DD OS 5.2 Command Reference Guide

March 27, 2018 | Author: dragos_scribd | Category: Secure Shell, Public Key Certificate, File Transfer Protocol, File System, World Wide Web


Comments



Description

EMC Data Domain Operating System 5.2 Command Reference Guide May 2012 THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Using, copying, and distributing EMC software described in this publication requires an applicable software license. EMC2, EMC, Data Domain, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2009-2012 EMC Corporation. All rights reserved. Published in the USA. Reference: 762-0013-0006_Rev_A Contents About This Guide Related Documents The EMC Data Domain Support Portal Knowledge Base and Reference Library Service and Support 19 19 20 20 20 adminaccess Change History Guidelines and Restrictions Options add authentication certificate del disable enable reset show ssh telnet trust web Additional Topics Supported Certificate Formats Importing and Deleting Certificates Returning Command Output to a Remote Machine 21 21 22 22 22 23 24 26 26 27 27 27 28 29 30 30 31 31 31 32 alerts Change History Guidelines and Restrictions Options clear notify-list show Keywords and Arguments 33 33 33 33 34 34 36 39 3 Additional Topics Output From alerts show Command Option Default Notification Group Alert Notice at Log In 40 40 41 42 alias Change History Guidelines and Restrictions Options add del reset show Additional Topics Correspondence Table 43 43 43 43 43 44 44 44 44 44 archive Change History Guidelines and Restrictions Options data-movement policy data-movement schedule data-movement start data-movement status data-movement stop data-movement watch disable enable option report show 47 47 48 48 48 49 50 50 50 50 50 51 51 51 51 authentication Change History Guidelines and Restrictions Options disable domain enable 53 53 53 54 54 54 54 4 EMC DD OS 5.2 Command Reference Guide groups reset servers show status 54 55 55 56 56 authorization Change History Guidelines and Restrictions Options show Additional Topics Creating the First Security Officer Account Authorization Workflow Enabling Security Officer Authorization 57 57 57 58 58 59 59 59 59 autosupport Change History Guidelines and Restrictions Options add del disable enable reset send set show test Keywords and Arguments Additional Topics Using autosupport in a GDA Navigating Message Logs 61 61 61 61 62 62 62 62 62 63 63 64 65 65 66 66 66 cifs Change History Guidelines and Restrictions 67 67 68 5 Options add del disable enable hosts nb-lookup option reset set share show status troubleshooting Additional Topics Tips on Entering or Removing Client Lists 68 68 68 69 69 69 69 69 70 70 71 72 73 74 74 74 cluster Change History Guidelines and Restrictions Options add create destroy run show status 75 75 75 76 76 76 76 76 77 77 config Change History Guidelines and Restrictions Options reset set setup show 79 79 79 79 79 80 81 82 6 EMC DD OS 5.2 Command Reference Guide ddboost Guidelines and Restrictions Change History Options access destroy disable enable file-replication ifgroup option reset set show status storage-unit Additional Topics Setting Low-Bandwidth Optimization Output from file-replication show 85 86 86 87 87 87 88 88 88 89 91 91 92 92 95 95 96 96 97 disk Change History Guidelines and Restrictions Options beacon multipath port rescan reset set show status unfail Additional Topics Disk States More About Disks and Enclosures Invalid Commands When a Disk in a Tier Fails 99 99 99 99 100 100 101 101 101 102 102 106 107 108 108 109 109 110 7 . Explicitly Failing a Disk Unfailing a Disk 110 110 enclosure Change History Guidelines and Restrictions Options beacon show test 111 111 111 112 112 112 117 filesys Change History Guidelines and Restrictions Options archive clean create destroy disable enable encryption expand fastcopy option restart show status sync Additional Topics More About Filesystem Cleaning How Data Values Are Calculated Error Messages Enabling Security Officer Authorization 119 120 120 121 121 121 124 124 125 125 125 130 130 131 133 133 138 139 139 139 139 140 140 help Change History Guidelines and Restrictions 141 141 141 8 EMC DD OS 5.2 Command Reference Guide . ipmi Change History Guidelines and Restrictions Options config disable enable remote console remote power reset show user Additional Topics Supported Models-IPMI Supported Models-SOL Viewing Serial Output of a Remote System Disconnecting from an SOL Session Disconnecting from the Initiator Setting Up IPMI Number of Supported IPMI Users 143 143 144 144 144 144 145 145 145 145 145 146 147 147 147 148 148 148 148 150 license Change History Guidelines and Restrictions Options add delete reset show Additional Topics Required Licenses 151 151 151 151 151 152 152 152 153 153 log Change History Guidelines and Restrictions Options host list 155 155 156 156 156 157 9 . 2 Command Reference Guide .view watch Additional Topics Understanding a Log Message Archiving Log Files 159 159 159 159 160 migration Change History Guidelines and Restrictions Options abort commit receive send show stats status watch Additional Topics Migration With Encryption-Enabled Source Migrating Between Source and Destination Migration During Directory Replication 161 161 161 162 162 162 163 163 165 165 166 166 166 167 167 mtree Change History Guidelines and Restrictions Options create delete list rename retention-lock show compression undelete Additional Topics Supported Characters 169 170 170 171 171 172 172 174 175 177 179 179 179 ndmpd Change History Guidelines and Restrictions 181 181 181 10 EMC DD OS 5. Options disable enable option show status stop user 181 182 182 182 182 184 184 184 net Change History Guidelines and Restrictions Options aggregate config congestion-check create ddns destroy disable enable failover hosts iperf lookup option ping reset set show tcdump troubleshooting Additional Topics New Support for IPv6 More About Ethernet Failover Number of Ports Number of Physical Interfaces More About the net aggregate Option 187 188 189 189 189 192 193 197 197 198 198 199 199 200 201 202 202 202 202 203 204 209 210 210 210 210 211 212 212 11 . More About LACP More About Up/Down Arguments Linux/DD OS Equivalent Arguments for iperf Option Linux/DD OS Equivalent Arguments for tcdump Option Sample Failover Workflow Sample Aggregation Workflow Interface Naming Format 212 212 213 214 214 215 216 217 nfs Change History Guidelines and Restrictions Options add del disable enable reset show status Additional Topics Add or Delete NFS Clients 219 219 219 219 220 221 221 221 221 221 223 224 224 ntp Change History Guidelines and Restrictions Options add del disable enable reset show status 225 225 225 226 226 226 226 226 227 227 227 quota Change History Guidelines and Restrictions 229 229 230 12 EMC DD OS 5.2 Command Reference Guide . Options disable enable reset set show status 230 230 230 230 231 232 233 replication Change History Guidelines and Restrictions Options abort add break disable enable initialize modify option reauth recover resync show status sync throttle watch Additional Topics Collection Replication Collection Replication Key Management Directory Replication MTree Replication Pool Replication 235 235 236 236 236 237 237 237 237 237 238 239 240 240 240 240 244 244 244 246 246 246 247 247 247 247 route Change History Guidelines and Restrictions 249 249 250 13 . 2 Command Reference Guide .Options add del reset set show trace Additional Topics Support for IPv6 Add a Route Delete a Route Set a Default Gateway 250 250 250 250 250 251 252 252 252 252 252 252 snapshot Change History Guidelines and Restrictions Options create expire list rename schedule Additional Topics Naming Snapshots Created by a Schedule Supported Characters 253 253 253 254 254 255 255 256 256 258 258 258 snmp Change History Guidelines and Restrictions Options add del disable enable reset set show status user 261 261 262 262 262 263 264 264 264 265 265 267 267 14 EMC DD OS 5. Additional Topics More about SNMP on a Data Domain System Changing Multiple Settings SNMP sysLocation and sysContact Variables 268 268 269 269 storage Change History Guidelines and Restrictions Options add remove show Additional Topics Adding Storage to an Active Tier Viewing Disk and LUN States 271 271 271 272 272 272 272 274 274 274 support Change History Guidelines and Restrictions Options upload 277 277 277 277 277 system Change History Guidelines and Restrictions Options headswap option passphrase poweroff reboot retention-lock sanitize set show status upgrade 279 279 280 280 280 280 281 281 281 282 282 282 283 294 296 15 . Additional Topics Output Changes for Multi-Thread Mode Configuring a System for Retention Lock Compliance Configuring an MTree for Retention Lock Compliance Setting a Log In Banner Ensuring System Sanitization Checking System Temperature and Power Supply 296 296 297 297 297 298 298 user Change History Guidelines and Restrictions Options add change del disable enable password reset show Additional Topics The Role of the Security Officer RBAC and User Role Definitions Adding a Security Officer Adding a User Removing a User Changing a User Password Changing a Role 299 299 300 300 300 301 301 301 301 301 303 303 304 304 305 306 306 306 306 306 vtl Change History Guidelines and Restrictions Options add cap debug del disable drive 307 308 309 309 309 309 309 310 310 310 16 EMC DD OS 5.2 Command Reference Guide . enable export group import initiator option pool port port option readahead reset show slot status tape Keywords and Arguments Additional Topics More About vtl group Command Options Requirements for Group Naming Values for vtl option Commands Extended Retention and vtl tape show Command 311 311 312 313 313 314 315 317 318 319 319 319 320 320 320 322 328 328 329 329 329 Upgrading VTL Directory-Based Pools to MTree-Based Pools 328 17 . 18 EMC DD OS 5.2 Command Reference Guide . latest features.datadomain. Administering Data Domain systems using the Web-based GUI. Administering two-tiered storage on a Data Domain system.com/US/en/documentation. See the document: Release Notes Initial Configuration Guide Administration Guide Global Deduplication Array Administration Guide Extended Retention Administration Guide (formerly EMC Data Domain860 Archiver Administration Guide) About This Guide 19 . “Enterprise Manager. For information on: New and obsolete commands. known issues. and workarounds. modified command options and output.” Installing and administering controllers in a dual-node configuration.jsp. Setting up a Data Domain system for the first time.About This Guide This guide describes the EMC Data Domain operating system (DD OS) commands. Related Documents Product documentation is available from the EMC Data Domain Support portal at https://my. enhancements. including:         Technical advisories on late-breaking issues Upgrade procedures Offline diagnostic procedures Troubleshooting articles Integration guides for third-party applications Part installation guides Compatibility matrixes White papers For details on a specific topic or issue. Knowledge Base and Reference Library In addition to product documentation.com/US/en/login. enter a search term into the Knowledge Base Search field or select a category such as “How To’s.jsp or call 877. and the situation in which the problem occurred.3282.207.datadomain. Service and Support For troubleshooting assistance with installing or administering your Data Domain system. go to https://my.The EMC Data Domain Support Portal The following information provides an overview of technical resources and references available to our customers. the Support portal offers a wide variety of frequently updated publications. click the Knowledge Articles tab.” To browse the latest updates. Be prepared to describe your system setup and configuration. 20 EMC DD OS 5.2 Command Reference Guide . adminaccess The adminaccess command manages the access control list configuration. including arguments. and SSH administrative protocols on the Data Domain system. SSH is open to the default user sysadmin and to users added by the administrator.2 New command options: adminaccess certificate delete {imported-host | imported-ca | subject <subject-name> | fingerprint <fingerprint>} adminaccess certificate import {host password <password> | ca} adminaccess 21 . systems running Enterprise Manager (EM). output. options were added to this command to enhance the secure communication among two or more Data Domain systems. for example. HTTPS. See the EMC DD OS Release Notes of the corresponding version for details on modifications. and permissions. and between a Data Domain system and a Web browser. Options include:             add authentication certificate del disable enable reset show ssh telnet trust web Change History Click the command option for details on usage and functionality.2. HTTP. Telnet. Beginning in 5. Version Change 5. Command options enable remote hosts to use the FTP. add adminaccess add {ftp | telnet | ssh | http | https} <host-list> Add hosts to a protocol. TCP wrappers are used and the /etc/hosts.yourcompany. For FTP. spaces. class-C IP addresses. or the word “all.Modified command options: adminaccess certificate show [detailed] [host | imported-host | ca | imported-ca] adminaccess authentication show adminaccess reset ssh-keys [user <username>] adminaccess show Guidelines and Restrictions  Unless otherwise noted. command options are available only to users with admin role permissions. enter a list of entries separated by commas. the host-list can contain hostnames. Apache’s mod_access is used for host-based access control and the /usr/local/apache2/conf/httpd-ddr.” For SSH. such as *. IP address with either netmasks or length. Telnet.conf file is updated.com 22 EMC DD OS 5. or an asterisk (*) wildcard with a domain name. To add multiple hosts. and SSH. a host is a fully qualified domain hostname.2 Command Reference Guide .allow and /etc/hosts. An asterisk (*) by itself means no restrictions.com. FTP and Telnet are disabled by default. or both.  For HTTP and HTTPS. class-C IP address.deny files are updated.  Options The following options are available with this command.yourcompany. For HTTP/HTTPS.   Example 1 To add the host srvr24 to the Telnet access list: # adminaccess add telnet srvr24. an IP address range. create the public and private SSH keys: # jsmith > ssh-keygen -d Generating public/private dsa key pair.0/24 adminaccess add ssh-keys [user <username>] Add an SSH public key.ssh/id_dsa.pub authentication adminaccess authentication add {cifs} Allow Windows domain users with no local account on the Data Domain system to access the system through SSH. the user must be in the standard Windows Domain Admins group or in a group that you create named Data Domain. The command also gives user-level access (no administrative operations allowed) to all other users from the domain. created on a UNIX-based remote machine. Users must be from the domain that includes the Data Domain system or a related.ssh (in this example) is id_dsa. Example 1.24. For administrative access.20.pub. The operation allows users to log in without a password. Users from both group names are always accepted as administrative users. 3. 2. Enter file in which to save the key (/home/jsmith/.ssh/id_dsa): . trusted domain.yourcompany. adminaccess 23 . Telnet. The public key created under /home/jsmith/. The Data Domain system prompts the user for the password before accepting the key: # jsmith > ssh -l sysadmin dd10 "adminaccess add ssh-keys user jsmith" \< ~/. to the SSH authorized keys file on the Data Domain system.com Example 3 To add a range of IP addresses to the Telnet access list: # adminaccess add telnet 10. and FTP using Windows domain group credentials. dd10 in this example. Enter file in which to save the key (/home/jsmith/. write the public key to the Data Domain system. On the remote machine. On the remote machine. Press Enter to accept the file location and other defaults.ssh/id_dsa): .Example 2 To add all hosts in a domain to the Telnet access list: # adminaccess add telnet *. Importing an RKM auto-registered certificate directly. adminaccess authentication reset {cifs} Reset the Windows user access to the default of requiring a local account for administrative access to the Data Domain system. With the exception of users with data-access permissions only. or FTP command that accesses the Data Domain system must include the domain name. specifying the certificate name is not required. Example # adminaccess authentication show CIFS authentication: disabled certificate adminaccess certificate delete {imported-host | imported-ca | subject <subject-name> | fingerprint <fingerprint>} Delete a user imported host or trusted CA certificate. Only one CA certificate or one host certificate may be imported. all users may run this command option. Allow admin role only for users with local user accounts on the Data Domain system.The SSH. Because one imported host or trusted CA certificate is maintained. After deleting the host certificate. and the user name in double quotation marks. You may also delete the certificates based on subject name or fingerprint.2 Command Reference Guide . refresh or restart the browser to proceed. this password is viewable on the terminal. or bulk importing multiple certificates is not supported. note CIFS must be enabled and the Data Domain system must be part of a Windows domain. note Log out from the browser session before deleting a host certificate. adminaccess authentication del {cifs} Prevent authentication of a Windows domain. You must include the <password> to decrypt PKCS12 file to import host certificates. For security 24 EMC DD OS 5. Because of a limitation of SSH. adminaccess authentication show Display settings that enable a Windows administrative user to access a Data Domain system when no local account exists. The CA certificate must be in PEM format. a backslash. The system prompts you to confirm the deletion prior to removing the certificate. Otherwise HTTPS browser sessions (using imported host certificates) will be brought down. The host certificate must be in PKCS12 format. Telnet. adminaccess certificate import {host password <password> | ca} Import host or trusted CA certificate via SSH on a remote system. purposes.p12 is xyz. running this command will bring down the current browser session. Example 1 # adminaccess certificate show host Subject Type Valid From Valid Until Fingerprint --------------------------------------------------------------------------------------------------------------------------------------sys1.p12 This command option is followed by a prompt to enter the sysadmin password. Log out of the session prior to running this command. then the SSH command issued by sysadmin from client1 to import the host certificate to the Data Domain system ddr1 would be: # ssh sysadmin@ddr1 adminaccess certificate import host password xyz < /home/usr/host. adminaccess certificate show [detailed] [host | imported-host | ca | imported-ca] Display the Data Domain system host.datadomain. Press Control-C to cancel. and the password to decrypt host.pem Example 3 (CA Certificate) To import the CA certificate through ddsh. All users may run this command option. The system passphrase of Data Domain system must be set prior to importing the host certificate.pem location.p12. note If the certificates are used by Enterprise Manager (server extension). Example 1 (Host Certificate) If the host certificate is located on remote system client1 under /home/usr/host. copy and paste the PEM-formatted CA certificate on the ddsh: # adminaccess certificate import ca Enter the certificate and press Control-D. make sure the necessary precautions are in place when entering the command. imported host. the SSH command issued by sysadmin would be: # ssh sysadmin@host2 adminaccess certificate import ca < /home/usr/cacert. Example 2 (CA Certificate) To import the CA certificate located at /home/usr/cacert. CA certificate or imported trusted CA certificate.com host Sun Nov 21 08:04:13 2010 Wed Nov 13 16:04:13 2041 D2:C6:A0:8E:60:57:98: (truncated) --------------------------------------------------------------------------------------------------------------------------------------- adminaccess 25 . hostnames. or both.Example 2 # adminaccess certificate show detailed host Type: Cert Type: Issued By: Valid From: Valid Until: Fingerprint: host Host Certificate sys2. Host entries may be separated by commas. If all is access disabled. adminaccess del telnet <host-list> Remove hosts (IP addresses. adminaccess del ssh <host-list> Remove hosts (IP addresses. Users may delete their own keys. hostnames. 26 EMC DD OS 5.com Sun Nov 21 08:04:13 2010 Wed Nov 13 16:04:13 2041 D2:C6:A0:8E:60:57:98:1B:FA:4C:83:46:14:04:02:41:2F:78:AA:2A Subject/Issued To: sys2.datadomain. or both. or asterisk (*)) from the HTTP/HTTPS list.2 Command Reference Guide . Run the command option adminaccess show ssh-keys to view line number values. or asterisk (*)) from the SSH list. Host entries may be separated by commas. spaces. Host entries may be separated by commas. or both. or both. hostnames. spaces. spaces. Disabling FTP or Telnet does not affect entries in the access lists. disable adminaccess disable {http | https | ftp | telnet | ssh | all} Disable administrative access on the Data Domain system. adminaccess del http <host-list> Remove hosts (IP addresses. and users in admin role may delete user keys. spaces.datadomain. or asterisk (*)) from the FTP list. adminaccess del ssh-keys <lineno> [user <username>] Delete an SSH key from the key file.com del adminaccess del ftp <host-list> Remove hosts (IP addresses. the Data Domain system is available only through a serial console or keyboard and monitor. or asterisk (*)) from Telnet list. hostnames. Host entries may be separated by commas. Users with security role or data access permissions may not reset keys.  Example # adminaccess show Service Enabled Allowed Hosts ------ssh telnet ftp ------yes yes no -------------------* - adminaccess 27 . all users may run this command option.    Users may reset their own keys only. and Telnet protocols to their default states and clear the access lists of host entries. By default. HTTP. HTTP. users with admin role permissions must add host machines to the access lists. adminaccess reset ssh-keys [user <username>] Remove the authorized SSH keys file for a user specified user or for the operator account from the Data Domain system. but the access list does not contain host names. Users with admin role permissions may reset the keys of any user. An asterisk (*) means that the service allows all hosts. show adminaccess show List the access services available on a Data Domain system and display option values for the access services that are enabled. and HTTPS services are enabled and FTP and Telnet are disabled. reset adminaccess reset {ftp | telnet | ssh | http | all} Reset the FTP.   N/A means that the service does not use an access list. HTTP and HTTPS allow users to log in from Enterprise Manager. every SSH connection requires password authentication. With the exception of users with data-access permissions only. A dash (-) means that the service can use an access list. After removing the file. To use FTP and Telnet. the SSH. SSH.enable adminaccess enable {http | https | ftp | telnet | ssh | all} Enable a protocol on the Data Domain system. adminaccess ssh option set server-port <port-number> Set the SSH server port. 28 EMC DD OS 5. This command may be run in a GDA. Users with admin role permissions can view the SSH key files of any user. ssh adminaccess ssh option reset [server-port | session-timeout] Reset the SSH options to default values. Users in other roles can view their own SSH key file only.http https ------Option yes yes ------- -------------------Value ----80 443 20 ----- Web options: --------------http-port https-port session-timeout --------------Ssh options: Option --------------session-timeout --------------Telnet options: Option --------------session-timeout --------------Value --------------none (infinite) --------------Value --------------none (infinite) --------------- adminaccess show ssh-keys [user <username>] Display the SSH key file with a line number for each entry. This command may be run in a GDA. adminaccess ssh option set session-timeout <timeout-in-secs> Set the SSH timeout options.2 Command Reference Guide . See the Global Deduplication Array Administration Guide for details. See the Global Deduplication Array Administration Guide for details. To configure the Data Domain system to prevent sessions from timing out. See the Global Deduplication Array Administration Guide for details. and if the client does not respond to a subsequent prompt message.Example Set the SSH session timeout period to 10 minutes: # adminaccess ssh option set session-timeout 600 adminaccess ssh option show Display the SSH options. use the adminaccess telnet option reset command option. the SSH client session timeout is set to the default value “none. Example To reset the Telnet options to the default values: # adminaccess telnet option reset session-timeout adminaccess telnet option set session-timeout <timeout-in-secs> Set the client session timeout period to the specified number of seconds. The valid range is from 60 to 31536000. If no data is received from a Telnet client within the timeout period. This command may be run in a GDA.” Example # adminaccess ssh option show Ssh options: Option -------------------session-timeout ---------------------Value -------------------none (infinite) -------------------- telnet adminaccess telnet option reset [session-timeout] Reset the client session timeout period to the default value none to prevent client sessions from timing out. Example To set the SSH session timeout period to 10 minutes: # adminaccess telnet option set session-timeout 600 adminaccess 29 . In the following example. the session terminates. com trusted-ca Sun Nov 21 16:04:13 2010 Wed Nov 13 16:04:13 2041 4F:63:15:45:E7: F3: (truncated) jon-ddm.2 Command Reference Guide . mutual trust from the specified host. The Type field shows the type of certificate.sqa. web adminaccess web option reset [http-port | https-port | session timeout] Reset the Web options to default values. adminaccess trust del host <hostname> [type mutual] Remove trust or. All users may run this command option. adminaccess trust show <hostname> Show the list of trusted Certificate Authorities (CAs).local trusted-ca Mon Nov 22 11:09:54 2010 Thu Nov 14 11:09:54 2041 2C:26:7C:OC:D2: 53: (truncated) --------------------------------------------------------------------------------------------------------------------------------------adminaccess trust copy {source | destination} <hostname>} Copy the trust to or from the given host. Example # adminaccess trust show Subject Type Valid From Valid Until Fingerprint --------------------------------------------------------------------------------------------------------------------------------------sys3. 30 EMC DD OS 5. All users may run this command option.datadomain.adminaccess telnet option show Display the Telnet options. optionally. Example To set the Telnet client session timeout to the default value: # adminaccess telnet option show Option --------------session-timeout ----------------Value ------------------none (infinite) -------------------- trust adminaccess trust add host <hostname> [type mutual] Show the list of trusted Certificate Authorities (CAs). the following actions occur:  If Data Domain system passphrase is set. adminaccess 31 . Default is port 443. Users must provide the PKCS12 file and password to decrypt the PKCS12 file. Default is port 80. Importing and Deleting Certificates Importing host certificates on a Data Domain system is not allowed if the filesystem is locked. the imported host PKCS12 certificate is reencrypted using the system passphrase. User must provide the CA certificate PEM file used to sign the host certificate.adminaccess web option set http-port <port-number> Set the http access port for the Web client. When importing or deleting certificates on a Data Domain system on which the filesystem is unlocked and encryption is enabled or disabled. This version of DD OS also supports CA certificate PEM. Default is 10800 seconds. Supported Certificate Formats This version of DD OS supports host certificate PKCS12. Example To set Web options to default values: # adminaccess web option set Option ---------------http-port https-port Value -------80 443 session-timeout 10800 adminaccess web option show Show the current values for the Web options. adminaccess web option set session-timeout <timeout-in-secs> Set the Web client session timeout. adminaccess web option set https-port <port-number> Set the https access port for the Web client. Additional Topics This section provides additional information on various topics and concepts. and use the file as input to the login.” See “system” for instructions on setting the system passphrase. Example 1. one command per line.00 Filesystem has been up 14 days 10:13 The NFS system is currently active and running Total number of NFS requests handled = 314576 32 EMC DD OS 5. and then log out automatically. 0. # ssh -l admin dd10 < cmds11 admin@dd10’s password: The filesystem is enabled 3:00 pm up 14 days 10 hours 15 minutes 1 user. and then returns output from the command option filesys status. # ssh -l admin dd10 filesys status admin@dd10’s password: The filesystem is enabled Additionally. load average: 0. If the system passphrase is not set. you can have output from Data Domain system commands return to a remote machine at login.00. Run the command as shown and read the output. system show uptime. For example. Output from each command is returned. and NFS status. prompts for the password.2 Command Reference Guide . the following command connects with the machine dd10 as user admin. 2.00. you can create a file containing multiple Data Domain system commands. 0. an error is generated when importing the host certificate and a message displays on the console “Set System passphrase to proceed. Returning Command Output to a Remote Machine With admin role permissions and using SSH. Create a file named cmds11 and include the commands filesys status. Depending on the option. date posted. More than three months of alert history is retained. Command options enable sending email to a designated recipient or notification group when an event occurs within the Data Domain system. Options The following options are available with this command.2 Modified command options: alerts notify-list del <group-name> [class <class-list>] [emails <email-addrlist>] alerts notify-list destroy <group-name> alerts notify-list reset Guidelines and Restrictions Unless otherwise noted. and alerts history. and resulting action. alerts 33 . output. Version Change 5. Options include:    clear notify-list show Change History Click the command option for details on usage and functionality. are detected repeatedly if the underlying condition is not corrected. Some event types. command options are available only to users with admin role permissions. such as those in the environment class that pertain to temperature sensors within the chassis.alerts The alerts command manages current alerts. and permissions. alert notification groups. including arguments. See the EMC DD OS Release Notes of the corresponding version for details on modifications. information includes alert type. severity level.com -------------------- alerts notify-list create <group-name> class <class-list> [severity <severity>] Create an alert notification group.com Notification list "eng_lab" Class Severity -----. Example # alerts add notify-list eng_lab emails [email protected] warning -----. or recipient email address. Example # alerts notify-list create eng_grp class hardwareFailure Notification list "eng_grp" Class --------------Severity -------- hardwarefailure warning --------------Members -------------------- 34 EMC DD OS 5. [email protected] alerts clear alert-id <alert-id-list> Clear an active alert or list of alerts.-------Members [email protected] [email protected] Command Reference Guide . notify-list alerts notify-list add <group-name> [class <class-list> [severity <severity>]] [emails <email-addr-list>] Modify a notification group by adding an event class. Example # alerts notify-list del eng_grp class hardwareFailure Notification list "eng_grp" Class Severity ----. Security officer authorization is required only if the <group-name> has a severity level of Warning or above and the command is run on a Retention Lock Compliance system.datadomain.-----------. alerts 35 . alerts notify-list reset Remove all user-created alert notification groups and restore the default notification group email list to autosupport-alert@autosupport. Note that the default alert notification group cannot be destroyed.alerts notify-list del <group-name> [class <class-list>] [emails <email-addr-list>] Modify an alert notification group by deleting event classes. Notification list "eng_grp" destroyed.com. Security officer authorization is required only if the <group-name> has a severity level of Warning or above and the command is run on a Retention Lock Compliance system. See the EMC Data Domain Administration Guide for details on alerts.-------Members ------------- alerts notify-list destroy <group-name> Delete an alert notification group. or both. Are you sure? (yes|no|?) [no]: y ok. Security officer authorization is required for systems with Retention Lock Compliance. Example # alerts notify-list destroy eng_grp The 'alerts notify-list destroy' command will destroy this user-configured notification list. See “Default Notification Group” for details. email recipients. See the EMC Data Domain Administration Guide for details on alerts. proceeding. Notification lists reset to factory default. Example # alerts notify-list show eng_lab mlee@yourcompany. Example # alerts show all Notification Lists -----------------Notification list "default" Class ----------------cifs storage cluster network security filesystem environment Severity ---------warning warning warning warning warning warning warning 36 EMC DD OS 5.2 Command Reference Guide .Example # alerts notify-list reset The 'alerts notify-list reset' command will destroy all user-configured notification lists. or alert notification groups that subscribe to a single email address. proceeding.com alerts notify-list test {group <group-name> | email <email-addr>} Send a test notification to an alert notification group or email address. Example # alerts notify-list test jsmith@yourcompany. alerts notify-list show [group <group-name> | email <email-addr>] Display all alert notification groups.com OK: Message sent. Are you sure? (yes|no|?) [no]: y ok. show alerts show all [local] Display details on all alert notification groups. a specific alert notification group. Example # alerts show current No active alerts.------ ------ -------- alerts show current [local] Display information about current alerts.-------------------------------NULL Tue Feb 8 16:08:21 2011 NULL Tue Feb 8 17:42:27 2011 1 1 2 2 Tue Feb 8 18:03:57 2011 Tue Feb 8 18:03:57 2011 Wed Feb 9 11:44:53 2011 Wed Feb 9 11:44:53 2011 NULL NULL Filesystem Filesystem Filesystem Filesystem -------. Output includes event information and an Additional Information field.-----NULL NULL Status -------post post post clear post clear Message ----------------------System rebooted System rebooted System rebooted System rebooted System rebooted System rebooted ----------------------- -------.replication hardwarefailure systemmaintenance syslog ----------------Members ----------------auto backup bin boot data ddr Current Alerts -------------No active alerts.-------------------------------There are 6 historic alerts. alerts show current-detailed [local] [alert-id <alert-id-list>] Display details on all current alerts or on a specific current alert. Alert History ------------Alert Id Time warning warning warning warning ---------- Severity Class ---------NULL NULL INFO INFO INFO INFO ----- Object . alerts 37 . ---------. 38 EMC DD OS 5. Example # alerts show history last 100 days Alert Id Time 1 1 2 2 Fri Dec 24 08:59:52 2010 Fri Dec 24 08:59:52 2010 Fri Dec 24 09:02:10 2010 Fri Dec 24 09:02:10 2010 Severity ALERT ALERT INFO INFO Class Object Status post clear post clear Message Historical database recovery failed. Data in the historical database is used for some system reports.datadomain. alerts show history [local] [last <n> {hours | days | weeks | months}] [start <MMDDhhmm> [[<CC>]<YY>] end <MMDDhhmm> [[<CC>]<YY>]] Display alert history. Event Id EVT-HD-RDB-0001 Event Name HistoricalDatabaseRecoverError Description Historical database recovery failed. The system successfully created a new historical database.alerts show daily [local] Display daily alert report. Historical database recovery failed. Action Contact your contracted support provider or visit us online at https://my. including current alerts and 24-hour alert history.com to debug this problem and possibly attempt recovery of the lost historical data. System rebooted.2 Command Reference Guide . but it is not required for proper system functioning. Example # alerts show history-detailed last 100 days Alert Id 1 Time Fri Dec 24 08:59:52 2010 Severity ALERT Class Status SystemMaintenance post Message Historical database recovery failed. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------SystemMaintenance SystemMaintenance Filesystem Filesystem ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------- alerts show history-detailed [local] [last <n> {hours | days | weeks | months}] [start <MMDDhhmm> [[<CC>]<YY>] end <MMDDhhmm> [[<CC>]<YY>]] Display details of alert history including event information. This failure may occur during head swap processing if recovery to create the new head primary historical database from the shelf database files fails. All existing historical data has been lost. System rebooted. days.Keywords and Arguments alert-id <alert-id-list> class <class-list> Identification number of alert. notice. hardwareFailure. cluster. info. and debug. (Optional) Severity level of event class: emergency. hhmm indicates hours and minutes of start time(24-hour format). use mon 1200. storage. weeks.” (Optional) Email addresses of members in an alert notification group. Name of alert notification group. critical. and syslog. network. security. Default is “warning. warning. List of alert identification numbers. filesystem. MMDD indicates month and day of start date. severity <severity> emails <email-addr-list> <group-name> last <n> {hours | days | weeks | months} start <MMDDhhmm> alerts 39 . alert. replication. (Optional) List of event classes: cifs. To specify noon on Monday . To specify midnight between Sunday night and Monday morning. systemMaintenance. error. months). use mon 0000. Use with show option to display alerts for specific interval. Use with show option to display alerts for most recent number of <n> (hours. environment. use mon 0000. use mon 1200. output may include notification lists. and. MMDD indicates month and day of end date. the number of current.end <MMDDhhmm> Use with show option to display alerts for specific interval. 40 EMC DD OS 5. To specify noon on Monday . active alerts. (Optional) Use with start or stop arguments to show option. <CC> (Optional) Use with start or stop arguments to show option.2 Command Reference Guide . To specify midnight between Sunday night and Monday morning. Output for a GDA may differ from single-node examples. if applicable. hhmm indicates hours and minutes of end time (24-hour format). Default is 20. Specify first two digits of year. the email address of members. alert history. Specify last two digits of year. <YY> Additional Topics This section provides additional information on various topics and concepts. Output From alerts show Command Option Depending on arguments used with the alerts show command. (Detailed displays only. (Detailed displays only. (Detailed displays only.) Suggested action to take to correct the event and clear the alert as defined in the Message Catalog.Output also includes the following categories: Alert ID Time Severity Class Object Identification number of alert.) If applicable. Severity level of the event that triggered the alert.) Detailed description of the underlying event as defined in the Message Catalog.) Alphanumeric identifier of the event that triggered the alert.datadomain. Event class of the event that triggered the alert. Status Message Additional Information Event ID Event Name Description Action Default Notification Group The default alert notification group (“default”) is configured to send alerts for any event class with severity level of Warning or above. basic information about the affected system component or element. Email notifications are sent to Data Domain Support at autosupport alert@autosupport. The default alert notification group can only be reset to default values: it cannot be destroyed. (Detailed displays only. information about the affected system component or element. Alert status. alerts 41 . as defined in the Message Catalog. (Detailed displays only. If applicable. Date and time the alert was posted.) Name of the associated SNMP trap notification as defined in the Message Catalog.com. Brief description of the underlying event. Alert Notice at Log In A message is shown at log in that indicates the presence of alerts and instructions on how to proceed. Run "alerts show current" ** to display outstanding alert(s).0.------------------------4 Fri Jan 21 16:25:51 2011 WARNING Storage Enclosure=3 Enclosure connected but has not 42 EMC DD OS 5.----------. Alert Id Time -------.-------.----------.-----------------------.-----------------------.------. Severity Class Object Message --------------------------------------------been added to the system. For example: Welcome to Data Domain OS 5.2 Command Reference Guide .------.0 ---------------------------------------------------** ** NOTICE: There is 1 outstanding alert.-------.2.---------------------------------------------------------------------------There is 1 active alert. -------. and displays command aliases. Version Change 5. delete. add alias add <alias-name> "<command>" Add a command alias. and permissions. and display command aliases for the Data Domain system command set. Options include:     add del reset show Change History Click the command option for details on usage and functionality. Options The following options are available with this command. deletes. The new alias is available only to the user who created it. output. See the EMC DD OS Release Notes of the corresponding version for details on modifications.alias The alias command creates. and enclose the command name in quotation marks. Command options enables users to add. A new alias is available only to the user who created it on the Data Domain system. alias 43 . Users can administer aliases only for commands for which they have permission.2 No changes from previous version. Enter the alias name and command. Guidelines and Restrictions   All users may run this command. including arguments. Correspondence Table Aliases for various command options include:. reset alias reset Remove user-created aliases and restore defaults. date df hostname ifconfig iostat netstat nfsstat passwd ping poweroff reboot sysstat system show date filesys show space net show hostname net config system show stats net show stats nfs show stats user change password net ping system poweroff system reboot system show stats 44 EMC DD OS 5.del alias del <alias-name> Delete an alias by name. Additional Topics This section provides additional information on various topics and concepts. show alias show Display all aliases and command definitions.2 Command Reference Guide . traceroute uname uptime who route trace system show version system show uptime user show active alias 45 . 46 EMC DD OS 5.2 Command Reference Guide . including arguments. Version Change 5. and permissions.2 Modified command options: archive data-movement policy set age-threshold {<days> | none} mtrees <mtree-list> archive data-movement policy set default-age-threshold {<days> | none} archive option show [local-compression-type | data-movement-packing] archive 47 . See the EMC DD OS Release Notes of the corresponding version for details on modifications. Options include:            data-movement policy data-movement schedule data-movement start data-movement status data-movement stop data-movement watch disable enable option report show Change History Click the command option for details on usage and functionality. output.archive The archive command is used only on systems licensed to run the EMC Data Domain Extended Retention software option (formerly “DD860 Archiver”). Archive command options enable the feature and configure policies. installation. and configuration. See the DD Extended Retention Administration Guide for details on functionality. 48 EMC DD OS 5. archive data-movement policy reset default-age-threshold Reset the age threshold to the default value of none. archive data-movement policy set default-age-threshold {<days> | none} Set the default age threshold. command options are available only to users with admin role permissions. This is the default for new MTrees and for the default-age-threshold. Example # archive data-movement policy reset default-age-threshold The default-age-threshold value is set to none. Shelves within a chain cannot be mixed. none Never migrate. Files modified only in the past (beyond the age threshold) are moved to the archive tier during the next data movement.2 Command Reference Guide . A system may contain a mix of ES20 and ES30 shelves.  Options The following options are available with this command. Default is none. data-movement policy archive data-movement policy reset age-threshold mtrees <mtree-list> Reset the age threshold for specified MTrees. Argument Definitions <days> A number from 0 to 18250 (50 years).Guidelines and Restrictions  Unless otherwise noted. The default age threshold applies to MTrees for which the age threshold has not been set. Supported configurations:   Controllers: DD860 (72G memory and three SAS cards) and DD990 (with 256G memory and 4 SAS2 Cards) Storage: ES20 and ES30. The number 0 means migrate when data movement runs. however. archive data-movement policy set age-threshold {<days> | none} mtrees <mtree-list> Set the age threshold for specific MTrees. each shelf chain must contain ES20 shelves only or ES30 shelves only. Unless you specify no-clean. Note that the days argument checks two ranges:   Weekday (Monday–Sunday) Day of the month (1–31. Example To reset the schedule to default values: # archive data-movement schedule reset The Archive data-movement schedule has been reset. plus “last” and “first”) Any value outside of the two ranges returns a message: **** Invalid day of the week: note For days.15 time 10:00 days last time 10:00 .last day of the month archive data-movement schedule show Display the data-movement schedule. All users may run this command option. regardless of month. Acceptable values include: days sun time 00:00 days mon. data-movement schedule archive data-movement schedule reset Reset the data-movement schedule. archive data-movement schedule set never Set the schedule for data movement to begin. it is not executed on months with fewer that 31 days.archive data-movement policy show [mtrees <mtree-list>] View the data-movement policy for the specified MTrees. Archive data movement is scheduled to run on day(s) "Tue" at "06:00" archive data-movement schedule set days <days> time <time> [no-clean] Set the schedule for data movement. “last” is converted to the value 31. DD OS adds a cron job based on the schedule entered.tue time 00:00 days 2 time 10:00 days 2. archive 49 . the filesystem is cleaned after data movement is completed. If a schedule is set for the 31st of every month at 10:00 PM. This is a known issue with crontab. All files that satisfy the age-threshold value are moved to the archive tier. data-movement status archive data-movement status Display data-movement status. data-movement watch archive data-movement watch Display data-movement progress.data-movement start archive data-movement start Start data movement from the active tier to the archive tier. including progress of the fourth phase of the file migration process “packing. 50 EMC DD OS 5. data-movement stop archive data-movement stop Stop data movement to the archive tier. Example # archive data-movement start Waiting for data movement to start.2 Command Reference Guide . Run "filesys data-movement watch" to monitor the progress. Data movement has started. Data movement has stopped..” All users may run this command option.. disable archive disable Disable the archive feature. All users may run this command option.. Example # archive data-movement stop Waiting for data movement to stop.. for example. The file system must be restarted to effect this change. The file system must be restarted to effect this change. Example # archive option set local-compression-type lz The local compression will be set to lz. archive unit ar1. archive option show [local-compression-type | data-movement-packing] Display the local compression algorithm for the archive tier and the progress of the fourth phase of the file migration process “packing.enable archive enable Enable the archive feature. An asterisk (*) is appended to the archive unit name if the file spans the active tier and the archive unit. archive 51 .” All users may run this command option. Output also shows if packing is enabled or disabled. report archive report generate file-location Create a report showing the name and location of each file in the system. option archive option reset local-compression-type Reset the local compression algorithm to default value gz for subsequent data movement to the archive tier. Press Ctrl-C to stop generating the report. archive option set local-compression-type {none | lz | gzfast | gz} Set the local compression algorithm for subsequent data movement to the archive tier. Example # archive option reset local-compression-type The local compression for archive tier is reset. show archive show config Display archive configuration. All users may run this command option. 52 EMC DD OS 5.2 Command Reference Guide . including arguments. Version Change 5. See the EMC DD OS Release Notes of the corresponding version for details on modifications. and server names. Command options enable the Data Domain system to participate in an active Network Information Service (NIS) domain. output. domains. authentication 53 . which keeps a centralized repository of users. command options are available only to users with admin role permissions.2 Modified command options: authentication nis groups add <group-list> role {user | admin | backupoperator} authentication nis groups del <group-list> role {user | admin | backupoperator} Guidelines and Restrictions Unless otherwise noted. groups and servers. NIS adds a global directory that authenticates users from any host on the network. Options include:         disable domain enable groups reset servers show status Change History Click the command option for details on usage and functionality.authentication The authentication command manages NIS users. and permissions. groups. groups authentication nis groups add <group-list> role {user | admin | backup-operator} Delete a role-based access control (RBAC) role for NIS users in the <group-list>. authentication nis domain show Display the NIS domain name. enable authentication nis enable Enable the NIS client.com". authentication nis domain set domain [servers <server-list>] Set the NIS domain name and optionally to add NIS servers to the <server-list>. authentication nis groups del <group-list> role {user | admin | backup-operator} Delete a role-based access control (RBAC) role for NIS users in the <group-list>.Options The following options are available with this command. 