Data Domain Command Reference Guide 6.0
Data Domain Command Reference Guide 6.0
Version 6.0
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners.
Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
Figures 15
Preface 17
Revision history 21
Chapter 1 adminaccess 23
adminaccess Change History......................................................................24
adminaccess guidelines and restrictions..................................................... 24
adminaccess add........................................................................................ 24
adminaccess authentication....................................................................... 25
adminaccess certificate..............................................................................25
adminaccess del......................................................................................... 33
adminaccess disable................................................................................... 33
adminaccess enable....................................................................................34
adminaccess ftp......................................................................................... 34
adminaccess ftps........................................................................................34
adminaccess http....................................................................................... 35
adminaccess option.................................................................................... 35
adminaccess reset...................................................................................... 36
adminaccess show...................................................................................... 37
adminaccess ssh.........................................................................................38
adminaccess telnet..................................................................................... 38
adminaccess trust...................................................................................... 39
adminaccess web....................................................................................... 39
Chapter 2 alerts 41
alerts change history.................................................................................. 42
alerts clear..................................................................................................42
alerts notify-list.......................................................................................... 42
alerts show................................................................................................. 45
alerts test events........................................................................................47
Chapter 3 alias 49
alias change history.................................................................................... 50
alias add..................................................................................................... 50
alias del....................................................................................................... 51
alias reset....................................................................................................51
alias show....................................................................................................51
Chapter 4 archive 53
archive change history............................................................................... 54
archive data-movement..............................................................................54
archive disable............................................................................................55
archive enable............................................................................................ 56
archive option.............................................................................................56
archive report.............................................................................................56
archive show.............................................................................................. 57
archive space-reclamation..........................................................................57
Chapter 5 authentication 59
authentication change history.................................................................... 60
authentication kerberos..............................................................................60
authentication nis........................................................................................61
Chapter 6 authorization 63
authorization change history...................................................................... 64
authorization guidelines and restrictions.....................................................64
authorization policy.................................................................................... 64
authorization show..................................................................................... 64
Chapter 7 autosupport 65
autosupport change history........................................................................66
autosupport guidelines and restrictions...................................................... 66
autosupport add......................................................................................... 66
autosupport del.......................................................................................... 66
autosupport reset....................................................................................... 67
autosupport send........................................................................................67
autosupport set.......................................................................................... 68
autosupport show.......................................................................................69
autosupport test.........................................................................................69
Chapter 8 boostfs 71
boostfs change history............................................................................... 72
boostfs mount............................................................................................ 72
boostfs lockbox.......................................................................................... 73
boostfs kerberos.........................................................................................73
Chapter 9 cifs 75
cifs change history..................................................................................... 76
cifs disable..................................................................................................76
cifs enable.................................................................................................. 76
cifs local-group...........................................................................................76
cifs option...................................................................................................76
cifs reset.....................................................................................................77
cifs restart.................................................................................................. 77
cifs set........................................................................................................78
cifs share.................................................................................................... 79
cifs show.................................................................................................... 80
cifs status...................................................................................................80
cifs troubleshooting....................................................................................80
Chapter 10 client-group 83
client-group change history........................................................................84
client-group guidelines and restrictions...................................................... 84
client-group add......................................................................................... 84
client-group create.....................................................................................85
client-group data-access-permit-list.......................................................... 85
client-group del.......................................................................................... 86
client-group destroy................................................................................... 86
client-group rename................................................................................... 86
client-group show.......................................................................................86
client-group stats options...........................................................................92
client-group stream-limit............................................................................ 93
Chapter 11 cloud 95
cloud change history.................................................................................. 96
cloud clean................................................................................................. 96
cloud enable............................................................................................... 96
cloud profile............................................................................................... 96
cloud status................................................................................................ 97
cloud unit....................................................................................................97
Chapter 12 compression 99
compression Change History.................................................................... 100
compression physical-capacity-measurement...........................................100
Chapter 20 ha 187
ha change history......................................................................................188
ha guidelines and restrictions.................................................................... 188
ha create...................................................................................................189
ha destroy................................................................................................. 189
ha failover................................................................................................. 190
ha offline...................................................................................................190
ha online....................................................................................................190
ha status................................................................................................... 190
net lookup.................................................................................................263
net modify................................................................................................ 263
net option................................................................................................. 263
net ping.................................................................................................... 263
net reset...................................................................................................264
net route.................................................................................................. 264
net set...................................................................................................... 269
net show................................................................................................... 271
net tcpdump............................................................................................. 276
net troubleshooting...................................................................................277
As part of an effort to improve its product lines, EMC periodically releases revisions of
its software and hardware. Therefore, some functions described in this document
might not be supported by all versions of the software or hardware currently in use.
The product release notes provide the most up-to-date information on product
features, software updates, software compatibility guides, and information about EMC
products, licensing, and service.
Contact your EMC technical support professional if a product does not function
properly or does not function as described in this document.
Note
This document was accurate at publication time. Go to EMC Online Support (https://
support.emc.com) to ensure that you are using the latest version of this document.
Purpose
This guide describes the EMC Data Domain operating system (DD OS) commands and
provides an overview of how they are used. For more specific, task-based instructions,
see the EMC Data Domain Operating System Administration Guide.
Related documentation
The following Data Domain system documents provide additional information.
l Installation and setup guide for your system, for example, EMC Data Domain DD
2500 Storage System, Installation and Setup Guide
l EMC Data Domain Operating System USB Installation Guide
l EMC Data Domain Operating System DVD Installation Guide
l EMC Data Domain Operating System Release Notes
l EMC Data Domain Operating System Initial Configuration Guide
l EMC Data Domain Product Security Guide
l EMC Data Domain Operating System Administration Guide
l EMC Data Domain Operating System MIB Quick Reference
l EMC Data Domain Operating System Offline Diagnostics Suite User's Guide
l Hardware overview guide for your system, for example, EMC Data Domain DD4200,
DD4500, and DD7200 Systems, Hardware Overview
l Field replacement guides for your system components, for example, Field
Replacement Guide, Data Domain DD4200, DD4500, and DD7200 Systems, I/O
Module and Management Module Replacement or Upgrade
l EMC Data Domain System Controller Upgrade Guide
l EMC Data Domain Expansion Shelf Hardware Guide (for shelf model ES20 or ES30)
l EMC Data Domain Boost for Partner Integration Administration Guide
l EMC Data Domain Boost for OpenStorage Administration Guide
l EMC Data Domain Boost for Oracle Recovery Manager Administration Guide
l Statement of Volatility for the Data Domain DD2500 System
l Statement of Volatility for the Data Domain DD4200, DD4500, or DD7200 System
Special notice conventions used in this document
EMC uses the following conventions for special notices.
NOTICE
Note
A note identifies information that is incidental, but not essential, to the topic. Notes
can provide an explanation, a comment, reinforcement of a point in the text, or just a
related point.
Typographical conventions
The following table describes the type style conventions used in this document.
Technical support
Go to EMC Online Support and click Service Center. You will see several options
for contacting EMC Technical Support. Note that to open a service request, you
must have a valid support agreement. Contact your EMC sales representative for
details about obtaining a valid support agreement or with questions about your
account.
Your comments
Your suggestions will help us continue to improve the accuracy, organization, and
overall quality of the user publications. Send your opinions of this document to:
DPAD.Doc.Feedback@emc.com.
01 (6.0) September 2016 This revision includes information about these command
changes supporting Data Domain 6.0:
l adminaccess commands: Two with modified
arguments
l alerts commands: One new, two with modified
arguments, one with modified output.
l boostfs commands: Three new.
l cifs commands: Two with modified behavior.
l client-group commands: Fourteen new.
l cloud commands: Twenty-two new.
l data-movement commands: Sixteen new.
l ddboost commands: Two with new arguments, three
with modified output.
l disk commands: One new.
l elicense commands: Three new.
l filesys commands: Three with modified arguments,
twelve with modified output.
Revision history 21
Revision history
The adminaccess command manages access control and enables users to import
host and CA certificates. Command options also enable remote hosts to use the FTP,
FTPS, Telnet, HTTP, HTTPS, SSH, and SCP administrative protocols on the Data
Domain system. SSH is open to the default user sysadmin and to users added by the
administrator.
A Certificate Signing Request (CSR) can now be generated for a host certificate.
Also, host certificates can now be imported in PKCS12 or PEM formats. EMC Data
Domain uses the SHA1 RSA encryption algorithm for a CSR and PBE-SHA1-3DES
encryption algorithm for the PKCS12 key and certificate.
This chapter contains the following topics:
adminaccess 23
adminaccess
adminaccess add
adminaccess add ssh-keys [user username]
Add an SSH public key to the SSH authorized keys file on the Data Domain system.
Admin role users can add and delete ssh-keys for other users. User role users can add
or delete ssh-keys for their username only. Specify a username to associate the user
with the key. When prompted, enter the key, press Enter, and press Ctrl-D. Role
required: admin, limited-admin, security, user, or backup-operator.
Note
For Data Domain high availability (HA) systems, SSH keys created on the active node
take 30 seconds to one minute to propagate to the standby node.
adminaccess authentication
adminaccess authentication add {cifs}
Allow Windows domain users with no local account on the Data Domain system to
access the system through SSH, Telnet, and FTP using Windows domain group
credentials. For administrative access, the user must be in the standard Windows
Domain Admins group or in a group that you create named Data Domain. Users from
both group names are always accepted as administrative users. The command also
gives user-level access (no administrative operations allowed) to all other users from
the domain. Users must be from the domain that includes the Data Domain system or
a related, trusted domain.
The SSH, Telnet, or FTP command that accesses the Data Domain system must
include the domain name, a backslash, and the user name in double quotation marks.
Note
CIFS must be enabled and the Data Domain system must be part of a Windows
domain.
adminaccess certificate
adminaccess certificate cert-signing-request delete
Delete the certificate signing request. To see if there is a certificate signing request on
the system, enter adminaccess certificate cert-signing-request show.
Role required: admin, limited-admin.
adminaccess certificate cert-signing-request generate [key-
strength {1024bit | 2048bit | 3072bit | 4096bit}] [country
country-code] [state state] [city city] [org-name organization-
name] [org-unit organization-unit] [common-name common-name]
Generate a Certificate Signing Request (CSR) file at the following path /ddvar/
certificates/CertificateSigningRequest.csr. Use SCP, FTP or FTPS to
transfer the CSR file from the system to a computer from which you can send the
CSR to a Certificate Authority (CA). After you receive a signed CSR file from a CA,
you can import the certificate using adminaccess certificate import.
adminaccess authentication 25
adminaccess
If a previously generated CSR exists, the system prompts you to approve or reject
certificate regeneration, which replaces the existing CSR.
If the user does not specify values, default values are used.
Note
You must configure a system passphrase (system passphrase set) before you
can generate a CSR.
country
Default is US. Abbreviation for country cannot exceed two characters. No special
characters are allowed.
state
Default is California. Maximum entry is 128 characters.
city
Default is Santa Clara. Maximum entry is 128 characters.
org-name
Default is My Company Ltd. Maximum entry is 64 characters.
org-unit
Default value is empty string. Maximum entry is 64 characters.
common name
Default value is the system host name. Maximum entry is 64 characters.
Note
Log out from the browser session before deleting an HTTPS host certificate.
Otherwise HTTPS browser sessions (using imported host certificates) are closed.
After deleting the host certificate, refresh or restart the browser to proceed.
Argument Definitions
If the value you set for a variable includes any space characters, enclose the variable
string in quotes.
all
Deletes the certificates for all applications.
application-list
To delete the certificates for multiple applications, replace application-list with
the application names, separated by commas or spaces (for example, ddboost,
rkm).
ddboost
Deletes the certificate for the DD Boost application.
cloud
Deletes the certificate for the cloud application.
https
Deletes the certificate for the HTTPS application.
imported-ca application
Indicates that the certificate to be deleted is a CA certificate for the specified
applications.
imported-host application
Indicates that the certificate to be deleted is a host certificate for the specified
applications.
login-auth
Deletes login authorization.
rkm
Deletes the certificate for the RSA Key Manager (RKM) application.
support
Deletes the certificate for the support application.
Note
Log out from the browser session before deleting an HTTPS host certificate.
Otherwise HTTPS browser sessions (using imported host certificates) are closed.
After deleting the host certificate, refresh or restart the browser to proceed.
adminaccess certificate 27
adminaccess
application-list
To delete the certificates for multiple applications, replace application-list with
the application names, separated by commas or spaces (for example, ddboost,
rkm).
cloud
Deletes the certificate for the cloud application.
ddboost
Deletes the certificate for the DD Boost application.
fingerprint
Specifies the fingerprint of a certificate to be deleted. To display the available
certificates and their footprints, enter adminaccess certificate show.
login-auth
Deletes login authorization.
https
Deletes the certificate for the HTTPS application.
rkm
Deletes the certificate for the RSA Key Manager (RKM) application.
subject
Specifies the subject name of a certificate to be deleted. To display the available
certificates and their subject names, enter adminaccess certificate show.
support
Deletes the certificate for the support application.
fingerprint
Specifies the fingerprint of a certificate to be exported. To display the available
certificates and their footprints, enter adminaccess certificate show.
subject
Specifies the subject name of a certificate to be exported. To display the available
certificates and their subject names, enter adminaccess certificate show.
Argument Definitions
If the value you set for a variable includes any space characters, enclose the variable
string in quotes.
application-list
To export the certificates for multiple applications, replace application-list with
the application names, separated by commas or spaces (for example, ddboost,
rkm).
ddboost
Exports the certificate for the DD Boost application.
rkm
Exports the certificate for the RSA Key Manager (RKM) application.
file
Saves a copy of the certificate in the /ddvar/certificates directory using the
specified filename.
adminaccess certificate 29
adminaccess
Note
application-list
To import a certificate for multiple applications, replace application-list with the
application names, separated by commas or spaces (for example, ddboost,
rkm).
ca application
Indicates that the certificate to be imported is a CA certificate.
cloud
Imports the certificate for the cloud application.
ddboost
Imports the certificate for the DD Boost application.
host application
Indicates that the certificate to be imported is a host certificate.
login-auth
Imports login authorization.
rkm
Imports the certificate for the RSA Key Manager (RKM) application.
file
Specifies a file from which to import the certificate. A copy of the certificate file
must be in the /ddvar/certificates directory.
Example 1
application-list
Specifies a list of applications for which certificates are displayed.
ca application
Displays CA certificates for the specified applications.
cloud
Displays the certificate for the cloud application.
ddboost
Displays the certificate for the DD Boost application.
fingerprint
Displays the certificate with the specified fingerprint. To display the available
certificates and their footprints, enter adminaccess certificate show.
host application
Displays host certificates for the specified applications.
https
Displays the certificate for the HTTPS application.
imported-ca
Specifies the CA certificates are to be displayed for the specified applications.
imported-host
Specifies the host certificates are to be displayed for the specified applications.
login-auth
Displays login authorizations.
rkm
Displays the certificate for the RSA Key Manager (RKM) application.
subject
Displays all certificate that use the specified subject. To display the available
certificates and their subject names, enter adminaccess certificate show.
support
Displays the certificate for the support application.
adminaccess certificate 31
adminaccess
application-list
To remove the certificate revoke lists for multiple applications, replace
application-list with the application names, separated by commas or spaces (for
example, ddboost, rkm).
ddboost
Remove CRL which are imported for DDBoost application.
fingerprint
Specifies the fingerprint of a certificate revoked list to be removed. To display the
available certificates and their footprints, enter adminaccess certificate
show.
issuer
Specifies the issuer of a certificate on the revoked list to be removed. To display
the available certificates and their issuer, enter adminaccess certificate
show.
login-auth
Remove CRL which are imported for making decision for certificate based login
application-list
To import the certificate revoke lists for multiple applications, replace application-
list with the application names, separated by commas or spaces (for example,
ddboost, rkm).
ddboost
Import CRL which are imported for DDBoost application.
login-auth
Import CRL which are imported for making decision for certificate based login
application-list
To show the certificate revoke lists for multiple applications, replace application-
list with the application names, separated by commas or spaces (for example,
ddboost, rkm).
cloud
Show CRL which are imported for cloud application.
ddboost
Show CRL which are imported for DDBoost application.
fingerprint
Specifies the fingerprint of a certificate revoked list to be shown. To display the
available certificates and their footprints, enter adminaccess certificate
show.
issuer
Specifies the issuer of a certificate on the revoked list to be shown. To display the
available certificates and their issuer, enter adminaccess certificate
show.
login-auth
Show CRL which are imported for making decision for certificate based login
adminaccess del
adminaccess del ssh-keys lineno [user username]
Delete an SSH key from the key file. Users may delete their own keys, and users in
admin role may delete user keys. Run the command option adminaccess show ssh-
keys to view line number values. Role required: admin, limited-admin, security, user,
backup-operator, or none.
adminaccess disable
adminaccess disable {http | https | ftp | ftps | telnet | ssh |
scp | web-service | all}
Disable system access using the specified protocol. Disabling FTP or Telnet does not
affect entries in the access lists. If all access is disabled, the Data Domain system is
available only through a serial console or keyboard and monitor. Role required: admin,
limited-admin.
adminaccess del 33
adminaccess
adminaccess enable
adminaccess enable {http | https | ftp | ftps | telnet | ssh |
scp | web-service | all}
Enable a protocol on the Data Domain system. By default, SSH, HTTP, HTTPS, and
web-service are enabled and FTP and Telnet are disabled. HTTP and HTTPS allow
users to log in from System Manager. The web-service allows the use of REST APIs.
To use FTP and Telnet, users with admin role permissions must add host machines to
the access lists. Role required: admin, limited-admin.
adminaccess ftp
adminaccess ftp add host-list
Add one or more hosts to the FTP list. You can identify a host using a fully qualified
hostname, an IPv4 address, or an IPv6 address. Host entries cannot include a space.
Multiple entries may be separated by commas, spaces, or both. Role required: admin,
limited-admin.
Note
Only users who are assigned the admin management role are permitted to access the
system using FTP.
adminaccess ftps
adminaccess ftps add host-list
Add one or more hosts to the FTPS list. You can identify a host using a fully qualified
hostname, an IPv4 address, or an IPv6 address. Host entries cannot include a space.
Multiple entries may be separated by commas, spaces, or both. Role required: admin,
limited-admin.
Note
Only users who are assigned the admin management role are permitted to access the
system using FTPS.
adminaccess http
adminaccess http add host-list
Add one or more hosts to the HTTP/HTTPS list. You can identify a host using a fully
qualified hostname, an IPv4 address, or an IPv6 address. Host entries cannot include a
space. Multiple entries may be separated by commas, spaces, or both. Role required:
admin, limited-admin.
adminaccess http del host-list
Remove one or more hosts (IP addresses, hostnames, or asterisk) from the HTTP/
HTTPS list. Host entries may be separated by commas, spaces, or both. Role required:
admin, limited-admin.
adminaccess option
adminaccess option reset [login-max-attempts | login-unlock-
timeout | login-max-active]
Resets the specified option to the default value, which is 4 for maximum attempts, 120
seconds for the unlock timeout, and 10 for active sessions. Note that the limit set for
active sessions does not apply to the sysadmin user. Role required: admin, limited-
admin.
Example 2
Example 3
adminaccess http 35
adminaccess
Example 3 (continued)
Example 4
Example 5
Example 6
# adminaccess option sh
Option Value
-------------------- -----
login-unlock-timeout 120
login-max-attempts 4
login-max-active 10
-------------------- -----
adminaccess reset
adminaccess reset {http | https | ftp | ftps | telnet | ssh |
scp | all}
Reset one or more protocols to their default states and clear the access lists of host
entries. Output shows the running state of each protocol. Role required: admin,
limited-admin.
Note
Because SCP works together with SSH, output appears the same for both. However,
due to the registry configuration, output could be misleading. For example, if SSH is
disabled, SCP also shows as disabled; however, SCP is enabled at the registry level.
This is expected behavior and does not affect functionality. When a user resets SCP,
the SCP registry entry changes to enabled and output for SSH shows as enabled.
adminaccess show
adminaccess show
Lists the access services available on a Data Domain system and displays option values
for the access services that are enabled. Role required: admin, limited-admin, security,
user, backup-operator, or none.
l N/A means the service does not use an access list.
l A hyphen means the service can use an access list, but the access list does not
contain host names.
l An asterisk means the service allows all hosts.
# adminaccess show
Service Enabled Allowed Hosts
----------- ------- -------------
ssh yes -
scp yes (same as ssh)
telnet no -
ftp yes *
ftps no -
http yes -
https yes -
web-service yes N/A
----------- ------- -------------
Ssh/Scp options:
Option Value
--------------- ------------------
session-timeout default (infinite)
server-port default (22)
--------------- ------------------
Telnet options:
Option Value
--------------- ------------------
session-timeout default (infinite)
--------------- ------------------
Ftp options:
Option Value
--------------- ------------------
session-timeout default (infinite)
--------------- ------------------
adminaccess show 37
adminaccess
Ftps options:
Option Value
--------------- ------------------
session-timeout default (infinite)
--------------- ------------------
Web options:
Option Value
--------------- -----
http-port 80
https-port 443
session-timeout 10800
--------------- -----
adminaccess ssh
adminaccess ssh add host-list
Add one or more hosts to the SSH list. You can identify a host using a fully qualified
hostname, an IPv4 address, or an IPv6 address. Host entries cannot include a space.
Multiple entries may be separated by commas, spaces, or both. Role required: admin,
limited-admin.
adminaccess ssh del host-list
Remove one or more hosts (IP addresses, hostnames, or asterisks) from the SSH list.
Host entries may be separated by commas, spaces, or both. Role required: admin,
limited-admin.
adminaccess ssh option reset [server-port | session-timeout]
Reset the SSH options to default values, which are port 22 and no time out. Role
required: admin, limited-admin.
adminaccess ssh option set server-port port-number
Set the SSH server port. The default port number is 22. Role required: admin, limited-
admin.
adminaccess ssh option set session-timeout timeout-in-secs
Set the SSH client timeout options. The timeout range is 60 to 31,536,000 seconds.
The default setting never times out a session. Role required: admin, limited-admin.
Example 7
adminaccess telnet
adminaccess telnet add host-list
Add one or more hosts to the Telnet list. You can identify a host using a fully qualified
hostname, an IPv4 address, or an IPv6 address. Host entries cannot include a space.
Multiple entries may be separated by commas, spaces, or both. Role required: admin,
limited-admin.
adminaccess telnet delete host-list
Remove one or more hosts (IP addresses, hostnames, or asterisk) from the Telnet list.
Host entries may be separated by commas, spaces, or both. Role required: admin,
limited-admin.
adminaccess telnet option reset [session-timeout]
Reset the client session timeout period to the default value, which does not time out
sessions. Role required: admin, limited-admin.
adminaccess telnet option set session-timeout timeout-in-secs
Set the client session timeout period to the specified number of seconds. If no data is
received from a Telnet client within the timeout period, and if the client does not
respond to a subsequent prompt message, the session terminates. The valid range is
from 60 to 31536000 (365 days).
To configure the Data Domain system to prevent sessions from timing out, use the
adminaccess telnet option reset command. Role required: admin, limited-
admin.
Example 8
adminaccess trust
adminaccess trust add host hostname [type mutual]
Establishes the (mutual) trust with the specified host. Role required: admin, limited-
admin.
adminaccess trust copy {source | destination} hostname
Copy all trust to or from the specified host. Role required: admin, limited-admin.
adminaccess trust del host hostname [type mutual]
Remove the mutual trust from the specified host. Role required: admin, limited-admin.
adminaccess trust show [hostname]
Show the list of trusted Certificate Authorities (CAs). Role required: admin, limited-
admin, security, user, backup-operator, or none.
adminaccess web
adminaccess web option reset [http-port | https-port | session
timeout]
Reset the Web options to default values. Role required: admin, limited-admin.
adminaccess web option set http-port port-number
Set the HTTP access port for the Web client. Default is port 80. Role required: admin,
limited-admin.
adminaccess web option set https-port port-number
adminaccess trust 39
adminaccess
Set the HTTPS access port for the Web client. Default is port 443. Role required:
admin, limited-admin.
adminaccess web option set session-timeout timeout-in-secs
Set the Web client session timeout. Range is 300 to 31536000 seconds; the default is
10800 seconds. Role required: admin, limited-admin.
adminaccess web option show
Show the current values for Web options. Role required: admin, limited-admin.
The alerts command manages current alerts, alert notification groups, and alerts
history. When a user logs in, a message is shown indicating the presence of alerts and
instructions on how to proceed.
Command options enable sending email to a designated recipient or notification group
when an event occurs within the Data Domain system. Depending on the option,
information includes alert type, date posted, and resulting action. More than three
months of alert history is retained.
The default alert notification group (“default”) is configured to send alerts for any
event class with severity level of Warning or above. Email notifications are sent to
Data Domain Support at autosupport-alert@autosupport.datadomain.com. The default
alert notification group can only be reset to default values: it cannot be destroyed.
Some event types, such as those in the environment class that pertain to temperature
sensors within the chassis, are detected repeatedly if the underlying condition is not
corrected.
This chapter contains the following topics:
alerts 41
alerts
alerts clear
alerts clear alert-id alert-id-list
Clear an active alert or list of alerts. Role required: admin, limited-admin.
Argument Definitions
alert-id-list
List of alert identification numbers. To display the alert ID numbers, enter alerts
show all.
alerts notify-list
alerts notify-list add group-name {[class class-list [severity
severity]] [emails email-addr-list]}
Modify a notification group by adding an event class, severity level, or recipient email
address. The system does not accept EMC or Data Domain email IDs. Role required:
admin, limited-admin, tenant-admin.
Argument Definitions
class class-list
List of event classes: cifs, cloud, cluster, environment, filesystem,
firmware, ha, hardwareFailure, network, replication, security,
storage, syslog, and systemMaintenance.
emails email-addr-list
Email addresses of members in an alert notification group.
group-name
Name of alert notification group.
severity severity
Severity level of event class. The severity levels in decreasing order of severity
are: emergency, alert, critical, error, warning, notice, info, and
debug. Default is warning.
Example 9
emails email-addr-list
Email addresses of members in an alert notification group.
group-name
Name of alert notification group.
severity severity
Severity level of event class. The severity levels in decreasing order of severity
are: emergency, alert, critical, error, warning, notice, info, and
debug. Default is warning.
Example 10
alerts notify-list 43
alerts
Argument Definitions
class class-list
List of event classes: cifs, cloud, cluster, environment, filesystem,
firmware, ha, hardwareFailure, network, replication, security,
storage, syslog, and systemMaintenance.
emails email-addr-list
Email addresses of members in an alert notification group.
group-name
Name of alert notification group.
Example 11
group-name
Name of alert notification group.
tenant unit
The basic unit of a multi-tenancy configuration. A tenant unit is a secure, isolated
partition for tenant-specific data and control flow within a Data Domain system.
See the EMC Data Domain Operating System Administration Guide for more
information on SMT.
Example 12
group-name
Name of alert notification group.
Example 13
alerts show
alerts show all [local]
Display details on all alert notification groups. The local argument only applies to
cluster configurations, which are not supported in this release. The local argument
will be removed in a future release. Role required: admin, limited-admin, security, user,
backup-operator, or none.
alerts show current [local] [tenant-unit tenant-unit]
Display a list of currently active alerts on a Data Domain system or tenant unit. The
local argument only applies to cluster configurations, which are not supported in this
release. The local argument will be removed in a future release. Role required:
admin, limited-admin, tenant-admin, security, user, tenant-user, backup-operator, or
none.
Argument Definitions
tenant unit
The basic unit of a multi-tenancy configuration. A tenant unit is a secure, isolated
partition for tenant-specific data and control flow within a Data Domain system.
See the EMC Data Domain Operating System Administration Guide for more
information on SMT.
alerts show 45
alerts
local
The local argument only applies to cluster configurations, which are not
supported in this release. The local argument will be removed in a future
release.
tenant unit
The basic unit of a multi-tenancy configuration. A tenant unit is a secure, isolated
partition for tenant-specific data and control flow within a Data Domain system.
See the EMC Data Domain Operating System Administration Guide for more
information on SMT.
CC
Use with start or end arguments to show option. Specify first two digits of
year. Default is 20.
end MMDDhhmm
Use with show option to display alerts for specific interval.
The argument MMDD indicates month and day of end date.
The argument hhmm indicates hours and minutes of end time (24-hour format).
To specify midnight between Sunday night and Monday morning, use mon 0000.
To specify noon on Monday, use mon 1200.
local
The local argument only applies to cluster configurations, which are not
supported in this release. The local argument will be removed in a future
release.
start MMDDhhmm
Use with show option to display alerts for specific interval.
The argument MMDD indicates month and day of start date.
The argument hhmm indicates hours and minutes of start time (24-hour
format). To specify midnight between Sunday night and Monday morning, use
mon 0000. To specify noon on Monday, use mon 1200.
tenant unit
The basic unit of a multi-tenancy configuration. A tenant unit is a secure, isolated
partition for tenant-specific data and control flow within a Data Domain system.
See the EMC Data Domain Operating System Administration Guide for more
information on SMT.
YY
Use with start or end arguments to show option. Specify last two digits of
year.
The alias command creates, deletes, and displays command aliases for the Data
Domain system command set. Users can manage aliases for only those commands
permitted for the user's access role.
This chapter contains the following topics:
alias 49
alias
alias add
alias add alias-name "command"
Add a command alias. Enter the alias name and command, and enclose the command
name in quotation marks. The new alias is available only to the user who created it.
Role required: admin, limited-admin, security, user, backup-operator, or none.
Default Command Aliases
The following command aliases are included with the system and available to all users.
date
system show date
df
filesys show space
hostname
net show hostname
ifconfig
net config
iostat
system show stats
netstat
net show stats
nfsstat
nfs show stats
passwd
user change password
ping
net ping
poweroff
system poweroff
reboot
system reboot
sysstat
system show stats
traceroute
route trace
uname
system show version
uptime
system show uptime
who
user show active
alias del
alias del alias-name
Delete an alias by name. Role required: admin, limited-admin, security, user, backup-
operator, or none.
alias reset
alias reset
Remove user-created aliases and restore defaults. Role required: admin, limited-
admin, security, user, backup-operator, or none.
alias show
alias show
Display all aliases and command definitions. Role required: admin, limited-admin,
security, user, backup-operator, or none.
alias del 51
alias
The archive command is used only on systems licensed to run the EMC Data Domain
Extended Retention software option (formerly Data Domain Archiver). Extended
Retention command options enable the feature and configure policies. See the EMC
Data Domain Operating System Administration Guide for details on functionality,
installation, and configuration.
This chapter contains the following topics:
archive 53
archive
archive data-movement
archive data-movement policy reset age-threshold mtrees mtree-
list
Reset the age threshold for specified MTrees (mtree-list is a colon-separated list).
Only files modified in the past (beyond the age threshold) are moved to the retention
tier during the next data movement. Role required: admin, limited-admin.
archive data-movement policy reset default-age-threshold
Reset the age threshold to the default value, which is set with archive data-
movement policy set default-age-threshold.The default age threshold
applies to new MTrees and to MTrees for which the age threshold has not been set.
Role required: admin, limited-admin.
archive data-movement policy set age-threshold {days | none}
mtrees mtree-list
Set the age threshold for specified MTrees (mtree-list is a colon-separated list). The
value for days must be from 14 days to 18250 days (50 years). Role required: admin,
limited-admin.
archive data-movement policy set default-age-threshold {days |
none}
Set the default age threshold. The argument days must be from 14 days to 18250 days
(50 years). Role required: admin, limited-admin.
archive data-movement policy show [mtrees mtree-list]
View the data-movement policy for the specified MTrees (mtree-list is a colon-
separated list). Role required: admin, limited-admin.
archive data-movement schedule reset
Reset the data-movement schedule to default values. Role required: admin, limited-
admin.
archive data-movement schedule set {never | days days time time
[every 2wks]} [no-clean]
Set the schedule for data movement. Unless you specify no-clean, the file system is
cleaned after data movement is completed. Note that the days argument checks two
ranges (and can be either a space- or comma-separated list, or arbitrary text):
l Weekday (Monday-Sunday)
l Day of the month (1-31, regardless of month, plus “last” and “first”)
Any value outside of the two ranges generates an error message. Role required:
admin.
Note
For days, “last” is converted to the value 31. If a schedule is set for the 31st of every
month at 10:00 PM, it is not executed on months with fewer than 31 days. This is a
known issue.
Example 14
Example 14 (continued)
Example 15
archive disable
archive disable
Disable the Extended Retention software option. Note that the file system must be
destroyed (and all data lost) before Extended Retention can be disabled. Role
required: admin, limited-admin.
archive disable 55
archive
archive enable
archive enable
Enable the Extended Retention software option. The file system must be disabled
before Extended Retention can be enabled. Role required: admin, limited-admin.
Note
archive option
archive option reset local-compression-type
Reset the local compression algorithm to the default value gz for subsequent data
movement to the retention tier. You must restart the file system for this change to
take effect. Role required: admin, limited-admin.
archive option set local-compression-type {none | lz | gzfast |
gz}
Set the local compression algorithm for subsequent data movement to the retention
tier. You must restart the file system for this change to take effect. Role required:
admin, limited-admin.
archive option show [local-compression-type | data-movement-
packing]
Display the local compression algorithm for the retention tier or the progress of the
file migration process. Role required: admin, limited-admin, security, user, backup-
operator.
archive report
archive report generate file-location [path {path-list | all}]
[output-file filename]
Create a report showing the name and location of each file in a directory, an MTree, or
the entire namespace. If you specify output-file filename, the report is saved in
this file under the fixed directory /ddvar. If the output file argument is not specified,
the report is displayed in standard output. The command returns before the entire
report is generated, and a footer indicates that the report is complete. Each line in the
report contains a file name and its location. The location is shown as Active if the file
completely resides in the active tier. If the file resides partially or completely in the
retention tier, the retention unit name is shown for its location. An asterisk is
appended to the line if the file contents span the active tier and retention unit. Role
required: admin, limited-admin.
Example 16
or
Example 16 (continued)
or
# archive report generate file-location output-file report.txt
archive show
archive show config
Displays the Extended Retention configuration. Role required: admin, limited-admin,
security, user, backup-operator.
Example 17
archive space-reclamation
archive space-reclamation resume
Resume the retention tier space reclamation process. Role required: admin, limited-
admin.
archive space-reclamation schedule reset
Reset the space-reclamation schedule to the factory default. Role required: admin,
limited-admin.
archive space-reclamation schedule set {never | days days time
time [every 2wks]}
Set the starting time for space-reclamation. Role required: admin, limited-admin.
archive space-reclamation schedule show
archive show 57
archive
Example 18
The authentication command manages NIS users, domains, groups and servers.
Command options enable the Data Domain system to participate in an active Network
Information Service (NIS) domain, which maintains a centralized repository of users,
groups, and server names. NIS adds a global directory that authenticates users from
any host on the network.
This chapter contains the following topics:
authentication 59
authentication
authentication kerberos
authentication kerberos keytab import
Imports the krb5.keytab file from /ddvar to /ddr/etc. If the file is not present in /
ddvar, then the command returns an error. Role required: admin, limited-admin.
authentication kerberos reset
Resets the realm, KDC, and so on, to default configuration. Unjoins a DDR from the
domain and unjoins a DDR from a Linux KDC and a Windows KDC. Role required:
admin, limited-admin.
Note
To make a DDR part of Windows AD, first unjoin the DDR from the Linux KDC using
this command.
kdc-type
Key Distribution Center type - Windows or UNIX.
kdc-list
List of KDCs.
Example 19
Example 19 (continued)
Output definitions
Home Realm
The Kerberos Realm.
KDC List
List of KDCs.
