dd os 5.2 command reference guide

330
EMC Data Domain Operating System 5.2 Command Reference Guide May 2012

Upload: dragosscribd

Post on 16-Apr-2015

4.851 views

Category:

Documents


9 download

DESCRIPTION

DD OS 5.2 Command Reference Guide

TRANSCRIPT

Page 1: DD OS 5.2 Command Reference Guide

EMC Data Domain Operating System 5.2

Command Reference Guide

May 2012

Page 2: DD OS 5.2 Command Reference Guide

THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Using, copying, and distributing EMC software described in this publication requires an applicable software license. EMC2, EMC, Data Domain, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2009-2012 EMC Corporation. All rights reserved. Published in the USA.

Reference: 762-0013-0006_Rev_A

Page 3: DD OS 5.2 Command Reference Guide

Contents

About This Guide 19

Related Documents 19

The EMC Data Domain Support Portal 20

Knowledge Base and Reference Library 20

Service and Support 20

adminaccess 21

Change History 21

Guidelines and Restrictions 22

Options 22

add 22

authentication 23

certificate 24

del 26

disable 26

enable 27

reset 27

show 27

ssh 28

telnet 29

trust 30

web 30

Additional Topics 31

Supported Certificate Formats 31

Importing and Deleting Certificates 31

Returning Command Output to a Remote Machine 32

alerts 33

Change History 33

Guidelines and Restrictions 33

Options 33

clear 34

notify-list 34

show 36

Keywords and Arguments 39

3

Page 4: DD OS 5.2 Command Reference Guide

Additional Topics 40

Output From alerts show Command Option 40

Default Notification Group 41

Alert Notice at Log In 42

alias 43

Change History 43

Guidelines and Restrictions 43

Options 43

add 43

del 44

reset 44

show 44

Additional Topics 44

Correspondence Table 44

archive 47

Change History 47

Guidelines and Restrictions 48

Options 48

data-movement policy 48

data-movement schedule 49

data-movement start 50

data-movement status 50

data-movement stop 50

data-movement watch 50

disable 50

enable 51

option 51

report 51

show 51

authentication 53

Change History 53

Guidelines and Restrictions 53

Options 54

disable 54

domain 54

enable 54

4 EMC DD OS 5.2 Command Reference Guide

Page 5: DD OS 5.2 Command Reference Guide

groups 54

reset 55

servers 55

show 56

status 56

authorization 57

Change History 57

Guidelines and Restrictions 57

Options 58

show 58

Additional Topics 59

Creating the First Security Officer Account 59

Authorization Workflow 59

Enabling Security Officer Authorization 59

autosupport 61

Change History 61

Guidelines and Restrictions 61

Options 61

add 62

del 62

disable 62

enable 62

reset 62

send 63

set 63

show 64

test 65

Keywords and Arguments 65

Additional Topics 66

Using autosupport in a GDA 66

Navigating Message Logs 66

cifs 67

Change History 67

Guidelines and Restrictions 68

5

Page 6: DD OS 5.2 Command Reference Guide

Options 68

add 68

del 68

disable 69

enable 69

hosts 69

nb-lookup 69

option 69

reset 70

set 70

share 71

show 72

status 73

troubleshooting 74

Additional Topics 74

Tips on Entering or Removing Client Lists 74

cluster 75

Change History 75

Guidelines and Restrictions 75

Options 76

add 76

create 76

destroy 76

run 76

show 77

status 77

config 79

Change History 79

Guidelines and Restrictions 79

Options 79

reset 79

set 80

setup 81

show 82

6 EMC DD OS 5.2 Command Reference Guide

Page 7: DD OS 5.2 Command Reference Guide

ddboost 85

Guidelines and Restrictions 86

Change History 86

Options 87

access 87

destroy 87

disable 88

enable 88

file-replication 88

ifgroup 89

option 91

reset 91

set 92

show 92

status 95

storage-unit 95

Additional Topics 96

Setting Low-Bandwidth Optimization 96

Output from file-replication show 97

disk 99

Change History 99

Guidelines and Restrictions 99

Options 99

beacon 100

multipath 100

port 101

rescan 101

reset 101

set 102

show 102

status 106

unfail 107

Additional Topics 108

Disk States 108

More About Disks and Enclosures 109

Invalid Commands 109

When a Disk in a Tier Fails 110

7

Page 8: DD OS 5.2 Command Reference Guide

Explicitly Failing a Disk 110

Unfailing a Disk 110

enclosure 111

Change History 111

Guidelines and Restrictions 111

Options 112

beacon 112

show 112

test 117

filesys 119

Change History 120

Guidelines and Restrictions 120

Options 121

archive 121

clean 121

create 124

destroy 124

disable 125

enable 125

encryption 125

expand 130

fastcopy 130

option 131

restart 133

show 133

status 138

sync 139

Additional Topics 139

More About Filesystem Cleaning 139

How Data Values Are Calculated 139

Error Messages 140

Enabling Security Officer Authorization 140

help 141

Change History 141

Guidelines and Restrictions 141

8 EMC DD OS 5.2 Command Reference Guide

Page 9: DD OS 5.2 Command Reference Guide

ipmi 143

Change History 143

Guidelines and Restrictions 144

Options 144

config 144

disable 144

enable 145

remote console 145

remote power 145

reset 145

show 145

user 146

Additional Topics 147

Supported Models-IPMI 147

Supported Models-SOL 147

Viewing Serial Output of a Remote System 148

Disconnecting from an SOL Session 148

Disconnecting from the Initiator 148

Setting Up IPMI 148

Number of Supported IPMI Users 150

license 151

Change History 151

Guidelines and Restrictions 151

Options 151

add 151

delete 152

reset 152

show 152

Additional Topics 153

Required Licenses 153

log 155

Change History 155

Guidelines and Restrictions 156

Options 156

host 156

list 157

9

Page 10: DD OS 5.2 Command Reference Guide

view 159

watch 159

Additional Topics 159

Understanding a Log Message 159

Archiving Log Files 160

migration 161

Change History 161

Guidelines and Restrictions 161

Options 162

abort 162

commit 162

receive 163

send 163

show stats 165

status 165

watch 166

Additional Topics 166

Migration With Encryption-Enabled Source 166

Migrating Between Source and Destination 167

Migration During Directory Replication 167

mtree 169

Change History 170

Guidelines and Restrictions 170

Options 171

create 171

delete 172

list 172

rename 174

retention-lock 175

show compression 177

undelete 179

Additional Topics 179

Supported Characters 179

ndmpd 181

Change History 181

Guidelines and Restrictions 181

10 EMC DD OS 5.2 Command Reference Guide

Page 11: DD OS 5.2 Command Reference Guide

Options 181

disable 182

enable 182

option 182

show 182

status 184

stop 184

user 184

net 187

Change History 188

Guidelines and Restrictions 189

Options 189

aggregate 189

config 192

congestion-check 193

create 197

ddns 197

destroy 198

disable 198

enable 199

failover 199

hosts 200

iperf 201

lookup 202

option 202

ping 202

reset 202

set 203

show 204

tcdump 209

troubleshooting 210

Additional Topics 210

New Support for IPv6 210

More About Ethernet Failover 210

Number of Ports 211

Number of Physical Interfaces 212

More About the net aggregate Option 212

11

Page 12: DD OS 5.2 Command Reference Guide

More About LACP 212

More About Up/Down Arguments 212

Linux/DD OS Equivalent Arguments for iperf Option 213

Linux/DD OS Equivalent Arguments for tcdump Option 214

Sample Failover Workflow 214

Sample Aggregation Workflow 215

Interface Naming Format 216

217

nfs 219

Change History 219

Guidelines and Restrictions 219

Options 219

add 220

del 221

disable 221

enable 221

reset 221

show 221

status 223

Additional Topics 224

Add or Delete NFS Clients 224

ntp 225

Change History 225

Guidelines and Restrictions 225

Options 226

add 226

del 226

disable 226

enable 226

reset 227

show 227

status 227

quota 229

Change History 229

Guidelines and Restrictions 230

12 EMC DD OS 5.2 Command Reference Guide

Page 13: DD OS 5.2 Command Reference Guide

Options 230

disable 230

enable 230

reset 230

set 231

show 232

status 233

replication 235

Change History 235

Guidelines and Restrictions 236

Options 236

abort 236

add 237

break 237

disable 237

enable 237

initialize 237

modify 238

option 239

reauth 240

recover 240

resync 240

show 240

status 244

sync 244

throttle 244

watch 246

Additional Topics 246

Collection Replication 246

Collection Replication Key Management 247

Directory Replication 247

MTree Replication 247

Pool Replication 247

route 249

Change History 249

Guidelines and Restrictions 250

13

Page 14: DD OS 5.2 Command Reference Guide

Options 250

add 250

del 250

reset 250

set 250

show 251

trace 252

Additional Topics 252

Support for IPv6 252

Add a Route 252

Delete a Route 252

Set a Default Gateway 252

snapshot 253

Change History 253

Guidelines and Restrictions 253

Options 254

create 254

expire 255

list 255

rename 256

schedule 256

Additional Topics 258

Naming Snapshots Created by a Schedule 258

Supported Characters 258

snmp 261

Change History 261

Guidelines and Restrictions 262

Options 262

add 262

del 263

disable 264

enable 264

reset 264

set 265

show 265

status 267

user 267

14 EMC DD OS 5.2 Command Reference Guide

Page 15: DD OS 5.2 Command Reference Guide

Additional Topics 268

More about SNMP on a Data Domain System 268

Changing Multiple Settings 269

SNMP sysLocation and sysContact Variables 269

storage 271

Change History 271

Guidelines and Restrictions 271

Options 272

add 272

remove 272

show 272

Additional Topics 274

Adding Storage to an Active Tier 274

Viewing Disk and LUN States 274

support 277

Change History 277

Guidelines and Restrictions 277

Options 277

upload 277

system 279

Change History 279

Guidelines and Restrictions 280

Options 280

headswap 280

option 280

passphrase 281

poweroff 281

reboot 281

retention-lock 282

sanitize 282

set 282

show 283

status 294

upgrade 296

15

Page 16: DD OS 5.2 Command Reference Guide

Additional Topics 296

Output Changes for Multi-Thread Mode 296

Configuring a System for Retention Lock Compliance 297

Configuring an MTree for Retention Lock Compliance 297

Setting a Log In Banner 297

Ensuring System Sanitization 298

Checking System Temperature and Power Supply 298

user 299

Change History 299

Guidelines and Restrictions 300

Options 300

add 300

change 301

del 301

disable 301

enable 301

password 301

reset 303

show 303

Additional Topics 304

The Role of the Security Officer 304

RBAC and User Role Definitions 305

Adding a Security Officer 306

Adding a User 306

Removing a User 306

Changing a User Password 306

Changing a Role 306

vtl 307

Change History 308

Guidelines and Restrictions 309

Options 309

add 309

cap 309

debug 309

del 310

disable 310

drive 310

16 EMC DD OS 5.2 Command Reference Guide

Page 17: DD OS 5.2 Command Reference Guide

enable 311

export 311

group 312

import 313

initiator 313

option 314

pool 315

port 317

port option 318

readahead 319

reset 319

show 319

slot 320

status 320

tape 320

Keywords and Arguments 322

Additional Topics 328

Upgrading VTL Directory-Based Pools to MTree-Based Pools 328

More About vtl group Command Options 328

Requirements for Group Naming 329

Values for vtl option Commands 329

Extended Retention and vtl tape show Command 329

17

Page 18: DD OS 5.2 Command Reference Guide

18 EMC DD OS 5.2 Command Reference Guide

Page 19: DD OS 5.2 Command Reference Guide

About This Guide

This guide describes the EMC Data Domain operating system (DD OS) commands.

Related DocumentsProduct documentation is available from the EMC Data Domain Support portal at https://my.datadomain.com/US/en/documentation.jsp.

For information on: See the document:

New and obsolete commands, modified command options and output, latest features, enhancements, known issues, and workarounds.

Release Notes

Setting up a Data Domain system for the first time.

Initial Configuration Guide

Administering Data Domain systems using the Web-based GUI, “Enterprise Manager.”

Administration Guide

Installing and administering controllers in a dual-node configuration.

Global Deduplication Array Administration Guide

Administering two-tiered storage on a Data Domain system.

Extended Retention Administration Guide (formerly EMC Data Domain860 Archiver Administration Guide)

About This Guide 19

Page 20: DD OS 5.2 Command Reference Guide

The EMC Data Domain Support PortalThe following information provides an overview of technical resources and references available to our customers.

Knowledge Base and Reference Library

In addition to product documentation, the Support portal offers a wide variety of frequently updated publications, including:

Technical advisories on late-breaking issues

Upgrade procedures

Offline diagnostic procedures

Troubleshooting articles

Integration guides for third-party applications

Part installation guides

Compatibility matrixes

White papers

For details on a specific topic or issue, enter a search term into the Knowledge Base Search field or select a category such as “How To’s.” To browse the latest updates, click the Knowledge Articles tab.

Service and Support

For troubleshooting assistance with installing or administering your Data Domain system, go to https://my.datadomain.com/US/en/login.jsp or call 877.207.3282. Be prepared to describe your system setup and configuration, and the situation in which the problem occurred.

20 EMC DD OS 5.2 Command Reference Guide

Page 21: DD OS 5.2 Command Reference Guide

adminaccess

The adminaccess command manages the access control list configuration. Command options enable remote hosts to use the FTP, Telnet, HTTP, HTTPS, and SSH administrative protocols on the Data Domain system. SSH is open to the default user sysadmin and to users added by the administrator.

Beginning in 5.2, options were added to this command to enhance the secure communication among two or more Data Domain systems, and between a Data Domain system and a Web browser; for example, systems running Enterprise Manager (EM).

Options include:

add

authentication

certificate

del

disable

enable

reset

show

ssh

telnet

trust

web

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 New command options:

adminaccess certificate delete {imported-host | imported-ca | subject <subject-name> | fingerprint <fingerprint>}

adminaccess certificate import {host password <password> | ca}

adminaccess 21

Page 22: DD OS 5.2 Command Reference Guide

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

FTP and Telnet are disabled by default.

OptionsThe following options are available with this command.

add

adminaccess add {ftp | telnet | ssh | http | https} <host-list>

Add hosts to a protocol. To add multiple hosts, enter a list of entries separated by commas, spaces, or both. For FTP, Telnet, and SSH, a host is a fully qualified domain hostname, class-C IP address, IP address with either netmasks or length, or an asterisk (*) wildcard with a domain name, such as *.yourcompany.com. An asterisk (*) by itself means no restrictions.

For HTTP and HTTPS, the host-list can contain hostnames, class-C IP addresses, an IP address range, or the word “all.”

For SSH, TCP wrappers are used and the /etc/hosts.allow and /etc/hosts.deny files are updated.

For HTTP/HTTPS, Apache’s mod_access is used for host-based access control and the /usr/local/apache2/conf/httpd-ddr.conf file is updated.

Example 1

To add the host srvr24 to the Telnet access list:

# adminaccess add telnet srvr24.yourcompany.com

Modified command options:

adminaccess certificate show [detailed] [host | imported-host | ca | imported-ca]

adminaccess authentication show

adminaccess reset ssh-keys [user <username>]

adminaccess show

22 EMC DD OS 5.2 Command Reference Guide

Page 23: DD OS 5.2 Command Reference Guide

Example 2

To add all hosts in a domain to the Telnet access list:

# adminaccess add telnet *.yourcompany.com

Example 3

To add a range of IP addresses to the Telnet access list:

# adminaccess add telnet 10.24.20.0/24

adminaccess add ssh-keys [user <username>]

Add an SSH public key, created on a UNIX-based remote machine, to the SSH authorized keys file on the Data Domain system. The operation allows users to log in without a password.

Example

1. On the remote machine, create the public and private SSH keys:

# jsmith > ssh-keygen -dGenerating public/private dsa key pair.

Enter file in which to save the key (/home/jsmith/.ssh/id_dsa):

.

2. Press Enter to accept the file location and other defaults. The public key created under /home/jsmith/.ssh (in this example) is id_dsa.pub.

Enter file in which to save the key (/home/jsmith/.ssh/id_dsa):.

3. On the remote machine, write the public key to the Data Domain system, dd10 in this example. The Data Domain system prompts the user for the password before accepting the key:

# jsmith > ssh -l sysadmin dd10 "adminaccess add ssh-keys user jsmith" \< ~/.ssh/id_dsa.pub

authentication

adminaccess authentication add {cifs}

Allow Windows domain users with no local account on the Data Domain system to access the system through SSH, Telnet, and FTP using Windows domain group credentials. For administrative access, the user must be in the standard Windows Domain Admins group or in a group that you create named Data Domain. Users from

both group names are always accepted as administrative users. The command also gives user-level access (no administrative operations allowed) to all other users from the domain. Users must be from the domain that includes the Data Domain system or a related, trusted domain.

adminaccess 23

Page 24: DD OS 5.2 Command Reference Guide

The SSH, Telnet, or FTP command that accesses the Data Domain system must include the domain name, a backslash, and the user name in double quotation marks.

note CIFS must be enabled and the Data Domain system must be part of a Windows domain.

adminaccess authentication del {cifs}

Prevent authentication of a Windows domain. Allow admin role only for users with local user accounts on the Data Domain system.

adminaccess authentication reset {cifs}

Reset the Windows user access to the default of requiring a local account for administrative access to the Data Domain system.

adminaccess authentication show

Display settings that enable a Windows administrative user to access a Data Domain system when no local account exists. With the exception of users with data-access permissions only, all users may run this command option.

Example

# adminaccess authentication show

CIFS authentication: disabled

certificate

adminaccess certificate delete {imported-host | imported-ca | subject <subject-name> | fingerprint <fingerprint>}

Delete a user imported host or trusted CA certificate. Because one imported host or trusted CA certificate is maintained, specifying the certificate name is not required. You may also delete the certificates based on subject name or fingerprint. The system prompts you to confirm the deletion prior to removing the certificate.

note Log out from the browser session before deleting a host certificate. Otherwise HTTPS browser sessions (using imported host certificates) will be brought down. After deleting the host certificate, refresh or restart the browser to proceed.

adminaccess certificate import {host password <password> | ca}

Import host or trusted CA certificate via SSH on a remote system. The host certificate must be in PKCS12 format. The CA certificate must be in PEM format. Only one CA certificate or one host certificate may be imported. Importing an RKM auto-registered certificate directly, or bulk importing multiple certificates is not supported.

You must include the <password> to decrypt PKCS12 file to import host certificates. Because of a limitation of SSH, this password is viewable on the terminal. For security

24 EMC DD OS 5.2 Command Reference Guide

Page 25: DD OS 5.2 Command Reference Guide

purposes, make sure the necessary precautions are in place when entering the command. The system passphrase of Data Domain system must be set prior to importing the host certificate.

note If the certificates are used by Enterprise Manager (server extension), running this command will bring down the current browser session. Log out of the session prior to running this command.

Example 1 (Host Certificate)

If the host certificate is located on remote system client1 under /home/usr/host.p12, and the password to decrypt host.p12 is xyz, then the SSH command issued by sysadmin from client1 to import the host certificate to the Data Domain system ddr1 would be:

# ssh sysadmin@ddr1 adminaccess certificate import host password xyz < /home/usr/host.p12

This command option is followed by a prompt to enter the sysadmin password.

Example 2 (CA Certificate)

To import the CA certificate located at /home/usr/cacert.pem location, the SSH command issued by sysadmin would be:

# ssh sysadmin@host2 adminaccess certificate import ca < /home/usr/cacert.pem

Example 3 (CA Certificate)

To import the CA certificate through ddsh, copy and paste the PEM-formatted CA certificate on the ddsh:

# adminaccess certificate import ca

Enter the certificate and press Control-D. Press Control-C to cancel.

adminaccess certificate show [detailed] [host | imported-host | ca | imported-ca]

Display the Data Domain system host, imported host, CA certificate or imported trusted CA certificate. All users may run this command option.

Example 1

# adminaccess certificate show host

Subject Type Valid From Valid Until Fingerprint

---------------------------------------------------------------------------------------------------------------------------------------

sys1.datadomain.com host Sun Nov 21 08:04:13 2010 Wed Nov 13 16:04:13 2041 D2:C6:A0:8E:60:57:98: (truncated)

---------------------------------------------------------------------------------------------------------------------------------------

adminaccess 25

Page 26: DD OS 5.2 Command Reference Guide

Example 2

# adminaccess certificate show detailed host

Type: host

Cert Type: Host Certificate

Subject/Issued To: sys2.datadomain.com

Issued By: sys2.datadomain.com

Valid From: Sun Nov 21 08:04:13 2010

Valid Until: Wed Nov 13 16:04:13 2041

Fingerprint: D2:C6:A0:8E:60:57:98:1B:FA:4C:83:46:14:04:02:41:2F:78:AA:2A

del

adminaccess del ftp <host-list>

Remove hosts (IP addresses, hostnames, or asterisk (*)) from the FTP list. Host entries may be separated by commas, spaces, or both.

adminaccess del http <host-list>

Remove hosts (IP addresses, hostnames, or asterisk (*)) from the HTTP/HTTPS list. Host entries may be separated by commas, spaces, or both.

adminaccess del ssh <host-list>

Remove hosts (IP addresses, hostnames, or asterisk (*)) from the SSH list. Host entries may be separated by commas, spaces, or both.

adminaccess del ssh-keys <lineno> [user <username>]

Delete an SSH key from the key file. Users may delete their own keys, and users in admin role may delete user keys. Run the command option adminaccess show ssh-keys to view line number values.

adminaccess del telnet <host-list>

Remove hosts (IP addresses, hostnames, or asterisk (*)) from Telnet list. Host entries may be separated by commas, spaces, or both.

disable

adminaccess disable {http | https | ftp | telnet | ssh | all}

Disable administrative access on the Data Domain system. Disabling FTP or Telnet does not affect entries in the access lists. If all is access disabled, the Data Domain system is available only through a serial console or keyboard and monitor.

26 EMC DD OS 5.2 Command Reference Guide

Page 27: DD OS 5.2 Command Reference Guide

enable

adminaccess enable {http | https | ftp | telnet | ssh | all}

Enable a protocol on the Data Domain system. By default, the SSH, HTTP, and HTTPS services are enabled and FTP and Telnet are disabled. HTTP and HTTPS allow users to log in from Enterprise Manager. To use FTP and Telnet, users with admin role permissions must add host machines to the access lists.

reset

adminaccess reset {ftp | telnet | ssh | http | all}

Reset the FTP, HTTP, SSH, and Telnet protocols to their default states and clear the access lists of host entries.

adminaccess reset ssh-keys [user <username>]

Remove the authorized SSH keys file for a user specified user or for the operator account from the Data Domain system. After removing the file, every SSH connection requires password authentication.

Users may reset their own keys only.

Users with admin role permissions may reset the keys of any user.

Users with security role or data access permissions may not reset keys.

show

adminaccess show

List the access services available on a Data Domain system and display option values for the access services that are enabled. With the exception of users with data-access permissions only, all users may run this command option.

N/A means that the service does not use an access list.

A dash (-) means that the service can use an access list, but the access list does not contain host names.

An asterisk (*) means that the service allows all hosts.

Example

# adminaccess show

Service Enabled Allowed Hosts

------- ------- --------------------

ssh yes -

telnet yes *

ftp no -

adminaccess 27

Page 28: DD OS 5.2 Command Reference Guide

http yes -

https yes -

------- ------- --------------------

Web options:

Option Value

--------------- -----

http-port 80

https-port 443

session-timeout 20

--------------- -----

Ssh options:

Option Value

--------------- ---------------

session-timeout none (infinite)

--------------- ---------------

Telnet options:

Option Value

--------------- ---------------

session-timeout none (infinite)

--------------- ---------------

adminaccess show ssh-keys [user <username>]

Display the SSH key file with a line number for each entry. Users with admin role permissions can view the SSH key files of any user. Users in other roles can view their own SSH key file only.

ssh

adminaccess ssh option reset [server-port | session-timeout]

Reset the SSH options to default values. This command may be run in a GDA. See the Global Deduplication Array Administration Guide for details.

adminaccess ssh option set server-port <port-number>

Set the SSH server port.

adminaccess ssh option set session-timeout <timeout-in-secs>

Set the SSH timeout options. This command may be run in a GDA. See the Global Deduplication Array Administration Guide for details.

28 EMC DD OS 5.2 Command Reference Guide

Page 29: DD OS 5.2 Command Reference Guide

Example

Set the SSH session timeout period to 10 minutes:

# adminaccess ssh option set session-timeout 600

adminaccess ssh option show

Display the SSH options. This command may be run in a GDA. See the Global Deduplication Array Administration Guide for details.

In the following example, the SSH client session timeout is set to the default value “none.”

Example

# adminaccess ssh option show

Ssh options:

Option Value

-------------------- --------------------

session-timeout none (infinite)

---------------------- --------------------

telnet

adminaccess telnet option reset [session-timeout]

Reset the client session timeout period to the default value none to prevent client sessions from timing out.

Example

To reset the Telnet options to the default values:

# adminaccess telnet option reset session-timeout

adminaccess telnet option set session-timeout <timeout-in-secs>

Set the client session timeout period to the specified number of seconds. If no data is received from a Telnet client within the timeout period, and if the client does not respond to a subsequent prompt message, the session terminates. The valid range is from 60 to 31536000.

To configure the Data Domain system to prevent sessions from timing out, use the adminaccess telnet option reset command option.

Example

To set the SSH session timeout period to 10 minutes:

# adminaccess telnet option set session-timeout 600

adminaccess 29

Page 30: DD OS 5.2 Command Reference Guide

adminaccess telnet option show

Display the Telnet options.

Example

To set the Telnet client session timeout to the default value:

# adminaccess telnet option show

Option Value

--------------- -------------------

session-timeout none (infinite)

----------------- --------------------

trust

adminaccess trust add host <hostname> [type mutual]

Show the list of trusted Certificate Authorities (CAs). The Type field shows the type of certificate. All users may run this command option.

Example

# adminaccess trust show

Subject Type Valid From Valid Until Fingerprint

---------------------------------------------------------------------------------------------------------------------------------------

sys3.datadomain.com trusted-ca Sun Nov 21 16:04:13 2010 Wed Nov 13 16:04:13 2041 4F:63:15:45:E7: F3: (truncated)

jon-ddm.sqa.local trusted-ca Mon Nov 22 11:09:54 2010 Thu Nov 14 11:09:54 2041 2C:26:7C:OC:D2: 53: (truncated)

---------------------------------------------------------------------------------------------------------------------------------------

adminaccess trust copy {source | destination} <hostname>}

Copy the trust to or from the given host.

adminaccess trust del host <hostname> [type mutual]

Remove trust or, optionally, mutual trust from the specified host.

adminaccess trust show <hostname>

Show the list of trusted Certificate Authorities (CAs). All users may run this command option.

web

adminaccess web option reset [http-port | https-port | session timeout]

Reset the Web options to default values.

30 EMC DD OS 5.2 Command Reference Guide

Page 31: DD OS 5.2 Command Reference Guide

adminaccess web option set http-port <port-number>

Set the http access port for the Web client. Default is port 80.

adminaccess web option set https-port <port-number>

Set the https access port for the Web client. Default is port 443.

adminaccess web option set session-timeout <timeout-in-secs>

Set the Web client session timeout. Default is 10800 seconds.

Example

To set Web options to default values:

# adminaccess web option set

Option Value

---------------- --------

http-port 80

https-port 443

session-timeout 10800

adminaccess web option show

Show the current values for the Web options.

Additional TopicsThis section provides additional information on various topics and concepts.

Supported Certificate Formats

This version of DD OS supports host certificate PKCS12. Users must provide the PKCS12 file and password to decrypt the PKCS12 file.

This version of DD OS also supports CA certificate PEM. User must provide the CA certificate PEM file used to sign the host certificate.

Importing and Deleting Certificates

Importing host certificates on a Data Domain system is not allowed if the filesystem is locked.

When importing or deleting certificates on a Data Domain system on which the filesystem is unlocked and encryption is enabled or disabled, the following actions occur:

If Data Domain system passphrase is set, the imported host PKCS12 certificate is reencrypted using the system passphrase.

adminaccess 31

Page 32: DD OS 5.2 Command Reference Guide

If the system passphrase is not set, an error is generated when importing the host certificate and a message displays on the console “Set System passphrase to proceed.” See “system” for instructions on setting the system passphrase.

Returning Command Output to a Remote Machine

With admin role permissions and using SSH, you can have output from Data Domain system commands return to a remote machine at login, and then log out automatically. For example, the following command connects with the machine dd10 as user admin, prompts for the password, and then returns output from the command option filesys status.

# ssh -l admin dd10 filesys statusadmin@dd10’s password:

The filesystem is enabled

Additionally, you can create a file containing multiple Data Domain system commands, one command per line, and use the file as input to the login. Output from each command is returned.

Example

1. Create a file named cmds11 and include the commands filesys status, system show uptime, and NFS status.

2. Run the command as shown and read the output.

# ssh -l admin dd10 < cmds11admin@dd10’s password:

The filesystem is enabled

3:00 pm up 14 days 10 hours 15 minutes 1 user, load average: 0.00, 0.00, 0.00

Filesystem has been up 14 days 10:13

The NFS system is currently active and running

Total number of NFS requests handled = 314576

32 EMC DD OS 5.2 Command Reference Guide

Page 33: DD OS 5.2 Command Reference Guide

alerts

The alerts command manages current alerts, alert notification groups, and alerts history. Command options enable sending email to a designated recipient or notification group when an event occurs within the Data Domain system. Depending on the option, information includes alert type, date posted, and resulting action. More than three months of alert history is retained.

Some event types, such as those in the environment class that pertain to temperature sensors within the chassis, are detected repeatedly if the underlying condition is not corrected.

Options include:

clear

notify-list

show

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and RestrictionsUnless otherwise noted, command options are available only to users with admin role permissions.

OptionsThe following options are available with this command.

Version Change

5.2 Modified command options:

alerts notify-list del <group-name> [class <class-list>] [emails <email-addr-list>]

alerts notify-list destroy <group-name>

alerts notify-list reset

alerts 33

Page 34: DD OS 5.2 Command Reference Guide

clear

alerts clear alert-id <alert-id-list>

Clear an active alert or list of alerts.

notify-list

alerts notify-list add <group-name> [class <class-list> [severity <severity>]][emails <email-addr-list>]

Modify a notification group by adding an event class, severity level, or recipient email address.

Example

# alerts add notify-list eng_lab emails [email protected], [email protected]

Notification list "eng_lab"

Class Severity

------ --------

syslog warning

------ --------

Members

--------------------

[email protected]

[email protected]

--------------------

alerts notify-list create <group-name> class <class-list> [severity <severity>]

Create an alert notification group.

Example

# alerts notify-list create eng_grp class hardwareFailure

Notification list "eng_grp"

Class Severity

--------------- --------

hardwarefailure warning

--------------- --------

Members

-------

-------

34 EMC DD OS 5.2 Command Reference Guide

Page 35: DD OS 5.2 Command Reference Guide

alerts notify-list del <group-name> [class <class-list>] [emails <email-addr-list>]

Modify an alert notification group by deleting event classes, email recipients, or both.

Security officer authorization is required only if the <group-name> has a severity level of Warning or above and the command is run on a Retention Lock Compliance system. See the EMC Data Domain Administration Guide for details on alerts.

Example

# alerts notify-list del eng_grp class hardwareFailure

Notification list "eng_grp"

Class Severity

----- --------

----- --------

Members

-------

-------

alerts notify-list destroy <group-name>

Delete an alert notification group. Note that the default alert notification group cannot be destroyed. See “Default Notification Group” for details.

Security officer authorization is required only if the <group-name> has a severity level of Warning or above and the command is run on a Retention Lock Compliance system. See the EMC Data Domain Administration Guide for details on alerts.

Example

# alerts notify-list destroy eng_grp

The 'alerts notify-list destroy' command will destroy this user-configured notification list.

Are you sure? (yes|no|?) [no]: y

ok, proceeding.

Notification list "eng_grp" destroyed.

alerts notify-list reset

Remove all user-created alert notification groups and restore the default notification group email list to [email protected].

Security officer authorization is required for systems with Retention Lock Compliance.

alerts 35

Page 36: DD OS 5.2 Command Reference Guide

Example

# alerts notify-list reset

The 'alerts notify-list reset' command will destroy all user-configured notification lists.

Are you sure? (yes|no|?) [no]: y

ok, proceeding.

Notification lists reset to factory default.

alerts notify-list show [group <group-name> | email <email-addr>]

Display all alert notification groups, a specific alert notification group, or alert notification groups that subscribe to a single email address.

Example

# alerts notify-list show eng_lab [email protected]

alerts notify-list test {group <group-name> | email <email-addr>}

Send a test notification to an alert notification group or email address.

Example

# alerts notify-list test [email protected]

OK: Message sent.

show

alerts show all [local]

Display details on all alert notification groups.

Example

# alerts show all

Notification Lists

------------------

Notification list "default"

Class Severity

----------------- ----------

cifs warning

storage warning

cluster warning

network warning

security warning

filesystem warning

environment warning

36 EMC DD OS 5.2 Command Reference Guide

Page 37: DD OS 5.2 Command Reference Guide

replication warning

hardwarefailure warning

systemmaintenance warning

syslog warning

----------------- ----------

Members

-----------------

auto

backup

bin

boot

data

ddr

Current Alerts

--------------

No active alerts.

Alert History

-------------

Alert Id Time Severity Class Object Status Message

-------- -------------------------------- ---------- ----- - ------ -------- -----------------------

NULL Tue Feb 8 16:08:21 2011 NULL NULL NULL post System rebooted

NULL Tue Feb 8 17:42:27 2011 NULL NULL NULL post System rebooted

1 Tue Feb 8 18:03:57 2011 INFO Filesystem post System rebooted

1 Tue Feb 8 18:03:57 2011 INFO Filesystem clear System rebooted

2 Wed Feb 9 11:44:53 2011 INFO Filesystem post System rebooted

2 Wed Feb 9 11:44:53 2011 INFO Filesystem clear System rebooted

-------- -------------------------------- ---------- ------ ------ -------- -----------------------

There are 6 historic alerts.

alerts show current [local]

Display information about current alerts.

Example

# alerts show current

No active alerts.

alerts show current-detailed [local] [alert-id <alert-id-list>]

Display details on all current alerts or on a specific current alert. Output includes event information and an Additional Information field.

alerts 37

Page 38: DD OS 5.2 Command Reference Guide

alerts show daily [local]

Display daily alert report, including current alerts and 24-hour alert history.

alerts show history [local] [last <n> {hours | days | weeks | months}] [start <MMDDhhmm> [[<CC>]<YY>] end <MMDDhhmm> [[<CC>]<YY>]]

Display alert history.

Example

# alerts show history last 100 days

Alert Id Time Severity Class Object Status Message

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1 Fri Dec 24 08:59:52 2010 ALERT SystemMaintenance post Historical database recovery failed.

1 Fri Dec 24 08:59:52 2010 ALERT SystemMaintenance clear Historical database recovery failed.

2 Fri Dec 24 09:02:10 2010 INFO Filesystem post System rebooted.

2 Fri Dec 24 09:02:10 2010 INFO Filesystem clear System rebooted.

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------

alerts show history-detailed [local] [last <n> {hours | days | weeks | months}] [start <MMDDhhmm> [[<CC>]<YY>] end <MMDDhhmm> [[<CC>]<YY>]]

Display details of alert history including event information.

Example

# alerts show history-detailed last 100 days

Alert Id 1

Time Fri Dec 24 08:59:52 2010

Severity ALERT

Class SystemMaintenance

Status post

Message Historical database recovery failed.

Event Id EVT-HD-RDB-0001

Event Name HistoricalDatabaseRecoverError

Description Historical database recovery failed. All existing historical data has been lost. Data in the

historical database is used for some system reports, but it is not required for proper system functioning.

This failure may occur during head swap processing if recovery to create the new head primary historical

database from the shelf database files fails. The system successfully created a new historical database.

Action Contact your contracted support provider or visit us online at https://my.datadomain.com to debug

this problem and possibly attempt recovery of the lost historical data.

38 EMC DD OS 5.2 Command Reference Guide

Page 39: DD OS 5.2 Command Reference Guide

Keywords and Arguments

alert-id Identification number of alert.

<alert-id-list> List of alert identification numbers.

class <class-list> (Optional) List of event classes: cifs, storage, cluster, network, security, filesystem, environment, replication, hardwareFailure, systemMaintenance, and syslog.

severity <severity> (Optional) Severity level of event class: emergency, alert, critical, error, warning, notice, info, and debug. Default is “warning.”

emails <email-addr-list> (Optional) Email addresses of members in an alert notification group.

<group-name> Name of alert notification group.

last <n> {hours | days | weeks | months} Use with show option to display alerts for most recent number of <n> (hours, days, weeks, months).

start <MMDDhhmm> Use with show option to display alerts for specific interval.

MMDD indicates month and day of start date.

hhmm indicates hours and minutes of start time(24-hour format). To specify midnight between Sunday night and Monday morning, use mon 0000. To specify noon on Monday , use mon 1200.

alerts 39

Page 40: DD OS 5.2 Command Reference Guide

Additional TopicsThis section provides additional information on various topics and concepts.

Output From alerts show Command Option

Depending on arguments used with the alerts show command, output may include notification lists, the email address of members, alert history, and, if applicable, the number of current, active alerts. Output for a GDA may differ from single-node examples.

end <MMDDhhmm> Use with show option to display alerts for specific interval.

MMDD indicates month and day of end date.

hhmm indicates hours and minutes of end time (24-hour format). To specify midnight between Sunday night and Monday morning, use mon 0000. To specify noon on Monday , use mon 1200.

<CC> (Optional) Use with start or stop arguments to show option. Specify first two digits of year. Default is 20.

<YY> (Optional) Use with start or stop arguments to show option. Specify last two digits of year.

40 EMC DD OS 5.2 Command Reference Guide

Page 41: DD OS 5.2 Command Reference Guide

Output also includes the following categories:

Default Notification Group

The default alert notification group (“default”) is configured to send alerts for any event class with severity level of Warning or above. Email notifications are sent to Data Domain Support at autosupport [email protected].

The default alert notification group can only be reset to default values: it cannot be destroyed.

Alert ID Identification number of alert.

Time Date and time the alert was posted.

Severity Severity level of the event that triggered the alert.

Class Event class of the event that triggered the alert.

Object If applicable, basic information about the affected system component or element.

Status Alert status.

Message Brief description of the underlying event.

Additional Information (Detailed displays only.) If applicable, information about the affected system component or element.

Event ID (Detailed displays only.) Alphanumeric identifier of the event that triggered the alert, as defined in the Message Catalog.

Event Name (Detailed displays only.) Name of the associated SNMP trap notification as defined in the Message Catalog.

Description (Detailed displays only.) Detailed description of the underlying event as defined in the Message Catalog.

Action (Detailed displays only.) Suggested action to take to correct the event and clear the alert as defined in the Message Catalog.

alerts 41

Page 42: DD OS 5.2 Command Reference Guide

Alert Notice at Log In

A message is shown at log in that indicates the presence of alerts and instructions on how to proceed. For example:

Welcome to Data Domain OS 5.2.0.0

----------------------------------------------------

**

** NOTICE: There is 1 outstanding alert. Run "alerts show current"

** to display outstanding alert(s).

Alert Id Time Severity Class Object Message

-------- ------------------------ -------- ------- ----------- ------------------------- ---------------------------------------------

4 Fri Jan 21 16:25:51 2011 WARNING Storage Enclosure=3 Enclosure connected but has not

been added to the system.

-------- ------------------------ -------- ------- ----------- ----------------------------------------------------------------------------

There is 1 active alert.

42 EMC DD OS 5.2 Command Reference Guide

Page 43: DD OS 5.2 Command Reference Guide

alias

The alias command creates, deletes, and displays command aliases. Command options enables users to add, delete, and display command aliases for the Data Domain system command set. Users can administer aliases only for commands for which they have permission.

Options include:

add

del

reset

show

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions All users may run this command.

A new alias is available only to the user who created it on the Data Domain system.

OptionsThe following options are available with this command.

add

alias add <alias-name> "<command>"

Add a command alias. Enter the alias name and command, and enclose the command name in quotation marks. The new alias is available only to the user who created it.

Version Change

5.2 No changes from previous version.

alias 43

Page 44: DD OS 5.2 Command Reference Guide

del

alias del <alias-name>

Delete an alias by name.

reset

alias reset

Remove user-created aliases and restore defaults.

show

alias show

Display all aliases and command definitions.

Additional TopicsThis section provides additional information on various topics and concepts.

Correspondence Table

Aliases for various command options include:.

date system show date

df filesys show space

hostname net show hostname

ifconfig net config

iostat system show stats

netstat net show stats

nfsstat nfs show stats

passwd user change password

ping net ping

poweroff system poweroff

reboot system reboot

sysstat system show stats

44 EMC DD OS 5.2 Command Reference Guide

Page 45: DD OS 5.2 Command Reference Guide

traceroute route trace

uname system show version

uptime system show uptime

who user show active

alias 45

Page 46: DD OS 5.2 Command Reference Guide

46 EMC DD OS 5.2 Command Reference Guide

Page 47: DD OS 5.2 Command Reference Guide

archive

The archive command is used only on systems licensed to run the EMC Data Domain Extended Retention software option (formerly “DD860 Archiver”). Archive command options enable the feature and configure policies. See the DD Extended Retention Administration Guide for details on functionality, installation, and configuration.

Options include:

data-movement policy

data-movement schedule

data-movement start

data-movement status

data-movement stop

data-movement watch

disable

enable

option

report

show

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 Modified command options:

archive data-movement policy set age-threshold {<days> | none} mtrees <mtree-list>

archive data-movement policy set default-age-threshold {<days> | none}

archive option show [local-compression-type | data-movement-packing]

archive 47

Page 48: DD OS 5.2 Command Reference Guide

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

Supported configurations:

Controllers: DD860 (72G memory and three SAS cards) and DD990 (with 256G memory and 4 SAS2 Cards)

Storage: ES20 and ES30. A system may contain a mix of ES20 and ES30 shelves; however, each shelf chain must contain ES20 shelves only or ES30 shelves only. Shelves within a chain cannot be mixed.

OptionsThe following options are available with this command.

data-movement policy

archive data-movement policy reset age-threshold mtrees <mtree-list>

Reset the age threshold for specified MTrees. Files modified only in the past (beyond the age threshold) are moved to the archive tier during the next data movement.

archive data-movement policy reset default-age-threshold

Reset the age threshold to the default value of none. The default age threshold applies to MTrees for which the age threshold has not been set.

Example

# archive data-movement policy reset default-age-threshold

The default-age-threshold value is set to none.

archive data-movement policy set age-threshold {<days> | none} mtrees <mtree-list>

Set the age threshold for specific MTrees. Default is none.

archive data-movement policy set default-age-threshold {<days> | none}

Set the default age threshold.

Argument Definitions

<days>A number from 0 to 18250 (50 years). The number 0 means migrate when data movement runs.

noneNever migrate. This is the default for new MTrees and for the default-age-threshold.

48 EMC DD OS 5.2 Command Reference Guide

Page 49: DD OS 5.2 Command Reference Guide

archive data-movement policy show [mtrees <mtree-list>]

View the data-movement policy for the specified MTrees.

data-movement schedule

archive data-movement schedule reset

Reset the data-movement schedule.

Example

To reset the schedule to default values:

# archive data-movement schedule reset

The Archive data-movement schedule has been reset.

Archive data movement is scheduled to run on day(s) "Tue" at "06:00"

archive data-movement schedule set days <days> time <time> [no-clean]

Set the schedule for data movement. Note that the days argument checks two ranges:

Weekday (Monday–Sunday)

Day of the month (1–31, regardless of month, plus “last” and “first”)

Any value outside of the two ranges returns a message:

**** Invalid day of the week:

note For days, “last” is converted to the value 31. DD OS adds a cron job based on the schedule entered. If a schedule is set for the 31st of every month at 10:00 PM, it is not executed on months with fewer that 31 days. This is a known issue with crontab.

archive data-movement schedule set never

Set the schedule for data movement to begin. Unless you specify no-clean, the filesystem is cleaned after data movement is completed. Acceptable values include:

days sun time 00:00

days mon,tue time 00:00

days 2 time 10:00

days 2,15 time 10:00

days last time 10:00 - last day of the month

archive data-movement schedule show

Display the data-movement schedule. All users may run this command option.

archive 49

Page 50: DD OS 5.2 Command Reference Guide

data-movement start

archive data-movement start

Start data movement from the active tier to the archive tier. All files that satisfy the age-threshold value are moved to the archive tier.

Example

# archive data-movement start

Waiting for data movement to start...

Data movement has started. Run "filesys data-movement watch" to monitor the progress.

data-movement status

archive data-movement status

Display data-movement status. All users may run this command option.

data-movement stop

archive data-movement stop

Stop data movement to the archive tier.

Example

# archive data-movement stop

Waiting for data movement to stop...

Data movement has stopped.

data-movement watch

archive data-movement watch

Display data-movement progress, including progress of the fourth phase of the file migration process “packing.” All users may run this command option.

disable

archive disable

Disable the archive feature.

50 EMC DD OS 5.2 Command Reference Guide

Page 51: DD OS 5.2 Command Reference Guide

enable

archive enable

Enable the archive feature.

option

archive option reset local-compression-type

Reset the local compression algorithm to default value gz for subsequent data movement to the archive tier.

Example

# archive option reset local-compression-type

The local compression for archive tier is reset. The file system must be restarted to effect this change.

archive option set local-compression-type {none | lz | gzfast | gz}

Set the local compression algorithm for subsequent data movement to the archive tier.