54 EMC DD OS 5. authentication nis groups reset Delete all added NIS groups. domain authentication nis domain reset Reset the NIS domain name. See “user” for role definitions. disable authentication nis disable Disable the NIS client. Example # authentication nis domain show NIS domain is "datadomain.2 Command Reference Guide . See “user” for role definitions. Example # authentication nis servers show NIS Servers: 10. authentication nis servers reset Reset the NIS servers to their default settings.111. authentication nis servers show Display a list of NIS servers.authentication nis groups show Display lists of NIS user groups and NIS admin groups. authentication nis servers del <server-list> Delete NIS servers from the <server-list>.123.12 authentication 55 . servers authentication nis servers add <server-list> Add NIS servers to the <server-list>. reset authentication nis reset Delete the NIS configuration and set it to the default. 2 Command Reference Guide .188.show authentication nis show Display the NIS configuration.110. 56 EMC DD OS 5.12 Admin Groups: User Groups: Backup Operator Groups: Enabled: No Status: N/A (NIS Disabled) status authentication nis status Display the NIS status. Example # authentication nis servers show NIS Summary: Domain: datadomain.com Servers: 10. See “Authorization Workflow. the admin enables the feature and the security officer enables runtime authorization. and permissions. For example. This log file serves as the audit trail. See the EMC DD OS Release Notes of the corresponding version for details on modifications. including arguments. Command options enable security-based functions such as managing filesystem encryption and enabling or disabling authorization policy.2 Modified command options: authorization policy reset security-officer authorization policy set security-officer {enabled | disabled} Guidelines and Restrictions  Only the sysadmin user (the default user created after the DD OS installation) can create the first security role. Options include:   policy show Change History Click the command option for details on usage and functionality.     authorization 57 .authorization The authorization command establishes or modifies runtime authorization policy. Separation of privilege and duty apply. output.” This command is not supported in Global Depduplication Arrays.” for each action. Only security officers can create other security officers. or “authorization history. after which the privilege to create security officers is removed from the sysadmin role. Procedures requiring authorization must be dual-authenticated by the security officer and the user in the admin role. to set encryption. Users in the role of admin cannot perform security officer tasks. The log file includes a timestamp. and the Data Domain system on which the task was performed. All authorization tasks are logged automatically. Version Change 5. and vice versa. the identities of the security officer and administrative user.  policy authorization policy reset security-officer Reset runtime authorization policy to defaults. Example # authorization show history Id Date User Security Officer ------------------------------------------------------------------------------------------------------------------------------------------------------------------1 2 3 4 5 6 7 04/12/2011 14:44:14 04/12/2011 15:50:08 04/12/2011 15:50:20 04/14/2011 12:36:24 04/14/2011 13:06:46 04/14/2011 16:03:26 04/15/2011 18:41:12 sysadmin sysadmin sysadmin sec-off sec-off sec-off sec-off secsec s123ec345sec sec-off sec-off sec-off sec-off sms_unittest for authorization user add sec-off priv security sms_unittest for authorization user add boom1 priv security user del boom1 authorization policy set security-officer enabled authorization policy set security-officer disabled Operation ------------------------------------------------------------------------------------------------------------------------------------------------------------------7 authorized operations found. show authorization show history [last <n> { hours | days | weeks }] View or audit past authorizations according to the interval specified. 58 EMC DD OS 5. authorization policy set security-officer {enabled | disabled} Enable and disable runtime authorization policy.Options The following options are available with this command.2 Command Reference Guide . authorization policy show Show status of authorization policy. Setting authorization policy is not allowed on Retention Lock Compliance systems. Resetting authorization policy is not allowed on Retention Lock Compliance systems. Status may be enabled or disabled. Run the command option authorization policy set security-officer enabled. To enable security officer authorization: 1.Additional Topics This section provides additional information on various topics and concepts. If not. If necessary. Enter: # user add sec_off password <password> role security 2. authorization 59 . a Security alert is generated. 1. Enabling Security Officer Authorization Filesystem encryption. the admin issues the command and the system displays a message that security officer authorizations must be enabled. Creating the First Security Officer Account The user with the role of sysadmin must create and enable the first security officer account. the security officer must enter his or her credentials on the same console at which the command option was run. If the system recognizes the credentials. and managing systems enabled for Retention Lock Compliance require admin role permissions and security officer authorization. In a typical scenario. create a security officer role. 2. the procedure is authorized. Log in as a security role. decryption. The new security user must log in as the security office and enable the security officer authorization policy. Enter: # authorization policy set security-officer enabled Authorization Workflow A user in the role of admin interacts with the security officer to perform a command that requires security officer sign off. The authorization log records the details of each transaction. To proceed with the sign-off. See “user” for details about the role. 60 EMC DD OS 5.2 Command Reference Guide . User role may view address lists only. including arguments. autosupport 61 . By default. See the EMC DD OS Release Notes of the corresponding version for details on modifications. For details on configuring autosupport notifications. see the EMC Data Domain Initial Configuration Guide. command options are available only to users with admin role permissions. and permissions. Version Change 5. Guidelines and Restrictions  Unless otherwise noted. but users with admin role permissions may configure additional addresses. Command options enable administrative users to manage two reports that describe the state of a Data Domain system: the Autosupport Report and the Daily Alert Summary.autosupport The autosupport command manages system reports.  Options The following options are available with this command.2 No changes from previous version. Options include:          add del disable enable reset send set show test Change History Click the command option for details on usage and functionality. both reports are emailed to the Data Domain Support address only. output. 2 Command Reference Guide . the Data Domain support email address is autosupport@autosupport. reset autosupport reset { alert-summary | asup-detailed | support-notify } Reset an autosupport command option to the default value.com disable autosupport disable support-notify Disable the sending of the Daily Alert Summary and the Autosupport Report to Data Domain support.” autosupport reset all Reset all autosupport command option to the default values. Example # autosupport del asup-detailed emails jsmith@yourcompany. this command is run on the master controller only. enable autosupport enable support-notify Enable the sending of the Daily Alert Summary and the Autosupport Report to Data Domain support. Example # autosupport add asup-detailed emails djones@yourcompany. By default. 62 EMC DD OS 5.com.datadomain. and values configured on the master controller are propagated to the worker controllers.add autosupport add { alert-summary | asup-detailed } emails <email-list> Add entries to the email list for the Daily Alert Summary or the Autosupport Report. This setting is non-configurable. See “Keywords and Arguments. In a Global Deduplication Array.com del autosupport del { alert-summary | asup-detailed } emails <email-list> Delete entries from the email list for the Daily Alert Summary or the Autosupport Report. By default.com only: # autosupport send djones@yourcompany.  By default. autosupport 63 .  send autosupport send [<email-addr>] [cmd "<cmd>"] Email a report or command description to the Autosupport Report email list or to the address specified. the schedule for the Autosupport Report is configured with the daily 0800 options. the most recently configured schedule overrides the previously configured schedule.com: # autosupport send [email protected] Example 3 To run the net show stats command and email the results to [email protected] cmd "log view messages. Example 1 To run the Autosupport Report and emai the completed report: # autosupport send Example 2 To run the Autosupport Report and email the completed report to [email protected] to the Data Domain support address: # autosupport send [email protected] reset schedule [ alert-summary | asup-detailed ] Reset the schedules of the Daily Alert Summary and the Autosupport Report to the default values. You must enclose the command option name in double quotation marks.1" set autosupport set schedule { alert-summary | asup-detailed } { [ { daily | <day(s)> } <time> ] | never } Schedule the Daily Alert Summary or the Autosupport Report. the schedule for the Daily Alert Summary is configured with the daily 0600 options.com cmd "net show stats" Example 4 To send a copy of the log file messages. For either report. 2 Command Reference Guide . 64 EMC DD OS 5. Monday and Friday: # autosupport set schedule alert-summary mon. Use the q key to exit.Example 1 To schedule the Daily Alert Summary for 2 p.m. Example # autosupport show alert-summary Alert summary email: usera@yourcompany. Enter a forward slash (/) and a pattern to search for dates.m: # autosupport set schedule asup-detailed tue 0400 Example 3 To schedule the Autosupport Report for Tuesday at 3 p. which includes the date for each Autosupport Report. Message system logs are retained for ten weeks.com [email protected] userc@yourcompany.: # autosupport set schedule asup-detailed tue 1500 show autosupport show { all | alert-summary | asup-detailed | support-notify } Display autosupport configuration. autosupport show report Generate an Autosupport Report without sending the results to the Autosupport Report email list.fri 1400 Example 2 To schedule the Autosupport Report for Tuesday at 4 a.m. Example To display entries from all of the messages system logs: # autosupport show history Nov 10 03:00:19 scheduled autosupport Nov 11 03:00:19 scheduled autosupport Nov 12 03:00:19 scheduled autosupport Use the up and down arrow keys to move through the log.com autosupport show history Display the event history file. separate the first and last items in the range with a dash (-). For example: mon wed fri. For example: thu. Run the specified report automatically on specific days of the month or week. the option is enabled. spaces. Enclose the command in double quotation marks. or both. To specify a day of the week. Default setting for Daily Alert Summary and the Autosupport Report. To specify a day of the month. separate the items in the list with commas. or both. asup-detailed "cmd" daily <days> <email-list> support-notify autosupport 65 . use the one. To specify a list of days. To specify a range of days. Separate the items in the list with commas. Keywords and Arguments alert-summary Addresses in email list for the Daily Alert Summary. Reset the sending of the Daily Alert Summary and Autosupport Report to the Data Domain support email address to the default value. test autosupport test { alert-summary | asup-detailed | support-notify| email <email-addr> } Send a test email to all lists. By default.or twonumeral string. or to a specific address. Run the specified DD OS command. For example: 1. Addresses in the email list for the Autosupport Report. For example: tue-fri. spaces. use the first three letters of that day. Individual email addresses to add to the specified list.autosupport show schedule [ alert-summary | asup-detailed ] Display the schedules for the Daily Alert Summary and the Autosupport Report. use mon 0000. Press q to exit. Values configured on the master controller are propagated to the worker controllers. this command is run on the master controller only. 66 EMC DD OS 5. Using autosupport in a GDA In a Global Deduplication Array. To specify midnight between Sunday night and Monday morning. Note that 2400 is not a valid time. never Additional Topics This section provides additional information on various topics and concepts. specified in 24-hours. Navigating Message Logs Use the up and down arrow keys to move through the log.2 Command Reference Guide . for example. Enter a forward slash (/) and a pattern to search for specific dates or other details.<time> Time at which the specified report is to be run. Do not run the specified report automatically. and permissions. Command options enable and disable access to a Data Domain system from media servers and other Windows clients that use the CIFS protocol. The cifs command sets the authentication mode and CIFS options. See the EMC DD OS Release Notes of the corresponding version for details on modifications. output. and displays status and statistics for CIFS clients.2 Modified command option: cifs set authentication active-directory <realm> { [<dc1> [<dc2> . Options include:              add del disable enable hosts nb-lookup option reset set share show status troubleshooting Change History Click the command option for details on usage and functionality. including arguments. Version Change 5...]] | * } Deprecated command: cifs set authentication nt4 <domain> { [<pdc> [<bdc>]] | * } cifs 67 .cifs The cifs command manages CIFS (Common Internet File System) data access between a Data Domain system and Windows clients. Select the vendor for the client’s operating system and then select the appropriate tuning document.2 Command Reference Guide . See “Tips on Entering or Removing Client Lists. add cifs add /backup <client-list> Specify the CIFS backup client that can access a Data Domain system /backup directory. command options are available only to users with admin role permissions.” cifs del /ddvar <client-list> Specify administrative clients that cannot access a Data Domain system /ddvar directory. The /backup directory is the target directory for compressed backup server data. note If adding multiple clients. See “cifs enable.    Options The following options are available with this command. 68 EMC DD OS 5. After a CIFS client name has been added.” cifs add /ddvar <client-list> Specify administrative clients that can access a Data Domain system /ddvar directory.” The /backup subdirectory is not supported in a GDA. del cifs del /backup <client-list> Remove a client from the list of CIFS backup clients that can access a Data Domain system /backup directory.Guidelines and Restrictions  Unless otherwise noted. The /ddvar directory contains Data Domain system core and log files. See “‘cifs disable. it must be configured for access to the Data Domain system. Configuration instructions are provided in the Integration Documentation on the Data Domain Support portal. note If removing multiple clients. Data Domain recommends using the cifs share add command instead. Data Domain recommends using the cifs share destroy command instead. CIFS must be enabled on the Data Domain system. cifs hosts show Display lmhosts mappings. This option removes all IP address and NetBIOS hostnames from the lmhosts file. nb-lookup cifs nb-lookup <netbios-name> Display the IP address for the specified NetBIOS name. A single IP address can contain multiple hostnames. The lmhosts file is a local text file that maps IP addresses to NetBIOS names. cifs 69 . cifs hosts del <ipaddr> Remove lmhosts mapping for the specified IP address. cifs option set <name> <value> Set a CIFS option. enable cifs enable Enable the CIFS service and allow CIFS clients to connect to the Data Domain system. All users may run this command option.disable cifs disable Disable the CIFS service and prevent CIFS clients from connecting to the Data Domain system. cifs hosts reset Reset lmhosts mapping to the default. hosts cifs hosts add <ipaddr> <host-list> Add lmhosts mapping. cifs option show Display CIFS options. option cifs option reset <name> Reset a CIFS option to default value. spaces. When prompted. trusted domain. The account in the trusted domain must have permission to join the Data Domain system to your company domain. not the system hostname. If you set the NetBIOS hostname using the command cifs set nb-hostname. enter a name for a user account. 70 EMC DD OS 5. the entry is created for NetBIOS hostname only.  For user “Administrator” inside the company domain.. The type and format of the name depend on if the user is inside or outside the company domain. The backup and ddvar shares are also removed. The realm must be a fully qualified name. For user “Jane Doe” in a non-local. cifs reset wins-server Set the WINS server IP address to the default: none. cifs reset clients Reset the CIFS client access list for /backup and / ddvar shares to the default: no client access.reset cifs reset authentication Reset the CIFs authentication to the default: workgroup. It is not necessary to create the entry manually.]] | * } Set authentication to the Active Directory. or both to separate entries in the domain controller list. the system hostname is used.. Security officer authorization is required for systems with Retention Lock Compliance.  The Data Domain system automatically adds a host entry to the DNS server. enter the user name and domain: jane.2 Command Reference Guide . cifs set nb-hostname <nb-hostname> Set the NetBIOS hostname. set cifs set authentication active-directory <realm> { [<dc1> [<dc2> . enter the name only: administrator. note Data Domain recommends using the asterisk to set all controllers instead of entering them individually. cifs set authentication workgroup <workgroup> Set the authentication mode to workgroup for the specified workgroup [email protected]. Use commas. cifs reset nb-hostname Reset the NetBIOS hostname to the default: none. Otherwise. No spaces or tabs allowed. a WINS server may be required to resolve NetBIOS names to IP addresses. In GDA configurations. clients A comma-separated list of clients allowed to access the share. or not (disabled). administrative users have write privileges even if the argument writable is disabled. default). max-connections The maximum number of connections to the share allowed at one time. Argument Definitions share A descriptive name for the share. writeable The share is writable (enabled. default). only /ddvar is exported. The export of /data shares is not supported. If CIFS clients are using NetBIOS. share cifs share create <share> path <path> {max-connections <max connections> | clients <clients> | browsing {enabled | disabled} | writeable {enabled | disabled} | users <users> | comment <comment>} Create a new share. or not (disabled) by Web browsers. users A comma-separated list of user names. By default. browsing The share is seen (enabled.cifs set wins-server <ipaddr> Set the WINS server IP address. path The path to the target directory. spaces (blank or tab) are treated as part of the user name because a Windows user name can have a space in the name. cifs 71 . Specify the clients by hostname or IP address. Other than the comma delimiter. specify <users>.The user names list can include group names. In GDA configurations. only /ddvar is exported. Modifications apply to new connections only. cifs share modify <share> {max-connections <max connections> | clients <clients> | browsing {enabled | disabled} | writeable {enabled | disabled} | users <users> | comment <comment>} Modify a share configuration with the same configuration options as the cifs share create option. All users in the client list can access the share unless one or more user names are specified. cifs share disable <share> Disable a share. You cannot change the path for an existing share. cifs share enable <share> Enable a share. See the share create command option for a description of the command variables. cifs share show [<share>] Display share configurations for all shares. cifs show clients Display all allowed CIFS clients for the default /ddvar administrative share and the default /backup data share. which must be proceeded by the at (@) symbol. or for a specified or custom share. but no spaces are allowed between groups. There can be spaces inside the name of a group. Separate group and user names by commas. cifs show config Display the CIFS configuration. To remove a user list for the share. The export of /data shares is not supported.2 Command Reference Guide . show cifs show active Display all active CIFS clients. comment A descriptive comment about the share. in which case only the listed names can access the share. 72 EMC DD OS 5. except for its path. not spaces. cifs share destroy <share> Delete a share. such as @group1. Example # cifs show detailed-stats Name smb SMBmkdir SMBrmdir SMBopen SMBcreate SMBclose SMBflush SMBunlink SMBmv SMBgetatr .0 % 0.0 % 0..0 % Time (ms) Time % Windows Server 2003 R2 3790 Service Pack 2 : 1 . and print a list of operating systems with their client counts.0 % 0. where the value is the maximum number of connections since the last reset. where Yes means the displayed list of clients is incomplete. cifs 73 . -------------------------------------------------------------------Miscellaneous clients Maximum connections Windows Server 2003 3790 Service Pack 2 nt : No :1 :1 :1 : : : : : : : : : : : Count 2947 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0.. and Maximum connections. display CIFS client statistics.cifs show detailed-stats Display statistics for every individual type of SMB operation.0 % 0.0 % 0.0 % 0.0 % 0.0 % 0. cifs show stats Show CIFS statistics. In some cases the same client may use multiple IP addresses. status cifs status Show status of CIFS: enable or disabled. No means the list is complete.. The list counts the number of different IP addresses connected from each operating system. Output truncated.. Output for CIFS Client Type shows Miscellaneous clients. or an asterisk (*) followed by a domain name.  74 EMC DD OS 5. a space.. Tips on Entering or Removing Client Lists When adding or removing clients on the Data Domain system /backup directory:  Separate clients in the list by a comma.troubleshooting cifs troubleshooting domaininfo Report domain information. Example To troubleshoot performance problems: # cifs troubleshooting performance Please start CIFS traffic on all active interfaces. # support upload bundle cifs troubleshooting user <username> | <uid> | <SID> Display details on a specified user. cifs troubleshooting list-groups List all CIFS groups. or both. cifs troubleshooting list-users List all CIFS users.com..yourcompany. Also to confirm if authentication issues are due to domain connectivity.2 Command Reference Guide . if not already started Waiting up to 2 minutes for network capture processes to exit . cifs troubleshooting performance Collect tcpdump and ddfs traces for CIFS performance analysis. to check the connectivity between the Data Domain system and the domain. The client-list can contain class-C IP addresses. cifs troubleshooting group <groupname> | <gid> | <SID> List details for a specified group. Enter an asterisk (*) to add or remove all clients on the network. such as *. Additional Topics This section provides additional information on various topics and concepts. IP addresses with either netmasks or length. for example. hostnames. See the EMC DD OS Release Notes of the corresponding version for details on modifications. Version Change 5.    cluster 75 .cluster The cluster command manages a Data Domain Global Deduplication Array (GDA). and permissions. Use the cluster create command to add the first controller of a GDA. A standard GDA comprises two controllers: the master and the worker. Each controller requires a GDA license. command options are available only to users with admin role permissions. For more information on this command. Guidelines and Restrictions  Unless otherwise noted. The master controller manages the worker controller.2 No changes from previous version. GDA is a licensed software option. Only two cluster command options are allowed on the worker controller: cluster destroy and cluster show config. output. see the Global Deduplication Array Administration Guide. including arguments. See the Global Deduplication Array Administration Guide for details. Options include:       add create destroy run show status Change History Click the command option for details on usage and functionality. represented by IP addresses or hostnames. command Local commands to run on one or more controllers. add cluster add <node-name> [license <license-code>] After creating a GDA. Global commands apply to the entire array. Argument Definitions host-list List of hosts. The name you assign is the name by which the GDA is identified within the CLI and Enterprise Manager. destroy cluster destroy [<cluster-name>] Destroy the filesystem on the GDA controllers and separate the controllers from the array. The filesystem must be disabled on the master controller. run cluster run [host {<host-list> | all | worker}] cmd <command> Run cluster CLI commands for specific controllers locally. The filesystem must be in a pristine state. enter the cluster add command option on the master controller to add the second controller to the GDA. The second controller must match the master controller in terms of DD OS software. The second controller must have a pristine filesystem. create cluster create <cluster-name> Create a new GDA. After running this command option. Separate entries by commas. This command can be entered on any controller in the GDA. and hardware model.2 Command Reference Guide . This command must be executed on the master controller. storage capacity.Options The following options are available with this command. each controller reverts to single-controller functionality. 76 EMC DD OS 5. 1. such as:     The filesystem status is enabled and running. Global Deduplication Array Interface: the IP address of the GDA interconnect between the array’s controllers.company.    status cluster status [node <node-name> | all] Show the status of a specific controller or for all controllers in the GDA. such as:   Filesystem up and running (Up) Filesystem has encountered a problem (Down)  Alerts: the number of alerts for each controller cluster 77 . 3 down  Filesystem Status. All users may run this command option.company. a summary of the array’s status is displayed for each controller. for example. Number: the number assigned to the controller.com Role: Master or Worker Interface Status. If you enter cluster status without options. such as:   Master: 3 up. Name: For example. dd880-1. All users may run this command option. You can run this command on the master controller only. dd880-1. 2.show cluster show config Display array membership information. 3 down Worker: 3 up. Replication Interface: the IP address of the replication interface.com Serial Number Role: Master or Worker Management Interface: the IP address of the management interface for the controller. Example Information shown for each controller:     Name: for example. If you enter the cluster status command for a specified controller. To show the status of all controllers in the GDA. only that controller’s status is displayed.2 Command Reference Guide . enter: # cluster status all 78 EMC DD OS 5. 2 Modified command options: config reset timezone config set timezone <zonename> config setup Guidelines and Restrictions Unless otherwise noted. including arguments. See the EMC DD OS Release Notes of the corresponding version for details on modifications. output.config The config command manages Data Domain system configuration settings. Command options include changing individual configuration parameters and viewing the configuration setup. Version Change 5. reset config reset location Reset the location description to the default Null. see the EMC DD OS Initial Configuration Guide and the EMC Data Domain Administration Guide. command options are available only to users with admin role permissions. Options The following options are available with this command. Options include:     reset set setup show Change History Click the command option for details on usage and functionality. and permissions. For information on how to configure the system. config 79 . config reset mailserver Reset the mail server to the default mail server.yourcompany. This command option requires security officer authorization if Retention Lock Compliance is enabled on any MTrees. the description must be in double quotation marks. The host is also added to the FTP and Telnet lists–licensed software options only–and to the CIFS and NFS lists for access to /ddvar and /backup. Example # config set admin-host admin12. The system requires one administrative email address. This command provides a quick way to add authentication privileges.com The System Admin host is admin12. Example # config set location "row2-num4-room221" The system location is row2-num4-room221 80 EMC DD OS 5. set config set admin-email <email-addr> Set recipient addresses for alerts and autosupport emails. use config show admin-email. config reset timezone Reset the time zone to the default US/Pacific.com The Admin Email is: jsmith@company. To check the current setting. If the description contains one or more spaces. use config show location. A description of a physical location helps identify the machine when viewing alerts and autosupport emails. To check the current setting. Use the autosupport and alerts commands to add other email addresses.yourcompany. fully qualified. To check the current setting. Example # config set admin-email jsmith@company. The hostname can be simple.2 Command Reference Guide . or an IP address. use config show admin-host.com config set admin-host <host> Set the machine from which you can log in to the Data Domain system to view system logs and use system commands.com config set location "<location>" Change the description of a Data Domain system’s location. Canada. America. Cancel. Example # config set mailserver mail. and Retry. Changes to the time zone require a system reboot. filesystem.. Choices include Save. NFS. network. and licenses. You will be prompted to confirm any changes. This command option requires security officer authorization if any MTrees are enabled with Retention Lock Compliance. Indian. Atlantic. Use Enterprise Manager to change configuration settings. Asia. use config show mailserver. Chile..com config set timezone <zonename> Set the system clock to a specific time zone. Australia. Example # config set timezone us Ambiguous timezone name. Europe.com The Mail (SMTP) server is: mail. Brazil. This command option is unavailable on Retention Lock Compliance systems. The default setting is US/Pacific. config 81 . Mexico. and US. enter a category or a partial zone name. CIFS. Mideast.config set mailserver <host> Change the SMTP mail server used by the Data Domain system. matching. US/Alaska US/Eastern US/Michigan US/Aleutian US/East-Indiana US/Mountain US/Arizona US/Hawaii US/Pacific US/Central US/Indiana-Starke US/Samoa setup config setup Use this command on a single node or in a GDA to change configuration settings for the system.yourcompany. To check the current setting. Press Enter to cycle through the selections. Pacific.yourcompany. The categories are Africa. Example # config set timezone Los_Angeles To display time zones. All users may run this command option. Example # config show location The System Location is: bldg12 rm 120 rack8 config show mailserver Display the name of the mail server that the Data Domain system uses to send email. All users may run this command option.yourcompany. All users may run this command option. Example # config show admin-email The Admin Email is: [email protected] config show admin-host Display the administrative host from which you can log into the Data Domain system to view system logs and use system commands.2 Command Reference Guide . config show location Display the Data Domain system location description. All users may run this command option.com config show all Display all config command settings. Example # config show timezone The Timezone name is: US/Pacific 82 EMC DD OS 5.com config show timezone Display the time zone used by the system clock. Example # config show mailserver The Mail (SMTP) server is: mail. All users may run this command option. Example # config show admin-host The Admin Host is: admin12.show config show admin-email Display the administrative email address the Data Domain system uses for email from the alerts and autosupport commands.yourcompany. if you set one. All users may run this command option. config 83 . 2 Command Reference Guide .84 EMC DD OS 5. and low-bandwidth optimization. encryption. Output of the ddboost storage-unit show command indicates if a quota is defined for the storage unit. Quotas may also be used to provision various DDBoost storage units with different sizes.ddboost The ddboost command manages the integration of Data Domain systems and disk backup devices.2. Quotas restrict the logical (uncompressed and undeduplicated) storage capacity for each storage unit. Note that it is possible to configure quotas on a system and run out of storage before quota limits are reached. Like MTree quota limits. See the DD Boost Administration Guide for details on functionality. DDBoost storage unit quota limits (hard or soft) can be set or removed dynamically. See “quota” and “mtree” for details on the quota feature. the ddboost storage-unit create command includes new. Options include:             access destroy disable enable file-replication ifgroup option reset set show status storage-unit ddboost 85 . users can now use quotas to provision Data Domain system storage among different backup applications. Command options create and delete storage units on the storage server. Beginning in 5. optional parameters to specify quota limits at the time the storage unit is created. and display the disk space usage of each storage unit. distributed segment processing. DD Boost also supports advanced load balancing and failover. enabling an administrative user to monitor the usage of a particular storage unit over time. including definitions of hard and soft limits. A message displays in the output notifying users if the quota feature is disabled. See the EMC DD OS Release Notes of the corresponding version for details on modifications. command options are available only to users with admin role permissions. If MTree quotas are enabled. verify that the proper licensing has been implemented on your Data Domain system. Enabling quotas may cause OpenStorage backup applications to report non-intuitive sizes and capacities. output. When a storage unit is created. See Knowledge Base article 85210. and permissions. including arguments.Guidelines and Restrictions  Unless otherwise noted. backups are stopped if a hard limit is reached. DD Boost is a licensed software option.2 New command options: ddboost ifgroup create <group-name> ddboost ifgroup destroy <group-name> ddboost ifgroup rename <source-group-name> <destination-group-name> ddboost option reset [virtual-synthetics] ddboost option set virtual-synthetics {enabled | disabled} ddboost option show [virtual-synthetics] Modified command options: ddboost ifgroup add <group_name> {interface <ipaddr> | client <host>} ddboost ifgroup del <group_name> {interface <ipaddr> | client <host>} ddboost ifgroup disable <group-name> ddboost ifgroup enable <group-name> ddboost ifgroup reset <group-name> 86 EMC DD OS 5. quota limits are set to the default MTree quota size. Version Change 5. for details. available on the Support portal. If basic options do not work.2 Command Reference Guide . Quota limits are enforced only if MTree quotas are enabled.      Change History Click the command option for details on usage and functionality. not IP address. The command permanently removes all data (files) contained in the storage units. ddboost access reset Reset DD Boost client access list to factory default. access ddboost access add clients <client-list> Add clients to DD Boost access list. The access list must be the hostname. ddboost 87 . Example # ddboost access add clients host1 host2 host3 host1 : Access already exists host2 : Invalid host host3 : Added ddboost access del clients <client-list> Delete clients from DD Boost access list. ddboost access show Show DD Boost client access list. destroy ddboost destroy Delete all storage units from the Data Domain system. You must also manually remove (expire) corresponding catalog entries in the backup software.ddboost ifgroup show config {interfaces | clients | groups | all} <groupname> ddboost ifgroup status <group-name> ddboost show histogram ddboost show stats [ interval <seconds> ] [count <count>] ddboost storage-unit create <storage-unit-name> [quota-soft-limit <n> {MiB|GiB|TiB|PiB}] [quota-hard-limit <n> {MiB|GiB|TiB|PiB}] Options The following options are available with this command. the Data Domain system updates all files and storage units the next time this command is run. ddboost file-replication reset stats Reset file-replication statistics when DD Boost is enabled. You must specify a duration. file-replication ddboost file-replication option reset {low-bw-optim | encryption} Reset low-bandwidth optimization and encryption to the default value (disabled). 88 EMC DD OS 5. file-based replication history. ddboost file-replication show detailed-file-history [duration <duration> {day | hr}] Show a detailed.disable ddboost disable Disable DD Boost. ddboost file-replication option show [low-bw-optim] Show state of low-bandwidth optimization: enabled or disabled. time. If the user. or as enabled with a configuration mismatch. ddboost file-replication option show [encryption] Show state of encryption: enabled or disabled. Output for low-bandwidth optimization shows the function as enabled and running. ddboost file-replication option set encryption {enabled | disabled} This command must be entered on the source system and the destination (target) system to enable or disable encrypted data transfer for DD Boost file replication. enable ddboost enable Enable DD Boost. or group ID (GID) changes. ddboost file-replication option set low-bw-optim {enabled | disabled} This command must be entered on the source system and the destination (target) system to enable or disable low-bandwidth optimization.2 Command Reference Guide . Data for each file name is organized by date. Default setting is disabled. and direction (outbound or inbound). ddboost file-replication show active Show the status of a DD Boost file-replication transfer to a destination Data Domain system. user ID (UID). and direction (outbound or inbound). Output is shown for the specified interval. client. See “ddboost ifgroup enable <group-name>. Note the compression ratio increases when low-bandwidth optimization is enabled. You can add public or private IP addresses for data transfer connections. the IP address must be configured on the Data Domain system and its interface must be enabled. cumulative view of file-replication history. Data is organized by date. This command option may be run on a single node and on a master node in a Global Deduplication Array (GDA). See “Output from file-replication show. Prior to adding an interface you must create the <group_name> unless the group name is the default group. Additionally.” ifgroup ddboost ifgroup add <group_name> {interface <ipaddr> | client <host>} Add an interface. After adding an IP address as an interface.” ddboost file-replication show file-history [duration <duration> {day | hr}] Show the data-transfer history of inbound and outbound traffic for files in the Data Domain system /backup directory. See “Output from file-replication show” for details. ddboost file-replication show history [duration <duration> {day | hr}] [interval <interval> {hr}] Show the data transfer history between the source and destination Data Domain systems. you must enable advanced load balancing and link failover.” note The group-name “default” is created during an upgrade of a fresh install and is always used if <group_name> is not specified. See “ddboost ifgroup create <group-name>. time. The count displays the number of lines equal to the count value. See “Output from file-replication show. ddboost ifgroup create <group-name> Create a group with the name <group-name> for the interface. or both to <group-name> or default group.ddboost file-replication show detailed-history [duration <duration> {day | hr}] [interval <interval> {hr}] Display a detailed. ddboost file-replication show performance [interval <sec>] [count <count>] Display in real time the amount of pre-compressed outbound and inbound data compared to network throughput or post-compressed data. ddboost file-replication show stats Monitor outbound and inbound traffic on a Data Domain system during replication. ddboost 89 .” See the DD Boost Administration Guide and the EMC Data Domain Administration Guide for more information on interface groups. a-z. Select the all argument to view configuration options of all groups. ddboost ifgroup disable <group-name> Disable a specific group by entering the <group-name>. A-Z]. ddboost ifgroup enable <group-name> Enable a specific group by entering the <group-name>. If <group-name> is not specified.” ddboost ifgroup del <group_name> {interface <ipaddr> | client <host>} Remove an interface. If this is the case. Only empty groups can be destroyed. ddboost ifgroup show config {interfaces | clients | groups | all} <group-name> Display selected configuration options. you have the option of terminating this command option. all information about the specified <group-name> is shown. note The group-name “default” cannot be destroyed.The <group-name> may contain characters ^. If <group-name> is not specified. Deleting the last IP address interface disables the ifgroup. ddboost ifgroup destroy <group-name> Destroy the group name.” “all. Hostnames and fully qualified hostnames may be used. Wildcard hostnames. If <group-name> is not specified. the command applies to the default group.* $. Interfaces or clients cannot be destroyed but may be removed sequentially or by running the command option ddboost ifgroup reset group-name. or both from <group-name> or default group. ddboost ifgroup status <group-name> Show status of link aggregation: enabled or disabled. and hyphen (-). [0-9. If <group-name> is not specified. indicated by an asterisk (*) may be used. client. This command option does not require disabling the group. All users may run this command option. Reserved group names that cannot be used are: “default. all information about the default group is displayed.” and “none. Status is displayed for all groups unless <group-name> is specified. All users may run this command option. If no selection is made. ddboost ifgroup reset <group-name> Reset a specific group by entering the <group-name>. the command applies to the default group.2 Command Reference Guide . underscore(_). the command applies to the default group. ddboost ifgroup rename <source-group-name> <destination-group-name> Rename the ifgroup <source-group-name> to <destination-group-name>. 90 EMC DD OS 5. ddboost reset user-name Delete and reset the DD Boost user name. All users may run this command. or as a network recovery procedure to clear job connections after the network connection is lost. Virtual synthetics is supported on single-node configurations and DD Extended Retention systems only. ddboost option show [virtual-synthetics] Show status of virtual synthetics: enabled or disabled. ddboost 91 . ddboost option set virtual-synthetics {enabled | disabled} Enable or disable the virtual synthetics feature on the DD OS. Distributed segment processing must be enabled in GDA configurations. Distributed segment processing must be enabled in GDA configurations. Distributed segment processing must be enabled in GDA configurations. Example 2 # ddboost ifgroup status local_1 Status of ifgroup local_1 is "disabled" option ddboost option reset [distributed-segment-processing] Reset distributed segment processing to the default option (enabled). reset ddboost reset stats Reset statistics when DD Boost is enabled. ddboost option reset [virtual-synthetics] Reset virtual synthetics to the default option (disabled). Virtual synthetics is supported on single-node configurations and DD Extended Retention systems only. All users may run this command. ddboost option set distributed-segment-processing {enabled | disabled} Enable or disable the distributed segment processing feature on the DD OS. ddboost option show [distributed-segment-processing] Show status of distributed segment processing: enabled or disabled.Example 1 # ddboost ifgroup status Status of ifgroup default is "enabled". 1.com NO 8 7. as shown in Example 2.109.109.220.set ddboost set user-name <user-name> Set the DD Boost user name when DD Boost is enabled. Example # ddboost ifgroup show config ifgroup default: enabled -----------------------------------------------------------------------Interfaces: 10.5.6.4.0.141.17-1. it uses multiple concurrent RSS connections for a single job.0-200818 Microsoft Windows Server 2008 SP 2 (build 6002).168.ifgroup ------------------------.109.6.221 Clients: *. 192. 64-bit NetBackup: 7.Connections ---------------------------------------Group Name none Status Interfaces 10. Otherwise show all groups.984 2.2.2142_FC4smp x86_64 NetBackup: 6.6.b-domain.4 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ Client Connections: Max Client Connections: 314 ---------------------.2.datadomain. This is expected behavior. show ddboost ifgroup show config <group-name> Show a specific group by entering the <group-name>.190 2.1 client1.1. output may show two restore connections and one control connection.142 Clients: * ifgroup local_1: enabled -----------------------------------------------------------------------Interfaces: 192. Example 1 (Single Node) # ddboost show connections Active Clients: 2 Clients: Client Idle CPUs Memory(MiB) Plugin Version OS Version Application Version -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------cmpnyx NO 8 8. 10.6.com ddboost show connections Show the number of DD Boost connections. note When an Archive Train restore image file spans multiple partitions.140.38 Backup Restore Src-repl 0 0 0 Dst-repl Control 0 0 Total 0 --------------------------------------------------------------------------------------------------------------------------------------------- 92 EMC DD OS 5. All users may run this command.--------------------.6.109.168.0Linux 2. Therefore.2 Command Reference Guide . 10. 109. 2. stddev The standard deviation for time to complete operations. derived from the mean time.Connections ---------------------------------------Group Name none none Total Connections: Status Interfaces 10.------------------------------------------------------------------------------------------ ddboost show histogram Display a DD Boost histogram for the Data Domain system.141 enabled 10. max-s The maximum time taken for a single operation.--------------------.41 enabled 10. ---------------------.168.109.220 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ---------------------------------------------------------------------------------------------------------------------------------------------Total Connections: * Control connections for image operations -------------------------------------------------. 4.------------------------------------------------------------------------------------------ Example 2 (Master:1) # ddboost show connection .244 enabled 10. 8.109.140 enabled 192.1.6. 6. ddboost 93 .109. 1s The number of operations that took between 100 ms and one second.6..6.. or 10ms The number of operations that took less than the specified number of milliseconds (ms). 100ms The number of operations that took between 10 ms and 100 ms.6. Output Definitions mean-ms The mathematical mean time for completion of the operations.6.38 10.ifgroup ------------------------.109.none default default external lab10G 10.39 Backup Restore Src-repl 0 0 0 0 2 0 0 0 0 Dst-repl Control 0 0 0 0 1 0 Total 0 0 0 --------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------.109.6. Example # ddboost show stats 01/09 03:56:56 DD Boost statistics: DDP_GETATTR DDP_LOOKUP DDP_ACCESS DDP_READ DDP_WRITE DDP_CREATE DDP_REMOVE DDP_READDIR DDP_FSSTAT DDP_REPL_START DDP_REPL_STOP DDP_REPL_STATUS DDP_QUERY DDP_GETPROPERTY DDP_BOOST_INFO DDP_STREAM_INFO (Output truncated.10s The number of operations that took between 1 second and 10 seconds.400.860.529.043.851.) Count Image creates Image deletes Bytes after filtering Bytes after local compression Network bytes received Compression ratio Total bytes read 0 0 56 56 Errors 0 0 68. >10s The number of operations that took over 10 seconds.613.2 Command Reference Guide .318 23.598. ddboost show stats [ interval <seconds> ] [count <count>] Show DD Boost statistics.600 23.921 2.397.9 ---------------------------------------------------------------------------------------: : : : : : : : : : : : : : : : 36954 45572 115 0 3 56 56 0 36155 9 9 840 218569 87377 95234 0 [0] [8036] [0] [0] [0] [0] [0] [0] [0] [0] [0] [0] [0] [0] [0] [0] Pre-compressed bytes received ---------------------------------------------------------------------------------------- 94 EMC DD OS 5.198 23. See “mtree” for details on quota limits. for details.ddboost show user-name Display the current DD Boost user. Quota limits are not enforced. ddboost storage-unit show [compression] [<storage-unit-name>] Display the compression for all storage units (the original byte size. You must also manually remove (expire) corresponding catalog entries from the backup application. Quotas may cause OpenStorage backup applications to report non-intuitive sizes and capacities. storage-unit ddboost storage-unit create <storage-unit-name> [quota-soft-limit <n> {MiB|GiB|TiB|PiB}] [quotahard-limit <n> {MiB|GiB|TiB|PiB}] Create a storage unit and set limits. the quota is created but a message appears stating the feature is disabled and limits are not enforced. Created storage-unit SU_2 quota-soft-limit: 1586 GiB. status ddboost status Display status of DD Boost: enabled or disabled. quota-hard-limit: N/A ddboost storage-unit delete <storage-unit-name> Delete a specified storage unit and contents. Note that if the quota feature is not enabled. quota-hard-limit: 1078 GiB Example 2 # ddboost storage-unit create SU_2 quota-soft-limit 1586 GiB ** Quota is disabled. See Knowledge Base article 85210. See Example 2. Example 1 # ddboost storage-unit create SU_1 quota-soft-limit 793 GiB quota-hard-limit 1078 GiB Created storage-unit SU_1 quota-soft-limit: 793 GiB. The list of files in a storage unit is shown in the output only if a storage unit name is specified. ddboost 95 . as shown in Example 2. See “quota” for details. global and local compression) or the filenames in a specified storage unit. available on the Support portal. 