KDC Type
Key Distribution Center type - Windows or UNIX.
authentication nis
authentication nis disable
Disable the NIS client. Role required: admin, limited-admin.
authentication nis domain reset
Reset the NIS domain name. Role required: admin, limited-admin.
authentication nis domain set domain [servers server-list]
Set the NIS domain name and optionally add NIS servers to the server-list by
specifying the server hostnames. Role required: admin, limited-admin.
authentication nis domain show
Display the configured NIS domain name. Role required: admin, limited-admin,
security, user, backup-operator, or none.
authentication nis enable
Enable the NIS client. Role required: admin, limited-admin.
authentication nis groups add group-list role {user | admin |
backup-operator | limited-admin}
Add a role-based access control (RBAC) role for NIS users in the group-list. You
cannot add an existing tenant-admin group or tenant-user group to an NIS group. See
the EMC Data Domain Operating System Administration Guide for role definitions. Role
required: admin, limited-admin.
Example 20
authentication nis 61
authentication
Example 21
Note
If you add an invalid server name and enable NIS authentication, the system will
continue to use the last valid NIS server name, based on the set domain.
authorization 63
authorization
authorization policy
authorization policy reset security-officer
Reset runtime authorization policy to defaults. Resetting authorization policy is not
allowed on Retention Lock Compliance systems. Role required: security.
authorization policy set security-officer {enabled | disabled}
Enable or disable runtime authorization policy. Disabling authorization policy is not
allowed on Retention Lock Compliance systems. Role required: security.
Example 22
authorization show
authorization show history [last n { hours | days | weeks }]
View or audit past authorizations according to the interval specified. Role required:
security.
autosupport 65
autosupport
autosupport add
autosupport add {alert-summary | asup-detailed} emails email-
list
Add entries to the email list for the daily alert summary or the autosupport report. The
system does not accept EMC or Data Domain email IDs. Role required: admin, limited-
admin.
Example 23
Argument Definitions
alert-summary
Adds the specified emails to the list for daily alert distribution.
asup-detailed
Adds the specified emails to the list for daily autosupport report distribution.
email-list
Specifies the emails to be added to the specified list. Separate the list items with
commas, spaces, or both.
autosupport del
autosupport del {alert-summary | asup-detailed} emails email-
list
Delete entries from the email list for the daily alert summary or the autosupport
report. The system does not deleted EMC or Data Domain email IDs. Role required:
admin, limited-admin.
Argument Definitions
alert-summary
Deletes the specified emails from the list for daily alert distribution.
asup-detailed
Deletes the specified emails from the list for daily autosupport report distribution.
email-list
Specifies the emails to be deleted from the specified list. Separate the list items
with commas, spaces, or both.
autosupport reset
autosupport reset {alert-summary | asup-detailed}
Reset asup-detailed email list or alert-summary email list to the default value. Role
required: admin, limited-admin.
autosupport reset all
Reset all autosupport command options to the default values. Output includes details
on where autosupport reports and alert summaries are sent and the related schedules.
Role required: admin, limited-admin.
autosupport reset schedule [alert-summary | asup-detailed]
Reset the schedules of the daily alert summary and the autosupport report to the
default values.
l By default, the schedule for the daily alert summary is configured with the daily
and 0600 options.
l By default, the schedule for the autosupport report is configured with the daily
and 0800 options.
Role required: admin, limited-admin.
autosupport reset subject-tag
Clear the configured subject tag for the autosupport report and daily alert summary.
Role required: admin, limited-admin.
autosupport send
autosupport send [email-addr] [cmd "cmd"]
Email an autosupport report or execute a command and send the output to the
autosupport report email list or to the address specified. Role required: admin, limited-
admin, security, user, backup-operator, or none.
Example 24
To run the net show stats command and email the results to
djones@yourcompany.com:
Argument Definitions
“cmd”
Run the specified DD OS command. Enclose the command in double quotation
marks.
email-addr
Enter the email address to which you want to send the report.
autosupport reset 67
autosupport
autosupport set
autosupport set schedule {alert-summary | asup-detailed}
{[{daily | day(s)} time] | never}
Schedule the daily alert summary or the autosupport report. For either report, the
most recently configured schedule overrides the previously configured schedule. Role
required: admin, limited-admin.
Argument Definitions
alert-summary
Specifies that the schedule defined in the command is for the alert summary.
asup-detailed
Specifies that the schedule defined in the command is for the detailed
autosupport report.
daily
Specifies that the selected report is sent daily.
day(s)
Specifies the days on which the report is sent. Valid entries are Mon, Tue, Wed,
Thu, Fri, Sat, and Sun. Enter multiple days as needed and separate the days with
spaces or commas.
time
Specifies the scheduled time in the HHMM format.
Example 25
To schedule the daily alert summary for 2 p.m. Monday and Friday:
Example 26
Example 27
autosupport show
autosupport show {all | alert-summary | asup-detailed}
Displays the entire autosupport configuration when the all is specified. The alert-
summary option lists the emails that receive the alert summaries, and the asup-
detailed option lists the emails that receive detailed autosupport reports. Role
required: admin, limited-admin, security, user, backup-operator, or none.
Example 28
autosupport test
autosupport test {alert-summary | asup-detailed | support-
notify} | email email-addr
Send a test email to the email addresses in the specified list or to a specific email
address. Role required: admin, limited-admin, security, user, backup-operator, or none.
Argument Definitions
alert-summary
Specifies the alert summary email list, which is created with the autosupport
add alert-summary command.
asup-detailed
Specifies the detailed autosupport email list, which is created with the
autosupport add asup-detailed command.
autosupport show 69
autosupport
email-addr
Specifies an email address to which the test email is sent.
support-notify
Specifies the support notify email list, which is created with the alerts
notifiy-list add command.
The boostfs command enables you perform operations using the EMC Data Domain
BoostFS software option. BoostFS provides a virtual filesystem that allows you to
increase the number of backup applications that integrate with Data Domain systems.
It can also help improve backup time, load balancing, and in-flight encryption. These
capabilities allow BoostFS to reduce bandwidth usage.
Using the open-source software Filesystem in User Space (FUSE) and the DD Boost
SDK, BoostFS allows you to mount your own filesystem implementations.
The boostfs lockbox set command allows you to store user credentials in RSA
Lockbox. The boostfs lockbox includes arguments that let you specify the hostname
of the Data Domain system, the storage-unit name, and the storage-unit user.
The boostfs mount command allows you to mount storage units on a Data Domain
system as a filesystem and access files from the mounted filesystem. This command
also allows you to add and manage credentials for access.
boostfs 71
boostfs
boostfs mount
The boostfs mount command allows you to establish the BoostFS FUSE mount.
boostfs mount [-d|--data-domain-system] <data-domain-system>
[-s|--storage-unit] <storage-unit>
[[-o|--option <param>=<value>] ...] <mount-point>
Mount the BoostFS file system. Role required: none.
boostfs umount <mount-point>
Unmount the BoostFS file system. Role required: none.
Argument Definitions
mount-point
The mount-point for the BoostFS system.
storage-unit
The target storage-unit on the Data Domain system.
Command options
The following options are valid for the boostfs mount command:
Option Description
-o directory-name=path/to/subdir Subdirectory within the storage-unit you
select for mounting (default: root of the
storage unit)
boostfs lockbox
The boostfs lockbox command allows you to set the RSA lockbox values.
boostfs lockbox set [-d |--data-domain-system] <data-domain-
system>
[-u | --storage- unit-username] <storage-unit-username>
[-s | --storage-unit] <storage-unit>
To store credentials in an RSA lockbox, the user specifies the Data Domain hostname,
the storage-unit name, and the storage-unit user. After providing that information, the
user is prompted for the password.
boostfs lockbox query [-d | --data-domain-system] <data-domain-
system>
[-s | storage- unit] <storage-unit>
If the credentials have been stored in an RSA lockbox, this command returns the
username after the query is submitted with the specified Data Domain hostname and
storage-unit.
boostfs lockbox remove [-d | --data-domain-system] <data-
domain-system>
[-s | storage- unit] <storage-unit>
Removes the stored RSA lockbox credentials in the specified Data Domain system and
storage-unit.
boostfs kerberos
The boostfs kerberos command allows you to add, verify, and remove Kerberos
credentials.
boostfs kerberos set [-u|--storage-unit-username] <storage-
unit-username>
[-s|--storage-unit] <storage-unit>
[[-r|--kerberos-realm] <kerberos-realm>]
[[-m|--kerberos-username] <kerberos-username>]
Gets the Ticket Granting Ticket (TGT) for the storage-unit user.
boostfs kerberos query [[-u|--storage-unit-username] <storage-
unit-username>
[-s|--storage-unit] <storage-unit>]
[[-m|--kerberos-username] <kerberos-username>]
Checks for Kerberos credentials.
boostfs kerberos remove [-s|--storage-unit] <storage-unit>
Removes Kerberos credentials.
boostfs lockbox 73
boostfs
The cifs command manages CIFS data access between a Data Domain system and
Windows clients. Command options enable and disable access to a Data Domain
system from media servers and other Windows clients that use the CIFS protocol. The
cifs command sets the authentication mode, share management, and administrative
access, and displays status and statistics for CIFS clients.
This chapter contains the following topics:
cifs 75
cifs
cifs disable
cifs disable
The CIFS server stops listening on port 445. Role required: admin, limited-admin.
cifs enable
cifs enable
The CIFS server starts listening on port 445. Role required: admin, limited-admin.
cifs local-group
cifs local-group add group-name members member-list
Add a domain user or domain group to the cifs local group using a comma separated
list. Role required: admin, limited-admin.
Note
Do not use cifs local-group add when an f5 option has already been set using
the cifs option set f5 command.
cifs option
cifs option reset name
Reset a CIFS option to default value. Name field will support group name "dd limited-
admin group1 " to " dd limited-admin group50." Role required: admin, limited-admin,
user.
Note
Do not use cifs option set f5 when a CIFS local group has been set using the
cifs local-group add command.
all
Display all options except the undocumented options that are not set by user.
cifs reset
cifs reset authentication
Reset the CIFS authentication to the default: workgroup. Role required: admin,
limited-admin.
cifs reset nb-hostname
Reset the NetBIOS hostname to the default: none. Role required: admin, limited-
admin.
cifs reset stats
Reset cifs statistics. Role required: admin, limited-admin.
cifs restart
cifs restart [force]
cifs reset 77
cifs
cifs set
cifs set authentication active-directory realm { [dc1
[dc2 ...]] | * }
Set authentication to Active Directory (AD). The realm must be a fully qualified name.
Use commas, spaces, or both to separate entries in the domain controller list. Security
officer authorization is required for systems with Retention Lock Compliance enabled.
Role required: admin, limited-admin.
Note
Data Domain recommends using the asterisk to set all controllers instead of entering
them individually.
Argument definitions
realm
The Windows Active Directory realm.
dc1, dc2
Domain Controller 1, Domain Controller 2. You can use the * wildcard character in
the string.
When prompted, enter a name for a user account. The type and format of the name
depend on if the user is inside or outside the company domain.
l For user “Administrator” inside the company domain, enter the name only:
administrator.
l For user “Jane Doe” in a trusted domain, enter the user name and domain:
jane.doe@trusteddomain.com. The account in the trusted domain must have
permission to join the Data Domain system to your company domain.
The Data Domain system automatically adds a host entry to the DNS server. It is not
necessary to create the entry manually.
If you set the NetBIOS hostname using the command cifs set nb-hostname, the
entry is created for NetBIOS hostname only, not the system hostname. Otherwise, the
system hostname is used.
cifs set authentication workgroup workgroup
Set the authentication mode to workgroup for the specified workgroup name. Role
required: admin, limited-admin.
Argument definitions
workgroup
Workgroup name.
cifs share
cifs share create share path path {max-connections max
connections | clients clients | users users | comment comment}
Create a new share. Role required: admin, limited-admin.
Note
This command accepts the /backup alias for the default (backup) MTree in addition
to /data/col1/backup. For paths in all other MTrees, use /data/col1/mtree-
name.
Argument Definitions
share
A descriptive name for the share.
path
The path to the target directory.
max-connections
The maximum number of connections to the share allowed at one time.
clients
A comma-separated list of clients allowed to access the share. Specify the clients
by hostname or IP address. No spaces or tabs are allowed and the list must be
enclosed in double quotes. If the clients argument is not specified when creating
the share, the share is not accessible by any client. To make the share accessible
for all clients, enter the clients argument and precede client name by an
ampersand.
users
A comma-separated list of user names. Other than the comma delimiter, spaces
(blank or tab) are treated as part of the user name because a Windows user name
can have a space in the name.
The user names list can include group names. Group names must be preceded by
the symbol for the word at (@).
All users in the client list can access the share unless one or more user names are
specified, in which case only the listed names can access the share. Separate
group and user names by commas only. Spaces may be included within a group
name but are not allowed as delimiters for group names.
comment
A descriptive comment about the share.
cifs share 79
cifs
cifs show
cifs show active
Display all active CIFS clients. The system displays the computer, the user, opens,
connection time, and idle time for each session. The system also displays the user,
mode, locks, and file for each open file. A summary of sessions and open files is also
displayed. Role required: admin, limited-admin, user, backup-operator, security, none.
cifs show config
Displays the CIFS configuration and whether the DDR is in workgroup mode or active
directory mode as well as the maximum open files. Role required: admin, limited-
admin, user, backup-operator, security, none.
Note
In the command output, "Max open files per connection" displays the maximum
number of open files on a Data Domain system, not the number of open files per
connection.
cifs status
cifs status
Show status of CIFS: enabled or disabled. Role required: admin, limited-admin, user,
backup-operator, security, none.
cifs troubleshooting
cifs troubleshooting domaininfo
Report domain information; for example, to check the connectivity between the Data
Domain system and the domain. Also to confirm if authentication issues are due to
domain connectivity. Role required: admin, limited-admin.
cifs troubleshooting group groupname | gid | SID
List details for a specified group. Role required: admin, limited-admin.
Example 29
cifs troubleshooting 81
cifs
The client-group command lets you configure and monitor external clients in
groups, independent of protocol used.
Note
The Client Group feature is supported only for clients that use DD Boost or NFS
protocols.
Client Group monitoring provides stream counting, stream limit checks, and access
checks against an allowed MTree list. Client Group displays show read and write
stream counters, incoming and outgoing byte counts and network usage, and active
stream file activity with duration and image name. Client Group history provides the
history of every image written or read as well as historical statistics for each group,
collected at a specified interval.
Client Group supports both IP and FibreChannel transport types.
This chapter contains the following topics:
client-group 83
client-group
client-group add
client-group add group-name host host-list
Add a host or a list of hosts to a client group. A client group must have been created
before you can add a host to a client group. To create a client group, use the
client-group create command.
Note
Host names must be entered using all lowercase characters. Using uppercase
characters results in the client being put in the "unassigned" group.
Hosts do not move between groups while they have active streams. A host can only be
in one group at any given time, so a host finds its group on its first stream activity.
Once a host starts a read/write operation, it remains in the group it started on,
independent of any add commands. The add for host only takes effect when the read/
write starts. If additional streams are active concurrently, they will all belong to the
same group. When you move a host to another group, the host must not be active
with any streams, or it will not start in the next group.
The search priority for the host-list in identifying a group-name is:
1. IP address of the client. The IP address is entered as a range--for example, host
10.30.2.28/32
l For IPv4, you can select five different range masks, based on network.
l For IPv6, fixed masks /64 /112 and /128 are available.
2. Hostname. The hostname must match the client-sent name in protocol
communication. This can be verified with ddboost show connections for DD
Boost or nfs show active for NFS.
3. Partial FQDN.
The first match is used.
The "unassigned" group, which is the default group for all clients not added to a
specific group, does not allow host-list (that is, the command checks and does not
allow specification of host-list) .
client-group create
client-group create group-name
Create a client group.
You can create a maximum of 64 groups; the "unassigned" group is created
automatically. Clients are mapped to the "unassigned" group until configured for
another group. The group-name cannot exceed 24 alphanumeric characters; the
hyphen (-) and underscore (_) characters are also allowed. The group-name cannot
be any of the following: all, no, none, limit, group, client, view.
client-group data-access-permit-list
client-group data-access-permit-list add group-name mtree
mtree-name-list
Add a list of MTrees (/data/col1/mtree-name OR mtree-name) or storage units
that should be validated at the start of a read/write operation. Each client group must
check against the allowed MTree list. No checking is done when there is no configured
MTree or storage unit. If the access check against any specified MTrees or storage
unit fails, a permission error is returned. The application then deletes the empty file
and lets you correct the MTree used in the policy.
If a group does not have any data-access-permit settings, permission checks will not
be performed. The check is only performed one time at the start of a read or write
stream operation.
The command accepts a list of MTree names or a single MTree name.
When a storage-unit is deleted or renamed, the client-group MTree is removed or
renamed accordingly.
The MTree is not exclusive to a client-group--the same MTree or storage-unit can be
specified for multiple client-groups.
The command allows both the full mtree /data/col1/mtree-name and the short
version mtree-name, but all displays show only the short version mtree-name.
client-group create 85
client-group
client-group del
client-group del group-name host host-list
Delete a host from a client group.
You can delete a host-list from a client group at any time, but the change does not
take effect until the all active read/write jobs complete on the group-name started.
When a stream starts, using the priority search order described in client group
add, the host finds its client-group. A host will not check its client-group association
until all its current streams complete and it starts a new read or write stream.
client-group destroy
client-group destroy group-name
Destroy an empty client group.
Remove all configured hosts from the client group before issuing the destroy
command. The group must not have active client streams. The "unassigned" group
cannot be destroyed.
When a client-group is destroyed, all statistics information for this client-group is
cleared, except for the information in the clients_stats.log file.
client-group rename
client-group rename group-name new-group-name
Rename a client group.
You can rename a client group at any time. The group-name cannot exceed 24
alphanumeric characters; the hyphen (-) and underscore (_) characters are also
allowed. The group-name cannot be any of the following: all, no, none, limit, group,
client, view.
The client-group name is also used by both log files, clients_history.log and
clients_stats.log. The new name will be used as new log entries are written.
client-group show
client-group show config [ group-name ] [view {summary | hosts
| stream-limit | mtree}]
Show configuration of all client groups, a particular group or selected configuration.
summary
l View summary is part of ASUP
l Shows Boost and/or NFS started time if applicable
l Shows all the statistics options settings
l Shows the stream limits, number of hosts, and Mtree configured
hosts
l List of every host and its associated group
l Can list only hosts for a particular group
stream-limit
mtree
l List of every group MTree or storage-unit
l Select a specific group for MTree or storage-unit
The first protocol read or write of a stream will set the protocol started time. This time
is refreshed when the file-system restarts such as on an upgrade or reboot process.
Note
ASUPs will have the output of client-group show config view summary,
which includes the protocol started time.
Example 30
Group-name Host-name
---------- -------------------------
group2 ddboost-dl.datadomain.com
group2 10.4.5.0/24
group3 *.emc.com
---------- --------------------------
Group-name MTree-name
---------- -------------------------
group2 DDBOOST_STRESS
group2 STU3
---------- --------------------------
Example 31
client-group show 87
client-group
Example 31 (continued)
interval = 60
Note
Group-Name
Client group-name with active streams
Client Hostname
FQDN or short-name sent by client
Client Interface
IP address of Client (or FC indication)
Server Interface
IP of DD side (or FC indication)
Operation
l dsp-write or syn-dsp-write – Boost DSP write with synthetic if specified
l bst-write or nfs-write – non DSP write for either DD Boost or NFS protocol
l bst-read or nfs-read – Read for either DD Boost or NFS protocol
Path
Full path not including “/data/col1”
Start Offset
Start offset written or read
Last Offset
Last offset written or read
Duration
Duration active in read/write state
Example 32
Example 32 (continued)
Group-Name Hostname Interface Interface Offset
Offset hh:mm:ss
---------- ----------- ------------- ------------ --------- ---------- ------
----------- --------
group5 bst.emc.com 192.168.1.203 192.168.1.98 dsp-write STU/wr_0 0
515,899,392 00:00:02
group5 bst.emc.com 192.168.1.203 192.168.1.98 bst-read STU/wr_0 0
515,899,392 00:01:03
---------- ----------- ------------- ------------ --------- -------- ------
----------- --------
group2 ddboost-dl 10.6.109.177 10.26.16.182 nfs-write MT1/data_1 0
5,287,707,000 00:00:51
group2 ddboost-dl 10.6.109.177 10.26.16.182 nfs-read MT1/data_1 0
5,287,707,000 00:00:51
---------- ---------- ------------ ------------ --------- ---------- ------
------------- --------
Write (GiB)
byte count of incoming data
Filtered (GiB)
Boost DSP mode duplicate data
Post_lc (GiB)
Boost DSP mode compressed data
Read (GiB)
byte count of outgoing data
Network (GiB)
byte count on the network (IP or FC)
client-group show 89
client-group
Limit checks include client limit, group limit, and storage-unit limit (if storage-unit).
Limit violations cause the job to fail, and the exceeded count in the log is incremented.
These statistics are reset with the log interval (default 1 hour):
l Recent stream rejected (count of rejected streams due to limit violations)
l Stream max-count per client in group within interval
l Stream max-count for group within interval
The data statistics are reset based on the reset interval (default 12 hours)
Example 34
Example 35
Example 35 (continued)
5.50 0.00 0.00 5.50 0.00 1 1 1 0
5 10
Example 37
Example 38
client-group show 91
client-group
Example 38 (continued)
** Failed to get list: No active clients in list
DD_ERR_EMPTY = 5006
log-condition
Only log groups with updated states, or log all groups
reset-interval
l Debug/clients_stats.log file reset data counters interval
l Default value is one day
l Maximum value can be set for seven days
l On the reset interval, after statistics are written to file, these per-group
counters are reset:
n Write – byte count of incoming data
n Filtered – Boost DSP mode filtered duplicate data
n Post_lc – Boost DSP mode sent compressed incoming data
log-condition
l Debug/clients_stats.log file update groups with updated states or always
l Default is only when states have been updated
reset-interval
l Debug/clients_stats.log file reset data counters interval
l Default value is one day
client-group stream-limit
client-group stream-limit set group-name [client n ] [group n ]
Set stream limits per client in the group and/or for the entire group. Stream limits are
only checked when the stream starts.
l The client limit must be within the group limit if a group limit is specified. The
group limit or client limit cannot exceed the maximum combined limit for the Data
Domain type.
l When the stream limit is set to zero (the default), no checking is done.
l Storage-unit stream limits are checked together with client-group limits.
l The first stream limit settings to exceed will fail stream limit check.
l At the start of a read or write, a failed stream limit check results in an error.
l Once a host starts a read or write operation, limits are not rechecked.
l Statistics kept for client-group show the rejected count due to stream limits.
client-group stream-limit reset group-name [client] [group]
Reset stream limit setting to zero.
client-group stream-limit 93
client-group
The cloud command is used only on systems licensed to run the EMC Data Domain
Cloud Tier software option. Command options let you enable the feature and configure
a profile. See the EMC Data Domain Operating System Administration Guide for details
on using the DD OS System Manager user interface.
This chapter contains the following topics:
cloud 95
cloud
cloud clean
cloud clean frequency reset
Reset the cloud tier cleaning frequency to the default value. Role required: admin and
limited-admin.
cloud clean frequency set interval
Set the frequency for cloud tier cleaning. Role required: admin and limited-admin.
cloud clean frequency show
Show the cloud tier cleaning frequency. Role required: admin and limited-admin.
cloud clean show config
Show the cloud tier cleaning configuration.
cloud clean start unit-name
Start cloud tier cleaning on the cloud unit unit-name. Role required: admin.
cloud clean status
Show cloud tier cleaning status.
cloud clean stop
Stop the cloud tier cleaning process. Role required: admin and limited-admin.
cloud clean throttle reset
Reset throttle percentage for cloud tier cleaning to the default value. Role required:
admin and limited-admin.
cloud clean throttle set percent
Set throttle percentage for cloud tier cleaning (100 is fastest, 0 is slowest). Role
required: admin and limited-admin.
cloud clean throttle show
Show throttle percentage for cloud tier cleaning.
cloud clean watch
Monitor the cloud tier cleaning process.
cloud enable
cloud enable
Enable the Data Domain Cloud Tier software option. If a file system already exists, you
can enable the cloud tier for that system. If you are creating a new file system, you
can enable the cloud tier at the time you create the file system. Role required: admin
and limited-admin.
cloud profile
cloud profile add profile-name
Add a new cloud profile to the system. Role required: admin and limited-admin.
Note
Before adding the first cloud profile, be sure to import root CA certificates of the
cloud provider or any proxy using adminaccess certificate import ca
application cloud file file-name. Certificates need to be stored in /ddr/var/
certificates before you run the adminaccess command.
cloud status
cloud status
Displays whether the Cloud Tier is enabled or not.
cloud unit
cloud unit add unit-name profile profile-name
Add a cloud unit using the specified profile. Role required: admin and limited-admin.
cloud unit del unit-name
Delete the specified cloud unit. A cloud unit cannot be deleted when the file system is
running. Role required: admin and limited-admin.
Note
The cloud unit del command is not allowed on Retention Lock Compliance
systems.
cloud status 97
cloud
Physical capacity measurement (PCM) provides space usage information for a sub-set
of storage space. From the command line interface you can view space usage
information for MTrees, tenants, tenant units, and pathsets.
This chapter contains the following topics:
compression 99
compression
compression physical-capacity-measurement
Physical capacity measurement commands.
compression physical-capacity-measurement disable
Disable physical capacity measurement. Role required: admin and limited-admin.
compression physical-capacity-measurement enable [and-
initialize]
Enable physical capacity measurement. Role required: admin and limited-admin.
compression physical-capacity-measurement pathset add pathset-
name paths pathlist
Add paths to an existing pathset. Role required: admin and limited-admin.
Argument definitions
Note
pathset-name
Specify the name of a pathset.
paths pathlist
Specify a list of pathnames.
100 EMC Data Domain Operating System 6.0 Command Reference Guide
compression
task-id id
Specify a task id for a physical capacity measurement task.
pathsets pathset-list
Specify the name of a list of pathsets.
tenants tenant-list
Specify the list of tenant names.
tenant-units tenant-unit-list
Specify the list of tenant unit names.
mtrees mtree-list
Specify certain MTrees.
Note
WARNING
When multiple objects are specified by this command, the system attempts to
start measurement samples for each object. However, the command succeeds
only if measurement samples actually start for all specified objects. Otherwise,
the system does not start samples for any of the specified objects and the
command fails.
102 EMC Data Domain Operating System 6.0 Command Reference Guide
compression
Argument definitions
priority {normal | urgent}
Specify normal or urgent. Normal priority submits a measurement task to the
processing queue. Urgent priority submits a measurement task to the front of the
processing queue.
CAUTION
The system stops the specified object's measurement task(s), but not
measurement tasks active for any objects contained in the specified object.
NOTICE
Argument definitions
name
Specify a schedule name.
Example 39
Argument definitions
time time
Specify the time for a schedule using the following 24-hour formats: 0000 or
00:00
day days
With the keyword day, specify days as the days of the week using either
lowercase, three letter abbreviations for the days of the week: mon, tue, wed,
thu, fri, sat, sun, or as integers: 0 = Sunday, 1 = Monday, 2 = Tuesday, 3 =
Wednesday, 4 = Thursday, 5 = Friday, 6 = Saturday.
Example 40
Example 41
104 EMC Data Domain Operating System 6.0 Command Reference Guide
compression
Reset the throttle percentage for physical capacity measurement to the default value:
20 percent. Role required: admin and limited-admin.
compression physical-capacity-measurement throttle set 1-100
Set the throttle percentage for physical capacity measurement. Role required: admin
and limited-admin.
compression physical-capacity-measurement throttle show
Show the throttle percentage for physical capacity measurement. Role required:
admin and limited-admin.
Note
106 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 13
config
config 107
config
config reset
config reset location
Delete the location configured with the config set location command. Role
required: admin and limited-admin.
config reset mailserver
Delete the mail server configured with the config set mailserver command.
Role required: admin and limited-admin.
config reset timezone
Reset the time zone to the default, which is US/Pacific. Role required: admin and
limited-admin. This command option requires security officer authorization if
Retention Lock Compliance is enabled on any MTrees.
config set
config set admin-email email-addr
Set the email address for the administrator who should receive system alerts and
autosupport reports. The system requires one administrative email address. Use the
autosupport and alerts commands to add other email addresses. To check the
current setting, use config show admin-email. Role required: admin and limited-
admin.
config set admin-host host
Set the machine from which you can log in to the Data Domain system to view system
logs and use system commands. The hostname can be a simple or fully qualified
hostname or an IP address. The specified host is also added to the FTP and Telnet lists
configured with the adminaccess command and to the CIFS and NFS lists created
with the cifs share create and nfs add commands. This command provides a
quick way to add authentication privileges to multiple lists. To check the current
setting, use config show admin-host. Role required: admin and limited-admin.
Example 42
Example 43
108 EMC Data Domain Operating System 6.0 Command Reference Guide
config
Configure the SMTP mail server used by the Data Domain system. To check the
current setting, use config show mailserver. Role required: admin and limited-
admin.
Example 44
Note
For additional time zone names that are not displayed in DD OS, see the
"Miscellaneous" section of Appendix A in the EMC Data Domain Operating System
Command Reference.
Changes to the time zone require a system reboot. Role required: admin. This
command option requires security officer authorization if any MTrees are enabled with
Retention Lock Compliance.
config setup
config setup
Launch a utility program that prompts you to configure settings for the system,
network, filesystem, CIFS, NFS, and licenses. Press Enter to cycle through the
selections and confirm any changes when prompted. Choices include Save, Cancel,
and Retry.
This command option is unavailable on Retention Lock Compliance systems. Use
System Manager to change configuration settings. Role required: admin and limited-
admin.
config show
config show admin-email
Display the administrator email address to which alert summaries and autosupport
reports are sent. Role required: admin, limited-admin, security, user, backup-operator,
or none.
config show admin-host
Display the administrative host from which you can log into the Data Domain system
to view system logs and use system commands. Role required: admin, limited-admin,
security, user, backup-operator, or none.
config show all
Display all config command settings. Role required: admin, limited-admin, security,
user, backup-operator, or none.
config show location
Display the Data Domain system location description, if you set one. Role required:
admin, limited-admin, security, user, backup-operator, or none.
config show mailserver
Display the name of the mail server that the Data Domain system uses to send email.
Role required: admin, limited-admin, security, user, backup-operator, or none.
config show timezone
Display the time zone used by the system clock. Role required: admin, limited-admin,
security, user, backup-operator, or none.
110 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 14
data-movement
The data-movement command is used only on systems licensed to run the EMC
Data Domain Cloud Tier software option. Command options let you configure data
movement policies and options. See the EMC Data Domain Operating System
Administration Guide for details on using the DD OS System Manager user interface.
This chapter contains the following topics:
data-movement 111
data-movement
data-movement policy
data-movement policy reset {age-range | age-threshold} mtrees
mtree-list
Resets the data-movement policy for the specified MTrees. Role required: admin and
limited-admin.
data-movement policy set age-range min-age days max-age days
to-tier cloud cloud-unit unit-name mtrees mtree-list
Set the age range policy for the specified MTrees. The value for days must be from 14
days to 18250 days (approximately 50 years). The upper limit is optional. Role
required: admin and limited-admin.
data-movement policy set age-threshold days to-tier cloud
cloud-unit unit-name mtrees mtree-list
Set the age threshold policy for the specified MTrees. The value for days must be
from 14 days to 18250 days (approximately 50 years). Role required: admin and
limited-admin.
data-movement policy show [all | to-tier cloud [cloud-unit
unit-name] | mtrees mtree-list]
View the data-movement policy for all MTrees, the specified MTrees, or the specified
cloud units.
data-movement recall
data-movement recall path pathname
Recall a file from the cloud tier to the active tier. A maximum of four files can be
recalled at one time. Once a file is recalled, its aging is reset and will start again from
0, and the file will be eligible based on the age policy set. Role required: admin and
limited-admin.
Note
If a cloud file is present in a snapshot and not in the active MTree, it cannot be
recalled. The only way to recall cloud files that are in snapshots and not in active
Mtrees is to do a fastcopy operation to copy the files from the snapshot to the active
MTree.
112 EMC Data Domain Operating System 6.0 Command Reference Guide
data-movement
data-movement resume
data-movement resume
Resume data movement to the cloud. Role required: admin and limited-admin.
data-movement schedule
data-movement schedule set to-tier cloud {never | days days
time time [every n wks]}
Set the schedule for data movement to the cloud. Note that the days argument
accepts two ranges (and can be either a space- or comma-separated list, or arbitrary
text):
l Weekday (Monday-Sunday)
l Day of the month (1-31, regardless of month, plus “last” and “first”)
Any value outside of the two ranges generates an error message. Data movement
occurs no more frequently than weekly. Role required: admin and limited-admin.
Note
For days, “last” is converted to the value 31. If a schedule is set for the 31st of every
month at 10:00 PM, it is not executed on months with fewer than 31 days. This is a
known issue.
Example 45
Example 46
data-movement start
data-movement start [[to-tier cloud [cloud-unit unit-name]] |
[mtrees mtree-list]]
Start data movement to the cloud. You can start data movement to the specified
cloud unit, for all MTrees with configured data-movement policies, or for specified
MTrees. Role required: admin and limited-admin.
Example 47
Example 47 (continued)
# data-movement start
Data-movement started.
Run "data-movement watch" to monitor progress.
data-movement status
data-movement status [path {pathname | all} | to-tier cloud |
all]
Show the status of data movement as well as recall.
Example 48
# data-movement status
Data-movement to cloud tier:
----------------------------
Data-movement is initializing..
Data-movement recall:
---------------------
No recall operations running.
data-movement stop
data-movement stop [path pathname | to-tier {active | cloud} |
all]
Stop data movement as specified. All data movement to the active tier or to the cloud
tier, or for the specified file can be stopped. Role required: admin and limited-admin.
data-movement suspend
data-movement suspend
Suspend data movement to the cloud. Role required: admin and limited-admin.
data-movement throttle
data-movement throttle reset
Reset the throttle value to 100 percent (no throttle). The throttle value takes effect
without restarting data movement if it is running. Role required: admin and limited-
admin.
data-movement throttle set {25 | 50 | 75 | 100 }
Set the throttle value to 25, 50, 75, or 100, where 25 is the slowest, and 100 is the
fastest. The throttle value takes effect without restarting data movement if it is
running. Role required: admin and limited-admin.
Note
The throttle is for adjusting resources for internal Data Domain processes; it does not
affect network bandwidth.
114 EMC Data Domain Operating System 6.0 Command Reference Guide
data-movement
Show the current throttle value. Role required: admin and limited-admin.
data-movement watch
data-movement watch
View data movement progress while the operation is running. If the operation has
completed or is not running, output shows current status only.
Example 49
# data-movement watch
Data-movement: phase 1 of 3 (copying)
100% complete; time: phase 0:00:24, total 0:00:34
Copied (post-comp): 25.54 MiB, (pre-comp): 103.25 MiB, Files copied: 15, Files
verified: 0
Data-movement: phase 2 of 3 (verifying)re-comp): 103.25 MiB, Files copied: 15, Files
verified: 0
100% complete; time: phase 0:00:10, total 0:00:44
Copied (post-comp): 25.54 MiB, (pre-comp): 103.25 MiB, Files copied: 15, Files
verified: 15
Data-movement: phase 3 of 3 (installing files)): 103.25 MiB, Files copied: 15, Files
verified: 15
100% complete; time: phase 0:13:29, total 0:14:22
Copied (post-comp): 25.54 MiB, (pre-comp): 103.25 MiB, Files copied: 15, Files
verified: 15
Copied (post-comp): 25.54 MiB, (pre-comp): 103.25 MiB, Files copied: 15, Files
verified: 15
Data-movement was started on Jun 23 2016 13:06 and completed on Jun 23 2016 13:20
Copied (post-comp): 25.54 MiB, (pre-comp) 103.25 MiB, Files copied: 15, Files verified 15
116 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 15
ddboost
The ddboost command manages the integration of Data Domain systems and disk
backup devices. Command options create and delete storage units on the storage
server, and display the disk space usage of each storage unit. The EMC Data Domain
Boost software option also supports advanced load balancing and failover, distributed
segment processing, encryption, and low-bandwidth optimization.