Example

# archive option set local-compression-type lz

The local compression will be set to lz. The file system must be restarted to effect this change.

archive option show [local-compression-type | data-movement-packing]

Display the local compression algorithm for the archive tier and the progress of the fourth phase of the file migration process “packing.” All users may run this command option.

report

archive report generate file-location

Create a report showing the name and location of each file in the system; for example, archive unit ar1. An asterisk (*) is appended to the archive unit name if the file spans the active tier and the archive unit.

Press Ctrl-C to stop generating the report.

show

archive show config

Display archive configuration. Output also shows if packing is enabled or disabled. All users may run this command option.

archive 51

Page 52: DD OS 5.2 Command Reference Guide

52 EMC DD OS 5.2 Command Reference Guide

Page 53: DD OS 5.2 Command Reference Guide

authentication

The authentication command manages NIS users, domains, groups and servers. Command options enable the Data Domain system to participate in an active Network Information Service (NIS) domain, which keeps a centralized repository of users, groups, and server names. NIS adds a global directory that authenticates users from any host on the network.

Options include:

disable

domain

enable

groups

reset

servers

show

status

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and RestrictionsUnless otherwise noted, command options are available only to users with admin role permissions.

Version Change

5.2 Modified command options:

authentication nis groups add <group-list> role {user | admin | backup-operator}

authentication nis groups del <group-list> role {user | admin | backup-operator}

authentication 53

Page 54: DD OS 5.2 Command Reference Guide

OptionsThe following options are available with this command.

disable

authentication nis disable

Disable the NIS client.

domain

authentication nis domain reset

Reset the NIS domain name.

authentication nis domain set domain [servers <server-list>]

Set the NIS domain name and optionally to add NIS servers to the <server-list>.

authentication nis domain show

Display the NIS domain name.

Example

# authentication nis domain show

NIS domain is "datadomain.com".

enable

authentication nis enable

Enable the NIS client.

groups

authentication nis groups add <group-list> role {user | admin | backup-operator}

Delete a role-based access control (RBAC) role for NIS users in the <group-list>. See “user” for role definitions.

authentication nis groups del <group-list> role {user | admin | backup-operator}

Delete a role-based access control (RBAC) role for NIS users in the <group-list>. See “user” for role definitions.

authentication nis groups reset

Delete all added NIS groups.

54 EMC DD OS 5.2 Command Reference Guide

Page 55: DD OS 5.2 Command Reference Guide

authentication nis groups show

Display lists of NIS user groups and NIS admin groups.

reset

authentication nis reset

Delete the NIS configuration and set it to the default.

servers

authentication nis servers add <server-list>

Add NIS servers to the <server-list>.

authentication nis servers del <server-list>

Delete NIS servers from the <server-list>.

authentication nis servers reset

Reset the NIS servers to their default settings.

authentication nis servers show

Display a list of NIS servers.

Example

# authentication nis servers show

NIS Servers:

10.111.123.12

authentication 55

Page 56: DD OS 5.2 Command Reference Guide

show

authentication nis show

Display the NIS configuration.

Example

# authentication nis servers show

NIS Summary:

Domain: datadomain.com

Servers: 10.110.188.12

Admin Groups:

User Groups:

Backup Operator Groups:

Enabled: No

Status: N/A (NIS Disabled)

status

authentication nis status

Display the NIS status.

56 EMC DD OS 5.2 Command Reference Guide

Page 57: DD OS 5.2 Command Reference Guide

authorization

The authorization command establishes or modifies runtime authorization policy. Command options enable security-based functions such as managing filesystem encryption and enabling or disabling authorization policy.

All authorization tasks are logged automatically. The log file includes a timestamp, the identities of the security officer and administrative user, and the Data Domain system on which the task was performed. This log file serves as the audit trail, or “authorization history,” for each action.

Options include:

policy

show

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Only the sysadmin user (the default user created after the DD OS installation) can

create the first security role, after which the privilege to create security officers is removed from the sysadmin role.

Only security officers can create other security officers.

Separation of privilege and duty apply. Users in the role of admin cannot perform security officer tasks, and vice versa.

Procedures requiring authorization must be dual-authenticated by the security officer and the user in the admin role. For example, to set encryption, the admin enables the feature and the security officer enables runtime authorization. See “Authorization Workflow.”

This command is not supported in Global Depduplication Arrays.

Version Change

5.2 Modified command options:

authorization policy reset security-officer

authorization policy set security-officer {enabled | disabled}

authorization 57

Page 58: DD OS 5.2 Command Reference Guide

OptionsThe following options are available with this command.

policy

authorization policy reset security-officer

Reset runtime authorization policy to defaults. Resetting authorization policy is not allowed on Retention Lock Compliance systems.

authorization policy set security-officer {enabled | disabled}

Enable and disable runtime authorization policy. Setting authorization policy is not allowed on Retention Lock Compliance systems.

authorization policy show

Show status of authorization policy. Status may be enabled or disabled.

show

authorization show history [last <n> { hours | days | weeks }]

View or audit past authorizations according to the interval specified.

Example

# authorization show history

Id Date User Security Operation

Officer

-------------------------------------------------------------------------------------------------------------------------------------------------------------------

1 04/12/2011 14:44:14 sysadmin secsec sms_unittest for authorization

2 04/12/2011 15:50:08 sysadmin - user add sec-off priv security

3 04/12/2011 15:50:20 sysadmin s123ec345sec sms_unittest for authorization

4 04/14/2011 12:36:24 sec-off sec-off user add boom1 priv security

5 04/14/2011 13:06:46 sec-off sec-off user del boom1

6 04/14/2011 16:03:26 sec-off sec-off authorization policy set security-officer enabled

7 04/15/2011 18:41:12 sec-off sec-off authorization policy set security-officer disabled

-------------------------------------------------------------------------------------------------------------------------------------------------------------------

7 authorized operations found.

58 EMC DD OS 5.2 Command Reference Guide

Page 59: DD OS 5.2 Command Reference Guide

Additional TopicsThis section provides additional information on various topics and concepts.

Creating the First Security Officer Account

The user with the role of sysadmin must create and enable the first security officer account.

1. Enter:

# user add sec_off password <password> role security

2. The new security user must log in as the security office and enable the security officer authorization policy. Enter:

# authorization policy set security-officer enabled

Authorization Workflow

A user in the role of admin interacts with the security officer to perform a command that requires security officer sign off. In a typical scenario, the admin issues the command and the system displays a message that security officer authorizations must be enabled. To proceed with the sign-off, the security officer must enter his or her credentials on the same console at which the command option was run. If the system recognizes the credentials, the procedure is authorized. If not, a Security alert is generated. The authorization log records the details of each transaction.

Enabling Security Officer Authorization

Filesystem encryption, decryption, and managing systems enabled for Retention Lock Compliance require admin role permissions and security officer authorization.

To enable security officer authorization:

1. Log in as a security role. If necessary, create a security officer role. See “user” for details about the role.

2. Run the command option authorization policy set security-officer enabled.

authorization 59

Page 60: DD OS 5.2 Command Reference Guide

60 EMC DD OS 5.2 Command Reference Guide

Page 61: DD OS 5.2 Command Reference Guide

autosupport

The autosupport command manages system reports. Command options enable administrative users to manage two reports that describe the state of a Data Domain system: the Autosupport Report and the Daily Alert Summary. By default, both reports are emailed to the Data Domain Support address only, but users with admin role permissions may configure additional addresses. For details on configuring autosupport notifications, see the EMC Data Domain Initial Configuration Guide.

Options include:

add

del

disable

enable

reset

send

set

show

test

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

User role may view address lists only.

OptionsThe following options are available with this command.

Version Change

5.2 No changes from previous version.

autosupport 61

Page 62: DD OS 5.2 Command Reference Guide

add

autosupport add { alert-summary | asup-detailed } emails <email-list>

Add entries to the email list for the Daily Alert Summary or the Autosupport Report.

Example

# autosupport add asup-detailed emails [email protected]

del

autosupport del { alert-summary | asup-detailed } emails <email-list>

Delete entries from the email list for the Daily Alert Summary or the Autosupport Report. In a Global Deduplication Array, this command is run on the master controller only, and values configured on the master controller are propagated to the worker controllers.

Example

# autosupport del asup-detailed emails [email protected]

disable

autosupport disable support-notify

Disable the sending of the Daily Alert Summary and the Autosupport Report to Data Domain support.

enable

autosupport enable support-notify

Enable the sending of the Daily Alert Summary and the Autosupport Report to Data Domain support. By default, the Data Domain support email address is [email protected]. This setting is non-configurable.

reset

autosupport reset { alert-summary | asup-detailed | support-notify }

Reset an autosupport command option to the default value. See “Keywords and Arguments.”

autosupport reset all

Reset all autosupport command option to the default values.

62 EMC DD OS 5.2 Command Reference Guide

Page 63: DD OS 5.2 Command Reference Guide

autosupport reset schedule [ alert-summary | asup-detailed ]

Reset the schedules of the Daily Alert Summary and the Autosupport Report to the default values.

By default, the schedule for the Daily Alert Summary is configured with the daily 0600 options.

By default, the schedule for the Autosupport Report is configured with the daily 0800 options.

send

autosupport send [<email-addr>] [cmd "<cmd>"]

Email a report or command description to the Autosupport Report email list or to the address specified. You must enclose the command option name in double quotation marks.

Example 1

To run the Autosupport Report and emai the completed report:

# autosupport send

Example 2

To run the Autosupport Report and email the completed report to [email protected] only:

# autosupport send [email protected]

Example 3

To run the net show stats command and email the results to [email protected]:

# autosupport send [email protected] cmd "net show stats"

Example 4

To send a copy of the log file messages.1 to the Data Domain support address:

# autosupport send [email protected] cmd "log view messages.1"

set

autosupport set schedule { alert-summary | asup-detailed } { [ { daily | <day(s)> } <time> ] | never }

Schedule the Daily Alert Summary or the Autosupport Report. For either report, the most recently configured schedule overrides the previously configured schedule.

autosupport 63

Page 64: DD OS 5.2 Command Reference Guide

Example 1

To schedule the Daily Alert Summary for 2 p.m. Monday and Friday:

# autosupport set schedule alert-summary mon,fri 1400

Example 2

To schedule the Autosupport Report for Tuesday at 4 a.m:

# autosupport set schedule asup-detailed tue 0400

Example 3

To schedule the Autosupport Report for Tuesday at 3 p.m.:

# autosupport set schedule asup-detailed tue 1500

show

autosupport show { all | alert-summary | asup-detailed | support-notify }

Display autosupport configuration.

Example

# autosupport show alert-summary

Alert summary email: [email protected] [email protected] [email protected]

autosupport show history

Display the event history file, which includes the date for each Autosupport Report. Message system logs are retained for ten weeks.

Example

To display entries from all of the messages system logs:

# autosupport show history

Nov 10 03:00:19 scheduled autosupportNov 11 03:00:19 scheduled autosupportNov 12 03:00:19 scheduled autosupport

Use the up and down arrow keys to move through the log. Use the q key to exit. Enter a forward slash (/) and a pattern to search for dates.

autosupport show report

Generate an Autosupport Report without sending the results to the Autosupport Report email list.

64 EMC DD OS 5.2 Command Reference Guide

Page 65: DD OS 5.2 Command Reference Guide

autosupport show schedule [ alert-summary | asup-detailed ]

Display the schedules for the Daily Alert Summary and the Autosupport Report.

test

autosupport test { alert-summary | asup-detailed | support-notify| email <email-addr> }

Send a test email to all lists, or to a specific address.

Keywords and Arguments

alert-summary Addresses in email list for the Daily Alert Summary.

asup-detailed Addresses in the email list for the Autosupport Report.

"cmd" Run the specified DD OS command. Enclose the command in double quotation marks.

daily Default setting for Daily Alert Summary and the Autosupport Report.

<days> Run the specified report automatically on specific days of the month or week.To specify a day of the month, use the one- or two-numeral string. For example: 1. To specify a day of the week, use the first three letters of that day. For example: thu. To specify a list of days, separate the items in the list with commas, spaces, or both. For example: mon wed fri. To specify a range of days, separate the first and last items in the range with a dash (-). For example: tue-fri.

<email-list> Individual email addresses to add to the specified list. Separate the items in the list with commas, spaces, or both.

support-notify Reset the sending of the Daily Alert Summary and Autosupport Report to the Data Domain support email address to the default value. By default, the option is enabled.

autosupport 65

Page 66: DD OS 5.2 Command Reference Guide

Additional TopicsThis section provides additional information on various topics and concepts.

Using autosupport in a GDA

In a Global Deduplication Array, this command is run on the master controller only. Values configured on the master controller are propagated to the worker controllers.

Navigating Message Logs

Use the up and down arrow keys to move through the log. Press q to exit. Enter a forward slash (/) and a pattern to search for specific dates or other details.

<time> Time at which the specified report is to be run, specified in 24-hours. Note that 2400 is not a valid time. To specify midnight between Sunday night and Monday morning, for example, use mon 0000.

never Do not run the specified report automatically.

66 EMC DD OS 5.2 Command Reference Guide

Page 67: DD OS 5.2 Command Reference Guide

cifs

The cifs command manages CIFS (Common Internet File System) data access between a Data Domain system and Windows clients. Command options enable and disable access to a Data Domain system from media servers and other Windows clients that use the CIFS protocol. The cifs command sets the authentication mode and CIFS options, and displays status and statistics for CIFS clients.

Options include:

add

del

disable

enable

hosts

nb-lookup

option

reset

set

share

show

status

troubleshooting

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 Modified command option:

cifs set authentication active-directory <realm> { [<dc1> [<dc2> ...]] | * }

Deprecated command:cifs set authentication nt4 <domain> { [<pdc> [<bdc>]] | * }

cifs 67

Page 68: DD OS 5.2 Command Reference Guide

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

After a CIFS client name has been added, it must be configured for access to the Data Domain system. Configuration instructions are provided in the Integration Documentation on the Data Domain Support portal. Select the vendor for the client’s operating system and then select the appropriate tuning document.

CIFS must be enabled on the Data Domain system. See “cifs enable.”

The /backup subdirectory is not supported in a GDA.

OptionsThe following options are available with this command.

add

cifs add /backup <client-list>

Specify the CIFS backup client that can access a Data Domain system /backup directory. The /backup directory is the target directory for compressed backup server data.

note If adding multiple clients, Data Domain recommends using the cifs share add command instead. See “Tips on Entering or Removing Client Lists.”

cifs add /ddvar <client-list>

Specify administrative clients that can access a Data Domain system /ddvar directory. The /ddvar directory contains Data Domain system core and log files.

del

cifs del /backup <client-list>

Remove a client from the list of CIFS backup clients that can access a Data Domain system /backup directory.

note If removing multiple clients, Data Domain recommends using the cifs share destroy command instead. See “‘cifs disable.”

cifs del /ddvar <client-list>

Specify administrative clients that cannot access a Data Domain system /ddvar directory.

68 EMC DD OS 5.2 Command Reference Guide

Page 69: DD OS 5.2 Command Reference Guide

disable

cifs disable

Disable the CIFS service and prevent CIFS clients from connecting to the Data Domain system.

enable

cifs enable

Enable the CIFS service and allow CIFS clients to connect to the Data Domain system.

hosts

cifs hosts add <ipaddr> <host-list>

Add lmhosts mapping. The lmhosts file is a local text file that maps IP addresses to NetBIOS names. A single IP address can contain multiple hostnames.

cifs hosts del <ipaddr>

Remove lmhosts mapping for the specified IP address.

cifs hosts reset

Reset lmhosts mapping to the default. This option removes all IP address and NetBIOS hostnames from the lmhosts file.

cifs hosts show

Display lmhosts mappings. All users may run this command option.

nb-lookup

cifs nb-lookup <netbios-name>

Display the IP address for the specified NetBIOS name.

option

cifs option reset <name>

Reset a CIFS option to default value.

cifs option set <name> <value>

Set a CIFS option.

cifs option show

Display CIFS options.

cifs 69

Page 70: DD OS 5.2 Command Reference Guide

reset

cifs reset authentication

Reset the CIFs authentication to the default: workgroup.

cifs reset clients

Reset the CIFS client access list for /backup and / ddvar shares to the default: no client access. The backup and ddvar shares are also removed.

cifs reset nb-hostname

Reset the NetBIOS hostname to the default: none.

cifs reset wins-server

Set the WINS server IP address to the default: none.

set

cifs set authentication active-directory <realm> { [<dc1> [<dc2> ...]] | * }

Set authentication to the Active Directory. The realm must be a fully qualified name. Use commas, spaces, or both to separate entries in the domain controller list. Security officer authorization is required for systems with Retention Lock Compliance.

note Data Domain recommends using the asterisk to set all controllers instead of entering them individually.

When prompted, enter a name for a user account. The type and format of the name depend on if the user is inside or outside the company domain.

For user “Administrator” inside the company domain, enter the name only: administrator.

For user “Jane Doe” in a non-local, trusted domain, enter the user name and domain: [email protected]. The account in the trusted domain must have permission to join the Data Domain system to your company domain.

The Data Domain system automatically adds a host entry to the DNS server. It is not necessary to create the entry manually.

If you set the NetBIOS hostname using the command cifs set nb-hostname, the entry is created for NetBIOS hostname only, not the system hostname. Otherwise, the system hostname is used.

cifs set authentication workgroup <workgroup>

Set the authentication mode to workgroup for the specified workgroup name.

cifs set nb-hostname <nb-hostname>

Set the NetBIOS hostname.

70 EMC DD OS 5.2 Command Reference Guide

Page 71: DD OS 5.2 Command Reference Guide

cifs set wins-server <ipaddr>

Set the WINS server IP address. If CIFS clients are using NetBIOS, a WINS server may be required to resolve NetBIOS names to IP addresses.

share

cifs share create <share> path <path> {max-connections <max connections> | clients <clients> | browsing {enabled | disabled} | writeable {enabled | disabled} | users <users> | comment <comment>}

Create a new share. In GDA configurations, only /ddvar is exported. The export of /data shares is not supported.

Argument Definitions

shareA descriptive name for the share.

pathThe path to the target directory.

max-connectionsThe maximum number of connections to the share allowed at one time.

clientsA comma-separated list of clients allowed to access the share. Specify the clients by hostname or IP address. No spaces or tabs allowed.

browsingThe share is seen (enabled, default), or not (disabled) by Web browsers.

writeableThe share is writable (enabled, default), or not (disabled). By default, administrative users have write privileges even if the argument writable is disabled.

usersA comma-separated list of user names. Other than the comma delimiter, spaces (blank or tab) are treated as part of the user name because a Windows user name can have a space in the name.

cifs 71

Page 72: DD OS 5.2 Command Reference Guide

The user names list can include group names, which must be proceeded by the at (@) symbol, such as @group1.

All users in the client list can access the share unless one or more user names are specified, in which case only the listed names can access the share. Separate group and user names by commas, not spaces. There can be spaces inside the name of a group, but no spaces are allowed between groups.

commentA descriptive comment about the share.

cifs share destroy <share>

Delete a share.

cifs share disable <share>

Disable a share.

cifs share enable <share>

Enable a share.

cifs share modify <share> {max-connections <max connections> | clients <clients> | browsing {enabled | disabled} | writeable {enabled | disabled} | users <users> | comment <comment>}

Modify a share configuration with the same configuration options as the cifs share create option, except for its path. You cannot change the path for an existing share. Modifications apply to new connections only.

See the share create command option for a description of the command variables. To remove a user list for the share, specify <users>.

In GDA configurations, only /ddvar is exported. The export of /data shares is not supported.

cifs share show [<share>]

Display share configurations for all shares, or for a specified or custom share.

show

cifs show active

Display all active CIFS clients.

cifs show clients

Display all allowed CIFS clients for the default /ddvar administrative share and the

default /backup data share.

cifs show config

Display the CIFS configuration.

72 EMC DD OS 5.2 Command Reference Guide

Page 73: DD OS 5.2 Command Reference Guide

cifs show detailed-stats

Display statistics for every individual type of SMB operation, display CIFS client statistics, and print a list of operating systems with their client counts.

The list counts the number of different IP addresses connected from each operating system. In some cases the same client may use multiple IP addresses.

Output for CIFS Client Type shows Miscellaneous clients, where Yes means the displayed list of clients is incomplete. No means the list is complete, and Maximum connections, where the value is the maximum number of connections since the last reset.

Example

# cifs show detailed-stats

Name : Count Time (ms) Time %

smb : 2947

SMBmkdir : 0 0 0.0 %

SMBrmdir : 0 0 0.0 %

SMBopen : 0 0 0.0 %

SMBcreate : 0 0 0.0 %

SMBclose : 0 0 0.0 %

SMBflush : 0 0 0.0 %

SMBunlink : 0 0 0.0 %

SMBmv : 0 0 0.0 %

SMBgetatr : 0 0 0.0 %

...

--------------------------------------------------------------------

Miscellaneous clients : No

Maximum connections : 1

Windows Server 2003 R2 3790 Service Pack 2 : 1

Windows Server 2003 3790 Service Pack 2 : 1

nt : 1

...

Output truncated.

cifs show stats

Show CIFS statistics.

status

cifs status

Show status of CIFS: enable or disabled.

cifs 73

Page 74: DD OS 5.2 Command Reference Guide

troubleshooting

cifs troubleshooting domaininfo

Report domain information; for example, to check the connectivity between the Data Domain system and the domain. Also to confirm if authentication issues are due to domain connectivity.

cifs troubleshooting group <groupname> | <gid> | <SID>

List details for a specified group.

cifs troubleshooting list-groups

List all CIFS groups.

cifs troubleshooting list-users

List all CIFS users.

cifs troubleshooting performance

Collect tcpdump and ddfs traces for CIFS performance analysis.

Example

To troubleshoot performance problems:

# cifs troubleshooting performance

Please start CIFS traffic on all active interfaces, if not already started

Waiting up to 2 minutes for network capture processes to exit ...

# support upload bundle

cifs troubleshooting user <username> | <uid> | <SID>

Display details on a specified user.

Additional TopicsThis section provides additional information on various topics and concepts.

Tips on Entering or Removing Client Lists

When adding or removing clients on the Data Domain system /backup directory:

Separate clients in the list by a comma, a space, or both. The client-list can contain class-C IP addresses, IP addresses with either netmasks or length, hostnames, or an asterisk (*) followed by a domain name, such as *.yourcompany.com.

Enter an asterisk (*) to add or remove all clients on the network.

74 EMC DD OS 5.2 Command Reference Guide

Page 75: DD OS 5.2 Command Reference Guide

cluster

The cluster command manages a Data Domain Global Deduplication Array (GDA). A standard GDA comprises two controllers: the master and the worker. The master controller manages the worker controller. For more information on this command, see the Global Deduplication Array Administration Guide.

Options include:

add

create

destroy

run

show

status

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

GDA is a licensed software option. Each controller requires a GDA license. See the Global Deduplication Array Administration Guide for details.

Use the cluster create command to add the first controller of a GDA.

Only two cluster command options are allowed on the worker controller: cluster destroy and cluster show config.

Version Change

5.2 No changes from previous version.

cluster 75

Page 76: DD OS 5.2 Command Reference Guide

OptionsThe following options are available with this command.

add

cluster add <node-name> [license <license-code>]

After creating a GDA, enter the cluster add command option on the master controller to add the second controller to the GDA. The filesystem must be disabled on the master controller.

The second controller must match the master controller in terms of DD OS software, storage capacity, and hardware model. The second controller must have a pristine filesystem.

create

cluster create <cluster-name>

Create a new GDA. The name you assign is the name by which the GDA is identified within the CLI and Enterprise Manager. This command must be executed on the master controller. The filesystem must be in a pristine state.

destroy

cluster destroy [<cluster-name>]

Destroy the filesystem on the GDA controllers and separate the controllers from the array. After running this command option, each controller reverts to single-controller functionality. This command can be entered on any controller in the GDA.

run

cluster run [host {<host-list> | all | worker}] cmd <command>

Run cluster CLI commands for specific controllers locally. Global commands apply to the entire array.

Argument Definitions

host-listList of hosts, represented by IP addresses or hostnames. Separate entries by commas.

commandLocal commands to run on one or more controllers.

76 EMC DD OS 5.2 Command Reference Guide

Page 77: DD OS 5.2 Command Reference Guide

show

cluster show config

Display array membership information. All users may run this command option.

Example

Information shown for each controller:

Name: for example, dd880-1.company.com

Serial Number

Role: Master or Worker

Management Interface: the IP address of the management interface for the controller.

Replication Interface: the IP address of the replication interface.

Global Deduplication Array Interface: the IP address of the GDA interconnect between the array’s controllers.

Number: the number assigned to the controller; for example, 1, 2.

status

cluster status [node <node-name> | all]

Show the status of a specific controller or for all controllers in the GDA. You can run this command on the master controller only. All users may run this command option.

If you enter cluster status without options, a summary of the array’s status is displayed for each controller, such as:

The filesystem status is enabled and running.

Name: For example, dd880-1.company.com

Role: Master or Worker

Interface Status, such as:

Master: 3 up, 3 down

Worker: 3 up, 3 down

Filesystem Status, such as:

Filesystem up and running (Up)

Filesystem has encountered a problem (Down)

Alerts: the number of alerts for each controller

cluster 77

Page 78: DD OS 5.2 Command Reference Guide

If you enter the cluster status command for a specified controller, only that controller’s status is displayed. To show the status of all controllers in the GDA, enter:

# cluster status all

78 EMC DD OS 5.2 Command Reference Guide

Page 79: DD OS 5.2 Command Reference Guide

config

The config command manages Data Domain system configuration settings. Command options include changing individual configuration parameters and viewing the configuration setup. For information on how to configure the system, see theEMC DD OS Initial Configuration Guide and the EMC Data Domain Administration Guide.

Options include:

reset

set

setup

show

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and RestrictionsUnless otherwise noted, command options are available only to users with admin role permissions.

OptionsThe following options are available with this command.

reset

config reset location

Reset the location description to the default Null.

Version Change

5.2 Modified command options:

config reset timezone

config set timezone <zonename>

config setup

config 79

Page 80: DD OS 5.2 Command Reference Guide

config reset mailserver

Reset the mail server to the default mail server.

config reset timezone

Reset the time zone to the default US/Pacific. This command option requires security officer authorization if Retention Lock Compliance is enabled on any MTrees.

set

config set admin-email <email-addr>

Set recipient addresses for alerts and autosupport emails. The system requires one administrative email address. Use the autosupport and alerts commands to add other email addresses. To check the current setting, use config show admin-email.

Example

# config set admin-email [email protected]

The Admin Email is: [email protected]

config set admin-host <host>

Set the machine from which you can log in to the Data Domain system to view system logs and use system commands. The hostname can be simple, fully qualified, or an IP address. The host is also added to the FTP and Telnet lists–licensed software options only–and to the CIFS and NFS lists for access to /ddvar and /backup. This command provides a quick way to add authentication privileges. To check the current setting, use config show admin-host.

Example

# config set admin-host admin12.yourcompany.com

The System Admin host is admin12.yourcompany.com

config set location "<location>"

Change the description of a Data Domain system’s location. A description of a physical location helps identify the machine when viewing alerts and autosupport emails. If the description contains one or more spaces, the description must be in double quotation marks. To check the current setting, use config show location.

Example

# config set location "row2-num4-room221"

The system location is row2-num4-room221

80 EMC DD OS 5.2 Command Reference Guide

Page 81: DD OS 5.2 Command Reference Guide

config set mailserver <host>

Change the SMTP mail server used by the Data Domain system. To check the current setting, use config show mailserver.

Example

# config set mailserver mail.yourcompany.com

The Mail (SMTP) server is: mail.yourcompany.com

config set timezone <zonename>

Set the system clock to a specific time zone. The default setting is US/Pacific. Changes to the time zone require a system reboot. This command option requires security officer authorization if any MTrees are enabled with Retention Lock Compliance.

Example

# config set timezone Los_Angeles

To display time zones, enter a category or a partial zone name. The categories are Africa, America, Asia, Atlantic, Australia, Brazil, Canada, Chile, Europe, Indian, Mexico, Mideast, Pacific, and US.

Example

# config set timezone us

Ambiguous timezone name; matching...

setup

config setup

Use this command on a single node or in a GDA to change configuration settings for the system, network, filesystem, CIFS, NFS, and licenses. Press Enter to cycle through the selections. You will be prompted to confirm any changes. Choices include Save, Cancel, and Retry.

This command option is unavailable on Retention Lock Compliance systems. Use Enterprise Manager to change configuration settings.

US/Alaska US/Aleutian US/Arizona US/CentralUS/Eastern US/East-Indiana US/Hawaii US/Indiana-StarkeUS/Michigan US/Mountain US/Pacific US/Samoa

config 81

Page 82: DD OS 5.2 Command Reference Guide

show

config show admin-email

Display the administrative email address the Data Domain system uses for email from the alerts and autosupport commands. All users may run this command option.

Example

# config show admin-email

The Admin Email is: [email protected]

config show admin-host

Display the administrative host from which you can log into the Data Domain system to view system logs and use system commands. All users may run this command option.

Example

# config show admin-host

The Admin Host is: admin12.yourcompany.com

config show all

Display all config command settings. All users may run this command option.

config show location

Display the Data Domain system location description, if you set one. All users may run this command option.

Example

# config show location

The System Location is: bldg12 rm 120 rack8

config show mailserver

Display the name of the mail server that the Data Domain system uses to send email. All users may run this command option.

Example

# config show mailserver

The Mail (SMTP) server is: mail.yourcompany.com

config show timezone

Display the time zone used by the system clock. All users may run this command option.

Example

# config show timezone

The Timezone name is: US/Pacific

82 EMC DD OS 5.2 Command Reference Guide

Page 83: DD OS 5.2 Command Reference Guide

config 83

Page 84: DD OS 5.2 Command Reference Guide

84 EMC DD OS 5.2 Command Reference Guide

Page 85: DD OS 5.2 Command Reference Guide

ddboost

The ddboost command manages the integration of Data Domain systems and disk backup devices. Command options create and delete storage units on the storage server, and display the disk space usage of each storage unit. DD Boost also supports advanced load balancing and failover, distributed segment processing, encryption, and low-bandwidth optimization. See the DD Boost Administration Guide for details on functionality.

Beginning in 5.2, users can now use quotas to provision Data Domain system storage among different backup applications. Quotas restrict the logical (uncompressed and undeduplicated) storage capacity for each storage unit. DDBoost storage unit quota limits (hard or soft) can be set or removed dynamically. Quotas may also be used to provision various DDBoost storage units with different sizes, enabling an administrative user to monitor the usage of a particular storage unit over time. Note that it is possible to configure quotas on a system and run out of storage before quota limits are reached.

Like MTree quota limits, the ddboost storage-unit create command includes new, optional parameters to specify quota limits at the time the storage unit is created. Output of the ddboost storage-unit show command indicates if a quota is defined for the storage unit. See “quota” and “mtree” for details on the quota feature, including definitions of hard and soft limits.

Options include:

access

destroy

disable

enable

file-replication

ifgroup

option

reset

set

show

status

storage-unit

ddboost 85

Page 86: DD OS 5.2 Command Reference Guide

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

DD Boost is a licensed software option. If basic options do not work, verify that the proper licensing has been implemented on your Data Domain system.

Quota limits are enforced only if MTree quotas are enabled. A message displays in the output notifying users if the quota feature is disabled.

When a storage unit is created, quota limits are set to the default MTree quota size.

If MTree quotas are enabled, backups are stopped if a hard limit is reached.

Enabling quotas may cause OpenStorage backup applications to report non-intuitive sizes and capacities. See Knowledge Base article 85210, available on the Support portal, for details.

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 New command options:

ddboost ifgroup create <group-name>

ddboost ifgroup destroy <group-name>

ddboost ifgroup rename <source-group-name> <destination-group-name>

ddboost option reset [virtual-synthetics]

ddboost option set virtual-synthetics {enabled | disabled}

ddboost option show [virtual-synthetics]

Modified command options:

ddboost ifgroup add <group_name> {interface <ipaddr> | client <host>}

ddboost ifgroup del <group_name> {interface <ipaddr> | client <host>}

ddboost ifgroup disable <group-name>

ddboost ifgroup enable <group-name>

ddboost ifgroup reset <group-name>

86 EMC DD OS 5.2 Command Reference Guide

Page 87: DD OS 5.2 Command Reference Guide

OptionsThe following options are available with this command.

access

ddboost access add clients <client-list>

Add clients to DD Boost access list. The access list must be the hostname, not IP address.

Example

# ddboost access add clients host1 host2 host3

host1 : Access already exists

host2 : Invalid host

host3 : Added

ddboost access del clients <client-list>

Delete clients from DD Boost access list.

ddboost access reset

Reset DD Boost client access list to factory default.

ddboost access show

Show DD Boost client access list.

destroy

ddboost destroy

Delete all storage units from the Data Domain system. The command permanently removes all data (files) contained in the storage units. You must also manually remove (expire) corresponding catalog entries in the backup software.

ddboost ifgroup show config {interfaces | clients | groups | all} <group-name>

ddboost ifgroup status <group-name>

ddboost show histogram

ddboost show stats [ interval <seconds> ] [count <count>]

ddboost storage-unit create <storage-unit-name> [quota-soft-limit <n> {MiB|GiB|TiB|PiB}] [quota-hard-limit <n> {MiB|GiB|TiB|PiB}]

ddboost 87

Page 88: DD OS 5.2 Command Reference Guide

disable

ddboost disable

Disable DD Boost.

enable

ddboost enable

Enable DD Boost. If the user, user ID (UID), or group ID (GID) changes, the Data Domain system updates all files and storage units the next time this command is run.

file-replication

ddboost file-replication option reset {low-bw-optim | encryption}

Reset low-bandwidth optimization and encryption to the default value (disabled).

ddboost file-replication option set encryption {enabled | disabled}

This command must be entered on the source system and the destination (target) system to enable or disable encrypted data transfer for DD Boost file replication.

ddboost file-replication option set low-bw-optim {enabled | disabled}

This command must be entered on the source system and the destination (target) system to enable or disable low-bandwidth optimization. Default setting is disabled.

ddboost file-replication option show [low-bw-optim]

Show state of low-bandwidth optimization: enabled or disabled.

ddboost file-replication option show [encryption]

Show state of encryption: enabled or disabled.

ddboost file-replication reset stats

Reset file-replication statistics when DD Boost is enabled.

ddboost file-replication show active

Show the status of a DD Boost file-replication transfer to a destination Data Domain system. Output for low-bandwidth optimization shows the function as enabled and running, or as enabled with a configuration mismatch.

ddboost file-replication show detailed-file-history [duration <duration> {day | hr}]

Show a detailed, file-based replication history. You must specify a duration. Data for each file name is organized by date, time, and direction (outbound or inbound).

88 EMC DD OS 5.2 Command Reference Guide

Page 89: DD OS 5.2 Command Reference Guide

ddboost file-replication show detailed-history [duration <duration> {day | hr}] [interval <interval> {hr}]

Display a detailed, cumulative view of file-replication history. Data is organized by date, time, and direction (outbound or inbound). See “Output from file-replication show.”

ddboost file-replication show file-history [duration <duration> {day | hr}]

Show the data-transfer history of inbound and outbound traffic for files in the Data Domain system /backup directory. See “Output from file-replication show” for details.

ddboost file-replication show history [duration <duration> {day | hr}] [interval <interval> {hr}]

Show the data transfer history between the source and destination Data Domain systems.

ddboost file-replication show performance [interval <sec>] [count <count>]

Display in real time the amount of pre-compressed outbound and inbound data compared to network throughput or post-compressed data. The count displays the number of lines equal to the count value. Output is shown for the specified interval.

ddboost file-replication show stats

Monitor outbound and inbound traffic on a Data Domain system during replication. Note the compression ratio increases when low-bandwidth optimization is enabled. See “Output from file-replication show.”

ifgroup

ddboost ifgroup add <group_name> {interface <ipaddr> | client <host>}

Add an interface, client, or both to <group-name> or default group. Prior to adding an interface you must create the <group_name> unless the group name is the default group. See “ddboost ifgroup create <group-name>.”

note The group-name “default” is created during an upgrade of a fresh install and is always used if <group_name> is not specified.

Additionally, the IP address must be configured on the Data Domain system and its interface must be enabled. You can add public or private IP addresses for data transfer connections. After adding an IP address as an interface, you must enable advanced load balancing and link failover. See “ddboost ifgroup enable <group-name>.”

See the DD Boost Administration Guide and the EMC Data Domain Administration Guide for more information on interface groups.

ddboost ifgroup create <group-name>

Create a group with the name <group-name> for the interface. This command option may be run on a single node and on a master node in a Global Deduplication Array (GDA).

ddboost 89

Page 90: DD OS 5.2 Command Reference Guide

The <group-name> may contain characters ^, [0-9, a-z, A-Z],* $, underscore(_), and hyphen (-). Hostnames and fully qualified hostnames may be used. Wildcard hostnames, indicated by an asterisk (*) may be used. Reserved group names that cannot be used are: “default,” “all,” and “none.”

ddboost ifgroup del <group_name> {interface <ipaddr> | client <host>}

Remove an interface, client, or both from <group-name> or default group. Deleting the

last IP address interface disables the ifgroup. If this is the case, you have the option of terminating this command option.

ddboost ifgroup destroy <group-name>

Destroy the group name. Only empty groups can be destroyed. Interfaces or clients cannot be destroyed but may be removed sequentially or by running the command option ddboost ifgroup reset group-name.

note The group-name “default” cannot be destroyed.

ddboost ifgroup disable <group-name>

Disable a specific group by entering the <group-name>. If <group-name> is not specified, the command applies to the default group.

ddboost ifgroup enable <group-name>

Enable a specific group by entering the <group-name>. If <group-name> is not specified, the command applies to the default group.

ddboost ifgroup rename <source-group-name> <destination-group-name>

Rename the ifgroup <source-group-name> to <destination-group-name>. This command option does not require disabling the group.

ddboost ifgroup reset <group-name>

Reset a specific group by entering the <group-name>. If <group-name> is not specified, the command applies to the default group.

ddboost ifgroup show config {interfaces | clients | groups | all} <group-name>

Display selected configuration options. If no selection is made, all information about the specified <group-name> is shown.

If <group-name> is not specified, all information about the default group is displayed. Select the all argument to view configuration options of all groups. All users may run this command option.

ddboost ifgroup status <group-name>

Show status of link aggregation: enabled or disabled. Status is displayed for all groups unless <group-name> is specified. All users may run this command option.

90 EMC DD OS 5.2 Command Reference Guide

Page 91: DD OS 5.2 Command Reference Guide

Example 1

# ddboost ifgroup status

Status of ifgroup default is "enabled".

Example 2

# ddboost ifgroup status local_1

Status of ifgroup local_1 is "disabled"

option

ddboost option reset [distributed-segment-processing]

Reset distributed segment processing to the default option (enabled). Distributed segment processing must be enabled in GDA configurations.

ddboost option set distributed-segment-processing {enabled | disabled}

Enable or disable the distributed segment processing feature on the DD OS. Distributed segment processing must be enabled in GDA configurations.

ddboost option show [distributed-segment-processing]

Show status of distributed segment processing: enabled or disabled. Distributed segment processing must be enabled in GDA configurations. All users may run this command.

ddboost option reset [virtual-synthetics]

Reset virtual synthetics to the default option (disabled). Virtual synthetics is supported on single-node configurations and DD Extended Retention systems only.

ddboost option set virtual-synthetics {enabled | disabled}

Enable or disable the virtual synthetics feature on the DD OS. Virtual synthetics is supported on single-node configurations and DD Extended Retention systems only.

ddboost option show [virtual-synthetics]

Show status of virtual synthetics: enabled or disabled. All users may run this command.

reset

ddboost reset stats

Reset statistics when DD Boost is enabled, or as a network recovery procedure to clear job connections after the network connection is lost.

ddboost reset user-name

Delete and reset the DD Boost user name.

ddboost 91

Page 92: DD OS 5.2 Command Reference Guide

set

ddboost set user-name <user-name>

Set the DD Boost user name when DD Boost is enabled.

show

ddboost ifgroup show config <group-name>

Show a specific group by entering the <group-name>. Otherwise show all groups.

Example

# ddboost ifgroup show config

ifgroup default: enabled

------------------------------------------------------------------------

Interfaces: 10.6.109.140, 10.6.109.141, 10.6.109.142

Clients: *

ifgroup local_1: enabled

------------------------------------------------------------------------

Interfaces: 192.168.1.220, 192.168.1.221

Clients: *.b-domain.com

ddboost show connections

Show the number of DD Boost connections. All users may run this command.

note When an Archive Train restore image file spans multiple partitions, it uses multiple concurrent RSS connections for a single job. Therefore, output may show two restore connections and one control connection. This is expected behavior, as shown in Example 2.

Example 1 (Single Node)

# ddboost show connections

Active Clients: 2

Clients:Client Idle CPUs Memory(MiB) Plugin Version OS Version Application Version------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------cmpnyx NO 8 8,190 2.2.2.0-200818 Microsoft Windows Server 2008 SP 2 (build 6002), 64-bit NetBackup: 7.1client1.datadomain.com NO 8 7,984 2.4.0.0- Linux 2.6.17-1.2142_FC4smp x86_64 NetBackup: 6.5.4------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Client Connections:

Max Client Connections: 314

---------------------- ifgroup ------------------------- --------------------- Connections ----------------------------------------

Group Name Status Interfaces Backup Restore Src-repl Dst-repl Control Total

---------------------------------------------------------------------------------------------------------------------------------------------

none 10.6.109.38 0 0 0 0 0 0

92 EMC DD OS 5.2 Command Reference Guide

Page 93: DD OS 5.2 Command Reference Guide

none 10.6.109.244 0 0 0 0 0 0

default enabled 10.6.109.141 0 0 0 0 0 0

default enabled 10.6.109.41 0 0 0 0 0 0

external enabled 10.6.109.140 0 0 0 0 0 0

lab10G enabled 192.168.1.220 0 0 0 0 0 0

----------------------------------------------------------------------------------------------------------------------------------------------

Total Connections: 0 0 0 0 0 0

-------------------------------------------------- ------------------------------------------------------------------------------------------

* Control connections for image operations

Example 2

(Master:1) # ddboost show connection

. . .

---------------------- ifgroup ------------------------- --------------------- Connections ----------------------------------------

Group Name Status Interfaces Backup Restore Src-repl Dst-repl Control Total

---------------------------------------------------------------------------------------------------------------------------------------------

none 10.6.109.38 0 0 0 0 0 0

none 10.6.109.39 0 2 0 0 1 0

----------------------------------------------------------------------------------------------------------------------------------------------

Total Connections: 0 0 0 0 0 0

-------------------------------------------------- ------------------------------------------------------------------------------------------

ddboost show histogram

Display a DD Boost histogram for the Data Domain system.

Output Definitions

mean-msThe mathematical mean time for completion of the operations.

stddevThe standard deviation for time to complete operations, derived from the mean time.

max-sThe maximum time taken for a single operation.

2, 4, 6, 8, or 10msThe number of operations that took less than the specified number of milliseconds (ms).

100msThe number of operations that took between 10 ms and 100 ms.

1sThe number of operations that took between 100 ms and one second.

ddboost 93

Page 94: DD OS 5.2 Command Reference Guide

10sThe number of operations that took between 1 second and 10 seconds.

>10s

The number of operations that took over 10 seconds.

ddboost show stats [ interval <seconds> ] [count <count>]

Show DD Boost statistics.

Example

# ddboost show stats

01/09 03:56:56

DD Boost statistics:

DDP_GETATTR : 36954 [0]

DDP_LOOKUP : 45572 [8036]

DDP_ACCESS : 115 [0]

DDP_READ : 0 [0]

DDP_WRITE : 3 [0]

DDP_CREATE : 56 [0]

DDP_REMOVE : 56 [0]

DDP_READDIR : 0 [0]

DDP_FSSTAT : 36155 [0]

DDP_REPL_START : 9 [0]

DDP_REPL_STOP : 9 [0]

DDP_REPL_STATUS : 840 [0]

DDP_QUERY : 218569 [0]

DDP_GETPROPERTY : 87377 [0]

DDP_BOOST_INFO : 95234 [0]

DDP_STREAM_INFO : 0 [0]

(Output truncated.)

Count Errors

----------------------------------------------------------------------------------------

Image creates 56 0

Image deletes 56 0

Pre-compressed bytes received 68,613,529,600 -

Bytes after filtering 23,043,860,318 -

Bytes after local compression 23,397,851,198 -

Network bytes received 23,400,598,921 -

Compression ratio 2.9 -

Total bytes read 0 0

----------------------------------------------------------------------------------------

94 EMC DD OS 5.2 Command Reference Guide

Page 95: DD OS 5.2 Command Reference Guide

ddboost show user-name

Display the current DD Boost user.

status

ddboost status

Display status of DD Boost: enabled or disabled.

storage-unit

ddboost storage-unit create <storage-unit-name> [quota-soft-limit <n> {MiB|GiB|TiB|PiB}] [quota-hard-limit <n> {MiB|GiB|TiB|PiB}]

Create a storage unit and set limits. See “mtree” for details on quota limits. Note that if the quota feature is not enabled, the quota is created but a message appears stating the feature is disabled and limits are not enforced, as shown in Example 2. See “quota” for details.

Quotas may cause OpenStorage backup applications to report non-intuitive sizes and capacities. See Knowledge Base article 85210, available on the Support portal, for details.