2 Command Reference Guide . Enter the command option filesys clean start on both systems. The duration of the cleaning cycle depends on the amount of data on the Data Domain system.Example 1 # ddboost storage-unit show Name DDBOOST_STRESS_SU abcd abcd2 D : Deleted RO : Read Only RW : Read Write Pre-Comp (GiB) 1. Do not use this option if maximum filesystem write performance is required.0 Status RW RW RW --------------------------------------------------------------------------------------- --------------------------------------------------------------------------------------- Example 2 # ddboost storage-unit show DDBOOST_STRESS_SU Name DDBOOST_STRESS_SU D : Deleted RO : Read Only RW : Read Write List of files in DDBOOST_STRESS_SU: write_000 -------------Pre-Comp (GiB) 1.0 0.0 0. 96 EMC DD OS 5.0 Status RW ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ Additional Topics This section provides additional information on various topics and concepts. Setting Low-Bandwidth Optimization Low-bandwidth optimization is for networks with less than 6 Mbps aggregate bandwidth. both systems must undergo a full cleaning cycle to prepare the existing data. After enabling low-bandwidth optimization on the source and target systems. Output from file-replication show Arguments for the command option ddboost file-replication show display the following data:      amount of pre-compressed data in KB amount of post-compressed data in KB network transfer data in KB low-bandwidth optimization factor number of errors ddboost 97 . 98 EMC DD OS 5.2 Command Reference Guide . <disk-id> Guidelines and Restrictions Unless otherwise noted. and reliability statistics. For details on disks in external shelves. output. and permissions. For a Data Domain system with one or more Data Domain external disk shelves. Options include:          beacon multipath port rescan reset set show status unfail Change History Click the command option for details on usage and functionality. logical (RAID) layout. Version Change 5. see the Expansion Shelf Hardware Guide. including arguments.disk The disk command manages disks and displays disk locations. commands also include entries for enclosures and disks. Options The following options are available with this command. See the EMC DD OS Release Notes of the corresponding version for details on modifications.2 Modified command option: disk unfail <enclosure-id>. Each Data Domain system reports on the number of disks in the system. disk 99 . usage. command options are available only to users with admin role permissions. This command works on gateway models only. Disabling auto-failback means the user must manually fail back to the primary path when the path becomes available. Enabling auto-failback means the primary path is used when it is available. disk multipath option set auto-failback {enabled | disabled} Enable or disable auto-failback policy. Auto-failback is supported on gateway systems only. disk multipath option show Show status of multipath configuration monitoring and auto-failback: disabled or enabled. Multipath configuration monitoring is disabled by default. 100 EMC DD OS 5. multipath disk multipath failback Manually force all disks to use the primary path. disk multipath reset stats Clear statistics of all disk paths in expansion shelves. failures in paths to disk devices do not generate alerts. disk multipath resume port <port> Allow I/O on specified initiator port. even if the secondary path remains usable. To check all disks in an enclosure. Multipath configuration monitoring is disabled by default. failures in paths to disk devices generate alerts and log multipath events. use the enclosure beacon command option. Press Ctrl-C to stop the flash. use this command to switch over to the primary path when it becomes available. When disabled. To perform auto-failback. When enabled. disk multipath option reset {monitor | auto-failback} Disable multipath configuration monitoring. disk multipath option set monitor {enabled | disabled} Enable multipath configuration monitoring. This command is supported on gateway models only. If monitoring is disabled.2 Command Reference Guide . meaning disk multipath show history is not updated. multipath event logging is not performed.<disk-id> Cause the LED that signals normal operation to flash on the target disk. The auto-failback option is enabled by default and supported on gateway systems only.beacon disk beacon <enclosure-id>. storage array.<disk-id>] Rescan all disks to search for newly removed or inserted disks or LUNS. disk multipath show stats [enclosure <enc-id>] Show statistics for all disk paths by default. or power on a drive. or for the specified enclosure only. disk multipath suspend port <port> Disallow I/O on specified initiator port. disk 101 . disk multipath status [<port-id>] Show multipath configurations and runtime status. or system. This command does not drop the Fibre Channel link. reset disk reset performance Reset disk performance statistics to zero. and stop traffic on particular ports during scheduled maintenance of the SAN. disk port show {stats | summary} Show disk port information.disk multipath show history Show history of multipath events. rescan disk rescan [<enclosure-id>. port disk port enable <port-id> Enable the specified initiator port. please wait. Disk dev1 has been added to spindle-group 8. Are you sure? (yes|no|?) [no]: y ok. proceeding.2 Command Reference Guide . The enclosure and disk numbers. The result will be effective after the filesystem is restarted. Example # disk show hardware Disk (enc/disk) ---------------------------------------------------------------------------------------------------------------------------------------------------------1. The firmware revision on each disk. Output Definitions (Disk Information) Disk (enc/disk) Manufacturer/Model Firmware Serial No.88 GiB Manufacturer/Model Firmware Serial No. 102 EMC DD OS 5. The manufacturer’s serial number for the disk. Capacity ---------------------------------------------------------------------------------------------------------------------------------------------------------3 drives present.88 GiB 232. show disk show failure-history Display list of serial numbers of failed disks in the Data Domain system.3 Hitachi HDP725025GLA380 Hitachi HDP725025GLA380 Hitachi HDP725025GLA380 GM2OA52A GM2OA52A GM2OA52A GEL230RB0DMU8B GEL230RB0DRTSB GEL230RB0DTH8B 232.1 1.88 GiB 232.set disk set dev<disk-id> spindle-group <1-16> Assign a LUN group to the disk. Please enter sysadmin password to confirm 'disk set': This command may take several minutes to complete.2 1. Example # disk set dev1 spindle-group 8 The 'disk set' command assigns a lun-group to the disk/lun. The manufacturer’s model designation. disk show hardware Display disk hardware information. (Available on gateway systems only. The world-wide number of the port on the storage array through which data is sent to the Data Domain system. The firmware level used by the third-party physical disk storage controller. or other information depending on the vendor string sent by the storage array.Capacity The data storage capacity of the disk when used in a Data Domain system. A label that identifies the manufacturer. The display may include a model ID. The spindle-group for this LUN. MiB = Mebibytes. The serial number from the third-party physical disk storage system for a volume that is sent to the Data Domain system. GiB = Gibibytes. The LUN number given to a LUN on the third-party physical disk storage system. Command output from a gateway Data Domain system lists each LUN accessed by the Data Domain system as a disk. Capacity Spindle-Group disk show performance Display disk performance statistics for each disk. RAID type. The Data Domain convention for computing disk space defines one gigabyte as 230 bytes. Output Definitions (System Information) Disk LUN Port WWN Each LUN accessed by the Data Domain system as a disk. the base-2 equivalent of Gigabytes.) Manufacturer/Model Firmware Serial No. Each column displays statistics averaged since the last disk reset performance command or the last system power cycle. giving a different disk capacity than the manufacturer’s rating. the base-2 equivalent of Megabytes. disk 103 .  TiB = Tebibytes. the base-2 equivalent of Terabytes. The amount of data in a volume sent to the Data Domain system. 2 1.037 0. MiBytes = MiB = Mebibytes.3 ATA Bus CRC Err 0 0 0 Reallocated Sectors 0 0 0 25 C 77 F 23 C 73 F 23 C 73 F Temperature ------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------3 drives operating normally.037 0.1 1. The average number of megabytes per second written to each disk.111 MiB/s. MiBytes/s 0.1 1.Example # disk show performance Disk (enc/disk) 1. Write sects/s 20 20 20 0 % busy Cumul. Example # disk show reliability-data Disk (enc/disk) 1.2 1. Busy disk show reliability-data View details of the hardware state of each disk. 104 EMC DD OS 5.037 0% 0% 0% Busy ------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------- Output Definitions Disk (enc/disk) Read sects/s Write sect/s Cumul. The information is typically used by Data Domain Support for troubleshooting assistance.3 Cumulative Read sects/s 56 57 57 0. the base-2 equivalent of Megabytes. The average number of sectors per second written to each disk.2 Command Reference Guide . The average percent of time that each disk has at least one command queued. MiBytes/s The enclosure and disk numbers. The average number of sectors per second written to each disk. The uncorrected raw UDMA CRC errors. disk show state Display state information about all disks in an enclosure (a Data Domain system or an attached expansion shelf). .Output Definitions Disk ATA Bus CRC Err Reallocated Sectors Temperature The <enclosure. The current temperature of each disk in Celsius and Fahrenheit. Columns in the output display the disk state for each slot number by enclosure ID. If a RAID disk group reconstruction is underway. The number of mapped-out defective sectors. columns for the disk identifier. The allowable case temperature range for disks is from 5 degrees centigrade to 55 degrees centigrade.available K .Unknown disk 105 .Known U . and the total number of disks.reconstruction v . s D s . v v v v v v v v v v v v v v D State In Use Disks Spare Disks Disabled Disks Count 3 1 1 -------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------Output Legend s .disk-id> disk identifier. and time remaining are also shown. Example To display a system containing shelf disks: # disk show state Enclosure Disk 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ----------------------------------------------------------------------------1 2 Legend . . progress.spare R . the total number of disks by disk state. or LUNs in a Data Domain gateway system using storage area network (SAN) storage. ” A special case of a system that would have been Normal if the system had none of the following conditions that require user action:  RAID system degraded   Warning Foreign storage Failed or Absent disks See “Disk States for details. the display shows only the number and state of the LUNs accessed by the Data Domain system. Normal Error System is operational and all disks are available and ready for use.Absent D .Disabled status disk status View details on the Data Domain system disk status.Foreign F .O . note The RAID portion of the display could show one or more disks as Failed while the Operational portion of the display could show all drives operating nominally. high-level states. disk status is indicated by one of the following. In the first line of output. See the definitions for Foreign and Failed in “Disk States. but not in use by RAID.2 Command Reference Guide . and if a RAID disk group reconstruction is underway. A disk can be physically functional and available.Failed A . Output includes the number of disks in use and failed. the number of spare disks available. The remainder of the display is invalid for a gateway system. On a gateway Data Domain system. Error indicates that some or all of its own storage is missing. Reconstruction is done per disk. possibly because of operator intervention. A new head unit is in this state when Foreign storage is present. For a system configured with some storage. If more than one disk is to be reconstructed. the disks queued for reconstruction show as spare or hot spare until reconstruction begins. 106 EMC DD OS 5. Example 1 Output shows status of disks: # disk status Normal .<disk-id> This command option makes a disk previously marked Failed or Foreign usable to the system. disk 107 .system operational Disk reconstruction detail Disk (%) 3.15 Progress (minutes) 40 125 Active tier 27 3 16 47 Archive tier 28 4 32 Head unit 3 1 4 Other 15 1 1 17 Remaining ----------------------------------------------------------------------------------------Disk states In-Use Spare Available Unknown Fail Absent TOTAL DISKS ---------------------------------------------------------------------------------------------------- Spare (Reconstructing) 1 ---------------------------------------------------------------------------------------------------- unfail disk unfail <enclosure-id>.Storage operational Disk States ----------In Use TOTAL DISKS ----------Active tier ----------3 3 ----------- Example 2 Output shows overall status of disks in a DD Extended Retention system with RAID disk group reconstruction underway: # disk status Normal . Some states require assistance from Data Domain Support. This option transmits to the drives the serial number of the main board. In Use is the normal state of a drive in an active data array. caution! Do not run the disk unfail command option on a disk in the Foreign state after a chassis swap.2 Command Reference Guide . Disk States Output from various disk show command options includes details on disk states. This state commonly appears after a chassis swap or after new enclosures are connected to an active system.Additional Topics This section provides additional information on various topics and concepts. Doing so destroys the filesystem and all data will be lost. Failed Disk state Failed indicates the system took the disk offline because of a hardware error and that the system has started reconstruction on the spare. Unknown Disk state Unknown indicates the disk may be newly introduced to the system. run the system headswap command option. Foreign Disk state Foreign indicates the disk is not reporting the proper identification information in the RAID group. 108 EMC DD OS 5. This state generates an alert to Data Domain Support and a case is created and a replacement drive is sent. In Use Disk state In Use indicates the disk is working properly. If disks remain in this state after the chassis swap. which allows the system to recognize the drives and use them accordingly. Spare Disk state Spare is the normal state of a Data Domain disk serving as the hot standby for the active RAID set. This state also appears when disks are undergoing reconstruction. The bottom LED is amber and glows steadily when the disk has failed.12. To reset the disk state. The top LED is green and flashes when the disk is accessed or when the disk is the target of a beacon operation. However. Following the system rescan. To verify the drive is available. The disk-identifying variable used in disk commands (except gateway-specific commands) is <enclosure-id>. An enclosure may be a Data Domain system or an external disk shelf. if the problem persists. Output for the suspected drive should be blank or show as Absent. remove the disk. Invalid Commands The following disk command options are invalid on gateway Data Domain systems using third-party physical storage disk arrays rather than Data Domain external disk shelves: disk beacon disk expand disk fail disk unfail disk show failure-history disk show reliability-data disk 109 . run the command option disk show hardware. and a Data Domain system is always enclosure 1. This state generates an alert to Data Domain Support and a case is created. More About Disks and Enclosures The number of disks a Data Domain system has depends on the model. For example. Contact Data Domain Support for assistance. Disk 12 in the first external shelf is labeled 2. wait five minutes.12. Each disk in an external shelf has two LEDs at the right edge of the disk carrier. and then reinsert the disk. disk 12 in a Data Domain system is labeled 1. A green or blue LED indicates disk activity. there may be a bad slot on the enclosure or the head unit. output typically shows the disk state as Spare.<disk-id>. and an amber or red LED indicates a failure or attention condition. Each disk has two LEDs.Absent Disk state Absent indicates the disk is disconnected from the bus and is inaccessible (the condition is the same as a drive being pulled from the system). Disks in the Absent state cannot be failed or unfailed. the disk unfail command changes the disk state to Unknown. 110 EMC DD OS 5.When a Disk in a Tier Fails When a disk belonging to a tier fails. or disks belonging to two or more tiers. To list available spare disks. enter y when prompted to confirm the operation. the command reformats the disk to a spare in the same tier as the other tiered disk in the shelf. If the Failed disk belonged to a tier with an available spare disk. Explicitly Failing a Disk Use the disk fail command to explicitly change the state of a single disk on a specific tier. Spare. which have three disks and no spare disk. Spare disks are supplied in a carrier for a Data Domain system or a carrier for an expansion shelf. to change a disk in the Available. Always replace a failed disk as soon as possible. In this case.2 Command Reference Guide . Typically. Less frequently. the disk subsystem automatically changes the state of that disk to Failed and removes that storage from the tier. In this case. in which case a warning appears. for example. A maximum of two disks in the head unit can be failed concurrently in most Data Domain systems. To proceed. and does not add the disk to a tier. the disk is in an enclosure with other disks belong to the tier. In this case. You can then remove the storage from the tier. In DD120 and DD140 systems. Unfailing a Disk The state at which the disk unfail command moves the Failed or Foreign disk and adds it to a tier depends on how other disks in the enclosure are tiered. Occasionally the disk is in an enclosure with no disks belonging to tiers. or In Use state to Failed on the active tier. the disk unfail command changes the disk to Available in the same tier. use the disk show state command option. but not to the disk group. the disk is in an enclosure with other disks belonging to the tier. Do not move a disk from one carrier to another. Note that the command stops if failing the specified disk would cause a triple disk failure in a disk group. unless doing so would result in data loss. the disk subsystem automatically replaces the Failed disk with the spare. with the exception of DD120 and DD140 systems. only one disk can be failed. and permissions. Version Change 5. See the EMC DD OS Release Notes of the corresponding version for details on modifications. Enclosure commands do not include adding a shelf.) To determine enclosure numbering. The shelf allocating the disks must have at least 14 disks available for its own RAID group. output. see the World Wide Name (WWN) of each enclosure in the output of the enclosure show topology command option. including arguments. Options include:    beacon show test Change History Click the command option for details on usage and functionality.2 Modified command (output only): enclosure show summary Guidelines and Restrictions  Unless otherwise noted. require spare disks and none are available. An enclosure is a Data Domain system or an attached expansion shelf. If a Data Domain system or a previously installed shelf.enclosure The enclosure command identifies and displays information about expansion shelves. Enclosure numbers are not static and may change when the system is rebooted. See “Adding Storage to an Active Tier” for instructions. disks from a newly installed shelf are allocated to the existing RAID groups (disk groups) when the new shelf is recognized with the disk rescan command. (Numbers are generated according to when the shelves are detected during system startup. or both.    enclosure 111 . command options are available only to users with admin role permissions. 0 Gbps 112 EMC DD OS 5. indicating activity.0 Gbps 50060480A810F0BF 08E0 US1V2102000741 OK 24. Example # enclosure show controllers Model Capacity WWN Serial # ES30 15 Slots US1V4102300094 US1V4102300094 Number of Controllers 2 Controller A WWN Firmware Serial # Status HOST port EXP'N port Controller B WWN Firmware Serial # Status HOST port EXP'N port 50060480A810143F 08E0 US1V2102000135 OK 12. enclosure show controllers <enclosure> Display information and status for an enclosure and shelf controller systems. show enclosure show all [<enclosure>] Display the temperatures and status of fans and power supplies. Press Ctrl-C to halt the command.0 Gbps 0.Options The following options are available with this command. This command option causes the LED on each disk in an enclosure to flash green.2 Command Reference Guide .0 Gbps 24. beacon enclosure beacon <enclosure> Confirm that the DD OS and hardware recognize an enclosure. Capacity The number of usable drive slots in the enclosure. WWN The World Wide Name for the shelf controller. there are blocks for Controller A and Controller B. enclosure 113 . Status The current status for the shelf controller. Serial # The serial number of the physical enclosure. the enclosure is an ES20. Output Definitions (Shelf Controller Modules) Controller A Identifies which shelf controller module the block of information is for. As with the WWN. The serial number is different for each shelf controller and differs from the enclosure Serial # value. HOST port The link speed of the HOST port of the shelf controller. This number matches the label located on the enclosure OPS Panel. Number of Controllers The number of shelf controllers currently inserted into the enclosure. The WWN is different for each controller and differs from the WWN for the enclosure. This number is the argument that is passed to the command. This value can be different for each shelf controller. If this enclosure has both shelf controllers installed.Output Definitions (Physical Enclosure Shell) Enclosure The number listed here is the enclosure number assigned by the Data Domain OS. Serial # The serial number for the shelf controller. this may be the same value as the WWN. Model The product name of the enclosure. This value matches the serial number printed on the label on the back of the enclosure. This identifier describes the enclosure itself and will not change when components within the enclosure are swapped. In this example. A controller connects to the Data Domain system or shelf controller of the previous enclosure through the HOST port. Depending on when the enclosure was manufactured. Firmware The revision level of the firmware that resides on the shelf controller. this describes the enclosure and will not change if components are swapped. WWN The World Wide Name of the physical ES20 enclosure. or in a specific enclosure. for the Data Domain system. Level The fan speed. Status The fan status: OK or Failed. Example # enclosure show fans Enclosure Description --------1 ---------------------FAN 1 FAN 2 FAN 3 FAN 4 FAN 5 FAN 6 FAN 7 FAN 8 2 Power module #1 fan #2 Power module #2 fan #1 Power module #2 fan #2 Level -----medium medium medium medium medium medium medium medium low low low Status -----OK OK OK OK OK OK OK OK OK OK OK OK Power module #1 fan #1 low Output Definitions Enclosure The enclosure number. 114 EMC DD OS 5.EXP'N port The link speed of the EXP'N port of the shelf controller. A controller connects to the shelf controller of the next enclosure in the chain through the EXP'N port. Description The fan description for each power or cooling unit. starting from 1. enclosure show fans [<enclosure>] Display the current status of fans in all enclosures.2 Command Reference Guide . This value depends on the internal temperature and amount of cooling required. State OEM Name OEM Value Capacity ------------------------------------------------------------------------------------------------------------------------1 2 3 DD690 ES20 ES30 8F46927218 US1V4100500053 Online Online 15 Slots 16 Slots 15 Slots 50050CC100100D4E Online ------------------------------------------------------------------------------------------------------------------------3 enclosures present. The serial number for an expansion shelf is the same as the chassis serial number. enclosure 115 . OEM names and values. and capacity (number of disks in the enclosure).enclosure show powersupply [<enclosure>] Display the status USAF power supplies in all enclosures or in a specific enclosure. Serial No. Example # enclosure show powersupply  Enclosure --------1 1 2 2 --------Description --------------Power Module #1 Power Module #2 Power Module #1 Power Module #2 --------------Status -----OK OK OK OK ------ Output Definitions (Status) OK The power supply is operating normally. state. Example # enclosure show summary Enclosure Model No. Unavailable The system cannot determine the status of the power supply. Degraded The power supply is manifesting a fault or not installed. model and serial numbers. enclosure show summary List enclosures. which is the same as the enclosure WWN and the OPS panel WWN. and the internal temperature for expansion shelves. Shelf was connected previously. Indicates no communication with firmware. Fault Applies to ES20 only. the Data Domain system shuts down.Enclosure states may be one of the following: Offline No connectivity to shelf.2 Command Reference Guide . the numbers are positive. Software Error Typically means busy. Found Transient state. Also occurs if there is no power to the enclosure (after startup). No problems detected. Try again later. With older models. If a CPU temperature reaches 0° Celsius. With newer models. If the CPU temperature reaches 80° Celsius. The CPU numbers depend on the Data Domain system model. enclosure show temperature-sensors [<enclosure>] List the internal and CPU chassis temperatures for a system. Enclosure detected (though not seen by user) and will transition to other states. CPU temperatures may be shown in relative or ambient readings. the numbers are negative when the status is OK and move toward zero as CPU temperature increases. Error Hardware or software error. Example # enclosure show temperature-sensors Enclosure --------2 --------Description ---------------Internal ambient ---------------C/F ----25/77 ----Status -----OK ------ 116 EMC DD OS 5. A status of Critical indicates that the temperature is above the shutdown threshold. the Data Domain system shuts down. Online Operating as expected. B.A.A.B.B.A.H: 2. enclosure 117 .A.E 4.enclosure show topology Show the layout of the SAS enclosures attached to a system.H: 3.B.A.H: 2.port enc. Port 1a 1b 1c 1d 2a 2b 2c 2d 3a 3b 3c 3d ------------------------------------------------------------------------------------------------Encl ---2 3 4 ---WWN -------------------------US1V4102300094 US1V4101700116 US1V4102300042 -------------------------Serial # --------------------------US1V4102300094 US1V4101700116 US1V4102300042 -------------------------3.E 3.port ------------------------------------------------------------------------------------------------- Error Message: -----------------------No error detected ----------------------Enclosure rear view: CONTROLLER-B | | | | | | H E | | | E CONTROLLER-A H | | | OP-PANEL | | | +--------------------------------------------------------------------------------------------+ +--------------------------------------------------------------------------------------------+ test enclosure test topology <port> duration <minutes> Test the connections in the enclosure topology.ctrl.B.ctrl.H: 4.H: 4.E 4.E enc.E 2.A.B.E 2.ctrl.H: 3.port enc. 2 Command Reference Guide .118 EMC DD OS 5. and start and stop filesystem processes. Command output for disk space or the amount of data on disks is computed using base-2 calculations. capacity.filesys The filesys command displays statistics. See “How Data Values Are Calculated” for details. The filesys clean command options reclaim physical storage within the filesystem. Command options also clear the statistics file. status. and utilization of the filesystem. Options include:               archive clean create destroy disable enable encryption expand fastcopy option restart show status sync filesys 119 . 2 New command options: filesys encryption key-manager disable filesys encryption key-manager enable filesys encryption key-manager reset filesys encryption key-manager set {server <server-name> | port <portnumber> | fips-mode {enabled | disabled} | key-class <key-class> | server <server-name> port <port-number> fips-mode {enabled | disabled} key-class <key-class>} filesys encryption key-manager show filesys encryption keys delete <keyid> filesys encryption keys destroy <keyid> filesys encryption keys show [<keyid>] filesys encryption keys sync Deprecated command option: filesys encryption keys detailed show filesys encryption passphrase change (See “system passphrase change. including arguments. command options for encryption require security officer authorization. See the EMC DD OS Release Notes of the corresponding version for details on modifications. output.”) Guidelines and Restrictions  Unless otherwise noted. See “Enabling Security Officer Authorization” for instructions. Version Change 5. In addition to admin permissions.Change History Click the command option for details on usage and functionality.  120 EMC DD OS 5.2 Command Reference Guide . and permissions. command options are available only to users with admin role permissions. or both. clean filesys clean reset {schedule | throttle | all} Reset the clean schedule to the default of Tuesday at 6 a. (tue 0600). archive The filesys archive command option is specific to a DD Extended Retention system. (tue 0600). filesys clean set schedule [daily | monthly | never] <day(s)> <time> Set schedule for the clean operation to run automatically. This command destroys all data in the archive unit. It enables administrative users to provision the filesystem with tiered storage. filesys 121 . filesys archive unit add Create an archive unit from the archive tier of the filesystem. An archive unit can be deleted from the tier only when the Data Domain system filesystem is disabled. the default throttle of 50 percent. Disabling the filesystem stops all Data Domain system operations. See the DD Extended Retention Administration Guide (formerly DD860 Archiver Administration Guide) for details on command usage and examples. and add the new archive unit to the filesystem.m. change the state of disks or LUNs from available to in-use. Files within the archive unit must be deleted to remove them from the namespace.m. filesys archive unit expand <archive-unit> Expand the size of the specified archive unit. filesys archive unit del <archive-unit> Delete a specific archive unit and change the state of disks or LUNs to available. Also view the list of archive unit sizes available in the archive tier. including filesys clean. filesys archive unit list [<archive-unit> | all] List all archive units or a specific archive unit. note This command option is not available on a Retention Lock Compliance system.Options The following options are available with this command. Default is Tuesday at 6 a. At 100 percent.m.: # filesys clean set schedule tue 1600 Example 2 To run the operation more than once in a month. Example 1 To run the clean operation automatically every Tuesday at 4 p. cleaning uses system resources in the standard way. cleaning runs at 100 percent. For example. Argument Definitions daily Runs command every day at the set time. However. time Time is 24-hour format. enter: # filesys clean set schedule monthly 1. 2400 is not a valid time. day(s) Runs on the day or days specified. if there is no shortage of disk space you may clean less often. to clean the filesystem on the first and fifteenth day of the month at 4 p.. 122 EMC DD OS 5. Days are entered as integers ranging from 1 to 31. The time mon 0000 is midnight between Sunday night and Monday morning.Data Domain recommends running the clean operation once a week to maintain optimal availability of the filesystem.15 1600 filesys clean set throttle <percent> Set clean operations to use a lower level of system resources when the Data Domain system is busy. never Turns off the clean schedule. At zero percent.m. Days are entered as integers ranging from 1 to 31. When the Data Domain system is not running backup or restore operations. depending on how busy the system is. Default is 50 percent. A new set schedule command cancels the previous setting. set multiple days in a single command. cleaning runs slowly or not at all. monthly Starts command on a the day or days specified at the set time.2 Command Reference Guide . Restarting the process means starting from the beginning. filesys clean show schedule Display current date and time for the clean schedule. All users may run this command option. total 8:53:21 filesys clean stop Stop the clean process. 2496 GiB free. All users may run this command option. filesys 123 . time: phase 1:06:32.Example To set the clean operation to run at 30 percent of its potential speed: # filesys clean set throttle 30 filesys clean show config Display settings for filesystem cleaning. Example # filesys clean show schedule Filesystem cleaning is scheduled to run "Tue" at "0600". filesys clean show throttle Display throttle setting for cleaning. filesys clean status Display status of the clean process. All users may run this command option. a message is sent to the system log citing the percentage of available storage space. All users may run this command option. Example # filesys clean show config 50 Percent Throttle Filesystem cleaning is scheduled to run "Tue" at "0600". Example # filesys clean status Cleaning started at 2009/02/06 10:21:51: phase 6 of 10 64. When the process finishes. Example # filesys clean show throttle 100 Percent Throttle filesys clean start Start clean process manually. Stopping the process means all progress is lost.6% complete. Enable the filesystem using 'filesys enable' destroy filesys destroy [and-zero] Delete all data in the Data Domain system filesystem including data configured with Retention Lock Governance.2 Command Reference Guide . note Because some files may be dropped during verification. You now have a freshly initialized filesystem. filesys clean watch Monitor the filesys clean process. This is expected behavior. Press Ctrl-C to stop monitoring. note This command option is not available on a Retention Lock Compliance system. create filesys create Create a filesystem or associated RAID disk group with available and spare storage in the active tier. output of the percent completion phase may not reach 100%. Changes to system resource usage take effect immediately. 124 EMC DD OS 5. and return filesystem settings to defaults. run the filesys clean set throttle command to change the amount of system resources used by the clean process.If the clean process slows down the system. remove Replicator configuration settings. . Reporting concludes after the final phase. Are you sure? (yes|no?) [no]: y . . For example. All users may run this command. Note the filesys clean process continues to run. Output of this command continuously updates as the filesys clean operation progresses. Example # filesys create The filesystem of size 2TiB will be created. NFS clients connected to the Data Domain system may require a remount. When this process is finished. Change the state from Available to In Use. output of verification phase shows the actual number of files moved to the target. Security officer authorization is required if there is time skew in the system clock. The aes_256_gcm option (AES in the Galois/Counter mode). you must restart the filesystem with the filesys restart command option. This requirement provides an audit trail for changes to data encryption status. Output indicates changes are pending. disable filesys disable Stop filesystem operations. is the most secure algorithm. if applicable. Disks are not overwritten with zeroes unless you specify the and-zero option. even if the disks have not been overwritten with zeroes. Filesystem data marked deleted cannot be recovered. Encryption changes are applied to all data in the Data Domain system during the next cleaning cycle. you must run filesys disable and enter security officer credentials. See the section on Retention Lock Compliance in the EMC Data Domain Administration Guide for details. filesys encryption algorithm set {aes_128_cbc | aes_256_cbc | aes_128_gcm | aes_256_gcm} Select the encryption algorithm. but is significantly slower than Cipher Block Chaining (CBC) mode. See “Enabling Security Officer Authorization” for details. The and-zero option adds several hours to the destroy operation. filesys 125 . filesys encryption apply-changes Update filesystem with current encryption configuration. Before you run this command. It is not supported on Data Domain gateway systems. encryption filesys encryption algorithm reset Reset the algorithm to the default: aes_256_cbc. you must restart the filesystem with the filesys restart command option. After running this command. enable filesys enable Start the filesystem operations. filesys encryption disable Deactivate encryption. filesys encryption algorithm show Display encryption algorithm. this command only marks the filesystem data as deleted.By default. After running this command. the RSA Data Protection Manager (DPM) key manager is available for external encryption key management. the key size must be 256 bits. you must restart the filesystem with the filesys restart command.2 Command Reference Guide . This command option requires security-officer authorization.2. RSA Data Protection Manager (DPM) supports three attributes of a Key Class Cipher including Algorithm. As in previous releases. Please present credentials for such a user below. 126 EMC DD OS 5. The RSA DPM Key Manager enables the use of multiple.Example # filesys encryption disable This command requires authorization by a user having a 'security' role. Additionally. Username: so_user1 Password: The encryption feature is now disabled. filesys encryption key-manager enable Beginning with version 5. The filesystem continues to use the latest Activated-RW key for encrypting the data. DPM supports a maximum of 254 keys. otherwise the DPM configuration will fail. rotating keys on a Data Domain system. Data Domain does not use the attributes Algorithm and Mode from RSA DPM. Key Size. See the section on key management in the EMC Data Domain Administration Guide for additional information. The local encryption key administration method is also available. The filesystem must be restarted to effect this change. and Mode. filesys encryption key-manager disable Key rotation policy is disabled. These attributes are configured using the command option: filesys encryption algorithm set {aes_128_cbc | aes_256_cbc | aes_128_gcm | aes_256_gcm}. filesys encryption key-manager set {server <server-name> | port <port-number> | fips-mode {enabled | disabled} | key-class <key-class> | server <server-name> port <port-number> fips-mode {enabled | disabled} key-class <key-class>} Specify the attributes of the key-manager. filesys encryption key-manager reset Clear the attributes of the key-manager. After running this command. filesys encryption enable Activate encryption for new data written to the filesystem and specify a new passphrase. When setting up a Key Class in RSA DPM for use with a Data Domain system. the local key manager provides a single encryption key for each Data Domain system. Default is enabled.” In this release. After the key is destroyed. the key is no longer used for reading or writing. filesys 127 . This command option requires security officer authorization. however. fips-mode Use the argument disabled if the imported certificate for key management is not in FIPS mode.scmc. Only a Destroyed-Compromised key or a Destroyed key can be deleted. Choices for the RSA DPM attribute Get Key Behavior of a Key Class are “New Key Each Time” or “Use Current Key. the Data Domain system does not receive the correct key to encrypt the data.” filesys encryption keys destroy <keyid> Destroy the specified encryption key if all data encrypted with the key requires re-encryption. key-class The key class configured on the key manager for the Data Domain system. See “Enabling Security Officer Authorization. Data Domain supports the Key Class “Use Current Key” only. An error message is not issued if the Key Class is incorrectly configured to generate a new key each time. This command option requires security officer authorization. port The port number of the RSA server on which the key manager is listening. Example # filesys encryption key-manager show Key Manager: Enabled Server: testmachine. See the EMC Data Domain Administration Guide for descriptions of key states.local Port: 38443 Fips-mode: enabled Status: Online Key-class: qa_gui_2 filesys encryption keys delete <keyid> Delete the key from the filesystem after the number of keys has exceeded 254. Argument Definitions server The name of the RSA key manager server or IP address.note A Data Domain system retrieves a key from RSA DPM by Key Class. filesys encryption key-manager show Display details about the key manager. Data Domain supports the Key Class “Use Current Key” only. the new key is used for reading and writing. Example 2 # filesys encryption keys show 1 Key Id Key MUID State Type Start Date End Date 1 e03a6b9fff773c3a67167a9e0ec700260a0592d1662d0633416ae0f1785f9131 Activated-RW RKM Tue Nov 22 11:32:03 2011 Never Create Date Tue Nov 22 11:32:03 2011 filesys encryption keys sync Synchronize the key manager encryption keys.” In this release.filesys encryption keys show [<keyid>] Display the key-manager attributes. the Data Domain system does not receive the correct key to encrypt the data.2 Command Reference Guide . An error message is not issued if the Key Class is incorrectly configured to generate a new key each time. When the filesystem is restarted. however. an alert is generated. note A Data Domain system retrieves a key from RSA DPM by Key Class. A key that is destroyed in RSA DPM will not be marked for destroyed on the Data Domain system. See the EMC Data Domain Administrator’s Guide “Managing Encryption of Data at Rest” for details on how to destroy a key. 128 EMC DD OS 5. If a new key is detected. Choices for the RSA DPM attribute Get Key Behavior of a Key Class are “New Key Each Time” or “Use Current Key. Example 1 # filesys encryption keys show Key Id Key MUID State Size post-comp --------------------------------------------------------------------------------------------------------------------------------------1 e03a6b9fff773c3a67167a9e0ec700260a0592d1662d0633416ae0f1785f9131 Activated-RW - --------------------------------------------------------------------------------------------------------------------------------------* Post-comp size will be updated after next cleaning cycle. Example # filesys disable Please wait.. After running this command. filesys encryption show Check the status of the encryption feature. Before locking the system.. This command is useful when preparing a Data Domain system and its external storage devices for shipment. Before you run this command. you must run filesys disable and enter security officer credentials.. The filesystem is now locked. The filesystem is now disabled.. Data cannot be recovered without the new passphrase. # filesys encryption lock This command requires authorization by a user having a 'security' role. Username: so_user2 Password: Enter the current passphrase: Enter new passphrase: Re-enter new passphrase: Passphrases matched. See “Enabling Security Officer Authorization” for instructions. verify there are no keys in a compromised state.. Example # filesys encryption show Encryption is enabled (Encryption 'disable' change is pending*) Algorithm: aes_256_cbc (Algorithm 'aes_128_cbc' change is pending*) The filesystem is unlocked * The filesystem must be restarted to effect this change. Data Domain recommends keeping a record of the passphrase in a safe location. if applicable. Output indicates changes are pending. Data Domain recommends performing a filesystem clean procedure prior to locking the system. the system encryption keys are unrecoverable until the system is unlocked with the system passphrase... Please present credentials for such a user below. For security purposes. filesys 129 . New passphrases are not stored and can be forgotten...filesys encryption lock Lock the system by creating a new passphrase and destroying the cached copy of the current passphrase. Snapshots always reside in /backup/.snapshot/fast\ copy destination /data/col1/backup/dir2 Argument Definitions source <src> The location of the directory or file to copy. The first part of the path must be /backup. destination <dest> The destination for the directory or file being copied.2 Command Reference Guide .  Enclose the entire source pathname with double quotation marks: filesys fastcopy "/data/col1/backup/. expand filesys expand Increase the filesystem by using all space in the active tier. Do not add quotation marks: filesys fastcopy /data/col1/backup/.snapshot/fast copy" destination /data/col1/backup/dir OR  Enter a backslash before the space. 130 EMC DD OS 5.filesys encryption unlock The filesystem is locked automatically after a headswap or chassis swap. fastcopy filesys fastcopy source <src> destination <dest> Copy a file or directory tree from a Data Domain system source directory to another destination on the Data Domain system.snapshot. The destination cannot already exist. Source names <src> that include spaces or special characters must be entered according to the following conventions. Use this command option to unlock the filesystem. Use the snapshot list command to list existing snapshots. report-replica-as-writable Reset the filesystem to read-only. Only when a filesys destroy command is entered does the type used change to the default of 9. With CIFS. staging-reserve Set staging reserve percentage from 0 to 90. With CIFS. Use the filesys disable command before changing this option and use the filesys enable command after changing the option. filesys option reset {local-compression-type | low-bw-optim | marker-type | report-replica-aswritable | global-compression-type} | staging-reserve | staging-clean | staging-delete-suspend | compute-segfeatures} Return filesystem compression to the default settings on the destination Data Domain system. The filesystem continues to use the current type.option filesys option disable report-replica-as-writable Set the reported read/write status of a replication destination filesystem to read-only. Argument Definitions local-compression-type Reset the compression algorithm to the default of lz. low-bw-optim Display if low-bandwidth optimization is enabled. filesys 131 . use the cifs disable command before changing the option and use the cifs enable command after changing the option. use the cifs disable command before changing the option and use the cifs enable command after changing the option. Low-bandwidth optimization is not supported in Global Deduplication arrays. Use the filesys disable command before changing this option and use the filesys enable command after changing the option. global-compression-type Remove a manually set global compression type. marker-type Return the marker setting to the default of auto. filesys option enable report-replica-as-writable Set the reported read/write status of a replication destination filesystem to read/write. Data Domain recommends the lz option. Argument Definitions none No data compression occurs. If not. filesys option set staging-reserve <percent> Reserve a percentage of total disk space for disk staging.filesys option set global-compression-type {1 | 9} Set the global compression of data to type 9 (new type) or type 1 (previous type). This behavior reduces overhead of the cleaning process. gzfast A zip-style compression that uses less space for compressed data. The system transitions to the new compression type as backups expire. the change is applied only to new data and data accessed during subsequent clean operations. but also uses the most CPU cycles (up to twice as many as lz). the command fails with an error message. If the filesystem is over 40 percent full. gz A zip-style compression that uses the least amount of space for data storage (10% to 20% less than lz). but more CPU cycles. If local compression is changed from the default value of lz. gzfast is the recommended alternative for sites that want more compression at the cost of lower performance. 132 EMC DD OS 5. Example # filesys option set global-compression-type 1 # filesys disable # filesys enable filesys option set local-compression-type {none | lz | gzfast | gz} Set compression algorithm. Enter the filesys disable and filesys enable commands for the change to take effect. use the filesys disable and filesys enable command options. To enable the new setting. lz The default algorithm that gives the best throughput. replication stops. Compression type must be the same on each side of a directory replication pair.2 Command Reference Guide . files and directories in the filesystem. specify one of the system options. report-replica-as-writable Display the current reported setting on the destination Data Domain system. filesys 133 . See the DD Extended Retention Administration Guide for details. and compression achieved for. By default. Argument Definitions local-compression-type Display the current compression algorithm. restart filesys restart Disable and enable the filesystem in a single operation. global-compression-type Display the current global compression type. information is also shown for the active or archive tiers. staging-reserve Set staging reserve percentage from 0 to 90. To limit the output to a single system option. marker-type Display the current marker setting. all filesystem options are displayed. See “How Data Values Are Calculated” for details. low-bw-optim Display if low-bandwidth optimization is enabled.filesys option show [{local-compression-type | low-bw-optim | marker-type | report-replica-aswritable | global-compression-type | staging-reserve | staging-clean | staging-delete-suspend | compute-segfeatures} Show the filesystem option settings. show filesys show compression [<filename>] [last <n> {hours | days}] [no-sync] filesys show compression [tier {active | archive}] summary | daily | daily-detailed {[last <n> { hours | days | weeks | months }] | [start <date> [end <date>]]} Display the space used by. When used on a DD Extended Retention system. Values are reported in Gigibytes (GiB). The statistics for the last 24 hours remain in the summary output. Note that the display on a busy system may not return for several hours. Data written in the last 7 days. include the no-sync option. Other factors may influence the display. no-sync (Optional) Display compression statistics for a specific file or directory without first synchronizing all modified files to disk. last <n> {hours | days | weeks | months} (Optional) In the summary portion of the output. Depending on the number of files in the filesystem. By including the last <n> option or the start <date> option. but uses a dash instead. you can display statistics for a time frame other than the last 7 days.In general. Argument Definitions <filename> filename (Optional) Synchronize all modified files to disk and then display compression statistics for the specified file or directory only. depending on the number of files. summary (Optional) Display all compression statistics. you cannot use this option with the weeks keyword or the months keyword. Data written in the last 24 hours. To display compression statistics for a specific file or directory without first synchronizing all modified files to disk. the more often a backup procedure is run on a file or filesystem. Output includes details on active and archive tiers for the DD Extended Retention system only. summarized in the following categories: Storage currently used. specifying a file name could cause this command to process for several hours before completing. Running the command without arguments generates default output that displays a summary of compression statistics for all files and directories in the filesystem for the last 7 days and the last 24 hours. If you specify a file or directory name. the higher the compression.2 Command Reference Guide . display filesystem compression statistics for the specified time frame instead of for the past 7 hours. 