Quotas provision Data Domain system storage among different backup applications.
Quotas restrict the logical (uncompressed and undeduplicated) storage capacity for
each storage unit. DD Boost storage unit quota limits (hard or soft) can be set or
removed dynamically. Quotas may also be used to provision various DD Boost storage
units with different sizes, enabling an administrative user to monitor the usage of a
particular storage unit over time. Note that it is possible to configure quotas on a
system and run out of storage before quota limits are reached.
Like MTree quota limits, the ddboost storage-unit create command includes
optional arguments to specify quota limits at the time the storage unit is created.
Output of the ddboost storage-unit show command indicates if a quota is
defined for the storage unit.
Fibre Channel transport is available for DD Boost via the DD Boost over Fibre Channel
service and Automatic Image Replication (AIR) is also supported.
The Multiuser Storage Unit Access Control feature enhances the user experience by
supporting multiple usernames for the DD Boost protocol, providing data isolation for
multiple users sharing a Data Domain system. Using the DD Boost protocol, the
backup application connects to the Data Domain system with a username and
password to support this feature. Both the username and password are encrypted
using public key exchange. The tenant-unit keyword is introduced to the ddboost
storage-unit command for integration with the Secure Multi-Tenancy feature.
One storage unit must be configured for each tenant unit. Each tenant unit can be
associated with multiple storage units.
See the EMC Data Domain Boost for OpenStorage Administration Guide and the EMC
Data Domain Operating System Administration Guide for details.
This chapter contains the following topics:
ddboost 117
ddboost
118 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
ddboost association
ddboost association create local-storage-unit {{replicate-to}
remote-hostname remote-storage-unit | {replicate-from} remote-
hostname remote-storage-unit [{import-to} client-hostname]}
Create a storage unit association between the specified storage unit and the target
Data Domain system storage unit and optionally, the import-to target client. The
import-to client option is applicable when the AIR filecopy feature has been configured
to run, and it lets you specify a single NetBackup media server client to receive AIR
filecopy events from the target Data Domain system. Role required: admin and limited-
admin.
Note
When the AIR import-to client option is used in an environment where multiple media
servers could be used to connect to the AIR filecopy target Data Domain system, the
import-to client specified in this command is the one and only NetBackup media server
client able to receive AIR filecopy event notifications.
If the connected client has a hostname that does not match the defined hostname in
the registry, this ddfs.info log message is generated: DDBoost association
replication-from has import-to client [<client-name>] specified
and a mismatch was found for client requesting events: <client>
Example 50
Example 51
120 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
Example 51 (continued)
Note
This command option deletes unprocessed events in the local storage unit if the
association specified is {replicate-from}. It does not delete user data in the local
storage unit.
Example 52
Example 53
ddboost clients
ddboost clients add client-list [encryption-strength {none |
medium | high} authentication-mode {one-way | two-way |
anonymous | kerberos}]
Add clients to the DD Boost client list and enable encryption for those clients. Use the
authentication-mode option to configure the minimum authentication requirement. A
client attempting to connect using a weaker authentication setting is blocked. Both
one-way and two-way authentication require the client to be knowledgeable of
certificates. If the encryption strength is none, only kerberos authentication-mode is
supported. Kerberos is only available to clients running BoostFS. Role required: admin
and limited-admin.
Argument definitions
none
This encryption strength can only be applied if the authentication mode is
Kerberos.
medium
Use the AES128-SHA cipher suite.
high
Use the AES256-SHA cipher suite.
one-way
The DD Boost client requests authentication from the Data Domain server, and
the Data Domain server sends the appropriate certificate to the DD Boost client.
The DD Boost client verifies the certificate. The communication channel between
the DD Boost client and the Data Domain server is encrypted.
two-way
The DD Boost client requests authentication from the Data Domain server using
the server certificate. The Data Domain server also requests authentication from
the DD Boost client using the client certificate. After authentication through an
SSL handshake, the communication channel between the DD Boost client and the
Data Domain server is encrypted.
anonymous
No certificates are exchanged. After the SSL handshake, the communication
channel between the DD Boost client and the Data Domain server is encrypted.
kerberos
The DD Boost client requests a Kerberos Ticket Granting Ticket (TGT) from the
Key Distribution Center (KDC). When the client credentials are verified, the KDC
sends a TGT to the DD Boost client. The DD Boost client then requests a
Kerberos Ticket Granting Service (TGS) for the desired service. The KDC grants
the TGS for the requested service to the DD Boost client.
122 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
Example 54
Example 55
See the ddboost clients add command for a description of Encryption Strength
and Authentication Mode.
ddboost destroy
ddboost destroy
Delete all storage units from the Data Domain system. The command permanently
removes all data (files) contained in the storage units. You must also manually remove
(expire) corresponding catalog entries in the backup software. Role required: admin.
ddboost disable
ddboost disable
Disable DD Boost. During the process of disabling DD Boost, all file replication
transfers and read/write jobs are also disabled. Role required: admin, limited-admin,
and security.
ddboost enable
ddboost enable
Enable DD Boost. If the user, user ID (UID), or group ID (GID) changes, the Data
Domain system updates all files and storage units the next time this command is run.
Role required: admin and limited-admin.
ddboost event
ddboost event show [all | storage-unit storage-unit]
Show the event list for the specified local storage unit or all local storage units with a
{replicate-from} association. Role required: admin, limited-admin, security, user,
backup-operator, none.
Events formatted with the suffix .event.nnnnnnn have been processed but not yet
deleted. Events formatted with the suffix .imgset have not yet been processed.
Example 56
proc_id
Process identifier on the first media server to which the event is initially delivered.
In the example: 31234.
thread_id
Thread identifier on the first media server to which the event is first delivered. In
the example: 6589.
# images
Number of images contained in event. In the example: 1. Typically this number is 1
because only the IM image file is contained in an event.
event
Image set identifier. In the example: 0000000000000006.
source server
Hostname of the NetBackup server. In the example: rtp-ost-sparc1.emc.com.
image date
NetBackup image time stamp. In the example: 1328637954.
# images
Number of images contained in event. In the example: 1. Typically this number is 1
because only the IM image file is contained in an event.
imgset
Image set identifier.
124 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
ddboost fc
ddboost fc dfc-server-name reset
Reset DD Boost Fibre Channel server name. Role required: admin and limited-admin.
ddboost fc dfc-server-name set server-name
Set DD Boost Fibre Channel server name. The default dfc-server-name has the format
DFC-<base hostname>. Role required: admin and limited-admin.
ddboost fc dfc-server-name show
Show DD Boost Fibre Channel server name. Role required: admin, limited-admin,
security, user, backup-operator, none.
ddboost fc dump start logfile-id logfile-id [formatted]
[snaplen bytes] [logfile-count-limit count] [logfile-size-limit
bytes] [virtual-connection virtual-connection-id] [client-
hostname hostname] [initiator initiator] [target-endpoint
endpoint] [destination-tcp-port tcp-port]
Start DD Boost Fibre Channel message tracing. Role required: admin and limited-
admin.
ddboost fc dump status
Show DD Boost Fibre Channel message tracing. Role required: admin, limited-admin,
security, user, backup-operator, none.
ddboost fc dump stop
Stop DD Boost Fibre Channel message tracing. Role required: admin and limited-
admin.
ddboost fc group add group-name initiator initiator-spec
Add one or more initiators to a DD Boost Fibre Channel group. Role required: admin
and limited-admin.
ddboost fc group add group-name device-set [count count]
[endpoint {all | none | endpoint-list}] [disk]
Add one or more DD Boost devices to a DD Boost Fibre Channel group; if "disk" is not
specified, then the default DFC device type ("Processor") is added. Valid range for
count argument is 1-64. Role required: admin and limited-admin.
ddboost fc group create group-name
Create a DD Boost Fibre Channel group. Role required: admin and limited-admin.
ddboost fc group del group-name initiator initiator-spec
Remove one or more initiators from a DD Boost Fibre Channel group. Role required:
admin and limited-admin.
ddboost fc group del group-name device-set {count count | all}
Remove one or more DD Boost devices from a DD Boost Fibre Channel group. Role
required: admin and limited-admin.
ddboost fc group destroy group-name
Destroy a DD Boost Fibre Channel group. Role required: admin and limited-admin.
ddboost fc group modify group-name device-set [count count]
[endpoint {all | none | endpoint-list]
Modify a device set for a DD Boost Fibre Channel group. Role required: admin and
limited-admin.
ddboost fc group rename src-group-name dst-group-name
Rename a DD Boost Fibre Channel group. Role required: admin and limited-admin.
ddboost fc 125
ddboost
ddboost file-replication
ddboost file-replication option reset {low-bw-optim |
encryption | ipversion}
Reset to default file-replication options. Reset low-bandwidth optimization or
encryption to the default value (disabled). Reset IP version to the default value (ipv4).
Role required: admin and limited-admin.
Note
126 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
option is ipv4, then IPv4 is the preferred IP address type for managed file-replication.
If a preferred IP address is not specified, the default is IPv4. Role required: admin and
limited-admin.
Note
If necessary, check the IP version of the destination system to ensure that it is set as
desired.
Note
entered without a space, for example, 10day or 5hr. In DD OS Release 5.4.1.0, a new
column —Post-synthetic-optim— is added to the command outputs to provide
statistics for synthetic replication. Role required: admin, limited-admin, security, user,
backup-operator, none, tenant-admin, tenant-user.
ddboost file-replication show file-history [all | storage-unit
storage-unit | tenant-unit tenant-unit] [duration duration{day
| hr}]
Show the data-transfer history of inbound and outbound traffic for files in the Data
Domain system /backup directory. The remote hostname is included in the output.
The duration of the day and hour must be entered without a space, for example,
10day or 5hr. Role required: admin, limited-admin, security, user, backup-operator,
none, tenant-admin, tenant-user.
Note
There is a discrepancy between the network bytes output of the CLI and the network
bytes output of the GUI. This is because the CLI reports only one direction of network
bytes for Network (KB), and the SMS report used by the GUI reports the sum of
network_bytes_in + network_bytes_out for Network Bytes (MiB).
Example 57
The following example displays the output of a Data Domain system which is the
source and is replicating to another Data Domain system. Therefore, the source is set
only for outgoing replication. For some of the time periods shown, no data was
actually sent. If inbound replication traffic was set, then the columns under inbound
would be filled in similarly. The ddboost file-replication show
performance command is used without any options:
128 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
Example 57 (continued)
- - - -
906275 2677 - -
1280554 3801 - -
- - - -
2386719 7046 - -
294790 899 - -
- - - -
2491855 7383 - -
- - - -
- - - -
1459252 4323 - -
- - - -
- - - -
2556742 7575 - -
Note
Managed file replication statistics are populated under the ddboost file-
replication show performance command and kept separate from the backup
and restore stream stats.
Note
Managed file replication statistics are populated under the ddboost file-
replication show stats command and kept separate from the backup and
restore stream stats.
Example 58
The following example displays the output of a Data Domain system which is logging
the inbound replication traffic:
Direction: Inbound
Network bytes received: 292,132,082,144
Pre-compressed bytes received: 36,147,804,001,570
Bytes after synthetic optimization: 36,147,804,001,570
Bytes after filtering: 1,664,434,329,750
Example 58 (continued)
ddboost ifgroup
ddboost ifgroup add group_name {interface {ipaddr | ipv6addr} |
client host}
Note
Add an interface, client, or both to group-name or to the default group. Prior to adding
an interface you must create the group_name unless the group name is the default
group. Role required: admin, limited-admin.
This command provides full ifgroup support for static IPv6 addresses, providing the
same capabilities for IPv6 as for IPv4. Concurrent IPv4 and IPv6 client connections
are allowed. A client connected with IPv6 sees IPv6 ifgroup interfaces only. A client
connected with IPv4 sees IPv4 ifgroup interfaces only. Individual ifgroups include all
IPv4 addresses or all IPv6 addresses. The default group behaves in the same manner
as any other group.
l The group-name “default” is created during an upgrade of a fresh install and is
always used if group_name is not specified.
l You can enforce private network connectivity, ensuring that a failed job does not
reconnect on the public network after network errors. When interface
enforcement is enabled, a failed job can only retry on an alternative private
network IP address. Interface enforcement is only available for clients that use
ifgroup interfaces.
Interface enforcement is off (FALSE) by default. To enable interface enforcement,
you must add the following setting to the system registry:
system.ENFORCE_IFGROUP_RW=TRUE
After you've made this entry in the registry, you must do a filesys restart
for the setting to take effect. For more information, see the EMC Data Domain
Boost for Partner Integration Administration Guide or the EMC Data Domain Boost for
OpenStorage Administration Guide.
l An ifgroup client is a member of a single ifgroup group-name and may consist of a
fully qualified domain name (FQDN) such as ddboost.datadomain.com, wild
cards such as *.datadomain.com or “*”, a short name such as ddboost, or IP
range of the client (xx.xx.xx.0/24 for IPv4 or xxxx::0/112 for IPv6, for
example). When a client's source IP address is evaluated for access to the ifgroup,
the order of precedence is:
1. IP address of the connected Data Domain system
2. Connected client IP range. This host-range check is useful for separate VLANs
with many clients where there isn't a unique partial hostname (domain). For
IPv4, 16, 20, 24, 28, and 32 bit masks are supported. For IPv6, 64, 112, and 128
bit masks are supported.
130 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
Note
Create a group with the name group-name for the interface. Group names may
contain alphanumeric characters, hyphens, and underscores. System hostnames, fully
qualified hostnames, and wildcard hostnames indicated by an asterisk may also be
used. Reserved group names that cannot be used are default, all, or none. Role
required: admin, limited-admin.
ddboost ifgroup del group_name {interface {ipaddr | ipv6addr} |
client host}
Note
Remove an interface, client, or both from group_name or default group. Deleting the
last IP address interface disables the ifgroup. If this is the case, you have the option of
terminating this command option. Role required: admin, limited-admin.
ddboost ifgroup destroy group-name
Note
Destroy the group name. Only empty groups can be destroyed. Interfaces or clients
cannot be destroyed but may be removed sequentially or by running the command
option ddboost ifgroup reset group-name. Role required: admin, limited-admin.
Note
Note
Note
Note
Note
Reset a specific group by entering the group-name. If group-name is not specified, the
command applies to the default group. Role required: admin, limited-admin.
ddboost ifgroup show config {interfaces | clients | groups |
all} [group-name]
Note
Note
132 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
Show status of the specified group-name: enabled or disabled. Role required: admin,
limited-admin, security, user, backup-operator, none.
If group-name is not specified, status for the default group is shown. All users may run
this command option.
ddboost option
ddboost option reset {distributed-segment-processing | virtual-
synthetics | fc}
Reset distributed segment processing, virtual synthetics to the default option of
enabled. Reset Fibre Channel to the default option of disabled. Virtual synthetics and
Fibre Channel features are supported on single-node configurations and systems with
Extended Retention only. Role required: admin, limited-admin.
ddboost option set distributed-segment-processing {enabled |
disabled}
Enable or disable the distributed segment processing feature on DD Boost.
Distributed-segment-processing feature is supported on single-node configurations
and systems with Extended Retention only. Role required: admin, limited-admin.
ddboost option set fc {enabled | disabled}
Enable or disable Fibre Channel for DD Boost. Fiber Channel features are supported on
single-node configurations and systems with Extended Retention. Role required:
admin, limited-admin.
ddboost option set virtual-synthetics {enabled | disabled}
Enable or disable the virtual synthetics feature on the DD Boost. Virtual synthetics
features are supported on single-node configurations and systems with Extended
Retention. Role required: admin, limited-admin.
ddboost option show [distributed-segment-processing | virtual-
synthetics | fc]
Show status of distributed segment processing, virtual synthetics, or Fibre Channel. If
no argument is specified, status for all arguments are shown. Status is enabled or
disabled. Default is enabled for distributed segment processing and virtual synthetics.
Default is disabled for Fibre Channel. All users may run this command. Role required:
admin, limited-admin, security, user, backup-operator, none.
ddboost reset
ddboost reset stats
Reset statistics when DD Boost is enabled, or as a network recovery procedure to
clear job connections after the network connection is lost. Role required: admin,
limited-admin.
ddboost reset user-name user-name
This command is deprecated. Use ddboost user unassign command instead.
Role required: admin, limited-admin.
ddboost set
ddboost set user-name user-name
This command is deprecated. Use ddboost user assign command instead. Role
required: admin, limited-admin.
Note
The ddboost user assign command will be the default command to create users
for DD Boost storage units.
ddboost show
ddboost show connections [detailed]
Show DD Boost active clients and client connections. Client information includes
name, idle status, plug-in version, OS version, application version, encryption, DSP,
and transport. Using the detailed option provides CPU and memory data. Role
required: admin, limited-admin, security, user, backup-operator, none.
Note
l When DD Boost Fibre Channel is enabled, connections are listed in the category
Interfaces and are named DDBOOST_FC. The ifgroup Group Name category does
not apply to DD Boost Fibre Channel; therefore, the group name is listed as n/a.
l AIR replication job count will be displayed as a Src-repl job in the output of a
ddboost show connections command, the same as other NetBackup and
Backup Exec optimized duplication jobs.
l Both the control connection for file replication and the actual replication interfaces
are displayed.
Note
A protocol message with an error count may not indicate a problem. For example, a
DDP_LOOKUP with a high error count may just mean that the application issued a
request to find a file before creating it simply to verify that the file didn't already exist.
Output definitions
mean
The mathematical mean time for completion of the operations, in milliseconds.
std-dev
The standard deviation for time to complete operations, derived from the mean
time, in milliseconds.
<1ms
The number of operations that took less than 1 millisecond.
<5ms
The number of operations that took between 1 milliseconds and 5 milliseconds.
134 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
<10ms
The number of operations that took between 5 milliseconds and 10 milliseconds
<100ms
The number of operations that took between 10 milliseconds and 100 milliseconds.
<1s
The number of operations that took between 100 milliseconds and 1 second.
<10s
The number of operations that took between 1 second and 10 seconds.
>10s
The number of operations that took more than 10 seconds.
total
The total time taken for a single operation, in milliseconds.
max
The maximum time taken for a single operation, in milliseconds.
min
The minimum time taken for a single operation, in milliseconds.
Example 59
--------------------------------------------------------------
OPER mean std-dev <1ms <5ms <10ms <100ms ...
--------------------------------------------------------------
...
DDP_GETATTR 0.00ms 0.00ms 0 0 0 0 ...
DDP_LOOKUP 3.34ms 29.17ms 13389 126 137 617 ...
DDP_WRITE 0.30ms 4.98ms 125... 5048 1776 1502 ...
...
Example 60
This example shows the default output when neither interval nor count is
specified:
Example 60 (continued)
DD Boost statistics:
Example 61
This example shows the output when both interval and count are specified:
136 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
ddboost status
ddboost status
Display status of DD Boost: enabled or disabled. Role required: admin, limited-admin,
security, user, backup-operator, none.
Note
ddboost storage-unit
ddboost storage-unit create storage-unit user user-name
[tenant-unit tenant-unit] [quota-soft-limit n {MiB|GiB|TiB|
PiB}] [quota-hard-limit n {MiB|GiB|TiB|PiB}] [report-physical-
size n {MiB|GiB|TiB|PiB}] [write-stream-soft-limit n] [read-
stream-soft-limit n] [repl-stream-soft-limit n] [combined-
stream-soft-limit n] [combined-stream-hard-limit n]
Create a storage unit, assign tenant, and set quota and stream limits. Role required:
admin, limited-admin.
Note
If the quota feature is not enabled, the quota is created but a message appears stating
the feature is disabled and quota limits are not enforced.
Note
The tenant-unit option is introduced for integration with the Secure Multi-Tenancy
(SMT) feature. If a tenant-unit is specified, and the storage-unit user has a role other
than none, the command fails. To remove a user's association with a tenant-unit, use
the ddboost storage-unit modify command and set the tenant-unit value
to none.
For more information about SMT, refer to the EMC Data Domain Operating System
Administration Guide.
You can assign four types of soft stream warning limits against each storage-unit
(read, write, replication, and combined), and you can assign a combined hard stream
limit. Assigning a hard stream limit per storage-unit enables you to fail new DD Boost
streams when the limit is exceeded, including read streams, write streams, and
replication streams. The hard stream limit is detected before the stream operation
starts. The hard stream limit cannot exceed the capacity of the Data Domain system
model, and it cannot be less than any other single limit (read, write, replication, or
combined).
The following example shows how to create a storage unit with stream limits:
# ddboost storage-unit create NEW_STU0 user user2 write-stream-soft-limit 5
read-stream-soft-limit 1 repl-stream-soft-limit 2 combined-stream-hard-limit 10
Created storage-unit "NEW_STU0" for "user2".
Set stream warning limits for storage-unit "NEW_STU0".
Quotas may cause OpenStorage backup applications to report unexpected sizes and
capacities. See Knowledge Base article 85210, available on the EMC Online Support.
ddboost storage-unit delete storage-unit
Delete a specified storage unit, its contents, and any DD Boost associations. The
deleted storage-unit retains its old name and is shown as deleted in the mtree list.
Role required: admin.
Note
You must also manually remove (expire) corresponding catalog entries from the
backup application.
Note
If a tenant-unit value other than none is specified, and the storage-unit user has a role
other than none, the command fails. To remove a user's association with a tenant-unit,
set the tenant-unit value to none.
The following example shows how to modify the stream limits for a storage unit:
# ddboost storage-unit modify NEW_STU1 write-stream-soft-limit 3
read-stream-soft-limit 2 repl-stream-soft-limit 1 combined-stream-hard-limit 8
NEW_STU1: Stream soft limits: write=3, read=2, repl=1, combined=none
If DD Boost storage units are replicated with MTree or collection replication, each
storage unit on the target must have the DD Boost user added with the command
ddboost storage-unit modify before being accessed by the Boost backup
software. The following example sets the user of the storage unit STU1 to ostuser.
# ddboost user show
ostuser
Assuming storage-unit STU1
# ddboost storage-unit modify STU1 user ostuser
138 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
Note
Note
l Deleted storage units are available until the next filesys clean command is
run.
l You cannot use this command to undelete an Mtree.
l You cannot use this command to undelete a storage unit deleted using the DD
Boost SDK. To recover a storage unit deleted using the DD Boost SDK:
1. Enter mtree show to determine which deleted mtree is the storage unit to be
undeleted. To help identify it, the first 32 characters of the original storage unit
name are included in mtree name, in the following format: deleted-original-su-
name-xxxxxxxxx, where xxxxxxxxx is a timestamp in ms. If this isn’t sufficient,
look in messages.engineering to find the renamed value.
2. Enter ddboost storage-unit undelete deleted-mtree-name, using the
mtree name identified in step 1.
3. Enter ddboost rename deleted-mtree-name original-su-name.
ddboost streams
ddboost streams show active [all | storage-unit storage-unit |
tenant-unit tenant-unit]
Display active streams per storage-unit. Role required: admin, limited-admin, security,
user, backup-operator, none, tenant-admin, tenant-user.
# ddboost streams show active storage-unit STU-1
--------- Active Streams -------- --------- Soft Limits -------- - Hard Limit -
Name Read Write Repl-out Repl-in Read Write Repl Combined Combined
----- ---- ----- -------- ------- ---- ----- ---- -------- --------------
STU-1 0 0 0 0 - - - - 25
----- ---- ----- -------- ------- ---- ----- ---- -------- --------------
DD System Stream Limits: read=30 write=90 repl-in=90 repl-out=82 combined=90
Note
The DD system stream limits above are based on the type of the DD system.
You can assign four types of soft stream warning limits against each storage-unit
(read, write, replication, and combined), and you can assign a combined hard stream
limit. Assigning a hard stream limit per storage-unit enables you to fail new DD Boost
streams when the limit is exceeded, including read streams, write streams, and
replication streams. The hard stream limit is detected before the stream operation
starts. The hard stream limit cannot exceed the capacity of the Data Domain system
140 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
model, and it cannot be less than any other single limit (read, write, replication, or
combined).
When any stream count exceeds the warning limit quota, an alert is generated. The
alert automatically clears once the stream limit returns below the quota for over 10
minutes.
Note
DD Boost users are expected to reduce the workload to remain below the stream
warning quotas or the system administrator can change the warning limit configured
to avoid exceeding the limit.
Example 62
Storage-Unit: "stu1"
Date Time read write repl-out repl-in
YYYY/MM/DD HH:MM streams streams streams streams
---------- ------- ------- ------- --------- --------
2013/08/29 12:00 0 0 0 0
2013/08/29 12:10 0 0 0 0
2013/08/29 12:20 0 1 0 0
2013/08/29 12:30 0 2 0 0
2013/08/29 12:40 0 2 0 0
2013/08/29 12:50 0 1 0 0
2013/08/29 13:00 0 0 0 0
---------- ------ ------- ------- --------- --------
ddboost user
ddboost user assign user-name-list
Assign Data Domain system users to the list of recognized DD Boost users. Role
required: admin, limited-admin, security, user, backup-operator, none, tenant-admin,
tenant-user.
This command is typically used for applications that create storage-units through the
DD Boost SDK APIs.
Note
When a storage-unit is created with a valid Data Domain system local user that is not
assigned to DD Boost, the user is automatically added to the DD Boost user list.
Example 63
Note
Example 64
The following output displays how to set the tenant-units when working with SMT.
(The default tenant-unit is displayed only when SMT is enabled.)
142 EMC Data Domain Operating System 6.0 Command Reference Guide
ddboost
Example 64 (continued)
DD Boost user Default tenant-unit
------------- -------------------
user2 tu2
------------- -------------------
Example 65
Example 66
Note
The ddboost user unassign command does not validate the DD Boost user, it
only looks to see if the user has been previously assigned to the DD Boost users list.
Example 67
If the administrator is trying to delete a specific user named user4, who has not been
previously assigned to the users list, by either using the ddboost user unassign
or ddboost user option reset command, then the following output will display
that this user is not assigned to the DD Boost users list:
144 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 16
disk
The disk command manages disks and displays disk locations, logical (RAID) layout,
usage, and reliability statistics. Each Data Domain system reports the number of disks
in the system. For a Data Domain system with one or more Data Domain external disk
shelves, commands also include entries for enclosures and disks.
This chapter contains the following topics:
disk 145
disk
disk beacon
disk beacon {enclosure-id.disk-id | serialno}
Cause the LEDs associated with the specified disk to flash. Use this command to
verify communications with a disk or to identify which physical disk corresponds to a
disk ID.
The LEDs that flash are the LEDs that signal normal operation on the target disk and
the IDENT LEDs for the enclosure and the controller. The power supply IDENT LEDs
also flash on DS60 enclosures. Press Ctrl-C to stop the flash. To display disk
identification information, enter disk show hardware. To beacon all disks in an
enclosure, type enclosure beacon. Role required: admin, limited-admin.
disk fail
disk fail enclosure-id.disk-id
Fail a disk and force reconstruction. To display disk identification information, enter
disk show hardware. Role required: admin, limited-admin.
146 EMC Data Domain Operating System 6.0 Command Reference Guide
disk
disk multipath
disk multipath option reset {monitor}
Disable multipath configuration monitoring. When disabled, failures in paths to disk
devices do not generate alerts. Multipath configuration monitoring is disabled by
default. Role required: admin, limited-admin.
disk multipath option set monitor {enabled | disabled}
Enable multipath configuration monitoring. When enabled, failures in paths to disk
devices generate alerts and log multipath events. If monitoring is disabled, multipath
event logging is not performed, meaning disk multipath show history is not updated.
Multipath configuration monitoring is disabled by default. Role required: admin,
limited-admin.
disk multipath option show
Show the configuration of multipath monitoring. Role required: admin, limited-admin,
security, user, backup-operator, or none.
disk multipath reset stats
Clear statistics of all disk paths in expansion shelves. Role required: admin, limited-
admin.
disk multipath resume port port
Allow I/O on specified initiator port. Use disk multipath status to display the
available ports. Role required: admin, limited-admin.
disk multipath show history
Show the history of multipath events. Role required: admin, limited-admin, security,
user, backup-operator, or none.
disk multipath show stats [enclosure enc-id]
Show statistics for all disk paths or for the specified enclosure only. To view the
enclosure IDs, enter enclosure show summary.
disk multipath status [port-id]
Show multipath configurations and runtime status. To view the port IDs, enter the
command without the port ID. Role required: admin, limited-admin, security, user,
backup-operator, or none.
disk multipath suspend port port
Disallow I/O on the specified initiator port, and stop traffic on particular ports during
scheduled maintenance of a SAN, storage array, or system. This command does not
drop a Fibre Channel link. To view the ports, enter disk multipath status. Role
required: admin, limited-admin.
disk port
disk port enable port-id
Enable the specified initiator port. To display the disk ports, enter disk port show
summary. Role required: admin, limited-admin.
disk port show {stats | summary}
Show disk port statistics or configuration and status. When the disabled status
appears without an asterisk, the port is administratively disabled. When the disabled
status appears with an asterisk and an error message below the report, the system has
disabled the port. Role required: admin, limited-admin, security, user, backup-
operator, or none.
Example 68
Example 69
disk release
disk release persistent-id {persistent-id | all}
Releases the disk's persistent ID and enables persistent ID to be assigned on the next
boot. Role required: admin, limited-admin.
disk rescan
disk rescan [enclosure-id.disk-id]
Rescan all disks or a specified disk to look for newly removed or inserted disks or
LUNs or power on a drive. To view disk IDs with both enclosure ID and disk ID, enter
disk show hardware. Role required: admin, limited-admin.
disk reset
disk reset performance
Reset disk performance statistics to zero. Role required: admin, limited-admin.
148 EMC Data Domain Operating System 6.0 Command Reference Guide
disk
disk set
disk set dev disk-id spindle-group 1-16
Assign a LUN group to the disk. To display the disk IDs, enter disk show
hardware. You must restart the file system after adding the LUN. Role required:
admin, limited-admin.
disk show
disk show failure-history
Display a list of disk failure events, which include the date, time disk ID, enclosure
serial number, and disk serial number. Role required: admin, limited-admin, security,
user, backup-operator, or none.
disk show hardware
Display disk hardware information. The output includes a column for slot identification.
The identification displayed in the Slot column is based on the type of enclosure that
contains each disk.
l Slot numbering begins at 0 for DD2500 and ES30 enclosures.
l Slot numbering begins at 0 for DD4200, DD4500, and DD7200 controllers,
however slot 0 is unused and does not appear in output.
l Slot numbering begins at 1 for DD990 controllers and earlier.
l Slot numbering for DS60 enclosures uses a letter and a number to define the row
and column location of each disk.
Role required: admin, limited-admin, security, user, backup-operator, or none.
Output Definitions (Disk Information)
Disk (enc/disk)
The enclosure and disk ID numbers.
Slot
The slot number for the disk.
Manufacturer/Model
The manufacturer model designation.
Firmware
The firmware revision on each disk.
Serial No.
The manufacturer serial number for the disk.
Capacity
The data storage capacity of the disk when used in a Data Domain system. The
Data Domain convention for computing disk space defines one gigabyte as 230
bytes, giving a different disk capacity than the manufacturer’s rating.
Type
The type of disk drive.
LUN
The LUN number given to a LUN on the third-party physical disk storage system.
Port WWN
The world-wide number of the port on the storage array through which data is
sent to the Data Domain system.
Manufacturer/Model
A label that identifies the manufacturer. The display may include a model ID, RAID
type, or other information depending on the vendor string sent by the storage
array.
Firmware
The firmware level used by the third-party physical disk storage controller.
Serial No.
The serial number from the third-party physical disk storage system for a volume
that is sent to the Data Domain system.
Capacity
The amount of data in a volume sent to the Data Domain system. GiB = Gibibytes,
the base-2 equivalent of Gigabytes. MiB = Mebibytes, the base-2 equivalent of
Megabytes. TiB = Tebibytes, the base-2 equivalent of Terabytes.
enclosure-id
Specify an enclosure number to display the performance data for only the disks in
that enclosure. To display the enclosure IDs, enter enclosure show summary.
enclosure-id.disk-id
Specify an enclosure number and disk number to display the performance data for
a specific disk. To display the available disks, enter disk show performance.
devn
Specify a SCSI target or vdisk device to display the performance data for the
device. To display the available devices, enter disk show performance.
150 EMC Data Domain Operating System 6.0 Command Reference Guide
disk
Output Definitions
Disk (enc/disk)
The enclosure and disk numbers.
Read
Disk access statistics for read operations.
Read+Write
Disk access statistics for total (read +write) operations.
Write
Disk access statistics for write operations.
KiB/sec
The average data transfer speed in KiB/second.
IOPs
The average number of read, write, or total (read +write) input/output operations
per second (IOPs).
Resp(ms)
The average response time in milliseconds.
Ops >1s
The number of operations that required more than 1 second for processing.
MiB/sec
The average number of mebibytes per second (MiB/s) written to storage.
Mebibytes are the base-2 equivalent of Megabytes.
Random
The percentage of random IOPs.
Busy
The average percent of time that at least one command is queued for storage
access.
Slot
The disk slot number.
Reallocated Sectors
The number of mapped-out defective sectors.
Temperature
The current temperature of each disk in Celsius and Fahrenheit. The allowable
case temperature range for disks is from 5 degrees centigrade to 55 degrees
centigrade.
-
(Dash) Not installed. The enclosure firmware has determined that no disk is
installed.
A
Absent. DD OS does not detect a disk in the indicated location, and no firmware
status is available. The disk may be absent, or there may be some condition that
makes the disk appear to be absent.
C
Copy Recovery. The disk has a high error rate but is not failed. RAID is currently
copying the contents onto a spare drive and will fail the drive once the copy
reconstruction is complete.
d
Destination. The disk is in use as the destination for storage migration.
E
Error. The disk has a high error rate but is not failed. The disk is in the queue for
copy reconstruction. The state will change to Copy Recovery when copy
reconstruction begins.
K
Known. The disk is a supported disk that is ready for allocation.
m
Migrating. The disk is in use as the source for storage migration.
O
Foreign. The disk has been assigned to a tier, but the disk data indicates the disk
may be owned by another system.
P
Powered Off. The disk power has been removed by EMC Support.
152 EMC Data Domain Operating System 6.0 Command Reference Guide
disk
R
Reconstruction. The disk is reconstructing in response to a disk fail
command or by direction from RAID/SSM.
s
Spare. The disk is available for use as a spare.
U
Unknown. An unknown disk is not allocated to the active or retention tier. It might
have been failed administratively or by the RAID system.
v
Available. An available disk is allocated to the active or retention tier, but it is not
currently in use.
Y
System. System disks store DD OS and system data. No backup data is stored on
system disks.
Example 70
The following example shows the output for 15 disk enclosure such as the ES30.
Example 71
The following example shows the output for a system with 2 15-disk enclosures and 2
60-disk enclosures.
disk status
disk status
View details on the Data Domain system disk status. Output includes the number of
disks in use and failed, the number of spare disks available, and if a RAID disk group
reconstruction is underway.
Note
The RAID portion of the display could show one or more disks as Failed while the
Operational portion of the display could show all drives operating nominally. A disk can
be physically functional and available, but not in use by RAID, possibly because of user
intervention.
Reconstruction is done per disk. If more than one disk is to be reconstructed, the disks
queued for reconstruction show as spare or hot spare until reconstruction begins.
In the first line of output, disk status is indicated by one of the following, high-level
states.
154 EMC Data Domain Operating System 6.0 Command Reference Guide
disk
Destination
The disk is in use as the destination for storage migration.
Error
A new head unit is in this state when Foreign storage is present. For a system
configured with some storage, the error indicates that some or all of its own
storage is missing.
Migrating
The disk is in use as the source for storage migration.
Normal
The system is operational and all disks are available and ready for use.