Example 1

# ddboost storage-unit create SU_1 quota-soft-limit 793 GiBquota-hard-limit 1078 GiB

Created storage-unit SU_1

quota-soft-limit: 793 GiB, quota-hard-limit: 1078 GiB

Example 2

# ddboost storage-unit create SU_2 quota-soft-limit 1586 GiB

** Quota is disabled. Quota limits are not enforced.

Created storage-unit SU_2

quota-soft-limit: 1586 GiB, quota-hard-limit: N/A

ddboost storage-unit delete <storage-unit-name>

Delete a specified storage unit and contents. You must also manually remove (expire) corresponding catalog entries from the backup application.

ddboost storage-unit show [compression] [<storage-unit-name>]

Display the compression for all storage units (the original byte size, global and local compression) or the filenames in a specified storage unit. The list of files in a storage unit is shown in the output only if a storage unit name is specified. See Example 2.

ddboost 95

Page 96: DD OS 5.2 Command Reference Guide

Example 1

# ddboost storage-unit show

Name Pre-Comp (GiB) Status

---------------------------------------------------------------------------------------

DDBOOST_STRESS_SU 1.0 RW

abcd 0.0 RW

abcd2 0.0 RW

---------------------------------------------------------------------------------------

D : Deleted

RO : Read Only

RW : Read Write

Example 2

# ddboost storage-unit show DDBOOST_STRESS_SU

Name Pre-Comp (GiB) Status

------------------------------------------------------------------------------------------------------------------------------------------------

DDBOOST_STRESS_SU 1.0 RW

-------------------------------------------------------------------------------------------------------------------------------------------------

D : Deleted

RO : Read Only

RW : Read Write

List of files in DDBOOST_STRESS_SU:

write_000

--------------

Additional TopicsThis section provides additional information on various topics and concepts.

Setting Low-Bandwidth Optimization

Low-bandwidth optimization is for networks with less than 6 Mbps aggregate bandwidth. Do not use this option if maximum filesystem write performance is required.

After enabling low-bandwidth optimization on the source and target systems, both systems must undergo a full cleaning cycle to prepare the existing data. Enter the command option filesys clean start on both systems. The duration of the cleaning cycle depends on the amount of data on the Data Domain system.

96 EMC DD OS 5.2 Command Reference Guide

Page 97: DD OS 5.2 Command Reference Guide

Output from file-replication show

Arguments for the command option ddboost file-replication show display the following data:

amount of pre-compressed data in KB

amount of post-compressed data in KB

network transfer data in KB

low-bandwidth optimization factor

number of errors

ddboost 97

Page 98: DD OS 5.2 Command Reference Guide

98 EMC DD OS 5.2 Command Reference Guide

Page 99: DD OS 5.2 Command Reference Guide

disk

The disk command manages disks and displays disk locations, logical (RAID) layout, usage, and reliability statistics. Each Data Domain system reports on the number of disks in the system. For a Data Domain system with one or more Data Domain external disk shelves, commands also include entries for enclosures and disks. For details on disks in external shelves, see the Expansion Shelf Hardware Guide.

Options include:

beacon

multipath

port

rescan

reset

set

show

status

unfail

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and RestrictionsUnless otherwise noted, command options are available only to users with admin role permissions.

OptionsThe following options are available with this command.

Version Change

5.2 Modified command option:

disk unfail <enclosure-id>.<disk-id>

disk 99

Page 100: DD OS 5.2 Command Reference Guide

beacon

disk beacon <enclosure-id>.<disk-id>

Cause the LED that signals normal operation to flash on the target disk. Press Ctrl-C to stop the flash. To check all disks in an enclosure, use the enclosure beacon command option.

multipath

disk multipath failback

Manually force all disks to use the primary path. This command works on gateway models only.

disk multipath option reset {monitor | auto-failback}

Disable multipath configuration monitoring. When disabled, failures in paths to disk devices do not generate alerts. Multipath configuration monitoring is disabled by default.

To perform auto-failback, use this command to switch over to the primary path when it becomes available, even if the secondary path remains usable. The auto-failback option is enabled by default and supported on gateway systems only.

disk multipath option set auto-failback {enabled | disabled}

Enable or disable auto-failback policy. Enabling auto-failback means the primary path is used when it is available. Disabling auto-failback means the user must manually fail back to the primary path when the path becomes available. This command is supported on gateway models only.

disk multipath option set monitor {enabled | disabled}

Enable multipath configuration monitoring. When enabled, failures in paths to disk devices generate alerts and log multipath events. If monitoring is disabled, multipath event logging is not performed, meaning disk multipath show history is not updated. Multipath configuration monitoring is disabled by default.

disk multipath option show

Show status of multipath configuration monitoring and auto-failback: disabled or enabled. Auto-failback is supported on gateway systems only.

disk multipath reset stats

Clear statistics of all disk paths in expansion shelves.

disk multipath resume port <port>

Allow I/O on specified initiator port.

100 EMC DD OS 5.2 Command Reference Guide

Page 101: DD OS 5.2 Command Reference Guide

disk multipath show history

Show history of multipath events.

disk multipath show stats [enclosure <enc-id>]

Show statistics for all disk paths by default, or for the specified enclosure only.

disk multipath status [<port-id>]

Show multipath configurations and runtime status.

disk multipath suspend port <port>

Disallow I/O on specified initiator port, and stop traffic on particular ports during scheduled maintenance of the SAN, storage array, or system. This command does not drop the Fibre Channel link.

port

disk port enable <port-id>

Enable the specified initiator port.

disk port show {stats | summary}

Show disk port information.

rescan

disk rescan [<enclosure-id>.<disk-id>]

Rescan all disks to search for newly removed or inserted disks or LUNS, or power on a drive.

reset

disk reset performance

Reset disk performance statistics to zero.

disk 101

Page 102: DD OS 5.2 Command Reference Guide

set

disk set dev<disk-id> spindle-group <1-16>

Assign a LUN group to the disk.

Example

# disk set dev1 spindle-group 8

The 'disk set' command assigns a lun-group to the disk/lun.

Are you sure? (yes|no|?) [no]: y

ok, proceeding.

Please enter sysadmin password to confirm 'disk set':

This command may take several minutes to complete; please wait.

Disk dev1 has been added to spindle-group 8. The result will be effective after the filesystem is restarted.

show

disk show failure-history

Display list of serial numbers of failed disks in the Data Domain system.

disk show hardware

Display disk hardware information.

Example

# disk show hardware

Disk Manufacturer/Model Firmware Serial No. Capacity

(enc/disk)

----------------------------------------------------------------------------------------------------------------------------------------------------------

1.1 Hitachi HDP725025GLA380 GM2OA52A GEL230RB0DMU8B 232.88 GiB

1.2 Hitachi HDP725025GLA380 GM2OA52A GEL230RB0DRTSB 232.88 GiB

1.3 Hitachi HDP725025GLA380 GM2OA52A GEL230RB0DTH8B 232.88 GiB

----------------------------------------------------------------------------------------------------------------------------------------------------------

3 drives present.

Output Definitions (Disk Information)

Disk (enc/disk) The enclosure and disk numbers.

Manufacturer/Model The manufacturer’s model designation.

Firmware The firmware revision on each disk.

Serial No. The manufacturer’s serial number for the disk.

102 EMC DD OS 5.2 Command Reference Guide

Page 103: DD OS 5.2 Command Reference Guide

Output Definitions (System Information)

disk show performance

Display disk performance statistics for each disk. Each column displays statistics averaged since the last disk reset performance command or the last system power cycle.

Command output from a gateway Data Domain system lists each LUN accessed by the Data Domain system as a disk.

Capacity The data storage capacity of the disk when used in a Data Domain system. The Data Domain convention for computing disk space defines one gigabyte as 230 bytes, giving a different disk capacity than the manufacturer’s rating.

Disk Each LUN accessed by the Data Domain system as a disk.

LUN The LUN number given to a LUN on the third-party physical disk storage system.

Port WWN The world-wide number of the port on the storage array through which data is sent to the Data Domain system.

Manufacturer/Model A label that identifies the manufacturer. The display may include a model ID, RAID type, or other information depending on the vendor string sent by the storage array.

Firmware The firmware level used by the third-party physical disk storage controller.

Serial No. The serial number from the third-party physical disk storage system for a volume that is sent to the Data Domain system.

Capacity The amount of data in a volume sent to the Data Domain system. GiB = Gibibytes, the base-2 equivalent of Gigabytes. MiB = Mebibytes, the base-2 equivalent of Megabytes. TiB = Tebibytes, the base-2 equivalent of Terabytes.

Spindle-Group The spindle-group for this LUN. (Available on gateway systems only.)

disk 103

Page 104: DD OS 5.2 Command Reference Guide

Example

# disk show performance

Disk Read Write Cumul. Busy

(enc/disk) sects/s sects/s MiBytes/s

-------------------------------------------------------------------------------------------

1.1 56 20 0.037 0 %

1.2 57 20 0.037 0 %

1.3 57 20 0.037 0 %

-------------------------------------------------------------------------------------------

Cumulative 0.111 MiB/s, 0 % busy

Output Definitions

disk show reliability-data

View details of the hardware state of each disk. The information is typically used by Data Domain Support for troubleshooting assistance.

Example

# disk show reliability-data

Disk ATA Bus Reallocated Temperature

(enc/disk) CRC Err Sectors

-------------------------------------------------------------------------------------------------

1.1 0 0 25 C 77 F

1.2 0 0 23 C 73 F

1.3 0 0 23 C 73 F

-------------------------------------------------------------------------------------------------

3 drives operating normally.

Disk (enc/disk) The enclosure and disk numbers.

Read sects/s The average number of sectors per second written to each disk.

Write sect/s The average number of sectors per second written to each disk.

Cumul. MiBytes/s The average number of megabytes per second written to each disk. MiBytes = MiB = Mebibytes, the base-2 equivalent of Megabytes.

Busy The average percent of time that each disk has at least one command queued.

104 EMC DD OS 5.2 Command Reference Guide

Page 105: DD OS 5.2 Command Reference Guide

Output Definitions

disk show state

Display state information about all disks in an enclosure (a Data Domain system or an attached expansion shelf), or LUNs in a Data Domain gateway system using storage area network (SAN) storage.

Columns in the output display the disk state for each slot number by enclosure ID, the total number of disks by disk state, and the total number of disks.

If a RAID disk group reconstruction is underway, columns for the disk identifier, progress, and time remaining are also shown.

Example

To display a system containing shelf disks:

# disk show state

Enclosure Disk

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

-----------------------------------------------------------------------------

1 s . . .

2 v v v v v v v v v v v v v v D

-----------------------------------------------------------------------------

Legend State Count

----------------------------------------------

. In Use Disks 3

s Spare Disks 1

D Disabled Disks 1

----------------------------------------------

Output Legend

s - spare

R - reconstruction

v - available

K - Known

U - Unknown

Disk The <enclosure.disk-id> disk identifier.

ATA Bus CRC Err The uncorrected raw UDMA CRC errors.

Reallocated Sectors The number of mapped-out defective sectors.

Temperature The current temperature of each disk in Celsius and Fahrenheit. The allowable case temperature range for disks is from 5 degrees centigrade to 55 degrees centigrade.

disk 105

Page 106: DD OS 5.2 Command Reference Guide

O - Foreign

F - Failed

A - Absent

D - Disabled

status

disk status

View details on the Data Domain system disk status. Output includes the number of disks in use and failed, the number of spare disks available, and if a RAID disk group reconstruction is underway.

note The RAID portion of the display could show one or more disks as Failed while the Operational portion of the display could show all drives operating nominally. A disk can be physically functional and available, but not in use by RAID, possibly because of operator intervention.

On a gateway Data Domain system, the display shows only the number and state of the LUNs accessed by the Data Domain system. The remainder of the display is invalid for a gateway system.

Reconstruction is done per disk. If more than one disk is to be reconstructed, the disks queued for reconstruction show as spare or hot spare until reconstruction begins.

In the first line of output, disk status is indicated by one of the following, high-level states.

Normal System is operational and all disks are available and ready for use.

Error A new head unit is in this state when Foreign storage is present. For a system configured with some storage, Error indicates that some or all of its own storage is missing. See the definitions for Foreign and Failed in “Disk States.”

Warning A special case of a system that would have been Normal if the system had none of the following conditions that require user action: RAID system degraded

Foreign storage

Failed or Absent disks See “Disk States for details.

106 EMC DD OS 5.2 Command Reference Guide

Page 107: DD OS 5.2 Command Reference Guide

Example 1

Output shows status of disks:

# disk status

Normal - Storage operational

Disk States Active tier

----------- -----------

In Use 3

TOTAL DISKS 3

----------- -----------

Example 2

Output shows overall status of disks in a DD Extended Retention system with RAID disk group reconstruction underway:

# disk status

Normal - system operational

Disk reconstruction detail

Disk Progress Remaining

(%) (minutes)

---------------------------------------------

3.15 40 125

---------------------------------------------

Disk states Active tier Archive tier Head unit Other

----------------------------------------------------------------------------------------------------

In-Use 27 28 3 -

Spare 3 4 1 -

Spare (Reconstructing) 1 - - -

Available 16 - - -

Unknown - - - 15

Fail - - - 1

Absent - - - 1

TOTAL DISKS 47 32 4 17

----------------------------------------------------------------------------------------------------

unfail

disk unfail <enclosure-id>.<disk-id>

This command option makes a disk previously marked Failed or Foreign usable to the

system.

disk 107

Page 108: DD OS 5.2 Command Reference Guide

Additional TopicsThis section provides additional information on various topics and concepts.

Disk States

Output from various disk show command options includes details on disk states. Some states require assistance from Data Domain Support.

In Use

Disk state In Use indicates the disk is working properly. In Use is the normal state of a drive in an active data array.

Spare

Disk state Spare is the normal state of a Data Domain disk serving as the hot standby for the active RAID set. This state also appears when disks are undergoing reconstruction.

Unknown

Disk state Unknown indicates the disk may be newly introduced to the system.

Foreign

Disk state Foreign indicates the disk is not reporting the proper identification information in the RAID group. This state commonly appears after a chassis swap or after new enclosures are connected to an active system. If disks remain in this state after the chassis swap, run the system headswap command option. This option transmits to the drives the serial number of the main board, which allows the system to recognize the drives and use them accordingly.

caution! Do not run the disk unfail command option on a disk in the Foreign state after a chassis swap. Doing so destroys the filesystem and all data will be lost.

Failed

Disk state Failed indicates the system took the disk offline because of a hardware error and that the system has started reconstruction on the spare. This state generates an alert to Data Domain Support and a case is created and a replacement drive is sent.

108 EMC DD OS 5.2 Command Reference Guide

Page 109: DD OS 5.2 Command Reference Guide

Absent

Disk state Absent indicates the disk is disconnected from the bus and is inaccessible (the condition is the same as a drive being pulled from the system). Disks in the Absent state cannot be failed or unfailed. This state generates an alert to Data Domain Support and a case is created.

To verify the drive is available, run the command option disk show hardware. Output for the suspected drive should be blank or show as Absent.

To reset the disk state, remove the disk, wait five minutes, and then reinsert the disk. Following the system rescan, output typically shows the disk state as Spare. However, if the problem persists, there may be a bad slot on the enclosure or the head unit. Contact Data Domain Support for assistance.

More About Disks and Enclosures

The number of disks a Data Domain system has depends on the model. Each disk has two LEDs. A green or blue LED indicates disk activity, and an amber or red LED indicates a failure or attention condition.

Each disk in an external shelf has two LEDs at the right edge of the disk carrier. The top LED is green and flashes when the disk is accessed or when the disk is the target of a beacon operation. The bottom LED is amber and glows steadily when the disk has failed.

The disk-identifying variable used in disk commands (except gateway-specific commands) is <enclosure-id>.<disk-id>.

An enclosure may be a Data Domain system or an external disk shelf, and a Data Domain system is always enclosure 1. For example, disk 12 in a Data Domain system is labeled 1.12. Disk 12 in the first external shelf is labeled 2.12.

Invalid Commands

The following disk command options are invalid on gateway Data Domain systems using third-party physical storage disk arrays rather than Data Domain external disk shelves:

disk beacon

disk expand

disk fail

disk unfail

disk show failure-history

disk show reliability-data

disk 109

Page 110: DD OS 5.2 Command Reference Guide

When a Disk in a Tier Fails

When a disk belonging to a tier fails, the disk subsystem automatically changes the state of that disk to Failed and removes that storage from the tier. Always replace a failed disk as soon as possible. Spare disks are supplied in a carrier for a Data Domain system or a carrier for an expansion shelf. Do not move a disk from one carrier to another.

Explicitly Failing a Disk

Use the disk fail command to explicitly change the state of a single disk on a specific tier; for example, to change a disk in the Available, Spare, or In Use state to Failed on the active tier. You can then remove the storage from the tier, unless doing so would result in data loss, in which case a warning appears. To proceed, enter y when prompted to confirm the operation. Note that the command stops if failing the specified disk would cause a triple disk failure in a disk group.

If the Failed disk belonged to a tier with an available spare disk, the disk subsystem automatically replaces the Failed disk with the spare. To list available spare disks, use the disk show state command option.

A maximum of two disks in the head unit can be failed concurrently in most Data Domain systems, with the exception of DD120 and DD140 systems. In DD120 and DD140 systems, which have three disks and no spare disk, only one disk can be failed.

Unfailing a Disk

The state at which the disk unfail command moves the Failed or Foreign disk and adds it to a tier depends on how other disks in the enclosure are tiered.

Typically, the disk is in an enclosure with other disks belonging to the tier. In this case, the command reformats the disk to a spare in the same tier as the other tiered disk in the shelf. Less frequently, the disk is in an enclosure with other disks belong to the tier, but not to the disk group. In this case, the disk unfail command changes the disk to Available in the same tier.

Occasionally the disk is in an enclosure with no disks belonging to tiers, or disks belonging to two or more tiers. In this case, the disk unfail command changes the disk state to Unknown, and does not add the disk to a tier.

110 EMC DD OS 5.2 Command Reference Guide

Page 111: DD OS 5.2 Command Reference Guide

enclosure

The enclosure command identifies and displays information about expansion shelves. An enclosure is a Data Domain system or an attached expansion shelf.

Options include:

beacon

show

test

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

Enclosure numbers are not static and may change when the system is rebooted. (Numbers are generated according to when the shelves are detected during system startup.) To determine enclosure numbering, see the World Wide Name (WWN) of each enclosure in the output of the enclosure show topology command option.

Enclosure commands do not include adding a shelf. See “Adding Storage to an Active Tier” for instructions.

If a Data Domain system or a previously installed shelf, or both, require spare disks and none are available, disks from a newly installed shelf are allocated to the existing RAID groups (disk groups) when the new shelf is recognized with the disk rescan command. The shelf allocating the disks must have at least 14 disks available for its own RAID group.

Version Change

5.2 Modified command (output only):

enclosure show summary

enclosure 111

Page 112: DD OS 5.2 Command Reference Guide

OptionsThe following options are available with this command.

beacon

enclosure beacon <enclosure>

Confirm that the DD OS and hardware recognize an enclosure. This command option causes the LED on each disk in an enclosure to flash green, indicating activity. Press Ctrl-C to halt the command.

show

enclosure show all [<enclosure>]

Display the temperatures and status of fans and power supplies.

enclosure show controllers <enclosure>

Display information and status for an enclosure and shelf controller systems.

Example

# enclosure show controllers

Model ES30

Capacity 15 Slots

WWN US1V4102300094

Serial # US1V4102300094

Number of Controllers 2

Controller A

WWN 50060480A810F0BF

Firmware 08E0

Serial # US1V2102000741

Status OK

HOST port 24.0 Gbps

EXP'N port 0.0 Gbps

Controller B

WWN 50060480A810143F

Firmware 08E0

Serial # US1V2102000135

Status OK

HOST port 12.0 Gbps

EXP'N port 24.0 Gbps

112 EMC DD OS 5.2 Command Reference Guide

Page 113: DD OS 5.2 Command Reference Guide

Output Definitions (Physical Enclosure Shell)

EnclosureThe number listed here is the enclosure number assigned by the Data Domain OS. This number is the argument that is passed to the command.

ModelThe product name of the enclosure. In this example, the enclosure is an ES20.

CapacityThe number of usable drive slots in the enclosure.

WWNThe World Wide Name of the physical ES20 enclosure. This identifier describes the enclosure itself and will not change when components within the enclosure are swapped. This number matches the label located on the enclosure OPS Panel.

Serial #The serial number of the physical enclosure. As with the WWN, this describes the enclosure and will not change if components are swapped. Depending on when the enclosure was manufactured, this may be the same value as the WWN. This value matches the serial number printed on the label on the back of the enclosure.

Number of ControllersThe number of shelf controllers currently inserted into the enclosure.

Output Definitions (Shelf Controller Modules)

Controller AIdentifies which shelf controller module the block of information is for. If this enclosure has both shelf controllers installed, there are blocks for Controller A and Controller B.

WWNThe World Wide Name for the shelf controller. The WWN is different for each controller and differs from the WWN for the enclosure.

FirmwareThe revision level of the firmware that resides on the shelf controller. This value can be different for each shelf controller.

Serial #The serial number for the shelf controller. The serial number is different for each shelf controller and differs from the enclosure Serial # value.

Status

The current status for the shelf controller.

HOST portThe link speed of the HOST port of the shelf controller. A controller connects to the Data Domain system or shelf controller of the previous enclosure through the HOST port.

enclosure 113

Page 114: DD OS 5.2 Command Reference Guide

EXP'N portThe link speed of the EXP'N port of the shelf controller. A controller connects to the shelf controller of the next enclosure in the chain through the EXP'N port.

enclosure show fans [<enclosure>]

Display the current status of fans in all enclosures, or in a specific enclosure.

Example

# enclosure show fans

Enclosure Description Level Status

--------- ---------------------- ------ ------

1 FAN 1 medium OK

FAN 2 medium OK

FAN 3 medium OK

FAN 4 medium OK

FAN 5 medium OK

FAN 6 medium OK

FAN 7 medium OK

FAN 8 medium OK

2 Power module #1 fan #1 low OK

Power module #1 fan #2 low OK

Power module #2 fan #1 low OK

Power module #2 fan #2 low OK

Output Definitions

EnclosureThe enclosure number, starting from 1, for the Data Domain system.

DescriptionThe fan description for each power or cooling unit.

LevelThe fan speed. This value depends on the internal temperature and amount of cooling required.

StatusThe fan status: OK or Failed.

114 EMC DD OS 5.2 Command Reference Guide

Page 115: DD OS 5.2 Command Reference Guide

enclosure show powersupply [<enclosure>]

Display the status USAF power supplies in all enclosures or in a specific enclosure.

Example

# enclosure show powersupply

Enclosure Description Status--------- --------------- ------1 Power Module #1 OK1 Power Module #2 OK2 Power Module #1 OK2 Power Module #2 OK--------- --------------- ------

Output Definitions (Status)

OKThe power supply is operating normally.

DegradedThe power supply is manifesting a fault or not installed.

UnavailableThe system cannot determine the status of the power supply.

enclosure show summary

List enclosures, model and serial numbers, state, OEM names and values, and capacity (number of disks in the enclosure). The serial number for an expansion shelf is the same as the chassis serial number, which is the same as the enclosure WWN and the OPS panel WWN.

Example

# enclosure show summary

Enclosure Model No. Serial No. State OEM Name OEM Value Capacity

-------------------------------------------------------------------------------------------------------------------------

1 DD690 8F46927218 Online 15 Slots

2 ES20 50050CC100100D4E Online 16 Slots

3 ES30 US1V4100500053 Online 15 Slots

-------------------------------------------------------------------------------------------------------------------------

3 enclosures present.

enclosure 115

Page 116: DD OS 5.2 Command Reference Guide

Enclosure states may be one of the following:

OfflineNo connectivity to shelf. Shelf was connected previously. Also occurs if there is no power to the enclosure (after startup).

OnlineOperating as expected. No problems detected.

Fault Applies to ES20 only. Indicates no communication with firmware.

FoundTransient state. Enclosure detected (though not seen by user) and will transition to other states.

ErrorHardware or software error.

Software ErrorTypically means busy. Try again later.

enclosure show temperature-sensors [<enclosure>]

List the internal and CPU chassis temperatures for a system, and the internal temperature for expansion shelves. CPU temperatures may be shown in relative or ambient readings. The CPU numbers depend on the Data Domain system model. With newer models, the numbers are negative when the status is OK and move toward zero as CPU temperature increases. If a CPU temperature reaches 0° Celsius, the Data Domain system shuts down. With older models, the numbers are positive. If the CPU temperature reaches 80° Celsius, the Data Domain system shuts down. A status of Critical indicates that the temperature is above the shutdown threshold.

Example

# enclosure show temperature-sensors

Enclosure Description C/F Status

--------- ---------------- ----- ------

2 Internal ambient 25/77 OK

--------- ---------------- ----- ------

116 EMC DD OS 5.2 Command Reference Guide

Page 117: DD OS 5.2 Command Reference Guide

enclosure show topology

Show the layout of the SAS enclosures attached to a system.

Port enc.ctrl.port enc.ctrl.port enc.ctrl.port

-------------------------------------------------------------------------------------------------

1a

1b

1c

1d

2a 2.B.H: 2.B.E 4.B.H: 4.B.E 3.B.H: 3.B.E

2b

2c

2d

3a 3.A.H: 3.A.E 4.A.H: 4.A.E 2.A.H: 2.A.E

3b

3c

3d

-------------------------------------------------------------------------------------------------

Encl WWN Serial #

---- -------------------------- ---------------------------

2 US1V4102300094 US1V4102300094

3 US1V4101700116 US1V4101700116

4 US1V4102300042 US1V4102300042

---- -------------------------- --------------------------

Error Message:

------------------------

No error detected

-----------------------

Enclosure rear view:

CONTROLLER-B CONTROLLER-A OP-PANEL

+--------------------------------------------------------------------------------------------+

| | E | H | |

| | | | |

| | H | E | |

+--------------------------------------------------------------------------------------------+

test

enclosure test topology <port> duration <minutes>

Test the connections in the enclosure topology.

enclosure 117

Page 118: DD OS 5.2 Command Reference Guide

118 EMC DD OS 5.2 Command Reference Guide

Page 119: DD OS 5.2 Command Reference Guide

filesys

The filesys command displays statistics, capacity, status, and utilization of the filesystem. Command options also clear the statistics file, and start and stop filesystem processes. The filesys clean command options reclaim physical storage within the filesystem.

Command output for disk space or the amount of data on disks is computed using base-2 calculations. See “How Data Values Are Calculated” for details.

Options include:

archive

clean

create

destroy

disable

enable

encryption

expand

fastcopy

option

restart

show

status

sync

filesys 119

Page 120: DD OS 5.2 Command Reference Guide

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

In addition to admin permissions, command options for encryption require security officer authorization. See “Enabling Security Officer Authorization” for instructions.

Version Change

5.2 New command options:

filesys encryption key-manager disable

filesys encryption key-manager enable

filesys encryption key-manager reset

filesys encryption key-manager set {server <server-name> | port <port-number> | fips-mode {enabled | disabled} | key-class <key-class> | server <server-name> port <port-number> fips-mode {enabled | disabled} key-class <key-class>}

filesys encryption key-manager show

filesys encryption keys delete <keyid>

filesys encryption keys destroy <keyid>

filesys encryption keys show [<keyid>]

filesys encryption keys sync

Deprecated command option:

filesys encryption keys detailed show

filesys encryption passphrase change (See “system passphrase change.”)

120 EMC DD OS 5.2 Command Reference Guide

Page 121: DD OS 5.2 Command Reference Guide

OptionsThe following options are available with this command.

archive

The filesys archive command option is specific to a DD Extended Retention system. It enables administrative users to provision the filesystem with tiered storage. See theDD Extended Retention Administration Guide (formerly DD860 Archiver Administration Guide) for details on command usage and examples.

filesys archive unit add

Create an archive unit from the archive tier of the filesystem, change the state of disks or LUNs from available to in-use, and add the new archive unit to the filesystem. Also view the list of archive unit sizes available in the archive tier.

filesys archive unit del <archive-unit>

Delete a specific archive unit and change the state of disks or LUNs to available. An archive unit can be deleted from the tier only when the Data Domain system filesystem is disabled. Disabling the filesystem stops all Data Domain system operations, including filesys clean.

This command destroys all data in the archive unit. Files within the archive unit must be deleted to remove them from the namespace.

note This command option is not available on a Retention Lock Compliance system.

filesys archive unit expand <archive-unit>

Expand the size of the specified archive unit.

filesys archive unit list [<archive-unit> | all]

List all archive units or a specific archive unit.

clean

filesys clean reset {schedule | throttle | all}

Reset the clean schedule to the default of Tuesday at 6 a.m. (tue 0600), the default throttle of 50 percent, or both.

filesys clean set schedule [daily | monthly | never] <day(s)> <time>

Set schedule for the clean operation to run automatically. Default is Tuesday at 6 a.m. (tue 0600).

filesys 121

Page 122: DD OS 5.2 Command Reference Guide

Data Domain recommends running the clean operation once a week to maintain optimal availability of the filesystem. However, if there is no shortage of disk space you may clean less often.

Argument Definitions

dailyRuns command every day at the set time.

monthlyStarts command on a the day or days specified at the set time. Days are entered as integers ranging from 1 to 31.

neverTurns off the clean schedule.

day(s)Runs on the day or days specified. Days are entered as integers ranging from 1 to 31.

timeTime is 24-hour format. 2400 is not a valid time. The time mon 0000 is midnight between Sunday night and Monday morning. A new set schedule command cancels the previous setting.

Example 1

To run the clean operation automatically every Tuesday at 4 p.m.:

# filesys clean set schedule tue 1600

Example 2

To run the operation more than once in a month, set multiple days in a single command. For example, to clean the filesystem on the first and fifteenth day of the month at 4 p.m., enter:

# filesys clean set schedule monthly 1,15 1600

filesys clean set throttle <percent>

Set clean operations to use a lower level of system resources when the Data Domain system is busy. At zero percent, cleaning runs slowly or not at all, depending on how busy the system is.

At 100 percent, cleaning uses system resources in the standard way. Default is 50 percent. When the Data Domain system is not running backup or restore operations, cleaning runs at 100 percent.

122 EMC DD OS 5.2 Command Reference Guide

Page 123: DD OS 5.2 Command Reference Guide

Example

To set the clean operation to run at 30 percent of its potential speed:

# filesys clean set throttle 30

filesys clean show config

Display settings for filesystem cleaning. All users may run this command option.

Example

# filesys clean show config

50 Percent Throttle

Filesystem cleaning is scheduled to run "Tue" at "0600".

filesys clean show schedule

Display current date and time for the clean schedule. All users may run this command option.

Example

# filesys clean show schedule

Filesystem cleaning is scheduled to run "Tue" at "0600".

filesys clean show throttle

Display throttle setting for cleaning. All users may run this command option.

Example

# filesys clean show throttle

100 Percent Throttle

filesys clean start

Start clean process manually. When the process finishes, a message is sent to the system log citing the percentage of available storage space.

filesys clean status

Display status of the clean process. All users may run this command option.

Example

# filesys clean status

Cleaning started at 2009/02/06 10:21:51: phase 6 of 10

64.6% complete, 2496 GiB free; time: phase 1:06:32, total 8:53:21

filesys clean stop

Stop the clean process. Stopping the process means all progress is lost. Restarting the process means starting from the beginning.

filesys 123

Page 124: DD OS 5.2 Command Reference Guide

If the clean process slows down the system, run the filesys clean set throttle command to change the amount of system resources used by the clean process. Changes to system resource usage take effect immediately.

filesys clean watch

Monitor the filesys clean process. Output of this command continuously updates as the filesys clean operation progresses. For example, output of verification phase shows the

actual number of files moved to the target. Reporting concludes after the final phase.

Press Ctrl-C to stop monitoring. Note the filesys clean process continues to run. All users may run this command.

note Because some files may be dropped during verification, output of the percent completion phase may not reach 100%. This is expected behavior.

create

filesys create

Create a filesystem or associated RAID disk group with available and spare storage in the active tier. Change the state from Available to In Use.

Example

# filesys create

The filesystem of size 2TiB will be created.

Are you sure? (yes|no?) [no]: y

.

.

.

You now have a freshly initialized filesystem.

Enable the filesystem using 'filesys enable'

destroy

filesys destroy [and-zero]

Delete all data in the Data Domain system filesystem including data configured with Retention Lock Governance, remove Replicator configuration settings, and return filesystem settings to defaults. When this process is finished, NFS clients connected to the Data Domain system may require a remount.

note This command option is not available on a Retention Lock Compliance system.

124 EMC DD OS 5.2 Command Reference Guide

Page 125: DD OS 5.2 Command Reference Guide

By default, this command only marks the filesystem data as deleted. Disks are not overwritten with zeroes unless you specify the and-zero option. Filesystem data marked deleted cannot be recovered, even if the disks have not been overwritten with zeroes.

The and-zero option adds several hours to the destroy operation. It is not supported on Data Domain gateway systems.

disable

filesys disable

Stop filesystem operations.

enable

filesys enable

Start the filesystem operations. Security officer authorization is required if there is time skew in the system clock. See the section on Retention Lock Compliance in the EMC Data Domain Administration Guide for details.

encryption

filesys encryption algorithm reset

Reset the algorithm to the default: aes_256_cbc. After running this command, you must restart the filesystem with the filesys restart command option.

filesys encryption algorithm set {aes_128_cbc | aes_256_cbc | aes_128_gcm | aes_256_gcm}

Select the encryption algorithm. After running this command, you must restart the filesystem with the filesys restart command option.

The aes_256_gcm option (AES in the Galois/Counter mode), is the most secure algorithm, but is significantly slower than Cipher Block Chaining (CBC) mode.

filesys encryption algorithm show

Display encryption algorithm. Output indicates changes are pending, if applicable.

filesys encryption apply-changes

Update filesystem with current encryption configuration. Encryption changes are applied to all data in the Data Domain system during the next cleaning cycle.

filesys encryption disable

Deactivate encryption. Before you run this command, you must run filesys disable and enter security officer credentials. See “Enabling Security Officer Authorization” for details. This requirement provides an audit trail for changes to data encryption status.

filesys 125

Page 126: DD OS 5.2 Command Reference Guide

Example

# filesys encryption disable

This command requires authorization by a user having a 'security' role.

Please present credentials for such a user below.

Username: so_user1

Password:

The encryption feature is now disabled.

The filesystem must be restarted to effect this change.

filesys encryption enable

Activate encryption for new data written to the filesystem and specify a new passphrase. After running this command, you must restart the filesystem with the filesys restart command.

filesys encryption key-manager disable

Key rotation policy is disabled. The filesystem continues to use the latest Activated-RW key for encrypting the data. This command option requires security-officer authorization.

filesys encryption key-manager enable

Beginning with version 5.2, the RSA Data Protection Manager (DPM) key manager is available for external encryption key management. The local encryption key administration method is also available.

As in previous releases, the local key manager provides a single encryption key for each Data Domain system. The RSA DPM Key Manager enables the use of multiple, rotating keys on a Data Domain system. DPM supports a maximum of 254 keys.

See the section on key management in the EMC Data Domain Administration Guide for additional information.

filesys encryption key-manager reset

Clear the attributes of the key-manager.

filesys encryption key-manager set {server <server-name> | port <port-number> | fips-mode {enabled | disabled} | key-class <key-class> | server <server-name> port <port-number> fips-mode {enabled | disabled} key-class <key-class>}

Specify the attributes of the key-manager. RSA Data Protection Manager (DPM) supports three attributes of a Key Class Cipher including Algorithm, Key Size, and Mode. When setting up a Key Class in RSA DPM for use with a Data Domain system, the key size must be 256 bits, otherwise the DPM configuration will fail.

Additionally, Data Domain does not use the attributes Algorithm and Mode from RSA DPM. These attributes are configured using the command option: filesys encryption algorithm set {aes_128_cbc | aes_256_cbc | aes_128_gcm | aes_256_gcm}.

126 EMC DD OS 5.2 Command Reference Guide

Page 127: DD OS 5.2 Command Reference Guide

note A Data Domain system retrieves a key from RSA DPM by Key Class. Choices for the RSA DPM attribute Get Key Behavior of a Key Class are “New Key Each Time” or “Use Current Key.” In this release, Data Domain supports the Key Class “Use Current Key” only. An error message is not issued if the Key Class is incorrectly configured to generate a new key each time; however, the Data Domain system does not receive the correct key to encrypt the data.

Argument Definitions

serverThe name of the RSA key manager server or IP address.

portThe port number of the RSA server on which the key manager is listening.

fips-modeUse the argument disabled if the imported certificate for key management is not in FIPS mode. Default is enabled.

key-classThe key class configured on the key manager for the Data Domain system.

filesys encryption key-manager show

Display details about the key manager. See the EMC Data Domain Administration Guide for descriptions of key states.

Example

# filesys encryption key-manager show

Key Manager: Enabled

Server: testmachine.scmc.local

Port: 38443

Fips-mode: enabled

Status: Online

Key-class: qa_gui_2

filesys encryption keys delete <keyid>

Delete the key from the filesystem after the number of keys has exceeded 254. Only a Destroyed-Compromised key or a Destroyed key can be deleted. This command option requires security officer authorization. See “Enabling Security Officer Authorization.”

filesys encryption keys destroy <keyid>

Destroy the specified encryption key if all data encrypted with the key requires re-encryption. After the key is destroyed, the key is no longer used for reading or writing. This command option requires security officer authorization.

filesys 127

Page 128: DD OS 5.2 Command Reference Guide

filesys encryption keys show [<keyid>]

Display the key-manager attributes.

Example 1

# filesys encryption keys show

Key Key State Size

Id MUID post-comp

---------------------------------------------------------------------------------------------------------------------------------------

1 e03a6b9fff773c3a67167a9e0ec700260a0592d1662d0633416ae0f1785f9131 Activated-RW -

---------------------------------------------------------------------------------------------------------------------------------------

* Post-comp size will be updated after next cleaning cycle.

Example 2

# filesys encryption keys show 1

Key Id 1

Key MUID e03a6b9fff773c3a67167a9e0ec700260a0592d1662d0633416ae0f1785f9131

State Activated-RW

Type RKM

Create Date Tue Nov 22 11:32:03 2011

Start Date Tue Nov 22 11:32:03 2011

End Date Never

filesys encryption keys sync

Synchronize the key manager encryption keys. If a new key is detected, an alert is generated. When the filesystem is restarted, the new key is used for reading and writing.

A key that is destroyed in RSA DPM will not be marked for destroyed on the Data Domain system. See the EMC Data Domain Administrator’s Guide “Managing Encryption of Data at Rest” for details on how to destroy a key.

note A Data Domain system retrieves a key from RSA DPM by Key Class. Choices for the RSA DPM attribute Get Key Behavior of a Key Class are “New Key Each Time” or “Use Current Key.” In this release, Data Domain supports the Key Class “Use Current Key” only. An error message is not issued if the Key Class is incorrectly configured to generate a new key each time; however, the Data Domain system does not receive the correct key to encrypt the data.

128 EMC DD OS 5.2 Command Reference Guide

Page 129: DD OS 5.2 Command Reference Guide

filesys encryption lock

Lock the system by creating a new passphrase and destroying the cached copy of the current passphrase. Before you run this command, you must run filesys disable and enter security officer credentials. See “Enabling Security Officer Authorization” for instructions.

Before locking the system, verify there are no keys in a compromised state. For security purposes, Data Domain recommends performing a filesystem clean procedure prior to locking the system.

After running this command, the system encryption keys are unrecoverable until the system is unlocked with the system passphrase. This command is useful when preparing a Data Domain system and its external storage devices for shipment.

New passphrases are not stored and can be forgotten. Data Domain recommends keeping a record of the passphrase in a safe location. Data cannot be recovered without the new passphrase.

Example

# filesys disable

Please wait..........

The filesystem is now disabled.

# filesys encryption lock

This command requires authorization by a user having a 'security' role.

Please present credentials for such a user below.

Username: so_user2

Password:

Enter the current passphrase:

Enter new passphrase:

Re-enter new passphrase:

Passphrases matched.

The filesystem is now locked.

filesys encryption show

Check the status of the encryption feature. Output indicates changes are pending, if applicable.

Example

# filesys encryption show

Encryption is enabled (Encryption 'disable' change is pending*)

Algorithm: aes_256_cbc (Algorithm 'aes_128_cbc' change is pending*)

The filesystem is unlocked

* The filesystem must be restarted to effect this change.

filesys 129

Page 130: DD OS 5.2 Command Reference Guide

filesys encryption unlock

The filesystem is locked automatically after a headswap or chassis swap. Use this command option to unlock the filesystem.

expand

filesys expand

Increase the filesystem by using all space in the active tier.

fastcopy

filesys fastcopy source <src> destination <dest>

Copy a file or directory tree from a Data Domain system source directory to another

destination on the Data Domain system.

Source names <src> that include spaces or special characters must be entered according to the following conventions.

Enclose the entire source pathname with double quotation marks:

filesys fastcopy "/data/col1/backup/.snapshot/fast copy" destination /data/col1/backup/dir

OR

Enter a backslash before the space. Do not add quotation marks:

filesys fastcopy /data/col1/backup/.snapshot/fast\ copy destination /data/col1/backup/dir2

Argument Definitions

source <src>The location of the directory or file to copy. The first part of the path must be /backup. Snapshots always reside in /backup/.snapshot. Use the snapshot list command to list existing snapshots.

destination <dest>The destination for the directory or file being copied. The destination cannot already exist.

130 EMC DD OS 5.2 Command Reference Guide

Page 131: DD OS 5.2 Command Reference Guide

option

filesys option disable report-replica-as-writable

Set the reported read/write status of a replication destination filesystem to read-only. Use the filesys disable command before changing this option and use the filesys enable command after changing the option.

With CIFS, use the cifs disable command before changing the option and use the cifs enable command after changing the option.

filesys option enable report-replica-as-writable

Set the reported read/write status of a replication destination filesystem to read/write. Use the filesys disable command before changing this option and use the filesys enable command after changing the option.

With CIFS, use the cifs disable command before changing the option and use the cifs enable command after changing the option.

filesys option reset {local-compression-type | low-bw-optim | marker-type | report-replica-as-writable | global-compression-type} | staging-reserve | staging-clean | staging-delete-suspend | compute-segfeatures}

Return filesystem compression to the default settings on the destination Data Domain system. Low-bandwidth optimization is not supported in Global Deduplication arrays.

Argument Definitions

local-compression-typeReset the compression algorithm to the default of lz.

low-bw-optimDisplay if low-bandwidth optimization is enabled.

marker-typeReturn the marker setting to the default of auto.

report-replica-as-writableReset the filesystem to read-only.

global-compression-typeRemove a manually set global compression type. The filesystem continues to use the current type. Only when a filesys destroy command is entered does the type used change to the default of 9.

staging-reserve

Set staging reserve percentage from 0 to 90.

filesys 131

Page 132: DD OS 5.2 Command Reference Guide

filesys option set global-compression-type {1 | 9}

Set the global compression of data to type 9 (new type) or type 1 (previous type). Enter the filesys disable and filesys enable commands for the change to take effect. If the filesystem is over 40 percent full, the command fails with an error message.

Compression type must be the same on each side of a directory replication pair. If not, replication stops.

Example

# filesys option set global-compression-type 1

# filesys disable

# filesys enable

filesys option set local-compression-type {none | lz | gzfast | gz}

Set compression algorithm. To enable the new setting, use the filesys disable and filesys enable command options.

If local compression is changed from the default value of lz, the change is applied only to new data and data accessed during subsequent clean operations. The system transitions to the new compression type as backups expire. This behavior reduces overhead of the cleaning process.

Argument Definitions

none

No data compression occurs.

lzThe default algorithm that gives the best throughput. Data Domain recommends the lz option.

gzfastA zip-style compression that uses less space for compressed data, but more CPU cycles. gzfast is the recommended alternative for sites that want more compression at the cost of lower performance.

gzA zip-style compression that uses the least amount of space for data storage (10% to 20% less than lz), but also uses the most CPU cycles (up to twice as many as lz).

filesys option set staging-reserve <percent>

Reserve a percentage of total disk space for disk staging.

132 EMC DD OS 5.2 Command Reference Guide

Page 133: DD OS 5.2 Command Reference Guide

filesys option show [{local-compression-type | low-bw-optim | marker-type | report-replica-as-writable | global-compression-type | staging-reserve | staging-clean | staging-delete-suspend | compute-segfeatures}

Show the filesystem option settings. By default, all filesystem options are displayed. To limit the output to a single system option, specify one of the system options.

Argument Definitions

local-compression-typeDisplay the current compression algorithm.

low-bw-optim

Display if low-bandwidth optimization is enabled.

marker-typeDisplay the current marker setting.

report-replica-as-writableDisplay the current reported setting on the destination Data Domain system.

global-compression-typeDisplay the current global compression type.

staging-reserveSet staging reserve percentage from 0 to 90.

restart

filesys restart

Disable and enable the filesystem in a single operation.

show

filesys show compression [<filename>] [last <n> {hours | days}] [no-sync]

filesys show compression [tier {active | archive}] summary | daily | daily-detailed {[last <n> { hours | days | weeks | months }] | [start <date> [end <date>]]}

Display the space used by, and compression achieved for, files and directories in the filesystem. When used on a DD Extended Retention system, information is also shown for the active or archive tiers. See the DD Extended Retention Administration Guide for details. Values are reported in Gigibytes (GiB). See “How Data Values Are Calculated” for details.

filesys 133

Page 134: DD OS 5.2 Command Reference Guide

In general, the more often a backup procedure is run on a file or filesystem, the higher the compression. The output does not include global and local compression factors for the Currently Used table, but uses a dash instead. Note that the display on a busy system may not return for several hours, depending on the number of files. Other factors may influence the display.

Running the command without arguments generates default output that displays a

summary of compression statistics for all files and directories in the filesystem for the last 7 days and the last 24 hours. Output includes details on active and archive tiers for the DD Extended Retention system only.

Argument Definitions

<filename> filename(Optional) Synchronize all modified files to disk and then display compression statistics for the specified file or directory only. To display compression statistics for a specific file or directory without first synchronizing all modified files to disk, include the no-sync option.

