throttle to unlimited. Action: To set a replication throttle schedule. In the Web page of log messages. search for the message "MSGID: MSG-SMTOOL-00006 . DD OS 4.Audience: customer Message: No replication throttle schedules found: setting throttle to unlimited.9 Command Reference Guide 191 . https://my. the command displays the current messages file. log Examples Understand a Log Message 1. Replication is running with throttle set to unlimited. A detailed description of log messages can be obtained from the Data Domain Support Web site. (This can be done on the Data Domain system either by using the command log view message. or the command log view. then the book icon under Docs for the given release.com/. Use the key combination Ctrl+c to break out of the watch operation.watch log watch [filename] Use this command to display a view of the messages file that adds new entries as they occur. 2. by clicking Software Downloads. SMTOOL-00006. View the log file." Find the following: 4. 3. then Error Message Catalog. add a user name and password to the FTP line. If using FTP: 1.com/ Note: Some Web browsers do not automatically ask for a login if a machine does not accept anonymous logins. 192 log . Open the log directory to list the messages files. On the Data Domain system. For example. 4.5. use the adminaccess show 3. In that case. CIFS mount. On the remote machine. the user could run the replication throttle add command to set the throttle. log into the Data Domain system as user sysadmin. See the CIFS add command or the NFS add command for more information. If the service is not enabled. you are in the directory just above the log directory. If the address is not in the list. In the Address box at the top of the Web browser. command to see that the FTP access list has the IP address of your remote machine or a class-C address that includes your remote machine. For example: ftp://Data Domain system_name. use the command adminaccess enable ftp. Archive Log Files To archive log files. If using CIFS or NFS. On the Data Domain system. use NFS. use the command adminaccess add ftp ipaddr. use the adminaccess show command to see that the FTP service is enabled. Based on the message. At the login popup. or FTP to copy the files to another machine. open a Web browser. mount /ddvar to your desktop and copy the files from the mount point. use FTP to access the Data Domain system. 6. add: ftp://sysadmin:your-pw@Data Domain system_name. 2.com/ 5. On the Data Domain system.yourcompany.yourcompany. Choose a location for the file copy. use SSH to log into the Data Domain system as sysadmin and give the command adminaccess disable ftp. Right-click on the file icon and select Copy To Folder from the menu.9 Command Reference Guide 193 . Copy the file that you want to save. DD OS 4. If you want the FTP service disabled on the Data Domain system.7. 8. 194 log . After migrating a context. All data under /backup is always migrated and exists on both systems after migration. Show migration port information. Page 196 Page 197 Page 197 Page 198 Page 200 Page 201 Page 201 About the migration Command The migration command copies all data from one Data Domain system to another and may also copy replication contexts (configurations). Manage and display migration information. Expand Data Domain system storage capacity. the migrated contexts still exist on the migration source. Flash a migration ID LED.16 migration Use the migration command to move all data from one Data Domain system to another. Fail a migration and force reconstruction. See the procedures at the end of this section for using migration with a Data Domain system that is part of a replication pair. The migration command has the following options: abort commit receive send show stats status watch Add a migration or migration enclosure. break replication for that context on the migration source. Use the command when upgrading to a larger capacity Data Domain system. After migrating replication contexts.9 Command Reference Guide . Start migration. 195 DD OS 4. • • • Only administrative users can use the migration command. Migration is usually done in a LAN environment. Run the command on the migration source and the migration destination. The migration destination must have a capacity that is the same size as or larger than the used space on the migration source. use the replication throttle set override command to set the throttle to the maximum (unlimited) before starting migration. Using the migration abort command on a migration destination will require a filesys destroy on that machine before the file system can be enabled on it again. This command is available to administrative users only. • Any setting of the system’s replication throttle feature also applies to migration. If the migration source Data Domain system is part of a replication pair. replication is restarted. A migration destination does not need a replication license unless the system uses replication. migration Command Options abort migration abort Use this command to kill a migration process that is in progress. If the migration source has throttle settings.• • • Data Domain does not recommend running backup operations to a migration source during a migration operation. The command stops the migration process and returns the Data Domain system to its previous state. The migration destination must have an empty file system. Notes: A migration abort leaves the password on the destination system the same as the password on the migration source. 196 migration . This command is available to administrative users only. After the migration process finishes. All data on the source Data Domain system at the time of the commit command (including data newly written since the migration started) is migrated to the destination Data Domain system. Write access to the source is blocked after you enter the migration commit command and during the time needed to complete migration. receive migration receive source-host src-hostname Use this command to prepare a Data Domain system to be a migration destination. to prepare a destination for migration from a migration source named hostA: # filesys destroy # migration receive source-host hostA Caution: When preparing the destination. This command is available to administrative users only. the source is opened for write access. For example. DD OS 4. You can enter the command and limit the migration of new data at any time after entering the migration send command. After the commit. but new data is no longer migrated to the destination. Use the command: • • • Only on the migration destination. new data for the contexts migrated to the destination should be sent only to the destination. Before entering the migration send command on the migration source.9 Command Reference Guide 197 . do not run the filesys enable command. After running the filesys destroy operations on the destination. Data Domain recommends entering the commit command after all backup jobs for the context being migrated are finished.commit migration commit Use this command to limit migration to data received by the source at the time the command is entered. New data written to the source after a migration commit command is not migrated. A context in the obj-spec-list can be: • The destination string. but the context configuration is only on the migration destination. as defined when setting up replication. This command is available to administrative users only. which migrates all contexts from the migration source to the destination. as shown in output from the replication status command. Examples are: dir://hostB/backup/dir2 col://hostB pool://hostB/pool2 • The context number. 198 migration . all data from the context is still on the source system. After entering the migration receive command on the migration destination. For example: rctx://2 • The keyword all. Note that write access to the source is blocked from the time a migration commit command is given until the migration process finishes. Use the command: • • • Only on the migration source. Only when no backup data is being sent to the migration source. the obj-spec-list is one or more contexts from the migration source.send migration send {obj-spec-list | all} destination-host dsthostname Use this command to start migration. With replication. After you migrate a context. The obj-spec-list is /backup for systems that do not have a replication license. New data written to the source is marked for migration until you enter the migration commit command. The migration commit command should be entered first on the migration source and then on the destination. In the following examples. use a command similar to the following: # migration send /backup destination-host hostC • To start a migration that includes a collection replication context (replication destination string) of col://hostB.The migration send command stays open until a migration commit command is entered. even when a single directory replication context is specified in the command. remember that all data on the migration source is always migrated. use: # migration send col://hostB destination-host hostC • To start migration with a directory replication context of dir://hostB/backup/dir2. use: # migration send dir://hostB/backup/dir2 destination-host hostC • To start migration with two replication contexts using context numbers 2 and 3. even if replication contexts are configured) to a migration destination named hostC.9 Command Reference Guide 199 . use: # migration send rctx://2 rctx://3 destination-host hostC • To migrate all replication contexts. • To start migration of data only (no replication contexts. use: # migration send all destination-host hostC DD OS 4. The date and time when the most recent records were processed. the value includes overhead and network overhead. On the destination.show stats migration show stats Use this command to display migration statistics during the migration process. On the source. The date and time when the most recent records were received. the value includes data. The total number of bytes received at the destination. Bytes Received) to estimate network traffic generated by migration. On the destination. The value includes backup data. overhead. overhead. Bytes Received Received Time Processed Time For example: # migration show stats Destination Bytes Sent Bytes Received ----------hostB ----------200 -----------153687473704 --------------------1974621040 ---------Received Time ---------------Fri Jan 13 09:37 ---------------migration . and network overhead. Migration statistics have the following columns: Bytes Sent The total number of bytes sent from the migration source. the value includes overhead and network overhead. This command is available to administrative users only. Use the value (and the next value. and network overhead. Use the value (and the previous value) to estimate network traffic generated by migration. 9 Command Reference Guide 201 . This command is available to administrative users only.Processed Time ---------------Fri Jan 13 09:37 ------------------- status migration status Use this command to display the current status of migration. For example: migration status CTX: Mode: Destination: Enabled: Local file system status Connection 15:20:09 State: Error: Destination lag: Current throttle: Contexts under migration: 0 migration source hostB yes enabled connected since Tue Jul 17 migrating 3/3 60% no error 0 unlimited dir://hostA/backup/dir2 watch migration watch Use this command to track the initial phase of migration (when write access is blocked). DD OS 4. The command output shows the percent of the migration process that has been completed. This command is available to administrative users only. 1. 1. and then on the destination. hostA. On hostA (the source). During that time. hostC.migration Examples Migrate Between Source and Destination To migrate data from a source. run the following command: # migration send /backup destination-host hostB 3. new data sent to the source is also marked for migration. run the following command to display migration progress: # migration watch 4. hostA. hostB (ignoring replication contexts). use the following commands. create a migration end point. # filesys disable # filesys destroy # migration receive source-host hostA 202 migration . to a destination. On hostC (the migration destination). The three phases of migration may take many hours. to a destination. To allow backups with the least disruption. when hostA is also a directory replication source for hostB. run the following commands. hostB. Migrate with Replication To migrate data and a context from a source. use the following commands. At the appropriate time for your site. use the following command after the three migration phases finish: # migration commit The migration commit command should be entered first on the migration source. use: # filesys disable # filesys destroy # migration receive source-host hostA 2. On either host. On hostB (the migration destination). hostA. run commands similar to the following to change the replication source to hostC: # filesys disable # replication modify dir://hostB/backup/dir2 source-host hostC # filesys enable DD OS 4. # migration send dir://hostB/backup/dir2 destination-host hostC Note that this command also disables the file system. # migration commit Note that this command also disables the file system. run the following command.9 Command Reference Guide 203 .2. On hostA (the migration and replication source). 5. On the source migration host. run the following command. run the following command to display migration progress: # migration watch 4. First on hostA and then on hostC. On hostB (the replication destination). 3. 204 migration . Enable Ethernet interfaces. Analyze network connections. Page 206 Page 208 Page 212 Page 213 Page 213 Page 214 Page 215 Page 215 Page 218 Page 219 Page 220 Page 221 Reset network parameters to the defaults.17 net The net command sets up network parameters and Ethernet interface addresses and displays network information. Save packet data to a file for analysis. Configure and display interface failover. Disable Ethernet interfaces. Create a VLAN or virtual interface. Configure and display hosts. Delete a VLAN interface. Page 221 Page 221 Page 223 Page 226 DD OS 4. Configure network parameters. Look up DNS entries. Confirm a connection between the Data Domain system and a host.9 Command Reference Guide 205 . The net command has the following options: aggregate config create destroy disable ddns enable failover hosts iperf lookup ping reset set show tcpdump Configure and display aggregate interfaces. Set network parameters. Manage the Dynamic DNS protocol. Display network parameters. Choose the mode that is compatible with the requirements of the system to which the ports are directly attached. Data Domain recommends making interface changes only during scheduled maintenance downtime. and displays network information and status. see the net create virtual command. (Link aggregation and Ethernet trunking are different terms for the same thing. Note: Changes to disabled Ethernet interfaces made with the net command options flush the routing table. you must reconfigure any routing rules and gateways.About the net Command The net command manages the use of virtual interfaces. DHCP. 206 net . DNS. Use the net aggregate add command to enable aggregation on an existing virtual interface by specifying the physical interfaces and mode (the mode must be specified). The route command manages routing rules. The net aggregate commands control this feature.) aggregate add net aggregate add virtual-ifname mode {xor-L2 |xor-L2L3 | roundrobin} interfaces physical-ifname-list See Considerations for Ethernet Failover and Net Aggregation on page 230 before setting up aggregation. thus increasing the link speed and reliability over that of a single port. After making interface changes. net Command Options aggregate Link aggregation provides improved network performance and resiliency by using two to four network ports in parallel. and IP addresses. Note: To create a virtual interface. Available modes are the Layer 2 or Layer 3/Layer4 implementations of the static balanced mode. or round-robin. eth3 aggregate reset net aggregate reset virtual-ifname Use this command to remove all physical interfaces from an aggregate virtual interface. to enable link aggregation on virtual interface veth1 to physical interfaces eth1 and eth2 in mode xor-L2. The supported aggregate modes are: xor-L2 Transmit based on static balanced mode aggregation with an XOR hash of Layer 2 (inbound and outbound MAC addresses). to delete physical interfaces eth1 and eth2 from the aggregate virtual interface veth1. DD OS 4. use the following command: # net aggregate add veth1 mode xor-L2 interfaces eth2 eth3 aggregate del net aggregate del virtual-ifname interfaces physical-ifnamelist Use this command to delete interfaces from the physical list of the aggregate virtual interface. Transmit based on static balanced mode aggregation with an XOR hash of Layer 3 (inbound and outbound IP address) and Layer 4 (inbound and outbound port numbers).9 Command Reference Guide 207 . Transmit packets in sequential order from the first available link through the last in the aggregated group. xor-L3L4 roundrobin For example. The aggregated links transmit packets out of the Data Domain system. For example. use the following command: # net aggregate del veth1 interfaces eth2.The command enables aggregation on a virtual interface virtualifname in the specified mode with the physical interfaces named in physical-ifname-list. eth5 ------------------- config net config ifname [ipaddr][netmask mask][up | down] [dhcp {yes | no}][mtu {size | default}][autoneg][duplex {full | half}] [speed {10 | 100 | 1000}] [0] config ifname 0 net config ifname 0 Use this command to reset a network interface card to its default (unconfigured) mode. 208 net . This command is available to administrative users only. The output is similar to the following: # net aggregate show Ifname -----veth1 -----Hardware Address ---------------00:15:17:0f:63:fc ----------------Aggregation Mode ---------------balance hash xor-L2 ---------------Configured Interfaces --------------------eth4.The output is similar to the following: # net aggregate reset veth1 Interfaces "eth2. For example. use net config eth0 0 to reset interface 0. aggregate show net aggregate show Use this command to display basic information on the aggregate setup. eth3" have been removed from "veth1". use the command: # net config eth0 dhcp yes To check the command. This command is available to administrative users only. Changes take effect only after a system reboot.9 Command Reference Guide 209 . either have a network cable attached to the card during the reboot or. Note: To activate DHCP for an interface when no other interface is using DHCP. to set autonegotiation for interface eth1. to set DHCP for the interface eth0. This command always enables the specified interface. regardless of whether you specify yes or no. For example. To activate DHCP for an optional gigabit Ethernet card. To check that the Ethernet connection is live. For example. run the net enable command for the interface. you must reboot the Data Domain system.config ifname autoneg net config ifname autoneg Use this command to allow the network interface card to autonegotiate the line speed and duplex setting for an interface. use: # net config eth1 autoneg config ifname dhcp net config ifname dhcp [yes | no] Use this command to set up an Ethernet interface to expect DHCP information. use the net show hardware command. use the net show configuration command. DD OS 4. Note: This command is not applicable with 10 Gb Ethernet cards. This command is available to administrative users only. after attaching a cable. This command is available to administrative users only.x.x is 255.1. if it is enabled. the default netmask for 10.1. See config ifname dhcp on page 209 for details. This command disables autonegotiation.x. Use the net config ifname dhcp disable command to turn off DHCP for an interface. the system uses the default netmask. This command is available to administrative users only.0.168.255.255. and the default netmask for 192. For example. This command disables DHCP for the interface. 100 Base-T. use: # net config eth1 speed 100 duplex full config ifname ipaddr net config ifname ipaddr Use this command to change the IP address used by a Data Domain system Ethernet interface.0. For example. 210 net .1 Use the net show config command to check the operation. Setting a port to a speed of 1000 and duplex of half leads to unpredictable results. The default value for netmask depends on the IP address.0. A line speed of 1000 allows only a duplex setting of full.1.x is 255. You can specify line speeds of 10 Base-T. use: # net config eth0 192. You cannot use this command with 10 Gb Ethernet cards. If you do not specify a netmask with config ifname netmask.168. to set the line use to half-duplex for interface eth1.x. to set the interface eth0 to the IP address of 192. For example.x. Half-duplex is not available for any port set for a speed of 1000 (Gigabit). or 1000 Base-T (Gigabit). use: # net config eth1 duplex half speed 100 To set the line speed to 100 Base-T for interface eth1. and set the line speed. Both duplex and speed are required keywords.0.config ifname duplex speed net config ifname duplex {full|half} speed {10 | 100 | 1000} Use this command to manually set an interface to half-duplex or full-duplex. This command is available to administrative users only. The Global Deduplication license must be installed. This command is available to administrative users only. Make sure that all of your network components support the size set with this option.168. For 100 Base-T and gigabit networks.config ifname mtu net config ifname mtu {size | default} Use this command to change the maximum transfer unit size for an Ethernet interface.255.200 netmask 255.255. you must also specify an IP address with config ifname ipaddr.99. 1500 is the standard default. If you specify a netmask for an interface. use the command: # net config eth2 mtu 9014 config ifname netmask net config ifname netmask mask Use this command to change the netmask used by an Ethernet interface. This command is available to administrative users only. For example. to set the netmask 255.0 for the interface eth0: # net config eth0 192. For example. to set a maximum transfer unit size of 9014 for the interface eth2.replication"] This command is used to tag a network interface for a specific type of Global Deduplication Array traffic. DD OS 4. Supported values are from 1500 to 9014.0 config ifname type net config ifname type [none|management|data|replication|cluster|"data. Note: Only one physical or virtual interface can be associated with each logical interface type.255. The default option returns the setting to the default value.9 Command Reference Guide 211 .255. • • For example. Global Deduplication interface: identifies the Global Deduplication Array interconnect IP address on each controller. Note: To use the Enterprise Manager. Replication interface: identifies the IP address for replication traffic. The Data Domain controller needs an IP address so the Web browser can locate it on the network. the Data Domain file system will use the network interface with type cluster to communicate with the second system. The range of vlan-id is between 1 and 4095. create create interface net create interface {physical-ifname|virtual-ifname} vlan vlan-id Use this command to create a new VLAN interface from either a physical port or a virtual interface. which is a graphical-user interface (GUI) application). • Data interface: identifies the IP address for backup traffic from the media servers to the controller. Use the net config commands to configure the IP 212 net . veth1.• Management interface: identifies the IP address for managing the controller (SSH or the Data Domain Enterprise Manager. Data Domain file systems use the network interface with type data to communicate with the Media Server for backup data. in a Global Deduplication Array. you must be able to connect to the Data Domain controller via the internet. enter: # net config veth1 type cluster config ifname up | down net config ifname [up | down] See net config enable and net config disable. If a Global Deduplication Array has two Data Domain systems. to communicate with a second Data Domain system. to create a VLAN interface named eth0. The remainder of the name can be decimal or hexadecimal numbers (0-9 and aA-fF are permitted). For example.address and netmask. to create a virtual interface named veth12. For example to destroy a VLAN named eth1. The maximum number of interfaces is 512. The virtual interface name virtual-id must begin with veth. Interface names must be unique.35 # net destroy veth23 disable net disable ifname DD OS 4. Notes: • • The total number of VLAN and virtual interfaces that can be created is limited to 80. use: # net destroy eth1. or to enable or disable the interface. A VLAN interface cannot be created on a failover interface consisting of Chelsio 10 GbE interfaces.35 and a virtual interface named veth23:2. The VLAN interface is named ifname. use: # net create virtual veth12 destroy net destroy {virtual-ifname|vlan-ifname} Use this command to delete an existing VLAN or virtual interface.2: # net create interface eth0 vlan 2 create virtual net create virtual virtual-id Use this command to create a new virtual interface.9 Command Reference Guide 213 . This command is available to administrative users only. For example.vlan-id. 214 net . This command is available to administrative users only. ddns add net ddns add (ifname-list | all) Use this command to add interfaces to the DDNS registration list.Use this command to disable an Ethernet interface on the Data Domain system. and register their IP address on. For example. use: # net disable eth0 ddns DDNS (Dynamic DNS) is the protocol that allows machines on a network to communicate with. This command is available to administrative users only. ddns del net ddns del (ifname-list | all) Use this command to remove interfaces from the DDNS registration list. ddns enable net ddns enable Use this command to enable DNS updates. ddns disable net ddns disable Use this command to disable DNS updates. to disable the interface eth0. This command is available to administrative users only. a DNS server. This command is available to administrative users only. This command is available to administrative users only. ddns reset net ddns reset Use this command to reset the DDNS registration list to its defaults and disable registration. ddns status net ddns status Use this command to display whether DDNS registration is enabled or not. ddns show net ddns show Use this command to display interfaces in the DDNS registration list. This command is available to administrative users only. enable net enable ifname Use this command to enable a disabled Ethernet interface on the Data Domain system. This command is available to administrative users only. For example.ddns register net ddns register Use this command to manually register configured interfaces with DNS. where ifname is the name of an interface. and is implemented with the net failover DD OS 4. use: # net enable eth0 failover Ethernet failover provides improved network stability and performance. to enable the interface eth0. This command is available to administrative users only.9 Command Reference Guide 215 . See Considerations for Ethernet Failover and Net Aggregation on page 230 before setting up failover. This command is available to administrative users only. Using special characters in the string x other than the period (. where x is a unique string (typically one or two digits). A failover from one physical interface to another can take up to 30 seconds. which typically limits the name string x to two characters. one of which can be specified as the primary. use the net show settings command. to associate a failover virtual interface named veth1 with the physical interfaces eth2 and eth3. The system makes the primary interface the active interface whenever the primary interface is operational. The maximum length of the full name is 16 characters. use: # net failover add veth1 interfaces eth2 eth3 primary eth2 Current interfaces for veth1: eth2. To designate one of the physical interfaces as the primary failover interface. failover add net failover add virtual-ifname interfaces physical-ifname-list [primary physical-ifname | none] Use this command to enable failover on an existing virtual interface name in the form vethx. and with eth2 as the primary.3999:199. eth3. to check for the presence of a virtual interface. The failover enabled virtual interface represents a group of secondary physical interfaces. A typical full virtual interface name is veth56. Note: A primary interface must be part of the failover and cannot be deleted from the failover while it is the primary interface.command. Use the net failover modify command to change the primary interface. use the optional primary parameter. The delay is to guard against multiple failovers when a network is unstable. The virtual interface must already be present on the system.) and the colon (:) is allowed but not recommended. For example. primary eth2 216 net . failover reset net failover reset virtual-ifname Use this command to reset a virtual interface and remove all physical interfaces that were associated with it. For example. the following command removes the virtual interface veth1 and releases all of its associated physical interfaces. Resetting a virtual interface removes all associated physical interfaces from the virtual interface.failover del net failover del virtual-ifname interfaces physical-ifname-list Use this command to remove a physical Ethernet interface from a failover virtual interface.) # net failover reset veth1 DD OS 4. The physical interface remains disabled after being removed from the virtual interface. Current interfaces for veth1: eth3.9 Command Reference Guide 217 . to remove eth2 from the virtual interface veth1. This command is available to administrative users only. For example. primary: eth3 failover modify net failover modify virtual-ifname primary {physical-ifname | none} Use this command to modify the physical Ethernet interface designated as primary for failover on a virtual interface. This command is available to administrative users only. which has eth2 and eth3 as slaves and eth3 as the primary interface. This command is available to administrative users only. use: # net failover del veth1 interfaces eth2 Interfaces "eth2" have been removed from "veth1". (The physical interfaces are still disabled and must be enabled for any other use than as part of another virtual interface. When interfaces are added to the virtual interface the information is not sent to the bonding module until the virtual interface is brought up. To see what is in the registry. Until that time the registry and the bonding driver configuration will be different. Use the net enable command to re-enable the interfaces.168.. use the net show settings command. This command shows what is configured at the bonding driver.. to associate both the fully-qualified domain name bkup20. This command is available to administrative users only. # net enable eth2 # net enable eth3 failover show net failover show Use this command to display configured failover virtual interfaces.3.yourcompany. The value in the Hardware Address column is the physical interface currently used by the failover virtual interface. Use this command to associate an IP address with a hostname. For example. use the command: 218 net .com and the hostname of bkup20 with an IP address of 192. # net failover show Ifname -----veth1 -----Hardware Address ----------------00:04:23:d4:f1:27 ----------------Configured Interfaces --------------------eth3 --------------------- hosts hosts add net hosts add ipaddr {host | host [alias]} .3. The hostname is a fully-qualified domain name or a hostname.After the virtual interface has been reset. Note: The registry settings may be different from the bonding configuration.. the physical interfaces remain disabled. The entry is added to the /etc/hosts file. to remove the host entries with an IP address of 192. This command is available to administrative users only.yourcompany.3 bkup20. This command is available to administrative users only.3.com iperf The iperf Linux command measures the quality and bandwidth of network connections.3 hosts reset net hosts reset Use this command to delete all hostname and IP address entries from the /etc/hosts file.168.3. This command is available to administrative users only.9 Command Reference Guide 219 .3. DD OS 4.yourcompany.168.3 -> bkup20 bkup20. The display looks similar to the following: # net hosts show Hostname Mappings: 192.# net hosts add 192.3.168. For example. hosts show net hosts show Use this command to display hostnames and IP addresses from the /etc/hosts file.com bkup20 hosts del net hosts del ipaddr Use this command to delete a hostname or IP address entry from the /etc/hosts file.3. The net iperf command provides the equivalent capabilities.168. use: # net hosts del 192. or G suffices to scale the value. net iperf server Option port port window-size bytes Equivalent iperf Option -p port -w iperf_bytes lookup net lookup {ipaddr | hostname} Use this command to look up DNS entries. net iperf client Option server-host port port window-size bytes transmit-size bytes duration secs interval secs data random data default Equivalent iperf Option -c server-host -p port -w iperf_bytes -n iperf_bytes -t secs -i secs -F /dev/urandom No equivalent option (default behavior) Values for bytes may be followed by the K. This command is available to administrative users only. iperf server net iperf server [port port] [window-size bytes] Use this command to run the iperf command in server (-s) mode. This command is available to administrative users only. 220 net . M.iperf client net iperf client server-host [port port] [window-size bytes] [data {random|default}] [interval secs] [{transmit-size bytes | duration secs}] Use this command to run the iperf command in client mode. ipaddr3]] Use this command to add or change DNS servers for the Data Domain system to use in resolving addresses to give DNS server IP addresses. domain name. or both. The command requires at least one parameter and accepts multiple parameters. This command is available to administrative users only. use: # net ping srvr24 reset net reset {hostname | domainname | dns} Use this command to reset the hostname. The command writes over the current list of DNS servers. broadcast count interface Allow pinging a broadcast address. Changes take effect only after a system reboot. Entries in the list can be separated by commas. to check that communication is possible with the host srvr24. This command is available to administrative users only. use: # net reset hostname set set dns net set dns ipaddr1[. Give the interface to use: eth0 through eth3. ipaddr2[. Give the number of pings to issue.ping net ping host [broadcast] [count n] [interface ifname] Use this command to check that a Data Domain system can communicate with a remote host with a hostname or IP address. Only the servers given in the latest command are available to a Data Domain system. DD OS 4. For example. spaces.9 Command Reference Guide 221 . to reset the system host name. For example. and DNS parameters to their default values (empty). 