Warning
One or more of the following conditions require user action.
l RAID system degraded
l Foreign storage
l Failed or Absent disks
disk unfail
disk unfail enclosure-id.disk-id
This command attempts to make a disk previously marked Failed or Foreign usable to
the system. To display the enclosure and disk ID for each disk, enter disk show
hardware. Role required: admin, limited-admin.
156 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 17
elicense
elicense 157
elicense
elicense reset
elicense reset
Delete all existing licenses. Role required: admin, limited-admin.
Note
When features such as HA, vdisk, VTL, or DD Boost are in use, elicense reset
returns an error message. Disable any such features before issuing the elicense
reset command.
elicense show
elicense show [licenses | locking-id | software-id | all]
Show current license information. Specify locking-ID to display the serial number,
licenses to display all licenses installed, and all to display licenses, locking-ID, and
last modified. The software-id option is only available for DD VE. Issuing elicense
show is the same as issuing elicense show all. Role required: admin, limited-
admin, security, backup-operator, user.
elicense update
elicense update [check-only] [license-file]
l Use elicense update to cut and paste elicense codes. When finished pasting,
enter CTRL+D
l Use elicense update filename to transfer a .lic file to /ddvar.
l Use the check-only option to validate the license file or license content.
Role required: admin, limited-admin.
Note
All licenses for the system have to be put in a single file. Every time that elicenses are
updated, the previous licenses are overwritten.
158 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 18
enclosure
The enclosure command identifies and displays information about Data Domain
system enclosures and attached expansion shelves. Beginning with 5.4, output from
the enclosure show command option includes device VPD information for
enclosures on newer Data Domain appliances (DD4500 and DD7200). VPD information
enables users to monitor systems more efficiently.
This chapter contains the following topics:
enclosure 159
enclosure
enclosure beacon
enclosure beacon enclosure
Cause the LEDs associated with the specified enclosure to flash. Use this command to
verify communications with an enclosure or to identify which physical enclosure
corresponds to an enclosure ID.
The LEDs that flash are the LEDs that signal normal operation on all enclosure disks
and the IDENT LEDs for the enclosure and the controller. The power supply IDENT
LEDs also flash on DS60 enclosures. Press Ctrl-C to stop the flash. Role required:
admin, limited-admin.
enclosure release
enclosure release persistent-id {serialno | persistent-id |
all}
Remove the persistent ID assignment of an enclosure from the system. This removal
becomes complete when the system is restarted. Use enclosure show
persistent-id to display the serial numbers and IDs for persistent enclosures. Role
required: admin, limited-admin.
Example 72
enclosure show
enclosure show all [enclosure]
Display detailed information about the installed components and component status for
all enclosures. The controller is enclosure 1. To see the IDs for all enclosures, enter
enclosure show summary. Role required: admin, limited-admin, security, user,
backup-operator, or none.
enclosure show chassis [enclosure]
160 EMC Data Domain Operating System 6.0 Command Reference Guide
enclosure
Show part numbers, serial numbers, and component version numbers for one or all
enclosures. To see the IDs for all enclosures, enter enclosure show summary.
Role required: admin, limited-admin, security, user, backup-operator, or none.
enclosure show controllers <enclosure>
Display the controller model number and related information for a system controller or
expansion shelf. To see the IDs for all enclosures, enter enclosure show summary.
Role required: admin, limited-admin, security, user, backup-operator, or none.
enclosure show persistent-id
The command enables persistent enclosure numbering management method. Role
required: admin, limited-admin, security, user, backup-operator, or none.
Model
The product name, such as DD860 or ES30.
Capacity
The number of usable drive slots in the enclosure.
Serial No.
The serial number of the physical enclosure. As with the WWN, this describes the
enclosure and does not change if components are swapped. Depending on when
the enclosure was manufactured, this may be the same value as the WWN. This
value matches the serial number printed on the label on the back of the enclosure.
Number of Controllers
The number of shelf controllers currently inserted into the enclosure.
Firmware
The revision level of the firmware that resides on the shelf controller. This value
can be different for each shelf controller.
Serial #
The serial number for the shelf controller. The serial number is different for each
shelf controller and differs from the enclosure serial number.
Part #
The part number for the shelf controller.
Status
The current status of the shelf controller.
Type
The type of shelf controller.
Description
The ID for each power or cooling unit.
Level
The fan speed. This value depends on the internal temperature and amount of
cooling required.
Status
The fan status: OK or Failed.
Example 73
162 EMC Data Domain Operating System 6.0 Command Reference Guide
enclosure
Example 74
Online
Operating as expected. No problems detected.
Fault
Applies to ES20 only. Indicates no communication with firmware.
Found
Enclosure detected. This transition state is very brief and rarely seen.
Error
Hardware or software error.
Software Error
Typically means busy. Try again later.
Description
The ID for each monitored component. The components listed depend on the
model and are often shown as abbreviations. Some examples are:
l CPU 0 Temp (Central Processing Unit)
l MLB Temp 1 (main logic board)
l BP middle temp (backplane)
l LP temp (low profile of I/O riser FRU)
l FHFL temp (full height full length of I/O riser FRU)
l FP temp (front panel)
164 EMC Data Domain Operating System 6.0 Command Reference Guide
enclosure
C/F
Ambient readings are displayed as positive numbers and indicate the approximate
component temperature in Celsius and Fahrenheit. CPU temperatures may be
shown in relative or ambient readings. Relative readings are displayed as negative
numbers and indicate the difference between the current temperature and the
CPU throttling point, when the CPU reduces its power consumption.
Status
If temperature thresholds are defined for a component, the Status column
displays the component status determined by the threshold configuration. If the
component temperature is within the configured thresholds, the status is OK.
Warning status indicates the temperature is above the acceptable threshold, and
Critical status indicates the temperature is above the shutdown threshold. When
no thresholds are defined for a component, the Status column displays a dash (-).
Example 75
Example 76
enclosure test
enclosure test topology port duration minutes
Test communications with the specified port for the specified number of minutes. To
display the port IDs, enter enclosure show io-cards. Role required: admin,
limited-admin.
166 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 19
filesys
The filesys command displays statistics, capacity, status, and use of the filesystem.
Command options also clear the statistics file, and start and stop filesystem
processes. The filesys clean command options reclaim physical storage within
the filesystem. Command output for disk space or the amount of data on disks is
computed using base-2 calculations. See the EMC Data Domain Operating System
Administration Guide for details.
The filesys archive command option is specific to a Data Domain system with
Extended Retention, and enables administrative users to provision the filesystem with
tiered storage. See the EMC Data Domain Operating System Administration Guide for
details on command usage and examples.
This chapter contains the following topics:
filesys 167
filesys
filesys archive
filesys archive unit add
Create a retention unit from the retention tier of the file system, change the state of
disks or LUNs from Available to In Use, and add the new retention unit to the file
system. The system creates a retention unit using all available storage, but fails the
operation if the combined size of all available storage in the retention tier is larger than
the maximum supported size. Role required: admin.
Note
If a system already has archive units configured, it will fail with the following error
message: "Cannot add an archive unit to this system: The system already has an
archive unit."
Note
168 EMC Data Domain Operating System 6.0 Command Reference Guide
filesys
filesys clean
filesys clean reset {schedule | throttle | all}
Reset the clean schedule to the default of Tuesday at 6 a.m. (tue 0600), the default
throttle of 50 percent, or both. Role required: admin, limited-admin.
filesys clean set schedule { never | daily time | <day(s)> time
| biweekly day time | monthly <day(s)> time }
Set schedule for the clean operation to run automatically. Data Domain recommends
running the clean operation once a week to maintain optimal availability of the file
system. However, if there is no shortage of disk space you may clean less often. Role
required: admin, limited-admin.
Argument Definitions
never
Turn off the clean schedule.
daily
Run command every day at the set time.
time
Time is 24-hour format and must be specified by four digits. The time mon 0000
is midnight between Sunday night and Monday morning. 2400 is not a valid time.
A new set schedule command cancels the previous setting.
biweekly
Run command on alternate weeks. Bi-weekly cleaning is recommended for file
migration on systems with Extended Retention.
monthly
Starts command on the day or days specified at the set time. Days are entered as
integers from 1 to 31.
day(s)
Runs on the day or days specified. Days are entered as integers from 1 to 31.
Example 77
To run the clean operation automatically every Tuesday at 4 p.m.: # filesys clean
set schedule tue 1600
Example 78
To set file system cleaning to run on alternate Tuesdays at 6:00 a.m., enter: #
filesys clean set schedule biweekly "tue" "06:00"
Example 79
To run the operation more than once in a month, set multiple days in a single
command. For example, to clean the file system on the first and fifteenth day of the
month at 4 p.m., enter: # filesys clean set schedule monthly 1,15 1600
Set clean operations to use a lower level of system resources when the Data Domain
system is busy. At zero percent, cleaning runs slowly or not at all, depending on how
busy the system is. At 100 percent, cleaning uses system resources in the standard
way. Default is 50 percent. When the Data Domain system is not running backup or
restore operations, cleaning runs at 100 percent. Range: max: 100, min: 0. Role
required: admin.
Example 80
To set the clean operation to run at 30 percent of its potential speed: # filesys
clean set throttle 30
Note
Because some files may be dropped during verification, output of the percent
completion phase may not reach 100 percent. This is expected behavior.
170 EMC Data Domain Operating System 6.0 Command Reference Guide
filesys
filesys create
filesys create
Create a file system or associated RAID disk group with available and spare storage in
the active tier. Change the state from Available to In Use. Role required: admin,
limited-admin.
Note
This command fails if the user tries to expand the file system beyond the maximum
supported active tier size.
Note
If file system creation fails, and the system is unusable, the system displays the
following message: "File system creation failed. Contact Data Domain Support."
filesys destroy
filesys destroy [and-zero]
Delete all data in the Data Domain system file system including data configured with
Retention Lock Governance, remove Replicator configuration settings, and return file
system settings to defaults. When this process is finished, NFS clients connected to
the Data Domain system may require a remount. Role required: admin.
Note
By default, this command only marks the file system data as deleted. Disks are not
overwritten with zeroes unless you specify the and-zero option. file system data
marked deleted cannot be recovered, even if the disks have not been overwritten with
zeroes. The and-zero option adds several hours to the destroy operation.
filesys disable
filesys disable
Stops file system operations. If no file system exists, the system displays a message
confirming that there is no file system to disable. Role required: admin, limited-admin.
filesys enable
filesys enable
Start the file system operations. On systems configured with Retention Lock
Compliance, security officer authorization is required if there is time skew in the
system clock. See the section on Retention Lock Compliance in the EMC Data Domain
Operating System Administration Guide for details. Role required: admin, limited-admin.
filesys encryption
filesys encryption abort-apply-changes
Abort a previously issued apply-changes request. This applies to both the active and
the retention tiers if DD Extended Retention is enabled. If an apply-changes operation
is already in progress, the abort request will not abort the running operation, which will
be allowed to finish. Role required: admin.
filesys encryption algorithm reset
Reset the algorithm to the default (aes_256_cbc). After running this command, you
must restart the file system with filesys restart for the change to take effect.
Role required: admin.
filesys encryption algorithm set {aes_128_cbc | aes_256_cbc |
aes_128_gcm | aes_256_gcm}
Select the encryption algorithm. The aes_256_gcm option (AES in the Galois/
Counter mode) is the most secure algorithm, but is significantly slower than Cipher
Block Chaining (CBC) mode. After running this command, you must restart the file
system with filesys restart for the change to take effect. Role required: admin.
filesys encryption algorithm show
Display the encryption algorithm. Output indicates changes are pending, if applicable.
Role required: admin, user, backup-operator, security, none.
filesys encryption apply-changes
Update the file system with the current encryption configuration. Encryption changes
are applied to all data in the file system active tier during the next cleaning cycle and
to the file system retention tier (if DD Extended Retention is enabled) during the next
space reclamation cycle. Role required: admin.
Note
This process can take a long time to complete depending on the size of the data to be
re-encrypted.
Note
172 EMC Data Domain Operating System 6.0 Command Reference Guide
filesys
Note
Note
Note
Note
Note
Note
RSA DPM (Data Protection Manager) supports the Key Class Cipher attributes Key
Size, Algorithm, and Mode. Data Domain does not use the RSA DPM attributes
Algorithm and Mode. These attributes are configured using filesys encryption
algorithm set {aes_128_cbc | aes_256_cbc | aes_128_gcm |
aes_256_gcm}. For Key Class, RSA DPM attribute “Get Key Behavior” has the
choices “New Key Each Time” or “Use Current Key”, however, Data Domain supports
only “Use Current Key”. When setting up a Key Class in RSA DPM for use in Data
Domain, the Key Size must be 256 bits; otherwise the RSA DPM configuration will fail.
An error message is not issued if the Key Class is incorrectly configured to generate a
new key each time, but the Data Domain system will not receive the correct key to
encrypt the data. For more details about configuring and setting up the RSA DPM
server, see the EMC Data Domain Operating System Administration Guide.
174 EMC Data Domain Operating System 6.0 Command Reference Guide
filesys
Note
Note
The re-encryption operation may start in the future and may take a long time
depending on how much data needs to be re-encrypted. Use filesys encryption
status to check the status.
Note
Note
A Data Domain system retrieves a key from RSA DPM (Data Protection Manager) by
Key Class. Choices for the RSA DPM attribute Get Key Behavior of a Key Class are
“New Key Each Time” or “Use Current Key.” EMC Data Domain supports only the Key
Class “Use Current Key”. An error message is not issued if the Key Class is incorrectly
configured to generate a new key each time; however, the Data Domain system does
not receive the correct key to encrypt the data.
Note
Before locking the system, you must (1) verify that there are no keys in a
compromised state, (2) perform a file system clean (filesys clean), and (3)
disable the file system (filesys disable).
Lock the system by creating a new system passphrase and destroying the cached
copy of the current passphrase. This command is useful when preparing a Data
Domain system and its external storage devices for shipment. There is only one
passphrase for each Data Domain system. After running this command, the system
encryption keys are unrecoverable until the system is unlocked with the system
passphrase. A new system passphrase is not stored and can be forgotten. It is
recommended that you keep a record of the passphrase in a safe location. Data
cannot be recovered without the new passphrase. Role required: admin.
176 EMC Data Domain Operating System 6.0 Command Reference Guide
filesys
Note
Example 83 Example: Key rotation policy set for embedded key manager
Example 85 Example: Status for system enabled with DD Extended Retention (continued)
Apply-changes status: none
Re-encryption status (for compromised or destroyed keys): none
Retention Tier:
Retention unit: retention-unit-3
Apply-changes status: none
Re-encryption status (for compromised or destroyed keys): none
Note
Argument Definitions
fips-mode
Indicates whether the imported certificate for key management is FIPS (Federal
Information Processing Standards) compliant. The default is enabled.
key-class
The key class configured on the RSA DPM (Data Protection Manager) server for
the Data Domain system. The Key Class name must be enclosed in single or
double quotes if the name contains special characters, such as a comma or a
space.
key-id
The identifier for a specific key.
muid
The MUID (manufacturer unique identifier) for a specific key,
port
The port number of the RSA server on which the key manager is listening.
server
The name of the RSA DPM (Data Protection Manager) key manager server or IP
address.
tier | archive-unit
For systems enabled with DD Extended Retention, the particular tier [active or
retention (archive)] or retention (archive) unit.
filesys expand
filesys expand
178 EMC Data Domain Operating System 6.0 Command Reference Guide
filesys
Increase the file system by using all available space in the active tier. Role required:
admin, limited-admin.
Note
This command fails if the user tries to expand the file system beyond the maximum
supported active tier size.
filesys fastcopy
filesys fastcopy [retention-lock] source src destination dest
Copy a file, an MTree, or directory tree from a Data Domain system source directory
to another destination on the Data Domain system. Role required: admin, limited-
admin, backup-operator, security.
Note
Note
Source names src that include spaces or special characters must be entered according
to the following conventions.
l Enclose the entire source pathname with double quotation marks:
filesys fastcopy source "/data/col1/backup/.snapshot/fast copy"
destination /data/col1/backup/dir
OR
l Enter a backslash before the space. Do not add quotation marks:
filesys fastcopy source /data/col1/backup/.snapshot/fast\ copy
destination /data/col1/backup/dir2
Argument Definitions
retention-lock
Use this argument to propagate the retention lock attributes (worm attributes)
for files. Use the retention-lock argument when Retention Lock is required on the
destination, if the destination file exists (and cannot be overwritten), and when
Retention Lock attributes are set per file. When you use the retention-lock
argument, the command output varies in the following situations:
l When both the source and destination MTrees are Retention Lock enabled,
Retention Lock attributes are copied.
l When the source MTree is not Retention Lock enabled, the system displays a
warning message but allows the file copy.
l When the destination MTree is not Retention Lock enabled, the system
displays a warning message but still allows the file to copy, and the Retention
Lock attributes are not copied.
source src
The location of the directory or file to copy. The first part of the path must be /
data/col1/.
destination dest
The destination for the directory or file being copied. The first part of the path
must be /data/col1/. If the destination already exists, you will be asked if you
want to overwrite it.
filesys option
filesys option disable report-replica-as-writable
Set the reported read/write status of a replication destination file system to read-
only. Use the filesys disable command before changing this option and use the
filesys enable command after changing the option. Role required: admin, limited-
admin.
With CIFS, use the cifs disable command before changing the option and use the
cifs enable command after changing the option. Role required: admin, limited-
admin.
filesys option enable report-replica-as-writable
Enable the filesys option. Role required: admin, limited-admin.
Set the reported read/write status of a replication destination file system to read/
write. Use the filesys disable command before changing this option and use the
filesys enable command after changing the option.
With CIFS, use the cifs disable command before changing the option and use the
cifs enable command after changing the option.
filesys option reset {local-compression-type | low-bw-optim |
marker-type | report-replica-as-writable | staging-reserve |
staging-clean | staging-delete-suspend | compute-segfeatures |
app-optimized-compression | warning-space-usage <50-90>|
critical-space-usage <75-98>}
Return file system compression to the default settings on the destination Data Domain
system. Role required: admin, limited-admin.
Argument Definitions
local-compression-type
Reset the compression algorithm to the default of lz.
low-bw-optim
This option is available only to authorized Data Domain and partner support
personnel.
marker-type
Return the marker setting to the default of auto.
report-replica-as-writable
Reset the file system to read-only.
staging-clean
Staging-clean: Controls the automatic start of a cleaning operation after files
have been deleted. Specify this as a percentage of the reserve. For example, if
the staging reserve is 20% and staging-clean is 80%, then the system will start a
cleaning operation when the space to be recovered from deleted files exceeds
16% of the total space. Default 0, range 0-200.
180 EMC Data Domain Operating System 6.0 Command Reference Guide
filesys
staging-delete-suspend
Intended to prevent runaway deletions. For example, when no more reserve is
available to increase available space and the client software keeps deleting files
hoping to free up space. Specify as a percentage of the reserve. When the
specified amount of space has been freed by deletions, the system allows no
further deletions until after a clean is started. Default 0, range 0-400.
compute-segfeatures
This option is available only to authorized Data Domain and partner support
personnel.
staging-reserve
Set staging reserve percentage from 0 to 90.
app-optimized-compression
Reset the Oracle Optimized Deduplication to none.
warning-space-usage 50-90
The system can alert you with a warning message when a percentage (50-90%)
of the available space is used. Set the percentage using this argument.
critical-space-usage 75-98
The system can alert you with a critical message when a percentage (75-98%) of
the available space is used. Set the percentage using this argument.
Note
It is recommended that you set the critical-space-usage percentage higher than the
warning-space-usage percentage.
Note
It is recommended that you set the warning-space-usage percentage lower than the
critical-space-usage percentage.
marker-type
Display the current marker setting.
low-bw-optim
This option is available only to authorized Data Domain and partner support
personnel.
report-replica-as-writable
Display the current reported setting on the destination Data Domain system.
staging-reserve
Set staging reserve percentage from 0 to 90.
staging-clean
This option is available only to authorized Data Domain and partner support
personnel.
staging-delete-suspend
This option is available only to authorized Data Domain and partner support
personnel.
compute-segfeatures
This option is available only to authorized Data Domain and partner support
personnel.
app-optimized-compression
Display the Oracle Optimized Deduplication settings enabled.
warning-space-usage 50-90
The system can alert you with a warning message when a percentage (50-90%)
of the available space is used. Set the percentage using this argument.
critical-space-usage 75-98
The system can alert you with a critical message when a percentage (75-98%) of
the available space is used. Set the percentage using this argument.
filesys restart
filesys restart
Disable and enable the file system in a single operation. The system displays a
message that the file system will be restarted and that applications may experience
interruptions. Role required: admin, limited-admin, user, backup-operator.
182 EMC Data Domain Operating System 6.0 Command Reference Guide
filesys
filesys show
filesys show compression [filename] [recursive] [last n {hours
| days}] [no-sync]
filesys show compression [tier {active | archive | cloud}]
summary | daily | daily-detailed {[last n {hours | days | weeks
| months}] | start date [end date]
These command options display the space used by, and compression achieved for,
files and directories in the file system. Information is also shown for the tiers
supported by the system. Values are reported in Gigibytes (GiB). See the EMC Data
Domain Operating System Administration Guide for details. Role required: admin, user,
backup-operator, security, none.
In general, the more often a backup procedure is run on a file or file system, the higher
the compression. The output does not include global and local compression factors for
the Currently Used table, but uses a dash instead. Output for a busy system may not
return for several hours, depending on the number of files. Other factors may
influence the output display.
Running the command without arguments generates default output that shows a
summary of compression statistics for all files and directories in the file system for the
last 7 days and the last 24 hours. Output includes details on active and retention tiers
for systems with Extended Retention only.
Argument Definitions
recursive (Optional)
Display all files in all subdirectories as well as compression information for each
file.
filename (Optional)
Synchronize all modified files to disk and then display compression statistics for
the specified file or directory only. To display compression statistics for a specific
file or directory without first synchronizing all modified files to disk, include the
no-sync option.
Depending on the number of files in the file system, specifying a file name could
cause this command to process for several hours before completing.
no-sync (Optional)
Use to not sync the file system prior to getting compression information.
summary (Optional)
Display all compression statistics, summarized in the following categories:
l Storage currently used.
l Data written in the last 7 days. By including the last n option or the start
date option, you can display statistics for a different time frame.
filesys show 183
filesys
daily (Optional)
In addition to the summary output, display the following information for each day,
over the previous four full weeks, plus the current partial week. This option is not
available if you specify a file or directory name.
daily-detailed (Optional)
Display the daily output, but also include the following information for each day.
This option is not available if you specify a file or directory name.
Output Definitions
Pre-Comp
Data written before compression.
Post-Comp
Storage used after compression.
Global-Comp Factor
Ratio of Pre-Comp / (size after global compression). Not applicable to the
storage currently used.
Local-Comp Factor
Ratio of (size after global compression)/Post-Comp. Not applicable to the
storage currently used.
Total-Comp Factor
Ratio of Pre-Comp / Post-Comp.
Reduction %
Percentage value (Pre-Comp - Post-Comp) / Pre-Comp) * 100. This is the
default output format.
Example 86
184 EMC Data Domain Operating System 6.0 Command Reference Guide
filesys
Example 86 (continued)
filesys show compression filename [recursive]
Displays all files in all subdirectories and prints compression information for each file
as well as the summary for filename.
Note
The tier and archive-unit keywords are not supported for Data Domain Virtual Edition
(DDVE), so filesys show space does not accept these keywords.
Note
Keywords tier and archive-unit are mutually exclusive. The user can only specify one
or the other but not both.
Output Definitions
Size GiB
Total storage capacity of a file system resource.
Used GiB
Amount of data stored on a file system resource.
Avail GiB
Amount of free space on a file system resource.
Use%
Ratio of data stored to total capacity, multiplied by 100.
Cleanable GiB
Estimated amount of recoverable free space. Command output displays space
availability and usage information for the following file system components:
/data: pre-comp
Amount of virtual data stored on the Data Domain system. Virtual data is the
amount of data sent to the Data Domain system from backup servers.
/data: post-comp
Amount of total physical disk space available for data, actual physical space used
for compressed data, and physical space still available for data storage. Warning
messages go to the system log and an email alert is generated when the Use%
figure reaches 90%, 95%, and 100%. At 100%, the Data Domain system stops
accepting data from backup servers.
/ddvar
Approximate amount of space used by and available to the log and core files. Use
this directory to free space in this area, remove old logs and core files. You can
also delete core files from the /ddvar/core directory or the /ddvar/ext directory
if it exists.
The total amount of space available for data storage can change because an
internal index may expand as the Data Domain system fills with data. The index
expansion takes space from the Avail GiB amount.
If Use% is always high, use the command option filesys clean show-
schedule to see how often the cleaning operation is scheduled to run
automatically. Use filesys clean schedule to run the operation more often.
filesys status
filesys status
Display the state of the filesystem process. If the filesystem was shut down with a
Data Domain system command, such as filesys disable, the output display includes the
command name in square brackets. Role required: admin, limited-admin, user, backup-
operator, tenant-admin, tenant-user, security, none.
filesys sync
filesys sync
Synchronize modified files to disk. Role required: admin, limited-admin, backup-
operator, security.
186 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 20
ha
High availability (HA) is a licensed feature that allows one Data Domain controller to
failover to a second controller connected to it, and to the same sets of disks if the
primary controller experiences a failure. The ha command creates, manages, modifies,
and removes the HA configuration. See the EMC Data Domain Operating System
Administration Guide for details.
This chapter contains the following topics:
ha 187
ha
ha change history
Modified output in DD OS 6.0
ha status [detailed]
Add the percentage of HA availability in the detailed output.
188 EMC Data Domain Operating System 6.0 Command Reference Guide
ha
ha create
Create the HA relationship between two Data Domain systems.
ha create peer {<ipaddr> | <hostname>} [ha-name <hostname>]
Create an HA relationship between the local system, and the specified peer system.
Optionally specify a hostname to use as the top-level HA system name. The local
system becomes the primary node, and the specified peer becomes the standby node.
This command prompts the user for the sysadmin password of the peer system. Both
nodes automatically reboot after the command completes successfully. Role required:
admin, limited-admin.
If the ha-name <hostname> parameter is not specified, the hostname of the local
system becomes the HA system name, and the hostnames of the two nodes are
assigned as follows:
l Local node: <ha-system-name>-p0
l Peer node: <ha-system-name>-p1
The HA name, whether specified with the ha-name <hostname> parameter, or
generated from the hostname of the local system, must be associated with a valid
floating IP address to provide access to the system over the network.
To change the HA name, manually update the new HA name for all backup, recovery,
and replication operations that identify the system by the HA name. Complete the
following sequence to change the HA name:
1. Run the net set hostname <host> command to set the hostname on the local
system to the desired HA name.
2. Run the net set hostname ha-system command to promote the new local
system hostname to become the HA name.
Argument definitions
ha-name
The top-level hostname for the HA pair. This hostname is used to access the HA
pair, and is not tied to a specific physical node.
ha destroy
Remove the HA relationship between two Data Domain systems to use each system
independently.
ha destroy
Remove the HA relationship between the primary and secondary nodes to use each
system independently. Run this command on the same system where the HA pair was
ha create 189
ha
first created. After the destroy operation, the HA pair is broken down into two single-
node systems. The file system is preserved on the node where it resides.
After this command is successful, complete the following sequence to use both nodes
as independent systems:
1. Disconnect the node without the file system from the storage and the HA
interconnect.
2. Disable and reenable the file system on the node where it resides to resume
activity on the file system.
3. Connect the node without the file system to new storage.
4. Run the GUI or CLI Configuration Wizard on the node without the file system to
configure it with its own storage and file system.
Role required: admin, limited-admin.
ha failover
Manually initiate a failover from the current active node to the standby node.
ha failover [go-offline]
Manually initiate a failover from the current active node to the standby node. The
node being switched from active to standby reboots after the command completes
successfully. This command can be run from either node. The go-offline option
can be run on the current active node to take the node offline after failing over to the
standby node. Role required: admin, limited-admin.
ha offline
Take the standby node offline.
ha offline
Take the standby node offline. This command takes the system out of the highly
available state, therefore a failover cannot occur if the primary node suffers a
failure. This command can only be run on the standby node. Role required: admin,
limited-admin.
ha online
Bring an offline standby node back online.
ha online
Bring the standby node back online. The standby node reboots after this command
completes successfully. This command returns the system to the highly
available state, allowing for failover if the primary node suffers a failure. This
command can only be run on the standby node. Role required: admin, limited-admin.
ha status
View details of the HA configuration.
ha status [detailed]
View the details of the HA configuration.
HA System Name: apollo-ha3a.emc.com
HA System Status: highly available
Node Name Node ID Role HA State
190 EMC Data Domain Operating System 6.0 Command Reference Guide
ha
Node apollo-ha2a-p0.datadomain.com:
Role: active
HA State: online
Node Health: ok
Node apollo-ha2a-p1.datadomain.com:
Role: standby
HA State: online
Node Health: ok
Mirroring Status:
Component Name Status
-------------- ------
nvram ok
registry ok
sms ok
ddboost ok
cifs ok
-------------- ------
Note
ha status 191
ha
192 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 21
help
The Command Line Interface (CLI) displays two types of help, syntax-only help and
command-description help that includes the command syntax.
The following guidelines describe how to use syntax-only help.
l To list the top-level CLI commands, enter a question mark (?), or type the
command help at the prompt.
l To list all forms of a top-level command, enter the command with no options at the
prompt or enter command ?.
l To list all commands that use a specific keyword, enter help keyword or ?
keyword.
For example, ? password displays all Data Domain system commands that use
the password argument.
The following guidelines describe how to use command-description help.
l To list the top-level CLI commands, enter a question mark (?), or type the
command help at the prompt.
l To list all forms of a top-level command with an introduction, enter help
command or ? command.
l The end of each help description is marked END. Press Enter to return to the CLI
prompt.
l When the complete help description does not fit in the display, the colon prompt
(:) appears at the bottom of the display. The following guidelines describe what
you can do when this prompt appears.
n To move through the help display, use the up and down arrow keys.
n To quit the current help display and return to the CLI prompt, press q.
n To display help for navigating the help display, press h.
n To search for text in the help display, enter a slash character (/) followed by a
pattern to use as search criteria and press Enter. Matches are highlighted.
help 193
help
194 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 22
ifgroup
The ifgroup command configures and displays information about dynamic interface
groups. Command options create interface groups, add and delete interfaces and
clients, enable and disable interface groups, assign and unassign replication Mtrees
and remote hosts, and display configuration and connection information.
This chapter contains the following topics:
ifgroup 195
ifgroup
ifgroup add
ifgroup add group_name {interface {ipaddr | ipv6addr} | client
host}
Add an interface, client, or both to group-name or to the default group. Prior to adding
an interface you must create the group_name unless the group name is the default
group. Role required: admin, limited-admin.
This command provides full ifgroup support for static IPv6 addresses, providing the
same capabilities for IPv6 as for IPv4. Concurrent IPv4 and IPv6 client connections
are allowed. A client connected with IPv6 sees IPv6 ifgroup interfaces only. A client
connected with IPv4 sees IPv4 ifgroup interfaces only. Individual ifgroups include all
IPv4 addresses or all IPv6 addresses. The default group behaves in the same manner
as any other group.
l The group-name “default” is created during an upgrade of a fresh install and is
always used if group_name is not specified.
l You can enforce private network connectivity, ensuring that a failed job does not
reconnect on the public network after network errors. When interface
enforcement is enabled, a failed job can only retry on an alternative private
network IP address. Interface enforcement is only available for clients that use
ifgroup interfaces.
Interface enforcement is off (FALSE) by default. To enable interface enforcement,
you must add the following setting to the system registry:
system.ENFORCE_IFGROUP_RW=TRUE
After you've made this entry in the registry, you must do a filesys restart
for the setting to take effect. For more information, see the EMC Data Domain
Boost for Partner Integration Administration Guide or the EMC Data Domain Boost for
OpenStorage Administration Guide.
l An ifgroup client is a member of a single ifgroup group-name and may consist of a
fully qualified domain name (FQDN) such as ddboost.datadomain.com, wild
cards such as *.datadomain.com or “*”, a short name such as ddboost, or IP
range of the client (xx.xx.xx.0/24 for IPv4 or xxxx::0/112 for IPv6, for
example). When a client's source IP address is evaluated for access to the ifgroup,
the order of precedence is:
1. IP address of the connected Data Domain system
2. Connected client IP range. This host-range check is useful for separate VLANs
with many clients where there isn't a unique partial hostname (domain).
n For IPv4, you can select five different masks in the range /8 to /32.
n For IPv6, fixed masks /64, /112, and /128 are available.
3. Client Name: abc-11.d1.com
4. Client Domain Name: *.d1.com
5. All Clients: *
If none of these checks find a match, ifgroup interfaces are not used for this
client.
196 EMC Data Domain Operating System 6.0 Command Reference Guide
ifgroup
For detailed information about this order of precedence, see the EMC Data
Domain Boost for Partner Integration Administration Guide.
l By default, the maximum number of groups is eight. It is possible to increase this
number by editing the system registry and rebooting.
Additionally, the IP address must be configured on the Data Domain system and its
interface must be enabled. You can add public or private IP addresses for data transfer
connections. After adding an IP address as an interface, you can enable advanced load
balancing and link failover.
See the EMC Data Domain Boost for Partner Integration Administration Guide or the EMC
Data Domain Boost for OpenStorage Administration Guide, and theEMC Data Domain
Operating System Administration Guide for more information on interface groups.
ifgroup create
ifgroup create group-name
Create a group with the name group-name for the interface. Group names may
contain alphanumeric characters, hyphens, and underscores. System hostnames, fully
qualified hostnames, and wildcard hostnames indicated by an asterisk may also be
used. Reserved group names that cannot be used are default, all, or none. Role
required: admin, limited-admin.
ifgroup del
ifgroup del group_name {interface {ipaddr | ipv6addr} | client
host}
Remove an interface, client, or both from group_name or default group. Deleting the
last IP address interface disables the ifgroup. If this is the case, you have the option of
terminating this command option. Role required: admin, limited-admin.
ifgroup destroy
ifgroup destroy group-name
Destroy the group name. Only empty groups can be destroyed. Interfaces or clients
cannot be destroyed but may be removed sequentially or by running the command
option ddboost ifgroup reset group-name. Role required: admin, limited-admin.
Note
ifgroup disable
ifgroup disable group-name
Disable a specific group by entering the group-name. If group-name is not specified,
the command applies to the default group. Role required: admin, limited-admin.
ifgroup enable
ifgroup enable group-name
ifgroup option
ifgroup option reset {disable-file-replication | enforce-
client-interface}
Reset replication permissions for ifgroups and interface enforcement settings to their
default settings. Role required: admin, limited-admin.
Changed settings impact all interface groups, but they do not impact in-progress jobs.
Changed settings take effect during the ifgroup query at the start of a job.
Example 87
Example 88
Example 89
Example 90
ifgroup rename
ifgroup rename group-name new-group-name
Rename the ifgroup group-name to new-group-name. This command option does not
require disabling the group. The default group cannot be renamed. Role required:
admin, limited-admin.
198 EMC Data Domain Operating System 6.0 Command Reference Guide
ifgroup
Note
Example 91
Example 92
ifgroup reset
ifgroup reset [group_name] {all | interfaces | clients |
replication}
Reset all, interfaces, clients, or replication for group-name. If group-name is not
specified, the command applies to the default group. Role required: admin, limited-
admin.
Example 93
ok, proceeding.
Example 94
Example 95
200 EMC Data Domain Operating System 6.0 Command Reference Guide
ifgroup
Example 95 (continued)
10GLab disable eth4b 3000::231 0 0 0
0 0
---------- ------- ------- ---------- ------------ ----------- --------
------- -----
202 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 23
ipmi
The ipmi command monitors and manages a Data Domain system deployed remotely.