Depending on the number of files in the filesystem, specifying a file name could cause this command to process for several hours before completing.

last <n> {hours | days | weeks | months} (Optional)In the summary portion of the output, display filesystem compression statistics for the specified time frame instead of for the past 7 hours. The statistics for the last 24 hours remain in the summary output. If you specify a file or directory name, you cannot use this option with the weeks keyword or the months keyword.

no-sync (Optional)Display compression statistics for a specific file or directory without first synchronizing all modified files to disk.

summary (Optional)Display all compression statistics, summarized in the following categories:

Storage currently used.

Data written in the last 7 days. By including the last <n> option or the start <date> option, you can display statistics for a time frame other than the last 7 days.

Data written in the last 24 hours.

134 EMC DD OS 5.2 Command Reference Guide

Page 135: DD OS 5.2 Command Reference Guide

daily (Optional)In addition to the summary output, display the following information for each day, over the previous four full weeks, plus the current partial week. This option is not available if you specify a file or directory name.

daily-detailed (Optional)Display the daily output, but also include the following information for each day. This

option is not available if you specify a file or directory name.

start <date> (Optional) In the summary portion of the output, display filesystem compression statistics for the time frame that begins on the specified day instead of the past 7 hours. The statistics for the last 24 hours will remain in the summary output. If you specify a time frame less than the previous four weeks, plus the current full week, the daily or daily-detailed output (if specified) is truncated to the shorter time frame.

Specify <date> in the format <yyyy>-<mm>-<dd> (for example, “2011-04-07”). By default, the last day of the time frame specified with this argument is the most recent, full day elapsed.

end <date> (Optional) Valid only if the start option is used. In the summary portion of the output, display filesystem compression statistics for the time frame that ends on the specified day. In general, the more often a backup is done for a particular file or filesystem, the higher the compression. On a busy system, this process may not complete for several hours, depending on the number of files. Other factors may also affect results.

Example

The following example shows sample output from a DD Extended Retention system. It includes summary information for active and archive tiers, and a table of currently used storage. On a standard Data Domain system, output includes information on active tier only.

# filesys show compression

Active Tier:

Pre-Comp Post-Comp Global-Comp Local-Comp Total-Comp

(GiB) (GiB) Factor Factor Factor

(Reduction %)

--------------------------------------------------------------------------------------------------------------------------------------------------------------

Written:

Last 33 days 122518.6 32314.9 2.5x 1.5x 3.8x (73.6)

Last 24 hrs 127.9 0.0 17828639.6x 2.8x 49159570.3x (100.0)

--------------------------------------------------------------------------------------------------------------------------------------------------------------

* Does not include the effects of pre-comp file deletes/truncates

since the last cleaning on 2011/04/07 13:56:59.

filesys 135

Page 136: DD OS 5.2 Command Reference Guide

Archive Tier:

Pre-Comp Post-Comp Global-Comp Local-Comp Total-Comp

(GiB) (GiB) Factor Factor Factor

(Reduction %)

--------------------------------------------------------------------------------------------------------------------------------------------------------------

Written:*

Last 33 days 122518.6 32314.9 2.5x 1.5x 3.8x (73.6)

Last 24 hrs 127.9 0.0 17828639.6x 2.8x 49159570.3x (100.0)

--------------- -------- --------- ----------- ---------- -------------------

* Does not include the effects of pre-comp file deletes/truncates

since the last cleaning on 2011/04/07 13:56:59.

Currently Used:

Pre-Comp Post-Comp Global-Comp Local-Comp Total-Comp

(GiB) (GiB) Factor Factor Factor

(Reduction %)

--------------------------------------------------------------------------------------------------------------------------------------------------------------

Active 86625.9 18365.6 - - 4.7x (78.8

Archive 86625.9 18365.6 - - 4.7x (78.8

Total ******* *******

--------------------------------------------------------------------------------------------------------------------------------------------------------------

Output Definitions

Pre-CompData written before compression.

Post-CompStorage used after compression.

Global-Comp FactorRatio of Pre-Comp / (size after global compression). Not applicable to the storage currently used.

Local-Comp FactorRatio of (size after global compression)/Post-Comp. Not applicable to the storage currently used.

Total-Comp Factor Ratio of Pre-Comp / Post-Comp.

Reduction %Percentage value (Pre-Comp - Post-Comp) / Pre-Comp) * 100. This is the default output format.

136 EMC DD OS 5.2 Command Reference Guide

Page 137: DD OS 5.2 Command Reference Guide

filesys show file-info <filename>

Display detailed information about the specified file. Specify the fully qualified path to the file.

filesys show space

Display the space available to and used by filesystem resources. Values are reported in Gigibytes (GiB). See “How Data Values Are Calculated” for details.

The following example shows filesystem space on a standard Data Domain system:

# filesys show space

Active Tier:

Resource Size GiB Used GiB Avail GiB Use% Cleanable GiB

-------------------------------------------------------------------------------------------------------------------------------

/data: pre-comp - 8805.7 - - -

/data: post-comp 21563.9 495.5 21068.4 2% 83.0

/ddvar 132.9 58.5 67.6 46% -

-------------------------------------------------------------------------------------------------------------------------------

Output Definitions

Size GiBTotal storage capacity of a filesystem resource.

Used GiBAmount of data stored on a filesystem resource.

Avail GiBAmount of free space on a filesystem resource.

Use%Ratio of data stored to total capacity, multiplied by 100.

Cleanable GiBEstimated amount of recoverable free space.

Command output displays space availability and usage information for the following filesystem components:

/data: pre-compAmount of virtual data stored on the Data Domain system. Virtual data is the amount of data sent to the Data Domain system from backup servers.

filesys 137

Page 138: DD OS 5.2 Command Reference Guide

/data: post-comp Amount of total physical disk space available for data, actual physical space used for compressed data, and physical space still available for data storage. Warning messages go to the system log and an email alert is generated when the Use% figure reaches 90%, 95%, and 100%. At 100%, the Data Domain system stops accepting data from backup servers.

/ddvarApproximate amount of space used by and available to the log and core files. To free space in this area, remove old logs and core files.

The total amount of space available for data storage can change because an internal index may expand as the Data Domain system fills with data. The index expansion takes space from the Avail GiB amount.

If Use% is always high, use the command option filesys clean show-schedule to see how often the cleaning operation is scheduled to run automatically. Use filesys clean schedule to run the operation more often.

filesys show uptime

Display the amount of time passed since the filesystem was last enabled. The display is in days, hours, and minutes.

Example

# filesys show uptime

Filesys has been up 47 days, 23:28

status

filesys status

Display the state of the filesystem process.

Example

# filesys status

The filesystem is enabled and running

If the filesystem was shut down with a Data Domain system command, such as filesys disable, the display includes the command.

Example

# filesys status

The filesystem is disabled and shutdown. [filesys disable]

138 EMC DD OS 5.2 Command Reference Guide

Page 139: DD OS 5.2 Command Reference Guide

sync

filesys sync

Synchronize modified files to disk.

Additional TopicsThis section provides additional information on various topics and concepts.

More About Filesystem Cleaning

The filesys clean command reclaims physical storage on the Data Domain system. It is the only command that reclaims physical storage used by files that are deleted and not present in a snapshot. During the clean operation, the Data Domain system is available for backup (write) and restore (read) operations.

Cleaning is a self-throttling process that gives up system resources in the presence of user traffic. Data Domain recommends running a clean operation after the first full backup to a Data Domain system. The initial local compression on a full backup is typically a factor of 1.5 to 2.5. An immediate clean operation increases compression by another factor of 1.15 to 1.2 and reclaims a corresponding amount of disk space.

Any operation that shuts down the Data Domain system, such as disabling the filesystem or performing a power-off or reboot, stops the clean operation. The clean does not restart when the system and filesystem restart. You must restart the clean manually or wait until the next scheduled clean operation.

Replication between Data Domain systems can affect filesys clean operations. If a source Data Domain system receives large amounts of new or changed data while replication is disabled or disconnected, resuming replication may significantly delay filesys clean operations. Cleaning becomes inefficient during a large replication process because what is not replicated is not cleaned.

How Data Values Are Calculated

1 KiB = 210 bytes = 1024 bytes

1 MiB = 220 bytes = 1,048,576 bytes

1 GiB = 230 bytes = 1,073,741,824 bytes

1 TiB = 240 bytes = 1,099,511,627,776 bytes

filesys 139

Page 140: DD OS 5.2 Command Reference Guide

Error Messages

Occasionally, error messages may be generated when creating a filesystem.

Error creating filesystem. Log stored in /ddr/var/log/debug/create.<number>

This is a general error message. See the log file reference in the error message.

A filesystem already exists.

The filesystem was not destroyed before the filesys create command was run. Run the filesys destroy command, and then retry the filesys create command.

There is no storage available for creation.

No storage was added to the active tier before the filesys create command option was run. Use the storage add command option to add disks or LUNs to the tier, and then retry creating the filesystem.

Enabling Security Officer Authorization

Filesystem encryption, decryption, and managing systems enabled for Retention Lock Compliance require admin role permissions and security officer authorization.

To enable security officer authorization:

1. Log in as a security role. If necessary, create a security officer role. See “user” for instructions on creating the role and for details about the role.

2. Run the command option authorization policy set security-officer enabled.

140 EMC DD OS 5.2 Command Reference Guide

Page 141: DD OS 5.2 Command Reference Guide

help

The help command displays Help files for Data Domain system commands. Entering the help command without an object displays the complete list of Data Domain system commands. For a description of a single command, including syntax, options, and for most commands, sample output, include the command name as the object; for example, help filesys.

You can also search for command options using keywords. If the keyword is the same as a command name, the entire Help page for the command displays. Typically, information that does not appear in the Help files is available in the EMC Data Domain Administration Guide.

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions All users may run this command option.

Use the up and down arrow keys to move through a help page.

Press Tab to complete an entry.

Use the q key to exit.

Enter a slash (/) to move forward and a question mark (?) with a pattern to search for and highlight lines of interest.

Version Change

5.2 No changes from previous version.

help 141

Page 142: DD OS 5.2 Command Reference Guide

142 EMC DD OS 5.2 Command Reference Guide

Page 143: DD OS 5.2 Command Reference Guide

ipmi

The ipmi command monitors and manages a Data Domain system deployed remotely. Command options enable administrators to monitor remote systems and to power the systems on or off as required. The Serial-Over-LAN (SOL) feature is used to view the serial output of a remote system boot sequence. For more information, see the EMC Data Domain Operating System Offline Diagnostics Suite User’s Guide.

Options include:

config

disable

enable

remote console

remote power

reset

show

user

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 No changes from previous version.

ipmi 143

Page 144: DD OS 5.2 Command Reference Guide

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

Users cannot log in to IPMI via SSH. See the EMC Data Domain Administration Guide for instructions on managing remote systems.

IPMI (on/off/cycle/status) is not supported on the following models:

DD140

DD610

DD630

SOL (serial-over-LAN) is not supported on the following models:

DD120

DD140

DD5xx

DD610

DD630

DD660

DD690/g

See Additional Topics for the lists of models that support IPMI and SOL.

OptionsThe following options are available with this command.

config

ipmi config <port> {dhcp | ipaddress <ipaddr> netmask <mask> gateway <ipaddr>}

Configure the IPMI static or dynamic IP address of a BMC. If configuring a static IP, you must provide the BMC IP address, netmask, and gateway address. See “Setting Up IPMI” for details.

disable

ipmi disable {<port> | all}

Disable IPMI remote access to a single system, or all systems.

144 EMC DD OS 5.2 Command Reference Guide

Page 145: DD OS 5.2 Command Reference Guide

enable

ipmi enable {<port> | all}

Enable IPMI remote access to a single system, or to all systems.

remote console

ipmi remote console ipmi-target <ipaddr | hostname> user <user> [password <password>]

Activate SOL mode to view serial console of a remote Data Domain system. See “Viewing Serial Output of a Remote System” for instructions.

remote power

ipmi remote power {on | off | cycle | status} ipmi-target <ipaddr | hostname> user <user> [password <password>]

Power on, power off, or power cycle a remote target system from an initiator system.

Example

# ipmi remote power cycle ipmi-target 10.25.220.197 user sysadmin

The 'ipmi remote power cycle' command turns off the power without shutting down the system gracefully and file access will be interrupted.

Are you sure? (yes|no|?) [no]: yes

ok, proceeding.

Remote target 10.25.220.197 has been power CYCLED.

Please use serial-over-lan or serial console to view boot status.

reset

ipmi reset

Reset LAN and SOL configuration and clear all IPMI users.

show

ipmi show config

View the configuration of local IPMI interfaces. Output includes the dynamic or static IP address, gateway, netmask, and MAC address.

ipmi 145

Page 146: DD OS 5.2 Command Reference Guide

Example

# ipmi show config

Console: serial

Port Enabled DHCP IP address Netmask Gateway

------ ------- ---- -------- ------------------- ------------ -----------------

bmc0a yes yes 192.168.11.165* 255.255.252.0* 192.168.10.1*

------ ------- ---- -------- ------------------- ------------ -----------------

* Value from DHCP

ipmi show hardware

View the port names and firmware version of the local BMC. Output also includes the IPMI version, manufacturer, MAC addresses. The Link Status column shows if the LAN cable is connected to the LAN-IPMI shared port.

Link status cannot be determined on Data Domain systems with a dedicated IPMI port. These include models DD640, DD670, DD860, and DD890.

Example

# ipmi show hardware

Firmware Revision: 0.59

IPMI Version : 2.0

Manufacturer Name: Intel Corporation

Port MAC Address Link Status

------------- -------------------------- -----------

bmc-eth0 00:15:17:30:2d:72 yes

bmc-eth1 00:15:17:30:2d:73 no

-------- ----- --------------------------- -----------

user

ipmi user add <user> [password <password>]

Add new IPMI user.

ipmi user change <user> [password <password>]

Change the password of an IPMI user.

ipmi user del <user>

Delete an IPMI user.

ipmi user list

View a list of IPMI users, including names, IDs, and permissions.

146 EMC DD OS 5.2 Command Reference Guide

Page 147: DD OS 5.2 Command Reference Guide

ipmi user reset

Clear all IPMI users. If this is the first time using IPMI, we recommend running this command to clear IPMI users who may be out of synch between two ports, and to disable default users.

Additional TopicsThis section provides additional information on various topics and concepts.

Supported Models-IPMI

DD120

DD160

DD510/530/565/580/580g

DD620

DD640

DD660

DD670

DD690

DD860

DD880/g

DD890

Supported Models-SOL

DD160

DD620

DD880/g

DD640

DD670

DD860

DD890

ipmi 147

Page 148: DD OS 5.2 Command Reference Guide

Viewing Serial Output of a Remote System

The Serial-Over-Lan (SOL) feature enables viewing text-based serial output without a serial server. It is used in combination with the remote power cycle command to view the remote system’s boot sequence.

The following example shows how to enter SOL mode and view the serial output of a remote Data Domain system:

# ipmi remote console ipmi-target 10.25.220.197 user sysadmin

Please enter user password:

[SOL Session operational. Use @? for help]

Data Domain OS 0.86.0.0-191797

localhost.localdomain login:

Disconnecting from an SOL Session

Enter the symbol @ to disconnect from a session and return to the command line.

Disconnecting from the Initiator

Enter the symbol ~ to disconnect from the initiator system completely.

Setting Up IPMI

How you set up IPMI on a Data Domain system varies depending on model number.

1. Connect LAN cable to LAN port. Note the following exceptions:

For models DD860, DD890, DD640, and DD670, connect LAN to maintenance port.

For models DD160 and DD620, connect LAN cable to upper port (eth0a), which is shared by LAN and BMC.

2. Adjust the BIOS settings according to model.

Model BIOS Settings

DD640, DD670, DD860, DD880g, DD890

Use default settings.

148 EMC DD OS 5.2 Command Reference Guide

Page 149: DD OS 5.2 Command Reference Guide

3. Run ipmi show config to get the port name.

4. Run ipmi config port { dhcp | ipaddress <ipaddr> netmask <mask> gateway<ipaddr> } to configure an IPMI port.

5. If this is the first time using IPMI, run ipmi user reset to clear IPMI users that may be out of synch between two ports, and to disable default users.

6. To add a new IPMI user, run the command option ipmi user add user [password <password>].

7. To set up SOL, run the command option system option set console lan.

8. When prompted, enter y to reboot the system.

DD160, DD620 Press F2 to go to BIOS. Server > Set AST1000/2000 LAN Configuration >

BMC LAN Enable

Server > Remote Access Configuration

Remote Access = enable Serial Port = com2 Serial port mode = 9600 Flow control = none Redirection = always Terminal type = vt100 Server Management > Console Redirection >

Serial Port B > Baud Rate 9.6K

DD120, DD510, DD530, DD565, DD580, DD580g, DD660, DD690

Press F2 to go to BIOS. Advanced > Serial Port Configuration > Serial B

Enable [Enabled].

Server Management > Console Redirection > Serial Port B > Baud Rate 9.6K

Model BIOS Settings

ipmi 149

Page 150: DD OS 5.2 Command Reference Guide

Number of Supported IPMI Users

Model Number of Users

DD880g Maximum user IDs = 15. Default user = 1 (NULL).Net maximum available for use = 14.

DD640, DD670, DD860, DD890 Maximum user IDs = 10. Default user = 2 (NULL, root).Net maximum available for use = 8.

DD160, DD630 Maximum user IDs = 10. Default user = 1 (root)Net maximum available for use = 9.

DD120, DD5xx, DD660, DD690 Maximum user IDs = 10. Default user = 1(root). Net maximum available for use = 9.

150 EMC DD OS 5.2 Command Reference Guide

Page 151: DD OS 5.2 Command Reference Guide

license

The license command adds, deletes, and resets keys for licensed features and storage capacity.

Options include:

add

delete

reset

show

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

License codes are case-insensitive. Include the hyphens when entering codes.

OptionsThe following options are available with this command.

add

license add <license-code> [<license-code> ...]

Add one or more licenses for features and storage capacity. Include dashes when entering the license code. This command option may run on a standalone Data Domain system or on the master controller of a Global Deduplication Array.

Version Change

5.2 Licenses for Retention Lock Compliance and Retention Lock Governance added. See the EMC Data Domain Administration Guide for details on Retention Lock software options.

license 151

Page 152: DD OS 5.2 Command Reference Guide

Example

# license add ABCD-DCBA-AABB-CCDD BBCC-DDAA-CCAB-AADD-DCCB-BDAC-E5

Added "ABCD-DCBA-AABB-CCDD" : REPLICATION feature

Added "BBCC-DDAA-CCAB-AADD-DCCB-BDAC-E5" : CAPACITY-ARCHIVE feature for 6TiB capacity ES20

delete

license del <license-feature> [<license-feature> ...] | <license-code> [<license-code> ...]

Delete one or more software option licenses. In a GDA configuration, run this command on the master controller.

Security officer authorization is required to delete licenses from Retention Lock Compliance systems only.

Example

# license del EEFF-GGHH-JJII-LLKK MMNN-OOQP-NMPQ-PMNM STXZ-ZDYS-GSSG-BBAA

License code "EEFF-GGHH-JJII-LLKK" deleted.

License code "MMNN-OOQP-NMPQ-PMNM" deleted.

License code "STXZ-ZDYS-GSSG-BBAA" deleted.

reset

license reset

Remove all licenses. This command option requires security officer authorization if removing licenses from Retention Lock Compliance systems. Licenses cannot be reset on a Global Deduplication Array.

show

license show [local]

View license keys and features. If the local argument is included in the option, output includes details on local node only.

152 EMC DD OS 5.2 Command Reference Guide

Page 153: DD OS 5.2 Command Reference Guide

Additional TopicsThis section provides additional information on various topics and concepts.

Required Licenses

The following software options require separate licenses. See the Data Domain documentation set or visit the Support portal for details.

DD Boost

Extended Retention (formerly “Archiver”)

Encryption

Expanded Storage

Global Deduplication Array (GDA)

I/OS

Replication

Retention Lock Compliance

Retention Lock Governance

Shelf Capacity

Virtual Tape Library (VTL)

license 153

Page 154: DD OS 5.2 Command Reference Guide

154 EMC DD OS 5.2 Command Reference Guide

Page 155: DD OS 5.2 Command Reference Guide

log

The log command manages and displays the Data Domain system log file. Messages from the alerts feature, the autosupport reports, and general system messages are sent to the log directory (/ddvar/log). A log entry appears for each Data Domain system command given on the system.

Data Domain systems can send network log messages to other systems enabled to listen. The Data Domain system sends the log in the standard syslog format. When remote logging is enabled, all messages in the messages and kern.info files are exported.

Message selectors include:

*.noticeSend all messages at the notice priority and higher.

*.alertSend all messages at the alert priority and higher (alerts are included in *.notice).

kern.*Send all kernel messages (kern.info log files).

local7.*Send all messages from system startups (boot.log files).

See the vendor-supplied documentation for details on managing the selectors and receiving messages on a third-party system.

Options include:

host

list

view

watch

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 No changes from previous version.

log 155

Page 156: DD OS 5.2 Command Reference Guide

Guidelines and RestrictionsUnless otherwise noted, command options are available only to users with admin role permissions.

OptionsThe following options are available with this command.

host

log host add <host-name>

Add a system to the list that receives Data Domain system log messages.

Example

To add the system log-server to the hosts that receive log messages:

# log host add log-server

log host del <host-name>

Remove a system from the list of systems that receive Data Domain system log messages.

Example

To remove the system log-server from the hosts that receive log messages:

# log host del log-server

log host disable

Disable sending log messages to other systems.

log host enable

Enable sending log messages to other systems.

log host reset

Reset the log sending feature to the defaults of disabled and an empty list.

log host show

Display the list of systems that receive log messages and are in the state of enabled or disabled.

156 EMC DD OS 5.2 Command Reference Guide

Page 157: DD OS 5.2 Command Reference Guide

Example

# log host show

Remote logging is enabled.Remote logging hostslog-server

list

log list [debug]

List the files in the log directory with the date each file was last modified and the size of each file.

Output Definitions (Without Debug Option)

messagesThe system log, generated from Data Domain system actions and general system operations.

space.logMessages about disk space usage by Data Domain system components and data storage, and messages from the clean process. A space use message is generated every hour. Each time the clean process runs, it creates approximately 100 messages. All messages are in comma-separated-value format with tags you can use to separate the disk space or messages from the clean process. You can use third-party software to analyze either set of messages. The tags are:

CLEAN for data lines from clean operations.

CLEAN_HEADER for lines that contain headers for the clean operations data lines.

SPACE for disk space data lines.

SPACE_HEADER for lines that contain headers for the disk space data lines.

Output Definitions (With Debug Option)

accessTrack users of the Data Domain Enterprise Manager graphical user interface.

boot.logKernel diagnostic messages generated during the boot process.

ddfs.infoDebugging information created by the filesystem processes.

ddfs.memstatMemory debugging information for filesystem processes.

log 157

Page 158: DD OS 5.2 Command Reference Guide

destroy.id_number.logAll actions taken by an instance of the filesys destroy command. Each instance produces a log with a unique ID number.

disk-error-logDisk error messages.

error

List errors generated by the Data Domain Enterprise Manager operations.

kern.errorKernel error messages.

kern.infoKernel information messages.

networkMessages from network connection requests and operations.

perf.logPerformance statistics used by Data Domain Support for system tuning.

secureMessages from unsuccessful logins and changes to user accounts.

ssi_requestMessages from the Data Domain Enterprise Manager when users connect with HTTPS.

windowsMessages about CIFS-related activity from CIFS clients attempting to connect to the Data Domain system.

Example

To list all of the files in the log directory:

# log list

Last modified Size File

------------------------ ------- ----------

Thu Jul 29 16:37:47 2011 716 KB messages

Thu Jul 29 16:00:02 2011 9931 KB space.log

Sun Jul 25 00:00:02 2011 541 KB messages.1

Sun Jul 18 00:00:02 2011 450 KB messages.2

Sun Jul 11 01:29:58 2011 447 KB messages.3

Sun Jul 4 00:00:01 2011 179 KB messages.4

------------------------ ------- ----------

KiB = Kibibytes = the binary equivalent of Kilobytes.

158 EMC DD OS 5.2 Command Reference Guide

Page 159: DD OS 5.2 Command Reference Guide

view

log view [<filename>]

View the log files. When viewing the log, use the up and down arrows to scroll through the file. Use the q key to quit. Enter a slash (/) to search forward or a question mark (?) to search backward for a pattern such as a date. If filename is not included, the command displays the current messages file.

watch

log watch [<filename>]

View new message entries as they occur. Use Ctrl-C to stop the display. If a filename is not included, the command displays the current messages file.

Additional TopicsThis section provides additional information on various topics and concepts.

Understanding a Log Message

1. View the log file by entering the command options log view message, or log view. Output resembles:

July 27 10:28:11 syrah19 bootbin: NOTICE: MSG-SMTOOL-00006: No replication throttle schedules found: setting throttle to unlimited.

2. Look for the file of log messages. Descriptions of log messages are available on the Data Domain Support portal in the Error Message Catalog.

3. In the Web page of log messages, search for the message MSG-SMTOOL-00006. The following information displays:

ID: MSG-SMTOOL-00006 - Severity: NOTICE - Audience: customer

Message: No replication throttle schedules found: setting throttle to unlimited.

Description: The restorer cannot find a replication throttle schedule. Replication is running with throttle set to unlimited.

Action: To set a replication throttle schedule, run the replication throttle add command.

4. Follow the instructions indicated by “Action:” to correct the error.

log 159

Page 160: DD OS 5.2 Command Reference Guide

Archiving Log Files

To archive log files, use NFS, CIFS mount, or FTP to copy the files to another machine. If using CIFS or NFS, mount /ddvar to your desktop and copy the files from the mount point.

If using FTP:

1. On the Data Domain system, use the adminaccess show command to verify that the FTP service is enabled. If the service is not enabled, use the command adminaccess enable ftp.

2. On the Data Domain system, enter adminaccess show to see that the FTP access list includes the IP or class-C address of your remote machine. If not in the list, enter adminaccess add ftp ipaddr to add the address.

3. Open a Web browser on the remote machine.

4. In the Address box, use FTP to access the Data Domain system:

ftp://<Data_Domain_system_name>.yourcompany.com/

5. Some Web browsers do not request a login if a system does not accept anonymous logins. In that case, add a user name and password to the FTP line:

ftp://sysadmin:your-pw@ <Data_Domain_system_name>.yourcompany.com/

6. Log in to the Data Domain system as sysadmin.

7. On the Data Domain system, you are in the directory just above the log directory. Open the log directory to list the messages files.

8. Copy the file to save. Right-click on the file icon and select Copy To Folder from the menu. Choose a location for the file copy.

9. To disable the FTP service on the Data Domain system, use SSH to log in to the Data Domain system as sysadmin and run the command option adminaccess disable ftp.

160 EMC DD OS 5.2 Command Reference Guide

Page 161: DD OS 5.2 Command Reference Guide

migration

The migration command copies all data from one Data Domain system to another. Use the command when upgrading to a larger capacity Data Domain system. Migration is typically performed in a LAN environment.

Migration may also be used to copy replication configurations, known as “contexts.” See the EMC DD OS Administration Guide for instructions.

Options include:

abort

commit

receive

send

show stats

status

watch

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

All data under /backup is migrated and exists on both systems after migration.

After migrating replication contexts, the contexts remain on the source. You must break replication contexts on the migration source after the process is completed. See “Migration During Directory Replication” for details.

For best results, avoid backup operations to a migration source during a migration operation.

A migration destination does not require a Replication license or Encryption license unless the source system is licensed for those software options.

Version Change

5.2 No changes from previous version.

migration 161

Page 162: DD OS 5.2 Command Reference Guide

With the exception of collection replication, the migration destination must have equal or larger capacity than the used space on the migration source.

The migration destination must have an empty filesystem.

Any setting of the system’s replication throttle also applies to migration. If the migration source has throttle settings, use the replication throttle set override command to set the throttle to the maximum (unlimited) before starting migration.

The procedure for migrating from an encryption-enabled source requires additional steps. See “Migration With Encryption-Enabled Source” in “Additional Topics” for instructions.

OptionsThe following options are available with this command.

abort

migration abort

Stop a migration process and return the Data Domain system to its previous state. If the migration source is part of a replication pair, replication is restarted. Run the command option on the migration source and destination.

Using the migration abort command option on a destination system requires running the filesys destroy command option on the destination before the filesystem can be reenabled.

Following a migration abort procedure the password on the destination system is the same as the password on the migration source.

commit

migration commit

Limit migration to data received by the source at the time the command is entered. You can enter the command and limit the migration of new data any time after entering the migration send command. All data on the source Data Domain system at the time of the commit command. After the commit operation, including new data for contexts migrated to the destination, is sent only to the destination

Write access to the source is blocked after you enter the migration commit command and during the time required to complete migration. After the migration process is finished, the source is opened for write access, but new data is no longer migrated to the destination.

162 EMC DD OS 5.2 Command Reference Guide

Page 163: DD OS 5.2 Command Reference Guide

receive

migration receive source-host <src-hostname>

Prepare a Data Domain system to be a migration destination. When preparing the destination, do not run the filesys enable command.

Run this option under the following conditions:

On the migration destination only.

Before entering the migration send command on the migration source.

After running the filesys destroy and filesys create operations on the destination.

Example

To prepare a destination for migration from the source hostA:

# filesys destroy

# filesys create

# migration receive source-host hostA

send

migration send {<obj-spec-list> | all} destination-host <dst-hostname>

Start migration.

Use the command option under the following conditions:

Only on the migration source.

Only when no backup data is being sent to the migration source.

After entering the migration receive command on the destination.

The <obj-spec-list> is /backup for systems that do not have a replication license. With replication, this argument represents one or more contexts from the migration source. After you migrate a context, all data from the context remains on the source system, but the context configuration is moved to the migration destination.

A context in the obj-spec-list can be:

The destination string, as defined when setting up replication. For example:

dir://hostB/backup/dir2

col://hostB

pool://hostB/pool2

migration 163

Page 164: DD OS 5.2 Command Reference Guide

The context number, such as rctx://2, as shown in output from the replication status command option.

The keyword all, which migrates all contexts from the migration source to the destination.

New data written to the source is marked for migration until you enter the migration commit command. New data written to the source after a migration commit command is

not migrated. Note that write access to the source is blocked from the time a migration commit command is given until the migration process concludes.

The migration send command stays open until a migration commit command is entered. Enter the migration commit command on the migration source first, and then on the destination.

With the exception of licenses and key-manager settings, all data on the migration source is always migrated, even when a single directory replication context is specified in the command option.

Example 1

To start migration of data only (excluding replication contexts, even if replication contexts are configured) to a migration destination named hostC:

# migration send /backup destination-host hostC

Example 2

To start a migration that includes a collection replication context (replication destination string) of col://hostB:

# migration send col://hostB destination-host hostC

Example 3

To start migration with a directory replication context of dir://hostB/backup/dir2:

# migration send dir://hostB/backup/dir2 destination-host hostC

Example 4

To start migration with two replication contexts using context numbers 2 and 3:

# migration send rctx://2 rctx://3 destination-host hostC

Example 5

To migrate all replication contexts:

# migration send all destination-host hostC

164 EMC DD OS 5.2 Command Reference Guide

Page 165: DD OS 5.2 Command Reference Guide

show stats

migration show stats

Display migration statistics during the migration process.

Example

# migration show stats

--------------------------------------------------------------------------------------------------------------

Destination Bytes Sent Bytes Received

Received Time

hostB 153687473704 1974621040 Mon March 29 14 09:37

--------------------------------------------------------------------------------------------------------------

Processed

Time

-----------------------------------

Mon March 29 14 09:37

------------------------------------

Output Definitions

Bytes SentThe total number of bytes sent from the migration source. The value includes backup data, overhead, and network overhead. On the destination, the value includes overhead and network overhead. Use the value (and the next value, Bytes Received) to estimate network traffic generated by migration.

Bytes ReceivedThe total number of bytes received at the destination. On the destination, the value includes data, overhead, and network overhead. On the source, the value includes overhead and network overhead. Use the value (and the previous value) to estimate network traffic generated by migration.

Received TimeThe date and time when the most recent records were received.

Processed TimeThe date and time when the most recent records were processed.

status

migration status

Display the current status of migration.

migration 165

Page 166: DD OS 5.2 Command Reference Guide

Example

# migration status

CTX: 0Mode: migration sourceDestination: hostBEnabled: yesLocal file system status enabledConnection connected since Tue Jul 17 15:20:09State: migrating 3/3 60%Error: no errorDestination lag: 0Current throttle: unlimitedContexts under migration: dir://hostA/backup/dir2

watch

migration watch

Track the initial phase of migration (when write access is blocked). The command output shows the percentage of the migration process that has been completed.

Additional TopicsThis section provides additional information on various topics and concepts.

Migration With Encryption-Enabled Source

If the migration source has encryption enabled, you must perform the following tasks on the destination before starting the migration process.

1. Add the Encryption license:

# license add <license-code>

2. Enable encryption. This command prompts you for a passphrase. Use the same passphrase as the migration source:

# filesys encryption enable

3. After running the encryption enable command, restart the filesystem:

# filesys restart

If the migration source has DPM key manager configured and enabled, clear the DPM attributes on the destination:

# filesys disable

# filesys encryption key-manager reset

# filesys restart

166 EMC DD OS 5.2 Command Reference Guide

Page 167: DD OS 5.2 Command Reference Guide

After migration concludes, configure the DPM attributes on the destination to be the same as the DPM attributes on the migration source, and then enable the DPM key manager.

See the commands filesys encryption key-manager enable and filesys encryption key-manager set in “filesys” for more information.

Migrating Between Source and Destination

To migrate data from hostA, to a destination, hostB (steps do not apply to replication contexts):

1. On hostB (the destination), enter:

# filesys disable

# filesys destroy

# filesys create

# migration receive source-host hostA

2. On hostA (the source), enter:

# migration send /backup destination-host hostB

3. On either host, enter:

# migration watch

4. At the appropriate time for your site, create a migration end point. Note that three phases of migration may take many hours. During that time, new data sent to the source is also marked for migration.

5. After the three migration phases are finished, enter the following command on hostA first, and then on the destination, hostB:

# migration commit

Migration During Directory Replication

The following example describes how to migrate data and a context from a source, hostA, to a destination, hostC, when hostA is also a directory replication source for hostB.

1. On hostC (the migration destination), enter:

# filesys disable

# filesys destroy

# filesys create

# migration receive source-host hostA

migration 167

Page 168: DD OS 5.2 Command Reference Guide

2. On hostA (the migration and replication source), enter:

# migration send dir://hostB/backup/dir2 destination-host hostC

Note that this command also disables the filesystem.

3. On the source migration host, enter:

# migration watch

4. First on hostA and then on hostC, enter:

# migration commit

Note that this command also disables the filesystem.

5. On hostB (the replication destination), enter the following command options to change the replication source to hostC:

# filesys disable

# replication modify dir://hostB/backup/dir2 source-host hostC

# filesys enable

168 EMC DD OS 5.2 Command Reference Guide

Page 169: DD OS 5.2 Command Reference Guide

mtree

The mtree command enables operations on a single “managed tree” (MTree) of a filesystem. An MTree is a logical partition of the namespace in the filesystem that can group together a set of files for management purposes; for example, snapshot schedules, replication, or retention locking. An MTree can be a directory subtree or a VTL tape pool, and the files of an MTree can span the collection of active and archive storage tiers in a DD Extended Retention system.

Previously, users could not manage the amount of storage space for an MTree. If a Data Domain system had several MTrees, a single MTree could use all of the storage space on the system, depleting the storage space for other MTrees. Users can now restrict storage space for MTrees by setting quota limits during the creation of MTrees. See “quota” for additional information.

Options include:

create

delete

list

rename

retention-lock

show compression

undelete

mtree 169

Page 170: DD OS 5.2 Command Reference Guide

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

A single controller supports a maximum of 100 MTrees; however, system performance may degrade if the number of MTrees simultaneously engaged in read or write streams exceeds 14. For best results, limit the number of active MTrees to 14, and, when possible, consolidate operations on the same MTree into one operation.

MTrees cannot be created if the maximum of 100 has been reached or if there is no available space.

MTree quotas cannot be set on the /data/col1/backup directory.

The maximum quota value is 4096 PiB.

Quota limits are pre-compressed values.

The default setting for MTree quota limits is disabled.

On a DD Extended Retention system (previously DD860 Archiver), MTree quota limits are set for the active tier only.

See “Additional Topics” for the list of characters supported for naming MTrees.

Version Change

5.2 Modified command options:

mtree create <mtree-path> [quota-soft-limit <n> {MiB|GiB|TiB|PiB}] [quota-hard-limit <n> {MiB|GiB|TiB|PiB}]

mtree retention-lock enable mode {compliance | governance} mtree <mtree-path>

mtree list [<mtree-path>]

170 EMC DD OS 5.2 Command Reference Guide

Page 171: DD OS 5.2 Command Reference Guide

OptionsThe following options are available with this command.

create

mtree create <mtree-path> [quota-soft-limit <n> {MiB|GiB|TiB|PiB}] [quota-hard-limit <n> {MiB|GiB|TiB|PiB}]

Create an MTree under the specified path. The format of the <mtree-path> is /data/col1/<mtree-name>. An error message notifies you to enter a different name if another MTree with the same name exists, if the new name is formatted incorrectly, or if the destination MTree does not exist.

Quotas can only be set during the creation of MTrees. If no quota option specified, the default is unlimited for both soft and hard limits, meaning there are no quota limits.

When setting quota limits, a warning appears if the new limit is lower than the current space usage of the MTree. The command does not fail, but subsequent writes to the MTree are rejected. An error message appears if you are setting a soft limit that is greater than or equal to the hard limit. When the hard limit is reached for an MTree quota, write operations stop and the MTree becomes read-only.

Example 1

To create MTree /data/col1/backup1 with no quota limits:

# mtree create /data/col1/backup1

MTree "/data/col1/backup1" created successfully

Quota soft limit: none, hard limit: none

Note: Quota is disabled. Quota limits not enforced.

Example 2

To set a soft limit quota of 10 GiB on MTree /data/col1/backup1:

# mtree create /data/col1/backup1 quota-soft-limit 10 GiB

MTree "/data/col1/backup1" created successfully.

/data/col1/backup1: Quota soft limit: 10240 MiB, hard limit: unlimited

Example 3

To set a hard limit quota of 10 TiB on MTree /data/col1/backup2:

# mtree create /data/col1/backup2 quota-hard-limit 10 TiB

MTree "/data/col1/backup2" created successfully.

/data/col1/backup2: Quota soft limit: none, hard limit: 1048576 MiB

mtree 171

Page 172: DD OS 5.2 Command Reference Guide

Example 4

To set a soft limit quota of 100GiB and a hard limit quota of 1TiB on MTree /data/col1/backup3:

# mtree create /data/col1/backup3 quota-soft-limit 100 GiBquota-hard-limit 1 TiB

MTree "/data/col1/backup3" created successfully.

/data/col1/backup3: Quota soft limit: 102400 MiB , hard limit: 1048576 MiB

delete

mtree delete <mtree-path>

Delete the specified MTree (denoted by the pathname). MTrees marked for deletion remain in the filesystem until the filesys clean command is run. You can revert the marked-for-deletion state of that MTree by running the mtree undelete command. See “undelete” for details.

This command option is allowed on Retention Lock Compliance systems and on Retention Lock Governance MTrees only. It is not allowed on Retention Lock Compliance MTrees. See the EMC Data Domain Administrator’s Guide for details on Retention Lock Compliance and Governance.

Effects of deleting an MTree include:

The MTree appears in the output of the mtree list command option and is marked with the status value D.

File service to a deleted MTree is rejected. Deleted MTrees are not visible through NFS or CIFS clients.

When an MTree is removed from the filesystem, snapshots associated with that MTree are also deleted from the /data/col1/<mtree-name>/.snapshot/ directory or the /backup/.snapshot/ directory.

Example

# mtree delete /data/col1/myMTree

MTree "/data/col1/myMTree" has been deleted.

list

mtree list [<mtree-path>]

Display the list of MTrees.

172 EMC DD OS 5.2 Command Reference Guide

Page 173: DD OS 5.2 Command Reference Guide

Argument Definitions

<mtree-path> (Optional)Display MTrees under the specified path only. This command supports the asterisk (*) wildcard character in the MTree pathname. Values include:

/data/col1/mtree1

/data/col1/mtree*

*mtree*

Example

# mtree list

Name Pre-Comp (GiB) Status

----------------------------------------------------------------------------

/data/col1/backup 7.7 RW/Q/RLGE

/data/col1/backup1 9.5 RW

/data/col1/backup2 0.0 RW

----------------------------------------------------------------------------

Output Definitions

Output includes the MTree pathname, precompression, and status. Status is based on pre-defined values:

DMarked for deletion. MTree will be removed from the filesystem by the filesys clean command. Can be unmarked for deletion by using the mtree undelete command only if the filesys clean command has not been run.

QQuota defined.

RORead-only access.

RW

Read/write access.

RDReplication destination.

RLCERetention Lock Compliance enabled.

mtree 173

Page 174: DD OS 5.2 Command Reference Guide

RLGE

Retention Lock Governance enabled.

RLGDRetention Lock Governance disabled.

rename

mtree rename <mtree-path> <new-mtree-path>

Rename the specified MTree. Note that /data/col1/backup cannot be renamed. Retention Lock Governance or Retention Lock Compliance MTrees can only be renamed if they are empty.

This command option requires security officer authorization if Retention Lock Compliance is enabled on the specified MTree.

Example 1

To rename the MTree from /data/col1/gov_1 to /data/col1/gov_1x, enter:

# mtree rename /data/col1/gov_1 /data/col1/gov_1x

If there are any NFS exports, CIFS shares, VTL tapes, DDBOOST storage-units or Replication Contexts configured for this MTree, they need to be manually edited to reflect the new MTree name. Do you wish to continue?

Are you sure? (yes|no|?) [no]: yes

ok, proceeding.

**** MTree "/data/col1/gov_1" has retention-lock configuration, can be renamed

only if it is empty.

Example 2

# mtree rename /data/col1/com_1 /data/col1/com_1x

This command requires authorization by a user having a 'security' role.

Please present credentials for such a user below.

Username: sec

Password:

If there are any NFS exports, CIFS shares, VTL tapes, DDBOOST storage-units or

Replication Contexts configured for this MTree, they need to be manually edited

to reflect the new MTree name. DO you wish to continue?

Are you sure? (yes|no|?) [no]: yes

ok, proceeding.

**** MTree "/data/col1/com_1" has retention-lock configuration, can be renamed

only if it is empty.

174 EMC DD OS 5.2 Command Reference Guide

Page 175: DD OS 5.2 Command Reference Guide

retention-lock

mtree retention-lock disable mtree <mtree-path>

Disable Retention Lock for the specified MTree. This command option is allowed on Retention Lock Governance MTrees only. It is not allowed on Retention Lock Compliance MTrees. See the EMC Data Domain Administrator’s Guide for details on Retention Lock Compliance and Governance.

mtree retention-lock enable mode {compliance | governance} mtree <mtree-path>

Enable Retention Lock for the specified MTree. Use the compliance argument to meet the strictest data permanence regulatory standards, such as those ofSEC17a-4f. Enabling Retention Lock Compliance requires security officer authorization.

Use the governance argument to propagate the same protection provided in the previous release of DD OS. The level of security protection is lower than Retention Lock Compliance.

When Retention Lock is enabled on an MTree, any file in the MTree may become locked by setting its <atime> to the future. Additionally, renaming a non-empty directory in the MTree is disabled. See the EMC Data Domain Administration Guide for details Retention Lock Compliance and Governance, and for instructions on setting retention time.

mtree retention-lock reset {min-retention-period | max-retention-period} mtree <mtree-path>

Reset the minimum or maximum retention period for the specified MTree to its default value. The command option is allowed on systems with Retention Lock Compliance enabled, and on MTrees with Retention Lock Governance enabled. However, users cannot reset the minimum (12 hours) or maximum (5 years) retention periods on MTrees enabled with Retention Lock Compliance. See the EMC Data Domain Administrator’s Guide for details on Retention Lock Compliance and Governance and for instructions on setting retention time.

mtree retention-lock revert <path>

Revert all Retention Lock files in a specified path to non-Retention Lock files. Note that directories and files within Retention Lock Compliance Mtrees cannot be reverted.

The base of the path must be /data/col1/<mtree-name>/ or /backup/.

Reverting Retention Lock Compliance or Governance generates a Data Domain system alert (at the “Alert” severity level) and logs the names of the reset files. Data Domain recommends when a recipient receives the alert, he or she confirms the reset operation was intended.

mtree 175

Page 176: DD OS 5.2 Command Reference Guide

mtree retention-lock set {min-retention-period | max-retention-period} <period> mtree <mtree-path>

Set the minimum or maximum retention period for the specified MTree. This command option requires security officer authorization if Retention Lock Compliance is enabled on the specified MTree.

Users cannot set the minimum retention period to fewer than 12 hours (shown in output as 720 minutes). Doing so generates a message notifying the user that the entry was invalid and stating the minimum retention period allowed.

When setting the lock period for Retention Lock Compliance MTrees, users cannot set the period to be less than the minimum or maximum period allowed. Doing so generates a message notifying the user that the entry was invalid and stating the minimum or maximum retention period allowed.

The retention period is specified in the format [number] [unit]. Possible unit values are:

min

hr

day

mo

year

The period cannot be more than 70 years. Specifying a value greater than 70 years results in an error. By default, the min-retention-period is 12 hours and the max-retention-period is 5 years.

Example

To set the min-retention-period to 24 months for mtree1:

# mtree retention-lock set min-retention-period 24mo mtree /data/col1/mtree1

mtree retention-lock show {min-retention-period | max-retention-period} mtree <mtree-path>

Show the minimum or maximum retention period for the specified MTree.

mtree retention-lock status mtree <mtree-path>

Show Retention Lock status for the specified MTree. Possible values are enabled, disabled, previously enabled, and MTree Retention Lock mode: Compliance or Governance.

