DD Os 7.2 Admin Guide 01
DD Os 7.2 Admin Guide 01
Administration Guide
7.2
March 2021
Rev. 04
Contents
2 Contents
Viewing hardware component status...........................................................................................................................35
Viewing system statistics................................................................................................................................................ 36
Capacity statistics charts................................................................................................................................................36
Viewing the Task Log....................................................................................................................................................... 37
Viewing the system High Availability status................................................................................................................37
High Availability status............................................................................................................................................... 38
Contents 3
Managing support delivery..............................................................................................................................................56
Selecting standard email delivery to Dell EMC.................................................................................................... 56
Selecting and configuring Secure Remote Services delivery........................................................................... 56
Testing ConnectEMC operation.............................................................................................................................. 58
Managing log files............................................................................................................................................................. 58
Viewing log files in DD System Manager............................................................................................................... 58
Displaying a log file in the CLI...................................................................................................................................58
Learning more about log messages.........................................................................................................................59
Saving a copy of log files...........................................................................................................................................60
Log message transmission to remote systems.................................................................................................... 60
Managing a core dump..................................................................................................................................................... 61
Splitting a coredump file.............................................................................................................................................61
4 Contents
Configuring a VLAN................................................................................................................................................... 101
Modifying a VLAN interface.................................................................................................................................... 102
Configuring an IP alias.............................................................................................................................................. 102
Modifying an IP alias interface................................................................................................................................103
Registering interfaces with DDNS.........................................................................................................................103
Destroying an interface............................................................................................................................................ 103
Viewing an interface hierarchy in the tree view.................................................................................................104
General network settings management..................................................................................................................... 104
Viewing network settings information.................................................................................................................. 104
Setting the DD System Manager hostname........................................................................................................104
Managing the domain search list........................................................................................................................... 105
Adding and deleting host maps.............................................................................................................................. 105
Configuring DNS IP addresses............................................................................................................................... 106
Network route management.........................................................................................................................................106
Viewing route information........................................................................................................................................107
Setting the default gateway....................................................................................................................................107
Creating static routes............................................................................................................................................... 108
Deleting static routes................................................................................................................................................108
Contents 5
Monitoring the file system.............................................................................................................................................126
Managing file system capacity................................................................................................................................127
Monitor the capacity with email alerts................................................................................................................. 127
Performing basic operations......................................................................................................................................... 127
Creating the file system........................................................................................................................................... 127
Enabling or disabling the file system..................................................................................................................... 128
Expanding the file system........................................................................................................................................128
Destroying the file system....................................................................................................................................... 129
Performing cleaning........................................................................................................................................................ 129
Starting cleaning........................................................................................................................................................ 130
Scheduling or stopping cleaning............................................................................................................................. 131
Performing sanitization................................................................................................................................................... 131
Sanitizing deduplicated data.................................................................................................................................... 131
Sanitization level 1: data clearing or shredding...................................................................................................132
Sanitization level 2: full system sanitization........................................................................................................ 132
Modifying basic settings................................................................................................................................................ 132
Changing local compression.................................................................................................................................... 132
Changing read-only settings................................................................................................................................... 133
Working with disk staging........................................................................................................................................133
Configuring disk staging...........................................................................................................................................134
Tape marker settings................................................................................................................................................ 134
SSD Random workload share..................................................................................................................................134
Fast copy operations.......................................................................................................................................................134
Performing a fast copy operation.......................................................................................................................... 134
6 Contents
Monitoring snapshots and their schedules................................................................................................................145
Managing snapshots....................................................................................................................................................... 145
Creating a snapshot.................................................................................................................................................. 145
Modifying a snapshot expiration date...................................................................................................................145
Renaming a snapshot................................................................................................................................................145
Expiring a snapshot................................................................................................................................................... 146
Managing snapshot schedules......................................................................................................................................146
Creating a snapshot schedule.................................................................................................................................146
Modifying a snapshot schedule.............................................................................................................................. 147
Deleting a snapshot schedule..................................................................................................................................147
Recover data from a snapshot..................................................................................................................................... 147
Contents 7
NFS overview................................................................................................................................................................... 165
HA systems and NFS................................................................................................................................................ 165
Managing NFS client access to the protection system......................................................................................... 165
Enabling NFS services.............................................................................................................................................. 166
Disabling NFS services............................................................................................................................................. 166
Creating an export.....................................................................................................................................................166
Modifying an export.................................................................................................................................................. 167
Creating an export from an existing export........................................................................................................ 168
Deleting an export..................................................................................................................................................... 168
Displaying NFS information........................................................................................................................................... 168
Viewing NFS status................................................................................................................................................... 168
Viewing NFS exports................................................................................................................................................ 169
Viewing active NFS clients...................................................................................................................................... 169
Integrating a DDR into a Kerberos domain................................................................................................................ 169
Add and delete KDC servers after initial configuration........................................................................................... 171
8 Contents
Enabling Active Directory.............................................................................................................................................. 182
Configuring Active Directory...................................................................................................................................183
Configuring clients on Active Directory................................................................................................................183
Contents 9
Deleting a client from the interface group.......................................................................................................... 215
Using interface groups for Managed File Replication (MFR)......................................................................... 215
Destroying DD Boost.......................................................................................................................................................217
Configuring DD Boost-over-Fibre Channel................................................................................................................217
Enabling DD Boost users.......................................................................................................................................... 217
Configuring DD Boost............................................................................................................................................... 218
Verifying connectivity and creating access groups...........................................................................................219
Using DD Boost on HA systems................................................................................................................................... 221
About the DD Boost tabs...............................................................................................................................................221
Settings........................................................................................................................................................................ 221
Active Connections...................................................................................................................................................222
IP Network..................................................................................................................................................................223
Fibre Channel............................................................................................................................................................. 223
Storage Units............................................................................................................................................................. 223
10 Contents
Changing a tape's write or retention lock state................................................................................................ 248
Working with the vault.................................................................................................................................................. 248
Working with the cloud-based vault.......................................................................................................................... 249
Prepare the VTL pool for data movement.......................................................................................................... 249
Remove tapes from the backup application inventory.................................................................................... 250
Select tape volumes for data movement............................................................................................................. 251
Restore data held in the cloud............................................................................................................................... 253
Manually recall a tape volume from cloud storage............................................................................................253
Working with access groups........................................................................................................................................ 254
Creating an access group....................................................................................................................................... 255
Deleting an access group........................................................................................................................................ 257
Working with a selected access group...................................................................................................................... 258
Selecting endpoints for a device........................................................................................................................... 258
Configuring the NDMP device TapeServer group............................................................................................ 259
Working with resources.................................................................................................................................................260
Working with initiators..............................................................................................................................................261
Working with endpoints............................................................................................................................................261
Working with a selected endpoint.........................................................................................................................262
Working with pools......................................................................................................................................................... 264
Creating pools............................................................................................................................................................265
Deleting pools.............................................................................................................................................................265
Working with a selected pool.......................................................................................................................................266
Converting a directory pool to an MTree pool ..................................................................................................267
Moving tapes between pools................................................................................................................................. 268
Copying tapes between pools................................................................................................................................ 269
Renaming pools......................................................................................................................................................... 269
Contents 11
Viewing estimated completion time for backup jobs........................................................................................295
Checking replication context performance.........................................................................................................296
Tracking status of a replication process............................................................................................................. 296
Replication lag............................................................................................................................................................296
Replication with HA........................................................................................................................................................ 296
Replicating a system with quotas to one without...................................................................................................297
Replication Scaling Context ........................................................................................................................................ 297
Directory-to-MTree replication migration................................................................................................................. 297
Performing migration from directory replication to MTree replication........................................................ 297
Viewing directory-to-MTree migration progress...............................................................................................298
Checking the status of directory-to-MTree replication migration................................................................298
Aborting D2M replication ....................................................................................................................................... 299
Troubleshooting D2M...............................................................................................................................................299
Additional D2M troubleshooting............................................................................................................................ 300
Using collection replication for disaster recovery with SMT................................................................................ 301
12 Contents
Adding a cloud unit for Amazon Web Services S3............................................................................................323
Adding a cloud unit for Azure.................................................................................................................................324
Adding a cloud unit for Google Cloud Provider..................................................................................................324
Adding an S3 Flexible provider cloud unit........................................................................................................... 326
Modifying a cloud unit or cloud profile.................................................................................................................326
Deleting a cloud unit................................................................................................................................................. 328
Data movement............................................................................................................................................................... 329
Adding data movement policies to MTrees........................................................................................................ 329
Moving data manually.............................................................................................................................................. 329
Moving data automatically...................................................................................................................................... 329
Recalling a file from the Cloud Tier...................................................................................................................... 330
Using the CLI to recall a file from the cloud tier............................................................................................... 330
Direct restore from the cloud tier..........................................................................................................................331
Using the CLI to configure Cloud Tier....................................................................................................................... 332
Configuring encryption for DD cloud units............................................................................................................... 335
Information needed in the event of system loss..................................................................................................... 335
Using DD Replicator with Cloud Tier..........................................................................................................................335
Using DD Virtual Tape Library (VTL) with Cloud Tier............................................................................................ 336
Displaying capacity consumption charts for Cloud Tier........................................................................................ 336
Cloud Tier logs................................................................................................................................................................. 336
Using the CLI to remove Cloud Tier........................................................................................................................... 337
Contents 13
Chapter 27: DD Encryption........................................................................................................ 363
DD Encryption overview................................................................................................................................................363
Configuring encryption.................................................................................................................................................. 364
About key management.................................................................................................................................................364
Rectifying lost or corrupted keys..........................................................................................................................365
Key manager support............................................................................................................................................... 365
Working with the Embedded Key Manager........................................................................................................ 365
Working with KeySecure Key Manager............................................................................................................... 366
Using DD System Manager to set up and manage the KeySecure Key Manager..................................... 366
Using the DD CLI to manage the KeySecure Key Manager............................................................................369
How the cleaning operation works........................................................................................................................ 371
Key manager setup..........................................................................................................................................................371
Setting up KMIP key manager................................................................................................................................372
Changing key managers after setup...........................................................................................................................373
Deleting certificates..................................................................................................................................................373
Checking DD Encryption settings............................................................................................................................... 373
Enabling and disabling DD Encryption........................................................................................................................ 374
Enabling DD Encryption........................................................................................................................................... 374
Disabling DD Encryption.......................................................................................................................................... 374
Locking and unlocking the file system....................................................................................................................... 374
Locking the file system............................................................................................................................................ 375
Unlocking the file system........................................................................................................................................ 375
Changing the encryption algorithm.......................................................................................................................376
14 Contents
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2020 - 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Other trademarks may be trademarks of their respective owners.
1
Introducing DD OS
This chapter presents the following topics:
Topics:
• Revision history
• System overview
• DD OS features
Revision history
The revision history lists the major changes to this document.
System overview
Dell EMC PowerProtect DD Series Appliances and older Data Domain systems are disk-based appliances that run PowerProtect
DD OS to provide inline deduplication for data protection and disaster recovery (DR) in the enterprise environment.
NOTE: In this guide, "DD system," "the protection system," or simply "the system" refers to PowerProtect DD Series
Appliances running DD OS 7.0 or later as well as earlier Data Domain systems.
16 Introducing DD OS
DD system appliances vary in storage capacity and data throughput. Systems are typically configured with expansion enclosures
that add storage space.
DD OS provides the following interfaces:
● DD System Manager—Enables you to configure, manage, and monitor your system using a browser-based graphical user
interface (GUI). DD System Manager provides real-time graphs and tables that enable you to monitor the status of system
hardware components and configured features. DD System Manager provides a single, consolidated management interface
that enables you to manage a single system from any location.
NOTE: If you have a larger environment, PowerProtect DD Management Center (DDMC) enables you to manage
multiple systems from a single browser window. Contact your Dell EMC representative for more information.
● Command-line interface (CLI)—Enables you to perform all system operations, including operations that cannot be managed
by DD System Manager. Using the CLI commands you can configure system settings and display system hardware status,
feature configuration, and operations. Refer to the PowerProtect DD Series Appliances Operating System Command
Reference Guide for a complete description of commands.
DD OS features
DD OS features include:
● Data integrity—The DD OS Data Invulnerability Architecture protects against data loss from hardware and software failures.
● Data Deduplication—The file system deduplicates data by identifying redundant data during each backup and storing unique
data just once.
● Restore operations—File restore operations create little or no contention with backup or other restore operations.
● DD Replicator—DD Replicator sets up and manages the replication of backup data between two protection systems.
● Multipath and load balancing—In a Fibre Channel multipath configuration, multiple paths are established between a
protection system and a backup server or backup destination array. When multiple paths are present, the system
automatically balances the backup load between the available paths.
● High availability—The High Availability (HA) feature lets you configure two protection systems as an Active-Standby pair,
providing redundancy in the event of a system failure. HA keeps the active and standby systems in sync, so that if the active
node were to fail due to hardware or software issues, the standby node can take over services and continue where the
failing node left off.
● Random I/O handling—The random I/O optimizations included in DD OS provide improved performance for applications and
use cases that generate larger amounts of random read and write operations than sequential read and write operations.
● System Administrator access—System administrators can access the system for configuration and management using a
command line interface (CLI) or a graphical user interface (GUI).
● Licensed features—Feature licenses allow you to purchase only those features you intend to use. Some examples of features
that require licenses are DD Boost, and capacity on demand (storage capacity increases).
● Storage environment integration—DD OS systems integrate easily into existing data centers.
Licensed features
Feature licenses allow you to purchase only those features you intend to use. Some examples of features that require licenses
are DD Boost, and capacity on demand (storage capacity increases).
Consult with your sales representative for information on purchasing licensed features.
Introducing DD OS 17
Table 2. Features requiring licenses (continued)
Feature Name License Name in Description
Software
Cloud Tier CLOUDTIER-CAPACITY Enables a system to move data from the active tier to low-cost,
high-capacity object storage in the public, private, or hybrid cloud
for long-term retention.
DD Encryption ENCRYPTION Allows data on system drives or external storage to be encrypted
while being saved and locked when moving the system to another
location.
DD Expansion Storage EXPANDED-STORAGE Allows system storage to be expanded beyond the level provided in
the base system.
DD I/OS (for IBM i operating I/OS An I/OS license is required when DD VTL is used to backup
environments) systems in the IBM i operating environment. Apply this license
before adding virtual tape drives to libraries.
DD Replicator REPLICATION Adds DD Replicator for replication of data from one protection
system to another. A license is required on each system.
DD Retention Lock RETENTION-LOCK- Meets the strictest data retention requirements from regulatory
Compliance Edition COMPLIANCE standards such as SEC17a-4.
DD Retention Lock RETENTION-LOCK- Protects selected files from modification and deletion before a
Governance Edition GOVERNANCE specified retention period expires.
DD Shelf Capacity-Active Tier CAPACITY-ACTIVE Enables a system to expand the active tier storage capacity to an
additional enclosure or a disk pack within an enclosure.
DD Storage Migration STORAGE-MIGRATION- Enables migration of data from one enclosure to another to
FOR-DATADOMAIN- support replacement of older, lower-capacity enclosures.
SYSTEMS
DD Virtual Tape Library (DD VTL Enables the use of a protection system as a virtual tape library
VTL) over a Fibre Channel network. This license also includes the NDMP
Tape Server feature and the I/OS license for IBM i systems, which
previously required separate licenses.
High Availability HA-ACTIVE-PASSIVE Enables the High Availability feature in an Active-Standby
configuration. You only need to purchase one HA license; the
license runs on the active node and is mirrored to the standby
node.
SSD Cache SSD-CAPACITY Enables the SSD cache feature on DD6300, DD6800, DD9300,
DD9500, and DD9800 systems. This license is not required to use
the SSD cache feature on DD6900, DD9400, and DD9900 systems.
18 Introducing DD OS
2
Getting Started
This chapter presents the following topics:
Topics:
• Logging in and out of DD System Manager
• Using the system configuration wizard
• Using the command line interface
• Managing HA systems
• Managing electronic licenses
• Optionally configure the login banner
Prerequisites
DD System Manager uses HTTP port 80 and HTTPS port 443. To reach the system if it is behind a firewall, you might need to
enable port 80 for HTTP or port 443 for HTTPS. You can change the port numbers according to your security requirements.
Related concepts
Managing host certificates for HTTP and HTTPS on page 66
Steps
1. Open a web browser and enter the IP address or hostname to connect to DD System Manager. It must be one of the
following:
● A fully qualified domain name (for example, http://dd01.example.com)
● A hostname (http://dd01)
● An IP address (http://10.5.50.5)
2. For HTTPS secure login, click Secure Login.
Secure login with HTTPS requires a digital certificate to validate the identity of the DD OS system and to support
bi-directional encryption between DD System Manager and a browser. DD OS includes a self-signed certificate, and DD
OS allows you to import your own certificate.
3. Enter your assigned username and password.
Getting Started 19
● For physical systems the default password is the system serial number.
● For PowerProtect DD Virtual Edition (DD VE) instances the default password is changeme.
4. Click Log In.
For first-time login, the Home page appears.
NOTE: If this is the first time you are logging in and the system administrator has configured your username to require a
password change, you must change the password before gaining access to DD System Manager.
5. To log out, click the log out button in the DD System Manager banner.
Prerequisites
● You must have authorization privileges on the protection system, and the protection system must trust the CA certificate.
Your username must be specified in the common-name field in the certificate.
● You must have a user account on the protection system. You can be either a local user or a name service user (NIS/AD). For
a name service user, your group-to-role mapping must be configured on the protection system.
Steps
1. Use the following CLI command to import the public key from the CA that issued the certificate: adminaccess
certificate import ca application login-auth.
NOTE: If the CA certificate consists of a CA-chain, run the adminaccess certificate import ca
application login-auth command multiple times to import each public key of the CA-chain up to the root CA.
2. Load the user certificate in PKCS12 format in your browser from the CAC/PIV card after swiping CAC/PIV card against a
card reader which interacts with the browser .
Once the CA certificate is trusted by the protection system, a Log in with certificate link is visible on the HTTPS login
screen.
3. Click Log in with certificate, and choose the user certificate from the list of certificates that are prompted by the browser.
Results
The system validates the user certificate against the trust store. Based on authorization privileges associated with your account,
a System Manager session is created for you.
Prerequisites
SSO must be enabled and the protection system must be registered with an SSO provider.
Steps
1. At the login screen, click Log in with Data Protection Central.
NOTE: If a brand name is set on Data Protection Central (DPC), the link appears as Log in with <DPC-brand-name> .
20 Getting Started
Troubleshooting login issues
Steps
1. Select Maintenance > System > Configure System.
2. Use the controls at the bottom of the Configuration Wizard dialog box to select which features to configure and to
advance through the wizard. To display help for a feature, click the help icon (question mark) in the lower left corner of the
dialog box.
Configuration parameters
View the parameters that you can configure using the Configuration wizard.
The Configuration wizard enables you to define the parameters for the following components:
Getting Started 21
● Licensing
● Network
● File System
● System settings
● Deployment Assessment page for DDVE
● DD Boost protocol
● CIFS protocol
● NFS protocol
● Virtual Tape Library (VTL) protocol
The Online Help provides more details about these options.
Prerequisites
To use the CLI, you must establish a local or remote connection to the protection system using one of the following methods.
● If you are connecting through a serial console port on the system, connect a terminal console to the port and use the
communication settings: 115200 baud, 8 data bits, no parity, and 1 stop bit.
● If the system supports keyboard and monitor ports, connect a keyboard and monitor to those ports.
● If you are connecting through Ethernet, connect a computer with SSH or Telnet client software to an Ethernet network that
can communicate with the system.
Steps
1. If you are using an SSH or Telnet connection to access the CLI, start the SSH or Telnet client and specify the IP address or
host name of the protection system.
For information on initiating the connection, see the documentation for the client software. The system prompts you for a
username.
2. When prompted, enter your protection system username or sysadmin, the default username.
3. When prompted, enter the password for the specified username.
Example
The following example shows SSH login to a system named mysystem using SSH client software.
22 Getting Started
CLI online help guidelines
The CLI displays two types of help: syntax-only help and command-description help, which includes the command syntax. Both
types of help offer features that enable you reduce the time it takes to find the information you need.
The following guidelines describe how to use syntax-only help.
● To list the top-level CLI commands, enter a question mark (?), or type help or man at the prompt.
● To list all forms of a top-level command, enter the command with no options at the prompt or enter command ?.
● To list all commands that use a specific keyword, enter help keyword, man keyword, or ? keyword.
For example, ? password displays all system commands that use the password argument.
Managing HA systems
The High Availability (HA) feature lets you configure two protection systems as an Active-Standby pair, providing redundancy in
the event of a system failure. HA keeps the active and standby systems in sync, so that if the active node were to fail due to
hardware or software issues, the standby node can take over services and continue where the failing node left off.
Using DD System Manager, you can view the status of a configured HA system, but you cannot perform an initial HA system
set-up. Use the DD OS CLI commands to set up the HA relationship between the two nodes, one active and one standby.
HA is supported on the following systems:
● Data Domain DD6800
● Power Protect DD6900
● Data Domain DD9300
● Power Protect DD9400
● Data Domain DD9500
● Data Domain DD9800
● Power Protect DD9900
Setup
Both nodes of the HA pair must have identical hardware. This requirement is validated during setup and system boot-up. Ensure
that the system interconnect and identical hardware are set up on both nodes. Run the initial set-up on either node, one at a
time.
When configuring HA for the first time, run the ha create command on the node with the license installed. To upgrade an
existing system to HA by adding a new or unconfigured system, initiate the HA upgrade from the existing standalone system.
Feature continuity
HA provides failover within 10 minutes for most operations. CIFS, DD VTL, and NDMP must be restarted manually.
Getting Started 23
NOTE: Recovery of DD Boost applications may take longer than 10 minutes, because Boost application recovery cannot
begin until the DD server failover is complete. In addition, Boost application recovery cannot start until the application
invokes the Boost library. Similarly, NFS may require additional time to recover.
The installation guides for the systems that support HA describe how to install a new HA system. The Single Node to HA
Upgrade describes how to upgrade an existing system to an HA pair.
Maintenance
The HA architecture provides a rolling upgrade, which reduces maintenance downtime for the upgrade.
With a rolling upgrade, the HA nodes are upgraded one at a time. The standby node is restarted and upgraded first. The newly
upgraded standby node then takes over the active role through an HA failover. After the failover, the second node is restarted
and assumes the role of the standby node after the upgrade.
System upgrade operations that require data conversion cannot start until both systems are upgraded to the same level and HA
state is fully restored.
Steps
1. Select Administration > Access.
2. Select the Login Banner tab.
3. Click Configure to configure the login banner for the first time.
4. In the Title field, specify a title for the login banner message.
5. Select Message text to type a message, or Upload a .txt file to upload a message from a text file.
6. Click Save.
Steps
1. Click Modify to change the text of the message.
2. Click Reset to remove the message entirely.
24 Getting Started
3
Configuring System Settings
This chapter presents the following topics:
Topics:
• Managing the system passphrase
• Enabling FIPS mode
• Configuring mail server settings
• Managing time and date settings
• Managing system properties
• Managing SNMP
• Troubleshooting system management
Prerequisites
No minimum system passphrase length is configured when DD OS is installed, but the CLI provides a command to set a minimum
length. To determine if a minimum length is configured for the passphrase, enter the system passphrase option show
CLI command.
Steps
1. Select Administration > Access > Administrator Access.
If the system passphrase is not set, the Set Passphrase button appears in the Passphrase area. If a system passphrase is
configured, the Change Passphrase button appears, and your only option is to change the passphrase.
Results
The system passphrase is set and the Change Passphrase button replaces the Set Passphrase button.
WARNING: Be sure to take care of the passphrase. If the passphrase is lost, it cannot be recovered.
Changing the passphrase requires two-user authentication to protect against data shredding.
Steps
1. Select Administration > Access > Administrator Access.
2. To change the system passphrase, click Change Passphrase.
The Change Passphrase dialog appears.
NOTE: The file system must be disabled to change the passphrase. If the file system is running, you are prompted to
disable it.
Prerequisites
The DD OS, PowerProtect DD Virtual Edition, and PowerProtect DD Management Center Security Configuration Guide provides
additional details about FIPS 140-2 compliance on DD OS.
Steps
1. Select Administration > Settings.
2. Click FIPS Mode to enable or disable FIPS 140-2 compliance mode.
Results
After enabling FIPS 140-2 compliance mode, DD OS:
● Forces a password change for the sysadmin account and one security officer account (if security officer is enabled).
● Reboots, causing an interruption in file system access.
● Allows only applications with FIPS-compatible clients to access the file system after the reboot is complete.
3. Specify the name of the mail server in the Mail Server field.
4. Use the Credentials button to enable or disable the use of credentials for the mail server.
5. If credentials are enabled, specify the mail server username in the User Name field.
6. If credentials are enabled, specify the mail server password in the Password field.
7. Click Set.
8. Optionally use the CLI to verify and troubleshoot the mail server configuration.
a. Run the config show mailserver command to verify the mail server is configured.
b. Run the net ping <mailserver-hostname> count 4 command to ping the mail server.
c. If the mail server is not configured correctly, run the config set mailserver <mailserver-hostname>
command to set the mail server, and attempt to ping it again.
d. Run the net show dns command to verify the DNS server is configured.
e. Run the net ping <DNS-hostname> count 4 command to ping the DNS server.
f. If the DNS server is not configured correctly, run the config set dns <dns-IP> command to set the DNS server,
and attempt to ping it again.
g. Optionally run the net hosts add <IP-address> <hostname> command to add the mail server IP address and
hostname to the system hosts file for local resolving.
h. Run the net ping <mailserver-hostname> count 4 command to ping the mail server.
Prerequisites
When using active directory mode for CIFS access, the system clock time can differ by no more than five minutes from that of
the domain controller.
Steps
1. To view the current time and date configuration, select Administration > Settings > Time and Date Settings.
The Time and Date Settings page shows the current system date and time, whether NTP is enabled, and IP addresses or
host names of configured NTP servers.
2. To change the configuration, select More Tasks > Configure Time Settings.
The Configure Time Settings dialog box appears. Do one of the following:
● In the Time Zone list, select the time zone where the system resides.
● To manually set the time and date, select None, type the date in the Date box, and select the time in the Time lists.
● To use NTP to synchronize the time, select NTP and set how the NTP server is accessed.
○ To use DHCP to automatically select a server, select Obtain NTP Servers using DHCP.
○ To configure an NTP server IP address, select Manually Configure, add the IP address of the server, and click OK.
3. Click OK.
4. If you changed the time zone, you must reboot the system:
Select Maintenance > System > Reboot System > OK.
Steps
1. Run the system set date-change-frequency command to set the allowed interval between system time and date
changes.
Where <DD> is the number of days required between time and date changes.
2. Run the system set date-change-limit command to set the maximum allowed advance for a single system time and
date change operation.
Where <hh> is the number of hours, and <mm> is the number of minutes.
Once the date change limit is set, the system generates an alert when the clock skew exceeds half of the date change limit.
If the alert appears, fix the system time and clear the alert manually. If the alert is not cleared, it will update for any further
increase in the clock skew (when the clock skew increases by at least half of the system date change limit).
Steps
1. To view the current configuration, select Administration > Settings > System Properties.
The System Properties tab displays the system location, the administrator email address, and the administrator hostname.
2. To change the configuration, select More Tasks > Set System Properties.
The Set System Properties dialog box appears.
3. In the Location box, enter information about where the protection system is located.
4. In the Admin Email box, enter the email address of the system administrator.
5. In the Admin Host box, enter the name of the administration server.
6. Click OK.
Managing SNMP
The Simple Network Management Protocol (SNMP) is a standard protocol for exchanging network management information,
and is a part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP provides a tool for network
administrators to manage and monitor network-attached devices, such as DD systems, for conditions that warrant administrator
attention.
To monitor systems using SNMP, install the DD OS MIB in your SNMP Management system. DD OS also supports the standard
MIB-II so you can query MIB-II statistics for general data such as network statistics. For full coverage of available data, use both
the DD OS MIB and the standard MIB-II.
Steps
Select Administration > Settings > SNMP.
The SNMP view shows the SNMP status, SNMP properties, SNMP V3 configuration, and SNMP V2C configuration.
Steps
1. Select Administration > Settings > SNMP.
2. In the Status area, click Enable or Disable.
Steps
1. Select Administration > Settings > SNMP.
2. Click Download MIB file.
3. In the Opening <protection system>.mib dialog box, select Open.
4. Click Browse and select a browser to view the MIB in a browser window.
NOTE: If using the Microsoft Internet Explorer browser, enable Automatic prompting for file download.
Steps
1. Select Administration > Settings > SNMP.
2. In the SNMP Properties area, click Configure.
The SNMP Configuration dialog box appears.
Steps
1. Select Administration > Settings > SNMP.
2. In the SNMP Users area, click Create.
The Create SNMP User dialog box appears.
3. In the Name text field, enter the name of the user for whom you want to grant access to the system agent. The name must
be a minimum of eight characters.
4. Select either read-only or read-write access for this user.
5. To authenticate the user, select Authentication.
a. Select the MD5, SHA1, or SHA256 protocol.
b. Enter the authentication key in the Key text field.
c. To provide encryption to the authentication session, select Privacy.
d. Select either the AES or the DES protocol.
e. Enter the encryption key in the Key text field.
6. Click OK.
The newly added user account appears in the SNMP Users table.
Steps
1. Select Administration > Settings > SNMP.
2. In the SNMP Users area, select a checkbox for the user and click Modify.
The Modify SNMP User dialog box appears. Add or change any of the following settings.
Steps
1. Select Administration > Settings > SNMP.
2. In the SNMP Users area, select a checkbox for the user and click Delete.
The Delete SNMP User dialog box appears.
NOTE: If the Delete button is disabled, the selected user is being used by one or more trap hosts. Delete the trap hosts
and then delete the user.
NOTE: SNMP community definitions do not enable the transmission of SNMP traps to a management station. You must
define trap hosts to enable trap submission to management stations.
Steps
1. Select Administration > Settings > SNMP.
2. In the Communities area, click Create.
The Create SNMP V2C Community dialog box appears.
3. In the Community box, enter the name of a community for whom you want to grant access to the system agent.
4. Select either read-only or read-write access for this community.
5. If you want to associate the community to one or more hosts, add the hosts as follows:
a. Click + to add a host.
The Host dialog box appears.
b. In the Host text field, enter the IP address or domain name of the host.
c. Click OK.
The Host is added to the host list.
6. Click OK.
The new community entry appears in the Communities table and lists the selected hosts.
3. To change the access mode for this community, select either read-only or read-write access.
NOTE: The Access buttons for the selected community are disabled when a trap host on the same system is configured
as part of that community. To modify the access setting, delete the trap host and add it back after the community is
modified.
NOTE: The Access buttons for the selected community are not disabled when the trap host uses an IPv6 address and
the system is managed by an earlier DD OS version that does not support IPv6. If possible, always select a management
system that uses the same or a newer DD OS version than the systems it manages.
a. Select the checkbox for each host or click the Host check box in the table head to select all listed hosts.
b. Click the delete button (X).
6. To edit a host name, do the following:
a. Select the checkbox for the host.
b. Click the edit button (pencil icon).
c. Edit the host name.
d. Click OK.
7. Click OK.
The modified community entry appears in the Communities table.
Steps
1. Select Administration > Settings > SNMP.
2. In the Communities area, select a checkbox for the community and click Delete.
The Delete SNMP V2C Communities dialog box appears.
NOTE: If the Delete button is disabled, the selected community is being used by one or more trap hosts. Delete the trap
hosts and then delete the community.
Prerequisites
If you plan to assign an existing SNMP v2c community to a trap host, you must first use the Communities area to assign the trap
host to the community.
Steps
1. Select Administration > Settings > SNMP.
2. In the SNMP V3 Trap Hosts or SNMP V2C Trap Hosts area, click Create.
The Create SNMP [V3 or V2C] Trap Hosts dialog appears.
3. In the Host box, enter the IP address or domain name of the SNMP Host to receive traps.
4. In the Port box, enter the port number for sending traps (port 162 is a common port).
5. Select the user (SNMP V3) or the community (SNMP V2C) from the drop-down menu.
NOTE: The Community list displays only those communities to which the trap host is already assigned.
Steps
1. Select Administration > Settings > SNMP.
2. In the SNMP V3 Trap Hosts or SNMP V2C Trap Hosts area, select a Trap Host entry, and click Modify.
The Modify SNMP [V3 or V2C] Trap Hosts dialog box appears.
3. To modify the port number, enter a new port number in the Port box (port 162 is a common port).
4. Select the user (SNMP V3) or the community (SNMP V2C) from the drop-down menu.
NOTE: The Community list displays only those communities to which the trap host is already assigned.
Steps
1. Select Administration > Settings > SNMP.
2. In the Trap Hosts area (either for V3 or V2C, select a checkbox for the trap host and click Delete.
The Delete SNMP [V3 or V2C] Trap Hosts dialog box appears.
a. DD4200, DD4500, DD6300, DD6800, DD6900, DD7200, DD9300, DD9400, DD9500, DD9800, and DD9900
Steps
● To view system dashboard, select Home > Dashboard.
From the Dashboard you can view the following information:
○ Alerts—Shows the most recent alerts for each subsystem (hardware, replication, file system, and others). Click
anywhere in the alerts area to display more information on current alerts.
○ File System—Shows statistics for the entire file system. Click anywhere in the File System area to display more
information.
○ Dashboard services—Shows the status of replication, DD VTL, CIFS, NFS, DD Boost, and vDisk services. Click on a
service to display detailed information about that service.
○ HA Readiness—Indicates whether the system can fail over from the active node to the standby node if necessary.
○ Hardware—Shows the status of the system enclosures and drives. Click anywhere in the Hardware area to display more
information on these components.
○ Maintenance—Shows the system model number, DD OS version, system uptime, and system and chassis serial numbers.
● To view the system uptime and identity information, select Maintenance > System.
Steps
1. Select Hardware > Chassis.
The Chassis view shows the system enclosures. Enclosure 1 is the system controller, and the rest of the enclosures appear
below Enclosure 1.
Components with problems show yellow (warning) or red (error); otherwise, the component displays OK.
Monitoring DD Systems 35
2. Click a component to see detailed status.
Steps
1. Select Home > Realtime Charts.
The Performance Charts area displays the currently selected charts.
2. To view specific data-point information, hover over a chart point.
3. When a chart contains multiple data, you can use the checkboxes in the upper-right corner of the chart to select what to
display. For example, if Read is not selected in the upper right of the disk activity chart, only write data is charted.
Results
Each chart shows usage over the last 5 to 10 minutes.
Consumption chart
This chart displays a cumulative representation of the amount of space consumed on the system, and the amount of
deduplication performed against the total capacity of the system. Administrators may also view the time lines and durations
for system cleaning and data movement operations.
The space usage chart uses the following labels:
● Capacity: The total capacity of the system.
● Post-Comp Used: The amount of storage consumed after compression.
36 Monitoring DD Systems
● Comp Factor: The compression ratio.
● Cleaning: The time lines and duration of system cleaning operations.
● Data Movement: The time lines and duration of data movement operations.
Steps
1. Select Health > Jobs.
The Tasks view appears.
2. Select a filter by which to display the Task Log from the Filter By list box. You can select All, In Progress, Failed, or
Completed.
The Tasks view displays the status of all tasks based on the filter you select and refreshes every 60 seconds.
Steps
1. Select Health > High Availability on the DD System Manager.
The Health High Availability screen appears.
A green check mark indicates the system is operating normally and ready for failover.
The screen shows the active node, which is typically Node 0.
2. Hover the cursor over a node to see its status.
The node is highlighted in blue if it is active.
3. Click the drop-down menu in the banner if you want to change the view from the active node to the standby node, which is
typically Node 1.
Monitoring DD Systems 37
High Availability status
The Health High Availability (HA) view informs you about the system status using a diagram of the nodes and their connected
storage. You can also see any current alerts as well as detailed information about the system.
You can determine if the active node and the storage are operational by hovering the cursor over them. Blue highlighting
indicates normal operation. The standby node should appear gray.
You can filter the alerts table by selecting a component. Only alerts related to the selected components are displayed.
38 Monitoring DD Systems
5
Managing System Power
This chapter presents the following topics:
Topics:
• Restarting a DD OS system
• Powering the DD OS system off
• Powering the DD OS system on
• Remote system power management with IPMI
• Use iDRAC to power the system on and off remotely
Restarting a DD OS system
After modifying the system configuration, you might need to restart the system for the change to take effect. For example,
changing the time zone requires that you restart the system before the new time zone is applied.
Steps
1. Select Maintenance > System > Reboot System.
2. Click OK to confirm.
Steps
1. Run the following commands to verify that I/O on the system is stopped:
● cifs show active
● nfs show active
● system show stats view sysstat interval 2
● system show perf
2. For HA systems, run the ha status command to verify the health of the HA configuration.
The following example is from a healthy system. If the system has a failed component, the HA System Status is degraded,
and one or both nodes show offline for the HA State.
3. Run the alerts show current command. For HA pairs, run the command on the active node first, and then the standby
node.
4. For HA systems, run the ha offline command from the standby node if the system is in a highly available state with both
nodes online. Skip this step if the HA status is degraded.
5. Run the system poweroff command. For HA pairs, run the command on the active node first, and then the standby
node.
6. Remove the power cords from the power supplies on the controller or controllers.
7. Verify that the blue power LED on the controllers is off to confirm that the system is powered down.
8. When the controller has powered off, switch off any external expansion shelves.
Steps
1. Power on expansion shelves before powering on the controller. Wait approximately three minutes after all expansion shelves
are turned on.
NOTE: A controller includes the chassis and any internal storage. A DD OS system includes the controller and any
external storage.
2. Plug in the power cord for the controller, and if there is a power button on the controller, press the power button, as shown
in the Installation Guide for your system. For HA systems, power on the active node first, and then the standby node.
NOTE: Some DD OS appliances do not have a traditional power button, and are designed to be "always on." These
devices will power up as soon as AC power is applied.
The system reboot time depends on the storage attached and might take approximately 30-40 minutes. Connect a console
session to view the system boot sequence.
3. For HA systems, verify the health of the HA configuration.
Run the command, ha status.
4. For HA systems, if one of the nodes displays as offline, run the ha online command on that node to restore the HA
configuration.
The ha online command triggers a system reboot.
5. Use a serial connection or an SSH session to verify that the system is fully booted and the operating system is running. The
system is up when you can log into the system.
6. Run the alerts show current command. For HA pairs, run the command on the active node first, and then on the
standby node.
Steps
1. Select Maintenance > IPMI.
2. To add a user, complete the following steps.
a. Above the IPMI Users table, click Add.
b. In the Add User dialog box, type the user name (16 or less characters) and password in the appropriate boxes (reenter
the password in the Verify Password box).
c. Click Create.
The user entry appears in the IPMI Users table.
Steps
1. Select Maintenance > IPMI.
2. In the IPMI Users table, select a user, and click Change Password.
3. In the Change Password dialog box, type the password in the appropriate text box and reenter the password in the Verify
Password box.
4. Click Update.
Steps
1. Select Maintenance > IPMI.
The IPMI Configuration area shows the IPMI configuration for the managed system. The Network Ports table lists the ports
on which IPMI can be enabled and configured. The IPMI Users table lists the IPMI users who can access the managed
system.
Steps
1. Connect the console to the system directly or remotely.
● Use the following connectors for a direct connection.
○ DIN-type connectors for a PS/2 keyboard
○ USB-A receptacle port for a USB keyboard
○ DB15 female connector for a VGA monitor
NOTE: Systems DD4200, DD4500, and DD7200 do not support direct connection, including KVM.
● For a serial connection, use a standard DB9 male or micro-DB9 female connector. Systems DD4200, DD4500, and
DD7200 provide a female micro-DB9 connector. A null modem cable with male micro-DB9 and standard female DB9
connectors is included for a typical laptop connection.
● For a remote IPMI/SOL connection, use the appropriate RJ45 receptacle as follows.
○ For other systems, use the maintenance or service port. For port locations, refer to the system documentation, such
as a hardware overview or installation and setup guide.
2. To support remote console monitoring, use the default BIOS settings.
3. To display the IPMI port name, enter ipmi show config.
4. To enable IPMI, enter ipmi enable {port | all}.
5. To configure the IPMI port, enter ipmi config port { dhcp | ipaddress ipaddr netmask mask gateway
ipaddr }.
NOTE: If the IPMI port also supports IP traffic (for administrator access or backup traffic), the interface port must be
enabled with the net enable command before you configure IPMI.
6. If this is the first time using IPMI, run ipmi user reset to clear IPMI users that may be out of synch between two ports,
and to disable default users.
7. To add a new IPMI user, enter ipmi user add user.
8. To set up SOL, do the following:
a. Enter system option set console lan.
b. When prompted, enter y to reboot the system.
Steps
1. Select Maintenance > IPMI.
2. Click Login to Remote System.
The IPMI Power Management dialog box appears.
3. Enter the remote system IPMI IP address or hostname and the IPMI username and password, then click Connect.
NOTE: The remote system must be properly set up before you can manage power or monitor the system.
Steps
1. Establish a CLI session on the system from which you want to monitor a remote system.
2. To manage power on the remote system, enter ipmi remote power {on | off | cycle | status} ipmi-
target <ipaddr | hostname> user user.
3. To begin remote console monitoring, enter ipmi remote console ipmi-target <ipaddr | hostname> user user.
NOTE: The user name is an IPMI user name defined for IPMI on the remote system. DD OS user names are not
automatically supported by IPMI.
4. To disconnect from a remote console monitoring session and return to the command line, enter the at symbol (@).
5. To terminate remote console monitoring, enter the tilde symbol (~).
Steps
1. In a web browser, type the iDRAC IP address specified during iDRAC configuration.
2. Login with the user name root. The default password is the system serial number on the PSNT.
3. Select Dashboard.
4. Click Graceful Shutdown to initiate the same behavior as pressing the power button, or select the drop-down arrow to
select on the of the following options:
● Power Off System
● Reset System (warm boot)
● Power Cycle System (cold boot)
Related concepts
Managing alert notifications on page 47
Steps
1. To view all of the current alerts, select Health > Alerts > Current Alerts.
2. To limit the number of entries in the current alert list, do the following.
a. In the Filter By area, select a Severity and Class to expose only alerts that pertain to those choices.
b. Click Update.
All alerts not matching the Severity and Class are removed from the list.
3. To display additional information for a specific alert in the Details area, click the alert in the list.
4. To clear an alert, select the alert checkbox in the list and click Clear.
A cleared alert no longer appears in the current alerts list, but it can be found in the alerts history list.
5. To remove filtering and return to the full listing of current alerts, click Reset.
Related concepts
Managing alert notifications on page 47
46 Managing Alerts
Viewing the alerts history
The Alerts History tab displays a list of all the cleared alerts and can display detailed information for a selected alert.
