Docu51004 Data Domain Operating System Command Reference Guide 5.4
Docu51004 Data Domain Operating System Command Reference Guide 5.4
System
Version 5.4
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with
respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a
particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable
software license.
EMC, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other
countries. All other trademarks used herein are the property of their respective owners.
For the most up-to-date regulatory document for your product line, go to EMC Online Support (https://support.emc.com).
EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com
Preface 13
Chapter 1 adminaccess 17
adminaccess Change History.........................................................................18
adminaccess Guidelines and Restrictions..................................................... 18
adminaccess add.......................................................................................... 18
adminaccess authentication......................................................................... 18
adminaccess certificate.................................................................................19
adminaccess del........................................................................................... 21
adminaccess disable.................................................................................... 21
adminaccess enable..................................................................................... 21
adminaccess ftp............................................................................................21
adminaccess ftps.......................................................................................... 22
adminaccess http..........................................................................................22
adminaccess reset........................................................................................ 22
adminaccess show........................................................................................23
adminaccess ssh.......................................................................................... 23
adminaccess telnet....................................................................................... 24
adminaccess trust.........................................................................................24
adminaccess web..........................................................................................24
Chapter 2 alerts 27
alerts Change History.................................................................................... 28
alerts Guidelines and Restrictions................................................................. 28
alerts clear.................................................................................................... 28
alerts notify-list............................................................................................. 28
alerts show................................................................................................... 30
Chapter 3 alias 31
alias Change History......................................................................................32
alias Guidelines and Restrictions.................................................................. 32
alias add....................................................................................................... 32
alias del........................................................................................................ 32
alias reset..................................................................................................... 32
alias show.....................................................................................................32
Chapter 4 archive 33
archive Change History..................................................................................34
archive Guidelines and Restrictions...............................................................34
archive data-movement.................................................................................34
archive disable..............................................................................................36
archive enable.............................................................................................. 36
archive option............................................................................................... 36
archive report................................................................................................36
archive show.................................................................................................37
archive space-reclamation............................................................................ 37
Chapter 5 authentication 39
authentication Change History...................................................................... 40
authentication Guidelines and Restrictions................................................... 40
authentication nis......................................................................................... 40
Chapter 6 authorization 43
authorization Change History........................................................................ 44
authorization Guidelines and Restrictions..................................................... 44
authorization policy...................................................................................... 44
authorization show....................................................................................... 44
Chapter 7 autosupport 45
autosupport Change History.......................................................................... 46
autosupport Guidelines and Restrictions.......................................................46
autosupport add........................................................................................... 46
autosupport del............................................................................................ 46
autosupport reset..........................................................................................47
autosupport send..........................................................................................47
autosupport set.............................................................................................48
autosupport show......................................................................................... 48
autosupport test........................................................................................... 49
Chapter 8 cifs 51
cifs Change History........................................................................................52
cifs Guidelines and Restrictions.................................................................... 52
cifs add......................................................................................................... 52
cifs del.......................................................................................................... 52
cifs disable................................................................................................... 53
cifs enable.................................................................................................... 53
cifs hosts...................................................................................................... 53
cifs nb-lookup............................................................................................... 53
cifs option.....................................................................................................53
cifs reset....................................................................................................... 54
cifs set.......................................................................................................... 54
cifs share...................................................................................................... 55
cifs show.......................................................................................................56
cifs status..................................................................................................... 56
cifs troubleshooting...................................................................................... 56
Chapter 9 config 59
config Change History................................................................................... 60
config Guidelines and Restrictions................................................................ 60
config reset................................................................................................... 60
config set...................................................................................................... 60
config setup.................................................................................................. 61
config show...................................................................................................61
Chapter 10 ddboost 63
ddboost Change History................................................................................ 64
ddboost Guidelines and Restrictions............................................................. 64
ddboost access.............................................................................................64
ddboost association......................................................................................65
ddboost destroy............................................................................................ 65
ddboost disable............................................................................................ 65
ddboost enable.............................................................................................65
ddboost event...............................................................................................65
ddboost fc.....................................................................................................67
ddboost file-replication................................................................................. 69
ddboost ifgroup............................................................................................ 70
ddboost option............................................................................................. 71
ddboost reset................................................................................................71
ddboost set...................................................................................................72
ddboost show............................................................................................... 72
ddboost status..............................................................................................73
ddboost storage-unit.....................................................................................73
Chapter 11 disk 75
disk Change History...................................................................................... 76
disk Guidelines and Restrictions................................................................... 76
disk beacon.................................................................................................. 76
disk fail......................................................................................................... 76
disk multipath...............................................................................................76
disk port....................................................................................................... 77
disk rescan................................................................................................... 77
disk reset...................................................................................................... 77
disk set......................................................................................................... 77
disk show......................................................................................................77
disk status.................................................................................................... 80
disk unfail..................................................................................................... 81
Chapter 12 enclosure 83
enclosure Change History..............................................................................84
enclosure Guidelines and Restrictions...........................................................84
enclosure beacon..........................................................................................84
enclosure show............................................................................................. 84
enclosure test............................................................................................... 87
Chapter 13 filesys 89
filesys Change History................................................................................... 90
filesys Guidelines and Restrictions................................................................ 90
filesys archive............................................................................................... 90
filesys clean.................................................................................................. 90
filesys create.................................................................................................92
filesys destroy............................................................................................... 93
filesys disable............................................................................................... 93
filesys enable................................................................................................93
filesys encryption.......................................................................................... 93
filesys expand............................................................................................... 97
filesys fastcopy............................................................................................. 97
filesys option................................................................................................ 98
filesys restart.............................................................................................. 100
filesys show................................................................................................ 100
filesys status...............................................................................................103
As part of an effort to improve its product lines, EMC periodically releases revisions of its
software and hardware. Therefore, some functions described in this document might not
be supported by all versions of the software or hardware currently in use. The product
release notes provide the most up-to-date information on product features.
Contact your EMC technical support professional if a product does not function properly
or does not function as described in this document.
Note
This document was accurate at publication time. Go to EMC Online Support (https://
support.emc.com) to ensure that you are using the latest version of this document.
Purpose
This guide describes the EMC Data Domain operating system (DD OS) commands and
provides an overview of how they are used. For more specific, task-based instructions,
see the EMC Data Domain Operating System Administration Guide.
Related documentation
The following Data Domain system documents provide additional information:
l Installation and setup guide for your system, for example, EMC Data Domain DD 2500
Storage System, Installation and Setup Guide
l EMC Data Domain Operating System USB Installation Guide
l EMC Data Domain Operating System DVD Installation Guide
l EMC Data Domain Operating System Release Notes
l EMC Data Domain Operating System Initial Configuration Guide
l EMC Data Domain Product Security Guide
l EMC Data Domain Operating System Administration Guide
l EMC Data Domain Operating System MIB Quick Reference
l EMC Data Domain Operating System Offline Diagnostics Suite User's Guide
l Hardware overview guide for your system, for example, EMC Data Domain DD4200,
DD4500, and DD7200 Systems, Hardware Overview
l Field replacement guides for your system components, for example, Field Replacement
Guide, Data Domain DD4200, DD4500, and DD7200 Systems, IO Module and
Management Module Replacement or Upgrade
l EMC Data Domain, System Controller Upgrade Guide
l EMC Data Domain Expansion Shelf, Hardware Guide (for shelf model ES20 or ES30)
l EMC Data Domain Boost for OpenStorage Administration Guide
l EMC Data Domain Boost for Oracle Recovery Manager Administration Guide
l EMC Data Domain Boost SDK Programmer's Guide
l Statement of Volatility for the Data Domain DD2500 System
l Statement of Volatility for the Data Domain DD4200, DD4500, or DD7200 System
Special notice conventions used in this document
EMC uses the following conventions for special notices:
DANGER
Indicates a hazardous situation which, if not avoided, will result in death or serious
injury.
WARNING
Indicates a hazardous situation which, if not avoided, could result in death or serious
injury.
CAUTION
Indicates a hazardous situation which, if not avoided, could result in minor or moderate
injury.
NOTICE
Note
Typographical conventions
EMC uses the following type style conventions in this document:
Table 1 Typography
Bold Use for names of interface elements, such as names of windows, dialog
boxes, buttons, fields, tab names, key names, and menu paths (what
the user specifically selects or clicks)
Technical support
Go to EMC Online Support and click Service Center. You will see several options for
contacting EMC Technical Support. Note that to open a service request, you must
have a valid support agreement. Contact your EMC sales representative for details
about obtaining a valid support agreement or with questions about your account.
Your comments
Your suggestions will help us continue to improve the accuracy, organization, and overall
quality of the user publications. Send your opinions of this document to:
mailto:[email protected].
The adminaccess command manages access control and enables users to import host
and CA certificates. Command options also enable remote hosts to use the FTP, FTPS,
Telnet, HTTP, HTTPS, SSH, and SCP administrative protocols on the Data Domain system.
SSH is open to the default user sysadmin and to users added by the administrator.
A Certificate Signing Request (CSR) can now be generated for a host certificate. Also, host
certificates can now be imported in PKCS12 or PEM formats. EMC Data Domain uses the
SHA1 RSA encryption algorithm for a CSR and PBE-SHA1-3DES encryption algorithm for
the PKCS12 key and certificate.
This chapter contains the following topics:
adminaccess 17
adminaccess
Version Change
5.4 No changes from previous version.
adminaccess add
adminaccess add ssh-keys [user username]
Add an SSH public key created on a UNIX-based remote machine to the SSH authorized
keys file on the Data Domain system.
adminaccess authentication
adminaccess authentication add {cifs}
Allow Windows domain users with no local account on the Data Domain system to access
the system through SSH, Telnet, and FTP using Windows domain group credentials. For
administrative access, the user must be in the standard Windows Domain Admins group
or in a group that you create named Data Domain. Users from both group names are
always accepted as administrative users. The command also gives user-level access (no
administrative operations allowed) to all other users from the domain. Users must be
from the domain that includes the Data Domain system or a related, trusted domain.
The SSH, Telnet, or FTP command that accesses the Data Domain system must include
the domain name, a backslash, and the user name in double quotation marks.
Note
CIFS must be enabled and the Data Domain system must be part of a Windows domain.
adminaccess authentication del {cifs}
Prevent authentication of a Windows domain. Allow admin role only for users with local
user accounts on the Data Domain system.
adminaccess authentication reset {cifs}
Reset the Windows user access to the default of requiring a local account for
administrative access to the Data Domain system.
adminaccess certificate
adminaccess certificate delete {imported-host | imported-ca |
support-bundle-ca | subject subject-name | fingerprint
fingerprint}
Delete a user imported host, trusted CA certificate, support bundle server CA certificate
(used to upload a support bundle securely), subject, or fingerprint of the imported host or
trusted CA certificate.
Because a single imported host or trusted CA certificate is maintained for HTTPS and key-
manager, you may use the arguments imported-host or imported-ca for deleting those
certificates. Arguments for subject and fingerprint may also be used.
Note
Log out from the browser session before deleting a host certificate. Otherwise HTTPS
browser sessions (using imported host certificates) will be closed. After deleting the host
certificate, refresh or restart the browser to proceed.
adminaccess certificate generate cert-signing-request [key-
strength {1024bit | 2048bit | 4096bit}] [country country-code]
[state state] [city city] [org-name organization-name] [org-
unit organization-unit] [common-name common-name]
Generates a Certificate Signing Request (CSR) under the directory /ddvar/
certificates/CertificateSigningRequest.csr. Users may retrieve the CSR
from the system using SCP, FTP or FTPS. After a CSR is signed by a CA, the public host
certificate can be imported in PEM format.
When prompted, users may choose to regenerate the CSR if a previously generated CSR
exists and the corresponding public host certificate is not imported. After the public host
certificate is imported the CSR is deleted from the system.
If the user does not specify values, default values are used.
Example 1
Argument Definitions
key strength
Enumeration values allowed are 1024 bit, 2048 bit, or 4096 bit. Default is 2048 bit.
adminaccess certificate 19
adminaccess
country
Default is US. Abbreviation for country cannot exceed two characters. No special
characters are allowed.
state
Default is California. Maximum entry is 128 characters.
city
Default is Santa Clara. Maximum entry is 128 characters.
org-name
Default is My Company Ltd. Maximum entry is 64 characters.
org-unit
Default value is empty string. Maximum entry is 64 characters.
common name
Default value is system host name. Maximum entry is 64 characters.
Note
If the certificates are used by System Manager (server extension), running this command
closes the current browser session. Log out of the session prior to running this command.
Example 2
Example 2 (continued)
Example 3 (CSR)
adminaccess del
adminaccess del ssh-keys lineno [user username]
Delete an SSH key from the key file. Users may delete their own keys, and users in admin
role may delete user keys. Run the command option adminaccess show ssh-keys to view
line number values.
adminaccess disable
adminaccess disable {http | https | ftp | ftps | telnet | ssh |
scp | all}
Disable administrative access on the Data Domain system. Disabling FTP or Telnet does
not affect entries in the access lists. If all access is disabled, the Data Domain system is
available only through a serial console or keyboard and monitor.
adminaccess enable
adminaccess enable {http | https | ftp | ftps | telnet | ssh |
scp | all}
Enable a protocol on the Data Domain system. By default, the SSH, HTTP, and HTTPS
services are enabled and FTP and Telnet are disabled. HTTP and HTTPS allow users to log
in from System Manager. To use FTP and Telnet, users with admin role permissions must
add host machines to the access lists.
adminaccess ftp
adminaccess ftp add host-list
Add one or more hosts to the FTP list. Host names cannot include a space. Multiple
entries may be separated by commas, spaces, or both.
adminaccess ftp del host-list
adminaccess del 21
adminaccess
Remove one or more hosts (IP addresses, hostnames, or asterisks) from the FTP list.
Multiple entries may be separated by commas, spaces, or both.
adminaccess ftp option reset [session-timeout]
Reset the FTP options to default values.
adminaccess ftp option set session-timeout timeout-in-secs
Set the FTP client session timeout.
adminaccess ftp option show
Show the current FTP options.
adminaccess ftps
adminaccess ftps add host-list
Add one or more hosts to the FTPS list. Multiple entries may be separated by commas,
spaces, or both.
adminaccess ftps del host-list
Remove one or more hosts (IP addresses, hostnames, or asterisk) from the FTPS list. Host
entries may be separated by commas, spaces, or both.
adminaccess ftps option reset [session-timeout]
Resets the FTPS options to default values.
adminaccess ftps option set session-timeout timeout-in-secs
Sets the FTPS client session timeout.
adminaccess ftps option show
Shows the current FTPS options.
adminaccess http
adminaccess http add host-list
Add one or more hosts to the HTTP/HTTPS list. Host entries may be separated by
commas, spaces, or both.
adminaccess http del host-list
Remove one or more hosts (IP addresses, hostnames, or asterisk) from the HTTP/HTTPS
list. Host entries may be separated by commas, spaces, or both.
adminaccess reset
adminaccess reset {http | https | ftp | ftps | telnet | ssh |
scp | all}
Reset one or more protocols to their default states and clear the access lists of host
entries. Output shows the running state of each protocol.
Note
Because SCP works together with SSH, output appears the same for both. However, due
to the registry configuration, output could be misleading. For example, if SSH is disabled,
SCP also shows as disabled; however, SCP is enabled at the registry level. This is
expected behavior and does not affect functionality. When a user resets SCP, the SCP
registry entry changes to enabled and output for SSH shows as enabled.
adminaccess reset ssh-keys [user username]
Remove the authorized SSH keys file for a user specified user or for the operator account
from the Data Domain system. After removing the file, every SSH connection requires
password authentication.
l Users may reset their own keys only.
l Users with admin role permissions may reset the keys of any user.
l Users with security role or data access permissions may not reset keys.
adminaccess show
adminaccess show
List the access services available on a Data Domain system and display option values for
the access services that are enabled. With the exception of users with data-access
permissions only, all users may run this command option.
l N/A means the service does not use an access list.
l A hyphen means the service can use an access list, but the access list does not
contain host names.
l An asterisk means the service allows all hosts.
adminaccess show ssh-keys [user username]
Display the authorized SSH key file with a line number for each entry. Users with admin
role permissions can view the SSH key files of any user. Users in other roles can view
their own SSH key file only.
adminaccess ssh
adminaccess ssh add host-list
Add one or more hosts to the SSH list. Host entries may be separated by commas,
spaces, or both.
adminaccess ssh del host-list
Remove one or more hosts (IP addresses, hostnames, or asterisks) from the SSH list.
Host entries may be separated by commas, spaces, or both.
adminaccess ssh option reset [server-port | session-timeout]
Reset the SSH options to default values.
adminaccess ssh option set server-port port-number
Set the SSH server port.
adminaccess ssh option set session-timeout timeout-in-secs
Set the SSH client timeout options.
Example 4
adminaccess show 23
adminaccess
adminaccess telnet
adminaccess telnet add host-list
Add one or more hosts to the Telnet list. Host entries may be separated by commas,
spaces, or both.
adminaccess telnet delete host-list
Remove one or more hosts (IP addresses, hostnames, or asterisk) from the Telnet list.
Host entries may be separated by commas, spaces, or both.
adminaccess telnet option reset [session-timeout]
Reset the client session timeout period to the default value none to prevent client
sessions from timing out.
adminaccess telnet option set session-timeout timeout-in-secs
Set the client session timeout period to the specified number of seconds. If no data is
received from a Telnet client within the timeout period, and if the client does not respond
to a subsequent prompt message, the session terminates. The valid range is from 60 to
31536000 (365 days).
To configure the Data Domain system to prevent sessions from timing out, use the
adminaccess telnet option reset command option.
Example 5
adminaccess trust
adminaccess trust add host hostname [type mutual]
Establishes the (mutual) trust with the specified host.
adminaccess trust copy {source | destination} hostname
Copy all trust to or from the specified host.
adminaccess trust del host hostname [type mutual]
Remove the mutual trust from the specified host.
adminaccess trust show [hostname]
Show the list of trusted Certificate Authorities (CAs). All users may run this command
option.
adminaccess web
adminaccess web option reset [http-port | https-port | session
timeout]
Reset the Web options to default values.
adminaccess web option set http-port port-number
Set the HTTP access port for the Web client. Default is port 80.
adminaccess web 25
adminaccess
The alerts command manages current alerts, alert notification groups, and alerts
history. When a user logs in, a message is shown indicating the presence of alerts and
instructions on how to proceed.
Command options enable sending email to a designated recipient or notification group
when an event occurs within the Data Domain system. Depending on the option,
information includes alert type, date posted, and resulting action. More than three
months of alert history is retained.
The default alert notification group (default) is configured to send alerts for any event
class with severity level of Warning or above. Email notifications are sent to Data Domain
Support at [email protected]. The default alert
notification group can only be reset to default values: it cannot be destroyed.
Some event types, such as those in the environment class that pertain to temperature
sensors within the chassis, are detected repeatedly if the underlying condition is not
corrected.
This chapter contains the following topics:
alerts 27
alerts
Version Change
5.4 No changes from previous version.
alerts clear
alerts clear alert-id alert-id-list
Clear an active alert or list of alerts.
Command Options
alert-id-list
List of alert identification numbers.
alerts notify-list
alerts notify-list add group-name { [class class-list [severity
severity]] [emails email-addr-list] }
Modify a notification group by adding an event class, severity level, or recipient email
address.
Example 6
Example 7
Security officer authorization is required only if the group-name has a severity level of
Warning or above and the command is run on a Retention Lock Compliance system. See
the EMC Data Domain Operating System Administration Guide for details on alerts.
Example 8
Example 9
Example 10
alerts notify-list 29
alerts
alerts show
alerts show all [local]
Display details on all alert notification groups.
alerts show current [local]
Display information about current alerts.
alerts show current-detailed [local] [alert-id alert-id-list]
Display details on all current alerts or on a specific current alert. Output includes event
information and an Additional Information field.
alerts show daily [local]
Display daily alert report, including current alerts and 24-hour alert history.
alerts show history [local] [last n {hours | days | weeks |
months}] [start MMDDhhmm [[CC]YY] end MMDDhhmm [[CC]YY]]
Display alert history.
alerts show history-detailed [local] [last n {hours | days |
weeks | months}] [start MMDDhhmm [[CC]YY] end MMDDhhmm
[[CC]YY]]
Display details of alert history.
Command Option Arguments
alert-id-list
List of alert identification numbers.
last n {hours | days | weeks | months}
Use with show option to display alerts for most recent number of n (hours, days,
weeks, months).
The alias command creates, deletes, and displays command aliases for the Data
Domain system command set. Users can administer aliases only for commands for which
they have permission.
This chapter contains the following topics:
alias 31
alias
Version Change
5.4 No changes from previous version.
alias add
alias add alias-name "command"
Add a command alias. Enter the alias name and command, and enclose the command
name in quotation marks. The new alias is available only to the user who created it.
alias del
alias del alias-name
Delete an alias by name.
alias reset
alias reset
Remove user-created aliases and restore defaults.
alias show
alias show
Display all aliases and command definitions.
The archive command is used only on systems licensed to run the EMC Data Domain
Extended Retention software option (formerly Data Domain Archiver). Extended Retention
command options enable the feature and configure policies. See the EMC Data Domain
Operating System Administration Guide for details on functionality, installation, and
configuration.
This chapter contains the following topics:
archive 33
archive
Version Change
5.4 No changes from previous version.
archive data-movement
archive data-movement policy reset age-threshold mtrees mtree-
list
Reset the age threshold for specified MTrees. Files modified only in the past (beyond the
age threshold) are moved to the retention tier during the next data movement. Role
required: admin.
archive data-movement policy reset default-age-threshold
Reset the age threshold to the default value of none. The default age threshold applies to
new MTrees and to MTrees for which the age threshold has not been set. Role required:
admin.
archive data-movement policy set age-threshold {days | none}
mtrees mtree-list
Set the age threshold for specified MTrees. Default is none. Role required: admin.
archive data-movement policy set default-age-threshold {days |
none}
Set the default age threshold. Role required: admin.
Argument Definitions
days
A number from 0 to 18250 (50 years). The number 0 means migrate when data
movement runs.
none
Never migrate. This is the default for the argument default-age-threshold.
Note
For days, last is converted to the value 31. If a schedule is set for the 31st of every
month at 10:00 PM, it is not executed on months with fewer than 31 days. This is a
known issue.