176 EMC DD OS 5.2 Command Reference Guide

Page 177: DD OS 5.2 Command Reference Guide

show compression

mtree show compression <mtree-path> [tier {active | archive}] [summary | daily | daily-detailed] {[last <n> { hours | days | weeks | months }] | [start <date> [end <date>]]}

Display compression statistics for a specific MTree. Values are reported in Gigibytes (GiB). Running the command without arguments generates default output that displays a summary of compression statistics for all files and directories in the filesystem for the last 7 days and the last 24 hours.

Argument Definitions

<mtree-path>The pathname of the MTree for which to display compression statistics.

tier {active | archive}Display results for the specified tier.

summary (Optional)Display all compression statistics, summarized as:

Data written in the last 7 days. By including the last <n> option or the start <date> option, you can display statistics for a time frame other than the last 7 days.

Data written in the last 24 hours.

daily (Optional)

In addition to the summary output, display detailed information for each day, over the previous four full weeks, plus the current partial week. This option is not available if you specify a file or directory name.

daily-detailed (Optional)

Display the daily output and include the following information for each day. This option is not available if you specify a file or directory name.

last <n> {hours | days | weeks | months} (Optional)

In the summary portion of the output, display filesystem compression statistics for the specified time frame instead of for the past 7 hours. The statistics for the last 24 hours remain in the summary output. If you specify a file or directory name, you cannot use this option with the weeks keyword or the months keyword.

start <date> (Optional)

In the summary portion of the output, display filesystem compression statistics for the time frame that begins on the specified day instead of the past 7 hours. The statistics for the last 24 hours remain in the summary output. If you specify a time frame less than the previous four weeks, plus the current full week, the daily or daily-detailed output (if specified) is truncated to the shorter time frame.

mtree 177

Page 178: DD OS 5.2 Command Reference Guide

Specify <date> in the format <yyyy>-<mm>-<dd> (for example, 2011-04-07). By default, the last day of the time frame specified with this argument is the most recent, full day elapsed.

end <date> (Optional)

Valid only if the start option is used. In the summary portion of the output, display filesystem compression statistics for the time frame that ends on the specified day.

Example

# mtree show compression /data/col1/backup

Active Tier:

Pre-Comp Post-Comp Global-Comp Local-Comp Total-Comp

(GiB) (GiB) Factor Factor Factor

(Reduction %)

-----------------------------------------------------------------------------------------------------------------------------------

Written:

Last 7 days 20.3 9.4 1.0x 2.2x 2.2x (53.6)

Last 24 hrs

-----------------------------------------------------------------------------------------------------------------------------------

Archive Tier:

Pre-Comp Post-Comp Global-Comp Local-Comp Total-Comp

(GiB) (GiB) Factor Factor Factor

(Reduction %)

-----------------------------------------------------------------------------------------------------------------------------------

Written:

Last 7 days 15.2 7.1 1.0x 2.2x 2.2x (53.6)

Last 24 hrs

-----------------------------------------------------------------------------------------------------------------------------------

Key:

Pre-Comp = Data written before compression

Post-Comp = Storage used after compression

Global-Comp Factor = Pre-Comp / (size after de-dupe)

Local-Comp Factor = (Size after de-dupe) / Post-Comp

Total-Comp Factor = Pre-Comp / Post-Comp

Reduction % = (Pre-Comp - Post-Comp) / Pre-Comp) * 100

178 EMC DD OS 5.2 Command Reference Guide

Page 179: DD OS 5.2 Command Reference Guide

undelete

mtree undelete <mtree-path>

Mark as not deleted any marked-for-deletion MTrees under the specified path. This command reverses a previous mtree delete command.

Example

To reverse a previous mtree delete command request that included the MTree at /data/col1/myMTree:

# mtree undelete /data/col1/myMTree

MTree "/data/col1/myMTree" has been undeleted.

Additional TopicsThis section provides additional information on various topics and concepts.

Supported Characters

In addition to letters A–Z, a–z, numbers 0–9, and a single embedded space(non-leading), characters supported for creating MTree names include:

! exclamation point

# number sign

$ dollar sign

% percentage

& ampersand

@ “at” symbol

^ caret

~ tilde

( left parenthesis

) right parenthesis

[ left bracket

] right bracket

{ left curly brace

mtree 179

Page 180: DD OS 5.2 Command Reference Guide

} right curly brace

. period

, comma

; semicolon

‘ single quotation mark (slanted)

' single quotation mark (unslanted)

+ plus sign

= equal sign

180 EMC DD OS 5.2 Command Reference Guide

Page 181: DD OS 5.2 Command Reference Guide

ndmpd

The ndmpd command is the top-level command for the NDMP daemon running on the Data Domain system. The NDMP daemon provides access to VTL-created devices via the NDMP version 4 protocol.

Options include:

disable

enable

option

show

status

stop

user

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

This command is not supported on Extended Retention (formerly “DD860 Archiver”) systems.

OptionsThe following options are available with this command.

Version Change

5.2 No changes from previous version.

ndmpd 181

Page 182: DD OS 5.2 Command Reference Guide

disable

ndmpd disable

Disable the NDMP daemon.

enable

ndmpd enable

Enable the NDMP daemon.

option

ndmpd option reset <option name> | all

Reset all NDMP daemon options or a specific option.

set

ndmpd option set <option name> <value>

Set NDMP daemon options.

show

ndmpd option show <option name> <value>

View all NDMP daemon options or a specific option.

Example

# ndmpd option show all

Name Value

-------------- ----------

authentication text

debug disabled

port 10000

preferred-ip

-------------- ----------

ndmpd show devicenames

View the device name, VTL virtual name, SCSI vendor and product code, and the serial numbers of devices controlled by the NDMP daemon. Typically, this information is

displayed during device discovery and configuration. However, you can use this command to verify the VTL TapeServer group configuration and perform a manual configuration, if required.

182 EMC DD OS 5.2 Command Reference Guide

Page 183: DD OS 5.2 Command Reference Guide

No output in the NDMP Device column indicates the VTL service is not running, or that no devices are registered with the VTL TapeServer. A series of hyphens in the NDMP Device column indicates the VTL service is running on the system but has not registered the devices. Restart the VTL service to correct this behavior. If the problem persists, contact Data Domain Support.

Example

# ndmpd show devicenames

NDMP Device Virtual Name Vendor Product Serial Number

-------------------------------------------------------------------------------------------------------------------------------------

/dev/dd_ch_c0t0l0 dd660-16 changer STK L180 6290820000

/dev/dd_st_c0t1l0 dd660-16 drive 1 IBM ULTRIUM-TD3 6290820001

/dev/dd_st_c0t2l0 dd660-16 drive 2 IBM ULTRIUM-TD3 6290820002

/dev/dd_st_c0t3l0 dd660-16 drive 3 IBM ULTRIUM-TD3 6290820003

-------------------------------------------------------------------------------------------------------------------------------------

ndmpd show sessions

View active sessions.

Example

# ndmpd show sessions

Session ID Remote IP:Port

--------------- -----------------------------

1 10.24.28.18:32000

3 192.168.200.100:1123

250 172.16.254.1:666

23041 137.69.76.212:1904

ndmpd show stats <session-id> | all

Use this command to view statistics of a a single session or all sessions. Session numbers are obtained from the command ndmpd show sessions.

Example

# ndmpd show stats 23041

Key Value

---------------------------- -------------------

Session ID 23041

Remote IP:Port 137.69.76.212:1904

Time connected 00:00:06

Authorized True

SCSI device no device opened

SCSI Controller -1

ndmpd 183

Page 184: DD OS 5.2 Command Reference Guide

SCSI target id -1

SCSI LUN -1

Tape device /dev/dd_st_c0t5l0

Tape file number 0

Tape soft errors 0

Tape block size 0

Tape block number 0

Tape total space 0

Tape space remaining 0

Mover mode noaction

Mover state idle

Mover pause reason n/a

...

----------------------------- ------------------

Output truncated.

status

ndmpd status

Display the NDMP daemon status.

Example

# ndmpd status

NDMP daemon admin_state: enabled, process_state: running, vtl licensed

stop

ndmpd stop session <session-id> | all

Stop all sessions or a single session.

user

ndmpd user add <user name> [ password <password> ]

Add one (only) user name and password for the NDMP daemon md5 authentication. Passwords are optional but a prompt appears if a password is not provided.

ndmpd user del <user name>

Delete the configured NDMP daemon user.

184 EMC DD OS 5.2 Command Reference Guide

Page 185: DD OS 5.2 Command Reference Guide

ndmpd user modify <user name> [ password <password> ]

Modify the password for the NDMP daemon md5 user. Passwords are optional but a prompt appears if a password is not provided.

ndmpd user show

View the NDMP daemon user, but not the password.

ndmpd 185

Page 186: DD OS 5.2 Command Reference Guide

186 EMC DD OS 5.2 Command Reference Guide

Page 187: DD OS 5.2 Command Reference Guide

net

The net command manages the use of virtual interfaces, DHCP, DNS, and IP addresses, and displays network information and status.

Options include:

aggregate

config

congestion-check

create

ddns

destroy

disable

enable

failover

hosts

iperf

lookup

option

ping

reset

set

show

tcdump

troubleshooting

net 187

Page 188: DD OS 5.2 Command Reference Guide

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 New command options:

net congestion-check modify

net congestion-check run

net congestion-check start

net congestion-check status

net congestion-check stop

net iperf server start [port {<port> | congestion_check-port}] [ipversion {ipv4 | ipv6}] [window-size <bytes>]

net iperf server status

net iperf server stop

Modified command options:

net config <ifname>

net create interface {<physical-ifname> | <virtual-ifname>} {vlan <vlan-id> | alias <alias-id>}

net hosts add {<ipaddr> | <ipv6addr>} <host-list>

net hosts del {<ipaddr> | <ipv6addr>}

net iperf client {<ipaddr> | ipv6addr> | <hostname> [ipversion {ipv4 | ipv6]} } [port <port>] [window-size <bytes>] [data {random|default}] [interval <secs>] [{transmit-size <bytes> | duration <secs>}] [connections <count>] [nodelay]

net iperf server [run] [ipversion {ipv4 | ipv6}] [port {<port> | congestion_check-port}] [window-size <bytes>]]

net lookup {<ipaddr> | <ipv6addr> | <hostname>}

net ping {<ipadddr> | <ipv6addr>| <hostname> [ipversion {ipv4 | ipv6}]} [broadcast] [count <n>] [interface <ifname>]

188 EMC DD OS 5.2 Command Reference Guide

Page 189: DD OS 5.2 Command Reference Guide

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

Changes made by the net command to disabled Ethernet interfaces flush the routing table. Data Domain recommends making interface changes only during scheduled downtime. After making interface changes, you must reconfigure all routing rules and gateways.

Command options on a Global Deduplication Array (GDA) must be run on the master controller.

IPv4 is the default IP version.

OptionsThe following options are available with this command.

aggregate

net aggregate add <virtual-ifname>

mode {roundrobin | balanced hash {xor-L2 | xor-L3L4| xor-L2L3} |lacp hash {xor-L2 | xor-L3L4 | xor-L2L3}[rate {fast | slow} ] }[up {<time> | default} ][down {<time> | default} ]interfaces <physical-ifname-list>

Enable aggregation on a virtual interface by specifying the physical interfaces and mode. Choose the mode compatible with the requirements of the system to which the ports are attached. Balanced and lacp modes require a hash.

Argument Definitions

net show stats [ipversion {ipv4 | ipv6}] [all | interfaces | listening | route | statistics]

net tcpdump capture <filename> [interface <iface>] [{host <host> [ipversion {ipv4 | ipv6] | net {<ipaddr> [mask <mask>] | <ipv6addr>[/<prefixlength>]}}] [port <port>] [snaplen <bytes>]

round robin Packets are transmitted sequentially, beginning with the first available link and ending with the last link in the aggregated group.

net 189

Page 190: DD OS 5.2 Command Reference Guide

balanced Data is sent over interfaces as determined by the hash method selected. This requires the associated interfaces on the switch to be grouped into an Etherchannel (trunk). Requires a hash.

lacp A link aggregation mode based on the Link Aggregation Control Protocol (IEEE 802.3ad). From a switch perspective this configuration is always an active LACP configuration. It cannot be set to passive. Communicates with the other end to coordinate which links within the bond are available. When the this mode is selected, both ends must be configured with lacp. Requires a hash. See “More About LACP” for additional information.

rate Specifies how often an LACP message is sent to the switch or system that is connected to the Data Domain system. The message identifies the aggregated interface. This acts as a type of heartbeat. Slow sends the message once every 30 seconds. It is the default. Fast sends the message every second.

The rate determines how fast the lacp will recognize when an interface cannot be used and when it can. If 30 seconds is too long it can be set to fast (1 second), but fast means there is more traffic comprised of small packets (about the size of a TCP ACK packet) across all aggregated lacp interfaces. With 10 Gb speed consider the potential for losing connections with a rate of 30 seconds.

xor-L2 Transmission of packets on a specific slave interface is based on static balanced mode or LACP mode aggregation with an XOR hash of Layer 2 (inbound and outbound MAC addresses).

xor-L2L3 Transmission of packets on a specific slave interface is based on static balanced and LACP mode aggregation with an XOR hash of Layer 2 (inbound and outbound MAC addresses) and Layer 3 (inbound and outbound IP addresses).

xor-L3L4 Transmission of packets on a specific slave interface is based on static balanced and LACP mode aggregation with an XOR hash of Layer 3 (inbound and outbound IP addresses) and Layer 4 (inbound and outbound port numbers).

up, down The length of delay allowed before the link is considered up or down. See “More About Up/Down Arguments.”

190 EMC DD OS 5.2 Command Reference Guide

Page 191: DD OS 5.2 Command Reference Guide

Example

To enable link aggregation on virtual interface veth1 to physical interfaces eth1a and eth2a in mode lacp hash xor-L2:

# net aggregate add veth1 mode lacp hash xor-L2 interfaces eth2a eth3a

net aggregate del <virtual-ifname> interfaces <physical-ifname-list>

Delete slave interfaces from the list of the aggregate virtual interface.

Example

To delete physical interfaces eth2a and eth3a from the aggregate virtual interface veth1:

# net aggregate del veth1 interfaces eth2a,eth3a

net aggregate modify <virtual-ifname>

mode {roundrobin | balanced hash {xor-L2 | xor-L3L4| xor-L2L3} |lacp hash {xor-L2 | xor-L3L4 | xor-L2L3}[rate {fast | slow} ] }[up {<time> | default} ][down {<time> | default} ]interfaces <physical-ifname-list>

Change the aggregation configuration on a virtual interface by specifying the slave interfaces, up delay, down delay, and rate if the mode is lacp. When modify is used the specified slave interfaces are added to the virtual interface. If a slave interface is already present but not listed in the modify command, it remains a slave.

Example

Use the following command to change link aggregation on virtual interface veth1 to physical interfaces eth2a and eth3a in mode xor-L2. Stating the previous condition is not required. The listed conditions replace the previous settings except on the current slave interfaces, which remain slaves to the virtual interface.

# net aggregate modify veth1 mode xor-L2 interfaces eth2a eth3a

net aggregate reset <virtual-ifname>

Remove all physical interfaces and IP addresses from an aggregate virtual interface.

Example

# net aggregate reset veth1

Interfaces "eth2a, eth3a" and associated IP addresses have been removed from "veth1".

note This command option also removes the addresses on any associated VLAN and alias, but will leave the interfaces.

net 191

Page 192: DD OS 5.2 Command Reference Guide

net aggregate show

Display basic information on the aggregate setup.

Example

# net aggregate show

Ifname Hardware Address Aggregation Mode Configured Interfaces Up Delay Down Delay

-----------------------------------------------------------------------------------------------------------------------------------------------------------

veth1 00:15:17:0f:63:fc balance hash xor-L2 eth4a,eth5a 29700 29700

-----------------------------------------------------------------------------------------------------------------------------------------------------------

config

net config <ifname>

{[[<ipaddr>] [netmask <mask>] [dhcp {yes | no}]] | [<ipv6addr>]}{[autoneg] | [duplex {full | half} speed {10|100|1000|10000}][up | down] [mtu {<size> | default}]

Configure an Ethernet interface. Note the following guidelines:

An IP address or a DHCP may be used, but not both.

The IP address can be IPv4 or IPv6. If IPv4, it must have a netmask different from the default netmask. The netmask must be specified when the address is specified. If an IPv6 address is specified there is no associated netmask. Instead, a prefix length is used to determine the subnet. The default prefix length is 0. To use a prefix length different from 0, it must be specified with the address by adding a forward slash (/) followed by a number. For example, if the prefix length is 52, the notation would be: 2026:3456:cafe::f00d:1/52.

Anywhere a netmask can be used for IPv4, a prefix length can be used for IPv6. The limit of the MTU size is 512 - 9014 unless it is an IPv6 address. For IPv6 addresses the minimum size is 1280.

Use the up argument to bring up an interface without an IP address. Using enable will fail if no IP address is given.

note If no address is given the up option may fail because there is no registry entry for an IP address. This typically occurs after a fresh install. If this occurs, specify an address of 0 to allow a registry location to be created.

net config <ifname> type {none | management | replication | cluster}

Configure or set the type of Ethernet interface.

192 EMC DD OS 5.2 Command Reference Guide

Page 193: DD OS 5.2 Command Reference Guide

congestion-check

net congestion-check modify

[sample-interval <secs>][capture-window <secs>] [every <mins>] [detailed {on | off}] [logfile <filename>][{ iperf_client {none |

{ <iperf-server-host> | <iperf-server-ipaddr>} [nodelay <on | off>] [port {<port> | default} ][window-size <bytes>] [connections <count>] } } ]

Modify options for the congestion monitor whether or not the monitor program is activated. (The congestion monitor is activated by the net congestion-check start command.) The modify command option sets the registry information. If the congestion monitor is scheduled, the new registry values are used when it runs. If the monitor is not scheduled, the values are used as defaults when it is scheduled. Typically this command option is used after the monitor is scheduled to run and the user does not want to stop and restart the monitor.

Values for rates and error numbers are added together. Values that may go up or down, such as the capture-window, are averaged over time.

net congestion-check modify sample-interval <secs>

Specify the time that statistic information is collected. There are multiple intervals during the capture window that data is collected and the sample-interval argument determines how often this is. For example, the initial default capture-window is 60 seconds and the default sample-interval is 4 seconds. Data is collected every 4 seconds data for 60 seconds. The data collecting then stops and the information is output to the screen if the run argument is specified, or to a logfile if the start argument is specified.

If the every argument is non-zero the capture window is run again after the number of minutes specified in the every argument. The value of the sample-interval argument must be less than the value of the capture-window argument.

The run argument default is always 4 seconds. For start and modify arguments, the initial default is 4 seconds.

net congestion-check modify capture-window <secs>

Congestion data is collected only during the capture window. Outside the capture widow the program is in sleep mode or terminated depending on whether the argument every is non-zero. During the capture window data is collected during each sample interval. For example, if the capture window is 60 seconds and the sample value is 5 seconds, data is collected every 5 seconds for 60 seconds and collection stops. The output is done at the end of the 60 seconds and is one line per external IP address.

net 193

Page 194: DD OS 5.2 Command Reference Guide

The run argument default for the capture window is always 60 seconds. The initial value for the start and modify arguments is 60 seconds. After that, the default for the start argument is whatever is in the registry as with every argument. The capture-window argument must be less than the argument every and greater than the argument sample-interval.

net congestion-check modify every <mins>

Determine how often to run the capture window. If set to zero the capture window is run once only. The default for the run argument is zero, which means if the every argument is not specified only one capture window is run. For the start argument, the value of the every argument must be greater than zero because start is a monitor and must run repeatedly. The default for the initial every argument is 60 minutes, which is put into the registry. After that the default for the start argument is whatever is in the registry.

When set to non-zero, the value for the argument every must be greater than the value of the capture-window argument. The default value for the run argument is always zero. For start and modify arguments the initial default is 60 minutes.

net congestion-check modify detailed {on | off}

Typically, only basic information is saved, but setting the parameter to on causes more data to be saved. The basic setting is mainly for replication on the source system and focuses on congestion conditions between the source and destination. The detailed on argument adds receive information and other entries useful for the general network environments of the Data Domain system. For the run argument the default is always off. For start and modify arguments the initial default is off.

net congestion-check modify logfile <filename>

Set the logfile used to save the data collected. This command option is not available with the run argument because the output goes to the screen. For start and modify arguments the initial default is /ddr/var/log/default/congestion.log.

The file name should not be changed unless absolutely required. The main concern is the default file name is on a rotation system where the file size cannot exceed 10 MB and up to 10 files only are saved for a maximum of 100 MB of disk space. Changing the file name voids the space restrictions, meaning there is no limit to the space that may be taken.

net congestion-check modify iperf-client none

This command option allows iperf to run during the capture window congestion data collection. For the run argument the default value is none. For start and modify arguments the initial default is none, but if iperf is used when data is being collected, the destination name or address argument must be specified.

The iperf operation is started only at the beginning for each capture window. The remote system must have an iperf server <iperf-server-host> and specified port <port>.

194 EMC DD OS 5.2 Command Reference Guide

Page 195: DD OS 5.2 Command Reference Guide

The iperf function is typically used to determine the maximum throughput. It is disruptive of the network and should not be left on for a long time, especially if there is other traffic using the network.

Alternatives include starting iperf manually before the congestion check is performed. The advantage of letting the congestion-check handle the iperf is that the iperf is only run when the congestion-check requires it. Otherwise iperf is not running.

The none argument must be specified to tell the congestion monitor to not use iperf if iperf was previously enabled and is no longer needed.

Options for modifying or starting iperf during the capture window are:

nodelay <on | off>On equals do not wait for ACK. Off equals wait for each buffer to be sent before sending the next.

<port | default>The port number to use with iperf. Default is 5002.

[window-size <bytes>The size of the socket buffer to use. Default is 32000.

connections <count>The number of connections to use. Must be greater than zero.

net congestion-check run

[sample-interval <secs>][capture-window <secs>] [every <mins>] [detailed {on | off}] [logfile <filename>][{ iperf_client {none |

{ <iperf-server-host> | <iperf-server-ipaddr>} [nodelay <on | off>] [port {<port> | default} ][window-size <bytes>] [connections <count>] } } ]

Run the congestion check program and display the results as screen output when the capture-window time is complete. When the command option is entered with no arguments the defaults are used. When the command option includes arguments, the arguments override the defaults during the procedure but return to the configured defaults after the procedure concludes. Default values for the run command are always the same and are not affected by the net congestion-check modify or the net congestion-check start commands.

The run option default for iperf is always none. If iperf address is given the default iperf options are: nodelay = off, port = 5002, window-size = 32000, connections = 1.

net 195

Page 196: DD OS 5.2 Command Reference Guide

net congestion-check start

[sample-interval <secs>][capture-window <secs>] [every <mins>] [detailed {on | off}] [logfile <filename>][{ iperf_client {none |

{ <iperf-server-host> | <iperf-server-ipaddr>} [nodelay <on | off>] [port {<port> | default} ][window-size <bytes>] [connections <count>] } } ]

Start the congestion monitor and schedule when it is to be run using the time arguments: sample-interval, capture-window, and every. When the command option is run with arguments, the arguments override the defaults and become the default by being placed in the registry. The remaining arguments of net congestion-check start command are used to further configure how the monitor is run. The start option default for iperf is always none.

note After entering the command, there is a slight delay during which the process (netmon) actually starts the monitor. After the monitor is started the specified time arguments take over. To get information immediately, use the net congestion-check run command instead.

Output is one line per external destination. All connections to and from an external address are merged into a single line of data.

Value types from the output vary. Amounts of data or packets increase. These amounts are added together across all connections to a specific IP address to give the total value to, or from, the external location. Rates are relatively constant but are also added together to give the total flow rate to the pipe at the remote location. Other values are relatively static across all connections, such as the mss, rtt, window scale factor, or congestion window. These are given as an average with the minimum and maximum. Errors and loses are treated the same as rates and are added across all interfaces.

net congestion-check status

Display the state of the congestion monitor. The congestion monitor is started when the net congestion-check start command option is issued. The status argument displays the configured timings, the level of logging, the log file, the monitored connections, if the monitor is actually running or scheduled to run, and if iperf is specified to run. It also shows if iperf is currently running and which connections are being monitored.

196 EMC DD OS 5.2 Command Reference Guide

Page 197: DD OS 5.2 Command Reference Guide

net congestion-check stop

The congestion monitor is run when the net congestion-check start command is issued. If it is not scheduled, a message displays indicating that information to the user and no other action occurs. If the congestion monitor is scheduled, this command option unschedules the procedure. If the congestion monitor is running, this command option stops the procedure and unschedules it.

create

net create interface {<physical-ifname> | <virtual-ifname>} {vlan <vlan-id> | alias <alias-id>}

Create a VLAN interface or an IP alias interface. The VLAN is created immediately in the kernel, but the alias is not created in the kernel until an IP address is specified. The number given must be between 1 and 4094 inclusive. For the VLAN there must be a matching number on the switch or other systems to transfer packets to the interface. There is no such requirement for the alias, however it must be unique for the interface.

net create virtual veth<id>

Create a virtual interface. The virtual interface name <vlan-id> must begin with veth. The remainder of the name is a decimal. Interface names must be unique.

There are no restrictions except for the size and the number. The maximum size for an interface name is 15 characters, which includes VLAN, alias names, and the associated dot (.) and colon (:). The virtual interface name must be kept at a minimum. Even though the maximum is 9999, EMC recommends that the number used be in the range of 0 to 99.

The number of virtual interfaces cannot exceed the number of physical interfaces. For example, if there are 10 physical interfaces there can be no more than 10 virtual interfaces.

Example

To create a virtual interface named veth12:

# net create virtual veth12

ddns

net ddns add <ifname-list | all>

Add interfaces to Dynamic DNS registration list.

net ddns del <ifname-list | all>

Remove interfaces from Dynamic DNS registration list.

net 197

Page 198: DD OS 5.2 Command Reference Guide

net ddns disable

Disable Dynamic DNS updates.

net ddns enable

Enable Dynamic DNS updates.

net ddns register

Register configured interfaces with DNS.

net ddns reset

Reset Dynamic DNS registration list to auto and disable registration.

net ddns show

Show interfaces in Dynamic DNS registration list.

net ddns status

Check status of dynamic DNS registration: enabled or disabled.

destroy

net destroy {<virtual-ifname> | <vlan-ifname> | <ipalias-ifname> }

Remove a VLAN, IP alias, or virtual interface. If a virtual interface has associated VLANs and aliases, or if a VLAN has associated aliases, the associated interfaces are also destroyed when the virtual interface or VLAN interface is destroyed.

Example

To remove a VLAN named eth1a.35 and a virtual interface named veth23:2:

# net destroy eth1a.35

# net destroy veth23

disable

net disable <ifname>

Disable an Ethernet interface on the Data Domain system and bring down the interface in the kernel.

Example

To disable the interface eth0a:

# net disable eth0a

198 EMC DD OS 5.2 Command Reference Guide

Page 199: DD OS 5.2 Command Reference Guide

enable

net enable <ifname>

Enable or reenable an Ethernet interface on the Data Domain system, where <ifname> is the name of an interface. This includes bringing up the interface to the RUNNING state and requires the interface to have an IP address. The address may already be saved in the registry or may come from DHCP. If the interface does not go into the RUNNING state, the command will fail and the interface goes to the DOWN state and set to disabled.

failover

net failover add <virtual-ifname> interfaces <ifname-list> [primary <ifname>] [up {<time> | default}] [down {<time> | default}

Add network interfaces to a failover interface. Allow one failover to be set as the primary and allow the up and down delays to be set.

net failover del <virtual-ifname> interfaces <ifname-list>

Delete network interfaces from a failover interface. The freed interface remains disabled after being removed from the virtual interface. Use commas, spaces, or both to separate list entries. To delete a primary interface specify another interface as primary or set the primary be none.

Example

To remove eth2a from the virtual interface veth1, which has eth2a and eth3a as slaves and eth3a as the primary interface:

# net failover del veth1 interfaces eth2a

Interfaces "eth2a" have been removed from "veth1".

Current interfaces for veth1: eth3a, primary: eth3a

net failover modify <virtual-ifname> primary {<ifname> | none} [up {<time> | default}] [down {<time> | default}]

Modify the primary network interface, the up /down times for a failover interface, or both. A down interface must be up for the amount of <time> to be designated up. An up interface must be down for the amount of <time> to be designated down. The up and down time is given in milliseconds and is adjusted internally to increments of 900. For example, if the time you want is 10 seconds and 10000 is specified, the actual value would be 9900. The default value is 30 seconds but the actual 29.7 seconds.

A primary interface cannot be removed from failover. To remove a primary use primary <physical-ifname> none.

Example

# net failover modify veth1 up 5000 down 10000

net 199

Page 200: DD OS 5.2 Command Reference Guide

The up time value used would be 4500 (4.5 seconds) and the down time value would be 9900 (9.9 seconds).

net failover reset <virtual-ifname>

Reset a failover interface by removing associated slave interfaces. This command also removes the addresses from the virtual interfaces and the addresses of any associated interfaces such as VLANs and aliases.

Example

Use the following command to remove virtual interface veth1 and release associated physical interfaces. (The physical interfaces remain disabled and must be reenabled for any other use than as part of another virtual interface.)

# net failover reset veth1

After the virtual interface has been reset, the physical interfaces remain disabled. Use the net enable command to reenable the interfaces. If there are no IP addresses associated with these interfaces these commands will fail and using the command net config <ifname> up may be required.

# net enable eth2a

# net enable eth3a

net failover show

Display all failover interfaces. This command shows what is configured at the bonding driver. To see what is in the registry, use the net show settings command.

The registry settings may be different from the bonding configuration. After creation, when interfaces are added to the virtual interface, the information is not sent to the bonding module until the virtual interface is brought up. Until that time the registry and the bonding driver configuration differ.

hosts

net hosts add {<ipaddr> | <ipv6addr>} <host-list>

Add a host list entry. Associate an IP address with a hostname. The address can be a IPv4 or an IPv6. The hostname is a fully qualified domain name, a hostname, or an alias. The entry is added to the /etc/hosts file. Entries in the list can be separated by commas, spaces, or both.

Example

To associate the fully qualified domain name bkup20.yourcompany.com and the hostname of bkup20 with an IP address of 192.168.3.3:

# net hosts add 192.168.3.3 bkup20.yourcompany.com bkup20

200 EMC DD OS 5.2 Command Reference Guide

Page 201: DD OS 5.2 Command Reference Guide

net hosts del {<ipaddr> | <ipv6addr>}

Delete a host list entry from the /etc/hosts file.

Example

# net hosts del 192.168.3.3

net hosts reset

Clear the hosts list from the /etc/hosts file.

net hosts show

Display hostnames and IP addresses from the /etc/hosts file. All users may run this command option.

Example

# net hosts show

Hostname Mappings:

192.168.3.3 -> bkup20 bkup20.yourcompany.com

iperf

net iperf client {<ipaddr> | ipv6addr> | <hostname> [ipversion {ipv4 | ipv6]} } [port <port>] [window-size <bytes>] [data {random|default}] [interval <secs>] [{transmit-size <bytes> | duration <secs>}] [connections <count>] [nodelay]

Run iperf in client mode. If an IPv6 address is specified for the hostname, the ipversion argument must also be specified. The default is an IPv4 address.

net iperf server [run] [ipversion {ipv4 | ipv6}] [port {<port> | congestion_check-port}] [window-size <bytes>]]

Run iperf in server mode. See “Linux/DD OS Equivalent Arguments for iperf Option” to compare Linux iperf options with DD OS options. The ipversion argument may be used to specify the type of addressing.

net iperf server start [port {<port> | congestion_check-port}] [ipversion {ipv4 | ipv6}] [window-size <bytes>]

Run the iperf in the background in server (-s) mode. The ipversion argument may be used to specify the type of addressing.

net iperf server status

Display information about the iperf server running in the background as invoked by net_server start. This command option provides the status on if the iperf server is

running and what connections it has.

net iperf server stop

Stop iperf invoked by net_server start.

net 201

Page 202: DD OS 5.2 Command Reference Guide

lookup

net lookup {<ipaddr> | <ipv6addr> | <hostname>}

Search DNS entries. This command may be used with IPv4 or IPv6 addresses. All users may run this command option.

option

net option show

Display settings for network options.

ping

net ping {<ipadddr> | <ipv6addr>| <hostname> [ipversion {ipv4 | ipv6}]} [broadcast] [count <n>] [interface <ifname>]

Verify the Data Domain system can communicate with a remote host.

Argument Definitions

Example

To verify communication is possible with the host srvr24:

# net ping srvr24

reset

net reset {domainname | searchdomains}

Reset Data Domain system DNS servers, domain names, or host names to default settings. Requires system reboot for changes to take effect.

ipaddr An IPv4 address is specified.

ipv6addr An IPv6 address is specified.

hostname Can be converted into an IPv4 or Ipv6 depending on the ipversion argument. If ipversion argument is not specified, IPv4 is used.

broadcast Enable pinging a broadcast address (available for IPv4 only).

count <n> Number of pings to issue.

interface <ifname> Name of interface to ping.

202 EMC DD OS 5.2 Command Reference Guide

Page 203: DD OS 5.2 Command Reference Guide

Example

# net reset domainname

The Domainname is: yourcompanydomain.com

# net reset searchdomains

The Searchdomains is: yourcompanydomain.com (local domain)

net reset dns

Reset DNS list to default values. Requires system reboot for changes to take effect.

net reset hostname

Reset hostname to default values. Requires system reboot for changes to take effect.

set

net set {domainname <local-domain-name> | searchdomains <search-domain-list>}

Set the domainname or searchdomains used by the Data Domain system. The default for domainname is the return from DHCP, or what is set by net set hostname command. The default for searchdomain is the domainname name, which is always included in the list of searchdomains.

Example

# net set domainname yourcompany-ny.com

# net set searchdomains yourcompany2.com, yourcompany3.com

The searchdomains list is yourcompany-ny.com, yourcompany2.com and yourcompany3.com.

If the domain names provided cannot be resolved, a warning is displayed:

Warning: Following domains are not resolvable; please check the names and DNS configuration.

net set dns <ipv4-ipv6-addr-list>

Set the DNS server list using IP version 4 or IP version 6. This command overwrites the current list of DNS servers. Only servers included in the most recently issued command are available to a Data Domain system.

net set hostname <host>

Set the hostname of the Data Domain system. Note that some browsers may prevent logins to the host if the hostname contains an underscore. Data Domain recommends using hostnames without underscores to ensure the GUI can recognize and manage the host.

net 203

Page 204: DD OS 5.2 Command Reference Guide

note If the Data Domain system is using CIFS with Active Directory authentication, changing the hostname causes the Data Domain system to drop out of the domain. Use the cifs set authentication command option to rejoin the Active Directory domain.

net set portnaming {slot-based | legacy}

Change the port naming scheme.

show

net show all

Display all networking information, including IPv4 and IPv6 addresses. Some IPv6 addresses are automatically assigned to interfaces, either linklocal or router-generated addresses. Auto-assigned addresses are displayed with the kernel information but not with the registry settings, as in the net show settings command, because they do not exist in the registry. This type of address cannot be changed or modified.

Example

# net show all

Active Network Configuration:

eth0 Link encap:Ethernet HWaddr 00:15:17:A3:9F:98

inet addr:192.168.8.175 Bcast:192.168.11.255 Mask:255.255.252.0

UP BROADCAST NOTRAILERS RUNNING MULTICAST MTU:1500 Metric:1

RX packets:339424667 errors:0 dropped:8563092 overruns:0 frame:0

TX packets:25770836 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

RX bytes:52040424455 (48.4 GiB) TX bytes:2155985162 (2.0 GiB)

eth1 Link encap:Ethernet HWaddr 00:15:17:A3:9F:99

BROADCAST MULTICAST MTU:1500 Metric:1

RX packets:0 errors:0 dropped:0 overruns:0 frame:0

TX packets:0 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)

204 EMC DD OS 5.2 Command Reference Guide

Page 205: DD OS 5.2 Command Reference Guide

Network Settings:

port enabled DHCP IP address netmask type additional setting

---------------------------------------------------------------------------------------------------------------

eth0 yes yes 192.168.8.175* 255.255.252.0* n/a

eth1 yes yes (not specified)* (not specified)* n/a

---------------------------------------------------------------------------------------------------------------

* Value from DHCP

Domainname:

The Domainname is: datadomain.com

Searchdomains:

# Searchdomains

- -----------------------------

1 datadomain.com (local domain)

- -----------------------------

The Hostname is: dd120-19.datadomain.com

DNS:

# Server

--------------------------

1 10.24.255.146

2 10.24.255.150

--------------------------

Showing DNS servers configured by DHCP.

Network Hardware:

Port Speed Duplex Supp Speeds Hardware Address Physical Link Status

------------------------------------------------------------------------------------------------------------------

eth0 1000Mb/s full 10/100/1000 00:15:17:a3:9f:98 Copper yes

eth1 unknown unknown 10/100/1000 00:15:17:a3:9f:99 Copper no

------------------------------------------------------------------------------------------------------------------

Network Stats:

Active Internet connections (w/o servers)

Proto Recv-Q Send-Q Local Address Foreign Address State

tcp 0 0 127.0.0.1:55373 127.0.0.1:3006 TIME_WAIT

tcp 0 0 127.0.0.1:56883 127.0.0.1:3006 TIME_WAIT

tcp 0 0 127.0.0.1:7995 127.0.0.1:33092 ESTABLISHED

tcp 0 0 127.0.0.1:53578 127.0.0.1:3006 TIME_WAIT

tcp 0 0 127.0.0.1:33092 127.0.0.1:7995 ESTABLISHED

tcp 0 0 127.0.0.1:57064 127.0.0.1:8002 ESTABLISHED

Output truncated.

net 205

Page 206: DD OS 5.2 Command Reference Guide

net show config [<ifname>]

Display the configuration for a specific Ethernet interface. Exclude the keyword <ifname> to view the configuration for all Ethernet interfaces. This command shows auto-generated IPv6 addresses.

In the example, the interface eth0a shows a statically assigned IPv6 address; however, because the interface cannot come up to the RUNNING state the link local and router-generated address are not available. Interface eth0b shows a IPv4 static address and two auto-generated IPv6 addresses.

Example (IPv6)

# net show config

eth0a Link encap:Ethernet HWaddr 00:A0:D1:EC:F7:41

inet6 addr: 2003:deaf::beef:face:cafe/52 Scope:Global

UP BROADCAST MULTICAST MTU:1500 Metric:1

RX packets:0 errors:0 dropped:0 overruns:0 frame:0

TX packets:0 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)

eth0b Link encap:Ethernet HWaddr 00:A0:D1:EC:F7:40

inet addr:10.25.130.165 Bcast:10.25.143.255 Mask:255.255.240.0

inet6 addr: 2620:0:170:1106:2a0:d1ff:feec:f740/64 Scope:Global

inet6 addr: fe80::2a0:d1ff:feec:f740/64 Scope:Link

UP BROADCAST NOTRAILERS RUNNING MULTICAST MTU:1500 Metric:1

RX packets:5130625 errors:0 dropped:0 overruns:0 frame:0

TX packets:7345 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

RX bytes:362880422 (346.0 MiB) TX bytes:2831694 (2.7 MiB)

net show {domainname | searchdomains}

Display the domain name or search domains used for email sent by a Data Domain system.

net show dns

Display a list of DNS servers used by the Data Domain system. The final line in the output shows if the servers were configured manually or by DHCP.

206 EMC DD OS 5.2 Command Reference Guide

Page 207: DD OS 5.2 Command Reference Guide

net show hardware

Display Ethernet port hardware information.

Example

# net show hardware

Network Hardware:

Port Speed Duplex Supp Speeds Hardware Address Physical Link Status

------------------------------------------------------------------------------------------------------------------

eth0 1000Mb/s full 10/100/1000 00:15:17:a3:9f:98 Copper yes

eth1 unknown unknown 10/100/1000 00:15:17:a3:9f:99 Copper no

------------------------------------------------------------------------------------------------------------------

Output Definitions

PortThe Ethernet interfaces on the system (for example, eth3 or eth3a, depending on the port naming convention the system uses).

SpeedThe actual speed at which the port processes data.

DuplexFull or half duplex protocol.

Supp SpeedsLists speeds the port is capable of using.

Hardware AddressThe MAC address. The IPv6 addressing scheme uses colons to separate values. IPv4 uses periods.

Physical

Copper or fibre.

net show hostname

Display the hostname of the Data Domain system.

net show settings

Display the configured Ethernet interface settings, not the status of each interface. For example, if an interface on the Data Domain system does not have a live Ethernet connection, the interface is not enabled.

net 207

Page 208: DD OS 5.2 Command Reference Guide

Example (IPv4)

# net show settings

port enabled DHCP IP address netmask type additional setting/prefix length

-------------------------------------------------------------------------------------------------------------------------------------------------------------------

eth0 yes yes 192.168.9.142* 255.255.252.0* n/a

eth1 no n/a n/a n/a n/a

eth2 no n/a n/a n/a n/a

eth3 yes n/a n/a n/a n/a bonded to veth0

eth4 yes n/a n/a n/a n/a bonded to veth1

eth5 no n/a n/a n/a n/a

eth6 no n/a n/a n/a n/a

veth0 yes n/a n/a n/a n/a bonded to veth2 / balance hash xor-L3L4: eth3

veth1 yes n/a n/a n/a n/a bonded to veth2 / balance hash xor-L3L4: eth4

veth2 yes no 30.30.30.30 255.255.255.0 n/a failover: veth0,veth1

-------------------------------------------------------------------------------------------------------------------------------------------------------------------

* Value from DHCP

Example (IPv6)

# net show settings

port enabled DHCP IP address netmask type additional setting

/prefix length

------------------------------------------------------------------------------------------------------------------------------------------------

eth0a yes no 2003:deaf::beef:face:cafe /52 n/a

eth0b yes yes 10.25.130.165* 255.255.240.0* n/a

------------------------------------------------------------------------------------------------------------------------------------------------

* Value from DHCP

208 EMC DD OS 5.2 Command Reference Guide

Page 209: DD OS 5.2 Command Reference Guide

net show stats [ipversion {ipv4 | ipv6}] [all | interfaces | listening | route | statistics]

Display network statistics. The ipversion argument shows information on IPv4 or IPv6 addresses only. The default shows all statistics, including IPv4 and IPv6 addresses.

Example 1

# net show stats all

Active Internet connections (w/o servers)

Proto Recv-Q Send-Q Local Address Foreign Address State

tcp 0 0 127.0.0.1:53968 127.0.0.1:3006 TIME_WAIT

tcp 0 0 127.0.0.1:38008 127.0.0.1:3006 ESTABLISHED

tcp 0 0 127.0.0.1:60344 127.0.0.1:3006 TIME_WAIT

tcp 0 0 192.168.8.175:601 10.25.209.6:940 TIME_WAIT

tcp 0 0 127.0.0.1:42791 127.0.0.1:3006 TIME_WAIT

tcp 0 0 127.0.0.1:7995 127.0.0.1:33092 ESTABLISHED

tcp 38 0 ::ffff:127.0.0.1:38401 ::ffff:127.0.0.1:3009 CLOSE_WAIT

Example 2

# net show stats listening

Active Internet connections (only servers)

Proto Recv-Q Send-Q Local Address Foreign Address State

tcp 0 0 *:nfs *:* LISTEN

tcp 0 0 *:pxc-ntfy *:* LISTEN

tcp 0 0 localhost.lo:teradataordbms *:* LISTEN

tcp 0 0 *:epnsdp *:* LISTEN

tcp 0 0 localhost.localdomain:8003 *:* LISTEN

tcdump

net tcpdump capture <filename> [interface <iface>] [{host <host> [ipversion {ipv4 | ipv6] | net {<ipaddr> [mask <mask>] | <ipv6addr>[/<prefixlength>]}}] [port <port>] [snaplen <bytes>]

Capture data, and then copy the output file to another system for analysis. This command converts the options from the command line to equivalent tcpdump options. Output files are placed in /ddvar/traces where you can upload them to autosupport. A maximum of 10 output files may be retained on the system. If this limit is reached, you are prompted to delete some of the files.

net tcpdump del {<filename> | all}

Delete output files created by the net tcpdump capture command. Specify a <filename> to delete files matching the pattern /ddvar/traces/tcpdump_<filename> *. Specify all to

remove all net tcpdump output files.

net 209

Page 210: DD OS 5.2 Command Reference Guide

troubleshooting

net troubleshooting duplicate-ip

Detect duplicate IP in network.

Example

# net troubleshooting duplicate-ip

Port IP Address Details

----- -------------- -----------

eth1a 11.2.1.2 duplicate ip from MAC address 00:15:17:32:33:32

eth2a.100:1 11.2.1.3 duplicate ip from MAC address 00:15:17:32:33:33

Additional TopicsThis section provides additional information on various topics and concepts.

New Support for IPv6

Federal certification requirements state that the DD OS must be IPv6-capable and that interoperability with IPv4 be maintained in an heterogeneous environment. As a result, several net command options now include arguments for both versions of Internet Protocol. EMC Data Domain customers select which version to use, based on the type of configuration.

If you do not specify an IP version, the default is IPv4 to maintain compatibility with the previous DD OS versions. The exception is show commands. If the version is not specified in the show command option (as in route show table), both address versions are displayed. To view the IPv4 routes only, you must specify the IPv4 argument.

If a command cannot determine the IP version of an address; for example, when a hostname is provided, you must enter IPv6 in the command option if the host is to be accessed using its IPv6 address.

note IPv6 addresses are not supported for replication, NFS, OST, DD Boost, and CIFS.