Steps
1. To view all of the alerts history, select Health > Alerts > Alerts History.
2. To limit the number of entries in the current alert list, do the following.
a. In the Filter By area, select a Severity and Class to expose only alerts that pertain to those choices.
b. Click Update.
All alerts not matching the Severity and Class are removed from the list.
3. To display additional information for a specific alert in the Details area, click the alert in the list.
4. To remove filtering and return to the full listing of cleared alerts, click Reset.
Related concepts
Managing alert notifications on page 47
Managing Alerts 47
Viewing the notification group list
A notification group defines a set of alert types (classes) and a group of email addresses (for subscribers). Whenever the
system generates an alert type selected in a notification list, that alert is sent to the list subscribers.
Steps
1. Select Health > Alerts > Notification.
CLI equivalent
2. To limit (filter) the entries in the Group Name list, type a group name in the Group Name box or a subscriber email in the
Alert Email box, and click Update.
NOTE: Click Reset to display all configured groups.
3. To display detailed information for a group, select the group in the Group Name list.
Steps
1. Select Health > Alerts > Notification.
2. Click Add.
The Add Group dialog box appears.
Steps
1. Select Health > Alerts > Notification.
2. Select the checkbox of a group in the Notifications group list, and do one of the following.
● Click Modify and select Subscribers.
● Click Configure in the Subscribers list.
3. To add a subscriber to the group, do the following.
a. Click the + icon.
The Email Address dialog box appears.
48 Managing Alerts
# alerts notify-list add eng_lab emails [email protected],[email protected]
Steps
1. Select Health > Alerts > Notification.
2. Select the checkbox of the group to modify in the group list.
3. To modify the class attributes for a group, do the following.
a. Click Configure in the Class Attributes area.
The Edit Group dialog box appears.
b. Select (or clear) the checkbox of one or more class attributes.
c. To change the severity level for a class attribute, select a level from the corresponding list box.
d. Click OK.
CLI equivalent
5. Click OK.
Steps
1. Select Health > Alerts > Notification.
2. Select one or more checkboxes of groups in the Notifications group list, and click Delete.
Managing Alerts 49
The Delete Group dialog box appears.
Steps
1. Select Health > Alerts > Notification.
2. Select More Tasks > Reset Notification Groups.
3. In the Reset Notification Groups dialog box, click Yes in the verification dialog.
CLI equivalent
Steps
1. Select Health > Alerts > Daily Alert Summary.
2. If the default deliver time of 8 AM is not acceptable, do the following.
a. Click Schedule.
The Schedule Alert Summary dialog box appears.
b. Use the list boxes to select the hour, minute, and either AM or PM for the summary report.
c. Click OK.
CLI equivalent
50 Managing Alerts
● To modify an email address, select the checkbox for the subscriber, click the pencil icon, edit the email address, and
click OK.
● To delete an email address, select the checkbox for the subscriber and click X.
CLI equivalent
c. Click Finish.
Steps
1. To view the alert reporting status, select Maintenance > Support > Autosupport.
The alert notification status is highlighted in green next to the Real-time alert label in the Support area. Depending on the
current configuration, either an Enable or a Disable button appears in the Real-time alert row.
2. To enable alert reporting, click Enable in the Real-time alert row.
3. To disable alert reporting, click Disable in the Real-time alert row.
Steps
1. To control whether or not a test alert is sent to Dell EMC, do the following.
a. Select Maintenance > Support > Autosupport.
b. In the Alert Support area, click Enable or Disable to control whether or not the test email is sent .
You cannot change the email address.
4. In the Notification Groups list, select groups to receive the test email and click Next.
5. Optionally, add additional email addresses to receive the email.
6. Click Send Now and OK.
CLI equivalent
7. If you disabled sending of the test alert to Dell EMC and you want to enable this feature now, do the following.
a. Select Maintenance > Support > Autosupport.
b. In the Alert Support area, click Enable .
Results
To test newly added alerts emails for mailer problems, enter: autosupport test email email-addr
For example, after adding the email address [email protected] to the list, check the address with the command:
autosupport test email [email protected]
Managing Alerts 51
7
Setting up Support
This chapter presents the following topics:
Topics:
• Managing Autosupport reports
• Managing support bundles
• Managing support delivery
• Managing log files
• Managing a core dump
Configuring ASUP
Configure the system to send ASUPs to Dell EMC Support.
Prerequisites
Steps
1. Configure mail server settings:
a. Select System Settings > General Configuration > Mail Server tabs.
b. From the More Tasks menu, select Set Mail Server.
The Set Mail Server dialog box opens.
c. In the Mail Server text box, enter the name of the mail server, and then click OK.
2. Configure the Autosupport Mailing List:
NOTE: For Autosupport to send notifications to Dell EMC, you must add the following account:
[email protected].
52 Setting up Support
d. In the Email dialog box, enter the recipients email address in the Autosupport Email text box, and then click OK.
The new autosupport email addresses open in the Detailed Autosupport Mailing Lists area.
3. Test the Alerts Email List:
a. Select Status > Alerts > Notification.
b. Select More Tasks > Send Test Alert.
The Send Test Alert dialog box opens.
c. In the Notification Groups area, select the groups who should receive test emails and click Next.
d. Optionally, add or create other email addresses.
e. Click Send Now and click OK.
Steps
1. To view the autosupport reporting status, select Maintenance > Support > Autosupport.
The autosupport reporting status is highlighted next to the Scheduled autosupport label in the Support area. Depending on
the current configuration, either an Enable or a Disable button appears in the Scheduled autosupport row.
2. To enable autosupport reporting, click Enable in the Scheduled autosupport row.
3. To disable autosupport reporting, click Disable in the Scheduled autosupport row.
Steps
1. Select Maintenance > Support > Autosupport.
The Autosupport Reports page shows the autosupport report file name and file size, and the date the report was generated.
Reports are automatically named. The most current report is autosupport, the previous day is autosupport.1, and the number
increments as the reports move back in time.
2. Click the file name link to view the report using a text editor. If doing so is required by your browser, download the file first.
Setting up Support 53
Steps
1. Select Maintenance > Support > Autosupport.
2. Click Configure.
The Configure Autosupport Subscribers dialog box appears.
Steps
1. Check if ASUPs can be sent to a local email address, an email address on the same Mail Server.
# autosupport send [internal-email-addr]
2. Check if ASUPs can be sent to an email address outside the local mail server.
# autosupport send [external email-addr]
3. If the email does not get to the external email address on the mail server, you may receive an error such as:
**** Unable to send message: (errno 51: Unrecoverable errors from server--giving up)
In this case, it is likely that forwarding will need to be enabled for the system on the local mail server by using the steps
outlined in the KB article Configure Email Relay on MS Exchange, available from the Online Support website.
4. If the ASUP can be sent to an external email address, but is not getting to Dell EMC, there may be an issue with the firewall
configuration or spam filters.
54 Setting up Support
Managing support bundles
A support bundle is a file that contains system configuration and operation information. It is a good practice to generate a
support bundle before a software upgrade or a system topology change (such as a controller upgrade).
Dell EMC Support often requests a support bundle when providing assistance.
The KB articles Data Domain: How to collect/upload a support bundle (SUB) from a Data Domain Restorer (DDR) and Data
Domain: Gathering Autosupports, available from the Online Support website, provide additional information about gathering and
working with support bundles.
Steps
1. Select Maintenance > Support > Support Bundles.
2. Click Generate Support Bundle.
NOTE: The system supports a maximum of five support bundles. If you attempt to generate an sixth support bundle,
the system automatically deletes the oldest support bundle. You can also delete support bundles using the CLI command
support bundle delete.
Also, if you generate a support bundle on a upgraded system that contains a support bundle named using the old format,
support-bundle.tar.gz, that file is renamed to use the newer name format.
Steps
1. Select Maintenance > Support > Support Bundles.
2. Click Generate Mini Support Bundle.
NOTE: The system supports a maximum of five support bundles (standard and mini). If you attempt to generate an sixth
support bundle, the system automatically deletes the oldest support bundle. You can also delete support bundles using
the CLI command support bundle delete.
Setting up Support 55
Viewing the support bundles list
Use the Support Bundles tab to view the support bundle files on the system.
Steps
1. Select Maintenance > Support > Support Bundles.
The Support Bundles list appears.
Listed are the support bundle file name, file size, and date the bundle was generated. Bundles are
automatically named hostname-support-bundle-datestamp.tar.gz. An example filename is localhost-
support-bundle-1127103633.tar.gz, which indicates that the support bundle was created on the localhost system
on November 27th at 10:36:33.
2. Click the file name link and select a gz/tar decompression tool to view the ASCII contents of the bundle.
Steps
1. Select Maintenance > Support > Autosupport.
2. Click Configure in the Channel row in the Support area.
The Configure EMC Support Delivery dialog appears. The delivery method is displayed after the Channel label in the Support
area.
3. In the Channel list box, select Email to datadomain.com.
4. Click OK.
CLI equivalent
56 Setting up Support
Steps
1. Select Maintenance > Support > Autosupport.
2. Click Configure in the Channel row in the Support area.
The Configure Dell EMC Support Delivery dialog box appears. The delivery method is displayed after the Channel label in the
Support area.
3. In the Channel list box, select Secure Remote Services.
4. Type the gateway hostname and select the local IP address for the system.
5. Click OK.
6. Type the service link username and password.
7. Click Register.
Secure Remote Services details are displayed in the Autosupport panel.
CLI equivalent
Steps
1. To set up the administrator email, enter:
Setting up Support 57
Testing ConnectEMC operation
A CLI command allows you to test ConnectEMC operation by sending a test message to Support through the Secure Remote
Services gateway.
Steps
To test ConnectEMC operation, use the CLI.
Log files are rotated weekly. Every Sunday at 0:45 a.m., the system automatically opens new log files for the existing logs
and renames the previous files with appended numbers. For example, after the first week of operation, the previous week
messages file is renamed messages.1, and new messages are stored in a new messages file. Each numbered file is rolled
to the next number each week. For example, after the second week, the file messages.1 is rolled to messages.2. If a
messages.2 file already existed, it rolls to messages.3. At the end of the retention period (shown in the table below, the
expired log is deleted. For example, an existing messages.9 file is deleted when messages.8 rolls to messages.9.
The audit.log does not rotate on a weekly basis. Instead, it rotates when the file reaches 70 MB in size.
Except as noted in this topic, the log files are stored in /ddvar/log.
NOTE: Files in the /ddvar directory can be deleted using Linux commands if the Linux user is assigned write permission
for that directory.
The set of log files on each system is determined by the features configured on the system and the events that occur.
Steps
1. Select Maintenance > Logs.
The Logs list displays log file names and the size and generation date for each log file.
2. Click a log file name to view its contents. You may be prompted to select an application, such as Notepad.exe, to open the
file.
Steps
1. To view a log file in the CLI, use the log view command.
With no argument, the command displays the current messages file.
2. When viewing the log, use the up and down arrows to scroll through the file; use the q key to quit; and enter a slash
character (/) and a pattern to search through the file.
58 Setting up Support
Example
The display of the messages file is similar to the following. The last message in the example is an hourly system status message
that the protection system generates automatically. The message reports system uptime, the amount of data stored, NFS
operations, and the amount of disk space used for data storage (%). The hourly messages go to the system log and to the serial
console if one is attached.
# log view
Jun 27 12:11:33 localhost rpc.mountd: authenticated unmount request from perfsun-
g.emc.com:668 for /ddr/col1/segfs (/ddr/col1/segfs)
Jun 27 12:28:54 localhost sshd(pam_unix)[998]: session opened for user jsmith10 by (uid=0)
Jun 27 13:00:00 localhost logger: at 1:00pm up 3 days, 3:42, 52324 NFS ops, 84763 GiB data
col. (1%)
Steps
1. Go to the Online Support website at https://support.emc.com, enter Error Message Catalog in the search box, and click the
search button.
2. In the results list, locate the catalog for your system and click on the link.
3. User your browser search tool to search for a unique text string in the message.
The error message description looks similar to the following display.
Action: To set a replication throttle schedule, run the replication throttle add command.
Setting up Support 59
Saving a copy of log files
Save log file copies to another device when you want to archive those files.
Steps
1. On the protection system, use the adminaccess show ftp command to see whether FTP service is enabled. If the
service is disabled, use the command adminaccess enable ftp.
2. Use the adminaccess show ftp command to see that the FTP access list includes the IP address of your remote
machine. If the address is not in the list, use the command adminaccess add ftp ipaddr.
3. On the remote machine, open a web browser.
4. In the Address box at the top of the web browser, use FTP to access the protection system as shown in the following
example.
ftp://Data Domain system_name.yourcompany.com/
NOTE: Some web browsers do not automatically ask for a login if a machine does not accept anonymous logins. In
that case, add a user name and password to the FTP line. For example: ftp://sysadmin:your-pw@Data Domain
system_name.yourcompany.com/
5. At the login pop-up, log into the protection system as user sysadmin.
6. On the protection system, you are in the directory just above the log directory. Open the log directory to list the messages
files.
7. Copy the file that you want to save. Right-click the file icon and select Copy To Folder from the menu. Choose a location
for the file copy.
8. If you want the FTP service disabled on the protection system, after completing the file copy, use SSH to log into the
protection system as sysadmin and invoke the command adminaccess disable ftp.
Steps
To display the configuration, enter the log host show command.
Example
60 Setting up Support
Enabling and disabling log message transmission
You must use CLI commands to enable or disable log message transmission.
Steps
1. To enable sending log messages to other systems, use the log host enable command.
2. To disable sending log messages to other systems, use the log host disable command.
Steps
1. To add a system to the list that receives protection system log messages, use the log host add command.
2. To remove a system from the list that receives system log messages, use the command: log host del.
Example
The following command adds the system named log-server to the hosts that receive log messages.
Steps
1. Select Maintenance > Support > Cores.
2. Select a core file from the table.
3. Click Split.
4. In the Size field, specify the size of the chunks to create and select MiB or GiB from the list box.
NOTE: A single core file can be broken down into a maximum of 20 chunks. The command will fail with an error if the
specified size would result in more than 20 chunks.
5. Click OK.
Setting up Support 61
Results
DD OS splits the selected coredump file into chunks of the specified size, and places them in the /ddvar/core directory. Split
files are automatically deleted after 48 hours.
CLI equivalent
Steps
1. Run the support coredump split <filename> <n> {MiB|GiB} command, where:
● <filename> is the name of the core file in the /ddvar/core directory
● <n> is the size of the smaller chunks to create
NOTE: A single core file can be broken down into a maximum of 20 chunks. The command will fail with an error if the
specified size would result in more than 20 chunks.
For example, splitting a 42.1 MB core file named cpmdb.core.19297.1517443767 into 10 MB chunks would result in five
chunks.
62 Setting up Support
8
Managing System Access
This chapter presents the following topics:
Topics:
• System access management
• Viewing active users
admin An admin role user can configure and monitor the entire system. Most configuration features and
commands are available only to admin role users. However, some features and commands require the
approval of a security role user before a task is completed.
limited-admin The limited-admin role can configure and monitor the system with some limitations. Users who are
assigned this role cannot perform data deletion operations, edit the registry, or enter bash or SE mode.
user The user role enables users to monitor systems and change their own password. Users who are assigned
the user management role can view system status, but they cannot change the system configuration.
security A security role user, who may be referred to as a security officer, can manage other security officers,
(security officer) authorize procedures that require security officer approval, and perform all tasks supported for user-role
users.
The security role is provided to comply with the Write Once Read-Many (WORM) regulation. This
regulation requires electronically stored corporate data be kept in an unaltered, original state for purposes
such as eDiscovery, auditing, and logging. As a result of compliance regulations, most command options
for administering sensitive operations, such as DD Encryption, DD Retention Lock Compliance, and
archiving now require security officer approval.
In a typical scenario, an admin role user issues a command and, if security officer approval is required,
the system displays a prompt for approval. To proceed with the original task, the security officer must
enter his or her username and password on the same console at which the command was run. If the
system recognizes the security officer credentials, the procedure is authorized. If not, a security alert is
generated.
The following are some guidelines that apply to security-role users:
● Only the sysadmin user (the default user created during the DD OS installation) can create the first
security officer, after which the privilege to create security officers is removed from the sysadmin
user.
● After the first security officer is created, only security officers can create other security officers.
● Creating a security officer does not enable the authorization policy. To enable the authorization policy,
a security officer must log in and enable the authorization policy.
Steps
Select Administration > Access > Administrator Access.
Results
The Access Management page displays the Administrator Access, Local Users, Authentication, and Active Users tabs.
NOTE: Only users who are assigned the admin management role are permitted to access the system using FTP
NOTE: LFTP clients that connect to a protection system via FTPS or FTP are disconnected after reaching a set timeout
limit. However the LFTP client uses its cached username and password to reconnect after the timeout while you are running
any command.
● To add a host, click Add (+). Enter the host identification and click OK.
● To modify a host ID, select the host in the Hosts list and click Edit (pencil). Change the host ID and click OK.
● To remove a host ID, select the host in the Hosts list and click Delete (X).
4. To set a session timeout, select the Advanced tab, and enter the timeout value in seconds.
NOTE: The session timeout default is Infinite, that is, the connection does not close.
5. Click OK.
If FTPS is enabled, a warning message appears with a prompt to click OK to proceed.
Steps
1. Select Administration > Access > Administrator Access.
2. Select FTPS and click Configure.
3. To manage FTPS access and which hosts can connect, select the General tab and do the following:
a. To enable FTPS access, select Allow FTPS Access.
b. To enable all hosts to connect, select Allow all hosts to connect.
c. To restrict access to select hosts, select Limit Access to the following systems, and modify the hosts list.
NOTE: You can identify a host using a fully qualified hostname, an IPv4 address, or an IPv6 address.
● To add a host, click Add (+). Enter the host identification and click OK.
● To modify a host ID, select the host in the Hosts list and click Edit (pencil). Change the host ID and click OK.
● To remove a host ID, select the host in the Hosts list and click Delete (X).
4. To set a session timeout, select the Advanced tab and enter the timeout value in seconds.
NOTE: The session timeout default is Infinite, that is, the connection does not close.
5. Click OK. If FTP is enabled, a warning message appears and prompts you to click OK to proceed.
Steps
1. Select Administration > Access > Administrator Access.
2. Select HTTP or HTTPS and click Configure.
The Configure HTTP/HTTPS Access dialog appears and displays tabs for general configuration, advanced configuration, and
certificate management.
3. To manage the access method and which hosts can connect, select the General tab and do the following:
a. Select the checkboxes for the access methods you want to allow.
b. To enable all hosts to connect, select Allow all hosts to connect.
c. To restrict access to select hosts, select Limit Access to the following systems, and modify the host list.
NOTE: You can identify a host using a fully qualified hostname, an IPv4 address, or an IPv6 address.
● To add a host, click Add (+). Enter the host identification and click OK.
● To modify a host ID, select the host in the Hosts list and click Edit (pencil). Change the host ID and click OK.
● To remove a host ID, select the host in the Hosts list and click Delete (X).
4. To configure system ports and session timeout values, select the Advanced tab, and complete the form.
● In the HTTP Port box, enter the port number. Port 80 is assigned by default.
● In the HTTPS Port box, enter the number. Port 443 is assigned by default.
● In the Session Timeout box, enter the interval in seconds that must elapse before a connection closes. The minimum is
60 seconds and the maximum is 31536000 seconds (one year).
5. Click OK.
NOTE: You must configure a system passphrase (system passphrase set) before you can generate a CSR.
Steps
1. Select Administration > Access > Administrator Access.
2. In the Services area, select HTTP or HTTPS and click Configure.
3. Select the Certificate tab.
4. Click Add.
A dialog appears for the protocol you selected earlier in this procedure.
Steps
1. If you did not requested a host certificate, request a host certificate from a certificate authority.
2. When you receive a host certificate, copy or move it to the computer from which you run DD Service Manager.
3. Select Administration > Access > Administrator Access.
4. In the Services area, select HTTP or HTTPS and click Configure.
5. Select the Certificate tab.
6. Click Add.
A dialog appears for the protocol you selected earlier in this procedure.
Steps
1. Select Administration > Access > Administrator Access.
2. In the Services area, select HTTP or HTTPS and click Configure.
3. Select the Certificate tab.
4. Select the certificate you want to delete.
5. Click Delete, and click OK.
Steps
1. Select Administration > Access > Administrator Access.
2. Select SSH or SCP and click Configure.
3. To manage the access method and which hosts can connect, select the General tab.
a. Select the checkboxes for the access methods you want to allow.
b. To enable all hosts to connect, select Allow all hosts to connect.
c. To restrict access to select hosts, select Limit Access to the following systems, and modify the host list.
NOTE: You can identify a host using a fully qualified hostname, an IPv4 address, or an IPv6 address.
NOTE: The session timeout default is Infinite, that is, the connection does not close.
5. Click OK.
Steps
1. Select Administration > Access > Administrator Access.
2. Select Telnet and click Configure.
3. To manage Telnet access and which hosts can connect, select the General tab.
a. To enable Telnet access, select Allow Telnet Access.
b. To enable all hosts to connect, select Allow all hosts to connect.
c. To restrict access to select hosts, select Limit Access to the following systems, and modify the host list.
NOTE: You can identify a host using a fully qualified hostname, an IPv4 address, or an IPv6 address.
● To add a host, click Add (+). Enter the host identification and click OK.
● To modify a host ID, select the host in the Hosts list and click Edit (pencil). Change the host ID and click OK.
● To remove a host ID, select the host in the Hosts list and click Delete (X).
4. To set a session timeout, select the Advanced tab and enter the timeout value in seconds.
NOTE: The session timeout default is Infinite, that is, the connection does not close.
5. Click OK.
Steps
1. Select Administration > Access > Local Users .
The Local Users view appears and shows the Local Users table and the Detailed Information area.
NOTE: User accounts configured with the admin or security officer roles can view all users. Users with other roles can
view only their own user accounts.
2. Select the user you want to view from the list of users.
Information about the selected user displays in the Detailed Information area.
NOTE: The default values are the initial default password policy values. A system administrator (admin role) can change
them by selecting More Tasks > Change Login Options.
Steps
1. Select Administration > Access > Local Users.
The Local Users view appears.
4. To manage password and account expiration, select the Advanced tab and set the controls as required.
5. Click OK.
NOTE: Note: The default password policy can change if an admin-role user changes them (More Tasks > Change
Login Options). The default values are the initial default password policy values.
Steps
1. Select Administration > Access > Local Users.
The Local Users view appears.
NOTE: To change the role for a DD Boost user that does not own any storage units, unassign it as a DD Boost user,
change the user role, and re- assign it as a DD Boost user again.
Steps
1. Select Administration > Access > Local Users.
The Local Users view appears.
Steps
1. Select Administration > Access > Local Users.
The Local Users view appears.
Steps
1. Log into the CLI using a security officer username and password.
2. To enable the security officer authorization policy, enter: # authorization policy set security-officer
enabled
Steps
1. Click Administration > Access > Local Users.
The Local Users view is displayed.
Steps
1. Select Administration > Access.
2. Select More Tasks > Change Login Options.
The Change Login Options dialog appears.
3. Specify the new configuration in the boxes for each option. To select the default value, click Default next to the appropriate
option.
4. Click OK to save the password settings.
Steps
1. Select Administration > Access > Authentication.
2. Expand the Active Directory/Kerberos Authentication panel.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
6. Select the default CIFS server name, or select Manual and enter a CIFS server name.
7. To select domain controllers, select Automatically assign, or select Manual and enter up to three domain controller names.
You can enter fully qualified domain names, hostnames, or IP (IPv4 or IPv6) addresses.
8. To select an organizational unit, select Use default Computers, or select Manual and enter an organization unit name.
NOTE: The account is moved to the new organizational unit.
9. Click Next.
The Summary page for the configuration appears.
10. Click Finish.
The system displays the configuration information in the Authentication view.
11. To enable administrative access, click Enable to the right of Active Directory Administrative Access.
Prerequisites
Enable Active Directory Administrative Access on the Active Directory/Kerberos Authentication panel in the Administration >
Access > Authentication page.
Steps
1. Click Create....
2. Enter the domain and group name separated by a backslash. For example: domainname\groupname.
3. Select the management role for the group from the drop-down menu.
4. Click OK.
Prerequisites
Enable Active Directory Administrative Access on the Active Directory/Kerberos Authentication panel in the Administration >
Access > Authentication page.
Steps
1. Select a group to modify under the Active Directory Administrative Access heading.
2. Click Modify....
3. Modify the domain and group name. These names are separated by a backslash. For example: domainname\groupname.
Prerequisites
Enable Active Directory Administrative Access on the Active Directory/Kerberos Authentication panel in the Administration >
Access > Authentication page.
Steps
1. Select a group to delete under the Active Directory Administrative Access heading.
2. Click Delete.
Prerequisites
NIS must be running for UNIX-mode Kerberos authentication to function. For instructions about enabling Kerberos, see the
section regarding enabling NIS services.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
NOTE: A keytab file must be uploaded and imported for Kerberos authentication to operate correctly.
7. Click Finish.
The system displays the configuration information in the Active Directory/Kerberos Authentication panel.
Steps
1. Select Administration > Access Management > Authentication.
The Authentication view appears.
Steps
1. Select Administration > Access > Authentication.
2. Expand the Workgroup Authentication panel.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
4. For Workgroup Name, select Manual and enter a workgroup name to join, or use the default.
The Workgroup mode joins a protection system to a workgroup domain.
5. For CIFS Server Name, select Manual and enter a server name (the DDR), or use the default.
6. Click OK.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
4. Click OK.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
Prerequisites
LDAP authentication must be disabled before configuring an LDAP server.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
NOTE: LDAP must be disabled when making any changes to the configuration.
Steps
1. Add one or more LDAP servers by using the authentication ldap servers add command:
2. Remove one or more LDAP servers by using the authentication ldap servers del command:
3. Remove all LDAP servers by using the authentication ldap servers reset command:
Steps
1. Set the LDAP base suffix by using the authentication ldap base set command:
2. Reset the LDAP base suffix by using the authentication ldap base reset command:
2. Reset the Bind DN and password by using the authentication ldap client-auth reset command:
Enable LDAP
Prerequisites
An LDAP configuration must exist before enabling LDAP. Additionally, you must disable NIS, ensure that the LDAP server is
reachable, and be able to query the root DSE of the LDAP server.
Steps
1. Enable LDAP by using the authentication ldap enable command:
The details of the LDAP configuration are displayed for you to confirm before continuing. To continue, type yes and restart
the file system for LDAP configuration to take effect.
2. View the current LDAP configuration by using the authentication ldap show command:
The LDAP status is displayed. If the LDAP status is not good, the problem is identified in the output. For example:
Prerequisites
If there is no LDAP CA certificate and tls_reqcert is set to demand, the operation fails. Import an LDAP CA certificate and
try again.
If tls_reqcert is set to never, an LDAP CA certificate is not required. For more information, see Configure LDAP server
certificate verification with imported CA certificates on page 80.
Steps
1. Enable SSL by using the authentication ldap ssl enable command:
Steps
1. Change the TLS request certificate behavior by using the authentication ldap ssl set tls_reqcert command.
Do not verify the certificate:
2. Reset the TLS request certificate behavior by using the authentication ldap ssl reset tls_reqcert command.
The default behavior is demand:
Steps
1. Import a CA certificate for LDAP server certificate verification by using the adminaccess certificate import
command.
Specify ldap for ca application:
2. Delete a CA certificate for LDAP server certificate verification by using the adminaccess certificate delete
command.
Specify ldap for application:
3. Show current CA certificate information for LDAP server certificate verification by using the adminaccess
certificate show command:
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
4. Click OK.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
NOTE: Data Protection Central (DPC) is the only supported SSO provider. DPC version 19.1 is required to use SSO.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
Steps
1. Log in to the DPC and navigate to the System Management.
2. Add the system to DPC.
NOTE: DPC requires sysadmin credentials for the system.
3. Refresh the Single Sign-On (SSO) panel in DD SM to confirm that the system is registered with DPC.
Steps
1. Select Administration > Access > Authentication.
The Authentication view appears.
4. Click OK.
NOTE: If a group name belongs to multiple domains, set up the same group name with all domain names on the
protection system with the desired role, or make sure the domain name the user will log in with is configured on
system with the desired role. This is important for Active Directory configurations with child or sub domains.
● To modify an SSO user group, select the checkbox of the group name in the SSO group list and click Edit (pencil).
Change the management role and click OK.
● To remove an SSO user group, select the group in the list and click Delete (X).
Steps
1. Select Administration > Access > Authentication
2. Expand the Active Directory/Kerberos Authentication panel.
3. Click Diagnose.
4. Select an issue to investigate, and click Diagnose.
5. Provide the requested information.
To diagnose issues logging in as an Active Directory user, provide:
● Active Directory server IP address
● Active Directory server FQDN
● Active Directory service username
NOTE: The Active Directory user account specified here requires the following privileges:
○ Read-only access to the base DN identified by the domain name.
○ Read-only access to query attributes of all users in the base DN.
○ Read-only access to query attributes of the machine account for the protection system.
● Active Directory service password
● Username experiencing login failure
To diagnose issues joining the system to an Active Directory Domain, provide:
● Active Directory server IP address
● Active Directory server FQDN
● Active Directory service username
● Active Directory service password
6. Click Diagnose.
7. View the report.
● Click View Report to view the report online. Each item in the Action Items table can be clicked for additional details.
● Click Download to download a copy of the report.
8. Review and implement the suggested fixes for the issue, and retry the operation.
Prerequisites
Certificate-based authentication requires SSH keys and CA certificates are imported to allow users to authenticate with the
system when password-based authentication is disabled.
Steps
1. Select Administration > Access.
The Access Management view appears.
2. Click Manage CA Certificates.
3. Click Add to create a new certificate.
4. Add the certificate.
● Select I want to upload the certificate as a .pem file and click Choose File to select the certificate file and upload it
to the system.
● Select I want to copy and paste the certificate text to copy and paste the certificate text into the text field.
5. Click Add.
6. Select More Tasks > Change Login Options.
7. In the Password Based Login drop-down menu, select Disable.
NOTE: The drop-down menu is disabled if the required SSH keys and CA certificates are not configured on the system
8. Click OK.
If a security policy is configured, the system prompts for security officer credentials. Provide the credentials and click OK.
Steps
1. Select Administration > Access.
The Access Management view appears.
2. Select More Tasks > Change Login Options.
3. In the Password Based Login drop-down menu, select Enable.
4. Click OK.
If a security policy is configured, the system prompts for security officer credentials. Provide the credentials and click OK.
Steps
1. Connect to the system serial console or connect KVM to the system.
2. Reboot the system.
3. During the system boot process, press F2 to access the BIOS menu.
4. Select iDRAC Settings.
5. Select Reset iDRAC configurations to defaults all.
6. Select Yes to confirm the reset.
7. Select Continue.
8. Exit the BIOS and reboot.
Results
The iDRAC configuration resets to the following username and password:
● Username: root
● Password: calvin
Steps
Select Administration > Access > Active Users.
The Active Users list appears and displays information for each user.
Related concepts
Local user account management on page 68
HA system upgrades
The upgrade process on an HA system automatically upgrades both the active and standby nodes.
The HA nodes are upgraded one at a time. The standby node is rebooted and upgraded first. The newly upgraded standby node
then takes over the active role through an HA failover. After the failover, the second node is rebooted and assumes the role of
the standby node after the upgrade.
For an HA system, transfer the software to the active node and start the upgrade from the active node. Use the floating IP
address to access DD System Manager to perform software upgrades.
System upgrade operations that require data conversion cannot start until both systems are upgraded to the same level and HA
state is fully restored.
Steps
1. Select Maintenance > System. To view the MD5 and SHA256 checksums, select an upgrade package and click View
Checksum.
2. To obtain an upgrade package, click the Dell EMC Online Support link, click Downloads, and use the search function to
locate the recommended package for your system. Save the upgrade package to the local computer.
3. If more than four packages are listed in Upgrade Packages Available, remove at least one package before uploading the new
package.
4. Click Upload Upgrade Package.
5. In the Upload Upgrade Package dialog box, click Browse, navigate to and select the file, and click Open.
6. Click OK.
The .rpm file is downloaded and appears in the Upgrade Packages Available list.
7. To verify the upgrade package integrity, click View Checksum and compare the calculated checksum displayed in the dialog
box to the authoritative checksum on the Online Support site.
8. To manually initiate an upgrade precheck, select an upgrade package and click Upgrade Precheck.
Prerequisites
● Reboot the system.
● For HA systems, do not reboot the system until after completing the steps in this procedure.
● Review the section Troubleshooting upgrade errors on page 92 for other issues that can cause failure.
7. Check whether the enclosure topology is correct. Check whether any # enclosure show topology
error appears with an asterisk (*) next to the enc.ctrl.port field.
Also check the Error Message field for any errors such as A possible
problem was detected for this shelf controller or the
cable connected to it.
8. Check that the device port mapping is correct. # system show hardware
9. Check the link speed for connected ports. # system show ports
10. Check the status of the file system to determine that file system is enabled # filesys status
and running normally.
11. Check if file system cleaning is running, and if so, stop it. # filesys clean status
# filesys clean stop
13. For a system enabled with Cloud Tier, ensure there is no data movement. # data-movement status
# data-movement stop all
14. Check if cloud cleaning is running, and if so, stop it. # cloud clean status
# cloud clean stop
15. Check if any backup and restore activity is in progress, and if so, stop it. # system show stats
16. Run an Autosupport Report just prior to performing the DD OS upgrade to # autosupport send
determine if the system reports errors that need to be resolved before the <your_email_address>
upgrade.
17. If the Autosupport Report indicated issues with the system, check # log view debug/platform/
kern.info log, and if you notice frequent failures in hardware, contact kern.info
Support to inspect your system before you perform the upgrade. Search
for the string ERROR in the log file.
Next steps
For HA systems, follow the reboot instructions described in Upgrading HA systems on page 91.
Automatic tasks performed by the upgrade script (in the .rpm file)
prior to upgrade
These tests precede the actual system upgrade process. The system:
1. Determines whether two different kinds of NVRAM cards are present.
2. Checks the /ddr partition and / (root) partition sizes for space utilization.
3. Checks the OST version.
4. Determines whether the RAID metagroup is assembled. If it is not assembled, the upgrade process does not begin.
Prerequisites
● Read the DD OS Release Notes for the complete upgrade instructions and coverage of all the issues that can impact the
upgrade.
● Log out of any CLI sessions on the system where the upgrade is to be performed.
● Reboot the system to verify that the hardware is in a clean state. Resolve any issues discovered during the reboot. For an
MDU upgrade, a reboot might not be needed.
Steps
1. Log into DD System Manager on the protection system where the upgrade is to be performed.
2. Select Maintenance > System.
3. From the Upgrade Packages Available list, select the package to use for the upgrade.
NOTE: You must select an upgrade package for a newer version of DD OS. DD OS does not support downgrades to
previous versions.
5. Verify the version of the upgrade package, and click OK to continue with the upgrade.
The System Upgrade dialog box displays the upgrade status and the time remaining.
Wait for the upgrade to complete before using DD System Manager to manage the system. If the system restarts, the
upgrade might continue after the restart, and DD System Manager displays the upgrade status after login. If possible, keep
the System Upgrade progress dialog box open until the upgrade completes or the system restarts. A Login link appears when
the upgrade is complete.
NOTE: To view the status of an upgrade using the CLI, enter the system upgrade status command. Log
messages for the upgrade are stored in /ddvar/log/debug/platform/upgrade-error.log and /ddvar/log/
debug/platform/upgrade-info.log.
Next steps
The following requirements might apply after completing an upgrade.
● For environments that use self-signed SHA256 certificates, do the following:
1. Run the adminaccess certificate generate self-signed-cert regenerate-ca command to
regenerate the self-signed CA and host certificates. Regenerating the certificates breaks existing trust relationships
with external systems.
2. Run the adminaccess trust add host hostname type mutual command to reestablish mutual trust between
the protection system and the external system.
● If the system shows existing or configured FC ports with missing WWPN or WWNN information, or reports that no FC host
bus adapter (HBA) driver is installed, run the scsitarget endpoint enable all command.
NOTE: With collection replication, no files are visible on the destination system if replication was not finished before
starting the upgrade. After the upgrade, wait until replication completes to see files on the destination system.
Upgrading HA systems
HA systems require additional steps before and after the upgrade operation.
Prerequisites
Perform the manual checks described in Preparing the system for upgrade on page 88 before rebooting the HA system.
Steps
1. Run the ha status command to verify the HA system state.
The HA system must be in a highly available state, with both nodes online before performing the DD OS upgrade.
# ha status
HA System Name: dd9900-ha3a.example.com
HA System Status: highly available
Node Name Node ID Role HA State
-------------------------- --------- --------- --------
dd9900-ha3a-p0.example.com 0 active online
dd9900-ha3a-p1.example.com 1 standby online
-------------------------- --------- --------- --------
# ha status
HA System Name: dd9900-ha3a.example.com
HA System Status: highly available
Node Name Node ID Role HA State
-------------------------- --------- --------- --------
dd9900-ha3a-p0.example.com 0 standby online
dd9900-ha3a-p1.example.com 1 active online
-------------------------- --------- --------- --------
# ha status
HA System Name: dd9900-ha3a.example.com
HA System Status: highly available
Node Name Node ID Role HA State
-------------------------- --------- --------- --------
dd9900-ha3a-p0.example.com 0 active online
dd9900-ha3a-p1.example.com 1 standby online
-------------------------- --------- --------- --------
Results
After both nodes are upgraded, the system does not perform another failover to return the nodes to their original configuration.
Next steps
After the upgrade procedure is complete, run the ha status command again to verify that the system is in a highly available
state, and both nodes are online.
Optionally run the ha failover command to return the nodes to their pre-upgrade roles.
Steps
1. Select Maintenance > System.
2. From the list titled Upgrade Packages Available on <protection system> , select the package to remove. One package
can be removed at a time.
3. Click Remove Upgrade Package.
Running tasks
● A replication initialization is in progress.
● The file system did not shutdown cleanly, resulting in a core dump.
● A previous upgrade did not complete successfully.
Configuration issues
● The system is not configured correctly. For example, NFS mount points were manually created under root.
● Inspection of digests and signatures that are contained in .rpm file indicates that the signature is not valid. The valid
signatures are SHA1 or MD5.
● NFS mount points are unknown.
Space issues
● Storage is functionally deficient, such as an enclosure is missing.
● The / (root) or /ddr partition is full with log files, core dumps, and so forth.
● Available space for the file system is insufficient.
● Available space for the upgrade is insufficient.
● Available space for VTL is insufficient.
● The number of MTrees or VTL pools exceeds 100.
Slow connection
NOTE: For security reasons, there is a 30-minute time limit for the upload of RPM packages for DDMC and DD system
upgrades using the DDMC GUI. If you have a slow connection from a client machine to the DDMC and the upload takes
more than 30 minutes, the connection drops and you cannot use DDMC to upload the package.
Workaround: Use the CLI to upload the package into DDMC (for example, use SCP/PSCP from a Unix terminal or Windows
CMD).
Floating IP addresses exist only in the two-node HA system. During failover, the IP addresses "float" to the new active node and
are:
● Only configured on the active node
● Used for file system access and most configuration
● Can only be static
● Configuration requires the type floating argument
Steps
1. Select Hardware > Ethernet > Interfaces.
2. To filter the interface list by interface name, enter a value in the Interface Name field and click Update.
Filters support wildcards, such as eth*, veth*, or eth1*
3. To filter the interface list by interface type, select a value from the Interface Type menu and click Update.
On an HA system, there is a filter dropdown to filter by IP Address Type (Fixed, Floating, or Interconnect).
4. To return the interfaces table to the default listing, click Reset.
5. Select an interface in the table to populate the Interface Details area.
6. To view IPMI interface configuration and management options, click View IPMI Interfaces.
This link displays the Maintenance > IPMI information.
Steps
1. Select Hardware > Ethernet > Interfaces.
2. Select an interface to configure.
3. Click Configure.
4. In the Configure Interface dialog box, determine how the interface IP address is to be set:
NOTE: On an HA system, the Configure Interface dialog box has a field for whether or not to designate the Floating
IP (Yes/No). Selecting Yes the Manually Configure IP Address radio button is auto-selected; Floating IP
interfaces can only be manually configured.
● Use DHCP to assign the IP address—in the IP Settings area, select Obtain IP Address using DHCP and select either
DHCPv4 for IPv4 access or DHCPv6 for IPv6 access.
Setting a physical interface to use DHCP automatically enables the interface.
NOTE: If you choose to obtain the network settings through DHCP, you can manually configure the hostname at
Hardware > Ethernet > Settings or with the net set hostname command. You must manually configure the
host name when using DHCP over IPv6.
● Specify IP Settings manually—in the IP Settings area, select Manually configure IP Address.
The IP Address and Netmask fields become active.
5. If you chose to manually enter the IP address, enter an IPv4 or IPv6 address. If you entered an IPv4 address, enter a
netmask address.
NOTE: You can assign just one IP address to an interface with this procedure. If you assign another IP address, the new
address replaces the old address. To attach an additional IP address to an interface, create an IP alias.
The combination of speed and duplex settings define the rate of data transfer through the interface. Select one of these
options:
● Autonegotiate Speed/Duplex — Select this option to allow the network interface card to autonegotiate the line speed
and duplex setting for an interface. Autonegotiation is not supported on the following DD4200, D4500, DD6300, DD6800,
DD7200, DD9300, DD9500, and DD9800 I/O modules:
○ Dual port 10GbE SR Optical with LC connectors (using SFPs)
○ Dual port 10GbE Direct Attach Copper (SFP+ cables)
○ Quad port 2 port 1GbE Copper (RJ45) /2 port 1GbE SR Optical
○ Autonegotiate Speed/Duplex is required for all I/O modules on the DD6900, DD9400, and DD9900 systems:
■ Quad port 10GbE Base-T
■ Quad port 10GbE SFP+
■ Dual port 25GbE SFP28
■ Dual port 100GbE QSFP28
● Manually configure Speed/Duplex — Select this option to manually set an interface data transfer rate. Select the
speed and duplex from the menus.
NOTE: This option is not available on DD6900, DD9400, and DD9900 systems.
9. Click Next.
The Configure Interface Settings summary page appears. The values listed reflect the new system and interface state, which
are applied after you click Finish.
NOTE: The minimum MTU for IPv6 interfaces is 1280. The interface fails if you try to set the MTU lower than 1280.
Steps
1. If the interface that hosts the static IP address is part of a DD Boost interface group, remove the IP address from that
group.
NOTE: Add the new IP address back to the DD Boost interface group after this task is complete.
Steps
1. Select Hardware > Ethernet > Interfaces.
2. In the Interfaces table, disable the physical interface where the bonded interface is to be added by clicking No in the
Enabled column.