92 To check the command. and would result in the GUI not being able to manage that host. For example. to allow a Data Domain system to use a DNS server with an IP address of 123. it can prevent logins to that host from the GUI. This command is available to administrative users only. use the net ping host-name command. use the command: # net set dns 123. changing the hostname causes the Data Domain system to drop out of the domain.Note: To activate a DNS change.234.78. set domainname net set domainname name Use this command to change the domain name used by the Data Domain system. If the Data Domain system is using CIFS with active directory authentication. Because of a restriction with some browsers. For example. This command is available to administrative users only.78. to set the domain name to yourcompany-ny. For example. the Data Domain system must be rebooted. to set the Data Domain system name to dd10: # net set hostname dd10 To check the operation.234.92.com. use: # net set domainname yourcompany-ny. If the hostname contains an underscore.com set hostname net set hostname host Use this command to change the name other systems use to access the Data Domain system. the hostname should not include an underscore character. use the net show hostname command. 222 net . Use the cifs set authentication command to rejoin the active directory domain. The last line indicates whether the servers were configured manually or by DHCP.show show all net show all Use this command to display the output from the commands net show config. net show dns.3 192. show domainname net show domainname Use this command to display the domain name used for email sent by a Data Domain system. # net show dns # 1 2 Server ----------192.168. net show domainname. net show hostname. With no ifname. show config net show config [ifname] Use this command to display the current network driver settings for an Ethernet interface.1. The display looks similar to the following. and net show stats. net show hardware. DD OS 4. net show settings.9 Command Reference Guide 223 .1.4 ----------- Showing DNS servers configured manually.168. the command returns configuration information for all Ethernet interfaces. show dns net show dns Use this command to display the DNS servers used by a Data Domain system. yourcompany. The display looks similar to the following: # net show hardware Port ---eth0 eth1 eth2 eth3 Speed -------100Mb/s unknown 1000Mb/s unknown Duplex ------full unknown full Supp Speeds ----------10/100/1000 10/100/1000 10/100/1000 Hardware Address ----------------00:02:b3:b0:8a:d2 00:02:b3:b0:80:3f 00:07:e9:0d:5a:1a 00:07:e9:0d:5a:1b Physical -------Copper Copper Copper Copper Cable ----yes no yes no unknown 10/100/1000 The display of the status of network ports has the columns: Port The Ethernet interfaces on the system (for example.The display looks similar to the following: # net show domainname The Domainname is: yourcompany.com show hostname net show hostname To display the current hostname used by the Data Domain system. Shows whether the port is using the full or half duplex protocol.co show hardware net show hardware Use this command to display hardware information. eth3 or eth3a. Speed Duplex Supp Speeds 224 net . The display is similar to the following: # net show hostname The Hostname is: dd10. The actual speed at which the port currently deals with data. use the net show hostname operation. depending on the port naming convention your system uses). Lists all the speeds that the port is capable of using. 252.255.0* (not specified)* n/a n/a n/a n/a --------------------------------additional setting ------------------ * Value from DHCP Port Enabled Each Ethernet interface listed by name. Shows whether or not the port currently has a cable attached and the carrier is up. For example.9. Shows whether the port is Copper or Fiber. To check the actual status of interfaces. not the actual status of each interface. Whether or not the port is configured as enabled. the display does not have values for the remaining columns. The Cable column entry shows a value of yes for live Ethernet connections. if an interface on the Data Domain System does not have a live Ethernet connection. The address used by the network to identify the port.168. If a port uses DHCP for configuration values. show settings net show settings Use this command to display network settings. the interface is not actually enabled. The standard IP network mask. use the net show hardware command.199* (not specified)* n/a n/a n/a n/a ---------------netmask ---------------255. Whether or not port characteristics are supplied by DHCP. The display of Ethernet interface settings shows what you have configured.Hardware Address Physical Cable The MAC address.9 Command Reference Guide . # net show settings port ----eth0 eth1 veth0 veth1 veth2 veth3 ----enabled ------yes yes no no no no ------DHCP ---yes yes n/a n/a n/a n/a ---IP address ---------------192. 225 DHCP IP Address Netmask DD OS 4. 0. The output files are placed in /ddvar/traces from where you can upload them to autosupport.168. Display the IP routing tables showing the destination. Display the kernel interface table and a table of all network-enabled interfaces and their activity.datad 0.8. This command converts the options from the command line to equivalent tcpdump options.0 default router-10. Display network statistics for protocols.0. A maximum of 10 output files may be retained on the system. netmask. if 226 net . # net show stats route Gateway * * Genmask 255.0 tcpdump tcpdump capture net tcpdump capture filename [interface iface] [{host host | net net [mask mask]}] [port port] [snaplen bytes] Use this command to run the Linux tcpdump command and save packet data to a file for later analysis.0. all interfaces listening route Display summaries of the other options.0.0 127.show stats net show stats [all | interfaces | listening | route | statistics] Use this command to display network statistics. The information returned from all the options is used by Data Domain support staff for troubleshooting. statistics The display with the route option is similar to the following.255.252. Display statistics about active internet connections from servers.0.0 255.0 Flags U U UG MSS Window 0 0 0 0 0 0 irtt Iface 0 eth0 0 lo 0 eth0 Kernel IP routing table Destination 192. gateway. and other information for each route. You can use this command to collect data and then copy the output file to another system for analysis.0. eth3. This command is available to administrative users only. and eth4 for use as failover interfaces: # net disable eth2 # net disable eth3 # net disable eth4 2. net Examples Sample Failover Workflow 1. Specify a filename to delete all files that match the pattern /ddvar/traces/tcpdump_filename *. If virtual interface veth1 does not exist on the system.this limit is reached. the command prompts you to delete some of the existing files.9 Command Reference Guide 227 . This command is available to administrative users only. Command options are translated as follows: net tcpdump Option filename interface iface host host net net mask mask port port snaplen bytes Equivalent tcpdump Options -w /ddvar/traces/tcpdump_filename -C 100M -W 5 -i iface host host net net mask mask port port -s bytes tcpdump del net tcpdump del {filename | all} This command deletes output files created by the net tcpdump capture command. create it: DD OS 4. Disable the interfaces eth2. Specify all to remove all net tcpdump output files. eth3.0 5. eth3 4.199.20.41 netmask 255.eth3 Current interfaces for veth1: eth2.# net create virtual veth1 3.eth3 --------------------- To add the physical interface eth4 to failover virtual interface veth1: # net failover add veth1 interfaces eth4 Current interfaces for veth1: eth2. Create a failover virtual interface named veth1 using the physical interfaces eth2 and eth3: # net failover add veth1 interfaces eth2. Configuration of "veth1" is reset.eth4 • To remove eth2 from the virtual interface veth1: # net failover del veth1 interfaces eth2 Interfaces "eth2" have been removed from "veth1". Enable virtual interface veth1: # net config veth1 10.255. Show configured failover virtual interfaces: # net failover show Ifname -----veth1 -----• Hardware Address ----------------00:04:23:d4:f1:27 ----------------Configured Interfaces --------------------eth2. • To remove the virtual interface veth1 and release all of its associated physical interfaces: # net failover reset veth1 Interfaces for veth1: • To re-enable the physical interfaces: # net enable eth2 # net enable eth3 # net enable eth4 228 net .0. 9 Command Reference Guide 229 .eth3 --------------------- • To delete physical interface eth3 from the aggregate virtual interface veth1: # net aggregate del veth1 interfaces eth3 • To add link physical interface eth4 on virtual interface veth1: # net aggregate add veth1 mode xor-L2 interfaces eth4 • To remove all interfaces from veth1: # net aggregate reset veth1 Interfaces "eth2. Disable the interfaces eth2. create it: # net create virtual veth1 3. DD OS 4.119 netmask 255.0 5. Configuration of "veth1" is reset. eth4" have been removed from "veth1". If virtual interface veth1 does not exist on the system.168.45. Enable the virtual interface: # net config veth1 192. eth3.Sample Aggregation Workflow 1.248. Show the aggregate setup: # net aggregate show Ifname -----veth1 -----Hardware Address ---------------00:15:17:0f:63:fc ----------------Aggregation Mode ---------------xor-L2 ---------------Configured Interfaces --------------------eth2. Enable link aggregation on virtual interface veth1 for physical interfaces eth2 and eth3 in xor-L2 mode: # net aggregate add veth1 mode xor-L2 interfaces eth2 eth3 4. and eth4 to use as aggregation interfaces: # net disable eth2 # net disable eth3 # net disable eth4 2.255. Each physical interface (eth0 to eth5) can belong to at most one virtual interface. • • • • • 230 net . you can configure one primary interface and up to five failover interfaces (except with 10 Gb copper Ethernet cards. The recommended number of physical interfaces used in aggregation is two. Virtual interfaces must be created from identical physical interfaces (all copper or all optical. and eth5.• To re-enable the physical interfaces: # net enable eth2 # net enable eth3 # net enable eth4 Important Notices Considerations for Ethernet Failover and Net Aggregation While planning Ethernet failover and net aggregation. and all 1 Gb or all 10 Gb). A system can have multiple and mixed failover and aggregation virtual interfaces. consider the following supported guidelines: • A system with two Ethernet cards can have a maximum of six ports. eth2. and with the 10 Gb optical Ethernet cards. eth4. which are restricted to one primary interface and one failover interface. eth3. eth1. eth0. The recommended number of physical interfaces for failover is two. which cannot be used in any failover or aggregation). unless one of the cards is a 1-port 10 GbE fiber. subject to the restrictions above. However. in which case the system has a total of five ports (eth0-eth4). All interfaces in a virtual interface must be on the same subnet and on the same LAN (or card for 10 Gb).Supported Interfaces Interface Aggregation Failover 1 Gb to 10 Gb Motherboard to 1 Gb dual-port copper (this is the only supported configuration) 1 Gb to 1 Gb Dual-port copper Not supported Supported Not supported Supported Dual-port fiber Supported across ports on a card. Network switches used by a virtual interface must be on the same subnet. or across cards Supported across ports on a card or across cards Supported only on the same NIC Not supported 10 Gb to 10 Gb Dual-port copper Single-port fiber Not supported Not supported When you create a virtual interface: • The virtual-name must be in the form vethx where x is a number in the format required for the net create virtual command. The physical-name must be in the form ethx where x is an alphanumeric string (typically a number). across ports on the motherboard. You can create as many virtual interfaces as there are physical interfaces.9 Command Reference Guide . An interface that is part of a virtual interface is seen as disabled by other net commands. or across cards Supported across ports on a card or across cards Supported across ports on a card. 231 • • • • DD OS 4. across ports on the motherboard. Each interface used in a virtual interface must first be disabled with the net disable command. If the primary interface goes down and multiple interfaces are still available. it must be explicitly specified with the primary option to the net failover add command and must also be a slave to the virtual interface.• A virtual interface needs an IP address that is set manually. If a primary interface is to be used in a failover configuration. Use the net config command. the next interface used is a random choice. 232 net . all allowed NFS clients. Show active NFS clients.9 Command Reference Guide 233 . Delete NFS clients from an export. This command includes the following options. Reset the client list so that no clients can connect. and the time needed for specific NFS operations. DD OS 4. Disable NFS clients from connecting. and an NFS histogram of the time needed for NFS operations. It also allows you to display status information. Enable NFS clients to connect. such as whether or not the NFS system is active. add del disable enable reset show Add NFS clients to an export. Page 234 Page 235 Page 235 Page 235 Page 236 Page 236 status Page 238 About the nfs Command The nfs command allows you to add NFS clients and to manage their access to a Data Domain system.18 nfs The nfs command manages NFS clients for a Data Domain system. Show whether or not NFS is enabled. Turn off root squashing (default value). IP addresses with either netmasks or length. or an asterisk (*) wildcard with a domain name. and bounded by parentheses. This command is available to administrative users only. To specify multiple clients. or both. With no options specified. root_squash. Map requests from uid or gid 0 to the anonymous uid/gid. such as *.nfs Command Options add nfs add {/ddvar | /backup[/sub-dir]} client-list [nfs-options] Use this command to add NFS clients that can access the Data Domain system. Note: /backup subdirectory is not supported in Global Deduplication Array. or both. The following options are allowed: ro rw root_squash no_root_squash all_squash no_all_squash secure Enable read-only permission. Require that requests originate on an Internet port that is less than IPPORT_RESERVED (1024) (default value). with entries separated by commas. insecure 234 nfs . A client can be a fullyqualified domain hostname.com. no_all_squash. the default options are rw. Map all user requests to the anonymous uid/gid. Turn off the mapping of all user requests to the anonymous uid/gid (default value). an NIS netgroup name with the prefix @. The nfs-options are contained in a list. A client added to a subdirectory under /backup has access only to that subdirectory. spaces. create a list of entries separated by commas. class-C IP addresses. Enable read and write permissions (default value).yourcompany. An asterisk (*) by itself means no restrictions. and secure. Turn off the secure option. spaces. The ID is an integer bounded from 0 to 65635. including a backup subdirectory. disable nfs disable Use this command to disable all NFS clients. which must be enclosed in double quotation marks. enable nfs enable Use this command to allow all NFS-defined clients to access the Data Domain system. anongid=id del nfs del {/ddvar | /backup[/subdir]} client-list Use this command to delete specific directories. or both.9 Command Reference Guide 235 . which must be enclosed in double quotation marks. This command is available to administrative users only. The client-list can contain IP addresses. for one or more clients. Set an explicit group ID for the anonymous account. This command is available to administrative users only. DD OS 4. This command is available to administrative users only.anonuid="id" Set an explicit user ID for the anonymous account. The ID is an integer bounded from 0 to 65635. Note: /backup subdirectory is not supported in Global Deduplication Array. spaces. hostnames. or an asterisk (*) that represents all clients. Separate items in the list by commas. 236 nfs .reset reset clients nfs reset clients Use this command to reset the client list to the factory default. This command is available to administrative users only. and the mount path and NFS options for each. show clients nfs show clients Use this command to list the NFS clients allowed to access the Data Domain system. No NFS clients can access the Data Domain system when the list is empty. reset stats nfs reset stats Use this command to clear the NFS statistics. show detailed-stats nfs show detailed-stats Use this command to display NFS cache entries and status for purposes of troubleshooting. This command is available to administrative users only. show show active nfs show active Use this command to list all of the clients that have been active in the past 15 minutes and the mount path for each active client. which is an empty list. show histogram nfs show histogram [op] Use this command to display NFS operations in a histogram. Optionally, use the op argument to plot a histogram for a specific NFS operation. This command is available to administrative users only. The command displays the following output. Op mean-ms stddev max-s 2ms 4ms 6ms 8ms 10ms 100ms 1s 10s >10s The name of the NFS operation. The mathematical mean time for completion of the operations. The standard deviation for time to complete operations, derived from the mean time. The maximum time taken for a single operation. The number of operations that took 2 ms or less. The number of operations that took between 2ms and 4ms. The number of operations that took between 4ms and 6ms. The number of operations that took between 6ms and 8ms. The number of operations that took between 8ms and 10ms. The number of operations that took between 10ms and 100ms. The number of operations that took between 100ms and 1 second. The number of operations that took between 1 second and 10 seconds. The number of operations that took over 10 seconds. DD OS 4.9 Command Reference Guide 237 # nfs show histogram Op NULL GETATTR SETATTR LOOKUP ACCESS READLINK READ WRITE CREATE MKDIR SYMLINK MKNOD REMOVE RMDIR RENAME LINK READDIR READDIRPLUS FSSTAT FSINFO PATHCONF COMMIT WRITESHM READSHM SYNC COMPSTATS mean-ms 0.0 0.0 0.1 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 49.0 0.0 0.0 stddev 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 max-s 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 2ms 1 3 1 20 3 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 4ms 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 6ms 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 8ms 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 10ms 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 100ms 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1s 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 10s 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 >10s 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 --------------------------------------------------------------------------------------------------------- show stats nfs show stats Use this command to display NFS statistics. status nfs status Enter this option to determine whether or not the NFS system is operational. When the files system is active and running, the output shows the total number of NFS requests since the file system started, or since the last time that the NFS statistics were reset. 238 nfs nfs Examples Add or Delete NFS Clients To add an NFS client with an IP address of 192.168.1.02 and read/write access to /backup with the secure option, enter: # nfs add /backup 192.168.1.02 You can also add NFS clients that are part of a subnet. The following examples show how to add a client using its IP address followed by a length and a netmask: # nfs add /backup 192.168.1.02/24 # nfs add /backup 192.168.1.02/255.255.255.0 To delete an NFS client with an IP address of 192.168.1.02 from the /ddvar directory, enter: # nfs del /ddvar 192.168.1.02 DD OS 4.9 Command Reference Guide 239 240 nfs 19 ntp Use the ntp command to synchronize a Data Domain system with NTP time servers and manage the NTP service. The ntp command has the following options: add timeserver del timeserver disable enable reset reset timeservers show status Add one or more remote time servers. Add one or more remote time servers. Disable the NTP local server. Enable the NTP local server. Reset (to default) the NTP server configuration. Reset (to default) the remote time server list. Show the local NTP server configuration. Show the local NTP server status. Page 242 Page 242 Page 242 Page 243 Page 243 Page 243 Page 243 Page 244 About the ntp Command The ntp command allows you to synchronize a Data Domain system with an NTP time server, manage the NTP service, or turn off the local (on the Data Domain system) NTP server. The default system settings for NTP service are enabled and multicast. A Data Domain system can use a time server supplied through the default multicast operation, received from DHCP, or set manually with the Data Domain system ntp add command. DD OS 4.9 Command Reference Guide 241 • • • Time servers set with the ntp add command override time servers from DHCP and from multicast operations. Time servers from DHCP override time servers from multicast operations. The Data Domain system ntp del and ntp reset commands act only on manually added time servers, not on DHCPsupplied time servers. You cannot delete DHCP time servers or reset to multicast when DHCP time servers are supplied. ntp Command Options add timeserver ntp add timeserver server_name Use this command to add a remote time server to NTP list. This command is available to administrative users only. For example, to add an NTP time server named srvr26.yourcompany.com to the list, enter: # ntp add timeserver srvr26.yourcompany.com del timeserver ntp del timeserver server_name Use this command to delete a manually added time server from the list. This command is available to administrative users only. For example, to delete an NTP time server named srvr26.yourcompany.com from the list, enter: # ntp del timeserver srvr26.yourcompany.com disable ntp disable Use this command to disable NTP service on a Data Domain system. This command is available to administrative users only. 242 ntp enable ntp enable Use this command to enable NTP service on a Data Domain system. This command is available to administrative users only. reset ntp reset Use this command to reset the NTP configuration to the default settings. This command is available to administrative users only. reset timeservers ntp reset timeservers Use this command to reset the time server list from manually entered time servers to either DHCP time servers (if supplied) or to the multicast mode (if no DHCP time servers supplied). This command is available to administrative users only. show ntp show config Use this command to display whether NTP is enabled or disabled, and show the time server list. The following example shows the information that is returned: # ntp show config NTP is currently enabled. # Server eth0 eth1 --------------------1 192.168.244.208 X 2 192.168.244.214 X --------------------Showing NTP servers configured by DHCP. DD OS 4.9 Command Reference Guide 243 status ntp status Use this command to display the local NTP service status, time, and synchronization information. The following example shows the information that is returned: # ntp status Status Current Clock Time Clock Last Synchronized Clock Last Synchronized With Time Server Enabled Thu Feb 26 19:27:57.676 2009 Thu Feb 26 19:12:05.729 2009 192.168.244.208 Note: For Global Deduplication Array mode, the output includes information about both the master and worker controllers. ntp Examples Add an NTP Server The following command gives the time server srvr26.company.com as a time server for the Data Domain system to use for synchronization: # ntp add timeserver srvr26.company.com 244 ntp and performance. Create and delete an LSU.20 ost The ost command manages OpenStorage (OST). destroy disable enable ifgroup Delete all LSUs and their contents from the Data Domain system. which is a feature of Symantec’s Veritas NetBackup backup and recovery product. OST is a licensed feature. For Advanced Load Balancing and Failover: Manage interface groups (IP addresses) on a Data Domain private network that distributes data transfer.9 Command Reference Guide 245 . such as Data Domain systems. Set. Clear all job connection counters shown in the output of the ost show connections command in the event that network connection is lost. Set. The ost command includes the following options. verify that OST licensing has been implemented on your Data Domain system. Page 247 Page 248 Page 247 Page 248 lsu opt-dup Page 250 Page 251 option reset Page 255 Page 256 set user-name Set an OST user. reset. Page 256 DD OS 4. Delete the OST user and reset statistics. or show the status of the lowbandwidth optimization option for optimized duplication. or list the LSUs and images in an LSU. Show or reset statistics. reset. If basic options do not work. Disable OST. or show the status of the Distributed Segment Processing option. Enable OST. history. OST integrates NetBackup with disk backup devices. Only connections for backup and restore jobs are load balanced. The LSUs and their contents remain in the Data Domain file system even if you subsequently disable OST. that is. comprised of the IP addresses designated as a group interface. All communication with the Data Domain system is initiated via this master IP connection. which is configured on the NetBackup server. OST commands also support the following major features. the data transfer is load balanced and distributed as separate jobs on the private network. providing higher input/output throughput. backups and restores. If an interface group is configured. Advanced Load Balancing and Failover Configuring an interface group creates a private network within the Data Domain system. OST histogram. Once you re-enable OST. when the Data Domain system receives data from the media server clients. especially for customers who use multiple 1 GigE connections. Page 259 About the ost Command The ost command allows you to create and delete logical storage units (LSUs) on the storage server and to display LSUs disk space usage. Page 257 status Show whether OST is enabled or disabled. In the Symantec NetBackup environment. connections. or OST imageduplication status. 246 ost . Note: You manage Advanced Load Balancing and Failover via the ost ifgroup commands. The data transfer is load balanced based on the number of connections outstanding on the interfaces.show Show the OST user name. statistics. The group interface uses the Advanced Load Balancing and Failover feature to improve data transfer performance and increase reliability. This public network also processes data transfer. media server clients use a single public network IP address to access the Data Domain system. you can use these LSUs again. Distributed Segment Processing The Distributed Segment Processing feature increases backup throughput in almost all cases by eliminating duplicate data transmission between the media server and the Data Domain system. Note: You manage low-bandwidth optimization via the ost ost Command Options enable ost enable Administrators use this command to create and export the /backup/ost directory. Whenever the user. DD OS 4. the Data Domain system updates all images and LSUs the next time that the ost enable command is issued. Low-Bandwidth Optimization NetBackup customers who utilize optimized duplication over a low-bandwidth network (WAN) can increase image duplication speed by using low-bandwidth optimization (low-bw-optim). The command permanently removes all of the data (images) contained in the LSUs. This feature provides additional compression during data transfer. Low-bandwidth compression is available to Data Domain systems with an installed Replication license. opt-dup commands. destroy ost destroy Administrators use this command to delete all LSUs and their contents from the Data Domain system. Note: You manage Distributed Segment Processing via the ost option commands.9 Command Reference Guide 247 . or group ID (GID) changes. user ID (UID). or its interface is not enabled). The command checks if the IP address is valid. ifgroup Notes: ifgroup is an interface group. If the IP is valid. a message reports the IP address is invalid (either because it is not configured on the Data Domain system. you need to enable Advanced Load Balancing and Failover using the ost ifgroup enable command. ifgroup add interface ost ifgroup add interface ipaddr Administrators use this command to add an IP address to a private network that is to process data transfer.You must also manually remove (expire) the corresponding NetBackup catalog entries. However. The IP address must be configured on the Data Domain system. Advanced Load Balancing and Failover is not supported for a Global Deduplication Array. Use the net show settings or net show config commands to view available IP addresses. If not. all the in flight jobs to that interface fail and need to be restarted by the backup administrator. disable ost disable Administrators use this command to disable OST for the Data Domain system. Failover is not an automatic process. any jobs that are started subsequent to the failure will get routed to the healthy interfaces. After adding an IP address as an interface. and its interface enabled. 248 ost . If an interface (or a NIC that has multiple interfaces) fails. the message IP added to list is displayed. Notes: • • 1 GigE and 10GigE connections cannot be used in the same interface group. DD OS 4. At least one IP address must have already been added. You can add public or private IP addresses for data transfer connections. If you are attempting to delete the last IP address interface. ifgroup disable ost ifgroup disable Administrators use this command to disable the Advanced Load Balancing and Failover option for new jobs. ifgroup enable ost ifgroup enable Administrators use this command to enable Advanced Load Balancing and Failover.9 Command Reference Guide 249 . Currently running jobs are not affected. ifgroup del interface ost ifgroup del interface ipaddr Administrators use this command to remove a valid IP address added as an interface. If the OST feature is disabled. the message disabled is displayed. ifgroup show config ifgroup show config Use this command to show the IP addresses that have been added to the ifgroup. you are informed that the ifgroup will be disabled and are given the option of terminating this command. If there are active jobs. 250 ost . lsu lsu create ost lsu create lsu-name Administrators use this command to create an LSU with a given name. a message informs you that the system is busy and that jobs need to complete. If you do not run this series of commands. the Data Domain system reports an error. lsu delete ost lsu delete lsu-name Administrators use this command to delete a specified LSU and all of its contents. You must also manually remove (expire) the corresponding NetBackup catalog entries.ifgroup reset ifgroup reset Administrators use this command to reset Advanced Load Balancing and Failover links. You are asked to try again later. ifgroup status ifgroup status Use this command to show whether OST Link Aggregation is enabled or disabled. the Advanced Load Balancing and Failover feature must be disabled. a message to this effect is displayed. If the Advanced Load Balancing and Failover links are reset. and there must be no active jobs. Note: If you invoke the filesys destroy command. you need to run ost disable followed by ost enable and then create an LSU using ost lsu create. For a reset to occur. which is disabled. the names of all images in a specified LSU. This command. which is available to administrators only. Do not use this option if maximum filesystem write performance is required. is designed for use on networks with less than 6 Mbps aggregate bandwidth. optionally. both systems must undergo a full cleaning cycle to prepare the existing data. and local compression for all LSUs). opt-dup option set low-bw-optim ost opt-dup option set low-bw-optim {enabled | disabled} Low-bandwidth optimization.9 Command Reference Guide 251 . opt-dup Note: The low-bandwidth optimization option is not supported in a Global Deduplication Array. Note: To interrupt the output of this command. global compression. which is disabled by default. After you enable low-bandwidth optimization on both systems. enter the compression option. Enter this CLI command on the source and destination systems: # filesys clean start The amount of time the cleaning cycle takes depends on the amount of data currently on the Data Domain system. must be entered on both Data Domain systems—the source and destination (target) systems. opt-dup option reset ost opt-dup option reset {low-bw-optim} Administrators can use this command to reset low-bandwidth optimization to its default value. To display the compression for all LSUs (the original byte size. press Ctrl+C.lsu show ost lsu show [compression] [lsu-name] Use this command to display the names of all LSUs or. DD OS 4. 