Command options enable administrators to monitor remote systems and to power the
systems on or off as required. The Serial-Over-LAN (SOL) feature is used to view the
serial output of a remote system boot sequence. For more information, including the
list of supported models, see the EMC Data Domain Operating System Offline
Diagnostics Suite User’s Guide.
This chapter contains the following topics:
ipmi 203
ipmi
ipmi config
ipmi config port {dhcp | ipaddress ipaddr netmask mask gateway
ipaddr}
Configure an IPMI port to get its IPv4 configuration from DHCP, or configure static IP
address information. If configuring a static IP address, you must provide the BMC IP
address, netmask, and gateway address. To display a list of IPMI ports, enter ipmi
show hardware or ipmi show config. See the EMC Data Domain Operating
System Administration Guide for details. Role required: admin, limited-admin.
Note
If the IPMI port also supports IP traffic (for administrator access or backup traffic),
the interface port must be enabled with the net enable command before you
configure IPMI.
Note
The BMP port and IPMI implementation do not support IPv6 in this release.
ipmi disable
ipmi disable {port | all}
Disable IPMI remote access through one or all IPMI ports. To display a list of IPMI
ports, enter ipmi show hardware or ipmi show config. Role required: admin,
limited-admin.
ipmi enable
ipmi enable {port | all}
Enable IPMI remote access through one or all IPMI capable ports. To display a list of
IPMI capable ports, enter ipmi show hardware. Role required: admin, limited-
admin.
204 EMC Data Domain Operating System 6.0 Command Reference Guide
ipmi
ipmi remote
ipmi remote console ipmi-target {ipaddr | hostname} user user
Activates the Serial-Over-Lan (SOL) feature, which enables viewing text-based serial
output of a remote Data Domain system without a serial server. SOL is used in
combination with the remote power cycle command to view the remote system’s boot
sequence.
Specify the IP address or hostname of the remote system, and specify an IPMI
username that is configured on the remote system. For more information, see the
EMC Data Domain Operating System Administration Guide. Role required: admin, limited-
admin.
ipmi remote power {on | off | cycle | status} ipmi-target
{ipaddr | hostname} user user
Power on, power off, or power cycle a remote target system from an initiator system.
Specify the IP address or hostname of the remote system. Role required: admin,
limited-admin.
ipmi reset
ipmi reset
Resets the LAN configuration for all IPMI ports, and clears the SOL configuration.
Role required: admin, limited-admin.
ipmi show
ipmi show config
View the configuration of local IPMI interfaces. Output includes the dynamic or static
IP address, gateway, netmask, and MAC address. Role required: admin, limited-admin.
ipmi show hardware
View the port names and firmware version of the local BMC. Output also includes the
IPMI version, manufacturer, MAC addresses. The Link Status column shows if the
LAN cable is connected to the LAN-IPMI shared port.
Link status cannot be determined on the following Data Domain systems: DD640,
DD2200, and DD2500. Role required: admin, limited-admin.
ipmi user
ipmi user add user [password password]
Add a new local IPMI user. The specified username and password are used by remote
systems to access the local system. Role required: admin, limited-admin.
Note
206 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 24
license
The license command adds, deletes, and resets keys for licensed features and
storage capacity.
This chapter contains the following topics:
license 207
license
license add
license add license-code [license-code ...]
Add one or more licenses for features and storage capacity. Enter the license code
exactly as provided by EMC, including the dashes. Role required: admin, limited-
admin.
license delete
license del license-feature [license-feature ...] | license-
code [license-code ...]
Delete one or more licenses for features or storage capacity. To display the license
codes and license feature names, enter license show. Role required: admin,
limited-admin. Security officer authorization is required to delete Retention Lock
Compliance licenses.
license reset
license reset
208 EMC Data Domain Operating System 6.0 Command Reference Guide
license
Remove all licenses. Requires confirmation before deletion. Role required: admin,
limited-admin. Security officer authorization is required to delete Retention Lock
Compliance licenses.
Example 96
#license reset
This will delete all added licenses.
Do you want to continue? (yes|no) [no]: yes
license show
license show [scheme]
View license codes, which are also called license keys. Feature licenses also display a
feature name, which you can use instead of the code when deleting a feature license.
The scheme argument displays unknown, DD licensing, or elicensing. Role
required: admin, limited-admin, security, backup-operator, user.
210 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 25
log
The log command manages and displays the Data Domain system log file. Messages
from the alerts feature, the autosupport reports, and general system messages are
sent to the log directory (/ddvar/log). A log entry appears for each Data Domain
system command given on the system.
Data Domain systems can send network log messages to other systems enabled to
listen. The Data Domain system sends the log in the standard syslog format. When
remote logging is enabled, all messages in the messages and kern.info files are
exported.
Message selectors include:
*.notice
Send all messages at the notice priority and higher.
*.alert
Send all messages at the alert priority and higher (alerts are included in *.notice).
kern.*
Send all kernel messages (kern.info log files).
log 211
log
log host
log host add host
Add a remote system hostname to the list of hosts to which system log messages are
sent. Role required: admin, limited-admin.
Note
If using three or more remote log hosts, they must be added by entering the IP
address in the host argument instead of the host name.
212 EMC Data Domain Operating System 6.0 Command Reference Guide
log
Display whether logging is enabled or disabled and the list of destination hostnames.
Role required: admin, limited-admin, security, user, backup-operator, or none.
log list
log list
List the files in the log directory with the date each file was last modified and the size
of each file. For information on the log files, see the EMC Data Domain Operating
System Administration Guide. Role required: admin, limited-admin, security, user,
backup-operator, or none.
log view
log view [filename]
Display the specified log file. To display the available log files, enter log list. If a
filename is not specified, the command displays the current messages file.
When viewing the log, use the up and down arrows to scroll through the file. Use the q
key to quit. Enter a forward slash to search forward or a question mark to search
backward for a pattern such as a date. Role required: admin, limited-admin, security,
user, backup-operator, or none.
log view access-info [authentication-failures {all | known-
users | unknown-users} | access-history {all | logins |
logouts} | user-management] [user <user-name>] [last <n> {hours
| days | weeks | months} | start <MMDDhhmm[[CC]YY]> [end
<MMDDhhmm[[CC]YY]>]]
Displays a history of user logins and logouts on the system, including both successful
and unsuccessful attempts to log in.
log view audit-info [authorization-errors | all-errors] [user
<user-name>] | user-role {admin | security | user | backup-
operator | none}] [tenant-unit <tenant-unit>] [host <host>]
[application {CLI | REST | GUI | VDISK}] [string <str>] [last
<n> {hours | days | weeks | months} | start <MMDDhhmm[[CC]YY]>
[end <MMDDhhmm[[CC]YY]>]]
Displays a list of all system management configuration changes, and provides the
following the following details:
l Username of the user who initiated the configuration change
l TImestamp
l Requested operation
l Operation outcome
log watch
log watch [filename]
View new log entries for the specified log file as they occur. To display the available
log files, enter log list. If a filename is not specified, the command displays the
messages file entries.
Use Ctrl-C to stop the display. Role required: admin, limited-admin, security, user,
backup-operator, or none.
214 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 26
migration
The migration command copies all data from one DD system to another. Use this
command when upgrading to a larger capacity DD system. Migration is typically
performed in a LAN environment.
Migration may also be used to copy replication configurations, known as “contexts.”
See the EMC Data Domain Operating System Administration Guide for instructions.
This chapter contains the following topics:
migration 215
migration
migration abort
migration abort
Stop a migration process and return the DD system to its previous state. If the
migration source is part of a replication pair, you must run migration abort on the
source, and replication will be restarted. You cannot run this command on the
migration destination. After you run migration abort on the destination, you must
also run filesys destroy on the destination before the file system can be
reenabled. After running migration abort, the password on the destination will be
the same as the password on the source. Role required: admin, limited-admin.
migration commit
migration commit
Limit migration to data received by the source at the time the command is entered.
You can use this command anytime after entering migration send. After
migration commit, all data on the source, including new data for contexts
migrated to the destination, is sent only to the destination. Write access to the source
is blocked after you enter migration commit and during the time required to
complete migration. After the migration process is finished, the source is opened for
write access, but new data is not migrated to the destination. Role required: admin,
limited-admin.
Example 97
216 EMC Data Domain Operating System 6.0 Command Reference Guide
migration
Example 97 (continued)
4. After the three migration phases are finished, enter the following command on
hostA first, and then on destination hostB:
# migration commit
Example 98
To migrate data and a context from source hostA to destination hostC, when hostA is
also a directory replication source for hostB:
migration receive
migration receive source-host src-hostname
Prepare a DD system to be a migration destination. This migration destination:
l Must have an empty file system
l Must have equal or larger capacity than the used space on the migration source
(with the exception of collection replication)
l Must have a replication and/or encryption license if the source is licensed for
those software options
This command should be run:
l Only on the migration destination
l After running filesys destroy and filesys create on the migration
destination
l Before entering migration send on the migration source
Role required: admin, limited-admin.
Example 99
Example 99 (continued)
# filesys destroy
# filesys create
# migration receive source-host hostA
Argument Definitions
src-hostname
The migration source host, which can be a simple host name, an IP address, a
partially qualified domain name, or a fully qualified domain name.
migration send
migration send {obj-spec-list | all} destination-host dst-
hostname
Start migration, which will continue until you run migration commit.
This command should be run:
l Only on the migration source
l Only when no backup data is being sent to the migration source
l After running migration receive on the migration destination
New data written to the source is marked for migration until you run migration
commit (which should be run first on the source, then the destination). New data
written to the source after migration commit is not migrated. Write access to the
source is blocked from the time you run migration commit until the migration
process concludes.
Any setting of the system’s replication throttle also applies to migration. If the
migration source has throttle settings, use replication throttle set
override to set the throttle to the maximum (unlimited) before starting migration.
With the exception of licenses and key-manager settings, all data on the migration
source is always migrated, even when a single directory replication context is
specified. Role required: admin, limited-admin.
Note
After you run migration send, the migration source remains in read-only mode
until all replication contexts are synchronized. To avoid excessive time in this mode, it
is recommended that you first synchronize these contexts by running replication
sync and then run migration send immediately after synchronization concludes.
Example 100
Example 101
218 EMC Data Domain Operating System 6.0 Command Reference Guide
migration
Example 102
Example 103
To start migration with two replication contexts using context numbers 2 and 3:
Example 104
Example 105
If a migration source has encryption enabled, you must do the following on the
destination before starting the migration process.
Argument Definitions
dst-hostname
The migration destination, which can be a simple host name, an IP address, a
partially qualified domain name, or a fully qualified domain name.
obj-spec-list
The specified replication contexts or paths, which can be one of the following:
l For systems that do not have a replication license:
/backup
l For systems with replication, this argument represents one or more contexts
from the migration source. After you migrate a context, all data from the
context remains on the source, but the context configuration is moved to the
sh destination. Thus, this argument can be:
n The destination string, as defined when setting up replication, for example:
dir://hostB/backup/dir2col://hostBpool://hostB/pool2
n The context number, such as rctx://2, as shown in the output from
replication status
n The keyword all, which migrates all contexts from the migration source
to the destination
Bytes Remaining
The total number of bytes remaining to be sent. This information is shown only on
the migration source.
Bytes Sent
The total number of bytes sent from the migration source. This value includes
backup data, overhead, and network overhead. On the destination, this value
includes overhead and network overhead. Use this value (and the Bytes
Received value) to estimate network traffic generated by migration.
Sync'ed-as-of Time
The last time stamp for which data has been synchronized between the two
systems.
migration status
migration status
220 EMC Data Domain Operating System 6.0 Command Reference Guide
migration
Display the status of migration at the time the command is run. Role required: admin,
limited-admin.
migration watch
migration watch
Track the initial phase of migration (when write access is blocked). The command
output shows the percentage of the migration process that has been completed. Role
required: admin, limited-admin.
222 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 27
mtree
mtree 223
mtree
mtree create
mtree create mtree-path [tenant-unit tenant-unit] [quota-soft-
limit n {MiB|GiB|TiB|PiB}] [quota-hard-limit n {MiB|GiB|TiB|
PiB}]
Create an MTree under the specified path. The format of the mtree-path is /data/
col1/mtree-name. An error message notifies you to enter a different name if another
MTree with the same name exists. Role required: admin, limited-admin.
Naming conventions for creating MTrees include uppercase and lowercase letters (A-
Z, a-z), numbers 0-9, single, non-leading embedded space, exclamation point, hash,
dollar sign, ampersand, caret, tilde, left and right parentheses, left and right brackets,
left and right braces.
If no quota option is specified, the default is unlimited for both soft and hard limits,
meaning there are no quota limits.
When setting quota limits, a warning appears if the new limit is lower than the current
space usage of the MTree. The command does not fail, but subsequent writes to the
MTree are rejected. An error message appears if you are setting a soft limit that is
greater than or equal to the hard limit. When the hard limit is reached for an MTree
quota, write operations stop and no more data can be written to the MTree. Data can
be deleted.
Argument Definitions
mtree-path
Displays MTrees under a specified path only.
224 EMC Data Domain Operating System 6.0 Command Reference Guide
mtree
tenant-unit (Optional)
The basic unit of a multi-tenancy configuration. A tenant unit is a secure, isolated
partition for tenant-specific data and control flow within a Data Domain system.
Example 106
Example 107
Example 108
Example 109
mtree delete
mtree delete mtree-path
Delete the specified MTree (denoted by the pathname). MTrees marked for deletion
remain in the file system until the filesys clean command is run. This command
option is not allowed on Retention Lock Governance or Retention Lock Compliance
MTrees unless they are empty. You can revert the marked-for-deletion state of that
MTree by running the mtree undelete command. See the EMC Data Domain
Operating System Administration Guide for details on Retention Lock Compliance and
Governance. If the MTree is a storage unit, the system returns an error. Role required:
admin.
Note
For systems that use the DD Boost protocol, you can use the ddboost storage-
unit delete command to delete a storage unit.
l When an MTree is removed from the file system, snapshots associated with that
MTree are also deleted from the /data/col1/mtree-name/.snapshot/
directory.
mtree list
mtree list [mtree-path] [tenant-unit tenant-unit]
Display the list of MTrees. When Secure Multi-tenancy (SMT) is not enabled, the
system displays three columns: Name, Pre-Comp (GiB), and Status. When SMT is
enabled, the system also displays Tenant Unit. Role required: admin, limited-admin,
user, backup-operator, tenant-admin, tenant-user, security, none.
Argument Definitions
mtree-path (Optional)
Display MTrees under the specified path only. This command supports the
asterisk (*) wildcard character in the MTree pathname. Values include:
l /data/col1/mtree1
l /data/col1/mtree*
l *mtree*
tenant-unit (Optional)
The basic unit of a multi-tenancy configuration. A tenant unit is a secure, isolated
partition for tenant-specific data and control flow within a Data Domain system.
Output Definitions
When SMT is enabled, tenant-unit will be displayed if it is configured. If it is not
configured, the system will display "-". Output includes the MTree pathname, pre-
compression, and status. Status is based on pre-defined values:
D
Marked for deletion. MTree will be removed from the file system by the filesys
clean command. Can be unmarked for deletion by using the mtree undelete
command only if the filesys clean command has not been run.
Q
Quota defined.
RO
Read-only access.
RW
Read/write access.
RD
Replication destination.
RLCE
Retention Lock Compliance enabled.
RLGE
Retention Lock Governance enabled.
226 EMC Data Domain Operating System 6.0 Command Reference Guide
mtree
RLGD
Retention Lock Governance disabled.
mtree modify
mtree modify mtree-path tenant-unit tenant-unit name
Assign an MTree to a tenant-unit. If the MTree is a storage unit, the system returns an
error. Role required: admin, limited-admin.
Note
For systems that use the DD Boost protocol, you can use the ddboost storage-
unit modify command to modify a storage unit.
Argument Definitions
mtree-path
Display MTrees under the specified path only.
tenant-unit (Optional)
The basic unit of a multi-tenancy configuration. A tenant unit is a secure, isolated
partition for tenant-specific data and control flow within a Data Domain system.
tenant-unit name
The name of the tenant-unit you want to associate with the MTree.
mtree option
mtree option reset app-optimized-compression mtree mtree_path
Reset the Oracle Optimized Deduplication setting on the specified MTree to its default
value, none. Role required: admin, limited-admin.
mtree option set app-optimized-compression {none | global |
oracle1} mtree mtree_path
Set Oracle Optimized Deduplication on the specified MTree.
Argument Definitions
none
Oracle Optimized Deduplication is disabled.
global
The MTree uses the system-level app-optimized-compression value (none or
oracle).
oracle1
Oracle Optimized Deduplication is enabled.
Argument Definitions
mtree_path
The full path of the MTree in the file system.
mtree rename
mtree rename mtree-path new-mtree-path
Rename the specified MTree. Note that /data/col1/backup cannot be renamed.
Retention Lock Governance or Retention Lock Compliance MTrees can only be
renamed if they are empty. Role required: admin, limited-admin.
This command option requires security officer authorization if Retention Lock
Compliance is enabled on the specified MTree.
mtree retention-lock
mtree retention-lock disable mtree mtree-path
Disable Retention Lock for the specified MTree. This command option is allowed on
Retention Lock Governance MTrees only. It is not allowed on Retention Lock
Compliance MTrees. See the EMC Data Domain Operating System Administrator’s
Guide for details on Retention Lock Compliance and Governance. Role required:
admin, limited-admin..
mtree retention-lock enable mode {compliance | governance}
mtree mtree-path
Enable Retention Lock for the specified MTree. Use the compliance argument to meet
the strictest data permanence regulatory standards, such as those of SEC17a-4f.
Enabling Retention Lock Compliance requires security officer authorization. Role
required: admin, limited-admin.
Use the governance argument to propagate the same protection provided in the
previous release of DD OS. The level of security protection is lower than Retention
Lock Compliance.
When Retention Lock is enabled on an MTree, any file in the MTree may become
locked by setting its atime to the future. Additionally, renaming a non-empty directory
in the MTree is disabled. See the EMC Data Domain Operating System Administration
Guide for details on Retention Lock Compliance and Governance, and for instructions
on setting retention time.
To enable Retention Lock Compliance on an MTree, enter: # mtree retention-lock
enable mode compliance mtree /data/col1/mtree_name
Note that /data/col1/backup cannot be configured for Retention Lock
Compliance.
mtree retention-lock reset {min-retention-period | max-
retention-period} mtree mtree-path
Reset the minimum or maximum retention period for the specified MTree to its default
value. The command option is allowed on MTrees with Retention Lock Governance
enabled. Role required: admin, limited-admin.
See the EMC Data Domain Operating System Administration Guide for details on
Retention Lock Compliance and Governance and for instructions on setting retention
time.
228 EMC Data Domain Operating System 6.0 Command Reference Guide
mtree
Note
For Retention Lock Governance files (only), you can delete retention locked files using
a two step process: First use the mtree retention-lock revert path command
to revert the retention locked file. Next, delete the file on the client system using the
rm filename command.
Example 110
mtree show
mtree show compression {mtree-path | tenant-unit tenant-unit}
[tier {active | archive | cloud}] [summary | daily | daily-
detailed] [last n {hours | days | weeks | months} | start date
[end date]]
Display compression statistics for a specific MTree. Values are reported in Gigibytes
(GiB). Running the command without arguments generates default output that
displays a summary of compression statistics for all files and directories in the file
system for the last 7 days and the last 24 hours. Role required: admin, limited-admin,
user, backup-operator, tenant-admin, tenant-user, security, none.
Argument Definitions
mtree-path
The pathname of the MTree for which to display compression statistics.
tenant-unit
The basic unit of a multi-tenancy configuration. A tenant unit is a secure, isolated
partition for tenant-specific data and control flow within a Data Domain system.
summary (Optional)
Display all compression statistics, summarized as:
l Data written in the last 7 days. By including the last n option or the start date
option, you can display statistics for a time frame other than the last 7 days.
l Data written in the last 24 hours.
daily (Optional)
In addition to the summary output, display detailed information for each day, over
the previous four full weeks, plus the current partial week. This option is not
available if you specify a file or directory name.
daily-detailed (Optional)
Display the daily output and include the following information for each day. This
option is not available if you specify a file or directory name.
230 EMC Data Domain Operating System 6.0 Command Reference Guide
mtree
Where:
Argument Definitions
mtree-path
The pathname of the MTree for which to display performance statistics.
tenant-unit
The basic unit of a multi-tenancy configuration. A tenant unit is a secure, isolated
partition for tenant-specific data and control flow within a Data Domain system.
start (Optional)
In the summary portion of the output, display file system performance statistics
for the time frame that begins on the specified day instead of the past 7 hours.
The statistics for the last 24 hours remain in the summary output. If you specify a
time frame less than the previous four weeks, plus the current full week, the daily
or daily-detailed output (if specified) is truncated to the shorter time frame.
Specify the starting date in the format: MMDDhhmm[[CC]YY]
end (Optional)
Valid only if the start option is used. In the summary portion of the output, display
file system performance statistics for the time frame that ends on the specified
day. Specify the ending date in the format: MMDDhhmm[[CC]YY]
Example 113
232 EMC Data Domain Operating System 6.0 Command Reference Guide
mtree
mtree undelete
mtree undelete mtree-path
Mark as not deleted the marked-for-deletion MTree at the specified path. This
command reverses a previous mtree delete command. Role required: admin,
limited-admin.
Note
To undelete an MTree, cleaning must not have run before executing the undelete
command.
Note
If a user tries to undelete a storage unit, the system displays the following message:
"MTree 'mtree-path' contains a DD Boost storage unit and cannot be undeleted."
Example 114
To reverse a previous mtree delete command request that included the MTree at /
data/col1/myMTree:
234 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 28
ndmpd
The ndmpd command is the top-level command for the NDMP (Network Data
Management Protocol) daemon running on a DD system. The NDMP daemon provides
access to VTL-created devices using the NDMP version 4 protocol. Use of this
command requires a VTL license. A VTL used by the NDMP tapeserver must be in the
TapeServer access group.
This chapter contains the following topics:
ndmpd 235
ndmpd
ndmpd disable
ndmpd disable
Disable the NDMP (Network Data Management Protocol) daemon. Role required:
admin, limited-admin.
ndmpd enable
ndmpd enable
Enable the NDMP (Network Data Management Protocol) daemon. Role required:
admin, limited-admin.
ndmpd option
ndmpd option reset option-name | all
Reset all NDMP (Network Data Management Protocol) daemon options or just a
specific option. Role required: admin, limited-admin.
ndmpd option set option-name value
Set a specific NDMP daemon option. Role required: admin, limited-admin.
ndmpd option show option-name | all
Show the values for all NDMP daemon options or just for a specific option. Role
required: admin, limited-admin.
Argument Definitions
option-name
The NDMP daemon option, which can be authentication, debug, port, or
preferred-ip.
value
The value for the particular NDMP daemon option.
ndmpd show
ndmpd show devicenames
View the device name, VTL virtual name, SCSI vendor and product code, and the serial
numbers of devices controlled by the NDMP (Network Data Management Protocol)
daemon. Typically, this information is displayed during device discovery and
configuration. However, you can use this command to verify the VTL TapeServer
group configuration and perform a manual configuration, if required.
If there is no output in the NDMP Device column, either the VTL service is not running
or there are no devices registered with the VTL TapeServer. A series of hyphens in the
NDMP Device column means the VTL service is running on the system, but has not
registered the devices. Restart the VTL service to correct this behavior. If this
problem persists, go to EMC Online Support for assistance. Role required: admin,
limited-admin.
236 EMC Data Domain Operating System 6.0 Command Reference Guide
ndmpd
ndmpd status
ndmpd status
Display the NDMP (Network Data Management Protocol) daemon status. Role
required: admin, limited-admin.
ndmpd stop
ndmpd stop session session-id | all
Stop all NDMP (Network Data Management Protocol) daemon sessions or stop a
single session. Role required: admin, limited-admin.
ndmpd user
ndmpd user add user-name
Add (only) one user name and password for NDMP (Network Data Management
Protocol) daemon MD5 authentication. Role required: admin, limited-admin.
ndmpd user del user-name
Delete the configured NDMP daemon MD5 user name and password. Role required:
admin, limited-admin.
ndmpd user modify user-name
Set the password for the NDMP daemon MD5 user name. Role required: admin,
limited-admin.
ndmpd user show
Show the NDMP daemon MD5 user name. Role required: admin, limited-admin.
238 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 29
net
The net command manages the use of all IP network features and displays network
information and status.
Federal certification requirements state that the DD OS must be IPv6-capable and
that interoperability with IPv4 be maintained in an heterogeneous environment. As a
result, several net command options include arguments for both versions of Internet
Protocol. Collection, directory, and MTree replication are supported over IPv6
networks, which allows you to take advantage of the IPv6 address space.
Simultaneous replication over IPv6 and IPv4 networks is also supported, as is
Managed File Replication using DD Boost.
If you do not specify an IP version, the default is IPv4 to maintain compatibility with
DD OS versions prior to 5.2. The exception is show commands. If the version is not
specified in the show command option (as in route show table), both address
versions are displayed. To view the IPv4 routes only, you must specify the IPv4
argument.
For some commands, you must include the IPv6 command argument if the host is to
be accessed using its IPv6 address. This is required when a hostname is specified and
the host name format resembles an IPv4 address.
This chapter contains the following topics:
net 239
net
240 EMC Data Domain Operating System 6.0 Command Reference Guide
net
net aggregate
net aggregate add virtual-ifname interfaces physical-ifname-
list [mode {roundrobin | balanced hash {xor-L2 | xor-L3L4| xor-
L2L3} | lacp hash {xor-L2 | xor-L3L4 | xor-L2L3} [rate {fast |
slow}]} [up {time | default}] [down {time | default}]
Add physical interfaces to an aggregate virtual interface. Setting the mode is required
on initial configuration and when there is no default aggregate mode, but optional
when adding interfaces to an existing aggregate interface. Choose the mode
compatible with the specifications of the system to which the ports are attached.
Balanced and LACP modes require a hash selection.
Note
mode {roundrobin | balanced hash {xor-L2 | xor-L3L4| xor-L2L3} | lacp hash {xor-L2
| xor-L3L4 | xor-L2L3}
Specifies how traffic is routed over the aggregate interfaces.
balanced hash {xor-L2 | xor-L3L4| xor-L2L3}
Data is sent over interfaces as determined by the hash method selected.
Balanced mode requires a hash configuration.
roundrobin
Packets are transmitted sequentially, beginning with the first available link
and ending with the last link in the aggregated group.
242 EMC Data Domain Operating System 6.0 Command Reference Guide
net
xor-L2
Transmission of packets from a specific slave interface is based on static
balanced mode or LACP mode aggregation with an XOR based on a hash
policy. An XOR of source and destination MAC addresses is used to generate
the hash.
xor-L2L3
Transmission of packets from a specific slave interface is based on static
balanced and LACP mode aggregation with an XOR based on a hash policy.
An XOR of source and destination's upper layers (L2 and L3) protocol
information is used to generate the hash.
xor-L3L4
Transmission of packets from a specific slave interface is based on static
balanced and LACP mode aggregation with an XOR based on a hash policy.
An XOR of source and destination's upper layers (L3 and L4) protocol
information is used to generate the hash.
virtual-ifname
Specifies a virtual interface to create or modify. The virtual-name must be in the
form vethx where x is a number. The recommended maximum number is 99
Example 115
The following command enables link aggregation on virtual interface veth1 to physical
interfaces eth1a and eth2a in mode lacp hash xor-L2.
# net aggregate add veth1 interfaces eth1a eth2a mode lacp hash xor-L2
Example 116
To delete physical interfaces eth2a and eth3a from the aggregate virtual interface
veth1:
Example 117
Use the following command to change link aggregation on virtual interface veth1 to
mode lacp hash xor-L2. Stating the previous configuration is not required.
Note
With the exception of net aggregate show, net aggregate commands control
link aggregation. The recommended and supported maximum is four ports, but there
are no restrictions on the Data Domain system for having more aggregate slaves.
net config
net config addresses type {fixed | floating}
244 EMC Data Domain Operating System 6.0 Command Reference Guide
net
Bulk convert IP addresses on the Data Domain system to the specified type. The
system prompts for each IP address individually. This command only works on HA
systems. Role required: admin.
net config ifname {[ipaddr [netmask mask]] | [ipv6addr/prefix]
| [type {fixed | floating}] | [dhcp {yes [ipversion {ipv4 |
ipv6}] | no}]} {[autoneg] | [duplex {full | half} speed {10|
100|1000|10000}] [up | down] [mtu {size | default}] [txqueuelen
size]
Display the physical interface configuration or configure a base interface or an alias
interface. A base interface is a physical interface to which an IP address is assigned.
An alias interface is used to add an additional IP address to a base interface, and you
can create multiple alias interfaces to add multiple IP addresses to a base interface.
Note
To create an alias interface, enter the base interface and alias name in the following
format: base_interface:alias_name and specify an IPv4 or IPv6 address. The following
are some sample alias names.
l eth5a:35—The base interface is physical interface eth5a, and the alias name is 35.
l veth4:26—The base interface is virtual interface veth4, and the alias name is 26.
l eth5a.82:162—The base interface is VLAN interface eth5a.82, and the alias name
is 162.
To delete an alias interface, assign the 0 value to the IP address as follows: net
config eth0a:200 0
Role required: admin, limited-admin.
Argument Definitions
autoneg
Specify this option to configure the interface to autonegotiate the duplex and
speed settings with the remote interface.
Note
DHCP over IPv6 does not supply a host name. If you set an interface to use
DHCP over IPv6, complete the configuration, run net show hostname, and
verify that the hostname is correct. If there is no host name or if it is no longer
correct, configure the hostname using net set hostname or with DD System
Manager at Hardware > Network > Settings.
ifname
Specify the interface to configure and one or more arguments to change the
configuration. If you omit the interface name, the command lists the configuration
for all the interfaces. If you specify an interface without any additional arguments,
the command lists the configuration for the interface.
To create an alias interface, enter the alias in the following format:
base_interface:alias_name. The alias name must be a number in the range of 1 to
9999.
Note
The IPv6 SLAAC and IPv6 Link Local addresses cannot be configured. They are
automatically configured when the interface is brought up.
The SLAAC addresses are generated based on the response from the router and
is based on the mac address. The Link Local is also based on the mac address but
is generated whenever the physical, bonded, or VLAN is brought up to the running
state.
Use the floating IP option for file system access and most configuration. The
floating IP is static.
Note
246 EMC Data Domain Operating System 6.0 Command Reference Guide
net
prefix length different from 64, it must be specified with the address by adding a
forward slash followed by a number. For example, if the prefix length is 52, the
notation is: 2026:3456:cafe::f00d:1/52.
Note
DD140, DD160, DD610, DD620, and DD630 systems do not support IPv6 on
interface eth0a (eth0 on systems that use legacy port names) or on any VLANs
created on that interface.
txqueuelen size
Specify the transmit queue length. The range is 500 to 10,000 packet pointers,
and the default value is 1000.
up | down
Use the up argument to bring up an interface with or without an IP address.
(Using net enable fails if no IP address is configured on the interface.) Use the
down argument to bring down an interface.
Note
If no address is given, the up option might fail because there is no registry entry
for an IP address. This typically occurs after a fresh install. If this occurs, specify
an address of 0 to allow a registry address location to be created.
Example 118
The following example shows an excerpt from the net config display when no
arguments are entered.
Interface eth1d represents the physical interface. Interfaces eth1d:10 and eth1d:200
are alias interfaces that each add an IPv4 address to the base interface, and eth1d:100
and eth1d:210 are alias interfaces that add IPv6 addresses to the same base interface.
The IPv6 alias addresses are available when the base interface is in the running state
and the alias interface state is up. Notice that the IPv6 alias addresses in the example
above are displayed with the alias interfaces and the base interface.
Example 119
The following example adds an alias named 200 to the eth0a interface and assigns an
IPv6 address to it.
Example 120
The following example deletes alias 200 from the eth0a interface.
net congestion-check
net congestion-check modify [sample-interval secs] [capture-
window secs] [every mins] [detailed {on | off}] [logfile
filename] [logfilev6 filename] [iperf-client {none | iperf-
server-host | iperf-server-ipaddr} [nodelay {on | off}] [port
{port | default} ] [window-size bytes] [connections count]
[data {random|default}]}]
Congestion data is collected during a period of time defined by the capture window
argument. Within the capture window, data is captured at intervals defined by the
sample-interval argument. If the every argument is non-zero, a new capture
window starts at intervals determined by the every argument. For example, if the
capture window is 60 seconds, the sample interval is 5 seconds, and the every
argument is set to 60, data is collected every 60 minutes for a period of 60 seconds at
5 second intervals. The output displays as one line per remote IP address.
This command modifies options for the congestion monitor whether or not the
monitor program is activated. (The congestion monitor is activated by the net
congestion-check start command.) The settings configured with this command are
stored in the registry and replace the default values used by net congestion-
check start command. If the congestion monitor is scheduled, the new registry
values are used when it runs. If the monitor is not scheduled, the values are used as
defaults when it is started. Typically this command option is used after the monitor is
scheduled to run and the user does not want to stop and restart the monitor.
248 EMC Data Domain Operating System 6.0 Command Reference Guide
net
Output values for rates and error numbers are added together. Values that may
increase or decrease, such as the capture-window, are averaged over time. Role
required: admin, limited-admin.
Argument Definitions
The argument definitions are the same as described for the net congestion-
check start command.
net congestion-check run [sample-interval secs] [capture-window
secs] [every mins] [detailed {on | off}] [logfile filename]
[{iperf-client {none | {iperf-server-host | iperf-server-
ipaddr} [nodelay {on | off}] [port {port | default}] [window-
size bytes] [connections count] [data {random | default}]}]
Run the congestion check program with the run option to display the results as screen
output when the capture-window time is complete. When the command option is
entered without arguments, defaults are used. When the command option includes
arguments, the arguments override the defaults during the procedure but return to
the configured defaults after the procedure concludes. Default values for the run
command are always the same and are not affected by the net congestion-check
modify or the net congestion-check start commands.
Argument Definitions
The following argument definitions are unique to this command. The rest of the
argument definitions are the same as described for the net congestion-check
start command.
port {port | default}
The TCP port number for the target iperf server. The default is 5002, which is
one more than the iperf default, 5001.
Note
After entering the command, there is a slight delay during which the process actually
starts the monitor. After the monitor is started, the specified time arguments take
over. To get information immediately, use the net congestion-check run
command instead.
Output is one line per external destination. All connections to and from an external
address are merged into a single line of data.
Value types from the output vary. Amounts of data or packets increase. These
amounts are added together across all connections to a specific IP address to give the
total value to or from the external location. Rates are relatively constant but are also
added together to give the total flow rate to the pipe at the remote location. Other
values are relatively static across all connections, such as the mss, rtt, window scale
factor, or congestion window. These are given as an average with the minimum and
maximum. Errors and loses are treated the same as rates and are added across all
interfaces. Role required: admin, limited-admin.
Argument Definitions
capture-window secs
Specify the period during which data is captured. The initial value is 60 seconds;
the range is 10 to 3600 seconds. The configured value must be less than the
every argument and greater than the sample-intervalargument.
connections count
The connections argument determines how many parallel TCP connections to
establish between the iperf client and server. The default value is 1, which is
typically satisfactory if the window size is set appropriately. Larger values are
supported between DD OS iperf clients and servers, but are not supported by all
iperf servers. Increasing the connection count can improve performance, but too
many connections will negatively impact network performance. This argument is
equivalent to the Linux argument for parallel tests: -p number.
detailed
By default, detailed information is saved, but setting the argument to off saves
basic information. The basic setting is mainly for replication on the source system
and focuses on congestion conditions between the source and destination. The
detailed on argument adds receive information and other entries useful for the
general network environments of the Data Domain system. The initial value is
off.
every mins
Specify the period between the start of each capture window. The initial period is
60 minutes. The range is 10 to 60 minutes. The configured period must be greater
than that for the capture-window argument. Because this command configures
an ongoing monitor, value 0 is not supported.