3. From the Create menu, select Virtual Interface.
4. In the Create Virtual Interface dialog box, specify a bonded interface name in the veth box.
Enter a bonded interface name in the form vethx, where x is a unique ID (typically one or two digits). A typical full bonded
interface name with VLAN and IP Alias is veth56.3999:199. The maximum length of the full name is 15 characters. Special
characters are not allowed. Numbers must be between 0 and 4094, inclusively.
7. If you selected Balanced or LACP mode, specify a bonding hash type in the Hash list.
Options are: XOR-L2, XOR-L2L3, or XOR-L3L4.
XOR-L2 transmits through a bonded interface with an XOR hash of Layer 2 (inbound and outbound MAC addresses).
8. To select an interface to add to the aggregate configuration, select the checkbox that corresponds to the interface, and
then click Next.
The Create bonded interface veth_name dialog box appears.
9. Enter an IP address, or enter 0 to specify no IP address.
10. Enter a netmask address or prefix.
11. Skip the Speed/Duplex options as they are ignored for bonding.
12. Specify the MTU setting.
● To select the default value (1500), click Default.
● To select a different setting, enter the setting in the MTU box. Ensure that all of your network components support the
size set with this option.
13. Optionally, select Dynamic DNS Registration option.
Dynamic DNS (DDNS) is a protocol that registers local IP addresses on a Domain Name System (DNS) server. In this release,
DD System Manager supports Windows mode DDNS. To use UNIX mode DDNS, use the net ddns CLI command.
The DDNS must be registered to enable this option.
Steps
1. Select Hardware > Ethernet > Interfaces.
2. In the interfaces table, disable the physical interface to which the bonded interface is to be added by clicking No in the
Enabled column.
3. From the Create menu, select Virtual Interface.
4. In the Create Virtual Interface dialog box, specify a bonded interface name in the veth box.
Enter a bonded interface name in the form vethx, where x is a unique ID (typically one or two digits). A typical full bonded
interface name with VLAN and IP Alias is veth56.3999:199. The maximum length of the full name is 15 characters. Special
characters are not allowed. Numbers must be between 0 and 4094, inclusively.
Steps
1. Select Hardware > Ethernet > Interfaces.
2. In the Interfaces column, select the interface and disable the bonded interface by clicking No in the Enabled column. Click
OK in the warning dialog box.
3. In the Interfaces column, select the interface and click Configure.
4. In the Configure Virtual Interface dialog box, change the settings.
5. Click Next and Finish.
Configuring a VLAN
Create a new VLAN interface from either a physical interface or a bonded interface.
Steps
1. Select Hardware > Ethernet > Interfaces.
2. In the interfaces table, select the interface to which you want to add the VLAN.
3. Click Create and selectVLAN.
4. In the Create VLAN dialog box, specify a VLAN ID by entering a number in the VLAN ID box. This is the tag the VLAN will
use on the network.
The range of a VLAN ID is between 1 and 4094 inclusive.
9. Click Next.
The Create VLAN summary page appears.
10. Review the configuration settings, click Finish, and click OK.
Steps
1. Select Hardware > Ethernet > Interfaces.
2. In the Interfaces column, select the checkbox of the interface and disable the VLAN interface by clicking No in the
Enabled column. Click OK in the warning dialog box.
3. In the Interfaces column, select the checkbox of the interface and click Configure.
4. In the Configure VLAN Interface dialog box, change the settings.
5. Click Next and Finish.
Configuring an IP alias
An IP alias assigns an additional IP address to a physical interface, a bonded interface, or a VLAN.
Steps
1. Select Hardware > Ethernet > Interfaces.
2. Click Create, and select IP Alias.
The Create IP Alias dialog box appears.
7. Click Next.
The Create IP Alias summary page appears.
Steps
1. Select Hardware > Ethernet > Interfaces.
2. In the Interfaces column, select the checkbox of the interface and disable the IP alias interface by clicking No in the
Enabled column. Click OK in the warning dialog box.
3. In the Interfaces column, select the checkbox of the interface and click Configure.
4. In the Configure IP Alias dialog box, change the settings as described in the procedure for creating an IP Alias.
5. Click Next and Finish.
Steps
1. Select Hardware > Ethernet > Interfaces > DDNS Registration.
2. In the DDNS Windows Mode Registration dialog box, click Add to add an interface to the DDNS.
The Add Interface dialog box appears.
Destroying an interface
You can use DD System Manager to destroy or delete bonded, VLAN, and IP alias interfaces.
Steps
1. Select Hardware > Ethernet > Interfaces > Tree View.
2. In the Tree View dialog box, click the plus or minus boxes to expand or contract the tree view that shows the hierarchy.
3. Click Close to exit this view.
Steps
● Select Hardware > Ethernet > Settings.
Steps
1. Select Hardware > Ethernet > Settings.
2. Click Edit in the Host Settings area. The Configure Host dialog opens.
3. To manually configure the host and domain names:
a. Select Manually configure host.
b. Enter a hostname in the Host Name box.
d. Click OK.
The system displays progress messages as the changes are applied.
4. To obtain the host and domain names from a DHCP server, select Obtain Settings using DHCP and click OK.
At least one interface must be configured to use DHCP.
Steps
1. Select Hardware > Ethernet > Settings.
2. Click Edit in the Search Domain List area.
3. To add a search domain using the Configure Search Domains dialog:
a. Click Add (+).
b. In the Add Search Domain dialog, enter a name in the Search Domain box.
For example, id##.yourcompany.com
c. Click OK.
The system adds the new domain to the list of searchable domains.
d. Click OK to apply changes and return to the Settings view.
4. To remove a search domain using the Configure Search Domains dialog:
a. Select the search domain to remove.
b. Click Delete (X).
The system removes the selected domain from the list of searchable domains.
c. Click OK to apply changes and return to the Settings view.
Steps
1. Select Hardware > Ethernet > Settings.
2. To add a host map, do the following.
a. In the Hosts Mapping area, click Add.
b. In the Add Hosts dialog, enter the IP address of the host in the IP Address box.
c. Click Add (+).
d. In the Add Host dialog, enter a hostname, such as id##.yourcompany.com, in the Host Name box.
e. Click OK to add the new hostname to the Host Name list.
f. Click OK to return to the Settings tab.
3. To delete a host map, do the following.
a. In the Hosts Mapping area, select the host mapping to delete.
b. Click Delete (X).
Steps
1. Select Hardware > Ethernet > Settings.
2. Click Edit in the DNS List area.
3. To manually add a DNS IP address:
a. Select Manually configure DNS list.
The DNS IP address checkboxes become active.
b. Click Add (+).
c. In the Add DNS dialog box, enter the DNS IP address to add.
d. Click OK.
The system adds the new IP address to the list of DNS IP addresses.
e. Click OK to apply the changes.
4. To delete a DNS IP address from the list:
a. Select Manually configure DNS list.
The DNS IP address checkboxes become active.
b. Select the DNS IP address to delete and click Delete (X).
The system removes the IP address from the list of DNS IP addresses.
c. Click OK to apply the changes.
5. To obtain DNS addresses from a DHCP server, select Obtain DNS using DHCP and click OK.
At least one interface must be configured to use DHCP.
Steps
Select Hardware > Ethernet > Routes.
NOTE: If this does not display all the routing tables configured on the system, run the net route show tables
command to display all the tables. The DD OS Command Reference Guide provides additional information.
Results
The Static Routes area lists the route specification used to configure each static route. The Dynamic Routes table lists
information for each of the dynamically assigned routes.
Steps
1. Select Hardware > Ethernet > Routes.
2. Click Edit next to the default gateway type (IPv4 or IPv6) you want to configure.
3. To manually configure the default gateway address:
a. Select Manually Configure.
b. Enter the gateway address in the Gateway box.
c. Click OK.
4. To obtain the default gateway address from a DHCP server, select Use DHCP value and click OK.
At least one interface must be configured to use DHCP.
Steps
1. Select Hardware > Ethernet > Routes.
2. Click Create in the Static Routes area.
3. In the Create Routes dialog, select the interface you want to host the static route, and click Next.
4. Specify the Destination.
● To specify a destination network, select Network and enter the network address and netmask for the destination
network.
● To specify a destination host, select Host and enter the hostname or IP address of the destination host.
5. Optionally, specify the gateway to use to connect to the destination network or host.
a. Select Specify a gateway for this route.
b. Enter the gateway address in the Gateway box.
6. Review the configuration and click Next.
The create routes Summary page appears.
7. Click Finish.
8. After the process is completed, click OK.
The new route specification is listed in the Route Spec list.
Steps
1. Select Hardware > Ethernet > Routes.
2. Select the Route Spec of the route specification to delete.
3. Click Delete.
4. Click Delete to confirm and then click Close.
The selected route specification is removed from the Route Spec list.
In this example there are 14 disks in use in dg2 and each disk has a capacity of 2.7 TiB, therefore N=14 and C= 2.7 TiB
Use the formula (N-R) x C to get the usable capacity. In this example, the equation is (14-2) x 2.7 TiB.
12 x 2.7 TiB = 32.4 TiB, or 35.6 TB.
Steps
1. To display the storage status, select Hardware > Storage.
2. If an alerts link appears after the storage status, click the link to view the storage alerts.
3. If the Storage Migration Status is Not licensed, you can click Add License to add the license for this feature.
Steps
1. Establish a CLI session with the system.
2. Type enclosure beacon enclosure.
3. Press Ctrl-C to stop the LED flashing.
Steps
1. Select Hardware > Storage > Disks.
2. Select a disk from the Disks table and click Beacon.
NOTE: You can select one disk at a time.
The Beaconing Disk dialog box appears, and the LED light on the disk begins flashing.
Configuring storage
Storage configuration features allow you to add and remove storage expansion enclosures from the active, retention, and cloud
tiers. Storage in an expansion enclosure (also called an expansion shelf) is not available for use until it is added to a tier.
Steps
1. Select Hardware > Storage > Overview.
2. Expand the dialog box for the Active Tier, Cache Tier, or Cloud Tier.
3. Click Configure.
4. In the Configure Storage dialog box, select the storage from the Addable Storage list.
5. In the Configure list, select Active Tier.
The maximum amount of storage that can be added to the active tier depends on the active DD controller.
NOTE: The licensed capacity bar shows the portion of licensed capacity (used and remaining) for the installed
enclosures.
Prerequisites
All capacity expansions require the installation of additional disks and memory in the system. Do not attempt to expand the
capacity until the hardware upgrades are complete.
Steps
1. select Maintenance > System.
2. If the system has not been expanded, select the target capacity from the Select Capacity list box and click Capacity
Expand to initiate the capacity expansion.
The DD3300 Field Replacement and Upgrade Guide provides detailed instructions for expanding system capacity.
NOTE: Insufficient memory, insufficient physical capacity (HDDs), the system has already been expanded, or the
target for capacity expansion is not supported can prevent a capacity expansion. If the capacity expansion cannot be
completed, the system displays the reason.
Steps
● To fail a disk and force reconstruction:
1. Select Hardware > Storage > Disks > Fail.
2. Select a disk from the table and click Fail.
● To make a disk marked Failed or Foreign usable to the system:
1. Select Hardware > Storage > Disks > Unfail.
2. Select a disk from the table and click Unfail.
Steps
1. Select Hardware > Storage.
In the Storage area, review the Storage Migration Status line. If the status is Not Licensed, you must add a license before
using any storage migration features. If the storage migration license is installed, the status can be one of the following:
None, Starting, Migrating, Paused by User, Paused by System, Copy Completed - Pending Finalization, Finalizing, Failed
during Copy, or Failed during Finalize.
2. If a storage migration is in progress, click View Storage Migration to view the progress dialogs.
NOTE: The migration status shows the percentage of blocks transferred. In a system with many free blocks, the free
blocks are not migrated, but they are included in the progress indication. In this situation, the progress indication will
climb quickly and then slow when the data migration starts.
3. When a storage migration is in progress, you can also view the status by selecting Health > Jobs.
Steps
1. Install the destination enclosures using the instructions in the product installation guides.
2. Select Administration > Licenses and verify that the storage migration license is installed.
3. If the storage migration license is not installed, click Add Licenses and add the license.
4. Select Hardware > Storage, then click Migrate Data.
5. In the Select a Task dialog, select Estimate, then click Next.
6. In the Select Existing Enclosures dialog, use the checkboxes to select each of the source enclosures for the storage
migration, then click Next.
7. In the Select New Enclosures dialog, use the checkboxes to select each of the destination enclosures for the storage
migration, then click Next.
The Add Licenses button allows you to add storage licenses for the new enclosures as needed, without interrupting the
current task.
8. In the Review Migration Plan dialog, review the estimated migration schedule, then click Next.
9. Review the precheck results in the Verify Migration Preconditions dialog, then click Close.
Results
If any of the precheck tests fail, resolve the issue before you start the migration.
Steps
1. Install the destination enclosures using the instructions in the product installation guides.
2. Select Administration > Licenses and verify that the storage migration license is installed.
3. If the storage migration license is not installed, click Add Licenses and add the license.
4. Select Hardware > Storage, then click Migrate Data.
5. In the Select a Task dialog, select Migrate, then click Next.
8. In the Review Migration Plan dialog, review the estimated migration schedule, then click Start.
9. In the Start Migration dialog, click Start.
The Migrate dialog appears and updates during the three phases of the migration: Starting Migration, Migration in Progress,
and Copy Complete.
10. When the Migrate dialog title displays Copy Complete and a filesystem restart is acceptable, click Finalize.
NOTE: This task restarts the filesystem and typically takes 10 to 15 minutes. The system is unavailable during this time.
Results
When the migration finalize task is complete, the system is using the destination enclosures and the source enclosures can be
removed.
P1. This system's Older DD system models do not support storage migration.
platform is
supported.
P2. A storage A storage migration license is required.
migration license
is available.
P3. No A previous storage migration must complete before you can start another.
other migration
is currently
running.
P4. The Resume and complete the interrupted migration.
current migration
request is
the same as
the interrupted
migration
request.
P5. Check the Storage migration requires that each source enclosure contain only one disk group, and all the disks in the
disk group layout group must be in that enclosure.
on the existing
enclosures.
P6. Verify the The total system capacity after migration and the removal of the source enclosures must not exceed the
final system capacity supported by the DD system model.
capacity.
P7. Verify The usable capacity of the destination enclosures must be greater than that of the source enclosures.
the replacement
enclosures'
capacity.
P8. Source The system supports storage migration from either the active tier or the retention tier. It does not
enclosures are in support migration of data from both tiers at the same time.
the same active
tier or retention
unit.
P9. Source Although the system controller is listed as an enclosure in the CLI, storage migration does not support
enclosures are migration from disks installed in the system controller.
not part of the
head unit.
Steps
1. Install the destination enclosures using the instructions in the product installation guides.
2. Check to see if the storage migration feature license is installed.
# elicense show
3. If the license is not installed, update the elicense to add the storage migration feature license
# elicense update
4. View the disk states for the source and destination disks.
8. Optionally, view the disk states for the source and destination disks during the migration.
10. View the disk states for the source and destination disks.
12. If you want to remove all data from each of the source enclosures, remove the data now.
NOTE: The storage sanitize command does not produce a certified data erasure. Dell EMC offers certified data erasure
as a service. For more information, contact your Dell EMC representative.
13. View the disk states for the source and destination disks.
elicense update
# elicense update mylicense.lic
New licenses: Storage Migration
Feature licenses:
## Feature Count Mode Expiration Date
-- ----------- ----- --------------- ---------------
1 REPLICATION 1 permanent (int) n/a
2 VTL 1 permanent (int) n/a
3 Storage Migration 1 permanent (int)
-- ----------- ----- --------------- ---------------
** This will replace all existing Data Domain licenses on the system with the above EMC
ELMS licenses.
Do you want to proceed? (yes|no) [yes]: yes
eLicense(s) updated.
Source enclosures:
Disks Count Disk Disk Enclosure Enclosure
Group Size Model Serial No.
-------- ----- ----- ---------- --------- --------------
2.1-2.15 15 dg1 1.81 TiB ES30 APM00111103820
-------- ----- ----- ---------- --------- --------------
Total source disk size: 27.29 TiB
Destination enclosures:
Disks Count Disk Disk Enclosure Enclosure
Group Size Model Serial No.
---------- ----- ------- -------- --------- --------------
11.1-11.15 15 unknown 931.51 GiB ES30 APM00111103840
---------- ----- ------- -------- --------- --------------
Total destination disk size: 13.64 TiB
Source enclosures:
Disks Count Disk Disk Enclosure Enclosure
Group Size Model Serial No.
-------- ----- ----- ---------- --------- --------------
2.1-2.15 15 dg1 1.81 TiB ES30 APM00111103820
-------- ----- ----- ---------- --------- --------------
Total source disk size: 27.29 TiB
Destination enclosures:
Disks Count Disk Disk Enclosure Enclosure
Group Size Model Serial No.
---------- ----- ------- -------- --------- --------------
11.1-11.15 15 unknown 931.51 GiB ES30 APM00111103840
---------- ----- ------- -------- --------- --------------
Total destination disk size: 13.64 TiB
NOTE: Currently storage migration is only supported on the active node. Storage migration is not supported on the standby
node of an HA cluster.
Supported interfaces
The file system supports the following interfaces:
● NFS
● CIFS
● DD Boost
● DD VTL
Steps
● Select Data Management > File System.
Related concepts
Health Alerts panel on page 46
Related tasks
Viewing system storage information on page 110
Steps
1. Select Data Managment > File System > Summary.
2. For File System, click Enable or Disable.
3. On the confirmation dialog, click Close.
Steps
1. Select Data Managment > File System > Summary > Expand Capacity.
The Expand File System Capacity wizard is launched. The Storage Tier drop-down list always contains Active Tier, and it
may contain Cloud Tier as a secondary choice. The wizard displays the current capacity of the file system for each tier as
well as how much additional storage space is available for expansion.
NOTE: File system capacity can be expanded only if the physical disks are installed on the system and file system is
enabled.
Related concepts
Managing file system capacity on page 127
Steps
1. Run the filesys destroy command.
2. Confirm the operation at the prompt.
Performing cleaning
This section provides information about cleaning and describes how to start, stop, and modify cleaning schedules.
DD OS attempts to maintain a counter called 'Cleanable GiB' for the active tier. This number is an estimation of how much
physical (postcomp) space could potentially be reclaimed in the active tier by running clean/garbage collection. This counter is
shown using the filesys show space and df commands.
Active Tier:
Resource Size GiB Used GiB Avail GiB Use% Cleanable GiB*
---------------- -------- --------- --------- ----
--------------
/data: pre-comp - 7259347.5 - - -
/data: post-comp 304690.8 251252.4 53438.5 82% 51616.1 <=== NOTE
/ddvar 29.5 12.5 15.6 44% -
---------------- -------- --------- --------- ----
--------------
Starting cleaning
To immediately start a cleaning operation.
Steps
1. Select Data Managment > File System > Summary > Settings > Cleaning.
The Cleaning tab of the File System Setting dialog displays the configurable settings for each tier.
2. For the active tier:
a. In the Throttle % text box, enter a system throttle amount. This is the percentage of CPU usage dedicated to cleaning.
The default is 50 percent.
b. In the Frequency drop-down list, select one of these frequencies: Never, Daily, Weekly, Biweekly, and Monthly. The
default is Weekly.
c. For At, configure a specific time.
d. For On, select a day of the week.
3. For the cloud tier:
a. In the Throttle % text box, enter a system throttle amount. This is the percentage of CPU usage dedicated to cleaning.
The default is 50 percent.
b. In the Frequency drop-down list, select one of these frequencies: Never, After every 'N' Active Tier cleans.
NOTE: If a cloud unit is inaccessible when cloud tier cleaning runs, the cloud unit is skipped in that run. Cleaning
on that cloud unit occurs in the next run if the cloud unit becomes available. The cleaning schedule determines the
duration between two runs. If the cloud unit becomes available and you cannot wait for the next scheduled run, you
can start cleaning manually.
4. Click Save.
NOTE:
To start the cleaning operation using the CLI, use the filesys clean start command.
# filesys status
The filesystem is enabled and running.
Cleaning started at 2017/05/19 18:05:58: phase 1 of 12 (pre-merge)
50.6% complete, 64942 GiB free; time: phase 0:01:05, total 0:01:05
If cleaning is already running, the following message is displayed when it is attempted to be started.
**** Cleaning already in progress. Use 'filesys clean watch' to monitor progress.
NOTE: If clean is not able to start, contact the contracted support provider for further assistance. This issue may
indicate that the system has encountered a missing segment error, causing clean to be disabled.
Steps
1. Select Data Managment > File System > Summary > Settings > Cleaning.
The Cleaning tab of the File System Setting dialog displays the configurable settings for each tier.
2. For the active tier:
a. In the Frequency drop-down list, select wanted frequency.
3. For the cloud tier:
a. In the Frequency drop-down list, select wanted frequency.
4. Click Save.
NOTE: The CLI can be used to check that a clean schedule has been set.
If necessary, set an active tier clean schedule. The following example sets cleaning to run every Tuesday at 6 AM:
Performing sanitization
To comply with government guidelines, system sanitization, also called data shredding, must be performed when classified or
sensitive data is written to any system that is not approved to store such data.
When an incident occurs, the system administrator must take immediate action to thoroughly eradicate the data that was
accidentally written. The goal is to effectively restore the storage device to a state as if the event never occurred. If the data
leakage is with sensitive data, the entire storage will need to be sanitized using Dell EMC Professional Services' Secure Data
erasure practice.
The sanitization command exists to enable the administrator to delete files at the logical level, whether a backup set or individual
files. Deleting a file in most file systems consists of just flagging the file or deleting references to the data on disk, freeing up the
physical space to be consumed at a later time. However, this simple action introduces the problem of leaving behind a residual
representation of underlying data physically on disks. Deduplicated storage environments are not immune to this problem.
System sanitization requires security officer authorization, and cannot be run if a security policy is not configured on the
system. KB article 545871 PowerProtect Data Domain Operating Systems - Added Protection Against Accidental Execution of
Commands, available from https://support.emc.com/, provides more information.
Shredding data in a system implies eliminating the residual representation of that data and thus the possibility that the file may
be accessible after it has been shredded. Dell EMC's sanitization approach ensures is compliant with the National Institute of
Systems and Technology (NIST) Special Publication 800-88 Guidelines for Media Sanitization.
Steps
1. Delete the contaminated files or backups through the backup software or corresponding client. In the case of backups, be
sure to manage the backup software appropriately to ensure that related files on that image are reconciled, catalog records
are managed as required, and so forth.
2. Run the system sanitize start command on the contaminated system to cause all previously used space in it to
be overwritten once. This command requires security officer authorization to run, and cannot run if a security policy is not
configured on the system.
3. Wait for the affected system to be sanitized. Sanitization can be monitored by using the system sanitize watch
command.
If the affected system has replication enabled, all the systems containing replicas need to be processed in a similar manner.
Depending on how much data exists in the system and how it is distributed, the system sanitize command could take
some time. However, during this time, all clean data in the system is available to users.
Steps
1. Select Data Managment > File System > Summary > Settings > General.
2. From the Local Compression Type drop-down list, select a compression type.
3. Click Save.
Steps
1. Select Data Managment > File System > Summary > Settings > General.
2. In the Report Replica as Writable area, toggle between Disabled and Enabled as appropriate.
3. Click Save.
NOTE: The DD VTL feature is not required or supported when the system is used as a Disk Staging device.
The reason that some backup applications use disk staging devices is to enable tape drives to stream continuously. After the
data is copied to tape, it is retained on disk for as long as space is available. Should a restore be needed from a recent backup,
more than likely the data is still on disk and can be restored from it more conveniently than from tape. When the disk fills up, old
backups can be deleted to make space. This delete-on-demand policy maximizes the use of the disk.
In normal operation, the system does not reclaim space from deleted files until a cleaning operation is done. This is not
compatible with backup software that operates in a staging mode, which expects space to be reclaimed when files are deleted.
When you configure disk staging, you reserve a percentage of the total space—typically 20 to 30 percent—in order to allow the
system to simulate the immediate freeing of space.
Steps
1. Select Data Managment > File System > Summary > Settings > General.
2. In the Staging Reserve area, toggle between Disabled and Enabled as appropriate.
3. If Staging Reserve is enabled, enter a value in the % of Total Space box.
This value represents the percentage of the total disk space to be reserved for disk staging, typically 20 to 30%.
4. Click Save.
Steps
1. Select Data Managment > File System > Summary > Fast Copy.
The Fast Copy dialog is displayed.
3. In the Destination text box, enter the pathname of the directory where the data will be copied to. For example, /data/
col1/backup/dir2. This destination directory must be empty, or the operation fails.
● If the Destination directory exists, click the checkbox Overwrite existing destination if it exists.
4. Click OK.
5. In the progress dialog box that appears, click Close to exit.
MTrees overview
An MTree is a logical partition of the file system.
You can use MTrees for CIFS shares, DD Boost storage units, DD VTL pools, or NFS exports. MTrees allow granular
management of snapshots, quotas, and DD Retention Lock.
NOTE:
The maximum number of configurable MTrees on the system can be designated for MTree replication contexts.
Do not place user files in the top-level directory of an MTree. Create subdirectories within the MTree to store user data.
MTree limits
MTree limits for DD systems
MTree Quotas
MTree quotas apply only to the logical data written to the MTree.
An administrator can set storage space restrictions for an MTree, Storage Unit, or DD VTL pool to prevent it from consuming
excess space. MTrees have hard quota limits and soft quota limits. You can set soft, hard, or a combination of both limits. The
values must be integers, and the soft value must be less than the hard value.
When a soft limit is set, an alert is generated when the MTree size exceeds the limit, but data can still be written to it. When a
hard limit is set and the limit is reached, data cannot be written to the MTree and all write operations fail until data is deleted
from the MTree.
Quota enforcement
Enable or disable quota enforcement.
Steps
● Select Data Management > MTree.
The MTree view shows a list of configured MTrees. Details of the selected MTree are shown in the Summary tab. The
Space Usage and Daily Written tabs show graphs that visually display space usage amounts and data written trends for
the selected MTree. The view also contains options that enable MTree configuration for CIFS, NFS, and DD Boost, as well as
sections for managing snapshots and DD Retention Lock for an MTree.
NOTE: Physical capacity measurement (PCM) provides space usage information for MTrees. For more information
about PCM, see the section regarding understanding physical capacity measurement.
Steps
1. Select Data Management > File System > Summary.
The system displays the Summary tab in the File System panel.
2. Click ^ in the bottom-right corner to view the status panel.
Related tasks
Initializing physical capacity measurement on page 138
Starting physical capacity measurement immediately on page 140
Steps
1. Select Data Management > File System > Configuration.
2. Click Initialize under Physical Capacity Measurement to the right of Cache.
3. Click Yes.
Steps
1. Select Data Management > MTree > Manage Schedules.
● Click Add (+) to create a schedule.
● Select a schedule and click Modify (pencil) to edit the schedule.
● Select a schedule and click Delete (X) to delete a schedule.
2. Optionally, click the heading names to sort by schedule: Name, Status (Enabled or Disabled) Priority (Urgent or Normal),
Schedule (schedule timing), and MTree Assignments (the number of MTrees the schedule is assigned to).
Related tasks
Creating physical capacity measurement schedules on page 138
Editing physical capacity measurement schedules on page 139
Assigning physical capacity measurement schedules to an MTree on page 139
Steps
1. Select Data Management > MTree > Manage Schedules.
2. Click Add (+) to create a schedule.
3. Enter the name of the schedule.
4. Select the status:
● Normal: Submits a measurement task to the processing queue.
Related tasks
Editing physical capacity measurement schedules on page 139
Assigning physical capacity measurement schedules to an MTree on page 139
Steps
1. Select Data Management > MTree > Manage Schedules.
2. Select a schedule and click Modify (pencil).
3. Modify the schedule and click Save.
Schedule options are described in the Creating physical capacity measurement schedules topic.
4. Optionally, click the heading names to sort by schedule: Name, Status (Enabled or Disabled) Priority (Urgent or Normal),
Schedule (schedule timing), and MTree Assignments (the number of MTrees the schedule is assigned to).
Related tasks
Assigning physical capacity measurement schedules to an MTree on page 139
Prerequisites
Physical capacity measurement (PCM) schedules must be created.
Steps
1. Select Data Management > MTree > Summary.
2. Select MTrees to assign schedules to.
3. Scroll down to the Physical Capacity Measurements area and click Assign to the right of Schedules.
4. Select schedules to assign to the MTree and click Assign.
Related tasks
Starting physical capacity measurement immediately on page 140
Steps
1. Select Data Management > MTree > Summary.
2. Scroll down to the Physical Capacity Measurements area and click Measure Now to the right of Submitted Measurements.
3. Select Normal (Submits a measurement task to the processing queue), or Urgent (Submits a measurement task to the
front of the processing queue).
4. Click Submit.
Steps
1. Select Data Management > File System > Settings.
2. In the Physical Capacity Measurement area, click Edit to the left of Throttle.
3.
Option Description
Click Default Enters the 20% system default.
Type throttle percent The percentage of system resources that are dedicated to physical capacity measurement.
4. Click Save.
Creating an MTree
An MTree is a logical partition of the file system. Use MTrees CIFS shares, DD Boost storage units, DD VTL pools, or NFS
exports.
Steps
1. Select Data Management > MTree.
2. In the MTree overview area, click Create.
3. Enter the name of the MTree in the MTree Name text box. MTree names can be up to 50 characters. The following
characters are acceptable:
● Upper- and lower-case alphabetical characters: A-Z, a-z
● Numbers: 0-9
● Embedded space
● comma (,)
● period (.), as long as it does not precede the name.
● explanation mark (!)
● number sign (#)
● dollar sign ($)
● per cent sign (%)
To set quota limits for the MTree, select Set to Specific value and enter the value. Select the unit of measurement:
MiB, GiB, TiB, or PiB.
NOTE: When setting both soft and hard limits, a quota’s soft limit cannot exceed the quota’s hard limit.
5. Click OK.
The new MTree displays in the MTree table.
NOTE: You may need to expand the width of the MTree Name column to see the entire pathname.
Steps
1. Select one of the following menu paths:
● Select Data Management > MTree.
● Select Data Management > Quota.
2. Select only one MTree in the MTree tab, or one or more MTrees in the Quota tab.
NOTE: Quotas cannot be set on the /data/col1/backup directory.
3. In the MTree tab, click the Summary tab, and then click the Configure button in the Quota area.
4. In the Quota tab, click the Configure Quota button.
Steps
1. In the Configure Quota for MTrees dialog box, enter values for hard and soft quotas and select the unit of measurement:
MiB, GiB, TiB, or PiB.
2. Click OK.
Deleting an MTree
Removes the MTree from the MTree table. The MTree data is deleted at the next cleaning.
Steps
1. Select Data Management > MTree.
2. Select an MTree.
3. In the MTree overview area, click Delete.
4. Click OK at the Warning dialog box.
5. Click Close in the Delete MTree Status dialog box after viewing the progress.
Undeleting an MTree
Undelete retrieves a deleted MTree and its data and places it back in the MTree table.
NOTE: You can also use this procedure to undelete a storage unit.
Steps
1. Select Data Management > MTree > More Tasks > Undelete.
2. Select the checkboxes of the MTrees you wish to bring back and click OK.
3. Click Close in the Undelete MTree Status dialog box after viewing the progress.
The recovered MTree displays in the MTree table.
Renaming an MTree
Use the Data Management MTree GUI to rename MTrees.
Steps
1. Select Data Management > MTree.
2. Select an MTree in the MTree table.
3. Select the Summary tab.
4. In the Detailed Information overview area, click Rename.
6. Click OK.
The renamed MTree displays in the MTree table.
Related tasks
Creating an MTree on page 140
Snapshots overview
A snapshot is a read-only copy of a designated MTree at a specific time. You can use a snapshot as a restore point, you can
manage MTree snapshots and schedules, and you can view the status of existing snapshots.
Snapshots for the MTree named backup are created in the system directory /data/col1/backup/.snapshot. Each
directory under /data/col1/backup also has a .snapshot directory with the name of each snapshot that includes the
directory. Each MTree has the same structure. As an example, an MTree named SantaClara would have a system directory /
data/col1/SantaClara/.snapshot, and each subdirectory in /data/col1/SantaClara would have a .snapshot
directory as well.
Snapshot limitations
● Snapshots created on the source DD system are replicated to the destination system with collection and MTree replication.
You cannot create snapshots on a system that is a replica for collection replication. You cannot create a snapshot on the
destination MTree of an MTree replication. Directory replication does not replicate the snapshots, and you must create
snapshots separately on the destination system.
● The maximum number of snapshots allowed per MTree is 750. Warnings are sent when the number of snapshots per MTree
reaches 90% of the maximum allowed number (from 675 to 749 snapshots), and an alert is generated when the maximum
number is reached. To clear the warning, expire snapshots, and then run the file system cleaning operation.
An expired snapshot remains available until the next file system cleaning operation. To identify an MTree that is nearing
the maximum number of snapshots, check the Snapshots panel of the MTree page regarding viewing MTree snapshot
information.
● Snapshot retention for an MTree does not take any extra space, but if a snapshot exists and the original file no longer exists,
the space cannot be reclaimed.
● The .snapshot directory is not visible if only /data is mounted. When the MTree itself is mounted, the .snapshot
directory is visible.
Related concepts
MTrees overview on page 136
Managing snapshots
This section describes how to manage snapshots.
Creating a snapshot
Create a snapshot when an unscheduled snapshot is required.
Steps
1. Select Data Management > Snapshots to open the Snapshots view.
2. In the Snapshots view, click Create.
3. In the Name text field, enter the name of the snapshot.
4. In the MTree(s) area, select a checkbox of one or more MTrees in the Available MTrees panel and click Add.
5. In the Expiration area, select one of these expiration options:
a. Never Expire.
b. Enter a number for the In text field, and select Days, Weeks, Month, or Years from the drop-down list. The snapshot
will be retained until the same time of day as when it is created.
c. Enter a date (using the format mm/dd/yyyy) in the On text field, or click Calendar and click a date. The snapshot will be
retained until midnight (00:00, the first minute of the day) of the given date.
6. Click OK and Close.
Steps
1. Select Data ManagementSnapshots to open the Snapshots view.
2. Click the checkbox of the snapshot entry in the list and click Modify Expiration Date.
NOTE: More than one snapshot can be selected by clicking additional checkboxes.
3. In the Expiration area, select one of the following for the expiration date:
a. Never Expire.
b. In the In text field, enter a number and select Days, Weeks, Month, or Years from the drop-down list. The snapshot will
be retained until the same time of day as when it is created.
c. In the On text field, enter a date (using the format mm/dd/yyyy) or click Calendar and click a date. The snapshot will be
retained until midnight (00:00, the first minute of the day) of the given date.
4. Click OK.
Renaming a snapshot
Use the Snapshot tab to rename a snapshot.
Steps
1. Select Data Management > Snapshots to open the Snapshots view.
Expiring a snapshot
Snapshots cannot be deleted. To release disk space, expire snapshots and they will be deleted in the next cleaning cycle after
the expiry date.
Steps
1. Select Data Management > Snapshots to open the Snapshots view.
2. Click the checkbox next to snapshot entry in the list and click Expire.
NOTE: More than one snapshot can be selected by selecting additional checkboxes.
The snapshot is marked as Expired in the Status column and will be deleted at the next cleaning operation.
Steps
1. Select Data Managment > Snapshots > Schedules to open the Schedules view.
2. Click Create.
3. In the Name text field, enter the name of the schedule.
4. In the Snapshot Name Pattern text box, enter a name pattern.
Enter a string of characters and variables that translates to a snapshot name (for example, scheduled-%Y-%m-%d-%H-
%m, translates to "scheduled-2012-04-12-17-33"). Use alphabetic characters, numbers, _, -, and variables that translate into
current values.
Steps
1. In the schedule list, select the schedule and click Modify.
2. In the Name text field, enter the name of the schedule and click Next.
Use alphanumeric characters, and the _ and -.
Steps
1. In the schedule list, click the checkbox to select the schedule and click Delete.
2. In the verification dialog box, click OK and then Close.
Related concepts
Fast copy operations on page 134
CIFS overview
Common Internet File System (CIFS) clients can have access to the system directories on the protection system.
● The /data/col1/backup directory is the destination directory for compressed backup server data.
● The /ddvar/core directory contains system core and log files (remove old logs and core files to free space in this area).
NOTE: You can also delete core files from the /ddvar or the /ddvar/ext directory if it exists.
Clients, such as backup servers that perform backup and restore operations need access to the /data/col1/backup
directory, at a minimum. Clients that have administrative access need to be able to access the /ddvar/core directory to
retrieve core and log files.
As part of the initial protection system configuration, CIFS clients were configured to access these directories. This chapter
describes how to modify these settings and how to manage data access using the DD System Manager and the cifs command.
NOTE:
● The DD System Manager Protocols > CIFS page allows you to perform major CIFS operations such as enabling and
disabling CIFS, setting authentication, managing shares, and viewing configuration and share information.
● The cifs command contains all the options to manage CIFS backup and restores between Windows clients and
protection systems, and to display CIFS statistics and status. For complete information about the cifs command, see
the DD OS Command Reference Guide.
● For information about setting up clients to use the protection system as a server, see the related tuning guide, such
as the CIFS Tuning Guide, which is available from the support.emc.com web site. Search for the complete name of the
document using the Search field.
CIFS 149
Preparing clients for access to protection systems
Find documentation online.
Steps
1. Log into the Online Support (support.emc.com) web site.
2. In the Search field, enter the name of the document that you are looking for.
3. Select the appropriate document, such as the CIFS and Data Domain Systems Tech Note.
4. Follow the instructions in the document.
Steps
1. For the system selected in the DD System Manager Navigation tree, click Protocols > CIFS.
2. In the CIFS Status area, click Enable.
Related tasks
Preparing clients for access to protection systems on page 150
Related concepts
Setting authentication parameters on page 151
Steps
1. Display the current NetBIOS name by entering:
# cifs show config
2. Use the cifs set nb-hostname nb-hostname command.
150 CIFS
Setting authentication parameters
Set the authentication parameters for working with CIFS.
Click the Configure link in to the left of the Authentication label in the Configuration tab. The system will navigate to the
Administration > Access > Authentication tab where you can configure authentication for Active Directory, Kerberos,
Workgroups, and NIS.
Related concepts
Naming the CIFS server on page 150
Steps
1. Select Protocols > CIFS > Configuration.
2. In the Options area, click Configure Options.
3. To restrict anonymous connections, click the checkbox of the Enable option in the Restrict Anonymous Connections area.
4. In the Log Level area, click the drop-down list to select the level number.
The level is an integer from 1 (one) to 5 (five). One is the default system level that sends the least-detailed level of
CIFS-related log messages, five results in the most detail. Log messages are stored in the file /ddvar/log/debug/cifs/
cifs.log.
NOTE: A log level of 5 degrades system performance. Click the Default in the Log Level area after debugging an issue.
This sets the level back to 1.
Related references
Configuring SMB signing on page 156
Steps
1. Select Protocols > CIFS.
2. In the Status area, click Disable.
3. Click OK.
Even after disabling CIFS access, CIFS authentication services continue to run on the system. This continuation is required
to authenticate active directory domain users for management access.
CIFS 151
Creating shares
When creating shares, you have to assign client access to each directory separately and remove access from each directory
separately. For example, a client can be removed from /ddvar and still have access to /data/col1/backup
Steps
1. Select Protocols > CIFS tabs to go to the CIFS view.
2. Ensure that authentication has been configured, as described in the section regarding setting authentication parameters.
3. On the CIFS client, set shared directory permissions or security options.
4. On the CIFS view, click the Shares tab.
5. Click Create.
6. In the Create Shares dialog box, enter the following information:
NOTE: The share name can be a maximum of 80 characters and cannot contain the following characters: \ / : * ? " < >
| + [ ] ; , = or extended ASCII characters.
7. Add a client by clicking Add (+) in the Clients area. The Client dialog box is displayed. Enter the name of the client in the
Client text box and click OK.
Consider the following when entering the client name.
● No blanks or tabs (white space) characters are enabled.
● It is not recommended to use both an asterisk (*) and individual client name or IP address for a given share. When an
asterisk (*) is present, any other client entries for that share are not used.
● It is not required to use both client name and client IP address for the same client on a given share. Use client names
when the client names are defined in the DNS table.
● To make share available to all clients, specify an asterisk (*) as the client. All users in the client list can access the share,
unless one or more user names are specified, in which case only the listed names can access the share.
Repeat this step for each client that you need to configure.
8. In the Max Connections area, select the text box and enter the maximum number of connections to the share that are
enabled at one time. The default value of zero (also settable through the Unlimited button) enforces no limit on the number
of connections.
9. Click OK.
The newly created share is displayed at the end of the list of shares, which are located in the center of the Shares panel.
152 CIFS
Related concepts
Setting authentication parameters on page 151
CLI equivalent
Steps
1. Run the cifs status command to verify that CIFS is enabled.
2. Run the filesys status command to verify that file system is enabled.
3. Run the hostname command to determine the system hostname.
4. Create the CIFS share.
cifs share create <share> path <path> {max-connections <max connections> | clients
<clients> | users <users> | comment <comment>}
8. From the Windows system, select Start > Run, and type the hostname and directory of the CIFS share.
\\<DDhostname>.<DDdomain.com>\<sharename>
9. If there are problems connecting to the CIFS share, run the cifs share show command to verify the status of the share.
The warning WARNING: The share path does not exist! is displayed if the share does not exist or was misspelled
on creation.
enabled: yes
path: /backup
10. If the CIFS share is still not accessible, verify that all client information is in the access list, and all network connections are
functional.
Modifying a share
Change share information and connections.
Steps
1. Select Protocols > CIFS > Shares to navigate to the CIFS view, Shares tab.
2. Click the checkbox next the share that you wish to modify in the Share Name list.
3. Click Modify.
4. Modify share information:
CIFS 153
a. To change the comment, enter new text in the Comment text field.
b. To modify a User or Group names, in the User/Group list, click the checkbox of the user or group and click Edit (pencil
icon) or Delete (X). To add a user or group, click (+), and in the User/Group dialog box select the Type for User or
Group, and enter the user or group name.
c. To modify a client name, in the Client list click the checkbox of the client and click Edit (pencil icon) or Delete (X). To
add a client, click the Add (+) and add the name in the Client dialog box.
NOTE: To make the share available to all clients, specify an asterisk (*) as the client. All users in the client list can
access the share, unless one or more user names are specified, in which case only the listed names can access the
share.
d. Click OK.
5. In the Max Connections area, in the text box, change the maximum number of connections to the share that are allowed at
one time. Or select Unlimited to enforce no limit on the number of connections.
6. Click OK.
NOTE: User permissions from the existing share are carried over to the new share.