2. opt-dup show active ost opt-dup show active Use this command to show the status of an OST image duplication transfer to a destination Data Domain system. The following information is shown for inbound and outbound traffic for a given duration at a specified interval: • • • 252 amount of pre-compressed data in KB amount of post-compressed data in KB network transfer data in KB ost . opt-dup reset stats ost opt-dup reset stats Administrators can use this command to reset opt-dup statistics when OST is enabled.157 opt-dup show history ost opt-dup show history [ duration duration{day | hr}] [interval hr] Use this command to show the data transfer history between the source and destination (target) Data Domain systems. or that it is enabled but there is a configuration mismatch.240 104.opt-dup option show ost opt-dup option show [low-bw-optim] Use this command to show whether low-bandwidth optimization is enabled or disabled for optimized duplication. 04/28 11:29:43 Outbound image name Target host name 127. The low-bandwidth optimization status output indicates either that it is enabled and running.tar enabled and running 436.659.874.0.1 Low-bw-optim Logical bytes to transfer Logical bytes already transferred /backup/example. 638 Network (KB) 27.738 14.• • low-bandwidth optimization factor number of errors Example of OST opt-dup show history command output: Date Time Direction Pre-Comp (KB) 47.tar 0 0 DD OS 4.738 14.32 1.034 Lowbwoptim 1.634 8.327 Post-Comp (KB) 26.638 Network (KB) 27.634 8.21 Errors 2009/ 08/31 2009/ 08/31 11:14 11:14:09 Inbound Outbound 0 0 opt-dup show image-history ost opt-dup show image-history [duration duration{day | hr}] Use this command to show the data transfer history for inbound and outbound traffic on each image in Data Domain system’s backup directory for a given duration at a specified interval.tar /backup/d estin.9 Command Reference Guide 253 . The following is shown for inbound and outbound traffic by date and time: • • • • • amount of pre-compressed data in KB amount of post-compressed data in KB network transfer data in KB low-bandwidth optimization factor number of errors Example of OST opt-dup show image history command output: Date Time Direction Filename Pre-Comp (KB) 47.32 1.527 9.21 Errors 2009/ 08/31 2009/ 08/31 15:13:09 15:13:09 Inbound Outbound /backup/s ource.527 9.034 Lowbwoptim 1.327 Post-Comp (KB) 26. the amount of pre-compressed outbound and inbound data versus the actual network throughput. or postcompressed data.9 Inbound 88.874.080.240 153.opt-dup show performance ost opt-dup show performance [interval sec] [count count] Use this command to display in real time.547. The compression ratio increases when low-bandwidth optimization is enabled.240 153.417 145.--------1644 325 2901 470 2430 458 14390 300 0 70 2308 446 2814 552 3010 529 opt-dup show stats ost opt-dup show stats Use this command to monitor outbound and inbound traffic on a Data Domain system during replication.271 4.976 436.271 4.547.868 83.868 83.417 145.628.628.383. Direction: Network bytes sent: Pre-compressed bytes sent: Bytes after filtering: Bytes after low-bw-optim: Bytes after local compression: Compression ratio: Direction: Network bytes received: Pre-compressed bytes received: Bytes after filtering: Bytes after low-bw-optim: Bytes after local compression: Compression ratio: 254 Outbound 88.080.383.874.--------0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Inbound Pre-comp Network (KB/s) (KB/s) --------. for a given duration at a specified interval.976 436.9 ost . 04/30 11:14:16 Outbound Pre-comp Network (KB/s) (KB/s) --------. option show ost option show [boost] Use this command to show whether the Distributed Segment Processing option is enabled or disabled. Notes: • Distributed Segment Processing is enabled by default in DD OS 4. If a system is upgraded from DD OS 4. and the OST license is installed at the time of the upgrade. By default.x or 4. If this feature presents any problem for a media server. • option reset ost option reset [boost] Administrators use this command to reset Distributed Segment Processing to the default option.9. use this command to disable the feature on the Data Domain system. The Distributed Segment Processing feature is enabled in a Global Deduplication Array.8. Distributed Segment Processing is not automatically enabled.7. Distributed Segment Processing is supported only if the installed version of the OST plug-in is version 2.x to DD OS 4. DD OS 4.0 or later.6. which is enabled.9 Command Reference Guide 255 . and the feature is enabled on the DD OS.option option set boost ost option set boost {enabled | disabled} Administrators can use this command to enable or disable the Distributed Segment Processing feature on the DD OS. it is enabled for DD OS 4. you cannot disable it.8. reset stats ost reset stats Administrators use this command as follows: • • to reset all statistics when OST is enabled. • 256 ost . There can be only one OST user at a time.reset reset user-name ost reset user-name ost-user Use this command to delete the ost-user. The username and password must have already been set up on the Data Domain system by using the DD OS CLI command: user add username [password password] The user must be configured in NetBackup to connect to the Data Domain system. set user-name ost set user-name ost-user Administrators use this command to set the OST user name when OST is enabled. or as a network recovery procedure to clear job connections after the network connection has been lost. • • You must disable and then re-enable OST for OST user-name modifications to take effect. 9 Command Reference Guide 257 .168. and for each active client: • • • • • • • the client’s name whether or not the client is idle (yes/no) the number of installed CPUs the amount of memory in MiB the installed OST plug-in version number the name and version of the operating system the NetBackup version number. • the number of connections that a system uses for OST.Connections -------------Backup -------0 -------0 -------Restore -------0 -------0 -------Control* -------10 -------10 -------Total -------10 -------10 -------- * Control connections for opt-dup. (See sample output for client connections below. and the member column value is always no. Client Connections: Max Client Connections: 65 ifgroup status: Disabled Interface ----------------192. an overview of interfaces available for OST. the ifgroup status is always disabled. image operations DD OS 4. even when the interface has been removed from the ifgroup.show show connections ost show connections Use this command to show the following information: • the number of active clients.193 ----------------Total Connections -----------------------ifgroup member -------no --------------------.52.) the number of connections used for a given group. and whether these connections are spread across interfaces using Advanced Load Balancing and Failover. • • Note: For a Global Deduplication Array. Optionally. The number of operations that took between 10 ms and 100 ms. derived from the mean time.8. The number of operations that took between 1 second and 10 seconds. and the number of OST images created and deleted from LSUs. show image-duplication active ost show image-duplication active Use this command to show the OST image duplication status.show histogram ost show histogram op Use this command to display an OST histogram for the Data Domain system. show stats ost show stats [interval seconds] Use this command to show the output of previous show stats command. The maximum time taken for a single operation. or 10ms 100ms 1s 10s >10s The name of the NFS operation. The number of operations that took over 10 seconds. op mean-ms stddev max-s 2. The number of operations that took less than the specified number of milliseconds (ms). 258 ost .6.4. The number of operations that took between 100 ms and one second. the number of bytes written to and read from OST images contained in LSUs. you can show statistics for a specific number of seconds. The mathematical mean time for completion of the operations. The number of errors encountered for each operation is also shown. The standard deviation for time to complete operations. If Distributed Segment Processing is enabled. status ost status Enter this command to determine whether OST is enabled or disabled. show user-name ost show ost-user Use this command to display the current OST user. the number of bytes transferred and the amount of compression achieved is displayed. DD OS 4.9 Command Reference Guide 259 . 260 ost . 21 replication The replication command manages the mirroring of data between Data Domain systems. Restart replication that was temporarily halted (with disable). Destroy a replication pair. Reduce the network bandwidth rate. Page 263 Page 263 Page 264 Page 265 Page 265 Page 266 Page 266 Page 269 Page 271 Page 271 Page 272 Page 272 Page 282 Page 284 Page 284 Page 287 261 DD OS 4. Move data from a surviving destination to a new source. check that licensing is implemented. abort add break disable enable initialize modify option reauth recover resync show status sync throttle watch Stop an ongoing resync process. Temporarily suspend a replication pair. Manage replication connection options. Show replication status. The replication command includes the following options. Replication is a licensed feature.9 Command Reference Guide . Reset authentication between a source and a destination. Resynchronize broken directory replication. Start replication between a source and a destination. Display replication information. Modify replication host connection parameters. If basic options do not work. Create a replication pair. View the real-time status of replication. Synchronize a replication pair. a specific replication pair is always identified by the destination. Each Data Domain system is dedicated as a source or a destination and each can be in only one replication pair. VTL pool replication is the same as directory replication when you configure replication and when you use the replication command (except for the destination name limitation mentioned in the add option). such as /etc/passwd. Directory replication provides replication at the level of individual directories. Each replication pair configured on a Data Domain system is called a context. each Data Domain system can also perform normal backup and restore operations. In addition to /backup certain system files. The destination is a read-only system except for receiving data from the source. During directory replication. are also replicated. • In the command options. 262 replication . Do not mix CIFS and NFS data under the same directory. A single destination Data Domain system can receive backups from both CIFS clients and NFS clients as long as separate directories are used for CIFS and NFS. Replication command options with directory replication may target a single replication pair or may target all pairs that have a source or destination on the Data Domain system.About the replication Command Replication can be implemented as either a collection or a directory: • Collection replication replicates the complete /backup directory from one Data Domain system (a source) to another Data Domain system (a destination). Each Data Domain system can be the source or the destination for multiple directories and can also be a source for some directories and a destination for others. the command may take 15 to 20 seconds to finish.9 Command Reference Guide . This command can be invoked from either the source or the destination directory replication systems. The default is disabled. Refer to the entire procedure in Configuring Replication on page 288 before using this command. Once the command is executed. 263 • • DD OS 4. When a Data Domain system is at or near full capacity. Use low-bw-optim enabled to enable delta replication. abort resync replication abort resync destination Use this command to stop an ongoing resync operation. • The source and destination hostnames must be the names returned by the hostname command for the source and destination Data Domain systems. This option is only active when it is enabled on both the source and the destination. Note: This command is just one of the commands that are used to create a replication pair. add replication add source source destination destination [low-bw-optim {enabled | disabled}] Use this command to create a replication pair on both the source and destination Data Domain systems. This command can be executed only on the destination.replication Command Options abort abort recover replication abort recover destination Use this command to stop a recover process. reconfigure replication on the source and restart the recover process. This command is available to administrative users only. the source and destination parameters must start with dir://. A destination variable or all is required. break replication break {destination | all} Use this command to remove either the source or the destination Data Domain system from a replication pair. or to remove all Replicator configurations from a Data Domain system. The source and destination include the host and backup directory names. the source and destination parameters must start with col://. 264 replication . use replication modify connection -host command on the other system to direct communications to the correct network name. enter a command similar to the following on the source and destination Data Domain systems: # replication add source col://hostA destination col://hostB When you configure directory replication. For example. Refer to the entire procedure in Delete a Replication Pair on page 293 before using this command. Note: This command is just one of the commands that are used to remove a replication pair. enter a command similar to the following on the source and destination Data Domain systems: # replication add source dir://hostA/backup/dir2 destination dir://hostB/backup/hostA/dir2 Note: When the hostname for a source or destination does not correspond to the network name through which the Data Domain systems will communicate.When you configure collection replication. For example. and cannot reclaim space for files that are deleted but not yet replicated. While replication is disabled.disable replication disable {destination | all} Use this command to temporarily halt the replication of data between the source and the destination on either the source or the destination. the operation resumes the sending of data to the destination. A filesys clean operation may proceed very slowly on a replication context when that context is disabled.9 Command Reference Guide 265 . If the file system is disabled on either Data Domain system when replication is enabled. the operation stops the sending of data to the destination. On the destination. Use the replication break command to permanently stop replication and to avoid slowing filesys clean operations. replication is enabled when the file system is restarted. you can change the bandwidth and delay parameters on both sides of the connection with the replication option set command. the operation stops serving the active connection from the source. On the source. enable replication enable {destination | all} Use this command to restart replication that is temporarily halted on the Data Domain system that was temporarily halted. the operation resumes serving the active connection from the source. On the destination. DD OS 4. replication remains disabled even after the file system is restarted. This command is available to administrative users only. This command is available to administrative users only. Note: Using the command replication break on a collection replication replica or recovering originator requires the use of filesys destroy on that machine before the file system can be enabled again. Note: The replication disable command should be used as a short-term solution. If the file system is disabled on either Data Domain system when replication is disabled. On the source. modify modify low-bw-optim replication modify destination low-bw-optim {enabled | disabled} Use this command to enable delta replication on an existing replication context. the initialize operation can take many hours. Note: This command is just one of the commands that are used to create a replication pair. A destination variable is required.Note: If the source Data Domain system received large amounts of new or changed data during the halt. If the source holds a lot of data. Refer to the entire procedure in Configuring Replication on page 288 before using this command. resuming replication may significantly slow down filesys clean operations. This option is only active when it is enabled on both the source and the destination. This command is available to administrative users only. As an alternative. initialize replication initialize destination Use this command on the source to start replication between a source and destination. consider placing both Data Domain systems of the Replicator pair in the same location with a direct link to reduce initialization time. The command checks that the configuration and connections are correct and returns error messages if any problems appear. 266 replication . This command is available to administrative users only. company.com/backup/dir2 destination-host ny. When using the replication modify command. If you are changing the hostname on an existing source Data Domain system. if the local destination dest-orig. The hostname must be the name returned by the hostname command on the system receiving the new hostname. use the replication modify command on the destination. This command is available to administrative users only.company.9 Command Reference Guide 267 . Call Data Domain Technical Support before changing the hostname on an existing destination.com is moved from California to New York. run a command similar to the following on both the source and destination: # filesys disable # replication modify dir://ca.com # filesys enable DD OS 4.company.modify source-host or destination-host replication modify destination {source-host | destination-host} hostname Use this command when replacing a system in a replication pair to assign a new name for the replacement system on the other side of the replication pair. Do not use the command if you want to change the hostname on an existing destination. always run the filesys disable command first and the filesys enable command after. For example.ca. company.com. The following example is run on the source to change the destination host ny.company. # replication modify dir://ny. use the modify connection-host option to correct the name (or IP address) for the connection.com/backup/dir2 connection-host ny2.company.modify connection-host replication modify destination connection-host hostname [port port] A source Data Domain system connects to the destination Data Domain system using the destination name as returned by the hostname command on the destination (either name or IP address). An optional port number can also be used. If the destination hostname does not resolve correctly for the connection. Note that the destination variable for the context does not change and is still ny. The option may be needed after adding a new source and destination pair or after renaming either a source or a destination. The connection-host option may be required when a connection passes through a firewall and is required when connecting to an alternate listen-port on the destination.company.com to ny2.com 268 replication .company.com/backup/dir2. If multiple sources use one destination.9 Command Reference Guide 269 . each source must send to the same port. or listen port to 2151. Note: See the procedure Change the Destination Listen Port on page 297 for an example using this command. Use the replication modify command on a source to change the port to which the source sends data. DD OS 4. and they must be set on both sides of the connection. Caution: If you set bandwidth or delay you MUST set both. option option reset replication option reset {bandwidth | delay | listen-port} To reset system bandwidth to the default of unlimited or delay to the default of none.modify connection-host port replication modify destination connection-host hostname [port port] The default listen-port for a destination Data Domain system is 2051. A destination can have only one listen port. Use the filesys disable command before making changes and use the filesys enable command after making changes. option set bandwidth replication option set bandwidth rate Use this command to set the network bandwidth rate for the Data Domain system. use the replication option reset operation. option show option show Use this command to display the current bandwidth and delay settings. On a destination Data Domain system. replication calculates the proper tcp buffer size for replication usage. 270 replication . the operation returns just a command prompt with no setting information. Using bandwidth and network-delay settings together. Refer to the entire procedure in Set Replication Bandwidth and Network Delay on page 298 before using this command. high-bandwidth WANs in which the default tcp setting is not good enough to provide best throughput. set the port from which the destination receives data from replication sources (port 2051 by default). Note: This command is just one of the commands that are used to set the replication bandwidth and delay. and they must be set on both sides of the connection. This should be needed only for high-latency. A destination can have only one listen-port that must be used by all sources. For a destination with multiple sources. The connection-host port used by a source must match the listen-port used by the destination. If these settings are at the default of none. option set listen-port replication option set listen-port value Use this command to set the listen port for the Data Domain system. Caution: If you set bandwidth or delay you MUST set both. use the values with the maximum product.option set delay replication option set delay value Use this command to set the network delay in milliseconds for the Data Domain system. A destination variable is required. This command must be invoked only from the source.reauth replication reauth destination To reset authentication between a source and destination. If the replication break command was run earlier. the destination cannot be used to recover a source. Use the replication watch command to display the progress of the recovery process. recover replication recover destination To move data from a surviving destination to a new source. use the replication reauth command on both the source and the destination. • • • • • A destination variable is required. Messages similar to “Authentication keys out of sync” or “Key out of sync” signal the need for a reset. With directory replication. See Replace a Directory Source—Same Directory Name on page 296.9 Command Reference Guide 271 . use the replication recover command on the new source. This command is available to administrative users only. first use the filesys disable and filesys destroy commands on the new source. This command is available to administrative users only. With collection replication. DD OS 4. the target directory on the source must be empty. See Create Many-to-One Directory Replication on page 291. Reauthorization is primarily used when replacing a source Data Domain system. A replication resynchronization is useful when converting from collection replication to directory replication or when a directory replication destination runs out of space while the source destination still has data to replicate.) Note: This command cannot be used with collection replication. show show config replication show config [destination | all] Use this command to display configuration parameters for a specific destination or for all destinations. On the replica.com replication .datadomain. (Both source and destination must already be configured.company. and the destination is not empty. replication resync does not work. if at least one context was marked with an asterisk.company. # replication show CTX: Source: Destination: Connection Host: 272 config dir://host3.resync replication resync destination To resynchronize replication when directory replication is broken between a source and destination.com/backup/host2 ccm34. the per-context display is modified to include an asterisk.com/backup/host2 dir://host3.company. The display with a destination variable is similar to the following.com/backup/dir2 2 dir://host2. the footnote “Used for recovery only” is also displayed. Note: If you try to replicate to a Data Domain system that has retention-lock enabled. use the replication resync command. See Recover from a Full Replication Destination on page 294 for an example of using the command when a directory replication destination runs out of space. The all option returns a similar display for each context. The Data Domain system that receives data from backup applications.com (default) enabled yes show config all CTX: Source Destination Connection Host: Connection Port: Low-bw-optim: Enabled: The columns in the output are: CTX Source Destination Connection Host and Port The context number for directory replication or a 0 (zero) for collection replication. A source Data Domain system connects to the destination Data Domain system using the destination name as returned by the hostname command on the destination or by using a destination name or IP address and port given with the replication modify connection-host command. or configuration mismatch. The Data Domain system that receives data from the replication source Data Domain system. The replication process is yes (enabled and available to replicate data) or no (disabled and not available to replicate data). disabled.datadomain. The active status of low-bw-optim: enabled. The destination hostname may not resolve to the correct IP address for the connection when connecting to an alternate interface on the destination or when a connection passes through a firewall.pr. Low-bwoptim Enabled DD OS 4.princeton.com/backup/syrah22 dd580.Connection Port: Low-bw-optim: Enabled: # replication (default) enabled yes 1 dir://syrah22.com/backup/syrah22 dir://dd580.9 Command Reference Guide 273 .datadomain.datadomain. delta-compression. 274 replication . The amount of pre-compressed data that is replicated. The columns in the output are: Pre-Comp (KB) Remaining Replicated (KB) Pre-Comp Replicated (KB) Network The amount of pre-compression data that is not replicated. Statistics are generated only once an hour. so the smallest interval that appears is one hour. This command provides byte-count statistics related to identity-filtering. and local-compression. and localcompression.show detailed-history replication show detailed-history {destination | all} [duration duration {hr | min}] [interval number {hr | min}] Use this command to display statistics accumulated over the specified interval. The ratio of the byte values Bytes after filtering by destination to Bytes after low bandwidth optimization gives the additional compression ratio supplied by delta compression. use the replication show history command. This command provides byte-count statistics related to identity-filtering. show detailed-stats replication show detailed-stats [destination | all] Use this command to display cumulative stats since the context was created. The ratio of the columns Replicated Postfiltered and Replicated Post-low-bw-optim gives the additional compression ratio supplied by delta compression. show history replication show history {destination | all} [duration duration {hr | min}] [interval number {hr | min}] To display a history of replication. The amount of compressed data sent over the network. delta-compression. The default interval is two seconds. and dividing by the duration of the reporting interval. The columns and their meanings are as follows: Pre-comp (KB/s) Network (KB/s) Streams The size value before compression is applied. Typically this number is the second highest number (after Network. The additional compression ratio supplied by delta compression. Low-bw-optim show performance replication show performance {obj-spec-list | all} [interval sec] [count count] To display current replication activity.Sync’ed-as-of Time The time when the most recently replicated data on the destination was generated on the source. The values are calculated by taking the amount of time spent for the given activity.9 Command Reference Guide . A value of unknown appears during replication initialization. Sometimes referred to as “logical size. one replication context can use multiple streams for better performance. These columns show the relative amounts of time spent working or waiting by replication sender threads for the specified context. use the replication show performance command. Assuming more system streams are actually available. Values can exceed 100 due to the presence of multiple threads working on behalf of the specified replication context. Reading may be the largest of the columns. below). An internal system resource associated with reads and writes. four additional columns are presented. The time reading file system data from the local file system.” The amount of compressed data per second transferred over the network. multiplying by 100. On a deployment with high network bandwidth. 275 Reading DD OS 4. If only a single source context is specified. For example. The time spent sending file data and metadata. Waiting. as well as replicating filesystem namespace operations. and Network. The other source of time waiting is file system reads (Reading column). Normally this value is low. a network problem may be present. At 100Mbps. The source has previously sent data which has not yet been received. Meta. The output shows the following: • The ratio between Pre-comp and Network is approximately 2:1. packet loss may be causing reduced throughput. This is because replication is having to send all of the segments from the source to the destination. for example). the source spends most of its time waiting (in the Network column) for socket send buffer space to clear. and waiting for replies from the server about what data needs to be sent. Typically this is the highest of the four values. The following example was captured while initializing replication over a 100Mbps network. or where the replica has a higher workload than the sender because the replica is the destination for a number of additional replication contexts. This value exceeds 100 regularly if the sender is able to replicate multiple unreplicated files in parallel. Normally this value is under 50. it may indicate an unusual workload (a large number of file attribute updates. Dest Network If the Network column has the highest time values among Reading. If this value exceeds 50 on a sustained basis. replication • 276 . Local compression is responsible for the 2:1 ratio. Exceptions include systems on high-speed networks where the sender is a more powerful Data Domain system than the replica.Meta The time spent on miscellaneous bookkeeping acclivities. and if the Network KB/sec value is lower than expected. The time spent waiting due to the receiver not having given the sender more information about what data to send. # replication show performance rctx://1 07/31 10:09:27 rctx://1 Pre-comp (KB/s) --------21798 19914 23091 19446 24002 22725 18662 24263 20179 23887 21125 Network (KB/s) --------10173 9427 11314 9161 11604 10829 9119 11355 9640 11162 9957 ------3 3 3 3 3 3 3 3 3 3 3 Streams Busy Reading Meta Dest Waiting Network -------------31 27 42 20 52 47 41 31 28 40 23 0 0 0 0 0 0 0 0 0 0 0 -------------0 0 0 0 0 0 0 0 0 0 0 264 269 253 276 242 248 254 264 267 255 272 DD OS 4.9 Command Reference Guide 277 .• The value of 3 for Streams means that replication is sending three files in parallel for this context. Note: These examples use older Data Domain Systems. most of the time is spent in filesystem reading. # replication show performance rctx://1 07/31 10:20:13 rctx://1 Pre-comp (KB/s) --------35864 38120 34004 40418 32612 33133 36273 30522 36398 24684 38906 Network (KB/s) --------16778 17925 15536 18972 15574 15839 17530 14467 17372 12150 18293 ------3 3 3 3 3 3 3 3 3 3 3 Streams Busy Reading Meta Dest Waiting Network -------------253 243 238 252 251 253 237 272 256 260 246 0 0 0 0 0 0 0 0 0 0 0 -------------0 0 0 0 0 0 0 0 0 0 0 12 12 11 11 12 13 18 9 16 12 17 278 replication . this time with the replication throttle removed.The next example shows the command output from the same system. In this example. as expected. so the numbers are lower than users should expect to see with newer models. 429.com/backup/c dir://r4. The display is similar to the following: # replication show stats CTX Destination --1 2 -------------------------dir://33.show stats replication show stats [destination | all] To display replicator statistics for all replication pairs or for a specific destination pair.674.012 --------------- Sync'ed-as-of Time ---------------Mon Mar 17 13:06 Mon Mar 17 13:06 ---------------- Pre-comp Bytes Remaining -------0 0 -------- To display statistics for the destination labeled as context 1.380.840 918.dd.904 612 0.376 52.769.com/backup/r ------------------------ Post-comp Bytes Sent ------------1. use the following command: # replication show stats rctx://1 CTX: Destination: Network bytes sent: Pre-compressed bytes sent: Compression ratio: Sync'ed-as-of time: Pre-compressed bytes remaining: 1 dir://33.dd. use the replication show stats command.248 ------------- Post-comp Bytes Received --------------2.099.752.com/backup/rig14_8 3.008 829.300.652 ------------- Pre-comp Bytes Sent ------------5.company.005.400.0 Tue Dec 11 18:30 0 DD OS 4.9 Command Reference Guide 279 . The columns in the output are: CTX Destination Network bytes sent The context number for directory replication or a 0 (zero) for collection replication The replication destination. Postcompressed bytes sent Precompressed bytes sent Sync’ed-asof-Time Precompressed bytes remaining Compression ratio Compressed data remaining Below is some actual output for replication show stats all. Does include internal replication control information and metadata. For the source. Does not include TCP/IP headers. (directory replication only The sum of the size(s) of the file(s) remaining to be replicated for this context. so if a very large file is being replicated. due to metadata exchanged as part of the replication protocol. The count of bytes sent over the network. an engineer created a file a bit larger than 1 GB by writing some data. it only changes after the current file finishes. In this example. the actual (network) data sent by the source. For Destination. as well as file system data. The time when the most recently replicated data on the destination was generated on the source. The Pre-compressed bytes sent to destination 280 replication . Then he created seven copies of it using filesystem fastcopy. A value of unknown appears during replication initialization. Note: this includes the *entire* logical size of the current file being replicated. (collection replication only) The amount of compressed file system data remaining to be sent. Network bytes sent to destination is a bit larger than this. The number of pre-compressed bytes sent by the source. The fact that he wrote only approximately 1 GB shows up in the Pre-compressed bytes written to source column. Note: this includes logical bytes associated with the current file that’s being replicated. The ratio of pre-compressed bytes transferred to network bytes transferred. this number may not change for a noticeable period of time. the actual (network) data sent by the destination to the source. 