Example 11
Example 12
archive data-movement 35
archive
exception of users assigned to the none management role, all users may run this
command option.
archive disable
archive disable
Disable the Extended Retention software option. Note that the file system must be
destroyed (and all data lost) before Extended Retention can be disabled. Role required:
admin.
archive enable
archive enable
Enable the Extended Retention software option. The file system must be disabled before
Extended Retention can be enabled. Required role: admin.
Note
Mtree replication from a system with Extended Retention to a system without Extended
Retention is supported for recovering previously replicated data only. Attempts to use
this feature for purposes other than recovery generates a warning message. See the EMC
Data Domain Operating System Administration Guide for details.
archive option
archive option reset local-compression-type
Reset the local compression algorithm to default value gz for subsequent data movement
to the retention tier. You must restart the file system for the change to take effect. Role
required: admin.
archive option set local-compression-type {none | lz | gzfast |
gz}
Set the local compression algorithm for subsequent data movement to the retention tier.
You must restart the file system for the change to take effect. Role required: admin.
archive option show [local-compression-type | data-movement-
packing]
Display the local compression algorithm for the retention tier or the progress of the file
migration process. Role required: With the exception of users assigned to the none
management role, all users may run this command option.
archive report
archive report generate file-location filename
Create a report showing the name and location of each file in the file system. If the
filename argument is specified, the report is saved under the fixed directory/ddr/var and
a message notifies the user that the file was created. If the argument is not specified, the
report is displayed in the standard output. The command returns before the entire report
is generated, and a footer indicates that the report is complete. Each line in the report
contains a file name and its location. The location is "Active" for an active tier or a
retention unit name. An asterisk is appended to the line if the file contents span the
active tier and retention unit. Required role: admin.
archive show
archive show config
Display the Extended Retention configuration. Role required: With the exception of users
assigned to the none management role, all users may run this command option.
Example 13
archive space-reclamation
archive space-reclamation resume
Resumes the archive tier space reclamation process. Role required: admin.
archive space-reclamation start
Starts the archive tier space reclamation process. The space reclamation process runs
continuously until stopped or suspended explicitly, or preempted internally by a higher-
priority process such as archive data-movement or file system cleaning. Role required:
admin.
archive space-reclamation status
Shows the status of the archive tier space reclamation process. Role required: admin.
Example 14
archive show 37
archive
The authentication command manages NIS users, domains, groups and servers.
Command options enable the Data Domain system to participate in an active Network
Information Service (NIS) domain, which maintains a centralized repository of users,
groups, and server names. NIS adds a global directory that authenticates users from any
host on the network.
This chapter contains the following topics:
authentication 39
authentication
Version Change
5.4 No changes from previous version.
authentication nis
authentication nis disable
Disable the NIS client. Role required: admin.
authentication nis domain reset
Reset the NIS domain name. Role required: admin.
authentication nis domain set domain [servers server-list]
Set the NIS domain name and optionally add NIS servers to the server-list. Role required:
admin.
authentication nis domain show
Display the NIS domain name. Role required: admin, security, user, backup-operator, or
none.
authentication nis enable
Enable the NIS client. Role required: admin.
authentication nis groups add group-list role {user | admin |
backup-operator}
Add a role-based access control (RBAC) role for NIS users in the group-list. See the EMC
Data Domain Operating System Administration Guide for role definitions. Role required:
admin.
authentication nis groups del group-list role {user | admin |
backup-operator}
Delete a role-based access control (RBAC) role for NIS users in the group-list. See the EMC
Data Domain Operating System Administration Guide for role definitions. Role required:
admin.
authentication nis groups reset
Delete all added NIS groups. Role required: admin.
authentication nis groups show
Display lists of NIS user groups and NIS admin groups. Role required: admin, security,
user, backup-operator, or none.
authentication nis reset
Delete the NIS configuration and set it to the default. Role required: admin.
authentication nis servers add server-list
Add NIS servers to the server-list. Role required: admin.
authentication nis servers del server-list
Delete NIS servers from the server-list. Role required: admin.
authentication nis servers reset
Reset the NIS servers to their default settings. Role required: admin.
authentication nis servers show
Display a list of NIS servers. Role required: admin, security, user, backup-operator, or
none.
authentication nis show
Display the NIS configuration. Role required: admin, security, user, backup-operator, or
none.
authentication nis status
Display the NIS status. Role required: admin, security, user, backup-operator, or none.
authentication nis 41
authentication
authorization 43
authorization
Version Change
5.4 No changes from previous version.
authorization policy
authorization policy reset security-officer
Reset runtime authorization policy to defaults. Resetting authorization policy is not
allowed on Retention Lock Compliance systems.
authorization policy set security-officer {enabled | disabled}
Enable and disable runtime authorization policy. Disabling authorization policy is not
allowed on Retention Lock Compliance systems.
authorization show
authorization show history [last <n> { hours | days | weeks }]
View or audit past authorizations according to the interval specified.
autosupport 45
autosupport
Version Change
5.4 New command options:
autosupport add
autosupport add { alert-summary | asup-detailed } emails email-
list
Add entries to the email list for the daily alert summary or the autosupport report.
Example 15
autosupport del
autosupport del { alert-summary | asup-detailed } emails email-
list
Delete entries from the email list for the daily alert summary or the autosupport report.
Command Option Arguments
alert-summary
Addresses in email list for the Daily Alert Summary.
email-list
Individual email addresses to add to the specified list. Separate the items in the list
with commas, spaces, or both.
autosupport reset
autosupport reset { alert-summary | asup-detailed}
Reset asup-detailed email list or alert-summary email list to the default value.
autosupport reset all
Reset all autosupport command options to the default values. Output includes details on
where alert summaries are sent via email and alert summary schedules.
autosupport reset schedule [ alert-summary | asup-detailed ]
Reset the schedules of the daily alert summary and the autosupport report to the default
values.
l By default, the schedule for the daily alert summary is configured with the daily 0600
options.
l By default, the schedule for the autosupport report is configured with the daily 0800
options.
autosupport reset subject-tag
Reset subject tag to empty for the autosupport report and Daily Alert Summary.
Command Option Arguments
alert-summary
Addresses in email list for the Daily Alert Summary.
autosupport send
autosupport send [email-addr] [cmd "cmd"]
Email a report or command description to the autosupport report email list or to the
address specified. You must enclose the command option name in double quotation
marks.
Example 16
To run the net show stats command and email the results to [email protected]:
autosupport reset 47
autosupport
email-list
Individual email addresses to add to the specified list. Separate the items in the list
with commas, spaces, or both.
autosupport set
autosupport set schedule { alert-summary | asup-detailed }
{ [ { daily | day(s) } time ] | never }
Schedule the daily alert summary or the autosupport report. For either report, the most
recently configured schedule overrides the previously configured schedule.
Example 17
To schedule the daily alert summary for 2 p.m. Monday and Friday:
Example 18
Example 19
autosupport show
autosupport show { all | alert-summary | asup-detailed }
Display the autosupport configuration.
Example 20
Example 20 (continued)
autosupport test
autosupport test { alert-summary | asup-detailed | support-
notify } | email email-addr }
Send a test email to all lists, or to a specific address.
Command Option Arguments
alert-summary
Addresses in email list for the Daily Alert Summary.
email-list
Individual email addresses to add to the specified list. Separate the items in the list
with commas, spaces, or both.
autosupport test 49
autosupport
The cifs command manages CIFS data access between a Data Domain system and
Windows clients. Command options enable and disable access to a Data Domain system
from media servers and other Windows clients that use the CIFS protocol. The cifs
command sets the authentication mode, share management, and administrative access,
and displays status and statistics for CIFS clients.
This chapter contains the following topics:
cifs 51
cifs
Version Change
5.4 No changes from previous version.
cifs add
cifs add /backup client-list
Specify clients that can access a Data Domain system /backup directory. The /backup
directory is the target directory for compressed backup server data.
Note
If adding multiple clients, Data Domain recommends using the cifs share add command
instead.
cifs add /ddvar client-list
Specify clients that can access a Data Domain system /ddvar directory. The /ddvar
directory contains Data Domain system core and log files.
cifs del
cifs del /backup client-list
Remove clients from the list of CIFS backup clients that can access a Data Domain
system /backup directory.
Note
If removing multiple clients, Data Domain recommends using the cifs share destroy
command instead.
cifs del /ddvar client-list
Remove one or more clients from the list of clients that can access a Data Domain
system /ddvar directory.
cifs disable
cifs disable
Disable the CIFS service and prevent CIFS clients from connecting to the Data Domain
system. This command option stops the CIFS file service only. CIFS authentication
services continue to run.
cifs enable
cifs enable
Enable the CIFS service and allow CIFS clients to connect to the Data Domain system. This
command option starts the CIFS file service only.
cifs hosts
cifs hosts add ipaddrhost-list
Add lmhosts mapping. The lmhosts file is a local text file that maps IP addresses to
NetBIOS names. A single IP address can contain multiple hostnames.
cifs hosts del ipaddr
Remove lmhosts mapping for the specified IP address.
cifs hosts reset
Reset lmhosts mapping to the default. This option removes all IP address and NetBIOS
hostnames from the lmhosts file.
cifs hosts show
Display lmhosts mappings. All users may run this command option.
cifs nb-lookup
cifs nb-lookup netbios-name
Display the IP address for the specified NetBIOS name.
cifs option
cifs option reset name
Reset a CIFS option to default value.
cifs option set name value
Set a CIFS option.
cifs option show
Display CIFS options.
cifs disable 53
cifs
cifs reset
cifs reset authentication
Reset the CIFS authentication to the default: workgroup.
cifs reset clients
Reset the CIFS client access list for /backup and / ddvar shares to the default: no client
access.
cifs reset nb-hostname
Reset the NetBIOS hostname to the default: none.
cifs reset stats
Reset cifs statistics.
cifs reset wins-server
Set the WINS server IP address to the default: none.
cifs set
cifs set authentication active-directory realm { [dc1
[dc2 ...]] | * }
Set authentication to the Active Directory. The realm must be a fully qualified name. Use
commas, spaces, or both to separate entries in the domain controller list. Security officer
authorization is required for systems with Retention Lock Compliance enabled.
Note
Data Domain recommends using the asterisk to set all controllers instead of entering
them individually.
When prompted, enter a name for a user account. The type and format of the name
depend on if the user is inside or outside the company domain.
l For user Administrator inside the company domain, enter the name only:
administrator.
l For user Jane Doe in a trusted domain, enter the user name and domain:
[email protected]. The account in the trusted domain must have
permission to join the Data Domain system to your company domain.
The Data Domain system automatically adds a host entry to the DNS server. It is not
necessary to create the entry manually.
If you set the NetBIOS hostname using the command cifs set nb-hostname, the
entry is created for NetBIOS hostname only, not the system hostname. Otherwise, the
system hostname is used.
cifs set authentication workgroup workgroup
Set the authentication mode to workgroup for the specified workgroup name.
cifs set nb-hostname nb-hostname
Set the NetBIOS hostname.
cifs set wins-server ipaddr
Set the WINS server IP address. If CIFS clients are using NetBIOS, a WINS server may be
required to resolve NetBIOS names to IP addresses.
cifs share
cifs share create share path path {max-connections max
connections | clients clients | browsing {enabled | disabled} |
writeable {enabled | disabled} | users users | comment comment}
Create a new share.
Argument Definitions
share
A descriptive name for the share.
path
The path to the target directory.
max-connections
The maximum number of connections to the share allowed at one time.
clients
A comma-separated list of clients allowed to access the share. Specify the clients by
hostname or IP address. No spaces or tabs allowed. If the clients argument is not
specified when creating the share, the share is not accessible by any client. To make
the share accessible for all clients, enter the clients argument and precede client
name by an ampersand.
browsing
The share is seen (enabled, default), or not (disabled) by browsers.
writeable
The share is writable (enabled, default), or not (disabled). By default, administrative
users have write privileges even if the argument writable is disabled.
users
A comma-separated list of user names. Other than the comma delimiter, spaces
(blank or tab) are treated as part of the user name because a Windows user name
can have a space in the name.
The user names list can include group names. Group names must be preceded by an
ampersand symbol.
All users in the client list can access the share unless one or more user names are
specified, in which case only the listed names can access the share. Separate group
and user names by commas only. Spaces may be included within a group name but
are not allowed as delimiters for group names.
comment
A descriptive comment about the share.
cifs share 55
cifs
Modify a share configuration with the same configuration options as the cifs share create
option, except for its path. You cannot change the path for an existing share.
Modifications apply to new connections only.
See the share create command option for a description of the command variables. To
remove a user list for the share, specify users.
cifs share show [share]
Display share configurations for all shares, or for a specified or custom share.
cifs show
cifs show active
Display all active CIFS clients.
cifs show clients
Display all allowed CIFS clients for the default /ddvar administrative share and the
default /backup data share.
cifs show config
Display the CIFS configuration.
cifs show detailed-stats
Display detailed statistics on CIFS activity and performance.
cifs show stats
Display basic statistics on CIFS activity and performance.
cifs status
cifs status
Show status of CIFS: enabled or disabled.
cifs troubleshooting
cifs troubleshooting domaininfo
Report domain information; for example, to check the connectivity between the Data
Domain system and the domain. Also to confirm if authentication issues are due to
domain connectivity.
cifs troubleshooting group groupname | gid | SID
List details for a specified group.
cifs troubleshooting list-groups
List all CIFS groups.
cifs troubleshooting list-users
List all CIFS users.
cifs troubleshooting performance
Collect tcpdump and ddfs traces for CIFS performance analysis.
Example 21
Enter:
Example 21 (continued)
Enter:
cifs troubleshooting 57
cifs
The config command manages Data Domain system configuration settings. Command
options include changing individual configuration parameters and viewing the
configuration setup. For information on how to configure the system, see the EMC Data
Domain Operating System Initial Configuration Guide and the EMC Data Domain Operating
System Administration Guide.
This chapter contains the following topics:
config 59
config
Version Change
5.4 No changes from previous version.
config reset
config reset location
Reset the location description to the default Null.
config reset mailserver
Reset the mail server to the default mail server.
config reset timezone
Reset the time zone to the default US/Pacific. This command option requires security
officer authorization if Retention Lock Compliance is enabled on any MTrees.
config set
config set admin-email email-addr
Set recipient addresses for alerts and autosupport emails. The system requires one
administrative email address. Use the autosupport and alerts commands to add
other email addresses. To check the current setting, use config show admin-
email.
config set admin-host host
Set the machine from which you can log in to the Data Domain system to view system
logs and use system commands. The hostname can be simple, fully qualified, or an IP
address. The host is also added to the FTP and Telnet lists licensed software options only,
and to the CIFS and NFS lists for access to /ddvar and /backup. This command
provides a quick way to add authentication privileges. To check the current setting, use
config show admin-host.
Example 22
Example 23
Example 24
config setup
config setup
Change configuration settings for the system, network, filesystem, CIFS, NFS, and
licenses. Press Enter to cycle through the selections. You will be prompted to confirm any
changes. Choices include Save, Cancel, and Retry.
This command option is unavailable on Retention Lock Compliance systems. Use System
Manager to change configuration settings.
config show
config show admin-email
Display the administrative email address the Data Domain system uses for email from the
alerts and autosupport commands. All users may run this command option.
config show admin-host
Display the administrative host from which you can log into the Data Domain system to
view system logs and use system commands. All users may run this command option.
config show all
Display all config command settings. All users may run this command option.
config show location
Display the Data Domain system location description, if you set one. All users may run
this command option.
config show mailserver
Display the name of the mail server that the Data Domain system uses to send email. All
users may run this command option.
config show timezone
config setup 61
config
Display the time zone used by the system clock. All users may run this command option.
The ddboost command manages the integration of Data Domain systems and disk
backup devices. Command options create and delete storage units on the storage server,
and display the disk space usage of each storage unit. The EMC Data Domain Boost
software option also supports advanced load balancing and failover, distributed segment
processing, encryption, and low-bandwidth optimization.
Quotas provision Data Domain system storage among different backup applications.
Quotas restrict the logical (uncompressed and undeduplicated) storage capacity for each
storage unit. DD Boost storage unit quota limits (hard or soft) can be set or removed
dynamically. Quotas may also be used to provision various DD Boost storage units with
different sizes, enabling an administrative user to monitor the usage of a particular
storage unit over time. Note that it is possible to configure quotas on a system and run
out of storage before quota limits are reached.
Like MTree quota limits, the ddboost storage-unit create command includes
optional arguments to specify quota limits at the time the storage unit is created. Output
of the ddboost storage-unit show command indicates if a quota is defined for the
storage unit.
Fibre Channel transport is available for DD Boost via the DD Boost over Fibre Channel
service and Automatic Image Replication (AIR) is also supported. See the EMC Data
Domain Boost for OpenStorage Administration Guide and the EMC Data Domain Operating
System Administration Guide for details.
This chapter contains the following topics:
ddboost 63
ddboost
Version Change
5.4 No changes from previous version.
ddboost access
ddboost access add clients client-list
Add one or more clients to the list of clients that can access DD Boost. Enter the client
hostname, not IP address.
Example 25
ddboost association
ddboost association create local-storage-unit {replicate-to |
replicate-from} remote-hostnameremote-storage-unit
Create a storage unit association for the specified storage unit, the target Data Domain
system, and target storage unit.
Example 26
Note
This command option deletes unprocessed events in the local storage unit if the
association specified is {replicate-from}. It does not delete user data in the local storage
unit.
ddboost association show [local-storage-unit]
Show the storage unit association list for a specified local storage unit or all local storage
units with an association. All users may run this command option.
ddboost destroy
ddboost destroy
Delete all storage units from the Data Domain system. The command permanently
removes all data (files) contained in the storage units. You must also manually remove
(expire) corresponding catalog entries in the backup software.
ddboost disable
ddboost disable
Disable DD Boost. During the process of disabling DD Boost, all file replication transfers
and read/write jobs are also disabled.
ddboost enable
ddboost enable
Enable DD Boost. If the user, user ID (UID), or group ID (GID) changes, the Data Domain
system updates all files and storage units the next time this command is run.
ddboost event
ddboost event destroy local-storage-unitevent-id
Destroy the event specified by event-id on the specified storage unit.
ddboost association 65
ddboost
Note
This command should not be used routinely. Use this command option to remove events
orphaned as a result of system errors only.
ddboost event show [local-storage-unit]
Show the event list for the specified local storage unit or all local storage units with a
{replicate-from} association.
Events formatted with the suffix .event.nnnnnnn have been processed but not yet
deleted. Events formatted with the suffix .imgset have not yet been processed.
Example 27
ddboost fc
ddboost fc dfc-server-name reset
Reset DD Boost Fibre Channel server name.
Role required: admin.
ddboost fc dfc-server-name set server-name
Set DD Boost Fibre Channel server name. The default dfc-server-name is the Data Domain
system hostname.
Note
Only IP server names are valid in creating AIR associations, DFC server names should not
be used in creating AIR associations:
ddboost fc 67
ddboost
Example 28
ddboost fc status
Show DD Boost Fibre Channel status. Output includes information on admin state and
process state.
Role required: admin, security, user, backup-operator, none.
ddboost fc trace disable [component {all | component-list}]
Disable DD Boost Fibre Channel tracing.
Role required: admin.
ddboost file-replication
ddboost file-replication option reset {low-bw-optim |
encryption}
Reset low-bandwidth optimization or encryption to the default value (disabled). Low-
bandwidth optimization is not supported on DD Extended Retention systems.
ddboost file-replication option set encryption {enabled |
disabled}
Enable or disable encrypted data transfer for DD Boost file-replication. This command
must be entered on the source system and the destination (target) system.
ddboost file-replication option set low-bw-optim {enabled |
disabled}
Enable or disable low bandwidth optimization for DD Boost. This command must be
entered on the source system and the destination (target) system. Default setting is
disabled. Low-bandwidth optimization is not supported on DD Extended Retention
systems.
ddboost file-replication option show [encryption]
Show state of encryption: enabled or disabled.
ddboost file-replication option show [low-bw-optim]
Show state of low bandwidth optimization: enabled or disabled.
ddboost file-replication reset stats
Clear file-replication statistics when DD Boost is enabled.
ddboost file-replication show active
Show the status of a DD Boost file-replication transfer to a destination Data Domain
system. Output for low-bandwidth optimization shows the function as enabled and
running, or as enabled with a configuration mismatch.
ddboost file-replication show detailed-file-history [duration
duration {day | hr}]
Show a detailed, file-based replication history. Data for each file name is organized by
date, time, and direction (outbound or inbound). In Release 5.4.1.0, a new column (Post-
synthetic-optim) is added to the command outputs to provide statistics for synthetic
replication.
ddboost file-replication show detailed-history [duration
duration {day | hr}] [interval interval {hr}]
Show a detailed, cumulative view of file-replication history. Data is organized by date,
time, and direction (outbound or inbound). In Release 5.4.1.0, a new column (Post-
synthetic-optim) is added to the command outputs to provide statistics for synthetic
replication.
ddboost file-replication show file-history [duration duration
{day | hr}]
ddboost file-replication 69
ddboost
Show the data-transfer history of inbound and outbound traffic for files in the Data
Domain system /backup directory.
ddboost file-replication show history [duration duration {day |
hr}] [interval interval {hr}]
Show the data transfer history between the source and destination Data Domain systems.
ddboost file-replication show performance [interval sec] [count
count]
Show in real time the amount of pre-compressed outbound and inbound data compared
to network throughput or post-compressed data. The count displays the number of lines
equal to the count value. Output is shown for the specified interval.
ddboost file-replication show stats
Monitor outbound and inbound traffic on a Data Domain system during replication.
Compression ratio increases when low-bandwidth optimization is enabled. In Release
5.4.1.0, a new column (Post-synthetic-optim) is added to the command outputs to
provide statistics for synthetic replication.
ddboost ifgroup
ddboost ifgroup add group_name {interface ipaddr | client host}
Add an interface, client, or both to group-name or default group. Prior to adding an
interface you must create the group_name unless the group name is the default group.
Note
The group-name default is created during an upgrade of a fresh install and is always
used if group_name is not specified.
Additionally, the IP address must be configured on the Data Domain system and its
interface must be enabled. You can add public or private IP addresses for data transfer
connections. After adding an IP address as an interface, you can enable advanced load
balancing and link failover.