134 EMC DD OS 5. The output does not include global and local compression factors for the Currently Used table. and a table of currently used storage. The statistics for the last 24 hours will remain in the summary output. output includes information on active tier only. This option is not available if you specify a file or directory name. On a standard Data Domain system. over the previous four full weeks. start <date> (Optional) In the summary portion of the output. By default. “2011-04-07”). # filesys show compression Active Tier: Pre-Comp (GiB) Post-Comp (GiB) Global-Comp Factor Local-Comp Factor Total-Comp Factor (Reduction %) -------------------------------------------------------------------------------------------------------------------------------------------------------------Written: Last 33 days Last 24 hrs 122518. plus the current partial week. This option is not available if you specify a file or directory name. In the summary portion of the output. the last day of the time frame specified with this argument is the most recent. Example The following example shows sample output from a DD Extended Retention system.6) 49159570.5x 2. the higher the compression. but also include the following information for each day.6x 1. depending on the number of files. the more often a backup is done for a particular file or filesystem.5x 17828639.0 2. In general. this process may not complete for several hours. display filesystem compression statistics for the time frame that begins on the specified day instead of the past 7 hours. full day elapsed. end <date> (Optional) Valid only if the start option is used. It includes summary information for active and archive tiers. display filesystem compression statistics for the time frame that ends on the specified day.9 0. Other factors may also affect results.8x (73.9 32314.3x (100. plus the current full week. Specify <date> in the format <yyyy>-<mm>-<dd> (for example. On a busy system. daily-detailed (Optional) Display the daily output. the daily or daily-detailed output (if specified) is truncated to the shorter time frame.0) -------------------------------------------------------------------------------------------------------------------------------------------------------------* Does not include the effects of pre-comp file deletes/truncates since the last cleaning on 2011/04/07 13:56:59. filesys 135 . If you specify a time frame less than the previous four weeks.daily (Optional) In addition to the summary output.6 127. display the following information for each day.8x 3. 8x (73. Global-Comp Factor Ratio of Pre-Comp / (size after global compression). Not applicable to the storage currently used.Post-Comp) / Pre-Comp) * 100.6) 49159570. Reduction % Percentage value (Pre-Comp .7x (78.8 -------------------------------------------------------------------------------------------------------------------------------------------------------------- Output Definitions Pre-Comp Data written before compression.----------. Post-Comp Storage used after compression. 136 EMC DD OS 5. Currently Used: Pre-Comp (GiB) Post-Comp (GiB) Global-Comp Factor Local-Comp Factor Total-Comp Factor (Reduction %) -------------------------------------------------------------------------------------------------------------------------------------------------------------Active Archive Total 86625.6 127.---------.0 2.5x 17828639. Local-Comp Factor Ratio of (size after global compression)/Post-Comp.3x (100.5x 2.6 18365.9 0.9 32314. Total-Comp Factor Ratio of Pre-Comp / Post-Comp.--------.Archive Tier: Pre-Comp (GiB) Post-Comp (GiB) Global-Comp Factor Local-Comp Factor Total-Comp Factor (Reduction %) -------------------------------------------------------------------------------------------------------------------------------------------------------------Written:* Last 33 days Last 24 hrs 122518.7x (78. This is the default output format.2 Command Reference Guide .0) --------------.9 86625.------------------* Does not include the effects of pre-comp file deletes/truncates since the last cleaning on 2011/04/07 13:56:59.-------. Not applicable to the storage currently used.9 ******* 18365.6 ******* 4.8 4.8x 3.6x 1. 5 Avail GiB 21068. The following example shows filesystem space on a standard Data Domain system: # filesys show space Active Tier: Resource /data: pre-comp /data: post-comp /ddvar Size GiB 21563. filesys 137 . Specify the fully qualified path to the file.6 Use% 2% 46% Cleanable GiB 83. Command output displays space availability and usage information for the following filesystem components: /data: pre-comp Amount of virtual data stored on the Data Domain system.9 Used GiB 8805. Use% Ratio of data stored to total capacity. Used GiB Amount of data stored on a filesystem resource. multiplied by 100.5 58.7 495.filesys show file-info <filename> Display detailed information about the specified file. Values are reported in Gigibytes (GiB).0 ------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------- Output Definitions Size GiB Total storage capacity of a filesystem resource. filesys show space Display the space available to and used by filesystem resources.4 67. Cleanable GiB Estimated amount of recoverable free space. Avail GiB Amount of free space on a filesystem resource. Virtual data is the amount of data sent to the Data Domain system from backup servers. See “How Data Values Are Calculated” for details.9 132. 95%. /ddvar Approximate amount of space used by and available to the log and core files. If Use% is always high. At 100%./data: post-comp Amount of total physical disk space available for data. remove old logs and core files. The index expansion takes space from the Avail GiB amount. and minutes. Warning messages go to the system log and an email alert is generated when the Use% figure reaches 90%. Example # filesys status The filesystem is disabled and shutdown. 23:28 status filesys status Display the state of the filesystem process. hours. Example # filesys show uptime Filesys has been up 47 days. actual physical space used for compressed data. and physical space still available for data storage. Use filesys clean schedule to run the operation more often. The total amount of space available for data storage can change because an internal index may expand as the Data Domain system fills with data. such as filesys disable. The display is in days. [filesys disable] 138 EMC DD OS 5. the Data Domain system stops accepting data from backup servers. To free space in this area.2 Command Reference Guide . and 100%. use the command option filesys clean show-schedule to see how often the cleaning operation is scheduled to run automatically. filesys show uptime Display the amount of time passed since the filesystem was last enabled. the display includes the command. Example # filesys status The filesystem is enabled and running If the filesystem was shut down with a Data Domain system command. It is the only command that reclaims physical storage used by files that are deleted and not present in a snapshot. Cleaning is a self-throttling process that gives up system resources in the presence of user traffic.824 bytes 1 TiB = 240 bytes = 1. If a source Data Domain system receives large amounts of new or changed data while replication is disabled or disconnected. An immediate clean operation increases compression by another factor of 1.2 and reclaims a corresponding amount of disk space. More About Filesystem Cleaning The filesys clean command reclaims physical storage on the Data Domain system.5. Any operation that shuts down the Data Domain system. How Data Values Are Calculated 1 KiB = 210 bytes = 1024 bytes 1 MiB = 220 bytes = 1. Data Domain recommends running a clean operation after the first full backup to a Data Domain system.776 bytes filesys 139 .sync filesys sync Synchronize modified files to disk. During the clean operation. Additional Topics This section provides additional information on various topics and concepts. the Data Domain system is available for backup (write) and restore (read) operations. such as disabling the filesystem or performing a power-off or reboot. stops the clean operation. You must restart the clean manually or wait until the next scheduled clean operation.048. The clean does not restart when the system and filesystem restart.511. Replication between Data Domain systems can affect filesys clean operations.741.15 to 1.099.576 bytes 1 GiB = 230 bytes = 1. resuming replication may significantly delay filesys clean operations. Cleaning becomes inefficient during a large replication process because what is not replicated is not cleaned.627. The initial local compression on a full backup is typically a factor of 1.073.5 to 2. To enable security officer authorization: 1. Enabling Security Officer Authorization Filesystem encryption. create a security officer role. No storage was added to the active tier before the filesys create command option was run. See “user” for instructions on creating the role and for details about the role. See the log file reference in the error message. error messages may be generated when creating a filesystem. 140 EMC DD OS 5.<number> This is a general error message. and then retry creating the filesystem. Error creating filesystem. 2. Log stored in /ddr/var/log/debug/create. Run the command option authorization policy set security-officer enabled. Use the storage add command option to add disks or LUNs to the tier.2 Command Reference Guide . The filesystem was not destroyed before the filesys create command was run. There is no storage available for creation. Run the filesys destroy command. Log in as a security role. decryption. If necessary. and then retry the filesys create command. and managing systems enabled for Retention Lock Compliance require admin role permissions and security officer authorization. A filesystem already exists.Error Messages Occasionally. See the EMC DD OS Release Notes of the corresponding version for details on modifications. You can also search for command options using keywords. for example.help The help command displays Help files for Data Domain system commands. and permissions.2 No changes from previous version. Press Tab to complete an entry. sample output. and for most commands. including arguments. Change History Click the command option for details on usage and functionality. Typically. Use the q key to exit. For a description of a single command. Entering the help command without an object displays the complete list of Data Domain system commands. Enter a slash (/) to move forward and a question mark (?) with a pattern to search for and highlight lines of interest. information that does not appear in the Help files is available in the EMC Data Domain Administration Guide. the entire Help page for the command displays. including syntax. help filesys. Use the up and down arrow keys to move through a help page. Version Change 5. options. If the keyword is the same as a command name. output. help 141 . Guidelines and Restrictions      All users may run this command option. include the command name as the object. 142 EMC DD OS 5.2 Command Reference Guide . 2 No changes from previous version. including arguments. output. Options include:         config disable enable remote console remote power reset show user Change History Click the command option for details on usage and functionality. Version Change 5. See the EMC DD OS Release Notes of the corresponding version for details on modifications. Command options enable administrators to monitor remote systems and to power the systems on or off as required. ipmi 143 . and permissions. The Serial-Over-LAN (SOL) feature is used to view the serial output of a remote system boot sequence. see the EMC Data Domain Operating System Offline Diagnostics Suite User’s Guide.ipmi The ipmi command monitors and manages a Data Domain system deployed remotely. For more information. If configuring a static IP. or all systems. command options are available only to users with admin role permissions. See the EMC Data Domain Administration Guide for instructions on managing remote systems. you must provide the BMC IP address. netmask. disable ipmi disable {<port> | all} Disable IPMI remote access to a single system. config ipmi config <port> {dhcp | ipaddress <ipaddr> netmask <mask> gateway <ipaddr>} Configure the IPMI static or dynamic IP address of a BMC. Options The following options are available with this command. IPMI (on/off/cycle/status) is not supported on the following models:      DD140 DD610 DD630  SOL (serial-over-LAN) is not supported on the following models:        DD120 DD140 DD5xx DD610 DD630 DD660 DD690/g See Additional Topics for the lists of models that support IPMI and SOL. and gateway address.Guidelines and Restrictions  Unless otherwise noted.2 Command Reference Guide . 144 EMC DD OS 5. Users cannot log in to IPMI via SSH. See “Setting Up IPMI” for details. reset ipmi reset Reset LAN and SOL configuration and clear all IPMI users.enable ipmi enable {<port> | all} Enable IPMI remote access to a single system. remote console ipmi remote console ipmi-target <ipaddr | hostname> user <user> [password <password>] Activate SOL mode to view serial console of a remote Data Domain system.25. Example # ipmi remote power cycle ipmi-target 10. show ipmi show config View the configuration of local IPMI interfaces. or to all systems. See “Viewing Serial Output of a Remote System” for instructions. or power cycle a remote target system from an initiator system. Are you sure? (yes|no|?) [no]: yes ok. gateway. ipmi 145 .220.220. proceeding. and MAC address. Please use serial-over-lan or serial console to view boot status.197 user sysadmin The 'ipmi remote power cycle' command turns off the power without shutting down the system gracefully and file access will be interrupted. power off. Output includes the dynamic or static IP address. Remote target 10.25. remote power ipmi remote power {on | off | cycle | status} ipmi-target <ipaddr | hostname> user <user> [password <password>] Power on. netmask.197 has been power CYCLED. 59 IPMI Version Port ------------bmc-eth0 bmc-eth1 -------. These include models DD640.----: 2.0* -----------Gateway ----------------192. Link status cannot be determined on Data Domain systems with a dedicated IPMI port. including names. Example # ipmi show hardware Firmware Revision: 0. The Link Status column shows if the LAN cable is connected to the LAN-IPMI shared port.10. IDs. ipmi user del <user> Delete an IPMI user. ipmi user list View a list of IPMI users. and DD890.2 Command Reference Guide . DD860. 146 EMC DD OS 5.---DHCP -------yes -------IP address ------------------192. DD670.168.168. manufacturer.252. and permissions.Example # ipmi show config Console: serial Port -----bmc0a -----Enabled ------. ipmi user change <user> [password <password>] Change the password of an IPMI user.11.165* ------------------Netmask -----------255.255.1* ----------------- * Value from DHCP ipmi show hardware View the port names and firmware version of the local BMC. MAC addresses.0 MAC Address -------------------------00:15:17:30:2d:72 00:15:17:30:2d:73 --------------------------Link Status ----------yes no ----------Manufacturer Name: Intel Corporation user ipmi user add <user> [password <password>] Add new IPMI user.---yes ------. Output also includes the IPMI version. Additional Topics This section provides additional information on various topics and concepts. we recommend running this command to clear IPMI users who may be out of synch between two ports. and to disable default users.ipmi user reset Clear all IPMI users. Supported Models-IPMI            DD120 DD160 DD510/530/565/580/580g DD620 DD640 DD660 DD670 DD690 DD860 DD880/g DD890 Supported Models-SOL        DD160 DD620 DD880/g DD640 DD670 DD860 DD890 ipmi 147 . If this is the first time using IPMI. Adjust the BIOS settings according to model.220. For models DD160 and DD620.Viewing Serial Output of a Remote System The Serial-Over-Lan (SOL) feature enables viewing text-based serial output without a serial server. DD890. Use @? for help] Data Domain OS 0. DD640. connect LAN to maintenance port.0-191797 localhost.197 user sysadmin Please enter user password: [SOL Session operational. and DD670.0. which is shared by LAN and BMC. Connect LAN cable to LAN port. Note the following exceptions:  For models DD860. The following example shows how to enter SOL mode and view the serial output of a remote Data Domain system: # ipmi remote console ipmi-target 10. connect LAN cable to upper port (eth0a). DD880g. 148 EMC DD OS 5. Model DD640.localdomain login: Disconnecting from an SOL Session Enter the symbol @ to disconnect from a session and return to the command line. Setting Up IPMI How you set up IPMI on a Data Domain system varies depending on model number. It is used in combination with the remote power cycle command to view the remote system’s boot sequence.  2. 1.86.2 Command Reference Guide . DD670.25. DD890 BIOS Settings Use default settings. DD860. Disconnecting from the Initiator Enter the symbol ~ to disconnect from the initiator system completely. 4. and to disable default users. DD620 BIOS Settings Press F2 to go to BIOS. If this is the first time using IPMI. run the command option system option set console lan. ipmi 149 .6K 3.6K DD120. DD510. 8. To add a new IPMI user. DD660. run ipmi user reset to clear IPMI users that may be out of synch between two ports. DD690 Press F2 to go to BIOS. To set up SOL.  Advanced > Serial Port Configuration > Serial B Enable [Enabled]. Run ipmi show config to get the port name. Run ipmi config port { dhcp | ipaddress <ipaddr> netmask <mask> gateway <ipaddr> } to configure an IPMI port. DD530.Model DD160.  Server > Set AST1000/2000 LAN Configuration > BMC LAN Enable  Server > Remote Access Configuration Remote Access = enable Serial Port = com2 Serial port mode = 9600 Flow control = none Redirection = always Terminal type = vt100  Server Management > Console Redirection > Serial Port B > Baud Rate 9. enter y to reboot the system. DD580g. When prompted. 7. 6. run the command option ipmi user add user [password <password>]. DD565.  Server Management > Console Redirection > Serial Port B > Baud Rate 9. 5. DD580. DD640. DD860.Number of Supported IPMI Users Model DD880g Number of Users Maximum user IDs = 15. DD690 150 EMC DD OS 5. root). Net maximum available for use = 14. Default user = 1 (root) Net maximum available for use = 9. Default user = 1 (NULL). DD5xx. Default user = 2 (NULL. DD890 DD160. Default user = 1 (root). DD630 DD120. Maximum user IDs = 10. Net maximum available for use = 9. Maximum user IDs = 10. DD670.2 Command Reference Guide . Net maximum available for use = 8. Maximum user IDs = 10. DD660. Include dashes when entering the license code.] Add one or more licenses for features and storage capacity. Version Change 5. Guidelines and Restrictions  Unless otherwise noted. See the EMC DD OS Release Notes of the corresponding version for details on modifications. deletes. add license add <license-code> [<license-code> . Include the hyphens when entering codes. command options are available only to users with admin role permissions. License codes are case-insensitive. including arguments.2 Licenses for Retention Lock Compliance and Retention Lock Governance added.. See the EMC Data Domain Administration Guide for details on Retention Lock software options. This command option may run on a standalone Data Domain system or on the master controller of a Global Deduplication Array.license The license command adds.  Options The following options are available with this command. and resets keys for licensed features and storage capacity. Options include:     add delete reset show Change History Click the command option for details on usage and functionality.. output. license 151 . and permissions. In a GDA configuration. Licenses cannot be reset on a Global Deduplication Array.. This command option requires security officer authorization if removing licenses from Retention Lock Compliance systems.] | <license-code> [<license-code> .2 Command Reference Guide . License code "MMNN-OOQP-NMPQ-PMNM" deleted. Example # license del EEFF-GGHH-JJII-LLKK MMNN-OOQP-NMPQ-PMNM STXZ-ZDYSGSSG-BBAA License code "EEFF-GGHH-JJII-LLKK" deleted.Example # license add ABCD-DCBA-AABB-CCDD BBCC-DDAA-CCAB-AADD-DCCB- BDAC-E5 Added "ABCD-DCBA-AABB-CCDD" : REPLICATION feature Added "BBCC-DDAA-CCAB-AADD-DCCB- BDAC-E5" : CAPACITY-ARCHIVE feature for 6TiB capacity ES20 delete license del <license-feature> [<license-feature> .. run this command on the master controller. Security officer authorization is required to delete licenses from Retention Lock Compliance systems only. License code "STXZ-ZDYS-GSSG-BBAA" deleted.. If the local argument is included in the option. 152 EMC DD OS 5. show license show [local] View license keys and features..] Delete one or more software option licenses. reset license reset Remove all licenses. output includes details on local node only.            DD Boost Extended Retention (formerly “Archiver”) Encryption Expanded Storage Global Deduplication Array (GDA) I/OS Replication Retention Lock Compliance Retention Lock Governance Shelf Capacity Virtual Tape Library (VTL) license 153 .Additional Topics This section provides additional information on various topics and concepts. See the Data Domain documentation set or visit the Support portal for details. Required Licenses The following software options require separate licenses. 2 Command Reference Guide .154 EMC DD OS 5. info files are exported.info log files).* Send all messages from system startups (boot. Messages from the alerts feature.alert Send all messages at the alert priority and higher (alerts are included in *. the autosupport reports. See the EMC DD OS Release Notes of the corresponding version for details on modifications.log The log command manages and displays the Data Domain system log file. Version Change 5.log files). A log entry appears for each Data Domain system command given on the system. See the vendor-supplied documentation for details on managing the selectors and receiving messages on a third-party system. and general system messages are sent to the log directory (/ddvar/log).2 No changes from previous version.notice Send all messages at the notice priority and higher. The Data Domain system sends the log in the standard syslog format. *. kern.notice). When remote logging is enabled. all messages in the messages and kern. Options include:     host list view watch Change History Click the command option for details on usage and functionality. and permissions. log 155 .* Send all kernel messages (kern. local7. Data Domain systems can send network log messages to other systems enabled to listen. output. Message selectors include: *. including arguments. Options The following options are available with this command. 156 EMC DD OS 5. command options are available only to users with admin role permissions. log host reset Reset the log sending feature to the defaults of disabled and an empty list.Guidelines and Restrictions Unless otherwise noted. log host enable Enable sending log messages to other systems. Example To add the system log-server to the hosts that receive log messages: # log host add log-server log host del <host-name> Remove a system from the list of systems that receive Data Domain system log messages. log host show Display the list of systems that receive log messages and are in the state of enabled or disabled. host log host add <host-name> Add a system to the list that receives Data Domain system log messages.2 Command Reference Guide . Example To remove the system log-server from the hosts that receive log messages: # log host del log-server log host disable Disable sending log messages to other systems. Output Definitions (Without Debug Option) messages The system log. The tags are: CLEAN for data lines from clean operations.memstat Memory debugging information for filesystem processes.Example # log host show Remote logging is enabled. A space use message is generated every hour. You can use third-party software to analyze either set of messages.info Debugging information created by the filesystem processes. it creates approximately 100 messages. SPACE_HEADER for lines that contain headers for the disk space data lines. generated from Data Domain system actions and general system operations. log 157 .log Kernel diagnostic messages generated during the boot process. Each time the clean process runs. space. ddfs. and messages from the clean process.log Messages about disk space usage by Data Domain system components and data storage. SPACE for disk space data lines. CLEAN_HEADER for lines that contain headers for the clean operations data lines. boot. All messages are in comma-separated-value format with tags you can use to separate the disk space or messages from the clean process. Remote logging hosts log-server list log list [debug] List the files in the log directory with the date each file was last modified and the size of each file. ddfs. Output Definitions (With Debug Option) access Track users of the Data Domain Enterprise Manager graphical user interface. log All actions taken by an instance of the filesys destroy command.2 Command Reference Guide . perf. 158 EMC DD OS 5.3 messages.1 messages. kern.4 ---------- Sun Jul 25 00:00:02 2011 541 KB Sun Jul 18 00:00:02 2011 450 KB Sun Jul 11 01:29:58 2011 Sun Jul 4 00:00:01 2011 -----------------------447 KB 179 KB ------- KiB = Kibibytes = the binary equivalent of Kilobytes.2 messages.id_number. windows Messages about CIFS-related activity from CIFS clients attempting to connect to the Data Domain system.error Kernel error messages. network Messages from network connection requests and operations.log messages.destroy.info Kernel information messages. kern. Example To list all of the files in the log directory: # log list Last modified -----------------------Thu Jul 29 16:37:47 2011 Thu Jul 29 16:00:02 2011 Size ------716 KB 9931 KB File ---------messages space. disk-error-log Disk error messages. Each instance produces a log with a unique ID number. secure Messages from unsuccessful logins and changes to user accounts. error List errors generated by the Data Domain Enterprise Manager operations. ssi_request Messages from the Data Domain Enterprise Manager when users connect with HTTPS.log Performance statistics used by Data Domain Support for system tuning. Use Ctrl-C to stop the display.Severity: NOTICE . Use the q key to quit.view log view [<filename>] View the log files. Look for the file of log messages. Follow the instructions indicated by “Action:” to correct the error. Action: To set a replication throttle schedule. watch log watch [<filename>] View new message entries as they occur. 4. run the replication throttle add command. View the log file by entering the command options log view message. Replication is running with throttle set to unlimited. or log view. 3. the command displays the current messages file. Description: The restorer cannot find a replication throttle schedule. Enter a slash (/) to search forward or a question mark (?) to search backward for a pattern such as a date. Output resembles: July 27 10:28:11 syrah19 bootbin: NOTICE: MSG-SMTOOL-00006: No replication throttle schedules found: setting throttle to unlimited. If filename is not included. the command displays the current messages file. search for the message MSG-SMTOOL-00006. Understanding a Log Message 1. If a filename is not included. use the up and down arrows to scroll through the file. log 159 . Descriptions of log messages are available on the Data Domain Support portal in the Error Message Catalog. When viewing the log. 2.Audience: customer Message: No replication throttle schedules found: setting throttle to unlimited. In the Web page of log messages. The following information displays: ID: MSG-SMTOOL-00006 . Additional Topics This section provides additional information on various topics and concepts. Some Web browsers do not request a login if a system does not accept anonymous logins. Right-click on the file icon and select Copy To Folder from the menu.yourcompany. In the Address box. add a user name and password to the FTP line: ftp://sysadmin:your-pw@ <Data_Domain_system_name>. In that case. 4. mount /ddvar to your desktop and copy the files from the mount point. If not in the list. use the command adminaccess enable ftp. use SSH to log in to the Data Domain system as sysadmin and run the command option adminaccess disable ftp. or FTP to copy the files to another machine. 8. use FTP to access the Data Domain system: ftp://<Data_Domain_system_name>. If using CIFS or NFS. 160 EMC DD OS 5. 9.com/ 5. CIFS mount. use NFS. you are in the directory just above the log directory. Copy the file to save. To disable the FTP service on the Data Domain system. use the adminaccess show command to verify that the FTP service is enabled. On the Data Domain system. enter adminaccess add ftp ipaddr to add the address. 3. Log in to the Data Domain system as sysadmin. If the service is not enabled.Archiving Log Files To archive log files. 2.com/ 6. 7. If using FTP: 1.yourcompany. Open a Web browser on the remote machine.2 Command Reference Guide . On the Data Domain system. On the Data Domain system. Choose a location for the file copy. enter adminaccess show to see that the FTP access list includes the IP or class-C address of your remote machine. Open the log directory to list the messages files. 2 No changes from previous version. After migrating replication contexts. Migration may also be used to copy replication configurations.” See the EMC DD OS Administration Guide for instructions. You must break replication contexts on the migration source after the process is completed. Version Change 5. command options are available only to users with admin role permissions. avoid backup operations to a migration source during a migration operation. Options include:        abort commit receive send show stats status watch Change History Click the command option for details on usage and functionality. output. Use the command when upgrading to a larger capacity Data Domain system. See the EMC DD OS Release Notes of the corresponding version for details on modifications. known as “contexts. For best results.     migration 161 . All data under /backup is migrated and exists on both systems after migration. Migration is typically performed in a LAN environment. and permissions. Guidelines and Restrictions  Unless otherwise noted. A migration destination does not require a Replication license or Encryption license unless the source system is licensed for those software options. the contexts remain on the source. See “Migration During Directory Replication” for details. including arguments.migration The migration command copies all data from one Data Domain system to another. Using the migration abort command option on a destination system requires running the filesys destroy command option on the destination before the filesystem can be reenabled. The migration destination must have an empty filesystem. If the migration source has throttle settings. See “Migration With Encryption-Enabled Source” in “Additional Topics” for instructions. Run the command option on the migration source and destination. is sent only to the destination Write access to the source is blocked after you enter the migration commit command and during the time required to complete migration. the source is opened for write access. 162 EMC DD OS 5. replication is restarted. use the replication throttle set override command to set the throttle to the maximum (unlimited) before starting migration. commit migration commit Limit migration to data received by the source at the time the command is entered. You can enter the command and limit the migration of new data any time after entering the migration send command. including new data for contexts migrated to the destination. the migration destination must have equal or larger capacity than the used space on the migration source. All data on the source Data Domain system at the time of the commit command. The procedure for migrating from an encryption-enabled source requires additional steps. Following a migration abort procedure the password on the destination system is the same as the password on the migration source.2 Command Reference Guide . After the commit operation. With the exception of collection replication. Any setting of the system’s replication throttle also applies to migration. After the migration process is finished.    Options The following options are available with this command. abort migration abort Stop a migration process and return the Data Domain system to its previous state. If the migration source is part of a replication pair. but new data is no longer migrated to the destination. For example: dir://hostB/backup/dir2 col://hostB pool://hostB/pool2 migration 163 . Before entering the migration send command on the migration source. Use the command option under the following conditions:    Only on the migration source.receive migration receive source-host <src-hostname> Prepare a Data Domain system to be a migration destination. After you migrate a context. With replication. as defined when setting up replication. but the context configuration is moved to the migration destination. After entering the migration receive command on the destination. Only when no backup data is being sent to the migration source. this argument represents one or more contexts from the migration source. When preparing the destination. The <obj-spec-list> is /backup for systems that do not have a replication license. Run this option under the following conditions:    On the migration destination only. After running the filesys destroy and filesys create operations on the destination. Example To prepare a destination for migration from the source hostA: # filesys destroy # filesys create # migration receive source-host hostA send migration send {<obj-spec-list> | all} destination-host <dst-hostname> Start migration. do not run the filesys enable command. A context in the obj-spec-list can be:  The destination string. all data from the context remains on the source system. such as rctx://2. Note that write access to the source is blocked from the time a migration commit command is given until the migration process concludes. Enter the migration commit command on the migration source first. The migration send command stays open until a migration commit command is entered. Example 1 To start migration of data only (excluding replication contexts.  New data written to the source is marked for migration until you enter the migration commit command. With the exception of licenses and key-manager settings. The keyword all. and then on the destination. even when a single directory replication context is specified in the command option. New data written to the source after a migration commit command is not migrated. The context number.2 Command Reference Guide . all data on the migration source is always migrated. which migrates all contexts from the migration source to the destination. even if replication contexts are configured) to a migration destination named hostC: # migration send /backup destination-host hostC Example 2 To start a migration that includes a collection replication context (replication destination string) of col://hostB: # migration send col://hostB destination-host hostC Example 3 To start migration with a directory replication context of dir://hostB/backup/dir2: # migration send dir://hostB/backup/dir2 destination-host hostC Example 4 To start migration with two replication contexts using context numbers 2 and 3: # migration send rctx://2 rctx://3 destination-host hostC Example 5 To migrate all replication contexts: # migration send all destination-host hostC 164 EMC DD OS 5. as shown in output from the replication status command option. status migration status Display the current status of migration. Use the value (and the previous value) to estimate network traffic generated by migration. Example # migration show stats -------------------------------------------------------------------------------------------------------------Destination Bytes Sent Bytes Received hostB 153687473704 1974621040 Received Time Mon March 29 14 09:37 -------------------------------------------------------------------------------------------------------------Processed Time ----------------------------------Mon March 29 14 09:37 ------------------------------------ Output Definitions Bytes Sent The total number of bytes sent from the migration source. Processed Time The date and time when the most recent records were processed.show stats migration show stats Display migration statistics during the migration process. Bytes Received) to estimate network traffic generated by migration. and network overhead. Received Time The date and time when the most recent records were received. overhead. the value includes overhead and network overhead. overhead. Bytes Received The total number of bytes received at the destination. and network overhead. the value includes data. the value includes overhead and network overhead. On the source. On the destination. Use the value (and the next value. migration 165 . On the destination. The value includes backup data. Example # migration status CTX: Mode: Destination: Enabled: Local file system status Connection State: Error: Destination lag: Current throttle: Contexts under migration: 0 migration source hostB yes enabled connected since Tue Jul 17 15:20:09 migrating 3/3 60% no error 0 unlimited dir://hostA/backup/dir2 watch migration watch Track the initial phase of migration (when write access is blocked).2 Command Reference Guide . Add the Encryption license: # license add <license-code> 2. Additional Topics This section provides additional information on various topics and concepts. clear the DPM attributes on the destination: # filesys disable # filesys encryption key-manager reset # filesys restart 166 EMC DD OS 5. Use the same passphrase as the migration source: # filesys encryption enable 3. This command prompts you for a passphrase. restart the filesystem: # filesys restart If the migration source has DPM key manager configured and enabled. The command output shows the percentage of the migration process that has been completed. you must perform the following tasks on the destination before starting the migration process. Migration With Encryption-Enabled Source If the migration source has encryption enabled. Enable encryption. After running the encryption enable command. 1. enter: # migration send /backup destination-host hostB 3. and then enable the DPM key manager. to a destination. hostB: # migration commit Migration During Directory Replication The following example describes how to migrate data and a context from a source. create a migration end point. new data sent to the source is also marked for migration. 5.After migration concludes. enter the following command on hostA first. when hostA is also a directory replication source for hostB. On hostB (the destination). to a destination. After the three migration phases are finished. At the appropriate time for your site. See the commands filesys encryption key-manager enable and filesys encryption key-manager set in “filesys” for more information. On either host. On hostA (the source). Note that three phases of migration may take many hours. hostC. During that time. and then on the destination. 1. hostB (steps do not apply to replication contexts): 1. hostA. enter: # filesys disable # filesys destroy # filesys create # migration receive source-host hostA migration 167 . enter: # migration watch 4. enter: # filesys disable # filesys destroy # filesys create # migration receive source-host hostA 2. On hostC (the migration destination). Migrating Between Source and Destination To migrate data from hostA. configure the DPM attributes on the destination to be the same as the DPM attributes on the migration source. 5. First on hostA and then on hostC.2. 3. On hostB (the replication destination). On hostA (the migration and replication source). enter: # migration commit Note that this command also disables the filesystem. enter the following command options to change the replication source to hostC: # filesys disable # replication modify dir://hostB/backup/dir2 source-host hostC # filesys enable 168 EMC DD OS 5.2 Command Reference Guide . enter: # migration watch 4. enter: # migration send dir://hostB/backup/dir2 destination-host hostC Note that this command also disables the filesystem. On the source migration host. Previously. If a Data Domain system had several MTrees. Options include:        create delete list rename retention-lock show compression undelete mtree 169 . See “quota” for additional information.mtree The mtree command enables operations on a single “managed tree” (MTree) of a filesystem. for example. users could not manage the amount of storage space for an MTree. An MTree can be a directory subtree or a VTL tape pool. snapshot schedules. depleting the storage space for other MTrees. replication. An MTree is a logical partition of the namespace in the filesystem that can group together a set of files for management purposes. a single MTree could use all of the storage space on the system. Users can now restrict storage space for MTrees by setting quota limits during the creation of MTrees. or retention locking. and the files of an MTree can span the collection of active and archive storage tiers in a DD Extended Retention system. On a DD Extended Retention system (previously DD860 Archiver).Change History Click the command option for details on usage and functionality. system performance may degrade if the number of MTrees simultaneously engaged in read or write streams exceeds 14. Version Change 5. The maximum quota value is 4096 PiB. and permissions. command options are available only to users with admin role permissions. The default setting for MTree quota limits is disabled. MTree quota limits are set for the active tier only. A single controller supports a maximum of 100 MTrees. Quota limits are pre-compressed values. limit the number of active MTrees to 14. when possible. including arguments.2 Modified command options: mtree create <mtree-path> [quota-soft-limit <n> {MiB|GiB|TiB|PiB}] [quotahard-limit <n> {MiB|GiB|TiB|PiB}] mtree retention-lock enable mode {compliance | governance} mtree <mtreepath> mtree list [<mtree-path>] Guidelines and Restrictions  Unless otherwise noted. consolidate operations on the same MTree into one operation. output. and. For best results. See the EMC DD OS Release Notes of the corresponding version for details on modifications. MTrees cannot be created if the maximum of 100 has been reached or if there is no available space. MTree quotas cannot be set on the /data/col1/backup directory.2 Command Reference Guide .         170 EMC DD OS 5. however. See “Additional Topics” for the list of characters supported for naming MTrees. The command does not fail. When setting quota limits. /data/col1/backup1: Quota soft limit: 10240 MiB. hard limit: none Note: Quota is disabled. Example 1 To create MTree /data/col1/backup1 with no quota limits: # mtree create /data/col1/backup1 MTree "/data/col1/backup1" created successfully Quota soft limit: none. The format of the <mtree-path> is /data/col1/<mtree-name>. An error message appears if you are setting a soft limit that is greater than or equal to the hard limit. write operations stop and the MTree becomes read-only. hard limit: unlimited Example 3 To set a hard limit quota of 10 TiB on MTree /data/col1/backup2: # mtree create /data/col1/backup2 quota-hard-limit 10 TiB MTree "/data/col1/backup2" created successfully.Options The following options are available with this command. An error message notifies you to enter a different name if another MTree with the same name exists. Quota limits not enforced. meaning there are no quota limits. /data/col1/backup2: Quota soft limit: none. a warning appears if the new limit is lower than the current space usage of the MTree. hard limit: 1048576 MiB mtree 171 . Quotas can only be set during the creation of MTrees. When the hard limit is reached for an MTree quota. or if the destination MTree does not exist. the default is unlimited for both soft and hard limits. create mtree create <mtree-path> [quota-soft-limit <n> {MiB|GiB|TiB|PiB}] [quota-hard-limit <n> {MiB|GiB|TiB|PiB}] Create an MTree under the specified path. but subsequent writes to the MTree are rejected. if the new name is formatted incorrectly. Example 2 To set a soft limit quota of 10 GiB on MTree /data/col1/backup1: # mtree create /data/col1/backup1 quota-soft-limit 10 GiB MTree "/data/col1/backup1" created successfully. If no quota option specified. MTrees marked for deletion remain in the filesystem until the filesys clean command is run. It is not allowed on Retention Lock Compliance MTrees.2 Command Reference Guide . This command option is allowed on Retention Lock Compliance systems and on Retention Lock Governance MTrees only. When an MTree is removed from the filesystem. Effects of deleting an MTree include:  The MTree appears in the output of the mtree list command option and is marked with the status value D. snapshots associated with that MTree are also deleted from the /data/col1/<mtree-name>/.snapshot/ directory or the /backup/. 172 EMC DD OS 5.snapshot/ directory.   Example # mtree delete /data/col1/myMTree MTree "/data/col1/myMTree" has been deleted. File service to a deleted MTree is rejected. You can revert the marked-for-deletion state of that MTree by running the mtree undelete command. See the EMC Data Domain Administrator’s Guide for details on Retention Lock Compliance and Governance. /data/col1/backup3: Quota soft limit: 102400 MiB . list mtree list [<mtree-path>] Display the list of MTrees. See “undelete” for details. Deleted MTrees are not visible through NFS or CIFS clients. hard limit: 1048576 MiB delete mtree delete <mtree-path> Delete the specified MTree (denoted by the pathname).Example 4 To set a soft limit quota of 100GiB and a hard limit quota of 1TiB on MTree /data/col1/backup3: # mtree create /data/col1/backup3 quota-soft-limit 100 GiB quota-hard-limit 1 TiB MTree "/data/col1/backup3" created successfully. precompression. and status. Status is based on pre-defined values: D Marked for deletion. Q Quota defined. This command supports the asterisk (*) wildcard character in the MTree pathname. RLCE Retention Lock Compliance enabled.Argument Definitions <mtree-path> (Optional) Display MTrees under the specified path only. MTree will be removed from the filesystem by the filesys clean command. Values include: /data/col1/mtree1 /data/col1/mtree* *mtree* Example # mtree list Name /data/col1/backup /data/col1/backup1 /data/col1/backup2 Pre-Comp (GiB) 7.5 0.0 Status RW/Q/RLGE RW RW ---------------------------------------------------------------------------- ---------------------------------------------------------------------------- Output Definitions Output includes the MTree pathname. RO Read-only access. RW Read/write access.7 9. mtree 173 . Can be unmarked for deletion by using the mtree undelete command only if the filesys clean command has not been run. RD Replication destination. Username: sec Password: If there are any NFS exports. **** MTree "/data/col1/com_1" has retention-lock configuration. CIFS shares. This command option requires security officer authorization if Retention Lock Compliance is enabled on the specified MTree. proceeding.RLGE Retention Lock Governance enabled. Please present credentials for such a user below. VTL tapes. rename mtree rename <mtree-path> <new-mtree-path> Rename the specified MTree. they need to be manually edited to reflect the new MTree name. DDBOOST storage-units or Replication Contexts configured for this MTree.2 Command Reference Guide . can be renamed only if it is empty. RLGD Retention Lock Governance disabled. Retention Lock Governance or Retention Lock Compliance MTrees can only be renamed if they are empty. can be renamed only if it is empty. Example 1 To rename the MTree from /data/col1/gov_1 to /data/col1/gov_1x. proceeding. they need to be manually edited to reflect the new MTree name. Do you wish to continue? Are you sure? (yes|no|?) [no]: yes ok. **** MTree "/data/col1/gov_1" has retention-lock configuration. 