590.6 Wed Apr 2 16:40 DD OS 4. Originator: sym2# replication show stats all CTX: 1 Destination: dir://syrah33.com/backup/example Network bytes sent to destination: Pre-compressed bytes written to source: Pre-compressed bytes sent to destination: Pre-compressed bytes remaining: Files remaining: Compression ratio: Sync'ed-as-of time: 1.9 Command Reference Guide 281 .com/backup/example Network bytes received from source: Pre-compressed bytes written to source: Pre-compressed bytes sent to destination: Pre-compressed bytes remaining: Files remaining: Compression ratio: Sync'ed-as-of time: 1. 7.134.datadomain.163.968 0 0 7.676 1.968 0 0 7.073.6 Wed Apr 2 16:40 Replica: sym3# replication show stats all CTX: 1 Destination: dir://syrah33.163.590.576 1.741.741.134.515. being the sum of the sizes of the eight files involved.073.514.column gives the full (approximately) 8 GB.824 8.datadomain.824 8.6 is the ratio between pre-comp bytes sent and network bytes sent. To be supplied. The status (enabled or disabled) of the local file system. The enabled state (yes or no) of replication for each replication pair. With the all option. The state of the replication process.datadomain. replication Low bandwidth optimization Local Filesystem Status Connection State Error 282 .status replication status [destination | all] To display replicator configuration information and the status of replication operations. the display is similar to the following: # replication status all CTX: 1 Mode: source Destination: dir://dd580.princeton. A listing of any errors in the replication process. use the replication status command.com/backup/syrah22 Enabled: yes Low bandwidth optimization: enabled Local filesystem status: enabled Connection: connected since Thu Sep 24 00:46:58 State: normal Error: no error Sync'ed-as-of time: Tue Oct 27 14:57 Current throttle: unlimited The columns in the output for all are: Mode Destination Enabled The role of the local system: source or destination. Includes both the state and the date and time of the last change in the connection state. This column will show yes even if replication is enabled but the rate is throttled to zero. To be supplied. A listing of any errors in the replication process. The state of the replication process. Includes both the state and the date and time of the last change in the connection state. A value of unknown appears during replication initialization.Sync’ed-as-of-time The time when the most recently replicated data on the destination was generated on the source.9 Command Reference Guide 283 . The current throttle setting. The status (enabled or disabled) of the local file system. Current Throttle The fields in the output for destination are: Mode Local Filesystem Status Connection State Error Current Throttle The role of the local system: source or destination. DD OS 4. The current throttle setting. use the throttle add command. # replication sync 0 files flushed. Output is updated periodically and the command line cursor does not return until the operation is complete. the network bandwidth use is unlimited (as fast as possible at all times). 284 replication . The value represents only the data available at the time the command is given. This command is available to administrative users only. throttle throttle add replication throttle add sched-spec rate To change the rate of network bandwidth used by replication. Replication runs at the given rate until the next scheduled change or until new throttle commands force a change.sync replication sync destination Use this command only on the source. Data received after the command begins is not added to the output.304 bits per second (12 KiB). When the current value is equal to or greater than the output’s sync_target value. current=2832642 sync_target=2941532 head=2841234 sync status replication sync status destination To check on progress when running the sync start command. The output’s current value represents data on the source that is yet to be replicated to the destination. use the replication sync status command. By default. replication is complete for all of the data that was available for replication at the time the command began. Note: The system enforces a minimum rate of 98. In the rate variable: • • • • bps or b equals raw bits per second Kibps. or wed) or the word daily (to set the schedule every day of the week) A time of day in 24-hour military time • The rate includes a number or the word unlimited. The number can include a tag for bits or bytes per second. the base-2 equivalent of Kb or Kilobits. the base-2 equivalent of KB or Kilobytes. The default rate is bits per second. 2000 KiB).: # replication throttle add mon thu 0600 20KiB DD OS 4.The sched-spec must specify either: • One or more three-letter days of the week (such as mon. Do not use a space between the number and the bits or bytes specification (for example. For example. tue. Rate can also be 0 (the zero character). Kib.9 Command Reference Guide 285 . or K equals 1024 bits per second Bps or B equals bytes per second KiBps or KiB equals 1024 bytes per second Note: Kib = Kibibits. any new contexts also get throttled to zero. disable. KiB = Kibibytes. or disabled (each stops replication until the next rate change). the following command limits replication to 20 kibibytes per second starting on Mondays and Thursdays at 6:00 a. If you set rate to zero.m. use the throttle del command. Remove all scheduled change entries. returning the system to the default settings. the following command removes an entry for Mondays at 11:00 a. 286 replication . The sched-spec must include: • One or more three-letter days of the week (such as mon. This command is available to administrative users only. This command is available to administrative users only. current override schedule all Remove the rate set by the replication throttle set current command.: # replication throttle del mon 1100 throttle reset replication throttle reset {current | override | schedule | all} This command can reset a throttling schedule:. or wed) or the word daily (to set the schedule every day of the week) A time of day in 24-hour military time • For example. tue. Remove any current or override settings and remove all scheduled change entries.m.throttle del replication throttle del sched-spec To remove one or more throttle schedule entries. Remove the rate set by the replication throttle set override command. Set the throttle rate until another override command is invoked. Use the KiB option to display the rate in Kibibytes (the base2 equivalent of Kilobytes) per second. or recovery operation. Without the option. (See the rate explanation for the replication throttle add command above.throttle set replication throttle set {current | override} rate Use this command to set a throttle override. the rate is displayed in bits per second.9 Command Reference Guide 287 . resync. watch replication watch destination Use this command to display the progress of a replication initialization. The options are: current Set the throttle rate until the next scheduled change or until a system reboot.) override cannot be set if the replication throttle set current command is in effect. throttle show replication throttle show [KiB] Use this command to display all scheduled throttle entries and rates. (See the rate explanation for the replication throttle add command above. This command is available to administrative users only. DD OS 4.) current cannot be set if the replication throttle set override command is in effect. override This command is available to administrative users only. Ensure the destination directory is empty or its contents are not required. the replication operation can take many hours. If it is. and DD560 DD630. • 288 replication . and DD560 with 8 GB RAM All other models • Maximum Number of Contexts 180 90 45 20 20 If the source holds a lot of data. be sure to consider the following: • Ensure adequate storage is available on the source and destination. Determine the type of replication configuration to use.replication Examples Configuring Replication Before starting the replication configuration. At a minimum. either choose another or delete the system from the context. A directory can be in only one context at a time. A subdirectory that is under a source directory in a replication context cannot be used in another directory replication context. as it will be overwritten. Table 21-1: Maximum Contexts for Directory Replication Model DD880 DD690 and DD690g DD580. DD565. Consider putting both Data Domain systems in the Replicator pair in the same location with a direct link to cut down on initialization time. DD565. • • Limitations Before configuring directory replication. review the following information. the destination must have more space than the source. If a problem arises. latency.9 Command Reference Guide 289 . performance is about 70 MiB/sec of compressed data. DD OS 4. Run this command on the destination Data Domain system: filesys destroy 3.Configuring Replication Pairs Create either a collection or directory replication pair. ownership and permissions of the destination directory are always identical to those of the source directory. you do not need to re-initialize after fixing the problem. Test results from Data Domain returned the following guidelines for estimating the time needed for replication initialization. Run this command on both the source and destination Data Domain systems: replication add source col://hostA destination col://hostB Once it is verified that both Data Domain systems in the pair can communicate. such as that communication between the Data Domain systems is not possible. Replication should begin as soon as the Data Domain systems can communicate. After replication is initialized. and packet loss rate. Create Collection Replication 1. the Replicator process starts. Note that the following are guidelines only and may not be accurate in specific production environments. Run this command on both the source and destination Data Domain systems: filesys disable 2. Over a WAN. • • Over a gibibit LAN. bandwidth. as described in the following sections. performance is governed by the WAN link line speed. performance is about 40 MiB/sec of pre-compressed data. such as that communication between the Data Domain systems is not possible. 100ms WAN. Run this command on both the source and destination Data Domain systems: replication add source dir://hostA/backup/dir2 destination dir://hostB/backup/dir2 2. you do not need to re-initialize after fixing the problem.456 TiB/day Using a gibibit (the base-2 equivalent of gigabit) LAN. Note: When a new directory or pool replication pair is being created. Run this command on the source: replication initialize Once it is verified that both Data Domain systems in the pair can communicate. which gives data transfer of about double the rate for a T3 WAN. schedule the replication configuration at a time when backups are not occurring. Test results from Data Domain returned the following guidelines for estimating the time needed for replication initialization. Note that the following are guidelines only and may not be accurate in specific production environments. the source directory cannot be written to until the replication relationship between source and destination systems has been established. Attempts to write to the newly configured replication source directory will fail until the replication relationship has been established. which gives data transfer of: 40 MiB/sec = 25 seconds/GiB = 3. If a problem arises. • 290 replication . Instead. the Replicator process starts. performance is about 80 MiB/sec of pre-compressed data. • Using a T3 connection. Replication should begin as soon as the Data Domain systems can communicate.Create a Directory Replication 1. 1. Run this command on both the source and destination Data Domain systems: replication add source dir://hostB/backup/dir1 destination dir://hostA/backup/dir1 3.9 Command Reference Guide 291 . follow this procedure. Run this command on both the source and destination Data Domain systems: replication add source dir://hostA/backup/dir2 destination dir://hostB/backup/dir2 2. Run this command on the source: replication initialize Create Many-to-One Directory Replication To set up and start directory replication for directories from hostA and hostB to hostC. Run this command on hostB: replication initialize dir://hostA/backup/dir1 Create One-to-Many Directory Replication One source directory can be replicated to many destination systems. Run this command on both the source and destination Data Domain systems: replication add source dir://hostA/backup/dir2 destination dir://hostB/backup/dir2 2. Run this command on hostA: replication initialize dir://hostB/backup/dir2 4. Run this command on both hostA and hostC: replication add source dir://hostA/backup/dir2 destination dir://hostC/backup/dir2 DD OS 4. follow this procedure. 1. 1.Create Bi-Directional Directory Replication To set up and start directory replication for dir2 from hostA to hostB and for dir1 from hostB to hostA. • All these types of directory replication are the same (except for the destination name limitation below) when configuring replication and when using the replication command set.) Replicating VTL pools and tape cartridges does not require the VTL license on the destination Data Domain system. The pool name must be unique on the destination. and the destination cannot include levels of directories between the • • 292 replication . When creating a cascaded directory replication. There has been some confusion over “pool replication. UNI stands for “User to Network Interface”.” which is nothing but directory replication of directories that contain pools. we created the UNI “pool” as a shorthand. Both directory and collection replica can be part of a single cascaded directory replication. and acts no differently. Examples in this chapter that use dir:// are also valid for pool://. (To avoid exposing the full directory names to the VTL cartridges. Run this command on hostA: replication initialize dir://hostC/backup/dir2 4. use the procedure Create a Directory Replication on page 290 to create a pair for dir1 from hostA to dir1 hostB. Create a Pool Replication Replicating VTL tape cartridges (or pools) simply means replicating directories that contain VTL tape cartridges (or pools). Run this command on both hostB and hostC: replication add source dir://hostB/backup/dir1 destination dir://hostC/backup/dir1 3. 2. Run this command on hostB: replication initialize dir://hostC/backup/dir1 Create Cascaded Directory Replication 1.2. Complete the cascade from dir1 hostB to dir1 hostC. Start the source and destination variables with pool:// and include the pool that is the replication target. With collection replication. a destination of pool://hostB/hostA/pool2 is not allowed.destination hostname and the pool name. a destination is left as a standalone read/write Data Domain system that can then be used as a source. Run the replication break command: replication break {destination | all} 3. On a collection replication replica or recovering originator. enter a command similar to the following on both Data Domain systems: replication add source pool://hostA/pool2 destination pool://hostB/pool2 The replication from source to destination begins. the source directory cannot be written to until the replication relationship between source and destination systems has been established. Run the filesys enable command. For example. a destination cannot be brought back into the replication pair or used as a destination for another source until the file system is emptied with the filesys destroy command. use the filesys destroy command on that machine before the file system can be enabled again. schedule the replication configuration at a time when backups are not occurring.9 Command Reference Guide . Instead. For example. 1. 4. 293 • DD OS 4. Run the filesys disable command on the source and destination systems. 2. Attempts to write to the newly configured replication source directory will fail until the replication relationship has been established. Note: When a new directory or pool replication pair is being created. • With collection replication. Managing Replication Delete a Replication Pair 1. Suspend and Resume Replication Suspending replication temporarily pauses an active replication of data between source and destination. use: replication enable {destination | all} Replication of data is resumed. a destination Data Domain system can become full before a source Data Domain system replicates all of a context to the destination. the data being sent to the destination is paused. a destination directory must be empty to be used again (whether with the original source or with a different source). or alternatively. To suspend replication from either the source or the destination. For example. replication resync must be used. On the destination. this operation stops serving the active connection from the source. Recover from a Full Replication Destination When using directory replication. On the source. use: replication disable {destination | all} 2. 1. On the source and destination Data Domain systems. Note: If the source Data Domain system received large amounts of new or changed data during the halt. use the following procedure: 1. run commands similar to the following: filesys disable replication break dir://hostB/backup/dir2 filesys enable 294 replication . resuming replication may significantly slow down filesys clean operations.• With directory replication. to recover a context of dir://hostA/backup/dir2. To resume replication from either the source or the destination. 2. run a file system cleaning operation: filesys clean DD OS 4.9 Command Reference Guide 295 . On the destination. Also. run a replication resynchronization operation for the target context: replication resync dir://hostB/backup/dir2 Replace a Directory Source—Same Directory Name If the source (hostA) for directory replication is replaced or changed out. On both the source and destination. On the source. Note the State entry in the output. replication recovery completed is sent when the process is complete. State is normal when recovery is done and recovering while recovery is in progress. Run the following commands on the new source: replication add source dir://hostC/backup/dir2 destination dir://hostB/backup/dir2 replication recover dir://hostB/backup/dir2 4. Use the following command to see when the recovery is complete. a messages log file entry.3. 2. If the new source has any data in the target directories. 296 replication . Run the following commands on the destination: filesys disable replication modify dir://hostB/backup/dir2 sourcehost hostC replication reauth dir://hostB/backup/dir2 filesys enable 3. add back the original context: replication add source dir://hostA/backup/dir2 destination dir://hostB/backup/dir2 4. The byte count may be equal on both sides. 1. but the recovery is not complete until data integrity is verified. The recovering directory is read-only until recovery finishes. delete all data from the directories. use the following commands to integrate (with hostB) a new source that uses a new name (hostC). 9 Command Reference Guide 297 .com port 2161 2. DD OS 4.company.com has a listen-port of 2161. If multiple sources use one destination. use: # replication option set listen-port 2161 A destination can have only one listen port. on the source. For example. it can be changed globally or per replication pair.company. each source must send to the same port.company. If a network configuration requires a different port. 1. On the destination. The following example is run on the source to inform the source that the destination host ny. use the command: # replication modify dir://ny.com/backup/dir2 connection-host ny. Then use the replication option set listen-port command on the destination to set an alternate listen-port.# replication status dir://hostC/backup/dir2 CTX: Mode: Destination: Enabled: Local filesystem status: Connection: State: Error: Destination lag: Current throttle: 2 source dir://hostC/backup/dir2 yes enabled connected since Sat Apr8 23:38:11 recovering no error less than 5 minutes unlimited Change the Destination Listen Port The default IP Listen port for transmitting the data stream to the replication destination is 2051. by using the ping command). For a destination with multiple sources.Set Replication Bandwidth and Network Delay Using bandwidth and network-delay settings together. Bandwidth and delay must be set on both sides of the connection. Re-enable replication on all servers: # replication enable all 298 replication . replication calculates the proper tcp buffer size for replication usage. set the network delay to its actual value in milliseconds: # replication option set delay value 6. The setting is global to the box. Disable replication on all servers: # replication disable all 3. high-bandwidth WANs on which the default tcp setting is sufficient to provide the best throughput. 2. Caution: If you set bandwidth or delay you MUST set both. 5. 1. For each server. Find the actual network delay values for each server (for example. For each server. For each server. This should be needed only for high-latency. wait until replication status reports “disconnected”: # replication status 4. set the bandwidth to its actual value in Bytes per second: # replication option set bandwidth rate Note: The replication option set of bandwidth and network delay only needs to be executed once on any Data Domain system even with multiple replication server contexts. use the values with the maximum product. Find the actual bandwidth for each server. the over-the-wire compression ratio reported by the replication show stats command is 25x or more.Managing Delta Replication Delta replication. it is unlikely that any gain in virtual throughput will be realized. also called “low bandwith optimization. Delta replication incurs significant additional CPU and I/O overhead on both the source and destination Data Domain systems. the replication process. If the network throughput is much less than the available bandwidth. and thus most of the bandwidth is being consumed by segment metadata).9 Command Reference Guide 299 . Delta Replication can cut replication time by 50%. and could slow down. However. The Low-bw-optim ratio should average 2. and the network throughput (network bytes divided by time interval) should not be much less than the available bandwidth. and both systems have spare CPU and I/O capacity. then most likely one or both Data DD OS 4. which utilizes a low-bandwidth link more efficiently and reduces the time required to perform replication. When a lowbandwidth link is fully loaded. For high-bandwidth links (faster than T3 capacity). low bandwidth optimization does not compress segment metadata. If the data to be replicated is more than 96% identical to data already existing on the destination system (that is. it is unlikely that low bandwidth optimization will increase virtual throughput significantly. Delta Replication might not speed up. then enable low bandwidth optimization and monitor the output of replication show history over several weeks. and there is less than 6 Mbps of available bandwidth. If low bandwidth optimization is enabled across links with greater than 6 Mbps of bandwidth. If the data to be replicated is less than 96% identical to data already existing on the destination system. Low bandwidth optimization increases the virtual throughput of directory replication on most data sets by a factor of 2x or more. Delta Replication applies more computation time to data compression. If the Low-bw-optim ratio does not average 2.00 or more. then delta compression is probably not effective on the data set and should be disabled.00 or more.” can increase the virtual throughput of directory replication across links with less than 6 Mbps of available (or throttled) bandwidth. Determining Whether Delta Replication Increases Compression In some cases.618.0 for Low-bw-optim.618. that is.Domain systems do not have enough spare CPU or I/O capacity to support delta replication. Delta Replication cannot increase compression and therefore provides no benefit. Use the replication show command options to analyze your replication throughput and determine whether Delta Replication is likely to be helpful.881.200 Low-bw. This example shows a value of 1.616 Pre-Comp (KB) Remaining ------------13.662 4.Sync-as-of optim Time ---------------------1. and it should be disabled.616 Replicated (KB) Pre-Comp Network ----------------------9. This is a ratio of bytes before applying delta compression to bytes after delta compression.472. the low bandwidth optimization ratio. destination# replication show history all Directory Replication: Date ---------2009/03/12 Time -------15:19:51 CTX --1 Pre-Comp (KB) Written ------------13.00 Thu Mar 12 14:20 300 replication . the additional compression delta has added. 618.019 5.616.475.576.813.In this example.3.019 8.192 13.344 13.4 Thu Mar 12 21:14 DD OS 4. destination# replication show detailed-stats all CTX: Destination: Network bytes received from source: Pre-compressed bytes written to source: Pre-compressed bytes sent to destination: Bytes after filtering by destination: Bytes after low bandwidth optimization: Bytes after local compression: Pre-compressed bytes remaining: Files remaining: Compression ratio: Sync'ed-as-of time: 1 dir://1.4/backup/destination 5.068.068.618.867.9 Command Reference Guide 301 .500.344 8.069 0 0 2.616. the destination system reports that Bytes after low bandwidth optimization is not smaller than Bytes after filtering by destination.2.500. Pre-compressed bytes sent to destination is larger than Pre-compressed bytes written to source because of retries resulting from network problems.223 450.354.88x.457.166.340 237.446.2.205 1.515.273 0 0 34. destination# replication show detailed-stats all CTX: Destination: Network bytes received from source: Pre-compressed bytes written to source: Pre-compressed bytes sent to destination: Bytes after filtering by destination: Bytes after low bandwidth optimization: Bytes after local compression: Pre-compressed bytes remaining: Files remaining: Compression ratio: Sync'ed-as-of time: 1 dir://1. because an overwrite of even one byte to a file requires a certain minimum amount of logical file content around that one-byte overwrite to be re-replicated. Or.124 10.919.122.966.4/backup/destination 300.Example where Delta Replication Improves Throughput The actual numbers below show a situation where delta replication improves compression/throughput.295.746. In this case. Note that Bytes after low bandwidth optimization is smaller than Bytes after filtering by destination by about 2.948.596.201. Workloads involving overwrites or updates to small files may see marginally higher pre-compression bytes replicated.3.9 Tue Oct 20 05:28 When Pre-compressed bytes written to source is not equal to Pre-compressed bytes sent to destination.897.possible reasons include the following: • Pre-compressed bytes written might be less than precompressed bytes sent due to network-related resends.499.737 10. replication 302 . 9 Command Reference Guide 303 . but is possible with database applications. DD OS 4. This is unusual for backup applications.• Pre-compression bytes written might be higher than precompression bytes sent in cases where a large amount of file content is written. then overwritten prior to the file being closed on the sender. 304 replication . Remove a routing table. Use the route show config command to display the Route Config list. After making interface changes. DD OS 4.9 Command Reference Guide 305 . Note: Changes to the Ethernet interfaces made with the net command options flush the routing table. An added routing rule appears in the Kernel IP routing table and in the Data Domain system Route Config list. The route command has the following options: add del reset set show trace Add a routing table. All routing information is lost and any data movement currently using routing is immediately cut off. Page 306 Page 306 Page 307 Page 307 Page 307 Page 308 About the route Command Use the route command to manage routing between a Data Domain system and backup hosts.22 route Use the route command to manage Data Domain system network routing. Data Domain recommends making interface changes only during scheduled maintenance down times. Use the route show table command to display the Kernel IP routing table. Reset the default routing gateway to an empty entry. Set a default gateway. you must reconfigure any routing rules and gateways. Display a traceroute to the named host. a list of static routes that are re-applied at each system boot. and the routing gateway. routing displays. Display routing information. 1. use: # route add -net 192.0 gw srvr12 The following example gives a default gateway of srvr14 for use when no other route matches: # route set gw srvr14 del route del {-host host-name | -net ipaddr netmask mask} Use this command to remove a routing rule. use the -net option. Use the same form (-host or -net) to delete a rule as was used to create the rule.168. To add a route for the host user24 with a gateway of srvr12. If the target being added is a network.1. This command is available to administrative users only. any matching lines in the Route Config list are deleted. If neither -host or -net is used.168.route Command Options add route add {-host host-name | -net ipaddr netmask mask} gw gwaddr Use this command to add a routing rule. a netmask.x.0 netmask 255. The route show config command shows whether the entry is a host name or a net address.255. and a gateway of srvr12. If the target is a host. This command is available to administrative users only. The gateway (gw) can be either an IP address or a hostname that is available to the Data Domain system and that can be resolved to an IP address. use the -host option. use: # route add -host user24 gw srvr12 To add a route with a route specification of 192.255. 306 route . 0 netmask 255.9 Command Reference Guide 307 .168. to set the default routing gateway to the IP address of 192.255.1.x and a gateway of srvr12. The display looks similar to the following (each line in the example wraps): # route show config The Route Config list is: -host user24 gw srvr12 -net 192.168.168. use: # route set gateway 192. use: # route del -host user24 To remove a route with a route specification of 192. use: # route del -net 192.1.2.0 netmask 255.255.1.255.2 show show config route show config Use this command to display the configured static routes that are in the Route Config list.1.0 gw srvr12 DD OS 4. This command is available to administrative users only. set route set gateway ipaddr Use this command to change the routing default gateway. This command is available to administrative users only.To remove a route for host user24.1.168. For example.255.0 gw srvr12 reset route reset gateway Use this command to reset the default routing gateway to the default value (empty).168. 163 ms 0. The display looks similar to the following (each line in the example wraps): # route show table trace route trace host Use this command to display a route used by a Data Domain system to connect with a particular destination.com (192.2 192. 38 byte packets 1 srvr24 (192.yourcompany.3. The display looks similar to the following: # route show gateway Default Gateways 192. use: # route trace srvr24 Traceroute to srvr24.178 ms 0. 30 hops max.1.4 show table route show table Use this command to display all entries in the Kernel IP routing table.147 ms 308 route .168. For example.168.168.show gateway route show gateway Use this command to display the configured or DHCP-supplied routing gateways used by a Data Domain system.6) 0.1.168.6).1. to trace the route to srvr24. 