More About Ethernet Failover

Ethernet failover provides improved network stability and performance, and is implemented with the net failover command. The failover-enabled virtual interface represents a group of secondary physical interfaces, one of which can be specified as

the primary. The system makes the primary interface the active interface when the primary interface is operational.

210 EMC DD OS 5.2 Command Reference Guide

Page 211: DD OS 5.2 Command Reference Guide

A failover from one physical interface to another can take up to 30 seconds. The delay is to guard against multiple failovers when a network is unstable.

Guidelines

Consider the following guidelines when planning an interface failover:

For best results, a primary interface should be part of the failover. This provides a way of determining which interface is active. A primary slave cannot be removed from the bonding except in the case of net failover reset command, during which all slaves are removed.

A primary interface must be explicitly specified as the primary, and must also be a slave, to the virtual interface. To designate a physical interface as the primary failover interface, use the optional primary argument. If the primary interface goes down and multiple interfaces are available, the next interface is selected at random.

The virtual interface must be present on the system. Use the net show settings command option to confirm the presence of a virtual interface.

Enable failover on the existing virtual interface name in the form vethx, where x is a unique string (typically one or two digits). A typical full virtual interface name with and associated VLAN and alias is veth56.3999:199. The maximum name length is 15 characters, which typically limits the name string x to two characters. Special characters are not supported. Use commas, spaces, or both to separate list entries.

If a primary interface is part of the failover, it cannot be deleted from the failover while it is the primary interface. Use the net failover modify command to change the primary interface. To remove the slave from an interface, set another interface to primary or “none.”

For example, to associate a failover virtual interface named veth1 with the physical interfaces eth2a and eth3a, and to designate eth2a as the primary:

# net failover add veth1 interfaces eth2a eth3a primary eth2a

Current interfaces for veth1: eth2a, eth3a, primary eth2a

Number of Ports

The number of ports depends on the number and type of Ethernet cards, and on the system type. A system with two Ethernet cards has a maximum of six ports: eth0a, eth1a, eth2a, eth3a, eth4a, and eth5a. If one of the cards is a 1-port 10 GbE fiber, the maximum is five ports (eth0a-eth4a). A system with two quad-port NICs has a maximum 10 ports, and a system with three cards, such as DD670, has a maximum of 14 ports. If the system allows it, five network cards can be added to the system, but the absolute maximum number of physical port allowed is 20.

net 211

Page 212: DD OS 5.2 Command Reference Guide

Number of Physical Interfaces

The recommended number of physical interfaces for failover is two so as not to “waste” interfaces in a passive mode. However, you can configure one primary interface and five failover interfaces. Exceptions are 10 Gb CX4 Ethernet cards, which are restricted to one active interface and one standby interface (both slaves must be on same card), and 10 Gb optical, single-port Ethernet cards, which cannot be used in failover or aggregation. Note that the SFP+ 10 Gb interfaces do not have these restrictions.

More About the net aggregate Option

The net aggregate commands control link aggregation, which provides improved network performance and resilience by using two or more network ports in parallel. Note that link aggregation and Ethernet trunking are synonymous. The recommended and supported maximum is four ports, but there are no restrictions on the Data Domain system for having more aggregate slaves.

More About LACP

LACP uses a control protocol to determine which interfaces can be used. An interface must not only have carrier up, but also must be able to communicate with its directly attached partner. This provides a better port fail recovery than failover bonding; however, the LACP port must reside on a single switch except for special cases of virtual switch ports. Therefore to fail across switches failover bonding must be used.

More About Up/Down Arguments

A down interface must be up for interval configured in <time> to be considered up. An up interface must be down for the interval configured in <time> to be considered down and not available.

If a link is up, the interface carrier must be missing for the amount of time specified by the down argument before the link is designated down. Default for up/down times is 29.7 seconds. Up/down times are rounded down to a multiple of 0.9 seconds. For example if 10 seconds is configured, 9.9 seconds is used.

When the link is down:

Data is no longer sent to the interface.

For an aggregation bonding, aggregation is recalculated.

For a failover bonding, if the affected interface is the active interface, then the active interface is switched to another interface that is up.

212 EMC DD OS 5.2 Command Reference Guide

Page 213: DD OS 5.2 Command Reference Guide

The interface carrier must be present for the amount of time specified by the up argument before the link is designated up.

When the link is up:

Data can be sent over it.

For an aggregation bonding, the aggregation is recalculated to include the up link.

For a failover bonding, nothing more is done; however, if the up interface is the primary or sole, up slave interface, then it is also marked as the active interface.

Linux/DD OS Equivalent Arguments for iperf Option

The iperf Linux command measures the quality and bandwidth of network connections. The DD OS net iperf command provides equivalent capabilities. Values for <bytes> may be followed by the K, M, or G suffice for to scaling the value.

DD OS net iperf Option Linux iperf Option

<server-host> -c <server-host>

<port> -p <port>

window-size <bytes> -w <iperf-bytes>

transmit-size <bytes> -n <iperf-bytes>

duration <secs> -t <secs>

interval <secs> -i <secs>

data random (Data Domain version of iperf) or -F /dev/urandom-R

no delay -N

connections <count> -p <number>

none -X (Data Domain version of iperf)

net 213

Page 214: DD OS 5.2 Command Reference Guide

Linux/DD OS Equivalent Arguments for tcdump Option

The DD OS tcdump command dumps network traffic output as does the Linux tcdump command. Values for <bytes> may be followed by the K, M, or G suffice for to scaling the value.

Sample Failover Workflow

1. Disable the interfaces eth2a, eth3a, and eth4a for use as failover interfaces:

# net disable eth2a

# net disable eth3a

# net disable eth4a

2. If virtual interface veth1 does not exist on the system, create it:

# net create virtual veth1

3. Create a failover virtual interface named veth1 using the physical interfaces eth2a and eth3a:

# net failover add veth1 interfaces eth2a, eth3a

Current interfaces for veth1: eth2a, eth3a

4. Enable virtual interface veth1:

# net config veth1 10.20.199.41 netmask 255.255.0.0

DD OS net tcdump Option Linux tcdump Option

<filename> -w /ddvar/traces/tcpdump_<filename> -C 100M -W 5

interface <iface> -i <iface>

host <host> -w <iperf-bytes>

net <net> net <net>

mask <mask> mask <mask>

port <port> -i <secs>

snaplen <bytes> -s <bytes>

214 EMC DD OS 5.2 Command Reference Guide

Page 215: DD OS 5.2 Command Reference Guide

5. Show configured failover virtual interfaces:

# net failover show

Ifname Hardware Address Configured Interfaces

------ ----------------- ---------------------

veth1 00:04:23:d4:f1:27 eth2a,eth3a, active: none, primary: None

------ ----------------- ---------------------

To add the physical interface eth4a to failover virtual interface veth1:

# net failover add veth1 interfaces eth4a

Current interfaces for veth1: eth2a, eth3a, eth4a

To remove eth2a from the virtual interface veth1:

# net failover del veth1 interfaces eth2a

Interfaces "eth2a" have been removed from "veth1".

Configuration of "veth1" is reset.

To clear the virtual interface veth1 of the IP address and release the associated physical interfaces:

# net failover reset veth1

Interfaces "eth3a, eth4a" have been removed from "veth1".

Configuration of "veth1" is reset.

To reenable the physical interfaces:

# net enable eth2a

# net enable eth3a

# net enable eth4a

Sample Aggregation Workflow

1. Disable the interfaces eth2a, eth3a, and eth4a to use as aggregation interfaces:

# net disable eth2a

# net disable eth3a

# net disable eth4a

2. If virtual interface veth1 does not exist on the system, create it:

# net create virtual veth1

net 215

Page 216: DD OS 5.2 Command Reference Guide

3. Enable link aggregation on virtual interface veth1 for physical interfaces eth2a and eth3a in xor-L2 mode:

# net aggregate add veth1 mode balanced hash xor-L2 interfaces eth2a eth3a

4. Enable the virtual interface:

# net config veth1 192.168.45.119 netmask 255.255.248.0

5. Show the aggregate setup:

# net aggregate show

Ifname Hardware Address Aggregation Mode Configured Interfaces Up Delay Down Delay

-------------------------------------------------------------------------------------------------------------------------------------------------------

veth10 00:15:17:0f:63:fc balance hash xor-L2 eth2a, eth3a 29700 29700

-------------------------------------------------------------------------------------------------------------------------------------------------------

To delete physical interface eth3a from the aggregate virtual interface veth1:

# net aggregate del veth1 interfaces eth3a

To add link physical interface eth4a on virtual interface veth1:

# net aggregate add veth1 mode xor-L2 interfaces eth4a

To remove all interfaces from veth1:

# net aggregate reset veth1

Interfaces "eth2a, eth4a" have been removed from "veth1".

Configuration of "veth1" is reset.

To reenable the physical interfaces:

# net enable eth2a

# net enable eth3a

# net enable eth4a

Interface Naming Format

The interface naming format is eth<slot #><a-d>. Letters are sequential without gaps.

For onboard NIC vertical interfaces, the top or left interface is eth0a and the bottom or right interface is eth0b.

For onboard NIC horizontal interfaces, the left interface, as viewed from the rear, is

eth0a and the right is eth0b.

In configurations of four onboard interfaces, the top left interface is eth0a, the top right interface is eth0b, the bottom left interface is eth0c, and the bottom right interface is

216 EMC DD OS 5.2 Command Reference Guide

Page 217: DD OS 5.2 Command Reference Guide

eth0d. For optional cards installed vertical or horizontal, the interface at the top of the card is ethxa, the next is ethxb, the next is ethxc, and so on, until the bottom of the card where x is the slot number.

This ensures:

A method for identify the correct physical link from the logical link.

That the interface names do not change if cards are added or removed.

That the interface name is not dependent on the type of cards in the system.

When interface names prior to 4.9 are changed to the current naming structure, the associated configuration names are also changed. For example, eth1.236 becomes eth0b.236, eth1 and eth0 bonded to veth1 becomes eth0a and eth0b bonded to veth1. Note that the revised naming format is not required for virtual interfaces; however, slaves are renamed. Virtual interfaces can be removed from interface list by running the destroy option.

net 217

Page 218: DD OS 5.2 Command Reference Guide

218 EMC DD OS 5.2 Command Reference Guide

Page 219: DD OS 5.2 Command Reference Guide

nfs

The nfs command enables you to add NFS clients and manage access to a Data Domain system. It also enables you to display status information, such as verifying that the NFS system is active, and the time required for specific NFS operations.

Options include:

add

del

disable

enable

reset

show

status

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

The subdirectory /backup subdirectory is not supported in Global Deduplication Arrays (GDAs).

Separate list entries by commas, spaces, or both.

OptionsThe following options are available with this command.

Version Change

5.2 No changes from previous version.

nfs 219

Page 220: DD OS 5.2 Command Reference Guide

add

nfs add <path > <client-list> [(<option-list>)]

Add NFS clients that can access the Data Domain system. A client can be a fully qualified domain hostname, class-C IP addresses, IP addresses with netmasks or length, an NIS netgroup name with the prefix @, or an asterisk wildcard for the domain name, such as *.yourcompany.com.

An asterisk by itself means no restrictions. A client added to a subdirectory under /backup has access only to that subdirectory.

The <options-list> is comma or space separated, enclosed by parentheses. If no option is specified, the default options are rw, root_squash, no_all_squash, and secure.

In GDA configurations, only /ddvar is exported. The export of /data shares is not supported.

NFS Options

roEnable read-only permission.

rw Enable read and write permissions (default value).

root_squashMap requests from uid or gid 0 to the anonymous uid/gid.

no_root_squash Turn off root squashing (default value).

all_squashMap all user requests to the anonymous uid/gid.

no_all_squash Turn off the mapping of all user requests to the anonymous uid/gid (default value).

secure Require that requests originate on an Internet port that is less than IPPORT_RESERVED (1024) (default value).

insecure Turn off the secure option.

220 EMC DD OS 5.2 Command Reference Guide

Page 221: DD OS 5.2 Command Reference Guide

anonuid=<id>Set an explicit user ID for the anonymous account. The ID is an integer bounded from 0 to 65635.

anongid=<id>Set an explicit group ID for the anonymous account. The ID is an integer bounded from 0 to 65635.

del

nfs del <path><client-list>

Delete specific directories, including a backup subdirectory, for one or more clients. The <client-list> can contain IP addresses, hostnames, or an asterisk that represents all clients. In GDA configurations, only /ddvar is exported. The export of /data shares is not supported.

disable

nfs disable

Disable all NFS clients.

enable

nfs enable

Allow all NFS-defined clients to access the Data Domain system.

reset

nfs reset clients

Reset client list to the factory default empty. NFS clients can access the Data Domain system when the list is empty.

nfs reset stats

Clear the NFS statistics.

show

nfs show active

List clients active in the past 15 minutes and the mount path for each.

nfs 221

Page 222: DD OS 5.2 Command Reference Guide

nfs show clients

List NFS clients allowed to access the Data Domain system and the mount path and NFS options for each.

nfs show detailed-stats

Display NFS cache entries and status to facilitate troubleshooting.

nfs show histogram

Display NFS operations in a histogram. Users with user role permissions may run this command.

Example

# nfs show histogram

Op mean-ms stddev max-s 2ms 4ms 6ms 8ms 10ms 100ms 1s 10s >10s

-------------------------------------------------------------------------------------------------------------------------------------------

NULL 0.0 0.0 0.0 1 0 0 0 0 0 0 0 0

GETATTR 0.0 0.0 0.0 3 0 0 0 0 0 0 0 0

SETATTR 0.1 0.0 0.0 1 0 0 0 0 0 0 0 0

LOOKUP 0.0 0.0 0.0 20 0 0 0 0 0 0 0 0

ACCESS 0.0 0.0 0.0 3 0 0 0 0 0 0 0 0

READLINK 0.0 0.0 0.0 0 0 0 0 0 0 0 0 0

READ 0.0 0.0 0.0 0 0 0 0 0 0 0 0 0

WRITE 0.0 0.0 0.0 0 0 0 0 0 0 0 0 0

CREATE 0.0 0.0 0.0 0 0 0 0 0 0 0 0 0

MKDIR 0.0 0.0 0.0 0 0 0 0 0 0 0 0 0

SYMLINK 0.0 0.0 0.0 0 0 0 0 0 0 0 0 0

MKNOD 0.0 0.0 0.0 0 0 0 0 0 0 0 0 0

REMOVE 0.0 0.0 0.0 0 0 0 0 0 0 0 0 0

RMDIR 0.0 0.0 0.0 0 0 0 0 0 0 0 0 0

RENAME 0.0 0.0 0.0 0 0 0 0 0 0 0 0 0

LINK 0.0 0.0 0.0 0 0 0 0 0 0 0 0 0

READDIR 0.0 0.0 0.0 1 0 0 0 0 0 0 0 0

READDIRPLUS 0.0 0.0 0.0 0 0 0 0 0 0 0 0 0

...

-------------------------------------------------------------------------------------------------------------------------------------------

Output truncated.

222 EMC DD OS 5.2 Command Reference Guide

Page 223: DD OS 5.2 Command Reference Guide

Output Definitions

mean-ms The mathematical mean time for completion of the operations.

stddevThe standard deviation for time to complete operations, derived from the mean time.

max-s The maximum time taken for a single operation.

2msThe number of operations that took 2 ms or less.

4msThe number of operations that took between 2ms and 4ms.

6msThe number of operations that took between 4ms and 6ms.

8msThe number of operations that took between 6ms and 8ms.

10msThe number of operations that took between 8ms and 10ms.

100msThe number of operations that took between 10ms and 100ms.

1sThe number of operations that took between 100ms and 1 second.

10sThe number of operations that took between 1 second and 10 seconds.

>10sThe number of operations that took over 10 seconds.

nfs show port

Display NFS port information. Users with user role permissions may run this command.

nfs show stats

Display NFS statistics.

status

nfs status

Enter this option to determine if the NFS system is operational. When the filesystem is active and running, the output shows the total number of NFS requests since the filesystem started, or since the last time that the NFS statistics were reset.

nfs 223

Page 224: DD OS 5.2 Command Reference Guide

Additional TopicsThis section provides additional information on various topics and concepts.

Add or Delete NFS Clients

To add an NFS client with an IP address of 192.168.1.02 and read/write access to /backup with the secure option, enter:

# nfs add /backup 192.168.1.02

To add a subnet client using its IP address followed by a length and a netmask, enter:

# nfs add /backup 192.168.1.02/24

# nfs add /backup 192.168.1.02/255.255.255.0

To delete an NFS client with an IP address of 192.168.1.02 from the /ddvar directory, enter:

# nfs del /ddvar 192.168.1.02

224 EMC DD OS 5.2 Command Reference Guide

Page 225: DD OS 5.2 Command Reference Guide

ntp

The ntp command synchronizes a Data Domain system with an NTP time server, manages the NTP service, or turns off the local NTP server.

A Data Domain system can use a time server supplied through the default multicast operation, received from Dynamic Host Configuration Protocol (DHCP), or set manually with the Data Domain system ntp add command.

Options include:

add

del

disable

enable

reset

show

status

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

Default system settings for NTP service are enabled and multicast.

Time servers set with the ntp add command override time servers from DHCP and from multicast operations.

Time servers from DHCP override time servers from multicast operations.

Version Change

5.2 With the exception of ntp show and ntp status, ntp command options require security officer authorization when run on Retention Lock Compliance systems.

ntp 225

Page 226: DD OS 5.2 Command Reference Guide

The Data Domain system ntp del and ntp reset commands act only on manually added time servers, not on DHCP-supplied time servers. You cannot delete DHCP time servers or reset to multicast when DHCP time servers are supplied.

OptionsThe following options are available with this command.

add

ntp add timeserver <server-name>

Add a remote time server to NTP list. This command option requires security officer authorization for Retention Lock Compliance systems.

Example

To add an NTP time server named srvr26.yourcompany.com to the list, enter:

# ntp add timeserver srvr26.yourcompany.com

del

ntp del timeserver <server-name>

Delete a manually added time server from the list. This command option requires security officer authorization for Retention Lock Compliance systems.

Example

To delete an NTP time server named srvr26.yourcompany.com from the list, enter:

# ntp del timeserver srvr26.yourcompany.com

disable

ntp disable

Disable NTP service on a Data Domain system. This command option requires security officer authorization for Retention Lock Compliance systems.

enable

ntp enable

Enable NTP service on a Data Domain system. This command option requires security officer authorization for Retention Lock Compliance systems.

226 EMC DD OS 5.2 Command Reference Guide

Page 227: DD OS 5.2 Command Reference Guide

reset

ntp reset

Reset the NTP configuration to the default settings. This command option requires security officer authorization for Retention Lock Compliance systems.

ntp reset timeservers

Reset the time server list from manually entered time servers to DHCP time servers (if supplied) or to the multicast mode (if no DHCP time servers supplied). This command option requires security officer authorization for Retention Lock Compliance systems.

show

ntp show config

Display status of NTP: enabled or disabled, and show the time server list.

Example

# ntp show config

NTP is currently enabled.

# Server eth0a eth1a

-----------------------------------------------------------------

1 192.168.244.208 X

2 192.168.244.214 X

-----------------------------------------------------------------

Showing NTP servers configured by DHCP.

status

ntp status

Display the local NTP service status, time, and synchronization information. If running the command in a GDA, the output includes information about the master and worker controllers.

Example

# ntp status

Status Enabled

Current Clock Time Thu April 12 19:27:57.676 2011

Clock Last Synchronized Thu Feb 26 19:12:05.729 2010

Clock Last Synchronized With Time Server 192.168.244.208

ntp 227

Page 228: DD OS 5.2 Command Reference Guide

228 EMC DD OS 5.2 Command Reference Guide

Page 229: DD OS 5.2 Command Reference Guide

quota

The quota command enables users to modify the amount of storage space for MTrees and for VTL and DD Boost storage units. There are two quota limits: hard and soft. The hard limit prevents writes from exceeding the quota. Users receive an error message if the hard limit is exceeded. The soft limit allows writes to exceed the quota; however, an alert is generated. The soft value must be less than the hard value. Quota limits must be specified as integers.

You can set hard, soft, or both, depending on your requirements. For example, an administrator may choose to enforce only a soft limit to prevent backup jobs running overnight from failing when the quota limit is reached. Or, he or she may choose to enforce only a hard limit to block a user from writing when the quota limit is reached.

Snapshots capture quota information at a precise point in time. Usage tracking in the active filesystem does not account for the space of snapshot, so quota limits are not enforced on snapshots.

For information on establishing quotas when creating MTrees, and DD Boost and VTL storage units, see “mtree,” “ddboost,” and “ vtl,” respectively.

Options include:

disable

enable

reset

set

show

status

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 Quota command and options introduced.

quota 229

Page 230: DD OS 5.2 Command Reference Guide

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

MTree quotas with a hard limit cannot be set on the /data/col1/backup directory.

The maximum MTree quota value is 4096 PiB. See “mtree” for details.

OptionsThe following options are available with this command.

disable

quota disable

Disable quota support. This command option also disables MTree quota limits and restores the limits to the default state (unlimited).

enable

quota enable

Enable quota support.

reset

quota reset { all | mtrees <mtree-list> | storage-units <storage-unit-list> } [soft-limit] [hard-limit]

Reset quota limits. If hard or soft limits are not entered, both are reset to the default state (unlimited).

Example 1

To reset hard and soft limits for an MTree:

# quota reset mtrees /data/col1/backup1

Quota soft limit: none, hard limit: none

Note: Quota is disabled. Quota limits not enforced.

Example 2

To reset soft limit only for an MTree:

# quota reset mtrees /data/col1/backup1 soft limit

/data/col1/backup1: Quota soft limit: none, hard limit: 1048576 MiB

230 EMC DD OS 5.2 Command Reference Guide

Page 231: DD OS 5.2 Command Reference Guide

Example 3

To reset hard limit only for an MTree:

# quota reset mtrees /data/col1/backup3 hard limit

/data/col1/backup3: Quota soft limit: 102400 MiB, hard limit: none

Example 4

To reset hard and soft limits for a storage-unit:

# quota reset storage-units DDBOOST_STRESS_SU

Quota soft limit: none, hard limit: none

set

quota set {all | mtrees <mtree-list> | storage-units <storage-unit-list>} {soft-limit <n> {MiB|GiB|TiB|PiB} | hard-limit <n> {MiB|GiB|TiB|PiB} | soft-limit <n> {MiB|GiB|TiB|PiB} hard-limit <n> {MiB|GiB|TiB|PiB}}

Set quota limits during runtime for multiple MTrees. When used for storage units, this command option sets limits only after the storage unit is created. Note that the quota feature must be enabled, otherwise limits are not enforced. Setting quotas does not require disabling the filesystem and therefore does not affect system performance. See “ddboost” for instructions on how to set quotas during the creation of a storage unit.

Example 1

To set a soft limit quota of 10 GiB on MTree /data/col1/backup1 when the quota feature is disabled:

# quota set mtrees /data/col1/backup1 quota-soft-limit 10 GiB

/data/col1/backup1: Quota soft limit: 10240 MiB, hard limit: none

Note: Quota is disabled. Quota limits not enforced

Example 2

To set a hard limit quota of 10 TiB on MTree /data/col1/backup1:

# quota set mtrees /data/col1/backup1 hard-limit 10 GiB

/data/col1/backup1: Quota soft limit: n/a, hard limit: 1048576 MiB

Example 3

To set a soft limit quota of 100GiB and a hard limit quota of 1TiB on MTree /data/col1/backup1:

# quota set mtrees /data/col1/backup1 soft-limit 10 GiB hard-limit 10 TiB

/data/col1/backup1: Quota soft limit: 10240 MiB, hard limit: 1048576 MiB

quota 231

Page 232: DD OS 5.2 Command Reference Guide

Example 4

To set a soft limit quota of 100 GiB and a hard limit quota of 1 TiB on storage-unit DDBOOST_STRESS_SU:

# quota set storage-units DDBOOST_STRESS_SU soft-limit 100 GiB hard-limit 1 TiB

DDBOOST_STRESS_SU: Quota soft limit: 10240 MiB, hard limit: 1048576 MiB

show

quota show {all | mtrees <mtree-list> | storage-units <storage-unit-list>}

List the quota limits and usage of a particular mtree or storage unit, all mtrees or storage units, or all of both. The unit of display for usage and limits is MiB.

Example 1

# quota show /data/col1/backup

Mtree Pre-Comp (MiB) Soft-Limit (MiB) Hard-Limit (MiB)

--------------------------------------------------------------------------------------------------------------

/data/col1/backup 1000 none none

--------------------------------------------------------------------------------------------------------------

Note: Quota is disabled. Quota limits not enforced.

Example 2

# quota show all

Name Pre-Comp Soft-Limit Hard-Limit

-------------------------------------------------------------------------------------------------------------------------------------------------------------------

/data/col1/backup 0 KiB unlimited unlimited

/data/col1/DDBOOST_STRESS_SU 1 GiB 10 GiB 20 GiB

/data/col1/temp 0 KiB unlimited unlimited

/data/col1/.deleted-1310058450572152676 0 KiB unlimited unlimited

/data/col1/abcd 0 KiB unlimited unlimited

/data/col1/abcd2 0 KiB 100 GiB 200 GiB

-------------------------------------------------------------------------------------------------------------------------------------------------------------------

Note: Quota is disabled. Quota limits not enforced.

232 EMC DD OS 5.2 Command Reference Guide

Page 233: DD OS 5.2 Command Reference Guide

Example 3

# quota show storage units

Name Pre-Comp Soft-Limit Hard-Limit

-------------------------------------------------------------------------------------------------------------------------------------------------------------------

DDBOOST_STRESS_SU 1GiB unlimited unlimited

temp 0 KiB unlimited unlimited

abcd2 0 KiB 100 GiB 200 GiB

-------------------------------------------------------------------------------------------------------------------------------------------------------------------

Note: Quota is disabled. Quota limits not enforced.

Example 4

# quota show storage-units abcd2 temp

Name Pre-Comp Soft-Limit Hard-Limit

-------------------------------------------------------------------------------------------------------------------------------------------------------------------

temp 0 KiB unlimited unlimited

abcd2 0 KiB 100 GiB 200 GiB

-------------------------------------------------------------------------------------------------------------------------------------------------------------------

Note: Quota is disabled. Quota limits not enforced.

status

quota status

Display status of quota enforcement: enabled or disabled. If output includes a note stating status as disabled, quota limits are not being enforced and are therefore unlimited.

quota 233

Page 234: DD OS 5.2 Command Reference Guide

234 EMC DD OS 5.2 Command Reference Guide

Page 235: DD OS 5.2 Command Reference Guide

replication

The replication command enables you to replicate data (copy and synchronize), between two Data Domain systems: a source and a destination. Source and destination configurations, or pairs, are also known as “contexts.” Depending on your objective, you can replicate entire sites, specific directories, MTrees, or files within a virtual tape library. Replication is a licensed software option. See the EMC DD OS Administration Guide for details on replication practices and procedures.

Options include:

abort

add

break

disable

enable

initialize

modify

option

reauth

recover

resync

show

status

sync

throttle

watch

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 Modified command options:

replication break {<destination> | all}

replication 235

Page 236: DD OS 5.2 Command Reference Guide

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

Ensure adequate storage is available on the source and destination. With the exception of collection replication, the destination must have more space than the source.

With the exception of collection replication, the destination directory is overwritten during replication. Before starting, verify the destination directory is empty or that its contents are not required.

A source subdirectory cannot be in another directory replication context. A directory can be in only one context at a time.

Command options may take several seconds to conclude when a Data Domain system is at, or near, capacity.

If the source or destination hostnames do not correspond to the Data Domain network names, modify the name by running the command option replication modify connection-host on the source system.

Source names <source> that include spaces or special characters must be entered according to specific conventions or the command will fail. Either enclose the entire source pathname with double quotation marks, or enter a backslash before the space. Do not use both.

Retention Lock Compliance is supported for collection replication only.

OptionsThe following options are available with this command.

abort

replication abort recover <destination>

Stop a recover process. Run this command option on the destination Data Domain system only. Then, reconfigure replication on the source Data Domain system and restart the recover process.

replication abort resync <destination>

Stop a resync operation. Run this command option on the source or destination Data Domain system.

replication disable {<destination> | all}

replication sync [<destination>]

236 EMC DD OS 5.2 Command Reference Guide

Page 237: DD OS 5.2 Command Reference Guide

add

replication add source <source> destination <destination> [low-bw-optim {enabled | disabled}] [encryption {enabled | disabled}] [propagate-retention-lock {enabled | disabled}]

Create a replication pair. Use low-bw-optim enabled to enable delta replication. Low bandwidth optimization is active only when enabled on the source and destination and cannot be used for collection replication.

note Directory replication is not supported in GDA configurations.

break

replication break {<destination> | all}

Remove the source or destination Data Domain system from a replication pair, or remove all Replicator configurations from a Data Domain system. This command option requires security officer authorization for Retention Lock Compliance systems.

disable

replication disable {<destination> | all}

Run this command on the source or destination system to halt data replication temporarily. If run on the source, the operation stops sending data to the destination. If run on the destination, the operation stops serving the active connection from the source. This command option requires security officer authorization for Retention Lock Compliance systems.

enable

replication enable {<destination> | all}

Restart replication. If run on the source, the operation resumes sending data to the destination. If run on the destination, the operation resumes serving the active connection from the source.

initialize

replication initialize <destination>

Run this command option on the source to start replication between a source and destination. This command option verifies the configuration and connections are correct and returns error messages if problems appear.

replication 237

Page 238: DD OS 5.2 Command Reference Guide

The initialize operation can take several hours, or days, depending on the amount of data in the source. As an alternative, consider placing both Data Domain systems of the replicator pair in the same location with a direct link to reduce initialization time. The <destination> variable is required.

modify

replication modify <destination> connection-host <new-host-name> [port <port>]

Run this command option if the destination hostname does not resolve for the connection. Use the modify connection-host option to correct the name or IP address. An optional port number may also be used.

The connection-host option may be required when a connection passes through a firewall, and is required when connecting to an alternate listen-port on the destination. It may also be required after adding a new source and destination pair, or after renaming a source or a destination.

replication modify <destination> {source-host | destination-host} <new-host-name>

Assign a new hostname to a replacement system in a replication pair. The <new-host-name> must be the name returned by the hostname command on the system receiving the new host.

Run this command option on the destination system to change the hostname on a source system. Do not use the command to change the hostname on the destination. Contact Data Domain Support before changing the hostname on a destination system.

When using the replication modify command option, always run the filesys disable command first, and conclude with the filesys enable command.

Example

If the local destination dest-orig.ca.company.com is moved from California to New York, enter the following command options on the source and destination:

# filesys disable

# replication modify dir://ca.company.com/backup/dir2 destination-host ny.company.com

# filesys enable

replication modify <destination> encryption {enabled | disabled}

Modify the destination hostname and set the state of encryption.

replication modify <destination> low-bw-optim {enabled | disabled}

Enable delta replication on a replication context. This option is active only when enabled on the source and destination. This option does not apply to collection replication.

238 EMC DD OS 5.2 Command Reference Guide

Page 239: DD OS 5.2 Command Reference Guide

option

replication option reset {bandwidth | delay | listen-port}

Reset system bandwidth to default unlimited, or delay to default none, or listen port to 2051. When using the replication option reset command options, always run the filesys disable command first, and conclude with the filesys enable command.

replication option set bandwidth <rate>

Set the network bandwidth rate for the Data Domain system. You must set the bandwidth and network-delay on each side of the connection.

replication option set delay <value>

Set the network delay in milliseconds for the Data Domain system.You must set the bandwidth and network-delay on each side of the connection.

replication option set listen-port <value>

Set the listen port for the Data Domain system. On a destination Data Domain system, set the port from which the destination receives data from replication sources (default is 2051). A destination can have only one listen-port that must be used by all sources. The connection-host port used by a source must match the listen-port used by the destination.

For DD Boost managed file replication, the listen-port is used on the source Data Domain system and on the destination Data Domain system to specify the connection-host port. For directory replication, the replication modify connection-host command option is used on the source Data Domain system.

replication option show

Display the current bandwidth and network-delay settings. If these settings are at the default of none, the operation returns a command prompt with no setting information. All users may run this command.

replication 239

Page 240: DD OS 5.2 Command Reference Guide

reauth

replication reauth <destination>

Use this command on the source and the destination systems to reset authentication. A destination variable is required.

Messages similar to “Authentication keys out of sync” or “Key out of sync” indicate a reset is required. Reauthorization is primarily used when replacing a source Data Domain system.

recover

replication recover <destination>

Run this command option on a new source to move data from a destination system. If configuring collection replication, this option must be run on the new source only. A destination argument is required. This command is not available for MTree replication.

When using the replication recover command option, always run the filesys disable command option first, and conclude with the filesys enable command option.

If the replication break command was previously run, the destination cannot be used to recover a source. If configuring directory replication, the target directory on the source must be empty.

See “Additional Topics” for information on how recovery affects collection replication.

resync

replication resync <destination>

Synchronize replication when directory replication is broken between a source and destination. Note that the source and the destination must be configured and the context initialized.

This command option cannot be used with collection replication. Also, this command fails if you try to replicate to a Retention Lock system and the destination is not empty.

show

replication show config [<destination> | all]

Show replication configuration. All users may run this command option.

replication show detailed-history {<obj-spec-list> | all} [duration <duration> {hr | min}] [interval <interval> {hr | min}]

Show details of replication performance history. All users may run this command option.

240 EMC DD OS 5.2 Command Reference Guide

Page 241: DD OS 5.2 Command Reference Guide

Output Definitions

CTXThe context number for directory replication or a zero (0) for collection replication.

SourceThe Data Domain system that receives data from backup applications.

DestinationThe Data Domain system that receives data from the replication source Data Domain system.

Connection Host and PortA source system connects to the destination system using the name returned by the hostname command on the destination. It may also connect using a destination name or IP address and port designated by replication modify connection-host command. The destination hostname may not resolve to the correct IP address when connecting to an alternate interface on the destination, or when passing through a firewall.

Low-bw-optimThe status of low-bw-optim: enabled, disabled, or configuration mismatch.

EnabledThe replication process is enabled and available to replicate data (“yes”) or disabled and not available to replicate data (“no”).

replication show detailed-stats [<destination> | all]

Display cumulative statistics beginning with when the context was created. This command option provides byte-count statistics related to identity-filtering, delta-compression, and local-compression. The ratio of the values Bytes after filtering by destination to Bytes after low bandwidth optimization gives additional compression ratio supplied by delta compression. All users may run this command option.

replication show history {<obj-spec-list> | all}

Show replication performance history. Statistics are generated hourly. All users may run this command option.

replication 241

Page 242: DD OS 5.2 Command Reference Guide

Output Definitions

Pre-Comp (KB) RemainingThe amount of pre-compression data not replicated.

Replicated (KB) Pre-Comp The amount of pre-compressed data replicated.

Replicated (KB) Network The amount of compressed data sent over the network.

Sync’ed-as-of Time The time when the most recently replicated data on the destination was generated on the source. A value of unknown appears during replication initialization.

Low-bw-optimThe additional compression ratio supplied by delta compression.

replication show performance {<obj-spec-list> | all} [interval <sec>] [count <count>]

Display current replication activity. Default interval is two seconds. All users may run this command option.

If a single source context is specified, four additional columns are presented. These columns show the relative amounts of time spent working on, or waiting for, replication sender threads for the specified context. Values are calculated by the amount of time spent for the activity, multiplying the time by 100, and dividing the time by the duration of the reporting interval. Values can exceed 100 due to the presence of multiple threads working on behalf of the specified replication context.

Output Definitions

Pre-comp (KB/s)The size value before compression is applied. Sometimes referred to as “logical size.”

Network (KB/s)The amount of compressed data transferred over the network per second.

StreamsAn internal system resource associated with reads and writes. One replication context can use multiple streams for better performance.

ReadingThe time spent reading filesystem data from the local filesystem. Typically this number is the second highest number after Network. On a deployment with high network bandwidth, Reading may be the largest column.

242 EMC DD OS 5.2 Command Reference Guide

Page 243: DD OS 5.2 Command Reference Guide

MetaThe time spent on miscellaneous bookkeeping activities and replicating filesystem namespace operations. Typically this value is under 50. If this value exceeds 50 on a sustained basis, it may indicate an unusual workload (a large number of file attribute updates, for example).

Dest

The time spent waiting due to the receiver not providing the sender enough information on what data to send. Typically this value is low. Exceptions include systems on high-speed networks where the sender is a more powerful Data Domain system than the replica, or where the replica has a higher workload than the sender because the replica is the destination for a multiple replication contexts.

NetworkThe time spent sending file data and metadata and waiting for replies from the server on what data needs to be sent. Typically this is the highest of the four values. This value exceeds 100 regularly if the sender is able to replicate multiple files in parallel.

note If the Network column has the highest time values among Reading, Meta, Waiting, and Network, and if the Network KB/sec value is lower than expected, a network problem may be present. For example, packet loss may be causing reduced throughput.

replication show stats [<destination> | all]

Display statistics for all replication pairs or a specific destination pair. Output format is is based on replication type. All users may run this command option.

Note that in collection replication, the difference in values between Post-comp Bytes Sent and Post-comp Bytes Received is expected behavior.

Example 1

# repl show stats

CTX Destination Post-comp Post-comp Sync'ed-as-of Post-comp Bytes

Bytes Sent Bytes Received Time Remaining

----------------------------------------------------------------------------------------------------------------------------------------------------------------------

0 col://127.2.0.2 91,173,608 9,264 Mon Apr 9 15:54 0

----------------------------------------------------------------------------------------------------------------------------------------------------------------------

CTX Destination Post-comp Pre-comp Post-comp Sync'ed-as-of Pre-comp Bytes

Bytes Sent Bytes Sent Bytes Received Time Remaining

----------------------------------------------------------------------------------------------------------------------------------------------------------------------

1 dir://127.2.0.2/backup 0 0 0 - 0

----------------------------------------------------------------------------------------------------------------------------------------------------------------------

replication 243

Page 244: DD OS 5.2 Command Reference Guide

Output Definitions

CTXThe context number for replication. The number zero (0) indicates collection replication.

DestinationThe replication destination.

Post-comp Bytes SentNetwork data sent by the source to the destination.

Post-comp Bytes ReceivedThe number of bytes received by the source, including logical bytes associated with the file being replicated.

Sync’ed-as-of-TimeThe time when the most recently replicated data on the destination was generated on the source. A value of Unknown appears during replication initialization.

Pre-comp Bytes Remaining

Directory replication only: The sum of file sizes remaining to be replicated for the context. Output includes the entire logical size of the current file being replicated. If a large file is being replicated, this number may take some time to change. The number changes only after the current file finishes.

status

replication status [<destination> | all] [detailed]

Show status replication status. All users may run this command option.

sync

replication sync [<destination>]

Synchronize replication between the source and destination. You must first configure the source and destination and initialize the context.

throttle

replication throttle add <sched-spec> <rate>

Change the rate of network bandwidth used by replication. By default, the network bandwidth use is unlimited, meaning it continuously runs as fast as possible.

Replication runs at the given rate until the next scheduled change, or until new throttle commands force a change. The system enforces a minimum rate of 98,304 bits per second (12 KiB).

244 EMC DD OS 5.2 Command Reference Guide

Page 245: DD OS 5.2 Command Reference Guide

Argument Definitions

<sched-spec>Specifies one or more three-letter days of the week (such as mon, tue, or wed), or the word “daily” (to set the schedule every day). This argument can also specify a time of day in 24-hour format.

<rate>

Includes a number or the word “unlimited.” Rate can also be zero, disable, or disabled (each stops replication until the next rate change). If you set <rate> to zero, new contexts are also throttled to zero.

The number can include a tag for bits or bytes per second. Do not use a space between the number and the bits or bytes specification. The default rate is bits per second.

In the rate variable:

bps or b equals raw bits per second

Kibps, Kib, or K equals 1024 bits per second

Bps or B equals bytes per second

KiBps or KiB equals 1024 bytes per second

Kib = Kibibits, the base-2 equivalent of Kb or Kilobits. KiB = Kibibytes, the base-2 equivalent of KB or Kilobytes.

Example

To limit replication to 20 kibibytes per second starting on Mondays and Thursdays at 6:00 a.m., enter:

# replication throttle add mon thu 0600 20KiB

replication throttle del <sched-spec>

Remove one or more throttle schedule entries.

The sched-spec variable must include one or more three-letter days of the week (such as mon, tue, or wed), or the word “daily” (to set the schedule every day), and a time in 24-hour format.

Example

To remove an entry for Mondays at 1:00 p.m., enter:

# replication throttle del mon 1300

replication throttle reset {current | override | schedule | all}

Reset a throttling schedule.

replication 245

Page 246: DD OS 5.2 Command Reference Guide

Argument Definitions

currentRemove and reset the rate designated by the command option replication throttle set current.

overrideRemove and reset the rate designated by the command option replication throttle set override.

scheduleRemove and reset scheduled changes.

allRemove and reset current or override settings and remove all scheduled changes. This option returns the system to the default settings.

replication throttle set current <rate>

Set the throttle rate until the next scheduled change or until a system reboot. Setting the throttle to current cannot be done if the throttle set override command option is in effect.

replication throttle set override <rate>

Set the throttle rate until another override command option is run. Throttle override cannot be set if the throttle set current command option is in effect.

replication throttle show [KiB]>

Show throttle configuration. All users may run this command option.

watch

replication watch <destination>

Display the progress of a replication initialization, resynchronization process, or recovery operation. All users may run this command option.

Additional TopicsThis section provides additional information on various topics and concepts.

Collection Replication

The entire /backup directory is replicated. This replication type is typically used to back up an entire site. When the replication has concluded, the license must be added and key manager settings configured on the destination system. Retention Lock Compliance is supported for collection replication only.

246 EMC DD OS 5.2 Command Reference Guide

Page 247: DD OS 5.2 Command Reference Guide

Collection Replication Key Management

Key-manager settings on a destination are ignored when users set up and initialize a collection replication pair. The keys are copied to the replica, but key-manager settings are not. If the destination is configured with key-manager settings prior to becoming the replication destination, the settings remain on the system but are not used. If a collection replication breaks, you must reconfigure the destination to use the correct key-manager settings and key class.

EMC recommends resetting the key-manager on the destination prior to collection replication, and then configuring the destination with the correct key manager-server and key class after a collection replication is broken. See “migration” for instructions (Additional Topics > Migration With Encryption-Enabled Source).

Directory Replication

Specific subdirectories under /backup are replicated. This replication type is used when only a portion of /backup is required, or if specific directories are replicated to different destinations.

MTree Replication

An entire MTree is replicated. Note that you cannot replicate directories located under an MTree. See “mtree” for more information.

Pool Replication

A set of files or tapes within a virtual tape library (VTL) is replicated.

replication 247

Page 248: DD OS 5.2 Command Reference Guide

248 EMC DD OS 5.2 Command Reference Guide

Page 249: DD OS 5.2 Command Reference Guide

route

The route command manages routing between a Data Domain system and backup hosts. An additional routing rule appears in the Kernel IP routing table and in the Data Domain system Route Config list, which is a list of static routes reapplied at each system boot.

Options include:

add

del

reset

set

show

trace

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 Modified command options:

route add [ipversion {ipv4 | ipv6}] <route spec>

route del [<ipaddr> | <ipv6addr]>

route reset gateway [ipversion {ipv4 | ipv6}]

route set gateway {<ipaddr> | <ipv6addr>}

route show gateway [ipversion {ipv4 | ipv6}]

route show table [ipversion {ipv4 | ipv6}]

route trace [ipversion {ipv4 | ipv6}] <host>

route 249

Page 250: DD OS 5.2 Command Reference Guide

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

Changes to Ethernet interfaces made with net command options flush the routing table. All routing information is lost and data movement using routing is cut off immediately. Data Domain recommends making interface changes only during scheduled downtime. You must reconfigure routing rules and gateways after making interface changes

OptionsThe following options are available with this command.

add

route add [ipversion {ipv4 | ipv6}] <route spec>

Add a routing rule.

del

route del [<ipaddr> | <ipv6addr]>

Remove a routing rule.

reset

route reset gateway [ipversion {ipv4 | ipv6}]

Reset the default routing gateway to the default value (empty).

set

route set gateway {<ipaddr> | <ipv6addr>}

Change the routing default gateway.

Example

To set the default routing gateway to the IP address of 192.168.1.2:

# route set gateway 192.168.1.2

250 EMC DD OS 5.2 Command Reference Guide

Page 251: DD OS 5.2 Command Reference Guide

show

route show config

Display the configured static routes that are in the Route Config list.

Example

The display looks similar to the following (each line in the example wraps):

# route show config

The Route Config list is:-host user24 gw srvr12-net 192.168.1.0 netmask 255.255.255.0 gw srvr12

route show gateway [ipversion {ipv4 | ipv6}]

Display the configured or DHCP-supplied routing gateways used by a Data Domain system.

Example

# route show gateway

Default Gateways 192.168.1.2 192.168.3.4

route show table [ipversion {ipv4 | ipv6}]

Display all entries in the Kernel IP routing table.

Example

# route show table

Kernel IP routing table

Destination Gateway Genmask Flags Metric Ref Use Iface

192.168.8.0 0.0.0.0 255.255.252.0 U 0 0 0 eth0

127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo

0.0.0.0 10.25.128.1 0.0.0.0 UG 0 0 0 eth0

Kernel IPv6 routing table

Destination Next Hop Flags Metric Ref Use Iface

2620:0:170:1a04::/64 :: UA 256 1489 0 eth0

fe80::/64 :: U 256 0 0 eth0

::/0 fe80::5:73ff:fea0:804 UGDA 1024 1 0 eth0

::1/128 :: U 0 597 3 lo

fe80::215:17ff:fe30:2d70/128 :: U 0 31 1 lo

route 251

Page 252: DD OS 5.2 Command Reference Guide

trace

route trace [ipversion {ipv4 | ipv6}] <host>

Display a route used by a Data Domain system to connect with a particular destination.