250 EMC Data Domain Operating System 6.0 Command Reference Guide
net
iperf-server-host | iperf-server-ipaddr
The iperf-server-host and iperf-server-ipaddr arguments enable the
iperf client to run during congestion checks and specify a target iperf server
hostname or IP address.
logfile
Set the log file name used to save the IPv4 data collected. The initial default is /
ddvar/log/default/congestion.log.
Do not change the file name unless absolutely required. The default file name is on
a rotation system where the file size cannot exceed 10 MB, and up to 10 files are
saved for a maximum of 100 MB of disk space. Changing the file name voids the
space restrictions, meaning there is no limit to the space the files may consume.
logfilev6 filename
Set the log file name used to save the IPv6 data collected. The initial default is /
ddvar/log/default/congestion.log.
Do not change the filename unless absolutely required. The default file name is on
a rotation system where the file size cannot exceed 10 MB, and up to 10 files are
saved for a maximum of 100 MB of disk space. Changing the file name voids the
space restrictions, meaning there is no limit to the space the files may consume.
nodelay
The nodelay on argument eliminates the wait time between sends. The
nodelay off argument requires iperf to wait for an ACK message after each
send. This argument is equivalent to the Linux argument: -N.
none
The none argument prevents the iperf client from running during a network
congestion check. If iperf was previously enabled and is no longer needed, use the
none argument to disable iperf use by the congestion monitor. The initial value is
none.
sample-interval secs
Specify the sample period within the capture window. The initial value is 4
seconds; the range is 2 to 3600 seconds. The value of the sample-interval
argument must be less than the value of the capture-window argument.
window-size bytes
The size of the socket buffer to use. The default is 32,000; the range is 8,000 to
10,000,000. For long latencies, this size may be too small. Consider setting the
size to 250,000 or 10,000,000.
net create
net create interface {physical-ifname | virtual-ifname} {vlan
vlan-id | alias alias-id}
Create a VLAN interface or alias on the specified physical or virtual interface. A VLAN
is created immediately in the kernel, and the number given must be between 1 and
4094 inclusive. An alias is not created in the kernel until an IP address is specified.
Role required: admin, limited-admin.
Note
The alias argument is deprecated and will be removed in a future release. You can use
the alias option in this release, and if you do, the system displays a message regarding
the deprecation and the preferred way to enter an alias.
net ddns
net ddns add {ifname-list | all | ifname interface-hostname
hostname}
Add interfaces to the Dynamic DNS (DDNS) registration list. Role required: admin,
limited-admin.
252 EMC Data Domain Operating System 6.0 Command Reference Guide
net
Note
When DDNS is configured for UNIX mode, this feature supports physical interfaces
and aliases for physical interfaces. In this release, VLAN and virtual interfaces (and
any aliases for those interfaces) are not supported in DDNS UNIX mode.
Argument Definitions
all
When DDNS is enabled for the Windows environment, this option is enabled and
specifies that host names be registered for all interfaces.
ifname-list
When DDNS is enabled for the Windows environment, this option is enabled and
specifies that host names be registered for the specified interfaces.
ifname interface-hostname
When DDNS is enabled for the UNIX environment, this option is enabled and
specifies an interface and hostname to be registered with DDNS.
Note
If DDNS is already enabled, you must disable DDNS before selecting a different mode.
net destroy
net destroy {virtual-ifname | vlan-ifname | ipalias-ifname}
Remove a VLAN, IP alias, or virtual interface. If VLANs and aliases are associated with
a virtual interface, or if aliases are associated with a VLAN, these entities are also
destroyed when the virtual interface or VLAN interface is destroyed. Role required:
admin, limited-admin.
Note
Setting the address to zero for an alias will also cause it to be destroyed.
Example 121
net disable
net disable ifname
Disable an Ethernet interface on the Data Domain system. Role required: admin,
limited-admin.
net enable
net enable ifname
Enable or reenable an Ethernet interface on the Data Domain system, where ifname is
the name of an interface. An IP address must be assigned to the interface. When the
interface is configured properly, this command brings up the interface to the
RUNNING state. If the interface does not go into the RUNNING state, the command
fails, the interface is set to the DOWN state, and then set to disabled. Role required:
admin, limited-admin.
net failover
net failover add virtual-ifname interfaces ifname-list [primary
ifname] [up {time | default}] [down {time | default}]
Add interfaces to a failover virtual interface. Note that you can add an aggregated
interface to a failover interface. Role required: admin, limited-admin.
Argument Definitions
interfaces ifname-list
Specifies one or more slave interfaces to be added to the failover virtual
interface. The slave interfaces must be in a down (disabled) state when added to
the virtual interface. (Use net show settings to view the link state of all
interfaces.)
254 EMC Data Domain Operating System 6.0 Command Reference Guide
net
virtual-ifname
Specifies a virtual interface to modify. To display a list of failover virtual
interfaces, enter net failover show.
primary ifname
Specifies an interface as the primary failover slave interface.
Example 122
The following command example associates a failover virtual interface named veth1
with the physical interfaces eth2a and eth3a and designates eth2a as the primary
interface.
Example 123
The following command removes eth2a from the virtual interface veth1, for which
eth2a and eth3a are slaves and eth3a is the primary interface.
Modify the primary network interface, the up /down times for a failover interface, or
both. A down interface must transition and stay up for the amount of time to be
designated up. An up interface must transition and stay down for the amount of time
to be designated down.
The up and down time is given in milliseconds and is adjusted internally to the largest
multiple of 900, less than or equal to the specified value. For example, if the time you
want is 10 seconds and 10000 is specified, the actual value is 9900. The default value
is 30 seconds but the actual resulting value is 29.7 seconds.
A primary interface cannot be removed from failover. To remove a primary use
primary ifname none first. The argument definitions are the same as for net
failover add. Role required: admin, limited-admin.
Example 124
The up time value used is 4500 (4.5 seconds) and the down time value is 9900 (9.9
seconds).
Note
If a physical interface is down, none of the associated failover interfaces appear in this
list. To see all failover interfaces, regardless of the states of the physical interfaces,
use net show settings.
net filter
net filter add [seq-id n] operation {allow | block} [clients
{host-list | ipaddr-list}] [except-clients {host-list | ipaddr-
list}] [interfaces {ifname-list | ipaddr-list}] [except-
interfaces {ifname-list | ipaddr-list}] [ipversion {ipv4 |
ipv6}]
Add a set of rules to the iptables; service names are restricted to what is supported.
Role required: admin, limited-admin.
Argument definitions
seq-id n
The sequence number of where to add the function into the current filter
functions. If it is not specified it will be appended to the end of the user generated
filter functions but before the default functions.
256 EMC Data Domain Operating System 6.0 Command Reference Guide
net
all
Delete all functions. The default functions can not be deleted.
all
Disable all functions. Only one default function can be disabled per command.
new-seq-id
The sequence number indicating where the function is to be moved.
258 EMC Data Domain Operating System 6.0 Command Reference Guide
net
Show the net filter functions configured and the iptable rules associated with each
function. One id or a list of ids can be given. Role required: none.
Argument definitions
ids
The sequence numbers of the functions to display. If none are specified, all are
displayed.
net hosts
net hosts add {ipaddr | ipv6addr} host-list
Add a host list entry. Associate an IP address with a hostname. The address can be an
IPv4 or an IPv6. The hostname is a fully qualified domain name, a hostname, or an
alias. The entry is added to the /etc/hosts file. Entries in the list can be separated
by commas, spaces, or both. Role required: admin, limited-admin.
Example 125
net iperf
net iperf client {ipaddr | ipv6addr | hostname [ipversion {ipv4
| ipv6}]} [port port] [window-size bytes] [data {random |
default}] [interval secs] [{transmit-size bytes | duration
secs}] [connections count] [nodelay]
This command starts iperf client software, which can be used to generate network
traffic and display throughput test results. This command should be used with caution
on production networks because iperf is disruptive to the network. Consider using
iperf for brief periods, especially if there is other traffic using the network.
The iperf client requires an iperf server to communicate with. You can use net
iperf server to start an iperf server on a remote system. Role required: admin,
limited-admin.
Argument Definitions
connections count
The connections argument determines how many parallel TCP connections to
establish between the iperf client and server. The default value is 1, which is
typically satisfactory if the window size is set appropriately. Larger values are
supported between DD OS iperf clients and servers, but are not supported by all
iperf servers. Increasing the connection count can improve performance, but too
many connections will negatively impact network performance. This argument is
equivalent to the Linux argument for parallel tests: -p number.
duration secs
The duration argument indicates how many seconds iperf transmits packets.
This argument is equivalent to the Linux argument: -t secs.
interval secs
This argument indicates the time between reports. If this is not given, one is
reported at the end. If this is given, a progress report is displayed every "secs"
(seconds). Equivalent to the Linux argument: -i secs.
nodelay
The nodelay on argument eliminates the wait time between sends. If nodelay
argument is not specified, iperf will wait for an ACK message after each send.
This argument is equivalent to the Linux argument: -N.
port port
The port argument can be used to specify the TCP port number for the target
iperf server. The default port number is 5001, which is the default value for iperf.
The port number used by the iperf client must match the port number used by the
260 EMC Data Domain Operating System 6.0 Command Reference Guide
net
iperf server. Typically, you might change the port number to bypass network
filters or test specific ports. This argument is equivalent to the Linux argument: -
p port.
transmit-size bytes
The transmit-size argument defines how much data iperf will send before
closing. This is equivalent to the Linux argument: -n num.
window-size bytes
The window-size argument increases the amount of data sent at one time
(socket buffer size). This is equivalent to the Linux argument: -w iperf-bytes.
window-size bytes
The window-size argument specifies the amount of data sent at one time. This
is equivalent to the Linux argument: -w iperf-bytes.
When the iperf server is running in the background (as invoked by net_server
start), this command option displays the iperf server status and what connections
the server is using. Role required: admin, limited-admin, security, user, backup-
operator, or none.
net iperf server stop
When the iperf server is running in the background (as invoked by net_server
start), this command option stops iperf. Role required: admin, limited-admin.
262 EMC Data Domain Operating System 6.0 Command Reference Guide
net
net lookup
net lookup {ipaddr | ipv6addr | hostname}
Search DNS entries. This command may be used with IPv4 or IPv6 addresses. Role
required: admin, limited-admin, security, user, backup-operator, or none.
net modify
net modify virtual-ifname bonding {aggregate | failover}
Change the behavior of the specified virtual interface from aggregate to failover or
from failover to aggregate. Role required: admin, limited-admin.
The result is the default's value target function with the same slaves. The default for
failover is no primary and up-and-down delays of 29,700 milliseconds. The default for
link aggregation is LACP with hash of L3L4, and a rate of slow and up/down times of
29,700 milliseconds.
net option
net option show
Display settings for network options. Role required: admin, limited-admin, security,
user, backup-operator, or none.
net ping
net ping {ipadddr | ipv6addr| hostname [ipversion {ipv4 |
ipv6}]} [broadcast] [count n] [interface ifname] [packet-size
bytes] [path-mtu {do | dont | want}] [pattern pattern]
[numeric] [verbose]
Verify the Data Domain system can communicate with a remote host. Role required:
admin, limited-admin, security, user, backup-operator, or none.
Argument Definitions
broadcast
Enable pinging a broadcast address (available for IPv4 only).
count n
Number of pings to issue.
interface ifname
Name of interface from which to send the ping. You can ping from physical,
virtual, and VLAN interfaces.
numeric
Ping the IP address, not the hostname.
packet-size bytes
Set packet size.
pattern pattern
Send packets with the specified pattern.
verbose
Display expanded output.
net reset
net reset {domainname | searchdomains}
Reset Data Domain system DNS servers or domain names to the default settings. This
usually clears any static settings and ensures DNS addresses provided by DHCP are
used. If DHCP is not being used, then no DNS addresses are used. Role required:
admin, limited-admin.
net reset dns
Reset DNS list to default values. This usually clears any static settings and ensures
DNS addresses provided by DHCP are used. If DHCP is not being used, then no DNS
addresses are used. Role required: admin, limited-admin.
net reset hostname
Reset the hostname to the default value. This usually clears any static settings and
ensures DNS addresses provided by DHCP are used. If DHCP is not being used, then
no DNS addresses are used. Role required: admin, limited-admin.
net route
The net route command manages routing between Data Domain systems and backup
hosts. An additional routing rule in the Kernel IP routing table and in the Data Domain
system Net Route Config list shows a list of static routes reapplied at each system
boot. Each interface is assigned a route based on its assigned address.
In addition, depending on the default gateway subnet and the gateway owner, a route
is added to an interface automatically if the interface is in the subnet of a default route
address. If the address is an IPv4 type, a routing table is created for the interface and
default routes for that address are set up in that table.
net route guidelines and restrictions
Changes to Ethernet interfaces made with net command options flush the routing
table. All routing information is lost and data movement using routing is cut off
264 EMC Data Domain Operating System 6.0 Command Reference Guide
net
immediately. You should make interface changes only during a scheduled downtime.
You must also reconfigure routing rules and gateways after making interface changes.
net route add [ipversion {ipv4 | ipv6}] route spec
Add an IPv4 or IPv6 static route for a network or network host. Role required: admin,
limited-admin.
Arguments and definitions
ipv4address
The default gateway's IP address. It can only be an IPv4 address type.
interface name
The name of the interface for adding the default gateway. This makes this default
gateway a "targeted" default gateway, which means this default will be used to
route traffic for the IP address on this interface as long as the address is in the
same subnet as this default gateway.
floating
Specifies that the static route is floating.
gw gateway
Specifies the IP address of the gateway to use to reach the destination network
or host. If no gateway is specified, the route uses the default gateway.
ipv4address
Specifies the IPv4 address for the destination network or host. If no gateway is
specified, the command fails if the destination host is not found on the local
network or through the default gateway.
ipv6address
Specifies that the route is for IPv6routing. This argument is not required when an
IPv6 address is specified.
-netmask
Specifies the network mask that applies to the destination network or network
host.
type
Specifies the type of static route is either a fixed or floating IP.
Example 126
The following example shows an IPv4 route added to network 192.168.1.0 with
netmask 255.255.255.0 using the srvr12 gateway:
Example 127
The following example shows an IPv4 route added to network 172.16.83.278 with
netmask 255.255.255.0:
Example 128
The following example shows an IPv4 route added to a host named user24 through the
srvr12 gateway.
interface name
The name of the interface for adding the default gateway. This makes this default
gateway a "targeted" default gateway, which means this default will be used to
route traffic for the IP address on this interface only as long as the address is in
the same subnet as this default gateway.
266 EMC Data Domain Operating System 6.0 Command Reference Guide
net
interface name
If this is a targeted default gateway, the associated interface also needs to be
given for the targeted gateway to be deleted. Otherwise, the interface will be
deleted from the list of the added default gateways.
Note
When configuring an IPv6 address, a command failure might not produce an error
message in the CLI. If the new gateway is not visible using the route show gateway
and route show table commands, check the messages log file for information on why
the command failed.
Example 129
The following example shows the device configured at 192.168.10.1 the default IPv4
gateway.
Table: main
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 10.25.128.1 0.0.0.0 UG 0 0 0 eth0a
10.25.128.0 0.0.0.0 255.255.240.0 U 0 0 0 eth0a
10.25.160.0 0.0.0.0 255.255.240.0 U 0 0 0 eth0b
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
172.16.32.0 0.0.0.0 255.255.240.0 U 0 0 0 eth1b.100
172.16.144.0 0.0.0.0 255.255.240.0 U 0 0 0 eth1b
172.16.208.0 0.0.0.0 255.255.240.0 U 0 0 0 eth1a.200
172.16.240.0 0.0.0.0 255.255.240.0 U 0 0 0 eth1a.100
172.17.48.0 0.0.0.0 255.255.240.0 U 0 0 0 eth1a.555
192.168.112.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1d
Routing rules:
32766: from all lookup main
Table: teth0a
Kernel IP routing table:
default via 10.25.128.1 dev eth0a
10.25.128.0/20 dev eth0a scope link src 10.25.142.166
Routing rules:
32764: from all oif eth0a lookup teth0a
32765: from 10.25.142.166 lookup teth0a
Table: teth0b
Kernel IP routing table:
default via 10.25.160.1 dev eth0b
10.25.160.0/20 dev eth0b scope link src 10.25.167.241
Routing rules:
32762: from all oif eth0b lookup teth0b
32763: from 10.25.167.241 lookup teth0b
Table: teth1a.555
Kernel IP routing table:
default via 172.17.55.1 dev eth1a.555
172.17.48.0/20 dev eth1a.555 scope link src 172.17.55.55
Routing rules:
32760: from all oif eth1a.555 lookup teth1a.555
32761: from 172.17.55.55 lookup teth1a.555
Table: main
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 10.25.128.1 0.0.0.0 UG 0 0 0 eth0a
10.25.128.0 0.0.0.0 255.255.240.0 U 0 0 0 eth0a
10.25.160.0 0.0.0.0 255.255.240.0 U 0 0 0 eth0b
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
172.16.32.0 0.0.0.0 255.255.240.0 U 0 0 0 eth1b.100
268 EMC Data Domain Operating System 6.0 Command Reference Guide
net
Table: teth0a
Kernel IP routing table:
default via 10.25.128.1 dev eth0a
10.25.128.0/20 dev eth0a scope link src 10.25.142.166
Routing rules:
32764: from all oif eth0a lookup teth0a
32765: from 10.25.142.166 lookup teth0a
Table: teth0b
Kernel IP routing table:
default via 10.25.160.1 dev eth0b
10.25.160.0/20 dev eth0b scope link src 10.25.167.241
Routing rules:
32762: from all oif eth0b lookup teth0b
32763: from 10.25.167.241 lookup teth0b
Table: teth1a.555
Kernel IP routing table:
default via 172.17.55.1 dev eth1a.555
172.17.48.0/20 dev eth1a.555 scope link src 172.17.55.55
Routing rules:
32760: from all oif eth1a.555 lookup teth1a.555
32761: from 172.17.55.55 lookup teth1a.555
net set
net set {domainname local-domain-name | searchdomains search-
domain-list}
Set the domain name or search domains used by the Data Domain system. The default
for domainname is the return from DHCP, or domain portion of the hostname
configured with net set hostname. The default for searchdomains is the
domain name configured with net set domainname. The configured domain name
is always included in the list of search domains. Role required: admin, limited-admin.
Example 130
Example 131
Example 132
Note
If the Data Domain system is using CIFS with Active Directory authentication,
changing the hostname causes the Data Domain system to drop out of the domain.
Use the cifs set authentication command option to rejoin the Active
Directory domain.
Note
This command accepts domain names and validates that the domain name is made up
of valid characters separated by periods. Although an IPv4 address passes the
validation for a domain name, this command does not recognize the IP address as such
and does not validate the IP address. This is not an issue for IPv6 addresses because
they contain colon characters, which are invalid in host names.
270 EMC Data Domain Operating System 6.0 Command Reference Guide
net
net show
net show {domainname | searchdomains}
Display the domain name or search domains used for email sent by a Data Domain
system. Role required: admin, limited-admin, security, user, backup-operator, or none.
Example 133
Local Address
The connection IP address and port used on the local system or application.
Proto
Protocol in use for the listed connection. This is always TCP because UDP is a
connectionless protocol.
Recv-Q
A count of the protocol packets in the receive queue.
Send-Q
A count of the protocol packets in the send queue.
State
The state of the connection as signaled by the TCP protocol. The state for active
sessions is ESTABLISHED. The TIME_WAIT state appears when the local
connection is closing and reserving the port number for a wait period in case any
additional packets arrive. The SYN_RCVD, SYN_SENT, and CLOSE_WAIT states
are usually so brief that they do not appear, but if one of these states do appear
in several consecutive command displays, it might indicate a connection problem.
Display the configuration for a specific Ethernet interface. Exclude the keyword
ifname to view the configuration for all Ethernet interfaces. This command also shows
auto-generated IPv6 addresses, which are automatically generated and assigned to
the base interface. Role required: admin, limited-admin, security, user, backup-
operator, or none.
Example 134
Output Definitions
Bcast
IPv4 network broadcast address.
Collisions
Network collisions.
HWaddr
MAC address.
inet addr
IPv4 network address.
inet6 addr
IPv6 network address. An interface can have multiple IPv6 IP addresses.
Link encap
Link encapsulation used, typically Ethernet.
Mask
IPv4 network mask.
MTU
Maximum transfer unit.
RX bytes
Bytes of data received.
RX packets
Network packets received.
TX bytes
Bytes of data transmitted.
TX packets
Network packets transmitted.
272 EMC Data Domain Operating System 6.0 Command Reference Guide
net
txqueuelen
Transmit queue length.
Example 135
Output Definitions
Duplex
Full, half, or unknown duplex protocol. Unknown means the interface is not
available.
Hardware Address
The MAC address.
Link Status
The status is yes if the link is receiving carrier from the remote system and no if
no carrier is present. Carrier must be present for the link to support data transfer.
The status is unknown when the link is administratively down and the link state
cannot be determined.
Physical
Copper, DA Copper, or Fibre.
Port
The Ethernet interfaces on the system.
Speed
The actual speed at which the port processes data.
State
The port state indicates whether the port is administratively up or down and
whether the link is ready for traffic. A port in the running state is enabled and
receiving carrier from the remote system, so it is ready to send and receive data.
Supp Speeds
Lists speeds the port is capable of using.
274 EMC Data Domain Operating System 6.0 Command Reference Guide
net
Output Definitions
DHCP
The DHCP configuration for the interface, which is ipv4 (enabled for IPv4), ipv6
(enabled for IPv6), disabled (no), or not applicable (n/a).
Enabled
The target state of the interface, which is yes (enabled) or no (disabled).
Floating
The floating keyword means that the IP address is a floating type. If the column
does not indicate a floating type, then it is a fixed IP address.
IP address
The IPv4 and IPv6 addresses that are assigned to the interface. The auto-
generated IPv6 addresses are followed by one asterisk (*).
Interconnect
Used for internal communication between HA nodes.
Netmask/prefix length
The IPv4 network mask or IPv6 addresses prefix assigned to the interface.
Port
The Ethernet interfaces on the system. Interface eth1d represents the physical
interface. Interface eth1d:10 is an alias interface that adds an IPv4 address to the
base interface, and eth1d:100 is an alias interface that adds an IPv6 address to the
same base interface.
State
The port state indicates whether the port is administratively up or down and
whether the link is ready for traffic. A port in the running state is enabled and
receiving carrier from the remote system, so it is ready to send and receive data.
Type
The label assigned to the interface with the net config ifname type command.
detailed
Adds the associated processes for each connection.
interfaces
Displays a table of the driver statistics for each interface that is UP.
listening
Lists local server TCP connections.
statistics
Displays the statistics for IP, IP extended, ICMP, TCP, TCP extended, UDP, and
UDP Lite.
net tcpdump
net tcpdump capture filename [interface iface] [{host host
[ipversion {ipv4 | ipv6}] | net {ipaddr [mask mask] |
ipv6addr[/prefixlength]}}] [port port] [snaplen bytes]
Capture data, and then copy the output file to another system for analysis. This
command converts the options from the command line to equivalent tcpdump
options. Output files are placed in /ddvar/traces where you can upload them to
autosupport. Values for bytes may be followed by the K, M, or G to scale the value.
accordingly. A maximum of 10 output files may be retained on the system. If this limit
is reached, you are prompted to delete some of the files. Role required: admin.
Argument Definitions
filename
Specifies the output filename. Equivalent Linux argument: -w /ddvar/traces/
tcpdump_filename -C 100 -W 5.
interfaceiface
Equivalent Linux argument: -i iface.
276 EMC Data Domain Operating System 6.0 Command Reference Guide
net
ipv6add/prefixlength
IPv6 address.
port port
Equivalent Linux argument: port port
snaplen bytes
Equivalent Linux argument: -s bytes
net troubleshooting
net troubleshooting duplicate-ip
Detect duplicate IP addresses in the local network. Role required: admin, security,
user, backup-operator, or none.
278 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 30
nfs
The nfs command enables you to add NFS clients and manage access to a Data
Domain system. It also enables you to display status information, such as verifying that
the NFS system is active, and the time required for specific NFS operations.
This chapter contains the following topics:
nfs 279
nfs
nfs add
nfs add path client-list [(option-list)]
Add NFS clients that can access the Data Domain system. A client can be a fully
qualified domain hostname, class-C IP addresses, IP addresses with netmasks or
length, an IPV6 address, an NIS netgroup name with the prefix @, or an asterisk
wildcard for the domain name, such as *.yourcompany.com. Role required: admin,
limited-admin.
An asterisk by itself means no restrictions. A client added to a subdirectory under /
data/col1/backup has access only to that subdirectory.
The options-list is comma or space separated, enclosed by parentheses. If no option is
specified, the default options are rw, no_root_squash, no_all_squash, and
secure.
NFS Options
ro
Enable read-only permission.
rw
Enable read and write permissions (default value).
root_squash
Map requests from uid or gid 0 to the anonymous uid/gid.
no_root_squash
Turn off root squashing.
Note
all_squash
Map all user requests to the anonymous uid/gid.
no_all_squash
Turn off the mapping of all user requests to the anonymous uid/gid (default
value).
secure
Require that requests originate on an Internet port that is less than
IPPORT_RESERVED (1024) (default value).
insecure
Turn off the secure option.
anonuid=id
Set an explicit user ID for the anonymous account. The ID is an integer bounded
from 0 to 65635.
280 EMC Data Domain Operating System 6.0 Command Reference Guide
nfs
anongid=id
Set an explicit group ID for the anonymous account. The ID is an integer bounded
from 0 to 65635.
log
The system will log NFS requests. This option may impact performance.
sec
Set sec equal to the following options to activate different types of
authentication security options. The default for sec is sys.
sys: Allow unauthenticated connections. Select to not use authentication. This is
the default.
krb5: Allow Kerberos-5 NFS authenticated connections.
krb5i: (krb5 integrity) Allow connection that checksum NFS arguments and
results.
krb5p: (krb5 privacy) Allow connections that encrypt NFS arguments and results.
Note
Note
You can use any combination of the sec options. Security options are colon separated.
CAUTION
If authentication options (sec options) on the DDR are selected and a client tries
to connect to the DDR without setting the respective setting(s) on the client,
the client will be denied with an authentication failure. If multiple authentication
options are present for an export, the clients will be able to mount the export
using any one of the specified authentication options.
Example 136
Add NFS clients for a path using all of the security options.
Example 137
Add NFS clients for which the system will log NFS requests.
Example 138
Export backup to all users so that any client can access the mount point, and all of the
security options will be activated.
Example 139
Example 140
To add a subnet client using its IP address followed by a length and a netmask, enter:
Example 141
Example 142
To add a client that uses an IPv6 address followed by a prefix length, enter:
Note
Example 143
282 EMC Data Domain Operating System 6.0 Command Reference Guide
nfs
Note
You must include a space between the client (in this case "*") and the opening
parenthesis.
nfs del
nfs del path client-list
Delete specific directories, including a backup subdirectory, for one or more clients.
The client-list can contain IPv4 and IPv6 addresses, hostnames, or an asterisk that
represents all clients. Role required: admin, limited-admin.
Example 144
To delete an NFS client with an IP address of 192.168.1.01 from the /ddvar directory,
enter:
Example 145
nfs disable
nfs disable
Disable all NFS clients. Role required: admin, limited-admin.
nfs enable
nfs enable
Allow all NFS-defined clients to access the Data Domain system. Role required: admin,
limited-admin.
Note
Using the noac option provides greater cache coherence among NFS clients accessing
the same files, but it extracts a significant performance penalty. As such, judicious use
of file locking is encouraged instead.
nfs reset
nfs reset clients
Removes the existing client/share configuration, resetting the client list to the factory
default (empty). In non-interactive mode, for example when the command is run as
part of a script, the system will not pause. However, in interactive mode, the
command warns the user and asks for confirmation before proceeding. NFS clients
can access the Data Domain system when the client list is empty. Role required:
admin, limited-admin.
Note
In interactive mode, the system will prompt the user with the following warning
message:
This command will delete all exports and client configurations.
Do you want to proceed? (yes|no) [no]
nfs show
nfs show active [tenant-unit tenant-unit]
List clients active in the past 15 minutes and the mount path for each. Optionally, list
NFS clients assigned to a tenant-unit. Role required: admin, limited-admin, user,
backup-operator, security, tenant-user, tenant-admin.
284 EMC Data Domain Operating System 6.0 Command Reference Guide
nfs
Note
The NFS data path security feature filters the Linux 'showmount' output on the client
to match the client permissions in the export list. The system displays only the client's
activity.
Argument definitions
tenant-unit (Optional)
The basic unit of a multi-tenancy configuration. A tenant unit is a secure, isolated
partition for tenant-specific data and control flow within a Data Domain system.
Note
The NFS data path security feature filters the Linux showmount output on the client
to match the client permissions in the export list; the system does not display output
that is not relevant to the client.
When you run the showmount command with the tenant-unit hostname, you see only
the exports that tenant-unit owns.
std-dev
The standard deviation for time to complete operations, derived from the mean
time.
max
The maximum time taken for a single operation.
min
The minimum time taken for a single operation.
2ms
The number of operations that took 2 ms or less.
4ms
The number of operations that took between 2ms and 4ms.
6ms
The number of operations that took between 4ms and 6ms.
8ms
The number of operations that took between 6ms and 8ms.
10ms
The number of operations that took between 8ms and 10ms.
100ms
The number of operations that took between 10ms and 100ms.
1s
The number of operations that took between 100ms and 1 second.
10s
The number of operations that took between 1 second and 10 seconds.
>10s
The number of operations that took over 10 seconds.
nfs status
nfs status
Enter this option to determine if the NFS system is operational. When the filesystem is
active and running, the output shows the total number of NFS requests since the
filesystem started, or since the last time that the NFS statistics were reset.
286 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 31
ntp
The ntp command synchronizes a Data Domain system with an NTP time server,
manages the NTP service, or turns off the local NTP server.
A Data Domain system can use a time server supplied through the default multicast
operation, received from Dynamic Host Configuration Protocol (DHCP), or set
manually with the Data Domain system ntp add command.
This chapter contains the following topics:
ntp 287
ntp
ntp add
ntp add timeserver server-name
Add a remote time server hostname to the NTP timeserver list. Role required: admin,
limited-admin. This command option requires security officer authorization for
Retention Lock Compliance systems.
Example 146
ntp del
ntp del timeserver server-name
Delete a manually added time server hostname from the NTP server list. Role required:
admin, limited-admin. This command option requires security officer authorization for
Retention Lock Compliance systems.
Example 147
To delete an NTP time server named srvr26.yourcompany.com from the list, enter:
ntp disable
ntp disable
Disable NTP service on a Data Domain system. Role required: admin, limited-admin.
This command option requires security officer authorization for Retention Lock
Compliance systems.
288 EMC Data Domain Operating System 6.0 Command Reference Guide
ntp
ntp enable
ntp enable
Enable NTP service on a Data Domain system. Role required: admin, limited-admin.
This command option requires security officer authorization for Retention Lock
Compliance systems.
ntp reset
ntp reset
Reset the NTP configuration to the default settings. Role required: admin. This
command option requires security officer authorization for Retention Lock Compliance
systems.
ntp reset timeservers
Reset the time server list from manually entered time servers to DHCP time servers (if
supplied) or to the multicast mode (if no DHCP time servers supplied). Role required:
admin, limited-admin. This command option requires security officer authorization for
Retention Lock Compliance systems.
ntp show
ntp show config
Display whether NTP is enabled or disabled and show the time server list. Role
required: admin, limited-admin, security, user, backup-operator, or none.
ntp status
ntp status
Display the local NTP service status, time, and synchronization information. Role
required: admin, limited-admin, security, user, backup-operator, or none.
290 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 32
qos
The qos command displays, modifies, or resets the value of the Random I/O throttle.
This chapter contains the following topics:
qos 291
qos
qos randomio
qos randomio throttle reset
Reset the Random I/O throttle to its default value of 40 percent. Role required: admin,
limited-admin, security, user, backup-operator, or none.
qos randomio throttle set percent
Set the Random I/O throttle to a percent value from 1 to 100, where 1 allocates the
fewest resources for Random I/O workloads and 100 allocates the most resources.
Role required: admin, limited-admin, security, user, backup-operator, or none.
qos randomio throttle show
Display the current value of the Random I/O throttle. Role required: admin, limited-
admin, security, user, backup-operator, or none.
292 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 33
quota
The quota command lets you modify the amount of storage space for MTrees and for
VTL and DD Boost storage units. There are two quota limits: hard and soft. The hard
limit prevents writes from exceeding the quota. An error message is issued if the hard
limit is exceeded. The soft limit allows writes to exceed the quota. However, an alert is
generated if this happens. The soft limit value must be less than the hard limit value.
Quota limit values must be specified as integers.
You can set a hard limit, a soft limit, or both, depending on your requirements. For
example, an administrator may choose to enforce only a soft limit to prevent overnight
backup jobs from failing when the quota limit is reached. Or the administrator may
choose to enforce only a hard limit to block a user from writing when the quota limit is
reached.
Snapshots capture quota information at a precise point in time. Usage tracking in the
active file system does not account for the space of a snapshot, so quota limits are
not enforced on snapshots.
This chapter contains the following topics:
quota 293
quota
quota capacity
quota capacity disable
Disable capacity quota. Also disables MTree quota limits and restores the limits to the
default state (unlimited). Role required: admin, limited-admin.
quota capacity enable
Enable capacity quota. Role required: admin, limited-admin.
quota capacity reset { all | mtrees mtree-list | storage-units
storage-unit-list } [soft-limit] [hard-limit]
Reset capacity quota limits. Both the mtree-list and the storage-unit-list are colon-
separated lists. If hard or soft limits are not entered, both are reset to the default
state (unlimited). Role required: admin, limited-admin.
To set a soft limit quota of 10 GiB on MTree /data/col1/backup1 when the quota
feature is disabled:
294 EMC Data Domain Operating System 6.0 Command Reference Guide
quota
To set a soft limit quota of 100 GiB and a hard limit quota of 1 TiB on MTree /data/
col1/backup1:
To set a soft limit quota of 100 GiB and a hard limit quota of 1 TiB on storage-unit
DDBOOST_STRESS_SU:
quota disable
quota disable - deprecated
This command is deprecated. Use quota capacity disable instead. Role
required: admin, limited-admin.
quota enable
quota enable - deprecated
This command is deprecated. Use quota capacity enable instead. Role required:
admin, limited-admin.
quota reset
quota reset - deprecated
This command is deprecated. Use quota capacity reset instead. Role required:
admin, limited-admin.
quota set
quota set - deprecated
This command is deprecated. Use quota capacity set instead. Role required:
admin, limited-admin.
quota show
quota show - deprecated
This command is deprecated. Use quota capacity show instead. Role required:
admin, limited-admin, security, user, backup-operator, none, tenant-admin, tenant-
user.
quota status
quota status - deprecated
This command is deprecated. Use quota capacity status instead. Role required:
admin, limited-admin, security, user, backup-operator, none.
quota streams
quota streams reset storage-units storage-unit-list [write-
stream-soft-limit] [read-stream-soft-limit] [repl-stream-soft-
limit] [combined-stream-soft-limit] [hard-stream-limit n]
Reset streams quota soft limits. The storage-unit-list is a colon-separated list. Note
that this command controls the same stream limits as ddboost storage-unit
modify. Role required: admin, limited-admin.
Example 148
Example 149
296 EMC Data Domain Operating System 6.0 Command Reference Guide
quota
Example 150
When SMT is enabled and tenant-units exist, this example displays filtering by tenant-
unit tu1.