168.168.0 netmask 255.x and a netmask of 255.route Examples Add a Route To add a route with a route specification of 192.1.1.168. use: # route add -net 192.168.1.9 Command Reference Guide 309 .1 DD OS 4.255.255.0 gw srvr12 To add a route for host user24 with a gateway of srvr12.168. use: # route del -net 192.0 netmask 255.1.0 Set a Default Gateway To give a default gateway when no other route matches.255. use: # route add -host user24 gw srvr12 Delete a Route To delete a route with a route specification of 192. use: # route set gateway 192. and a gateway of srvr12.255.0.255.255. a netmask.10.x. 310 route . Show the snapshot schedule. Rename a snapshot. Snapshots must be created separately on a directory replication destination. snapshots are replicated. Snapshots are useful for avoiding version skew when backing up volatile data sets. A snapshot is a read-only copy of the Data Domain system file system from the top directory. Delete the specified snapshot schedule. Page 312 Page 314 Page 315 Page 315 Page 316 Page 317 Page 317 Page 318 Page 318 About the snapshot Command The snapshots command manages file system snapshots. such as tables in a busy data base. Modify the specified snapshot schedule. Create a snapshot. Delete all snapshot schedules.9 Command Reference Guide 311 . If the Data Domain system is a source for collection replication. Show a list of current snapshots. Set the retention period of a snapshot.snapshot.23 snapshot Use the snapshot command to create and manage read-only copies of the Data Domain file system. Each directory under /backup also has a DD OS 4. /backup. snapshots are not replicated. If the Data Domain system is a source for directory replication. Snapshots are created in the system directory /backup/. and for retrieving earlier versions of a directory or file that was deleted. The snapshot command has the following options: add create del expire list modify rename reset show Schedule when snapshots are taken. Notes: It is strongly recommended that snapshot schedules always explicitly specify a retention time.snapshot directory is a virtual directory.time.] [retention period] snapshot add schedule name [days days] time time every mins [retention period] snapshot add schedule name [days days] time time . However. Note: The . consuming valuable resources. It can be referenced in any directory. The default retention time is 14 days. If multiple snapshots are scheduled to occur at the same time. only one is retained. If no retention time is specified. a CIFS share or NFS mount point).. all snapshots are retained for 14 days. snapshot Command Options add snapshot add schedule name [days days] time time [.time. The filesys fastcopy command can use snapshots to copy a file or directory tree from a snapshot to the active file system. which one is retained is indeterminate. Multiple snapshot schedules can be active at the same time. snapshot add schedule name [days days] time time [. thus only one snapshot should be scheduled for a given time.time [every hrs | mins] [retention period] Use these commands to set up a series of snapshots to be taken at a regular intervals in the future..] [retention period] 312 snapshot ..snapshot directory with the name of each snapshot that includes the directory.. but it does not show up in a directory listing except at export points (for example.. and 14:00 or 1400 sets the time to 2:00 p. a two-digit hour. For example.). time retention period Names of Snapshots Created by a Schedule The naming convention for scheduled snapshots is the word scheduled followed by a four-digit year. weeks.. weeks or wks. The user can also specify the interval in minutes. The format in the command is a three.9 Command Reference Guide 313 . The name every_day_8_7 is the name of a snapshot schedule.m. For example.or four-digit number with an optional colon ( : ) between hours and minutes. snapshot add schedule name [days days] time time time [every hrs | mins] [retention period] The default for days is daily. or months tag. A 24-hour clock that starts at 00:00 and goes to 23:59. For example scheduled2009-04-27-13-41. When every is omitted. mon-fri creates a snapshot every day. such as tue for Tuesday. For example. the command defaults to 1hr. or months or mos with no space between the number and the days. 4:00 or 04:00 or 0400 sets the time to 4:00 a. a two-digit month. snapshot add schedule name [days days] time time every mins [retention period] The default for days is daily. and a two-digit minute.m. All elements of the name are separated by hyphens( .The default for days is daily and the user can specify a list of hours. The months or mos period is always 30 days. days Are one or more three-letter day abbreviations. a twodigit day. Use a hyphen ( . 6wks. Monday through Friday.) between days to denote a range. A number plus days. Snapshots generated by that schedule might have the names DD OS 4. For example. weeks. a two-digit month. 2009. snapshot retention date A descriptive name for the snapshot. scheduled-2008-03-24-20-00. For example. This command is available to administrative users only.m. or months. Snapshots are retained for "60" days. With a retention period. For example. or months or mos with no space between the number and the days. with a retention of two months. the output is similar to the following: # snapshot create test22 retention 6wks Snapshot "test22" created and will be retained until Jun 8 2007 08:48. create snapshot create snapshot [retention {date | period] Use this command to create a snapshot. 2009. If your system becomes filled with snapshots. the first minute of the day) of the given date. to schedule a snapshot every Monday and Thursday at 2:00 a. you can resolve this by expiring snapshots and then running filesys clean. The months or mos period is always 30 days. Note: The maximum number of snapshots allowed to be stored on a system is 800. For example.and so forth. and a twodigit day separated by dots ( . With a retention date. the snapshot is retained until midnight (00:00. 314 snapshot . 6wks.05. Thu" at "0200". the system generates an alert.). A four-digit year. retention period A number of days. ). the snapshot is retained until the same time of day as the creation. slashes ( / ).m. scheduled-2008-03-25-20-00. weeks or wks. on April 27.22. when a snapshot is created at 8:48 a. or hyphens ( . use: # snapshot add schedule mon thu 02:00 retention 2mos Snapshots are scheduled to run "Mon. If the maximum number is reached. The snapshot does not expire. 6wks. the snapshot is retained until the same time of day as the snapshot expire command was entered. The months or mos period is always 30 days. This command is available to administrative users only. This command is available to administrative users only. and a two-digit day separated by dots ( . slashes ( / ). or hyphens ( . The four-digit year.05. With a retention period. the snapshot is retained until midnight (00:00. Use this command to delete all snapshot schedules with the argument all.del snapshot del schedule [name | all] Use the snapshot del schedule name command to delete a specific snapshot schedule. snapshot retention date The name of an existing snapshot.). For example. or months or mos with no space between the number and the days. retention period forever DD OS 4. The number of days.22. the first minute of the day) of the given date.9 Command Reference Guide 315 . 2009. weeks. With a retention date. weeks or wks. a two-digit month. For example. Note that there are two ways to delete all scheduled snapshots: snapshot del schedule all or snapshot reset schedule expire snapshot expire snapshot [retention {date | period | forever}] Use this command to set or reset the retention time of an existing snapshot. or months. ). use the snapshot expire operation with no options. snapshot.For example: # snapshot expire tester23 retention 5wks Snapshot "tester23" will be retained until Jun 2007 09:26. snapshot expire name See also filesys clean.3 944.6 944. For example: # snapshot list Name -------------------SS_FULL_1 SS_INCR_1 SS_INCR_2 SS_FULL_2 DAILY_1 DAILY_2 WEEKLY_1 DAILY_3 scheduled-2007-05-05 scheduled-2007-07-07 scheduled-2007-08-02 -------------------Pre-Comp (GB) Create Date ------------.----------------948.9 Feb 1 2007 22:16 Feb 1 2007 23:09 Feb 2 2007 00:31 Mar 2 2007 00:48 Mar 12 2007 01:03 Mar 13 2007 02:24 Apr 12 2007 02:51 Apr 13 2007 03:40 May 5 2007 13:08 Jul 7 2007 13:09 Aug 2 2007 13:11 Aug 2 2007 07:33 Aug 2 2007 11:16 Aug 2 2007 13:09 Aug 2 2007 09:52 Aug 2 2007 07:33 Aug 2 2007 07:33 Aug 1 2007 13:08 Aug 7 2007 13:09 Sep 1 2007 13:11 ---------------------expired expired expired expired expired expired expired Retain Until ---------------Status ------- ------------. An expired snapshot remains available until the next file system clean operation.----------------- 316 snapshot . the retention date.7 937. and the status. but still available. the pre-compression amount of data in the snapshot. the creation date. 1 To immediately expire a snapshot.9 942.1 944. Use the snapshot expire command to set a future expiration date for an expired.5 943. list snapshot list Use this command to list existing snapshots. The status is either blank or expired. The display gives the snapshot name.8 940. An expired snapshot remains available until the next file system clean operation.8 937.4 938.7 939. time. use: # snapshot rename snap12-20 snap12-21 Snapshot “snap12-20” renamed to “snap12-21”.9 Command Reference Guide 317 . This command is available to administrative users only..] [retention period]} The default for days is daily and the user can specify a list of hours. rename snapshot rename snapshot new-name Use this command to change the name of a snapshot. the command defaults to every 1hr.time [every hrs | mins] [retention period] The default for days is daily..] [retention period]} snapshot modify schedule name {[days days] time time every mins [retention period]} snapshot modify schedule name {[days days] time time . The user can also specify the interval in mins. snapshot modify schedule name {[days days] time time every mins [retention period]} The default for days is daily. DD OS 4.. This command is available to administrative users only. For example.time.time [every hrs | mins] [retention period] Use this command to modify an already-existing snapshot schedule. There are several possible syntaxes: snapshot modify schedule name {[days days] time time [.. to change the name from snap12-20 to snap12-21.modify snapshot modify schedule name {[days days] time time [. with the same syntax as the snapshot add schedule command. When every is omitted. snapshot modify schedule name {[days days] time time . reset snapshot reset schedule Use this command to reset to the default of no snapshot schedules. show snapshot show schedule name Use this command to display a given snapshot schedule. Snapshots are scheduled to run "daily" at "1900". This command is available to administrative users only. For example. 318 snapshot . Snapshots are retained for "60" days. # snapshot show schedule Snapshots are scheduled to run "daily" at "0700". use the snapshot show schedule operation without an argument. To display a list of all snapshot schedules currently in effect. To schedule a snapshot every midnight. use: add schedule every_midnight days daily time 00:00 retention 3days or add schedule every_midnight days mon-sun time 00:00 retention 3days To schedule a snapshot every weekday at 6:00a.. use: add schedule every_day_8_pm days daily time 20:00 or add schedule every_day_8_pm days mon-sun time 20:00 Note: The name “every_day_8_pm” is the name of a snapshot schedule.fri time 06:00 retention 4days To schedule a snapshot every weekend Sun at 10:00a. Snapshots generated by that schedule will have names like “scheduled-2008-03-24-20-00”.thu.snapshot Examples Schedule a Snapshot To schedule a snapshot every day at 8:00p. use: add schedule wkdys_6_am days mon-fri time 06:00 retention 4days or add schedule wkdys_6_am days mon.tue..9 Command Reference Guide 319 ..m.m.wed. etc.m. “scheduled-2008-0325-20-00”. use: add schedule every_sunday_midnight days sun time 00:00 retention 2mos DD OS 4. use: add schedule every_sunday_10_am days sun time 10:00 retention 2mos To schedule a snapshot every Sunday at midnight. every week on Mondays and Tuesdays at 8:00a. use: add schedule every_hour time time 00:00-23:00 retention 3days To schedule a snapshot every 2 hours at 15 minutes past the hour.).. use: add schedule wkdys-every-2-hrs-8a_to_5p days monfri time 08:00-17:00 every 2 hrs retention 3days To schedule a snapshot on specific day of week at a specific time (for example.m. use: add schedule ev_mo_last_day_11pm days last time 23:00 retention 2yrs To schedule a snapshot for the beginning of every month.). use: add schedule every_2_hours days daily every 2hrs retention 3days To schedule a snapshot every hour. use: add schedule every-2h-15-past days daily time 00:15-23:15 every 2 hrs retention 3days To schedule a snapshot every 2 hours between 8:00a. on weekdays. every second day in the month at 10:15a.-5:00p.m. use: add schedule ev_mo_1st_day_1st_hr days 1 time 00:00 retention 2yrs To schedule a snapshot every 15 minutes. use: add schedule ev_mo_2nd_day_1015a days 2 time 10:15 retention 3mos To schedule a snapshot every last day in a month at 11:00p.To schedule a snapshot every 2 hours.tue time 08:00 retention 3mos To schedule a snapshot every specific day of a month at a specific time (for example.m.m. use: add schedule ev_15_mins days daily time 00:00-23:00 every 15mins retention 5days 320 snapshot .m. use: add schedule ev-wk-mon-and-tu-8-am days mon. and 3:30p.9 Command Reference Guide 321 .m..m. use: add schedule ev_weekday_1030_and_1530 days mon-fri time 10:30.15:30 retention 2mos DD OS 4.To schedule a snapshot every weekday at 10:30a. 322 snapshot . 24 snmp The snmp command manages the use of SNMP on a Data Domain system. Delete SNMP elements. Display SNMP information. Page 324 Page 325 Page 326 Page 326 Page 326 Page 327 Page 328 Page 329 About the snmp Command Simple Network Management Protocol (SNMP) is a standard protocol used to exchange network management information. The default port that is open when SNMP is enabled is port 161. Configure SNMP elements. Traps are sent out through port 162. The snmp command has the following options: add del disable enable reset set show status Add SNMP elements. The snmp command allows you to enable or disable SNMP access to a Data Domain system. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. Disable SNMP. SNMP provides a tool for network administrators to monitor and manage network-attached devices such as Data Domain systems. Restore SNMP elements to the defaults. add community strings. DD OS 4.9 Command Reference Guide 323 . Display SNMP status. give contact and location information. Enable SNMP. and display configuration settings. Note: The quickest way to change multiple settings is to first run the snmp disable command. This command is available to administrative users only. If you change multiple settings while snmp is enabled. then change the settings. This command is available to administrative users only. snmp Command Options add add ro-community snmp add ro-community community-string Use this command to add one or more community strings to enable read-only access to the Data Domain system. to add a community string of private with read/write permissions. use the command: # snmp add rw-community private 324 snmp . A common string for read/write access is private. add rw-community snmp add rw-community community-string Use this command to add one or more community strings to enable read/write access to the Data Domain system. which takes longer. and finally run snmp enable. For example. each command restarts snmp. A common string for read-only access is public. del rw-community snmp del rw-community community-string Use this command to delete one or more community strings that enable read-only access to the Data Domain system.9 Command Reference Guide 325 . to add a trap host admin12. alerts are also sent as traps. use the command: # snmp del rw-community private DD OS 4. to delete the community string private that gives read/write permissions. even when the local SNMP agent is disabled. With one or more trap hosts.add trap-host snmp add trap-host hostname[:port] Use this command to add one or more trap hosts (hostname or IP address) to receive SNMP traps generated by the Data Domain system. use the command: # snmp add trap-host admin12 del del ro-community del ro-community community-string Use this command to delete one or more community strings that enable read-only access to the Data Domain system. By default. For example. but another port can be assigned. This command is available to administrative users only. port 162 is used. For example. This command is available to administrative users only. This command is available to administrative users only. This command is available to administrative users only. 326 snmp . This command is available to administrative users only. use the command: # snmp del trap-host admin12 disable snmp disable Use this command to disable the SNMP agent and close port 161. to delete a trap host admin12. This command is available to administrative users only.del trap-host snmp del trap-host hostname Use this command to delete one or more trap hosts from the list of machines that receive SNMP traps generated by the Data Domain system. This command is available to administrative users only. reset Use this command to return all SNMP values to the defaults. This command is available to administrative users only. This command is available to administrative users only. reset ro-community snmp reset ro-community Use this command to reset the read-only community list to empty. For example. enable snmp enable Use this command to enable the SNMP agent and open port 161. reset rw-community snmp reset rw-community Use this command to reset the read-write community list to empty. 9 Command Reference Guide 327 . or to an empty string if the system value is empty. set set sysContact snmp set sysContact contact Use this command to set the system contact as used in the SNMP MIB II system variable sysContact. or to an empty string if the system value is empty.reset sysContact snmp reset sysContact Use this command to reset the system contact to the system value displayed by the command system show admin-email. reset sysLocation snmp reset sysLocation Use this command to reset the system location to the system value displayed by the command system show location. This command is available to administrative users only. This command is available to administrative users only. This command is available to administrative users only. use the command: # snmp set sysContact bob-smith DD OS 4. to give a contact of bob-smith. For example. reset trap-hosts snmp reset trap-hosts Use this command to return the trap hosts list to the default of empty. This command is available to administrative users only. 328 snmp .com admin10 admin11 public snmpadmin23 private snmpadmin1 ------------------- show ro-communities snmp show ro-communities Use this command to display all read-only community strings. use the command: # snmp set sysLocation bldg3-rm222 show show config snmp show config Use this command to display all of the SNMP parameters. The output is similar to the following: # snmp show config ---------------------SNMP sysLocation SNMP sysContact Trap Hosts Read-only Communities Read-write Communities ---------------------------------------bldg3-rm222 smith@company. This command is available to administrative users only. to give a location of bldg3-rm222. For example.set sysLocation snmp set sysLocation location Use this command to set the system location as used in the SNMP MIB II system variable sysLocation. This command is available to administrative users only. 9 Command Reference Guide 329 .show rw-communities snmp show rw-communities Use this command to display all read/write community strings. The output is similar to the following: # snmp show trap-hosts Trap Hosts: admin10 admin11 status snmp status Use this command to display the status of the SNMP agent on a Data Domain system (enabled or disabled). The output is similar to the following: # snmp show rw-communities RW Community Strings: private snmpadmin1 show sysContact snmp show sysContact Use this command to display the system contact on a Data Domain system. DD OS 4. show trap-hosts snmp show trap-hosts Use this command to display the trap host list on a Data Domain system. show sysLocation snmp show sysLocation Use this command to display the system location on a Data Domain system. contact. SNMP defines exactly how a SNMP manager communicates with an SNMP agent. An SNMP manager is software running on a workstation from which an administrator monitors and controls the different hardware and software systems on a network. hosts. An SNMP agent is software running on equipment that implements the SNMP protocol. However. the sysContact variable does not default to the value set by the config set admin-email command. 330 snmp . These devices include. The SNMP feature allows a Data Domain system to respond to a set of SNMP get operations from a remote machine. use the snmp command. To configure community strings.Important Notices Data Domain systems support SNMP versions V1 and V2C. and switches. storage systems. and system name on a Data Domain system. For example. a Data Domain system takes the additional action of sending alert messages as SNMP traps. If sysLocation is not set with an SNMP command. but are not limited to. even when the SNMP agent is disabled. SNMP management requires two primary elements: an SNMP manager and an SNMP agent. Note: The SNMP sysLocation and the location set with the config set location command are the same. With one or more trap hosts defined. routers. SNMP defines the format of requests that an SNMP manager sends to an agent and the format of replies the agent returns. the variable defaults to the values specified with the config set commands. a Data Domain system is a read-only device with the following exception: A remote machine can set the SNMP location. and other SNMP variables on the Data Domain system. From an SNMP perspective. DD OS 4. If more than one file is specified. The traces option sends perf. Use the traces option to send multiple perf. The bundle option sends various log files from /ddvar/log.log files. If more than one file is specified. support Command Options upload upload file-list The file-list contains filenames available under /ddvar. The selected files are tar-gzipped together with a README file that includes identifying autosupport headers.9 Command Reference Guide 331 .25 support The support command uploads files from a customer Data Domain system to the Data Domain Support Web site. The support command has the following options: upload Upload files from a customer Data Domain system. Page 331 About the support Command The support command sends files to Data Domain Support personnel for troubleshooting. upload {bundle [file-list]|traces|file-list} Use the bundle option to send various Data Domain system log files that are often needed by the support staff. filenames must be space-separated. filenames must be space-separated. The optional filelist contains filenames available under /ddvar.log (performance log) files that are often needed by the support staff. filenames must be space-separated. 332 support . filenames must be space-separated.In a Global Deduplication Array. If more than one file is specified. If more than one file is specified. issuing this command from the master controller uploads bundles or traces (performance logs) from that node only. This command is available on a single node and a worker controller too. and not the worker controller. issuing this command from the master controller uploads bundles or traces (performance logs) from both nodes. upload {bundle [file-list]|traces|file-list} local In a Global Deduplication Array. The bundle/traces will be uploaded from that node. There is no change to command functionality on the worker controller. Show system information. Shut down and turn off the power. Manage system options. Show system hardware status Upgrade the software on a single node or simultaneously upgrade Global Deduplication Array controllers with a specified package.9 Command Reference Guide 333 . The system command has the following options: headswap option poweroff reboot sanitize set date show status upgrade Restore system configuration after a head unit replacement. Set the system clock.26 system The system command manages system-level actions on the Data Domain system. Shut down and restart the server. Page 334 Page 334 Page 336 Page 336 Page 337 Page 338 Page 338 Page 352 Page 354 DD OS 4. Manage system sanitization. use the system headswap command. Stops and reboots the Data Domain system. see the Chassis Replacement FRU document for your system. and DD880g models. DD880.About the system Command The system command: • Displays the Data Domain hardware configuration and serial number. statistics. Sets date and banner information. Sanitizes the system after files are deleted. option option reset system option reset login-banner To reset the login banner to the default of no banner. DD690g. For specific instructions. Restores the configuration after a head unit replacement. DD880. • • • • • system Command Options headswap system headswap To restore the configuration to a DD690. Upgrades the software. Note: This command is available only when you swap to DD690. 334 system . and performance. This command is available to administrative users only. This command is available to administrative users only. DD690g. use this command. DD OS version. or DD880g system after a head unit replacement. run-time system status. use this command. Create a text file with your login message as the text on the other system. use this command. For example.9 Command Reference Guide 335 . This command is available to administrative users only. From the Data Domain system. Mount the Data Domain system directory /ddvar from another system.option set system option set login-banner filename To select a text file to display whenever someone logs in. 2. use the command: # system option set login-banner /ddvar/banner option show system option show To display the location of the file that contains the login banner text. This command is available to administrative users only. 3. to use the text from a file named banner. 1. The command output shows the path and file name: # system option show Option Value ----------------------------Login Banner File /ddvar/banner ----------------------------- DD OS 4. use the system option set login-banner command with the path and file name of the file that you created. use this command. The command automatically performs an orderly shutdown of file system processes. The command performs an orderly shutdown of file system processes. Are you sure? (yes|no|?) [no]: This command is available to administrative users only. The display includes a warning similar to the following: # system poweroff The 'system poweroff' command shuts down the system and turns off the power. reboot system reboot To shut down and reboot a Data Domain system. use this command. Are you sure? (yes|no|?) [no]: This command is available to administrative users only. Note: The system poweroff command does not power off external storage. The display includes a warning similar to the following: # system reboot The 'system reboot' command reboots the system. 336 system . File access is interrupted during the reboot.poweroff system poweroff To shut down power to the Data Domain system. particularly one not certified to hold data of that classification.sanitize System sanitization. vtl is temporarily disabled.9 Command Reference Guide 337 . in which classified data is inadvertently copied into another system. which is often required in government installations. Its primary use is to resolve Classified Message Incidents (CMIs). sanitize start system sanitize start Start the system sanitization process. sanitize abort system sanitize abort Stop the system sanitization process. ensures that all traces of deleted files are completely disposed of (shredded) and that the system is restored to a state as if the deleted files never existed. sanitize watch system sanitize watch Monitor system sanitization progress. Therefore. DD OS 4. sanitize status system sanitize status Check system sanitization process status. This command is available to administrative users only. running this command during scheduled backup times might not be desirable. While this command is running. show show all system show all To display memory usage information together with other available system information. at 9:24 a.: # system set date 1022092409 # system set date 102209242009 This command is available to administrative users only. Optionally. use this command. two digits for the century. two digits for the year. mm (00 through 59). hh(00 through 23). Two digits for minutes. Two digits for the hour. 2400 is not a valid entry. use either of the following commands to set the date and time to October 22. 0000 means midnight. use this command. The format for the data and time is: • • • • • • Two digits for the month. The output includes the results of the following commands: • • • • 338 system show detailed-version system show meminfo system show modelno system show serialno system .m. DD (01 through 31). 2009. Two digits for the day of the month. For example. The hour (hh) and minute (mm) entries are 24-hour (military) time with no colon between the hours and minutes. Note: Do not use this command if Network Time Protocol (NTP) is enabled. MM (01 through 12).set date system set date MMDDhhmm[[CC]YY] To set the system date and time. Optionally. The peak CPU utilization.• • system show uptime system show date show date system show date To display the system date and time. Stop collecting statistics and report the data gathered from the time that you entered the command system show detailed-stats start.) instead of a number. Run the command every nsecs seconds. you must use the count keyword. Otherwise. the statistics cover the time period since the last reboot. The results are the averages per second of the statistics during the time between the start and stop commands. Use the command options to specify a different interval for collecting statistics. To specify count without interval. show detailed-stats system show detailed-stats [start | stop | ([[interval] nsecs] [count count])] system show detailed-stats nsecs count By default. Generate count number of reports.9 Command Reference Guide 339 . The default interval is five seconds. Each subsequent report is for activity in the last nsecs. start stop Begin collecting statistics. The first report is for current activity. the column shows a dash ( . nsecs count The columns in this report show the following information: CPU busy CPU max The percentage of time CPU is busy (average for all CPUs). If the system is too busy to determine a value. use this command. DD OS 4. the keyword is optional. or RAID is degraded (a disk is missing and no reconstruction is in progress) Currently unused Verify data (a background process that checks for data consistency) Merging of the internal fingerprint index Summary vector internal checkpoint process B V M S NFS ops/s NFS proc NFS recv NFS send NFS idle CIFS ops/s ethx MB/s The number of NFS actions per second. One column appears for each Ethernet connection.State 'CDVMS' A single character that shows whether any of the six following events is occurring. The amount of data in megabytes per second passing through each Ethernet connection. The amount of data in kibibytes per second going to and from all disks in the Data Domain system. The fraction of time that the file server is busy servicing requests. C D Cleaning Disk reconstruction (repair of a failed disk). Disk KiB/s Disk busy NVRAM KiB/s 340 system . The amount of data in kibibytes per second that is read from and written to all NVRAM cards. The number of CIFS (Common Internet File system) operations per second. or RAID is resyncing (after an improper system shutdown and a restart). The percentage of NFS idle time. The percentage of time that all disks in the Data Domain system are busy. The proportion of NFS-busy time spent sending data out on the socket. The proportion of NFS-busy time spent waiting for data on the NFS socket. Each event can affect performance. use this command.12/arch/ia64/....@132588 dd_version_client=//ddfab:132588/app/..6.0-132588 Version info from kernel: kernel_version_release=2.12/arch/i386/.@25442 //prod/main/platform/os/debugrpm/..0..Repl KB/s The amount of data in kilobytes per second being replicated between one Data Domain system and another.... Note: KiB = kibibytes (the binary equivalent of kilobytes) Note: The output in Global Deduplication Array mode is different because there is more than one system.6.@132387 //prod/main/platform/os/linux-2.@124034 //prod/main/platform/user/samba/...@76935 //prod/main/platform/os/linux-2. The display is similar to the following: # system show detailed-version Data Domain OS 4.6..0-132588 Distribution: /auto/builds64e/distro/pinot/123033/localbld //prod/main/app/.@132364 Version info from ddfs executable: dd_version_timestamp=Fri Sep 25 19:56:00 2009 GMT dd_version_checksum=1dc267628964d4029346d82038d79932 dd_version_build_level=nightly dd_version_change_level=//prod/main/app/.23-ddr132588 kernel_build_level=SMP DD OS 4.9 Command Reference Guide 341 ..@132588 132588 //prod/main/platform/os/.9. For directory replication. the value is the total of all in and out traffic for all replication contexts.0.@61933 //prod/main/platform/os/linux-2. dd_version_opened_files= dd_version_release=4. show detailed-version system show detailed-version To display the versions of Data Domain system components on your system.12/arch/x86_64/..6..9.... Here is an example: # system show meminfo Memory Usage Summary Total memory: Free memory: Total swap: Free swap: 7987 MiB 1102 MiB 12287 MiB 12287 MiB 342 system . 5b 6a.-----------Device ------------------80003ES2LAN GigE MM-5425CN (empty) LSISAS3442E LSISAS3442E PRO/1000 PT DP GigE QLE2462 4Gb FC ------------------Ports -----0a. 0b 3a 4a 5a.-----------0 Intel 1 Micro Memory 2 (empty) 3 LSI Logic 4 LSI Logic 5 Intel 6 QLogic ---. use this command.show hardware system show hardware To display information about the PCI cards and other hardware in a Data Domain system. 6b ------ show meminfo system show meminfo To display a summary of the memory in a Data Domain system. Here are a few sample lines from the display: # system show hardware Slot Vendor ---. use this command. use this command. In both cases. enabled. Each battery entry should show 100% charged. The exceptions are for a new system or for a replacement NVRAM card.show modelno system show modelno To display the model number of a Data Domain system. show nvram system show nvram To display information about the memory and battery status of the NVRAM cards. The display is similar to the following: # system show nvram NVRAM Card Component ---------.9 Command Reference Guide 343 . If the card has one or more PCI or memory errors. the charge may initially be below 100%.00 MiB Note: MiB = Mebibytes (the binary equivalent of Megabytes) The errors entry shows the operational state of the card. enabled -------------------Value -------------------512.------------------0 PCI. an alerts email is sent and the Daily Alert Summary email includes an NVRAM entry. If the charge does not reach 100% within three days (or if a battery is not enabled). enabled 100% charged. DD OS 4.