Example

To trace the route to srvr24, enter:

# route trace srvr24

Traceroute to srvr24.yourcompany.com (192.168.1.6), 30 hops max, 38 byte packets1 srvr24 (192.168.1.6) 0.163 ms 0.178 ms 0.147 ms

Additional TopicsThis section provides additional information on various topics and concepts.

Support for IPv6

Federal certification requirements state that the DD OS must be IPv6-capable and that interoperability with IPv4 be maintained in an heterogeneous environment. As a result, several net command options now include arguments for both versions of Internet Protocol. EMC Data Domain customers select which version to use, based on the type of configuration.

Add a Route

To add a route with a route specification of 192.168.1.x, a netmask, and a gateway of srvr12, enter:

# route add -net 192.168.1.0 netmask 255.255.255.0 gw srvr12

To add a route for host user24 with a gateway of srvr12, enter:

# route add -host user24 gw srvr12

Delete a Route

To delete a route; for example, 192.168.1.0 and a netmask of 255.255.255.0, enter:

# route del -net 192.168.1.0 netmask 255.255.255.0

Set a Default Gateway

To give a default gateway when no other route matches, enter:

# route set gateway 192.168.10.1

252 EMC DD OS 5.2 Command Reference Guide

Page 253: DD OS 5.2 Command Reference Guide

snapshot

The snapshot command manages MTrees snapshots. MTrees add granularity to filesystem-type operations, allowing operations to be performed on a specific MTree instead of the entire filesystem. Snapshots are useful for avoiding version skew when backing up volatile data sets, such as tables in a busy database, and for restoring previous versions of a deleted directory or file.

A snapshot is a read-only copy of the Data Domain MTree from the top of each MTree: /data/col1/<mtree-name>.The MTree /data/col1/backup is the default directory created in the system during installation. It is also the MTree that is refreshed during an upgrade procedure. The directory /backup points to the default MTree. Snapshots can be accessed from the directories /backup/.snapshot or /data/col1/<mtree-name>/.snapshot.

Options include:

create

expire

list

rename

schedule

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

If the Data Domain system is a source for collection replication, snapshots are replicated.

If the Data Domain system is a source for directory replication, snapshots are not replicated. Snapshots must be created separately on a directory replication destination.

Version Change

5.2 No changes from previous version.

snapshot 253

Page 254: DD OS 5.2 Command Reference Guide

The .snapshot directory is a virtual directory. It can be referenced in any directory, but it does not show up as a directory listing except at export points (for example, a CIFS share or NFS mount point).

The maximum number of snapshots allowed to be stored on a system is 750. If the maximum number is reached, the system generates an alert. You can resolve this by expiring snapshots and then running the command option filesys clean.

See “Additional Topics” for the list of characters supported for snapshot naming.

OptionsThe following options are available with this command.

create

snapshot create <snapshot> mtree <mtree-path> [retention {<date> | <period>}]

Create a snapshot.

Argument Definitions

<snapshot>A name for the snapshot.

mtree <mtree-path>The pathname of the MTree for which the snapshot is being created. The base of the path must be /data/col1/<mtree_name> or /backup.

retention <date>A four-digit year, two-digit month, and two-digit day separated by dots ( . ), slashes ( / ), or hyphens ( - ). For example, 2011.03.22. The snapshot is retained until midnight (00:00, the first minute of the day) of the designated date.

retention <period>Number of days, weeks (wks), or months (mos) to retain a snapshot. Note there is no space between the number and time period; for example, 4wks. Also, one month equals 30 days. The snapshot is retained until the same time of day it was created.

Example

If a snapshot was created at 8:48 a.m. on March 1, 2011 with a retention period of one month, it would be retained for 30 days.

# snapshot create test22 mtree /backup retention 1mos

Snapshot "test22" created and will be retained until March 31 2011 08:48.

254 EMC DD OS 5.2 Command Reference Guide

Page 255: DD OS 5.2 Command Reference Guide

expire

snapshot expire <snapshot> mtree <mtree-path> [retention {<date> | <period> | forever}]

Set or reset the retention time of a snapshot. To expire a snapshot immediately, use the snapshot expire operation with no options. An expired snapshot remains available until the next filesystem clean operation.

Argument Definitions

<snapshot>The name of the snapshot.

mtree <mtree-path>The pathname of the MTree for which the snapshot is being created.

retention <date>A four-digit year, two-digit month, and two-digit day separated by dots ( . ), slashes ( / ), or hyphens ( - ). With a retention <date>, the snapshot is retained until midnight (00:00, the first minute of the day) of the designated date.

retention <period>Number of days, weeks (wks), or months (mos) to retain snapshot. Note there is no space between the number and time period; for example, 4wks. Also, one month equals 30 days. The snapshot is retained until the same time of day it was created.

foreverThe snapshot does not expire.

list

snapshot list mtree <mtree-path>

View a list of snapshots of a specific MTree. The display shows the snapshot name, the amount of pre-compression data, the creation date, the retention date, and the status. The status may be blank or expired.

snapshot 255

Page 256: DD OS 5.2 Command Reference Guide

Example

# snapshot list mtree /data/col1/ddmtree1

Snapshot Information for MTree: /data/col1/ddmtree1

-------------------------------------------------------------------------------------------------------------------------------------------------

Name Pre-Comp (GiB) Create Date Retain Until Status

-------------------------------------------------------------------------------------------------------------------------------------------------

new-snap1 0.0 April 12 2011 11:59 April 12 2011 12:04 expired

Snapshot Summary

---------------------------

Total: 1

Not expired: 0

Expired: 1

rename

snapshot rename <snapshot> <new-name> mtree <mtree-path>

Rename a snapshot for a specific MTree.

Example

To change the name from snap1 to new-snap1 for an MTree named /newMTree, enter:

# snapshot rename snap1 new-snap1 mtree /backup

Snapshot "snap1" renamed to "new-snap1" for MTree "/newMTree".

schedule

snapshot schedule add <name> mtrees <mtree-list>

Add multiple MTrees to a single snapshot schedule.

snapshot schedule create <name> [mtrees <mtree-list>] [days <days>] time <time> [,<time> ...] [retention <period>] [snap-name-pattern <pattern>]

snapshot schedule create <name> [mtrees <mtree-list>] [days <days>] time <time> every <mins> [retention <period>] [snap-name-pattern <pattern>]

snapshot schedule create <name> [mtrees <mtree-list>] [days <days>] time <time>-<time> [every <hrs | mins>] [retention <period>] [snap-name-pattern <pattern>]

Use these commands to create a snapshot schedule for multiple MTrees. Command arguments determine the duration of the schedule.

snapshot schedule del <name> mtrees <mtree-list>

Remove a list of MTrees from a schedule.

256 EMC DD OS 5.2 Command Reference Guide

Page 257: DD OS 5.2 Command Reference Guide

snapshot schedule destroy [<name> | all]

Remove the name of a schedule.

snapshot schedule modify <name> [mtrees <mtree-list>] [days <days>] time <time> [,<time> ...] [retention <period>] [snap-name-pattern <pattern>]

snapshot schedule modify <name> [mtrees <mtree-list>] [days <days>] time <time> every <mins> [retention <period>] [snap-name-pattern <pattern>]

snapshot schedule modify <name> [mtrees <mtree-list>] [days <days>] time <time>-<time> every <hrs | mins>] [retention <period>] [snap-name-pattern <pattern>]

Use these commands to modify a snapshot schedule. Command arguments determine the duration of the schedule.

snapshot schedule reset

Reset a snapshot schedule and delete all snapshot schedules.

caution! This command deletes the previous schedule without prompting the user.

snapshot schedule show [ {<name> | mtrees <mtree-list>} ]

Show a specific schedule and show schedules associated with a specific MTree. To show a list of schedules, enter the command with no options.

Example 1

To view all schedules, enter:

# snapshot schedule show

Name Days Time Retention (days) Snap-name Pattern

sched_am1 daily 02:00,03:00,05:00... 14 scheduled-%Y-%m-%d-%H-%M

sched_am2 daily 09:15,10:15,11:15... 14 scheduled-%Y-%m-%d-%H-%M

sched_pm1 daily 13:00,14:00,15:00... 14 scheduled-%Y-%m-%d-%H-%M

sched_pm2 daily 17:00,18:00,19:00... 14 scheduled-%Y-%m-%d-%H-%M

Example 2

To view a schedule associated with MTrees, include the schedule name.

# snapshot schedule show sched_pm2

Name Days Time Retention (days) Snap-name Pattern

sched_pm2 daily 17:00,18:00,19:00... 14 scheduled-%Y-%m-%d-%H-%M

MTree list

----------------

/data/col1/backup

/data/col1/mtree1

/data/col1/mtree2

snapshot 257

Page 258: DD OS 5.2 Command Reference Guide

Additional TopicsThis section provides additional information on various topics and concepts.

Naming Snapshots Created by a Schedule

The naming convention for scheduled snapshots is the word “scheduled” followed by a four-digit year, a two-digit month, a two-digit day, a two-digit hour, and a two-digit minute. All elements of the name are separated by hyphens( - ). For example,scheduled-2011-04-27-13-41.

The name every_day_8_7 is the name of a snapshot schedule. Snapshots generated by that schedule might have the names scheduled-2011-03-24-20-00, scheduled-2011-03-25-20-00, and so forth.

Example

To schedule a snapshot every Monday and Thursday at 2:00 a.m. with a retention of two months, enter:

# snapshot add schedule mon thu 02:00 retention 2mos

Snapshots are scheduled to run "Mon, Thu" at "0200".Snapshots are retained for "60" days.

Supported Characters

In addition to letters A–Z, a–z, and numbers 0–9, and a single embedded space (non-leading), characters supported for creating snapshot names include:

! exclamation point

# number sign

$ dollar sign

% percentage

& ampersand

@ “at” symbol

^ caret

~ tilde

( left parenthesis

) right parenthesis

258 EMC DD OS 5.2 Command Reference Guide

Page 259: DD OS 5.2 Command Reference Guide

[ left bracket

] right bracket

{ left curly brace

} right curly brace

. period

, comma

; semicolon

‘ single quotation mark (slanted)

' single quotation mark (unslanted)

+ plus sign

= equal sign

snapshot 259

Page 260: DD OS 5.2 Command Reference Guide

260 EMC DD OS 5.2 Command Reference Guide

Page 261: DD OS 5.2 Command Reference Guide

snmp

The snmp command enables or disables SNMP access to a Data Domain system, adds community strings, gives contact and location information, and displays configuration settings.

SNMP management requires two primary elements: an SNMP manager and an SNMP agent. See “More about SNMP on a Data Domain System” for details.

Options include:

add

del

disable

enable

reset

set

show

status

user

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 Modified command options:

snmp user add <user-name> <access {read-only | read-write}> [[authentication-protocol {MD5 | SHA1}] [authentication-key <auth-key>] [privacy-protocol {AES | DES}] [privacy-key <priv-key>]]

snmp user modify <user-name> <access {read-only | read-write}> [[authentication-protocol {MD5 | SHA1}] authentication-key <auth-key> [privacy-protocol {AES | DES}] privacy-key <priv-key>]

snmp 261

Page 262: DD OS 5.2 Command Reference Guide

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

Data Domain systems support SNMPv1, v2C, and v3.

Default port 161 is used for inbound/outbound, read/write SNMP access. Default port 162 is used for outbound traffic for SNMP traps.

In addition to blank spaces, the following characters cannot be used in community strings: \t : ; $ \n ’ ’

OptionsThe following options are available with this command.

add

snmp add ro-community <community-string-list> [hosts <host-list>]

Add one or more community strings for read-only access to the Data Domain system. A common string for read-only access is public. To grant access to specific hosts, enter the names in <host-list>. A valid host list can include the host name or the host IP address. For example:

hostnameA,hostNameB

10.10.1.2,10.10.1.3

10.*

*

Example

To add a community string of public with read-only permissions:

# snmp add ro-community public hosts host.datadomain.com

snmp add rw-community <community-string-list> [hosts <host-list>]

Add one or more community strings for read/write access to the Data Domain system. A common string for read/write access is private. To grant access to specific hosts, enter the names in <host-list>. A valid host-list can include the host name or the host IP address. For example:

hostnameA,hostNameB

10.10.1.2,10.10.1.3

10.*

*

262 EMC DD OS 5.2 Command Reference Guide

Page 263: DD OS 5.2 Command Reference Guide

Example

To add a community string of private with read/write permissions:

# snmp add rw-community private hosts host.datadomain.com

snmp add trap-host <host-name-list>[:port] [version {v2c | v3}] [{community <community> | user <user>}]

Add one or more trap hosts (host name or IP address) to receive the SNMP traps generated by the Data Domain system. Note that alerts are also sent as traps, even when the local SNMP agent is disabled. By default, port 162 is used to send traps, but another port may be assigned.

SNMP trap-host supports SNMPv2c and v3. For SNMPv1 and v2c specify the version and the pre-existing community. For SNMPv3 specify the SNMPv3 user name. Make sure to include trap-host in the community string hosts.

Example

To add a trap host admin12:

# snmp add trap-host admin12 version v2c community public

del

snmp del ro-community <community-string-list> [hosts <host-list>]

Delete one or more community strings for read-only access to the Data Domain system.

Example

To delete the host myhost.datadomain.com from public community list:

# snmp del ro-community public hosts myhost.datadomain.com

To delete the community public and all hosts associated with public:

# snmp del rw-community public

snmp del rw-community <community-string-list> [hosts <host-list>]

Delete one or more community strings for read-write access to the Data Domain system.

Example

To delete the community string private with read/write permissions:

# snmp del rw-community private hosts myhost.datadomain.com

To delete the community private and all hosts associated with private:

# snmp del rw-community private

snmp 263

Page 264: DD OS 5.2 Command Reference Guide

snmp del trap-host <host-name-list>

Delete one or more trap hosts from the list of hosts receiving SNMP traps generated by the Data Domain system.

Example

To delete trap host admin12:

# snmp del trap-host admin12

disable

snmp disable

Disable SNMP and close port 161.

enable

snmp enable

Enable SNMP and open port 161.

reset

snmp reset

Reset SNMP agent configuration to default values.

snmp reset ro-communities

Reset list of read-only community strings to default values.

snmp reset rw-communities

Reset list of read-write community strings to default values.

snmp reset sysContact

Reset the system contact to the value displayed by the command system show admin-email, or to an empty string if the system value is empty (default).

snmp reset sysLocation

Reset the system location to the system value displayed by the command system show location, or to an empty string if the system value is empty (default).

snmp reset trap-hosts

Reset list of SNMP trap receiver hosts to default values.

264 EMC DD OS 5.2 Command Reference Guide

Page 265: DD OS 5.2 Command Reference Guide

set

snmp set sysContact <sysContact>

Set the SNMP administrative contact MIB variable.

Example

To set administrative contact to jane-smith:

# snmp set sysContact jane-smith

snmp set sysLocation <sysLocation>

Set the SNMP physical location MIB variable.

Example

To set building location to bldg3-rm222:

# snmp set sysLocation bldg3-rm222

show

snmp show config

Use this command to display all SNMP parameters.

Example

# snmp show config

SNMP sysLocation

SNMP sysContact

Read-only Communities :

Communities Hosts

------------ -------

public

Read-write Communities :

Communities Hosts

------------------ ---------

private myhost.datadomain.com

private1 myhost.datadomain.com,10.10.*

SNMPv2 Trap Hosts:

----------------------------

Hosts Communities

-------------- --- --------------------

127.0.0.1

snmp 265

Page 266: DD OS 5.2 Command Reference Guide

SNMPv3 Trap Hosts:

-----------------------------

Hosts Users

-------------- ---- ------------------

localhost snmpv3user

137.69.76.131 snmpv3user

SNMP v3 Configuration

---------------------------------

User Access Authentication Protocol Privacy Protocol

--------- --------- ----------------------- ----------------

snmpv3user read-only MD5 AES

--------- --------- ----------------------- ----------------

snmp show ro-communities

Show the SNMP read-only community strings.

snmp show rw-communities

Show the SNMP read/write community strings.

Example

# snmp show rw-communities

Read-write Communities :

Communities Hosts

------------------ ----------

private myhost.datadomain.com

private1 myhost.datadomain.com,10.10.*

snmp show sysContact

Show the SNMP administrative contact MIB variable.

snmp show sysLocation

Show the SNMP physical location MIB variable.

266 EMC DD OS 5.2 Command Reference Guide

Page 267: DD OS 5.2 Command Reference Guide

snmp show trap-hosts

Display the trap host list on a Data Domain system.

Example

# snmp show trap-hosts

SNMPv2 Trap Hosts:

-----------------------------

Hosts Communities

-------------- ------------------

127.0.0.1

SNMPv3 Trap Hosts:

--------------------------

Hosts Users

-------------- --------------------

localhost snmpv3user

137.69.76.131 snmpv3user

status

snmp status

Show SNMP status.

user

snmp user add <user-name> <access {read-only | read-write}> [[authentication-protocol {MD5 | SHA1}] [authentication-key <auth-key>] [privacy-protocol {AES | DES}] [privacy-key <priv-key>]]

Add an SNMPv3 user to the system specifying the access rights, authentication protocol, and privacy protocol. The authentication key is used when calculating the digest for the authentication protocol. The privacy key is used as input for the privacy protocol.

Example

# snmp user add snmpv3user access read-only authentication-protocol MD5 authentication-key auth-key privacy-protocol DES privacy-key priv-key

User snmpv3user successfully added.

snmp user del <user-name>

Delete an SNMPv3 user.

snmp 267

Page 268: DD OS 5.2 Command Reference Guide

snmp user modify <user-name> <access {read-only | read-write}> [[authentication-protocol {MD5 | SHA1}] authentication-key <auth-key> [privacy-protocol {AES | DES}] privacy-key <priv-key>]

Modify an SNMPv3 user settings such as access rights, authentication protocol, and privacy key.

snmp user reset

Reset list of SNMPv3 users to default values.

snmp user show <user-name>

Display a SNMPv3 user.

Example

# snmp user show

User Access Authentication Protocol Privacy Protocol

--------- --------- ----------------------- ----------------

jane123 read-only Not Defined Not Defined

snmpv3user read-only MD5 AES

--------- --------- ----------------------- ----------------

Additional TopicsThis section provides additional information on various topics and concepts.

More about SNMP on a Data Domain System

An SNMP manager is software running on a workstation from which an administrator monitors and controls the different hardware and software systems on a network. These devices include, but are not limited to, storage systems, routers, and switches.

An SNMP agent is software running on equipment that implements the SNMP protocol. SNMP defines how an SNMP manager communicates with an SNMP agent. For example, SNMP defines the format of requests that an SNMP manager sends to an agent and the format of replies the agent returns.

From an SNMP perspective a Data Domain system is a read-only device, with one exception: A remote machine can set the SNMP location, contact, and system name on a Data Domain system. The snmp command enables administrative users to configure community strings, hosts, and other SNMP variables on the Data Domain system.

With one or more trap hosts defined, a Data Domain system takes the additional action of sending alert messages as SNMP traps, even when the SNMP agent is disabled.

268 EMC DD OS 5.2 Command Reference Guide

Page 269: DD OS 5.2 Command Reference Guide

Changing Multiple Settings

To change multiple settings quickly, run the snmp disable command, change the settings, and the run snmp enable. Changing multiple settings while SNMP is enabled requires restarting SNMP, which adds time.

SNMP sysLocation and sysContact Variables

The SNMP sysLocation and sysContact variables are not the same as those set with the config set location and config set admin-email commands. However, if the SNMP variables are not set with the SNMP commands, the variables default to the system values given with the config set commands.

snmp 269

Page 270: DD OS 5.2 Command Reference Guide

270 EMC DD OS 5.2 Command Reference Guide

Page 271: DD OS 5.2 Command Reference Guide

storage

The storage command adds, removes, and displays disks and LUNs belonging to active and archive storage tiers. Tiered storage enables the Data Domain system to use different types of storage devices.

A storage tier can contain two types of storage: whole disks in an enclosure, such as a Data Domain system or attached expansion shelf, or LUNs in a Data Domain gateway system that uses a SAN.

System storage for a filesystem or associated RAID disk group consists of two storage tiers: one active and one archive. The active tier has one active unit of storage, and the archive tier has one or more archive units of storage.

Options include:

add

remove

show

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

After adding disks or LUNs to storage tiers, the storage must be provisioned by creating or expanding the filesystem. See “Adding Storage to an Active Tier.”

Available LUNs may be removed from a tier to use as a RAID hot spare.

Version Change

5.2 No changes from previous version.

storage 271

Page 272: DD OS 5.2 Command Reference Guide

OptionsThe following options are available with this command.

add

storage add [tier {active | archive}] {enclosure <enclosure-id> | dev<disk-id> [spindle-group <1-16>] | disk <enclosure-id>.<disk-id> }

Add storage devices to a tier. Device types include all disks in an enclosure, a single disk, or a LUN in a gateway system. Disks or LUNs must be in the Unknown state to be added to the designated tier, after which the state changes to Available. This command cannot be used on dataless head (DLH) units. Default spindle group is 1.

note The storage add dev<disk-id> command option is allowed only after running the command option storage add enclosure <enclosure-id> to add the shelf.

remove

storage remove {enclosure <enclosure-id> | dev<disk-id> | disk <enclosure_id>.<disk-id>}

Remove storage devices from the tier, including all disks in an enclosure, a single disk, or a LUN in a gateway system. You can also remove a disk from a DLH unit. When a device is removed the state changes to Unknown.

This command cannot remove an In Use disk if doing so exceeds the minimum number allowed by the RAID scheme. This command also cannot remove a disk if the disk is a spare or an In Use LUN.

show

storage show {all | summary | tier {active | archive}}

Display information about filesystem storage. All users may run this command option.

Output includes the number of disk groups working normally and the number of degraded disk groups. Details on disk groups undergoing, or queued for, reconstruction, are also shown when applicable. The abbreviation N/A in the column Shelf Capacity License Needed indicates the enclosure does not require a capacity license, or that part of the enclosure is within a tier and the required capacity license for the entire enclosure has been accounted for.

272 EMC DD OS 5.2 Command Reference Guide

Page 273: DD OS 5.2 Command Reference Guide

Example 1

On a Data Domain system:

# storage show all

Active tier details:

Disk Disks Count Disk Additional

Group Size Information

--------------------------------------------------------------------------------------------

dg1 2.1-2.14 14 1.8 TiB

(spare) 2.15 1 1.8 TiB

--------------------------------------------------------------------------------------------

Archive tier details:

Disk Disks Count Disk Additional

Group Size Information

--------------------------------------------------------------------------------------------

dg2 3.1-3.14 14 1.8 TiB

(spare) 3.15 1 1.8 TiB

--------------------------------------------------------------------------------------------

Storage addable disks:

Disk Disks Count Disk Enclosure Shelf Capacity Additional

Type Size Mode License Needed Information

----------------------------------------------------------------------------------------------------------------------

(unknown) 4.1-4.15 15 1.8 TiB ES30 21.8 TiB

----------------------------------------------------------------------------------------------------------------------

Shelf Capacity License:

License Model Total Used Remaining

--------------------------------------------------------------------------------------------------------------------------

CAPACITY-ACTIVE ES20 916.7 TiB 0.0 TiB 916.7 TiB

CAPACITY-ACTIVE ES30 785.8 TiB 21.8 TiB 763.9 TiB

CAPACITY-ARCHIVE ES20 916.7 TiB 0.0 TiB 916.7 TiB

CAPACITY-ARCHIVE ES30 774.8 TiB 21.8 TiB 753.0 TiB

---------------------------------------------------------------------------------------------------------------------------

storage 273

Page 274: DD OS 5.2 Command Reference Guide

Example 2

Output for disk groups undergoing, or queued for, reconstruction:

Diskgroup Disk Progress (%) Remaining (minutes)

Reconstruction

--------- -------------- ------------ -------------------

dg4 4.12 40 125

dg4 (pending) - -

--------- ------------ ------------- --------------------

1 disk is under resconstruction.

1 disk is pending reconstruction.

Additional TopicsThis section provides additional information on various topics and concepts.

Adding Storage to an Active Tier

1. Add disks in two different enclosures to the active tier:

# storage add enclosure 2

# storage add enclosure 5

2. Destroy the filesystem:

# filesys destroy

3. Create a new filesystem with the storage in the active tier:

# filesys create

Viewing Disk and LUN States

To view the state of a disk or LUN on an active or archive tier, use the storage show summary command option.

Example

# storage show summary

Disk States Active tier Archive tier

----------- ----------- ------------

In Use 14 14

Spare 1 1

TOTAL DISKS 15 15

----------- ----------- ------------

274 EMC DD OS 5.2 Command Reference Guide

Page 275: DD OS 5.2 Command Reference Guide

Output Definitions

absent No disk is in the disk slot.

unknown A blank disk inserted into the disk slot, or a disk failed by a RAID system.

available Any of the following:

A previously unknown disk or LUN added to a tier by the storage add enclosure command option.

DD Extended Retention system only: a previously In Use disk or LUN deleted from an archive unit by the filesys archive unit del command option. This operation reverts the disk or LUN to available storage in the archive tier.

A previously failed disk in an expansion shelf populated with other disks belonging to a tier that is not primarily composed of disk group disks, and whose partition was destroyed by the disk unfail command.

In Use Storage that is part of an active filesystem or associated RAID disk group.

Spare A disk that can be used as a RAID hot spare through RAID reconstruction. Spare disks can be used to create or expand the filesystem.

Spare (reconstruction)A spare disk that is pending or undergoing RAID reconstruction, which puts filesystem data into what the formerly spare disk and then makes the disk an integral part of a disk group. After RAID reconstruction of a spare disk completes, the disk is part of a RAID disk group.

Failed Tiered storage (Available, Spare, or In Use) removed from the tier automatically by the disk subsystem, or explicitly by an administrative user. Failed may also indicate unknown or foreign storage explicitly changed to the Failed state.

Foreign A disk belonging to a third-party vendor.

storage 275

Page 276: DD OS 5.2 Command Reference Guide

276 EMC DD OS 5.2 Command Reference Guide

Page 277: DD OS 5.2 Command Reference Guide

support

The support command uploads files from a customer Data Domain system to the Support portal for troubleshooting. The selected files are compressed into a tar. gzip folder with a README file that includes identifying autosupport headers.

Options include:

upload

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Guidelines and RestrictionsUnless otherwise noted, command options are available only to users with admin role permissions.

OptionsThe following option is available with this command.

upload

support upload {bundle [<file-list>] | traces | <file-list>}

Upload files to Support. If using this command option on a master controller in a Global Deduplication Array, information for all nodes is included.

Argument Definitions

bundleSend various Data Domain system log files required by Support.

<file-list>Contains file names available under /ddvar. File names in a list must be separated by one space.

Version Change

5.2 No changes from previous version.

support 277

Page 278: DD OS 5.2 Command Reference Guide

tracesSend multiple perf.log (performance log) files to Support.

278 EMC DD OS 5.2 Command Reference Guide

Page 279: DD OS 5.2 Command Reference Guide

system

The system command enables administrative users to perform standard tasks on Data Domain systems, configure a system for Retention Lock Compliance, and view system-level information.

Options include:

headswap

option

passphrase

poweroff

reboot

retention-lock

sanitize

set

show

status

upgrade

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 New command options:

system passphrase change

system passphrase set

system retention-lock compliance configure

system retention-lock compliance enable

system retention-lock compliance status

system upgrade status

system 279

Page 280: DD OS 5.2 Command Reference Guide

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

The battery entry for NVRAM cards should show as 100 percent charged, enabled. Exceptions are if the system is new or the card is a replacement. In both cases the charge may be less than100 percent initially; however, if it does not reach 100 percent within three days, or if a battery is not enabled, the card must be replaced.

OptionsThe following options are available with this command.

headswap

system headswap

Restore the configuration to a system after a head unit replacement. This command is available only when you swap to DD690, DD690g, DD880, DD880g, and DD990models. For specific instructions, see the Chassis Replacement FRU document for the system.

option

system option reset {login-banner}

Reset the login banner to the default of no banner.

Modified command options:

system show stats [view {nfs | cifs | repl | net | iostat | sysstat | vtl},...] [custom-view <view-spec>,...] [{local | gda-display {row | column}}] [interval <nsecs>] [count <count>]

system show performance [local] [raw | fsop] [<duration> {hr | min} [<interval> {hr | min}]]

Modified output (see “Additional Topics” for details.)

system show performance [local] [raw | fsop] [<duration> {hr | min} [<interval> {hr | min}]]

system show stats [view {nfs | cifs | repl | net | iostat | sysstat | vtl},...] [custom-view <view-spec>,...] [{local | gda-display {row | column}}] [interval <nsecs>] [count <count>]

280 EMC DD OS 5.2 Command Reference Guide

Page 281: DD OS 5.2 Command Reference Guide

system option set console { serial | lan | monitor }

Set the active console option. This command is required for IPMI usage. See “ipmi” for details.

system option set login-banner <file>

Set the login banner file. See “Setting a Log In Banner” for instructions.

system option show

View system options.

passphrase

system passphrase change

Change the passphrase used to access the system. This command option requires security officer authorization.

system passphrase set

For fresh installations, set the passphrase used to access the system. Passphrase length cannot exceed 255 characters.

poweroff

system poweroff

Shut down the Data Domain system. The command performs an orderly shutdown of filesystem processes. This command does not power off external storage.

Example

# system poweroff

The 'system poweroff' command shuts down the system and turns off the power.

Are you sure? (yes|no|?) [no]: y

reboot

system reboot

Shut down and reboot a Data Domain system. The command automatically performs an orderly shutdown of filesystem processes.

Example

# system reboot

The 'system reboot' command reboots the system. File access is interrupted during the reboot.

Are you sure? (yes|no|?) [no]: y

system 281

Page 282: DD OS 5.2 Command Reference Guide

retention-lock

system retention-lock compliance configure

Configure Retention Lock Compliance on the Data Domain system. This command option requires security officer authorization. See “Configuring a System for Retention Lock Compliance” for instructions.

system retention-lock compliance enable

Enable Retention Lock Compliance on the Data Domain system. This command option requires security officer authorization.

system retention-lock compliance status

Display status of the Retention Lock Compliance policy on the system. This command option requires security officer authorization.

sanitize

system sanitize abort

Stop the system sanitization process.

system sanitize start

Start the system sanitization process. Note that prior to running sanitization, snapshots created during a previous replication process by another user may continue to hold deleted data. To ensure data is removed from replication snapshots during system sanitization, synchronize all replication contexts prior to beginning the procedure. See “Ensuring System Sanitization” for details.

system sanitize status

Check system sanitization process status.

system sanitize watch

Monitor the progress of system sanitization.

set

system set date <MMDDhhmm>[[<CC>]<YY>]

Set the system date and time. Do not use this command if Network Time Protocol (NTP) is enabled. This command option requires security officer authorization if the system is enabled for Retention Lock Compliance.

The format for the data and time is:

Two digits for the month, <MM> (01 through 12).

282 EMC DD OS 5.2 Command Reference Guide

Page 283: DD OS 5.2 Command Reference Guide

Two digits for the day of the month, <DD> (01 through 31).

Two digits for the hour, <hh> (00 through 23).

Two digits for minutes, <mm> (00 through 59).

Optional: Two digits for the century <CC> and two digits for the year <YY>.

The hour <hh> and minute <mm> variables are entered in 24-hour format with no colon

between the hours and minutes. 2400 is an invalid entry. The entry 0000 equals midnight.

Example

Use one of the following commands to set the date and time to April 23, 2012, at 9:24 a.m., enter one of the following commands (two- or four-digit year):

# system set date 0423152412

# system set date 042315242012

show

system show all

Show all system information.

system show date

Display the system clock.

system show detailed-version

Show the version number and release information.

Example

# system show detailed-version

Data Domain OS 5.2.0.0-273063

/auto/home/lsbuild/desktop-272152

//prod/main/app/...@273063

273063

//prod/main/platform/os/...@273002

//prod/main/platform/os/linux-2.6.12/arch/x86_64/...@61933

//prod/main/platform/os/linux-2.6.12/arch/i386/...@76935

//prod/main/platform/os/linux-2.6.12/arch/ia64/...@25442

//prod/main/platform/os/debugrpm/...@146377

Distribution: /auto/builds64i/distro/272152/root

272152

//prod/main/platform/user/samba/...@272001

system 283

Page 284: DD OS 5.2 Command Reference Guide

Version info from ddfs executable:

dd_version_timestamp=Mon Nov 7 21:21:42 2011 GMT

dd_version_checksum=4eeb0cb786c783252e1c85b2f7696e26

dd_version_build_level=nightly

dd_version_change_level=//prod/main/app/...@273063

dd_version_client=//ddfab:273063/app/...

dd_version_opened_files=

dd_version_release=5.2.0.0-273063

Version info from kernel:

kernel_version_release=2.6.23-ddr273063

kernel_build_level=SMP

system show eula

View the End User License Agreement (EULA). Note if the user is not present during system installation, the Data Domain Technical Consultant can temporarily bypass license acceptance and continue with the installation by pressing Ctrl-C. Otherwise, the user must press Enter to accept the license, which is displayed the first time he or she logs in to the system. See the DVD Installation Guide for details.

Example

# system show eula

SOFTWARE LICENSE AND MAINTENANCE AGREEMENT

*** IMPORTANT INFORMATION - PLEASE READ CAREFULLY ***

This Software contains computer programs and other proprietary material and

information, the use of which is subject to and expressly conditioned upon

acceptance of this Software License and Maintenance Agreement (the "Agreement").

Output truncated.

system show hardware

Display information about slots and vendors and other hardware in a Data Domain system.

Example

# system show hardware

Slot Vendor Device Ports

------------------------------------------------------------------------------

0 Intel 80003ES2LAN GigE 0a, 0b

1 Micro Memory 5425CN NVRAM Card

2 (empty) (empty)

3 LSI Logic SAS3442E 3a

4 LSI Logic SAS3442E 4a

284 EMC DD OS 5.2 Command Reference Guide

Page 285: DD OS 5.2 Command Reference Guide

5 Chelsio T320 10GbE Dual Port 5a, 5b

6 (empty) (empty)

------------------------------------------------------------------------------

system show meminfo

Display summary of system memory usage.

Example

# system show meminfo

Memory Usage Summary

Total memory:7987 MiB

Free memory:1102 MiB

Total swap:12287 MiB

Free swap:12287 MiB

system show modelno

Display the hardware model number of a Data Domain system.

system show nvram

Display information about NVRAM cards. If output indicates one or more component errors, an alerts notification is sent to the designated group and the Daily Alert Summary email includes an entry citing details of problem.

Example

# system show nvram

Card Component Value

--------------------------------------------------------------------------------------

1 Slot 6

Memory size 1024.00 MiB

Number of batteries 3

Errors 0 PCI, 0 memory

Battery 1 100% charged, enabled

Battery 2 100% charged, enabled

Battery 3 100% charged, enabled

--------------------------------------------------------------------------------------

system 285

Page 286: DD OS 5.2 Command Reference Guide

system show oemid [name | value]

Show details of system OEM. On systems with head units and shelves, the OEM identifier of the head unit is displayed first. Output includes IDs for connected enclosures only.

Example

# system show oemid

Enclosure Model No. OEM Name OEM Value

--------- -------------- --------------- --------------

1 DD890 DELL 72345CC

2 ES30 DELL 72345CC

3 ES30 DELL 72345CC

4 ES30

---------- -------------- --------------- --------------

system show performance [local] [raw | fsop] [<duration> {hr | min} [<interval> {hr | min}]]

Display summary of system performance for designated interval.

Argument Definitions

localDisplay local statistics.

rawShow unformatted statistics.

fsopDisplay the number of each filesystem operation performed per minute.

<duration>The hours or minutes prior to the current time for which to show data.

<interval>The time between each line in the display. To specify the interval, you must also specify the duration.

Example 1

To show performance figures of the prior 30-minute duration only, enter:

# system show performance 30 min

286 EMC DD OS 5.2 Command Reference Guide

Page 287: DD OS 5.2 Command Reference Guide

Example 2

To show performance figures of the prior 30-minute duration with an interval of 5 minutes between each set of figures, enter:

# system show performance 30 min 5 min

Example 3

To show system performance, enter:

# system show performance

------------------------Throughput (MB/s)----------- -----------------------------------------Protocol------------------------------------------------------...

Date Time Read Write Repl Network Repl Pre-comp ops/s load data (MB/s) wait (ms/MB) ...

---------- -------- ----- ----- ---------------------------------in/out--- ---------in/out--- ----- ----- --------------------in/out---- ------------in/out-----...

2011/12/03 16:58:00 0.0 0.0 0.00/ 0.00 0.00/ 0.00 12 0% 13.00/ 2.00 22.2/ 50.0

2011/12/03 17:08:00 0.0 0.0 0.00/ 0.00 0.00/ 0.00 10 0% 10.00/ 2.00

Output truncated.

Output Definitions

Throughput (MB/s)

DateThe date system performance is being viewed.

TimeThe time system performance is being viewed.

ReadThe read throughput data from the Data Domain system.

WriteThe write throughput data to the Data Domain system.

note Throughput Read and Write data includes NFS, CIFS, DD Boost over IP, VTL, NDMP, Replication, DD Boost-managed replication and optimized duplication.

Protocol

Repl Network (in/out)NetworkReplication throughput into and out of the Data Domain system.

Repl Pre-comp (in/out)Replication pre-compressed (logical) throughput into and out of the Data Domain system. The value is always zero for collection replication.

system 287

Page 288: DD OS 5.2 Command Reference Guide

note Protocol data includes NFS, CIFS, DD Boost over IP, and DD Boost-managed replication and optimized duplication. Data does not include Replication, VTL over Fibre Channel, or DD Boost over Fibre Channel.

ops/sOperations per second.

load

Load percentage (pending ops/total RPC ops *100).

data (MB/s in/out)Protocol throughput. Amount of data the filesystem can read from and write to the kernel socket buffer.

wait (ms/MB in/out)Time taken to send and receive 1MB of data from the filesystem to kernel socket buffer.

Compression

gcompGlobal compression rate.

lcompLocal compression rate.

thraPercent of compression units that have been read and discarded without being used. A high percent indicates cache thrashing.

unusPercent of compression unit data that is unused. Because a compression unit contains multiple segments, not all segments in a compression region may be used. A high percent indicates poor data locality.

ovhdPercent of a compression unit cache block that is unused. Compression regions are stored in fixed size (128 KB) blocks. A high ovhd relative to unus indicates space is being wasted due to cache block fragmentation. In the ideal case, ovhd should exactly equal unus.

Cache Miss

dataPercent of data segment lookups that miss in the cache. A high percent indicates poor data prefetching.

288 EMC DD OS 5.2 Command Reference Guide

Page 289: DD OS 5.2 Command Reference Guide

metaPercent of metadata segment lookups that miss in the cache. For each data access, first perform a metadata lookup followed by a data lookup. A high percent indicates poor metadata prefetching.

Streams

rdThe number of active read streams.

wr The number of active write streams.

r+The number of reopened read file streams in the past 30 seconds.

w+ The number of reopened write file streams in the past 30 seconds.

State

CCleaning

DDisk reconstruction

BGDA (also known as multinode cluster [MNC] balancing)

VVerification running (data or container)

M Fingerprint merge

FArchive data movement (active to archive)

SSummary vector checkpoint

IData integrity

system 289

Page 290: DD OS 5.2 Command Reference Guide

Utilization

cpuThe average and maximum CPU utilization. The CPU ID of the most loaded CPU is shown in brackets.

disk

The maximum (highest) disk utilization across all disks. The disk ID of the most loaded disk is shown in brackets. Note that this value may differ from the ID used by disk show commands.

Latency

avg/sdevThe average and standard deviation of the response time for ddfs to service all protocol requests, excluding the time to receive or send the request or reply.

SS Load Balance (user/repl)

Indicates the relative load balance across segment storage (segstore) instances. Information under (user/repl) denotes all user-plus-Replicator traffic.

streamThe number of open streams.

prefetchThe number/percentage of prefetch requests.

rdThe number of read requests.

wrThe number of write requests.

totThe total number of requests.

SS Load Balance (gc)

Denotes type and number of expunge (gc) processes.

prefetchPrefetch processes.

rdRead processes.

wrWrite processes.

290 EMC DD OS 5.2 Command Reference Guide

Page 291: DD OS 5.2 Command Reference Guide

tot

The total number of gc processes.

system show ports

Display information about ports. VTL-related ports do not display unless VTL is enabled.

Example

# system show ports

Port Connection Link Firmware Hardware

Type Speed Address

--------------------------------------------------------------------------------------------------------------------------------------------------

0a Enet 1.0 Gbps 00:26:6c:fa:7d:5d (eth0a)

0b Enet 00:26:6c:fa:7d:5c (eth0b)

1a SAS 01.27.10.00 50:06:02:b0:02:ad:d8:00

1b SAS 01.27.10.00 50:06:02:b0:02:ad:d8:04

1c SAS 01.27.10.00 50:06:02:b0:02:ad:e7:00

1d SAS 01.27.10.00 50:06:02:b0:02:ad:e7:04

2a SAS 12.0 Gbps 01.27.10.00 50:06:02:b0:02:b3:80:10

2b SAS 01.27.10.00 50:06:02:b0:02:b3:80:14

2c SAS 01.27.10.00 50:06:02:b0:02:b3:e0:50

2d SAS 01.27.10.00 50:06:02:b0:02:b3:e0:54

--------------------------------------------------------------------------------------------------------------------------------------------------

Output truncated.

Output Definitions

PortThe port number. See the model-specific installation and setup guide to match a slot to a port number.

Connection TypeThe type of connection, such as Ethernet, SAS, VTL, etc.

Link SpeedThe speed in Gbps (Gigabits per second).

Firmware The Data Domain system HBA firmware version.

Hardware Address A MAC address, a WWN, or a WWPN/WWNN. An address followed by an Ethernet port

number is a MAC address. WWN is the world-wide name of the Data Domain system SAS HBA on a system with expansion shelves. WWPN/WWNN is the world-wide port name or node name from the Data Domain system Fibre Channel HBA on gateway systems.

system 291

Page 292: DD OS 5.2 Command Reference Guide

system show serialno

Display the system serial number. For example:

# system show serialno

Serial number: 8F46942007

system show stats [view {nfs | cifs | repl | net | iostat | sysstat | vtl},...] [custom-view <view-spec>,...] [{local | gda-display {row | column}}] [interval <nsecs>] [count <count>]

Display system statistics to evaluate the performance level of the Data Domain system since the last reboot. If the system is too busy to determine a value, the column shows a dash ( - ) instead of a number. If there is a performance issue, this command option can determine if the problem is on the server, client, or network.

Argument Definitions

localDisplays local values on the master system. Valid on the master node of a cluster only.

gda-displayDisplays values of cluster nodes on the master system in a row or column format. Valid on the master node of a cluster only.

rowIf local or gda arguments are not specified on a GDA master, the argument <gda-display> is the default. Output for each node is in row format, displayed as a single line for each interval.

columnDisplays output of for each node in column format. Column headings indicate type of stat value.

intervalWhen specifying intervals for collecting statistics, the first report is for current activity. Subsequent reports show activity performed during [interval <nsecs>]. The default interval is five seconds. See also system show performance command.

countSpecifies how many times to display the results. The default count is one. If interval is specified and count is omitted, the count is set to infinite, or until the user presses Ctrl-C.

292 EMC DD OS 5.2 Command Reference Guide

Page 293: DD OS 5.2 Command Reference Guide

Example

# system show stats view nfs interval 2

--------------------------------------------------------------------------------------------------------------------------------------------------------------------

CPU |State |NFS | Net |...

aggr busy aggr max |CDBVMSF | ops/s load data in data out wait in wait out | aggr in aggr out |...

% % | | % MB/s MB/s ms/MB ms/MB | MB/s MB/s |...

--------------------------------------------------------------------------------------------------------------------------------------------------------------------

28 28 12 0 13 2.0 22.2 50.0 13.87 0 ...

Output truncated.

Output Definitions

CPU

aggr busy %

Average of busy percentage of all CPUs.

aggr max %

Amount of data sent through all interfaces.

State

Indicates system state. See “State” described in show system performance command for details on what each letter represents.

NFS

Indicates protocol type specified in <view> argument.

ops/sI/O operations.

load %Load percentage (pending ops/total RPC ops *100).x.)

data in % MB/sProtocol throughput. Amount of data the filesystem can read from and write to the kernel socket buffer.

data out % MB/sProtocol throughput. Amount of data the filesystem can write to the kernel socket buffer.

wait in ms/MBAverage amount of time spent in ms to receive the amount of data.

system 293

Page 294: DD OS 5.2 Command Reference Guide

wait out ms/MBAverage amount of time spent in ms to send the amount of data.

Net

aggr in MB/sAmount of data received through all interfaces.

aggr out MB/sAmount of data sent through all interfaces.

system show uptime

Display the filesystem uptime, the time since the last reboot, the number of users, and the average load.

Example

# system show uptime

13:39:53 up 1 day, 19:28, 2 users, load average: 1.00, 1.00, 1.00

Filesystem has been up 1 days, 19:18.

system show version

Display the Data Domain OS version and build identification number.

Example

# system show version

Data Domain OS 5.2.0.0-273063

status

system status

Display status of fans, internal temperatures, and power supplies. Information is grouped separately for the Data Domain system and each expansion shelf connected to the system. See “Checking System Temperature and Power Supply,” for details.