Steps
1. In the CIFS Shares tab, click the checkbox for the share you wish to use as the source.
2. Click Create From.
3. Modify the share information, as described in the section about modifying a share.
Related tasks
Modifying a share on page 153
Disabling a share
Disable one or more existing shares.
Steps
1. In the Shares tab, click the checkbox of the share you wish to disable in the Share Name list.
2. Click Disable.
3. Click Close.
Enabling a share
Enable one or more existing shares.
Steps
1. In the Shares tab, click the checkbox of the shares you wish to enable in the Share Name list.
2. Click Enable.
3. Click Close.
154 CIFS
Deleting a share
Delete one or more existing shares.
Steps
1. In the Shares tab, click the checkbox of the shares you wish to delete in the Share Name list.
2. Click Delete.
The Warning dialog box appears.
3. Click OK.
The shares are removed.
Steps
1. On the system CIFS page, verify that CIFS Status shows that CIFS is enabled and running.
2. In the Control Panel, open Administrative Tools and select Computer Management.
3. In the Computer Management dialog box, right-click Computer Management (Local) and select Connect to another
computer from the menu.
4. In the Select Computer dialog box, select Another computer and enter the name or IP address for the protection system.
5. Create a \backup subfolder as read-only. For more information, see the section on creating a /data/col1/backup subfolder
as read-only.
Steps
1. Right-click Shares in the Shared Folders directory.
2. Select New File Share from the menu.
The Create a Shared Folder wizard opens. The computer name should be the name or IP address of the protection system.
3. Enter the path for the Folder to share, for example, enter C:\data\col1\backup\newshare.
4. Enter the Share name, for example, enter newshare. Click Next.
5. For the Share Folder Permissions, selected Administrators have full access. Other users have read-only access. Click Next.
6. The Completing dialog box shows that you have successfully shared the folder with all Microsoft Windows clients in the
network. Click Finish.
The newly created shared folder is listed in the Computer Management dialog box.
CIFS 155
Displaying CIFS information
Display information about shared folders, sessions, and open files.
Steps
1. In the Control Panel, open Administrative Tools and select Computer Management.
2. Select one of the Shared Folders (Shares, Sessions, or Open Files) in the System Tools directory.
Information about shared folders, sessions, and open files is shown in the right panel.
Steps
● From the Windows client use this DOS command: net use drive: backup-location
Example
For example, enter:
# \\PP02\backup /USER:PP02\backup22
156 CIFS
This command maps the backup share from PowerProtect system PP02 to drive H on the Windows system and gives the user
named backup22 access to the \\PP_sys\backup directory.
DD OS supports the SMB Change Notify functionality. This improves CIFS performance on the Windows client by allowing the
CIFS server to automatically notify the Windows client about changes on the CIFS share, and eliminate the need for the client to
poll the protection system to look for changes to the share.
Steps
● Enter: adminaccess authentication add cifs
The SSH, Telnet, or FTP command that accesses the protection system must include, in double quotation marks, the domain
name, a backslash, and the user name. For example:
C:> ssh "domain2\djones" @dd22
Steps
1. To map a protection system default group number to a Windows group name that differs from the default group name, use
the cifs option set "dd admin group2" ["windows grp-name"] command.
The Windows group name is a group (based on one of the user roles—admin, user, or back-up operator) that exists on a
Windows domain controller, and you can have up to 50 groups (dd admin group1 to dd admin group50).
NOTE: For a description of DD OS user roles and Windows groups, see the section about managing protection systems.
Steps
● Enter: adminaccess authentication del cifs
This command prohibits Windows users access to the protection system if they do not have an account on the system.
CIFS 157
File access
This sections contains information about ACLs, setting DACL and SACL permissions using Windows Explorer, and so on.
NOTE: CREATOR OWNER is replaced by the user creating the file/folder for normal users and by Administrators for
administrative users.
Permissions for a New Object when the Parent Directory Has No ACL
The permissions are as follows:
● BUILTIN\Administrators:(OI)(CI)F
● NT AUTHORITY\SYSTEM:(OI)(CI)F
● CREATOR OWNER:(OI)(CI)(IO)F
● BUILTIN\Users:(OI)(CI)R
● BUILTIN\Users:(CI)(special access:)FILE_APPEND_DATA
● BUILTIN\Users:(CI)(IO)(special access:)FILE_WRITE_DATA
● Everyone:(OI)(CI)R
These permissions are described in more detail as follows:
158 CIFS
Setting ACL Permissions and Security
Windows-based backup and restore tools such as NetBackup can be used to back up DACL- and SACL-protected files to, and
restore them from, the protection system.
Steps
1. Right-click the file or folder and select Properties.
2. In the Properties dialog box, click the Security tab.
3. Select the group or user name, such as Administrators, from the list. The permissions appear, in this case for
Administrators, Full Control.
4. Click the Advanced button, which enables you to set special permissions.
5. In the Advanced Security Settings for ACL dialog box, click the Permissions tab.
6. Select the permission entry in the list.
7. To view more information about a permission entry, select the entry and click Edit.
8. Select the Inherit from parent option to have the permissions of parent entries inherited by their child objects, and click OK.
Steps
1. Right-click the file or folder and select Properties from the menu.
2. In the Properties dialog box, click the Security tab.
3. Select the group or user name, such as Administrators, from the list, which displays its permissions, in this case, Full
Control.
4. Click the Advanced button, which enables you to set special permissions.
5. In the Advanced Security Settings for ACL dialog box, click the Auditing tab.
6. Select the auditing entry in the list.
7. To view more information about special auditing entries, select the entry and click Edit.
8. Select the Inherit from parent option to have the permissions of parent entries inherited by their child objects, and click OK.
Steps
1. In the Advanced Security Settings for ACL dialog box, click the Owner tab.
CIFS 159
2. To change the owner, select a name from the Change owner list, and click OK.
Steps
1. In the DD System Manager, select Protocols > CIFS.
● Status is either enabled and running, or disabled but CIFS authentication is running.
To enable CIFS, see the section regarding enabling CIFS services. To disable CIFS, see the section regarding disabling
CIFS services.
● Connections lists the tally of open connections and open files.
160 CIFS
Table 13. Connections Details information (continued)
Item Description
Locks Number of locks on the file
Files File location
Related concepts
Display shares information on page 162
Related tasks
Enabling CIFS services on page 150
Disabling CIFS services on page 151
Authentication configuration
The information in the Authentication panel changes, depending on the type of authentication that is configured.
Click the Configure link in to the left of the Authentication label in the Configuration tab. The system will navigate to the
Administration > Access > Authentication page where you can configure authentication for Active Directory, Kerberos,
Workgroups, and NIS.
Workgroup configuration
Table 15. Workgroup configuration authentication information
Item Description
Mode The Workgroup mode displays.
Workgroup Name The configured workgroup name displays.
DDNS The status of the DDNS Server displays: either enabled or disabled.
CIFS Server Name The name of the configured CIFS server displays.
CIFS 161
Table 15. Workgroup configuration authentication information (continued)
Item Description
WINS Server Name The name of the configured WINS server displays.
● To list information about a specific share, enter the share name in the Filter by Share Name text box and click Update.
● Click Update to return to the default list.
● To page through the list of shares, click the < and > arrows at the bottom right of the view to page forward or backward. To
skip to the beginning of the list, click |< and to skip to the end, click >|.
● Click the Items per Page drop-down arrow to change the number of share entries listed on a page. Choices are 15, 30, or
45 entries.
Directory Path Status Indicates whether the configured directory path exists on the DDR. Possible values
are Path Exists or Path Does Not Exist, the later indicating an incorrect or
incomplete CIFS configuration.
Max Connections The maximum number of connections allowed to the share at one time. The default
value is Unlimited.
Comment The comment that was configured when the share was created.
Share Status The status of the share: either enabled or disabled.
● The Clients area lists the clients that are configured to access the share, along with a client tally beneath the list.
● The User/Groups area lists the names and type of users or groups that are configured to access the share, along with a user
or group tally beneath the list.
● The Options area lists the name and value of configured options.
162 CIFS
Displaying CIFS statistics
Use the command line to display CIFS statistics.
Steps
● Enter: cifs show detailed-stats
The output shows number of various SMB requests received and the time taken to process them.
Steps
● Enter: cifs show active
Results
Steps
● Enter: cifs option set max-global-open-files value.
The value for the maximum global open files can be between 1 and the open files maximum limit. The maximum limit is based
on the DDR system memory. For systems with greater than 12 GB, the maximum open files limit is 30,000. For systems with
less than or equal to 12 GB, the maximum open files limit is 10,000.
NOTE: The system has a maximum limit of 600 CIFS connections and 250,000 open files. However, if the system runs
out of open files, the number of files can be increased.
CIFS 163
NOTE: File access latencies are affected by the number of files in a directory. To the extent possible, we recommend
directory sizes of less than 250,000. Larger directory sizes might experience slower responses to metadata operations
such as listing the files in the directory and opening or creating a file.
System clock
When using active directory mode for CIFS access, the system clock time can differ by no more than five minutes from that of
the domain controller.
When configured for Active Directory authentication, the system regularly syncs time with the Windows domain controller.
Therefore, it is important for the domain controller to obtain the time from a reliable time source. Refer to the Microsoft
documentation for your Windows operating system version to configure the domain controller with a time source.
WARNING: When the system is configured for Active Directory authentication, it uses an alternate mechanism
to sync time with the domain controller. To avoid time sync conflicts, do not enable NTP when the system is
configured for Active Directory authentication.
164 CIFS
17
NFS
This chapter includes:
Topics:
• NFS overview
• Managing NFS client access to the protection system
• Displaying NFS information
• Integrating a DDR into a Kerberos domain
• Add and delete KDC servers after initial configuration
NFS overview
Network File System (NFS) clients can have access to the system directories or MTrees on the protection system.
● The/backup directory is the default destination for non-MTree compressed backup server data.
● The /data/col1/backup path is the root destination when using MTrees for compressed backup server data.
● The /ddvar/core directory contains system core and log files (remove old logs and core files to free space in this area).
NOTE: On protection systems, the /ddvar/core is on a separate partition. If you mount /ddvar only, you will not be
able to navigate to /ddvar/core from the /ddvar mountpoint.
Clients, such as backup servers that perform backup and restore operations need access to the /backup or /data/col1/
backup areas, at a minimum. Clients that have administrative access need to be able to access the /ddvar/core directory to
retrieve core and log files.
As part of the initial system configuration, NFS clients were configured to access these areas. This chapter describes how to
modify these settings and how to manage data access.
NOTE:
● The nfs command manages backups and restores between NFS clients and protection systems, and it displays NFS
statistics and status. For complete information about the nfs command, see the DD OS Command Reference Guide.
● For information about setting up third-party clients to use the protection system as a server, see the related tuning
guide, such as the Solaris System Tuning, which is available from the Dell EMC support web site.
NFS 165
Enabling NFS services
Enable NFS services to allow the client to access the system using the NFS protocol.
Steps
1. Select Protocols > NFS.
The NFS view opens displaying the Exports tab.
2. Click Enable.
Steps
1. Select the Protocols > NFS tabs.
The NFS view opens displaying the Exports tab.
2. Click Disable.
Creating an export
You can use DD SM’s Create button on the NFS view or use the Configuration Wizard to specify the NFS clients that can
access the /backup, /data/col1/backup,/ddvar, /ddvar/core areas, or the/ddvar/ext area if it exists.
CAUTION: If Replication is to be implemented, a single destination system can receive backups from both CIFS
clients and NFS clients as long as separate directories or MTrees are used for each. Do not mix CIFS and NFS
data in the same area.
Do not use the top level of an MTrree to host an NFS export. Create a subdirectory within the MTree, and specify that
subdirectory as the path for the NFS export.
Steps
1. Select ProtocolsNFS.
The NFS view opens displaying the Exports tab.
2. Click Create.
3. Enter the pathname in the Directory Path text box (for example, /data/col1/backup/dir1).
NOTE: col1 uses the lower-case letter L followed by the number 1.
4. In the Clients area, select an existing client or click the + icon to create a client.
The Client dialog box is displayed.
166 NFS
NOTE: Clients given access to the /data/col1/backup directory have access to the entire directory. A client
given access to a subdirectory of /data/col1/backup has access only to that subdirectory.
● A client can be a fully-qualified domain hostname, an IPv4 or IPv6 IP address, an IPv4 address with either a netmask
or prefix length, an IPv6 address with prefix length, an NIS netgroup name with the prefix @, or an asterisk (*)
wildcard with a domain name, such as *.yourcompany.com.
● A client added to a subdirectory under /data/col1/backup has access only to that subdirectory.
● Enter an asterisk (*) as the client list to give access to all clients on the network.
b. Select the checkboxes of the NFS options for the client.
General:
● Read-only permission (ro).
● Allow connections from ports below 1024 (secure) (default).
Anonymous UID/GID:
● Map requests from UID (user identifier) or GID (group identifier) 0 to the anonymous UID/GID (root _squash).
● Map all user requests to the anonymous UID/GID (all _squash).
● Use Default Anonymous UID/GID.
Allowed Kerberos Authentication Modes:
● Unauthenticated connections (sec=sys). Select to not use authentication.
● Authenticated Connections (sec=krb5).
NOTE: Integrity and Privacy are supported, although they might slow performance considerably.
c. Click OK.
5. Click OK to create the export.
Modifying an export
Change the directory path, domain name, and other options using the GUI.
Steps
1. SelectProtocols > NFS.
The NFS view opens displaying the Exports tab.
● A client can be a fully-qualified domain hostname, an IPv4 or IPv6 IP address, an IPv4 address with either a netmask
or prefix length, an IPv6 address with prefix length, an NIS netgroup name with the prefix @, or an asterisk (*)
wildcard with a domain name, such as *.yourcompany.com.
A client added to a subdirectory under /data/col1/backup has access only to that subdirectory.
● Enter an asterisk (*) as the client list to give access to all clients on the network.
b. Select the checkboxes of the NFS options for the client.
General:
● Read-only permission (ro).
● Allow connections from ports below 1024 (secure) (default).
Anonymous UID/GID:
● Map requests from UID (user identifier) or GID (group identifier) 0 to the anonymous UID/GID (root _squash).
NFS 167
● Map all user requests to the anonymous UID/GID (all _squash).
● Use Default Anonymous UID/GID.
Allowed Kerberos Authentication Modes:
● Unauthenticated connections (sec=sys). Select to not use authentication.
● Authenticated Connections (sec=krb5).
NOTE: Integrity and Privacy are not supported.
c. Click OK.
6. Click OK to modify the export.
Related tasks
Creating an export from an existing export on page 168
Steps
1. In the NFS Exports tab, click the checkbox of the export you wish to use as the source.
2. Click Create From.
3. Modify the export information, as described in section about modifying an export.
Related tasks
Modifying an export on page 167
Deleting an export
Delete an export from the NFS Exports tab.
Steps
1. In the NFS Exports tab, click the checkbox of the export you wish to delete.
2. Click Delete.
3. Click OK and Close to delete the export.
Steps
● Click Protocols > NFS.
The top panel shows the operational status of NFS; for example, whether NFS is currently active and running, and whether
Kerberos mode is enabled.
NOTE: Click Configure to view the Administration > Access > Authentication tab where you can configure Kerberos
authentication.
168 NFS
Viewing NFS exports
See the list of clients allowed to access the protection system.
Steps
1. Click Protocols > NFS.
The Exports view shows a table of NFS exports that are configured for system and the mount path, status, and NFS options
for each export.
2. Click an export in the table to populate the Detailed Information area, below the Exports table.
In addition to the export’s directory path, configured options, and status, the system displays a list of clients.
Use the Filter By text box to sort by mount path.
Click Update for the system to refresh the table and use the filters supplied.
Click Reset for the system to clear the Path and Client filters.
Steps
● Select the Protocols > NFS > Active Clients tab.
The Active Clients view displays, showing all clients that have been connected in the past 15 minutes and their mount path.
Use the Filter By text boxes to sort by mount path and client name.
Click Update for the system to refresh the table and use the filters supplied.
Click Reset for the system to clear the Path and Client filters.
NOTE: For UNIX Kerberos mode, a keytab file must be transferred from the Key Distribution Center (KDC) server, where
it is generated, to the DDR. If you are using more than one DDR, each DDR requires a separate keytab file. The keytab file
contains a shared secret between the KDC server and the DDR.
NOTE: When using a UNIX KDC, the DNS server does not have to be the KDC server, it can be a separate server.
Steps
1. Set the host name and the domain name for the DDR, using DDR commands.
net set hostname <host>
net set {domainname <local-domain-name>}
2. Configure NFS principal (node) for the DDR on the Key Distribution Center (KDC).
NFS 169
Example:
addprinc nfs/hostname@realm
3. Verify that there are nfs entries added as principals on the KDC.
Example:
listprincs
nfs/hostname@realm
NOTE: The <keytab_file> is the keytab file used to configure keys in a previous step.
6. Copy the keytab file from the location where the keys for NFS DDR are generated to the DDR in the /ddvar/ directory.
7. Set the realm on the DDR, using the following DDR command:
authentication kerberos set realm <home realm> kdc-type <unix, windows.> kdcs <IP address
of server>
8. When the kdc-type is UNIX, import the keytab file from /ddvar/ to /ddr/etc/, where the Kerberos configuration file expects
it. Use the following DDR command to copy the file:
authentication kerberos keytab import
NOTE: This step is required only when the kdc-type is UNIX.
host/hostname@realm
nfs/hostname@realm
root/hostname@realm
11. For each NFS client, import all its principals into a keytab file on the client.
Example:
ktadd -k <keytab_file> host/hostname@realm
ktadd -k <keytab_file> nfs/hostname@realm
170 NFS
Add and delete KDC servers after initial configuration
After you have integrated a DDR into a Kerberos domain, and thereby enabled the DDR to use the authentication server as
a Key Distribution Center (for UNIX) and as a Distribution Center (for Windows Active Directory), you can use the following
procedure to add or delete KDC servers.
Steps
1. Join the DDR to a Windows Active Directory (AD) server or a UNIX Key Distribution Center (KDC).
authentication kerberos set realm <home-realm> kdc-type {windows [kdcs <kdc-list>] | unix
kdcs <kdc-list>}
Example: authentication kerberos set realm krb5.test kdc-type unix kdcs nfskrb-
kdc.krb5.test
This command joins the system to the krb5.test realm and enables Kerberos authentication for NFS clients.
NOTE: A keytab generated on this KDC must exist on the DDR to authenticate using Kerberos.
2. Verify the Kerberos authentication configuration.
authentication kerberos show config
config.kerberos.home_realm = krb5.test
config.kerberos.home_realm.kdc1 = ostqa-sparc2.krb5.test
config.kerberos.home_realm.kdc2 = nfskrb-kdc.krb5.test
config.kerberos.kdc_count = 2
config.kerberos.kdc_type = unix
6. Delete a KDC server.
Delete a KDC server by using the authentication kerberos set realm <home-realm> kdc-type {windows
[kdcs <kdc-list>] | unix kdcs <kdc-list>} command without listing the KDC server that you want to delete.
For example, if the existing KDC servers are kdc1, kdc2, and kdc3, and you want to remove kdc2 from the realm, you could
use the following example:
authentication kerberos set realm <realm-name> kdc-type <kdc_type> kdcs kdc1,kdc3
NFS 171
18
NFSv4
This chapter includes:
Topics:
• Introduction to NFSv4
• ID Mapping Overview
• External formats
• Internal Identifier Formats
• When ID mapping occurs
• NFSv4 and CIFS/SMB Interoperability
• NFS Referrals
• NFSv4 and High Availability
• NFSv4 Global Namespaces
• NFSv4 Configuration
• Kerberos and NFSv4
• Enabling Active Directory
Introduction to NFSv4
Because NFS clients are increasingly using NFSv4.x as the default NFS protocol level, protection systems can now employ
NFSv4 instead of requiring the client to work in a backwards-compatibility mode.
Clients can work in mixed environments in which NFSv4 and NFSv3 must be able to access the same NFS exports.
The DD OS NFS server can be configured to support NFSv4 and NFSv3, depending on site requirements. You can make each
NFS export available to only NFSv4 clients, only NFSv3 clients, or both.
Several factors might affect whether you choose NFSv4 or NFSv3:
● NFS client support
Some NFS clients may support only NFSv3 or NFSv4, or may operate better with one version.
● Operational requirements
An enterprise might be strictly standardized to use either NFSv4 or NFSv3.
● Security
If you require greater security, NFSv4 provides a greater security level than NFSv3, including ACL and extended owner and
group configuration.
● Feature requirements
If you need byte-range locking or UTF-8 files, you should choose NFSv4.
● NFSv3 submounts
If your existing configuration uses NFSv3 submounts, NFSv3 might be the appropriate choice.
172 NFSv4
Table 22. NFSv4 compared to NFSv3
Feature NFSv3 NFSv4
Standards-based Network Filesystem Yes Yes
Kerberos support Yes Yes
Kerberos with LDAP Yes Yes
Quota reporting Yes Yes
Multiple exports with client-based access lists Yes Yes
ID mapping Yes Yes
UTF-8 character support No Yes
File/directory-based Access Control Lists (ACL) No Yes
Extended owner/group (OWNER@) No Yes
File share locking No Yes
Byte range locking No Yes
DD-CIFS integration (locking, ACL, AD) No Yes
Stateful file opens and recovery No Yes
Global namespace and pseudoFS No Yes
Multi-system namespace using referrals No Yes
NFSv4 ports
You can enable or disable NFSv4 and NFSv3 independently. In addition, you can move NFS versions to different ports; both
versions do not need to occupy the same port.
With NFSv4, you do not need to restart the file system if you change ports. Only an NFS restart is required in such instances.
Like NFSv3, NFSv4 runs on Port 2049 as the default if it is enabled.
NFSv4 does not use portmapper (Port 111) or mountd (Port 2052).
ID Mapping Overview
NFSv4 identifies owners and groups by a common external format, such as [email protected]. These common formats are
known as identifiers, or IDs.
Identifiers are stored within an NFS server and use internal representations such as ID 12345 or ID S-123-33-667-2. The
conversion between internal and external identifiers is known as ID mapping.
Identifiers are associated with the following:
● Owners of files and directories
● Owner groups of files and directories
● Entries in Access Control Lists (ACLs)
Protection systems use a common internal format for NFS and CIFS/SMB protocols, which allows files and directories to be
shared between NFS and CIFS/SMB. Each protocol converts the internal format to its own external format with its own ID
mapping.
External formats
The external format for NFSv4 identifiers follows NFSv4 standards (for example, RFC-7530 for NFSv4.0). In addition,
supplemental formats are supported for interoperability.
NFSv4 173
Standard identifier formats
Standard external identifiers for NFSv4 have the format identifier@domain. This identifier is used for NFSv4 owners,
owner-groups, and access control entries (ACEs). The domain must match the configured NFSv4 domain that was set using the
nfs option command.
The following CLI example sets the NFSv4 domain to mycorp.com for the NFS server:
NOTE: If you do not set the default value, it will follow the DNS name for the protection system.
NOTE: The file system must be restarted after changing the DNS domain for the nfs4-domain to automatically update.
Alternative formats
To allow interoperability, NFSv4 servers on protection systems support some alternative identifier formats for input and output.
● Numeric identifiers; for example, “12345”.
● Windows compatible Security identifiers (SIDs) expressed as “S-NNN-NNN-…”
See the sections on input mapping and output mapping for more information about restrictions to these formats.
174 NFSv4
● Output mapping:
An identifier is sent from the NFS server to the NFSv4 client. See Output mapping on page 175.
● Credential mapping
The RPC client credentials are mapped to an internal identity for access control and other operations. See Credential
mapping on page 175.
Input mapping
Input mapping occurs when an NFSv4 client sends an identifier to the protection system NFSv4 server—setting up the owner
or owner-group of a file, for example. Input mapping is distinct from credential mapping.
Standard format identifiers such as [email protected] are converted into an internal UID/GID based on the configured
conversion rules. If NFSv4 ACLs are enabled, a SID will also be generated, based on the configured conversion rules.
Numeric identifiers (for example, “12345”) are directly converted into corresponding UID/GIDs if the client is not using Kerberos
authentication. If Kerberos is being used, an error will be generated as recommended by the NFSv4 standard. If NFSv4 ACLs are
enabled, a SID will be generated based on the conversion rules.
Windows SIDs (for example, “S-NNN-NNN-…”) are validated and directly converted into the corresponding SIDs. A UID/GID will
be generated based on the conversion rules.
Output mapping
Output mapping occurs when the NFSv4 server sends an identifier to the NFSv4 client; for example, if the server returns the
owner or owner-group of a file.
1. If configured, the output might be the numeric ID.
This can be useful for NFSv4 clients that are not configured for ID mapping (for example, some Linux clients).
2. Mapping is attempted using the configured mapping services, (for example, NIS or Active Directory).
3. The output is a numeric ID or SID string if mapping fails and the configuration is allowed.
4. Otherwise, nobody is returned.
The nfs option nfs4-idmap-out-numeric configures the mapping on output:
● If nfs option nfs4-idmap-out-numeric is set to map-first, mapping will be attempted. On error, a numeric string
is output if allowed. This is the default.
● If nfs option nfs4-idmap-out-numeric is set to always, output will always be a numeric string if allowed.
● If nfs option nfs4-idmap-out-numeric is set to never, mapping will be attempted. On error, nobody@nfs4-
domain is the output.
If the RPC connection uses GSS/Kerberos, a numeric string is never allowed and nobody@nfs4-domain is the output.
The following example configures the protection system NFS server to always attempt to output a numeric string on output. For
Kerberos the name nobody is returned:
Credential mapping
The NFSv4 server provides credentials for the NFSv4 client.
These credentials perform the following functions:
● Determine the access policy for the operation; for example, the ability to read a file.
● Determine the default owner and owner-group for new files and directories.
Credentials sent from the client may be [email protected], or system credentials such as UID=1000, GID=2000.
System credentials specify a UID/GID along with auxiliary group IDs.
If NFSv4 ACLs are disabled, then the UID/GID and auxiliary group IDs are used for the credentials.
NFSv4 175
If NFSv4 ACLs are enabled, then the configured mapping services are used to build an extended security descriptor for the
credentials:
● SIDs for the owner, owner-group, and auxiliary group mapped and added to the Security Descriptor (SD).
● Credential privileges, if any, are added to the SD.
176 NFSv4
NFS Referrals
The referral feature allows an NFSv4 client to access an export (or file system) in one or multiple locations. Locations can be on
the same NFS server or on different NFS servers, and use either the same or different path to reach the export.
Because referrals are an NFSv4 feature, they apply only to NFSv4 mounts.
Referrals can be made to any server that uses NFSv4 or later, including the following:
● A protection system running NFS with NFSv4 enabled
● Other servers that support NFSv4 including Linux servers, NAS appliances, and VNX systems.
A referral can use an NFS export point with or without a current underlying path in the DD file system.
NFS exports with referrals can be mounted through NFSv3, but NFSv3 clients will not be redirected since referrals are a NFSv4
feature. This characteristic is useful in scaleout systems to allow exports to be redirected at a file-management level.
Referral Locations
NFSv4 referrals always have one or more locations.
These locations consist of the following:
● A path on a remote NFS server to the referred filesystem.
● One or more server network addresses that allow the client to reach the remote NFS server.
Typically when multiple server addresses are associated with the same location, those addresses are found on the same NFS
server.
NFSv4 177
NFSv4 and High Availability
With NFSv4, protocol exports (for example, /data/col1/<mtree> are mirrored in a High Availability (HA) setup. However,
configuration exports such as /ddvar are not mirrored.
The /ddvar filesystem is unique to each node of an HA pair. As a result, /ddvar exports and their associated client access
lists are not mirrored to the standby node in an HA environment.
The information in /ddvar becomes stale when the active node fails over to the standby node. Any client permissions granted
to /ddvar on the original active node must be recreated on the newly active node after a failover occurs.
You must also add any additional /ddvar exports and their clients (for example, /ddvar/core) that were created on the
original active node to the newly active node after a failover occurs.
Finally, any desired /ddvar exports must be unmounted from the client and then remounted after a failover occurs.
Best practice
If your system uses NFSv3 exports submounts to give the client read-write access based on the mount path, you must consider
this before using NFSv4 with these submount exports.
With NFSv4, each client has an individual PseudoFS.
178 NFSv4
Table 24. NFSv3 submount exports
Export Path Client Options
Mt1 /data/col1/mt1 client1.example.com ro
Mt1-sub /data/col1/mt1/subdir client2.example.com rw
NFSv4 Configuration
The default protection system configuration only enables NFSv3. To use NFSv4, you must first enable the NFSv4 server.
Next steps
After the NFSv4 server is enabled, you might need to perform additional NFS configuration tasks specifically for your site. These
tasks can include:
● Setting the NFSv4 domain
● Configuring NFSv4 ID mapping
● Configuring ACL (Access Control Lists)
Steps
Enter the nfs option set default-server-version 3:4 command:
Steps
Enter the nfs export modify all command:
NFSv4 179
# nfs export modify all clients all options version=version number
To ensure all existing clients have either version 3, 4, or both, you can modify the NFS version to the appropriate string. The
following example shows NFS modified to include versions 3 and 4:
For more information about the nfs export command, see the DD OS Command Reference Guide for more information.
NOTE: krb5i and krb5p can both cause performance degradation due to additional computational overhead on both the
NFS client and the protection system.
180 NFSv4
You employ existing commands that are used for NFSv3 when configuring your system for Kerberos. See the nfsv3 chapter of
the DD OS Command Reference Guide for more information.
Steps
1. Create the nfs/<ddr_dns_name>@<realm> service principal.
3. Copy the keytab file to the protection system at the following location:
/ddr/var/krb5.keytab
4. Create one of the following principals for the client and export that principal to the keytab file:
nfs/<client_dns_name>@<REALM>
root/<client_dns_name>@<REALM>
/etc/krb5.keytab
NOTE: It is recommended that you use an NTP server to keep the time synchronized on all entities.
NFSv4 181
4. (Optional) Make the nfs4-domain the same as the Kerberos realm using the nfs option command:
5. Add a client to an existing export by adding sec=krb5 to the nfs export add command:
Configuring Clients
Steps
1. Configure the DNS server and verify that forward and reverse lookups are working.
2. Configure the KDC and Kerberos realm by editing the /etc/krb5.conf configuration file.
You might need to perform this step based on the client operating system you are using.
3. Configure NIS or another external name mapping service.
4. (Optional) Edit the /etc/idmapd.conf file to ensure it is the same as the Kerberos realm.
You might need to perform this step based on the client operating system you are using.
5. Verify the keytab file /etc/krb5.keytab contains an entry for the nfs/ service principal or the root/ principal.
Steps
1. Join an active directory realm using the cifs set command:
Kerberos is automatically set up on the system, and the required NFS/ service principal is automatically created on the KDC.
2. Configure NIS using the authentication nis command:
# cifs disable
# cifs option set idmap-type nss
# cifs enable
# filesys restart
182 NFSv4
# nfs option set nfs4-domain <ad-realm>
5. Enable Active Directory for NFSv4 id mapping by using the nfs command:
C:\Windows\system32>nisadmin
The following are the settings on localhost
NIS Domains
NIS Domain in AD Master server NIS Domain in UNIX
---------------- ------------- ----------------
corp win-ad-server corp
4. Assign AD users and groups UNIX UID/GIDs for the NFSv4 server.
a. Go to Server Manager > Tools > Active Directory.
b. Open the Properties for an AD user or group.
c. Under the UNIX Atributes tab, fill in the NIS domain, UID, and Primary GID fields.
NFSv4 183
19
Metadata on Flash
This chapter includes:
Topics:
• Overview of Metadata on Flash (MDoF)
• SSD cache licensing and capacity
• SSD cache tier
• SSD cache tier - system management
• SSD alerts
Caching the file system metadata on SSDs improves I/O performance for both traditional and random workloads.
For traditional workloads, offloading random access to metadata from HDDs to SSDs allows the hard drives to accommodate
streaming write and read requests.
For random workloads, SSD cache provides low latency metadata operations, which allows the HDDs to serve data requests
instead of cache requests.
Read cache on SSD improves random read performance by caching frequently accessed data. Writing data to NVRAM combined
with low latency metadata operations to drain the NVRAM faster improve random write latency. The absence of cache does not
prevent file system operation, it only impacts file system performance.
When the cache tier is first created, a file system restart is only required if the cache tier is being added after the file system is
running. For new systems that come with cache tier disks, no file system restart is required if the cache tier is created before
enabling the file system for the first time. Additional cache can be added to a live system, without the need to disable and
enable the file system.
One specific condition with regard to SSDs is when the number of spare blocks remaining gets close to zero, the SSD enters a
read only condition. When a read only condition occurs, DD OS treats the drive as read-only cache and sends an alert.
MDoF is supported on the following systems:
● DD6300
● DD6800
● DD6900
● DD9300
● DD9400
● DD9500
● DD9800
● DD9900
● DD VE instances, including DD3300 systems, in capacity configurations of 16 TB and higher (SSD Cache Tier for DD VE)
Steps
1. Select Hardware > Storage > Overview.
2. Expand the Cache Tier dialog.
3. Click Configure.
NOTE: The licensed capacity bar shows the portion of licensed capacity (used and remaining) for the installed
enclosures.
CLI Equivalent
When the cache tier SSDs are installed in the head unit:
a. Add the SSDs to the cache tier.
SSD alerts
There are three alerts specific to the SSD cache tier.
The SSD cahce tier alerts are:
● Licensing
If the file system is enabled and less physical cache capacity present than what the license permits is configured, an alert
is generated with the current SSD capacity present, and the capacity license. This alert is classified as a warning alert. The
absence of cache does not prevent file system operation, it only impacts file system performance. Additional cache can be
added to a live system, without the need to disable and enable the file system.
● Read only condition
When the number of spare blocks remaining gets close to zero, the SSD enters a read only condition. When a read only
condition occurs, DD OS treats the drive as read-only cache.
Alert EVT-STORAGE-00001 displays when the SSD is in a read-only state and should be replaced.
Related concepts
About DD Boost on page 199
Steps
1. Select Hardware > Fibre Channel.
2. Next to NPIV: Disabled, select Enable.
3. In the Enable NPIV dialog box, you are warned that all Fibre Channel ports must be disabled before NPIV can be enabled. If
you are sure that you want to continue, select Yes.
Disabling NPIV
Before you can disable NPIV, you must not have any ports with multiple endpoints.
NOTE: NPIV is required for HA configuration. It is enabled by default and cannot be disabled.
Resources tab
The Hardware > Fibre Channel > Resources tab displays information about ports, endpoints, and initiators.
Configuring a port
Ports are discovered, and a single endpoint is automatically created for each port, at startup.
Steps
1. Select Hardware > Fibre Channel > Resources.
2. Under Ports, select an port, and then select Modify (pencil).
3. In the Configure Port dialog, select whether to automatically enable or disable NPIV for this port.
4. For Topology, select Loop Preferred, Loop Only, Point to Point, or Default.
5. For Speed, select 1, 2, 4, 8, or 16 Gbps, or auto.
6. Select OK.
Enabling a port
Ports must be enabled before they can be used.
Steps
1. Select Hardware > Fibre Channel > Resources.
2. Select More Tasks > Ports > Enable. If all ports are already enabled, a message to that effect is displayed.
3. In the Enable Ports dialog, select one or more ports from the list, and select Next.
4. After the confirmation, select Next to complete the task.
Disabling a port
You can simply disable a port (or ports), or you can chose to failover all endpoints on the port (or ports) to another port.
Steps
1. Select Hardware > Fibre Channel > Resources.
2. Select More Tasks > Ports > Disable.
3. In the Disable Ports dialog, select one or more ports from the list, and select Next.
4. In the confirmation dialog, you can continue with simply disabling the port, or you can chose to failover all endpoints on the
ports to another port.
Adding an endpoint
An endpoint is a virtual object that is mapped to a underlying virtual port. In non-NPIV mode (not available on HA configuration),
only a single endpoint is allowed per physical port, and the base port is used to configure that endpoint to the fabric. When NPIV
is enabled, multiple endpoints are allowed per physical port, each using a virtual (NPIV) port, and endpoint failover/failback is
enabled.
NOTE: Non-NPIV mode is not available on HA configurations. NPIV is enabled by default and cannot be disabled.
NOTE: When using NPIV, it is recommended that you use only one protocol (that is, DD VTL Fibre Channel, DD Boost-
over-Fibre Channel, or vDisk Fibre Channel) per endpoint. For failover configurations, secondary endpoints should also be
configured to have the same protocol as the primary.
Steps
1. Select Hardware > Fibre Channel > Resources.
2. Under Endpoints, select Add (+ sign).
3. In the Add Endpoint dialog, enter a Name for the endpoint (from 1 to 128 characters). The field cannot be empty or be the
word "all," and cannot contain the characters asterisk (*), question mark (?), front or back slashes (/, \), or right or left
parentheses [(,)].
4. For Endpoint Status, select Enabled or Disabled.
5. If NPIV is enabled, for Primary system address, select from the drop-down list. The primary system address must be
different from any secondary system address.
6. If NPIV is enabled, for Fails over to secondary system addresses, check the appropriate box next to the secondary system
address.
7. Select OK.
Configuring an endpoint
After you have added an endpoint, you can modify it using the Configure Endpoint dialog.
Steps
1. Select Hardware > Fibre Channel > Resources.
2. Under Endpoints, select an endpoint, and then select Modify (pencil).
3. In the Configure Endpoint dialog, enter a Name for the endpoint (from 1 to 128 characters). The field cannot be empty or be
the word "all," and cannot contain the characters asterisk (*), question mark (?), front or back slashes (/, \), or right or left
parentheses [(,)].
4. For Endpoint Status, select Enabled or Disabled.
5. For Primary system address, select from the drop-down list. The primary system address must be different from any
secondary system address.
6. For Fails over to secondary system addresses, check the appropriate box next to the secondary system address.
7. Select OK.
Steps
1. Show all endpoints to verify the endpoints to be changed:
# scsitarget endpoint show list
2. Disable all endpoints:
# scsitarget endpoint disable all
3. Delete the new, unnecessary endpoint, ep-new:
# scsitarget endpoint del ep-new
4. Modify the endpoint you want to use, ep-1, by assigning it the new system address 10a:
# scsitarget endpoint modify ep-1 system-address 10a
5. Enable all endpoints:
# scsitarget endpoint enable all
Enabling an endpoint
Enabling an endpoint enables the port only if it is currently disabled, that is, you are in non-NPIV mode.
Steps
1. Select Hardware > Fibre Channel > Resources.
2. Select More Tasks > Endpoints > Enable. If all endpoints are already enabled, a message to that effect is displayed.
3. In the Enable Endpoints dialog, select one or more endpoints from the list, and select Next.
4. After the confirmation, select Next to complete the task.
Disabling an endpoint
Disabling an endpoint does not disable the associated port, unless all endpoints using the port are disabled, that is, you are in
non- NPIV mode.
Steps
1. Select Hardware > Fibre Channel > Resources.
2. Select More Tasks > Endpoints > Disable.
3. In the Disable Endpoints dialog, select one or more endpoints from the list, and select Next. If an endpoint is in use, you are
warned that disabling it might disrupt the system.
4. Select Next to complete the task.
Steps
1. Select Hardware > Fibre Channel > Resources.
2. Select More Tasks > Endpoints > Delete.
3. In the Delete Endpoints dialog, select one or more endpoints from the list, and select Next. If an endpoint is in use, you are
warned that deleting it might disrupt the system.
4. Select Next to complete the task.
Adding an initiator
Add initiators to provide backup clients to connect to the system to read and write data using the FC (Fibre Channel) protocol.
A specific initiator can support DD Boost over FC, or DD VTL, but not both. A maximum of 1024 initiators can be configured for
a DD system.
Steps
1. Select Hardware > Fibre Channel > Resources.
2. Under Initiators, select Add (+ sign)
3. In the Add Initiator dialog, enter the port’s unique WWPN in the specified format.
4. Enter a Name for the initiator.
5. Select the Address Method: Auto is used for standard addressing, and VSA (Volume Set Addressing) is used primarily for
addressing virtual buses, targets, and LUNs.
6. Select OK.
CLI Equivalent
Steps
1. Select Hardware > Fibre Channel > Resources.
2. Under Initiators, select one of the initiators. If you want to delete it, select Delete (X). If you want to modify it, select Modify
(pencil) to display the Modify Initiator dialog.
3. Change the initiator’s Name and/or Address Method [Auto is used for standard addressing, and VSA (Volume Set
Addressing) is used primarily for addressing virtual buses, targets, and LUNs.]
4. Select OK.
Recommendation to Set Initiator Aliases - CLI only
It is strongly recommended that Initiator aliases be set to reduce confusion and human error during the configuration
process.
Steps
1. Select Hardware > Fibre Channel > Resources.
2. Select More Tasks > Set Loop ID.
3. In the Set Loop ID dialog, enter the loop ID (from 0 to 125), and select OK.
Steps
1. Select Hardware > Fibre Channel > Resources.
2. Select More Tasks > Set Failover Options.
3. In the Set Failover Options dialog, enter the Failover and Failback Delay (in seconds) and whether to enable Automatic
Failback, and select OK.
Related tasks
Verifying connectivity and creating access groups on page 219
Port monitoring
Port monitoring detects an FC port at system startup and raises an alert if the port is enabled and offline.
To clear the alert, disable an unused port using the scsitarget port commands.
About DD Boost
DD Boost provides advanced integration with backup and enterprise applications for increased performance and ease of use. DD
Boost distributes parts of the deduplication process to the backup server or application clients, enabling client-side deduplication
for faster, more efficient backup and recovery.
DD Boost is an optional product that requires a separate license to operate on the protection system. You can purchase a DD
Boost software license key directly from Dell EMC.
NOTE: A special license, BLOCK-SERVICES-PROTECTPOINT, is available to enable clients using ProtectPoint block
services to have DD Boost functionality without a DD Boost license. If DD Boost is enabled for ProtectPoint clients only—
that is, if only the BLOCK-SERVICES-PROTECTPOINT license is installed—the license status indicates that DD Boost is
enabled for ProtectPoint only.
There are two components to DD Boost: one component that runs on the backup server and another that runs on the
protection system.
● In the context of the NetWorker backup application, Avamar backup application and other DDBoost partner backup
applications, the component that runs on the backup server (DD Boost libraries) is integrated into the particular backup
application.
● In the context of Veritas backup applications (NetBackup and Backup Exec) and the Oracle RMAN plug-in, you need to
download an appropriate version of the DD Boost plugin that is installed on each media server. The DD Boost plugin includes
the DD Boost libraries for integrating with the DD Boost server running on the protection system.
The backup application (for example, Avamar, NetWorker, NetBackup, or Backup Exec) sets policies that control when backups
and duplications occur. Administrators manage backup, duplication, and restores from a single console and can use all of the
features of DD Boost, including WAN-efficient replicator software. The application manages all files (collections of data) in the
catalog, even those created by the protection system.