174 EMC DD OS 5. enter: # mtree rename /data/col1/gov_1 /data/col1/gov_1x If there are any NFS exports. DDBOOST storage-units or Replication Contexts configured for this MTree. CIFS shares. Note that /data/col1/backup cannot be renamed. Example 2 # mtree rename /data/col1/com_1 /data/col1/com_1x This command requires authorization by a user having a 'security' role. VTL tapes. DO you wish to continue? Are you sure? (yes|no|?) [no]: yes ok. Reverting Retention Lock Compliance or Governance generates a Data Domain system alert (at the “Alert” severity level) and logs the names of the reset files. However. It is not allowed on Retention Lock Compliance MTrees. mtree retention-lock reset {min-retention-period | max-retention-period} mtree <mtree-path> Reset the minimum or maximum retention period for the specified MTree to its default value. Additionally. mtree 175 . Note that directories and files within Retention Lock Compliance Mtrees cannot be reverted. See the EMC Data Domain Administrator’s Guide for details on Retention Lock Compliance and Governance and for instructions on setting retention time. Data Domain recommends when a recipient receives the alert. users cannot reset the minimum (12 hours) or maximum (5 years) retention periods on MTrees enabled with Retention Lock Compliance. mtree retention-lock revert <path> Revert all Retention Lock files in a specified path to non-Retention Lock files. any file in the MTree may become locked by setting its <atime> to the future. renaming a non-empty directory in the MTree is disabled.retention-lock mtree retention-lock disable mtree <mtree-path> Disable Retention Lock for the specified MTree. he or she confirms the reset operation was intended. When Retention Lock is enabled on an MTree. The command option is allowed on systems with Retention Lock Compliance enabled. The base of the path must be /data/col1/<mtree-name>/ or /backup/. Enabling Retention Lock Compliance requires security officer authorization. Use the governance argument to propagate the same protection provided in the previous release of DD OS. such as those of SEC17a-4f. The level of security protection is lower than Retention Lock Compliance. and on MTrees with Retention Lock Governance enabled. See the EMC Data Domain Administrator’s Guide for details on Retention Lock Compliance and Governance. This command option is allowed on Retention Lock Governance MTrees only. See the EMC Data Domain Administration Guide for details Retention Lock Compliance and Governance. mtree retention-lock enable mode {compliance | governance} mtree <mtree-path> Enable Retention Lock for the specified MTree. and for instructions on setting retention time. Use the compliance argument to meet the strictest data permanence regulatory standards. This command option requires security officer authorization if Retention Lock Compliance is enabled on the specified MTree. mtree retention-lock status mtree <mtree-path> Show Retention Lock status for the specified MTree. users cannot set the period to be less than the minimum or maximum period allowed. Specifying a value greater than 70 years results in an error. Users cannot set the minimum retention period to fewer than 12 hours (shown in output as 720 minutes). Possible values are enabled. the min-retention-period is 12 hours and the max-retention-period is 5 years. When setting the lock period for Retention Lock Compliance MTrees.mtree retention-lock set {min-retention-period | max-retention-period} <period> mtree <mtreepath> Set the minimum or maximum retention period for the specified MTree. disabled.2 Command Reference Guide . Doing so generates a message notifying the user that the entry was invalid and stating the minimum retention period allowed. Possible unit values are: min hr day mo year The period cannot be more than 70 years. The retention period is specified in the format [number] [unit]. 176 EMC DD OS 5. Doing so generates a message notifying the user that the entry was invalid and stating the minimum or maximum retention period allowed. previously enabled. By default. Example To set the min-retention-period to 24 months for mtree1: # mtree retention-lock set min-retention-period 24mo mtree /data/col1/mtree1 mtree retention-lock show {min-retention-period | max-retention-period} mtree <mtree-path> Show the minimum or maximum retention period for the specified MTree. and MTree Retention Lock mode: Compliance or Governance. If you specify a file or directory name. plus the current partial week. Values are reported in Gigibytes (GiB).show compression mtree show compression <mtree-path> [tier {active | archive}] [summary | daily | daily-detailed] {[last <n> { hours | days | weeks | months }] | [start <date> [end <date>]]} Display compression statistics for a specific MTree. tier {active | archive} Display results for the specified tier. This option is not available if you specify a file or directory name. display filesystem compression statistics for the time frame that begins on the specified day instead of the past 7 hours. If you specify a time frame less than the previous four weeks. By including the last <n> option or the start <date> option.  daily (Optional) In addition to the summary output. This option is not available if you specify a file or directory name. Data written in the last 24 hours. display detailed information for each day. over the previous four full weeks. summary (Optional) Display all compression statistics. summarized as:  Data written in the last 7 days. start <date> (Optional) In the summary portion of the output. you cannot use this option with the weeks keyword or the months keyword. Running the command without arguments generates default output that displays a summary of compression statistics for all files and directories in the filesystem for the last 7 days and the last 24 hours. the daily or daily-detailed output (if specified) is truncated to the shorter time frame. you can display statistics for a time frame other than the last 7 days.  last <n> {hours | days | weeks | months} (Optional) In the summary portion of the output.  daily-detailed (Optional) Display the daily output and include the following information for each day. plus the current full week. Argument Definitions <mtree-path> The pathname of the MTree for which to display compression statistics. mtree 177 . The statistics for the last 24 hours remain in the summary output. The statistics for the last 24 hours remain in the summary output. display filesystem compression statistics for the specified time frame instead of for the past 7 hours. end <date> (Optional) Valid only if the start option is used. By default.2x (53. Example # mtree show compression /data/col1/backup Active Tier: Pre-Comp (GiB) Post-Comp (GiB) Global-Comp Local-Comp Factor Factor Total-Comp Factor (Reduction %) ----------------------------------------------------------------------------------------------------------------------------------Written: Last 7 days Last 24 hrs ----------------------------------------------------------------------------------------------------------------------------------Archive Tier: Pre-Comp (GiB) Post-Comp (GiB) Global-Comp Local-Comp Factor Factor Total-Comp Factor (Reduction %) ----------------------------------------------------------------------------------------------------------------------------------Written: Last 7 days Last 24 hrs ----------------------------------------------------------------------------------------------------------------------------------Key: Pre-Comp = Data written before compression Post-Comp = Storage used after compression Global-Comp Factor = Pre-Comp / (size after de-dupe) Local-Comp Factor = (Size after de-dupe) / Post-Comp Total-Comp Factor = Pre-Comp / Post-Comp Reduction % = (Pre-Comp .2x 2.6) 178 EMC DD OS 5.1 1.6) 20.0x 2. display filesystem compression statistics for the time frame that ends on the specified day. In the summary portion of the output.2 7. the last day of the time frame specified with this argument is the most recent.Post-Comp) / Pre-Comp) * 100 15.0x 2.2 Command Reference Guide .3 9.2x 2. 2011-04-07).Specify <date> in the format <yyyy>-<mm>-<dd> (for example.4 1. full day elapsed.2x (53. characters supported for creating MTree names include: ! # $ % & @ ^ ~ ( ) [ ] { exclamation point number sign dollar sign percentage ampersand “at” symbol caret tilde left parenthesis right parenthesis left bracket right bracket left curly brace mtree 179 .undelete mtree undelete <mtree-path> Mark as not deleted any marked-for-deletion MTrees under the specified path. This command reverses a previous mtree delete command. a–z. Supported Characters In addition to letters A–Z. Additional Topics This section provides additional information on various topics and concepts. numbers 0–9. Example To reverse a previous mtree delete command request that included the MTree at /data/col1/myMTree: # mtree undelete /data/col1/myMTree MTree "/data/col1/myMTree" has been undeleted. and a single embedded space (non-leading). . .} .2 Command Reference Guide . ‘ ' + = right curly brace period comma semicolon single quotation mark (slanted) single quotation mark (unslanted) plus sign equal sign 180 EMC DD OS 5. ndmpd The ndmpd command is the top-level command for the NDMP daemon running on the Data Domain system. The NDMP daemon provides access to VTL-created devices via the NDMP version 4 protocol. Version Change 5. output.  Options The following options are available with this command. and permissions. Guidelines and Restrictions  Unless otherwise noted. Options include:        disable enable option show status stop user Change History Click the command option for details on usage and functionality. This command is not supported on Extended Retention (formerly “DD860 Archiver”) systems.2 No changes from previous version. including arguments. See the EMC DD OS Release Notes of the corresponding version for details on modifications. command options are available only to users with admin role permissions. ndmpd 181 . enable ndmpd enable Enable the NDMP daemon. However. SCSI vendor and product code. this information is displayed during device discovery and configuration. Example # ndmpd option show all Name -------------debug port preferred-ip ----------------------Value ---------disabled 10000 authentication text ndmpd show devicenames View the device name. you can use this command to verify the VTL TapeServer group configuration and perform a manual configuration. 182 EMC DD OS 5. if required.disable ndmpd disable Disable the NDMP daemon. and the serial numbers of devices controlled by the NDMP daemon. Typically. option ndmpd option reset <option name> | all Reset all NDMP daemon options or a specific option. set ndmpd option set <option name> <value> Set NDMP daemon options.2 Command Reference Guide . show ndmpd option show <option name> <value> View all NDMP daemon options or a specific option. VTL virtual name. 212:1904 00:00:06 True no device opened -1 ndmpd 183 .69.254. or that no devices are registered with the VTL TapeServer.76. A series of hyphens in the NDMP Device column indicates the VTL service is running on the system but has not registered the devices.69.No output in the NDMP Device column indicates the VTL service is not running. Example # ndmpd show sessions Session ID --------------1 3 250 23041 Remote IP:Port ----------------------------10. Restart the VTL service to correct this behavior.1:666 137.18:32000 192. Session numbers are obtained from the command ndmpd show sessions.16.24.76.200.168.212:1904 ndmpd show stats <session-id> | all Use this command to view statistics of a a single session or all sessions. Example # ndmpd show stats 23041 Key ---------------------------Session ID Remote IP:Port Time connected Authorized SCSI device SCSI Controller Value ------------------23041 137. If the problem persists. contact Data Domain Support.28. Example # ndmpd show devicenames NDMP Device /dev/dd_ch_c0t0l0 /dev/dd_st_c0t1l0 /dev/dd_st_c0t2l0 /dev/dd_st_c0t3l0 Virtual Name dd660-16 changer dd660-16 drive 1 dd660-16 drive 2 dd660-16 drive 3 Vendor STK IBM IBM IBM Product L180 ULTRIUM-TD3 ULTRIUM-TD3 ULTRIUM-TD3 Serial Number 6290820000 6290820001 6290820002 6290820003 ------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------- ndmpd show sessions View active sessions.100:1123 172. ndmpd user del <user name> Delete the configured NDMP daemon user.2 Command Reference Guide . process_state: running.. user ndmpd user add <user name> [ password <password> ] Add one (only) user name and password for the NDMP daemon md5 authentication.SCSI target id SCSI LUN Tape device Tape file number Tape soft errors Tape block size Tape block number Tape total space Tape space remaining Mover mode Mover state Mover pause reason . Example # ndmpd status NDMP daemon admin_state: enabled. Passwords are optional but a prompt appears if a password is not provided. status ndmpd status Display the NDMP daemon status. 184 EMC DD OS 5.. ----------------------------- -1 -1 /dev/dd_st_c0t5l0 0 0 0 0 0 0 noaction idle n/a ------------------ Output truncated. vtl licensed stop ndmpd stop session <session-id> | all Stop all sessions or a single session. but not the password.ndmpd user modify <user name> [ password <password> ] Modify the password for the NDMP daemon md5 user. ndmpd 185 . Passwords are optional but a prompt appears if a password is not provided. ndmpd user show View the NDMP daemon user. 186 EMC DD OS 5.2 Command Reference Guide . DHCP. Options include:                    aggregate config congestion-check create ddns destroy disable enable failover hosts iperf lookup option ping reset set show tcdump troubleshooting net 187 . and IP addresses. DNS.net The net command manages the use of virtual interfaces. and displays network information and status. 2 Command Reference Guide . See the EMC DD OS Release Notes of the corresponding version for details on modifications. including arguments. and permissions.2 New command options: net congestion-check modify net congestion-check run net congestion-check start net congestion-check status net congestion-check stop net iperf server start [port {<port> | congestion_check-port}] [ipversion {ipv4 | ipv6}] [window-size <bytes>] net iperf server status net iperf server stop Modified command options: net config <ifname> net create interface {<physical-ifname> | <virtual-ifname>} {vlan <vlan-id> | alias <alias-id>} net hosts add {<ipaddr> | <ipv6addr>} <host-list> net hosts del {<ipaddr> | <ipv6addr>} net iperf client {<ipaddr> | ipv6addr> | <hostname> [ipversion {ipv4 | ipv6]} } [port <port>] [window-size <bytes>] [data {random|default}] [interval <secs>] [{transmit-size <bytes> | duration <secs>}] [connections <count>] [nodelay] net iperf server [run] [ipversion {ipv4 | ipv6}] [port {<port> | congestion_check-port}] [window-size <bytes>]] net lookup {<ipaddr> | <ipv6addr> | <hostname>} net ping {<ipadddr> | <ipv6addr>| <hostname> [ipversion {ipv4 | ipv6}]} [broadcast] [count <n>] [interface <ifname>] 188 EMC DD OS 5. Version Change 5.Change History Click the command option for details on usage and functionality. output. Data Domain recommends making interface changes only during scheduled downtime. aggregate net aggregate add <virtual-ifname> mode {roundrobin | balanced hash {xor-L2 | xor-L3L4| xor-L2L3} | lacp hash {xor-L2 | xor-L3L4 | xor-L2L3} [rate {fast | slow} ] } [up {<time> | default} ] [down {<time> | default} ] interfaces <physical-ifname-list> Enable aggregation on a virtual interface by specifying the physical interfaces and mode.    Options The following options are available with this command. Command options on a Global Deduplication Array (GDA) must be run on the master controller. Argument Definitions round robin Packets are transmitted sequentially.net show stats [ipversion {ipv4 | ipv6}] [all | interfaces | listening | route | statistics] net tcpdump capture <filename> [interface <iface>] [{host <host> [ipversion {ipv4 | ipv6] | net {<ipaddr> [mask <mask>] | <ipv6addr>[/<prefixlength>]}}] [port <port>] [snaplen <bytes>] Guidelines and Restrictions  Unless otherwise noted. Balanced and lacp modes require a hash. After making interface changes. IPv4 is the default IP version. command options are available only to users with admin role permissions. you must reconfigure all routing rules and gateways. net 189 . Changes made by the net command to disabled Ethernet interfaces flush the routing table. beginning with the first available link and ending with the last link in the aggregated group. Choose the mode compatible with the requirements of the system to which the ports are attached. ” xor-L2L3 xor-L3L4 up. Requires a hash. Slow sends the message once every 30 seconds. but fast means there is more traffic comprised of small packets (about the size of a TCP ACK packet) across all aggregated lacp interfaces. With 10 Gb speed consider the potential for losing connections with a rate of 30 seconds. Transmission of packets on a specific slave interface is based on static balanced and LACP mode aggregation with an XOR hash of Layer 2 (inbound and outbound MAC addresses) and Layer 3 (inbound and outbound IP addresses).3ad). See “More About LACP” for additional information. It is the default. both ends must be configured with lacp. lacp rate xor-L2 Transmission of packets on a specific slave interface is based on static balanced mode or LACP mode aggregation with an XOR hash of Layer 2 (inbound and outbound MAC addresses). If 30 seconds is too long it can be set to fast (1 second). down 190 EMC DD OS 5. Requires a hash. From a switch perspective this configuration is always an active LACP configuration. Fast sends the message every second. Specifies how often an LACP message is sent to the switch or system that is connected to the Data Domain system. A link aggregation mode based on the Link Aggregation Control Protocol (IEEE 802. When the this mode is selected. The length of delay allowed before the link is considered up or down. See “More About Up/Down Arguments. This acts as a type of heartbeat. Transmission of packets on a specific slave interface is based on static balanced and LACP mode aggregation with an XOR hash of Layer 3 (inbound and outbound IP addresses) and Layer 4 (inbound and outbound port numbers). It cannot be set to passive. This requires the associated interfaces on the switch to be grouped into an Etherchannel (trunk). Communicates with the other end to coordinate which links within the bond are available. The message identifies the aggregated interface.balanced Data is sent over interfaces as determined by the hash method selected.2 Command Reference Guide . The rate determines how fast the lacp will recognize when an interface cannot be used and when it can. eth3a net aggregate modify <virtual-ifname> mode {roundrobin | balanced hash {xor-L2 | xor-L3L4| xor-L2L3} | lacp hash {xor-L2 | xor-L3L4 | xor-L2L3} [rate {fast | slow} ] } [up {<time> | default} ] [down {<time> | default} ] interfaces <physical-ifname-list> Change the aggregation configuration on a virtual interface by specifying the slave interfaces. Example To delete physical interfaces eth2a and eth3a from the aggregate virtual interface veth1: # net aggregate del veth1 interfaces eth2a. eth3a" and associated IP addresses have been removed from "veth1". and rate if the mode is lacp. it remains a slave. The listed conditions replace the previous settings except on the current slave interfaces. Example # net aggregate reset veth1 Interfaces "eth2a. which remain slaves to the virtual interface. but will leave the interfaces. # net aggregate modify veth1 mode xor-L2 interfaces eth2a eth3a net aggregate reset <virtual-ifname> Remove all physical interfaces and IP addresses from an aggregate virtual interface. note This command option also removes the addresses on any associated VLAN and alias. up delay. down delay. Example Use the following command to change link aggregation on virtual interface veth1 to physical interfaces eth2a and eth3a in mode xor-L2. If a slave interface is already present but not listed in the modify command. net 191 . When modify is used the specified slave interfaces are added to the virtual interface. Stating the previous condition is not required.Example To enable link aggregation on virtual interface veth1 to physical interfaces eth1a and eth2a in mode lacp hash xor-L2: # net aggregate add veth1 mode lacp hash xor-L2 interfaces eth2a eth3a net aggregate del <virtual-ifname> interfaces <physical-ifname-list> Delete slave interfaces from the list of the aggregate virtual interface. If this occurs. For IPv6 addresses the minimum size is 1280. it must be specified with the address by adding a forward slash (/) followed by a number. but not both. 192 EMC DD OS 5. Use the up argument to bring up an interface without an IP address. The limit of the MTU size is 512 . If an IPv6 address is specified there is no associated netmask. Using enable will fail if no IP address is given. specify an address of 0 to allow a registry location to be created.eth5a Up Delay 29700 Down Delay 29700 --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- config net config <ifname> {[[<ipaddr>] [netmask <mask>] [dhcp {yes | no}]] | [<ipv6addr>]} {[autoneg] | [duplex {full | half} speed {10|100|1000|10000}] [up | down] [mtu {<size> | default}] Configure an Ethernet interface. If no address is given the up option may fail because there is no registry entry for an IP address.2 Command Reference Guide . a prefix length is used to determine the subnet. a prefix length can be used for IPv6. If IPv4. This typically occurs after a fresh install. The netmask must be specified when the address is specified. the notation would be: 2026:3456:cafe::f00d:1/52. For example. The default prefix length is 0. To use a prefix length different from 0.9014 unless it is an IPv6 address. if the prefix length is 52.   note net config <ifname> type {none | management | replication | cluster} Configure or set the type of Ethernet interface. The IP address can be IPv4 or IPv6. Anywhere a netmask can be used for IPv4. Example # net aggregate show Ifname veth1 Hardware Address 00:15:17:0f:63:fc Aggregation Mode balance hash xor-L2 Configured Interfaces eth4a. Note the following guidelines:   An IP address or a DHCP may be used.net aggregate show Display basic information on the aggregate setup. Instead. it must have a netmask different from the default netmask. The output is done at the end of the 60 seconds and is one line per external IP address. For example. net congestion-check modify capture-window <secs> Congestion data is collected only during the capture window. the initial default is 4 seconds. the new registry values are used when it runs. For example. net 193 . if the capture window is 60 seconds and the sample value is 5 seconds. If the every argument is non-zero the capture window is run again after the number of minutes specified in the every argument. or to a logfile if the start argument is specified.congestion-check net congestion-check modify [sample-interval <secs>] [capture-window <secs>] [every <mins>] [detailed {on | off}] [logfile <filename>] [{ iperf_client {none | { <iperf-server-host> | <iperf-server-ipaddr>} [nodelay <on | off>] [port {<port> | default} ] [window-size <bytes>] [connections <count>] } } ] Modify options for the congestion monitor whether or not the monitor program is activated. Outside the capture widow the program is in sleep mode or terminated depending on whether the argument every is non-zero. There are multiple intervals during the capture window that data is collected and the sample-interval argument determines how often this is. Values for rates and error numbers are added together. For start and modify arguments. If the congestion monitor is scheduled. are averaged over time. The run argument default is always 4 seconds.) The modify command option sets the registry information. net congestion-check modify sample-interval <secs> Specify the time that statistic information is collected. The value of the sample-interval argument must be less than the value of the capture-window argument. The data collecting then stops and the information is output to the screen if the run argument is specified. data is collected every 5 seconds for 60 seconds and collection stops. Values that may go up or down. (The congestion monitor is activated by the net congestion-check start command. Data is collected every 4 seconds data for 60 seconds. During the capture window data is collected during each sample interval. Typically this command option is used after the monitor is scheduled to run and the user does not want to stop and restart the monitor. the values are used as defaults when it is scheduled. If the monitor is not scheduled. the initial default capture-window is 60 seconds and the default sample-interval is 4 seconds. such as the capture-window. 194 EMC DD OS 5. The default for the initial every argument is 60 minutes. The basic setting is mainly for replication on the source system and focuses on congestion conditions between the source and destination. For start and modify arguments the initial default is off. the destination name or address argument must be specified. The default value for the run argument is always zero. After that the default for the start argument is whatever is in the registry. only basic information is saved. net congestion-check modify every <mins> Determine how often to run the capture window.log. the default for the start argument is whatever is in the registry as with every argument. When set to non-zero. For start and modify arguments the initial default is /ddr/var/log/default/congestion. The capture-window argument must be less than the argument every and greater than the argument sample-interval. The file name should not be changed unless absolutely required. For start and modify arguments the initial default is 60 minutes. After that. the value for the argument every must be greater than the value of the capture-window argument. Changing the file name voids the space restrictions. net congestion-check modify iperf-client none This command option allows iperf to run during the capture window congestion data collection. The remote system must have an iperf server <iperf-server-host> and specified port <port>. net congestion-check modify detailed {on | off} Typically. but setting the parameter to on causes more data to be saved. If set to zero the capture window is run once only. For the start argument. The default for the run argument is zero. For the run argument the default value is none. meaning there is no limit to the space that may be taken. The main concern is the default file name is on a rotation system where the file size cannot exceed 10 MB and up to 10 files only are saved for a maximum of 100 MB of disk space. the value of the every argument must be greater than zero because start is a monitor and must run repeatedly. For start and modify arguments the initial default is none. which is put into the registry. but if iperf is used when data is being collected. This command option is not available with the run argument because the output goes to the screen. net congestion-check modify logfile <filename> Set the logfile used to save the data collected. The initial value for the start and modify arguments is 60 seconds. The iperf operation is started only at the beginning for each capture window.The run argument default for the capture window is always 60 seconds. which means if the every argument is not specified only one capture window is run. The detailed on argument adds receive information and other entries useful for the general network environments of the Data Domain system.2 Command Reference Guide . For the run argument the default is always off. connections <count> The number of connections to use. Options for modifying or starting iperf during the capture window are: nodelay <on | off> On equals do not wait for ACK. <port | default> The port number to use with iperf. The advantage of letting the congestion-check handle the iperf is that the iperf is only run when the congestion-check requires it. net congestion-check run [sample-interval <secs>] [capture-window <secs>] [every <mins>] [detailed {on | off}] [logfile <filename>] [{ iperf_client {none | { <iperf-server-host> | <iperf-server-ipaddr>} [nodelay <on | off>] [port {<port> | default} ] [window-size <bytes>] [connections <count>] } } ] Run the congestion check program and display the results as screen output when the capture-window time is complete. Default values for the run command are always the same and are not affected by the net congestion-check modify or the net congestion-check start commands. net 195 . port = 5002. the arguments override the defaults during the procedure but return to the configured defaults after the procedure concludes. The none argument must be specified to tell the congestion monitor to not use iperf if iperf was previously enabled and is no longer needed. window-size = 32000. Off equals wait for each buffer to be sent before sending the next. Default is 32000. [window-size <bytes> The size of the socket buffer to use. Must be greater than zero. Alternatives include starting iperf manually before the congestion check is performed. The run option default for iperf is always none. When the command option is entered with no arguments the defaults are used. connections = 1. especially if there is other traffic using the network. If iperf address is given the default iperf options are: nodelay = off. Otherwise iperf is not running. It is disruptive of the network and should not be left on for a long time. Default is 5002. When the command option includes arguments.The iperf function is typically used to determine the maximum throughput. Value types from the output vary. Output is one line per external destination. rtt. It also shows if iperf is currently running and which connections are being monitored. the log file. and every. net congestion-check status Display the state of the congestion monitor. window scale factor. These are given as an average with the minimum and maximum. the level of logging. or from. the monitored connections. These amounts are added together across all connections to a specific IP address to give the total value to. such as the mss. To get information immediately. and if iperf is specified to run. The status argument displays the configured timings. note After entering the command. Other values are relatively static across all connections.net congestion-check start [sample-interval <secs>] [capture-window <secs>] [every <mins>] [detailed {on | off}] [logfile <filename>] [{ iperf_client {none | { <iperf-server-host> | <iperf-server-ipaddr>} [nodelay <on | off>] [port {<port> | default} ] [window-size <bytes>] [connections <count>] } } ] Start the congestion monitor and schedule when it is to be run using the time arguments: sample-interval. if the monitor is actually running or scheduled to run. The start option default for iperf is always none. The congestion monitor is started when the net congestion-check start command option is issued. After the monitor is started the specified time arguments take over. The remaining arguments of net congestion-check start command are used to further configure how the monitor is run. or congestion window. Amounts of data or packets increase. use the net congestion-check run command instead.2 Command Reference Guide . the arguments override the defaults and become the default by being placed in the registry. the external location. capture-window. Rates are relatively constant but are also added together to give the total flow rate to the pipe at the remote location. there is a slight delay during which the process (netmon) actually starts the monitor. 196 EMC DD OS 5. All connections to and from an external address are merged into a single line of data. When the command option is run with arguments. Errors and loses are treated the same as rates and are added across all interfaces. There are no restrictions except for the size and the number. If the congestion monitor is running. create net create interface {<physical-ifname> | <virtual-ifname>} {vlan <vlan-id> | alias <alias-id>} Create a VLAN interface or an IP alias interface. The virtual interface name <vlan-id> must begin with veth. If it is not scheduled. The maximum size for an interface name is 15 characters. if there are 10 physical interfaces there can be no more than 10 virtual interfaces. net create virtual veth<id> Create a virtual interface. alias names. net 197 .net congestion-check stop The congestion monitor is run when the net congestion-check start command is issued. For example.) and colon (:). There is no such requirement for the alias. The remainder of the name is a decimal. The number given must be between 1 and 4094 inclusive. this command option stops the procedure and unschedules it. however it must be unique for the interface. which includes VLAN. The VLAN is created immediately in the kernel. For the VLAN there must be a matching number on the switch or other systems to transfer packets to the interface. The number of virtual interfaces cannot exceed the number of physical interfaces. The virtual interface name must be kept at a minimum. and the associated dot (. a message displays indicating that information to the user and no other action occurs. Even though the maximum is 9999. EMC recommends that the number used be in the range of 0 to 99. If the congestion monitor is scheduled. Example To create a virtual interface named veth12: # net create virtual veth12 ddns net ddns add <ifname-list | all> Add interfaces to Dynamic DNS registration list. this command option unschedules the procedure. but the alias is not created in the kernel until an IP address is specified. net ddns del <ifname-list | all> Remove interfaces from Dynamic DNS registration list. Interface names must be unique. 35 # net destroy veth23 disable net disable <ifname> Disable an Ethernet interface on the Data Domain system and bring down the interface in the kernel. If a virtual interface has associated VLANs and aliases. net ddns register Register configured interfaces with DNS. or if a VLAN has associated aliases. Example To remove a VLAN named eth1a. net ddns reset Reset Dynamic DNS registration list to auto and disable registration. Example To disable the interface eth0a: # net disable eth0a 198 EMC DD OS 5. the associated interfaces are also destroyed when the virtual interface or VLAN interface is destroyed. net ddns show Show interfaces in Dynamic DNS registration list.2 Command Reference Guide . or virtual interface. destroy net destroy {<virtual-ifname> | <vlan-ifname> | <ipalias-ifname> } Remove a VLAN. net ddns status Check status of dynamic DNS registration: enabled or disabled. IP alias. net ddns enable Enable Dynamic DNS updates.net ddns disable Disable Dynamic DNS updates.35 and a virtual interface named veth23:2: # net destroy eth1a. Allow one failover to be set as the primary and allow the up and down delays to be set. net failover del <virtual-ifname> interfaces <ifname-list> Delete network interfaces from a failover interface. which has eth2a and eth3a as slaves and eth3a as the primary interface: # net failover del veth1 interfaces eth2a Interfaces "eth2a" have been removed from "veth1". If the interface does not go into the RUNNING state. the actual value would be 9900. Example # net failover modify veth1 up 5000 down 10000 net 199 . where <ifname> is the name of an interface. Use commas. or both to separate list entries. Current interfaces for veth1: eth3a. if the time you want is 10 seconds and 10000 is specified. An up interface must be down for the amount of <time> to be designated down. Example To remove eth2a from the virtual interface veth1. This includes bringing up the interface to the RUNNING state and requires the interface to have an IP address. The address may already be saved in the registry or may come from DHCP. spaces. The freed interface remains disabled after being removed from the virtual interface. primary: eth3a net failover modify <virtual-ifname> primary {<ifname> | none} [up {<time> | default}] [down {<time> | default}] Modify the primary network interface. To remove a primary use primary <physical-ifname> none. the command will fail and the interface goes to the DOWN state and set to disabled. A down interface must be up for the amount of <time> to be designated up. failover net failover add <virtual-ifname> interfaces <ifname-list> [primary <ifname>] [up {<time> | default}] [down {<time> | default} Add network interfaces to a failover interface. The default value is 30 seconds but the actual 29. A primary interface cannot be removed from failover. the up /down times for a failover interface. The up and down time is given in milliseconds and is adjusted internally to increments of 900.enable net enable <ifname> Enable or reenable an Ethernet interface on the Data Domain system.7 seconds. For example. To delete a primary interface specify another interface as primary or set the primary be none. or both. yourcompany.The up time value used would be 4500 (4. or an alias. The registry settings may be different from the bonding configuration. The entry is added to the /etc/hosts file.5 seconds) and the down time value would be 9900 (9. If there are no IP addresses associated with these interfaces these commands will fail and using the command net config <ifname> up may be required. spaces. use the net show settings command. # net enable eth2a # net enable eth3a net failover show Display all failover interfaces. Example To associate the fully qualified domain name bkup20. when interfaces are added to the virtual interface. The address can be a IPv4 or an IPv6. The hostname is a fully qualified domain name. This command shows what is configured at the bonding driver.3.3 bkup20. the information is not sent to the bonding module until the virtual interface is brought up.3: # net hosts add 192. or both. (The physical interfaces remain disabled and must be reenabled for any other use than as part of another virtual interface. hosts net hosts add {<ipaddr> | <ipv6addr>} <host-list> Add a host list entry. To see what is in the registry. the physical interfaces remain disabled.3. This command also removes the addresses from the virtual interfaces and the addresses of any associated interfaces such as VLANs and aliases.yourcompany. Entries in the list can be separated by commas. Associate an IP address with a hostname.9 seconds). Use the net enable command to reenable the interfaces. a hostname. net failover reset <virtual-ifname> Reset a failover interface by removing associated slave interfaces.) # net failover reset veth1 After the virtual interface has been reset.com and the hostname of bkup20 with an IP address of 192.com bkup20 200 EMC DD OS 5.168.168.2 Command Reference Guide . After creation. Example Use the following command to remove virtual interface veth1 and release associated physical interfaces. Until that time the registry and the bonding driver configuration differ. Example # net hosts show Hostname Mappings: 192.com iperf net iperf client {<ipaddr> | ipv6addr> | <hostname> [ipversion {ipv4 | ipv6]} } [port <port>] [windowsize <bytes>] [data {random|default}] [interval <secs>] [{transmit-size <bytes> | duration <secs>}] [connections <count>] [nodelay] Run iperf in client mode.3. The ipversion argument may be used to specify the type of addressing.3. See “Linux/DD OS Equivalent Arguments for iperf Option” to compare Linux iperf options with DD OS options. The ipversion argument may be used to specify the type of addressing. the ipversion argument must also be specified. Example # net hosts del 192.168. net 201 . net iperf server start [port {<port> | congestion_check-port}] [ipversion {ipv4 | ipv6}] [window-size <bytes>] Run the iperf in the background in server (-s) mode. The default is an IPv4 address. This command option provides the status on if the iperf server is running and what connections it has. net iperf server [run] [ipversion {ipv4 | ipv6}] [port {<port> | congestion_check-port}] [window-size <bytes>]] Run iperf in server mode. All users may run this command option. If an IPv6 address is specified for the hostname.3 -> bkup20 bkup20.3 net hosts reset Clear the hosts list from the /etc/hosts file. net iperf server stop Stop iperf invoked by net_server start.168.yourcompany. net iperf server status Display information about the iperf server running in the background as invoked by net_server start. net hosts show Display hostnames and IP addresses from the /etc/hosts file.net hosts del {<ipaddr> | <ipv6addr>} Delete a host list entry from the /etc/hosts file. Can be converted into an IPv4 or Ipv6 depending on the ipversion argument. Requires system reboot for changes to take effect. This command may be used with IPv4 or IPv6 addresses. ping net ping {<ipadddr> | <ipv6addr>| <hostname> [ipversion {ipv4 | ipv6}]} [broadcast] [count <n>] [interface <ifname>] Verify the Data Domain system can communicate with a remote host. An IPv6 address is specified. domain names.2 Command Reference Guide . Number of pings to issue. broadcast count <n> interface <ifname> Example To verify communication is possible with the host srvr24: # net ping srvr24 reset net reset {domainname | searchdomains} Reset Data Domain system DNS servers.lookup net lookup {<ipaddr> | <ipv6addr> | <hostname>} Search DNS entries. Enable pinging a broadcast address (available for IPv4 only). or host names to default settings. If ipversion argument is not specified. Argument Definitions ipaddr ipv6addr hostname An IPv4 address is specified. option net option show Display settings for network options. 202 EMC DD OS 5. Name of interface to ping. All users may run this command option. IPv4 is used. net set hostname <host> Set the hostname of the Data Domain system. a warning is displayed: Warning: Following domains are not resolvable.com. which is always included in the list of searchdomains. The default for searchdomain is the domainname name.Example # net reset domainname The Domainname is: yourcompanydomain.com The searchdomains list is yourcompany-ny. please check the names and DNS configuration. The default for domainname is the return from DHCP.com.com and yourcompany3. Requires system reboot for changes to take effect. set net set {domainname <local-domain-name> | searchdomains <search-domain-list>} Set the domainname or searchdomains used by the Data Domain system. yourcompany2. net reset hostname Reset hostname to default values. Requires system reboot for changes to take effect. Data Domain recommends using hostnames without underscores to ensure the GUI can recognize and manage the host. yourcompany3.com # net set searchdomains yourcompany2.com (local domain) net reset dns Reset DNS list to default values. net 203 . or what is set by net set hostname command. net set dns <ipv4-ipv6-addr-list> Set the DNS server list using IP version 4 or IP version 6.com. Only servers included in the most recently issued command are available to a Data Domain system. This command overwrites the current list of DNS servers. Note that some browsers may prevent logins to the host if the hostname contains an underscore. If the domain names provided cannot be resolved.com # net reset searchdomains The Searchdomains is: yourcompanydomain. Example # net set domainname yourcompany-ny. either linklocal or router-generated addresses.0 b) TX bytes:0 (0.4 GiB) TX bytes:2155985162 (2.8.255 Mask:255. including IPv4 and IPv6 addresses.0 GiB) eth1 Link encap:Ethernet HWaddr 00:15:17:A3:9F:99 BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.note If the Data Domain system is using CIFS with Active Directory authentication. changing the hostname causes the Data Domain system to drop out of the domain. Auto-assigned addresses are displayed with the kernel information but not with the registry settings. Some IPv6 addresses are automatically assigned to interfaces. as in the net show settings command.168.175 Bcast:192. Use the cifs set authentication command option to rejoin the Active Directory domain.168. show net show all Display all networking information. Example # net show all Active Network Configuration: eth0 Link encap:Ethernet HWaddr 00:15:17:A3:9F:98 inet addr:192.2 Command Reference Guide . net set portnaming {slot-based | legacy} Change the port naming scheme.255.0 UP BROADCAST NOTRAILERS RUNNING MULTICAST MTU:1500 Metric:1 RX packets:339424667 errors:0 dropped:8563092 overruns:0 frame:0 TX packets:25770836 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:52040424455 (48.11. because they do not exist in the registry. This type of address cannot be changed or modified.0 b) 204 EMC DD OS 5.252. 0.com Searchdomains: # Searchdomains .0.0.24.0.1:7995 127.0.255.0.0.0. net 205 .0.0.0.----------------------------The Hostname is: dd120-19.1:3006 127.146 2 10.175* 255.0.24.0* n/a (not specified)* (not specified)* n/a --------------------------------------------------------------------------------------------------------------* Value from DHCP Domainname: The Domainname is: datadomain.252.0.255.1:57064 Foreign Address 127.1:7995 127.1:56883 127.com DNS: # Server -------------------------1 10.0.8. Network Hardware: Port Speed Duplex Supp Speeds Hardware Address Physical Link Status -----------------------------------------------------------------------------------------------------------------eth0 1000Mb/s eth1 unknown full unknown 10/100/1000 10/100/1000 00:15:17:a3:9f:98 00:15:17:a3:9f:99 Copper Copper yes no -----------------------------------------------------------------------------------------------------------------Network Stats: Active Internet connections (w/o servers) Proto Recv-Q tcp tcp tcp tcp tcp tcp 0 0 0 0 0 0 Send-Q 0 0 0 0 0 0 Local Address 127.com (local domain) .0.0.1:53578 127.0.Network Settings: port enabled DHCP IP address netmask type additional setting --------------------------------------------------------------------------------------------------------------eth0 yes eth1 yes yes yes 192.150 -------------------------Showing DNS servers configured by DHCP.168.1:33092 127.0.0.----------------------------1 datadomain.datadomain.1:3006 127.0.0.255.0.1:3006 127.0.1:55373 127.1:8002 State TIME_WAIT TIME_WAIT ESTABLISHED TIME_WAIT ESTABLISHED ESTABLISHED Output truncated.1:33092 127.0. 130.0 MiB) TX bytes:2831694 (2.7 MiB) net show {domainname | searchdomains} Display the domain name or search domains used for email sent by a Data Domain system.2 Command Reference Guide .0 b) eth0b Link encap:Ethernet HWaddr 00:A0:D1:EC:F7:40 inet addr:10.255 Mask:255.143.240.0 b) TX bytes:0 (0. because the interface cannot come up to the RUNNING state the link local and router-generated address are not available. Interface eth0b shows a IPv4 static address and two auto-generated IPv6 addresses.0 inet6 addr: 2620:0:170:1106:2a0:d1ff:feec:f740/64 Scope:Global inet6 addr: fe80::2a0:d1ff:feec:f740/64 Scope:Link UP BROADCAST NOTRAILERS RUNNING MULTICAST MTU:1500 Metric:1 RX packets:5130625 errors:0 dropped:0 overruns:0 frame:0 TX packets:7345 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:362880422 (346. Example (IPv6) # net show config eth0a Link encap:Ethernet HWaddr 00:A0:D1:EC:F7:41 inet6 addr: 2003:deaf::beef:face:cafe/52 Scope:Global UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0. This command shows auto-generated IPv6 addresses.net show config [<ifname>] Display the configuration for a specific Ethernet interface. the interface eth0a shows a statically assigned IPv6 address. Exclude the keyword <ifname> to view the configuration for all Ethernet interfaces. The final line in the output shows if the servers were configured manually or by DHCP. net show dns Display a list of DNS servers used by the Data Domain system. 206 EMC DD OS 5.165 Bcast:10. however. In the example.25.255.25. IPv4 uses periods. Hardware Address The MAC address. not the status of each interface. eth3 or eth3a.net show hardware Display Ethernet port hardware information. the interface is not enabled. depending on the port naming convention the system uses). Duplex Full or half duplex protocol. For example. net show settings Display the configured Ethernet interface settings. Example # net show hardware Network Hardware: Port Speed Duplex Supp Speeds Hardware Address Physical Link Status -----------------------------------------------------------------------------------------------------------------eth0 1000Mb/s eth1 unknown full unknown 10/100/1000 10/100/1000 00:15:17:a3:9f:98 00:15:17:a3:9f:99 Copper Copper yes no ------------------------------------------------------------------------------------------------------------------ Output Definitions Port The Ethernet interfaces on the system (for example. Supp Speeds Lists speeds the port is capable of using. Speed The actual speed at which the port processes data. net show hostname Display the hostname of the Data Domain system. Physical Copper or fibre. net 207 . The IPv6 addressing scheme uses colons to separate values. if an interface on the Data Domain system does not have a live Ethernet connection. Example (IPv4) # net show settings port enabled DHCP eth0 eth1 eth2 eth3 eth4 eth5 eth6 yes no no yes yes no no yes n/a n/a n/a n/a n/a n/a n/a n/a no IP address 192.240.30.168.142* n/a n/a n/a n/a n/a n/a n/a n/a n/a n/a n/a n/a n/a n/a netmask 255.165* * Value from DHCP type additional setting ------------------------------------------------------------------------------------------------------------------------------------------------ 208 EMC DD OS 5.252.30 255.255.255.0* n/a n/a n/a n/a n/a n/a n/a n/a bonded to veth2 / balance hash xor-L3L4: eth3 bonded to veth2 / balance hash xor-L3L4: eth4 type n/a n/a n/a bonded to veth0 bonded to veth1 additional setting/prefix length ------------------------------------------------------------------------------------------------------------------------------------------------------------------- veth0 yes veth1 yes veth2 yes 30.25.30.0* n/a n/a yes 10.2 Command Reference Guide .255.255.veth1 ------------------------------------------------------------------------------------------------------------------------------------------------------------------* Value from DHCP Example (IPv6) # net show settings port enabled DHCP IP address netmask /prefix length -----------------------------------------------------------------------------------------------------------------------------------------------eth0a yes eth0b yes no 2003:deaf::beef:face:cafe /52 255.130.0 n/a failover: veth0.9. 0.1:3009 CLOSE_WAIT Example 2 # net show stats listening Active Internet connections (only servers) Proto Recv-Q Send-Q tcp tcp tcp tcp tcp 0 0 0 0 0 0 0 0 0 0 Local Address *:nfs *:pxc-ntfy localhost.0.25.1:38401 ::ffff:127.0.1:42791 127.0.175:601 127.0. net tcpdump del {<filename> | all} Delete output files created by the net tcpdump capture command.1:3006 127.168.0.0.1:53968 127. and then copy the output file to another system for analysis. Example 1 # net show stats all Active Internet connections (w/o servers) Proto Recv-Q Send-Q tcp tcp tcp tcp tcp tcp tcp 0 0 0 0 0 0 38 0 0 0 0 0 0 0 Local Address 127.0.8.1:33092 State TIME_WAIT ESTABLISHED TIME_WAIT TIME_WAIT TIME_WAIT ESTABLISHED ::ffff:127.0.0.net show stats [ipversion {ipv4 | ipv6}] [all | interfaces | listening | route | statistics] Display network statistics.0.0. you are prompted to delete some of the files.209.0.0.0.0. The default shows all statistics.0.1:60344 192.6:940 127. If this limit is reached.0. A maximum of 10 output files may be retained on the system.1:3006 10. net 209 .1:38008 127.localdomain:8003 Foreign Address *:* *:* *:* *:* *:* State LISTEN LISTEN LISTEN LISTEN LISTEN tcdump net tcpdump capture <filename> [interface <iface>] [{host <host> [ipversion {ipv4 | ipv6] | net {<ipaddr> [mask <mask>] | <ipv6addr>[/<prefixlength>]}}] [port <port>] [snaplen <bytes>] Capture data.0.1:7995 Foreign Address 127.1:3006 127.lo:teradataordbms *:epnsdp localhost. The ipversion argument shows information on IPv4 or IPv6 addresses only. including IPv4 and IPv6 addresses. Specify a <filename> to delete files matching the pattern /ddvar/traces/tcpdump_<filename> *. Specify all to remove all net tcpdump output files.0.0. This command converts the options from the command line to equivalent tcpdump options.0. Output files are placed in /ddvar/traces where you can upload them to autosupport.0.1:3006 127.0. several net command options now include arguments for both versions of Internet Protocol. Example # net troubleshooting duplicate-ip Port ----eth1a IP Address Details -------------.2 duplicate ip from MAC address 00:15:17:32:33:32 eth2a. the default is IPv4 to maintain compatibility with the previous DD OS versions. for example.troubleshooting net troubleshooting duplicate-ip Detect duplicate IP in network. The system makes the primary interface the active interface when the primary interface is operational. OST.----------11. you must specify the IPv4 argument. when a hostname is provided. 