Example

# system status

Enclosure 1

Fans

Description Level Status

----------- ------------ ------

FAN 1 medium OK

FAN 2 medium OK

FAN 3 medium OK

294 EMC DD OS 5.2 Command Reference Guide

Page 295: DD OS 5.2 Command Reference Guide

FAN 4 medium OK

FAN 5 medium OK

FAN 6 medium OK

FAN 7 medium OK

FAN 8 medium OK

----------- ------------ ------

Temperature

Description C/F Status

-------------- ------ ------

MLB TEMP 1 38/100 OK

MLB TEMP 2 26/79 OK

FP TEMP 23/73 OK

BP LEFT TEMP 27/81 OK

BP MIDDLE TEMP 27/81 OK

BP RIGHT TEMP 22/72 OK

LP TEMP 40/104 OK

FHFL TEMP 42/108 OK

CPU 0 TEMP 37/99 OK

CPU 1 TEMP 38/100 OK

-------------- ------ ------

Power Supply

Description Status

--------------- ------

Power Module #1 OK

Power Module #2 OK

--------------- ------

Enclosure 2

Fans

Description Level Status

---------------------- ----- ------

Power module #1 fan #1 low OK

Power module #1 fan #2 low OK

Power module #2 fan #1 low OK

Power module #2 fan #2 low OK

---------------------- ----- ------

Temperature

Description C/F Status

---------------- ----- ------

Internal ambient 25/77 OK

---------------- ----- ------

system 295

Page 296: DD OS 5.2 Command Reference Guide

Power Supply

Description Status

---------------- -----

Power Module #1 OK

Power Module #2 OK

--------------- ------

upgrade

system upgrade <file>

Upgrade the Data Domain system software from the <file> specified in the /ddr/var/releases directory. The upgrade command shuts down the filesystem and reboots the Data Domain system. The upgrade command may require over an hour, depending on the amount of data on the system.

See the Release Notes for instructions on upgrading Data Domain systems. DD OS release notes are available from the Support portal at https://my.datadomain.com.

system upgrade continue

If upgrading a multi-node cluster, run this command option on the master controller to complete the second phase of the upgrade procedure.

system upgrade status

Display current status of upgrade procedure. This command option shows only the current status and then terminates. It is not equivalent to a watch command. For best results, run this command option after the system reboots following the system upgrade command option.

When the upgrade is finished, a message displays the time of completion. If the upgrade is in progress, the command shows the status of upgrade and the phase of the procedure.

Additional TopicsThis section provides additional information on various topics and concepts.

Output Changes for Multi-Thread Mode

NFS server in DD OS 5.2 now runs in a multi-thread safe mode instead of the single-threaded mode in DD OS 5.1. Therefore, output of system show performance command has changed. New columns for utilization statistics are ops/s, load, data, and wait. Columns proc, recv, send, idle are no longer available.

296 EMC DD OS 5.2 Command Reference Guide

Page 297: DD OS 5.2 Command Reference Guide

Configuring a System for Retention Lock Compliance

There are two prerequisites for configuring a system for Retention Lock Compliance:

Installing the license for the feature. See “license” for instructions.

Setting up security office authorization. See “user” for instructions.

To configure the system:

1. Log in to the system as sysadmin.

2. Configure Retention Lock Compliance by entering:

# system retention-lock compliance configure

If the configuration is successful, the system reboots and file access is interrupted during this time.

3. When the reboot has concluded, log in to the system as sysadmin.

See the EMC Data Domain Administration Guide for more information on Retention Lock Compliance and Governance.

Configuring an MTree for Retention Lock Compliance

To enable Retention Lock Compliance on an MTree, enter:

# mtree retention-lock enable mode compliance mtree /data/col1/<mtree_name>

Note that /backup cannot be configured for Retention Lock Compliance. See “mtree” for details.

Setting a Log In Banner

1. Mount the Data Domain system directory /ddvar from another system.

2. Create a text file with your login message as the text on the other system.

3. From the Data Domain system, enter system option set login-banner with the path and file name of the text file you created. For example, to use text from a file named “banner,” enter:

# system option set login-banner /ddvar/banner

system 297

Page 298: DD OS 5.2 Command Reference Guide

Ensuring System Sanitization

If you discover data remains within a snapshot after the system is sanitized, delete the contaminated files and synchronize the replication contexts. When synchronization concludes, reissue the system sanitize start command option.

System sanitization was designed to remove all traces of deleted files and restore the system to the state in which the files never existed. The primary use of this command is to resolve Classified Message Incidents (CMIs) that occur when classified data is copied inadvertently onto a non-secure system. System sanitization is typically required in government installations.

Checking System Temperature and Power Supply

If the overall temperature for a Data Domain system reaches 50 degrees Celsius (122 degrees Fahrenheit), a warning message is generated. If the temperature reaches 60 degrees Celsius (140 degrees Fahrenheit), the Data Domain system shuts down. A Status of Critical indicates that the temperature is above the shutdown threshold.

The CPU temperature values depend on the Data Domain system model. With newer models, the numbers are negative when the status is OK and move toward 0 (zero) as CPU temperature increases. If a CPU temperature reaches 0 Celsius, the Data Domain system shuts down. With older models, the numbers are positive. If the CPU temperature reaches 80 Celsius (176 degrees Fahrenheit), the Data Domain system shuts down.

The Power Supply section reports that all power supplies are operating normally or that one or more are operating abnormally. The message does not identify which power supply or supplies are not functioning (except by enclosure). Look at the back panel of the enclosure and check the LED for each power supply to identify those requiring replacement.

298 EMC DD OS 5.2 Command Reference Guide

Page 299: DD OS 5.2 Command Reference Guide

user

The user command adds and deletes users, changes passwords, manages password aging and strength policies, and displays user roles. A role determines the type of operations a user can perform on the Data Domain system. See “RBAC and User Role Definitions” for details.

The default administrative account is sysadmin. You can change the sysadmin password but cannot delete the account. See the Installation and Setup Guide for details on sysadmin.

Options include:

add

change

del

disable

enable

password

reset

show

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 New command options:

user change role <user> {admin | user | backup-operator | data-access}

Modified command option:

user add user-name [password <password>] [role {admin | security | user}] [min-days-between-change <days>] [max-days-between-change <days>] {warn-days-before-expire <days>] [disable-days-after-expire <days>] [disable-date <date>]

user 299

Page 300: DD OS 5.2 Command Reference Guide

Guidelines and RestrictionsUnless otherwise noted, command options are available only to users with admin role permissions.

OptionsThe following options are available with this command.

add

user add user-name [password <password>] [role {admin | security | user}] [min-days-between-change <days>] [max-days-between-change <days>] {warn-days-before-expire <days>] [disable-days-after-expire <days>] [disable-date <date>]

Add a new user. If password is not specified, the system prompts for one. The default role is user. A user name must start with a number or a letter. Special characters cannot be used. The user names root and test are default names on each Data Domain system and are not available for general use.

Users in the sysadmin role create the first security officer role by adding a user and designating the role “security.” After a user is added as the initial security officer, only security officers can add or delete other security officers. See “Adding a Security Officer” for instructions.

Argument Definitions

passwordPassword must be at least six characters.

roleThe type of user permissions allowed. See “RBAC and User Role Definitions” for details.

min-days-between-changeMinimum number of days allowed before the password can be changed again.

max-days-between-changeMaximum number of days before password expires.

warn-days-before-expireNumber of days of warning before a password expires.

disable-days-after-expireAccount is disabled if inactive for the specified number of days past expiration.

disable-dateAccount is disabled on this date. If not specified, account never expires.

300 EMC DD OS 5.2 Command Reference Guide

Page 301: DD OS 5.2 Command Reference Guide

change

user change password [<user>]

Change a user’s password. The admin user can change any user’s password by using the user-name option. Users with the user role can change only their own passwords. Passwords must comply with the password strength policy, which you can check with the command option user password strength show.

user change role <user> {admin | user | backup-operator | data-access}

Change the role of a user. See “RBAC and User Role Definitions” for details on roles.

del

user del <user>

Remove a user. Note that sysadmin cannot be deleted.

disable

user disable <user>

Disable the specified user account. This prevents the user from logging on to the Data Domain system.

enable

user enable <user> [disable-date <date>]

Enable a specified user account with an optional disable date. The account must already exist on the system. If not specified, the disable date previously assigned to the account is used.

password

user password aging option reset {all | [min-days-between-change] [max-days-between-change] [warn-days-before-expire] [disable-days-after-expire]}

Reset one or more rules in the default password aging policy to the current default values. New accounts inherit the policy in effect at the time they are created, unless you set different aging options with the user add command.

user password aging option set [min-days-between-change <days>] [max-days-between-change <days>] [warn-days-before-expire <days>] [disable-days-after-expire <days>]

Set the default values for the password aging policy. This command option does not require security officer authorization.

user 301

Page 302: DD OS 5.2 Command Reference Guide

user password aging option show

Display the default password aging policy.

user password aging reset <user> {all | [min-days-between-change] [max-days-between-change][warn-days-before-expire] [disable-days-after-expire]}

Reset one or more rules in the password aging policy for the specified <user> to the current default values.

user password aging set <user> [min-days-between-change <days>] [max-days-between-change <days>] [warn-days-before-expire <days>] [disable-days-after-expire <days>]

Set the password aging policy for the specified <user>.

user password aging show [<user>]

Show the password aging policy for all users, or for a specified <user>. Users can check the password aging policy for their own account. Users in the admin role can check the policies for all users.

Example

# user password aging show joe

User Password Minimum Days Maximum Days Warn Days Disable Days Status

Last Changed Between Change Between Change Before Expire After Expire

-----------------------------------------------------------------------------------------------------------------------------------------------------------

joe1 March 28, 2011 0 99999 7 never enabled

sysadmin Mar 16, 2006 0 99999 7 never enabled

-----------------------------------------------------------------------------------------------------------------------------------------------------------

user password strength reset {all | min-length |min-char-classes <num_classes>}

Reset the password strength policy to the default values.

Argument Definitions

allReset both the minimum length and minimum number of character classes to 1.

min-lengthReset the minimum number of characters in the password to 1.

min-char-classesReset the minimum number of character classes to 1.

user password strength set {[min-length <length>] [min-char-classes <num_classes>}

Set the password strength policy. Specify either min-length or min-char-classes, or both.

302 EMC DD OS 5.2 Command Reference Guide

Page 303: DD OS 5.2 Command Reference Guide

Argument Definitions

min-lengthThe minimum number of characters in the password.

min-char-classesThe minimum number of character classes. Specify 1, 2, 3, or 4. Valid passwords must contain at least one character from the specified number of classes. The four character classes are lowercase letters, uppercase letters, digits, and special characters. WhenDD OS counts the number of character classes, an uppercase letter at the beginning of the password does not count as an uppercase letter. Similarly, a digit at the end of the password does not count as a digit.

user password strength show

Show the current password strength policy. All users may run this command option.

# user password strength show

Minimum length of password: 7Minimum number of character classes required in the password: 2

reset

user reset

Reset the user account list, password-aging options, and password-strength parameters to default values.

note This command option is not allowed on Retention Lock Compliance systems.

show

user show active

Display list of users currently logged in.

user show detailed [<user>]

Show detailed information for a specified user or for all users.

user show list

Display list of system users.

user 303

Page 304: DD OS 5.2 Command Reference Guide

Additional TopicsThis section provides additional information on various topics and concepts.

The Role of the Security Officer

The role of Security Officer was created to comply with the Write Once Read-Many (WORM) regulation. This regulation requires electronically stored corporate data be kept in an unaltered, original state for purposes such as eDiscovery. EMC Data Domain added auditing and logging capabilities to enhance the function, most of which are transparent to the user.

As a result of compliance regulations, most command options for administering sensitive operations, such as encryption, Retention Lock Compliance, and archiving now require security officer interaction. The type of interaction varies, depending on the use case.

The role of security officer is also associated with the feature “Role-Based Security Access” (RBAC), another federal requirement to which Data Domain adheres. RBAC introduces various new user roles, each with designated permissions. See “user” for a description of roles and permissions.

There are three types of security officer interaction:

Security Officer Sign Off

The security officer has approved the operation to be performed by the admin. To achieve sign off, the security officer must provide the proper credentials (username and security officer password) when prompted by the admin. Sign-offs occur per-command. They do not persist.

Security Officer Authorization

Synonymous with security officer sign off. The admin has the permission from the security officer to run a command, and the admin has received the security officer credentials.

Security Officer Oversight

Security officer oversight applies when Retention Lock Compliance is enabled on an MTree. However, some commands such as filesys encrypt are always under the purview of the security officer, even in the absence of MTrees enabled with Retention Lock Compliance.

304 EMC DD OS 5.2 Command Reference Guide

Page 305: DD OS 5.2 Command Reference Guide

RBAC and User Role Definitions

Role-based access control (RBAC) is an authentication policy that controls the type of operations a user can perform on a Data Domain system. System access and operations are allowed or restricted based on the permissions associated with each role.

In accordance with RBAC policy, the following roles are available for administering and managing the Data Domain operating system.

adminA user can configure and monitor the entire Data Domain system. Most command options are available to the admin role only.

userA user can monitor Data Domain systems and perform the fastcopy operation. The user role is for standard users who have access to a limited number of command options. For example, most show command options are available at this level.

security (security officer)

Some DD OS procedures require additional security and therefore must be authorized, or “signed off,” by the security officer. During authorization, the admin and the security officer are required to participate when issuing a command. See the section on authorization workflow in “authorization” for details.

In addition to authorizing procedures, only the security officer can create and manage additional security officers. The security role is assigned to local users only. Users in the security role cannot be assigned additional roles.

During an upgrade, if the system contains security officers, a sec-off-defaults permission is created that includes a list of all current security officers.

The user role “security” and “security officer” are synonymous and the terms are used interchangeably in this document.

backup-operatorIn addition to user role permissions, allows a user to create snapshots, import and export tapes to a VTL library, and move tapes within a VTL library.

data-accessFor DD Boost authentication only. A user with this role can log in to a system and can change his or her password, but cannot monitor, manage, or configure a Data Domain system.

user 305

Page 306: DD OS 5.2 Command Reference Guide

Adding a Security Officer

The user in the default role of sysadmin must create the first security officer. After the first security officer role is created, only users with security role permissions can add another security officer.

To add a user with security role permissions, enter:

# user add sec_off password <password> role security

The new security user must log in as the security office and enable the security officer authorization policy by entering:

# authorization policy set security-officer enabled

Adding a User

To add a user named jeff, password xyz1, and role admin, enter:

# user add jeff password xyz1 role admin

user "jeff" added.

Removing a User

To delete the user named jeff, enter:

# user del jeff

deleted user "jeff".

Changing a User Password

To change the password for the user named jane, enter:

# user change password jane

Enter new password:

Re-enter new password:

Passwords matched

Password changed for user "jane".

Changing a Role

To change the role to admin for the user named jane, enter:

# user change jane admin

Role changed for user "jane".

306 EMC DD OS 5.2 Command Reference Guide

Page 307: DD OS 5.2 Command Reference Guide

vtl

EMC Data Domain VTL is a licensed software option that enables backup applications to connect to and manage a Data Domain system as a virtual tape library.

Beginning with version 5.2, new VTL pools are MTree-based. Additionally, multiple MTrees enable the user to more closely configure DD OS for data management needs. MTree-based pools allow MTree replication to be used instead of directory replication.

Existing pools are backward compatible. Users may also create additional backward-compatible pools as needed. VTL pool-based replication is performed using MTree replication for MTree pools, and directory replication for backward-compatible pools.

MTree-specific attributes can be applied to each VTL pool individually instead of inheriting a common set of attributes from the default backup MTree. These attributes include snaphots and snapshot schedules, retention lock policy, and compression information.

In previous versions, access to VTL data in /backup (/data/col1/backup), typically through NFS or CIFS mount of /backup, was relatively unconstrained. This led to issues where VTL data was changed beneath the VTL process; for example, when manually deleting a pool or copying files, and resulted in unexpected behavior or inconsistencies. By using MTrees for pools VTL data is relocated from /backup.

With MTrees, users may continue to use and manage VTL with little or no difference when compared to versions 5.0 and earlier.

Options include:

add

cap

debug

del

disable

drive

enable

export

group

import

initiator

option

vtl 307

Page 308: DD OS 5.2 Command Reference Guide

pool

port

port option

readahead

reset

show

slot

status

tape

Change HistoryClick the command option for details on usage and functionality. See the EMC DD OS Release Notes of the corresponding version for details on modifications, including arguments, output, and permissions.

Version Change

5.2 New command options:

vtl drive show {serial-number <serial-number> | vtl <vtl> [drive {<drive-list>}]}

vtl pool upgrade-to-mtree {<pool-list> | all} [check-only]

Modified command options:

vtl pool add <pool> [backwards-compatibility-mode]

vtl show stats <vtl> [drive {<drive-list> | changer | all}] [port {<port-list> | all}] [interval <secs>] [count <count>]

vtl tape modify <barcode> [count <count>] [pool <pool>] retention-lock {<date> | <period>}

vtl tape move <vtl> source {slot | drive | cap} <src-address-list> destination {slot | drive | cap} <dst-address-list>

vtl tape show {all | pool <pool> | vault | <vtl>} [summary] [count <count>] [barcode <barcode>] [time-display {modification | creation | retention}] [sort-by {barcode | pool | location | state | capacity | usage | percentfull | compression | time | modtime} [{ascending | descending}]]

308 EMC DD OS 5.2 Command Reference Guide

Page 309: DD OS 5.2 Command Reference Guide

Guidelines and Restrictions Unless otherwise noted, command options are available only to users with admin

role permissions.

Verify that a Fibre Channel (FC) interface card is installed in the PCI card array. The VTL feature communicates between a backup server and a Data Domain system through a Fibre Channel interface.

Set the backup software minimum record (block) size. For best results, use 64 KiB or larger. Changing block size after the initial configuration renders data written in the original size unreadable.

The recommended number of concurrent virtual tape drive instances is platform-dependent, as is the recommended number of streams between a Data Domain system and a backup server. This number is system-wide and includes streams from all sources, such as VTL, NFS, and CIFS. For details on the number of tape drives and data streams, see the EMC Data Domain Administration Guide.

Data Domain VTL does not protect virtual tapes from a Data Domain system filesys destroy command. The destroy command deletes all virtual tapes.

Options

add

vtl add <vtl> [model <model>] [slots <num-slots>] [caps <num-caps>]

Add a tape library. Data Domain VTL supports a maximum of 64 library instances.

cap

vtl cap add <vtl> [count <num-caps>]

Add cartridge access ports (CAPs) to a virtual tape library. The total number of CAPs cannot exceed 100 per library or 1000 per system.

vtl cap del <vtl> [count <num-to-del>]

Delete <num-to-del> CAPs from a virtual tape library. The CAPs are deleted from the end.

debug

vtl debug disable [component {all | user | kernel | default | <component-list>}]

Disable debug functionality of the specified components. This command is supported

on both nodes of a cluster.

vtl 309

Page 310: DD OS 5.2 Command Reference Guide

vtl debug enable [component { all | user | kernel | default | <component-list>}] [level {all | high | medium | low | none}] [timeout {never | timeout (mins)}]

Enable debug functionality for the specified components in persistent mode or a specified timeout period at the specified debug level. The unit of timeout is minutes. This command is supported on both nodes of a cluster.

vtl debug show [component {all | user | kernel | default | <component-list>}]

Show specified components, or all components, running debug functionality. This command is supported on both nodes of a cluster.

del

vtl del <vtl>

Recycle (remove) an existing virtual tape library. Any tapes loaded into the library when the library is deleted are not destroyed. Instead, tapes are placed back into the virtual tape vault. When a VTL pool is deleted, the associated MTree is first renamed before deletion. This allows a new pool with the same name to be created.

disable

vtl disable

Close all libraries and shut down the VTL process.

drive

vtl drive add <vtl> [count <num-drives>] [model <model>]

Add drives to a virtual tape library. Drives are added by starting with drive number 1 and scanning for any holes left by the vtl drive del command. When the holes are filled, the drives are appended to the end of the library. The number of slots within a library cannot be fewer than the number of drives in the library. If an attempt is made to add more drives than the current number of slots, the system automatically adds the additional slots required.

note You cannot mix drive models within the same library.

vtl drive del <vtl> drive <drive number> [count <num-to-del>]

Delete virtual drives from a VTL. Any drive can be deleted, which means there can be holes in the drive list. This may cause issues with some applications.

vtl drive show {serial-number <serial-number> | vtl <vtl> [drive {<drive-list>}]}

View details of VTL drives.

310 EMC DD OS 5.2 Command Reference Guide

Page 311: DD OS 5.2 Command Reference Guide

Output Definitions

LocationStandard format location of library or drive.

Serial #Drive serial number.

VendorDrive vendor identification.

ProductDrive product identification.

Product revisionDrive product revision.

StatusDrive status.

BarcodeBarcode of loaded tape.

PoolPool of loaded tape.

Previous SlotPrevious slot of loaded tape.

DeviceSCSI device ID.

Persistent ReservationPersistent reservation information.

Access GroupsFibre Channel access groups for device.

enable

vtl enable

Enable VTL subsystem.

export

vtl export <vtl> {slot | drive | cap} <address> [count <count>]

Remove tapes from a slot, drive, or cartridge-access port (CAP) and send them to the vault.

vtl 311

Page 312: DD OS 5.2 Command Reference Guide

group

vtl group add <group-name> initiator <initiator-alias-or -WWPN>

Add an initiator alias or World Wide Port Name to the specified VTL access group.

vtl group add <group-name> vtl <vtl name> {all | changer | drive <drive-list>} [lun <lun>] [primary-port {all | none | <port-list>}] [secondary-port {all | none | <port-list>}]

Add a changer or drives to the specified VTL access group. You can add a changer or drive, optionally starting at a given LUN. You can optionally specify primary and secondary Data Domain system VTL port lists. By default, the port lists contain all Data Domain system VTL ports.

vtl group create <group-name>

Create a VTL access group with the specified group name. Each Data Domain system device (changer or drive) and initiators may then be added to the VTL access group.

vtl group del <group-name> initiator <initiator-alias-or-WWPN>

Remove an initiator alias or World Wide Port Name from the specified VTL access group.

vtl group del <group-name> vtl <vtl name> {all | changer | drive <drive-list>}

Remove a device from a group. This command immediately removes access from the specified initiator to the VTL devices within the group.

vtl group destroy <group-name>

Remove the specified empty VTL access group. Before you destroy a group, use the vtl group del command to remove the initiators and devices from the group.

vtl group modify <group-name> vtl <vtl name> {all | changer [lun <lun>] | drive <drive> [lun <lun>]} [primary-port {all | none | <port-list>}] secondary-port {all | none | <port-list>}]

Modify a group without removing and replacing devices or initiators in the group. You can use this command to change LUN assignments and primary and secondary port assignments. The main purpose of this command is to change group port assignments.

vtl group rename <src-group-name> <dst-group-name>

Rename a VTL access group. The <dst-group-name> must not already exist. See “Requirements for Group Naming” for name rules. Note that this command does not interrupt active sessions.

vtl group show [ all | vtl <vtl> | <group-name> ]

Show information about VTL access groups. All users may run this command option.

vtl group use <group-name> [vtl <vtl name> {all | changer | drive <drive-list>} {primary | secondary}

Switch ports in use for the specified changer in a group or library to the primary or secondary port list for the specified changer or drives. Immediately change the access

312 EMC DD OS 5.2 Command Reference Guide

Page 313: DD OS 5.2 Command Reference Guide

path to the primary or secondary port for the selected VTL components in an access group. When the path is restored, you can use this command to return the group to its primary port list.

After you apply a group to new VTL ports, a rescan of media server’s SCSI bus may be necessary. Also, a backup application may need to rescan available SCSI devices.

This command interrupts any current access to the specified group and is intended to

be used during path failures.

See “More About vtl group Command Options” for additional tips and guidelines.

import

vtl import <vtl> barcode <barcode> [count <count>] [pool <pool>] [element {drive | cap | slot}] [address <addr>]

Move tapes from the vault into a slot, drive, or cartridge access port.

Use the command vtl tape show <vtl name> to display the total number of slots for a VTL and to view which slots are currently used. Use backup software commands from the backup server to move VTL tapes to and from drives.

The following two commands are equivalent:

# vtl import VTL1 barcode TST010L1 count 5

# vtl import VTL1 barcode TST010L1 count 5 element slot address 1

Default address is 1. Default element is slot. Default pool is Default.

initiator

vtl initiator reset address-method initiator <initiator-alias-or-WWPN>

Reset the address method to the default. Reset the address method used by SCSI REPORT LUNS back to the default (auto).

vtl initiator reset alias <alias name>

Remove an initiator alias. Reset (delete) the initiator alias from the system. Deleting the alias does not affect any VTL access from the specified initiator. To remove an initiator from a group, use the vtl group del command instead.

vtl initiator set address-method {auto | vsa} initiator <initiator-alias-or-WWPN>

Set the device address method used when responding to a SCSI REPORT LUNS command from the specified initiator. With most platforms, you do not need to specify a device address method. Use this command to work around any platform-specific limitations you may encounter.

vtl 313

Page 314: DD OS 5.2 Command Reference Guide

vtl initiator set alias <alias name> wwpn <wwpn>

Add an initiator alias. This command sets an alias for an initiator’s WWPN. An initiator is any Data Domain system client HBA’s world-wide port names (WWPN). This command does not interrupt traffic or VTL group access.

Use the vtl initiator show command on the Data Domain system to list the client WWPNs detected by the Data Domain system. You must match the WWPNs in the command output to the client’s HBA WWPN, including colon delimiters.

The alias must be unique, must not be longer than 256 characters, and can contain only the characters 0-9, a-z, A-Z, underscore(_), and hyphen (-). You can create up to 128 aliases.

Example

The following example uses the client name and port number as the alias to avoid confusion with multiple clients that may have multiple ports:

# vtl initiator set alias client22_2a

wwpn 21:00:00:e0:8c:11:33:04

vtl initiator show [initiator <initiator-alias-or-WWPN> | port <port-list>]

Display information about one or all Fibre Channel devices. Not all devices shown are initiators. All users may run this command option.

option

vtl option disable <option name>

Disable a VTL option. Options include loop-id, auto-eject, and auto-offline. See “Values for vtl option Commands” for definitions.

vtl option enable <option name>

Enable a VTL option. Options include loop-id, auto-eject, and auto-offline. See “Values for vtl option Commands” for definitions.

Example

# vtl option enable auto-offline

If enabled tapes being moved from a drive are automatically taken offline and unloaded unless the “prevent” bit is set for the drive.

vtl option reset <option name>

Reset a VTL option to its default value. Options include loop-id, auto-eject, and auto-offline. See “Values for vtl option Commands” for definitions.

314 EMC DD OS 5.2 Command Reference Guide

Page 315: DD OS 5.2 Command Reference Guide

vtl option set <option name> <value>

Set an option and value. Options include loop-id, auto-eject, and auto-offline. See “Values for vtl option Commands” for definitions.

Example

# vtl option set loop-id 5

The Fibre Channel loop ID is 1 to 126.

vtl option show {<option name> | all}

Show settings for a specific option or all VTL options.

Example

# vtl option show all

Name Value

------------ -------------

loop-id 1

auto-eject disabled

auto-offline disabled

------------ -------------

pool

vtl pool add <pool> [backwards-compatibility-mode]

A pool created with backwards compatibility mode will exist in the default directory (/backup). Replication of backwards-compatibility-mode pools is done using directory-based replication, as in previous releases.

EMC does not recommend creating backwards-compatibility-mode pools unless users have specific requirements; for example, replication with a pre-5.2 DD OS system.

vtl pool del <pool>

Delete a tape pool. You must first use the vtl tape del command to remove all of the tapes from the pool.

vtl pool rename <src-pool> <dst-pool>

Rename a pool. Note that a pool can be renamed only if none of its tapes are in libraries.

vtl pool show {all | <pool>}

List tall tape pools or the contents of a specific <pool>. If the argument all is used, a summary of all tape pools is provided, including the state of each pool, the number of tapes, the total usage and compression for each pool, whether or not a pool is a replication destination, the Retention Lock status of the pool, read/write properties, and the number of tapes in the pool:

vtl 315

Page 316: DD OS 5.2 Command Reference Guide

Output Definitions

RWPool has normal read/write properties.

RDPool is a replication destination.

ROPool is read-only.

RLCEPool is Retention Lock Compliance Enabled.

RLGEPool is Retention Lock Governance Enabled.

RLGDPool is Retention Lock Governance Disabled.

BCMPool is in backward-compatibility mode.

vtl pool upgrade-to-mtree {<pool-list> | all} [check-only]

If a <pool-list> is specified, those pools are candidates for upgrade. If the argument all is specified, backward-compatibility mode pools are upgraded. If no arguments are provided, a precheck confirms that an upgrade is necessary (or possible). If so, the upgrade is performed, converting the specified backward-compatibility mode pools to MTree-based pools.

note An upgrade may only be run when VTL is disabled.

This command option does not convert the pool to MTree under the following conditions:

The pool is a replication source or destination.

The filesystem is full.

The pool collides with an MTree with same name.

Example 1

# vtl pool upgrade-to-mtree all

Checking for VTL upgrade...

Upgrading VTL pools...

VTL upgrade completed successfully.

If the check-only argument is used, the precheck is run, but no upgrade is performed. This allows planning for any necessary changes prior to the upgrade.

316 EMC DD OS 5.2 Command Reference Guide

Page 317: DD OS 5.2 Command Reference Guide

Example 2

# vtl pool upgrade-to-mtree old-pool check-only

Checking for VTL upgrade...

**** Upgrade 'old-pool' cannot be performed, <reason stated here>.

See “Upgrading VTL Directory-Based Pools to MTree-Based Pools” for details.

port

vtl port disable {all | <port-list>}

Disable a single Fibre Channel port or all Fibre Channel ports in the list.

vtl port enable {all | <port-list>}

Enable a single Fibre Channel port or all Fibre Channel ports in the list.

vtl port show detailed-stats

Show the following information about Fibre Channel ports. All users may run this command option.

Control commands

Write commands

Read commands

In (number of MiB written--the binary equivalent of MB)

Out (number of MiB read)

Link failures

LIP count

Sync losses

Signal losses

Error count in primitive sequence protocol

Number of invalid tx words

Number of frames received with a bad CRC

vtl 317

Page 318: DD OS 5.2 Command Reference Guide

vtl port show hardware

Show Fibre Channel ports hardware, including:

Model

Firmware

WWNN

WWPN

All users may run this command option.

vtl port show stats [port {<port-list> | all}] [interval <secs>] [count <count>]

Show VTL I/O stats on Fibre Channel ports. All users may run this command option.

vtl port show summary

Show the following information about Fibre Channel ports. All users may run this command option.

Port

HBA slot

HBA port

Connection type

Link speed

Port ID

Enabled

Status

port option

vtl port option reset [{fcp2-retry | topology} [port {<port-list> | all}]]

Reset options on VTL Fibre Channel ports.

vtl port option set fcp2-retry {disable | enable} [port {<port-list> | all}]

Set FCP2 retry on VTL Fibre Channel ports. Use this command only if FCP2 retry connectivity problems occur.

vtl port option set topology {loop-preferred | loop-only | point-to-point} [port {<port-list> | all}]

Set topology on VTL Fibre Channel ports.

vtl port option show [{fcp2-retry | topology} [port {<port-list> | all}]]

Show options on VTL Fibre Channel ports.

318 EMC DD OS 5.2 Command Reference Guide

Page 319: DD OS 5.2 Command Reference Guide

readahead

vtl readahead reset {stats | summary}

Reset VTL readahead information. When VTL reads a tape file it improves performance by reading ahead information from tape files and caching the information until needed.

vtl readahead show {stats | detailed-stats | summary}

Display readahead information about each open tape file that has been read.

Argument Definitions

statsOverview of information about each open tape file that has been read.

detailed-statsDetailed information each open tape file that has been read.

summarySummary of readahead information on all tape files since the statistics were last reset.

reset

vtl reset hba

Reset the hba. Broadcast new VTLs and VTL changes to clients. Avoid using the vtl reset hba command during an active backup or restore job. Changes may cause an active job to fail, depending on the backup application and host type.

show

vtl show config [<vtl>]

Show the library name and model and tape drive model for a single VTL or all VTLs. All users may run this command option.

vtl show element-address [<vtl>]

Show the following information for all VTLs, or a single VTL. All users may run this command option.

Starting element address

Slot count and starting address

CAP count and starting address

Drive count and starting address

Changer count and starting address

vtl 319

Page 320: DD OS 5.2 Command Reference Guide

vtl show stats <vtl> [drive {<drive-list> | changer | all}] [port {<port-list> | all}] [interval <secs>] [count <count>]

Show VTL I/O stats. Show detailed traffic statistics for devices belonging to the specified VTL. Statistics include speed of read/writes in KiB per second, per VTL drive. All users may run this command option.

slot

vtl slot add <vtl> [count <num-slots>]

Add slots to a virtual tape library. Add one or more slots to the end of the specified virtual tape library. The maximum is 32,000 slots per library, with a maximum of 64,000 slots per system.

vtl slot del <vtl> [count <num-to-del>]

Delete one or more slots from a virtual tape library.

status

vtl status

Show the state of the VTL process. All users may run this command option.

tape

vtl tape add <barcode> [capacity <capacity>] [count <count>] [pool <pool>]

Add one or more virtual tapes and insert them into the vault. Optionally, associate the tapes to the specified pool.

vtl tape copy barcode <barcode> [count <count>] source <src-pool> [snapshot <src-snapshot>] destination <dst-pool>

Copy tapes between VTL pools. Note that an opened writable tape in a tape drive may not be copied. Additionally, source and destination pools cannot be the same unless copying from a snapshot. If the snapshot argument is specified in the command option, tapes are copied from the snapshot of the source pool. In this case the destination pool can be the same as the source pool.

A tape that is in the vault or library slot/cap, or is opened read-only in a tape drive can be copied. A tape that is opened writable in a tape drive may not be copied.

Example

# vtl tape copy barcode AA0000LC count 100 source replica-dest destination daily-restores

320 EMC DD OS 5.2 Command Reference Guide

Page 321: DD OS 5.2 Command Reference Guide

vtl tape del <barcode> [count <count>] [pool <pool>]

Delete the specified tape or one or more tapes. You cannot delete tapes that are in a VTL. See “export” to remove tapes from a VTL.

caution! This command deletes all data on tapes.

vtl tape modify <barcode> [count <count>] [pool <pool>] retention-lock {<date> | <period>}

Modify the state of retention lock of a specified tape or tapes. Change the amount of time to maintain the retention lock on the specified tape or tapes. If the volume is not mounted, the change is made immediately. Otherwise, data is synchronized first. The command fails if the filesystem is read-only.

vtl tape modify <barcode> [count <count>] [pool <pool>] writeprotect {on | off}

Set the write protect state of a specified tape. If the volume is not mounted, the tape file permission is changed immediately. Otherwise, outstanding writes are synchronized first.

vtl tape move <vtl> source {slot | drive | cap} <src-address-list> destination {slot | drive | cap} <dst-address-list>

Move one or more tapes between elements in a VTL. Values for <src-address-list> include: all, 1, 2-14, 3-5, 7-10. Values for <dst-address-list> include: 1, 2-14, 3-5, 7-10, and auto.

You may specify the auto keyword only if moving from tapes from drives to slots. If auto is selected, VTL finds the previous slot the tape was in and moves it to that slot. If the slot is not empty, it moves the next available slot. See

vtl tape move barcode <barcode> [count <count>] source <src-pool> destination <dst-pool>

Move a tape between VTL pools if it is in the vault, or in a library slot or CAP. It may not be moved between VTL pools if the tape is open in a drive. You cannot move the following kinds of tapes:

Tapes open in a drive

Tapes on a replica

Tapes configured with Retention Lock

vtl tape show {all | pool <pool> | vault | <vtl>} [summary] [count <count>] [barcode <barcode>] [time-display {modification | creation | retention}] [sort-by {barcode | pool | location | state | capacity | usage | percentfull | compression | time | modtime} [{ascending | descending}]]

Display information about tapes, including modification, creation, or retention times. If time-display argument is omitted, the default is modification time for backwards-compatibility-mode VTL pools. If you are using Extended Retention (formerly “Archiver”), see “Extended Retention and vtl tape show Command” for information on modification time.

vtl 321

Page 322: DD OS 5.2 Command Reference Guide

Example

# vtl tape show vault time-display retention

Processing tapes....

Barcode Pool Location State Size Used (%) Comp Retention Time

----------------------------------------------------------------------------------------------------------------------------------------------

A00150LC Default vault RO/RL 5 GiB 0.0 GiB ( 0.00%) 0x 2011/01/01 12:00:00

A00151LC Default vault RO/RL 5 GiB 0.0 GiB ( 0.00%) 0x 2011/04/08 00:00:00

A00152LC Default vault RO/RL 5 GiB 0.0 GiB ( 0.00%) 0x 2011/04/08 00:00:00

A00153LC Default vault RO/RL 5 GiB 0.0 GiB ( 0.00%) 0x 2011/04/08 00:00:00

Keywords and Arguments

<addr> Abbreviation for “address.”

<alias or WWPN> Initiator alias or world-wide port name (WWPN).

all Show all information about the object specified by the command option.

ascending | descending Sort a report in the order specified.

auto The device address method chosen based on the numeric LUN range being reported: 0 - 255, peripheral device addressing is used, 256 - 16383, flat device addressing is used (default).

322 EMC DD OS 5.2 Command Reference Guide

Page 323: DD OS 5.2 Command Reference Guide

<barcode> An eight-character virtual tape identifier. Barcodes must start with six numbers or uppercase letters (0-9, A-Z), and end in a two-character tag of L1, L2, L3, LA, LB, or LC for the supported LT0-1, LT0-2, and LT0-3 tape types.Default sizes are used if you do not specify the <capacity> argument when creating the tape cartridge. Defaults are:L1=100 GiB capacity tape, L2 = 200 GiB, and L3 = 400 GiB.LA =50 GiB capacity tape, LB = 30 GiB, and LC =10 GiB. Specified values override the two-character tag.Show information about tapes that match the specified <barcode>. When using count and barcode together, use a wild card character in the barcode to have the count be valid. An asterisk (*) matches any character in that position and all further positions. A question mark (?) matches any character in that position.

caps Abbreviation for “cartridge access ports.”

<capacity> The number of gibibytes (GiB) for each tape created. This value overrides default barcode capacities. The upper limit is 4,000 GiB. For best results, when data becomes obsolete (and the Data Domain system cleaning process marks data for removal) set capacity to 100 or less for efficient reuse of Data Domain system disk space.GiBs equal the base-2 value of Gigabytes (GB).

changer Device type.

check-only Optional argument for vtl pool upgrade-to-mtree command to check if specified pool can be upgraded to an MTree.

component Required argument for vtl debug commands.

vtl 323

Page 324: DD OS 5.2 Command Reference Guide

<component-list> List of vtl debugging components. One or more may be specified.vhba scst fc ddcl vtc vmc vtlprocess group vscsi vtlsm vtc_readahead info_cache persistent_reservations master_client master_server worker_client worker_server vdev_thread registry misc

<count> The number of objects on which to perform the action, as specified by the command option.

<date> Retention-lock date stamp for vtl tape modify command.

detailed-stats Displays details of statistics.

<dest-address> New tape location. Address is indicated by keywords, slot, drive, or cap.

dst-address-list Similar to a typical drive list, such as 1-10, 2,3 etc. In the vtl tape move <vtl> source command, the number of elements must match the number of elements in the <src-address-list>.

The arguments “any” and “all” denote any empty element of the given type can be used. If the source is drive and destination is slot, then the previous slot is tried first.

drive <drive number> Number of VTL drive.

324 EMC DD OS 5.2 Command Reference Guide

Page 325: DD OS 5.2 Command Reference Guide

<drive-list> List of drives in group.

<dst-group-name> Name of the destination group.

<dst-pool> Name of new VTL pool.

<element> Destination element.

fcp2-retry Port option.

<group-name> VTL access group. TapeServer is a reserved group and cannot contain initiators.

<initiator-alias> Alias for an initiator.

interval <secs> Time interval in seconds.

kernel All kernel (low-level) vtl debugging components.

level Degree of vtl debugging verbosity to enable (all | high | medium | low | none).

loop-only Port topology option.

loop-preferred Port topology option.

<lun> A device address to pass to the initiator. The maximum logical unit number (LUN) is 16383. A LUN must be unique within a group, but need not be unique across the system. LUNs for VTL devices within a group must start with zero (0) and be contiguous numbers.

<model> A tape library model name. See the Data Domain technical note for the model name that corresponds with your backup software.

modtime Optional argument for vtl tape show command to display tapes sorted by modification time.

<num-caps> The number of cartridge-access ports. The default is zero (0), and the maximum is 100 per library or 1000 per system.

<num-drives> The number of drives to add. The maximum number of drives across all VTLs is 64 to 540, depending on the memory installed in your Data Domain system.

vtl 325

Page 326: DD OS 5.2 Command Reference Guide

<num slots> The number of slots in the library. You cannot add more drives than the number of configured slots. The maximum number of slots for all VTLs on a Data Domain system is 32,000. Default is 20 slots.

<num-to-del> The number of objects to delete.

<option name> Name of specific option.

<period> Time interval.

percentfull Optional argument for vtl tape show command to display tapes sorted by how full each tape is.

point-to-point Port topology option.

primary The primary VTL ports on which the devices are visible. By default, or if you specify all, the VTL devices are visible on all ports. Specify none if the devices should not be visible on any ports.

<pool name> Name of pool. The argument is required if tapes are in a pool.

<pool-list> List of pools.

<port-list> A comma-separated list of Data Domain system VTL ports. You can specify port names as a range separated by a hyphen (-). The ports must already exist. note For multiple ports, separate each name with

a comma and enclose the list with quotation marks (" ").

retention-lock Enable Retention Lock Compliance or Governance.

<sec> Seconds between each display refresh.

secondary The secondary VTL ports on which the devices are visible to the vtl group use secondary command. By default, the devices are visible on all ports. The secondary port list supports path redundancy.

slot VTL element.

snapshot Keyword for vtl tape copy command.

326 EMC DD OS 5.2 Command Reference Guide

Page 327: DD OS 5.2 Command Reference Guide

sort-by Sort the report on the specified column: barcode, pool, location, state, capacity, usage (number of bytes used on the tape), percentfull, compression, or modtime (modification time).

<src-address> Current tape location. Address is indicated by keywords, slot, drive, or cap.

<src-address-list> List of source addresses.

<src-group-name> Name of source group.

<src-pool> Name of the current VTL pool.

<src-snapshot> Option for vtl tape copy command describing a specific snapshot within a source pool.

stats Display statistics.

summary Show a summary of all tapes and tape usage.

time-display Optional argument for vtl tape show command.

timeout Optional argument for vtl debug enable command describing how long debugging should remain enabled for the specified components.

topology Port option.

vsa Volume set addressing (VSA). This method is used primarily for addressing virtual buses, targets, and LUNs. The HP-UX operating system selects the volume set addressing method based on inquiry data and LUN information returned by the SCSI-3 REPORT LUNS command.

<vtl> Name of library.

write-protect Enable or disable write-protection for a tape.

vtl 327

Page 328: DD OS 5.2 Command Reference Guide

Additional TopicsThis section provides additional information on various topics and concepts.

Upgrading VTL Directory-Based Pools to MTree-Based Pools

After a system upgrade, existing VTL directory-based pools are available as backwards compatibility mode pools. These pools are identified in the output of the command option vtl pool show all. Existing directory replication contexts continue to function for backwards compatibility mode pools.

After the primary system upgrade is complete, a user can upgrade backwards compatibility mode VTL pools to MTree-based pools using the vtl pool upgrade-to-mtree UI at an appropriate time in the customer's upgrade cycle.

This separate step allows interoperability of Data Domain systems at different revision levels; specifically, those using directory replication (which is not available to MTree-based pools.)

Under certain conditions, constraints apply when upgrading VTL directory-based backwards compatibility mode pools to MTree-based pools. Workarounds are included in parentheses.

The filesystem is a collection replication destination. (The replication source must be upgraded.)

A pool has a name that is invalid as an MTree. (The pool must be renamed before upgrade.)

A pool has a name that duplicates an existing MTree name. (The pool or MTree must be renamed before upgrade.)

An insufficient number of MTrees is available to convert pools. (Some pools or MTrees must be merged or deleted before upgrade.)

A pool is referenced in a directory replication context. (The context must be broken before upgrade.)

More About vtl group Command Options

The VTL group feature allows clients to access only selected LUNs from a Data Domain system.

VTL group changes may require the media server to rescan the SCSI bus, or you can use the vtl reset hba command to reset the link.

For troubleshooting purposes, run the command vtl group use to switch between the primary and secondary port lists in the event of path failure. Enter the command vtl group use primary to return the group to the primary port list after the path is repaired.

328 EMC DD OS 5.2 Command Reference Guide

Page 329: DD OS 5.2 Command Reference Guide

Requirements for Group Naming

A VTL group name must be unique, and can only contain the characters 0-9, a-z, A-Z, underscore(_), and hyphen (-). Group names cannot exceed 256 characters. A maximum of 128 groups is allowed. Reserved group names that cannot be used are: TapeServer, default, all, and summary.

Values for vtl option Commands

Values for commands vtl option disable, vtl option enable, vtl option reset, andvtl option set are:

loop-id The Fibre Channel loop ID: 1 to 126.

auto-ejectIf enabled, tapes placed into CAPs are automatically ejected to the vault.

auto-offlineIf enabled, tapes being moved from a drive are automatically taken offline and unloaded unless the “prevent” bit is set for the drive.

Extended Retention and vtl tape show Command

Modification times used by the system for age-based policies may differ from the last modified time displayed in the tape information sections of the GUI and CLI. This is expected behavior.

vtl 329

Page 330: DD OS 5.2 Command Reference Guide

330 EMC DD OS 5.2 Command Reference Guide