In the protection system, storage units that you create are exposed to backup applications that use the DD Boost protocol. For
Veritas applications, storage units are viewed as disk pools. For Networker, storage units are viewed as logical storage units
(LSUs). A storage unit is an MTree; therefore, it supports MTree quota settings. (Do not create an MTree in place of a storage
unit.)
This chapter does not contain installation instructions; refer to the documentation for the product you want to install. For
example, for information about setting up DD Boost with Veritas backup applications (NetBackup and Backup Exec), see the
DD Boost for OpenStorage Administration Guide. For information on setting up DD Boost with any other application, see the
application-specific documentation.
Additional information about configuring and managing DD Boost on the protection system can also be found in the DD
Boost for OpenStorage Administration Guide (for NetBackup and Backup Exec) and the DD Boost for Partner Integration
Administration Guide (for other backup applications).
Prerequisites
NFSv3 must be enabled to use DD Boost.
Steps
1. Select Data Management > File System. Verify that the file system is enabled and running by checking its state.
2. Select Protocols > DD Boost.
If you go to the DD Boost page without a license, the Status states that DD Boost is not licensed. Click Add License and
enter a valid license in the Add License Key dialog box.
NOTE: A special license, BLOCK-SERVICES-PROTECTPOINT, is available to enable clients using ProtectPoint block
services to have DD Boost functionality without a DD Boost license. If DD Boost is enabled for ProtectPoint clients
only—that is, if only the BLOCK-SERVICES-PROTECTPOINT license is installed—the license status indicates that DD
Boost is enabled for ProtectPoint only.
Use the DD Boost tabs—Settings, Active Connections, IP Network, Fibre Channel, and Storage Units—to manage DD Boost.
Steps
1. Select Protocols > DD Boost.
2. Select Add (+) above the Users with DD Boost Access list.
The Add User dialog appears.
3. To select an existing user, select the user name in the drop-down list.
If possible, select a user name with management role privileges set to none.
4. To create and select a new user, select Create a new Local User and do the following:
a. Enter the new user name in the User field.
The user must be configured in the backup application to connect to the protection system.
Steps
1. Select Protocols > DD Boost > Settings.
Steps
1. Select Protocols > DD Boost > Settings.
2. Select the user in the Users with DD Boost Access list that needs to be removed.
3. Click Remove (X) above the DD Boost user list.
The Remove User dialog appears.
4. Click Remove.
After removal, the user remains in the DD OS access list.
Related concepts
System access management on page 63
Enabling DD Boost
Use the DD Boost Settings tab to enable DD Boost and to select or add a DD Boost user.
Steps
1. Select Protocols > DD Boost.
2. Click Enable in the DD Boost Status area.
The Enable DD Boost dialog box is displayed.
3. Select an existing user name from the menu, or add a new user by supplying the name, password, and role.
Configuring Kerberos
You can configure Kerberos by using the DD Boost Settings tab.
Steps
1. Select Protocols > DD Boost > Settings.
2. Click Configure in the Kerberos Mode status area.
The Authentication tab under Administration > Access is displayed.
Disabling DD Boost
Disabling DD Boost drops all active connections to the backup server. When you disable or destroy DD Boost, the DD Boost FC
service is also disabled.
Prerequisites
Ensure there are no jobs running from your backup application before disabling.
NOTE: File replication started by DD Boost between two restore operations is not canceled.
Steps
1. Select Protocols > DD Boost.
2. Click Disable in the DD Boost Status area.
3. Click OK in the Disable DD Boost confirmation dialog box.
Steps
1. Select Protocols > DD Boost > Storage Units.
2. Click Create (+).
The Create Storage Unit dialog box is displayed.
5. To create and select a new username that will have access to this storage unit, select Create a new Local User and:
a. Enter the new user name in the User box.
The user must be configured in the backup application to connect to the protection system.
NOTE: When setting both soft and hard limits, a quota’s soft limit cannot exceed the quota’s hard limit.
7. Click Create.
8. Repeat the above steps for each DD Boost-enabled system.
To modify the pre-comp soft and hard limits shown in the tab:
1. Click the Quota link in the Quota panel.
2. In the Configure Quota dialog box, enter values for hard and soft quotas and select the unit of measurement: MiB, GiB,
TiB, or PiB. Click OK.
Steps
1. Select Protocols > DD Boost > Storage Units.
2. In the Storage Unit list, select the storage unit to modify.
3. Click the pencil icon.
The Modify Storage Unit dialog appears.
4. To rename the storage unit, edit the text in the Name field.
5. To select a different existing user, select the user name in the drop-down list.
If possible, select a username with management role privileges set to none.
6. To create and select a new user, select Create a new Local User and do the following:
a. Enter the new user name in the User box.
The user must be configured in the backup application to connect to the protection system.
NOTE: When setting both soft and hard limits, a quota’s soft limit cannot exceed the quota’s hard limit.
8. Click Modify.
Steps
1. Go to Protocols > DD Boost > Storage Units.
2. In the Storage Unit list, select the storage unit to rename.
Steps
1. Select Protocols > DD Boost > Storage Units.
2. Select the storage unit to be deleted from the list.
3. Click Delete (X).
4. Click OK.
Results
The storage unit is removed from your system. You must also manually remove the corresponding backup application catalog
entries.
Steps
1. Select Protocols > DD Boost > Storage Units > More Tasks > Undelete Storage Unit....
2. In the Undelete Storage Units dialog box, select the storage unit(s) that you want to undelete.
3. Click OK.
Steps
1. To display the DD Boost option settings, select Protocols > DD Boost > Settings > Advanced Options.
2. To change the settings, select More Tasks > Set Options.
The Set DD Boost Options dialog appears.
Virtual synthetics
A virtual synthetic full backup is the combination of the last full (synthetic or full) backup and all subsequent incremental
backups. Virtual synthetics are enabled by default.
Low-bandwidth optimization
If you use file replication over a low-bandwidth network (WAN), you can increase replication speed by using low bandwidth
optimization. This feature provides additional compression during data transfer. Low bandwidth compression is available to
protection systems with an installed Replication license.
Low-bandwidth optimization, which is disabled by default, is designed for use on networks with less than 6 Mbps aggregate
bandwidth. Do not use this option if maximum file system write performance is required.
NOTE: You can also manage low bandwidth optimization via the ddboost file-replication commands, which are
described in detail in the DD OS Command Reference Guide.
Steps
1. If you have not yet requested a host certificate, request one from a trusted CA.
2. When you have received a host certificate, copy or move it to the computer from which you run DD Service Manager.
3. Start DD System Manager on the system to which you want to add a host certificate.
NOTE: DD System Manager supports certificate management only on the management system (which is the system
running DD System Manager).
4. Select Protocols > DD Boost > More Tasks > Manage Certificates....
NOTE: If you try to remotely manage certificates on a managed system, DD System Manager displays an information
message at the top of the certificate management dialog. To manage certificates for a system, you must start DD
System Manager on that system.
Steps
1. Obtain a certificate for the trusted CA.
2. Copy or move the trusted CA certificate to the computer from which you run DD Service Manager.
3. Start DD System Manager on the system to which you want to add the CA certificate.
NOTE: DD System Manager supports certificate management only on the management system (which is the system
running DD System Manager).
4. Select Protocols > DD Boost > More Tasks > Manage Certificates....
NOTE: If you try to remotely manage certificates on a managed system, DD System Manager displays an information
message at the top of the certificate management dialog. To manage certificates for a system, you must start DD
System Manager on that system.
NOTE: DD Boost offers global authentication and encryption options to defend your system against man-in-the-middle
(MITM) attacks. You specify authentication and encryption settings using the GUI, or CLI commands on the protection
system. For details, see the DD Boost for OpenStorage 3.4 Administration Guide, and Adding a DD Boost client on page
210 or the DD OS Command Reference Guide.
Steps
1. Select Protocols > DD Boost > Settings.
2. In the Allowed Clients section, click Create (+).
The Add Allowed Client dialog appears.
6. Click OK.
Steps
1. Select Protocols > DD Boost > Settings.
2. In the Allowed Clients list, select the client to modify.
3. Click the Edit button, which displays a pencil icon.
7. Click OK.
Steps
1. Select Protocols > DD Boost > Settings.
2. Select the client from the list.
3. Click Delete (X).
The Delete Allowed Clients dialog appears.
Related concepts
Active Connections on page 222
Interfaces
IFGROUP supports physical and bonded interfaces.
An IFGROUP interface is a member of a single IFGROUP <group-name> and may consist of:
● Physical interface such as eth0a
● Bonded interface, created for link failover or link aggregation, such as veth1
● Bonded alias interface such as eth0a:2 or veth1:2
● Bonded VLAN interface such as eth0a.1 or veth1.1
● Within an IFGROUP <group-name>, all interfaces must be on unique interfaces (Ethernet, bonded Ethernet) to ensure
failover in the event of network error.
IFGROUP provides full support for static IPv6 addresses, providing the same capabilities for IPv6 as for IPv4. Concurrent IPv4
and IPv6 client connections are allowed. A client connected with IPv6 sees IPv6 IFGROUP interfaces only. A client connected
with IPv4 sees IPv4 IFGROUP interfaces only. Individual IFGROUPs include all IPv4 addresses or all IPv6 addresses.
For more information, see the DD Boost for Partner Integration Administration Guide or the DD Boost for OpenStorage
Administration Guide.
Interface enforcement
IFGROUP lets you enforce private network connectivity, ensuring that a failed job does not reconnect on the public network
after network errors.
When interface enforcement is enabled, a failed job can only retry on an alternative private network IP address. Interface
enforcement is only available for clients that use IFGROUP interfaces.
Interface enforcement is off (FALSE) by default. To enable interface enforcement, you must add the following setting to the
system registry:
system.ENFORCE_IFGROUP_RW=TRUE
After you've made this entry in the registry, you must do a filesys restart for the setting to take effect.
For more information, see the DD Boost for Partner Integration Administration Guide or the DD Boost for OpenStorage
Administration Guide.
Clients
IFGROUP supports various naming formats for clients. Client selection is based on a specified order of precedence.
An IFGROUP client is a member of a single ifgroup <group-name> and may consist of:
● A fully qualified domain name (FQDN) such as ddboost.exampledomain.com
● A partial host, allowing search on the first n characters of the hostname. For example, when n=3, valid formats are
rtp_.*example.com and dur_.*example.com. Five different values of n (1-5) are supported.
● Wild cards such as *.exampledomain.com or "*"
● A short name for the client, such as ddboost
● Client public IP range, such as 128.5.20.0/24
Steps
1. Select Protocols > DD Boost > IP Network.
2. In the Interface Groups section, click Add (+).
3. Enter the interface group name.
4. Select one or more interfaces. A maximum of 32 interfaces can be configured.
NOTE: Depending upon aliasing configurations, some interfaces may not be selectable if they are sharing a physical
interface with another interface in the same group. This is because each interface within the group must be on a
different physical interface to ensure fail-over recovery.
5. Click OK.
6. In the Configured Clients section, click Add (+).
7. Enter a fully qualified client name or *.mydomain.com.
NOTE: The * client is initially available to the default group. The * client may only be a member of one ifgroup.
Steps
1. Select Protocols > DD Boost > IP Network.
2. In the Interface Groups section, select the interface group in the list.
NOTE: If the interface group does not have both clients and interfaces assigned, you cannot enable the group.
Steps
1. Select Protocols > DD Boost > IP Network.
2. In the Interface Groups section, select the interface group in the list.
3. Click Edit (pencil).
4. Retype the name to modify the name.
The group name must be one to 24 characters long and contain only letters, numbers, underscores, and dashes. It cannot be
the same as any other group name and cannot be "default", "yes", "no", or "all."
6. Click OK.
Steps
1. Select Protocols > DD Boost > IP Network.
2. In the Interface Groups section, select the interface group in the list. The default group cannot be deleted.
3. Click Delete (X).
4. Confirm the deletion.
Steps
1. Select Protocols > DD Boost > IP Network.
2. In the Configured Clients section, click Add (+).
3. Enter a name for the client.
Client names must be unique and may consist of:
● FQDN
● *.domain
● Client public IP range:
○ For IPv4, xx.xx.xx.0/24 provides a 24-bit mask against the connecting IP. The /24 represents what bits are
masked when the client's source IP address is evaluated for access to the IFGROUP.
○ For IPv6, xxxx::0/112 provides a 112-bit mask against the connecting IP. The /112 represents what bits are
masked when the client's source IP address is evaluated for access to the IFGROUP.
Client names have a maximum length of 128 characters.
4. Select a previously configured interface group, and click OK.
Steps
1. Select Protocols > DD Boost > IP Network.
2. In the Configured Clients section, select the client.
3. Click Edit (pencil).
4. Type a new client name.
Client names must be unique and may consist of:
● FQDN
● *.domain
● Client public IP range:
○ For IPv4, xx.xx.xx.0/24 provides a 24-bit mask against the connecting IP. The /24 represents what bits are
masked when the client's source IP address is evaluated for access to the IFGROUP.
○ For IPv6, xxxx::0/112 provides a 112-bit mask against the connecting IP. The /112 represents what bits are
masked when the client's source IP address is evaluated for access to the IFGROUP.
Client names have a maximum length of 128 characters.
5. Select a new interface group from the menu.
NOTE: The old interface group is disabled if it has no clients.
6. Click OK.
Steps
1. Select Protocols > DD Boost > IP Network.
2. In the Configured Clients section, select the client.
3. Click Delete (X).
NOTE: If the interface group to which the client belongs has no other clients, the interface group is disabled.
Steps
1. Select Protocols > DD Boost > IP Network.
2. In the Configured Replication Paths section, click Add (+).
3. Enter values for MTree and/or Remote Host.
4. Select a previously configured interface group, and click OK.
Steps
1. Select Protocols > DD Boost > IP Network.
2. In the Configured Replication Paths section, select the replication path.
3. Click Edit (pencil).
4. Modify any or all values for MTree, Remote Host, or Interface Group.
5. Click OK.
Steps
1. Select Protocols > DD Boost > IP Network.
2. In the Configured Replication Paths section, select the replication path.
3. Click Delete (X).
4. In the Delete Replication Path(s) dialog, click OK.
Steps
1. Manually remove (expire) the corresponding backup application catalog entries.
NOTE: If multiple backup applications are using the same protection system, then remove all entries from each of those
applications’ catalogs.
2. Select Protocols > DD Boost > More Tasks > Destroy DD Boost....
3. Enter your administrative credentials when prompted.
4. Click OK.
Prerequisites
● Log in to DD System Manager. For instructions, see "Logging In and Out of DD System Manager."
CLI equivalent
● If you are using the CLI, ensure that the SCSI target daemon is enabled:
# scsitarget enable
Please wait ...
SCSI Target subsystem is enabled.
NOTE: If you are using DD System Manager, the SCSI target daemon is automatically enabled when you enable the DD
Boost-over-FC service (later in this procedure).
● Verify that the DD Boost license is installed. In DD System Manager, select Protocols > DD Boost > Settings. If the Status
indicates that DD Boost is not licensed, click Add License and enter a valid license in the Add License Key dialog box.
CLI equivalents
# elicense show
Steps
1. Select Protocols > DD Boost > Settings.
2. In the Users with DD Boost Access section, specify one or more DD Boost user names.
CLI equivalents
# ddboost enable
Starting DDBOOST, please wait...............
DDBOOST is enabled.
Results
You are now ready to configure the DD Boost-over-FC service.
Configuring DD Boost
After you have added user(s) and enabled DD Boost, you need to enable the Fibre Channel option and specify the DD Boost
Fibre Channel server name. Depending on your application, you may also need to create one or more storage units and install the
DD Boost API/plug-in on media servers that will access the protection system.
Steps
1. Select Protocols > DD Boost > Fibre Channel.
2. Click Enable to enable Fibre Channel transport.
CLI equivalent
3. To change the DD Boost Fibre Channel server name from the default (hostname), click Edit, enter a new server name, and
click OK.
CLI equivalent
4. Select Protocols > DD Boost > Storage Units to create a storage unit (if not already created by the application).
You must create at least one storage unit on the system, and a DD Boost user must be assigned to that storage unit. For
detailed instructions, see "Creating a Storage Unit."
CLI equivalent
Steps
1. Select Hardware > Fibre Channel > Resources > Initiators to verify that initiators are present.
It is recommended that you assign aliases to initiators to reduce confusion during the configuration process.
CLI equivalent
2. To assign an alias to an initiator, select one of the initiators and click the pencil (edit) icon. In the Name field of the Modify
Initiator dialog, enter the alias and click OK.
CLI equivalents
3. On the Resources tab, verify that endpoints are present and enabled.
CLI equivalent
7. Select one or more initiators. Optionally, replace the initiator name by entering a new one. Click Next.
CLI equivalent
An initiator is a port on an HBA attached to a backup client that connects to the system for the purpose of reading and
writing data using the Fibre Channel protocol. The WWPN is the unique World-Wide Port Name of the Fibre Channel port in
the media server.
8. Specify the number of DD Boost devices to be used by the group. This number determines which devices the initiator can
discover and, therefore, the number of I/O paths to the system. The default is one, the minimum is one, and the maximum is
64.
CLI equivalent
See the DD Boost for OpenStorage Administration Guide for the recommended value for different clients.
9. Indicate which endpoints to include in the group: all, none, or select from the list of endpoints. Click Next.
CLI equivalents
When presenting LUNs via attached FC ports on HBAs, ports can be designated as primary, secondary or none. A primary
port for a set of LUNs is the port that is currently advertizing those LUNs to a fabric. A secondary port is a port that will
broadcast a set of LUNs in the event of primary path failure (this requires manual intervention). A setting of none is used in
the case where you do not wish to advertize selected LUNs. The presentation of LUNs is dependent upon the SAN topology.
10. Review the Summary and make any modifications. Click Finish to create the access group, which is displayed in the DD
Boost Access Groups list.
CLI equivalent
NOTE: To change settings for an existing access group, select it from the list and click the pencil icon (Modify).
Related concepts
Working with endpoints on page 261
Working with initiators on page 261
Working with a selected access group on page 258
Related tasks
Selecting endpoints for a device on page 258
Configuring the NDMP device TapeServer group on page 259
Steps
1. Select Protocols > DD Boost > Fibre Channel.
2. Select the group to be deleted from the DD Boost Access Groups list.
NOTE: You cannot delete a group that has initiators assigned to it. Edit the group to remove the initiators first.
Related concepts
Working with a selected access group on page 258
Related tasks
Selecting endpoints for a device on page 258
Configuring the NDMP device TapeServer group on page 259
Settings
Use the Settings tab to enable or disable DD Boost, select clients and users, and specify advanced options.
The Settings tab shows the DD Boost status (Enabled or Disabled). Use the Status button to switch between Enabled or
Disabled.
Under Allowed Clients, select the clients that are to have access to the system. Use the Add, Modify, and Delete buttons to
manage the list of clients.
Under Users with DD Boost Access, select the users that are to have DD Boost access. Use the Add, Change Password,
and Remove buttons to manage the list of users.
Active Connections
Use the Active Connections tab to see information about clients, interfaces, and outbound files.
Fibre Channel
The Fibre Channel tab lists configured DD Boost access groups. Use the Fibre Channel tab to create and delete access groups
and to configure initiators, devices, and endpoints for DD Boost access groups.
Storage Units
Use the Storage Units tab to view, create, modify, and delete storage units.
Select a storage unit to see detailed information about it. Detailed information is available on three tabs:
● Storage Unit tab
NOTE: At present, 16 Gb/s is supported for fabric and point-to-point topologies. Other topologies will present issues.
The KB articles Data Domain: VTL Best Practices Guide and Data Domain: Create a Virtual Tape Library via CLI , available from
the Online Support website, provide additional information.
Planning a DD VTL
The DD VTL (Virtual Tape Library) feature has very specific requirements, such as proper licensing, interface cards, user
permissions, etc. These requirements are listed here, complete with details and recommendations.
● An appropriate DD VTL license.
○ DD VTL is a licensed feature, and you must use NDMP (Network Data Management Protocol) over IP (Internet Protocol)
or DD VTL directly over FC (Fibre Channel).
○ An additional license is required for IBM i systems – the I/OS license.
○ Adding a DD VTL license through the DD System Manager automatically disables and enables the DD VTL feature.
● An installed FC interface card or DD VTL configured to use NDMP.
○ If the DD VTL communication between a backup server and a DD system is through an FC interface, the DD system must
have an FC interface card installed. Notice that whenever an FC interface card is removed from (or changed within) a
DD system, any DD VTL configuration associated with that card must be updated.
○ If the DD VTL communication between a backup server and a DD system is through NDMP, no FC interface card is
required. However, you must configure the TapeServer access group. Also, when using NDMP, all initiator and port
functionality does not apply.
○ The net filter must be configured to allow the NDMP client to send information to the DD system. Run the net filter
add operation allow clients <client-IP-address> command to allow access for the NDMP client.
■ For added security, run the net filter add operation allow clients <client-IP-address>
interfaces <DD-interface-IP-address> command.
■ Add the seq-id 1 option to the command to enforce this rule before any other net filter rules.
● A backup software minimum record (block) size.
○ If possible, set backup software to use a minimum record (block) size of 64 KiB or larger. Larger sizes usually give faster
performance and better data compression.
○ Depending on your backup application, if you change the size after the initial configuration, data written with the original
size might become unreadable.
● Appropriate user access to the system.
○ For basic tape operations and monitoring, only a user login is required.
○ To enable and configure DD VTL services and perform other configuration tasks, a sysadmin login is required.
Related tasks
Configuring the NDMP device TapeServer group on page 259
DD VTL limits
Before setting up or using a DD VTL, review these limits on size, slots, etc.
● I/O Size – The maximum supported I/O size for any DD system using DD VTL is 1 MB.
● Libraries – DD VTL supports a maximum of 64 libraries per DD system (that is, 64 DD VTL instances on each DD system).
● Initiators – DD VTL supports a maximum of 1024 initiators or WWPNs (world-wide port names) per DD system.
● Tape Drives – Information about tape drives is presented in the next section.
● Data Streams – Information about data streams is presented in the following table.
Related concepts
Best practices for data streams sent to DD systems on page 125
Related concepts
Working with access groups on page 254
Related tasks
Creating libraries on page 235
Creating drives on page 245
Tape barcodes
When you create a tape, you must assign a unique barcode (never duplicate barcodes as this can cause unpredictable behavior).
Each barcode consists of eight characters: the first six are numbers or uppercase letters (0-9, A-Z), and the last two are the
tape code for the supported tape type, as shown in the following table.
NOTE: Although a DD VTL barcode consists of eight characters, either six or eight characters may be transmitted to a
backup application, depending on the changer type.
For multiple tape libraries, barcodes are automatically incremented, if the sixth character (just before the "L") is a number. If an
overflow occurs (9 to 0), numbering moves one position to the left. If the next character to increment is a letter, incrementation
stops. Here are a few sample barcodes and how each will be incremented:
● 000000L1 creates tapes of 100 GiB capacity and can accept a count of up to 100,000 tapes (from 000000 to 99999).
● AA0000LA creates tapes of 50 GiB capacity and can accept a count of up to 10,000 tapes (from 0000 to 9999).
● AAAA00LB creates tapes of 30GiB capacity and can accept a count of up to 100 tapes (from 00 to 99).
● AAAAAALC creates one tape of 10 GiB capacity. Only one tape can be created with this name.
● AAA350L1 creates tapes of 100 GiB capacity and can accept a count of up to 650 tapes (from 350 to 999).
● 000AAALA creates one tape of 50 GiB capacity. Only one tape can be created with this name.
Setting up a DD VTL
To set up a simple DD VTL, use the Configuration Wizard, which is described in the Getting Started chapter.
Then, continue with the following topics to enable the DD VTL, create libraries, and create and import tapes.
NOTE: If the deployment environment includes an AS400 system as a DD VTL client, refer to Configuring DD VTL default
options on page 233 to configure the serial number prefix for VTL changers and drives before configuring the DD VTL
relationship between the protection system and the AS400 client system.
Related tasks
Using the system configuration wizard on page 21
Logging In
To use a graphical user interface (GUI) to manage your DD Virtual Tape Library (DD VTL), log in to the DD System Manager.
CLI Equivalent
You can also log in at the CLI:
# scsitarget enable
Please wait ...
SCSI Target subsystem is enabled.
Accessing DD VTL
From the menu at the left of the DD System Manager, select Protocols > VTL.
Status
In the Virtual Tape Libraries > VTL Service area, you can see the status of your DD VTL process is displayed at the top, for
example, Enabled: Running. The first part of the status will be Enabled (on) or Disabled (off). The second part will be one of
the following process states.
CLI Equivalent
You can also verify that the DD VTL license has been installed at the CLI:
# elicense show
## License Key Feature
-- ------------------- -----------
1 DEFA-EFCD-FCDE-CDEF Replication
2 EFCD-FCDE-CDEF-DEFA VTL
-- ------------------- -----------
If the license is not present, each unit comes with documentation – a quick install card – which will show the licenses that have
been purchased. Enter the following command to populate the license key.
Related concepts
Working with access groups on page 254
Working with resources on page 260
Working with pools on page 264
Enabling DD VTL
Enabling DD VTL broadcasts the WWN of the protection system HBA to customer fabric and enables all libraries and library
drives. If a forwarding plan is required in the form of change control processes, this process should be enabled to facilitate
zoning.
Steps
1. Make sure that you have a DD VTL license and that the file system is enabled.
2. Select Virtual Tape Libraries > VTL Service.
3. To the right of the Status area, select Enable.
4. In the Enable Service dialog box, select OK.
5. After DD VTL has been enabled, note that Status will change to Enabled: Running in green. Also note that the configured
DD VTL options are displayed in the Option Defaults area.
CLI Equivalent
# vtl enable
Starting VTL, please wait ...
VTL is enabled.
Steps
1. Select Virtual Tape Libraries > VTL Service.
2. To the right of the Status area, select Disable.
3. In the Disable Service dialog, select OK.
4. After DD VTL has been disabled, notice that the Status has changed to Disabled: Stopped in red.
CLI Equivalent
# vtl disable
Steps
1. Select Virtual Tape Libraries > VTL Service.
2. In the Option Defaults area, select Configure. In the Configure Default Options dialog box, change any of the default
options, and then click OK.
NOTE: To disable all of these service options, select Reset to Factory, and the values will be immediately reset to
factory defaults.
Next steps
If the DD VTL environment contains an AS400 as a DD VTL client, configure the DD VTL option for serial-number-prefix
manually before adding the AS400 to the DD VTL environment. This is required to avoid duplicate serial numbers when there are
multiple protection systems using DD VTL. The serial-number-prefix value must:
● Be a unique six digit value such that no other DD VTL on any system in the environment has the same prefix number
● Not end with a zero
Configure this value only once during the deployment of the system and the configuration of DD VTL. It will persist with any
future DD OS upgrades on the system. Setting this value does not require a DD VTL service restart. Any DD VTL library created
after setting this value will use the new prefix for the serial number.
CLI equivalent
From the More Tasks menu, you can create and delete libraries, as well as search for tapes.
Prerequisites
If the deployment environment includes an AS400 system as a DD VTL client, refer to Configuring DD VTL default options on
page 233 to configure the serial number prefix for VTL changers and drives before creating the DD VTL library and configuring
the DD VTL relationship between the protection system and the AS400 client system.
Steps
1. Select Virtual Tape Libraries > VTL Service > Libraries.
2. Select More Tasks > Library > Create
3. In the Create Library dialog, enter the following information:
4. Select OK.
After the Create Library status dialog shows Completed, select OK.
The new library appears under the Libraries icon in the VTL Service tree, and the options you have configured appear as
icons under the library. Selecting the library displays details about the library in the Information Panel.
Note that access to VTLs and drives is managed with Access Groups.
CLI Equivalent
Deleting libraries
When a tape is in a drive within a library, and that library is deleted, the tape is moved to the vault. However, the tape's pool
does not change.
Steps
1. Select Virtual Tape Libraries > VTL Service > Libraries.
2. Select More Tasks > Library > Delete.
3. In the Delete Libraries dialog, select or confirm the checkbox of the items to delete:
● The name of each library, or
● Library Names, to delete all libraries
4. Select Next.
5. Verify the libraries to delete, and select Submit in the confirmation dialogs.
6. After the Delete Libraries Status dialog shows Completed, select Close. The selected libraries are deleted from the DD
VTL.
CLI Equivalent
Steps
1. Select Virtual Tape Libraries or Pools.
2. Select the area to search (library, vault, pool).
3. Select More Tasks > Tapes > Search.
4. In the Search Tapes dialog, enter information about the tape(s) you want to find.
5. Select Search.
From the More Tasks menu, you can delete, rename, or set options for a library; create, delete, import, export, or move tapes;
and add or delete slots and CAPs.
Related tasks
Deleting libraries on page 236
Creating tapes
You can create tapes in either a library or a pool. If initiated from a pool, the system first creates the tapes, then imports them
to the library.
Steps
1. Select Virtual Tape Libraries > VTL Service > Libraries > library or Vault or Pools > Pools > pool.
2. Select More Tasks > Tapes > Create.
3. In the Create Tapes dialog, enter the following information about the tape:
Related concepts
Tape barcodes on page 229
Steps
1. Select Virtual Tape Libraries > VTL Service > Libraries > library or Vault or Pools > Pools > pool.
2. Select More Tasks > Tapes > Delete.
3. In the Delete Tapes dialog, enter search information about the tapes to delete, and select Search:
4. Select the checkbox of the tape that should be deleted or the checkbox on the heading column to delete all tapes, and
select Next.
5. Select Submit in the confirmation window, and select Close.
NOTE: After a tape is removed, the physical disk space used for the tape is not reclaimed until after a file system
cleaning operation.
CLI Equivalent
NOTE: You can act on ranges; however, if there is a missing tape in the range, the action will stop.
Importing tapes
Importing a tape means that an existing tape will be moved from the vault to a library slot, drive, or cartridge access port (CAP).
Steps
1. You can import tapes using either step a. or step b.
a. Select Virtual Tape Libraries > VTL Service > Libraries > library. Then, select More Tasks > Tapes > Import. In the
Import Tapes dialog, enter search information about the tapes to import, and select Search:
Based on the previous conditions, a default set of tapes is searched to select the tapes to import. If pool, barcode, or
count is changed, select Search to update the set of tapes available from which to choose.
b. Select Virtual Tape Libraries > VTL Service > Libraries > library > Changer > Drives > drive > Tapes. Select tapes
to import by selecting the checkbox next to:
● An individual tape, or
● The Barcode column to select all tapes on the current page, or
● The Select all pages checkbox to select all tapes returned by the search query.
Only tapes showing Vault in the Location can be imported.
Select Import from Vault. This button is disabled by default and enabled only if all of the selected tapes are from the
Vault.
2. From the Import Tapes: library view, verify the summary information and the tape list, and select OK.
3. Select Close in the status window.
CLI Equivalent
Exporting tapes
Exporting a tape removes that tape from a slot, drive, or cartridge-access port (CAP) and sends it to the vault.
Steps
1. You can export tapes using either step a. or step b.
a. Select Virtual Tape Libraries > VTL Service > Libraries > library. Then, select More Tasks > Tapes > Export. In the
Export Tapes dialog, enter search information about the tapes to export, and select Search:
b. Select Virtual Tape Libraries > VTL Service > Libraries > library > Changer > Drives > drive > Tapes. Select tapes
to export by selecting the checkbox next to:
● An individual tape, or
● The Barcode column to select all tapes on the current page, or
● The Select all pages checkbox to select all tapes returned by the search query.
Only tapes with a library name in the Location column can be exported.
Select Export from Library. This button is disabled by default and enabled only if all of the selected tapes have a library
name in the Location column.
2. From the Export Tapes: library view, verify the summary information and the tape list, and select OK.
3. Select Close in the status window.
CLI Equivalent
Steps
1. Select Virtual Tape Libraries > VTL Service > Libraries > library .
Note that when started from a library, the Tapes panel allows tapes to be moved only between devices.
3. In the Move Tape dialog, enter search information about the tapes to move, and select Search:
4. From the search results list, select the tape or tapes to move.
5. Do one of the following:
a. Select the device from the Device list (for example, a slot, drive, or CAP), and enter a starting address using sequential
numbers for the second and subsequent tapes. For each tape to be moved, if the specified address is occupied, the next
available address is used.
b. Leave the address blank if the tape in a drive originally came from a slot and is to be returned to that slot; or if the tape is
to be moved to the next available slot.
6. Select Next.
7. In the Move Tape dialog, verify the summary information and the tape listing, and select Submit.
8. Select Close in the status window.
Adding slots
You can add slots from a configured library to change the number of storage elements.
Related tasks
Configuring the NDMP device TapeServer group on page 259
Deleting slots
You can delete slots from a configured library to change the number of storage elements.
Steps
1. If the slot that you want to delete contains cartridges, move those cartridges to the vault. The system will delete only empty,
uncommitted slots.
2. Select Virtual Tape Libraries > VTL Service > Libraries > library.
3. Select More Tasks > Slots > Delete.
4. In the Delete Slots dialog, enter the Number of Slots to delete.
5. Select OK and Close when the status shows Completed.
Adding CAPs
You can add CAPs (cartridge access ports) from a configured library to change the number of storage elements.
Steps
1. Select Virtual Tape Libraries > VTL Service > Libraries > library.
2. Select More Tasks > CAPs > Add.
3. In the Add CAPs dialog, enter the Number of CAPs to add. You can add from 1 to 100 CAPs per library and from 1 to 1,000
CAPs per system.
4. Select OK and Close when the status shows Completed.
Related tasks
Configuring the NDMP device TapeServer group on page 259
Steps
1. If the CAP that you want to delete contains cartridges, move those cartridges to the vault, or this will be done automatically.
2. Select Virtual Tape Libraries > VTL Service > Libraries > library.
3. Select More Tasks > CAPs > Delete.
4. In the Delete CAPs dialog, enter the Number of CAPs to delete. You can delete a maximum of 100 CAPs per library or 1000
CAPs per system.
5. Select OK and Close when the status shows Completed.
Steps
1. Select Virtual Tape Libraries > VTL Service > Libraries .
2. Select a specific library.
3. If not expanded, select the plus sign (+) on the left to open the library, and select a Changer element to display the Changer
information panel, which provides the following information.
Tape and library drivers – To work with drives, you must use the tape and library drivers supplied by your backup software
vendor that support the IBM LTO-1, IBM LTO-2, IBM LTO-3, IBM LTO-4, IBM LTO-5, IBM LTO-7 (default), HP-LTO-3, or
HP-LTO-4 drives and the StorageTek L180 (default), RESTORER-L180, IBM TS3500, I2000, I6000, or DDVTL libraries. For more
information, see the Application Compatibility Matrices and Integration Guides for your vendors. When configuring drives, also
keep in mind the limits on backup data streams, which are determined by the platform in use.
LTO capacities – Because the DD system treats LTO drives as virtual drives, you can set a maximum capacity to 15 TiB (15000
GiB) for each drive type. The default capacities for each LTO drive type are as follows:
● LTO-1 drive: 100 GiB
● LTO-2 drive: 200 GiB
● LTO-3 drive: 400 GiB
● LTO-4 drive: 800 GiB
● LTO-5 drive: 1.5 TiB (1500 GiB)
● LTO-7 drive: 6 TiB (6000 GiB)
Migrating LTO-1 tapes – You can migrate tapes from existing LTO-1 type VTLs to VTLs that include other supported
LTO-type tapes and drives. The migration options are different for each backup application, so follow the instructions in the LTO
tape migration guide specific to your application. To find the appropriate guide, go to the Online Support Site, and in the search
text box, type in LTO Tape Migration for VTLs.
Tape full: Early warning – You will receive a warning when the remaining tape space is almost completely full, that is, greater
than 99.9, but less than 100 percent. The application can continue writing until the end of the tape to reach 100 percent
capacity.
From the More Tasks menu, you can create or delete a drive.
Creating drives
See the Number of drives supported by a DD VTL section to determine the maximum number of drives supported for your
particular DD VTL.
Steps
1. Select Virtual Tape Libraries > VTL Service > Libraries > library> Changer > Drives.
2. Select More Tasks > Drives > Create.
3. In the Create Drive dialog, enter the following information:
4. Select OK, and when the status shows Completed, select OK.
The added drive appears in the Drives list.
Related concepts
Number of drives supported by a DD VTL on page 228
Related tasks
Configuring the NDMP device TapeServer group on page 259
Deleting drives
A drive must be empty before it can be deleted.
Steps
1. If there is a tape in the drive that you want to delete, remove the tape.
2. Select Virtual Tape Libraries > VTL Service > Libraries > library > Changer > Drives.
3. Select More Tasks > Drives > Delete.
4. In the Delete Drives dialog, select the checkboxes of the drives to delete, or select the Drive checkbox to delete all drives.
5. Select Next, and after verifying that the correct drive(s) has been selected for deletion, select Submit.
6. When the Delete Drive Status dialog shows Completed, select Close.
The drive will have been removed from the Drives list.
From the More Tasks menu, you can delete the drive or perform a refresh.
Related tasks
Deleting drives on page 246
From the information panel, you can import a tape from the vault, export a tape to the library, set a tape's state, create a tape,
or delete a tape.
From the More Tasks menu, you can move a tape.
Steps
1. Select Virtual Tape Libraries > VTL Service > Libraries > library > Tapes.
2. Select the tape to modify from the list, and select Set State (above the list).
3. In the Set Tape State dialog, select Read-Writeable, Write-Protected, or Retention-Lock.
4. If the state is Retention-Lock, either
● enter the tape’s expiration date in a specified number of days, weeks, months, years, or
● select the calendar icon, and select a date from the calendar. The Retention-Lock expires at noon on the selected date.
5. Select Next, and select Submit to change the state.
NOTE: This table only appears if Cloud Tier is enabled on the protection system.
Related tasks
Creating tapes on page 238
Deleting tapes on page 239
Searching for tapes on page 237
Steps
1. Select Protocols > DD VTL.
2. Expand the list of pools, and select a pool on which to enable migration to Cloud Tier.
3. In the Cloud Data Movement pane, click Create under Cloud Data Movement Policy.
4. In the Policy drop-down list, select a data movement policy:
● Age of tapes in days
● Manual selection
5. Set the data movement policy details.
● For Age of tapes in days, select an age threshold after which tapes are migrated to Cloud Tier, and specify a
destination cloud unit.
● For Manual selection, specify a destination cloud unit.
CLI equivalent
Steps
1. Set the data movement policy to user-managed or age-threshold
NOTE: VTL pool and cloud unit names are case sensitive and commands will fail if the case is not correct.
● To set the data movement policy to user-managed, run the following command: vtl pool modify cloud-vtl-
pool data-movement-policy user-managed to-tier cloud cloud-unit ecs-unit1
** Any tapes that are already selected will be migrated on the next data-movement
run.
VTL data-movement policy is set to "user-managed" for VTL pool "cloud-vtl-pool".
● To set the data movement policy to age-threshold, run the following command:
NOTE: The minimum is 14 days, and the maximum is 182,250 days.
** Any tapes that are already selected will be migrated on the next data-movement
run.
VTL data-movement policy "age-threshold" is set to 14 days for the VTL pool "cloud-
vtl-pool".
2. Verify the data movement policy for the VTL pool.
Run the following command: vtl pool show all
VTL Pools
Pool Status Tapes Size (GiB) Used (GiB) Comp Cloud Unit
Cloud Policy
--------------------- ------ ----- ---------- ---------- ---- ----------
------------
cloud-vtl-pool RW 50 250 41 45x ecs-unit1
user-managed
Default RW 0 0 0 0x -
none
--------------------- ------ ----- ---------- ---------- ---- ----------
------------
8080 tapes in 5 pools
RO : Read Only
RD : Replication Destination
BCM : Backwards-Compatibility
3. Verify the policy for the VTL pool MTree is app-managed.
Run the following command: data-movement policy show all
Prerequisites
Verify the backup application is aware of status changes for volumes moved to cloud storage. Complete the necessary steps for
the backup application to refresh its inventory to reflect the latest volume status.
If the tape is not in the vault, it cannot be migrated to Cloud Tier.
Steps
1. Select Protocols > DD VTL.
2. Expand the list of pools, and select the pool which is configured to migrate tapes to Cloud Tier.
3. In the pool pane, click the Tape tab.
4. Select tapes for migration to Cloud Tier.
5. Click Select for Cloud Move to migrate the tape at the next scheduled migration, or Move to Cloud Now to immediately
migrate the tape.
NOTE: If the data movement policy is based on tape ages, the Select for Cloud Move is not available, as the
protection system automatically selects tapes for migration.
Steps
1. Select Protocols > DD VTL.
2. Expand the list of pools, and select the pool which is configured to migrate tapes to Cloud Tier.
3. In the pool pane, click the Tape tab.
4. Select tapes for migration to Cloud Tier.
5. Click Unselect Cloud Move to remove the tape from the migration schedule.
6. Click Yes at the confirmation dialog.
CLI equivalent
Steps
1. Identify the slot location of the tape volume to move.
Run the following command: vtl tape show cloud-vtl
Processing tapes....
Barcode Pool Location State Size Used (%) Comp
Modification Time
-------- -------------- ----------------- ----- ----- ---------------- ----
-------------------
T00001L3 cloud-vtl-pool cloud-vtl slot 1 RW 5 GiB 5.0 GiB (99.07%) 205x
2017/05/05 10:43:43
T00002L3 cloud-vtl-pool cloud-vtl slot 2 RW 5 GiB 5.0 GiB (99.07%) 36x
2017/05/05 10:45:10
T00003L3 cloud-vtl-pool cloud-vtl slot 3 RW 5 GiB 5.0 GiB (99.07%) 73x
2017/05/05 10:45:26
5. View the list of tapes scheduled to move to cloud storage during the next data movement operation. The tapes selected for
movement display an (S) in the location column.
Run the following command: vtl tape show vault
Processing tapes.....
Barcode Pool Location State Size Used (%) Comp
Modification Time
-------- ----------------- --------- ------ ------ ---------------- ----
-------------------
T00003L3 cloud-vtl-pool vault (S) RW 5 GiB 5.0 GiB (99.07%) 63x
2017/05/05 10:43:43
T00006L3 cloud-vtl-pool ecs-unit1 n/a 5 GiB 5.0 GiB (99.07%) 62x
2017/05/05 10:45:49
-------- ----------------- --------- ------ ------ ---------------- ----
-------------------
* RD : Replication Destination
(S) Tape selected for migration to cloud. Selected tapes will move to cloud on the next
data-movement run.
(R) Recall operation is in progress for the tape.
Processing tapes.....