See the EMC Data Domain Boost Administration Guide and theEMC Data Domain Operating
System Administration Guide for more information on interface groups.
ddboost ifgroup create group-name
Create a group with the name group-name for the interface. Group names may contain
numbers 0-9, letters a-z (uppercase and lowercase), hyphens, carets, dollar signs,
underscores, and asterisks. System hostnames, fully qualified hostnames, and wildcard
hostnames indicated by an asterisk may also be used. Reserved group names that
cannot be used are default, all, or none.
ddboost ifgroup del group_name {interface ipaddr | client host}
Remove an interface, client, or both from group_name or default group. Deleting the last
IP address interface disables the ifgroup. If this is the case, you have the option of
terminating this command option.
ddboost ifgroup destroy group-name
Destroy the group name. Only empty groups can be destroyed. Interfaces or clients
cannot be destroyed but may be removed sequentially or by running the command option
ddboost ifgroup reset group-name.
Note
Disable a specific group by entering the group-name. If group-name is not specified, the
command applies to the default group.
ddboost ifgroup enable group-name
Enable a specific group by entering the group-name. If group-name is not specified, the
command applies to the default group.
ddboost ifgroup rename source-group-namedestination-group-name
Rename the ifgroup source-group-name to destination-group-name. This command option
does not require disabling the group.
ddboost ifgroup reset group-name
Reset a specific group by entering the group-name. If group-name is not specified, the
command applies to the default group.
ddboost ifgroup show config {interfaces | clients | groups |
all} [group-name]
Display selected configuration options. If no selection is made, all information about the
specified group-name is shown.
If group-name is not specified, all information about the default group is displayed. Select
the all argument to view configuration options of all groups. All users may run this
command option.
ddboost ifgroup status group-name
Show status of link aggregation: enabled or disabled. Status is displayed for all groups
unless group-name is specified. All users may run this command option.
ddboost option
ddboost option reset {distributed-segment-processing | virtual-
synthetics | fc}
Reset distributed segment processing, virtual synthetics to the default option enabled.
Reset Fibre Channel to the default option of disabled. Virtual synthetics and Fibre
Channel features are supported on single-node configurations and systems with
Extended Retention only.
ddboost option set distributed-segment-processing {enabled |
disabled}
Enable or disable the distributed segment processing feature on the DD OS.
ddboost option set fc {enabled | disabled}
Enable or disable Fibre Channel for DD Boost.
ddboost option set virtual-synthetics {enabled | disabled}
Enable or disable the virtual synthetics feature on the DD OS. Virtual synthetics and Fibre
Channel features are supported on single-node configurations and systems with
Extended Retention.
ddboost option show [distributed-segment-processing | virtual-
synthetics | fc]
Show status of distributed segment processing, virtual synthetics, or Fibre Channel. If no
argument is specified, status for all arguments are shown. Status is enabled or disabled.
Default is disabled for distributed segment processing and virtual synthetics. Default is
enabled for Fibre Channel. All users may run this command.
ddboost reset
ddboost reset stats
ddboost option 71
ddboost
ddboost set
ddboost set user-name user-name
The DD Boost user name cannot be configured while DD Boost is enabled. DD Boost must
be disabled using the ddboost disable command. Then DD Boost user name can be
updated. Finally, DD Boost can be reenabled to verify the user name by using the
ddboost show user-name command.
ddboost show
ddboost show connections
Show the number of DD Boost connections. All users may run this command.
When DD Boost Fibre Channel is enabled, connections are listed in the category
Interfaces and are named DDBOOST_FC. The ifgroup Group Name category does not apply
to DD Boost Fibre Channel; therefore, the group name is listed as n/a.
Note
When an archive train restore image file spans multiple partitions, it uses multiple
concurrent RSS connections for a single job. Therefore, output may show two restore
connections and one control connection. This is expected behavior.
ddboost show histogram
Display a DD Boost histogram for the Data Domain system.
Output Definitions
mean-ms
The mathematical mean time for completion of the operations.
stddev
The standard deviation for time to complete operations, derived from the mean time.
max-s
The maximum time taken for a single operation.
<1ms
The number of operations that took less than 1 millisecond (ms).
<5ms
The number of operations that took between 1 milliseconds and 5 milliseconds.
<10ms
The number of operations that took between 5 milliseconds and 10 milliseconds
100ms
The number of operations that took between 10 ms and 100 ms.
1s
The number of operations that took between 100 ms and one second.
10s
The number of operations that took between 1 second and 10 seconds.
>10s
The number of operations that took more than 10 seconds.
<10s
The number of operations that took less than 10 seconds.
<1m
The number of operations that took between 10 seconds and 1 minute.
<5m
The number of operations that took between 1 minute and 5 minutes.
>5min
The number of operations that took more than 5 minutes.
<100ms
The number of operations that took between 10 milliseconds and 100 milliseconds.
<1s
The number of operations that took between 100 milliseconds and 1 second)
<10s
The number of operations that took between 1 second and 10 seconds)
>10s
The number of operations that took more than 10 seconds.
ddboost status
ddboost status
Display status of DD Boost: enabled or disabled.
ddboost storage-unit
ddboost storage-unit create storage-unit-name [quota-soft-limit
n {MiB|GiB|TiB|PiB}] [quota-hard-limit n {MiB|GiB|TiB|PiB}]
[report-physical-size n {MiB|GiB|TiB|PiB}]
Create a storage unit and set limits. Configure reported physical size. If the physical size
is configured, the logical capacity quota is still available, but its value is not reported in
the SDK to the backup application. Note that if the quota feature is not enabled, the
quota is created but a message appears stating the feature is disabled and limits are not
enforced.
Naming conventions for creating storage units include letters A-Z and a-z, numbers 0-9,
embedded spaces, exclamation points, hash marks, dollar signs, ampersands, carets,
tildes, left and right parentheses, left and right brackets, left and right braces.
Quotas may cause OpenStorage backup applications to report non-intuitive sizes and
capacities. See Knowledge Base article 85210, available on the Support portal, for
details.
ddboost storage-unit modify storage-unit-name [report-physical-
size n|none {MiB|GiB|TiB|PiB}]
ddboost status 73
ddboost
The disk command manages disks and displays disk locations, logical (RAID) layout,
usage, and reliability statistics. Each Data Domain system reports on the number of disks
in the system. For a Data Domain system with one or more Data Domain external disk
shelves, commands also include entries for enclosures and disks.
This chapter contains the following topics:
disk 75
disk
Version Change
5.4 Modified command option:
disk beacon
disk beacon enclosure-id.disk-id
Cause the LED that signals normal operation to flash on the target disk. Press Ctrl-C to
stop the flash. To check all disks in an enclosure, use the enclosure beacon command
option.
disk fail
disk fail enclosure-id.disk-id
Fail a disk and force reconstruction.
disk multipath
disk multipath failback
Manually force all disks to use the primary path. This command works on gateway
models only.
disk multipath option reset {monitor | auto-failback}
Disable multipath configuration monitoring. When disabled, failures in paths to disk
devices do not generate alerts. Multipath configuration monitoring is disabled by default.
To perform auto-failback, use this command to switch over to the primary path when it
becomes available, even if the secondary path remains usable. The auto-failback option
is enabled by default and supported on gateway systems only.
disk multipath option set auto-failback {enabled | disabled}
Enable or disable auto-failback policy. Enabling auto-failback means the primary path is
used when it is available. Disabling auto-failback means the user must manually fail back
to the primary path when the path becomes available. This command is supported on
gateway models only.
disk multipath option set monitor {enabled | disabled}
disk port
disk port enable port-id
Enable the specified initiator port.
disk port show {stats | summary}
Show disk port information.
disk rescan
disk rescan [enclosure-id.disk-id]
Rescan all disks to look for newly removed or inserted disks or LUNs or power on a drive.
disk reset
disk reset performance
Reset disk performance statistics to zero.
disk set
disk set dev disk-id spindle-group 1-16
Assign a LUN group to the disk. You must restart the file system after adding the LUN.
disk show
disk show failure-history
Display list of serial numbers of failed disks in the Data Domain system.
disk port 77
disk
disk show 79
disk
R
Reconstruction
v
Available
K
Known
U
Unknown
O
Foreign
A
Absent
Y
System
D
Disabled
P
Powered Off
Additional legend entries include one for disks undergoing reconstruction and one
for disks in the queue:
C
Copy Recovery Disks
E
Error Disks
disk status
disk status
View details on the Data Domain system disk status. Output includes the number of disks
in use and failed, the number of spare disks available, and if a RAID disk group
reconstruction is underway.
Note
The RAID portion of the display could show one or more disks as Failed while the
Operational portion of the display could show all drives operating nominally. A disk can
be physically functional and available, but not in use by RAID, possibly because of user
intervention.
On a gateway Data Domain system, the display shows only the number and state of the
LUNs accessed by the Data Domain system. The remainder of the display is invalid for a
gateway system.
Reconstruction is done per disk. If more than one disk is to be reconstructed, the disks
queued for reconstruction show as spare or hot spare until reconstruction begins.
In the first line of output, disk status is indicated by one of the following, high-level
states.
Normal
System is operational and all disks are available and ready for use.
Error
A new head unit is in this state when Foreign storage is present. For a system
configured with some storage, Error indicates that some or all of its own storage is
missing.
Warning
A special case of a system that would have been Normal if the system had none of
the following conditions that require user action:
l RAID system degraded
l Foreign storage
l Failed or Absent disks
disk unfail
disk unfail enclosure-id.disk-id
Note
This command option makes a disk previously marked Failed or Foreign usable to the
system.
disk unfail 81
disk
The enclosure command identifies and displays information about Data Domain
system enclosures and attached expansion shelves. Beginning with 5.4, output from the
enclosure show command option includes device VPD information for enclosures on
newer Data Domain appliances (DD4500 and DD7200). VPD information enables users to
monitor systems more efficiently.
This chapter contains the following topics:
enclosure 83
enclosure
Version Change
5.4 Modified command options:
enclosure beacon
enclosure beacon enclosure
Confirm that the DD OS and hardware recognize an enclosure. This command option
causes the LED on each disk in an enclosure to flash green, indicating activity. Press Ctrl-
C to halt the command.
enclosure show
enclosure show all [enclosure]
Display detailed information for all enclosures and environmentals. To view information
on a specific environmental, use the enclosure show command and include the
environmental as an argument; for example enclosure show fans. Environmentals
included in the output of enclosure show all are:
l Fans
l Temperature
l Power-supply
(For enclosure 1 [head unit] only)
l Chassis
l IO-Cards
l Controller
l CPUs
l Memory
l NVRAM
enclosure show chassis [enclosure]
Show detailed enclosure chassis inventory. To view information on a specific enclosure,
include the enclosure number as the keyword.
enclosure show controllers [enclosure]
Display information and status for an enclosure and shelf controller systems.
Controller Definitions (Physical Enclosure Shell)
Enclosure
The number listed here is the enclosure number assigned by the Data Domain OS.
(Enclosure 1 is the head unit.) This number is the argument passed to the command.
Model
The product name or appliance series of the enclosure.
Capacity
The number of usable drive slots in the enclosure.
Serial No.
The serial number of the physical enclosure. As with the WWN, this describes the
enclosure and does not change if components are swapped. Depending on when the
enclosure was manufactured, this may be the same value as the WWN. This value
matches the serial number printed on the label on the back of the enclosure.
Number of Controllers
The number of shelf controllers currently inserted into the enclosure.
enclosure show 85
enclosure
List the internal and CPU chassis temperatures for a system, and the internal temperature
for expansion shelves. CPU temperatures may be shown in relative or ambient readings.
The CPU numbers depend on the Data Domain system model. With newer models, the
numbers are negative when the status is OK and move toward zero as CPU temperature
increases. If a CPU temperature reaches 0 degrees Celsius, the Data Domain system
shuts down. With older models, the numbers are positive. If the CPU temperature reaches
80 Celsius, the Data Domain system shuts down. A status of Critical indicates the
temperature is above the shutdown threshold.
enclosure show topology
Show the layout of the SAS enclosures attached to a system.
enclosure test
enclosure test topology port duration minutes
Test the connections in the enclosure topology.
enclosure test 87
enclosure
The filesys command displays statistics, capacity, status, and use of the filesystem.
Command options also clear the statistics file, and start and stop filesystem processes.
The filesys clean command options reclaim physical storage within the filesystem.
Command output for disk space or the amount of data on disks is computed using base-2
calculations. See the EMC Data Domain Operating System Administration Guide for details.
The filesys archive command option is specific to a Data Domain system with
Extended Retention, and enables administrative users to provision the filesystem with
tiered storage. See the EMC Data Domain Operating System Administration Guide for details
on command usage and examples.
This chapter contains the following topics:
filesys 89
filesys
Version Change
5.4 No changes from previous version.
filesys archive
filesys archive unit add
Create a retention unit from the retention tier of the filesystem, change the state of disks
or LUNs from Available to In Use, and add the new retention unit to the filesystem. Also
view the list of retention unit sizes available in the retention tier.
filesys archive unit del archive-unit
Delete a specific retention unit and change the state of disks or LUNs to available. A
retention unit can be deleted from the tier only when the Data Domain system filesystem
is disabled. Disabling the filesystem stops all Data Domain system operations, including
filesys clean.
This command destroys all data in the retention unit. Files within the retention unit must
be deleted to remove them from the namespace.
Note
filesys clean
filesys clean reset {schedule | throttle | all}
Reset the clean schedule to the default of Tuesday at 6 a.m. (tue 0600), the default
throttle of 50 percent, or both.
filesys clean set schedule { never | daily time | <day(s)> time
| biweekly daytime | monthly <day(s)> time }
Set schedule for the clean operation to run automatically. Data Domain recommends
running the clean operation once a week to maintain optimal availability of the
filesystem. However, if there is no shortage of disk space you may clean less often.
Argument Definitions
never
Turn off the clean schedule.
daily
Run command every day at the set time.
time
Time is 24-hour format and must be specified by four digits. The time mon 0000 is
midnight between Sunday night and Monday morning. 2400 is not a valid time. A
new set schedule command cancels the previous setting.
biweekly
Run command on alternate weeks. Bi-weekly cleaning is recommended for file
migration on systems with Extended Retention.
monthly
Starts command on the day or days specified at the set time. Days are entered as
integers from 1 to 31.
day(s)
Runs on the day or days specified. Days are entered as integers from 1 to 31.
Example 29
Example 30
Example 31
To run the operation more than once in a month, set multiple days in a single command.
For example, to clean the filesystem on the first and fifteenth day of the month at 4 p.m.,
enter:
filesys clean 91
filesys
At 100 percent, cleaning uses system resources in the standard way. Default is 50
percent. When the Data Domain system is not running backup or restore operations,
cleaning runs at 100 percent.
Example 32
Note
Because some files may be dropped during verification, output of the percent completion
phase may not reach 100 percent. This is expected behavior.
filesys create
filesys create
Create a filesystem or associated RAID disk group with available and spare storage in the
active tier. Change the state from Available to In Use.
filesys destroy
filesys destroy [and-zero]
Delete all data in the Data Domain system filesystem including data configured with
Retention Lock Governance, remove Replicator configuration settings, and return
filesystem settings to defaults. When this process is finished, NFS clients connected to
the Data Domain system may require a remount.
Note
By default, this command only marks the filesystem data as deleted. Disks are not
overwritten with zeroes unless you specify the and-zero option. Filesystem data marked
deleted cannot be recovered, even if the disks have not been overwritten with zeroes. The
and-zero option adds several hours to the destroy operation. It is not supported on
Data Domain gateway systems.
filesys disable
filesys disable
Stop filesystem operations.
filesys enable
filesys enable
Start the filesystem operations. On systems configured with Retention Lock Compliance,
security officer authorization is required if there is time skew in the system clock. See the
section on Retention Lock Compliance in the EMC Data Domain Operating System
Administration Guide for details.
filesys encryption
filesys encryption algorithm reset
Reset the algorithm to the default: aes_256_cbc. After running this command, you must
restart the filesystem with the filesys restart command option.
filesys encryption algorithm set {aes_128_cbc | aes_256_cbc |
aes_128_gcm | aes_256_gcm}
Select the encryption algorithm. After running this command, you must restart the
filesystem with the filesys restart command option.
The aes_256_gcm option (AES in the Galois/Counter mode), is the most secure
algorithm, but is significantly slower than Cipher Block Chaining (CBC) mode.
filesys encryption algorithm show
Display encryption algorithm. Output indicates changes are pending, if applicable.
filesys encryption apply-changes
Update filesystem with current encryption configuration. Encryption changes are applied
to all data in the Data Domain system during the next cleaning cycle.
filesys encryption disable
filesys destroy 93
filesys
Deactivate encryption. Before running this command, disable the filesystem (filesys
disable). After running this command, restart the filesystem (filesys restart).
Changes take effect after the filesystem is restarted. This command requires security
officer authorization.
Log in as a security role. If necessary, create a security officer role.
Enter:
# authorization policy set security-officer enabled
Note
A Data Domain system retrieves a key from RSA DPM by Key Class. Choices for the RSA
DPM attribute Get Key Behavior of a Key Class are New Key Each Time or Use Current
Key. In this release, Data Domain supports the Key Class Use Current Key only. An
error message is not issued if the Key Class is incorrectly configured to generate a new
key each time; however, the Data Domain system does not receive the correct key to
encrypt the data.
Argument Definitions
server
The name of the RSA DPM key manager server or IP address.
port
The port number of the RSA server on which the key manager is listening.
fips-mode
Use the argument disabled if the imported certificate for key management is not in
FIPS mode. Default is enabled.
key-class
The Key Class configured on the key manager for the Data Domain system.
Note
Key Class name must be enclosed in single or double quotes if the name contains special
characters, such as a comma or a space.
filesys encryption key-manager show
Display details about the key manager. See the EMC Data Domain Operating System
Administration Guide for descriptions of key states.
filesys encryption keys delete keyid
Delete the key from the filesystem after the number of keys has exceeded 254. Only a
Destroyed-Compromised key or a Destroyed key can be deleted. This command option
requires security officer authorization.
Log in as a security role. If necessary, create a security officer role.
Enter:
# authorization policy set security-officer enabled
filesys encryption 95
filesys
Export encryption keys. All encryption keys in the filesystem are exported to a file that can
recover encryption keys in the system if required. The key file is passphrase encrypted
and you will be prompted for a passphrase. To protect the key file, you may enter a new
passphrase that differs from the Data Domain system passphrase. Lost or forgotten
passphrases cannot be recovered. This command option requires security officer
authorization.
EMC recommends using this command option when a new key is created or when a
change of the state occurs to any of the existing keys. EMC also recommends sending the
exported file via FTP for storage in a secure location, accessible to authorized users only.
filesys encryption keys show [keyid]
Display the details of an encryption key. This command options require security officer
authorization.
Log in as a security role. If necessary, create a security officer role.
Enter:
# authorization policy set security-officer enabled
Note
A Data Domain system retrieves a key from RSA DPM by Key Class. Choices for the RSA
DPM attribute Get Key Behavior of a Key Class are New Key Each Time or Use Current
Key. In this release, Data Domain supports the Key Class Use Current Key only. An
error message is not issued if the Key Class is incorrectly configured to generate a new
key each time; however, the Data Domain system does not receive the correct key to
encrypt the data.
filesys encryption lock
Before locking the system, verify there are no keys in a compromised state. For security
purposes, EMC Data Domain recommends performing a filesystem clean procedure first.
Lock the system by creating a new system passphrase and destroying the cached copy of
the current passphrase. There is only one passphrase for the Data Domain system. Before
you run this command, you must disable the filesystem (filesys disable). This
command option requires security officer authorization.
Log in as a security role. If necessary, create a security officer role.
Enter:
# authorization policy set security-officer enabled
After running this command, the system encryption keys are unrecoverable until the
system is unlocked with the system passphrase. This command is useful when preparing
a Data Domain system and its external storage devices for shipment.
A new system passphrase is not stored and can be forgotten. EMC Data Domain
recommends keeping a record of the passphrase in a safe location. Data cannot be
recovered without the new passphrase.
filesys encryption show
Check the status of the encryption feature.
filesys expand
filesys expand
Increase the filesystem by using all space in the active tier.
filesys fastcopy
filesys fastcopy source src destination dest
Copy a file or directory tree from a Data Domain system source directory to another
destination on the Data Domain system.
Source names src that include spaces or special characters must be entered according to
the following conventions.
l Enclose the entire source pathname with double quotation marks:
filesys fastcopy source "/data/col1/backup/.snapshot/fast copy"
destination /data/col1/backup/dir
OR
filesys expand 97
filesys
Argument Definitions
source src
The location of the directory or file to copy. The first part of the path must be data/
col1/.
destination dest
The destination for the directory or file being copied. The destination cannot already
exist.
filesys option
filesys option disable report-replica-as-writable
Set the reported read/write status of a replication destination filesystem to read-only.
Use the filesys disable command before changing this option and use the
filesys enable command after changing the option.
With CIFS, use the cifs disable command before changing the option and use the
cifs enable command after changing the option.
filesys option enable report-replica-as-writable
Set the reported read/write status of a replication destination filesystem to read/write.
Use the filesys disable command before changing this option and use the
filesys enable command after changing the option.
With CIFS, use the cifs disable command before changing the option and use the
cifs enable command after changing the option.
filesys option reset {local-compression-type | low-bw-optim |
marker-type | report-replica-as-writable | global-compression-
type | staging-reserve | staging-clean | staging-delete-suspend
| compute-segfeatures | app-optimized-compression}
Return filesystem compression to the default settings on the destination Data Domain
system.
Argument Definitions
local-compression-type
Reset the compression algorithm to the default of lz.
low-bw-optim
Reset low-bandwidth optimization to the default of auto.
marker-type
Return the marker setting to the default of auto.
report-replica-as-writable
Reset the filesystem to read-only.
global-compression-type
Remove a manually set global compression type. The filesystem continues to use the
current type. Only when a filesys destroy command is entered does the type
used change to the default of 9.
staging-reserve
Set staging reserve percentage from 0 to 90.
app-optimized-compression
Reset the data-specific compression optimizations to none.
Example 36
filesys option 99
filesys
low-bw-optim
Display if low-bandwidth optimization is enabled.
marker-type
Display the current marker setting.
report-replica-as-writable
Display the current reported setting on the destination Data Domain system.
global-compression-type
Display the current global compression type.
staging-reserve
Set staging reserve percentage from 0 to 90.
app-optimized-compression
Display which data-specific compression optimizations are enabled.
filesys restart
filesys restart
Disable and enable the filesystem in a single operation.
filesys show
filesys show compression [filename] [last n {hours | days}]
[no-sync]
filesys show compression [tier {active | archive}] summary |
daily | daily-detailed {[last n { hours | days | weeks |
months }] | [start date [end date]]}
These two command options display the space used by, and compression achieved for,
files and directories in the filesystem. When run on a Data Domain system with Extended
Retention, information is also shown for the active or retention tiers. Values are reported
in Gigibytes (GiB). See the EMC Data Domain Operating System Administration Guide for
details.