210 EMC DD OS 5. EMC Data Domain customers select which version to use.1.2 Command Reference Guide . based on the type of configuration.2. As a result. note IPv6 addresses are not supported for replication. New Support for IPv6 Federal certification requirements state that the DD OS must be IPv6-capable and that interoperability with IPv4 be maintained in an heterogeneous environment.100:1 11. one of which can be specified as the primary.2. To view the IPv4 routes only. More About Ethernet Failover Ethernet failover provides improved network stability and performance. The exception is show commands. The failover-enabled virtual interface represents a group of secondary physical interfaces.3 duplicate ip from MAC address 00:15:17:32:33:33 Additional Topics This section provides additional information on various topics and concepts. If a command cannot determine the IP version of an address. NFS.1. and is implemented with the net failover command. If the version is not specified in the show command option (as in route show table). both address versions are displayed. DD Boost. and CIFS. you must enter IPv6 in the command option if the host is to be accessed using its IPv6 address. If you do not specify an IP version. A failover from one physical interface to another can take up to 30 seconds. The delay is to guard against multiple failovers when a network is unstable. Guidelines Consider the following guidelines when planning an interface failover:  For best results, a primary interface should be part of the failover. This provides a way of determining which interface is active. A primary slave cannot be removed from the bonding except in the case of net failover reset command, during which all slaves are removed. A primary interface must be explicitly specified as the primary, and must also be a slave, to the virtual interface. To designate a physical interface as the primary failover interface, use the optional primary argument. If the primary interface goes down and multiple interfaces are available, the next interface is selected at random. The virtual interface must be present on the system. Use the net show settings command option to confirm the presence of a virtual interface. Enable failover on the existing virtual interface name in the form vethx, where x is a unique string (typically one or two digits). A typical full virtual interface name with and associated VLAN and alias is veth56.3999:199. The maximum name length is 15 characters, which typically limits the name string x to two characters. Special characters are not supported. Use commas, spaces, or both to separate list entries. If a primary interface is part of the failover, it cannot be deleted from the failover while it is the primary interface. Use the net failover modify command to change the primary interface. To remove the slave from an interface, set another interface to primary or “none.” For example, to associate a failover virtual interface named veth1 with the physical interfaces eth2a and eth3a, and to designate eth2a as the primary: # net failover add veth1 interfaces eth2a eth3a primary eth2a Current interfaces for veth1: eth2a, eth3a, primary eth2a     Number of Ports The number of ports depends on the number and type of Ethernet cards, and on the system type. A system with two Ethernet cards has a maximum of six ports: eth0a, eth1a, eth2a, eth3a, eth4a, and eth5a. If one of the cards is a 1-port 10 GbE fiber, the maximum is five ports (eth0a-eth4a). A system with two quad-port NICs has a maximum 10 ports, and a system with three cards, such as DD670, has a maximum of 14 ports. If the system allows it, five network cards can be added to the system, but the absolute maximum number of physical port allowed is 20. net 211 Number of Physical Interfaces The recommended number of physical interfaces for failover is two so as not to “waste” interfaces in a passive mode. However, you can configure one primary interface and five failover interfaces. Exceptions are 10 Gb CX4 Ethernet cards, which are restricted to one active interface and one standby interface (both slaves must be on same card), and 10 Gb optical, single-port Ethernet cards, which cannot be used in failover or aggregation. Note that the SFP+ 10 Gb interfaces do not have these restrictions. More About the net aggregate Option The net aggregate commands control link aggregation, which provides improved network performance and resilience by using two or more network ports in parallel. Note that link aggregation and Ethernet trunking are synonymous. The recommended and supported maximum is four ports, but there are no restrictions on the Data Domain system for having more aggregate slaves. More About LACP LACP uses a control protocol to determine which interfaces can be used. An interface must not only have carrier up, but also must be able to communicate with its directly attached partner. This provides a better port fail recovery than failover bonding; however, the LACP port must reside on a single switch except for special cases of virtual switch ports. Therefore to fail across switches failover bonding must be used. More About Up/Down Arguments A down interface must be up for interval configured in <time> to be considered up. An up interface must be down for the interval configured in <time> to be considered down and not available. If a link is up, the interface carrier must be missing for the amount of time specified by the down argument before the link is designated down. Default for up/down times is 29.7 seconds. Up/down times are rounded down to a multiple of 0.9 seconds. For example if 10 seconds is configured, 9.9 seconds is used. When the link is down:    Data is no longer sent to the interface. For an aggregation bonding, aggregation is recalculated. For a failover bonding, if the affected interface is the active interface, then the active interface is switched to another interface that is up. 212 EMC DD OS 5.2 Command Reference Guide The interface carrier must be present for the amount of time specified by the up argument before the link is designated up. When the link is up:    Data can be sent over it. For an aggregation bonding, the aggregation is recalculated to include the up link. For a failover bonding, nothing more is done; however, if the up interface is the primary or sole, up slave interface, then it is also marked as the active interface. Linux/DD OS Equivalent Arguments for iperf Option The iperf Linux command measures the quality and bandwidth of network connections. The DD OS net iperf command provides equivalent capabilities. Values for <bytes> may be followed by the K, M, or G suffice for to scaling the value. DD OS net iperf Option <server-host> <port> window-size <bytes> transmit-size <bytes> duration <secs> interval <secs> data random Linux iperf Option -c <server-host> -p <port> -w <iperf-bytes> -n <iperf-bytes> -t <secs> -i <secs> (Data Domain version of iperf) or -F /dev/urandom-R -N -p <number> -X (Data Domain version of iperf) no delay connections <count> none net 213 Linux/DD OS Equivalent Arguments for tcdump Option The DD OS tcdump command dumps network traffic output as does the Linux tcdump command. Values for <bytes> may be followed by the K, M, or G suffice for to scaling the value. DD OS net tcdump Option <filename> Linux tcdump Option -w /ddvar/traces/tcpdump_<filename> -C 100M -W 5 -i <iface> -w <iperf-bytes> net <net> mask <mask> -i <secs> -s <bytes> interface <iface> host <host> net <net> mask <mask> port <port> snaplen <bytes> Sample Failover Workflow 1. Disable the interfaces eth2a, eth3a, and eth4a for use as failover interfaces: # net disable eth2a # net disable eth3a # net disable eth4a 2. If virtual interface veth1 does not exist on the system, create it: # net create virtual veth1 3. Create a failover virtual interface named veth1 using the physical interfaces eth2a and eth3a: # net failover add veth1 interfaces eth2a, eth3a Current interfaces for veth1: eth2a, eth3a 4. Enable virtual interface veth1: # net config veth1 10.20.199.41 netmask 255.255.0.0 214 EMC DD OS 5.2 Command Reference Guide 5. Show configured failover virtual interfaces: # net failover show Ifname -----veth1 -----Hardware Address Configured Interfaces ----------------- --------------------00:04:23:d4:f1:27 eth2a,eth3a, active: none, primary: None ----------------- --------------------- To add the physical interface eth4a to failover virtual interface veth1: # net failover add veth1 interfaces eth4a Current interfaces for veth1: eth2a, eth3a, eth4a To remove eth2a from the virtual interface veth1: # net failover del veth1 interfaces eth2a Interfaces "eth2a" have been removed from "veth1". Configuration of "veth1" is reset. To clear the virtual interface veth1 of the IP address and release the associated physical interfaces: # net failover reset veth1 Interfaces "eth3a, eth4a" have been removed from "veth1". Configuration of "veth1" is reset. To reenable the physical interfaces: # net enable eth2a # net enable eth3a # net enable eth4a Sample Aggregation Workflow 1. Disable the interfaces eth2a, eth3a, and eth4a to use as aggregation interfaces: # net disable eth2a # net disable eth3a # net disable eth4a 2. If virtual interface veth1 does not exist on the system, create it: # net create virtual veth1 net 215 3. Enable link aggregation on virtual interface veth1 for physical interfaces eth2a and eth3a in xor-L2 mode: # net aggregate add veth1 mode balanced hash xor-L2 interfaces eth2a eth3a 4. Enable the virtual interface: # net config veth1 192.168.45.119 netmask 255.255.248.0 5. Show the aggregate setup: # net aggregate show Ifname Hardware Address Aggregation Mode Configured Interfaces Up Delay Down Delay ------------------------------------------------------------------------------------------------------------------------------------------------------veth10 00:15:17:0f:63:fc balance hash xor-L2 eth2a, eth3a 29700 29700 ------------------------------------------------------------------------------------------------------------------------------------------------------- To delete physical interface eth3a from the aggregate virtual interface veth1: # net aggregate del veth1 interfaces eth3a To add link physical interface eth4a on virtual interface veth1: # net aggregate add veth1 mode xor-L2 interfaces eth4a To remove all interfaces from veth1: # net aggregate reset veth1 Interfaces "eth2a, eth4a" have been removed from "veth1". Configuration of "veth1" is reset. To reenable the physical interfaces: # net enable eth2a # net enable eth3a # net enable eth4a Interface Naming Format The interface naming format is eth<slot #><a-d>. Letters are sequential without gaps. For onboard NIC vertical interfaces, the top or left interface is eth0a and the bottom or right interface is eth0b. For onboard NIC horizontal interfaces, the left interface, as viewed from the rear, is eth0a and the right is eth0b. In configurations of four onboard interfaces, the top left interface is eth0a, the top right interface is eth0b, the bottom left interface is eth0c, and the bottom right interface is 216 EMC DD OS 5.2 Command Reference Guide slaves are renamed. the next is ethxb. the interface at the top of the card is ethxa. until the bottom of the card where x is the slot number. Note that the revised naming format is not required for virtual interfaces. the associated configuration names are also changed. and so on. net 217 . This ensures:    A method for identify the correct physical link from the logical link.eth0d. For example. however.236 becomes eth0b. Virtual interfaces can be removed from interface list by running the destroy option. That the interface names do not change if cards are added or removed. eth1. That the interface name is not dependent on the type of cards in the system. the next is ethxc.9 are changed to the current naming structure. When interface names prior to 4. eth1 and eth0 bonded to veth1 becomes eth0a and eth0b bonded to veth1.236. For optional cards installed vertical or horizontal. 2 Command Reference Guide .218 EMC DD OS 5. nfs 219 . spaces. It also enables you to display status information. and permissions. or both. output. Guidelines and Restrictions  Unless otherwise noted. Options include:        add del disable enable reset show status Change History Click the command option for details on usage and functionality. Separate list entries by commas.2 No changes from previous version. such as verifying that the NFS system is active. and the time required for specific NFS operations.   Options The following options are available with this command. including arguments. The subdirectory /backup subdirectory is not supported in Global Deduplication Arrays (GDAs).nfs The nfs command enables you to add NFS clients and manage access to a Data Domain system. Version Change 5. See the EMC DD OS Release Notes of the corresponding version for details on modifications. command options are available only to users with admin role permissions. or an asterisk wildcard for the domain name. no_root_squash Turn off root squashing (default value). only /ddvar is exported.add nfs add <path > <client-list> [(<option-list>)] Add NFS clients that can access the Data Domain system. The export of /data shares is not supported. class-C IP addresses. root_squash Map requests from uid or gid 0 to the anonymous uid/gid.yourcompany. NFS Options ro Enable read-only permission. An asterisk by itself means no restrictions. enclosed by parentheses. all_squash Map all user requests to the anonymous uid/gid. insecure Turn off the secure option.com. If no option is specified. rw Enable read and write permissions (default value). IP addresses with netmasks or length. no_all_squash Turn off the mapping of all user requests to the anonymous uid/gid (default value). an NIS netgroup name with the prefix @. no_all_squash. and secure. the default options are rw. secure Require that requests originate on an Internet port that is less than IPPORT_RESERVED (1024) (default value). The <options-list> is comma or space separated.2 Command Reference Guide . 220 EMC DD OS 5. A client can be a fully qualified domain hostname. such as *. In GDA configurations. root_squash. A client added to a subdirectory under /backup has access only to that subdirectory. anongid=<id> Set an explicit group ID for the anonymous account. del nfs del <path><client-list> Delete specific directories. NFS clients can access the Data Domain system when the list is empty. show nfs show active List clients active in the past 15 minutes and the mount path for each. disable nfs disable Disable all NFS clients. enable nfs enable Allow all NFS-defined clients to access the Data Domain system. including a backup subdirectory. nfs 221 . In GDA configurations. nfs reset stats Clear the NFS statistics. only /ddvar is exported. The export of /data shares is not supported.anonuid=<id> Set an explicit user ID for the anonymous account. The ID is an integer bounded from 0 to 65635. for one or more clients. or an asterisk that represents all clients. reset nfs reset clients Reset client list to the factory default empty. The ID is an integer bounded from 0 to 65635. The <client-list> can contain IP addresses. hostnames. 0 0.0 0.0 0.0 0.0 0.0 0.0 1 3 1 20 3 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 8ms 10ms 100ms 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1s 10s >10s 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ------------------------------------------------------------------------------------------------------------------------------------------- .0 0..0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.1 0.0 0.0 0.0 0.0 0.2 Command Reference Guide .0 0.0 0. Example # nfs show histogram Op NULL GETATTR SETATTR LOOKUP ACCESS READLINK READ WRITE CREATE MKDIR SYMLINK MKNOD REMOVE RMDIR RENAME LINK READDIR READDIRPLUS mean-ms stddev max-s 2ms 4ms 6ms 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0. nfs show detailed-stats Display NFS cache entries and status to facilitate troubleshooting.nfs show clients List NFS clients allowed to access the Data Domain system and the mount path and NFS options for each.0 0.0 0.0 0..0 0. ------------------------------------------------------------------------------------------------------------------------------------------- Output truncated. Users with user role permissions may run this command. nfs show histogram Display NFS operations in a histogram.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0. 222 EMC DD OS 5.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0. >10s The number of operations that took over 10 seconds. 4ms The number of operations that took between 2ms and 4ms. 6ms The number of operations that took between 4ms and 6ms. max-s The maximum time taken for a single operation. stddev The standard deviation for time to complete operations. 8ms The number of operations that took between 6ms and 8ms. or since the last time that the NFS statistics were reset. 100ms The number of operations that took between 10ms and 100ms. status nfs status Enter this option to determine if the NFS system is operational. the output shows the total number of NFS requests since the filesystem started. 10ms The number of operations that took between 8ms and 10ms. derived from the mean time. Users with user role permissions may run this command. nfs show port Display NFS port information.Output Definitions mean-ms The mathematical mean time for completion of the operations. nfs 223 . 1s The number of operations that took between 100ms and 1 second. 2ms The number of operations that took 2 ms or less. nfs show stats Display NFS statistics. When the filesystem is active and running. 10s The number of operations that took between 1 second and 10 seconds. 168.1.168.02/255.168. enter: # nfs del /ddvar 192.255. enter: # nfs add /backup 192.1.0 To delete an NFS client with an IP address of 192.02/24 # nfs add /backup 192.1.1.02 from the /ddvar directory.2 Command Reference Guide .1.Additional Topics This section provides additional information on various topics and concepts.02 224 EMC DD OS 5.168.02 To add a subnet client using its IP address followed by a length and a netmask.168.168. enter: # nfs add /backup 192.02 and  read/write access to /backup with the secure option. Add or Delete NFS Clients To add an NFS client with an IP address of 192.1.255. 2 With the exception of ntp show and ntp status. command options are available only to users with admin role permissions. Guidelines and Restrictions  Unless otherwise noted. Default system settings for NTP service are enabled and multicast. output. and permissions. or set manually with the Data Domain system ntp add command. Options include:        add del disable enable reset show status Change History Click the command option for details on usage and functionality. received from Dynamic Host Configuration Protocol (DHCP).    ntp 225 .ntp The ntp command synchronizes a Data Domain system with an NTP time server. or turns off the local NTP server. Time servers set with the ntp add command override time servers from DHCP and from multicast operations. manages the NTP service. Time servers from DHCP override time servers from multicast operations. A Data Domain system can use a time server supplied through the default multicast operation. See the EMC DD OS Release Notes of the corresponding version for details on modifications. Version Change 5. including arguments. ntp command options require security officer authorization when run on Retention Lock Compliance systems. 226 EMC DD OS 5.com del ntp del timeserver <server-name> Delete a manually added time server from the list. This command option requires security officer authorization for Retention Lock Compliance systems.yourcompany. enter: # ntp add timeserver srvr26.com disable ntp disable Disable NTP service on a Data Domain system. enable ntp enable Enable NTP service on a Data Domain system. This command option requires security officer authorization for Retention Lock Compliance systems. You cannot delete DHCP time servers or reset to multicast when DHCP time servers are supplied. Example To add an NTP time server named srvr26.2 Command Reference Guide .com to the list.yourcompany. enter: # ntp del timeserver srvr26.yourcompany. The Data Domain system ntp del and ntp reset commands act only on manually added time servers.com from the list. add ntp add timeserver <server-name> Add a remote time server to NTP list. not on DHCP-supplied time servers. This command option requires security officer authorization for Retention Lock Compliance systems.yourcompany. This command option requires security officer authorization for Retention Lock Compliance systems. Options The following options are available with this command. Example To delete an NTP time server named srvr26. 168.168. time. and synchronization information.214 eth0a X X eth1a ----------------------------------------------------------------- ----------------------------------------------------------------Showing NTP servers configured by DHCP.244. # 1 2 Server 192. status ntp status Display the local NTP service status.676 2011 Thu Feb 26 19:12:05. show ntp show config Display status of NTP: enabled or disabled.729 2010 192. and show the time server list.reset ntp reset Reset the NTP configuration to the default settings.244.168. If running the command in a GDA. This command option requires security officer authorization for Retention Lock Compliance systems.208 192. ntp reset timeservers Reset the time server list from manually entered time servers to DHCP time servers (if supplied) or to the multicast mode (if no DHCP time servers supplied).208 ntp 227 . Example # ntp status Status Current Clock Time Clock Last Synchronized Clock Last Synchronized With Time Server Enabled Thu April 12 19:27:57.244. Example # ntp show config NTP is currently enabled. the output includes information about the master and worker controllers. This command option requires security officer authorization for Retention Lock Compliance systems. 228 EMC DD OS 5.2 Command Reference Guide quota The quota command enables users to modify the amount of storage space for MTrees and for VTL and DD Boost storage units. There are two quota limits: hard and soft. The hard limit prevents writes from exceeding the quota. Users receive an error message if the hard limit is exceeded. The soft limit allows writes to exceed the quota; however, an alert is generated. The soft value must be less than the hard value. Quota limits must be specified as integers. You can set hard, soft, or both, depending on your requirements. For example, an administrator may choose to enforce only a soft limit to prevent backup jobs running overnight from failing when the quota limit is reached. Or, he or she may choose to enforce only a hard limit to block a user from writing when the quota limit is reached. Snapshots capture quota information at a precise point in time. Usage tracking in the active filesystem does not account for the space of snapshot, so quota limits are not enforced on snapshots. For information on establishing quotas when creating MTrees, and DD Boost and VTL storage units, see “mtree,” “ddboost,” and “ vtl,” respectively. Options include:       disable enable reset set show status Change History Click the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions. Version Change 5.2 Quota command and options introduced. quota 229 Guidelines and Restrictions  Unless otherwise noted, command options are available only to users with admin role permissions. MTree quotas with a hard limit cannot be set on the /data/col1/backup directory. The maximum MTree quota value is 4096 PiB. See “mtree” for details.   Options The following options are available with this command. disable quota disable Disable quota support. This command option also disables MTree quota limits and restores the limits to the default state (unlimited). enable quota enable Enable quota support. reset quota reset { all | mtrees <mtree-list> | storage-units <storage-unit-list> } [soft-limit] [hard-limit] Reset quota limits. If hard or soft limits are not entered, both are reset to the default state (unlimited). Example 1 To reset hard and soft limits for an MTree: # quota reset mtrees /data/col1/backup1 Quota soft limit: none, hard limit: none Note: Quota is disabled. Quota limits not enforced. Example 2 To reset soft limit only for an MTree: # quota reset mtrees /data/col1/backup1 soft limit /data/col1/backup1: Quota soft limit: none, hard limit: 1048576 MiB 230 EMC DD OS 5.2 Command Reference Guide Example 3 To reset hard limit only for an MTree: # quota reset mtrees /data/col1/backup3 hard limit /data/col1/backup3: Quota soft limit: 102400 MiB, hard limit: none Example 4 To reset hard and soft limits for a storage-unit: # quota reset storage-units DDBOOST_STRESS_SU Quota soft limit: none, hard limit: none set quota set {all | mtrees <mtree-list> | storage-units <storage-unit-list>} {soft-limit <n> {MiB|GiB|TiB|PiB} | hard-limit <n> {MiB|GiB|TiB|PiB} | soft-limit <n> {MiB|GiB|TiB|PiB} hard-limit <n> {MiB|GiB|TiB|PiB}} Set quota limits during runtime for multiple MTrees. When used for storage units, this command option sets limits only after the storage unit is created. Note that the quota feature must be enabled, otherwise limits are not enforced. Setting quotas does not require disabling the filesystem and therefore does not affect system performance. See “ddboost” for instructions on how to set quotas during the creation of a storage unit. Example 1 To set a soft limit quota of 10 GiB on MTree /data/col1/backup1 when the quota feature is disabled: # quota set mtrees /data/col1/backup1 quota-soft-limit 10 GiB /data/col1/backup1: Quota soft limit: 10240 MiB, hard limit: none Note: Quota is disabled. Quota limits not enforced Example 2 To set a hard limit quota of 10 TiB on MTree /data/col1/backup1: # quota set mtrees /data/col1/backup1 hard-limit 10 GiB /data/col1/backup1: Quota soft limit: n/a, hard limit: 1048576 MiB Example 3 To set a soft limit quota of 100GiB and a hard limit quota of 1TiB on MTree /data/col1/backup1: # quota set mtrees /data/col1/backup1 soft-limit 10 GiB hard-limit 10 TiB /data/col1/backup1: Quota soft limit: 10240 MiB, hard limit: 1048576 MiB quota 231 Example 4 To set a soft limit quota of 100 GiB and a hard limit quota of 1 TiB on storage-unit DDBOOST_STRESS_SU: # quota set storage-units DDBOOST_STRESS_SU soft-limit 100 GiB hard-limit 1 TiB DDBOOST_STRESS_SU: Quota soft limit: 10240 MiB, hard limit: 1048576 MiB show quota show {all | mtrees <mtree-list> | storage-units <storage-unit-list>} List the quota limits and usage of a particular mtree or storage unit, all mtrees or storage units, or all of both. The unit of display for usage and limits is MiB. Example 1 # quota show /data/col1/backup Mtree /data/col1/backup Pre-Comp (MiB) 1000 Soft-Limit (MiB) none Hard-Limit (MiB) none --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Note: Quota is disabled. Quota limits not enforced. Example 2 # quota show all Name /data/col1/backup /data/col1/DDBOOST_STRESS_SU /data/col1/temp /data/col1/.deleted-1310058450572152676 /data/col1/abcd /data/col1/abcd2 Note: Quota is disabled. Quota limits not enforced. Pre-Comp 0 KiB 1 GiB 0 KiB 0 KiB 0 KiB 0 KiB Soft-Limit unlimited 10 GiB unlimited unlimited unlimited 100 GiB Hard-Limit unlimited 20 GiB unlimited unlimited unlimited 200 GiB ------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------- 232 EMC DD OS 5.2 Command Reference Guide Example 3 # quota show storage units Name DDBOOST_STRESS_SU temp abcd2 Note: Quota is disabled. Quota limits not enforced. Pre-Comp 1GiB 0 KiB 0 KiB Soft-Limit unlimited unlimited 100 GiB Hard-Limit unlimited unlimited 200 GiB ------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------- Example 4 # quota show storage-units abcd2 temp Name temp abcd2 Note: Quota is disabled. Quota limits not enforced. Pre-Comp 0 KiB 0 KiB Soft-Limit unlimited 100 GiB Hard-Limit unlimited 200 GiB ------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------- status quota status Display status of quota enforcement: enabled or disabled. If output includes a note stating status as disabled, quota limits are not being enforced and are therefore unlimited. quota 233 234 EMC DD OS 5.2 Command Reference Guide replication The replication command enables you to replicate data (copy and synchronize), between two Data Domain systems: a source and a destination. Source and destination configurations, or pairs, are also known as “contexts.” Depending on your objective, you can replicate entire sites, specific directories, MTrees, or files within a virtual tape library. Replication is a licensed software option. See the EMC DD OS Administration Guide for details on replication practices and procedures. Options include:                 abort add break disable enable initialize modify option reauth recover resync show status sync throttle watch Change History Click the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions. Version Change 5.2 Modified command options: replication break {<destination> | all} replication 235 replication disable {<destination> | all} replication sync [<destination>] Guidelines and Restrictions  Unless otherwise noted, command options are available only to users with admin role permissions. Ensure adequate storage is available on the source and destination. With the exception of collection replication, the destination must have more space than the source. With the exception of collection replication, the destination directory is overwritten during replication. Before starting, verify the destination directory is empty or that its contents are not required. A source subdirectory cannot be in another directory replication context. A directory can be in only one context at a time. Command options may take several seconds to conclude when a Data Domain system is at, or near, capacity. If the source or destination hostnames do not correspond to the Data Domain network names, modify the name by running the command option replication modify connection-host on the source system. Source names <source> that include spaces or special characters must be entered according to specific conventions or the command will fail. Either enclose the entire source pathname with double quotation marks, or enter a backslash before the space. Do not use both. Retention Lock Compliance is supported for collection replication only.        Options The following options are available with this command. abort replication abort recover <destination> Stop a recover process. Run this command option on the destination Data Domain system only. Then, reconfigure replication on the source Data Domain system and restart the recover process. replication abort resync <destination> Stop a resync operation. Run this command option on the source or destination Data Domain system. 236 EMC DD OS 5.2 Command Reference Guide add replication add source <source> destination <destination> [low-bw-optim {enabled | disabled}] [encryption {enabled | disabled}] [propagate-retention-lock {enabled | disabled}] Create a replication pair. Use low-bw-optim enabled to enable delta replication. Low bandwidth optimization is active only when enabled on the source and destination and cannot be used for collection replication. note Directory replication is not supported in GDA configurations. break replication break {<destination> | all} Remove the source or destination Data Domain system from a replication pair, or remove all Replicator configurations from a Data Domain system. This command option requires security officer authorization for Retention Lock Compliance systems. disable replication disable {<destination> | all} Run this command on the source or destination system to halt data replication temporarily. If run on the source, the operation stops sending data to the destination. If run on the destination, the operation stops serving the active connection from the source. This command option requires security officer authorization for Retention Lock Compliance systems. enable replication enable {<destination> | all} Restart replication. If run on the source, the operation resumes sending data to the destination. If run on the destination, the operation resumes serving the active connection from the source. initialize replication initialize <destination> Run this command option on the source to start replication between a source and destination. This command option verifies the configuration and connections are correct and returns error messages if problems appear. replication 237 The initialize operation can take several hours, or days, depending on the amount of data in the source. As an alternative, consider placing both Data Domain systems of the replicator pair in the same location with a direct link to reduce initialization time. The <destination> variable is required. modify replication modify <destination> connection-host <new-host-name> [port <port>] Run this command option if the destination hostname does not resolve for the connection. Use the modify connection-host option to correct the name or IP address. An optional port number may also be used. The connection-host option may be required when a connection passes through a firewall, and is required when connecting to an alternate listen-port on the destination. It may also be required after adding a new source and destination pair, or after renaming a source or a destination. replication modify <destination> {source-host | destination-host} <new-host-name> Assign a new hostname to a replacement system in a replication pair. The <new-hostname> must be the name returned by the hostname command on the system receiving the new host. Run this command option on the destination system to change the hostname on a source system. Do not use the command to change the hostname on the destination. Contact Data Domain Support before changing the hostname on a destination system. When using the replication modify command option, always run the filesys disable command first, and conclude with the filesys enable command. Example If the local destination dest-orig.ca.company.com is moved from California to New York, enter the following command options on the source and destination: # filesys disable # replication modify dir://ca.company.com/backup/dir2 destination-host ny.company.com # filesys enable replication modify <destination> encryption {enabled | disabled} Modify the destination hostname and set the state of encryption. replication modify <destination> low-bw-optim {enabled | disabled} Enable delta replication on a replication context. This option is active only when enabled on the source and destination. This option does not apply to collection replication. 238 EMC DD OS 5.2 Command Reference Guide You must set the bandwidth and network-delay on each side of the connection. On a destination Data Domain system. A destination can have only one listen-port that must be used by all sources. The connection-host port used by a source must match the listen-port used by the destination.option replication option reset {bandwidth | delay | listen-port} Reset system bandwidth to default unlimited. or delay to default none. the operation returns a command prompt with no setting information. When using the replication option reset command options. replication 239 . All users may run this command. For directory replication. always run the filesys disable command first. replication option set bandwidth <rate> Set the network bandwidth rate for the Data Domain system. the replication modify connection-host command option is used on the source Data Domain system. replication option set delay <value> Set the network delay in milliseconds for the Data Domain system. or listen port to 2051. If these settings are at the default of none. and conclude with the filesys enable command. You must set the bandwidth and network-delay on each side of the connection. replication option show Display the current bandwidth and network-delay settings. For DD Boost managed file replication. replication option set listen-port <value> Set the listen port for the Data Domain system. set the port from which the destination receives data from replication sources (default is 2051). the listen-port is used on the source Data Domain system and on the destination Data Domain system to specify the connection-host port. this command fails if you try to replicate to a Retention Lock system and the destination is not empty.2 Command Reference Guide . All users may run this command option. A destination variable is required. the target directory on the source must be empty. This command is not available for MTree replication. this option must be run on the new source only. and conclude with the filesys enable command option. Reauthorization is primarily used when replacing a source Data Domain system. If the replication break command was previously run. When using the replication recover command option. replication show detailed-history {<obj-spec-list> | all} [duration <duration> {hr | min}] [interval <interval> {hr | min}] Show details of replication performance history. show replication show config [<destination> | all] Show replication configuration. Note that the source and the destination must be configured and the context initialized. Messages similar to “Authentication keys out of sync” or “Key out of sync” indicate a reset is required. This command option cannot be used with collection replication. All users may run this command option.reauth replication reauth <destination> Use this command on the source and the destination systems to reset authentication. If configuring collection replication. If configuring directory replication. the destination cannot be used to recover a source. always run the filesys disable command option first. A destination argument is required. See “Additional Topics” for information on how recovery affects collection replication. resync replication resync <destination> Synchronize replication when directory replication is broken between a source and destination. recover replication recover <destination> Run this command option on a new source to move data from a destination system. Also. 240 EMC DD OS 5. delta-compression. and local-compression. The destination hostname may not resolve to the correct IP address when connecting to an alternate interface on the destination. Enabled The replication process is enabled and available to replicate data (“yes”) or disabled and not available to replicate data (“no”). disabled. It may also connect using a destination name or IP address and port designated by replication modify connection-host command.Output Definitions CTX The context number for directory replication or a zero (0) for collection replication. or when passing through a firewall. replication 241 . Source The Data Domain system that receives data from backup applications. All users may run this command option. Low-bw-optim The status of low-bw-optim: enabled. Destination The Data Domain system that receives data from the replication source Data Domain system. Statistics are generated hourly. replication show history {<obj-spec-list> | all} Show replication performance history. Connection Host and Port A source system connects to the destination system using the name returned by the hostname command on the destination. The ratio of the values Bytes after filtering by destination to Bytes after low bandwidth optimization gives additional compression ratio supplied by delta compression. or configuration mismatch. This command option provides byte-count statistics related to identity-filtering. All users may run this command option. replication show detailed-stats [<destination> | all] Display cumulative statistics beginning with when the context was created. Reading The time spent reading filesystem data from the local filesystem. and dividing the time by the duration of the reporting interval. These columns show the relative amounts of time spent working on. Replicated (KB) Pre-Comp The amount of pre-compressed data replicated. Streams An internal system resource associated with reads and writes. Reading may be the largest column. On a deployment with high network bandwidth.Output Definitions Pre-Comp (KB) Remaining The amount of pre-compression data not replicated. Typically this number is the second highest number after Network. All users may run this command option. or waiting for. Output Definitions Pre-comp (KB/s) The size value before compression is applied. Sync’ed-as-of Time The time when the most recently replicated data on the destination was generated on the source. Values are calculated by the amount of time spent for the activity. replication show performance {<obj-spec-list> | all} [interval <sec>] [count <count>] Display current replication activity.2 Command Reference Guide . four additional columns are presented. Values can exceed 100 due to the presence of multiple threads working on behalf of the specified replication context.” Network (KB/s) The amount of compressed data transferred over the network per second. 242 EMC DD OS 5. multiplying the time by 100. One replication context can use multiple streams for better performance. Low-bw-optim The additional compression ratio supplied by delta compression. A value of unknown appears during replication initialization. Sometimes referred to as “logical size. replication sender threads for the specified context. Default interval is two seconds. If a single source context is specified. Replicated (KB) Network The amount of compressed data sent over the network. it may indicate an unusual workload (a large number of file attribute updates. Network The time spent sending file data and metadata and waiting for replies from the server on what data needs to be sent. If this value exceeds 50 on a sustained basis. Typically this value is low. Example 1 # repl show stats CTX Destination Post-comp Bytes Sent Post-comp Bytes Received Sync'ed-as-of Time Post-comp Bytes Remaining ---------------------------------------------------------------------------------------------------------------------------------------------------------------------0 col://127. Note that in collection replication. a network problem may be present. For example. and if the Network KB/sec value is lower than expected.608 9. replication show stats [<destination> | all] Display statistics for all replication pairs or a specific destination pair.2.2. the difference in values between Post-comp Bytes Sent and Post-comp Bytes Received is expected behavior. Waiting. Typically this value is under 50. Meta. note If the Network column has the highest time values among Reading. and Network. All users may run this command option. Dest The time spent waiting due to the receiver not providing the sender enough information on what data to send. Exceptions include systems on high-speed networks where the sender is a more powerful Data Domain system than the replica.Meta The time spent on miscellaneous bookkeeping activities and replicating filesystem namespace operations. Output format is is based on replication type.264 Mon Apr 9 15:54 0 ---------------------------------------------------------------------------------------------------------------------------------------------------------------------CTX Destination Post-comp Bytes Sent Pre-comp Bytes Sent Post-comp Bytes Received Sync'ed-as-of Time Pre-comp Bytes Remaining ---------------------------------------------------------------------------------------------------------------------------------------------------------------------1 dir://127.0.2/backup 0 0 0 0 ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- replication 243 . for example). or where the replica has a higher workload than the sender because the replica is the destination for a multiple replication contexts. Typically this is the highest of the four values.0. This value exceeds 100 regularly if the sender is able to replicate multiple files in parallel.173. packet loss may be causing reduced throughput.2 91. If a large file is being replicated. Output includes the entire logical size of the current file being replicated. Post-comp Bytes Sent Network data sent by the source to the destination. Replication runs at the given rate until the next scheduled change.Output Definitions CTX The context number for replication. sync replication sync [<destination>] Synchronize replication between the source and destination. this number may take some time to change. The number changes only after the current file finishes. 244 EMC DD OS 5. The system enforces a minimum rate of 98. You must first configure the source and destination and initialize the context. or until new throttle commands force a change. including logical bytes associated with the file being replicated. The number zero (0) indicates collection replication. By default. the network bandwidth use is unlimited. meaning it continuously runs as fast as possible. Destination The replication destination. All users may run this command option. A value of Unknown appears during replication initialization.2 Command Reference Guide . Sync’ed-as-of-Time The time when the most recently replicated data on the destination was generated on the source. status replication status [<destination> | all] [detailed] Show status replication status. Post-comp Bytes Received The number of bytes received by the source. throttle replication throttle add <sched-spec> <rate> Change the rate of network bandwidth used by replication.304 bits per second (12 KiB). Pre-comp Bytes Remaining Directory replication only: The sum of file sizes remaining to be replicated for the context. The number can include a tag for bits or bytes per second. The default rate is bits per second. This argument can also specify a time of day in 24-hour format. Example To remove an entry for Mondays at 1:00 p. tue.. and a time in 24-hour format. If you set <rate> to zero. Example To limit replication to 20 kibibytes per second starting on Mondays and Thursdays at 6:00 a. the base-2 equivalent of KB or Kilobytes. tue. Do not use a space between the number and the bits or bytes specification. or K equals 1024 bits per second Bps or B equals bytes per second KiBps or KiB equals 1024 bytes per second Kib = Kibibits. Kib.Argument Definitions <sched-spec> Specifies one or more three-letter days of the week (such as mon. disable. The sched-spec variable must include one or more three-letter days of the week (such as mon. or the word “daily” (to set the schedule every day). enter: # replication throttle del mon 1300 replication throttle reset {current | override | schedule | all} Reset a throttling schedule. In the rate variable:     bps or b equals raw bits per second Kibps.m.. enter: # replication throttle add mon thu 0600 20KiB replication throttle del <sched-spec> Remove one or more throttle schedule entries.” Rate can also be zero. replication 245 .m. or the word “daily” (to set the schedule every day).  KiB = Kibibytes. or wed). <rate> Includes a number or the word “unlimited. the base-2 equivalent of Kb or Kilobits. new contexts are also throttled to zero. or disabled (each stops replication until the next rate change). or wed). 246 EMC DD OS 5. the license must be added and key manager settings configured on the destination system. Additional Topics This section provides additional information on various topics and concepts. or recovery operation. replication throttle set current <rate> Set the throttle rate until the next scheduled change or until a system reboot. Collection Replication The entire /backup directory is replicated. replication throttle set override <rate> Set the throttle rate until another override command option is run. resynchronization process. Setting the throttle to current cannot be done if the throttle set override command option is in effect. When the replication has concluded. All users may run this command option. all Remove and reset current or override settings and remove all scheduled changes. This replication type is typically used to back up an entire site.Argument Definitions current Remove and reset the rate designated by the command option replication throttle set current.2 Command Reference Guide . watch replication watch <destination> Display the progress of a replication initialization. schedule Remove and reset scheduled changes. replication throttle show [KiB]> Show throttle configuration. Retention Lock Compliance is supported for collection replication only. Throttle override cannot be set if the throttle set current command option is in effect. All users may run this command option. This option returns the system to the default settings. override Remove and reset the rate designated by the command option replication throttle set override. If the destination is configured with key-manager settings prior to becoming the replication destination. you must reconfigure the destination to use the correct key-manager settings and key class. or if specific directories are replicated to different destinations. See “migration” for instructions (Additional Topics > Migration With Encryption-Enabled Source). but key-manager settings are not. and then configuring the destination with the correct key manager-server and key class after a collection replication is broken. If a collection replication breaks. MTree Replication An entire MTree is replicated. Directory Replication Specific subdirectories under /backup are replicated. EMC recommends resetting the key-manager on the destination prior to collection replication. This replication type is used when only a portion of /backup is required. The keys are copied to the replica. See “mtree” for more information. the settings remain on the system but are not used. Note that you cannot replicate directories located under an MTree. Pool Replication A set of files or tapes within a virtual tape library (VTL) is replicated. replication 247 .Collection Replication Key Management Key-manager settings on a destination are ignored when users set up and initialize a collection replication pair. 248 EMC DD OS 5.2 Command Reference Guide . output.2 Modified command options: route add [ipversion {ipv4 | ipv6}] <route spec> route del [<ipaddr> | <ipv6addr]> route reset gateway [ipversion {ipv4 | ipv6}] route set gateway {<ipaddr> | <ipv6addr>} route show gateway [ipversion {ipv4 | ipv6}] route show table [ipversion {ipv4 | ipv6}] route trace [ipversion {ipv4 | ipv6}] <host> route 249 . Options include:       add del reset set show trace Change History Click the command option for details on usage and functionality. and permissions. An additional routing rule appears in the Kernel IP routing table and in the Data Domain system Route Config list.route The route command manages routing between a Data Domain system and backup hosts. Version Change 5. including arguments. See the EMC DD OS Release Notes of the corresponding version for details on modifications. which is a list of static routes reapplied at each system boot. add route add [ipversion {ipv4 | ipv6}] <route spec> Add a routing rule.1. Data Domain recommends making interface changes only during scheduled downtime.168. set route set gateway {<ipaddr> | <ipv6addr>} Change the routing default gateway.168.Guidelines and Restrictions  Unless otherwise noted. Example To set the default routing gateway to the IP address of 192. del route del [<ipaddr> | <ipv6addr]> Remove a routing rule.2: # route set gateway 192. All routing information is lost and data movement using routing is cut off immediately. reset route reset gateway [ipversion {ipv4 | ipv6}] Reset the default routing gateway to the default value (empty). Changes to Ethernet interfaces made with net command options flush the routing table.2 Command Reference Guide . You must reconfigure routing rules and gateways after making interface changes  Options The following options are available with this command.1.2 250 EMC DD OS 5. command options are available only to users with admin role permissions. 