Barcode Pool Location State Size Used (%) Comp Modification Time
-------- -------------- --------- ----- ----- ---------------- ---- -------------------
T00001L3 cloud-vtl-pool ecs-unit1 n/a 5 GiB 5.0 GiB (99.07%) 89x 2017/05/05 10:41:41
T00006L3 cloud-vtl-pool ecs-unit1 n/a 5 GiB 5.0 GiB (99.07%) 62x 2017/05/05 10:45:49
-------- -------------- --------- ----- ----- ---------------- ---- -------------------
(S) Tape selected for migration to cloud. Selected tapes will move to cloud on the next
data-movement run.
(R) Recall operation is in progress for the tape.
Steps
1. Select Protocols > DD VTL.
2. Expand the list of pools, and select the pool which is configured to migrate tapes to Cloud Tier.
3. In the pool pane, click the Tape tab.
4. Select one or more tapes that are located in a cloud unit.
5. Click Recall Cloud Tapes to recall tapes from Cloud Tier.
Results
After the next scheduled data migration, the tapes are recalled from the cloud unit to the vault. From the vault, the tapes can
be returned to a library.
CLI equivalent
Steps
1. Identify the volume required to restore data.
2. Recall the tape volume from the vault.
Run the following command: vtl tape recall start barcode T00001L3 count 1 pool cloud-vtl-pool
3. Verify the recall operation started.
Run the following command: data-movement status
4. Verify the recall operation completed successfully.
Run the following command: vtl tape show all barcode T00001L3
Processing tapes....
Barcode Pool Location State Size Used (%) Comp
Modification Time
-------- -------------- ---------------- ----- ----- ---------------- ----
-------------------
T00001L3 cloud-vtl-pool cloud-vtl slot 1 RW 5 GiB 5.0 GiB (99.07%) 239x
2017/05/05 10:41:41
-------- -------------- ---------------- ----- ----- ---------------- ----
-------------------
(S) Tape selected for migration to cloud. Selected tapes will move to cloud on the next
data-movement run.
(R) Recall operation is in progress for the tape.
If you select View All Access Groups, you are taken to the Fibre Channel view.
From the More Tasks menu, you can create or delete a group.
Related concepts
Fibre Channel view on page 191
Managing a DD VTL on page 231
Related tasks
Verifying connectivity and creating access groups on page 219
Configuring the NDMP device TapeServer group on page 259
Steps
1. Select Access Groups > Groups.
2. Select More Tasks > Group > Create
3. In the Create Access Group dialog, enter a name, from 1 to 128 characters, and select Next.
4. Add devices, and select Next.
5. Review the summary, and select Finish or Back, as appropriate.
CLI Equivalent
Steps
1. Select Access Groups > Groups. You can also select a specific group.
2. Select More Tasks > Group > Create or Group > Configure.
3. In the Create or Modify Access Group dialog, enter or modify the Group Name if desired. (This field is required.)
4. To configure initiators to the access group, check the box next to the initiator. You can add initiators to the group later.
5. Select Next.
6. In the Devices display, select Add (+) to display the Add Devices dialog.
a. Verify that the correct library is selected in the Library Name drop-down list, or select another library.
b. In the Device area, select the checkboxes of the devices (changer and drives) to be included in the group.
c. Optionally, specify a starting LUN in the LUN Start Address text box.
This is the LUN that the DD system returns to the initiator. Each device is uniquely identified by the library and the device
name. (For example, it is possible to have drive 1 in Library 1 and drive 1 in Library 2). Therefore, a LUN is associated with
a device, which is identified by its library and device name.
When presenting LUNs via attached FC ports on FC HBA/SLIC, ports can be designated as primary, secondary, or none.
A Primary port for a set of LUNs is the port that is currently advertizing those LUNs to a fabric. A secondary port is a
port that will broadcast a set of LUNs in the event of primary path failure (this requires manual intervention). A setting
of none is used in the case where you do not wish to advertize selected LUNs. The presentation of LUNs depends on the
SAN topology in question.
The initiators in the access group interact with the LUN devices that are added to the group.
The maximum LUN accepted when creating an access group is 16383.
A LUN can be used only once for an individual group. The same LUN can be used with multiple groups.
Some initiators (clients) have specific rules for target LUN numbering; for example, requiring LUN 0 or requiring
contiguous LUNs. If these rules are not followed, an initiator may not be able to access some or all of the LUNs assigned
to a DD VTL target port.
Check your initiator documentation for special rules, and if necessary, alter the device LUNs on the DD VTL target port
to follow the rules. For example, if an initiator requires LUN 0 to be assigned on the DD VTL target port, check the LUNs
for devices assigned to ports, and if there is no device assigned to LUN 0, change the LUN of a device so it is assigned to
LUN 0.
d. In the Primary and Secondary Endpoints area, select an option to determine from which ports the selected device will be
seen. The following conditions apply for designated ports:
● all – The checked device is seen from all ports.
The switchover to a secondary port is not an automatic operation. You must manually switch the DD VTL device to the
secondary ports if the primary ports become unavailable.
The port list is a list of physical port numbers. A port number denotes the PCI slot and a letter denotes the port on a PCI
card. Examples are 1a, 1b, or 2a, 2b.
A drive appears with the same LUN on all the ports that you have configured.
e. Select OK.
You are returned to the Devices dialog box where the new group is listed. To add more devices, repeat these five
substeps.
7. Select Next.
8. Select Close when the Completed status message is displayed.
CLI Equivalent
# vtl group add VTL_Group vtl NewVTL changer lun 0 primary-port all secondary-port all
# vtl group add VTL_Group vtl NewVTL drive 1 lun 1 primary-port all secondary-port all
# vtl group add SetUp_Test vtl SetUp_Test drive 3 lun 3 primary-port endpoint-fc-0
secondary-port endpoint-fc-1
Initiators:
Initiator Alias Initiator WWPN
--------------- -----------------------
tsm6_p23 21:00:00:24:ff:31:ce:f8
--------------- -----------------------
Devices:
Device Name LUN Primary Ports Secondary Ports In-use Ports
------------------ --- ------------- --------------- -------------
SetUp_Test changer 0 all all all
SetUp_Test drive 1 1 all all all
SetUp_Test drive 2 2 5a 5b 5a
SetUp_Test drive 3 3 endpoint-fc-0 endpoint-fc-1 endpoint-fc-0
------------------ --- ------------- --------------- -------------
Related concepts
Working with initiators on page 261
Working with resources on page 260
Related tasks
Verifying connectivity and creating access groups on page 219
Configuring the NDMP device TapeServer group on page 259
Steps
1. Select Protocols > VTL > Access Groups > Groups > group.
2. Select More Tasks > Group > Configure.
d. In the Primary and Secondary Ports area, change the option that determines the ports from which the selected device is
seen. The following conditions apply for designated ports:
● all – The checked device is seen from all ports.
● none – The checked device is not seen from any port.
● select – The checked device is seen from selected ports. Select the checkboxes of the ports from which it will be
seen.
If only primary ports are selected, the checked device is visible only from primary ports.
If only secondary ports are selected, the checked device is visible only from secondary ports. Secondary ports can be
used if primary ports become unavailable.
The switchover to a secondary port is not an automatic operation. You must manually switch the DD VTL device to the
secondary ports if the primary ports become unavailable.
The port list is a list of physical port numbers. A port number denotes the PCI slot, and a letter denotes the port on a PCI
card. Examples are 1a, 1b, or 2a, 2b.
A drive appears with the same LUN on all ports that you have configured.
e. Select OK.
Related concepts
Working with resources on page 260
Related tasks
Deleting an access group on page 257
Verifying connectivity and creating access groups on page 219
Steps
1. Remove all of the initiators and LUNs from the group.
2. Select Access Groups > Groups.
CLI Equivalent
Related tasks
Modifying or deleting an access group device on page 256
From the More Tasks menu, with a group selected, you can configure that group, or set endpoints in use.
Related tasks
Verifying connectivity and creating access groups on page 219
Deleting access groups on page 221
Selecting endpoints for a device on page 258
Steps
1. Select Access Groups > Groups > group.
2. Select More Tasks > Endpoints > Set In-Use.
3. In the Set in-Use Endpoints dialog, select only specific devices, or select Devices to select all devices in the list.
Related tasks
Verifying connectivity and creating access groups on page 219
Deleting access groups on page 221
Steps
1. Add tape drives to a new or existing library (in this example, named "dd9900-16").
2. Create slots and CAPs for the library.
3. Add the created devices in a library (in this example, "dd9900-16") to the TapeServer access group.
4. Enable the NDMP daemon by entering at the command line:
# ndmpd enable
Starting NDMP daemon, please wait...............
NDMP daemon is enabled.
5. Ensure that the NDMP daemon sees the devices in the TapeServer group:
Results
NDMP is now configured, and the TapeServer access group shows the device configuration. See the ndmpd chapter of the DD
OS Command Reference Guide for the complete command set and options.
Related tasks
Creating drives on page 245
Adding slots on page 242
Adding CAPs on page 243
Adding an access group device on page 255
Verifying connectivity and creating access groups on page 219
Deleting access groups on page 221
Configure Resources
Selecting Configure Resources takes you to the Fibre Channel area, where you can configure endpoints and initiators.
Related concepts
Fibre Channel view on page 191
Selecting Configure Initiators takes you to the Fibre Channel area, where you can configure endpoints and initiators.
CLI Equivalent
# vtl initiator show
Initiator Group Status WWNN WWPN Port
--------- --------- ------ ----------------------- ----------------------- ----
tsm6_p1 tsm3500_a Online 20:00:00:24:ff:31:ce:f8 21:00:00:24:ff:31:ce:f8 10b
--------- --------- ------ ----------------------- ----------------------- ----
Related concepts
Fibre Channel view on page 191
Configure Endpoints
Selecting Configure Endpoints takes you to the Fibre Channel area, where you can change any of the above information for
the endpoint.
CLI Equivalent
# scsitarget endpoint show list
Endpoint System Address Transport Enabled Status
-------- -------------- --------- ------- ------
endpoint-fc-0 5a FibreChannel Yes Online
endpoint-fc-1 5b FibreChannel Yes Online
From the More Tasks menu, you can create and delete pools, as well as search for tapes.
Related concepts
Managing a DD VTL on page 231
Related tasks
Deleting pools on page 265
Creating pools
You can create backward-compatible pools, if necessary for your setup, for example, for replication with a pre-5.2 DD OS
system.
Steps
1. Select Pools > Pools.
2. Select More Tasks > Pool > Create.
3. In the Create Pool dialog, enter a Pool Name, noting that a pool name:
● cannot be "all," "vault," or "summary."
● cannot have a space or period at its beginning or end.
● is case-sensitive.
4. If you want to create a directory pool (which is backward compatible with the previous version of DD System Manager),
select the option "Create a directory backwards compatibility mode pool. " However, be aware that the advantages of using
an MTree pool include the ability to:
● make individual snapshots and schedule snapshots.
● apply retention locks.
● set an individual retention policy.
● get compression information.
● get data migration policies to the Retention Tier.
● establish a storage space usage policy (quota support) by setting hard limits and soft limits.
5. Select OK to display the Create Pool Status dialog.
6. When the Create Pool Status dialog shows Completed, select Close. The pool is added to the Pools subtree, and you can
now add virtual tapes to it.
CLI Equivalent
Deleting pools
Before a pool can be deleted, you must have deleted any tapes contained within it. If replication is configured for the pool, the
replication pair must also be deleted. Deleting a pool corresponds to renaming the MTree and then deleting it, which occurs at
the next cleaning process.
Steps
1. Select Pools > Pools > pool .
2. Select More Tasks > Pool > Delete.
3. In the Delete Pools dialog, select the checkbox of items to delete:
● The name of each pool, or
● Pool Names, to delete all pools.
4. Select Submit in the confirmation dialogs.
5. When the Delete Pool Status dialog shows Completed, select Close.
The pool will have been removed from the Pools subtree.
Pool tab
Table 80. Summary
Item Description
Convert to MTree Pool Select this button to convert a Directory pool to an MTree pool.
Type Whether it is a Directory or MTree pool.
Tape Count The number of tapes in the pool.
Capacity The total configured data capacity of tapes in the pool, in GiB (Gibibytes, base-2
equivalent of GB, Gigabytes).
Logical Used The amount of space used on virtual tapes in the pool.
Compression The average amount of compression achieved for data on tapes in the pool.
Table 82. Pool Tab: Cloud Data Movement - Cloud Data Movement Policy
Item Description
Policy Age of tapes in days, or manual selection.
Older Than Age threshold for an age-based data movement policy.
Cloud Unit Destination cloud unit.
Tape tab
Table 83. Tape controls
Item Description
Create Create a new tape.
Delete Delete the selected tapes.
Copy Make a copy of a tape.
Move between Pool Move the selected tapes to a different pool.
Select for Cloud Move a Schedule the selected tapes for migration to Cloud Tier.
Unselect from Cloud Move a Remove the selected tapes from the schedule for migration to Cloud Tier.
Recall Cloud Tapes Recall the selected tapes from Cloud Tier.
Move to Cloud Now Migrate the selected tapes to Cloud Tier without waiting for the next scheduled
migration.
a. This option is only available if the data movement policy is configured for manual selection.
Replication tab
Table 85. Replication
Item Description
Name The name of the pool.
Configured Whether replication is configured for this pool: yes or no.
Remote Source Contains an entry only if the pool is replicated from another DD system.
Remote Destination Contains an entry only if the pool replicates to another DD system.
You can also select the Replication Detail button, at the top right, to go directly to the Replication information panel for the
selected pool.
From either the Virtual Tape Libraries or Pools area, from the More Tasks menu, you can create, delete, move, copy, or search
for a tape in the pool.
From the Pools area, from the More Tasks menu, you can rename or delete a pool.
Related tasks
Creating tapes on page 238
Deleting tapes on page 239
Searching for tapes on page 237
Creating an MTree, directory, or pool replication pair on page 286
Viewing estimated completion time for backup jobs on page 295
Steps
1. Make sure the following prerequisites have been met:
● The source and destination pools must have been synchronized, so that the number of tapes, and the data on each side,
remains intact.
● The directory pool must not be a replication source or destination.
● The file system must not be full.
● The file system must not have reached the maximum number of MTrees allowed (100).
● There must not already be an MTree with the same name.
Steps
1. With a pool highlighted, select More Tasks > Tapes > Move.
Note that when started from a pool, the Tapes Panel allows tapes to be moved only between pools.
2. In the Move Tapes dialog, enter information to search for the tapes to move, and select Search:
Steps
1. With a pool highlighted, select More Tasks > Tapes > Copy.
2. In the Copy Tapes Between Pools dialog. select the checkboxes of tapes to copy, or enter information to search for the
tapes to copy, and select Search:
Renaming pools
A pool can be renamed only if none of its tapes is in a library.
Steps
1. Select Pools > Pools > pool .
2. Select More Tasks > Pool > Rename.
3. In the Rename Pool dialog, enter the new Pool Name, with the caveat that this name:
● cannot be "all," "vault," or "summary."
● cannot have a space or period at its beginning or end.
● is case-sensitive.
4. Select OK to display the Rename Pool status dialog.
5. After the Rename Pool status dialog shows Completed, select OK.
The pool will have been renamed in the Pools subtree in both the Pools and the Virtual Tape Libraries areas.
DD Replicator overview
DD Replicator provides automated, policy-based, network-efficient, and encrypted replication for DR (disaster recovery) and
multi-site backup and archive consolidation. DD Replicator asynchronously replicates only compressed, deduplicated data over a
WAN (wide area network).
DD Replicator performs two levels of deduplication to significantly reduce bandwidth requirements: local and cross-site
deduplication. Local deduplication determines the unique segments to be replicated over a WAN. Cross-site deduplication
further reduces bandwidth requirements when multiple sites are replicating to the same destination system. With cross-site
deduplication, any redundant segment previously transferred by any other site, or as a result of a local backup or archive, will not
be replicated again. This improves network efficiency across all sites and reduces daily network bandwidth requirements up to
99%, making network-based replication fast, reliable, and cost-effective.
In order to meet a broad set of DR requirements, DD Replicator provides flexible replication topologies, such as full system
mirroring, bi-directional, many-to-one, one-to-many, and cascaded. In addition, you can choose to replicate either all or a subset
of the data on your DD system. For the highest level of security, DD Replicator can encrypt data being replicated between DD
systems using the standard SSL (Secure Socket Layer) protocol.
DD Replicator scales performance and supported fan-in ratios to support large enterprise environments.
Before getting started with DD Replicator, note the following general requirements:
● DD Replicator is a licensed product. See your Dell EMC sales representative to purchase licenses.
● You can usually replicate between machines that are within five releases of each other, for example, from 6.0 to 7.2.
However, there may be exceptions to this, so review the tables in the Replication version compatibility section, or check
with your Dell EMC representative.
● If you are unable to manage and monitor DD Replicator from the current version of the DD System Manager, use the
replication commands described in the DD OS Command Reference Guide.
Related concepts
Replication version compatibility on page 273
270 DD Replicator
Prerequisites for replication configuration
Before configuring a replication, review the following prerequisites to minimize initial data transfer time, prevent overwriting of
data, etc.
● Contexts – Determine the maximum number of contexts for your DD systems by reviewing the replication streams numbers
in the following table.
DD Replicator 271
Table 88. Data streams sent to a protection system (continued)
Model RAM / Backup Backup Repl a Repl a dest Mixed
NVRAM write read source streams
streams streams streams
ReplDest+w<=90; w+r+ReplSrc
<=90;Total<=90
DD VE 48 TB 36 GB / 1 GB 90 50 90 90 w<= 90 ; r<= 50
ReplSrc<=90; ReplDest<=90;
ReplDest+w<=90; w+r+ReplSrc
<=90;Total<=90
DD VE 64 TB 48 GB / 1 GB 90 50 90 90 w<= 90 ; r<= 50
ReplSrc<=90; ReplDest<=90;
ReplDest+w<=90; w+r+ReplSrc
<=90;Total<=90
DD VE 96 TB 64 GB / 2 GB 180 50 90 180 w<= 180 ; r<= 50
ReplSrc<=90; ReplDest<=180;
ReplDest+w<=180; w+r+ReplSrc
<=180;Total<=180
DD3300 4 TB 12 GB (virtual 20 16 30 20 w<= 20 ; r<= 16
memory) / 512 ReplSrc<=30; ReplDest<=20;
MB ReplDest+w<=20; w+r+ReplSrc
<=30;Total<=30
DD3300 8 TB 32 GB (virtual 90 50 90 90 w<= 90 ; r<= 50
memory) / ReplSrc<=90; ReplDest<=90;
1.536 GB ReplDest+w<=90; w+r+ReplSrc
<=90;Total<=90
DD3300 16 TB 32 GB (virtual 90 50 90 90 w<= 90 ; r<= 50
memory) / ReplSrc<=90; ReplDest<=90;
1.536 GB ReplDest+w<=90; w+r+ReplSrc
<=90;Total<=90
DD3300 32 TB 46 GB (virtual 90 50 90 90 w<= 90 ; r<= 50
memory) / ReplSrc<=90; ReplDest<=90;
1.536 GB ReplDest+w<=90; w+r+ReplSrc
<=90;Total<=140
272 DD Replicator
Replication version compatibility
To use DD systems running different versions of DD OS for a source or destination, the following tables provide compatibility
information for single-node, DD Retention Lock, MTree, directory, collection, delta (low bandwidth optimization), and cascaded
replication.
In general:
● For DD Boost or DD Boost OST, see the DD Boost for Partner Integration Administration Guide or the DD Boost for
OpenStorage Administration Guide for supported configurations.
● MTree and directory replication cannot be used simultaneously for replicating the same data.
● The recovery procedure is valid for all supported replication configurations.
● File migration is supported whenever collection replication is supported.
● For MTree replication, directory replication, or managed file replication, if a DD OS 7.2 source is configured to replicate to a
target running DD OS 6.2 with gz or gzfast compression, the target system must be upgraded to DD OS 6.2.0.35 or higher.
● For collection replication, the source and destination systems must be on the same release. There is no compatibility
between release families for collection replication.
● For MTree replication from a source DD system running DD OS 6.0 to a target DD system running an earlier version of DD
OS, the replication process behaves according to the older version of DD OS on the destination DD system. If a restore
operation or cascade replication is performed from the destination DD system, no virtual synthetics are applied.
● For cascaded configurations, the maximum number of hops is two, that is, three DD systems.
Directory-to-MTree migration supports backward compatibility up to two previous releases. See Directory-to-MTree
replication migration on page 297 for more information about directory-to-Mtree-migration.
● One-to-many, many-to-one, and cascaded replication support up to three consecutive DD OS release families, as seen in
these figures.
In these tables:
● Each DD OS release includes all releases in that family, for example, DD OS 7.1 includes 7.1.0.5, 7.1.0.10, etc.
● c = collection replication
● dir = directory replication
● m = MTree replication and MFR
● del = delta (low bandwidth optimization) replication
● dest = destination
● src = source
● NA = not applicable
DD Replicator 273
Table 89. Configuration: single-node to single-node
src/dest 6.0 (dest) 6.1 (dest) 6.2 (dest) 7.0 (dest) 7.1 (dest) 7.2 (dest)
6.0 (src) c, dir, del, m dir, del, m dir, del, m m m m
6.1 (src) dir, del, m c, dir, del, m dir, del, m dir, del, m m m
6.2 (src) dir, del, m dir, del, m c, dir, del, m dir, del, m dir, del, m m
7.0 (src) m dir, del, m dir, del, m c, dir, del, m dir, del, m dir, del, m
7.1 (src) m m dir, del, m dir, del, m c, dir, del, m dir, del, m
7.2 (src) m m m dir, del, m dir, del, m c, dir, del, m
Replication types
Replication typically consists of a source DD system (which receives data from a backup system) and one or more destination
DD systems. Each DD system can be the source and/or the destination for replication contexts. During replication, each DD
system can perform normal backup and restore operations.
Each replication type establishes a context associated with an existing directory or MTree on the source. The replicated context
is created on the destination when a context is established. The context establishes a replication pair, which is always active,
and any data landing in the source will be copied to the destination at the earliest opportunity. Paths configured in replication
contexts are absolute references and do not change based on the system in which they are configured.
A protection system can be set up for directory, collection, or MTree replication.
● Directory replication provides replication at the level of individual directories.
● Collection replication duplicates the entire data store on the source and transfers that to the destination, and the replicated
volume is read-only.
● MTree replication replicates entire MTrees (that is, a virtual file structure that enables advanced management). Media
pools can also be replicated, and by default, an MTree is created for replication. (A media pool can also be created in
backward-compatibility mode that, when replicated, will be a directory replication context.)
For any replication type, note the following requirements:
● A destination system must have available storage capacity that is at least the size of the expected maximum size of the
source directory. Be sure that the destination system has enough network bandwidth and disk space to handle all traffic
from replication sources.
● The file system must be enabled or, based on the replication type, will be enabled as part of the replication initialization.
● The source must exist.
● The destination must not exist.
● The destination will be created when a context is built and initialized.
● After replication is initialized, ownership and permissions of the destination are always identical to those of the source.
● In the replication command options, a specific replication pair is always identified by the destination.
● Both systems must have an active, visible route through the IP network so that each system can resolve its partner's host
name.
The choice of replication type depends on your specific needs. The next sections provide descriptions and features of these
three types, plus a brief introduction to Managed File Replication, which is used by DD Boost.
274 DD Replicator
Managed file replication
Managed file replication, which is used by DD Boost, is a type of replication that is managed and controlled by backup software.
With managed file replication, backup images are directly transferred from one DD system to another, one at a time, at the
request of the backup software.
The backup software keeps track of all copies, allowing easy monitoring of replication status and recovery from multiple copies.
Managed file replication offers flexible replication topologies including full system mirroring, bi-directional, many-to-one, one-to-
many, and cascaded, enabling efficient cross-site deduplication.
Here are some additional points to consider about managed file replication:
● Replication contexts do not need to be configured.
● Lifecycle polices control replication of information with no intervention from the user.
● DD Boost will build and tear down contexts as needed on the fly.
For more information, see the ddboost file-replication commands in the DD OS Command Reference Guide.
Directory replication
Directory replication transfers deduplicated data within a DD file system directory configured as a replication source to a
directory configured as a replication destination on a different system.
With directory replication, a DD system can simultaneously be the source of some replication contexts and the destination of
other contexts. And that DD system can also receive data from backup and archive applications while it is replicating data.
Directory replication has the same flexible network deployment topologies and cross-site deduplication effects as managed file
replication (the type used by DD Boost).
Here are some additional points to consider when using directory replication:
● Do not mix CIFS and NFS data within the same directory. A single destination DD system can receive backups from both
CIFS clients and NFS clients as long as separate directories are used for CIFS and NFS.
● Any directory can be in only one context at a time. A parent directory may not be used in a replication context if a child
directory of that parent is already being replicated.
● Renaming (moving) files or tapes into or out of a directory replication source directory is not permitted. Renaming files or
tapes within a directory replication source directory is permitted.
● A destination DD system must have available storage capacity of at least the post-compressed size of the expected
maximum post-compressed size of the source directory.
● When replication is initialized, a destination directory is created automatically.
● After replication is initialized, ownership and permissions of the destination directory are always identical to those of the
source directory. As long as the context exists, the destination directory is kept in a read-only state and can receive data
only from the source directory.
● At any time, due to differences in global compression, the source and destination directory can differ in size.
DD Replicator 275
for the manner in which it will rest – not in manner with which it will replicate. Keep this in mind when altering a backup
environment.
MTree replication
MTree replication is used to replicate MTrees between DD systems. Periodic snapshots are created on the source, and the
differences between them are transferred to the destination by leveraging the same cross-site deduplication mechanism used
for directory replication. This ensures that the data on the destination is always a point-in-time copy of the source, with file
consistency. This also reduces replication of churn in the data, leading to more efficient utilization of the WAN.
While directory replication must replicate every change to the content of the source directory in order, the use of snapshots
with MTree replication enables some intermediate changes to the source to be skipped. Skipping these changes further reduces
the amount of data that is sent over the network, and therefore reduces replication lag.
With MTree replication, a DD system can be simultaneously the source of some replication contexts and the destination of other
contexts. And that DD system can also receive data from backup and archive applications while it is replicating data.
MTree replication has the same flexible network deployment topologies and cross-site deduplication effects as managed file
replication (the type used by DD Boost).
Here are some additional points to consider when using MTree replication:
● When replication is initialized, a destination read-only MTree is created automatically.
● Data can be logically separated into multiple MTrees to promote greater replication performance.
● Snapshots must be created on source contexts.
● Snapshots cannot be created on a replication destination.
● Snapshots are replicated with a fixed retention of one year; however, the retention is adjustable on the destination and must
be adjusted there.
● Snapshots are not automatically deleted after breaking a replication context, and must be expired when they are no longer
required to prevent the system from filling up. The following KB articles, available from the Online Support website, provide
more information:
○ Data Domain - Checking for Snapshots that are No Longer Needed .
○ Data Domain - Identifying Why a DDR is Filling Up .
○ Data Domain - Mtree_replication_resync_Snapshot_retention .
● Replication contexts must be configured on both the source and the destination.
● Replicating DD VTL tape cartridges (or pools) simply means replicating MTrees or directories that contain DD VTL
tape cartridges. Media pools are replicated by MTree replication, as a default. A media pool can be created in backward-
compatibility mode and can then be replicated via directory-based replication. You cannot use the pool:// syntax to create
replication contexts using the command line. When specifying pool-based replication in DD System Manager, either directory
or MTree replication will be created, based on the media pool type.
● Replicating directories under an MTree is not permitted.
● A destination DD system must have available storage capacity of at least the post-compressed size of the expected
maximum post-compressed size of the source MTree.
● After replication is initialized, ownership and permissions of the destination MTree are always identical to those of the source
MTree. If the context is configured, the destination MTree is kept in a read-only state and can receive data only from the
source MTree.
● At any time, due to differences in global compression, the source and destination MTree can differ in size.
● DD Retention Lock Compliance is supported with MTree replication, by default. If DD Retention Lock is licensed on a source,
the destination must also have a DD Retention Lock license, or replication will fail. (To avoid this situation, you must disable
DD Retention Lock.) If DD Retention Lock is enabled on a replication context, a replicated destination context will always
contain data that is retention locked.
● DD Boost users should have the same user ID (UID) and primary group ID (GID) on both the source and destination systems.
276 DD Replicator
These steps are repeated any time a snapshot is created on the source MTree. The following situations trigger the creation of a
snapshot on the source system:
● System–generated periodic snapshot—When the replication lag is more than 15 minutes and there is no snapshot being
currently replicated.
● User–created snapshot—At a time specified by the user, such as after the completion of a backup job.
For examples showing the interaction of different types of snapshots, see the KB article How MTree Replication Works,
available from the Online Support website.
After the snapshot is replicated, the connection to the destination is closed. A new connection between the source and
destination is established when the next snapshot is replicated.
Related concepts
MTrees overview on page 136
Collection replication
Collection replication performs whole-system mirroring in a one-to-one topology, continuously transferring changes in the
underlying collection, including all of the logical directories and files of the DD file system.
Collection replication does not have the flexibility of the other types, but it can provide higher throughput and support more
objects with less overhead, which may work better for high-scale enterprise cases.
Collection replication replicates the entire /data/col1 area from a source DD system to a destination DD system.
Here are some additional points to consider when using collection replication:
● No granular replication control is possible. All data is copied from the source to the destination producing a read-only copy.
● Collection replication requires that the storage capacity of the destination system be equal to, or greater than, the capacity
of the source system. If the destination capacity is less than the source capacity, the available capacity on the source is
reduced to the capacity of the destination.
● The DD system to be used as the collection replication destination must be empty before configuring replication. After
replication is configured, this system is dedicated to receive data from the source system.
● With collection replication, all user accounts and passwords are replicated from the source to the destination. However, as of
DD OS 5.5.1.0, other elements of configuration and user settings of the DD system are not replicated to the destination; you
must explicitly reconfigure them after recovery.
● Collection replication is supported with DD Secure Multitenancy (SMT). Core SMT information, contained in the registry
namespace, including the tenant and tenant-unit definitions with matching UUIDs is automatically transferred during
replication operation. However, the following SMT information is not automatically included for replication, and must be
configured manually on the destination system:
○ Alert notification lists for each tenant-unit
○ All users assigned to the DD Boost protocol for use by SMT tenants, if DD Boost is configured on the system
○ The default-tenant-unit associated with each DD Boost user, if any, if DD Boost is configured on the system
Using collection replication for disaster recovery with SMT on page 301 describes how to manually configure these items on
the replication destination.
● DD Retention Lock Compliance supports collection replication.
DD Replicator 277
● Collection replication is not supported in cloud tier-enabled systems.
● With collection replication, data in a replication context on the source system that has not been replicated cannot be
processed for file system cleaning. If file system cleaning cannot complete because the source and destination systems are
out of sync, the system reports the cleaning operation status as partial, and only limited system statistics are available
for the cleaning operation. If collection replication is disabled, the amount of data that cannot be processed for file system
cleaning increases because the replication source and destination systems remain out of sync. The KB article Data Domain:
An overview of Data Domain File System (DDFS) clean/garbage collection (GC) phases, available from the Online Support
website provides additional information.
● To enhance throughput in a high bandwidth environment, run the replication modify <destination> crepl-gc-
gw-optim command to disable collection replication bandwidth optimization.
Related concepts
DD Encryption overview on page 363
Replication topologies
DD Replicator supports five replication topologies (one-to-one, one-to-one bidirectional, one-to-many, many-to-one, and
cascaded). The tables in this section show (1) how these topologies work with three types of replication (MTree, directory,
and collection) and (2) how mixed topologies are supported with cascaded replication.
In general:
● Single node (SN) systems support all replication topologies.
● Single node-to-single node (SN -> SN) can be used for all replication types.
● Collection replication cannot be configured from either an SN system to a DD high availability-enabled system, nor from a DD
high availability-enabled system to an SN system.
● For MTtree and Directory replication, DD high availability systems are treated like SN systems.
● Collection replication cannot be configured on Cloud Tier-enabled systems.
278 DD Replicator
In this table:
● SN = single node DD system without Cloud Tier
● SN + CT = single node DD system with Cloud Tier
cascaded SN -> {SN | SN + CT} -> {SN SN -> SN -> SN SN -> SN -> SN
| SN + CT}
SN -> SN -> SN + CT
Cascaded replication supports mixed topologies where the second leg in a cascaded connection is different from the first type in
a connection (for example, A -> B is directory replication, and B -> C is collection replication).
One-to-one replication
The simplest type of replication is from a DD source system to a DD destination system, otherwise known as a one-to-one
replication pair. This replication topology can be configured with directory, MTree, or collection replication types.
DD Replicator 279
Related tasks
Creating a replication pair on page 285
Bi-directional replication
In a bi-directional replication pair, data from a directory or MTree on DD system A is replicated to DD system B, and from
another directory or MTree on DD system B to DD system A.
Related concepts
Configuring bi-directional replication on page 287
280 DD Replicator
One-to-many replication
In one-to-many replication, data flows from a source directory or MTree on one DD system to several destination DD systems.
You could use this type of replication to create more than two copies for increased data protection, or to distribute data for
multi-site usage.
Related concepts
Configuring one-to-many replication on page 287
Many-to-one replication
In many-to-one replication, whether with MTree or directory, replication data flows from several source DD systems to a single
destination DD system. This type of replication can be used to provide data recovery protection for several branch offices on a
corporate headquarter’s IT system.
DD Replicator 281
Related concepts
Configuring many-to-one replication on page 288
Cascaded replication
In a cascaded replication topology, a source directory or MTree is chained among three DD systems. The last hop in the chain
can be configured as collection, MTree, or directory replication, depending on whether the source is directory or MTree.
For example, DD system A replicates one or more MTrees to DD system B, which then replicates those MTrees to DD system C.
The MTrees on DD system B are both a destination (from DD system A) and a source (to DD system C).
Data recovery can be performed from the non-degraded replication pair context. For example:
● In the event DD system A requires recovery, data can be recovered from DD system B.
● In the event DD system B requires recovery, the simplest method is to perform a replication resync from DD system A to
(the replacement) DD system B. In this case, the replication context from DD system B to DD system C should be broken
first. After the DD system A to DD system B replication context finishes resync, a new DD system B to DD System C context
should be configured and resynced.
Related concepts
Configuring cascaded replication on page 288
Managing replication
You can manage replication using the DD System Manager) or the DD OS CLI.
282 DD Replicator
Steps
1. From the menu at the left of the DD System Manager, select Replication. If your license has not been added yet, select
Add License.
2. Select Automatic or On-Demand (you must have a DD Boost license for on-demand).
CLI Equivalent
You can also log in at the CLI:
Replication status
Replication Status shows the system-wide count of replication contexts exhibiting a warning (yellow text) or error (red text)
state, or if conditions are normal.
Summary view
The Summary view lists the configured replication contexts for a DD system, displaying aggregated information about the
selected DD system – that is, summary information about the inbound and outbound replication pairs. The focus is the DD
system, itself, and the inputs to it and outputs from it.
The Summary table can be filtered by entering a Source or Destination name, or by selecting a State (Error, Warning, or
Normal).
DD Replicator 283
Detailed information for a replication context
Selecting one replication context from the Summary view populates that context’s information in Detailed Information,
Performance Graph, Completion Stats, and Completion Predictor.
Completion Predictor
The Completion Predictor is a widget for tracking a backup job's progress and for predicting when replication will complete, for a
selected context.
Related tasks
Changing host connection settings on page 289
284 DD Replicator
Viewing estimated completion time for backup jobs on page 295
Steps
1. Select Replication > Automatic > Summary tab > Create Pair .
2. In the Create Pair dialog, add information to create an inbound or outbound MTree, directory, collection, or pool replication
pair, as described in the next sections.
Steps
1. In the Create Pair dialog, select Add System.
2. For System, enter the hostname or IP address of the system to be added.
3. For User Name and Password, enter the sysadmin's user name and password.
4. Optionally, select More Options to enter a proxy IP address (or system name) of a system that cannot be reached directly.
If configured, enter a custom port instead of the default port 3009.
NOTE: IPv6 addresses are supported only when adding a DD OS 5.5 or later system to a management system using DD
OS 5.5 or later.
5. Select OK.
NOTE: If the system is unreachable after adding it to DD System Manager, make sure that there is a route from the
managing system to the system being added. If a hostname (either a fully qualified domain name (FQDN) or non-FQDN)
is entered, make sure it is resolvable on the managed system. Configure a domain name for the managed system, ensure
a DNS entry for the system exists, or ensure an IP address to hostname mapping is defined.
6. If the system certificate is not verified, the Verify Certificate dialog shows details about the certificate. Check the system
credentials. Select OK if you trust the certificate, or select Cancel.
Steps
1. In the Create Pair dialog, select Collection from the Replication Type menu.
2. Select the source system hostname from the Source System menu.
DD Replicator 285
3. Select the destination system hostname from the Destination System menu. The list includes only those hosts in the
DD-Network list.
4. If you want to change any host connection settings, select the Advanced tab.
5. Select OK. Replication from the source to the destination begins.
Results
Test results returned the following performance guidelines for replication initialization. These are guidelines only, and actual
performance seen in production environments may vary.
● Over a gibibit LAN: With a high enough shelf count to drive maximum input/output and ideal conditions, collection replication
can saturate a 1GigE link (modulo 10% protocol overhead), as well as 400-900 MB/sec on 10gigE, depending on the
platform.
● Over a WAN, performance is governed by the WAN link line speed, bandwidth, latency, and packet loss rate.
Related tasks
Changing host connection settings on page 289
Steps
1. In the Create Pair dialog, select Directory, MTree (default), or Pool from the Replication Type menu.
2. Select the source system hostname from the Source System menu.
3. Select the destination system hostname from the Destination System menu.
4. Enter the source path in the Source Path text box (notice the first part of the path is a constant that changes based on the
type of replication chosen).
5. Enter the destination path in the Destination Path text box (notice the first part of the path is a constant that changes
based on the type of replication chosen).
6. If you want to change any host connection settings, select the Advanced tab.
7. Select OK.
The Replication from the source to the destination begins.
Test results from returned the following guidelines for estimating the time needed for replication initialization.
These are guidelines only and may not be accurate in specific production environments.
● Using a T3 connection, 100ms WAN, performance is about 40 MiB/sec of pre-compressed data, which gives data
transfer of:
40 MiB/sec = 25 seconds/GiB = 3.456 TiB/day
● Using the base-2 equivalent of gigabit LAN, performance is about 80 MiB/sec of pre-compressed data, which gives data
transfer of about double the rate for a T3 WAN.
286 DD Replicator
CLI Equivalent
Here is an example of creating MTree replication pairs at the CLI. In this example, the source system is dd9900 and the
destination system is dlh5. For details about usage in other scenarios, see the DD OS Command Reference Guide.
1. Create an MTree on the source system:
2 mtree://dd9900.chaos.local/data/col1/Oracle2 mtree://dlh5.chaos.local/data/col1/
Oracle2
--- -------------------------------------------
------------------------------------------
* Used for recovery only.
5. To start replication between a source and destination, use the replication initialize command on the source. This
command checks that the configuration and connections are correct and returns error messages if any problems occur.
Related tasks
Changing host connection settings on page 289
Related tasks
Creating an MTree, directory, or pool replication pair on page 286
Related tasks
Creating an MTree, directory, or pool replication pair on page 286
DD Replicator 287
Configuring many-to-one replication
To create a many-to-one replication pair, use the directory or MTree replication pair procedure [for example, (1) mtree1 from
host A to mtree1 on host C and (2) mtree2 on host B to mtree2 on host C.]
Related tasks
Creating an MTree, directory, or pool replication pair on page 286
Related tasks
Creating an MTree, directory, or pool replication pair on page 286
Steps
1. Select one or more replication pairs in the Summary table, and select Disable Pair.
2. In the Display Pair dialog, select Next and then OK.
3. To resume operation of a disabled replication pair, select one or more replication pairs in the Summary table, and select
Enable Pair to display the Enable Pair dialog.
4. Select Next and then OK. Replication of data is resumed.
CLI Equivalent
Steps
1. Select one or more replication pairs in the Summary table, and select Delete Pair.
2. In the Delete Pair dialog, select Next and then OK. The replication pairs are deleted.
CLI Equivalent
Before running this command, always run the filesys disable command. Then, afterward, run the filesys enable
command
Certain situations may arise in which you must resynchronize replication to resolve an issue. For information about breaking
and resynchronizing replication, see the KB article Data Domain - Break and Resync Directory Replication, available from the
Online Support website.
288 DD Replicator
Changing host connection settings
To direct traffic out of a specific port, modify a current context by altering the connection host parameter using a host name
previously defined in the local hosts file to address the alternate system. That host name will correspond to the destination. The
host entry will indicate an alternate destination address for that host. This may be required on both the source and destination
systems.
Steps
1. Select the replication pair in the Summary table, and select Modify Settings. You can also change these settings when you
are performing Create Pair, Start Resync, or Start Recover by selecting the Advanced tab.
2. In the Modify Connection Settings dialog, modify any or all of these settings:
a. Use Low Bandwidth Optimization – For enterprises with small data sets and 6 Mb/s or less bandwidth networks, DD
Replicator can further reduce the amount of data to be sent using low bandwidth optimization. This enables remote sites
with limited bandwidth to use less bandwidth or to replicate and protect more of their data over existing networks. Low
bandwidth optimization must be enabled on both the source and destination DD systems. If the source and destination
have incompatible low bandwidth optimization settings, low bandwidth optimization will be inactive for that context.
After enabling low bandwidth optimization on the source and destination, both systems must undergo a full cleaning
cycle to prepare the existing data, so run filesys clean start on both systems. The duration of the cleaning cycle
depends on the amount of data on the DD system, but takes longer than a normal cleaning. For more information on the
filesys commands, see the DD OS Command Reference Guide.
Important: Low bandwidth optimization is not supported for Collection Replication.
b. Enable Encryption Over Wire – DD Replicator supports encryption of data-in-flight by using standard SSL (Secure
Socket Layer) protocol version 1.0.1, which uses the ADH-AES256-GCM-SHA384 and DHE-RSA-AES256-GCM-SHA384
cipher suites to establish secure replication connections. Both sides of the connection must enable this feature for
encryption to proceed.
c. Network Preference – You may choose IPv4 or IPv6. An IPv6-enabled replication service can still accept connections
from an IPv4 replication client if the service is reachable via IPv4. An IPv6-enabled replication client can still communicate
with an IPv4 replication service if the service is reachable via IPv4.
d. Use Non-default Connection Host – The source system transmits data to a destination system listen port. Since a
source system can have replication configured for many destination systems (each of which can have a different listen
port), each context on the source can configure the connection port to the corresponding listen port of the destination.
3. Select Next and then Close.
The replication pair settings are updated, and replication resumes.