In general, the more often a backup procedure is run on a file or filesystem, the higher the
compression. The output does not include global and local compression factors for the
Currently Used table, but uses a dash instead. Output for a busy system may not return
for several hours, depending on the number of files. Other factors may influence the
output display.
Running the command without arguments generates default output that shows a
summary of compression statistics for all files and directories in the filesystem for the
last 7 days and the last 24 hours. Output includes details on active and retention tiers for
systems with Extended Retention only.
Argument Definitions
filename (Optional)
Synchronize all modified files to disk and then display compression statistics for the
specified file or directory only. To display compression statistics for a specific file or
directory without first synchronizing all modified files to disk, include the no-sync
option.
Depending on the number of files in the filesystem, specifying a file name could
cause this command to process for several hours before completing.
100 EMC Data Domain Operating System 5.4 Command Reference Guide
filesys
daily (Optional)
In addition to the summary output, display the following information for each day,
over the previous four full weeks, plus the current partial week. This option is not
available if you specify a file or directory name.
daily-detailed (Optional)
Display the daily output, but also include the following information for each day.
This option is not available if you specify a file or directory name.
start date (Optional)
In the summary portion of the output, display filesystem compression statistics for
the time frame that begins on the specified day instead of the past 7 days. The
statistics for the last 24 hours remain in the summary output. If you specify a time
frame less than the previous 4 weeks, plus the current full week, the daily or daily-
detailed output (if specified) is truncated to the shorter time frame.
Specify date in the format yyyy-mm-dd. By default, the last day of the time frame
specified with this argument is the most recent, full day elapsed.
end date (Optional)
Valid only if the start option is used. In the summary portion of the output, display
filesystem compression statistics for the time frame that ends on the specified day.
In general, the more often a backup is done for a particular file or filesystem, the
higher the compression. On a busy system, this process may not complete for
several hours, depending on the number of files. Other factors may also affect
results.
On a standard Data Domain system, output includes information on active tier only.
Output Definitions
Pre-Comp
Data written before compression.
Post-Comp
Storage used after compression.
Global-Comp Factor
Ratio of Pre-Comp / (size after global compression). Not applicable to the storage
currently used.
Local-Comp Factor
Ratio of (size after global compression)/Post-Comp. Not applicable to the storage
currently used.
Total-Comp Factor
Ratio of Pre-Comp / Post-Comp.
Reduction %
Percentage value (Pre-Comp - Post-Comp) / Pre-Comp) * 100. This is the default
output format.
102 EMC Data Domain Operating System 5.4 Command Reference Guide
filesys
filesys status
filesys status
Display the state of the filesystem process. If the filesystem was shut down with a Data
Domain system command, such as filesys disable, the output display includes the
command name in square brackets.
filesys sync
filesys sync
Synchronize modified files to disk.
104 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 14
help
The Command Line Interface (CLI) displays two types of help, syntax-only help and
command-description help that includes the command syntax.
The following guidelines describe how to use syntax-only help.
l To list the top-level CLI commands, enter a question mark (?), or type the command
help at the prompt.
l To list all forms of a top-level command, enter the command with no options at the
prompt or enter command ?.
l To list all commands that use a specific keyword, enter help keyword or ? keyword.
For example, ? password displays all Data Domain system commands that use the
password argument.
The following guidelines describe how to use command-description help.
l To list the top-level CLI commands, enter a question mark (?), or type the command
help at the prompt.
l To list all forms of a top-level command with an introduction, enter help command
or ? command.
l The end of each help description is marked END. Press Enter to return to the CLI
prompt.
l When the complete help description does not fit in the display, the colon prompt (:)
appears at the bottom of the display. The following guidelines describe what you can
do when this prompt appears.
n To move through the help display, use the up and down arrow keys.
n To quit the current help display and return to the CLI prompt, press q.
n To display help for navigating the help display, press h.
n To search for text in the help display, enter a slash character (/) followed by a
pattern to use as search criteria and press Enter. Matches are highlighted.
help 105
help
Version Change
5.4 No changes from previous version.
106 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 15
ipmi
The ipmi command monitors and manages a Data Domain system deployed remotely.
Command options enable administrators to monitor remote systems and to power the
systems on or off as required. The Serial-Over-LAN (SOL) feature is used to view the serial
output of a remote system boot sequence. For more information, including the list of
supported models, see the EMC Data Domain Operating System Offline Diagnostics Suite
Users Guide.
This chapter contains the following topics:
ipmi 107
ipmi
Version Change
5.4 No changes from previous version.
ipmi config
ipmi config port {dhcp | ipaddress ipaddr netmask mask gateway
ipaddr}
Configure the IPMI static or dynamic IP address of a BMC-capable interface. If configuring
a static IP, you must provide the BMC IP address, netmask, and gateway address.
ipmi disable
ipmi disable {port | all}
Disable IPMI remote access to a single system, or all systems.
ipmi enable
ipmi enable {port | all}
Enable IPMI remote access to a single system, or to all systems.
ipmi remote
ipmi remote console ipmi-target <ipaddr | hostname> user user
Activate SOL mode to view serial console of a remote Data Domain system.
ipmi remote power {on | off | cycle | status} ipmi-target
<ipaddr | hostname> user user
Power on, power off, or power cycle a remote target system from an initiator system.
108 EMC Data Domain Operating System 5.4 Command Reference Guide
ipmi
ipmi reset
ipmi reset
Reset LAN and SOL configuration and clear all IPMI users.
ipmi show
ipmi show config
View the configuration of local IPMI interfaces. Output includes the dynamic or static IP
address, gateway, netmask, and MAC address.
ipmi show hardware
View the port names and firmware version of the local BMC. Output also includes the IPMI
version, manufacturer, MAC addresses. The Link Status column shows if the LAN cable is
connected to the LAN-IPMI shared port.
Link status cannot be determined on Data Domain systems with a dedicated IPMI port.
These include models DD640, DD4200, DD4500, and DD7200.
ipmi user
ipmi user add user
Add new IPMI user.
ipmi user change user
Change the password of an IPMI user.
ipmi user del user
Delete an IPMI user.
ipmi user list
View a list of IPMI users, including names, IDs, and permissions.
ipmi user reset
Clear all IPMI users. If this is the first time using IPMI, we recommend running this
command to clear IPMI users who may be out of synch between two ports, and to disable
default users.
110 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 16
license
The license command adds, deletes, and resets keys for licensed features and storage
capacity.
This chapter contains the following topics:
license 111
license
Version Change
5.4 Global Deduplication Arrays are deprecated as of this release.
license add
license add license-code [license-code ...]
Add one or more licenses for features and storage capacity. Include dashes when
entering the license code.
license delete
license del license-feature [license-feature ...] | license-
code [license-code ...]
Delete one or more licenses for features or storage capacity. Security officer authorization
is required to delete Retention Lock Compliance licenses.
license reset
license reset
Remove all licenses. Security officer authorization is required to delete Retention Lock
Compliance licenses.
license show
license show [local]
View license keys and features. If the local argument is included in the option, output
includes details on local node only.
112 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 17
log
The log command manages and displays the Data Domain system log file. Messages
from the alerts feature, the autosupport reports, and general system messages are sent
to the log directory (/ddvar/log). A log entry appears for each Data Domain system
command given on the system.
Data Domain systems can send network log messages to other systems enabled to listen.
The Data Domain system sends the log in the standard syslog format. When remote
logging is enabled, all messages in the messages and kern.info files are exported.
Message selectors include:
*.notice
Send all messages at the notice priority and higher.
*.alert
Send all messages at the alert priority and higher (alerts are included in *.notice).
kern.*
Send all kernel messages (kern.info log files).
local7.*
Send all messages from system startups (boot.log files).
See the vendor-supplied documentation for details on managing the selectors and
receiving messages on a third-party system.
log 113
log
Version Change
5.4 No changes from previous version.
log host
log host add host
Add a system (remote log host) to the list that receives Data Domain system log
messages.
Note
If using three or more remote log hosts, they must be added by entering the IP address in
the host argument instead of the host name.
log host del host
Remove a system from the list of systems that receive Data Domain system log messages.
log host disable
Disable sending log messages to other systems.
log host enable
Enable sending log messages to other systems.
log host reset
Reset the log sending feature to the defaults of disabled and an empty list.
log host show
Display the list of systems that receive log messages and are in the state of enabled or
disabled.
log list
log list [debug]
List the files in the log directory with the date each file was last modified and the size of
each file.
114 EMC Data Domain Operating System 5.4 Command Reference Guide
log
audit.log
List of log messages.
windows
Messages about CIFS-related activity from CIFS clients attempting to connect to the
Data Domain system.
log view
log view [filename]
View the log files. When viewing the log, use the up and down arrows to scroll through
the file. Use the q key to quit. Enter a forward slash to search forward or a question mark
to search backward for a pattern such as a date. If filename is not included, the command
displays the current messages file.
log watch
log watch [filename]
View new message entries as they occur. Use Ctrl-C to stop the display. If a filename is
not included, the command displays the current messages file.
116 EMC Data Domain Operating System 5.4 Command Reference Guide
log
2. On the Data Domain system, enter adminaccess show to see that the FTP access list
includes the IP or class-C address of your remote machine. If not in the list, enter
adminaccess add ftp ipaddr to add the address.
3. Open a Web browser on the remote machine.
4. In the Address box, use FTP to access the Data Domain system:
ftp://Data_Domain_system_name.yourcompany.com/
5. Some Web browsers do not request a login if a system does not accept anonymous
logins. In that case, add a user name and password to the FTP line:
ftp://sysadmin:your-pw@
Data_Domain_system_name.yourcompany.com/
6. Log in to the Data Domain system as sysadmin.
7. On the Data Domain system, you are in the directory just above the log directory.
Open the log directory to list the messages files.
8. Copy the file to save. Right-click on the file icon and select Copy To Folder. Choose a
location for the file copy.
9. To disable the FTP service on the Data Domain system, use SSH to log in to the Data
Domain system as sysadmin and run the command option adminaccess disable
ftp.
118 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 18
migration
The migration command copies all data from one Data Domain system to another. Use
this command when upgrading to a larger capacity Data Domain system. Migration is
typically performed in a LAN environment.
Migration may also be used to copy replication configurations, known as contexts. See
the EMC Data Domain Operating System Administration Guide for instructions.
This chapter contains the following topics:
migration 119
migration
Version Change
5.4 No changes from previous version.
migration abort
migration abort
Stop a migration process and return the Data Domain system to its previous state. If the
migration source is part of a replication pair, replication is restarted. Run the command
option on the migration source and destination.
Using the migration abort command option on a destination system requires
running the filesys destroy command option on the destination before the
filesystem can be reenabled.
Following a migration abort procedure the password on the destination system is the
same as the password on the migration source.
120 EMC Data Domain Operating System 5.4 Command Reference Guide
migration
migration commit
migration commit
Limit migration to data received by the source at the time the command is entered. You
can enter the command and limit the migration of new data any time after entering the
migration send command. After the commit operation, all data on the source Data
Domain system, including new data for contexts migrated to the destination, is sent only
to the destination.
Write access to the source is blocked after you enter the migration commit command and
during the time required to complete migration. After the migration process is finished,
the source is opened for write access, but new data is not migrated to the destination.
migration receive
migration receive source-host src-hostname
Prepare a Data Domain system to be a migration destination. When preparing the
destination, do not run the filesys enable command.
Run this option under the following conditions:
l On the migration destination only.
l Before entering the migration send command on the migration source.
l After running the filesys destroy and filesys create operations on the
destination.
Example 37
# filesys destroy
# filesys create
# migration receive source-host hostA
migration send
migration send {obj-spec-list | all} destination-host dst-
hostname
Start migration.
Use the command option under the following conditions:
l Only on the migration source.
l Only when no backup data is being sent to the migration source.
l After entering the migration receive command on the destination.
The obj-spec-list is /backup for systems that do not have a replication license. With
replication, this argument represents one or more contexts from the migration source.
After you migrate a context, all data from the context remains on the source system, but
the context configuration is moved to the migration destination.
A context in the obj-spec-list can be:
l The destination string, as defined when setting up replication. For example:
dir://hostB/backup/dir2col://hostBpool://hostB/pool2
l The context number, such as rctx://2, as shown in output from the
replication status command option.
l The keyword all, which migrates all contexts from the migration source to the
destination.
New data written to the source is marked for migration until you enter the migration
commit command. New data written to the source after a migration commit
command is not migrated. Note that write access to the source is blocked from the time a
migration commit command is given until the migration process concludes.
The migration send command stays open until a migration commit command is
entered. Enter the migration commit command on the migration source first, and
then on the destination.
Note
After the migration send command is entered, the migration source remains in read-
only mode until all contexts are synchronized. To avoid the time spent in this mode, EMC
recommends synchronizing the replication contexts before issuing the migration
send command. Enter replication sync to synchronize replication contexts. Enter
migration send immediately after the synchronization process concludes.
With the exception of licenses and key-manager settings, all data on the migration source
is always migrated, even when a single directory replication context is specified in the
command option.
Example 38
To start migration of data only (excluding replication contexts, even if replication contexts
are configured) to a migration destination named hostC:
Example 39
Example 40
Example 41
To start migration with two replication contexts using context numbers 2 and 3:
122 EMC Data Domain Operating System 5.4 Command Reference Guide
migration
Example 41 (continued)
Example 42
migration status
migration status
Display the status of migration at the time the command is run.
migration watch
migration watch
Track the initial phase of migration (when write access is blocked). The command output
shows the percentage of the migration process that has been completed.
Examples
Preparing for Migration
If the migration source has encryption enabled, you must perform the following tasks on
the destination before starting the migration process.
Procedure
1. Add the encryption license:
# license add license-code
2. Enable encryption. This command prompts you for a passphrase. Use the same
passphrase as the migration source:
# filesys encryption enable
3. After running the encryption enable command, restart the filesystem:
# filesys restart
After migration concludes, configure the DPM attributes on the destination to be the
same as the DPM attributes on the migration source, and then enable the DPM key
manager.
See the commands filesys encryption key-manager enable on page 93 and
filesys encryption key-manager set on page 93 for more information.
124 EMC Data Domain Operating System 5.4 Command Reference Guide
migration
# filesys create
# migration receive source-host hostA
2. On hostA (the migration and replication source), enter:
# migration send dir://hostB/backup/dir2 destination-host hostC
l Note that this command also disables the filesystem.
3. On the source migration host, enter:
# migration watch
4. First on hostA and then on hostC, enter:
# migration commit
l Note that this command also disables the filesystem.
5. On hostB (the replication destination), enter the following command options to
change the replication source to hostC:
# filesys disable
# replication modify dir://hostB/backup/dir2
source-host hostC
# filesys enable
126 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 19
mtree
mtree 127
mtree
Version Change
5.4 No changes from previous release.
mtree create
mtree create mtree-path [quota-soft-limit n {MiB|GiB|TiB|PiB}]
[quota-hard-limit n {MiB|GiB|TiB|PiB}]
Create an MTree under the specified path. The format of the mtree-path is /data/col1/
mtree-name. An error message notifies you to enter a different name if another MTree with
the same name exists, if the new name is formatted incorrectly, or if the destination
MTree already exists.
Naming conventions for creating MTrees include uppercase and lowercase letters A-Z, a-
z), numbers 0-9, single, non-leading embedded space, exclamation point, hash, dollar
sign, ampersand, caret, tilde, left and right parentheses, left and right brackets, left and
right braces.
If no quota option is specified, the default is unlimited for both soft and hard limits,
meaning there are no quota limits.
When setting quota limits, a warning appears if the new limit is lower than the current
space usage of the MTree. The command does not fail, but subsequent writes to the
MTree are rejected. An error message appears if you are setting a soft limit that is greater
than or equal to the hard limit. When the hard limit is reached for an MTree quota, write
operations stop and no more data can be written to the MTree. Data can be deleted.
128 EMC Data Domain Operating System 5.4 Command Reference Guide
mtree
Example 43
Example 44
Example 45 Example 3
mtree delete
mtree delete mtree-path
Delete the specified MTree (denoted by the pathname). MTrees marked for deletion
remain in the filesystem until the filesys clean command is run. This command
option is not allowed on Retention Lock Governance or Retention Lock Compliance
MTrees unless they are empty. You can revert the marked-for-deletion state of that MTree
by running the mtree undelete command. See the EMC Data Domain Operating System
Administration Guide for details on Retention Lock Compliance and Governance.
Effects of deleting an MTree include:
l The MTree appears in the output of the mtree list command option and is
marked with the status value D.
l File service to a deleted MTree is rejected. Deleted MTrees are not visible through NFS
or CIFS clients.
l When an MTree is removed from the filesystem, snapshots associated with that
MTree are also deleted from the /data/col1/mtree-name/.snapshot/ directory.
mtree list
mtree list [mtree-path]
Display the list of MTrees.
Argument Definitions
mtree-path (Optional)
Display MTrees under the specified path only. This command supports the asterisk
(*) wildcard character in the MTree pathname. Values include:
l /data/col1/mtree1
l /data/col1/mtree*
l *mtree*
Output Definitions
Output includes the MTree pathname, precompression, and status. Status is based on
pre-defined values:
D
Marked for deletion. MTree will be removed from the filesystem by the filesys clean
command. Can be unmarked for deletion by using the mtree undelete command only
if the filesys clean command has not been run.
Q
Quota defined.
RO
Read-only access.
RW
Read/write access.
RD
Replication destination.
RLCE
Retention Lock Compliance enabled.
RLGE
Retention Lock Governance enabled.
RLGD
Retention Lock Governance disabled.
mtree rename
mtree rename mtree-pathnew-mtree-path
Rename the specified MTree. Note that /data/col1/backup cannot be renamed.
Retention Lock Governance or Retention Lock Compliance MTrees can only be renamed if
they are empty.
This command option requires security officer authorization if Retention Lock Compliance
is enabled on the specified MTree.
mtree retention-lock
mtree retention-lock disable mtree mtree-path
Disable Retention Lock for the specified MTree. This command option is allowed on
Retention Lock Governance MTrees only. It is not allowed on Retention Lock Compliance
MTrees. See the EMC Data Domain Operating System Administrators Guide for details on
Retention Lock Compliance and Governance.
mtree retention-lock enable mode {compliance | governance}
mtree mtree-path
Enable Retention Lock for the specified MTree. Use the compliance argument to meet the
strictest data permanence regulatory standards, such as those ofSEC17a-4f. Enabling
Retention Lock Compliance requires security officer authorization.
Use the governance argument to propagate the same protection provided in the previous
release of DD OS. The level of security protection is lower than Retention Lock
Compliance.
When Retention Lock is enabled on an MTree, any file in the MTree may become locked
by setting its atime to the future. Additionally, renaming a non-empty directory in the
130 EMC Data Domain Operating System 5.4 Command Reference Guide
mtree
MTree is disabled. See the EMC Data Domain Operating System Administration Guide for
details Retention Lock Compliance and Governance, and for instructions on setting
retention time.
To enable Retention Lock Compliance on an MTree, enter:
# mtree retention-lock enable mode compliance mtree /data/col1/
mtree_name
Example 46
l year
The retention period cannot exceed 70 years. Setting a value greater than 70 years
results in an error.
Example 47
daily (Optional)
In addition to the summary output, display detailed information for each day, over
the previous four full weeks, plus the current partial week. This option is not
available if you specify a file or directory name.
daily-detailed (Optional)
Display the daily output and include the following information for each day. This
option is not available if you specify a file or directory name.
last n {hours | days | weeks | months}] (Optional)
In the summary portion of the output, display filesystem compression statistics for
the specified time frame instead of for the past 7 days. The statistics for the last 24
hours remain in the summary output. If you specify a file or directory name, you
cannot use this option with the weeks keyword or the months keyword.
132 EMC Data Domain Operating System 5.4 Command Reference Guide
mtree
mtree undelete
mtree undelete mtree-path
Mark as not deleted the marked-for-deletion MTrees at the specified path. This command
reverses a previous mtree delete command.
Note
To undelete an MTree, cleaning must not have run before executing the undelete
command.
Example 48
To reverse a previous mtree delete command request that included the MTree at /
data/col1/myMTree:
134 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 20
ndmpd
The ndmpd command is the top-level command for the NDMP (Network Data
Management Protocol) daemon running on a Data Domain system. The NDMP daemon
provides access to VTL-created devices using the NDMP version 4 protocol. Use of this
command requires a VTL license.
This chapter contains the following topics:
ndmpd 135
ndmpd
Version Change
5.4 No changes from previous version.
ndmpd disable
ndmpd disable
Disable the NDMP daemon.
ndmpd enable
ndmpd enable
Enable the NDMP daemon.
ndmpd option
ndmpd option reset option-name | all
Reset all NDMP daemon options or a specific option.
ndmpd show
ndmpd option show option-namevalue
View all NDMP daemon options or a specific option.
ndmpd show devicenames
View the device name, VTL virtual name, SCSI vendor and product code, and the serial
numbers of devices controlled by the NDMP daemon. Typically, this information is
displayed during device discovery and configuration. However, you can use this
command to verify the VTL TapeServer group configuration and perform a manual
configuration, if required.
No output in the NDMP Device column indicates the VTL service is not running, or that no
devices are registered with the VTL TapeServer. A series of hyphens in the NDMP Device
column indicates the VTL service is running on the system but has not registered the
devices. Restart the VTL service to correct this behavior. If the problem persists, contact
Data Domain Support.
136 EMC Data Domain Operating System 5.4 Command Reference Guide
ndmpd
ndmpd status
ndmpd status
Display the NDMP daemon status.
ndmpd stop
ndmpd stop session session-id | all
Stop all sessions or a single session.
ndmpd user
ndmpd user add user-name
Add one (only) user name for the NDMP daemon md5 authentication.
ndmpd user del user-name
Delete the configured NDMP daemon user.
ndmpd user modify user-name
Modify the name of the NDMP daemon md5 user.
ndmpd user show
View the NDMP daemon user.
138 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 21
net
The net command manages the use of virtual interfaces, DHCP, DNS, and IP addresses,
and displays network information and status.
Federal certification requirements state that the DD OS must be IPv6-capable and that
interoperability with IPv4 be maintained in an heterogeneous environment. As a result,
several net command options include arguments for both versions of Internet Protocol.
Collection, directory, and MTree replication are supported over IPv6 networks, which
allows you to take advantage of the IPv6 address space. Simultaneous replication over
IPv6 and IPv4 networks is also supported, as is Managed File Replication using DD Boost.