------------------1 memory size number of batteries 2 errors battery 1 battery 2 ---------. replace the card. 0 memory 100% charged. use this command. but the fields are as follows: 344 system . Display a table of how many of each file system operation was performed per minute. raw fsop duration interval The output is too large to print here. use this command. or sec. Follow the value with one of these keywords to show the time units: hr. The time between each line in the display.show performance system show performance [local] [raw | fsop] [duration {hr | min | sec}[interval {hr | min | sec}]] To display system performance figures for data transfer for an amount of time. min. Follow the value with one of these keywords to show the time units: hr. local Display the stats that are local to a Global Deduplication Array node. the system show performance gives Global Deduplication Array-wide statistics. or sec. Show unformatted statistics. or seconds prior to the current time for which to show data. If you want to specify the interval. you must also specify the duration. min. minutes. By default. The hours. Local compression rate.9 Command Reference Guide 345 . Utilization proc recv send idle Percent of time spent processing requests. Compression gcomp lcomp Global compression rate. Write throughput to the Data Domain system. The value is always zero for collection replication.Throughput Read Write Repl Network Read throughput from the Data Domain system. Repl Pre-comp Replication pre-compressed (logical) throughput into and out of the Data Domain System. DD OS 4. Percent of time spent receiving requests over the network. Replication network throughput into and out of the Data Domain system. Percent of time spent sending requests over the network. Percent of time spent idle. Percent of metadata segment lookups that miss in the cache. ovhd should exactly equal unus. The number of reopened read file streams in the past 30 seconds. A high percent indicates poor metadata prefetching. not all segments in a compression region may be used. A high ovhd relative to unus indicates that a lot of space is wasted due to cache block fragmentation. first perform a metadata lookup followed by a data lookup. Since a compression unit contains multiple segments. Percent of a compression unit cache block that is unused. For each data access.Cache Miss Note: Higher values are worse. A high percent indicates poor data prefetching. In the ideal case. The number of active write streams. Compression regions are stored in fixed size (128 KB) blocks. A high percent indicates cache thrashing. 346 system . Percent of data segment lookups that miss in the cache. thra Percent of compression units that have been read and discarded without being used. The number of reopened write file streams in the past 30 seconds. Percent of a compression unit’s data that is unused. unus ovhd data meta Streams rd wr r+ w+ The number of active read streams. A high percent indicates poor data locality. Disk reconstruction. The situation indicates that either the backup server is heavily loaded (resulting in slow network processing) or a network-related problem is slowing down sends and receives. Summary vector checkpoint. Fingerprint merge. Servicing a file system request consists of three steps: receiving the request over the network. and sending a reply to the request. the Data Domain system is spending much of its time waiting to receive or send data from or to the backup server. Verification. A high proc value indicates that the Data Domain system is already processing requests as quickly as it can and is the bottleneck. or backup server clients. Latency avg/std The average and standard deviation of the response time for ddfs to service all protocol requests excluding the time to receive/send the request/reply. The disk ID of the most loaded disk is shown in the brackets (may not correspond to the ID used by disk show commands).9 Command Reference Guide 347 . A common problem is that the client may be trying to access the Data Domain system over a 100 Mbit rather than a gigabit link. DD OS 4. When the recv or send value is high. Utilization cpu disk The average and maximum CPU utilization.State C D B V M S Cleaning. A low proc value indicates that the Data Domain system is lightly used and the performance is limited by the network. Currently unused. The CPU ID of the most loaded CPU is shown in the brackets. backup server. The maximum (highest) disk utilization over all disks. processing the request. 04. The display is similar to the following: # system show ports Port Connection Link Firmware Hardware Type Speed Address ---. Write.00 [IP] [84 00:64:a1:91:00:00:00:00 WWNN 50:06:0b:00:00:64:a1:90 WWPN 5b VTL 4. or the backup server may be waiting for data from slow backup clients.----------------------- 348 system .-------------.04.-----. recv.----------------------0a Enet 1 Gbps 00:15:17:0f:6e:bd (eth1) 0b Enet 1 Gbps 00:15:17:0f:6e:bc (eth0) 5a VTL 4. This situation indicates that the backup server cannot keep up with the Data Domain system.If the proc. then the Data Domain system is lightly loaded.04. The backup server's disk may be heavily loaded.---------.00 [IP] [84 00:64:a1:93:00:00:00:00 WWNN 50:06:0b:00:00:64:a1:92 WWPN 6a VTL 4.-----.04. idle is high). and send values are low (that is.00 [IP] [84 00:64:a0:75:00:00:00:00 WWNN 50:06:0b:00:00:64:a0:74 WWPN 6b VTL 4.00 [IP] [84 00:64:a0:77:00:00:00:00 WWNN 50:06:0b:00:00:64:a0:76 WWPN ---. the backup software may require tuning.-------------. Note: The Read.---------. use this command. show ports system show ports To display information about ports. and Replicate values are calculated in powers of 10 (1 KB = 1000) instead of powers of 2 (1 KiB = 1024). use this command. Ethernet ports. The display is similar to the following: # system show serialno Serial number: 8F46942007 show stats system show stats [start | stop | ([interval nsecs] [count count] )] system show stats nsecs count To display system statistics for CPUs. replication.9 Command Reference Guide 349 . The Data Domain system HBA firmware version. A MAC address. as follows: • An address followed by an Ethernet port number is a MAC address. for example. shows port 3a as a SAS HBA in slot 3 and port 4a as a SAS HBA in slot 4.Port The port number. and NFS. Link Speed Firmware Hardware Address show serialno system show serialno To display the system serial number. depending on the Data Domain system model. See the Data Domain Hardware Guide (for older systems) or the model-specific installation and setup guide to match a slot to a port number. a WWN. where # is the HBA slot number. • WWN is the world-wide name of the Data Domain system SAS HBA on a system with expansion shelves. use this command. A DD580. A gateway Data Domain system with a dual-port Fibre Channel HBA always shows #a as the top port and #b as the bottom port. • WWPN/WWNN is the world-wide port name or node name from the Data Domain system FC HBA on gateway systems. The speed in Gbps (Gigabits per second). Use the command DD OS 4. or a WWPN/WWNN. By default. the statistics cover the time period since the last reboot. disks. Otherwise. The default interval is five seconds. the column shows a dash ( . the keyword is optional. The results are the averages per second of the statistics during the time between the start and stop commands. Run the command every nsecs seconds. Generate count number of reports. start stop Begin collecting statistics.----. The first report is for current activity.--------. you must use the count keyword.) instead of a number.----. If the system is too busy to determine a value. To specify count without an interval. Stop collecting statistics and report the data gathered from the time that you entered the command system show stats start.----25 2% 4939 139 5683 0 4% 6606 0 Note: KiB = kibibytes (the binary equivalent of kilobytes) Note: The output in Global Deduplication Array mode is different because there is more than one system.options to specify a different interval for collecting statistics.----.----. nsecs count The display is similar to the following: # system show stats 04/23 16:23:10 CPU busy ----5% FS FS Net MB/s Disk KiB/s Disk NVRAM Repl ops/s proc in out read write busy KiB/s KB/s ----.----. Each subsequent report is for activity in the last nsecs. 350 system . The output is similar to the following: # system show uptime 12:57pm up 9 days. 5. use this command.47 Filesystem has been up 9 days.0-132588 DD OS 4. 0. 16:26 show version system show version To display the Data Domain OS version. 3 users. use this command. load average: 0. The display gives the release number and a build identification number. disk operations. and the idle time over the preceding 1. and 15 minute intervals The Filesystem line displays the time that has passed since the file system was last started.9 Command Reference Guide 351 . The display is similar to the following: # system show version Data Domain OS 4. 18:55. The display includes the following information: • • • • Current time Time since the last reboot (in days and hours) The current number of users The average load for file system operations. 0.0.show uptime system show uptime To display the time since the last reboot and the file system uptime.42.9.51. If the temperature reaches 60 degrees Celsius (140 degrees Fahrenheit). The information is grouped separately for the Data Domain system and each expansion shelf that is connected to the system. The Status column is the system view of fan operation. • The Fans section displays information about all of the cooling fans. • If the overall temperature for a Data Domain system reaches 50 degrees Celsius (122 degrees Fahrenheit). All of the fans in an expansion shelf are located inside the power supply units. internal temperatures. • • The Description column tells where the fan is located in the chassis. and power supplies. use this command.status system status To display status information about fans. A Status of Critical indicates that the temperature is above the shutdown threshold. medium. the numbers are negative when the status is OK and move toward 0 (zero) as CPU temperature increases. The CPU temperature values depend on the Data Domain system model. The C/F column displays temperature in degrees Celsius and Fahrenheit. See the topic “Replace Fans” in the Data Domain Hardware Guide (for older systems) or in the system-specific Cooling Fan Replacement document (newer systems) to identify the fans by name and number. the Data Domain system shuts down. • • The Temperature section displays the number of degrees that each CPU is below the maximum allowable temperature and the actual temperature for the interior of the chassis. With newer models. If a CPU temperature system • 352 . The Level column gives the current operating speed range (low. The operating speed changes depending on the temperature inside the chassis. or high) for each fan. The Status column shows whether or not the temperature is acceptable. a warning message is generated. # system status Enclosure 1 Fans Description -------------Cooling fan #1 Cooling fan #2 -------------Temperature Description --------------CPU 0 Relative Chassis Ambient --------------Power Supply Description --------------Power Module #1 Level -----medium medium -----C/F --------56/-101 24/75 -------Status -----OK Status -----OK OK -----Status -----OK OK ------ The display is similar to the following: DD OS 4. • The Power Supply section reports either that all power supplies are operating normally or that one or more are not operating normally. With older models. the numbers are positive.9 Command Reference Guide 353 . The message does not identify which power supply or supplies are not functioning (except by enclosure).reaches 0 Celsius. If the CPU temperature reaches 80 Celsius (176 degrees Fahrenheit). Look at the back panel of the enclosure and check the LED for each power supply to identify those that need replacement. the Data Domain system shuts down. the Data Domain system shuts down. Use the cifs show active command on the Data Domain system to check for CIFS activity. which requires the source and destination to run the same release. use this command. first upgrade the destination and then upgrade the source.7 is compatible with release 4. The exception is bidirectional directory replication. 1. Note: Stop any active CIFS client connections before starting an upgrade. On the client. You can get updated software from the Data Domain Support Web site.x releases.upgrade system upgrade filename To upgrade the Data Domain system software. this command upgrades both of the nodes. for example) and with the latest release of the previous family (4. 354 system . The upgrade command shuts down the Data Domain system file system and reboots the Data Domain system. enter the net use \\dd\backup /delete Keep these points in mind when performing an upgrade: • • In Global Deduplication Array mode. call customer support. depending on the amount of data on the system. replication is backwards compatible within release families (all 4. first upgrade the destination and then upgrade the destination. for example). Disconnect any client that is active. With collection replication. command: 2.6. With one exception. (If an upgrade fails.6.) The upgrade command may require over an hour. For systems that are already part of a replication pair: • • • • • With directory replication. On the administrative host. Click the Download button for the latest release. the command allows you to rollback the upgrade to the previous version. After all of the controllers have rebooted. (If the Web site has updated instructions. the master controller checks their status and initiates the second phase of the upgrade automatically on all controllers. If the automatic upgrade checks fail for some reason. go to: https://my. 2. which is installing the new DDOS upgrade on a secondary partition. Use secure HTTP (HTTPs) to connect to the Web site. open a browser and navigate to the Data Domain Support Web site. Download the new release file to the Data Domain system directory /ddvar/releases. DD OS 4. an alert is sent describing the cause of failure.datadomain. the controllers reboot.) 4. Log into a Data Domain system administrative host that mounts /ddvar from the Data Domain system. Upgrade by Using HTTP 1. Click Downloads. After the first phase of the upgrade. and the automated upgrade process exits. If the problem is not fixable. Log in with the Data Domain login name and password that you use for access to the support Web page. follow those instructions. Note: Before starting an upgrade. DD OS changes in a release may require new upgrade procedures. 6. A progress bar monitors the upgrade.9 Command Reference Guide 355 .com 3.• Do NOT disable replication on either system in the pair. 5. always read the Release Notes for the new release. For example. Note: You can run the second phase of the upgrade manually using the system upgrade command. Issuing this command on the master controller upgrades all controllers in a Global Deduplication Array simultaneously with the specified filename. 0-95091.rpm Examples for system Display System Statistics To display system statistics every 30 seconds for 10 iterations. the browser may add bracket and numeric characters to the upgrade image name.0.. Use the file name. not a path. Remove the added characters before running the system upgrade command. log into the Data Domain system as sysadmin and enter a command similar to the following.9. at 3:24 p. use the following command: # system show performance 30 min To show the last 30 minutes (duration) of performance figures with an interval of 5 minutes between each reported set of figures. use either of the following commands: # system set date 1026152408 # system set date 102615242008 Display System Performance To show only the last 30 minutes (duration) of performance figures. use the following command: # system show stats 30 10 Set the System Date and Time To set the date and time to October 26. # system upgrade 4. use the following command: # system show performance 30 min 5 min 356 system . 7.Note: When you use Internet Explorer to download a software upgrade image. 2008. To start the upgrade.m. For example.9 Command Reference Guide 357 .Display a Banner To have a text message appear at each login. use the following command on the Data Domain system: # system option set login-banner /ddvar/banner DD OS 4. mount the Data Domain system /ddvar directory from a third-party physical disk system and create a text file with the message as the text. to use text from a file named banner. 358 system . The admin privilege is for administrative users who have access to all Data Domain system commands. Delete a user. and displays user accounts.27 user The user command manages the user accounts on a Data Domain system. manages password aging and strength policies. Display user information. Manage password aging options. You can change the sysadmin password. The default administrative account is sysadmin. Disable a user account. Page 360 Page 361 Page 361 Page 361 Page 361 Page 362 Page 365 Page 365 About the user Command The user command adds and deletes users. The user command has the following options: add change del disable enable password reset show Add a new user. • The user privilege is for standard users who have access to a limited number of commands. • DD OS 4. Change user parameters.9 Command Reference Guide 359 . changes passwords. but cannot delete the account. Reset the user account list and password policies to their default values. Enable a user account. Most of the commands available at the user level display information. the account never expires. warn-days-before-expire. These options control password aging. If password is not specified. Account is disabled on this date. If this date is not specified.user Command Options add user add user-name [password password] [priv {admin | user}] [min-days-between-change days] [max-days-between-change days] {warn-days-before-expire days] [disable-days-after-expire days] [disable-date date] Use this command to add a new user. Account is disabled if inactive after N days past expiration. Maximum number of days before password expires. The default privilege level is user. max-days-between-change warn-days-before-expire disable-days-afterexpire disable-date The min-days-between-change. The user names root and test are default existing names on every Data Domain system and are not available for general use. 360 user . The disable-date is an optional date for password for account expiration. and disable-days-after-expire options are optional. A user-name must start with an alphanumeric character. password min-days-between-change Password must be at least 6 characters. Minimum number of days allowed before the password can be changed again. This command is available to administrative users only. Special characters cannot be used. max-days-between-change. the system prompts for one. Number of days of warning before a password expires. del user del user-name Use this command to remove a user. the disable-date previously assigned to the account is used. disable user disable user-name Use this command to disable the specified user account. The admin user can change any user’s password by using the user-name option. DD OS 4. If not specified. This command is available to users who currently have the admin privilege. This prevents the user from logging on to the Data Domain system. This command is available to administrative users only. Passwords must comply with the password strength policy. This command is available to administrative users only. which you can check with the command user password strength show.change change password user change password [user-name] Use this command to change a user’s password. This command is available to administrative users only. The account must already exist on the system. Users with the user privilege level can change only their own passwords.9 Command Reference Guide 361 . change priv user change priv user-name {admin | user} Use this command to change a user privilege level to either admin or user. enable user enable user [disable-date date] Use this command to enable a specified user account with the optionally specified account disable date. 362 user . New accounts inherit the policy in effect at the time they are created. unless you set different aging options with the user add command. This command is available to administrative users only.password password aging option reset user password aging option reset {all | [min-days-between-change] [max-days-between-change] [warn-days-before-expire] [disable-days-after-expire]} Use this command to reset one or more rules in the default password aging policy to the current default values. This command is available to administrative users only. password aging reset user password aging reset user {all | [min-days-between-change] [max-days-between-change] [warn-days-before-expire] [disable-days-after-expire]} Use this command to reset one or more rules in the password aging policy for the specified user to the current default values. password aging option set user password aging option set [min-days-between-change days] [max-days-between-change days] [warn-days-before-expire days] [disable-days-after-expire days] Use this command to set the default values for the password aging policy. This command is available to administrative users only. This command is available to administrative users only. password aging option show user password aging option show Use this command to display the default password aging policy. The output of this command is similar to the following: User -----joe1 Password Last Changed -----------Oct 28. This command is available to administrative users only. 2009 Minimum Days -------------0 0 Maximum Days -------------99999 99999 Warn Days Before Expire ------------7 7 Disable Days After Expire -----------never never ------enabled enabled Status Between Change Between Change sysadmin Mar 16. or for a specified user. 2006 password strength show user password strength show Show the current password strength policy. # user password strength show Minimum length of password: 7 Minimum number of character classes required in the password: 2 DD OS 4. This command is available to administrative users only. Administrative users can check the policies for all users.9 Command Reference Guide 363 . password aging show user password aging show [user] Use this command to show the password aging policy for all users.password aging set user password aging set user [min-days-between-change days] [max-days-between-change days] [warn-days-before-expire days] [disable-days-after-expire days] Use this command to set the password aging policy for the specified user. Users can check the password aging policy for their own account. digits. Reset the minimum number of characters in the password to 1. or both. Similarly. 364 user . This command is available to administrative users only. upper-case letters. Valid passwords must contain at least one character from the specified number of classes. 2. When DD OS counts the number of character classes. Specify either min-length or min-char-classes. and special characters. a digit at the end of the password does not count as a digit. password strength set user password strength set {[min-length length] [min-char-classes 1|2|3|4]} Set the password strength policy. or 4. min-length The minimum number of characters in the password min-char-classes The minimum number of character classes. 3. an upper-case letter at the beginning of the password does not count as an upper-case letter. all min-length Reset both the minimum length and minimum number of character classes to 1. Specify 1. The four character classes are lower-case letters. This command is available to administrative users only. # user password strength set min-length 8 Specified password policy parameters have been enforced.password strength reset user password strength reset {all | min-length | min-char-classes} Reset the password strength policy to the default values. min-char-classes Reset the minimum number of character classes to 1. This command is available to administrative users only.reset user reset Use this command to delete all users except for the sysadmin account and the current login. DD OS 4. show list user show list Use this command to display a valid list of system users. This command is available to administrative users only. run this command: user add fred password barney priv admin user "fred" added.9 Command Reference Guide 365 . show detailed user show detailed [user-name] Use this command to show detailed information for a specified user or for all users. user Examples Add a User To add a user named fred with password barney and with admin privileges. show show active user show active Use this command to display the currently logged-in users. The password aging and password strength options also get reset to their default values. This command is available to administrative users only. . run this command: user change wilma admin Privilege changed for user "wilma". Are you sure? (yes|no|?) [no]: yes ok. run this command.. The response looks similar to the following...[DONE] Resetting password aging options.[DONE] Resetting password strength options...... Reset to the Default User To reset the user list to the sysadmin user and the current user.. Deleted user "joe".. Change a Privilege Level To change the privilege level to admin for the user named wilma.. run this command: user del fred deleted user "fred".. proceeding. Resetting user accounts. Resetting user accounts..Remove a User To delete the user named fred.. Change a Password To change the password for the user named wilma.. barney. Resetting password aging options. which lists all removed users: user reset This command will delete all user accounts (except sysadmin) and reset password strength and password aging options to factory default values.. run this command: user change password wilma Enter new password: Re-enter new password: Passwords matched Password changed for user "wilma".. Password aging options have been reset.. 366 user .. .min-length: 1 .154 --------------Login From --------------tty ----tty1 pts/0 ----Session ------10650 23404 ------- Tue Dec 30 15:39 ---------------- 2 users found. The display of users currently logged into a Data Domain system includes the following information: Name Idle Login Time Login From tty The user’s login name..Password strength requirements reset to defaults: . The amount of time logged in with no actions from the user. Name -------sysadmin fred -------Idle ---22d 0s ---Login Time ---------------Mon Dec 8 14:36 192. The address from which the user logged in.9 Command Reference Guide 367 . The user’s session number. The hardware or network port through which the user is logged in or GUI for the users logged in through the Data Domain Enterprise Manager Web-based interface.[DONE] Display Current Users To display the users currently on the Data Domain system. The date and time when the user logged in.168. use this command # user show active User list from node "localhost"..min-character-classes: 1 Resetting password strength options. Session DD OS 4..128. The display of all users known to the Data Domain system includes the following: Name Uid Class Last Login From Last Login Time Status Disable Date The user’s login name.Display All Users To display a list of valid user accounts on the Data Domain system.98 <unknown> --------------Last Login Time -----------------------Tue Oct 27 17:15:06 2009 never -----------------------Status ------enabled enabled ------Disable Date -----------never never ------------ 2 users found. The address from which the user logged in. The date and time when the user last logged in. The date on which this account is to be disabled.168. # user show list User list from node "localhost". The user status. The user’s access level. The user’s ID number. Name ------sysadmin joe1 ------Uid --100 501 --Class ----admin user ----Last Login From --------------192. 368 user .128. Configure and show ports. Remove tapes from a slot. delete. and show groups. Display the state of the VTL process. Delete an existing tape library. DD OS 4. manages. Display VTL information. drive. Add or delete one or more Cartridge Access Ports (CAPs) from a VTL. Move existing tapes from the vault into a slot. Configure. Add or delete one or more slots in a VTL library. drive. and show pools. Manage and show VTL options. Configure and display tapes.9 Command Reference Guide 369 . modify. The vtl command has the following options: add cap del disable drive enable export group import initiator option pool port show slot status tape Add a tape library. Add. Page 371 Page 371 Page 372 Page 372 Page 373 Page 373 Page 373 Page 380 Page 381 Page 384 Page 386 Page 387 Page 389 Page 389 Page 391 Page 391 Page 392 Close all libraries and shut down the VTL process.28 vtl The vtl command creates. Page 372 reset hba Broadcast new VTLs and VTL changes to clients. or cartridgeaccess port and send them to the vault. delete. Manage and show initiator aliases. and deletes Virtual Tape Libraries (VTLs) on a Data Domain system. Add or delete virtual drives. or cartridge-access port. Start the VTL process. in a single zone. Note: VTL is a Data Domain licensed feature. to let two backup servers access a Data Domain system HBA in a SAN environment: 1. data movement from a system that uses VTL to a physical tape gets managed by backup software. 370 vtl . Virtual tape cartridges are created in one or more tape pools. To allow additional hosts access to Data Domain system VTL devices. CIFS. As with a physical stand-alone tape library. backup applications can connect to and manage a Data Domain system as if it were a standalone tape library. one for each server. Data Domain VTL supports simultaneous use of tape library and file system (NFS. and can only be deleted while they are in the vault. Virtual tape drives are accessible to backup software in the same way as physical tape devices. Add VTL devices and initiators into groups for access. For example. Single initiator zoning places each initiator. Contact your Data Domain representative for licensing information. Define two zones. Virtual tape cartridges that are not imported into a VTL reside in a virtual tape vault. not by the Data Domain system. the devices appear to the backup software as SCSI tape drives.About the vtl Command Using the Data Domain VTL feature. All of the functionality that is supported with tape is available with a Data Domain system. Create one VTL access group for each server. Tape cartridges are placed in the vault when initially created. Each tape cartridge has a barcode that is unique within the tape pool. 2. such as a backup server. A virtual tape library appears to the backup software as a SCSI robotic device accessed through standard driver interfaces. The vtl command is available to administrative users only. Data Domain recommends single-initiator zoning when using the VTL feature in a SAN (Storage Area Network) environment to simplify management and avoid possible host configuration issues. use VTL access groups. or OST) interfaces. After you create the devices in the VTL. A tape library model name. The total number of CAPs cannot exceed 100 per library or 1000 per system. The number of slots in the library. You cannot add more drives than the number of configured slots.000. num-slots num-caps cap cap add vtl cap add vtl [count num-caps] Add num-caps CAPs to a Virtual Tape Library. If using RESTORER-L180 as the model name. The maximum number of slots for all VTLs on a Data Domain system is 20. your backup software may require an update. vtl model A name of your choice. The current supported model names are L180 and RESTORER-L180.Options for the vtl Command add vtl add vtl [model model] [slots num-slots] [caps num-caps] Add a tape library (up to 64 library instances). The default is 0 (zero) and the maximum is 100 per library or 1000 per system. The number of cartridge-access ports. The default is 20 slots.9 Command Reference Guide 371 . The CAPs are deleted from the end. This command is available to administrative users only. This command is available to administrative users only. cap del vtl cap del vtl [count num_to_del] Delete num_to_del CAPs from a Virtual Tape Library. DD OS 4. See the Data Domain technical note for your backup software for the model name that you should use. This command is available to administrative users only. The number of drives to add. 372 vtl . model Drives are added by starting with drive number 1 and scanning for any holes left by the vtl drive del command. DD660. The maximum number of drives across all VTLs is 64 to 256. Systems with 4 G of memory (DD4xx. the system will automatically add the needed number of slots. The number of slots within a library can never be less than the number of drives in the library.del vtl del vtl Remove an existing virtual tape library. vtl num_drives The virtual tape library name. IBM-LTO-2. drive drive add vtl drive add vtl [count num_drives] [model model] Add virtual drives to a VTL. depending on the memory installed in your Data Domain system. The default drive type is IBM-LTO-3. If an attempt is made to add more drives than the current number of slots. or IBM-LTO-3. This command is available to administrative users only. Systems with 8 GB to 38 GB (DD580. This command is available to administrative users only. and DD690) can have a maximum of 128 drives. Once the holes are filled. One of IBM-LTO-1. DD510 and DD530) can have a maximum of 64 drives. the drives are appended to the end of the library. disable vtl disable Close all libraries and shut down the VTL process. Systems with 39 GB or more (DD880 and later) can have a maximum of 256 drives. This command is available to administrative users only. The number of the slot.Note: You cannot mix drive models within the same library.9 Command Reference Guide 373 . This command is available to administrative users only. or cartridge-access port. Use the vtl tape show vtl-name command to display slots and tape barcodes. which are virtual media changers or virtual tape drives) from a Data Domain system. VTL group changes may require the media server to rescan the SCSI bus. enable vtl enable Start the VTL process. drive. or cartridge-access port and send them to the vault. This may cause issues with some applications. DD OS 4. Any drive can be deleted. vtl address count The virtual tape library name. This command is available to administrative users only. drive. export vtl export vtl {slot | drive | cap} address [count count] Remove tapes from a slot. This command is available to administrative users only. or you can use the vtl reset hba command to reset the link. which means there can be holes in the drive list. The number of tapes to remove. group The VTL group feature allows clients to access only selected LUNs (devices. drive del vtl drive del vtl drive drive_number [count num_to_del] Delete virtual drives from a VTL. This command is available to administrative users only. group_name A VTL access group. a VTL. If drive_list contains more than one drive and you specify lun. vtl_name alias_or_WWPN all | changer | drive drive_list A VTL to add. You can optionally specify primary and secondary Data Domain system VTL port lists. The drive number can be a single number. Default. 