CLI Equivalent
Steps
1. Select Manage Systems.
2. In the Manage Systems dialog, add and/or delete systems, as required.
3. Select Close.
DD Replicator 289
Recovering directory pool data
You can recover data from a directory-based pool, but not from an MTree-based pool.
Steps
1. Select More > Start Recover.
2. In the Start Recover dialog, select Pool from the Replication Type menu.
3. Select the source system hostname from the System to recover to menu.
4. Select the destination system hostname from the System to recover from menu.
5. Select the context on the destination from which data is recovered.
6. If you want to change any host connection settings, select the Advanced tab.
7. Select OK to start the recovery.
Related tasks
Changing host connection settings on page 289
Steps
1. Select More > Start Recover to display the Start Recover dialog.
2. Select Collection from the Replication Type menu.
3. Select the source system host name from the System to recover to menu.
4. Select the destination system host name from the System to recover from menu.
5. Select the context on the destination from which data is recovered. Only one collection will exist on the destination.
6. To change any host connection settings, select the Advanced tab.
7. Select OK to start the recovery.
Related tasks
Changing host connection settings on page 289
Steps
1. Select More > Start Recover to display the Start Recover dialog.
2. Select Directory from the Replication Type menu.
3. Select the host name of the system to which data needs to be restored from the System to recover to menu.
4. Select the host name of the system that will be the data source from the System to recover from menu.
5. Select the context to restore from the context list.
6. To change any host connection settings, select the Advanced tab.
7. Select OK to start the recovery.
Related tasks
Changing host connection settings on page 289
290 DD Replicator
Aborting a replication pair recovery
If a replication pair recovery fails or must be terminated, you can stop the replication recovery.
Steps
1. Select the More menu, and select Abort Recover to display the Abort Recover dialog, which shows the contexts currently
performing recovery.
2. Select the checkbox of one or more contexts to abort from the list.
3. Select OK.
Next steps
As soon as possible, you should restart recovery on the source.
Steps
1. Delete the context on both the replication source and replication destination systems.
2. From either the replication source or replication destination system, select More > Start Resync to display the Start
Resync dialog.
3. Select the Replication Type to be resynced: Directory, MTree, or Pool.
4. Select the replication source system host name from the Source System menu.
5. Select the replication destination system host name from the Destination System menu.
6. Enter the replication source path in the Source Path text box.
7. Enter the replication destination path in the Destination Path text box.
8. To change any host connection settings, select the Advanced tab.
9. Select OK.
CLI Equivalent
Related tasks
Changing host connection settings on page 289
Steps
1. From either the replication source or replication destination system, select More > Abort Resync to display the Abort
Resync dialog, which lists all contexts currently performing resynchronization.
2. Select the checkboxes of one or more contexts to abort their resynchronization.
DD Replicator 291
3. Select OK.
DD Boost view
The DD Boost view provides configuration and troubleshooting information to NetBackup administrators who have configured
DD systems to use DD Boost AIR (Automatic Image Replication) or any DD Boost application that uses managed file replication.
See the DD Boost for OpenStorage Administration Guide for DD Boost AIR configuration instructions.
The File Replication tab displays:
● Currently Active File Replication:
○ Direction (Out-Going and In-Coming) and the number of files in each.
○ Remaining data to be replicated (pre-compressed value in GiB) and the amount of data already replicated (pre-
compressed value in GiB).
○ Total size: The amount of data to be replicated and the already replicated data (pre-compressed value in GiB).
● Most Recent Status: Total file replications and whether completed or failed
○ during the last hour
○ over the last 24 hours
● Remote Systems:
○ Select a replication from the list.
○ Select the time period to be covered from the menu.
○ Select Show Details for more information about these remote system files.
The Storage Unit Associations tab displays the following information, which you can use for audit purposes or to check the
status of DD Boost AIR events used for the storage unit's image replications:
● A list of all storage unit Associations known to the system. The source is on the left, and the destination is on the right.
This information shows the configuration of AIR on the protection system.
● The Event Queue is the pending event list. It shows the local storage unit, the event ID, and the status of the event.
An attempt is made to match both ends of a DD Boost path to form a pair and present this as one pair/record. If the match is
impossible, for various reasons, the remote path will be listed as Unresolved.
292 DD Replicator
Table 97. Performance Graph (continued)
Item Description
Network Bytes Amount of network throughput data (in GiB).
Files Succeeded Number of files that were successfully replicated.
Files Failed Number of files that failed to be replicated.
Show in new window Brings up a separate window.
Print Prints the graph.
Performance view
The Performance view displays a graph that represents the fluctuation of data during replication. These are aggregated
statistics of each replication pair for this DD system.
● Duration (x-axis) is 30 days by default.
● Replication Performance (y-axis) is in GibiBytes or MebiBytes (the binary equivalents of GigaBytes and MegaBytes).
● Network In is the total replication network bytes entering the system (all contexts).
● Network Out is the total replication network bytes leaving the system (all contexts).
● For a reading of a specific point in time, hover the cursor over a place on the graph.
● During times of inactivity (when no data is being transferred), the shape of the graph may display a gradually descending
line, instead of an expected sharply descending line.
Network Settings
● Bandwidth – Displays the configured data stream rate if bandwidth has been configured, or Unlimited (default) if not. The
average data stream to the replication destination is at least 98,304 bits per second (12 KiB).
● Delay – Displays the configured network delay setting (in milliseconds) if it has been configured, or None (default) if not.
● Listen Port – Displays the configured listen port value if it has been configured, or 2051 (default) if not.
DD Replicator 293
NOTE: Currently, you can set and modify destination throttle only by using the command-line interface (CLI); this
functionality is not available in the DD System Manager. For documentation on this feature, see the replication
throttle command in the DD OS Command Reference Guide. If the DD System Manager detects that you have one
or more destination throttles set, you will be given a warning, and you should use the CLI to continue.
Additional notes about replication throttling:
● Throttles are set only at the source. The only throttle that applies to a destination is the 0 Bps (Disabled) option, which
disables all replication traffic.
● The minimum value for a replication throttle is 98,304 bits per second.
Steps
1. Select Replication > Advanced Settings > Add Throttle Setting to display the Add Throttle Setting dialog.
2. Set the days of the week for which throttling is to be active by selecting Every Day or by selecting checkbox(es) next to
individual day(s).
3. Set the time that throttling is to start with the Start Time drop-down selectors for the hour:minute and AM/PM.
4. For Throttle Rate:
● Select Unlimited to set no limits.
● Enter a number in the text box (for example, 20000), and select the rate from the menu (bps, Kbps, Bps, or KBps).
● Select the 0 Bps (disabled) option to disable all replication traffic.
5. Select OK to set the schedule. The new schedule is shown under Permanent Schedule.
Results
Replication runs at the given rate until the next scheduled change, or until a new throttle setting forces a change.
Steps
1. Select Replication > Advanced Settings > Delete Throttle Setting to display the Delete Throttle Setting dialog.
2. Select the checkbox for the throttle setting to delete, or select the heading checkbox to delete all settings. This list can
include settings for the "disabled" state.
3. Select OK to remove the setting.
4. In the Delete Throttle Setting Status dialog, select Close.
Steps
1. Select Replication > Advanced Settings > Set Throttle Override to display the Throttle Override dialog.
2. Either set a new throttle override, or clear a previous override.
a. To set a new throttle override:
● Select Unlimited to revert to the system-set throttle rate (no throttling performed), or
● Set the throttling bit and rate in the text box (for example, 20000) and (bps, Kbps, Bps, or KBps), or
● Select 0 Bps (Disabled) to set the throttle rate to 0, effectively stopping all replication network traffic.
● To enforce the change temporarily, select Clear at next scheduled throttle event.
b. To clear an override previously set, select Clear Throttle Override.
3. Select OK.
294 DD Replicator
Changing network settings
Using the bandwidth and network-delay settings together, replication calculates the proper TCP (transmission control protocol)
buffer size for replication usage. These network settings are global to the DD system and should be set only once per system.
Steps
1. Select Replication > Advanced Settings > Change Network Settings to display the Network Settings dialog.
2. In the Network Settings area, select Custom Values.
3. Enter Delay and Bandwidth values in the text boxes. The network delay setting is in milliseconds, and bandwidth is in bytes
per second.
4. In the Listen Port area, enter a new value in the text box. The default IP Listen Port for a replication destination for receiving
data streams from the replication source is 2051. This is a global setting for the DD system.
5. Select OK. The new settings appear in the Network Settings table.
Monitoring replication
The DD System Manager provides many ways to track the status of replication – from checking replication pair status, to
tracking backup jobs, to checking performance, to tracking a replication process.
Steps
1. Select Replication > Summary.
2. Select a Replication context for which to display Detailed Information.
3. In the Completion Predictor area, select options from the Source Time drop-down list for a replication’s completion time,
and select Track.
The estimated time displays, in the Completion Time area, for when a particular backup job will finish its replication to the
destination. If the replication is finished, the area shows Completed.
DD Replicator 295
Checking replication context performance
To check the performance of a replication context over time, select a Replication context in the Summary view, and select
Performance Graph in the Detailed Information area.
CLI Equivalent
# replication show config all
CTX Source Destination
Connection Host and Port Enabled
--- ----------------------- -----------------------
------------------------ -------
1 dir://host2/backup/dir2 dir://host3/backup/dir3 host3.company.com
Yes
2 dir://host3/backup/dir3 dir://host2/backup/dir2 host3.company.com
Yes
When specifying an IP version, use the following command to check its setting:
CTX: 2
Source: mtree://ddbeta1.dallasrdc.com/data/col1/EDM1
Destination: mtree://ddbeta2.dallasrdc.com/data/col1/EDM_ipv6
Connection Host: ddbeta2-ipv6.dallasrdc.com
Connection Port: (default)
Ipversion: ipv6
Low-bw-optim: disabled
Encryption: disabled
Enabled: yes
Propagate-retention-lock: enabled
Replication lag
The amount of time between two copies of data is known as replication lag.
You can measure the replication lag between two contexts with the replication status command. For information about
determining the cause of replication lag and mitigating its impact, see the KB article Data Domain: Troubleshooting Replication
Lag, available from the Online Support website.
Replication with HA
Floating IP addresses allow HA systems to specify a single IP address for replication configuration that will work regardless of
which node of the HA pair is active.
Over IP networks, HA systems use a floating IP address to provide data access to the HA pair, regardless of which physical node
is the active node. The net config command provides the [type {fixed | floating}] option to configure a floating IP
address. The DD OS Command Reference Guide provides more information.
If a domain name is needed to access the floating IP address, specify the HA system name as the domain name. Run the ha
status command to locate the HA system name.
NOTE: Run the net show hostname type ha-system command to display the HA system name, and if required, run
the net set hostname ha-system command to change the HA system name.
All file system access should be through the floating IP address. When configuring backup and replication operations on an HA
pair, always specify the floating IP address as the IP address for the protection system. Other system features such as DD
296 DD Replicator
Boost and replication will accept the floating IP address for the HA pair the same way as they accept the system IP address for
a non-HA system.
Steps
1. Stop all ingest operations to the directory replication source directory.
2. Create an MTree on the source DD system: mtree create /data/col1/mtree-name
NOTE: Do not create the MTree on the destination DD system.
DD Replicator 297
4. Create the MTree replication context on both the source and destination DD systems: replication add source
mtree://source-system-name/source mtree replication add destination mtree://destination-
system-name/destination mtree
5. Start the D2M migration: replication dir-to-mtree start from rctx://1 to rctx://2
In the previous example, rctx://1 refers to the directory replication context, which replicates the directory backup
backup/dir1 on the source system; rctx://2 refers to the MTree replication context, which replicates the MTree /
data/col1/mtree1 on the source system.
NOTE: This command might take longer than expected to complete. Do not press Ctrl-C during this process; if you do,
you will cancel the D2M migration.
Phase 1 of 4 (precheck):
Marking source directory /backup/dir1 as read-only...Done.
Phase 2 of 4 (sync):
Syncing directory replication context...0 files flushed.
current=45 sync_target=47 head=47
current=45 sync_target=47 head=47
Done. (00:09)
Phase 3 of 4 (fastcopy):
Starting fastcopy from /backup/dir1 to /data/col1/mtree1...
Waiting for fastcopy to complete...(00:00)
Fastcopy status: fastcopy /backup/dir1 to /data/col1/mtree1: copied 24
files, 1 directory in 0.13 seconds
Creating snapshot 'REPL-D2M-mtree1-2015-12-07-14-54-02'...Done
Phase 4 of 4 (initialize):
Initializing MTree replication context...
(00:08) Waiting for initialize to start...
(00:11) Initialize started.
Steps
Enter replication dir-to-mtree watch rctx://2 to see the progress.
rctx://2 specifies the replication context.
You should see the following output:
Steps
1. Enter the following command; here, rctx://2 represents the MTree replication context on the source system:
replication dir-to-mtree status rctx://2
298 DD Replicator
The output should be similar to the following:
2. Begin ingesting data to the MTree on the source DD system when the migration process is complete.
3. (Optional) Break the directory replication context on the source and target systems.
See the DD OS Command Reference Guide for more information about the replication break command.
Steps
1. In the Command-Line Interface (CLI), enter the following command; here, rctx://2 is the MTree replication context:
replication dir-to-mtree abort rctx://2
You should see the following output:
Troubleshooting D2M
If you encounter a problem setting directory-to-MTree (D2M) replication, there is an operation you can perform to address
several different issues.
Always run replication dir-to-mtree abort before running the replication break command on the mrepl
ctx.
DD Replicator 299
Running the replication break command prematurely will permanently render the drepl source directory as read-only.
Steps
1. Enter replication dir-to-mtree abort to abort the process.
2. Break the newly created MTree replication context on both the source and destination systems.
In the following example, the MTree replication context is rctx://2.
3. Delete the corresponding MTrees on both the source and destination systems.
NOTE: MTrees marked for deletion remain in the file system until the filesys clean command is run.
300 DD Replicator
Using collection replication for disaster recovery with
SMT
To use the destination system of a collection replication pair configured with SMT as a replacement system for disaster
recovery, additional SMT configuration steps must be performed in addition to the other configuration steps required to bring a
replacement system online.
Prerequisites
Using the collection replication destination system in this manner requires autosupport reports to be configured and saved. The
KB article Collection replica with smt enabled, available from the Online Support website, provides additional information.
Steps
1. In the autosupport report, locate the output for the smt tenant-unit show detailed command.
Tenant-unit: "tu1"
Summary:
Name Self-Service Number of Mtrees Types Pre-Comp(GiB)
---- ------------ ---------------- -------- -------------
tu1 Enabled 2 DD Boost 2.0
---- ------------ ---------------- -------- -------------
Management-User:
User Role
------ ------------
tu1_ta tenant-admin
tu1_tu tenant-user
tum_ta tenant-admin
------ ------------
Management-Group:
Group Role
------ ------------
qatest tenant-admin
------ ------------
DDBoost:
Name Pre-Comp (GiB) Status User Tenant-Unit
---- -------------- ------ ----- -----------
su1 2.0 RW/Q ddbu1 tu1
---- -------------- ------ ----- -----------
Q : Quota Defined
RO : Read Only
RW : Read Write
Mtrees:
Name Pre-Comp (GiB) Status Tenant-Unit
-------------- -------------- ------ -----------
/data/col1/m1 0.0 RW/Q tu1
/data/col1/su1 2.0 RW/Q tu1
-------------- -------------- ------ -----------
D : Deleted
DD Replicator 301
Q : Quota Defined
RO : Read Only
RW : Read Write
RD : Replication Destination
RLGE : Retention-Lock Governance Enabled
RLGD : Retention-Lock Governance Disabled
RLCE : Retention-Lock Compliance Enabled
Quota:
Tenant-unit: tu1
Mtree Pre-Comp (MiB) Soft-Limit (MiB) Hard-Limit(MiB)
-------------- -------------- ---------------- ----------------
/data/col1/m1 0 71680 81920
/data/col1/su1 2048 30720 51200
-------------- -------------- ---------------- ----------------
Alerts:
Tenant-unit: "tu1"
Notification list "tu1_grp"
Members
------------------
[email protected]
------------------
5. If DD Boost is configured, assign each user listed in the DD Boost section of the smt tenant-unit show detailed
output to the default tenant-unit shown, if any, in the output.
6. Create a new alert notification group with the same name as the alert notification group in the Alerts section of the smt
tenant-unit show detailed output.
7. Assign each email address in the alert notification group in the Alerts section of the smt tenant-unit show
detailed output to the new alert notification group.
302 DD Replicator
24
DD Secure Multitenancy
This chapter includes:
Topics:
• Secure Multi-Tenancy overview
• Provisioning a Tenant Unit
• Enabling Tenant Self-Service mode
• Data access by protocol
• Data management operations
MTrees
MTrees are logical partitions of the file system and offer the highest degree of management granularity, meaning users can
perform operations on a specific MTree without affecting the entire file system. MTrees are assigned to Tenant Units and
contain that Tenant Unit's individualized settings for managing and monitoring SMT.
Multi-Tenancy
Multi-Tenancy refers to the hosting of an IT infrastructure by an internal IT department, or an external service provider, for
more than one consumer/workload (business unit/department/Tenant) simultaneously. DD SMT enables Data Protection-as-a-
Service.
Storage Unit
A Storage Unit is an MTree configured for the DD Boost protocol. Data isolation is achieved by creating a Storage Unit and
assigning it to a DD Boost user. The DD Boost protocol permits access only to Storage Units assigned to DD Boost users
connected to the system.
Tenant
A Tenant is a consumer (business unit/department/customer) who maintains a persistent presence in a hosted environment.
Tenant Self-Service
Tenant Self-Service is a method of letting a Tenant log in to a protection system to perform some basic services (view MTrees
or storage units that belong to the tenant unit, or change the tenant's own password). This reduces the bottleneck of always
having to go through an administrator for these basic tasks. The Tenant can access only their assigned Tenant Units. Tenant
Users and Tenant Admins will, of course, have different privileges.
Tenant Unit
A Tenant Unit is the partition of a system that serves as the unit of administrative isolation between Tenants. Tenant units that
are assigned to a tenant can be on the same or different systems and are secured and logically isolated from each other, which
ensures security and isolation of the control path when running multiple Tenants simultaneously on the shared infrastructure.
Tenant Units can contain one or more MTrees, which hold all configuration elements that are needed in a multi-tenancy setup.
Users, management-groups, notification-groups, and other configuration elements are part of a Tenant Unit.
NOTE: If you attempt to mount an MTree in an SMT using a non-SMT IP address, the operation will fail.
If multiple Tenant Units are belong to the same tenant, they can share a default gateway. However, if multiple Tenant Units that
belong to different tenants are oprevented from using the same default gateway.
Multiple Tenant Units belonging to the same tenant can share a default gateway. Tenant Units that belong to different tenants
cannot use the same default gateway.
admin role
A user with an admin role can perform all administrative operations on a protection system. An admin can also perform all SMT
administrative operations on the system, including setting up SMT, assigning SMT user roles, enabling tenant self-service mode,
creating a tenant, and so on. In the context of SMT, the admin is typically referred to as the landlord. In DD OS, the role is
known as the sysadmin.
To have permission to edit or delete a tenant, you must be both a DDMC admin and a DD OS sysadmin on all systems that
are associated with the tenant units of that tenant. If the tenant does not have any tenant units, you need only to be a DDMC
admin to edit or delete that tenant.
limited-admin role
A user with a limited-admin role can perform all administrative operations on a system as the admin. However, users with the
limited-admin role cannot delete or destroy MTrees. In DD OS, there is an equivalent limited-admin role.
tenant-admin role
A user with a tenant-admin role can perform certain tasks only when tenant self-service mode is enabled for a specific tenant
unit. Responsibilities include scheduling and running a backup application for the tenant and monitoring resources and statistics
within the assigned tenant unit. The tenant-admin can view audit logs, but RBAC ensures that only audit logs from the tenant
tenant-user role
A user with a tenant-user role can monitor the performance and usage of SMT components only on tenant unit(s) assigned to
them and only when tenant self-service is enabled, but a user with this role cannot view audit logs for their assigned tenant
units. Also, tenant-users may run the show and list commands.
none role
A user with a role of none is not allowed to perform any operations on a system other than changing their password and
accessing data using DD Boost. However, after SMT is enabled, the admin can select a user with a none role from the
system and assign them an SMT-specific role of tenant-admin or tenant-user. Then, that user can perform operations on SMT
management objects.
management groups
BSPs (backup service providers) can use management groups defined in a single, external AD (active directory) or NIS (network
information service) to simplify managing user roles on tenant units. Each BSP tenant may be a separate, external company and
may use a name-service such as AD or NIS.
With SMT management groups, the AD and NIS servers are set up and configured by the admin in the same way as SMT local
users. The admin can ask their AD or NIS administrator to create and populate the group. The admin then assigns an SMT role
to the entire group. Any user within the group who logs in to the system is logged in with the role that is assigned to the group.
When users leave or join a tenant company, they can be removed or added to the group by the AD or NIS administrator. It is not
necessary to modify the RBAC configuration on a system when users who are part of the group are added or removed.
Steps
1. Start SMT.
# smt enable
SMT enabled.
2. Verify that SMT is enabled.
# smt status
SMT is enabled.
3. Launch the SMT configuration wizard.
Tenant-unit Name
Enter tenant-unit name to be created
Do you want to add a local management ip to this tenant-unit? (yes|no) [no]: yes
Choose an ip from above table or enter a new ip address. New ip addresses will need
to be created manually.
Ip Address
Enter the local management ip address to be added to this tenant-unit
: 192.168.10.57
Do you want to add another local management ip to this tenant-unit? (yes|no) [no]:
Do you want to add another remote management ip to this tenant-unit? (yes|no) [no]:
Do you want to create a mtree for this tenant-unit now? (yes|no) [no]: yes
MTree Name
Enter MTree name
: SMT_57_tenant_unit
Invalid mtree path name.
Enter MTree name
: SMT_57_tenant_unit
MTree Soft-Quota
Enter the quota soft-limit to be set on this MTree (<n> {MiB|GiB|TiB|PiB}|none)
:
MTree Hard-Quota
Enter the quota hard-limit to be set on this MTree (<n> {MiB|GiB|TiB|PiB}|none)
:
Do you want to assign another MTree to this tenant-unit? (yes|no) [no]: yes
Do you want to create another mtree for this tenant-unit? (yes|no) [no]:
Do you want to configure a management group for this tenant-unit (yes|no) [no]: yes
Management-Group Name
Enter the group name to be assigned to this tenant-unit
: SMT_57_tenant_unit_group
Management-Group Type
What type do you want to assign to this group (nis|active-directory)?
: nis
Do you want to configure another management user for this tenant-unit? (yes|no) [no]:
Do you want to configure another management group for this tenant-unit? (yes|no) [no]:
Alert Configuration
Configuration complete.
Steps
1. View Tenant Self-Service mode status for one or all Tenant Units.
Steps
1. Create an MTree for CIFS and assign the MTree to the tenant unit.
Steps
1. Create an MTree for NFS and assign the MTree to the tenant unit.
Steps
1. Collect MTree real-time performance statistics.
Modifying quotas
To meet QoS criteria, a system administrator uses DD OS "knobs" to adjust the settings required by the Tenant configuration.
For example, the administrator can set "soft" and "hard" quota limits on DD Boost Storage Units. Stream "soft" and "hard" quota
limits can be allocated only to DD Boost Storage Units assigned to Tenant Units. After the administrator sets the quotas, the
tenant-admin can monitor one or all Tenant Units to ensure no single object exceeds its allocated quotas and deprives others of
system resources.
Steps
1. To modify soft and hard quota limits on DD Boost Storage Unit "su33":
ddboost storage-unit modify su33 quota-soft-limit 10 Gib quota-hard-limit 20 Gib
2. To modify stream soft and hard limits on DD Boost Storage Unit "su33":
ddboost storage-unit modify su33 write-stream-soft-limit 20 read-stream-soft-limit 6 repl
-stream-soft-limit 20 combined-stream-soft-limit 20
3. To report physical size for DD Boost Storage Unit "su33":
ddboost storage-unit modify su33 report-physical-size 8 GiB
Action: This alert is expected after loss of AC (main power) event. If this shutdown is
not expected and persists, contact your contracted support provider or visit us online at
https://dell.com/support.
Tenant description: The system has experienced an unexpected power loss and has restarted.
Tenant action: This alert is generated when the system restarts after a power loss. If
this alert repeats, contact your System Administrator.
Managing snapshots
A snapshot is a read-only copy of an MTree captured at a specific point in time. A snapshot can be used for many things, for
example, as a restore point in case of a system malfunction. The required role for using snapshot is admin or tenant-admin.
To view snapshot information for an MTree or a Tenant Unit:
Supported platforms
Cloud Tier is supported on physical platforms that have the necessary memory, CPU, and storage connectivity to accommodate
another storage tier.
Cloud Tier is supported on these systems:
a. ES30 shelves are only supported after a controller upgrade from an older system model.
b. The minimum metadata size is a hard limit. Dell EMC recommends that you start with 1 TB for metadata storage and
expand in 1 TB increments. The DDVE Installation and Administration Guide provides more details about using Cloud Tier
with DDVE.
NOTE: Cloud Tier is not supported on any system that is not listed and is configured with Collection Replication.
NOTE: The Cloud Tier feature may consume all available bandwidth in a shared WAN link, especially in a low bandwidth
configuration (1 Gbps), and this may impact other applications sharing the WAN link. If there are shared applications on the
WAN, the use of QoS or other network limiting is recommended to avoid congestion and ensure consistent performance
over time.
If bandwidth is constrained, the rate of data movement will be slow and you will not be able to move as much data to the
cloud. It is best to use a dedicated link for data going to the Cloud Tier.
NOTE: Do not send traffic over onboard management network interface controllers (ethMx interfaces).
Cloud seeding
The current migration engine to cloud is filed based and an efficient de-duplication optimized engine is used for identifying and
migrating only unique segments to cloud. This file based migration engine's efficiency is high when migrating higher generation
data to Cloud Tier, which already has some data to de-duplicate against. However, when Cloud Tier is empty or nearly empty,
there is no data to de-duplicate against. There is an overhead of compute cycles that are invested in deduplication. With
seeding-based migration, the dededuplication filtering is maintained on active tier storage and only unique data is migrated in
bulk to Cloud Tier. In cloud seeding, the engine migrates the content from local storage to cloud storage without processing it
for deduplication. When cloud seeding is active, files that are marked for migration to cloud storage are not cleaned (i.e. space is
not freed-up) as part of the active tier file system cleaning until the migration of all identified files by seeding is complete. Active
tier storage must be sized to account for this in environments where large amounts of data are migrated to cloud storage. If the
Cloud Tier storage is less than five percent full and has post-comp data usage of 30 TiB (or more), as seen in filesys show
space command, the system automatically uses cloud seeding when migrating data to cloud storage.
After five percent of the Cloud Tier capacity is consumed, cloud seeding automatically deactivates. Data is then processed for
deduplication before migration to cloud storage.
Here are additional points to consider when using Seeding migration:
● Migration is supported in Seeding mode only when:
○ Active tier postcomp used size is 30 TiB or more as reported in filesys show space output.
○ Active tier is less than 70% full, when migration starts as reported in filesys show space output.
NOTE: While in seeding mode, if Active Tier usage during a migration cycle exceeds 90%, migration is halted and
restarted in regular Filecopy mode.
● Migration in seeding mode is auto-suspended by cleaning on active tier, for the entire duration of the active tier cleaning.
Once cleaning completes, seeding resumes automatically and restarts the migration to cloud.
● Migration in seeding mode auto-suspends if a cloud UNAVAIL event is received on the cloud-unit (cloud-unit is reported as
"disconnected") to which it is migrating, and only resumes once the cloud-unit is available reports as active.
● Cleaning cannot start on a cloud-unit that is the destination of an in-progress migration operation in Seeding mode.
NOTE: In two cloud-unit systems, to force cleaning to start on a second cloud-unit which is not being seeded, suspend
migration in seeding mode using the data-movement suspend command and run the cloud clean start
command on the second cloud-unit.
● Probabilistic File Verification in cloud does not run against cloud-units on which seeding mode migration is in progress, even
if it is the default policy.
● If cleaning is in progress on Active Tier or Cloud Tier and scheduled data movement starts in seeding mode, the data
movement operation suspends for the duration of the cleaning activity.
● Migration in seeding mode does not migrate files from MTrees which are replication destinations, even if the files are
eligible for migration. Files from these replication destination MTrees are migrated with the Filecopy engine once migration in
seeding mode from all eligible MTree is complete.
● Seeding mode migration suspends physical capacity reporting for the duration of the migration activity.
● Migration in Seeding mode is only supported on all cloud enabled systems and configurations that have more than 80 Gb of
RAM. Seeding based migration is disabled by default for DD VEs.
Prerequisites
The file system must be disabled to configure Cloud Tier.
Steps
1. Select Data Management > File System and click Disable (at the bottom of the screen) to disable the file system.
2. Select Hardware > Storage.
3. In the Overview tab, expand Cloud Tier.
4. Click Configure.
The Configure Cloud Tier dialog box is displayed.
5. Select the checkbox for the shelf to be added from the Addable Storage section.
CAUTION: DD3300 systems require the use of 1 TB storage devices for Cloud Tier metadata storage.
9. Click Enable.
The cloud tier is enabled with the designated storage.
10. Click OK.
You must create cloud units separately, after the file system is enabled.
11. Select Enable file system.
Proxy settings
If there are any existing proxy settings that cause data above a certain size to be rejected, those settings must be changed to
allow object sizes up to 4.5MB.
If customer traffic is being routed through a proxy, the self-signed/CA-signed proxy certificate must be imported. See
"Importing CA certificates" for details.
Importing CA certificates
Before you can add cloud units for Alibaba, Amazon Web Services S3 (AWS), Azure, Elastic Cloud Storage (ECS), and Google
Cloud Provider (GCP), you must import CA certificates.
Prerequisites
For AWS and Azure public cloud providers, root CA certificates can be downloaded from https://www.digicert.com/digicert-
root-certificates.htm.
● For an AWS cloud provider, download the Baltimore CyberTrust Root certificate.
● For an Azure cloud provider, download the Baltimore CyberTrust Root certificate.
● For ECS, the root certificate authority varies by customer.
Implementing cloud storage on ECS requires a load balancer. If an HTTPS endpoint is used as an endpoint in the
configuration, be sure to import the root CA certificate. Contact your load balancer provider for details.
● For an S3 Flexible provider, import the root CA certificate. Contact your S3 Flexible provider for details.
If your downloaded certificate has a .crt extension, it is likely that it will need to be converted to a PEM-encoded certificate.
If so, use OpenSSL to convert the file from .crt format to .pem (for example, openssl x509 -inform der -in
BaltimoreCyberTrustRoot.crt -out BaltimoreCyberTrustRoot.pem).
● For Alibaba:
1. Download the GlobalSign Root R1 certificate from HTTPS://SUPPORT.GLOBALSIGN.COM/CUSTOMER/PORTAL/
ARTICLES/1426602-GLOBALSIGN-ROOTCERTIFICATES.
2. Convert the downloaded certificate to a PEM-encoded format. The OpenSSL command for this conversion is: openssl
x509 -inform der -in <root_cert.crt> -out <root_cert.pem>.
3. Import the certificate to the system.
● For GCP:
1. Download the GlobalSign Root R2 certificate from https://pki.goog.
2. Convert the downloaded certificate to a PEM-encoded format. The OpenSSL command for this conversion is: openssl
x509 -inform der -in <root_cert.crt> -out <root_cert.pem>.
3. Import the certificate to the system.
Steps
1. Select Data Management > File System > Cloud Units.
2. In the tool bar, click Manage Certificates.
The Manage Certificates for Cloud dialog is displayed.
3. Click Add.
4. Select one of these options:
● I want to upload the certificate as a .pem file.
Browse to and select the certificate file.
● I want to copy and paste the certificate text.
○ Copy the contents of the .pem file to your copy buffer.
○ Paste the buffer into the dialog.
5. Click Add.
Steps
1. Select Data Management > File System > Cloud Units.
2. Click Add.
The Add Cloud Unit dialog box appears.
3. Enter a name for this cloud unit. Only alphanumeric characters are allowed.
The remaining fields in the Add Cloud Unit dialog pertain to the cloud provider account.
4. For Cloud provider, select EMC Elastic Cloud Storage (ECS) from the list.
5. Enter the provider Access key as password text.
NOTE: Use the ECS username as the access key.
By default, ECS runs the S3 protocol on port 9020 for HTTP and 9021 for HTTPS. With a load balancer, these ports are
sometimes remapped to 80 for HTTP and 443 for HTTPS, respectively. Check with your network administrator for the
correct ports.
8. If an HTTP proxy server is required to get around a firewall for this provider, click Configure for HTTP Proxy Server.
Enter the proxy hostname, port, user, and password.
NOTE: There is an optional step to run the cloud provider verify tool before adding the cloud unit. This tool performs
pre-check tests to ensure that all requirements are met before to adding the actual cloud unit.
9. Click Add.
The File System main window displays summary information for the new cloud unit as well a control for enabling and
disabling the cloud unit.
The Alibaba Cloud user credentials must have permissions to create and delete buckets and to add, modify, and delete files
within the buckets they create. AliyunOSSFullAccess is preferred, but these are the minimum requirements:
● ListBuckets
● GetBucket
● PutBucket
● DeleteBucket
● GetObject
● PutObject
● DeleteObject
Steps
1. Select Data Management > File System > Cloud Units.
2. Click Add.
The Add Cloud Unit dialog is displayed.
3. Enter a name for this cloud unit. Only alphanumeric characters are allowed.
The remaining fields in the Add Cloud Unit dialog pertain to the cloud provider account.
4. For Cloud provider, select Alibaba Cloud from the drop-down list.
5. Select Standard or IA from the Storage class drop-down list.
6. Select the region from the Storage region drop-down list.
7. Enter the provider Access key as password text.
8. Enter the provider Secret key as password text.
9. Ensure that port 443 (HTTPS) is not blocked in firewalls. Communication with the Alibaba cloud provider occurs on port 443.
10. If an HTTP proxy server is required to get around a firewall for this provider, click Configure for HTTP Proxy Server.
Enter the proxy hostname, port, user, and password.
NOTE: There is an optional step to run the cloud provider verify tool before adding the cloud unit. This tool performs
pre-check tests to ensure that all requirements are met before to adding the actual cloud unit.
NOTE: The AWS user credentials must have permissions to create and delete buckets and to add, modify, and delete files
within the buckets they create. S3FullAccess is preferred, but these are the minimum requirements:
● CreateBucket
● ListBucket
● DeleteBucket
● ListAllMyBuckets
● GetObject
● PutObject
● DeleteObject
Steps
1. Select Data Management > File System > Cloud Units.
2. Click Add.
The Add Cloud Unit dialog is displayed.
3. Enter a name for this cloud unit. Only alphanumeric characters are allowed.
The remaining fields in the Add Cloud Unit dialog pertain to the cloud provider account.
4. For Cloud provider, select Amazon Web Services S3 from the drop-down list.
5. Select the storage class from the drop-down list.
6. Select the appropriate Storage region from the drop-down list.
7. Enter the provider Access key as password text.
8. Enter the provider Secret key as password text.
9. Ensure that port 443 (HTTPS) is not blocked in firewalls. Communication with the AWS cloud provider occurs on port 443.
10. If an HTTP proxy server is required to get around a firewall for this provider, click Configure for HTTP Proxy Server.
Enter the proxy hostname, port, user, and password.
The account name is obtained from the Azure cloud provider console.
Steps
1. Select Data Management > File System > Cloud Units.
2. Click Add.
The Add Cloud Unit dialog is displayed.
3. Enter a name for this cloud unit. Only alphanumeric characters are allowed.
The remaining fields in the Add Cloud Unit dialog pertain to the cloud provider account.
4. For Cloud provider, select Microsoft Azure Storage from the drop-down list.
5. For Account type, select Government or Public.
6. Select the storage class from the drop-down list.
7. Enter the provider Account name.
8. Enter the provider Primary key as password text.
9. Enter the provider Secondary key as password text.
10. Ensure that port 443 (HTTPS) is not blocked in firewalls. Communication with the Azure cloud provider occurs on port 443.
11. If an HTTP proxy server is required to get around a firewall for this provider, click Configure for HTTP Proxy Server.
Enter the proxy hostname, port, user, and password.
NOTE: There is an optional step to run the cloud provider verify tool before adding the cloud unit. This tool performs
pre-check tests to ensure that all requirements are met before to adding the actual cloud unit.
The Google Cloud Provider user credentials must have permissions to create and delete buckets and to add, modify, and delete
files within the buckets they create. These are the minimum requirements:
● ListBucket
● PutBucket
● GetBucket
● DeleteBucket
● GetObject
● PutObject
● DeleteObject
NOTE:
Cloud Tier only supports Nearline and is selected automatically during setup.
Steps
1. Select Data Management > File System > Cloud Units.
2. Click Add.
The Add Cloud Unit dialog is displayed.
3. Enter a name for this cloud unit. Only alphanumeric characters are allowed.
The remaining fields in the Add Cloud Unit dialog pertain to the cloud provider account.
4. For Cloud provider, select Google Cloud Storage from the drop-down list.
5. Enter the provider Access key as password text.
6. Enter the provider Secret key as password text.
7. Storage class is set as Nearline by default.
Steps
1. Select Data Management > File System > Cloud Units.
2. Click Add.
The Add Cloud Unit dialog is displayed.
3. Enter a name for this cloud unit. Only alphanumeric characters are allowed.
The remaining fields in the Add Cloud Unit dialog pertain to the cloud provider account.
4. For Cloud provider, select Flexible Cloud Tier Provider Framework for S3 from the drop-down list.
5. Enter the provider Access key as password text.
6. Enter the provider Secret key as password text.
7. Specify the appropriate Storage region.
8. Enter the provider Endpoint in this format: http://<ip/hostname>:<port>. If you are using a secure endpoint, use
https instead.
9. For Storage class, select the appropriate storage class from the drop-down list.
10. Ensure that port 443 (HTTPS) is not blocked in firewalls. Communication with the S3 cloud provider occurs on port 443.
11. If an HTTP proxy server is required to get around a firewall for this provider, click Configure for HTTP Proxy Server.
Enter the proxy hostname, port, user, and password.
NOTE: There is an optional step to run the cloud provider verify tool before adding the cloud unit. This tool performs
pre-check tests to ensure that all requirements are met before to adding the actual cloud unit.
5. For Secret key, enter the new provider secret key as password text.
6. For Primary key, enter the new provider primary key as password text.
NOTE: Modifying the primary key is only supported for Azure environments.
7. If an HTTP proxy server is required to get around a firewall for this provider, click Configure for HTTP Proxy Server.
8. Click OK.
Steps
1. Select Data Management > File System > Cloud Units.
2. Click the pencil icon for the AWS S3 cloud unit whose storage class you want to modify.
The Modify Cloud Unit dialog is displayed.
3. Select the new storage class from the drop-down list.
4. Click OK.
Prerequisites
● Check if data movement to the cloud is running (CLI command: data-movement status). If it is, stop data movement using
the “data-movement stop” CLI command.
● Check if cloud cleaning is running for this cloud unit (CLI command: cloud clean status). If it is, stop cloud cleaning using the
“cloud clean” CLI command.
● Check if a data movement policy is configured for this cloud unit (CLI command: data-movement policy show). If it is,
remove this policy using the “data-movement policy reset” CLI command.
Steps
1. Use the following CLI command to identify files in the cloud unit.
Wait for cleaning to complete. The cleaning may take time depending on how much data is present in the cloud unit.
4. Disable the file system.
5. Use the following CLI command to delete the cloud unit.
Results
If you have difficulty completing this procedure, contact Support.
NOTE: A data movement policy cannot be configured for the /backup MTree.
Steps
1. Select Data Management > MTree.
2. In the top panel, select the MTree to which you want to add a data movement policy.
3. Click the Summary tab.
4. Under Data Movement Policy click Add.
5. For File Age in Days, set the file age threshold (Older than) and optionally, the age range (Younger than).
NOTE: The minimum number of days for Older than is 14. For nonintegrated backup applications, files moved to the
cloud tier cannot be accessed directly and need to be recalled to the active tier before you can access them. So, choose
the age threshold value as appropriate to minimize or avoid the need to access a file moved to the cloud tier.
Steps
1. Select Data Management > File System.
2. At the bottom of the page, click Show Status of File System Services.
These status items are displayed:
● File System
● Physical Capacity Measurement
● Data Movement
● Active Tier Cleaning
3. For Data Movement, click Start.
Steps
1. Select Data Management > File System > Settings.
2. Click the Data Movement tab.
3. Set the throttle and schedule.
NOTE: The throttle is for adjusting resources for internal system processes; it does not affect network bandwidth.
NOTE: In an MTree replication context, the file is read-only on the destination MTree.
NOTE: If a file resides only in a snapshot, it cannot be recalled directly. To recall a file in a snapshot, use fastcopy to copy
the file from the snapshot back to the active MTree, then recall the file from the cloud. A file can only be recalled from the
cloud to an active MTree.
Steps
1. Select Data Management > File System > Summary.
2. Do one of the following:
● In the Cloud Tier section of the Space Usage panel, click Recall.
● Expand the File System status panel at the bottom of the screen and click Recall.
NOTE: The Recall link is available only if a cloud unit is created and has data.
3. In the Recall File from Cloud dialog, enter the exact file name (no wildcards) and full path of the file to be recalled, for
example: /data/col1/mt11/file1.txt. Click Recall.
4. To check the status of the recall, do one of the following:
● In the Cloud Tier section of the Space Usage panel, click Details.
● Expand the File System status panel at the bottom of the screen and click Details.
The Cloud File Recall Details dialog is displayed, showing the file path, cloud provider, recall progress, and amount of data
transferred. If there are unrecoverable errors during the recall, an error message is displayed. Hover the cursor over the error
message to display a tool tip with more details and possible corrective actions.
Results
Once the file has been recalled to the active tier, you can restore the data.
NOTE: For nonintegrated applications, once a file has been recalled from the cloud tier to the active tier, a minimum of 14
days must elapse before the file is eligible for data movement. After 14 days, normal data movement processing will occur
for the file. The file now has to wait the age-threshold or age-range to move back to the cloud as this time the ptime will be
examined rather than the mtime. This restriction does not apply to integrated applications.
NOTE: For data-movement, nonintegrated applications configure an age-based data movement policy on the protection
system to specify which files get migrated to the cloud tier, and this policy applies uniformly to all files in an MTree.
Integrated applications use an application-managed data movement policy, which lets you identify specific files to be
migrated to the cloud tier.
Steps
1. Check the location of the file using: filesys report generate file-location [path {<path-name> |
all}] [output-file <filename>]
The pathname can be a file or directory; if it is a directory, all files in the directory are listed.