IPv6 addresses are not supported for CIFS.
If you do not specify an IP version, the default is IPv4 to maintain compatibility with DD
OS versions prior to 5.2. The exception is show commands. If the version is not specified
in the show command option (as in route show table), both address versions are
displayed. To view the IPv4 routes only, you must specify the IPv4 argument.
For some commands, you must include the IPv6 command argument if the host is to be
accessed using its IPv6 address. This is required when a hostname is specified and the
host name format resembles an IPv4 address.
This chapter contains the following topics:
net 139
net
Version Change
5.4 No changes from previous version.
net aggregate
net aggregate add virtual-ifname interfaces physical-ifname-
list [mode {roundrobin | balanced hash {xor-L2 | xor-L3L4| xor-
L2L3} | lacp hash {xor-L2 | xor-L3L4 | xor-L2L3} [ rate {fast |
slow} ] [up {time | default} ] [down {time | default} ]
Add slave interfaces to an aggregate interface. Setting the mode is required on initial
configuration and when there is no default aggregate mode, but optional when adding
interfaces to an existing aggregate interface. Choose the mode compatible with the
specifications of the system to which the ports are attached. Balanced and lacp modes
require a hash.
Example 49
To enable link aggregation on virtual interface veth1 to physical interfaces eth1a and
eth2a in mode lacp hash xor-L2:
# net aggregate add veth1 interfaces eth1a eth2a mode lacp hash xor-L2
140 EMC Data Domain Operating System 5.4 Command Reference Guide
net
lacp
LACP is a link aggregation mode based on the Link Aggregation Control Protocol
(IEEE 802.3ad). From a switch perspective this configuration is always an active LACP
configuration. It cannot be set to passive. LACP communicates with the other end to
coordinate which links within the bond are available. When the this mode is
selected, both ends must be configured with LACP. Requires a hash.
An interface must not only have carrier up, but also must be able to communicate
with its directly attached partner. This provides a better port fail recovery than
failover bonding; however, the LACP port must reside on a single switch except for
special cases of virtual switch ports. Therefore to fail across switches, failover
bonding must be used.
rate
Specifies how often an LACP message is sent to the switch or system that is
connected to the Data Domain system. The message identifies the aggregated
interface. This acts as a type of heartbeat. Slow sends the message once every 30
seconds. It is the default. Fast sends the message every second.
The rate determines how fast the lacp will recognize when an interface cannot be
used and when it can. If 30 seconds is too long it can be set to fast (1 second), but
fast means there is more traffic comprised of small packets (about the size of a TCP
ACK packet) across all aggregated lacp interfaces. With 10 Gb speed consider the
potential for losing connections with a rate of 30 seconds.
xor-L2
Transmission of packets from a specific slave interface is based on static balanced
mode or LACP mode aggregation with an XOR based on a hash policy. An XOR of
source and destination MAC addresses is used to generate the hash.
xor-L2L3
Transmission of packets from a specific slave interface is based on static balanced
and LACP mode aggregation with an XOR based on a hash policy. An XOR of source
and destination's upper layers (L2 and L3) protocol information is used to generate
the hash.
xor-L3L4
Transmission of packets from a specific slave interface is based on static balanced
and LACP mode aggregation with an XOR based on a hash policy. An XOR of source
and destination's upper layers (L3 and L4) protocol information is used to generate
the hash.
up, down
The length of delay allowed before the link is considered up or down. A down
interface must be up for interval configured in time to be considered up. Conversely,
an up interface must be down for the interval configured in time to be considered
down and not available.
If a link is up, the interface carrier must be missing for the amount of time specified
by the down argument before the link is designated down. Default for up/down
times is 29.7 seconds. Up/down times are rounded down to a multiple of 0.9
seconds. For example if 10 seconds is configured, 9.9 seconds is used.
When the link is down:
l Data is no longer sent to the interface.
l For an aggregation bonding, aggregation is recalculated.
l For a failover bonding, if the affected interface is the active interface, then the
active interface is switched to another interface that is up.
The interface carrier must be present for the amount of time specified by the up
argument before the link is designated up.
When the link is up:
l Data can be sent over it.
l For an aggregation bonding, the aggregation is recalculated to include the up
link.
For a failover bonding, nothing more is done; however, if the up interface is the
primary or sole, up slave interface, then it is also marked as the active interface.
Example 50
To delete physical interfaces eth2a and eth3a from the aggregate virtual interface veth1:
Example 51
Use the following command to change link aggregation on virtual interface veth1 to mode
lacp hash xor-L2. Stating the previous condition is not required. The listed conditions
replace the previous settings except on the current slave interfaces, which remain slaves
to the virtual interface. Slaves may be added by this command, but none are removed.
142 EMC Data Domain Operating System 5.4 Command Reference Guide
net
Example 51 (continued)
Example 52
Note
This command option also removes the addresses on associated VLAN and alias, but
does not remove the interfaces.
Note
With the exception of net aggregate show, net aggregate commands control
link aggregation, which provides improved network performance and resilience by using
two or more network ports in parallel. Note that link aggregation and Ethernet trunking
are synonymous. The recommended and supported maximum is four ports, but there are
no restrictions on the Data Domain system for having more aggregate slaves.
net config
net config ifname {[[ipaddr] [netmask mask] [dhcp {yes | no}]]
| [ipv6addr]} {[autoneg] | [duplex {full | half} speed {10|100|
1000|10000}] [up | down] [mtu {size | default}]
Configure an Ethernet interface. Note the following guidelines:
l An IP address with netmask or DHCP with yes may be used, but not both.
l The IP address can be IPv4 or IPv6. If IPv4, it may have a netmask different from the
default netmask. The netmask can only be specified when the address is specified. If
an IPv6 address is specified there is no associated netmask. Instead, a prefix length
is used to determine the subnet. The default prefix length is 0. To use a prefix length
different from 0, it must be specified with the address by adding a forward slash
followed by a number. For example, if the prefix length is 52, the notation would be:
2026:3456:cafe::f00d:1/52.
l Anywhere a netmask can be used for IPv4, a prefix length can be used for IPv6. The
limit of the MTU size is 512 - 9000 for IPv4 and 1280 - 9000 for IPv6. To ensure
backward compatibility DD OS accepts an MTU size of 9014, but sets it to 9000 if the
MTU requested is greater than 9000 and less than or equal to 9014.
l Use the up argument to bring up an interface without an IP address. Using enable will
fail if no IP address is given.
Note
If no address is given the up option may fail because there is no registry entry for an IP
address. This typically occurs after a fresh install. If this occurs, specify an address of 0 to
allow a registry address location to be created.
net config ifname type {none | management | replication |
cluster}
Configure or set the type of Ethernet interface.
net congestion-check
net congestion-check modify [sample-interval secs] [capture-
window secs] [every mins] [detailed {on | off}] [logfile
filename] [ iperf-client {none | iperf-server-host | iperf-
server-ipaddr} [nodelay <on | off>] [port {port | default} ]
[window-size bytes] [connections count] [data {random|
default}]}]
Modify options for the congestion monitor whether or not the monitor program is
activated. (The congestion monitor is activated by the net congestion-check start
command.) The modify command option sets the registry information. If the congestion
monitor is scheduled, the new registry values are used when it runs. If the monitor is not
scheduled, the values are used as defaults when it is started. Typically this command
option is used after the monitor is scheduled to run and the user does not want to stop
and restart the monitor.
Output values for rates and error numbers are added together. Values that may increase
or decrease, such as the capture-window, are averaged over time.
net congestion-check modify sample-interval secs
Specify the time that statistic information is collected. There are multiple intervals during
the capture window when data is collected and the sample-interval argument determines
how often this is. For example, the initial default capture-window is 60 seconds and the
default sample-interval is 4 seconds. Data is collected every 4 seconds for 60 seconds
and collection stops. The information is output to the screen if the run argument is
specified, or to a log file if the start argument is specified.
If the every argument is non-zero the capture window is run again after the number of
minutes specified in the every argument. The value of the sample-interval
argument must be less than the value of the capture-window argument.
The run argument default is always 4 seconds. For start and modify arguments, the
initial default is 4 seconds.
net congestion-check modify capture-window secs
Congestion data is collected only during the capture window. Outside the capture
window the program is in sleep mode or terminated depending on whether the argument
every is non-zero. During the capture window data is collected during each sample
interval. For example, if the capture window is 60 seconds and the sample value is 5
seconds, data is collected every 5 seconds for 60 seconds and collection stops. The
output concludes at the end of 60 seconds and is displayed as one line per remote IP
address.
The run argument default for the capture window is always 60 seconds. The initial value
for the start and modify arguments is 60 seconds. After that, the default for the
start argument is whatever is in the registry. The capture-window argument must be
less than the argument every and greater than the argument sample-interval.
144 EMC Data Domain Operating System 5.4 Command Reference Guide
net
window-size bytes
The size of the socket buffer to use. Default is 32000. For long latencies, this size
may be too small. Consider setting the size to 250000 or 10000000.
connections count
The number of connections to use. Must be greater than zero. Default is 1, which is
typically satisfactory if the window size is set appropriately.
data {random | default}
An in-memory random data generator. This would be used if a WAN accelerators was
in the path thereby preventing the generator from providing elevated bandwidth
numbers.
Note
After entering the command, there is a slight delay during which the process (netmon)
actually starts the monitor. After the monitor is started the specified time arguments take
over. To get information immediately, use the net congestion-check run
command instead.
Output is one line per external destination. All connections to and from an external
address are merged into a single line of data.
Value types from the output vary. Amounts of data or packets increase. These amounts
are added together across all connections to a specific IP address to give the total value
to or from the external location. Rates are relatively constant but are also added together
to give the total flow rate to the pipe at the remote location. Other values are relatively
static across all connections, such as the mss, rtt, window scale factor, or congestion
146 EMC Data Domain Operating System 5.4 Command Reference Guide
net
window. These are given as an average with the minimum and maximum. Errors and
loses are treated the same as rates and are added across all interfaces.
net congestion-check status
Display the state of the congestion monitor. The congestion monitor is started when the
net congestion-check start command is issued. The status argument
displays the configured timings, the level of logging, the log file, the monitored
connections, if the monitor is actually running or scheduled to run, and if iperf is
specified to run. It also shows if iperf is currently running and which connections are
being monitored.
net congestion-check stop
The congestion monitor is run when the net congestion-check start command
is issued. A message notifies the user if the configuration monitor is not scheduled and
no action is taken. If the congestion monitor is scheduled, this command option
unschedules the procedure. If the congestion monitor is running, this command option
stops the procedure and unschedules it.
net create
net create interface {physical-ifname | virtual-ifname} {vlan
vlan-id | alias alias-id}
Create a VLAN interface or an IP alias interface. The VLAN is created immediately in the
kernel, but the alias is not created in the kernel until an IP address is specified. The
number given must be between 1 and 4094 inclusive. For the VLAN there must be a
matching number on the switch or other systems to transfer packets to the interface.
There is no such requirement for the alias but the alias ID must be unique for the
interface.
net create virtual vethid
Create a virtual interface. The virtual interface name veth-id must begin with veth. The
remainder of the name is a decimal number. Interface names must be unique.
There are no restrictions except for the size and the number. The maximum size for an
interface name is 15 characters, which includes VLAN, alias names, and the associated
dot and colon. The virtual interface name must be kept at a minimum. The maximum is
9999, but EMC recommends using a number in the range of 0 to 99.
The number of virtual interfaces cannot exceed the number of physical interfaces. For
example, if there are 10 physical interfaces there can be no more than 10 virtual
interfaces.
net ddns
net ddns add <ifname-list | all>
Add interfaces to Dynamic DNS registration list.
net ddns del <ifname-list | all>
Remove interfaces from Dynamic DNS registration list.
net ddns disable
Disable Dynamic DNS updates.
net ddns enable
Enable Dynamic DNS updates.
net ddns register
Register configured interfaces with DNS.
net destroy
net destroy {virtual-ifname | vlan-ifname | ipalias-ifname }
Remove a VLAN, IP alias, or virtual interface. If a virtual interface has associated VLANs
and aliases, or if a VLAN has associated aliases, the associated interfaces are also
destroyed when the virtual interface or VLAN interface is destroyed.
Example 53
net disable
net disable ifname
Disable an Ethernet interface on the Data Domain system and bring down the interface in
the kernel.
net enable
net enable ifname
Enable or reenable an Ethernet interface on the Data Domain system, where ifname is the
name of an interface. This includes bringing up the interface to the RUNNING state and
requires the interface to have an IP address. The address may already be saved in the
registry or may come from DHCP. If the interface does not go into the RUNNING state, the
command will fail and the interface is set to the DOWN state and set to disabled.
net failover
net failover add virtual-ifname interfaces ifname-list [primary
ifname] [up {time | default}] [down {time | default}]
Add network interfaces as slaves to a failover interface. Allow one failover slave to be set
as the primary and allow the up and down delays to be set. The slave interfaces must be
in a down (disabled) state when added to the virtual interface. Note that the network
interfaces can be aggregated interface.
net failover del virtual-ifname interfaces ifname-list
Delete slave interfaces from a failover interface. The freed interface remains disabled
after being removed from the virtual interface. Use commas, spaces, or both to separate
list entries. To delete a primary interface specify another interface as primary or set the
primary be none.
148 EMC Data Domain Operating System 5.4 Command Reference Guide
net
Example 54
To remove eth2a from the virtual interface veth1, which has eth2a and eth3a as slaves
and eth3a as the primary interface:
Example 55
The up time value used would be 4500 (4.5 seconds) and the down time value would be
9900 (9.9 seconds).
Example 56
Use the following command to remove virtual interface veth1 and release associated
physical interfaces. (The physical interfaces remain disabled and must be reenabled for
any other use than as part of another virtual interface.)
After the virtual interface has been reset, the physical interfaces remain disabled. Use the
net enable command to reenable the interfaces. If there are no IP addresses associated
with these interfaces these commands will fail and using the command net config
ifname up may be required.
The registry settings may be different from the bonding configuration. After creation,
when interfaces are added to the virtual interface, the information is not sent to the
bonding module until the virtual interface is brought up. Until that time the registry and
the bonding driver configuration differ.
net hosts
net hosts add {ipaddr | ipv6addr} host-list
Add a host list entry. Associate an IP address with a hostname. The address can be a IPv4
or an IPv6. The hostname is a fully qualified domain name, a hostname, or an alias. The
entry is added to the /etc/hosts file. Entries in the list can be separated by commas,
spaces, or both.
Example 57
net iperf
net iperf client {ipaddr | ipv6addr | hostname [ipversion {ipv4
| ipv6}]} [port port] [window-size bytes] [data {random|
default}] [interval secs] [{transmit-size bytes | duration
secs}] [connections count] [nodelay]
Run iperf in client mode. If an IPv6 address is specified for the hostname, the
ipversion argument must also be specified. The default is an IPv4 address. The port
argument can be used to change the port number from the default 5001 to another
number. Typically this is used to bypass network filters or test specific ports. The
window-size argument increases the amount of data sent at one time. If WAN
accelerators are on the network, the data random argument prevents artificial
performance numbers from being returned. The duration argument indicates how
many seconds the generator runs. The connections argument determines how many
connections to use, the number of which can improve throughput in a network
environment with high loss, high latency and low bandwidth. The nodelay argument
eliminates the wait time between sends.
net iperf server [run] [ipversion {ipv4 | ipv6}] [port {port |
congestion_check-port}] [window-size bytes]]
Run iperf in server mode. Look for the Linux DD OS Equivalent Arguments for the iperf
Option to compare Linux iperf options with DD OS options. The ipversion argument
may be used to specify the type of addressing.
150 EMC Data Domain Operating System 5.4 Command Reference Guide
net
net lookup
net lookup {ipaddr | ipv6addr | hostname}
Search DNS entries. This command may be used with IPv4 or IPv6 addresses. All users
may run this command option.
net option
net option reset option-name
Reset an option to the default values.
net option set option-namevalue(s)
Set values for the option specified.
net option show
Display settings for network options.
net ping
net ping {ipadddr | ipv6addr| hostname [ipversion {ipv4 |
ipv6}]} [broadcast] [count n] [interface ifname] [packet-size
bytes] [path-mtu {do | dont | want}] [pattern pattern]
[numeric] [verbose]
Verify the Data Domain system can communicate with a remote host.
net ping Command Option Arguments
ipaddr
An IPv4 address is specified.
ipv6addr
An IPv6 address is specified.
hostname
Can be converted into an IPv4 or IPv6 depending on the ipversion argument. If
ipversion argument is not specified, IPv4 is used.
broadcast
Enable pinging a broadcast address (available for IPv4 only).
count n
Number of pings to issue.
interface ifname
Name of interface to ping.
packet-size
Set packet size.
path-mtu
Allow/disallow fragments.
pattern
Send packet with a pattern.
numeric
Ping IP address not hostname.
verbose
Display expanded output.
net reset
net reset {domainname | searchdomains}
Reset Data Domain system DNS servers, domain names, or host names to default
settings. Requires system reboot for changes to take effect.
net reset dns
Reset DNS list to default values. Requires system reboot for changes to take effect.
net reset hostname
Reset hostname to default values. Requires system reboot for changes to take effect.
net set
net set {domainname local-domain-name | searchdomains search-
domain-list}
Set the domainname or searchdomains used by the Data Domain system. The default for
domainname is the return from DHCP, or what is set by net set hostname command. The
default for searchdomain is the domainname name, which is always included in the
list of searchdomains.
Example 58
152 EMC Data Domain Operating System 5.4 Command Reference Guide
net
Note
If the Data Domain system is using CIFS with Active Directory authentication, changing
the hostname causes the Data Domain system to drop out of the domain. Use the cifs
set authentication command option to rejoin the Active Directory domain.
net show
net show all
Display all networking information, including IPv4 and IPv6 addresses. Some IPv6
addresses are automatically assigned to interfaces, either linklocal or router-generated
addresses. Auto-assigned addresses are displayed with the kernel information but not
with the registry settings, as in the net show settings command, because they do
not exist in the registry. This type of address cannot be changed or modified.
net show config [ifname]
Display the configuration for a specific Ethernet interface. Exclude the keyword ifname to
view the configuration for all Ethernet interfaces. This command shows auto-generated
IPv6 addresses.
In the example, the interface eth0a shows a statically assigned IPv6 address; however,
because the interface cannot come up to the RUNNING state the link local and router-
generated address are not available. Interface eth0b shows a IPv4 static address and two
auto-generated IPv6 addresses.
net show {domainname | searchdomains}
Display the domain name or search domains used for email sent by a Data Domain
system.
net show dns
Display a list of DNS servers used by the Data Domain system. The final line in the output
shows if the servers were configured manually or by DHCP.
net show hardware
Display Ethernet port hardware information from the kernel.
Output Definitions
Port
The Ethernet interfaces on the system.
Speed
The actual speed at which the port processes data.
Duplex
Full or half duplex protocol.
Supp Speeds
Lists speeds the port is capable of using.
Hardware Address
The MAC address.
Physical
Copper or fibre.
net tcpdump
net tcpdump capture filename [interface iface] [{host host
[ipversion {ipv4 | ipv6} ] | net {ipaddr [mask mask] |
ipv6addr[/prefixlength]}}] [port port] [snaplen bytes]
Capture data, and then copy the output file to another system for analysis. This command
converts the options from the command line to equivalent tcpdump options. Output files
are placed in /ddvar/traces where you can upload them to autosupport. A maximum
of 10 output files may be retained on the system. If this limit is reached, you are
prompted to delete some of the files.
net tcpdump del {filename | all}
Delete output files created by the net tcpdump capture command. Specify a
filename to delete files matching the pattern /ddvar/traces/tcpdump_filename *.
Specify all to remove all net tcpdump output files.
net troubleshooting
net troubleshooting duplicate-ip
Detect duplicate IP in network.
154 EMC Data Domain Operating System 5.4 Command Reference Guide
net
DD OS filename
Linux -w /ddvar/traces/tcpdump_filename -C 100 -W 5
DD OS interface iface
Linux -i iface
DD OS host host
Linux host host
DD OS net net
Linux net net
DD OS mask mask
Linux mask mask
DD OS port port
Linux port port
DD OS snaplen bytes
Linux -s bytes
primary. The system makes the primary interface the active interface when the primary
interface is operational. A failover from one physical interface to another can take up to
30 seconds. The delay is to guard against multiple failovers when a network is unstable.
Guidelines on Failing Over an Interface
Consider the following guidelines when planning an interface failover:
l For best results, a primary interface should be part of the failover. This provides a way
of determining which interface is active. A primary slave cannot be removed from the
bonding except in the case of net failover reset command, during which all
slaves are removed.
l A primary interface must be explicitly specified as the primary, and must also be a
slave, to the virtual interface. To designate a physical interface as the primary failover
interface, use the optional primary argument. If the primary interface goes down
and multiple interfaces are available, the next interface is selected at random.
l The virtual interface must be present on the system. Use the net show settings
command option to confirm the presence of a virtual interface.
l Enable failover on the existing virtual interface name in the form vethx, where x is a
unique string (typically one or two digits). A typical full virtual interface name with
and associated VLAN and alias is veth56.3999:199. The maximum name length is 15
characters, which typically limits the name string x to two characters. Special
characters are not supported. Use commas, spaces, or both to separate list entries.
l If a primary interface is part of the failover, it cannot be deleted from the failover
while it is the primary interface. Use the net failover modify command to
change the primary interface. To remove the slave from an interface, set another
interface to primary or none.
For example, to associate a failover virtual interface named veth1 with the physical
interfaces eth2a and eth3a, and to designate eth2a as the primary:
# net failover add veth1 interfaces eth2a eth3a primary eth2a
156 EMC Data Domain Operating System 5.4 Command Reference Guide
net
l A method for identify the correct physical link from the logical link.
l The interface names do not change if cards are added or removed.
l The interface name is not dependent on the type of cards in the system.
When interface names prior to 4.9 are changed to the current naming structure, the
associated configuration names are also changed. For example, eth1.236 becomes
eth0b.236, eth1 and eth0 bonded to veth1 becomes eth0a and eth0b bonded to veth1.
Note that the revised naming format is not required for virtual interfaces; however, slaves
are renamed. Virtual interfaces can be removed from interface list by running the
destroy command.
Number of Ports
The number of ports depends on the number and type of Ethernet cards, and on the
system type. A system with two Ethernet cards has a maximum of six ports: eth0a, eth0b,
eth4a, eth4b, eth5a, eth5b. If one of the cards is a 1-port 10 GbE fiber, the maximum is
five ports. A system with two on-board interfaces and two quad-port NICs has a maximum
10 ports.