374 vtl . If drive_list includes a LUN that has already been used. The drive_list is a comma-separated list of drives. 3-1. An initiator alias or WWPN. This command is available to administrative users only. The devices to add. or devices within a VTL. and 3-2. and summary are also reserved and cannot be used at all. the system skips to the next free lun. group add vtl group add group_name initiator alias_or_WWPN vtl group add group_name vtl vtl_name {all | changer | drive drive_list} [lun lun] [primary-port {all | none | port-list}] [secondary-port {all | none | port-list}] Add an item to the specified VTL access group. the port lists contain all Data Domain system VTL ports. all.Note: Avoid using the vtl reset hba command during active backup or restore jobs. or a range of two numbers separated by a hyphen (-). The drive numbers are integers starting from 1. Note: TapeServer is a reserved group and cannot contain initiators. optionally starting at a given LUN. it gets used as the starting LUN. 2. By default. Examples include: 1. You can add an initiator. The changes may cause an active job to fail depending on the backup application and host type. See below for a description of portlist. The secondary VTL ports on which the devices are visible to the vtl group use secondary command. but need not be unique across the system. This option lets you apply VTL access groups to specific Data Domain system VTL ports. DD OS 4. The ports must already exist.lun A device address to pass to the initiator. Use the vtl group use primary command to return the group to the primary port list after the path gets repaired. By default. See below for a description of port-list. The vtl show config command displays configuration information for all defined VTLs.9 Command Reference Guide 375 . the VTL devices are visible on all ports. You can specify port names as a range separated by a hyphen (-). See group use on page 379. or if you specify all. Specify none if the devices should not be visible on any ports. LUNs for VTL devices within a group must start with 0 (zero) and be contiguous numbers. use the vtl port show summary command. This feature supports path flexibility for handling path failure and load-balancing of VTL devices across ports. The primary VTL ports on which the devices are visible. primary-port all | none | port-list secondary-port all | none | port-list port-list Related Commands Use the vtl group use command to switch between the primary and secondary port lists in the event of path failure. The secondary port list supports path redundancy. A LUN must be unique within a group. The maximum Logical Unit Number (LUN) is 16383. You can set an alias for the initiators with the vtl initiator set alias command. the devices are visible on all ports. By default. To list port names. A comma-separated list of Data Domain system VTL ports. TapeServer. and can contain only the characters 0-9. Offline means the initiator is not currently visible from a Data Domain system VTL port. a-z. The vtl initiator show command displays an initiator list and the current status (online or offline) for each Data Domain system VTL port from which the initiator is detected. Note: VTL group names are case-insensitive. group del vtl group del group_name initiator alias_or_WWPN vtl group del group_name vtl vtl_name {all | changer | drive drive_list} Use this command to delete an initiator from a group. Specify the initiator by its WWPN or alias. Note: Some initiators running HP-UX that are directly connected to the Data Domain system show the status of the initiator as offline in the vtl initiator show output when the device is in fact online. A-Z. underscore(_). You can create up to 128 groups. group_name The name of the new group. group create vtl group create group_name Use this command to create a VTL access group with a specified group-name. must not be longer than 256 characters. This command is available to administrative users only. If this occurs. and hyphen (-). all and summary.The vtl group show command displays a list of access groups as well as initiators and VTL devices within each group. The name must be unique. Do not use the reserved group names Default. verify whether the device is connected by visually inspecting the Data Domain system HBA LEDs. This command immediately removes access from the specified initiator to the VTL devices 376 vtl . Each Data Domain system device (media changer or tape drive) as well as initiators may then be added to the VTL access group. The VTL to delete from the group. use the vtl group del command to remove the initiators and devices from the group. alias_or_WWPN group destroy vtl group destroy group_name Use this command to delete the specified empty VTL access group. This command is available to administrative users only. 3-1. This command is available to administrative users only. group_name The group to destroy. group_name vtl_name drive_list The group from which to delete the item. The initiator to delete. Before you destroy a group. or the VTL that contains the devices to delete. The drive number can be a single number. group_name vtl_name The group from which to delete the item. group modify vtl group modify group_name vtl vtl_name {all | changer [lun lun] | drive drive_list [lun lun]} [primary-port {all | none | port-list}] [secondary-port {all | none | port-list}] Use this command to modify a group without removing and replacing devices or initiators in the group. This command is available to administrative users only. and 3-2. or the VTL that contains the devices to delete.9 Command Reference Guide 377 . The main purpose of this command is to change group port assignments. and primary and secondary port assignments. DD OS 4. Examples include 1. or a range of two numbers separated by a hyphen (-). The VTL to delete from the group. You can use this command to change LUN assignments.within the group. A comma-separated list of drives. The drive numbers are integers starting from 1. 2. The primary VTL ports on which the devices are visible. The ports must already exist. lun primary-port all | none | port-list secondary-port all | none | port-list port-list If you omit any option. This feature supports path flexibility for handling path failure and load-balancing of VTL devices across ports. The drive numbers are integers starting from 1. By default. See group use on page 379. See below for a description of portlist. This option lets you apply VTL access groups to specific Data Domain system VTL ports. the devices are visible on all ports. or a range of two numbers separated by a hyphen (-). the current value remains unchanged. 378 vtl . the VTL devices are visible on all ports. 3-1 and. You can set an alias for the initiators with the vtl initiator set alias command. or if you specify all. You can specify port names as a range separated by a '-'. The LUN to use for this group. See below for a description of port-list. The secondary port list supports path redundancy. To list port names. 2. The secondary VTL ports on which the devices are visible to the vtl group use secondary command. 3-2. Specify none if the devices should not be visible on any ports. A comma-separated list of Data Domain system VTL ports. use the vtl port show summary command.drive_list A comma-separated list of drives. Examples include 1. The drive number can be a single number. By default. Use the vtl group use primary command to return the group to the primary port list after the path gets repaired. The drive number can be a single number.9 Command Reference Guide . This command does not interrupt any active sessions. 2. This command is available to administrative users only.and 3-2.group rename vtl group rename src_group_name dst_group_name Use this command to rename an existing VTL access group. group_name vtl-name drive_list The VTL access group to use. The dst_group_name must not already exist. This command is available to administrative users only. See group create on page 376 for a description of group name rules. A comma-separated list of drives. group use vtl group use group_name [vtl vtl-name {all | changer | drive drive_list}] {primary | secondary} Use this command to immediately change the access path to the primary or secondary port for the selected VTL components in an access group. 3-1. group show vtl group show [all | vtl vtl-name | group_name] Use this command to show information about VTL access groups. Show detailed information about the specified group. The drive numbers are integers starting from 1. or a range of two numbers separated by a hyphen (-). The VTL to use. you can use this command to return the group to its primary port list. This command is available to administrative users only. 379 DD OS 4. all vtl-name group_name Show information about all groups (default). When the path gets restored. Show information about all VTL access groups that contain any devices within the specified vtl-name. Examples include 1. Note: This command interrupts any current access to the specified group and is intended to be used during path failures. vtl_name barcode count pool_name element addr The VTL to use. drive. The address. The default is 1. a backup application may need to rescan available SCSI devices. The following two commands are equivalent: # vtl import VTL1 barcode TST010L1 count 5 # vtl import VTL1 barcode TST010L1 count 5 element slot address 1 380 vtl . The identifier for a virtual tape. The default is slot. which is required if the tapes are in a pool. The number of tapes to import. The destination element. Also. a rescan of media server's SCSI bus may be necessary. This command is available to administrative users only. or cartridge access port. Use the vtl tape show vtl-name command to display the total number of slots for a VTL and which slots are currently used. Use backup software commands from the backup server to move VTL tapes to and from drives. The name of the pool.After you apply a group to new Data Domain system VTL ports. import vtl import vtl_name barcode barcode [count count] [pool pool_name] [element {drive | cap | slot}] [address addr] Use this command to move existing tapes from the vault into a slot. Note: To remove an initiator from a group.) (Total empty slots) . the slot is reserved. (You cannot import more tapes than the number of currently empty slots. del command instead. This command is available to administrative users only. If a tape is in a drive and the tape origin is unknown (slot or CAP). A tape that is known to have come from a CAP and that is in a drive does not get a reserved slot. initiator reset alias vtl initiator reset alias alias_name Use this command to reset (delete) the initiator alias from the system.Rules for the Number of Tapes Imported The number of tapes that you can import at one time is limited by: • • • • • The number of empty slots. Deleting the alias does not affect any VTL access from the specified initiator. use the vtl group 381 DD OS 4. If a tape is in a drive and the tape origin is known to be a slot. a slot is reserved.(the number of tapes of unknown origin) The number of tapes you can import equals: initiator initiator reset address-method vtl initiator reset address-method initiator alias_or_WWPN Use this command to reset the address method used by REPORT LUNS back to the default (auto). This command is available to administrative users only.(the number of tapes that came from slots) . (The tape returns to the CAP when removed from the drive.) The number of slots that are empty and that are not reserved for a tape that is currently in a drive.9 Command Reference Guide . you do not need to specify a device address method. This method is used primarily for addressing virtual buses. Use this command to work around any platform-specific limitations that you encounter. alias_or_WWPN 382 vtl . flat device addressing is used.16383.255. The HP-UX operating system selects the volume set addressing method based on inquiry data and LUN information returned by the SCSI-3 REPORT LUNS command. peripheral device addressing is used. With most platforms. • For 256 . vsa The method is set to volume set addressing. and LUNs. The initiator to configure. This is the default.initiator set address-method vtl initiator set address-method { auto | vsa } initiator alias_or_WWPN This command sets the device address method used when responding to a SCSI REPORT LUNS command from the specified initiator. targets. auto The device address method gets chosen based on the numeric LUN range being reported: • For 0 . This command is available to administrative users only. DD OS 4. The following example uses the client name and port number as the alias to avoid confusion with multiple clients that may have multiple ports: # vtl initiator set alias client22_2a wwpn 21:00:00:e0:8c:11:33:04 initiator show vtl initiator show [initiator initiator | port port] Use this command to display the following information about one or all initiators: • • • • • • • Group Status WWNN WWPN Port Symbolic port name Address method This command is useful in troubleshooting and during setup.9 Command Reference Guide 383 . This command does not interrupt traffic or VTL group access. A-Z. underscore(_).initiator set alias vtl initiator set alias alias_name wwpn wwpn This command sets an alias for an initiator's WWPN. and hyphen (-). must not be longer than 256 characters. An initiator is any Data Domain system client HBA's world-wide port names (WWPN). You can create up to 128 aliases. The alias must be unique. Use the vtl initiator show command on the Data Domain system to list the client WWPNs detected by the Data Domain system. You must match the WWPNs in the command output to the client's HBA WWPN. and can contain only the characters 0-9. This command is available to administrative users only. This command is available to administrative users only. including colon delimiters. a-z. auto-offline Automatically offline a tape when a move command is generated. auto-eject Automatically move any tape that is in a cartridgeaccess port to the vault. 384 vtl . Use this option when backup or other software does not issue an offline command to the tape drive before issuing a move command to the media changer. Note: With auto-eject enabled. the tape stays in the cartridge-access port (CAP). a tape moved from any element to a CAP will be ejected to the vault unless an ALLOW_MEDIUM_REMOVAL command with a value of 0 (false) was issued to the library to prevent the removal of the medium from the CAP to the outside world.option option disable vtl option disable {auto-eject | auto-offline} Use this command to disable automatically taking tapes offline or automatically ejecting them before a move command is issued. The exception is that if the tape came from the vault. This command is available to administrative users only. This command is available to administrative users only. option reset loop-id vtl option reset loop-id Use this command to reset the private-loop hard address to the default of 1 (one).option enable vtl option enable {auto-eject | auto-offline} Use this command to enable either the auto-eject or the autooffline option. auto-offline Automatically move a tape offline when a move command is generated. This command is available to administrative users only. a tape moved from any element to a CAP is ejected to the vault unless an ALLOW_MEDIUM_REMOVAL command with a value of 0 (false) was issued to the library to prevent the removal of the medium from the CAP to the outside world. Note: With auto-eject enabled. To enable the new value. auto-eject Automatically move any tape that is in a cartridgeaccess port to the vault. This command is available to administrative users only. DD OS 4. Use this option when backup or other software does not issue an offline command to the tape drive before issuing a move command to the media changer.9 Command Reference Guide 385 . The range for value is from 0 (zero) to 125. option set loop-id vtl option set loop-id value Use this command to give a Data Domain system VTL HBA a private-loop hard address. The exception is that if the tape came from the vault. disable and then re-enable the VTL by using the vtl disable and vtl enable commands. the tape stays in the cartridge-access port (CAP). This command is available to administrative users only. pool show vtl pool show {all | pool_name} Use this command to list the configured tape pools or the contents of a specific pool_name. You must first use the vtl tape del command to remove all of the tapes from the pool.option show vtl option show {option_name | all} Use this command to display the most recent VTL option settings. This command is available to administrative users only. 386 vtl . pool del vtl pool del pool_name Use this command to delete a tape pool. This command is available to administrative users only. Pools are for replication commands only. Disable/enable vtl to make the option become active. This command is available to administrative users only. A pool is a named vault for tapes. the tapes get placed in the vault named Default. If you do not create a pool. pool pool add vtl pool add pool_name Use this command to create a tape pool to allow replication by pools. This command is available to administrative users only. This command is available to administrative users only.port port disable vtl port disable {all | port-list} Use this command to disable all of the Fibre-Channel ports. All of the specified ports must exist. The port-list may contain ports that are already enabled. The port-list may contain ports that are already disabled.9 Command Reference Guide . or the specific ports in port-list. port show detailed-stats vtl port show detailed-stats Use this command to show the following information: • • • • • • • • • • • Control commands Write commands Read commands In (number of MiB written--the binary equivalent of MB) Out (number of MiB read) Link failures LIP count Sync losses Signal losses Count of errors in primitive sequence protocol Number of invalid tx words 387 DD OS 4. port enable vtl port enable {all | port-list} Use this command to enable one or more Fibre-Channel ports. All of the specified ports must exist. This is the default if you omit the port option. 388 vtl . port show hardware vtl port show hardware Use this command to show the following hardware information: • • • • Model Firmware WWNN WWPN This command is available to administrative users only. Seconds between each refresh of the display Maximum number of summaries to display. port portlist port all secs count Show detailed statistics for the devices that are accessible on the specified VTL ports. port show stats vtl port show stats [port {port-list | all}] [interval secs] [count count] This command shows a summary of the VTL I/O statistics of all the drives in all the VTLs on all of the Fibre Channel ports where the drives are visible.• Number of frames received with a bad CRC This command is available to administrative users only. This command is available to administrative users only. Show detailed statistics for all ports. reset hba vtl reset hba Use this command to broadcast new VTLs and VTL changes to clients.port show summary vtl port show summary Use this command to show the following information: • • • • • • • • Port HBA slot HBA port Connection type Link speed Port ID Enabled Status This command is available to administrative users only. show show config vtl show config [vtl] For all VTLs. Note: Avoid using the vtl reset hba command during active backup or restore jobs. or optionally a single VTL. The changes may cause an active job to fail depending on the backup application and host type.9 Command Reference Guide . This command is available to administrative users only. DD OS 4. this command displays the following information: • • Library name and model Tape drive model 389 This command is available to administrative users only. and 3-2. per VTL drive. If you omit both drive and port (or specify all for both). Show statistics for all ports. vtl The VTL to query. Show statistics for the devices that are accessible on the specified VTL ports. 3-1. show stats vtl show stats vtl [drive {drive-list | all}] [port {port-list | all}] [interval secs] [count count] Use this command to show detailed traffic statistics for devices that belong to the specified VTL. Examples include 1. 2. Show statistics for only the drives in a commadrive drive-list separated list of drives. you see the total traffic statistics for all devices on all ports. this command displays the following information: • • • • • Starting element address Slot count and starting address CAP count and starting address Drive count and starting address Changer count and starting address This command is available to administrative users only. This command is available to administrative users only. or a range of two numbers separated by a hyphen (-). vtl 390 . The statistics include the speed of reads and writes in KiB per second. The drive number can be a single number. or optionally a single VTL. drive all port portlist port all Show statistics for all drives. This is the default if you omit the drive option.show element-address vtl show element-address [vtl] For all VTLs. The drive numbers are integers starting from 1. This is the default if you omit the port option. This command is available to administrative users only.000 slots. The default count is infinity. count 10 displays statistics 10 times. For example. This command is available to administrative users only.secs The interval between repeated displays of statistics. vtl num_to_add The VTL to modify. The default interval is 2 seconds. each instance being interval secs apart. shows statistics every second. slot del vtl slot del vtl [count num_to_del] Use this command to delete one or more slots from the end of the specified Virtual Tape Library. distributed across one or more libraries. The default is 20 slots. The number of slots to add. the statistics display forever (or until the command is aborted with Ctrl+C). The number of slots to delete. The maximum is 20. DD OS 4. vtl num_to_del The VTL to modify. count slot slot add vtl slot add vtl [count num_to_add] Use this command to add one or more slots to the end of the specified Virtual Tape Library. This command is available to administrative users only. that is. status vtl status Use this command to display the state of the VTL process. The default is 20 slots. For example. Show statistics for count number of times. “interval 1”.9 Command Reference Guide 391 . The pool that you specify must already exist. associate the tapes to an existing pool for replication. The pool name is Default if you do not specify a name. • L3 represents a tape of 400 GiB capacity. • L2 represents a tape of 200 GiB capacity. This command is available to administrative users only. • LA represents a tape of 50 GiB capacity. the base-2 version of GB or GigaBytes. that value overrides the two-character tag. The default is 1 (one). Data Domain recommends setting capacity to 100 or less. Note: Capacities are quoted here in GiB or GibiBytes. Associate the tapes with the specified pool. This value overrides the barcode tag capacities. LT0-2. capacity The number of GibiBytes for each tape created. L2. LB. For the efficient reuse of Data Domain system disk space after data becomes obsolete (and the Data Domain system cleaning process marks data for removal). vtl count poolname 392 . • L1 represents a tape of 100 GiB capacity.) barcode An eight-character identifier that must start with six numeric or upper-case alphabetic characters (that is. 0-9 and A-Z). • LC represents a tape of 10 GiB capacity. See pool add on page 386. or LC for the supported LT0-1. Optionally. • LB represents a tape of 30 GiB capacity. The upper limit is 800. These capacities are the default sizes that get used if you omit the capacity option when you create the tape cartridge. If you specify capacity . and end in a two-character tag of L1. L3.tape tape add vtl tape add barcode [capacity capacity] [count count] [pool poolname] Use this command to add one or more virtual tapes and insert them into the vault. LA. The number of tapes to create. and LT0-3 tape type. The number of tapes to delete. Create one tape of 10 GiB capacity. Create tapes of 30 GiB capacity and can accept a count of up to 650 tapes (from 350 to 999).000 tapes in a single operation. 2. Create tapes of 50 GiB capacity which can accept a count of up to 10.000. increment it. 4. just before L. If the character is alphanumeric. increment it. You can create only one tape with this name. Start at the sixth character position. if you also specify count).9 Command Reference Guide 393 . then move one position to the left.000 tapes (from 0000 to 9999). If the character is a digit. If the character is a digit. AA0000LA AAA350LB 5M7Q3KLC Rules for Automatic Barcode Incrementing To automatically increment the barcode when creating more than one tape. based on the numeric characters in the bar code. in order. the system follows these steps: 1. you cannot increment the name.Sample Barcodes 000000L1 Create tapes of 100 GiB capacity which can accept a count of up to 1. DD OS 4. barcode count poolname The barcode identifier for the tape (or for the first tape. You can create up to 100. 5. This option is required if the tapes are in a pool. This command is available to administrative users only. 3. The name of the pool that contains the specified tape. 9 to 0. tape del vtl tape del barcode [count count] [pool poolname] Use this command to delete one or more tapes and all of the data on those tapes.000 tapes (from 000000 to 999999). stop. If an overflow occurs. You cannot delete tapes that are in a VTL. or 6months. specify a four-digit year. The months or mos period is always 30 days. If the file system is read-only. ). An absolute date or a relative time after the current time. This command is available to administrative users only. This command is available to administrative users only. 2009. the first minute of the day) of the given date. weeks or wks. For example. or months or mos with no space between the number and the days. the retention-lock is maintained until midnight (00:00. based on the numeric characters in the bar code. a twodigit month. barcode count poolname stamp The barcode identifier for the tape.05. For a relative date. the change gets made immediately. the retention-lock is maintained until the same time of day as you execute this command. For an absolute date. To retention-lock 500 tapes starting at barcode AA0000LC for one year: # vtl tape modify AA0000LC count 500 retention-lock 1year 394 vtl . weeks. This option is required if the tapes are in a pool. in order. tape modify retention-lock vtl tape modify barcode [count count] [pool poolname] retention-lock stamp Use this command to change the amount of time to maintain the retention-lock on a specified tape. the command fails. 1year. specify a number of days. The number of tapes to modify. With an absolute date. If the volume is not mounted. slashes ( / ). the data gets synchronized first. With a relative time. or hyphens ( . and a two-digit day separated by dots ( . The name of the pool that contains the specified tape. 6wks.).22. See export on page 373 to remove tapes from a VTL. For example. Otherwise. or months. The number of tapes to move. barcode count src-pool dest-pool The barcode identifier for the tape. in order. If the volume is not mounted. any outstanding writes are synchronized first.9 Command Reference Guide 395 . The current pool. The number of tapes to modify. This option is required if the tapes are in a pool. You cannot move the following kinds of tapes: • • • Tapes that are in a VTL library Tapes on a replica Retention-lock controlled tapes DD OS 4. These tapes must have sequential barcodes. The name of the pool that contains the specified tape. This command is available to administrative users only. Otherwise. the command fails. tape move vtl tape move barcode barcode [count count] source src-pool destination dest-pool Use this command to move tapes between VTL pools.tape modify writeprotect vtl tape modify barcode [count count] [pool poolname] writeprotect {on | off} Use this command to set the write protect state of a specified tape. barcode count poolname The barcode identifier for the tape. The new pool. If the file system is read-only and you try to use this command to turn write protection off. the tape file permission gets changed immediately. based on the numeric characters in the bar code. drive. count count Show the specified number of tapes in order. drive. The current tape location. all pool pool vault vtl summary Show information about all tapes. or cap with those keywords. 396 vtl . vtl src-address The Virtual Tape Library that contains the tape. When using count and barcode together. use a wild card character in the barcode to have the count be valid. This command is available to administrative users only. Specify whether the address is a slot. Show a summary of all tapes and tape usage. dest-address tape show vtl tape show {all | pool pool | vault | vtl} [summary] [count count] [barcode barcode] [sort-by {barcode | pool | location | state | capacity | usage | percentfull | compression | modtime} [{ascending | descending}]] Use this command to display information about tapes. An asterisk (*) matches any character in that position and all further positions. or cap with those keywords. Specify whether the address is a slot. Show information about tapes in the vault. Show information about the tapes in the specified pool. The new tape location. This command is available to administrative users only.vtl tape move vtl source {slot | drive | cap} src-address destination {slot | drive | cap} dest-address Use this command to move a tape between elements in specified Virtual Tape Library. Show information about tapes in the specified vtl. A question mark (?) matches any character in that position. barcode barcode Show information about tapes that match the specified barcode. based on the numeric characters in the bar code. state. descending The following example displays three tapes starting with barcode ABC00. add tapes. capacity. Add four IBM-LTO-3 drives to the VTL: # vtl drive add libr01 count 4 model IBM-LTO-3 3. Move ten tapes starting at AA0000LC from pool srcpool to pool dstpool: # vtl tape move barcode AA0000LC count 10 source srcpool destination dstpool DD OS 4.9 Command Reference Guide 397 . and then populate the VTL slots with tapes. 1. ascending | Sort the report in the specified order. location. percentfull. # vtl tape show vault count 3 barcode ABC00*L1 Examples Add a VTL The following commands add a VTL.sort-by Sort the report on the specified column: barcode. usage (number of bytes used on the tape). compression. pool. or modtime (modification time). Create a new VTL: # vtl add libr01 model L180 slots 200 caps 2 2. The VTL is then ready for backup commands. Adds tapes to the VTL: # vtl tape add ABC100L1 capacity 75 count 50 4. Import tapes into the VTL slots: # vtl import libr01 barcode ABC100L1 count 10 Move Tapes 1. . Export three tapes from drives.0 GiB ( 0... # vtl export lib1 drive 1 count 3 ...Manually Import and Export Tapes 1.. Import two tapes to CAPs. 398 vtl .0 GiB ( 0. 4.. imported 2 tape(s). 5.0x 3. # vtl tape show lib1 Processing tapes. Barcode Pool Location (%) Comp ModTime ABC000L1 0.. # vtl import lib1 barcode ABC000L1 element drive address 1 count 3 . Check the result. imported 3 tape(s). Import three tapes to drives. Check the results of the import..00%) ABC002L1 0.00%) State Size 100 GiB 100 GiB 100 GiB Used 0...00%) ABC001L1 0.. exported 3 tape(s).. # vtl tape show lib1 Processing tapes.0 GiB ( Default lib1 drive 1 RW 0x 2009/10/29 12:07:31 Default lib1 drive 2 RW 0x 2009/10/29 12:07:31 Default lib1 drive 3 RW 0x 2009/10/29 12:07:31 ------------------VTL Tape Summary Total number of tapes: Total pools: Total size of tapes: Total space used by tapes: Average Compression: 3 1 300 GiB 0. # vtl import lib1 barcode ABC000L1 element cap address 1 count 2 . 2...0 GiB 0.... imported 3 tape(s). # vtl tape show lib1 Processing tapes...0x 6.0 GiB ( Default lib1 slot 1 RW 0x 2009/10/29 12:07:31 Default lib1 slot 2 RW 0x 2009/10/29 12:07:31 Default lib1 slot 3 RW 0x 2009/10/29 12:07:31 VTL Tape Summary ---------------Total number of tapes: Total pools: Total size of tapes: 3 1 300 GiB 399 DD OS 4...00%) State Size 100 GiB 100 GiB 100 GiB Used 0. Export two tapes from CAPs.Barcode Pool Location (%) Comp ModTime ABC000L1 0..0 GiB ( 0.. 8.0 GiB ( 0.00%) ABC001L1 0. Check the results of the import...0 GiB 0. 