Tenant-unit: tu1
Storage Unit Write Streams Read Streams Repl Streams Combined Streams
Soft-Limit Soft-Limit Soft-Limit Soft-Limit
------------ ------------- ------------ ------------ ----------------
su1 none none none none
su2 none none none none
------------ ------------- ------------ ------------ ----------------
DD System Stream Limits: write=16 read=4 repl-in=20 repl-out=20 combined=16
Example 151
When SMT is enabled and tenant-units exist, but not all storage-units are contained in
tenant-units, this example displays streams quotas for all storage-units, where some
storage-units are in tenant-units, and some storage-units are not in any tenant-unit.
Storage Unit Write Streams Read Streams Repl Streams Combined Streams
Soft-Limit Soft-Limit Soft-Limit Soft-Limit
------------ ------------- ------------ ------------ ----------------
su4 none none none none
su5 none none none none
su6 none none none none
------------ ------------- ------------ ------------ ----------------
Tenant-unit: tu1
Storage Unit Write Streams Read Streams Repl Streams Combined Streams
Soft-Limit Soft-Limit Soft-Limit Soft-Limit
------------ ------------- ------------ ------------ ----------------
su1 none none none none
su2 none none none none
------------ ------------- ------------ ------------ ----------------
Tenant-unit: tu2
Storage Unit Write Streams Read Streams Repl Streams Combined Streams
Soft-Limit Soft-Limit Soft-Limit Soft-Limit
------------ ------------- ------------ ------------ ----------------
su3 none none none none
------------ ------------- ------------ ------------ ----------------
DD System Stream Limits: write=16 read=4 repl-in=20 repl-out=20 combined=16
298 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 34
replication
EMC Data Domain Replicator lets you replicate data (copy and synchronize) between
two Data Domain systems: a source and a destination. Source and destination
configurations, or pairs, are also known as “contexts.” Depending on your objective,
you can replicate entire sites, specific directories, MTrees, or files. Replication is a
licensed software option. See the EMC Data Domain Operating System Administration
Guide for details on replication practices and procedures.
This chapter contains the following topics:
replication 299
replication
replication abort
replication abort recover destination
300 EMC Data Domain Operating System 6.0 Command Reference Guide
replication
Stop a recover process. Run this on the destination Data Domain system only. Then,
reconfigure replication on the source Data Domain system and restart the recover
process. Role required: admin, limited-admin.
replication abort resync destination
Stop a resync operation. Run this on the source or destination Data Domain system. In
case of a directory replication context, run it both on the source and the destination.
Role required: admin, limited-admin.
replication add
replication add source source destination destination [low-bw-
optim {enabled | disabled}] [encryption {enabled |
[authentication-mode {one-way | two-way | anonymous |
disabled}] [propagate-retention-lock {enabled | disabled}]
[ipversion {ipv4 | ipv6}] [max-repl-streams n] [destination-
tenant-unit tenant-unit]
Create a replication pair, which can be for Collection, MTree, or Directory Replication.
If the destination exists, you will get an error, and you must either delete it or rename
it before proceeding. If a source or destination name does not correspond to a Data
Domain network name, run replication modify connection-host on the
source system. When entering names that include spaces or special characters,
enclose the entire pathname with double quotation marks, or enter a backslash before
the space, but do not use both. A file or a directory may not be renamed or moved into
or out of a source. This includes a “cut” operation followed by a “paste” operation in
Windows. After replication is initialized, ownership and permissions of the destination
are always identical to those of the source. If the context is configured, the
destination is kept in a read-only state and can receive data only from the source. Role
required: admin, limited-admin.
l The storage capacity of the destination system must be equal to, or greater than,
that of the source system. If the destination capacity is less than that of the
source, the available capacity on the source is reduced to that of the destination.
l The destination must have been destroyed and subsequently created, but not
enabled.
l Each destination and each source can be in only one context at a time.
In this example, notice the prefix col to the URL signifying Collection Replication. The
source hostname is system-dd1, and the destination hostname is system-dd2.
# replication add source col://system-dd1.chaos.local destination
col://system-dd2.chaos.local
l You can “reverse” the context for an MTree Replication, that is, you can switch
the destination and the source.
l Subdirectories within an MTree cannot be replicated, because the MTree, in its
entirety, is replicated.
In this example, notice the prefix mtree to the URL signifying MTree Replication. The
source MTree path is /data/col1/mtree1, the destination MTree path is /data/
col1/dstmtree1, the maximum number of replication streams is 6, and the
destination Tenant Unit is tu1.
# replication add source mtree://system-dd1.chaos.local/data/col1/
mtree1 destination mtree://system-dd2.chaos.local/data/col1/dstmtree1
max-repl-streams 6 destination-tenant-unit tu1
l The destination Data Domain system must have available storage capacity of at
least the post-compressed size of the expected maximum post-compressed size
of the source directory or MTree.
l When replication is initialized, a destination directory is created automatically.
l A Data Domain system can simultaneously be the source for one context and the
destination for another context.
In this example, notice the prefix dir to the URL signifying Directory Replication. The
source directory name is dir1, and it resides in the /backup MTree (the default
MTree).
# replication add source dir://system-dd1.chaos.local/backup/dir1
destination dir://system-dd2.chaos.local/backup/dir1
Argument Definitions
authentication-mode {anonymous | one-way | two-way | disabled}
Lets you choose an authentication-mode. If the mode is not specified, anonymous
is the default. One-way indicates that only the destination certificate is certified.
Two-way indicates that both the source and destination certificates are verified.
Note
destination-tenant-unit tenant-unit
Lets you specify a Tenant Unit only on the destination.
302 EMC Data Domain Operating System 6.0 Command Reference Guide
replication
max-repl-streams n
The maximum number of replication streams allowed, which must be between 1
and the maximum streams per context for a given Data Domain system model,
and is supported only for MTree Replication.
replication break
replication break {destination | all}
Remove the source or destination Data Domain system from a replication pair, or
remove all Replicator configurations from a Data Domain system. The all option
breaks all the replication contexts on the system without individual confirmation
prompts. Role required: security for Retention Lock Compliance systems; admin and
limited-admin for all other systems.
replication dir-to-mtree
replication dir-to-mtree abort source
Abort the directory-to-MTree migration process for the specified context. The
command stops the ongoing migration and performs the necessary cleanup. When the
process is complete, the MTree replication context and the associated MTrees on
both source and destination system are deleted. Role required: admin, limited-admin.
replication dir-to-mtree start from source to destination
Perform the directory-to-MTree migration from the directory replication context to
the MTree replication context. Role required: admin, limited-admin.
replication dir-to-mtree status [source | all]
Shows you the status of the directory-to-MTree replication for the specified context
or contexts. This command allows you to instantly see the status of fastcopy or
replication initialization operations. Role required: admin, limited-admin.
replication disable
replication disable {destination | all}
Disable replication. Run this on the source or destination system to halt data
replication temporarily. If run on the source, the operation stops sending data to the
destination. If run on the destination, the operation stops serving the active
connection from the source. Role required: security for Retention Lock Compliance
systems; admin, limited-admin for all other systems.
replication enable
replication enable {destination | all}
Restart replication. If run on the source, the operation resumes sending data to the
destination. If run on the destination, the operation resumes serving the active
connection from the source. Role required: admin, limited-admin.
replication initialize
replication initialize destination
Initialize replication. Run this on the source to start replication between a source and
destination and to verify that configuration and connections, including checking for a
matching tenant on both sides if a destination-tenant-unit was set for this context.
Error messages are returned if problems appear. Initialization can take several hours,
or days, depending on the amount of data in the source. To reduce initialization time,
consider placing both Data Domain systems of the replicator pair in the same location
with a direct link. The destination variable is required. Key-manager settings on a
destination are ignored when users set up and initialize a collection replication pair.
The keys are copied to the replica, but key-manager settings are not. If the destination
is configured with key-manager settings prior to becoming the replication destination,
the settings remain on the system but are not used. If a collection replication breaks,
you must reconfigure the destination to use the correct key-manager settings and key
class. EMC recommends resetting the key-manager on the destination prior to
collection replication, and then configuring the destination with the correct key
manager-server and key class after a collection replication is broken. Role required:
admin, limited-admin.
replication modify
replication modify destination {source-host | destination-host}
new-host-name
Modify the source or destination host name. In this case, you must modify the
replication configuration on both the source and the destination; that is, if the host
name that changed was the destination, you must run replication modify on both the
destination and the source so both sides will be updated. The new-host-name must be
the name returned by net show hostname on the system receiving the new host.
When using replication modify, always run filesys disable or
replication disable first, and conclude with filesys enable or
304 EMC Data Domain Operating System 6.0 Command Reference Guide
replication
replication enable. Then, run replication show config to make sure all
changes were done. Role required: admin, limited-admin.
replication modify destination connection-host new-host-name
[port port]
Modify the destination host name, when it does not resolve for the connection, to a
new host name or IP address. You may also specify an optional port number. This
action may be required when a connection passes through a firewall. It is definitely
required when connecting to an alternate listen-port on the destination. It may also be
required after adding a new source and destination pair, or after renaming a source or
a destination. Role required: admin, limited-admin.
Example 155
If local destination ca.company.com is moved from California to New York, run the
following on both the source and the destination:
# replication disable
# replication modify dir://ca.company.com/backup/dir2 destination-
host ny.company.com
# replication enable
# replication show config
Example 156
Modify the number of maximum replication streams allowed, which must be between 1
and the maximum streams per context for a given Data Domain system model, and is
supported only for MTree Replication. Role required: admin, limited-admin.
Example 157
replication option
replication option reset {bandwidth | delay | listen-port |
default-sync-alert-threshold}
Reset system bandwidth, delay, listen port, and sync-alert-threshold to default values.
Defaults are bandwidth, unlimited; delay, none; listen-port, 2051. Default for
sync-alert-threshold is 24 (hours). When using replication option
reset, always run filesys disable first, and conclude with filesys enable.
Role required: admin, limited-admin.
replication option set bandwidth rate
Set the network bandwidth rate for the Data Domain system. You must set the
bandwidth and network delay on each side of the connection. Role required: admin,
limited-admin.
replication option set default-sync-alert-threshold value
Set the sync time to configure when an alert is generated. The sync time is set in
hours. The default value is 24. Role required: admin, limited-admin.
replication option set delay value
Set the network delay in milliseconds for the Data Domain system. You must set the
bandwidth and network-delay on each side of the connection. Role required: admin,
limited-admin.
replication option set listen-port value
Set the listen port for the Data Domain system. On a destination Data Domain system,
set the port from which the destination receives data from replication sources (the
default is 2051). A destination can have only one listen port used by all sources. The
connection-host port used by a source must match the listen port used by the
destination. For DD Boost managed file replication, the listen port is used on the
source Data Domain system and on the destination Data Domain system to specify the
connection-host port. For directory replication, replication modify
connection-host is used on the source Data Domain system. Role required: admin,
limited-admin.
replication option show
Display the current bandwidth, network-delay settings, listen port, and sync-alert-
threshold. If these settings are configured using default values, replication
option show returns a command prompt with no setting information. Role required:
admin, limited-admin, security, user, backup-operator, none.
replication reauth
replication reauth destination
Reset authentication on the source and destination systems. The destination variable
is required. Messages similar to Authentication keys out of sync or Key
306 EMC Data Domain Operating System 6.0 Command Reference Guide
replication
replication recover
replication recover destination
Recover replication. Run this on a new source to move data from a destination system.
If configuring collection replication, this must be run on the new source only. The
destination argument is required. This is not available for MTree replication. When
using replication recover, always run filesys disable first, and conclude
with filesys enable. If replication break was previously run, the destination
cannot be used to recover a source. If configuring directory replication, the
destination directory on the source must be empty. Role required: admin, limited-
admin.
replication resync
replication resync destination
Bring back into sync (or recover) the data between a source and destination
replication pair after a manual break. The replication pair are resynchronized so both
endpoints contain the same data. Resynchronization is available for Directory, MTree
or Pool Replication, but not for Collection Replication.
Before running replication resync, you must run replication add to add the
source and destination back on the system.
A replication resynchronization can also be used:
l To recreate a context that has been deleted.
l When a destination runs out of space, but the source still has data to replicate.
l To convert a Directory Replication pair to an MTree Replication pair.
Note the following about using replication resync with DD Retention Lock:
l If the destination MTree or directory contains retention-locked files that do not
exist on the source, then resync will fail.
l If the destination directory has retention lock enabled, but the source directory
does not have retention lock enabled, then a resync of a directory replication will
fail.
l With MTree replication, resync will succeed if the source MTree does not have
retention lock enabled while the destination MTree has retention lock enabled or
vice versa, as long as the destination MTree does not contain retention-locked
files not present on the source.
Role required: admin, limited-admin.
replication show
replication show config [destination | tenant-unit tenant-unit
| all]
Show replication configuration. Role required: admin, limited-admin, security, user,
backup-operator, none, tenant-user, tenant-admin.
Output Definitions
Connection Host and Port
A source system connects to the destination system using the name returned by
the hostname command on the destination. It may also connect using a
destination name or IP address and port designated by replication modify
connection-host. The destination hostname may not resolve to the correct IP
address when connecting to an alternate interface on the destination, or when
passing through a firewall.
Ipversion
The IP version - either IPv4 or IPv6.
Low-bw-optim
The status of low-bandwidth optimization: enabled, disabled, or configuration
mismatch.
Crepl-gc-bw-optim
The status of Collection Replication bandwidth optimization: enabled, disabled.
The default value is enabled. Disable this optimization to enhance throughput in a
high bandwidth environment.
Encryption
The replication process is enabled and available for encryption (yes) or disabled
and not available for encryption (no).
Enabled
The replication process is enabled and available to replicate data (yesde) or
disabled and not available to replicate data (no).
Propagate-retention-lock
The retention lock process is available (enabled) or not available (disabled).
Max-repl-streams
The maximum number of replication streams allowed.
308 EMC Data Domain Operating System 6.0 Command Reference Guide
replication
Sync-as-of Time
The time when the most recently replicated data on the destination was
generated on the source. A value of unknown appears during replication
initialization.
Compression ratio
The ratio of the value of logical bytes ingested to the source to physical bytes
actually sent to the destination over the wire.
Sync'ed-as-of Time
The time when the most recently replicated data on the destination was
generated on the source. A value of unknown appears during replication
initialization.
Low-bw-optim
The additional compression ratio supplied by delta compression (low-bandwidth
optimization.
Sync-as-of Time
The time when the most recently replicated data on the destination was
generated on the source. A value of unknown appears during replication
initialization.
310 EMC Data Domain Operating System 6.0 Command Reference Guide
replication
values from all the threads that worked on behalf of the replication context, and
dividing this sum with the number of threads that worked on behalf of the context.
When a replication throttle is configured, you may see a large amount of output
followed by a period of none while viewing performance or statistics. This behavior is
the result of how statistics are calculated by replication, combined with the default
Data Domain system replication configuration of using large TCP buffers. When a
throttle is in effect, data is buffered before being sent on the network. Users may
configure the replication bandwidth and delay arguments in replication option
reset on the source and destination to use smaller TCP socket buffers. This reduces
the total amount of data on the network, increases how often replication writes data
to its sockets, and, as a result, increases the frequency of updates for statistics
counters. Role required: admin, limited-admin, security, user, backup-operator, none,
tenant-user, tenant-admin.
Output Definitions
Pre-comp (KB/s)
The size value before compression is applied. Sometimes referred to as logical
size.
Network (KB/s)
The amount of compressed data transferred over the network per second.
Streams
An internal system resource associated with reads and writes. One replication
context can use multiple streams for better performance.
Busy Reading
The time spent reading file system data from the local file system. This number is
typically the second highest number after Network. On a deployment with high
network bandwidth, Busy Reading may be the largest column.
Busy Meta
The time spent on miscellaneous bookkeeping activities and replicating file system
namespace operations. This value is typically under 50. If this value exceeds 50 on
a sustained basis, it may indicate an unusual workload (a large number of file
attribute updates, for example).
Waiting Dest
The time spent waiting because the receiver is not providing the sender enough
information on what data to send. Typically this value is low. Exceptions include
systems on high-speed networks where the sender is a more powerful Data
Domain system than the replica, or where the replica has a higher workload than
the sender because the replica is the destination for multiple replication contexts.
Waiting Network
The time spent sending file data and metadata and waiting for replies from the
server on what data needs to be sent. This is typically the highest of the four
values. This value exceeds 100 regularly if the sender is able to replicate multiple
files in parallel.
Note
If the Network column has the highest time values among Reading, Meta, Waiting, and
Network, and if the Network KB/sec value is lower than expected, a network problem
may be present. For example, packet loss may be causing reduced throughput.
Compression ratio
The ratio of the value of logical bytes ingested to the source to physical bytes
actually sent to the destination over the wire.
Sync'ed-as-of time
The time when the most recently replicated data on the destination was
generated on the source. A value of Unknown appears during replication
initialization.
replication status
replication status [destination | tenant-unit tenant-unit |
all] [detailed]
Show the current status of replication. Role required: admin, limited-admin, security,
user, backup-operator, none, tenant-user, tenant-admin.
Example 158
312 EMC Data Domain Operating System 6.0 Command Reference Guide
replication
replication sync
replication sync [and-verify] [destination]
Synchronize replication between the source and destination and wait for replication to
complete. You must first configure the source and destination and initialize the
context. Role required: admin, limited-admin, security, backup-operator.
replication throttle
replication throttle add [destination host | default] sched-
specrate
Change the rate of network bandwidth used by replication. By default, network
bandwidth use is unlimited, meaning it continuously runs as fast as possible. If you set
a throttle, replication runs at the given rate until the next scheduled change, or until
new throttle command options force a change. Throttle is usually set at the source
Data Domain system, but can optionally be set at the destination. Role required:
admin, limited-admin.
To limit replication to 5 megabits per second for a destination Data Domain system
named ddr1-ny, starting on Tuesdays and Fridays, at 10:00 a.m., enter:
Show throttle configuration. If no option is specified, all is the default option. Role
required: admin, limited-admin, security, user, backup-operator, none.
replication throttle show performance [destination host |
default | all] [interval sec] [count count}
Show current throttle throughput for an optionally specified number of times and
interval. If no option is specified, all is the default option. Role required: admin, limited-
admin, security, user, backup-operator, none.
To specify that results be shown exactly 7 times, at 2 second intervals (for a total of
14 seconds), enter:
# replication throttle show performance all interval 2 count
710/16 10:15:18
usr1-dl.datadomain
[8000K bps]
---------
(0 bps)
(0 bps)
(0 bps)
(0 bps)
(0 bps)
(0 bps)
(0 bps)
SE@usr1-dd1## date
Wed Oct 16 10:15:34 PDT 2013
Argument Definitions
all
Removes and resets current or override settings and removes all scheduled
changes. This option returns the system to the default settings.
count
The number of times the results will be shown. The default is unlimited (the
command will run until it is ended by the user).
current
Removes and resets the rate set by a previous replication throttle set
current.
host
The destination hostname when you are setting up a destination throttle.
override
Removes and resets the rate set by a previous replication throttle set
override.
rate
The rate, which can be the word unlimited; or a number; or disable, disabled, or
zero (any of the last three will stop replication until the next rate change). If set
to zero, new contexts are also throttled to zero. The system enforces a minimum
rate of 98,304 bits per second (about 100 Kbps) and a maximum of
34,358,689,792 bits per second (about 34 Gbps). The number can include a tag
for bits or bytes per second. Do not use a space between the number and the bits
or bytes specification. The default rate is bits per second. In the rate variable:
l bps equals raw bits per second
l Kbps or kbps equals 1000 bits per second
314 EMC Data Domain Operating System 6.0 Command Reference Guide
replication
sched-spec
One or more three-letter days of the week (such as mon, tue, or wed), or the
word daily (to set the schedule every day). This argument can also specify a
time of day in 24-hour format.
schedule
Removes and resets scheduled changes.
sec
The number of seconds for the interval between displaying the results. The
default is five seconds.
replication watch
replication watch destination
Display the progress of a replication initialization, resynchronization process, or
recovery operation. Role required: admin, limited-admin, security, user, backup-
operator, none.
Example 159
During initialization:
316 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 35
route
route 317
route
route add
route add [ipversion {ipv4 | ipv6}] <route spec>
The IPv4 route spec syntax is: ipv4address [netmask] [gw gateway]
The IPv6 route spec syntax is: ipv6address [gw gateway]
Add an IPv4 or IPv6 static route for a network or network host. Role required: admin,
limited-admin.
route add [ipversion {ipv4 | ipv6}] [type {fixed | floating}]
<route spec>
Add a fixed or floating static route in a high-availability (HA) system. Role required:
admin, limited-admin.
route add gateway ipv4address [interace name]
318 EMC Data Domain Operating System 6.0 Command Reference Guide
route
Add a gateway address to the list of gateway addresses on the Data Domain system.
Optionally specify a specific interface to associate with the gateway address. If the
gateway is unreachable, the system displays a warning, but still adds the gateway.
Role required: admin, limited-admin.
Argument Definitions
fixed
Specifies that the static route is fixed.
floating
Specifies that the static route is floating.
gw gateway
Specifies the IP address of the gateway to use to reach the destination network
or host. If no gateway is specified, the route uses the default gateway.
ipv4address
Specifies the IPv4 address for the destination network or host. If no gateway is
specified, the command fails if the destination host is not found on the local
network or through the default gateway.
ipv6address
Specifies the IPv6 address for the destination network or host. If no gateway is
specified, the command fails if the destination host is not found on the local
network or through the default gateway.
ipversion ipv4
Specifies that the new route is for IPv4routing. If this is omitted, the route is
applied to the IPv4 routing table if it is valid.
ipversion ipv6
Specifies that the route is for IPv6routing. This argument is not required when an
IPv6 address is specified.
-netmask
Specifies the network mask that applies to the destination network or network
host.
type
Specifies the type of static route is either a fixed or floating IP.
Example 160
This example adds an IPv4 route to network 192.168.1.0 with netmask 255.255.255.0
using the srvr12 gateway.
Example 161
This example adds an IPv4 route to a host named user24 through the srvr12 gateway.
route del
route del [ipversion {ipv4 | ipv6}] <route spec>
The IPv4 route spec syntax is: ipv4address [netmask] gw gateway
The IPv6 route spec syntax is: ipv6address gw gateway
Delete an IPv4 or IPv6 static route for a network or network host. Role required:
admin, limited-admin.
route del gateway {ipv4address | routing-table-name name
Deletes the specified gateway, along with its associated route entries and route rules.
Role required: admin, limited-admin.
Argument Definitions
gw gateway
Specifies the IP address of the gateway used to reach the destination network or
host.
ipv4address
Specifies the IPv4 address of the destination network or host.
ipv6address
Specifies the IPv6 address of the destination network or host.
ipversion ipv4
Specifies that the route is an IPv4 route. If this is omitted, the route is deleted
from the IPv4 routing table.
ipversion ipv6
Specifies that the route is an IPv6 route. If this is omitted, the route is deleted
from the IPv4 routing table.
-netmask
Specifies the network mask that applies to the destination network or network
host.
Example 162
route reset
route reset gateway [ipversion {ipv4 | ipv6}]
320 EMC Data Domain Operating System 6.0 Command Reference Guide
route
Delete the configured routing gateway for the specified protocol. If no protocol is
specified, the IPv4 gateway configuration is deleted. Role required: admin, limited-
admin.
route set
route set gateway {ipaddr | ipv6addr}
Configure the IP address for the IPv4 or IPv6 default gateway. When the default
gateway is added or changed, the Data Domain operating system automatically adds a
route to default gateway for each interface with the same subnet. Role required:
admin, limited-admin.
Note
When configuring an IPv6 address, a command failure might not produce an error
message in the CLI. If the new gateway is not visible using the route show
gateway and route show table commands, check the messages log file for
information on why the command failed.
Example 163
The following example configures the device at 192.168.10.1 as the default IPv4
gateway.
route show
route show config [routing-table-name name]
Display the configured static routes. Role required: admin, limited-admin, security,
user, backup-operator, or none.
route show gateways [detailed] [ipversion {ipv4 | ipv6}]
[<ipv4addr>]
Displays the configured or DHCP-supplied IPv4 and IPv6 gateways as specified. The
detailed option displays the network interface or type, associated routing tables,
interface addresses, and owners if applicable. If no IP version is specified, both
gateways are displayed. Role required: admin, limited-admin, security, user, backup-
operator, or none.
route show tables [table-name-list | gateway ipv4addr |
ipversion {ipv4 | ipv6}]
Displays the IPv4 and IPv6 routing tables as specified. If no IP version is specified,
both tables are displayed. Role required: admin, limited-admin, security, user, backup-
operator, or none.
route show [ipversion {ipv4 | ipv6}] [type {fixed | floating}]
Displays the type of IP address as specified.
route trace
route trace ipv4addr | ipv6addr | {hostname [ipversion {ipv4 |
ipv6}]}
Display a route used by a Data Domain system to connect with the specified
destination. Role required: admin, limited-admin, security, user, backup-operator, or
none.
Example 164
322 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 36
scsitarget
The scsitarget command manages the SCSI (Small Computer System Interface)
target subsystem configuration on single-node DD systems and on systems using
Extended Retention.
The SCSI target subsystem configuration comprises several SCSI target entities:
l services (VTL, DD Boost, and vdisk)
l transports (Fibre Channel)
l transport endpoints (Fibre Channel port)
l endpoints (such as VTL tape drives)
l logical devices
l host initiators
l access groups
In some cases, mostly group management, individual services provide interfaces more
tailored to the service, for example, vtl group. These services may be more
convenient for daily use than the generic scsitarget interface.
This chapter contains the following topics:
scsitarget 323
scsitarget
scsitarget device
scsitarget device show detailed [device-spec] [service service-
name] [group group-spec]
Show detailed information for SCSI target or vdisk devices. Role required: admin,
limited-admin, security, user, backup-operator, none.
scsitarget device show list [device-spec] [service service-
name] [group group-spec]
List summary information for SCSI target or vdisk devices. If no arguments are
selected, the output includes basic information for all device criteria, including vdisk
devices. Role required: admin, limited-admin, security, user, backup-operator, none.
Argument Definitions
device-spec
A list of devices that may use wildcards. This can be a vdisk device-spec.
group-name
The name of the SCSI target access group. These names are case-insensitive and
case-preserving. They cannot include colons, question marks, commas, asterisks,
forward or backward slashes, open or closed parentheses, or the words
summary, all, or VTL.
service-name
A SCSI target service: vtl, ddboost, or vdisk.
scsitarget disable
scsitarget disable
Disable the SCSI target subsystem. Role required: admin, limited-admin.
scsitarget enable
scsitarget enable
Enable the SCSI target subsystem. Role required: admin, limited-admin.
scsitarget endpoint
scsitarget endpoint add endpoint-name system-address address
[primary-system-address address] [secondary-system-address
{address-list | none}] [wwpn {auto | wwpn}] [wwnn {auto |
wwnn}] [fcp2-retry {disable | enable | default}]
Add a SCSI target endpoint. For the Fibre Channel transport, NPIV must be enabled to
have more than one endpoint per system address. Endpoints are added as disabled;
they must be explicitly enabled using scsitarget endpoint enable. This allows
other properties of the endpoint to be changed before enabling the endpoint. Role
required: admin, limited-admin.
324 EMC Data Domain Operating System 6.0 Command Reference Guide
scsitarget
Note
Note
When using NPIV, it is recommended that you use only one protocol (that is, VTL
Fibre Channel, DD Boost-over-Fibre Channel, or vDisk Fibre Channel) per endpoint.
For failover configurations, secondary endpoints should also be configured to have the
same protocol as the primary.
Example 165
Note
When using NPIV, it is recommended that you use only one protocol (that is, VTL
Fibre Channel, DD Boost-over-Fibre Channel, or vDisk Fibre Channel) per endpoint.
For failover configurations, secondary endpoints should also be configured to have the
same protocol as the primary.
Example 166
The following example sets the primary system address endpoint-fc-1 to 5a and the
secondary system address to 6a,6b and verifies both addresses. Note that the
system-address is changed in this case because the current system address is set to
the new primary system address as part of the change.
# scsitarget endpoint modify endpoint-fc-1 system-address "5a"
secondary-system-address "6a,6b"
Endpoint 'endpoint-fc-1' successfully modified.
Example 167
The following example changes the primary system address of a failed-over endpoint
so that on failback it moves to a different port.
# scsitarget endpoint modify endpoint-fc-1 primary-system-address "8a"
Endpoint 'endpoint-fc-1' successfully modified.
Example 168
326 EMC Data Domain Operating System 6.0 Command Reference Guide
scsitarget
Example 169
Example 170
Argument Definitions
count
The number of objects on which to perform the action, as specified by the
command option.
endpoint-name
The name of the endpoint (which, in a SCSI target architecture, corresponds to a
virtual port on a DD system). The name must not conflict with any other endpoint
name currently in the system.
endpoint-spec
A list of endpoints (which, in a SCSI target architecture, corresponds to a virtual
port on a DD system) that may use wildcards.
fcp2-retry
A port option.
interval interval
The time interval in seconds. The default is 2 seconds.
primary-system-address
The primary system address for the endpoint. The primary and any secondary
system address must be different. The current system address must always be in
the set of primary and secondary addresses.
secondary-system-address
The secondary system address for the endpoint. The primary and any secondary
system address must be different. if the endpoint is failed-over, the current
system address must remain in the secondary address list. if this is set to none,
the endpoint cannot failover. The current system address must always be in the
set of primary and secondary addresses. If multiple secondary addresses are
given, when failover occurs the system will automatically pick one of the
addresses from that list to make the current system address.
system-address
A system-specific name that identifies a specific SCSI target transport interface.
For the Fibre Channel transport, the system address is the name of the HBA (host
bus adapter) port used, for example, 5a. This name must match a currently valid
system address in the system. It must always be in the set of primary and
secondary addresses.
topology
The Fibre Channel topology for the endpoint. Values include: loop-preferred,
loop-only, point-to-point, default.
wwpn
The worldwide port name (WWPN) for the endpoint, which must follow existing
rules for WWPN conflict. If you do not provide a wwpn, and the transport uses
wwpn, it is assigned by default.
wwnn
The worldwide node name (WWNN) for the endpoint, which must follow existing
rules for WWNN conflict. If you do not provide a wwnn, and the transport uses
wwnn, it is assigned by default.
scsitarget group
scsitarget group add group-name device device-spec [lun lun]
[primary-endpoint {all | none | endpoint-list}] [secondary-
endpoint {all | none | endpoint-list}]
Add SCSI target or vdisk devices to a group. Role required: admin, limited-admin.
scsitarget group add group-name initiator initiator-spec
Add one or more initiators to a group. Role required: admin, limited-admin.
scsitarget group attach group-name device device-name lun lun
primary-endpoint {all | none | endpoint-list} secondary-
endpoint {all | none | endpoint-list}
Attach an additional LUN to a SCSI target or vdisk device in a group. This may be used
to expose a device with different LUNs through different endpoints. Role required:
admin, limited-admin.
scsitarget group create group-name service service-name
Create a new group associated with a specific service, which can be a vdisk service.
Role required: admin, limited-admin.
scsitarget group del group-name device device-spec
328 EMC Data Domain Operating System 6.0 Command Reference Guide
scsitarget
Delete one or more SCSI target or vdisk devices from a group. Role required: admin,
limited-admin.
scsitarget group del group-name initiator initiator-spec
Delete one or more initiators from a group. Role required: admin, limited-admin.
scsitarget group destroy group-name
Destroy a group. Role required: admin, limited-admin.
scsitarget group detach group-name device device-name lun lun
Detach a SCSI target or vdisk device from a LUN in a group. There must be at least
one LUN for a device in a group. Role required: admin, limited-admin.
scsitarget group modify group-name device device-spec [lun lun]
[primary-endpoint {all | none | endpoint-list}] [secondary-
endpoint {all | none | endpoint-list}]
Modify SCSI target or vdisk device attributes in a group. If a device is attached to
multiple LUNs, the lun argument, if specified, indicates which LUN to update. Role
required: admin, limited-admin.
scsitarget group rename src-group-namedst-group-name
Rename a group. Role required: admin, limited-admin.
scsitarget group show detailed [group-spec] [device device-
spec] [initiator initiator-spec] [service service-name]
Show detailed information on specific groups, based on selected arguments. Role
required: admin, limited-admin, security, user, backup-operator, none.
Example 171
Example 172
Argument Definitions
all
Shows all information about the object specified by the command option.
device-name
The name of the SCSI target or vdisk device. These names are case-insensitive
and case-preserving. They cannot include colons, question marks, commas,
asterisks, forward or backward slashes, open or closed parentheses, or the word
all.
device-spec
A list of devices that may use wildcards. This can be a vdisk device-spec.
group-name
The name of the SCSI target access group. These names are case-insensitive and
case-preserving. They cannot include colons, question marks, commas, asterisks,
forward or backward slashes, open or closed parentheses, or the words
summary, all, or VTL.
group-spec
A list of access groups that may use wildcards. This can be a vdisk group-spec.
initiator-spec
A list of initiators that may use wildcards.
lun
A device address to pass to the initiator. The maximum logical unit number (LUN)
is 16383. A LUN must be unique within a group, but need not be unique across the
system. LUNs for VTL devices within a group must start with zero and be
contiguous numbers.
primary-endpoint
The primary endpoint on which the SCSI target devices are visible. By default, or
if you specify all, SCSI target devices are visible on all ports. Specify none if
the devices should not be visible on any ports.
secondary-endpoint
The secondary endpoint on which the SCSI target devices are visible. By default,
the devices are visible on all ports. The secondary port list supports path
redundancy.
service-name
A SCSI target service: vtl, ddboost, or vdisk.
scsitarget initiator
scsitarget initiator add initiator-name system-address system-
address
Add an initiator with the specified system address. An initiator may be added before it
is visible on a port, which allows for early provisioning. Role required: admin, limited-
admin.
scsitarget initiator del initiator-spec
Delete an initiator. Note that if the initiator remains visible, it may be automatically
rediscovered. Role required: admin, limited-admin.
330 EMC Data Domain Operating System 6.0 Command Reference Guide
scsitarget
endpoint-spec
A list of endpoints (which, in a SCSI target architecture, corresponds to a virtual
port on a DD system) that may use wildcards.
group-spec
A list of access groups that may use wildcards. This can be a vdisk group-spec.
initiator-name
The name of SCSI target host initiator.
initiator-spec
A list of initiators that may use wildcards.
system-address
A system-specific name that identifies a specific SCSI target transport interface.
For the Fibre Channel transport, the system address is the name of the HBA (host
bus adapter) port used, for example, 5a. This name must match a currently valid
system address in the system. It must always be in the set of primary and
secondary addresses.
vsa
Volume set addressing (VSA). This method is used primarily for addressing virtual
buses, targets, and LUNs. The HP-UX operating system selects the volume set
addressing method based on inquiry data and LUN information returned by the
SCSI-3 REPORT LUNS command.
scsitarget option
scsitarget option reset {option-name | all}
Reset SCSI target global options. Role required: admin, limited-admin.
Note
Automatic failback is not guaranteed if all ports are disabled and then subsequently
enabled (which could be triggered by the administrator), as the order in which ports
get enabled is unspecified.
Note
Example 173
To set a delay of 60 seconds before starting failover and to perform automatic failback
when a port has been normal for 300 seconds:
# scsitarget option set failover-delay 60 automatic-failback enabled
failback-delay 300
failback-delay
A SCSI target global option, which is the time to wait before attempting
automatic failback when the interface is normal. The default is 120 seconds, the
minimum is 30 seconds, and the maximum is 600 seconds.
failover-delay
A SCSI target global option, which is the time to delay before performing a
failover. The default is 90 seconds, the minimum is 10 seconds, and the maximum
is 300 seconds.
option-name
List of SCSI target global options. One or more may be specified.
automatic-failback
332 EMC Data Domain Operating System 6.0 Command Reference Guide
scsitarget
failback-delay
failover-delay
scsitarget persistent-reservation
scsitarget persistent-reservation clear [device device-spec]
[initiator initiator-name]
Clear SCSI persistent reservations. Role required: admin, limited-admin.