168.0.255.255.0.8.0.0 0.0.0.0.255.1.0 0.0. Example # route show gateway Default Gateways 192.0.0.252.1 Genmask 255. Example The display looks similar to the following (each line in the example wraps): # route show config The Route Config list is: -host user24 gw srvr12 -net 192.0.0 Gateway 0.25.128.0 Flags U UG Metric 0 0 0 Ref Use Iface 0 0 0 0 0 0 eth0 lo eth0 255.3. Example # route show table Kernel IP routing table Destination 192.0 U Kernel IPv6 routing table Destination 2620:0:170:1a04::/64 fe80::/64 ::/0 ::1/128 fe80::215:17ff:fe30:2d70/128 Next Hop :: :: fe80::5:73ff:fea0:804 :: :: Flags UA U UGDA U U Metric 256 256 1024 0 0 Ref 1489 0 1 597 31 Use Iface 0 0 0 3 1 eth0 eth0 eth0 lo lo route 251 .168.4 route show table [ipversion {ipv4 | ipv6}] Display all entries in the Kernel IP routing table.show route show config Display the configured static routes that are in the Route Config list.0 127.2 192.0 gw srvr12 route show gateway [ipversion {ipv4 | ipv6}] Display the configured or DHCP-supplied routing gateways used by a Data Domain system.0.0 10.0.168.0 0.168.1.0 netmask 255. enter: # route add -net 192.178 ms 0. enter: # route set gateway 192.trace route trace [ipversion {ipv4 | ipv6}] <host> Display a route used by a Data Domain system to connect with a particular destination. EMC Data Domain customers select which version to use.0 gw srvr12 To add a route for host user24 with a gateway of srvr12.255.6).com (192.163 ms 0.0 netmask 255.0 and a netmask of 255.10. enter: # route del -net 192.168. 30 hops max.1. Support for IPv6 Federal certification requirements state that the DD OS must be IPv6-capable and that interoperability with IPv4 be maintained in an heterogeneous environment.0.0 netmask 255.255.168. enter: # route add -host user24 gw srvr12 Delete a Route To delete a route.168.168. Add a Route To add a route with a route specification of 192.147 ms Additional Topics This section provides additional information on various topics and concepts.1.2 Command Reference Guide .1 252 EMC DD OS 5.255. several net command options now include arguments for both versions of Internet Protocol. As a result. for example. 192.255.x. and a gateway of srvr12. Example To trace the route to srvr24.255.168.1.1.1.1. 38 byte packets 1 srvr24 (192.0 Set a Default Gateway To give a default gateway when no other route matches.168.255. a netmask.yourcompany.168. based on the type of configuration.6) 0. enter: # route trace srvr24 Traceroute to srvr24. The MTree /data/col1/backup is the default directory created in the system during installation. If the Data Domain system is a source for collection replication. MTrees add granularity to filesystem-type operations.   snapshot 253 . A snapshot is a read-only copy of the Data Domain MTree from the top of each MTree: /data/col1/<mtree-name>. snapshots are not replicated. See the EMC DD OS Release Notes of the corresponding version for details on modifications. including arguments. command options are available only to users with admin role permissions. Options include:      create expire list rename schedule Change History Click the command option for details on usage and functionality.snapshot or /data/col1/<mtree-name>/. and permissions. and for restoring previous versions of a deleted directory or file. Snapshots must be created separately on a directory replication destination.2 No changes from previous version. If the Data Domain system is a source for directory replication. The directory /backup points to the default MTree. Guidelines and Restrictions  Unless otherwise noted. snapshots are replicated.snapshot. Snapshots can be accessed from the directories /backup/. Snapshots are useful for avoiding version skew when backing up volatile data sets. output. It is also the MTree that is refreshed during an upgrade procedure.snapshot The snapshot command manages MTrees snapshots. Version Change 5. such as tables in a busy database. allowing operations to be performed on a specific MTree instead of the entire filesystem. m. 254 EMC DD OS 5. The snapshot is retained until midnight (00:00. You can resolve this by expiring snapshots and then running the command option filesys clean. The .22. Note there is no space between the number and time period. Argument Definitions <snapshot> A name for the snapshot.03. ). one month equals 30 days. the first minute of the day) of the designated date. 4wks. mtree <mtree-path> The pathname of the MTree for which the snapshot is being created. a CIFS share or NFS mount point). the system generates an alert. or months (mos) to retain a snapshot. The maximum number of snapshots allowed to be stored on a system is 750. weeks (wks).). # snapshot create test22 mtree /backup retention 1mos Snapshot "test22" created and will be retained until March 31 2011 08:48. See “Additional Topics” for the list of characters supported for snapshot naming. For example. create snapshot create <snapshot> mtree <mtree-path> [retention {<date> | <period>}] Create a snapshot. The base of the path must be /data/col1/<mtree_name> or /backup. or hyphens ( .   Options The following options are available with this command. retention <period> Number of days. on March 1. slashes ( / ). for example. and two-digit day separated by dots ( . 2011. two-digit month.snapshot directory is a virtual directory. but it does not show up as a directory listing except at export points (for example. It can be referenced in any directory. 2011 with a retention period of one month. it would be retained for 30 days. If the maximum number is reached. Also. Example If a snapshot was created at 8:48 a.2 Command Reference Guide . The snapshot is retained until the same time of day it was created. retention <date> A four-digit year. or months (mos) to retain snapshot. With a retention <date>. weeks (wks). the creation date. use the snapshot expire operation with no options. ). for example. retention <period> Number of days. one month equals 30 days.). the amount of pre-compression data.expire snapshot expire <snapshot> mtree <mtree-path> [retention {<date> | <period> | forever}] Set or reset the retention time of a snapshot. Also. An expired snapshot remains available until the next filesystem clean operation. snapshot 255 . The snapshot is retained until the same time of day it was created. the snapshot is retained until midnight (00:00. forever The snapshot does not expire. and two-digit day separated by dots ( . or hyphens ( . The display shows the snapshot name. and the status. the retention date. retention <date> A four-digit year. Note there is no space between the number and time period. list snapshot list mtree <mtree-path> View a list of snapshots of a specific MTree. To expire a snapshot immediately. mtree <mtree-path> The pathname of the MTree for which the snapshot is being created. 4wks. slashes ( / ). The status may be blank or expired. two-digit month. the first minute of the day) of the designated date. Argument Definitions <snapshot> The name of the snapshot. snapshot schedule del <name> mtrees <mtree-list> Remove a list of MTrees from a schedule.] [retention <period>] [snap-name-pattern <pattern>] snapshot schedule create <name> [mtrees <mtree-list>] [days <days>] time <time> every <mins> [retention <period>] [snap-name-pattern <pattern>] snapshot schedule create <name> [mtrees <mtree-list>] [days <days>] time <time>-<time> [every <hrs | mins>] [retention <period>] [snap-name-pattern <pattern>] Use these commands to create a snapshot schedule for multiple MTrees.<time> .0 Create Date April 12 2011 11:59 Retain Until April 12 2011 12:04 Status expired ------------------------------------------------------------------------------------------------------------------------------------------------- Snapshot Summary --------------------------Total: Not expired: Expired: 1 0 1 rename snapshot rename <snapshot> <new-name> mtree <mtree-path> Rename a snapshot for a specific MTree..2 Command Reference Guide . schedule snapshot schedule add <name> mtrees <mtree-list> Add multiple MTrees to a single snapshot schedule. enter: # snapshot rename snap1 new-snap1 mtree /backup Snapshot "snap1" renamed to "new-snap1" for MTree "/newMTree". 256 EMC DD OS 5.. snapshot schedule create <name> [mtrees <mtree-list>] [days <days>] time <time> [.Example # snapshot list mtree /data/col1/ddmtree1 Snapshot Information for MTree: /data/col1/ddmtree1 ------------------------------------------------------------------------------------------------------------------------------------------------Name new-snap1 Pre-Comp (GiB) 0. Example To change the name from snap1 to new-snap1 for an MTree named /newMTree. Command arguments determine the duration of the schedule. ... enter: # snapshot schedule show Name sched_am1 sched_am2 sched_pm1 sched_pm2 Days daily daily daily daily Time 02:00..19:00.. snapshot schedule show [ {<name> | mtrees <mtree-list>} ] Show a specific schedule and show schedules associated with a specific MTree.18:00. 09:15. snapshot schedule reset Reset a snapshot schedule and delete all snapshot schedules.18:00. Command arguments determine the duration of the schedule...03:00. enter the command with no options.snapshot schedule destroy [<name> | all] Remove the name of a schedule.10:15.15:00. Example 1 To view all schedules... snapshot schedule modify <name> [mtrees <mtree-list>] [days <days>] time <time> [. include the schedule name.14:00.11:15.05:00. 13:00. 17:00..<time> .] [retention <period>] [snap-name-pattern <pattern>] snapshot schedule modify <name> [mtrees <mtree-list>] [days <days>] time <time> every <mins> [retention <period>] [snap-name-pattern <pattern>] snapshot schedule modify <name> [mtrees <mtree-list>] [days <days>] time <time>-<time> every <hrs | mins>] [retention <period>] [snap-name-pattern <pattern>] Use these commands to modify a snapshot schedule. # snapshot schedule show sched_pm2 Name sched_pm2 MTree list ---------------/data/col1/backup /data/col1/mtree1 /data/col1/mtree2 Days daily Time 17:00. Retention (days) Snap-name Pattern 14 14 14 14 scheduled-%Y-%m-%d-%H-%M scheduled-%Y-%m-%d-%H-%M scheduled-%Y-%m-%d-%H-%M scheduled-%Y-%m-%d-%H-%M Example 2 To view a schedule associated with MTrees... caution! This command deletes the previous schedule without prompting the user.19:00. To show a list of schedules. Retention (days) Snap-name Pattern 14 scheduled-%Y-%m-%d-%H-%M snapshot 257 . 2 Command Reference Guide . a two-digit month. scheduled-2011-03-25-20-00. Snapshots are retained for "60" days. and a single embedded space (nonleading). and so forth.). enter: # snapshot add schedule mon thu 02:00 retention 2mos Snapshots are scheduled to run "Mon. scheduled-2011-04-27-13-41. Snapshots generated by that schedule might have the names scheduled-2011-03-24-20-00. Thu" at "0200". The name every_day_8_7 is the name of a snapshot schedule. with a retention of two months. a–z. a two-digit hour. characters supported for creating snapshot names include: ! # $ % & @ ^ ~ ( ) exclamation point number sign dollar sign percentage ampersand “at” symbol caret tilde left parenthesis right parenthesis 258 EMC DD OS 5.m. Supported Characters In addition to letters A–Z. and numbers 0–9. a two-digit day. Naming Snapshots Created by a Schedule The naming convention for scheduled snapshots is the word “scheduled” followed by a four-digit year. All elements of the name are separated by hyphens( .Additional Topics This section provides additional information on various topics and concepts. For example. Example To schedule a snapshot every Monday and Thursday at 2:00 a. and a two-digit minute. .[ ] { } . . ‘ ' + = left bracket right bracket left curly brace right curly brace period comma semicolon single quotation mark (slanted) single quotation mark (unslanted) plus sign equal sign snapshot 259 . 260 EMC DD OS 5.2 Command Reference Guide . snmp The snmp command enables or disables SNMP access to a Data Domain system. and displays configuration settings. and permissions. See “More about SNMP on a Data Domain System” for details.2 Modified command options: snmp user add <user-name> <access {read-only | read-write}> [[authentication-protocol {MD5 | SHA1}] [authentication-key <auth-key>] [privacy-protocol {AES | DES}] [privacy-key <priv-key>]] snmp user modify <user-name> <access {read-only | read-write}> [[authentication-protocol {MD5 | SHA1}] authentication-key <auth-key> [privacy-protocol {AES | DES}] privacy-key <priv-key>] snmp 261 . SNMP management requires two primary elements: an SNMP manager and an SNMP agent. Options include:          add del disable enable reset set show status user Change History Click the command option for details on usage and functionality. adds community strings. Version Change 5. See the EMC DD OS Release Notes of the corresponding version for details on modifications. gives contact and location information. output. including arguments. v2C. To grant access to specific hosts.hostNameB 10.com snmp add rw-community <community-string-list> [hosts <host-list>] Add one or more community strings for read/write access to the Data Domain system. enter the names in <host-list>. To grant access to specific hosts. Default port 162 is used for outbound traffic for SNMP traps. $ \n ’ ’    Options The following options are available with this command.1.10.3 10.3 10. add snmp add ro-community <community-string-list> [hosts <host-list>] Add one or more community strings for read-only access to the Data Domain system. Data Domain systems support SNMPv1.10. For example: hostnameA.2 Command Reference Guide .10. enter the names in <host-list>. command options are available only to users with admin role permissions. For example: hostnameA.10.2. A common string for read/write access is private. the following characters cannot be used in community strings: \t : .10. A common string for read-only access is public.* * Example To add a community string of public with read-only permissions: # snmp add ro-community public hosts host. read/write SNMP access.hostNameB 10.1. and v3. A valid host list can include the host name or the host IP address. Default port 161 is used for inbound/outbound.1.datadomain.* * 262 EMC DD OS 5.2.Guidelines and Restrictions  Unless otherwise noted.10. A valid host-list can include the host name or the host IP address. In addition to blank spaces.1. Example To add a community string of private with read/write permissions: # snmp add rw-community private hosts host.datadomain.com snmp add trap-host <host-name-list>[:port] [version {v2c | v3}] [{community <community> | user <user>}] Add one or more trap hosts (host name or IP address) to receive the SNMP traps generated by the Data Domain system. Note that alerts are also sent as traps, even when the local SNMP agent is disabled. By default, port 162 is used to send traps, but another port may be assigned. SNMP trap-host supports SNMPv2c and v3. For SNMPv1 and v2c specify the version and the pre-existing community. For SNMPv3 specify the SNMPv3 user name. Make sure to include trap-host in the community string hosts. Example To add a trap host admin12: # snmp add trap-host admin12 version v2c community public del snmp del ro-community <community-string-list> [hosts <host-list>] Delete one or more community strings for read-only access to the Data Domain system. Example To delete the host myhost.datadomain.com from public community list: # snmp del ro-community public hosts myhost.datadomain.com To delete the community public and all hosts associated with public: # snmp del rw-community public snmp del rw-community <community-string-list> [hosts <host-list>] Delete one or more community strings for read-write access to the Data Domain system. Example To delete the community string private with read/write permissions: # snmp del rw-community private hosts myhost.datadomain.com To delete the community private and all hosts associated with private: # snmp del rw-community private snmp 263 snmp del trap-host <host-name-list> Delete one or more trap hosts from the list of hosts receiving SNMP traps generated by the Data Domain system. Example To delete trap host admin12: # snmp del trap-host admin12 disable snmp disable Disable SNMP and close port 161. enable snmp enable Enable SNMP and open port 161. reset snmp reset Reset SNMP agent configuration to default values. snmp reset ro-communities Reset list of read-only community strings to default values. snmp reset rw-communities Reset list of read-write community strings to default values. snmp reset sysContact Reset the system contact to the value displayed by the command system show admin-email, or to an empty string if the system value is empty (default). snmp reset sysLocation Reset the system location to the system value displayed by the command system show location, or to an empty string if the system value is empty (default). snmp reset trap-hosts Reset list of SNMP trap receiver hosts to default values. 264 EMC DD OS 5.2 Command Reference Guide set snmp set sysContact <sysContact> Set the SNMP administrative contact MIB variable. Example To set administrative contact to jane-smith: # snmp set sysContact jane-smith snmp set sysLocation <sysLocation> Set the SNMP physical location MIB variable. Example To set building location to bldg3-rm222: # snmp set sysLocation bldg3-rm222 show snmp show config Use this command to display all SNMP parameters. Example # snmp show config SNMP sysLocation SNMP sysContact Read-only Communities Communities -----------public Read-write Communities Communities -----------------private private1 SNMPv2 Trap Hosts: ---------------------------Hosts -------------- --127.0.0.1 Communities -------------------: Hosts --------myhost.datadomain.com myhost.datadomain.com,10.10.* : Hosts ------- snmp 265 SNMPv3 Trap Hosts: ----------------------------Hosts -------------- ---localhost 137.69.76.131 SNMP v3 Configuration --------------------------------User --------snmpv3user --------Access --------read-only --------Authentication Protocol Privacy Protocol ----------------------MD5 -------------------------------------AES ---------------Users -----------------snmpv3user snmpv3user snmp show ro-communities Show the SNMP read-only community strings. snmp show rw-communities Show the SNMP read/write community strings. Example # snmp show rw-communities Read-write Communities Communities -----------------private private1 : Hosts ---------myhost.datadomain.com myhost.datadomain.com,10.10.* snmp show sysContact Show the SNMP administrative contact MIB variable. snmp show sysLocation Show the SNMP physical location MIB variable. 266 EMC DD OS 5.2 Command Reference Guide snmp show trap-hosts Display the trap host list on a Data Domain system. Example # snmp show trap-hosts SNMPv2 Trap Hosts: ----------------------------Hosts -------------127.0.0.1 SNMPv3 Trap Hosts: Communities ------------------ -------------------------Hosts -------------localhost 137.69.76.131 Users -------------------snmpv3user snmpv3user status snmp status Show SNMP status. user snmp user add <user-name> <access {read-only | read-write}> [[authentication-protocol {MD5 | SHA1}] [authentication-key <auth-key>] [privacy-protocol {AES | DES}] [privacy-key <priv-key>]] Add an SNMPv3 user to the system specifying the access rights, authentication protocol, and privacy protocol. The authentication key is used when calculating the digest for the authentication protocol. The privacy key is used as input for the privacy protocol. Example # snmp user add snmpv3user access read-only authenticationprotocol MD5 authentication-key auth-key privacy-protocol DES privacy-key priv-key User snmpv3user successfully added. snmp user del <user-name> Delete an SNMPv3 user. snmp 267 snmp user modify <user-name> <access {read-only | read-write}> [[authentication-protocol {MD5 | SHA1}] authentication-key <auth-key> [privacy-protocol {AES | DES}] privacy-key <priv-key>] Modify an SNMPv3 user settings such as access rights, authentication protocol, and privacy key. snmp user reset Reset list of SNMPv3 users to default values. snmp user show <user-name> Display a SNMPv3 user. Example # snmp user show User --------jane123 snmpv3user --------Access --------read-only read-only --------Authentication Protocol Privacy Protocol ----------------------Not Defined MD5 -------------------------------------Not Defined AES ---------------- Additional Topics This section provides additional information on various topics and concepts. More about SNMP on a Data Domain System An SNMP manager is software running on a workstation from which an administrator monitors and controls the different hardware and software systems on a network. These devices include, but are not limited to, storage systems, routers, and switches. An SNMP agent is software running on equipment that implements the SNMP protocol. SNMP defines how an SNMP manager communicates with an SNMP agent. For example, SNMP defines the format of requests that an SNMP manager sends to an agent and the format of replies the agent returns. From an SNMP perspective a Data Domain system is a read-only device, with one exception: A remote machine can set the SNMP location, contact, and system name on a Data Domain system. The snmp command enables administrative users to configure community strings, hosts, and other SNMP variables on the Data Domain system. With one or more trap hosts defined, a Data Domain system takes the additional action of sending alert messages as SNMP traps, even when the SNMP agent is disabled. 268 EMC DD OS 5.2 Command Reference Guide and the run snmp enable. However. the variables default to the system values given with the config set commands. if the SNMP variables are not set with the SNMP commands.Changing Multiple Settings To change multiple settings quickly. which adds time. snmp 269 . change the settings. Changing multiple settings while SNMP is enabled requires restarting SNMP. run the snmp disable command. SNMP sysLocation and sysContact Variables The SNMP sysLocation and sysContact variables are not the same as those set with the config set location and config set admin-email commands. 270 EMC DD OS 5.2 Command Reference Guide . Tiered storage enables the Data Domain system to use different types of storage devices. such as a Data Domain system or attached expansion shelf. the storage must be provisioned by creating or expanding the filesystem. System storage for a filesystem or associated RAID disk group consists of two storage tiers: one active and one archive. and permissions. and displays disks and LUNs belonging to active and archive storage tiers. Options include:    add remove show Change History Click the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications.   storage 271 . or LUNs in a Data Domain gateway system that uses a SAN.storage The storage command adds.” Available LUNs may be removed from a tier to use as a RAID hot spare. output. command options are available only to users with admin role permissions. including arguments. and the archive tier has one or more archive units of storage. Version Change 5. After adding disks or LUNs to storage tiers. removes. A storage tier can contain two types of storage: whole disks in an enclosure. Guidelines and Restrictions  Unless otherwise noted.2 No changes from previous version. See “Adding Storage to an Active Tier. The active tier has one active unit of storage. or a LUN in a gateway system. or a LUN in a gateway system. This command also cannot remove a disk if the disk is a spare or an In Use LUN.<disk-id>} Remove storage devices from the tier. You can also remove a disk from a DLH unit. including all disks in an enclosure. 272 EMC DD OS 5. Output includes the number of disk groups working normally and the number of degraded disk groups. The abbreviation N/A in the column Shelf Capacity License Needed indicates the enclosure does not require a capacity license. Default spindle group is 1. All users may run this command option. or queued for. Disks or LUNs must be in the Unknown state to be added to the designated tier. remove storage remove {enclosure <enclosure-id> | dev<disk-id> | disk <enclosure_id>. note The storage add dev<disk-id> command option is allowed only after running the command option storage add enclosure <enclosure-id> to add the shelf. after which the state changes to Available. show storage show {all | summary | tier {active | archive}} Display information about filesystem storage. reconstruction. add storage add [tier {active | archive}] {enclosure <enclosure-id> | dev<disk-id> [spindle-group <1-16>] | disk <enclosure-id>. Device types include all disks in an enclosure. This command cannot remove an In Use disk if doing so exceeds the minimum number allowed by the RAID scheme.2 Command Reference Guide .Options The following options are available with this command. or that part of the enclosure is within a tier and the required capacity license for the entire enclosure has been accounted for. are also shown when applicable. a single disk.<disk-id> } Add storage devices to a tier. When a device is removed the state changes to Unknown. Details on disk groups undergoing. a single disk. This command cannot be used on dataless head (DLH) units. 9 TiB 916.7 TiB 774.7 TiB 763.8 TiB Used 0.14 14 1.0 TiB -------------------------------------------------------------------------------------------------------------------------- --------------------------------------------------------------------------------------------------------------------------- storage 273 .8 TiB -------------------------------------------------------------------------------------------Storage addable disks: Disk Type Disks Count Disk Size Enclosure Mode Shelf Capacity License Needed Additional Information ---------------------------------------------------------------------------------------------------------------------(unknown) 4.0 TiB 21.1-2.7 TiB 753.7 TiB 785.14 2.8 TiB (spare) 3.8 TiB ---------------------------------------------------------------------------------------------------------------------Shelf Capacity License: License CAPACITY-ACTIVE CAPACITY-ACTIVE CAPACITY-ARCHIVE CAPACITY-ARCHIVE Model ES20 ES30 ES20 ES30 Total 916.15 15 1.Example 1 On a Data Domain system: # storage show all Active tier details: Disk Group Disks Count Disk Size Additional Information -------------------------------------------------------------------------------------------dg1 (spare) 2.8 TiB -------------------------------------------------------------------------------------------Archive tier details: Disk Group Disks Count Disk Size Additional Information -------------------------------------------------------------------------------------------dg2 3.15 1 1.15 1 1.0 TiB 21.1-4.8 TiB 14 1.8 TiB 0.8 TiB Remaining 916.8 TiB ES30 21.8 TiB 916.1-3. Adding Storage to an Active Tier 1. Create a new filesystem with the storage in the active tier: # filesys create Viewing Disk and LUN States To view the state of a disk or LUN on an active or archive tier.Example 2 Output for disk groups undergoing. or queued for. Destroy the filesystem: # filesys destroy 3.2 Command Reference Guide . reconstruction: Diskgroup --------dg4 dg4 --------Disk Reconstruction -------------4.12 (pending) ----------------------40 ------------------------------125 -------------------Progress (%) Remaining (minutes) 1 disk is under resconstruction. 1 disk is pending reconstruction. Example # storage show summary Disk States ----------In Use Spare TOTAL DISKS ----------Active tier ----------14 1 15 ----------Archive tier -----------14 1 15 ------------ 274 EMC DD OS 5. use the storage show summary command option. Add disks in two different enclosures to the active tier: # storage add enclosure 2 # storage add enclosure 5 2. Additional Topics This section provides additional information on various topics and concepts. available Any of the following:  A previously unknown disk or LUN added to a tier by the storage add enclosure command option. and whose partition was destroyed by the disk unfail command. Spare disks can be used to create or expand the filesystem. unknown A blank disk inserted into the disk slot.Output Definitions absent No disk is in the disk slot. storage 275 . Spare. After RAID reconstruction of a spare disk completes. or explicitly by an administrative user. the disk is part of a RAID disk group.   In Use Storage that is part of an active filesystem or associated RAID disk group. or a disk failed by a RAID system. This operation reverts the disk or LUN to available storage in the archive tier. or In Use) removed from the tier automatically by the disk subsystem. Spare A disk that can be used as a RAID hot spare through RAID reconstruction. DD Extended Retention system only: a previously In Use disk or LUN deleted from an archive unit by the filesys archive unit del command option. A previously failed disk in an expansion shelf populated with other disks belonging to a tier that is not primarily composed of disk group disks. Foreign A disk belonging to a third-party vendor. Spare (reconstruction) A spare disk that is pending or undergoing RAID reconstruction. Failed Tiered storage (Available. Failed may also indicate unknown or foreign storage explicitly changed to the Failed state. which puts filesystem data into what the formerly spare disk and then makes the disk an integral part of a disk group. 2 Command Reference Guide .276 EMC DD OS 5. command options are available only to users with admin role permissions. The selected files are compressed into a tar.support The support command uploads files from a customer Data Domain system to the Support portal for troubleshooting. Options The following option is available with this command. information for all nodes is included. output. Argument Definitions bundle Send various Data Domain system log files required by Support. <file-list> Contains file names available under /ddvar. gzip folder with a README file that includes identifying autosupport headers. and permissions. Options include:  upload Change History Click the command option for details on usage and functionality. including arguments. If using this command option on a master controller in a Global Deduplication Array. See the EMC DD OS Release Notes of the corresponding version for details on modifications. upload support upload {bundle [<file-list>] | traces | <file-list>} Upload files to Support. File names in a list must be separated by one space. Version Change 5.2 No changes from previous version. support 277 . Guidelines and Restrictions Unless otherwise noted. traces Send multiple perf.log (performance log) files to Support. 278 EMC DD OS 5.2 Command Reference Guide . and view system-level information.2 New command options: system passphrase change system passphrase set system retention-lock compliance configure system retention-lock compliance enable system retention-lock compliance status system upgrade status system 279 . including arguments. Options include:            headswap option passphrase poweroff reboot retention-lock sanitize set show status upgrade Change History Click the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications.system The system command enables administrative users to perform standard tasks on Data Domain systems. configure a system for Retention Lock Compliance. and permissions. output. Version Change 5. . The battery entry for NVRAM cards should show as 100 percent charged..] [custom-view <view-spec>. however..Modified command options: system show stats [view {nfs | cifs | repl | net | iostat | sysstat | vtl}.. DD880g. command options are available only to users with admin role permissions.  Options The following options are available with this command. In both cases the charge may be less than100 percent initially. if it does not reach 100 percent within three days.. Exceptions are if the system is new or the card is a replacement. the card must be replaced... see the Chassis Replacement FRU document for the system. headswap system headswap Restore the configuration to a system after a head unit replacement.2 Command Reference Guide . enabled.] [custom-view <view-spec>. This command is available only when you swap to DD690. or if a battery is not enabled.] [{local | gda-display {row | column}}] [interval <nsecs>] [count <count>] system show performance [local] [raw | fsop] [<duration> {hr | min} [<interval> {hr | min}]] Modified output (see “Additional Topics” for details..] [{local | gda-display {row | column}}] [interval <nsecs>] [count <count>] Guidelines and Restrictions  Unless otherwise noted. DD690g... DD880.. option system option reset {login-banner} Reset the login banner to the default of no banner.) system show performance [local] [raw | fsop] [<duration> {hr | min} [<interval> {hr | min}]] system show stats [view {nfs | cifs | repl | net | iostat | sysstat | vtl}. For specific instructions. and DD990models.. 280 EMC DD OS 5. Are you sure? (yes|no|?) [no]: y system 281 .system option set console { serial | lan | monitor } Set the active console option. This command is required for IPMI usage. See “ipmi” for details. This command option requires security officer authorization. system passphrase set For fresh installations. Example # system reboot The 'system reboot' command reboots the system. Are you sure? (yes|no|?) [no]: y reboot system reboot Shut down and reboot a Data Domain system. system option set login-banner <file> Set the login banner file. File access is interrupted during the reboot. set the passphrase used to access the system. This command does not power off external storage. See “Setting a Log In Banner” for instructions. The command automatically performs an orderly shutdown of filesystem processes. Passphrase length cannot exceed 255 characters. passphrase system passphrase change Change the passphrase used to access the system. system option show View system options. Example # system poweroff The 'system poweroff' command shuts down the system and turns off the power. poweroff system poweroff Shut down the Data Domain system. The command performs an orderly shutdown of filesystem processes. 2 Command Reference Guide .retention-lock system retention-lock compliance configure Configure Retention Lock Compliance on the Data Domain system. To ensure data is removed from replication snapshots during system sanitization. sanitize system sanitize abort Stop the system sanitization process. This command option requires security officer authorization. synchronize all replication contexts prior to beginning the procedure. <MM> (01 through 12). system sanitize watch Monitor the progress of system sanitization. This command option requires security officer authorization if the system is enabled for Retention Lock Compliance. The format for the data and time is: Two digits for the month. set system set date <MMDDhhmm>[[<CC>]<YY>] Set the system date and time. This command option requires security officer authorization. 282 EMC DD OS 5. system retention-lock compliance enable Enable Retention Lock Compliance on the Data Domain system. This command option requires security officer authorization. system sanitize start Start the system sanitization process. See “Ensuring System Sanitization” for details. Do not use this command if Network Time Protocol (NTP) is enabled. system sanitize status Check system sanitization process status. Note that prior to running sanitization. snapshots created during a previous replication process by another user may continue to hold deleted data. system retention-lock compliance status Display status of the Retention Lock Compliance policy on the system. See “Configuring a System for Retention Lock Compliance” for instructions. @25442 //prod/main/platform/os/debugrpm/...@273002 //prod/main/platform/os/linux-2.. at 9:24 a.@61933 //prod/main/platform/os/linux-2.@76935 //prod/main/platform/os/linux-2. Two digits for the hour.. Example # system show detailed-version Data Domain OS 5.2.6.0-273063 /auto/home/lsbuild/desktop-272152 //prod/main/app/.Two digits for the day of the month. Two digits for minutes. 2012... <hh> (00 through 23)....6.@272001 system 283 .or four-digit year): # system set date 0423152412 # system set date 042315242012 show system show all Show all system information.12/arch/i386/.12/arch/x86_64/. 2400 is an invalid entry.. enter one of the following commands (two.@273063 273063 //prod/main/platform/os/. system show date Display the system clock.... <mm> (00 through 59). The entry 0000 equals midnight..12/arch/ia64/. Example Use one of the following commands to set the date and time to April 23.. <DD> (01 through 31).@146377 Distribution: /auto/builds64i/distro/272152/root 272152 //prod/main/platform/user/samba/. Optional: Two digits for the century <CC> and two digits for the year <YY>.0. The hour <hh> and minute <mm> variables are entered in 24-hour format with no colon between the hours and minutes.m.6. system show detailed-version Show the version number and release information. Version info from ddfs executable: dd_version_timestamp=Mon Nov 7 21:21:42 2011 GMT dd_version_checksum=4eeb0cb786c783252e1c85b2f7696e26 dd_version_build_level=nightly dd_version_change_level=//prod/main/app/..2. Example # system show eula SOFTWARE LICENSE AND MAINTENANCE AGREEMENT *** IMPORTANT INFORMATION .0. system show hardware Display information about slots and vendors and other hardware in a Data Domain system.@273063 dd_version_client=//ddfab:273063/app/. See the DVD Installation Guide for details.2 Command Reference Guide .0-273063 Version info from kernel: kernel_version_release=2. the use of which is subject to and expressly conditioned upon acceptance of this Software License and Maintenance Agreement (the "Agreement"). the Data Domain Technical Consultant can temporarily bypass license acceptance and continue with the installation by pressing Ctrl-C. the user must press Enter to accept the license.6.. Note if the user is not present during system installation. Output truncated. 0b -----------------------------------------------------------------------------Micro Memory 5425CN NVRAM Card 284 EMC DD OS 5. which is displayed the first time he or she logs in to the system.. Example # system show hardware Slot 0 1 2 3 4 Vendor Intel (empty) LSI Logic LSI Logic Device 80003ES2LAN GigE (empty) SAS3442E SAS3442E 3a 4a Ports 0a.23-ddr273063 kernel_build_level=SMP system show eula View the End User License Agreement (EULA). dd_version_opened_files= dd_version_release=5.PLEASE READ CAREFULLY *** This Software contains computer programs and other proprietary material and information.. Otherwise. If output indicates one or more component errors. Example # system show meminfo Memory Usage Summary Total memory:7987 MiB Free memory:1102 MiB Total swap:12287 MiB Free swap:12287 MiB system show modelno Display the hardware model number of a Data Domain system. enabled 100% charged. enabled -------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------- system 285 . 0 memory 100% charged.5 6 Chelsio (empty) T320 10GbE Dual Port 5a. system show nvram Display information about NVRAM cards. enabled 100% charged.00 MiB 3 0 PCI. an alerts notification is sent to the designated group and the Daily Alert Summary email includes an entry citing details of problem. Example # system show nvram Card 1 Component Slot Memory size Number of batteries Errors Battery 1 Battery 2 Battery 3 Value 6 1024. 5b (empty) ------------------------------------------------------------------------------ system show meminfo Display summary of system memory usage. system show oemid [name | value] Show details of system OEM. To specify the interval. enter: # system show performance 30 min 286 EMC DD OS 5. Example # system show oemid Enclosure --------1 2 3 4 ---------Model No. fsop Display the number of each filesystem operation performed per minute. raw Show unformatted statistics. Example 1 To show performance figures of the prior 30-minute duration only. -------------DD890 ES30 ES30 ES30 ----------------------------------------OEM Name --------------DELL DELL DELL OEM Value -------------72345CC 72345CC 72345CC system show performance [local] [raw | fsop] [<duration> {hr | min} [<interval> {hr | min}]] Display summary of system performance for designated interval. Output includes IDs for connected enclosures only. <duration> The hours or minutes prior to the current time for which to show data.2 Command Reference Guide . you must also specify the duration. the OEM identifier of the head unit is displayed first. On systems with head units and shelves. Argument Definitions local Display local statistics. <interval> The time between each line in the display. 0 0.00/ 0.00 0..--------------------in/out---.-----------------------------------------Protocol------------------------------------------------------.00 12 10 0% 0% 13.------------in/out-----.0 Output truncated.00/ 2. 2011/12/03 2011/12/03 16:58:00 17:08:00 0.-------.00/ 0.00 0. enter: # system show performance 30 min 5 min Example 3 To show system performance.00 10. Protocol Repl Network (in/out) NetworkReplication throughput into and out of the Data Domain system.---------in/out--. VTL. Write The write throughput data to the Data Domain system.2/ 50. Time The time system performance is being viewed.Example 2 To show performance figures of the prior 30-minute duration with an interval of 5 minutes between each set of figures.00 0..0 0. Repl Pre-comp (in/out) Replication pre-compressed (logical) throughput into and out of the Data Domain system. Read The read throughput data from the Data Domain system..0 0.----.0 0. The value is always zero for collection replication.---------------------------------in/out--. Replication.00/ 0.. Output Definitions Throughput (MB/s) Date The date system performance is being viewed. DD Boost over IP. DD Boost-managed replication and optimized duplication.00/ 0.00/ 2.----. enter: # system show performance ------------------------Throughput (MB/s)----------.00 22. CIFS.. ---------.----.----.. NDMP. system 287 . note Throughput Read and Write data includes NFS. Date Time Read Write Repl Network Repl Pre-comp ops/s load data (MB/s) wait (ms/MB) . load Load percentage (pending ops/total RPC ops *100). A high percent indicates cache thrashing. A high percent indicates poor data prefetching. not all segments in a compression region may be used. Because a compression unit contains multiple segments. ops/s Operations per second. A high ovhd relative to unus indicates space is being wasted due to cache block fragmentation. In the ideal case. Cache Miss data Percent of data segment lookups that miss in the cache. VTL over Fibre Channel. Data does not include Replication. Compression regions are stored in fixed size (128 KB) blocks. ovhd should exactly equal unus. thra Percent of compression units that have been read and discarded without being used. and DD Boost-managed replication and optimized duplication.note Protocol data includes NFS. 288 EMC DD OS 5. or DD Boost over Fibre Channel. lcomp Local compression rate. Amount of data the filesystem can read from and write to the kernel socket buffer. wait (ms/MB in/out) Time taken to send and receive 1MB of data from the filesystem to kernel socket buffer. CIFS. ovhd Percent of a compression unit cache block that is unused. data (MB/s in/out) Protocol throughput. unus Percent of compression unit data that is unused. A high percent indicates poor data locality.2 Command Reference Guide . Compression gcomp Global compression rate. DD Boost over IP. meta Percent of metadata segment lookups that miss in the cache. A high percent indicates poor metadata prefetching. r+ The number of reopened read file streams in the past 30 seconds. Streams rd The number of active read streams. first perform a metadata lookup followed by a data lookup. wr The number of active write streams. w+ The number of reopened write file streams in the past 30 seconds. State C Cleaning D Disk reconstruction B GDA (also known as multinode cluster [MNC] balancing) V Verification running (data or container) M Fingerprint merge F Archive data movement (active to archive) S Summary vector checkpoint I Data integrity system 289 . For each data access. 290 EMC DD OS 5. SS Load Balance (gc) Denotes type and number of expunge (gc) processes. rd Read processes. wr Write processes. rd The number of read requests. prefetch Prefetch processes. Information under (user/repl) denotes all user-plus-Replicator traffic. excluding the time to receive or send the request or reply. stream The number of open streams. Latency avg/sdev The average and standard deviation of the response time for ddfs to service all protocol requests. The CPU ID of the most loaded CPU is shown in brackets. SS Load Balance (user/repl) Indicates the relative load balance across segment storage (segstore) instances. The disk ID of the most loaded disk is shown in brackets. wr The number of write requests. tot The total number of requests. Note that this value may differ from the ID used by disk show commands. disk The maximum (highest) disk utilization across all disks.2 Command Reference Guide .Utilization cpu The average and maximum CPU utilization. prefetch The number/percentage of prefetch requests. See the model-specific installation and setup guide to match a slot to a port number.00 01.10. Firmware The Data Domain system HBA firmware version. WWN is the world-wide name of the Data Domain system SAS HBA on a system with expansion shelves.0 Gbps Firmware Hardware Address 00:26:6c:fa:7d:5d (eth0a) 00:26:6c:fa:7d:5c (eth0b) 50:06:02:b0:02:ad:d8:00 50:06:02:b0:02:ad:d8:04 50:06:02:b0:02:ad:e7:00 50:06:02:b0:02:ad:e7:04 50:06:02:b0:02:b3:80:10 50:06:02:b0:02:b3:80:14 50:06:02:b0:02:b3:e0:50 50:06:02:b0:02:b3:e0:54 -------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------- Output truncated.00 01.00 01.10.00 Link Speed 1.27.10. An address followed by an Ethernet port number is a MAC address. VTL.00 01. Link Speed The speed in Gbps (Gigabits per second).00 01.10.27. Hardware Address A MAC address. etc. Connection Type The type of connection. Example # system show ports Port Connection Type 0a 0b 1a 1b 1c 1d 2a 2b 2c 2d Enet Enet SAS SAS SAS SAS SAS SAS SAS SAS 12.10.tot The total number of gc processes. or a WWPN/WWNN.10.10.27. such as Ethernet. a WWN.0 Gbps 01. system show ports Display information about ports. system 291 .00 01.27.27.27.27. SAS.00 01. WWPN/WWNN is the world-wide port name or node name from the Data Domain system Fibre Channel HBA on gateway systems. VTL-related ports do not display unless VTL is enabled. Output Definitions Port The port number.27.10. column Displays output of for each node in column format.. the first report is for current activity. Valid on the master node of a cluster only. Column headings indicate type of stat value. the argument <gda-display> is the default. If interval is specified and count is omitted. For example: # system show serialno Serial number: 8F46942007 system show stats [view {nfs | cifs | repl | net | iostat | sysstat | vtl}. If the system is too busy to determine a value. or until the user presses Ctrl-C.) instead of a number... The default count is one. If there is a performance issue. Subsequent reports show activity performed during [interval <nsecs>]. client. row If local or gda arguments are not specified on a GDA master.. Argument Definitions local Displays local values on the master system. Output for each node is in row format. this command option can determine if the problem is on the server. 292 EMC DD OS 5. See also system show performance command.. gda-display Displays values of cluster nodes on the master system in a row or column format. displayed as a single line for each interval. interval When specifying intervals for collecting statistics.system show serialno Display the system serial number.] [custom-view <viewspec>.2 Command Reference Guide . The default interval is five seconds. count Specifies how many times to display the results. Valid on the master node of a cluster only.] [{local | gda-display {row | column}}] [interval <nsecs>] [count <count>] Display system statistics to evaluate the performance level of the Data Domain system since the last reboot. the column shows a dash ( . or network. the count is set to infinite.. |.0 13.. NFS Indicates protocol type specified in <view> argument. Amount of data the filesystem can read from and write to the kernel socket buffer. wait in ms/MB Average amount of time spent in ms to receive the amount of data.x..) data in % MB/s Protocol throughput.Example # system show stats view nfs interval 2 -------------------------------------------------------------------------------------------------------------------------------------------------------------------CPU |State |NFS | ops/s | load % data in MB/s data out wait in MB/s ms/MB | Net wait out | aggr in aggr out ms/MB | MB/s MB/s |.. See “State” described in show system performance command for details on what each letter represents. |. system 293 . load % Load percentage (pending ops/total RPC ops *100).0 22.. data out % MB/s Protocol throughput. ops/s I/O operations.. State Indicates system state.. Output Definitions CPU aggr busy % Average of busy percentage of all CPUs. aggr max % Amount of data sent through all interfaces..87 0 . Amount of data the filesystem can write to the kernel socket buffer.2 50. Output truncated.. aggr busy aggr max |CDBVMSF % % | -------------------------------------------------------------------------------------------------------------------------------------------------------------------28 28 12 0 13 2. internal temperatures.2. Example # system status Enclosure 1 Fans Description Level ----------FAN 1 FAN 2 FAN 3 -----------medium medium medium Status -----OK OK OK 294 EMC DD OS 5. Information is grouped separately for the Data Domain system and each expansion shelf connected to the system.00. 1. 1.wait out ms/MB Average amount of time spent in ms to send the amount of data. load average: 1. system show version Display the Data Domain OS version and build identification number.2 Command Reference Guide . Net aggr in MB/s Amount of data received through all interfaces. 19:28. and power supplies. system show uptime Display the filesystem uptime. the number of users. 19:18. 2 users.” for details.00 Filesystem has been up 1 days. See “Checking System Temperature and Power Supply. the time since the last reboot.00.0-273063 status system status Display status of fans. aggr out MB/s Amount of data sent through all interfaces. Example # system show uptime 13:39:53 up 1 day. Example # system show version Data Domain OS 5. and the average load.0. FAN 4 FAN 5 FAN 6 FAN 7 FAN 8 ----------Temperature Description -------------MLB TEMP 1 MLB TEMP 2 FP TEMP medium medium medium medium medium ------------ OK OK OK OK OK -----C/F -----38/100 26/79 23/73 27/81 27/81 22/72 40/104 42/108 37/99 38/100 -----Status -----OK OK OK OK OK OK OK OK OK OK ------ BP LEFT TEMP BP MIDDLE TEMP BP RIGHT TEMP LP TEMP FHFL TEMP CPU 0 TEMP CPU 1 TEMP -------------Power Supply Description --------------Power Module #1 Power Module #2 --------------Enclosure 2 Fans Description ---------------------- Status -----OK OK ------ Level ----low low low low ----C/F --------Status ----------- Status -----OK OK OK OK ------ Power module #1 fan #1 Power module #1 fan #2 Power module #2 fan #1 Power module #2 fan #2 ---------------------Temperature Description ---------------Internal ambient ---------------- 25/77 OK system 295 . Additional Topics This section provides additional information on various topics and concepts. send. a message displays the time of completion.1. system upgrade status Display current status of upgrade procedure. 