7..0 GiB ( Default lib1 cap 1 RW 0x 2009/10/29 12:07:31 Default lib1 cap 2 RW 0x 2009/10/29 12:07:31 VTL Tape Summary ---------------Total number of tapes: Total pools: Total size of tapes: Total space used by tapes: Average Compression: 2 1 200 GiB 0.0 GiB ( 0. Barcode Pool Location (%) Comp ModTime ABC000L1 0..00%) ABC001L1 0.00%) ABC002L1 0.00%) State Size 100 GiB 100 GiB Used 0. # vtl export lib1 cap 1 count 2 . # vtl import lib1 barcode ABC000L1 count 3 . exported 2 tape(s). Import three tapes to slots.9 Command Reference Guide .. exported 3 tape(s). # vtl export lib1 slot 1 count 3 . • Set the backup software minimum record (block) size. Larger sizes usually give faster performance and better data compression..Total space used by tapes: 0.. The VTL feature requires a license.0 GiB Average Compression: 0.. Note: If you change the size after initial configuration.0x 9.com/documentation 400 vtl . For specific backup software and hardware configurations tested and supported by Data Domain. data written with the original size becomes unreadable. you need to: • Obtain a license. Compatibility Data Domain VTL is compatible with all DD400. DD500. the Data Domain system must have a Fibre Channel interface card installed in the PCI card array. See your Data Domain sales representative to purchase a license. Important Notices Before starting to use Data Domain VTL. and DD800 series Data Domain systems. Because the VTL feature communicates between a backup server and a Data Domain system through a Fibre Channel interface. • Verify that a Fibre Channel (FC) interface card has been installed. Export three tapes from slots.. DD600.datadomain. Data Domain strongly recommends that backup software be set up to use a minimum record (block) size of 64 KiB or larger. see the VTL matrices at the Data Domain Support Web site: https://my. ) Because the Data Domain system treats the IBM LTO drives as virtual drives.Tape Drives You can use tape and library drivers supplied by your backup software vendor that support the IBM LTO-1 (the default). (See Compatibility on page 400. RESTORERL180. See group on page 373. LTO-2. and IBM TS3200 tape libraries with the following number of libraries. or IBM LTO.000 tapes (cartridges) of up to 800 GiB for an individual tape (Gibibytes. the base-2 equivalent of Gigabytes). IBM LTO-2. tape drives. Up to 256 tape drives.9 Command Reference Guide 401 . and LTO-3) or media types in the same library. • • DD OS 4. Tape Libraries Data Domain VTL supports the StorageTek L180. The default capacities for each IBM LTO drive type are as follows: • • • LTO-1 drive: 100 GB LTO-2 drive: 200 GB LTO-3 drive: 800 GB Note: You cannot mix drive types (LTO-1. depending on the memory installed in your Data Domain system. RESTORER-L180. or IBM TS3200 tape libraries. you can set a maximum capacity of 800 GB for each drive type.3 drives and the StorageTek L180. and tapes: • 64 libraries (64 concurrently active virtual tape library instances). Access to VTLs and tape drives can be managed with the Access Grouping feature. Up to 100. Smaller records use the space at the same rate per record as larger records.Data Structures Data Domain VTL includes internal Data Domain system data structures for each virtual data cartridge. The command deletes all virtual tapes. The structures have a fixed amount of space that is optimized for records of 16 KiB or larger. such as VTL. Caution: Data Domain VTL does not protect virtual tapes from a Data Domain system filesys destroy command. Restrictions The number of recommended concurrent virtual tape drive instances is platform-dependent and is the same as the number of recommended streams between a Data Domain system and a backup server. leading to virtual cartridges that get marked as full even though the amount of data is less than the defined size of the cartridge. NFS. and CIFS. 402 vtl . This number is system-wide and includes all streams from all sources. Many can be found by searching on Google. The hierarchy is in the form of a table.A MIB Reference About the MIB The Data Domain Management Information Base (MIB) is a hierarchy of objects that define the status and operation of a Data Domain system.ireasoning. the iReasoning MIB browser can be found for downloading at http://www.shtml.9 Command Reference Guide 403 . at the link Download Free Personal Edition. DD OS 4.com/mibbrowser. As an example. MIB Browser The user may find it worthwhile to download a freeware MIB browser. Top-Level Organization of the MIB 404 MIB Reference . 3.4. Inc.4) -currentAlerts(1.1.3.1.1) --************************************************************ currentAlerts OBJECT IDENTIFIER ::= { alerts 1 } currentAlertTable OBJECT-TYPE SYNTAX SEQUENCE OF CurrentAlertEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A table containing entries of CurrentAlertEntry.19746. The MIB in Text Format The MIB can be viewed in text form. The Data Domain enterprise number is 19746. The text form of the section on alerts is shown below.1.9 Command Reference Guide 405 .4.1.19746.6.6.1 prefix up to and including the Data Domain.4.4.dataDomainMib (1.19746.4.============= --. as an example.4.3.19746.19746) -dataDomainMibObjects(1.6.1) -alerts (1. but it is somewhat difficult to read.1.3.3.Table A-1: Top-Level Organization of the MIB Tree/subtree Relative OID and Name Info The MIB is divided into four top-level entities: dataDomainMib Conformance dataDomainMib Objects dataDomainMib Notifications Products The Data Domain MIB 19746 DATADOMAINDescription: This document describes the MIB Management Information Base for Data Domain Products.1. Enterprise is 1.1.6." ::= { currentAlerts 1 } currentAlertEntry OBJECT-TYPE SYNTAX CurrentAlertEntry MAX-ACCESS not-accessible STATUS current DD OS 4.1.1.1.6.CurrentAlerts -. The ASN. --.1.1. DESCRIPTION "currentAlertTable Row Description" INDEX { currentAlertIndex } ::= { currentAlertTable 1 } CurrentAlertEntry ::= SEQUENCE { currentAlertIndexAlertIndexTC, currentAlertTimestampAlertTimestampTC, currentAlertDescriptionAlertDescriptionTC } currentAlertIndex OBJECT-TYPE SYNTAX AlertIndexTC MAX-ACCESS not-accessible STATUS current DESCRIPTION "Current Alert Row index" ::= { currentAlertEntry 1 } currentAlertTimestamp OBJECT-TYPE SYNTAX AlertTimestampTC MAX-ACCESS read-only STATUS current DESCRIPTION "Timestamp of current alert" ::= { currentAlertEntry 2 } currentAlertDescription OBJECT-TYPE SYNTAX AlertDescriptionTC MAX-ACCESS read-only STATUS current DESCRIPTION "Alert Description" ::= { currentAlertEntry 3 } -************************************************************ 406 MIB Reference Entries in the MIB The MIB is a hierarchy stored in a table. Each entry in the table has the following fields under it: Name Full Name of the field. For example: currentAlertDescription!@#.iso.org. dod.internet.private.enterprises .dataDomainMib.dataDomainMibObjects .alerts.currentAlerts.currentAlertT able.currentAlertEntry.currentAlert Description. This is equivalent to the OID number iso=1, org=3, dod=6, internet=1, private=4, enterprises=1, dataDomainMib=19746, etc. Full index number of the field. For example, .1.3.6.1.4.1.19746.1.4.1.1.1.3 For this MIB, this is always DATA-DOMAINMIB. Brief description. For example: read-only. For example: mandatory, current. Default value. For tables, lists indexes into the table. (For objects, lists the object.) Description of the field. OID MIB Syntax Access Status DefVal Indexes Descr DD OS 4.9 Command Reference Guide 407 Important Areas of the MIB Four areas deserve special attention and are documented thoroughly here. The four areas documented here are in the following order for the sake of clarity (the numbers in parentheses are the relative numbers inside the MIB): • • • • Alerts (.1.3.6.1.4.1.19746.1.4) Data Domain MIB notifications (.1.3.6.1.4.1.19746.2) File system space (.1.3.6.1.4.1.19746.1.3.2) Replication (.1.3.6.1.4.1.19746.1.8) A section of information on each area is given (see Alerts (.1.3.6.1.4.1.19746.1.4) on page 408, Data Domain MIB Notifications (.1.3.6.1.4.1.19746.2) on page 409, Filesystem Space (.1.3.6.1.4.1.19746.1.3.2) on page 428, and Replication (.1.3.6.1.4.1.19746.1.8) on page 430). Alerts (.1.3.6.1.4.1.19746.1.4) The Alerts table is a set of containers (variables or fields) that hold the current problems happening in the system. By contrast, the Notifications table holds a set of rules for what the system does in response to problems whenever they happen in the system. See also Data Domain MIB Notifications (.1.3.6.1.4.1.19746.2) on page 409. Alerts are the system for communicating problems, Data Domain's version of Notifications. The table currentAlertTable holds many current alert entries at once, with an Index, Timestamp, and Description for each. The Data Domain Alerts are shown in Figure A-1 and Table A-2. Figure A-1: Alerts 408 MIB Reference The Alerts table is indexed by the index currentAlertIndex. Table A-2: Alerts OID .1.3.6.1.4.1.19746.1.4 .1.3.6.1.4.1.19746.1.4.1 .1.3.6.1.4.1.19746.1.4.1.1 .1.3.6.1.4.1.19746.1.4.1.1.1 .1.3.6.1.4.1.19746.1.4.1.1.1.1 .1.3.6.1.4.1.19746.1.4.1.1.1.2 .1.3.6.1.4.1.19746.1.4.1.1.1.3 Name alerts currentAlerts currentAlertTable currentAlertEntry currentAlertIndex currentAlertTimestamp A table containing entries of CurrentAlertEntry currentAlertTable Row Description Current Alert Row index Timestamp of current alert Description currentAlertDescription Alert Description Data Domain MIB Notifications (.1.3.6.1.4.1.19746.2) The Notifications table holds a set of rules for what the system does in response to problems whenever they happen in the system. (Notifications are also known as traps.) By contrast, the Alerts table is a set of containers (variables or fields) that hold the current problems happening in the system. See also Alerts (.1.3.6.1.4.1.19746.1.4) on page 408.] As a user, the only thing you can do with notifications and alerts is choose to receive them or not. Choosing to receive notifications is called “adding a trap host,” that is, adding the name of a host machine to the list of machines that receive notifications when traps are sprung. Choosing not to receive notifications on a given machine is called “deleting a trap host.” See the entries add on page 324, del on page 325. DD OS 4.9 Command Reference Guide 409 Notifications vary in severity level, and thus in result. This is shown in Table A-3. Table A-3: Notification Severity Levels and Results Severity Level of Notification Warning Alert Shutdown Result An Autosupport email is sent. An Alert email is sent. The system shuts down. In addition to the above results, in each case a Notification is sent if it is supported. The following is an example of how the user might use the MIB Notifications table. A user adds the hostname panther5 to the list of machines that receive notifications, using the command: snmp add trap-host panther5 410 MIB Reference Later a fan module fails on the enclosure. The alarm fanModuleFailedAlarm is sent to panther5. The user gets this alarm, and looks it up in the MIB, in the Notifications table. The entry looks like somewhat like this: Table A-4: Part of the fanModuleFailedAlarm Field of the Notifications Table in the MIB OID Name Indexes fanIndex Description Meaning: A fan module in the enclosure has failed. The index of the fan is given as the index of the alarm. This same index can be looked up in the environmentals table fanProperties for more information about which fan has failed. What to do: Replace the fan! .1.3.6.1.4.1.19746.2. fanModuleFailedAlarm 0.5 • • • The user looks up the index in the MIB environmentals table fanProperties, and finds that fan 1 has failed. Back in the Notifications table, the user sees that What to do is Replace the fan. The user replaces the fan, removing the error condition. More on Notifications is given in Figure A-2 and Table A-2. DD OS 4.9 Command Reference Guide 411 Figure A-2: Notifications 412 MIB Reference In the Notifications table, notifications are indexed into other tables by various indexes, given in the Indexes column. The table names can be found under Description. Table A-5: Notifications OID .1.3.6. 1.4.1. 19746 .2 .1.3.6. 1.4.1. 19746 .2.0 .1.3.6. 1.4.1. 19746 .2.0.1 .1.3.6. 1.4.1. 19746 .2.0.2 Name dataDomainMib Notifications Indexes Description dataDomainMib Traps powerSupplyFail edAlarm Meaning: Power supply failed What to do: Replace the power supply. tempSen sorIndex Meaning: The temperature reading of one of the thermometers in the chassis has exceeded the warning temperature level. If it continues to rise, it may eventually trigger a shutdown of the Data Domain system. The index value of the alarm indicates the thermometer index that may be looked up in the environmentals table temperatures for more information about the actual thermometer reading value. What to do: Check the Fan status, the temperatures of the environment in which the Data Domain system is located, and other factors that may increase the temperature. systemOverheat WarningAlarm DD OS 4.9 Command Reference Guide 413 1. 414 MIB Reference . What to do: Check the fan status. 1.3 Name systemOverheat AlertAlarm Indexes tempSen sorIndex Description Meaning: The temperature reading of one of the thermometers in the chassis is more than halfway between the warning and shutdown temperature levels.Table A-5: Notifications (Continued) OID . and other factors that may increase the system temperature.2.0.3. it may eventually trigger a shutdown of the Data Domain system. If it continues to rise.1.4.6. The index value of the alarm indicates the thermometer index that may be looked up in the environmentals table temperatures for more information about the actual thermometer reading value. the temperatures of the environment in which the Data Domain system is located. 19746 . 1.3.1. systemOverheatS tempSen hutdowntAlarm sorIndex .6.1. The index of the fan is given as the index of the alarm.Table A-5: Notifications (Continued) OID . The index value of the alarm indicates the thermometer index that may be looked up in the environmentals table temperatures for more information about the actual thermometer reading value. Then check other environmental values. What to do: Replace the fan. What to do: Once the system has been brought back up. Meaning: A fan module in the enclosure has failed.2. first check for high environment temperatures or other factors that may increase the system temperature.4. such as fan status and disk temperatures.6.5 fanModuleFailed fanIndex Alarm DD OS 4. 19746 .1. The Data Domain system will shut down to prevent damage to the system. 1. This same index can be looked up in the environmentals table fanProperties for more information about the fan that has failed.4. 19746 .2.1.0.3.4 Name Indexes Description Meaning: The temperature reading of one of the thermometers in the chassis has reached or exceeded the shutdown temperature level.9 Command Reference Guide 415 .0. Meaning: The file system process on the Data Domain system has had a serious problem and has had to restart.1. upgrade rpm files stored in the /ddvar file system.1. There has been an excessive number of PCI or memory errors.1. What to do: Delete unneeded files. .3.Table A-5: Notifications (Continued) OID . The system may not have enough space for the routine system activities to run without error. core files.2.0. What to do: Check the status of the NVRAM after reboot. 1.6.4.3.6 Name nvramFailingAla rm Indexes Description Meaning: The system has detected that the NVRAM is potentially failing.7 filesystemFailed Alarm .8 fileSpaceMainten anceAlarm 416 MIB Reference . What to do: Check the system logs for conditions that may be triggering the failure.1.6.3.2. such as old log files.4. The NVRAM tables nvramProperties and nvramStats may provide for information on why the NVRAM is failing. 19746 . 19746 . and replace if the errors continue. 1. support bundles. Other alarms may also indicate why the file system is having problems.0.4.6.1.0.1.2. 1. 19746 . Meaning: DDVAR File System Resource Space is running low for system maintenance activities. support bundles.0.1. 19746 . What to do: Delete unneeded files. When files are deleted from outside of the /ddvar space.3. and upgrade rpm files stored in the /ddvar file system.2. The system may not have enough space for the routine system activities to run without error. and core files.6. Consider upgrading the hardware or adding shelves to high-end units. 1. fileSpacePrewarn filesyste ingAlarm mResour ceIndex DD OS 4.1. invoke filesys clean before the space is recovered.9 Command Reference Guide 417 .4. such as old log files.Table A-5: Notifications (Continued) OID . Reducing the retention times for backup data can also help.9 Name Indexes Description Meaning: /ddvar file system resource space is running low for system maintenance activities. Table A-5: Notifications (Continued) OID . Consider upgrading the hardware or adding shelves to high-end units. and core files. The index value of the alarm identifies the file system index that may be looked up in the file system table filesystemSpace for more information about the actual file system that is getting full.0. support bundles. 1.1. 418 MIB Reference . 19746 .3.1. and upgrade rpm files stored in the /ddvar file system.6. such as old log files.2.1 0 Name fileSpaceWarnin gAlarm Indexes filesyste mResour ceIndex Description Meaning: A file system resource space is 90% utilized. invoke filesys clean to recover space. When files are deleted from outside of the /ddvar space. Reducing the retention times for backup data can also help. What to do: Delete unneeded files.4. 6. 1.1. When files are deleted from outside of the /ddvar space.2. Consider upgrading the hardware or adding shelves to high-end units.0. and upgrade rpm files stored in the /ddvar file system. invoke filesys clean to recover space.9 Command Reference Guide 419 . Reducing the retention times for backup data can also help. support bundles. 19746 .4. such as old log files.1.1 1 Name Indexes Description Meaning: A file system resource space is 95% utilized.Table A-5: Notifications (Continued) OID . What to do: Delete unneeded files. fileSpaceSevereA filesyste larm mResour ceIndex DD OS 4. The index value of the alarm indicates the file system index that may be looked up in the file system table filesystemSpace for more information about the actual file system that is getting full.3. or core files. 19746 . When files are deleted from outside of the /ddvar space.4. such as old log files. The index value of the alarm identifies the disk index that may be looked up in the disk tables diskProperties. What to do: Delete unneeded files. and diskReliability for more information about the actual disk that has failed.Table A-5: Notifications (Continued) OID .0. and upgrade rpm files stored in the /ddvar file system. . support bundles. Reducing the retention times for backup data can also help.1. diskPerformance.6.1.3.1 4 diskFailedAlarm diskProp Meaning: Some problem has Index been detected about the indicated disk.2.1 2 Name fileSpaceCritical Alarm Indexes filesyste mResour ceIndex Description Meaning: A file system resource space is 100% utilized.1. Consider upgrading the hardware or adding shelves to high-end units. 1.1.4. or core files.0.2. What to do: Replace the disk. invoke filesys clean to recover space.3.6. 19746 . 1. 420 MIB Reference . The index value of the alarm indicates the file system index that may be looked up in the file system table filesystemSpace for more information about the actual file system that is full. The index value of the alarm indicates the disk index that may be looked up in the disk tables 'diskProperties'. If it continues to rise.2. and other factors that may increase the temperature. temperatures of the environment where the Data Domain system is located.3. it may eventually trigger a shutdown of the Data Domain system.1. What to do: Check the disk status. DD OS 4.15 Name diskOverheatWa rningAlarm Indexes diskErrI ndex Description Meaning: The temperature reading of the indicated disk has exceeded the 'warning' temperature level. 'diskPerformance'. and 'diskReliability' for more information about the actual disk exhibiting the high value.9 Command Reference Guide 421 . 19746 .4.Table A-5: Notifications (Continued) OID . 1.6.1. 422 MIB Reference . and diskReliability for more information about the actual disk exhibiting the high value.6. and other factors that may increase the temperature. If the temperature stays at this level or rises. consider failing the disk and getting a replacement.2.1 6 Name diskOverheatAle rtAlarm Indexes diskErrI ndex Description Meaning: The temperature reading of the indicated disk is more than halfway between the warning and shutdown temperature levels.1. The index value of the alarm indicates the disk index that may be looked up in the disk tables diskProperties. and no other disks are reading this trouble.Table A-5: Notifications (Continued) OID . diskPerformance. it will trigger a shutdown of the Data Domain system. 1.1.4. What to do: Check the disk status. If it continues to rise. the temperatures of the environment in which the Data Domain system is located.0. 19746 .3. 6.4 . This can happen due to a disk failing during runtime or boot-up. The index value of the alarm identifies the disk index that may be looked up in the disk tables diskProperties.1. The Data Domain system will shut down. 2.1.19 746.1 8 raidReconSevere Alarm DD OS 4. Reconstruction occurs when the RAID group falls into degraded mode. 6.1.1. and diskReliability for more information about the actual disk exhibiting the high value.0. the disk should be replaced to ensure data safety.3.01 7 Name Indexes Description Meaning: The temperature reading of the indicated disk has surpassed the shutdown temperature level. consider failing it and getting a replacement disk.3. What to do: Boot the Data Domain system and monitor the status and temperatures. If the same disk has continues having problems.2. 1.1. diskOverheatShu diskErrI tdowntAlarm ndex . What to do: While it is still possible that the reconstruction could succeed.4.Table A-5: Notifications (Continued) OID .9 Command Reference Guide 423 . Meaning: RAID group reconstruction is currently active and has not completed after 71 hours. diskPerformance. 19746 . What to do: The disk must be replaced.4. 1. 19746 . Reconstruction occurs when the RAID group falls into degraded mode.0. Reconstruction occurs when the RAID group falls into degraded mode.0. 19746 . 1.2. 19746 .4.2.3.2 0 raidReconCritica lShutdownAlar m . 19746 .1. 1. . What to do: Disk may need to be replaced. This can happen if a disk fails during run-time or boot-up.1.3.6.0. or RAID administration may be necessary.1.4.1.2.4. Meaning: One or more RAID groups is missing.1.2. What to do: Disk may need to be replaced.6.3. Meaning: There is no spare available for the RAID group.2 2 raidGroupMissin gAlarm diskNoSpareAlar m 424 MIB Reference . 1.0.6.6.1.3. This can happen if a disk fails during runtime or boot-up.1 9 Name raidReconCritica lAlarm Indexes Description Meaning: RAID group reconstruction is currently active and has not completed after 72 hours. What to do: The disk should be replaced to ensure data safety.1. or RAID administration may be necessary.2 1 .Table A-5: Notifications (Continued) OID .1. Meaning: RAID group reconstruction is currently active and has not completed after more than 72 hours. 0. 19746 . 1. 19746 . Meaning: Unsupported multipath setting in the HBA firmware. What to do: Check the status of network and wiring.1.2.3.0. 19746 . Administration may be necessary.1.4.0. What to do: Contact Data Domain support.1.6.Table A-5: Notifications (Continued) OID .2 5 .4.0.9 Command Reference Guide .1.3.1. 1.2.2 8 diskSASHBAlar m snapshotFullAlar m snapshotHWMA larm clusterNodeAlar m DD OS 4.4.0. 19746 . What to do: SAS configuration documentation should be consulted.6. 19746 .4.3.2. If they are OK.1.6.2. try rebooting the node.1.2.1. Meaning: The maximum number of snapshots has been reached.3.1. 1. What to do: Multipath disk administration may be necessary.0. 1.1.2 7 .2 6 .1.2. Meaning: Node is not reachable on any network interface.1. Meaning: The number of snapshots exceeded a predefined percentage of the maximum. 19746 . 425 .3. The number of paths set up is less than the required number of paths.3.6. Meaning: SAS configuration error. 1. What to do: Begin expiring some old snapshots to make room.4.6.2 3 Name diskPathAlarm Indexes Description Meaning: Multipath configuration is experiencing a problem.2 4 diskSASAlarm . Disk index is in the first disk in the enclosure with multipath.4. The maximum number of enclosures has been reached. or there is a topology problem.6. 1. What to do: Expire some old snapshots to make room. replSyncAlarm replLagAlarm systemStartupAl arm .0.3 1 .6. 19746 .4.1.0. A software or hardware restart may fix this malfunction.2.2.2 9 . Meaning: The system has rebooted or started. A software or hardware restart may fix this malfunction.2.1. 19746 .3.1.0.1.1. What to do: Consult the system logs.6.6. Meaning: The file system has undergone too many relaunches. then reconfigure and run replication sync. What to do: Break replication on the source and destination.3. unless the reboot was triggered by abnormal conditions.1. power.Table A-5: Notifications (Continued) OID . What to do: Consult the system logs.3 2 Name clusterInterfaceA larm Indexes Description Meaning: One interface of the Global Deduplication Array is down. What to do: Check the status of network and wiring. Meaning: The lag threshold for replication has been exceeded.4.3.0. such as temperature. This does not indicate any abnormal activity.1.3. What to do: Nothing.0. 1.1.3 3 .2. try rebooting the node. It is probably unstable. 19746 . 19746 . If they are OK. 1. or fan problems.4.2.1. Meaning: A replication context is disabled due to NVRAM loss.3 4 filesysRelaunchA larm filesysDDGCFail edAlarm 426 MIB Reference . 1.4.6.0.2.3. What to do: Check the logs and network connectivity.4.1. 1. 1.6. 1.1.4.6. Meaning: The DDGC cleaning process has failed. 19746 . 19746 .3.3 0 .1. 1.4.2. What to do: Replace the disk.1. 19746 .3.6.0.2.3.1.4.6.0. A software or hardware restart may fix this malfunction. 1.Table A-5: Notifications (Continued) OID .3 5 . 1. diskUnsupporte dAlarm DD OS 4. Meaning: The disk is not supported by the Data Domain system.3 6 Name filesysGeneralPr oblemAlarm Indexes Description Meaning: A general problem has occurred with the file system.9 Command Reference Guide 427 . 19746 .1. What to do: Consult the system logs. 4.3.1.4.6.2.Filesystem Space (.19746.1.2.2.1.1. See Figure A-3 and Table A-6.6.6.1.1.3.3.3.3.4.2. Figure A-3: Filesystem Space The Filesystem Space table is indexed by the index filesystemResourceIndex.19746.2.3.6.1.1 .2 .1.3.1.1.3.1.1.19746.1.3.1.1.1.3.3.1.6.1 .1.1.1.1 .3.19746.1.4 Name filesystemSpaceTable filesystemSpaceIndex filesystemResourceInde x The file system resource index Description A table containing entries of FilesystemSpaceEntry filesystemResourceNam The file system resource e name filesystemSpaceSize filesystemSpaceUsed The size of the file system resource in gigabytes The amount of used space within the file system resource in gigabytes 428 MIB Reference .4.4.1.2.1.1.3. Table A-6: Filesystem Space OID .1.19746.1.1.1.1.3.4.1.3 .1.1.1.4.19746.1.2) The Filesystem Space MIB entries describe the allocation of file system space in Data Domain systems.19746.1.6.1.6.1. 3.6.Table A-6: Filesystem Space (Continued) OID .1.4.4.1.3.5 Name filesystemSpaceAvail Description The amount of available space within the file system resource in gigabytes The percentage of used space within the file system resource .1.2.9 Command Reference Guide 429 .1.1.1.6 filesystemPercentUsed DD OS 4.1.19746.1.19746.6.1.3.1.1.2.3.1. 1.1.1.6.1.1.8.1 .3.1.1.1.1.1.8) Various values related to replication are contained in the Replication table in the MIB.1.4.3.2 . Table A-7: Replication OID .1.1.1.19746.1.1.6.1.8. The state of the replication source and destination pair The status of the replication source and destination pair connection MIB Reference Description 430 .3.8.6.Replication (.1.1.19746.1.19746.1.4.3.1 .1.1.1.1.8.1.1.1.19746.1 .1.6.3.4.8 .3.1.3 Name replication replicationInfo replicationInfoTable replicationInfoEntry ReplState replStatus A table containing entries of ReplicationInfoEntry The replicationInfoTable row description.19746.1.3.1.1.4.1.4. Figure A-4: Replication The Replication table is indexed by the index replContext.4.19746.19746.1.6.6.8.4.1.1.6. 10 .7 replSource replDestination .3.1.1.1.1.1.1.19746.19746.1.11 replLag replPreCompBytesSent replPostCompBytesSen t replPreCompBytesRem aining replPostCompBytesRec eived replThrottle replSyncedAsOfTime .1.1.1.12 .19746.1.1.3.19746.1.1. or 0 if the time is unknown .4.19746.1.1.1.8.1.9 .1.6 .6.4.1.4.6.8.1.4 .1.1.19746.1.1.1.6.1.6.1.1.8.1.1.1.19746.1.1.6.8.4.19746.1.1.1.1.8.6.8.3.1.1.4.1. in bps The time when the source and destination were in sync.1.3.1. The number of postcompression bytes sent The number of precompression bytes remaining The number of postcompression bytes received The replication throttle.3.1.1.1.1.4.1.1.4.1.3.19746.8.3.4.1.1.1.19746.1.1.1.1.8.6.1.1.8 .4.4.1.1.6.3.1.1.8.8.6.3. or the time since disconnect if the status is disconnected The network path to the replication source directory The network path to the replication destination directory The time lag between the source and destination The number of precompression bytes sent.3.1.1.19746.3.4.6.8.9 Command Reference Guide 431 .1.1.6.1.1.Table A-7: Replication (Continued) OID .1.1.1.1.1.1.1.14 DD OS 4.5 Name replFileSysStatus replConnTime Description The status of the file system The time of connection established between the source and destination.1.13 . 19746.4.1.4.19746.1.4.9.1.1.1.1.4. and the nfsStatsEntry table is indexed by nfsStatsIndex.3.3.19746.1.9.6.19746.3.1 .1.9) Various values related to NFS are contained in the nfsClientEntry and nfsStatsEntry tables in the MIB.2.1.6.6.6.1.1.1.19746.1 Name nfs nfsProperties nfsStatus nfsClient nfsClientTable A table containing entries of nfsClientEntry Status of the network file system Description 432 MIB Reference .1.1.6.9 .6.1.1.1.NFS (.19746.1.4.1.3.1.4.1.3.1.1 .1. Table A-8: NFS OID .1.9. Figure A-5: NFS The nfsClientEntry table is indexed by nfsClientIndex.2 .3.1.9. See Figure A-5 and Table A-8. 1 .6.4.1.1.1.4.9.19746.1.1.1.6.3.1.19746.1.1.2.1.1.1.1 .3.1.1.19746.1.6.3.6 .1.4.1.1.2.1.19746.7 Name nfsClientEntry nfsClientIndex nfsClientPath nfsClientClients nfsClientOptions nsfstats nfsStatsTable nfsStatsEntry nfsStatsIndex nfsStatsExportPoint nfsStatsFilesystemTy pe nfsStatsCacheEntry nfsStatsFileHandleLo okup MaxCacheSize CurrentOpenStreams A table containing entries of nfsStatsEntry nfsStatsEntry table row description NSF resource index NFS export point File system type Number of cache entries File handle lookup count Max cache size Current open stream count Description nfsClientTable Row Description NFS Client index NFS client path List of NFS clients NFS client's options DD OS 4.9.3.1.6.19746.1.6.1.3.3.19746.1.1.1.1.4.3.4.3.3.3.1.9.1.9.6.3.1.6.9.6.2.4 .19746.1.1.19746.3 .1.2.19746.4.4.1.1 .3.1.6.1.1.4.19746.1.3.5 .1.1.2.1.1.1.9.1.6.19746.1.1.3.1.3.1.1.3.1.1.1 .3.1.1.1.Table A-8: NFS (Continued) OID .1.1 .3.1.4 .1.1.1.4.1.19746.9.9.1.4.6.9.3.4.3.1.6.3 .1.1.1.9.1.4.1.9.1.9.19746.1.1.1.9.9 Command Reference Guide 433 .1.6.19746.1.9.3.6.1.1.1.4.3.6.1.4.19746.1.4.1.1.9.1.3.2 .1.1.1.3 .2 .1.3. 3.1.19746.2 .1.10.2.4.2.1.19746.3.1.6.1.10.3.10.1.1.6.2 Name cifs cifsProperties cifsStatus cifsConfig cifsConfigMode cifsConfigWINSServe r CIFS configuration mode CIFS WINS server CIFS status Description 434 MIB Reference .1.10.10 .1.3.1.1 .3.1.1.1.4.1.3.1.1.1.19746.6.1. See Figure A-6 and Table A-9.1 .1.10) Various values related to CIFS are contained in the cifsShareTable table in the MIB.6.19746.1.1 .1.4.1.19746.6. Table A-9: CIFS OID .19746.4.19746.6.CIFS (.1.1.4.1.10.4. Figure A-6: CIFS The cifsStareIndex table is indexed by the cifsShareIndex.1.1.4.1.3.1.6. 2.1.1.3.1.1.1.4.1.1.1.3.1.3.1 .3.4.6.3 .1.1.1.1.6.1.1.19746.3.9 Command Reference Guide 435 .3.6 .4. cifsShareTable Row Description CIFS share index CIFS domain controller CIFS DNS server CIFS configuration group name CIFS share name CIFS share path CIFS share clients CIFS share user CIFS share comment CIFS share browsing CIFS share writeable cifsShareMaxConnecti CIFS share maximum on connection DD OS 4.3.5 .10.1.1.4.1.1.1.1.1.4 .1.3.3.19746.1.4.1.3.19746.3.3 .Table A-9: CIFS OID .10.1.7 .1 .10.6.1.1.6.3.19746.4.1.1.1.6.3.10.1.6.2.10.10.1.4.19746.1.3.19746.19746.1.3.4.19746.10.1.4.1.1.9 Name Description cifsConfigNetBIOSHo CIFS Net BIOS hostname stname cifsConfigDomainCo ntroller cifsConfigDNS cifsConfigGroupNam e cifsShare cifsShareTable cifsShareEntry cifsShareIndex cifsShareName cifsSharePath cifsShareClients cifsShareUser cifsShareComment cifsShareBrowsing cifsShareWritable A table containing entries of cifsShareEntry.6.1.4.1.4.6.1.1.19746.1.1.3.1.1.6.3.3.19746.19746.1.3.1.4.10.3 .1.1 .1.1.2 .1.1.1.4.1.4 .1.3.1.1.1.10.1.2.10.3.6.1.3.4.10.6.1.1.2.3.1.3.1.8 .19746.1.10.1.1.10.6.4.19746.1.1.1.1.6.6 .1.1.5 .1.19746.3.10.1.1.1.4.6.10.3.1.6.1.3.1.19746.6.19746.1.10.1. 19746.1.1.1.VTL (. Figure A-7: VTL 436 MIB Reference .6.4.11) Various values related to VTL are contained in the vtlLibraryTable and vtlDriveTable in the MIB.3. See Figure A-7 and Table A-10.1. 19746.1.1.1 .6.11.2.1.6.3.2.4.1.2.1.1.3.4.11.11.1.1.1 .1.10 .4.11.6.6.1.1.1.1.2.1.2.6.1.1.2.19746.4 .11.1.19746.3.1.1.1.1.1.2.3.1.1.1.8 .6.1.11.3.6.1.11.3.1.1.2 .1.1.1.1.1.6.6.The VTLLibraryTable is indexed by the vtlLibraryIndex.1.11.1.4.4.11.2 .1.2.1.6.6 .2.1.11.1.4.1.1.1.4.1. VTL drive index.19746.3.1.1.2.1.1.4.3.1.3.9 . Description State of VTL administration State of VTL process A table containing entries of VtlLibraryEntry vtlLibraryTable Row Description VTL Library index VTL library name VTL library vendor VTL library model VTL library revision VTL library serial VTL library total drives VTL library total slots VTL library total caps VTL library status DD OS 4.1.1.1.1.3.1.1. Table A-10: VTL OID .3.1 .1.11 .11.1.1.3.4.1.3.1.4.6.4.1.1.5 .2.1.1.1.6.19746.1.4.11.6.6.4.1.1.11.19746.1.4.3.1.2.19746.1.2 .2.19746.19746.1.4.3.2.1.4.2.1.1 .11.6.1.6.1.3.1.11.1.9 Command Reference Guide 437 .11.6.3.4.3.1.1.1 Name vtl vtlProperties vtlAdminState vtlProcessState vtlConfiguration vtlLibrary vtlLibraryTable vtlLibraryEntry vtlLibraryIndex vtlLibraryName vtlLibraryVendor vtlLibraryModel vtlLibraryRevision vtlLibrarySerial vtlLibraryTotalDrives vtlLibraryTotalSlots vtlLibraryTotalCaps vtlLibraryStatus vtlDrive vtlDriveTable vtlDriveEntry vtlDriveIndex A table containing entries of VtlDriveEntry vtlDriveTable Row Description.19746.2.1.19746.11.11.4.6.1.1.19746.1.2.1.1.1.1.11.19746.1.4.6.1 .1.19746.2 .1.3 .6.1.1.19746.6.2.3.11.11.1.1.1.4.2.6.3.1.1.19746.1.1.1.1.1.1.2.1.3. and the vtlDriveTable is indexed by vtlDriveIndex.4.1.1 .1.1 .1.7 .1.1.1.1.1.1.19746.19746.3.1.1.1.19746.19746.19746.4.1.1.1.1.1.1.1.1 .1.19746.1. 1.4 .2.2.19746.2.6.3.6.2.2.1.2.1.4.5 .3 .1.3.1.19746.2 .11.6 .4.7 .2.2.1.1.4.1.3.1.19746.1.2.1.3.1.19746.1.2.1.19746.4.11.2.6.1.1.1.1.1.1.1.1.2.1.1.11.8 .1.1.1.11.9 Name vtlDriveName vtlDriveVendor vtlDriveModel vtlDriveRevision vtlDriveSerial vtlDriveLibraryName vtlDriveStatus vtlDriveTapeVolume Description VTL drive name VTL drive vendor VTL drive model VTL drive revision VTL drive serial VTL drive library name VTL drive status VTL drive tape volume 438 MIB Reference .11.19746.4.3.2.1.1.3.1.19746.2.1.4.4.1.1.6.19746.11.1.6.1.3.6.1.1.1.1.6.1.1.11.1.1.1.2.Table A-10: VTL OID .6.11.2.1.3.1.1.4.1.