Newer systems, such as DD2500, support three Ethernet SLICs, 4 x 1 GbE onboard and 2
x 10GBaseT onboard, allowing a maximum of 18 physical ports, depending on the
Ethernet SLIC types (Quad Port 1000Base-T, 2x1000Base-T/2x1000Base-SR and Dual
Port 10G Ethernet).
Systems DD4200, DD4500 and DD7200 support six Ethernet SLICS allowing a maximum
of 24 physical ports, depending on the Ethernet SLIC types (Quad Port 1000Base-T,
2x1000Base-T/2x1000Base-SR and Dual Port 10G Ethernet).
To clear the virtual interface veth1 of the IP address and release the associated
physical interfaces:
# net failover reset veth1
To delete physical interface eth3a from the aggregate virtual interface veth1:
# net aggregate del veth1 interfaces eth3a
158 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 22
nfs
The nfs command enables you to add NFS clients and manage access to a Data Domain
system. It also enables you to display status information, such as verifying that the NFS
system is active, and the time required for specific NFS operations.
This chapter contains the following topics:
nfs 159
nfs
Version Change
5.4 No changes from previous version.
nfs add
nfs add pathclient-list [(option-list)]
Add NFS clients that can access the Data Domain system. A client can be a fully qualified
domain hostname, class-C IP addresses, IP addresses with netmasks or length, an NIS
netgroup name with the prefix @, or an asterisk wildcard for the domain name, such as
*.yourcompany.com.
An asterisk by itself means no restrictions. A client added to a subdirectory under /
backup has access only to that subdirectory.
The options-list is comma or space separated, enclosed by parentheses. If no option is
specified, the default options are rw, root_squash, no_all_squash, and secure.
NFS Options
ro
Enable read-only permission.
rw
Enable read and write permissions (default value).
root_squash
Map requests from uid or gid 0 to the anonymous uid/gid.
no_root_squash
Turn off root squashing (default value).
all_squash
Map all user requests to the anonymous uid/gid.
no_all_squash
Turn off the mapping of all user requests to the anonymous uid/gid (default value).
secure
Require that requests originate on an Internet port that is less than
IPPORT_RESERVED (1024) (default value).
160 EMC Data Domain Operating System 5.4 Command Reference Guide
nfs
insecure
Turn off the secure option.
anonuid=id
Set an explicit user ID for the anonymous account. The ID is an integer bounded from
0 to 65635.
anongid=id
Set an explicit group ID for the anonymous account. The ID is an integer bounded
from 0 to 65635.
nfs del
nfs del pathclient-list
Delete specific directories, including a backup subdirectory, for one or more clients. The
client-list can contain IP addresses, hostnames, or an asterisk that represents all clients.
nfs disable
nfs disable
Disable all NFS clients.
nfs enable
nfs enable
Allow all NFS-defined clients to access the Data Domain system.
nfs reset
nfs reset clients
Reset client list to the factory default empty. NFS clients can access the Data Domain
system when the list is empty.
nfs reset stats
Clear the NFS statistics.
nfs show
nfs show active
List clients active in the past 15 minutes and the mount path for each.
nfs show clients
List NFS clients allowed to access the Data Domain system and the mount path and NFS
options for each.
nfs show detailed-stats
Display NFS cache entries and status to facilitate troubleshooting.
nfs show histogram
Display NFS operations in a histogram. Users with user role permissions may run this
command.
Output Definitions
mean-ms
The mathematical mean time for completion of the operations.
stddev
The standard deviation for time to complete operations, derived from the mean time.
max-s
The maximum time taken for a single operation.
2ms
The number of operations that took 2 ms or less.
4ms
The number of operations that took between 2ms and 4ms.
6ms
The number of operations that took between 4ms and 6ms.
8ms
The number of operations that took between 6ms and 8ms.
10ms
The number of operations that took between 8ms and 10ms.
100ms
The number of operations that took between 10ms and 100ms.
1s
The number of operations that took between 100ms and 1 second.
10s
The number of operations that took between 1 second and 10 seconds.
>10s
The number of operations that took over 10 seconds.
nfs status
nfs status
Enter this option to determine if the NFS system is operational. When the filesystem is
active and running, the output shows the total number of NFS requests since the
filesystem started, or since the last time that the NFS statistics were reset.
162 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 23
ntp
The ntp command synchronizes a Data Domain system with an NTP time server,
manages the NTP service, or turns off the local NTP server.
A Data Domain system can use a time server supplied through the default multicast
operation, received from Dynamic Host Configuration Protocol (DHCP), or set manually
with the Data Domain system ntp add command.
This chapter contains the following topics:
ntp 163
ntp
Version Change
5.4 No changes made from previous version.
ntp add
ntp add timeserver server-name
Add a remote time server to NTP list. This command option requires security officer
authorization for Retention Lock Compliance systems.
Example 59
ntp del
ntp del timeserver server-name
Delete a manually added time server from the list. This command option requires security
officer authorization for Retention Lock Compliance systems.
Example 60
To delete an NTP time server named srvr26.yourcompany.com from the list, enter:
164 EMC Data Domain Operating System 5.4 Command Reference Guide
ntp
Example 60 (continued)
ntp disable
ntp disable
Disable NTP service on a Data Domain system. This command option requires security
officer authorization for Retention Lock Compliance systems.
ntp enable
ntp enable
Enable NTP service on a Data Domain system. This command option requires security
officer authorization for Retention Lock Compliance systems.
ntp reset
ntp reset
Reset the NTP configuration to the default settings. This command option requires
security officer authorization for Retention Lock Compliance systems.
ntp reset timeservers
Reset the time server list from manually entered time servers to DHCP time servers (if
supplied) or to the multicast mode (if no DHCP time servers supplied). This command
option requires security officer authorization for Retention Lock Compliance systems.
ntp show
ntp show config
Display status of NTP: enabled or disabled, and show the time server list.
ntp status
ntp status
Display the local NTP service status, time, and synchronization information.
166 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 24
quota
The quota command lets you modify the amount of storage space for MTrees and for VTL
and DD Boost storage units. There are two quota limits: hard and soft. The hard limit
prevents writes from exceeding the quota. An error message is issued if the hard limit is
exceeded. The soft limit allows writes to exceed the quota. However, an alert is generated
if this happens. The soft limit value must be less than the hard limit value. Quota limit
values must be specified as integers.
You can set a hard limit, a soft limit, or both, depending on your requirements. For
example, an administrator may choose to enforce only a soft limit to prevent overnight
backup jobs from failing when the quota limit is reached. Or the administrator may
choose to enforce only a hard limit to block a user from writing when the quota limit is
reached.
Snapshots capture quota information at a precise point in time. Usage tracking in the
active file system does not account for the space of a snapshot, so quota limits are not
enforced on snapshots.
This chapter contains the following topics:
quota 167
quota
Version Change
5.4 No changes made from previous version.
quota disable
quota disable
Disable quota support. This command option also disables MTree quota limits and
restores the limits to the default state (unlimited).
quota enable
quota enable
Enable quota support.
quota reset
quota reset { all | mtrees mtree-list | storage-units storage-
unit-list } [soft-limit] [hard-limit]
Reset quota limits. If hard or soft limits are not entered, both are reset to the default state
(unlimited).
Example 61
Example 62
168 EMC Data Domain Operating System 5.4 Command Reference Guide
quota
Example 62 (continued)
Example 63
Example 64
quota set
quota set {all | mtrees mtree-list | storage-units storage-
unit-list} {soft-limit n {MiB|GiB|TiB|PiB} | hard-limit n {MiB|
GiB|TiB|PiB} | soft-limit n {MiB|GiB|TiB|PiB} hard-limit n
{MiB|GiB|TiB|PiB}}
Set quota limits during runtime for multiple MTrees. When used for storage units, this
command option sets limits only after the storage unit is created. Note that the quota
feature must be enabled, otherwise limits are not enforced. Setting quotas does not
require disabling the filesystem and therefore does not affect system performance.
Example 65
To set a soft limit quota of 10 GiB on MTree /data/col1/backup1 when the quota
feature is disabled:
Example 66
Example 67
To set a soft limit quota of 100GiB and a hard limit quota of 1TiB on MTree /data/
col1/backup1:
Example 68
Example 68 (continued)
To set a soft limit quota of 100 GiB and a hard limit quota of 1 TiB on storage-unit
DDBOOST_STRESS_SU:
quota show
quota show {all | mtrees mtree-list | storage-units storage-
unit-list}
List the quota limits and usage of a particular mtree or storage unit, all mtrees or storage
units, or all of both. The unit of display for usage and limits is MiB.
quota status
quota status
Display status of quota enforcement: enabled or disabled. If output includes a note
stating status as disabled, quota limits are not being enforced and are therefore
unlimited.
170 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 25
replication
EMC Data Domain Replicator lets you replicate data (copy and synchronize) between two
Data Domain systems: a source and a destination. Source and destination
configurations, or pairs, are also known as contexts. Depending on your objective, you
can replicate entire sites, specific directories, MTrees, or files within a VTL (virtual tape
library). Replication is a licensed software option. See theEMC Data Domain Operating
System Administration Guide for details on replication practices and procedures.
This chapter contains the following topics:
replication 171
replication
Version Change
5.4 No changes made from previous version.
replication abort
replication abort recover destination
Stop a recover process. Run this command option on the destination Data Domain
system only. Then, reconfigure replication on the source Data Domain system and restart
the recover process.
replication abort resync destination
Stop a resync operation. Run this command option on the source or destination Data
Domain system.
replication add
replication add source source destination destination [low-bw-
optim {enabled | disabled}] [encryption {enabled | disabled}]
172 EMC Data Domain Operating System 5.4 Command Reference Guide
replication
Note
MTree replication from a system with Extended Retention to a single-node Data Domain
system is supported only for recovering previously replicated data. Enabling this feature
for purposes other than recovery generates a warning message. See the EMC Data Domain
Operating System Administration Guide for details.
replication break
replication break {destination | all}
Remove the source or destination Data Domain system from a replication pair, or remove
all Replicator configurations from a Data Domain system. This command option requires
security officer authorization for Retention Lock Compliance systems.
replication disable
replication disable {destination | all}
Run this command on the source or destination system to halt data replication
temporarily. If run on the source, the operation stops sending data to the destination. If
run on the destination, the operation stops serving the active connection from the source.
This command option requires security officer authorization for Retention Lock
Compliance systems.
replication enable
replication enable {destination | all}
Restart replication. If run on the source, the operation resumes sending data to the
destination. If run on the destination, the operation resumes serving the active
connection from the source.
replication initialize
replication initialize destination
Run this command option on the source to start replication between a source and
destination. This command option verifies the configuration and connections are correct
and returns error messages if problems appear.
The initialize operation can take several hours, or days, depending on the amount of data
in the source. As an alternative, consider placing both Data Domain systems of the
replicator pair in the same location with a direct link to reduce initialization time. The
destination variable is required.
Key-manager settings on a destination are ignored when users set up and initialize a
collection replication pair. The keys are copied to the replica, but key-manager settings
are not. If the destination is configured with key-manager settings prior to becoming the
replication destination, the settings remain on the system but are not used. If a collection
replication breaks, you must reconfigure the destination to use the correct key-manager
settings and key class.
EMC recommends resetting the key-manager on the destination prior to collection
replication, and then configuring the destination with the correct key manager-server and
key class after a collection replication is broken.
replication modify
replication modify destination connection-host new-host-name
[port port]
Run this command option if the destination hostname does not resolve for the
connection. Use the modify connection-host option to correct the name or IP
address. An optional port number may also be used.
The connection-host option may be required when a connection passes through a
firewall, and is required when connecting to an alternate listen-port on the destination. It
may also be required after adding a new source and destination pair, or after renaming a
source or a destination.
replication modify destination {source-host | destination-host}
new-host-name
Assign a new hostname to a replacement system in a replication pair. The new-host-name
must be the name returned by the hostname command on the system receiving the new
host.
Run this command option on the destination system to change the hostname on a source
system. Do not use the command to change the hostname on the destination. Contact
Data Domain Support before changing the hostname on a destination system.
When using the replication modify command option, always run the filesys
disable command first, and conclude with the filesys enable command.
Example 69
If the local destination ca.company.com is moved from California to New York, enter the
following command options on the source and destination:
# filesys disable
# replication modify dir://ca.company.com/backup/dir2 destination-
host ny.company.com
# filesys enable
174 EMC Data Domain Operating System 5.4 Command Reference Guide
replication
replication option
replication option reset {bandwidth | delay | listen-port |
default-sync-alert-threshold}
Reset system bandwidth, delay, listen port, and sync-alert-threshold to default values.
Defaults are bandwidth, unlimited; delay, none; listen-port, 2051. Default for
sync-alert-threshold is 24 (hours).
When using the replication option reset command options, always run the
filesys disable command first, and conclude with the filesys enable
command.
replication option set bandwidth rate
Set the network bandwidth rate for the Data Domain system. You must set the bandwidth
and network delay on each side of the connection.
replication option set default-sync-alert-threshold value
Set the sync time to configure when an alert is generated. The sync time is set in hours.
Default value is 24.
replication option set delay value
Set the network delay in milliseconds for the Data Domain system. You must set the
bandwidth and network-delay on each side of the connection.
replication option set listen-port value
Set the listen port for the Data Domain system. On a destination Data Domain system, set
the port from which the destination receives data from replication sources (default is
2051). A destination can have only one listen port used by all sources. The connection-
host port used by a source must match the listen port used by the destination.
For DD Boost managed file replication, the listen port is used on the source Data Domain
system and on the destination Data Domain system to specify the connection-host port.
For directory replication, the replication modify connection-host command option is used
on the source Data Domain system.
replication option show
Display the current bandwidth, network-delay settings, listen port, and sync-alert-
threshold. If these settings are configured using default values, the command option
returns a command prompt with no setting information. All users may run this command.
replication reauth
replication reauth destination
Use this command on the source and the destination systems to reset authentication. A
destination variable is required.
Messages similar to Authentication keys out of sync or Key out of sync
indicate a reset is required. Reauthorization is primarily used when replacing a source
Data Domain system.
replication recover
replication recover destination
Run this command option on a new source to move data from a destination system. If
configuring collection replication, this option must be run on the new source only. A
destination argument is required. This command is not available for MTree replication.
When using the replication recover command option, always run the filesys
disable command option first, and conclude with the filesys enable command
option.
If the replication break command was previously run, the destination cannot be
used to recover a source. If configuring directory replication, the target directory on the
source must be empty.
replication resync
replication resync destination
Synchronize replication when directory replication is broken between a source and
destination. Note that the source and the destination must be configured and the context
initialized.
This command option cannot be used with collection replication. Also, this command
fails if you try to replicate to a Retention Lock system and the destination is not empty.
replication show
replication show config [destination | all]
Show replication configuration. All users may run this command option.
replication show detailed-history {obj-spec-list | all}
[duration duration {hr | min}] [interval interval {hr | min}]
Show details of replication performance history. All users may run this command option.
Output Definitions
CTX
The context number for directory replication or a zero (0) for collection replication.
Source
The Data Domain system that receives data from backup applications.
Destination
The Data Domain system that receives data from the replication source Data Domain
system.
Connection Host and Port
A source system connects to the destination system using the name returned by the
hostname command on the destination. It may also connect using a destination
name or IP address and port designated by replication modify
connection-host command. The destination hostname may not resolve to the
correct IP address when connecting to an alternate interface on the destination, or
when passing through a firewall.
Low-bw-optim
The status of low-bw-optim: enabled, disabled, or configuration mismatch.
Enabled
The replication process is enabled and available to replicate data (yes) or disabled
and not available to replicate data (no).
176 EMC Data Domain Operating System 5.4 Command Reference Guide
replication
Meta
The time spent on miscellaneous bookkeeping activities and replicating filesystem
namespace operations. Typically this value is under 50. If this value exceeds 50 on a
sustained basis, it may indicate an unusual workload (a large number of file
attribute updates, for example).
Dest
The time spent waiting due to the receiver not providing the sender enough
information on what data to send. Typically this value is low. Exceptions include
systems on high-speed networks where the sender is a more powerful Data Domain
system than the replica, or where the replica has a higher workload than the sender
because the replica is the destination for a multiple replication contexts.
Network
The time spent sending file data and metadata and waiting for replies from the
server on what data needs to be sent. Typically this is the highest of the four values.
This value exceeds 100 regularly if the sender is able to replicate multiple files in
parallel.
Note
If the Network column has the highest time values among Reading, Meta, Waiting, and
Network, and if the Network KB/sec value is lower than expected, a network problem may
be present. For example, packet loss may be causing reduced throughput.
replication show stats [destination | all]
Display statistics for all replication pairs or a specific destination pair. Output format is is
based on replication type. All users may run this command option.
Note that in collection replication, the difference in values between Post-comp Bytes Sent
and Post-comp Bytes Received is expected behavior.
Output Definitions
CTX
The context number for replication. The number zero (0) indicates collection
replication.
Destination
The replication destination.
Post-comp Bytes Sent
Network data sent by the source to the destination.
Post-comp Bytes Received
The number of bytes received by the source, including logical bytes associated with
the file being replicated.
Synced-as-of-Time
The time when the most recently replicated data on the destination was generated
on the source. A value of Unknown appears during replication initialization.
Pre-comp Bytes Remaining
Directory replication only: The sum of file sizes remaining to be replicated for the
context. Output includes the entire logical size of the current file being replicated. If
a large file is being replicated, this number may take some time to change. The
number changes only after the current file finishes.
replication status
replication status [destination | all] [detailed]
178 EMC Data Domain Operating System 5.4 Command Reference Guide
replication
Show status replication status. All users may run this command option.
replication sync
replication sync [and-verify] [destination]
Synchronize replication between the source and destination and wait for replication to
complete. You must first configure the source and destination and initialize the context.
replication throttle
replication throttle add sched-specrate
Change the rate of network bandwidth used by replication. By default, the network
bandwidth use is unlimited, meaning it continuously runs as fast as possible.
Replication runs at the given rate until the next scheduled change, or until new throttle
commands force a change. The system enforces a minimum rate of 98,304 bits per
second (12 KiB).
Argument Definitions
sched-spec
Specifies one or more three-letter days of the week (such as mon, tue, or wed), or
the word daily (to set the schedule every day). This argument can also specify a
time of day in 24-hour format.
rate
Includes a number or the word unlimited. Rate can also be zero, disable, or
disabled (each stops replication until the next rate change). If you set rate to zero,
new contexts are also throttled to zero.
The number can include a tag for bits or bytes per second. Do not use a space
between the number and the bits or bytes specification. The default rate is bits per
second.
In the rate variable:
Example 70
Example 71
replication watch
replication watch destination
Display the progress of a replication initialization, resynchronization process, or recovery
operation. All users may run this command option.
180 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 26
route
The route command manages routing between a Data Domain system and backup
hosts. An additional routing rule in the Kernel IP routing table and in the Data Domain
system Route Config list shows a list of static routes reapplied at each system boot. Each
interface is assigned a route based on the address assigned to it. Also, depending on the
default gateway subnet, a route is added to an interface automatically if the interface is
in the subnet of the default route address.
Federal certification requirements state the DD OS must be IPv6-capable and that
interoperability with IPv4 be maintained in a heterogeneous environment. As a result,
several net command options now include arguments for both versions of Internet
Protocol. EMC Data Domain customers select which version to use, based on the type of
configuration.
This chapter contains the following topics:
route 181
route
Version Change
5.4 No changes made from previous version.
route add
route add [ipversion {ipv4 | ipv6}] route-spec
Add a routing rule.
Example 72
Example 73
route del
route del [ipversion {ipv4 | ipv6}] route-spec
Remove a routing rule from the kernel IP routing table or Route Config list.
Example 74
182 EMC Data Domain Operating System 5.4 Command Reference Guide
route
Example 74 (continued)
route reset
route reset gateway [ipversion {ipv4 | ipv6}]
Reset the default routing gateway to the default value (empty).
route set
route set gateway {ipaddr | ipv6addr}
Change the routing default gateway. When the default gateway is added or changed, the
Data Domain operating system automatically adds a route to default gateway for each
interface with the same subnet.
Example 75
route show
route show config
Display the configured static routes that are in the Route Config list.
route show gateway [ipversion {ipv4 | ipv6}]
Display the configured or DHCP-supplied routing gateways used by a Data Domain
system.
route show table [ipversion {ipv4 | ipv6}]
Display all entries in the Kernel IP routing table.
route trace
route trace [ipversion {ipv4 | ipv6}] host
Display a route used by a Data Domain system to connect with a particular destination.
Example 76
184 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 27
scsitarget
The scsitarget command manages the SCSI (Small Computer System Interface) target
subsystem configuration on single-node Data Domain systems and on systems using
Extended Retention.
The SCSI target subsystem configuration comprises several SCSI target entities:
l services (VTL and DD Boost)
l transports (Fibre Channel)
l transport endpoints (Fibre Channel port)
l endpoints (such as VTL tape drives)
l logical devices
l host initiators
l access groups
This chapter contains the following topics:
scsitarget 185
scsitarget
Version Change
5.4 No change from previous version.
scsitarget device
scsitarget device show detailed [device-spec] [service service-
name] [group group-spec]
Show detailed information on SCSI target devices.
scsitarget device show list [device-spec] [service service-
name] [group group-spec]
List summary information on SCSI target devices. If no arguments are selected, output
displays basic information on all device criteria.
Command Option Arguments
group-name
Name of SCSI target access group.
service-name
A SCSI Target service such as VTL or DD Boost.
scsitarget disable
scsitarget disable
Disable the SCSI target subsystem.
186 EMC Data Domain Operating System 5.4 Command Reference Guide
scsitarget
scsitarget enable
scsitarget enable
Enable the SCSI target subsystem.
scsitarget endpoint
scsitarget endpoint connection-reset endpoint-spec
Reset one or more SCSI target endpoints.