296 EMC DD OS 5.datadomain. Columns proc. The upgrade command shuts down the filesystem and reboots the Data Domain system. system upgrade continue If upgrading a multi-node cluster. depending on the amount of data on the system. When the upgrade is finished. output of system show performance command has changed. New columns for utilization statistics are ops/s. recv.com.Power Supply Description ---------------Power Module #1 Power Module #2 --------------Status ----OK OK ------ upgrade system upgrade <file> Upgrade the Data Domain system software from the <file> specified in the /ddr/var/releases directory.2 Command Reference Guide . The upgrade command may require over an hour.2 now runs in a multi-thread safe mode instead of the single-threaded mode in DD OS 5. See the Release Notes for instructions on upgrading Data Domain systems. run this command option after the system reboots following the system upgrade command option. the command shows the status of upgrade and the phase of the procedure. This command option shows only the current status and then terminates. and wait. load. run this command option on the master controller to complete the second phase of the upgrade procedure. For best results. data. It is not equivalent to a watch command. If the upgrade is in progress. idle are no longer available. Output Changes for Multi-Thread Mode NFS server in DD OS 5. Therefore. DD OS release notes are available from the Support portal at https://my. ” enter: # system option set login-banner /ddvar/banner system 297 . Configure Retention Lock Compliance by entering: # system retention-lock compliance configure If the configuration is successful. See “license” for instructions. From the Data Domain system. Mount the Data Domain system directory /ddvar from another system. enter system option set login-banner with the path and file name of the text file you created. Create a text file with your login message as the text on the other system. to use text from a file named “banner. 3.Configuring a System for Retention Lock Compliance There are two prerequisites for configuring a system for Retention Lock Compliance:   Installing the license for the feature. 2. See “mtree” for details. See the EMC Data Domain Administration Guide for more information on Retention Lock Compliance and Governance. Setting up security office authorization. log in to the system as sysadmin. When the reboot has concluded. 2. Setting a Log In Banner 1. To configure the system: 1. See “user” for instructions. For example. the system reboots and file access is interrupted during this time. Configuring an MTree for Retention Lock Compliance To enable Retention Lock Compliance on an MTree. Log in to the system as sysadmin. 3. enter: # mtree retention-lock enable mode compliance mtree /data/col1/<mtree_name> Note that /backup cannot be configured for Retention Lock Compliance. When synchronization concludes. the Data Domain system shuts down. If a CPU temperature reaches 0 Celsius. With older models. a warning message is generated. the Data Domain system shuts down. delete the contaminated files and synchronize the replication contexts. Look at the back panel of the enclosure and check the LED for each power supply to identify those requiring replacement. With newer models. reissue the system sanitize start command option. The message does not identify which power supply or supplies are not functioning (except by enclosure).2 Command Reference Guide . The CPU temperature values depend on the Data Domain system model. If the temperature reaches 60 degrees Celsius (140 degrees Fahrenheit). The primary use of this command is to resolve Classified Message Incidents (CMIs) that occur when classified data is copied inadvertently onto a non-secure system. If the CPU temperature reaches 80 Celsius (176 degrees Fahrenheit). the Data Domain system shuts down. Checking System Temperature and Power Supply If the overall temperature for a Data Domain system reaches 50 degrees Celsius (122 degrees Fahrenheit). The Power Supply section reports that all power supplies are operating normally or that one or more are operating abnormally. the numbers are positive. the numbers are negative when the status is OK and move toward 0 (zero) as CPU temperature increases.Ensuring System Sanitization If you discover data remains within a snapshot after the system is sanitized. System sanitization is typically required in government installations. A Status of Critical indicates that the temperature is above the shutdown threshold. 298 EMC DD OS 5. System sanitization was designed to remove all traces of deleted files and restore the system to the state in which the files never existed. Options include:         add change del disable enable password reset show Change History Click the command option for details on usage and functionality. changes passwords. See the EMC DD OS Release Notes of the corresponding version for details on modifications. including arguments. A role determines the type of operations a user can perform on the Data Domain system.2 New command options: user change role <user> {admin | user | backup-operator | data-access} Modified command option: user add user-name [password <password>] [role {admin | security | user}] [min-days-between-change <days>] [max-days-between-change <days>] {warn-days-before-expire <days>] [disable-days-after-expire <days>] [disable-date <date>] user 299 . See “RBAC and User Role Definitions” for details. and displays user roles.user The user command adds and deletes users. manages password aging and strength policies. You can change the sysadmin password but cannot delete the account. output. See the Installation and Setup Guide for details on sysadmin. and permissions. The default administrative account is sysadmin. Version Change 5. ” After a user is added as the initial security officer. disable-days-after-expire Account is disabled if inactive for the specified number of days past expiration. the system prompts for one. disable-date Account is disabled on this date. only security officers can add or delete other security officers. If password is not specified. add user add user-name [password <password>] [role {admin | security | user}] [min-days-betweenchange <days>] [max-days-between-change <days>] {warn-days-before-expire <days>] [disabledays-after-expire <days>] [disable-date <date>] Add a new user. command options are available only to users with admin role permissions.Guidelines and Restrictions Unless otherwise noted. warn-days-before-expire Number of days of warning before a password expires. 300 EMC DD OS 5. Users in the sysadmin role create the first security officer role by adding a user and designating the role “security. account never expires.2 Command Reference Guide . A user name must start with a number or a letter. See “Adding a Security Officer” for instructions. Argument Definitions password Password must be at least six characters. max-days-between-change Maximum number of days before password expires. The user names root and test are default names on each Data Domain system and are not available for general use. See “RBAC and User Role Definitions” for details. min-days-between-change Minimum number of days allowed before the password can be changed again. The default role is user. Options The following options are available with this command. role The type of user permissions allowed. If not specified. Special characters cannot be used. user change role <user> {admin | user | backup-operator | data-access} Change the role of a user. the disable date previously assigned to the account is used.change user change password [<user>] Change a user’s password. The account must already exist on the system. enable user enable <user> [disable-date <date>] Enable a specified user account with an optional disable date. disable user disable <user> Disable the specified user account. unless you set different aging options with the user add command. user 301 . Users with the user role can change only their own passwords. This command option does not require security officer authorization. Passwords must comply with the password strength policy. This prevents the user from logging on to the Data Domain system. New accounts inherit the policy in effect at the time they are created. The admin user can change any user’s password by using the user-name option. See “RBAC and User Role Definitions” for details on roles. Note that sysadmin cannot be deleted. del user del <user> Remove a user. password user password aging option reset {all | [min-days-between-change] [max-days-between-change]  [warn-days-before-expire] [disable-days-after-expire]} Reset one or more rules in the default password aging policy to the current default values. which you can check with the command option user password strength show. user password aging option set [min-days-between-change <days>] [max-days-between-change <days>] [warn-days-before-expire <days>] [disable-days-after-expire <days>] Set the default values for the password aging policy. If not specified. 2006 ----------------------------------------------------------------------------------------------------------------------------------------------------------- user password strength reset {all | min-length |min-char-classes <num_classes>} Reset the password strength policy to the default values. Example # user password aging show joe User Password Last Changed joe1 March 28. 302 EMC DD OS 5.user password aging option show Display the default password aging policy.2 Command Reference Guide . Specify either min-length or min-char-classes. Argument Definitions all Reset both the minimum length and minimum number of character classes to 1. user password aging show [<user>] Show the password aging policy for all users. 2011 Minimum Days Maximum Days Warn Days Disable Days Status Between Change Between Change Before Expire After Expire 0 0 99999 99999 7 7 never never enabled enabled ----------------------------------------------------------------------------------------------------------------------------------------------------------sysadmin Mar 16. Users can check the password aging policy for their own account. Users in the admin role can check the policies for all users. min-length Reset the minimum number of characters in the password to 1. min-char-classes Reset the minimum number of character classes to 1. or for a specified <user>. user password strength set {[min-length <length>] [min-char-classes <num_classes>} Set the password strength policy. or both. user password aging reset <user> {all | [min-days-between-change] [max-days-between-change] [warn-days-before-expire] [disable-days-after-expire]} Reset one or more rules in the password aging policy for the specified <user> to the current default values. user password aging set <user> [min-days-between-change <days>] [max-days-between-change <days>] [warn-days-before-expire <days>] [disable-days-after-expire <days>] Set the password aging policy for the specified <user>. or 4. and special characters. When DD OS counts the number of character classes. show user show active Display list of users currently logged in. Valid passwords must contain at least one character from the specified number of classes. The four character classes are lowercase letters. Specify 1. # user password strength show Minimum length of password: 7 Minimum number of character classes required in the password: 2 reset user reset Reset the user account list.Argument Definitions min-length The minimum number of characters in the password. an uppercase letter at the beginning of the password does not count as an uppercase letter. 3. min-char-classes The minimum number of character classes. user show detailed [<user>] Show detailed information for a specified user or for all users. note This command option is not allowed on Retention Lock Compliance systems. and password-strength parameters to default values. user show list Display list of system users. user password strength show Show the current password strength policy. a digit at the end of the password does not count as a digit. All users may run this command option. digits. uppercase letters. password-aging options. user 303 . Similarly. 2. The Role of the Security Officer The role of Security Officer was created to comply with the Write Once Read-Many (WORM) regulation. The role of security officer is also associated with the feature “Role-Based Security Access” (RBAC). such as encryption. This regulation requires electronically stored corporate data be kept in an unaltered. To achieve sign off. Sign-offs occur per-command. each with designated permissions. EMC Data Domain added auditing and logging capabilities to enhance the function.Additional Topics This section provides additional information on various topics and concepts. They do not persist. See “user” for a description of roles and permissions. 304 EMC DD OS 5. There are three types of security officer interaction:  Security Officer Sign Off The security officer has approved the operation to be performed by the admin. As a result of compliance regulations. and the admin has received the security officer credentials. original state for purposes such as eDiscovery.2 Command Reference Guide . the security officer must provide the proper credentials (username and security officer password) when prompted by the admin. some commands such as filesys encrypt are always under the purview of the security officer. However.  Security Officer Authorization Synonymous with security officer sign off. most of which are transparent to the user. RBAC introduces various new user roles. and archiving now require security officer interaction. Retention Lock Compliance. depending on the use case. The admin has the permission from the security officer to run a command.  Security Officer Oversight Security officer oversight applies when Retention Lock Compliance is enabled on an MTree. another federal requirement to which Data Domain adheres. most command options for administering sensitive operations. even in the absence of MTrees enabled with Retention Lock Compliance. The type of interaction varies. In addition to authorizing procedures. a sec-off-defaults permission is created that includes a list of all current security officers. but cannot monitor. During authorization. Users in the security role cannot be assigned additional roles. user 305 . Most command options are available to the admin role only. manage. user A user can monitor Data Domain systems and perform the fastcopy operation. For example. only the security officer can create and manage additional security officers. the following roles are available for administering and managing the Data Domain operating system.” by the security officer. The user role is for standard users who have access to a limited number of command options. the admin and the security officer are required to participate when issuing a command. The security role is assigned to local users only. See the section on authorization workflow in “authorization” for details. if the system contains security officers. and move tapes within a VTL library. allows a user to create snapshots. System access and operations are allowed or restricted based on the permissions associated with each role. admin A user can configure and monitor the entire Data Domain system. or “signed off. security (security officer) Some DD OS procedures require additional security and therefore must be authorized. or configure a Data Domain system.RBAC and User Role Definitions Role-based access control (RBAC) is an authentication policy that controls the type of operations a user can perform on a Data Domain system. most show command options are available at this level. The user role “security” and “security officer” are synonymous and the terms are used interchangeably in this document. In accordance with RBAC policy. During an upgrade. A user with this role can log in to a system and can change his or her password. import and export tapes to a VTL library. data-access For DD Boost authentication only. backup-operator In addition to user role permissions. password xyz1. 306 EMC DD OS 5. enter: # user del jeff deleted user "jeff". Changing a User Password To change the password for the user named jane. Changing a Role To change the role to admin for the user named jane. enter: # user change jane admin Role changed for user "jane". only users with security role permissions can add another security officer. After the first security officer role is created.Adding a Security Officer The user in the default role of sysadmin must create the first security officer. and role admin. Removing a User To delete the user named jeff. To add a user with security role permissions. enter: # user add jeff password xyz1 role admin user "jeff" added. enter: # user add sec_off password <password> role security The new security user must log in as the security office and enable the security officer authorization policy by entering: # authorization policy set security-officer enabled Adding a User To add a user named jeff.2 Command Reference Guide . enter: # user change password jane Enter new password: Re-enter new password: Passwords matched Password changed for user "jane". Beginning with version 5. MTree-based pools allow MTree replication to be used instead of directory replication. was relatively unconstrained. This led to issues where VTL data was changed beneath the VTL process.0 and earlier. Users may also create additional backward-compatible pools as needed. Existing pools are backward compatible. and resulted in unexpected behavior or inconsistencies. Additionally. retention lock policy. With MTrees. when manually deleting a pool or copying files. and directory replication for backward-compatible pools. By using MTrees for pools VTL data is relocated from /backup. VTL pool-based replication is performed using MTree replication for MTree pools. These attributes include snaphots and snapshot schedules. and compression information. users may continue to use and manage VTL with little or no difference when compared to versions 5. Options include:             add cap debug del disable drive enable export group import initiator option vtl 307 . typically through NFS or CIFS mount of /backup. In previous versions.vtl EMC Data Domain VTL is a licensed software option that enables backup applications to connect to and manage a Data Domain system as a virtual tape library. multiple MTrees enable the user to more closely configure DD OS for data management needs. for example. access to VTL data in /backup (/data/col1/backup). new VTL pools are MTree-based. MTree-specific attributes can be applied to each VTL pool individually instead of inheriting a common set of attributes from the default backup MTree.2. output. See the EMC DD OS Release Notes of the corresponding version for details on modifications.2 New command options: vtl drive show {serial-number <serial-number> | vtl <vtl> [drive {<drive-list>}]} vtl pool upgrade-to-mtree {<pool-list> | all} [check-only] Modified command options: vtl pool add <pool> [backwards-compatibility-mode] vtl show stats <vtl> [drive {<drive-list> | changer | all}] [port {<port-list> | all}] [interval <secs>] [count <count>] vtl tape modify <barcode> [count <count>] [pool <pool>] retention-lock {<date> | <period>} vtl tape move <vtl> source {slot | drive | cap} <src-address-list> destination {slot | drive | cap} <dst-address-list> vtl tape show {all | pool <pool> | vault | <vtl>} [summary] [count <count>] [barcode <barcode>] [time-display {modification | creation | retention}] [sortby {barcode | pool | location | state | capacity | usage | percentfull | compression | time | modtime} [{ascending | descending}]] 308 EMC DD OS 5. and permissions. Version Change 5.2 Command Reference Guide .         pool port port option readahead reset show slot status tape Change History Click the command option for details on usage and functionality. including arguments. The CAPs are deleted from the end. NFS. use 64 KiB or larger. The recommended number of concurrent virtual tape drive instances is platform-dependent. Verify that a Fibre Channel (FC) interface card is installed in the PCI card array. Data Domain VTL supports a maximum of 64 library instances. The total number of CAPs cannot exceed 100 per library or 1000 per system. This command is supported on both nodes of a cluster.Guidelines and Restrictions  Unless otherwise noted. The VTL feature communicates between a backup server and a Data Domain system through a Fibre Channel interface. For best results. as is the recommended number of streams between a Data Domain system and a backup server.     Options add vtl add <vtl> [model <model>] [slots <num-slots>] [caps <num-caps>] Add a tape library. The destroy command deletes all virtual tapes. vtl cap del <vtl> [count <num-to-del>] Delete <num-to-del> CAPs from a virtual tape library. cap vtl cap add <vtl> [count <num-caps>] Add cartridge access ports (CAPs) to a virtual tape library. vtl 309 . For details on the number of tape drives and data streams. Data Domain VTL does not protect virtual tapes from a Data Domain system filesys destroy command. and CIFS. Set the backup software minimum record (block) size. such as VTL. debug vtl debug disable [component {all | user | kernel | default | <component-list>}] Disable debug functionality of the specified components. command options are available only to users with admin role permissions. Changing block size after the initial configuration renders data written in the original size unreadable. see the EMC Data Domain Administration Guide. This number is system-wide and includes streams from all sources. 2 Command Reference Guide . Drives are added by starting with drive number 1 and scanning for any holes left by the vtl drive del command. The unit of timeout is minutes. drive vtl drive add <vtl> [count <num-drives>] [model <model>] Add drives to a virtual tape library. which means there can be holes in the drive list. When the holes are filled. 310 EMC DD OS 5. vtl debug show [component {all | user | kernel | default | <component-list>}] Show specified components. If an attempt is made to add more drives than the current number of slots. the system automatically adds the additional slots required. Any tapes loaded into the library when the library is deleted are not destroyed. del vtl del <vtl> Recycle (remove) an existing virtual tape library. When a VTL pool is deleted. This command is supported on both nodes of a cluster. note You cannot mix drive models within the same library. tapes are placed back into the virtual tape vault. vtl drive del <vtl> drive <drive number> [count <num-to-del>] Delete virtual drives from a VTL. This command is supported on both nodes of a cluster. The number of slots within a library cannot be fewer than the number of drives in the library. the associated MTree is first renamed before deletion. vtl drive show {serial-number <serial-number> | vtl <vtl> [drive {<drive-list>}]} View details of VTL drives. Instead. or all components.vtl debug enable [component { all | user | kernel | default | <component-list>}] [level {all | high | medium | low | none}] [timeout {never | timeout (mins)}] Enable debug functionality for the specified components in persistent mode or a specified timeout period at the specified debug level. running debug functionality. This allows a new pool with the same name to be created. disable vtl disable Close all libraries and shut down the VTL process. the drives are appended to the end of the library. Any drive can be deleted. This may cause issues with some applications. Output Definitions Location Standard format location of library or drive. Persistent Reservation Persistent reservation information. Barcode Barcode of loaded tape. or cartridge-access port (CAP) and send them to the vault. Serial # Drive serial number. drive. Product revision Drive product revision. Access Groups Fibre Channel access groups for device. export vtl export <vtl> {slot | drive | cap} <address> [count <count>] Remove tapes from a slot. enable vtl enable Enable VTL subsystem. Previous Slot Previous slot of loaded tape. Vendor Drive vendor identification. Product Drive product identification. Device SCSI device ID. Status Drive status. Pool Pool of loaded tape. vtl 311 . vtl group destroy <group-name> Remove the specified empty VTL access group. Each Data Domain system device (changer or drive) and initiators may then be added to the VTL access group. vtl group modify <group-name> vtl <vtl name> {all | changer [lun <lun>] | drive <drive> [lun <lun>]} [primary-port {all | none | <port-list>}] secondary-port {all | none | <port-list>}] Modify a group without removing and replacing devices or initiators in the group. Before you destroy a group. This command immediately removes access from the specified initiator to the VTL devices within the group. vtl group show [ all | vtl <vtl> | <group-name> ] Show information about VTL access groups. Immediately change the access 312 EMC DD OS 5. vtl group add <group-name> vtl <vtl name> {all | changer | drive <drive-list>} [lun <lun>] [primaryport {all | none | <port-list>}] [secondary-port {all | none | <port-list>}] Add a changer or drives to the specified VTL access group. optionally starting at a given LUN. By default. vtl group create <group-name> Create a VTL access group with the specified group name. You can add a changer or drive.group vtl group add <group-name> initiator <initiator-alias-or -WWPN> Add an initiator alias or World Wide Port Name to the specified VTL access group. You can optionally specify primary and secondary Data Domain system VTL port lists. vtl group use <group-name> [vtl <vtl name> {all | changer | drive <drive-list>} {primary | secondary} Switch ports in use for the specified changer in a group or library to the primary or secondary port list for the specified changer or drives.2 Command Reference Guide . vtl group del <group-name> initiator <initiator-alias-or-WWPN> Remove an initiator alias or World Wide Port Name from the specified VTL access group. use the vtl group del command to remove the initiators and devices from the group. You can use this command to change LUN assignments and primary and secondary port assignments. vtl group rename <src-group-name> <dst-group-name> Rename a VTL access group. See “Requirements for Group Naming” for name rules. Note that this command does not interrupt active sessions. the port lists contain all Data Domain system VTL ports. vtl group del <group-name> vtl <vtl name> {all | changer | drive <drive-list>} Remove a device from a group. The <dst-group-name> must not already exist. All users may run this command option. The main purpose of this command is to change group port assignments. vtl 313 . a backup application may need to rescan available SCSI devices. When the path is restored. To remove an initiator from a group. vtl initiator set address-method {auto | vsa} initiator <initiator-alias-or-WWPN> Set the device address method used when responding to a SCSI REPORT LUNS command from the specified initiator. Use the command vtl tape show <vtl name> to display the total number of slots for a VTL and to view which slots are currently used. The following two commands are equivalent: # vtl import VTL1 barcode TST010L1 count 5 # vtl import VTL1 barcode TST010L1 count 5 element slot address 1 Default address is 1. initiator vtl initiator reset address-method initiator <initiator-alias-or-WWPN> Reset the address method to the default. Use this command to work around any platform-specific limitations you may encounter. See “More About vtl group Command Options” for additional tips and guidelines. you do not need to specify a device address method. Also. a rescan of media server’s SCSI bus may be necessary. Reset (delete) the initiator alias from the system. drive. Use backup software commands from the backup server to move VTL tapes to and from drives. import vtl import <vtl> barcode <barcode> [count <count>] [pool <pool>] [element {drive | cap | slot}] [address <addr>] Move tapes from the vault into a slot. Default element is slot. or cartridge access port. This command interrupts any current access to the specified group and is intended to be used during path failures. you can use this command to return the group to its primary port list. Deleting the alias does not affect any VTL access from the specified initiator. With most platforms. After you apply a group to new VTL ports.path to the primary or secondary port for the selected VTL components in an access group. use the vtl group del command instead. vtl initiator reset alias <alias name> Remove an initiator alias. Default pool is Default. Reset the address method used by SCSI REPORT LUNS back to the default (auto). 314 EMC DD OS 5. including colon delimiters. auto-eject. A-Z. Example The following example uses the client name and port number as the alias to avoid confusion with multiple clients that may have multiple ports: # vtl initiator set alias client22_2a wwpn 21:00:00:e0:8c:11:33:04 vtl initiator show [initiator <initiator-alias-or-WWPN> | port <port-list>] Display information about one or all Fibre Channel devices. The alias must be unique. This command does not interrupt traffic or VTL group access. must not be longer than 256 characters. and auto-offline.vtl initiator set alias <alias name> wwpn <wwpn> Add an initiator alias. Use the vtl initiator show command on the Data Domain system to list the client WWPNs detected by the Data Domain system. option vtl option disable <option name> Disable a VTL option.2 Command Reference Guide . See “Values for vtl option Commands” for definitions. All users may run this command option. underscore(_). and hyphen (-). You can create up to 128 aliases. vtl option enable <option name> Enable a VTL option. and can contain only the characters 0-9. An initiator is any Data Domain system client HBA’s world-wide port names (WWPN). Options include loop-id. auto-eject. and auto-offline. vtl option reset <option name> Reset a VTL option to its default value. Options include loop-id. See “Values for vtl option Commands” for definitions. and auto-offline. Example # vtl option enable auto-offline If enabled tapes being moved from a drive are automatically taken offline and unloaded unless the “prevent” bit is set for the drive. Not all devices shown are initiators. a-z. Options include loop-id. This command sets an alias for an initiator’s WWPN. See “Values for vtl option Commands” for definitions. auto-eject. You must match the WWPNs in the command output to the client’s HBA WWPN. vtl pool show {all | <pool>} List tall tape pools or the contents of a specific <pool>. EMC does not recommend creating backwards-compatibility-mode pools unless users have specific requirements. and auto-offline. auto-eject. Note that a pool can be renamed only if none of its tapes are in libraries. Options include loop-id. as in previous releases. including the state of each pool. vtl pool rename <src-pool> <dst-pool> Rename a pool. If the argument all is used.2 DD OS system. See “Values for vtl option Commands” for definitions. the number of tapes. whether or not a pool is a replication destination. the total usage and compression for each pool. replication with a pre-5. You must first use the vtl tape del command to remove all of the tapes from the pool.vtl option set <option name> <value> Set an option and value. Example # vtl option set loop-id 5 The Fibre Channel loop ID is 1 to 126. a summary of all tape pools is provided. vtl pool del <pool> Delete a tape pool. for example. read/write properties. vtl option show {<option name> | all} Show settings for a specific option or all VTL options. and the number of tapes in the pool: vtl 315 . Replication of backwards-compatibility-mode pools is done using directory-based replication. Example # vtl option show all Name -----------loop-id auto-eject auto-offline -----------Value ------------1 disabled disabled ------------- pool vtl pool add <pool> [backwards-compatibility-mode] A pool created with backwards compatibility mode will exist in the default directory (/backup). the Retention Lock status of the pool. The pool collides with an MTree with same name. If so. BCM Pool is in backward-compatibility mode. RLGD Pool is Retention Lock Governance Disabled. VTL upgrade completed successfully.. 316 EMC DD OS 5. This allows planning for any necessary changes prior to the upgrade. those pools are candidates for upgrade. a precheck confirms that an upgrade is necessary (or possible). This command option does not convert the pool to MTree under the following conditions:    The pool is a replication source or destination. the precheck is run. RO Pool is read-only.. Upgrading VTL pools.Output Definitions RW Pool has normal read/write properties. Example 1 # vtl pool upgrade-to-mtree all Checking for VTL upgrade. If no arguments are provided. the upgrade is performed. converting the specified backward-compatibility mode pools to MTree-based pools.. RLGE Pool is Retention Lock Governance Enabled.. If the check-only argument is used. vtl pool upgrade-to-mtree {<pool-list> | all} [check-only] If a <pool-list> is specified. RD Pool is a replication destination. note An upgrade may only be run when VTL is disabled.2 Command Reference Guide . but no upgrade is performed. If the argument all is specified. The filesystem is full. backward-compatibility mode pools are upgraded. RLCE Pool is Retention Lock Compliance Enabled. port vtl port disable {all | <port-list>} Disable a single Fibre Channel port or all Fibre Channel ports in the list. **** Upgrade 'old-pool' cannot be performed. See “Upgrading VTL Directory-Based Pools to MTree-Based Pools” for details. All users may run this command option.Example 2 # vtl pool upgrade-to-mtree old-pool check-only Checking for VTL upgrade. <reason stated here>.             Control commands Write commands Read commands In (number of MiB written--the binary equivalent of MB) Out (number of MiB read) Link failures LIP count Sync losses Signal losses Error count in primitive sequence protocol Number of invalid tx words Number of frames received with a bad CRC vtl 317 . vtl port enable {all | <port-list>} Enable a single Fibre Channel port or all Fibre Channel ports in the list... vtl port show detailed-stats Show the following information about Fibre Channel ports.         Port HBA slot HBA port Connection type Link speed Port ID Enabled Status port option vtl port option reset [{fcp2-retry | topology} [port {<port-list> | all}]] Reset options on VTL Fibre Channel ports. vtl port option set topology {loop-preferred | loop-only | point-to-point} [port {<port-list> | all}] Set topology on VTL Fibre Channel ports. including:     Model Firmware WWNN WWPN All users may run this command option. vtl port show stats [port {<port-list> | all}] [interval <secs>] [count <count>] Show VTL I/O stats on Fibre Channel ports. All users may run this command option. vtl port show summary Show the following information about Fibre Channel ports.vtl port show hardware Show Fibre Channel ports hardware. 318 EMC DD OS 5.2 Command Reference Guide . vtl port option set fcp2-retry {disable | enable} [port {<port-list> | all}] Set FCP2 retry on VTL Fibre Channel ports. All users may run this command option. Use this command only if FCP2 retry connectivity problems occur. vtl port option show [{fcp2-retry | topology} [port {<port-list> | all}]] Show options on VTL Fibre Channel ports. Broadcast new VTLs and VTL changes to clients. summary Summary of readahead information on all tape files since the statistics were last reset.      Starting element address Slot count and starting address CAP count and starting address Drive count and starting address Changer count and starting address vtl 319 . When VTL reads a tape file it improves performance by reading ahead information from tape files and caching the information until needed. Argument Definitions stats Overview of information about each open tape file that has been read. Avoid using the vtl reset hba command during an active backup or restore job. vtl readahead show {stats | detailed-stats | summary} Display readahead information about each open tape file that has been read. or a single VTL. vtl show element-address [<vtl>] Show the following information for all VTLs. Changes may cause an active job to fail. detailed-stats Detailed information each open tape file that has been read. depending on the backup application and host type. show vtl show config [<vtl>] Show the library name and model and tape drive model for a single VTL or all VTLs. reset vtl reset hba Reset the hba. All users may run this command option. All users may run this command option.readahead vtl readahead reset {stats | summary} Reset VTL readahead information. A tape that is in the vault or library slot/cap. slot vtl slot add <vtl> [count <num-slots>] Add slots to a virtual tape library. The maximum is 32. Optionally. Example # vtl tape copy barcode AA0000LC count 100 source replica-dest destination daily-restores 320 EMC DD OS 5. source and destination pools cannot be the same unless copying from a snapshot. associate the tapes to the specified pool. Show detailed traffic statistics for devices belonging to the specified VTL. If the snapshot argument is specified in the command option. status vtl status Show the state of the VTL process. tapes are copied from the snapshot of the source pool. Statistics include speed of read/writes in KiB per second. vtl slot del <vtl> [count <num-to-del>] Delete one or more slots from a virtual tape library.vtl show stats <vtl> [drive {<drive-list> | changer | all}] [port {<port-list> | all}] [interval <secs>] [count <count>] Show VTL I/O stats.000 slots per library.2 Command Reference Guide . All users may run this command option. Note that an opened writable tape in a tape drive may not be copied. Add one or more slots to the end of the specified virtual tape library. with a maximum of 64. vtl tape copy barcode <barcode> [count <count>] source <src-pool> [snapshot <src-snapshot>] destination <dst-pool> Copy tapes between VTL pools. or is opened read-only in a tape drive can be copied. A tape that is opened writable in a tape drive may not be copied. In this case the destination pool can be the same as the source pool. tape vtl tape add <barcode> [capacity <capacity>] [count <count>] [pool <pool>] Add one or more virtual tapes and insert them into the vault. All users may run this command option. per VTL drive. Additionally.000 slots per system. vtl tape move <vtl> source {slot | drive | cap} <src-address-list> destination {slot | drive | cap} <dst-address-list> Move one or more tapes between elements in a VTL. and auto. Change the amount of time to maintain the retention lock on the specified tape or tapes. You may specify the auto keyword only if moving from tapes from drives to slots. See “export” to remove tapes from a VTL. 2-14. Values for <dst-address-list> include: 1. It may not be moved between VTL pools if the tape is open in a drive. If the volume is not mounted. Otherwise. the change is made immediately. the default is modification time for backwards-compatibility-mode VTL pools. 2-14. VTL finds the previous slot the tape was in and moves it to that slot. or in a library slot or CAP. vtl tape modify <barcode> [count <count>] [pool <pool>] writeprotect {on | off} Set the write protect state of a specified tape. You cannot delete tapes that are in a VTL. or retention times. vtl tape modify <barcode> [count <count>] [pool <pool>] retention-lock {<date> | <period>} Modify the state of retention lock of a specified tape or tapes. creation.vtl tape del <barcode> [count <count>] [pool <pool>] Delete the specified tape or one or more tapes. outstanding writes are synchronized first. The command fails if the filesystem is read-only. If the slot is not empty. 7-10. vtl 321 . see “Extended Retention and vtl tape show Command” for information on modification time. You cannot move the following kinds of tapes:    Tapes open in a drive Tapes on a replica Tapes configured with Retention Lock vtl tape show {all | pool <pool> | vault | <vtl>} [summary] [count <count>] [barcode <barcode>] [timedisplay {modification | creation | retention}] [sort-by {barcode | pool | location | state | capacity | usage | percentfull | compression | time | modtime} [{ascending | descending}]] Display information about tapes. 7-10. If time-display argument is omitted. 1. See vtl tape move barcode <barcode> [count <count>] source <src-pool> destination  <dst-pool> Move a tape between VTL pools if it is in the vault. data is synchronized first. If the volume is not mounted. If auto is selected. If you are using Extended Retention (formerly “Archiver”). the tape file permission is changed immediately. 3-5. it moves the next available slot. caution! This command deletes all data on tapes. Values for <src-address-list> include: all. 3-5. including modification. Otherwise. 255.00%) 0. ascending | descending auto 322 EMC DD OS 5.2 Command Reference Guide .” Initiator alias or world-wide port name (WWPN). peripheral device addressing is used.0 GiB ( 0.00%) 0..Example # vtl tape show vault time-display retention Processing tapes.. Show all information about the object specified by the command option.00%) Comp 0x 0x 0x 0x Retention Time 2011/01/01 12:00:00 2011/04/08 00:00:00 2011/04/08 00:00:00 2011/04/08 00:00:00 ---------------------------------------------------------------------------------------------------------------------------------------------A00150LC Default A00151LC Default A00152LC Default A00153LC Default Keywords and Arguments <addr> <alias or WWPN> all Abbreviation for “address..0 GiB ( 0.0 GiB ( 0.00%) 0. The device address method chosen based on the numeric LUN range being reported: 0 . Sort a report in the order specified. Barcode Pool Location vault vault vault vault State RO/RL RO/RL RO/RL RO/RL Size 5 GiB 5 GiB 5 GiB 5 GiB Used (%) 0.0 GiB ( 0. flat device addressing is used (default). 256 16383. LB. Optional argument for vtl pool upgrade-to-mtree command to check if specified pool can be upgraded to an MTree. use a wild card character in the barcode to have the count be valid. GiBs equal the base-2 value of Gigabytes (GB). The upper limit is 4. Default sizes are used if you do not specify the <capacity> argument when creating the tape cartridge. and end in a two-character tag of L1. Device type. LB = 30 GiB. An asterisk (*) matches any character in that position and all further positions. Barcodes must start with six numbers or uppercase letters (0-9. When using count and barcode together. Show information about tapes that match the specified <barcode>. LA =50 GiB capacity tape. Abbreviation for “cartridge access ports. L3. and LC =10 GiB. or LC for the supported LT0-1.<barcode> An eight-character virtual tape identifier. L2 = 200 GiB. Defaults are: L1=100 GiB capacity tape. For best results. L2. and L3 = 400 GiB. This value overrides default barcode capacities. LT0-2. caps <capacity> changer check-only component vtl 323 . when data becomes obsolete (and the Data Domain system cleaning process marks data for removal) set capacity to 100 or less for efficient reuse of Data Domain system disk space.” The number of gibibytes (GiB) for each tape created. Specified values override the two-character tag. A question mark (?) matches any character in that position. Required argument for vtl debug commands. A-Z). and LT0-3 tape types. LA.000 GiB. <count> <date> detailed-stats <dest-address> dst-address-list drive <drive number> Number of VTL drive. In the vtl tape move <vtl> source command. 324 EMC DD OS 5. Similar to a typical drive list. 2. Displays details of statistics.3 etc. or cap. Retention-lock date stamp for vtl tape modify command. The arguments “any” and “all” denote any empty element of the given type can be used. such as 1-10. If the source is drive and destination is slot.2 Command Reference Guide . New tape location. Address is indicated by keywords. One or more may be specified. then the previous slot is tried first. slot.<component-list> List of vtl debugging components. the number of elements must match the number of elements in the <src-address-list>. drive. as specified by the command option. vhba scst fc ddcl vtc vmc vtlprocess group vscsi vtlsm vtc_readahead info_cache persistent_reservations master_client master_server worker_client worker_server vdev_thread registry misc The number of objects on which to perform the action. Name of new VTL pool. A tape library model name. Port topology option. The default is zero (0). The number of drives to add. Degree of vtl debugging verbosity to enable (all | high | medium | low | none). See the Data Domain technical note for the model name that corresponds with your backup software. A device address to pass to the initiator. Port option. Destination element. The number of cartridge-access ports. Port topology option. <initiator-alias> interval <secs> kernel level loop-only loop-preferred <lun> <model> modtime <num-caps> <num-drives> vtl 325 . The maximum logical unit number (LUN) is 16383. and the maximum is 100 per library or 1000 per system. Alias for an initiator. VTL access group. The maximum number of drives across all VTLs is 64 to 540. Name of the destination group. Optional argument for vtl tape show command to display tapes sorted by modification time.<drive-list> <dst-group-name> <dst-pool> <element> fcp2-retry <group-name> List of drives in group. but need not be unique across the system. depending on the memory installed in your Data Domain system. Time interval in seconds. A LUN must be unique within a group. LUNs for VTL devices within a group must start with zero (0) and be contiguous numbers. All kernel (low-level) vtl debugging components. TapeServer is a reserved group and cannot contain initiators. <num-to-del> <option name> <period> percentfull point-to-point primary <pool name> <pool-list> <port-list> retention-lock <sec> secondary slot snapshot 326 EMC DD OS 5. Name of pool. List of pools. Keyword for vtl tape copy command.<num slots> The number of slots in the library. The argument is required if tapes are in a pool. By default. A comma-separated list of Data Domain system VTL ports. The ports must already exist. Seconds between each display refresh. note For multiple ports.000.2 Command Reference Guide . By default. Specify none if the devices should not be visible on any ports. The secondary port list supports path redundancy. Name of specific option. Default is 20 slots. separate each name with a comma and enclose the list with quotation marks (" "). Optional argument for vtl tape show command to display tapes sorted by how full each tape is. You can specify port names as a range separated by a hyphen (-). The primary VTL ports on which the devices are visible. the devices are visible on all ports. You cannot add more drives than the number of configured slots. the VTL devices are visible on all ports. Enable Retention Lock Compliance or Governance. Time interval. The secondary VTL ports on which the devices are visible to the vtl group use secondary command. VTL element. The maximum number of slots for all VTLs on a Data Domain system is 32. or if you specify all. Port topology option. The number of objects to delete. percentfull. drive. Address is indicated by keywords. Current tape location. capacity. Enable or disable write-protection for a tape. Name of library. <src-address> <src-address-list> <src-group-name> <src-pool> <src-snapshot> stats summary time-display timeout topology vsa <vtl> write-protect vtl 327 . or modtime (modification time). Name of the current VTL pool. pool. Volume set addressing (VSA). usage (number of bytes used on the tape). state. or cap. Name of source group. Option for vtl tape copy command describing a specific snapshot within a source pool. targets. location. The HP-UX operating system selects the volume set addressing method based on inquiry data and LUN information returned by the SCSI-3 REPORT LUNS command. Show a summary of all tapes and tape usage. Display statistics. and LUNs. Optional argument for vtl tape show command. This method is used primarily for addressing virtual buses. Optional argument for vtl debug enable command describing how long debugging should remain enabled for the specified components.sort-by Sort the report on the specified column: barcode. slot. Port option. compression. List of source addresses. specifically.) A pool has a name that duplicates an existing MTree name.) A pool is referenced in a directory replication context.) A pool has a name that is invalid as an MTree. or you can use the vtl reset hba command to reset the link. existing VTL directory-based pools are available as backwards compatibility mode pools. (The pool or MTree must be renamed before upgrade. (Some pools or MTrees must be merged or deleted before upgrade. For troubleshooting purposes.  The filesystem is a collection replication destination. These pools are identified in the output of the command option vtl pool show all. a user can upgrade backwards compatibility mode VTL pools to MTree-based pools using the vtl pool upgrade-to-mtree UI at an appropriate time in the customer's upgrade cycle. run the command vtl group use to switch between the primary and secondary port lists in the event of path failure. (The context must be broken before upgrade. VTL group changes may require the media server to rescan the SCSI bus. Existing directory replication contexts continue to function for backwards compatibility mode pools. After the primary system upgrade is complete.) An insufficient number of MTrees is available to convert pools.   328 EMC DD OS 5. Enter the command vtl group use primary to return the group to the primary port list after the path is repaired.)     More About vtl group Command Options  The VTL group feature allows clients to access only selected LUNs from a Data Domain system. those using directory replication (which is not available to MTreebased pools. Workarounds are included in parentheses.Additional Topics This section provides additional information on various topics and concepts. (The replication source must be upgraded. This separate step allows interoperability of Data Domain systems at different revision levels. constraints apply when upgrading VTL directory-based backwards compatibility mode pools to MTree-based pools.) Under certain conditions.2 Command Reference Guide . Upgrading VTL Directory-Based Pools to MTree-Based Pools After a system upgrade. (The pool must be renamed before upgrade. auto-offline If enabled. Values for vtl option Commands Values for commands vtl option disable. and vtl option set are: loop-id The Fibre Channel loop ID: 1 to 126. vtl option reset. A maximum of 128 groups is allowed. vtl 329 . and hyphen (-). tapes being moved from a drive are automatically taken offline and unloaded unless the “prevent” bit is set for the drive. a-z. all. Group names cannot exceed 256 characters.Requirements for Group Naming A VTL group name must be unique. tapes placed into CAPs are automatically ejected to the vault. Reserved group names that cannot be used are: TapeServer. A-Z. and summary. and can only contain the characters 0-9. underscore(_). This is expected behavior. default. vtl option enable. auto-eject If enabled. Extended Retention and vtl tape show Command Modification times used by the system for age-based policies may differ from the last modified time displayed in the tape information sections of the GUI and CLI. 2 Command Reference Guide .330 EMC DD OS 5.
Copyright © 2024 DOKUMEN.SITE Inc.