Filename Location
-------- --------
/data/col1/mt11/file1.txt Cloud Unit 1
3. Monitor the status of the recall using data-movement status [path {pathname | all | [queued]
[running] [completed] [failed]} | to-tier cloud | all]
4. Verify the location of the file using filesys report generate file-location [path {<path-name> | all}]
[output-file <filename>]
Filename Location
-------- --------
/data/col1/mt11/file1.txt Active
Results
Once the file has been recalled to the active tier, you can restore the data.
NOTE: For nonintegrated applications, once a file has been recalled from the cloud tier to the active tier, a minimum of 14
days must elapse before the file is eligible for data movement. After 14 days, normal data movement processing will occur
for the file. This restriction does not apply to integrated applications.
NOTE: For data-movement, nonintegrated applications configure an age-based data movement policy on the protection
system to specify which files get migrated to the cloud tier, and this policy applies uniformly to all files in an MTree.
Integrated applications use an application-managed data movement policy, which lets you identify specific files to be
migrated to the cloud tier.
Steps
1. Configure storage for both active and cloud tier. As a prerequisite, the appropriate capacity licenses for both the active and
cloud tiers must be installed.
a. Ensure licenses for the features CLOUDTIER-CAPACITY and CAPACITY-ACTIVE are installed. To check the ELMS
license:
# elicense show
If the license is not installed, use the elicense update command to install the license. Enter the command and paste
the contents of the license file after this prompt. After pasting, ensure there is a carriage return, then press Control-D
to save. You are prompted to replace licenses, and after answering yes, the licenses are applied and displayed.
# elicense update
Enter the content of license file and then press Control-D, or press Control-C to
cancel.
2. Install certificates.
Before you can create a cloud profile, you must install the associated certificates.
For AWS and Azure public cloud providers, root CA certificates can be downloaded from https://www.digicert.com/digicert-
root-certificates.htm.
● For an AWS or Azure cloud provider, download the Baltimore CyberTrust Root certificate.
● For Alibaba, Alibaba download the GlobalSign Root R1 certificate from https://support.globalsign.com/customer/portal/
articles/1426602-globalsign-rootcertificates.
● For ECS, the root certificate authority will vary by customer. Contact your load balancer provider for details.
Downloaded certificate files have a .crt extension. Use openssl on any Linux or Unix system where it is installed to convert
the file from .crt format to .pem.
3. To configure the system for data-movement to the cloud, you must first enable the “cloud” feature and set the system
passphrase if it has not already been set.
4. Configure the cloud profile using the cloud provider credentials. The prompts and variables vary by provider.
NOTE: For security reasons, this command does not display the access/secret keys you enter.
● Alibaba Cloud requires access key, secret key, storage class and region.
● AWS S3 requires access key, secret key, storage class, and region.
● Azure requires account name, whether or not the account is an Azure Government account, primary key, secondary key,
and storage class.
● ECS requires entry of access key, secret key and endpoint.
● Google Cloud Platform requires access key, secret key, and region. (Storage class is Nearline.)
● S3 Flexible providers require the provider name, access key, secret key, region, endpoint, and storage class.
At the end of each profile addition you are asked if you want to set up a proxy. If you do, these values are required: proxy
hostname, proxy port, proxy username, and proxy password.
5. Verify the cloud profile configuration:
# filesys create
# filesys enable
# elicense show
Connectivity Check:
Checking firewall access: PASSED
Validating certificate PASSED
Account Validation:
Creating temporary profile: PASSED
Creating temporary bucket: PASSED
S3 API Validation:
Validating Put Bucket: PASSED
Validating List Bucket: PASSED
Validating Put Object: PASSED
Validating Get Object: PASSED
Validating List Object: PASSED
Validating Delete Object: PASSED
Validating Bulk Delete: PASSED
Cleaning Up:
Deleting temporary bucket: PASSED
Deleting temporary profile: PASSED
12. Configure the file migration policy for this MTree. You can specify multiple MTrees in this command. The policy can be based
on the age threshold or the range.
a. To configure the age-threshold (migrating files older than the specified age to cloud):
b. To configure the age-range (migrating only those files that are in the specified age-range):
13. Export the file system, and from the client, mount the file system and ingest data into the active tier. Change the
modification date on the ingested files such that they now qualify for data migration. (Set the date to older than the
age-threshold value specified when configuring the data-movement policy.)
14. Initiate file migration of the aged files. Again, you can specify multiple MTrees with this command.
# data-movement status
You can also watch the progress of data-movement:
# data-movement watch
15. Verify that file migration worked and the files are now in the cloud tier:
16. Once you have migrated a file to the cloud tier, you cannot directly read from the file (attempting to do so results in an
error). The file can only be recalled back to the active tier. To recall a file to the active tier:
Steps
1. Select Data Management > File System > DD Encryption.
NOTE: If no encryption license is present on the system, the Add Licenses page is displayed.
3. Enter the security officer Username and Password. Optionally, check Restart file system now.
4. Click Enable or Disable, as appropriate.
5. In the File System Lock panel, lock or unlock the file system.
6. In the Key Management panel, click Configure.
7. In the Change Key Manager dialog, configure security officer credentials and the key manager.
NOTE: Cloud encryption is allowed only through the Embedded Key Manager. External key managers are not supported.
8. Click OK.
9. Use the DD Encryption Keys panel to configure encryption keys.
NOTE: Files in the Cloud Tier cannot be used as base files for virtual synthetic operations. The incremental forever or
synthetic full backups need to ensure that the files remain in the Active Tier if they will be used in virtual synthesis of new
backups.
Steps
1. Select Data Management > File System > Charts.
2. For Chart, select one of the following:
● Space Usage
● Consumption
● Daily Written
3. For Scope, select Cloud Tier.
● The Space Usage Tab displays space usage over time, in MiB. You can select a duration (one week, one month, three
months, one year, or All). The data is presented (color-coded) as pre-compression used (blue), post-compression used
(red), and the compression factor (green).
● The Consumption Tab displays the amount of post-compression storage used and the compression ratio over time, which
enables you to analyze consumption trends. You can select a duration (one week, one month, three months, one year, or
All). The data is presented (color-coded) as capacity (blue), post-compression used (red), compression factor (green),
cleaning (orange) and data movement (violet).
● The Daily Written Tab displays the amount of data written per day. You can select a duration (one week, one
month, three months, one year, or All). The data is presented (color-coded) as pre-compression written (blue), post-
compression used (red), and the total compression factor (green).
Prerequisites
Delete all files in the cloud units before removing the Cloud Tier configuration from the system. Run the filesys report
generate file-location path all output-file file_loc command to identify the files in the cloud units, and
delete them from the NFS mount points of the MTrees.
NOTE: The command above creates the report file_loc in the /ddr/var/ directory.
Steps
1. Disable the file system.
# filesys disable
ok, proceeding.
Please wait..............
The filesystem is now disabled.
ok, proceeding.
ok, proceeding.
# filesys enable
Please wait...........................................
The filesystem is now enabled.
6. Run the cloud unit list command to verify that neither cloud unit appears.
Contact Support if one or both cloud units still display with the status Delete-Pending.
7. Identify the disk enclosures that are assigned to Cloud Tier.
Each edition requires a separate, add-on license, and either or both can be used on a single system.
The retention-locking protocol is the same for both the DD Retention Lock Governance and Compliance Editions. The
differences in use stem from the system behavior for the DD Retention Lock Compliance Edition, since it places strict
restrictions to meet compliance requirements. For an overview, see the EMC Data Domain Retention Lock Software – A
Detailed Review (a white paper) available at https://www.dellemc.com/en-us/index.htm. Login is required.
The DD Retention Lock Governance Edition does not require a security officer and provides a higher degree of flexibility for
archive data retention.
For archive compliance storage requirements, SEC rules require that a separate copy of retention-locked data must be stored
with the same retention requirements as the original. Retention-locked files can be replicated using DD Replicator to another
Data Domain or PowerProtect system. If a retention-locked file is replicated, it remains retention locked on the destination
system, with the same level of protection as the source file.
DD Retention Lock Governance Edition is supported for on-premises, cloud-based, and DD3300 DD VE instances. DD Retention
Lock Compliance Edition is not supported for on-premises, cloud-based, or DD3300 DD VE instances.
The topics that follow provide additional information on DD Retention Lock.
Files that are written to shares or exports that are not committed to be retained (even if DD Retention Lock Governance or
Compliance is enabled on the MTree containing the files) can be modified or deleted at any time.
Retention locking prevents any modification or deletion of files under retention from occurring directly from CIFS shares or NFS
exports during the retention period specified by a client-side atime update command. Some archive applications and backup
applications can issue this command when appropriately configured. Applications or utilities that do not issue this command
cannot lock files using DD Retention Lock.
Retention-locked files are always protected from modification and premature deletion, even if retention locking is subsequently
disabled or if the retention-lock license is no longer valid.
You cannot rename or delete non-empty folders or directories within an MTree that is retention-lock enabled. However, you can
rename or delete empty folders or directories and create new ones.
The retention period of a retention-locked file can be extended (but not reduced) by updating the file’s atime.
For both DD Retention Lock Governance and Compliance, once the retention period for a file expires, the file can be deleted
using a client-side command, script, or application. However, the file cannot be modified even after the retention period for the
file expires. The system never automatically deletes a file when its retention period expires.
Related concepts
Client-Side Retention Lock file control on page 347
Setting Retention Locking on a file on page 348
Extending Retention Locking on a file on page 350
Supported data access protocols on page 341
Related concepts
Extending Retention Locking on a file on page 350
Client-Side Retention Lock file control on page 347
Deleting or expiring a file on page 351
Related concepts
DD Virtual Tape Library overview on page 225
Prerequisites
This task is only for DD6900, DD9400, and DD9900 systems.
Configure a security officer authorization policy on the system, and run the system retention-lock configure
command to configure Retention Lock Compliance Edition on the system.
Steps
1. Select Administration > Compliance.
NOTE: If no license for DD Retention Lock Compliance is present on the system, the Compliance page displays with
a message warning that there is no license.
b. In the Username field, specify a username for the iDRAC user account.
c. In the Password and Confirm Password fields, specify a password for the iDRAC user account.
d. Click Add User to add the user.
Prerequisites
This task is only for DD6900, DD9400, and DD9900 systems.
Steps
1. Select Administration > Compliance.
2. Select an iDRAC operator from the iDRAC Users table.
3. Click Enable.
4. Specify the security officer credentials, and click OK.
5. In the Duration list box, select the amount of time to allow access and click OK.
NOTE: Unless the access duration is extended, the account will be automatically disabled once the specified duration
expires.
Prerequisites
This task is only for DD6900, DD9400, and DD9900 systems.
Steps
1. Select Administration > Compliance.
2. Select an iDRAC operator from the iDRAC Users table.
3. Click Enable and select the duration from the list box.
4. Specify the security officer credentials, and click Authorize.
5. In the Duration list box, select the amount of time to allow access and click Save.
6. Click Yes at the confirmation prompt.
Prerequisites
This task is only for DD6900, DD9400, and DD9900 systems.
Steps
1. Select Administration > Compliance.
2. Select an iDRAC operator from the iDRAC Users table.
3. Click Disable.
4. Specify the security officer credentials, and click OK.
Steps
1. Add the DD Retention Lock Governance license, if it is not listed under Feature Licenses.
a. Select Administration > Licenses
b. In the Licenses area click Add Licenses.
c. In the License Key text box, type the license key.
NOTE: License keys are case-insensitive. Include the hyphens when typing keys.
d. Click Add.
2. Select an MTree for retention locking.
a. Select Data Management > MTree.
b. Select the MTree you want to use for retention locking. You can also create an empty MTree and add files to it later.
3. Click the MTree Summary tab to display information for the selected MTree.
4. Scroll down to Retention Lock area and click Edit to the right of Retention Lock.
5. Enable DD Retention Lock Governance on the MTree and change the default minimum and maximum retention lock periods
for the MTree, if required.
Perform the following actions in the Modify Retention Lock dialog box:
NOTE: If a file is modified before the automatic lock delay has elapsed, the lock delay time starts over when
the file modification is complete. For example, if the lock delay is 120 minutes and the file is modified after 60
minutes, the lock delay will start again at 120 minutes after the file is modified.
c. Click OK to save the settings.
After you close the Modify Retention Lock dialog box, which is updated MTree information appears in the Retention Lock
area.
6. Check retention lock information for the MTree.
Next steps
Retention-lock files in a retention-lock-enabled MTree.
Related concepts
Client-Side Retention Lock file control on page 347
Steps
1. Add the DD Retention Lock Compliance license on the system, if it is not present.
a. First, check whether the license is already installed.
elicense show
b. If the RETENTION-LOCK-COMPLIANCE feature is not displayed, install the license.
elicense update license-file
2. Set up one or more security officer users accounts according to Role-Base Access Control (RBAC) rules.
a. In the system administrator role, add a security officer account.
user add user role security
b. Enable the security officer authorization.
authorization policy set security-officer enabled
3. Configure and enable the system to use DD Retention Lock Compliance.
NOTE: Enabling DD Retention Lock Compliance enforces many restrictions on low-level access to system functions
used during troubleshooting. Once enabled, the only way to disable DD Retention Lock Compliance is to initialize and
reload the system, which results in destroying all data on the system.
CAUTION: When setting the lock period for Retention Lock Compliance MTrees, users cannot set the period
to be less than the current minimum or maximum period allowed. Doing so generates a message notifying the
user that the entry was invalid and stating the minimum or maximum retention period allowed.
5. To change the default minimum and maximum retention lock periods for a compliance-enabled MTree, type the following
commands with security officer authorization.
● mtree retention-lock set min-retention-period period mtree mtree-path
● mtree retention-lock set max-retention-period period mtree mtree-path
NOTE: The retention period is specified in the format [number] [unit]. For example: 1 min, 1 hr, 1 day, 1 mo, or 1 year.
Specifying a minimum retention period of less than 12 hours, or a maximum retention period longer than 70 years, results
in an error.
6. To change the automatic retention period and automatic lock delay for a compliance-enabled MTree, type the following
commands with security officer authorization.
● mtree retention-lock set automatic-retention-period period mtree mtree-path
NOTE: The automatic retention period is specified in the format [number] [unit]. For example: 1 min, 1 hr, 1 day, 1 mo,
or 1 year. The value must be between the minimum and maximum retention periods.
● mtree retention-lock set automatic-lock-delay time mtree mtree-path
NOTE: The automatic lock delay time is specified in the format [number] [unit]. For example: 5 min, 2 hr, or 1 day.
The value must be between five minutes and seven days. The default is 120 minutes. If a file is modified before the
automatic lock delay has elapsed, the lock delay time starts over when the file modification is complete. For example,
if the lock delay is 120 minutes and the file is modified after 60 minutes, the lock delay will start again at 120 minutes
after the file is modified.
Repeat steps 4 through 6 to enable additional MTrees.
Next steps
Retention lock files reside in a retention-lock-enabled MTree.
Related concepts
Client-Side Retention Lock file control on page 347
Role-based access control on page 63
Prerequisites
DD Retention Lock (Governance or Compliance) must be enabled on the MTree to place an IRH.
Steps
1. Select an MTree to place the IRH.
a. Select Data Management > MTree.
b. Select the MTree on which to place the IRH.
2. Click the MTree Summary tab to display information for the selected MTree.
3. Scroll down to the Indefinite Retention Hold area and click Place Indefinite Retention Hold (IRH).
Results
No file deletion is allowed for locked files when an IRH is in place, including expired files. Unlocked files may be deleted. DD
Retention Lock Governance can be modified but not disabled on an MTree with an IRH in place.
Steps
1. Select an MTree from which to remove the IRH.
a. Select Data Management > MTree.
b. Select the MTree from which to remove the IRH.
2. Click the MTree Summary tab to display information for the selected MTree.
3. Scroll down to Indefinite Retention Hold area and click Remove Indefinite Retention Hold.
4. Click OK.
Results
File deletion is allowed immediately, and DD Retention Lock can be disabled on an MTree with the IRH removed.
NOTE: Some client machines using NFS, but running a legacy OS, cannot set retention time later than 2038. The NFS
protocol doesn’t impose the 2038 limit and allows to specifying times until 2106. Further, DD OS doesn’t impose the 2038
limit.
Client-side commands are used to manage the retention locking of individual files. These commands apply to all retention-lock-
capable systems and must be issued in addition to the setup and configuration of DD Retention Lock on the system.
NOTE: The touch command for Windows may have a different format than the Linux examples in this chapter.
Follow the installation instructions provided and set the search path as needed on the client machine.
Related concepts
Enabling DD Retention Lock on an MTree on page 344
Figure 18. Valid and invalid atimes for retention locking files
NOTE: Some client machines using NFS, but running a legacy OS, cannot set retention time later than 2038. The NFS
protocol doesn’t impose the 2038 limit and allows to specifying times until 2106. Further, DD OS doesn’t impose the 2038
limit.
NOTE: A file must be completely written to the system before it is committed to be a retention-locked file.
Figure 19. Valid and invalid atimes for extending retention locking on files
For example, changing the atime from 201412312230 to 202012121230 using the following command:
NOTE: For more information, refer to the KB article Data Domain: How to delete data, available from the Online Support
website.
Steps
1. Use the mtree retention-lock revert path command to revert the retention locked file.
2. Delete the file on the client system using the rm filename command.
ctime
ctimegets set to the current time when any of the follow events occur:
● A non-retention-locked file is retention locked.
● The retention time of a retention-locked file is extended.
● A retention-locked file is reverted.
NOTE: User access permissions for a retention-locked file are updated using the Linux command line tool chmod.
mtime
mtime is the last-modified time of a file. It changes only when the contents of the file change. So, the mtime of a retention-
locked file cannot change.
Replication
Collection replication, MTree replication, and directory replication replicate the locked or unlocked state of files.
Files that are governance retention locked on the source are governance retention locked on the destination and have the same
level of protection. For replication, the source system must have a DD Retention Lock Governance license installed—a license is
not required on the destination system.
Replication is supported between systems that are:
● Running the same major DD OS version (for example, both systems are running DD OS 5.5.x.x).
● Running DD OS versions within the next two consecutive higher or lower major releases (for example, 5.3.x.x to 5.5.x.x or
5.5.x.x to 5.3.x.x). Cross-release replication is supported only for directory and MTree replication.
NOTE: MTree replication is not supported for DD OS 5.0 and earlier.
Be aware that:
● Collection replication and MTree replication replicate the minimum and maximum retention periods configured on MTrees to
the destination system.
Replication Resync
The replication resync destination command tries to bring the destination into sync with the source when the MTree or
directory replication context is broken between destination and source systems. This command cannot be used with collection
replication. Note that:
● If files are migrated to the cloud tier before the context is broken, the MTree replication resync overwrites all the data on
the destination, so you will need to migrate the files to the cloud tier again.
● If the destination directory has DD Retention Lock enabled, but the source directory does not have DD Retention Lock
enabled, then a resync of a directory replication will fail.
● With Mtree replication, resync will fail if the source MTree does not have retention lock enabled and the destination MTree
has retention lock enabled.
● With Mtree replication, resync will fail if the source and destination MTrees are retention lock enabled but the propagate
retention lock option is set to FALSE.
Related concepts
DD Replicator overview on page 270
Fastcopy
When the filesys fastcopy [retention-lock] source src destination dest command is run on a system with
a DD Retention Lock Governance enabled MTree, the command preserves the retention lock attribute during the fastcopy
operation.
NOTE: If the destination MTree is not retention lock enabled, the retention-lock file attribute is not preserved.
Filesys destroy
Effects of the filesys destroy command when it is run on a system with a DD Retention Lock Governance enabled MTree.
● All data is destroyed, including retention-locked data.
● All filesys options are returned to their defaults. This means that retention locking is disabled and the minimum and
maximum retention periods are set back to their default values on the newly created file system.
NOTE: This command is not allowed if DD Retention Lock Compliance is enabled on the system.
MTree delete
When the mtree delete mtree-path command attempts to delete a DD Retention Lock Governance enabled (or previously
enabled) MTree that currently contains data, the command returns an error.
NOTE: The behavior of mtree delete is a similar to a command to delete a directory—an MTree with retention lock
enabled (or previously enabled) can be deleted only if the MTree is empty.
Replication
An MTree enabled with DD Retention Lock Compliance can be replicated via MTree and collection replication only. Directory
replication is not supported.
MTree and collection replication replicate the locked or unlocked state of files. Files that are compliance retention locked on
the source are compliance retention locked on the destination and have the same level of protection. Minimum and maximum
retention periods configured on MTrees are replicated to the destination system.
To perform collection replication, the same security officer user must be present on both the source and destination systems
before starting replication to the destination system and afterward for the lifetime of the source/replica pair.
Replication Resync
The replication resync destination command can be used with MTree replication, but not with collection replication.
● If the destination MTree contains retention-locked files that do not exist on the source, then resync will fail.
● Both source and destination MTrees must be enabled for DD Retention Lock Compliance, or resync will fail.
Related concepts
DD Replicator overview on page 270
Replication procedures
The topics in this section describe MTree and collection replication procedures supported for DD Retention Lock Compliance.
NOTE: For full descriptions of the commands referenced in the following topics, see the DD OS Command Reference
Guide.
Prerequisites
Enable DD Retention Lock on an MTree and configure client-side retention lock file control before replication.
Steps
1. Until instructed otherwise, perform the following steps on the destination system only.
2. Add the DD Retention Lock Compliance license on the system, if it is not present.
a. First, check whether the license is already installed.
elicense show
b. If the RETENTION-LOCK-COMPLIANCE feature is not displayed, install the license.
elicense update license-file
3. Set up one or more security officer users accounts according to Role-Base Access Control (RBAC) rules.
a. In the system administrator role, add a security officer account.
user add user role security
b. Enable the security officer authorization.
authorization policy set security-officer enabled
4. Configure and enable the system to use DD Retention Lock Compliance.
CAUTION: When setting the lock period for Retention Lock Compliance MTrees, users cannot set the period
to be less than the current minimum or maximum period allowed. Doing so generates a message notifying the
user that the entry was invalid and stating the minimum or maximum retention period allowed.
Related concepts
Client-Side Retention Lock file control on page 347
Related tasks
Enabling DD Retention Lock Compliance on an MTree on page 345
Prerequisites
Enable DD Retention Lock compliance on an MTree and configure client-side retention lock file control before replication.
Steps
1. Until instructed otherwise, perform the following steps on the destination system only.
2. Add the DD Retention Lock Compliance license on the system, if it is not present.
a. First, check whether the license is already installed.
elicense show
b. If the RETENTION-LOCK-COMPLIANCE feature is not displayed, install the license.
elicense update license-file
3. Set up one or more security officer users accounts according to Role-Base Access Control (RBAC) rules.
a. In the system administrator role, add a security officer account.
user add user role security
b. Enable the security officer authorization.
authorization policy set security-officer enabled
4. Configure and enable the system to use DD Retention Lock Compliance.
CAUTION: When setting the lock period for Retention Lock Compliance MTrees, users cannot set the period
to be less than the current minimum or maximum period allowed. Doing so generates a message notifying the
user that the entry was invalid and stating the minimum or maximum retention period allowed.
Related concepts
Client-Side Retention Lock file control on page 347
Related tasks
Enabling DD Retention Lock Compliance on an MTree on page 345
Steps
1. Until instructed otherwise, perform the following steps on both the source and destination systems.
2. Log in to the DD System Manager.
The DD System Manager window appears with DD Network in the Navigation panel.
3. Select a protection system.
In the Navigation panel, expand DD Network and select a system
4. Add the DD Retention Lock Governance license, if it is not listed under Feature Licenses.
a. Select Administration > Licenses
b. In the Licenses area click Add Licenses.
c. In the License Key text box, type the license key.
NOTE: License keys are case-insensitive. Include the hyphens when typing keys.
d. Click Add.
5. Break the current MTree context on the replication pair.
replication break mtree://destination-system-name/data/col1/mtree-name
6. Create the new replication context.
Related concepts
Client-Side Retention Lock file control on page 347
Related tasks
Enabling DD Retention Lock Governance on an MTree on page 344
Steps
1. On the source system only:
a. Create a snapshot for each DD Retention Lock Compliance enabled MTree.
snapshot create snapshot-name /data/col1/mtree-name
b. Synchronize the collection replication pair.
replication sync col://destination-system-name
c. Confirm that replication is complete.
replication status col://destination-system-name detailed
This command reports 0 pre-compressed bytes remaining when replication is finished.
d. View snapshot information for each DD Retention Lock Compliance enabled MTree.
snapshot list mtree /data/col1/mtree-name
Note the snapshot names for use later.
2. On the destination system only:
a. Confirm that the replication is complete.
replication status mtree://destination-system-name/data/col1/mtree-name detailed
This command reports 0 pre-compressed bytes remaining when replication is finished.
b. View each MTree snapshot replicated to the destination system.
snapshot list mtree /data/col1/mtree-name
c. Ensure that all DD Retention Lock Compliance MTree snapshots have been replicated by comparing the snapshot names
generated here with those generated on the source system.
snapshot list mtree /data/col1/mtree-name
3. On the both the source and destinations systems:
a. Disable the file system.
filesys disable
b. Break the collection replication context.
replication break col://destination-system-name
c. Enable the file system. (Security officer authorization may be required.)
filesys enable
Steps
1. Until instructed to do differently, perform the following steps on the source system only.
2. Log in to the DD System Manager.
The DD System Manager window appears with DD Network in the Navigation Panel.
3. Select a protection system.
In the Navigation Panel, expand DD Network and select a system.
4. Add the DD Retention Lock Governance license, if it is not listed under Feature Licenses.
a. Select Administration > Licenses
b. In the Licenses area click Add Licenses.
c. In the License Key text box, type the license key.
NOTE: License keys are case-insensitive. Include the hyphens when typing keys.
d. Click Add.
5. Create the replication context.
replication add source col://source-system-name destination col://destination-system-name
6. Until instructed to do differently, perform the following steps on the destination system only.
7. Destroy the file system.
filesys destroy
8. Log in to the DD System Manager.
The DD System Manager window appears with DD Network in the Navigation Panel.
9. Select a protection system.
In the Navigation Panel, expand DD Network and select a system.
10. Create a file system, but do not enable it.
filesys create
11. Create the replication context.
replication add source col://source-system-name destination col://destination-system-name
12. Configure and enable the system to use DD Retention Lock Compliance.
a. system retention-lock compliance configure
b. user idrac create
c. system retention-lock compliance enable
13. Perform the following steps on the source system only.
Related tasks
Enabling DD Retention Lock Governance on an MTree on page 344
Steps
1. Until instructed otherwise, perform the following steps on both the source and destination systems.
2. Disable the replication.
replication disable col://destination-system-name
3. Log in to the DD System Manager.
The DD System Manager window appears with DD Network in the Navigation Panel.
4. Select a protection system.
In the Navigation Panel, expand DD Network and select a system.
5. Until instructed otherwise, perform the following steps on the source system.
6. Configure and enable the system to use DD Retention Lock Compliance.
system retention-lock compliance configure
(The system automatically reboots by executing the system retention-lock compliance enable command.)
7. Enable the replication context.
replication enable col://destination-system-name
8. Until instructed otherwise, perform the following steps on the destination system.
9. Configure and enable the system to use DD Retention Lock Compliance.
a. system retention-lock compliance configure
b. user idrac create
c. system retention-lock compliance enable
10. Enable the replication context.
replication enable col://destination-system-name
Related tasks
Enabling DD Retention Lock Governance on an MTree on page 344
Fastcopy
When the filesys fastcopy [retention-lock] source src destination dest command is run on a system with
a DD Retention Lock Compliance enabled MTree, the command preserves the retention lock attribute during the fastcopy
operation.
NOTE: If the destination MTree is not retention lock enabled, the retention-lock file attribute is not preserved.
CIFS
When DD Retention Lock Compliance is enabled, CIFS servers no longer synchronize the system time with Active Directory. If
there is a time difference of greater than five minutes between the system and Active Directory, the CIFS server displays an
CLI usage
Considerations for a protection system with DD Retention Lock Compliance.
● Commands that break compliance cannot be run. The following commands are disallowed:
○ filesys destroy
○ mtree delete mtree-path
○ mtree retention-lock reset {min-retention-period period | max-retention-period period}
mtree mtree-path
○ mtree retention-lock disable mtree mtree-path
○ mtree retention-lock revert
○ user reset
● The following command requires security officer authorization if the license being deleted is for DD Retention Lock
Compliance:
○ elicense reset
○ elicense update
● The following commands require security officer authorization if DD Retention Lock Compliance is enabled on an MTree
specified in the command:
○ mtree retention-lock set {min-retention-period period | max-retention-period period}
mtree mtree-path
○ mtree rename mtree-path new-mtree-path
● The following commands require security officer authorization if DD Retention Lock Compliance is enabled on the system:
NOTE: These commands must be run in interactive mode.
System clock
DD Retention Lock Compliance implements an internal security clock to prevent malicious tampering with the system clock.
The security clock closely monitors and records the system clock. If the accumulated skew between the security clock and the
system clock reaches a designated value, the file system is disabled and can be resumed only by a security officer.
The allowed skew value is user-configurable, with a system default of 14 days if no value is specified.
Prerequisites
Changing the allowed clock skew threshold from the system default of 14 days requires that a value be set for the system date
change limit. Setting system date change frequency and date change limit on page 28 describes how to set the system date
change limit.
Steps
1. Run the system show clock-violation-action command to display the allowed clock skew value.
If this parameter has not been configured, the system default value is 14 days.
2. Run the system set clock-violation-action command to set the allowed clock skew value.
Specify the threshold in the format [<number>] [<unit>]. Possible unit values are:
● min
● hr
● day
● mo
● year
The minimum allowed value is the system date change limit, and the maximum allowed value is one year. The value never
can be used to ensure the file system is never disabled for any amount of clock skew on the system.
Steps
1. At the system console, enable the file system.
filesys enable
2. At the prompt, confirm that you want to quit the filesys enable command and check whether the system date is right.
3. Display the system date.
system show date
4. If the system date is not correct, set the correct date (security officer authorization is required) and confirm it.
system set date MMDDhhmm[[CC]YY]system show date
5. Enable the file system again.
filesys enable
6. At the prompt, continue to the enabling procedure.
7. A security officer prompt appears. Complete the security officer authorization to start the file system. The security clock will
automatically be updated to the current system date.
DD Encryption overview
Data encryption protects user data if the protection system is stolen or if the physical storage media is lost during transit, and it
eliminates accidental exposure of a failed drive if it is replaced.
When data enters the protection system using any of the supported protocols (NFS, CIFS, DD VTL, DD Boost, and NDMP Tape
Server), the stream is segmented, fingerprinted, and de-duplicated (global compression). It is then grouped into multi-segment
compression regions, locally compressed, and encrypted before being stored to disk.
Once enabled, the DD Encryption feature encrypts all data entering the system. You cannot enable encryption at a more
granular level.
CAUTION: Data that has been stored before the DD Encryption feature is enabled does not automatically get
encrypted. To protect all of the data on the system, be sure to enable the option to encrypt existing data when
you configure encryption.
Additional Notes:
The filesys encryption apply-changes command applies any encryption configuration changes to all data present in
the file system during the next cleaning cycle. For more information about this command, see the DD OS Command Reference
Guide.
DD Encryption supports all of the currently supported backup applications described in the Backup Compatibility Guides available
through Online Support at http://support.emc.com.
DD Replicator can be used with encryption, enabling encrypted data to be replicated using collection, directory, MTree, or
application-specific managed file replication with the various topologies. Each replication form works uniquely with encryption
and offers the same level of security. For more information, see the section on using DD Encryption with replication.
Files locked using DD Retention Lock can be stored, encrypted, and replicated.
The autosupport feature includes information about the state of encryption on the system:
● Whether or not encryption is enabled
● The Key Manager in effect and which keys are used
● The encryption algorithm that is configured
● The state of the file system
Related concepts
Using DD Encryption with DD Replicator on page 278
DD Encryption 363
Configuring encryption
This procedure includes configuring a key manager.
If the Encryption Status on the Data Management > File System > Encryption tab shows Not Configured, click Configure
to set up encryption on the protection system.
NOTE: Applications may experience an interruption while the file system is restarted.
Related concepts
Managing the system passphrase on page 25
Related tasks
Changing key managers after setup on page 373
364 DD Encryption
KeySecure
KeySecure 8.5 and 8.9 supported, which is a KMIP-compliant key manager product from Safenet Inc/Gemalto Keysecure. To
be able to use KMIP key manager, users have to configure both the key manager and the protection system/DDVE, to trust
each other. Users have to pre-create keys on the key manager. A protection system will retrieve these keys and their states
from KeySecure after establishing a secure TLS connection. See the DD OS and Gemalto KeySecure Integration Guide for more
information about how to create keys and use them on a protection system.
Replication
When configuring protection systems for directory or MTree replication, configure each system separately. The two systems
can use either the same or a different key class, and the same or different key managers.
For collection replication configuration, the protection system must be configured on the source. All replicated data is encrypted
with the key set on the source. New data written to the destination after a replication break will either use the last active key
set on the source, or a new key if the key manager is configured.
Steps
1. Select Data Management > File System > DD Encryption.
2. In the Encryption Keys section, click Create... .
3. Type your security officer user name and password.
A new protection system key is created and activated immediately.
4. Click Create.
DD Encryption 365
Destroying a key (Embedded Key Manager)
Destroy an encryption key for the Embedded Key Manager.
Steps
1. Select Data Management > File System > Encryption.
2. In the Encryption Keys section, select the key in the list to be destroyed.
3. Click Destroy....
The system displays the Destroy dialog that includes the tier and state for the key.
4. Type your security officer user name and password.
5. Confirm that you want to destroy the key by clicking Destroy.
NOTE: After a file system clean has run, the key state changes to Destroyed.
Deleting a key
You can delete Key Manager keys that are in the Destroyed or Compromised-Destroyed states. However, you only need to
delete a key when the number of keys has reached the maximum 254 limit. This procedure requires security officer credentials.
Steps
1. Select Data Management > File System > Encryption.
2. In the Encryption Keys section, select the key or keys in the list to be deleted.
3. Click Delete....
The system displays the key to be deleted, and the tier and state for the key.
4. Type your security officer user name and password.
5. Confirm that you want to delete the key or keys by clicking Delete.
Steps
1. Scroll down to the Key Manager Encryption Keys table.
366 DD Encryption
2. Click Add to create a new Key Manager encryption key.
a. Enter the Security Officer username and password.
b. Click Create.
A new KIMP key is created and activated immediately.
DD Encryption 367
Modifying the state of an existing key in KeySecure Key Manager
Use DD System Manager to modify the state of an existing KIMP encryption key.
Prerequisites
Review the conditions for changing a key state:
● A key in an Activated-RO key requires no conditions. Deactivate at any time.
Steps
1. Select Data Management > File System > DD Encryption.
2. Scroll down to view the Key Manager Encryption Keys table.
3. Select the appropriate key from the Key Manager Encryption Keys table.
4. To deactivate a key:
a. Click on any key that shows an Activated state.
b. Enter the security officer username and password.
c. Click DEACTIVATE.
Results
The state of an existing key is changed.
Prerequisites
Confirm the desired Key rotation period (weeks or months), the Key rotation start date, and the Next key rotation date.
Steps
1. Select Data Management > File System > DD Encryption.
2. In the Key Management section, click Configure. The Change Key Manager dialog box opens.
3. Enter your security officer user name and password.
4. Select KeySecure Key Manager from the Key Manager Type drop down menu. The Change Key Manager information
appears.
5. Set the key rotation policy:
NOTE: The rotation policy is specified in weeks and months. The minimum key rotation policy increment is one week,
and the maximum key rotation policy increment is 52 weeks (or 12 months).
a. Enable the Key Rotation policy. Set the Enable Key rotation policy button to enable.
368 DD Encryption
b. Enter the appropriate dates in the Key rotation schedule field.
c. Select the appropriate number of weeks or months from the Weeks or Months drop down menu.
d. Click OK.
Results
The key rotation policy is set or changed.
Prerequisites
Ensure that you have the appropriate user credentials. The security role is required to run these commands.
Steps
1. Log into the protection system using the security role:
Username: <security office user>
Password: <security officer password>
Results
A new active key is created.
DD Encryption 369
Modify the state of an existing key in the KeySecure Key Manager
Use the protection system CLI to modify the state of an existing key to a deactivated state.
Prerequisites
Ensure that you have the appropriate user credentials. The security role is required to run these commands.
Steps
1. Log into the protection system using the security role:
Username: sec
Password: <security officer password>
For example:
Results
The state of an existing key is modified.
Prerequisites
Ensure that you have the appropriate user credentials. The security role is required to run these commands.
Steps
1. Log into the Data Domain system using the security role:
Username: sec
Password: <security officer password>
2. Set a key rotation policy for the first time. In our example, we will set the rotation policy to three weeks:
For example:
370 DD Encryption
Output that is similar to the following appears:
3. Subsequently, run this command if you choose to change the existing key rotation policy. In our example, we will change the
rotation policy from three weeks to four months:
NOTE: Log into the Data Domain system using the security role (where Username is sec, and the password is the
<security officer password> ).
For example:
4. Display the current key rotation policy, or verify that the policy is set correctly:
Results
The key rotation policy is set or changed.
DD Encryption 371
Setting up KMIP key manager
With KMIP support, a protection appliance can retrieve symmetric key objects that are used for data at rest encryption from
KMIP key managers.
Steps
1. Set up a KeySecure instance with IP address <IP1>.
2. Create and install an SSL server certificate on the KeySecure.
3. Enable KMIP by navigating to Device > Key Server.
Ensure <IP1> is the address that is used and Port is <Port1> and the server certificate from Step 2 is used.
4. Create a certificate signing request (CSR) for the system on the protection system/DD VE or Linux computer.
a. Log in to the protection system.
b. Issue the command adminaccess certificate cert-signing-request generate.
If the command is successful, it generates the file CertificateSigningRequest.csr, which is located in /ddvar/
certificates/.
By default, NFS exports do not have permissions to access the certificates folder, even to a root user.
372 DD Encryption
The current active key is used to encrypt any data being ingested.
14. Sync the key states.
a. On the keysecure web interface, create a new active key as previously described.
b. On the keysecure web interface, deactivate the old key by clicking the key and going under the Life Cycle tab. Click
Edit State. Set the Cryptographic State to Deactivated. Click Save.
15. On the protection system, sync the local key table by running the filesys encryption keys sync command.
Sample output of local key table forfilesys encryption keys show:
NOTE: Keys can be marked as versioned keys. When 2nd and 3rd versions of a specific key are generated, KMIP queries
currently don't pick up these keys and may be an issue if that key is being used by a protection system or DD VE.
Prerequisites
To manage certificates for a system, you must start DD System Manager on that system.
Steps
1. Select Data Management > File System > Encryption.
2. Under Key Management, click Configure.
3. Type your security officer username and password.
4. Select to enable or disable key rotation. If enabled, enter a rotation interval between 1-to-12 months. Click OK.
5. Click Manage Certificates to add certificates.
Deleting certificates
Select a certificate with the correct fingerprint.
Steps
1. Select a certificate to delete.
2. Click Delete.
The system displays a Delete Certificate dialog with the fingerprint of the certificate to be deleted.
3. Click OK.
DD Encryption 373
Enabling and disabling DD Encryption
After configuring DD Encryption, the status is enabled and the Disabled button is active. When DD Encryption is disabled, the
Enabled button is active.
Enabling DD Encryption
Use the DD System Manager to enable the DD Encryption feature.
Steps
1. Using the DD System Manager, select the protection system you are working with in the Navigation panel.
2. In the Encryption view, click the Enable button.
3. Both of the following options are available:
● Select Apply to existing data and click OK. Encryption of existing data will occur during the first cleaning cycle after
the file system is restarted.
● Select Restart the file system now and click OK. DD Encryption will be enabled after the file system is restarted.
Next steps
NOTE: Applications may experience an interruption while the file system is restarted.
Disabling DD Encryption
Use the DD System Manager to disable the DD Encryption feature.
Steps
1. Using the DD System Manager, select the protection system you are working with in the Navigation panel.
2. In the Encryption view, click the Disable button.
The Disable Encryption dialog box is displayed.
3. In the Security Officer Credentials area, enter the user name and password of a security officer.
4. Select one of the following:
● Select Apply to existing data and click OK. Decryption of existing data will occur during the first cleaning cycle after
the file system is restarted.
● Select Restart the file system now and click OK. DD Encryption will be disabled after the file system is restarted.
Next steps
NOTE: Applications may experience an interruption while the file system is restarted.
Steps
1. Select Data Management > File System > Encryption .
In the File System Lock area, the Status shows whether the file system is Locked or Unlocked.
2. Disable the file system by clicking Disabled in the File System status area.
3. Use the procedure to lock or unlock the file system.
374 DD Encryption
Locking the file system
To lock the file system, DD Encryption must be enabled and the file system must be disabled.
Steps
1. Select Data Management > File System > Encryption and click Lock File System.
2. In the text fields of the Lock File System dialog box, provide:
● The username and password of a Security Officer account (an authorized user in the Security User group on that
protection system).
● The current and a new passphrase.
3. Click OK.
This procedure re-encrypts the encryption keys with the new passphrase. This process destroys the cached copy of the
current passphrase (both in-memory and on-disk).
NOTE: Changing the passphrase requires two-user authentication to protect against the possibility of a rogue
employee‘s shredding the data.
CAUTION: Be sure to take care of the passphrase. If the passphrase is lost, you will never be able to unlock
the file system and access the data. The data will be irrevocably lost.
Related tasks
Unlocking the file system on page 375
Steps
1. Select Data Management > File System > Encryption and click Unlock File System.
2. In the text fields, type the passphrase that was used to lock the file system.
3. Click OK.
4. Click Close to exit.
If the passphrase is incorrect, the file system does not start and the system reports the error. Type the correct passphrase,
as directed in the previous step.
Related tasks
Locking the file system on page 375
DD Encryption 375
Changing the encryption algorithm
Reset the encryption algorithm if necessary, or select options to encrypt new and existing data or just new data.
Steps
1. Select Data Management > File System > Encryption
2. To change the Encryption Algorithm used to encrypt the protection system, click Change Algorithm.
The Change Algorithm dialog box is displayed. Supported encryption algorithms are:
● AES-128 CBC
● AES-256 CBC
● AES-128 GCM
● AES-256 GCM
3. Select an encryption algorithm from the drop-down list or accept the default AES 256-bit (CBC).
The AES 256-bit Galois/Counter Mode (GCM) is the most secure algorithm but it is significantly slower than the Cipher
Block Chaining (CBC) mode.
NOTE: To reset the algorithm to the default AES 256-bit (CBC), click Reset to default.
NOTE: Encryption of existing data can take longer than a standard file system clean operation.
● To encrypt only new data, select Restart file system now and click OK.
5. The status is displayed. Click Close when the process is complete.
NOTE: Applications may experience an interruption while the file system is restarted.
376 DD Encryption