Note
Resetting endpoint connections during a backup may disrupt the backup operation.
scsitarget endpoint del endpoint-spec
Delete one or more endpoints. This may be used to delete an endpoint if the underlying
hardware is no longer available. Note that if the underlying hardware is still present, or
becomes available, a new endpoint for the hardware is discovered automatically and
configured based on default values.
scsitarget endpoint disable endpoint-spec
Disable one or more SCSI target endpoints.
scsitarget endpoint enable endpoint-spec
Enable one or more SCSI target endpoints.
scsitarget endpoint modify endpoint-spec [fcp2-retry {disable |
enable | default}] [topology {loop-preferred | loop-only |
point-to-point | default}] [wwpn {auto | wwpn}] [wwnn {auto |
wwnn}]
Modify one or more endpoints.
scsitarget endpoint rename src-endpoint-name dst-endpoint-name
Rename an endpoint.
scsitarget endpoint show detailed [endpoint-spec]
Show detailed information about one or more endpoints.
scsitarget endpoint show list [endpoint-spec]
Show summarized list of configured endpoints. If no argument is selected, output
displays basic information on all endpoint criteria.
scsitarget endpoint show stats [endpoint-spec] [interval
interval] [count count]
Periodically list I/O statistics on one or more endpoints. If no endpoints are specified,
output displays a single-line total for each interval.
Command Option Arguments
count
The number of objects on which to perform the action, as specified by the command
option.
endpoint-spec
Specifies the endpoint on which to perform the command.
fcp2-retry
Port option.
interval secs
Time interval in seconds.
topology
Set the Fibre Channel topology for the endpoint. Values include: loop-
preferred, loop-only, point-to-point, default.
wwpn
Set the world-wide port name (WWPN) for the endpoint, or use an automatic system-
generated WWPN.
wwnn
Set the WWNN for the endpoint, or use an automatic system-generated WWNN.
scsitarget group
scsitarget group add group-name device device-spec [lun lun]
[primary-endpoint {all | none | endpoint-list}] [secondary-
endpoint {all | none | endpoint-list}]
Add devices to a group.
scsitarget group add group-name initiator initiator-spec
Add one or more initiators to a group.
scsitarget group attach group-name device device-name lun lun
primary-endpoint {all | none | endpoint-list} secondary-
endpoint {all | none | endpoint-list}
Attach an additional LUN to a device in a group. This may be used to expose a device with
different LUNs through different endpoints.
scsitarget group create group-name service service-name
Create a new group associated with a specific service.
scsitarget group del group-name initiator initiator-spec
Delete one or more initiators from a group.
scsitarget group del group-name device device-spec
Delete one or more devices from a group.
scsitarget group destroy group-name
Destroy a group.
scsitarget group detach group-name device device-name lun lun
Detach a device from a LUN in a group. There must be at least one LUN for a device in a
group.
scsitarget group modify group-name device device-spec [lun lun]
[primary-endpoint {all | none | endpoint-list}] [secondary-
endpoint {all | none | endpoint-list}]
Modify device attributes in a group. If a device is attached to multiple LUNs, the lun
argument, if specified, indicates which LUN to update.
scsitarget group rename src-group-namedst-group-name
Rename a group.
scsitarget group show detailed [group-spec] [device device-
spec] [initiator initiator-spec] [service service-name]
Show detailed information on specific groups, based on selected arguments.
scsitarget group show list [group-spec] [device device-spec]
[initiator initiator-name] [service service-name]
188 EMC Data Domain Operating System 5.4 Command Reference Guide
scsitarget
scsitarget initiator
scsitarget initiator add initiator-name system-address system-
address
Add an initiator with associated system address. An initiator may be added before it is
visible on a transport, which allows for early provisioning.
scsitarget initiator del initiator-spec
Delete an initiator. Note that if the initiator is remains visible it may be automatically
rediscovered.
scsitarget initiator modify initiator-spec [address-method
{auto | vsa | default}]
Modify one or more initiators. The argument vsa is an acronym for volume system
addressing.
scsitarget initiator rename src-initiator-name dst-initiator-
name
Rename an initiator.
scsitarget persistent-reservation
scsitarget persistent-reservation clear [device device-spec]
[initiator initiator-name]
Clear SCSI-3 persistent reservations.
Example 77
To clear all persistent reservations set by an initiator no longer visible to the system,
enter:
Note
If a device does not include a reservation key, or is using a shared key, output displays a
series of zeros (0X0000000000000000) in the Reservation Key category instead of n/a.
This is expected behavior.
190 EMC Data Domain Operating System 5.4 Command Reference Guide
scsitarget
scsitarget reset
scsitarget reset detailed-stats
Reset detailed statistics for SCSI target subsystem.
scsitarget service
scsitarget service refresh [service]
Refresh SCSI target service configuration. The refresh command option causes all
services within the SCSI target system configuration to be re-created.
scsitarget service show list
Display a list of configured services and current state.
scsitarget show
scsitarget show config
Show SCSI target configuration.
scsitarget show detailed-stats
Show detailed statistics for SCSI target subsystem.
scsitarget status
scsitarget status
Show SCSI target status.
l The administrative state shows the overall state of the SCSI target subsystem.
l The process state shows if the SCSI target management process is currently running.
l The module state shows if required system modules have been loaded prior to
starting the management process.
If the status shows an administrative state of enabled but a process state of stopped,
the scsitarget enable command may be used to request a start of the SCSI target
subsystem.
scsitarget trace
scsitarget trace disable [component {all | user | kernel |
default | component-list}]
Disable SCSI target tracing.
scsitarget transport
scsitarget transport option reset {option-name | all}
Reset a SCSI target transport option.
scsitarget transport option set option-name value
Set a SCSI target transport option.
scsitarget transport option show {option-name | all}
Show a SCSI target transport option.
Example 78
192 EMC Data Domain Operating System 5.4 Command Reference Guide
scsitarget
Note
level
Degree of debugging verbosity to enable (all | high | medium | low | none).
timeout
Optional argument for scsitrace command. Set how long debugging is enabled
for the specified components.
194 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 28
snapshot
snapshot 195
snapshot
Version Change
5.4 No changes from previous version.
snapshot create
snapshot create snapshot mtree mtree-path [retention {date |
period}]
Create a snapshot. Naming conventions for creating MTrees include uppercase and
lowercase letters A-Z, a-z), numbers 0-9, single, non-leading embedded space,
exclamation point (!), hash (#), dollar sign ($), ampersand (&), caret (^), tilde (~), left and
right parentheses ( ( or ) ), left and right brackets ( [ or ] ), left and right curly braces
( { or } ).
Argument Definitions
snapshot
A name for the snapshot.
mtree mtree-path
The pathname of the MTree for which the snapshot is being created. The base of the
path must be /data/col1/mtree_name or /backup.
196 EMC Data Domain Operating System 5.4 Command Reference Guide
snapshot
retention date
A four-digit year, two-digit month, and two-digit day separated by dots, slashes, or
hyphens. For example, 2013.03.23. The snapshot is retained until midnight (00:00,
the first minute of the day) of the designated date.
retention period
Number of days, weeks (wks), or months (mos) to retain a snapshot. Note there is no
space between the number and time period; for example, 4wks. Also, one month
equals 30 days. The snapshot is retained until the same time of day it was created.
Example 79
If a snapshot was created at 8:48 a.m. on March 1, 2013 with a retention period of one
month, it would be retained for 30 days.
snapshot expire
snapshot expire snapshot mtree mtree-path [retention {date |
period | forever}]
Set or reset the retention time of a snapshot. To expire a snapshot immediately, use the
snapshot expire operation with no options. An expired snapshot remains available
until the next filesystem clean operation.
Argument Definitions
snapshot
The name of the snapshot.
mtree mtree-path
The pathname of the MTree for which the snapshot is being created.
retention date
A four-digit year, two-digit month, and two-digit day separated by dots ( . ), slashes
( / ), or hyphens ( - ). With a retention date, the snapshot is retained until midnight
(00:00, the first minute of the day) of the designated date.
retention period
Number of days, weeks (wks), or months (mos) to retain snapshot. Note there is no
space between the number and time period; for example, 4wks. Also, one month
equals 30 days. The snapshot is retained until the same time of day it was created.
The retention period must be set in days only.
forever
The snapshot does not expire.
snapshot list
snapshot list mtree mtree-path
View a list of snapshots of a specific MTree. The display shows the snapshot name, the
amount of pre-compression data, the creation date, the retention date, and the status.
The status may be blank or expired.
Example 80
Example 80 (continued)
snapshot rename
snapshot rename snapshotnew-name mtree mtree-path
Rename a snapshot for a specific MTree.
Example 81
To change the name from snap1 to new-snap1 for an MTree named /newMTree, enter:
snapshot schedule
snapshot schedule add name mtrees mtree-list
Add multiple MTrees to a single snapshot schedule.
snapshot schedule create name [mtrees mtree-list] [days days]
time time [,time ...] [retention period] [snap-name-pattern
pattern]
snapshot schedule create name [mtrees mtree-list] [days days]
time time every mins [retention period] [snap-name-pattern
pattern]
snapshot schedule create name [mtrees mtree-list] [days days]
time time-time [every <hrs | mins>] [retention period] [snap-
name-pattern pattern]
Use these commands to create a snapshot schedule for multiple MTrees. Command
arguments determine the duration of the schedule. (Note the different arguments for
specifying time interval.)
CAUTION
The retention period must be set in days only. If set in hours an error message appears
stating your data is in danger and the command will fail.
Example 82
198 EMC Data Domain Operating System 5.4 Command Reference Guide
snapshot
CAUTION
This command deletes the previous schedule without prompting the user.
snapshot schedule show [ {name | mtrees mtree-list} ]
Show a specific schedule and show schedules associated with a specific MTree. To show
a list of schedules, enter the command with no options.
Example 83
To schedule a snapshot every Monday and Thursday at 2:00 a.m. with a retention of two
months, enter:
200 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 29
snmp
The snmp command enables or disables SNMP access to a Data Domain system, adds
community strings, gives contact and location information, and displays configuration
settings.
SNMP management requires two primary elements: an SNMP manager and an SNMP
agent. An SNMP manager is software running on a workstation from which an
administrator monitors and controls the different hardware and software systems on a
network. These devices include, but are not limited to, storage systems, routers, and
switches.
An SNMP agent is software running on equipment that implements the SNMP protocol.
SNMP defines how an SNMP manager communicates with an SNMP agent. For example,
SNMP defines the format of requests that an SNMP manager sends to an agent and the
format of replies the agent returns.
From an SNMP perspective a Data Domain system is a read-only device, with one
exception: A remote machine can set the SNMP location, contact, and system name on a
Data Domain system. The snmp command enables administrative users to configure
community strings, hosts, and other SNMP MIB variables on the Data Domain system.
With one or more trap hosts defined, a Data Domain system takes the additional action of
sending alert messages as SNMP traps, even when the SNMP agent is disabled.
This chapter contains the following topics:
snmp 201
snmp
Version Change
5.4 Modified command options:
snmp add
snmp add ro-community community-string-list [hosts host-list]
Add one or more community strings for read-only access to the Data Domain system. A
common string for read-only access is public. To grant access to specific hosts, enter the
names in host-list. A valid host list can include the host name or IP address, such as:
hostnameA,hostNameB 10.10.1.2,10.10.1.310.**
Example 84
202 EMC Data Domain Operating System 5.4 Command Reference Guide
snmp
Example 85
Example 86
snmp del
snmp del ro-community community-string-list [hosts host-list]
Delete one or more community strings for read-only access to the Data Domain system.
snmp del rw-community community-string-list [hosts host-list]
Delete one or more community strings for read-write access to the Data Domain system.
Example 87
To delete the community private and all hosts associated with private:
Example 88
snmp disable
snmp disable
Disable SNMP and close port 161.
snmp enable
snmp enable
Enable SNMP and open port 161.
snmp reset
snmp reset
Reset SNMP agent configuration to default values.
snmp reset ro-communities
Reset list of read-only community strings to default values.
snmp reset rw-communities
Reset list of read-write community strings to default values.
snmp reset sysContact
Reset the SNMP administrative contact MIB variable to the default value or to an empty
string if the system value is empty.
snmp reset sysLocation
Reset the system location MIB variable to the default value or to an empty string if the
system value is empty or to an empty string if the system value is empty.
snmp reset trap-hosts
Reset list of SNMP trap receiver hosts to default values.
snmp set
snmp set sysContact sysContact
Set the SNMP administrative contact MIB variable. The SNMP sysContact MIB variable
differs from the value set with the config set admin-email command option.
However, if the SNMP MIB variables are not set with the SNMP commands, the variables
default to the system values given with the config set commands.
snmp set sysLocation sysLocation
Set the SNMP physical location MIB variable. The SNMP sysLocation MIB variables differs
from the value set with the config set location command option. However, if the
SNMP MIB variables are not set with the SNMP commands, the variables default to the
system values given with the config set commands.
snmp show
snmp show config [version {v2c | v3}]
Use this command to display all SNMP parameters. If SNMP version is not entered,
output displays information for both versions.
snmp show ro-communities
Show the SNMP read-only community strings.
204 EMC Data Domain Operating System 5.4 Command Reference Guide
snmp
snmp status
snmp status
Show SNMP status.
snmp user
snmp user add user-name access {read-only | read-write}
[authentication-protocol {MD5 | SHA1} authentication-key auth-
key [privacy-protocol {AES | DES} privacy-key priv-key]]
Add an SNMPv3 user to the system specifying the access rights, authentication protocol,
and privacy protocol. The authentication key is used when calculating the digest for the
authentication protocol. The privacy key is used as input for the privacy protocol.
snmp user del user-name
Delete an SNMPv3 user.
snmp user modify user-name access {read-only | read-write}
[authentication-protocol {MD5 | SHA1} authentication-key auth-
key [privacy-protocol {AES | DES} privacy-key priv-key]]
Modify an SNMPv3 user settings such as access rights, authentication protocol, and
privacy key.
snmp user reset
Reset list of SNMPv3 users to default values.
snmp user show user-name
Display a SNMPv3 user.
206 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 30
storage
The storage command adds, removes, and displays disks and LUNs belonging to active
and archive storage tiers. Tiered storage enables the Data Domain system to use different
types of storage devices.
A storage tier can contain two types of storage: whole disks in an enclosure, such as a
Data Domain system or attached expansion shelf, or LUNs in a Data Domain gateway
system that uses a SAN.
System storage for a filesystem or associated RAID disk group consists of two storage
tiers: one active and one archive. The active tier has one active unit of storage, and the
archive tier has one or more retention units of storage.
This chapter contains the following topics:
storage 207
storage
Version Change
5.4 No changes from previous version.
storage add
storage add [tier {active | archive}] {enclosure enclosure-id |
devdisk-id [spindle-group 1-16] | disk enclosure-id.disk-id }
Add storage devices to a tier. Device types include all disks in an enclosure, a single disk,
or a LUN in a gateway system. Disks or LUNs must be in the Unknown state to be added
to the designated tier, after which the state changes to Available. This command cannot
be used on dataless head (DLH) units. Default spindle group is 1.
Additionally:
l If adding a disk to an enclosure on the active tier and if there is already a disk group
in the enclosure, the disk becomes a spare, not available. This is because if you add
a disk and it becomes available, there is no way for the available disk to become
spare. Spares are only created when a disk group is created within the enclosure.
This rule also applies to the head unit.
l If there is not a disk group in the enclosure (other disks are available or spare), the
disk becomes available.
Note
The storage add devdisk-id command option is allowed only after running the
command option storage add enclosure enclosure-id to add the shelf.
storage remove
storage remove {enclosure enclosure-id | devdisk-id | disk
enclosure_id.disk-id}
Remove storage devices from the tier, including all disks in an enclosure, a single disk, or
a LUN in a gateway system. You can also remove a disk from a DLH unit. When a device is
removed the state changes to Unknown.
208 EMC Data Domain Operating System 5.4 Command Reference Guide
storage
This command cannot remove an In Use disk if doing so exceeds the minimum number
allowed by the RAID scheme. This command also cannot remove a disk if the disk is a
spare or an In Use LUN.
storage show
storage show {all | summary | tier {active | archive}}
Display information about filesystem storage. All users may run this command option.
Output includes the number of disk groups working normally and the number of
degraded disk groups. Details on disk groups undergoing, or queued for, reconstruction,
are also shown when applicable. The abbreviation N/A in the column Shelf Capacity
License Needed indicates the enclosure does not require a capacity license, or that part
of the enclosure is within a tier and the capacity license for the entire enclosure has been
accounted for.
Output Definitions
absent
No disk is in the disk slot.
unknown
A blank disk inserted into the disk slot, or a disk failed by a RAID system.
available
Any of the following:
l A previously unknown disk or LUN added to a tier by the storage add
enclosure command option.
l DD Extended Retention system only: a previously In Use disk or LUN deleted
from a retention unit by the filesys archive unit del command option.
This operation reverts the disk or LUN to available storage in the archive tier.
l A previously failed disk in an expansion shelf populated with other disks
belonging to a tier that is not primarily composed of disk group disks, and whose
partition was destroyed by the disk unfail command.
In Use
Storage that is part of an active filesystem or associated RAID disk group.
Spare
A disk that can be used as a RAID hot spare through RAID reconstruction. Spare
disks can be used to create or expand the filesystem.
Spare (reconstruction)
A spare disk that is pending or undergoing RAID reconstruction, which puts
filesystem data into what the formerly spare disk and then makes the disk an
integral part of a disk group. After RAID reconstruction of a spare disk completes, the
disk is part of a RAID disk group.
Failed
Tiered storage (Available, Spare, or In Use) removed from the tier
automatically by the disk subsystem, or explicitly by an administrative user. Failed
may also indicate unknown or foreign storage explicitly changed to the Failed
state.
Foreign
A disk belonging to a third-party vendor.
210 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 31
support
The support command manages bundles (EMC Data Domain log files), traces
(performance log files, also known as perf.logs), and file lists (file names under /
ddvar) from a customer Data Domain system. The information is transported to EMC via
HTTP or HTTPS.
This chapter contains the following topics:
support 211
support
Version Change
5.4 No changes from previous version.
support bundle
support bundle create {files-only file-list | traces-only}
[and-upload [transport {http|https}]]
Compress listed files into bundle and upload if specified. File names in a list must be
separated by one space.
support bundle create default [with-files file-list] [and-
upload [transport {http|https}]]
Compress default and listed files into bundle and upload if specified. File names in a list
must be separated by one space.
support bundle list
List all support bundles on system.
support bundle upload bundle-name [transport {http | https}]
Upload specified bundle to support server.
support notification
support notification disable { autosupport | alerts | all }
Disable autosupport (and am-email) or alerts or all notifications.
support notification enable { autosupport | alerts | all }
Enable autosupport (and am-email) or alerts or all notifications.
support notification show { autosupport | alerts | all }
Show notification setting of autosupport (and am-email) or alerts or all.
212 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 32
system
The system command enables administrative users to perform standard tasks on Data
Domain systems, configure a system for Retention Lock Compliance, and view system-
level information.
This chapter contains the following topics:
system 213
system
Version Change
5.4 New command option:
system show all. For newer systems, this command now displays the product serial
number as the serial number instead of the chassis serial number. The chassis serial
number is also displayed.
system show serialno [detailed]. For newer systems, this command now displays the
product serial number as the serial number instead of the chassis serial number. The
detailed argument displays both the system serial number and the chassis serial
number.
system headswap
system headswap
Restore the configuration to a system after replacing the head unit. For additional
instructions, see the Chassis Replacement FRU document for the system model.
system option
system option reset {login-banner}
Reset the login banner to the default of no banner.
214 EMC Data Domain Operating System 5.4 Command Reference Guide
system
Example 89
Mount the Data Domain system directory /ddvar from another system.
Create a text file with your login message as the text on the other system.
From the Data Domain system, enter system option set login-banner with the
path and file name of the text file you created. For example, to use text from a file named
banner, enter:
system passphrase
system passphrase change
Change the passphrase used to access the system. This command option requires
security officer authorization.
system passphrase set
For fresh installations, set the passphrase used to access the system. Passphrase length
cannot exceed 255 characters.
system poweroff
system poweroff
Shut down the Data Domain system. The command performs an orderly shutdown of
filesystem processes. This command does not power off external storage.
system reboot
system reboot
Shut down and reboot a Data Domain system. The command automatically performs an
orderly shutdown of filesystem processes.
system retention-lock
system retention-lock compliance configure
Configure Retention Lock Compliance on the Data Domain system. This command option
requires security officer authorization.
system retention-lock compliance enable
Enable Retention Lock Compliance on the Data Domain system. This command option
requires security officer authorization. See the command option system retention-
system sanitize
system sanitize abort
Stop the system sanitization process.
system sanitize start
Start the system sanitization process. Note that prior to running sanitization, snapshots
created during a previous replication process by another user may continue to hold
deleted data. To ensure data is removed from replication snapshots during system
sanitization, synchronize all replication contexts prior to beginning the procedure.
system sanitize status
Check system sanitization process status.
system sanitize watch
Monitor the progress of system sanitization.
system set
system set date MMDDhhmm[[CC]YY]
Set the system date and time. Do not use this command if Network Time Protocol (NTP) is
enabled. This command option requires security officer authorization if the system is
enabled for Retention Lock Compliance.
The format for the data and time is:
Two digits for the month, MM (01 through 12).
Two digits for the day of the month, DD (01 through 31).
Two digits for the hour, hh (00 through 23).
Two digits for minutes, mm (00 through 59).
Optional: Two digits for the century CC and two digits for the year YY.
The hour hh and minute mm variables are entered in 24-hour format with no colon
between the hours and minutes. 2400 is an invalid entry. The entry 0000 equals
midnight.
Example 90
Use one of the following commands to set the date and time to April 23, 2013, at 9:24
a.m., enter one of the following commands (two- or four-digit year):
system show
system show all
216 EMC Data Domain Operating System 5.4 Command Reference Guide
system
Show all system information. Note that newer systems, such as DD4500 and DD7200,
display the product serial number in the Serial number row and the chassis serial number
in the Chassis serial number row. On legacy systems, such as DD990 and earlier, the
Serial number row displays the chassis serial number and the Service tag row displays
the product serial number. The product serial number remains the same during many
maintenance events, including chassis upgrades. Role required: admin, security, user,
backup-operator, or none.
system show date
Display the system clock.
system show detailed-version
Show the version number and release information.
system show eula
View the End User License Agreement (EULA). Note if the user is not present during
system installation, the Data Domain Technical Consultant can temporarily bypass
license acceptance and continue with the installation by pressing Ctrl-C. Otherwise, the
user must press Enter to accept the license, which is displayed the first time he or she
logs in to the system. See the DVD Installation Guide for details.
system show hardware
Display information about slots and vendors and other hardware in a Data Domain
system.
system show managing-system
Identify on which Data Domain Management Console the Data Domain system was
added. Also display details about the Data Domain Management Console, such as the
outbound proxy host and port, the date for which the system became managed, and the
date of last contact.
system show meminfo
Display summary of system memory usage. Output differs between newer systems, such
as DD4500 and DD7200, and legacy systems, such as DD990 and earlier.
system show modelno
Display the hardware model number of a Data Domain system.
system show nvram
Display information about NVRAM cards. If output indicates one or more component
error, an alerts notification is sent to the designated group and the Daily Alert Summary
email includes an entry citing details of problem.
system show oemid [name | value]
Show details of system OEM. On systems with head units and shelves, the OEM identifier
of the head unit is displayed first. Output includes IDs for connected enclosures only.
system show performance [local] [raw | fsop] [duration {hr |
min} [interval {hr | min}]]
Display summary of system performance for a designated interval.
Argument Definitions
local
Display local statistics.
raw
Show unformatted statistics.
fsop
Display the number of each filesystem operation performed per minute.
duration
The hours or minutes prior to the current time for which to show data.
interval
The time between each line in the display. To specify the interval, you must also
specify the duration.
Example 91
Example 92
To show performance figures of the prior 30-minute duration with an interval of 5 minutes
between each set of figures, enter:
Note
Throughput Read and Write data includes NFS, CIFS, DD Boost over IP and Fibre Channel,
VTL, Replication, DD Boost-managed replication and optimized duplication.
Note
Protocol data includes NFS, CIFS, DD Boost over IP, and DD Boost-managed replication
and optimized duplication. Data does not include Replication, VTL over Fibre Channel, or
DD Boost over Fibre Channel.
ops/s
Operations per second.
load
Load percentage (pending ops/total RPC ops *100).
218 EMC Data Domain Operating System 5.4 Command Reference Guide
system
220 EMC Data Domain Operating System 5.4 Command Reference Guide
system
tot
The total number of requests.
SS Load Balance (gc)
Denotes type and number of expunge (gc) processes.
prefetch
Prefetch processes.
rd
Read processes.
wr
Write processes.
tot
The total number of gc processes.
Example 93
The following example is from a newer system that displays the product serial number as
the system serial number.
Note
Global Deduplication Arrays are deprecated as of this release. Users will receive a
message if the argument gda-display is entered.
Argument Definitions
local
Displays local values on the master system. Valid on the master node of a cluster
only.
gda-display
Displays values of cluster nodes on the master system in a row or column format.
Valid on the master node of a cluster only.
row
Output for each node is in row format, displayed as a single line for each interval.
column
Displays output of for each node in column format. Column headings indicate type of
stat value.
interval
When specifying intervals for collecting statistics, the first report is for current
activity. Subsequent reports show activity performed during [interval nsecs]. The
default interval is five seconds.
count
Specifies how many times to display the results. The default count is one. If interval
is specified and count is omitted, the count is set to infinite, or until the user presses
Ctrl-C.
Example 94
CIFS
ops/s
I/O and metadata operations per second.
222 EMC Data Domain Operating System 5.4 Command Reference Guide
system
in MB/s
Write throughput.
out MB/s
Read throughput.
NFS
ops/s
I/O operations.
load %
Load percentage (pending ops/total RPC ops *100).x.)
data in % MB/s
Protocol throughput. Amount of data the filesystem can read from and write to the
kernel socket buffer.
data out % MB/s
Protocol throughput. Amount of data the filesystem can write to the kernel socket
buffer.
wait in ms/MB
Average amount of time spent in ms to receive the amount of data.
wait out ms/MB
Average amount of time spent in ms to send the amount of data.
Net
aggr in MB/s
Amount of data received through all interfaces.
aggr out MB/s
Amount of data sent through all interfaces.
system status
system status
Display status of fans, internal temperatures, and power supplies. Information is grouped
separately for the Data Domain system and each expansion shelf connected to the
system. See the EMC Data Domain Operating System Administration Guide for details.
system upgrade
system upgrade file
Upgrade the Data Domain system software from the file specified in the /ddr/var/
releases directory. The upgrade command shuts down the filesystem and reboots the
Data Domain system. The upgrade command may require over an hour, depending on
the amount of data on the system. See the EMC Data Domain Operating System Release
Notes for instructions on upgrading Data Domain systems.
system upgrade continue
If upgrading a multi-node cluster, run this command option on the master controller to
complete the second phase of the upgrade procedure. (Multi-node clusters, or Global
Deduplication Arrays, are deprecated as of this release. See the EMC Data Domain
Operating System Release Notes for details.)
system upgrade history
Display history of system upgrades.
system upgrade precheck file
Check if current Data Domain operating system can be upgraded to the specified file in
the /ddr/var/release directory.
system upgrade status
Display current status and phase of the upgrade procedure. This command option shows
only the current status and then terminates. Users cannot monitor, or watch, upgrade
progress. When the upgrade is finished, a message displays the time of completion. If
upgrading from an earlier release (pre-5.2), this command becomes available after the
system reboots.
If the configuration is successful, the system reboots. File access is interrupted during
this time.
6. When the reboot has concluded, log in to the system as sysadmin.
224 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 33
user
The user command adds and deletes users, manages password aging and strength
policies, and displays user roles. A role determines the type of operations a user can
perform on the Data Domain system. See the EMC Data Domain Operating System
Administration Guide for details.
The default administrative account is sysadmin. You can change the sysadmin password
but cannot delete the account.
This chapter contains the following topics:
user 225
user
Version Change
5.4 No changes from previous version.
user add
user add user [role {admin | security | user | backup-operator
| data-access}] [min-days-between-change days] [max-days-
between-change days] [warn-days-before-expire days] [disable-
days-after-expire days] [disable-date date]
Add a new user. The default role is user. A user name must start with a number or a
letter. Special characters cannot be used. The user names root and test are default
names on each Data Domain system and are not available for general use.
Users in the sysadmin role create the first security officer role by adding a user and
designating the role security. After a user is added as the initial security officer, only
security officers can add or delete other security officers.
Argument Definitions
role
The type of user permissions allowed.
min-days-between-change
Minimum number of days allowed before the password can be changed again.
max-days-between-change
Maximum number of days before password expires.
warn-days-before-expire
Number of days of warning before a password expires.
disable-days-after-expire
Account is disabled if inactive for the specified number of days past expiration.
disable-date
Account is disabled on this date. If not specified, account never expires.
user change
user change password [user]
226 EMC Data Domain Operating System 5.4 Command Reference Guide
user
Change the password of a user. Users in the admin role user can change any user
password. Users in the user role can change only their own passwords. Passwords must
comply with the password strength policy, which you can check with the command
option user password strength show.
user change role user {admin | user | backup-operator | data-
access}
Change the role of a user.
user del
user del user
Remove a user. Note that sysadmin cannot be deleted.
user disable
user disable user
Disable the specified user account. This prevents the user from logging on to the Data
Domain system.
user enable
user enable user [disable-date date]
Enable a specified user account with an optional disable date. The account must already
exist on the system. If not specified, the disable date previously assigned to the account
is used.
user password
user password aging option reset {all | [min-days-between-
change] [max-days-between-change] [warn-days-before-expire]
[disable-days-after-expire]}
Reset one or more rules in the default password aging policy to the current default
values. New accounts inherit the policy in effect at the time they are created, unless you
set different aging options with the user add command.
user password aging option set {[min-days-between-change days]
[max-days-between-change days] [warn-days-before-expire days]
[disable-days-after-expire days]}
Set the default values for the password aging policy. This command option does not
require security officer authorization.
user password aging option show
Display the default password aging policy.
user password aging reset user {all | [min-days-between-change]
[max-days-between-change] [warn-days-before-expire] [disable-
days-after-expire]}
Reset one or more rules in the password aging policy for the specified user to the current
default values.
user password aging set user [min-days-between-change days]
[max-days-between-change days] [warn-days-before-expire days]
[disable-days-after-expire days]
Set the password aging policy for the specified user.
user reset
user reset
Reset the user account list, password-aging options, and password-strength parameters
to default values.
Note
user show
user show active
Display list of users currently logged in.
user show detailed [user]
Show detailed information for a specified user or for all users.
user show list
228 EMC Data Domain Operating System 5.4 Command Reference Guide
user
230 EMC Data Domain Operating System 5.4 Command Reference Guide
CHAPTER 34
vtl
EMC Data Domain Virtual Tape Library (VTL) is a licensed software option that enables
backup applications to connect to and manage a Data Domain system running Extended
Retention as a virtual tape library.
VTL pools are MTree-based (as of DD OS 5.2). Multiple MTrees let you more closely
configure DD OS for data management. MTree-based pools allow MTree replication to be
used instead of directory replication. Existing pools are backward compatible. You may
create additional backward-compatible pools as needed. VTL pool-based replication is
performed using MTree replication for MTree pools, and directory replication for
backward-compatible pools.
MTree-specific attributes can be applied to each VTL pool individually instead of
inheriting a common set of attributes from the default /backup MTree. These attributes
include snapshots and snapshot schedules, compression information, and migration
policies for Extended Retention.
In previous versions, user access to VTL pool data in /backup (/data/col1/backup)
was performed mainly through an NFS or CIFS mount of /backup and was relatively
unconstrained. This led to issues where VTL data was changed beneath the VTL process;
for example, when deleting a pool or copying files manually, which caused unexpected
behavior and inconsistencies.
With MTrees, users may continue to use and manage VTL with little or no difference when
compared to versions 5.1 and earlier.
This chapter contains the following topics:
vtl 231
vtl
232 EMC Data Domain Operating System 5.4 Command Reference Guide
vtl
Version Change
5.4 No changes from previous version.
vtl add
vtl add vtl [model model] [slots num-slots] [caps num-caps]
Add a tape library. Data Domain VTL supports a maximum of 64 library instances.
Command Option Arguments
model
A tape library model name. See the Data Domain technical note for the model name
that corresponds with your backup software.
num-caps
The number of cartridge-access ports. The default is zero (0), and the maximum is
100 per library or 1000 per system.
num slots
The number of slots in the library. You cannot add more drives than the number of
configured slots. The maximum number of slots for all VTLs on a Data Domain
system is 32,000. Default is 20 slots.
vtl
Name of library.
vtl cap
vtl cap add vtl [count num-caps]
Add cartridge access ports (CAPs) to a virtual tape library. The total number of CAPs
cannot exceed 100 per library or 1000 per system.
vtl cap del vtl [count num-to-del]
Delete num-to-del CAPs from a virtual tape library. The CAPs are deleted from the end. For
example, the command option vtl cap del vtl1 count 3 run on a VTL with 10 CAPs
deletes CAPs 8-10.
Command Option Arguments
count
The number of objects on which to perform the action, as specified by the command
option.
num-to-del
The number of objects to delete.
vtl
Name of library.
vtl debug
vtl debug disable [component {all | user | default | component-
list}]
Disable debug functionality of the specified components.
vtl debug enable [component {all | user | default | component-
list}] [level {high | medium | low}] [timeout {never | timeout
mins}]
Enable debug functionality for the specified components in persistent mode or a
specified timeout period at the specified debug level. The unit of timeout is
minutes.
234 EMC Data Domain Operating System 5.4 Command Reference Guide
vtl
Note
vtl del
vtl del vtl
Remove an existing virtual tape library. Any tapes loaded into the library when the library
is deleted are not destroyed. Instead, tapes are placed back into the virtual tape vault.
Command Option Arguments
vtl
Name of library.
vtl disable
vtl disable
Close all libraries and shut down the VTL process.
vtl drive
vtl drive add vtl [count num-drives] [model model]
Add drives to a virtual tape library. Drives are added by starting with drive number 1 and
scanning for logical unit address gaps left by the vtl drive del command. When the
gaps are filled, the drives are appended to the end of the library. The number of slots
within a library cannot be fewer than the number of drives in the library. If an attempt is
made to add more drives than the current number of slots, the system automatically adds
the additional slots required.
Note
236 EMC Data Domain Operating System 5.4 Command Reference Guide
vtl
Access Groups
Fibre Channel access groups for device.
vtl enable
vtl enable
Enable VTL subsystem.
vtl export
vtl export vtl {slot | drive | cap} address [count count]
Remove tapes from a slot, drive, or cartridge-access port (CAP) and send them to the
vault.
Command Option Arguments
count
The number of objects on which to perform the action, as specified by the command
option.
vtl
Name of library.
vtl group
A VTL group name must be unique, and can only contain the characters 0-9, a-z, A-Z,
underscore, and hyphen. Group names cannot exceed 256 characters. A maximum of 128
groups is allowed. Reserved group names that cannot be used are TapeServer,
default, all, and summary.
238 EMC Data Domain Operating System 5.4 Command Reference Guide
vtl
group-name
VTL access group. TapeServer is a reserved group and cannot contain initiators.
initiator-alias
Alias for an initiator.
lun
A device address to pass to the initiator. The maximum logical unit number (LUN) is
16383. A LUN must be unique within a group, but need not be unique across the
system. LUNs for VTL devices within a group must start with zero (0) and be
contiguous numbers.
port-list
A comma-separated list of Data Domain system VTL ports. You can specify port
names as a range separated by a hyphen (-). The ports must already exist.
Note
For multiple ports, separate each name with a comma and enclose the list with
double quotes.
src-group-name
Name of source group.
vtl
Name of library.
vtl import
vtl import vtl barcode barcode [count count] [pool pool]
[element {drive | cap | slot}] [address addr]
Move tapes from the vault into a slot, drive, or cartridge access port. The following two
commands are equivalent:
# vtl import VTL1 barcode TST010L1 count 5
# vtl import VTL1 barcode TST010L1 count 5 element slot
address 1
Use the command vtl tape show vtl-name to display the total number of slots for a VTL
and to view which slots are currently used. Though the vtl import command option can
move tapes into tape drives, it is more common that backup software commands from
the backup server are used to move VTL tapes to and from drives. The default address is
1, default element is slot, and the default pool is Default.
Use the vtl tape show vtl command to display the total number of slots for a VTL and to
view which slots are currently used. Use commands from the backup server to move VTL
tapes to and from drives.
If no address is specified, the first free slot available is used. For example if slots 1
through 4 are occupied or reserved, the address used will be 5. If the address you specify
is already in use, the first free slot that is larger than the address specified is used.
Command Option Arguments
addr
Abbreviation for address. Default address is 1 for importing tapes.
barcode
An eight-character virtual tape identifier. Barcodes must start with six numbers or
uppercase letters (0-9, A-Z), and end in a two-character tag of L1, L2, L3, LA, LB, or LC
for the supported LT0-1, LT0-2, and LT0-3 tape types.
Default sizes are used if you do not specify the capacity argument when creating the
tape cartridge. Defaults are:
l L1=100 GiB capacity tape, L2 = 200 GiB, and L3 = 400 GiB
l LA =50 GiB capacity tape, LB = 30 GiB, and LC =10 GiB
Note
L1, LA, LB and LC tapes cannot be written on LTO-3 tape drives. L2 and L3 tapes
cannot be read on LTO-1 tape drives. Also, LTO-4 will not read L2 tapes (in addition
to the LA-L1 tapes).
count
The number of objects on which to perform the action, as specified by the command
option.
element
Destination element.
vtl
Name of library.
vtl initiator
vtl initiator reset address-method initiator initiator-alias-
or-WWPN
Reset the address method used when responding to a SCSI REPORT LUNS command to
the default (auto).
vtl initiator reset alias alias-name
Remove an initiator alias. Reset (delete) the initiator alias from the system. Deleting the
alias does not affect any VTL access from the specified initiator. To remove an initiator
from a group, use the vtl group del command instead.
vtl initiator set address-method {auto | vsa} initiator
initiator-alias-or-WWPN
Set the device address method used when responding to a SCSI REPORT LUNS command
from the specified initiator. With most platforms, you do not need to change the default
device address method. Use this command to work around any platform-specific
limitations you may encounter.
vtl initiator set alias alias-name wwpn wwpn
Add an initiator alias. This command sets an alias for an initiators WWPN. An initiator is
any Data Domain system client HBAs world-wide port names (WWPN). This command
does not interrupt traffic or VTL group access.
240 EMC Data Domain Operating System 5.4 Command Reference Guide
vtl
Use the vtl initiator show command on the Data Domain system to list the client
WWPNs detected by the Data Domain system. You must match the WWPNs in the
command output to the clients HBA WWPN, including colon delimiters.
The alias must be unique, cannot exceed 256 characters, and can contain the characters
0-9, a-z, A-Z, underscore, and hyphen only. Maximum number of aliases is 128.
Example 95
The following example uses the client name and port number as the alias to avoid
confusion with multiple clients that may have multiple ports:
Note
For multiple ports, separate each name with a comma and enclose the list with
double quotes.
vtl option
vtl option disable option-name
Disable a VTL option.
vtl option enable option-name
Enable a VTL option.
vtl option reset option-name
Example 96
vtl pool
vtl pool add pool [backwards-compatibility-mode]
A pool created with backwards compatibility mode will exist in the default directory (/
backup). Replication of backwards-compatibility-mode pools is done using directory-
based replication, as in previous releases.
EMC does not recommend creating backwards-compatibility-mode pools unless users
have specific requirements; for example, replication with a pre-5.2 DD OS system.
vtl pool del pool
Delete a tape pool. You must first use the vtl tape del command to remove all tapes from
the pool, or use the vtl tape move command to move all tapes to another pool.
vtl pool rename src-pool dst-pool
Rename a pool. Note that a pool can be renamed only if none of its tapes are in libraries.
vtl pool show {all | pool}
List all tape pools or the contents of a specific pool. If the argument all is used, a
summary of all tape pools is provided, including the state of each pool, the number of
tapes, the total usage and compression for each pool, whether or not a pool is a
replication destination, the Retention Lock status of the pool, read/write properties, and
the number of tapes in the pool.
Output Definitions
RW
Pool has normal read/write properties.
RD
Pool is a replication destination.
RO
Pool is read-only.
242 EMC Data Domain Operating System 5.4 Command Reference Guide
vtl
RLCE
Pool is Retention Lock Compliance Enabled.
RLGE
Pool is Retention Lock Governance Enabled.
RLGD
Pool is Retention Lock Governance Disabled.
BCM
Pool is in backward-compatibility mode.
Note
This command option does not convert the pool to MTree under the following conditions:
l The pool is a replication source or destination.
l The filesystem is full.
l The pool collides with an MTree with same name.
l The system has reached the maximum number of MTrees (100).
Example 97
If the check-only argument is used, the precheck is run, but no upgrade is performed.
This allows planning for changes prior to the upgrade.
Example 98
See the EMC Data Domain Operating System Administration Guide for instructions on
upgrading VTL directory-based pools to MTree-based pools.
vtl port
vtl port disable {all | port-list}
Disable a single Fibre Channel port or all Fibre Channel ports in the list.
244 EMC Data Domain Operating System 5.4 Command Reference Guide
vtl
l Read KiB/s
l Write KiB/s
l Soft Errors
l Hard Errors
vtl port show summary
Show summary information about Fibre Channel ports. All users may run this command
option. Output returned from this command option includes:
l Port
l HBA slot
l HBA port
l Connection type
l Link speed
l Port ID
l Enabled
l Status
Command Option Arguments
count
The number of objects on which to perform the action, as specified by the command
option.
detailed-stats
Displays details of statistics.
fcp2-retry
Port option.
interval secs
Time interval in seconds.
loop-only
Port topology option.
loop-preferred
Port topology option.
point-to-point
Port topology option.
port-list
A comma-separated list of Data Domain system VTL ports. You can specify port
names as a range separated by a hyphen (-). The ports must already exist.
Note
For multiple ports, separate each name with a comma and enclose the list with
double quotes.
summary
Show a summary of all tapes and tape usage.
topology
Port option.
vtl readahead
vtl readahead reset {stats | summary}
Reset VTL readahead information. When VTL reads a tape file it improves performance by
reading ahead information from tape files and caching the information until needed.
vtl readahead show {stats | detailed-stats | summary}
Display readahead information about each open tape file that has been read.
Argument Definitions
detailed-stats
Displays details of statistics.
stats
Display statistics.
summary
Show a summary of all tapes and tape usage.
vtl rename
vtl rename src-vtl dst-vtl
Rename a virtual tape library. The source name and the destination name must differ.
vtl reset
vtl reset hba
Reset the hba. Broadcast new VTLs and VTL changes over Fibre Channel to clients. Avoid
using the vtl reset hba command during an active backup or restore job. Changes may
cause an active job to fail, depending on the backup application and host type.
vtl reset detailed-stats
Reset the VTL detailed statistics.
vtl show
vtl show config [vtl]
Show the library name and model and tape drive model for a single VTL or all VTLs. All
users may run this command option.
vtl show detailed-stats
Show a large quantity of detailed VTL statistics and information.
vtl show element-address [vtl]
Show the following information for all VTLs, or a single VTL. All users may run this
command option.
l Starting element address
l Slot count and starting address
l CAP count and starting address
l Drive count and starting address
l Changer count and starting address
246 EMC Data Domain Operating System 5.4 Command Reference Guide
vtl
Note
For multiple ports, separate each name with a comma and enclose the list with
double quotes.
vtl
Name of library.
vtl slot
vtl slot add vtl [count num-slots]
Add slots to a virtual tape library. Additional slots are added to the end of the list of slots
in the specified virtual tape library. The maximum is 32,000 slots per library, 64,000 slots
per system.
vtl slot del vtl [count num-to-del]
Delete one or more slots from a virtual tape library.
Command Option Arguments
count
The number of objects on which to perform the action, as specified by the command
option.
num slots
The number of slots in the library. You cannot add more drives than the number of
configured slots. The maximum number of slots for all VTLs on a Data Domain
system is 32,000. Default is 20 slots.
num-to-del
The number of objects to delete.
vtl
Name of library.
vtl status
vtl status
Show the state of the VTL process. All users may run this command option.
vtl tape
vtl tape add barcode [capacity capacity] [count count] [pool
pool]
Add one or more virtual tapes and insert them into the vault. Optionally, add the tapes to
the specified pool.
vtl tape copy barcode barcode [count count] source src-pool
[snapshot src-snapshot] destination dst-pool
Copy tapes between VTL pools. Note that an opened writable tape in a tape drive may not
be copied. Additionally, source and destination pools cannot be the same unless copying
from a snapshot. If the snapshot argument is specified in the command option, tapes are
copied from the snapshot of the source pool. In this case the destination pool can be the
same as the source pool.
A tape that is in the vault or library slot/cap, or is opened read-only in a tape drive can be
copied. A tape that is opened writable in a tape drive may not be copied.
Example 99
CAUTION
248 EMC Data Domain Operating System 5.4 Command Reference Guide
vtl
250 EMC Data Domain Operating System 5.4 Command Reference Guide