Example 174
To clear all persistent reservations set by an initiator no longer visible to the system,
enter:
scsitarget port
scsitarget port connection-reset system-address-spec
Reset all connections for the given SCSI target port. Role required: admin, limited-
admin.
scsitarget port disable system-address-spec [failover-
endpoints]
Disable one or more SCSI target ports, along with any endpoints currently using that
port. If failover-endpoints is used, any endpoints that use the port for their primary
system address will be disabled or failed-over. Endpoints that are already disabled by
administrative operation prior to a port being disabled are remembered as manually
disabled. This state will be restored when that port is later enabled. Role required:
admin, limited-admin.
Example 175
Example 176
Example 177
Example 178
334 EMC Data Domain Operating System 6.0 Command Reference Guide
scsitarget
Example 179
System Address Link LIP Sync Signal Prim Seq Invalid Invalid
Failures Count Losses Losses Proto Errors Tx Words CRCs
--------------- -------- ----- ------ ------ ------------ -------- -------
5a 0 1 0 0 0 0 0
5b 0 2 0 0 0 0 0
--------------- -------- ----- ------ ------ ------------ -------- -------
Example 180
Example 181
To show I/O statistics every 30 seconds, two times, for system address 5a:
# scsitarget port show stats 5a interval 30 count 2
08/13 15:52:12
System Address Ctrl/s Read/s Read MiB/s Write/s Write MiB/s
-------------- ------ ------ ---------- ------- -----------
5a 0 10 5 0 0
-------------- ------ ------ ---------- ------- -----------
08/13 15:52:42
System Address Ctrl/s Read/s Read MiB/s Write/s Write MiB/s
-------------- ------ ------ ---------- ------- -----------
5a 0 10 5 0 0
-------------- ------ ------ ---------- ------- -----------
Argument Definitions
base-wwnn
The base worldwide node name (WWNN) for the port. This is used only when
NPIV is enabled for the port. Values are auto (default) or a valid WWNN.
base-wwpn
The base worldwide port name (WWPN) for the port. This is used only when
NPIV is enabled for the port. Values are auto (default) or a valid WWPN.
fcp2-retry
A port option.
npiv
Enables NPIV (N_Port ID Virtualization) support for the port. Values are auto
(default) or disabled. If set to disabled, NPIV is always disabled for the port. NPIV
is a Fibre Channel feature in which multiple Fibre Channel node port (N_Port) IDs
can share a single physical N_Port.
speed
The preferred link speed for the port. Values can be auto (default) or a number in
Gb/s (1, 2, 4, 8, or 16).
system-address-spec
A list of port system addresses that may use wildcards.
topology
The Fibre Channel topology for the endpoint. Values include: loop-preferred,
loop-only, point-to-point, default.
336 EMC Data Domain Operating System 6.0 Command Reference Guide
scsitarget
scsitarget reset
scsitarget reset detailed-stats
Reset detailed statistics for a SCSI target subsystem. Role required: admin, limited-
admin, security, user, backup-operator, none.
scsitarget service
scsitarget service refresh [service]
Refresh SCSI target service configuration. All services, including vdisk, within the
SCSI target system configuration will be re-created. Role required: admin, limited-
admin.
scsitarget service show list
Display a list of configured services, including vdisk, and current state. Role required:
admin, limited-admin, security, user, backup-operator, none.
Example 182
scsitarget show
scsitarget show config
Show SCSI target configuration. Role required: admin, limited-admin, security, user,
backup-operator, none.
scsitarget show detailed-stats
Show detailed statistics for the SCSI target subsystem. Role required: admin, limited-
admin, security, user, backup-operator, none.
scsitarget status
scsitarget status
Show SCSI target status.
l The administrative state shows the overall state of the SCSI target
subsystem.
l The process state shows if the SCSI target management process is currently
running.
l The module state shows if required system modules have been loaded prior to
starting the management process.
If the status shows an administrative state of enabled but a process state of
stopped, you can use scsitarget enable to request a start of the SCSI target
scsitarget trace
scsitarget trace disable [component {all | user | kernel |
default | component-list}]
Disable SCSI target tracing. Role required: admin, limited-admin.
scsitarget trace enable [component {all | user | kernel |
default | component-list}] [level {all | high | medium | low}]
[timeout {never | timeout-mins}] [service service-name]
Enable SCSI target tracing. If no components are specified, the default components
are used. If no timeout is given, a 10-minute timeout is used. Use scsitarget
trace show to see which components are available for each type (all, default, user,
kernel). Role required: admin, limited-admin.
scsitarget trace show [component {all | user | kernel | default
| component-list}]
Show SCSI target trace status, which includes vdisk service. Role required: admin,
limited-admin, security, user, backup-operator, none.
Example 183
Argument Definitions
all
Shows all information about the object specified by the command option.
component
Components available for tracing: all, default, user, kernel.
component-list
List of tracing components. One or more may be specified.
service
device
group
transport
initiator
endpoint
failover
op
system
event
338 EMC Data Domain Operating System 6.0 Command Reference Guide
scsitarget
comm
monitor
persistent-reservation
session
port
level
The degree of debugging verbosity to enable (all | high | medium | low |
none).
service-name
A SCSI target service: vtl, ddboost, or vdisk.
timeout
The length of time that debugging is enabled for the specified components.
scsitarget transport
scsitarget transport option reset {option-name | all}
Reset a SCSI target transport option (loop-id, npiv, or wwnn-scope). Role required:
admin, limited-admin.
scsitarget transport option set option-name value
Set a SCSI target transport option (loop-id, npiv, or wwnn-scope). Role required:
admin, limited-admin.
NPIV provides simplified multiple-system consolidation:
l NPIV is an ANSI T11 standard that allows a single HBA physical port to register
with a Fibre Channel fabric using multiple WWPNs.
l The virtual and physical ports have the same port properties and behave exactly
the same.
l There may be m:1 relationships between the endpoints and the port, that is,
multiple endpoints can share the same physical port.
Specifically, enabling NPIV enables the following features:
l Multiple endpoints are allowed per physical port (up to a maximum of 8 endpoints
per port), each using a virtual (NPIV) port. The base port is a placeholder for the
physical port and is not associated with an endpoint.
l Endpoint failover/failback is automatically enabled when using NPIV.
l Multiple DD systems can be consolidated into a single DD system, however, the
number of HBAs remains the same on the single DD system.
l Multiple endpoints can be configured on the single DD system, providing
equivalent access to the DD systems that were previously consolidated.
Note
System Address: 6b
...
FC Topology: Loop-Preferred
scsitgtd.info log
07/15 11:17:57.234 (tid 0x7f46183b59d0): NPIV is allowed but NPIV for
port 6a must be disabled or reconfigured to a different topology to
function properly.
System Address: 6b
...
FC Topology: Loop-Only
**** NPIV is not allowed. Topology for some or all ports must be
reconfigured to loop preferred.
340 EMC Data Domain Operating System 6.0 Command Reference Guide
scsitarget
Example 186
value
The value for the specific option.
342 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 37
smt
The smt command manages the EMC Data Domain Secure Multitenancy software
option, available on DD OS versions 5.5 and later. See the EMC Data Domain Operating
System Administration Guide for instructions on how to create and administer multiple
Tenant Units on a single DD system.
This chapter contains the following topics:
smt 343
smt
smt disable
smt disable
Disable the SMT (Secure Multitenancy) feature. Prior to running this command, you
must unassign Tenant Unit resources and destroy Tenant Units. When an MTree is
unassigned from a Tenant Unit, the MTree remains on the DD system, and
functionality is unaffected. Role required: admin, limited-admin.
smt enable
smt enable
Enable the SMT (Secure Multitenancy) software option. Required role: admin, limited-
admin.
smt status
smt status
344 EMC Data Domain Operating System 6.0 Command Reference Guide
smt
View the status of the SMT (Secure Multitenancy) software option – either enabled
or disabled. Required role: admin, limited-admin.
smt tenant
smt tenant add tenant-name tenant-units tenant-unit-list
Add Tenant Units to a Tenant. Role required: admin, limited-admin.
Example 187
Example 188
Example 189
Example 190
Example 191
Show detailed information about all Tenants or a specific Tenant. Role required:
admin, limited-admin, security, user, backup-operator.
Example 192
Management-Group:
Name Role Tenant-unit
---- ------------ ------------
g1 tenant-admin tu1
tenant-admin tu2
tenant-user tu4
g2 tenant-user tu3
-- ------------ ------------
Tenant: t2
Tenant UUID: f15c920502a3a7f8:e3ca68e199aac092
Tenant Pre-Comp (GiB): 0
Tenant-units:
No tenant-units.
Management-IP:
No management-ips.
Management-User:
No management-users.
Management-Group:
No management-groups.
Example 193
346 EMC Data Domain Operating System 6.0 Command Reference Guide
smt
Argument Definitions
new-tenant-name
This must be a unique name.
tenant-name
This must be a unique name.
tenant-unit-list
A comma-separated list of Tenant Units.
tenant-uuid
This must be a unique identifier.
smt tenant-unit
smt tenant-unit create tenant-unit
Create a Tenant Unit. Tenant Units are initially created using the SMT (Secure
Multitenancy) configuration wizard. Role required: admin, limited-admin.
smt tenant-unit data-ip add local ipv4-ipv6-list [remote
ipaddr-list] tenant-unit tenant-unit
Add a local or remote data IP address to a Tenant Unit. To add a local IP address, that
IP address must already be configured on an existing interface on the Data Domain
system. A local IP address must be associated with the Tenant Unit before a remote
association is permitted. Role required: admin, limited-admin.
smt tenant-unit data-ip del local ipv4-ipv6-list [remote
ipaddr-list] tenant-unit tenant-unit
Delete a local or remote data IP address from a Tenant Unit. Role required: admin,
limited-admin.
smt tenant-unit data-ip show [tenant-unit | all]
Show the local and remote data IP addresses for a Tenant Unit. Role required: admin,
limited-admin, user, security, backup-operator.
smt tenant-unit destroy tenant-unit
Destroy a Tenant Unit. Tenant Units must be destroyed before the SMT software
option can be disabled. Role required: admin, limited-admin.
smt tenant-unit gateway add ipv4-address tenant-unit tenant-
unit
Add a gateway to a Tenant Unit. A Tenant Unit must have a local IP address on the
same subnet as the gateway before the gateway can be added. The command will fail
if the system does not detect a local IP address on the same subnet as a the gateway.
Role required: admin, limited-admin.
Example 194
Example 195
Example 196
348 EMC Data Domain Operating System 6.0 Command Reference Guide
smt
Example 197
Example 198
IP Address Type
--------------------------------------- ------
10.25.246.190 remote
10.110.250.31 local
2001:0db8:85a3:0000:0000:8a2e:0370:7334 remote
--------------------------------------- ------
Tenant-unit: tu2
No management-ips.
Example 199
Example 200
Example 201
Example 202
Data-IP:
Local Remote
Address Address
----------- --------------
10.20.30.22 172.16.204.122
----------- --------------
Management-IP:
No management-ips.
350 EMC Data Domain Operating System 6.0 Command Reference Guide
smt
Gateway:
Tenant-unit Gateway IP
----------- ----------
tu_test_1 10.20.30.1
----------- ----------
Management-User:
No management-users.
Management-Group:
No management-groups.
DDBoost:
Storage-units not found
Mtrees:
**** There are no MTrees configured.
Quota:
**** There are no MTrees configured that match the pattern .
Replication:
**** License for "REPLICATION" does not exist.
Alerts:
No such active alerts.
Example 203
352 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 38
snapshot
snapshot 353
snapshot
snapshot create
snapshot create snapshot mtree mtree-path [retention {date |
period}]
Create a snapshot. Naming conventions for creating MTrees include uppercase and
lowercase letters A-Z, a-z), numbers 0-9, single, non-leading embedded space,
exclamation point (!), hash (#), dollar sign ($), ampersand (&), caret (^), tilde (~),
left and right parentheses ( ( or ) ), left and right brackets ( [ or ] ), left and right curly
braces ( { or } ). Role required: admin, limited-admin, backup.
Argument Definitions
snapshot
A name for the snapshot.
mtree mtree-path
The pathname of the MTree for which the snapshot is being created. The base of
the path must be /data/col1/mtree_name or /backup.
retention date
A four-digit year, two-digit month, and two-digit day separated by dots, slashes,
or hyphens. For example, 2013.03.23. The snapshot is retained until midnight
(00:00, the first minute of the day) of the designated date.
retention period
Number of days, weeks (wks), or months (mos) to retain a snapshot. Note there
is no space between the number and time period; for example, 4wks. Also, one
month equals 30 days. The snapshot is retained until the same time of day it was
created.
Example 204
If a snapshot was created at 8:48 a.m. on March 1, 2013 with a retention period of one
month, it would be retained for 30 days.
snapshot expire
snapshot expire snapshot mtree mtree-path [retention {date |
period | forever}]
Set or reset the retention time of a snapshot. To expire a snapshot immediately, use
the snapshot expire operation with no options. An expired snapshot remains
available until the next filesystem clean operation. Role required: admin, limited-
admin.
354 EMC Data Domain Operating System 6.0 Command Reference Guide
snapshot
Argument Definitions
snapshot
The name of the snapshot.
mtree mtree-path
The pathname of the MTree for which the snapshot is being created.
retention date
A four-digit year, two-digit month, and two-digit day separated by dots ( . ),
slashes ( / ), or hyphens ( - ). With a retention date, the snapshot is retained until
midnight (00:00, the first minute of the day) of the designated date.
retention period
Number of days, weeks (wks), or months (mos) to retain snapshot. Note there is
no space between the number and time period; for example, 4wks. Also, one
month equals 30 days. The snapshot is retained until the same time of day it was
created. The retention period must be set in days only.
retention forever
The snapshot does not expire.
snapshot list
snapshot list mtree mtree-path | tenant-unit tenant-unit
View a list of snapshots of a specific MTree. The display shows the snapshot name,
the amount of pre-compression data, the creation date, the retention date, and the
status. The status may be blank or expired. Role required: admin, limited-admin, user,
backup-operator, tenant-admin, tenant-user, security, none.
tenant-unit
A tenant unit is a secure, isolated partition for tenant-specific data and control
flow within a Data Domain system.
snapshot rename
snapshot rename snapshotnew-name mtree mtree-path
Rename a snapshot for a specific MTree. Role required: admin, limited-admin.
Example 206
To change the name from snap1 to new-snap1 for an MTree named /newMTree, enter:
snapshot schedule
snapshot schedule add name mtrees mtree-list
Add multiple MTrees to a single snapshot schedule. Separate multiple MTrees with
colons. Role required: admin, limited-admin.
snapshot schedule create name [mtrees mtree-list] [days days]
time time [,time ...] [retention period] [snap-name-pattern
pattern]
snapshot schedule create name [mtrees mtree-list] [days days]
time time every mins [retention period] [snap-name-pattern
pattern]
snapshot schedule create name [mtrees mtree-list] [days days]
time time-time [every <hrs | mins>] [retention period] [snap-
name-pattern pattern]
Use these commands to create a snapshot schedule for multiple MTrees. Command
arguments determine the duration of the schedule. (Note the different arguments for
specifying time interval.) Role required: admin, limited-admin.
CAUTION
The retention period must be set in days only. If set in hours an error message
appears stating your data is in danger and the command will fail.
Example 207
356 EMC Data Domain Operating System 6.0 Command Reference Guide
snapshot
CAUTION
This command deletes the previous schedule without prompting the user.
358 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 39
snmp
The snmp command enables or disables SNMP access to a Data Domain system, adds
community strings, gives contact and location information, and displays configuration
settings.
SNMP management requires two primary elements: an SNMP manager and an SNMP
agent. An SNMP manager is software running on a workstation from which an
administrator monitors and controls the different hardware and software systems on a
network. These devices include, but are not limited to, storage systems, routers, and
switches.
An SNMP agent is software running on equipment that implements the SNMP
protocol. SNMP defines how an SNMP manager communicates with an SNMP agent.
For example, SNMP defines the format of requests that an SNMP manager sends to
an agent and the format of replies the agent returns.
From an SNMP perspective a Data Domain system is a read-only device, with one
exception: A remote machine can set the SNMP location, contact, and system name
on a Data Domain system. The snmp command enables administrative users to
configure community strings, hosts, and other SNMP MIB variables on the Data
Domain system.
With one or more trap hosts defined, a Data Domain system takes the additional action
of sending alert messages as SNMP traps, even when the SNMP agent is disabled.
This chapter contains the following topics:
snmp 359
snmp
snmp add
snmp add ro-community community-string-list [hosts host-list]
Add one or more community strings for read-only access to the Data Domain system.
A common string for read-only access is public. To grant access to specific hosts,
replace host-list with one or more hostnames. Role required: admin, limited-admin.
Example 208
hostnameA,hostNameB 10.10.1.2,10.10.1.310.**
Example 209
The following command adds the public community string for read-only access from
host host.emc.com.
Example 210
The following command adds the private community string for read-write access from
host host.emc.com.
360 EMC Data Domain Operating System 6.0 Command Reference Guide
snmp
Add one or more trap hosts to receive the SNMP traps generated by the Data Domain
system. Note that alerts are also sent as traps, even when the local SNMP agent is
disabled.
Replace host-name-list with one or more hostnames or IP addresses. By default, port
162 is used to send traps, but another port may be assigned. For SNMPv1 and v2c
specify the version and the pre-existing community (username). For SNMPv3, specify
the SNMPv3 username. Role required: admin, limited-admin.
Example 211
snmp del
snmp del ro-community community-string-list [hosts host-list]
Delete one or more community strings or hosts from the read-only access list. To
display the read-only access list, enter snmp show ro-communities. Role
required: admin, limited-admin.
snmp del rw-community community-string-list [hosts host-list]
Delete one or more community strings or hosts from the read-write access list. To
display the read-write access list, enter snmp show rw-communities. Role
required: admin, limited-admin.
Example 212
The following command deletes host myhost.emc.com from the community string
private.
Example 213
The following command deletes the community private and all associated hosts.
Example 214
snmp disable
snmp disable
Disable SNMP and close port 161. Role required: admin, limited-admin.
snmp enable
snmp enable
Enable SNMP and open port 161. Role required: admin, limited-admin.
snmp reset
snmp reset
Reset the SNMP agent configuration to the default values. Role required: admin,
limited-admin.
snmp reset ro-communities
Reset the list of read-only community strings to the default values. Role required:
admin, limited-admin.
snmp reset rw-communities
Reset the list of read-write community strings to the default values. Role required:
admin, limited-admin.
snmp reset sysContact
Reset the SNMP administrative contact MIB variable to the default value or to an
empty string if the system value is empty. Role required: admin, limited-admin.
snmp reset sysLocation
Reset the system location MIB variable to the default value or to an empty string if the
system value is empty. Role required: admin, limited-admin.
snmp reset trap-hosts
Reset the list of SNMP trap receiver hosts to default values. Role required: admin,
limited-admin.
snmp set
snmp set sysContact sysContact
Set the SNMP administrative contact MIB variable using a text string such as an email
address. The SNMP sysContact MIB variable differs from the value set with the
config set admin-email command option. However, if the SNMP MIB variables
are not set with the SNMP commands, the variables default to the system values
given with the config set commands. Role required: admin, limited-admin.
snmp set sysLocation sysLocation
Set the SNMP physical location MIB variable using a text string. The SNMP
sysLocation MIB variables differs from the value set with the config set
location command option. However, if the SNMP MIB variables are not set with the
SNMP commands, the variables default to the system values given with the config
set commands. Role required: admin, limited-admin.
snmp set sysNotes sysNotes
Set the SNMP system notes MIB variable to a text string to record system-specific
data not stored in other SNMP variables. Role required: admin, limited-admin.
362 EMC Data Domain Operating System 6.0 Command Reference Guide
snmp
snmp show
snmp show config [version {v2c | v3}]
Use this command to display all SNMP configuration parameters or only those for
SNMP V2C or V3. Role required: admin, limited-admin, security, user, backup-
operator, or none.
snmp show ro-communities
Show the configured SNMP read-only communities and hosts. Role required: admin,
limited-admin.
snmp show rw-communities
Show the configured SNMP read/write communities and hosts. Role required: admin,
limited-admin.
snmp show stats
Show the SNMP operating statistics. Role required: admin, limited-admin, security,
user, backup-operator, or none.
snmp show sysContact
Show the configured SNMP administrative contact. Role required: admin, limited-
admin, security, user, backup-operator, or none.
snmp show sysLocation
Show the configured SNMP physical location MIB variable. Role required: admin,
limited-admin, security, user, backup-operator, or none.
snmp show sysNotes
Show the configured SNMP system notes MIB variable. Role required: admin, limited-
admin, security, user, backup-operator, or none.
snmp show trap-hosts [version {v2c | v3}]
Use this command to display all configured trap hosts or only those for SNMP V2C or
V3. Role required: admin, limited-admin, security, user, backup-operator, or none.
snmp status
snmp status
Display whether SNMP is enabled or disabled. Role required: admin, limited-admin,
security, user, backup-operator, or none.
snmp user
snmp user add user-name access {read-only | read-write}
[authentication-protocol {MD5 | SHA1} authentication-key auth-
key [privacy-protocol {AES | DES} privacy-key priv-key]]
Add an SNMPv3 user to the local system specifying the access rights, authentication
protocol, and privacy protocol. The authentication key is used when calculating the
digest for the authentication protocol. The privacy key is used as input for the privacy
protocol. Role required: admin, limited-admin.
snmp user del user-name
Delete an SNMPv3 user. To view the configured SNMPv3 users, enter snmp show
config version v3. Role required: admin, limited-admin.
364 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 40
storage
The storage command adds, removes, and displays disks and LUNs belonging to
active and archive storage tiers. Tiered storage enables the Data Domain system to
use different types of storage devices.
System storage for a filesystem or associated RAID disk group consists of two storage
tiers: one active and one archive. The active tier uses one active unit of storage, and
the archive tier uses one or more retention units of storage.
This chapter contains the following topics:
storage 365
storage
366 EMC Data Domain Operating System 6.0 Command Reference Guide
storage
storage add
storage add [tier {active | archive | cache |cloud}]
{enclosures <enclosure-list> | disks <disk-list> | <LUN-list>
[spindle-group <1-16>]}
Add storage devices to a tier. Device types include all disks in an enclosure, multiple
enclosures, one or more disks, one or more LUNs, or spindle group. Disks or LUNs
must be in the Unknown state to be added to the designated tier, after which the
state changes to Available. This command cannot be used on dataless head (DLH)
units. The default spindle group is 1.
When adding storage, consider the following guidelines.
l Specify <enclosure-list> as: A comma or space-separated list formatted
{<enclosure-id>[:<pack-id>]} or <enclosure-id>-<enclosure-id>.
l Specify <disk-list> as: A comma or space-separated list formatted
<enclosure-id>.<disk-id> .
l Specify <LUN-list> as: A comma or space-separated list formatted
{dev<disk-id> or dev<disk-id>-<disk-id> .
l Each system model tier supports a maximum storage quantity based on the system
capacity and the installed memory. It is a good practice to add no more than the
storage quantity supported by your system. Although you can use the storage
add command to add storage beyond the supported capacity, an error is reported
if you attempt to use the unsupported storage with the filesys create or
filesys expand command.
l If adding a disk to an enclosure on the active tier and if there is already a disk
group in the enclosure, the disk becomes a spare, not available. This is because if
you add a disk and it becomes available, there is no way for the available disk to
become spare. Spares are only created when a disk group is created within the
enclosure. This rule also applies to the head unit.
l If there is not a disk group in the enclosure (other disks are available or spare), the
disk becomes available.
Note
The storage add devdisk-id command option is allowed only after running the
command option storage add enclosure enclosure-id to add the shelf.
disk enclosure-id.disk-id
Specifies the disk to be added with the associated enclosure. To see the available
disk IDs with enclosure information, enter disk show hardware.
enclosure enclosure-id:[pack-id]
Adds all disks in the specified enclosure or pack to the specified tier. If you do not
specify a pack within a DS60 enclosure, the system adds all valid packs that have
not been previously added. Use this command multiple times to add some packs
to the active tier and some to the archive tier.
Example 215
storage migration
storage migration finalize
Finalize the storage migration. Remove the configuration associated with the source
enclosures (such as disk groups), remove the migration destination flag on the
destination enclosures, and restart the filesystem using only the storage on the
destination enclosures. Role required: admin, limited-admin.
368 EMC Data Domain Operating System 6.0 Command Reference Guide
storage
Example 216
The enclosure list can include one or more enclosure numbers, separated by commas
or space characters. To specify a pack within a DS60 enclosure, use the format
enclosure_number:pack. Role required: admin, limited-admin.
Source enclosures:
Disks Count Disk Disk Enclosure Enclosure
Group Size Model Serial No.
-------- ----- ----- ---------- --------- --------------
2.1-2.15 15 dg1 1.81 TiB ES30 APM00111103820
-------- ----- ----- ---------- --------- --------------
Total source disk size: 27.29 TiB
Destination enclosures:
Disks Count Disk Disk Enclosure Enclosure
Group Size Model Serial No.
---------- ----- ------- -------- --------- --------------
11.1-11.15 15 unknown 931.51 GiB ES30 APM00111103840
---------- ----- ------- -------- --------- --------------
Total destination disk size: 13.64 TiB
370 EMC Data Domain Operating System 6.0 Command Reference Guide
storage
Note
Storage migration does not start when disks are rebuilding in the source enclosures. If
a disk in any enclosure requires rebuilding after storage migration starts, the migration
is suspended to speed up the rebuilding process. When the rebuild is complete, the
migration process automatically resumes.
The enclosure list can include one or more enclosure numbers, separated by commas
or space characters. To specify a pack within a DS60 enclosure, use the format
enclosure_number:pack. Role required: admin, limited-admin.
Source enclosures:
Disks Count Disk Disk Enclosure Enclosure
Group Size Model Serial No.
-------- ----- ----- ---------- --------- --------------
2.1-2.15 15 dg1 1.81 TiB ES30 APM00111103820
-------- ----- ----- ---------- --------- --------------
Total source disk size: 27.29 TiB
Destination enclosures:
Disks Count Disk Disk Enclosure Enclosure
Group Size Model Serial No.
---------- ----- ------- -------- --------- --------------
11.1-11.15 15 unknown 931.51 GiB ES30 APM00111103840
---------- ----- ------- -------- --------- --------------
Total destination disk size: 13.64 TiB
Note
The migration status shows the percentage of blocks transferred. In a system with
many free blocks, the free blocks are not migrated, but they are included in the
progress indication. In this situation, the progress indication will climb quickly and then
slow when the data migration starts.
Migration status needs to report 'reserving space' and 'preparing' as one of the 'States'
now.
storage remove
storage remove {enclosures <enclosure-list> | disks <disk-list>
| <LUN-list> [spindle-group <1-16>]}
Remove storage devices from the tier, including all disks in an enclosure, multiple
enclosures, one or more disks, or one or more LUNs. You can also remove a disk from
a DLH unit. When a device is removed the state changes to Unknown.
l Specify <enclosure-list> as: A comma or space-separated list formatted
{<enclosure-id>[:<pack-id>]} or <enclosure-id>-<enclosure-id>.
l Specify <disk-list> as: A comma or space-separated list formatted
<enclosure-id>.<disk-id> .
l Specify <LUN-list> as: A comma or space-separated list formatted
{dev<disk-id> or dev<disk-id>-<disk-id> .
This command cannot remove an In Use disk if doing so exceeds the minimum number
allowed by the RAID scheme. This command also cannot remove a disk if the disk is a
spare or an In Use LUN. Role required: admin, limited-admin.
Argument Definitions
dev disk-id
Removes the specified device.
372 EMC Data Domain Operating System 6.0 Command Reference Guide
storage
disk enclosure-id.disk-id]
Removes the specified disk.
enclosure enclosure-id:[pack-id]
Removes all disks in the specified enclosure or pack.
storage sanitize
storage sanitize abort enclosure enclosure-id[:pack-id]
Abort the storage sanitize task for the specified storage location. Role required:
admin, limited-admin.
storage sanitize resume enclosure enclosure-id[:pack-id]
Resume a suspended storage sanitize task at the specified storage location. Role
required: admin, limited-admin.
storage sanitize start enclosure enclosure-id[:pack-id]
Initiate the storage sanitize task to remove (zero out) all data from all disks in the
specified storage location. All disks in the specified location must be in the unknown
state. You cannot use this command to sanitize disks that are being used by the
system. Role required: admin, limited-admin.
Example 217
storage show
storage show {all | summary | tier {active | archive | cache |
cloud}}
Display information about the disk groups, disks, and storage capacity of the file
system. The information that appears depends on the system configuration. All
systems display the Active tier details table and summary information about the
storage tiers. If Extended Retention is in use, the Archive tier details table also
appears. Additional tables may appear for Storage addable disks, Storage expandable
disks, and Shelf Capacity License information. Role required: admin, limited-admin,
security, user, backup-operator, or none.
Argument Definitions
all
Displays storage information for the active and archive tiers.
summary
Displays the states of the disk drives and a count of the disks in each state.
374 EMC Data Domain Operating System 6.0 Command Reference Guide
storage
Output Definitions
Additional Information
Displays additional information regarding the disk group.
Expandable
The Expandable entry indicates a system or enclosure that can provide
additional storage if the proper license is added. For expandable systems, the
Storage expandable disks table appears and the Additional
Information column in that table displays the capacity in use.
Migration destination
The disk is in use as the destination for storage migration.
Migration source
The disk is in use as the source for storage migration.
Pack n
This entry identifies the DS60 pack that contains the disks.
Count
Shows a count of the disks in the disk group or in the disk state identified in the
Disk Group column.
Disk Group
Identifies the configured disk groups and the state of disk slots that are not
actively participating in a disk group. The following are the disk states that can
appear in the Disk Group column.
absent
No disk is in the disk slot.
376 EMC Data Domain Operating System 6.0 Command Reference Guide
storage
available
Any of the following:
l A previously unknown disk or LUN added to a tier by the storage add
enclosure command option.
l DD Extended Retention system only: a previously In Use disk or LUN
deleted from a retention unit by the filesys archive unit del
command option. This operation reverts the disk or LUN to available
storage in the archive tier.
l A previously failed disk in an expansion shelf populated with other disks
belonging to a tier that is not primarily composed of disk group disks, and
whose partition was destroyed by the disk unfail command.
Failed
Tiered storage (Available, Spare, or In Use) removed from the tier
automatically by the disk subsystem, or explicitly by an administrative user.
Failed may also indicate unknown or foreign storage explicitly changed to the
Failed state.
Foreign
A disk belonging to a third-party vendor.
In Use
Storage that is part of an active filesystem or associated RAID disk group.
Spare
A disk that can be used as a RAID hot spare through RAID reconstruction.
Spare disks can be used to create or expand the filesystem.
Spare (reconstruction)
A spare disk that is pending or undergoing RAID reconstruction, which puts
filesystem data into what the formerly spare disk and then makes the disk an
integral part of a disk group. After RAID reconstruction of a spare disk
completes, the disk is part of a RAID disk group.
unknown
A blank disk inserted into the disk slot, or a disk failed by a RAID system.
Disk States
When the summary argument is specified, this column displays the operational
states of system disks.
Destination
The disks in this row are in use as a destination for storage migration.
In Use
The disks in this row are part of the system storage in use.
Migrating
The disks in this row are in use as a source for storage migration.
Spare
The disks in this row are reserved for use as a spares.
Disk Size
The size of the disks in the disk group or disk state.
Disks
Identifies the disks within a disk group using the format
enclosure_number.disk_number.
Enclosure Model
This column appears in the Storage expandable disks table and indicates the
enclosure model that contains the expandable disk group.
Model
Displays the enclosure model number to which the license applies.
Remaining
Displays the enclosure capacity available for use.
Total
Shows the total enclosure capacity supported by the license.
Used
Displays the enclosure capacity in use.
378 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 41
support
The support command manages bundles (EMC Data Domain log files), traces
(performance log files, also known as perf.logs), and file lists (file names under /
ddvar) from a customer Data Domain system. This command also configures the
ConnectEMC transport feature for securely transmitting information to EMC.
This chapter contains the following topics:
support 379
support
380 EMC Data Domain Operating System 6.0 Command Reference Guide
support
support bundle
support bundle create {files-only file-list | traces-only}
[and-upload [transport {http|https}]]
Compress listed files into bundle and upload if specified. File names in a list must be
separated by a space or a comma. The system automatically deletes the oldest
support bundle if five support bundles exist on the system. When uploading using an
HTTP proxy server, you must include the and-upload transport http option.
The default transport is HTTPS. Role required: admin, limited-admin.
support bundle create default [with-files file-list] [and-
upload [transport {http|https}]]
Compress default and listed files into bundle and upload if specified. File names in a list
must be separated by a space or a comma. The maximum number of support bundles
allowed is five. When uploading using an HTTP proxy server, you must include the
and-upload transport http option. The default transport is HTTPS. Role
required: admin, limited-admin.
support bundle delete {bundle-name-list | all}
Delete some or all of the support bundles on the system. File names in a bundle list
must be separated by a space or a comma. To list the system bundles available, enter
support bundle list. Role required: admin, limited-admin.
support bundle option set http-proxy proxy-server name or ip
address [http-proxy-port <port number> ]
Specify a proxy server to use for forwarding support bundles to EMC. The default
value, port 80, applies if the port number is omitted. Role required: admin, limited-
admin.
support bundle option reset http-proxy
Reset the proxy server configuration. Role required: admin, limited-admin.
support bundle option show http-proxy
Display the proxy server configuration. Role required: admin, limited-admin.
support bundle list
List all support bundles on system. Role required: admin, limited-admin.
support bundle resume bundle-name [transport {http|https}]
If a support bundle upload fails before completion, use this command to resume the
upload from where it left off (instead of starting from the beginning). When uploading
using an HTTP proxy server, you must include the transport http option. The
default transport is HTTPS. Role required: admin, limited-admin.
support bundle upload bundle-name [transport {http | https}]
Upload the specified bundle to the support server. To list the system bundles available,
enter support bundle list. When uploading using an HTTP proxy server, you
must include the transport http option. The default transport is HTTPS. Role
required: admin, limited-admin.
support connectemc
support connectemc device register ipaddr esrs-gateway {ipaddr
| hostname } [ha-peer ipaddr]
Register the system to the ESRS gateway. Role required: admin, limited-admin.
Note
The hostname or IP address specified for the ESRS gateway must match the
hostname or IP addresses specified when creating SSL certificates on the Data
Domain system, otherwise the support connectemc device register
command will fail.
Example 218
Example 219
382 EMC Data Domain Operating System 6.0 Command Reference Guide
support
Example 220
support coredump
support coredump delete {core-file-list | all}
Delete the specified coredump files or delete all coredump files. File names in a list
must be separated by a space or a comma. To display the coredump files on the
system, enter support coredump list. Role required: admin, limited-admin.
support coredump list
List the coredump files on the system. Role required: admin, limited-admin.
support notification
support notification disable {autosupport | alerts | all}
Disable email notification to EMC Data Domain for the specified option. Disabling
autosupport disables the daily autosupport email. Disabling alerts disables all alert
email, including both current alerts and summary reports. The all option specifies that
reporting of both autosupport and alerts is to be disabled. Role required: admin,
limited-admin.
support notification enable {autosupport | alerts | all}
Enable email notification to EMC Data Domain for the specified option. Enabling
autosupport enables the daily autosupport email. Enabling alerts enables all alert email,
including both current alerts and summary reports. The all option specifies that
reporting of both autosupport and alerts is to be enabled. Role required: admin,
limited-admin.
support notification method reset
Use this command to reset the notification method selection from ConnectEMC to
legacy email. Role required: admin, limited-admin.
support notification method set {email | connectemc}
Select email to use the legacy unsecure method of sending autosupport and alert
messages to EMC. Select connectemc to send ConnectEMC secure messages. The
ConnectEMC method requires a configured system administrator email address
(config set admin-email). The default method is legacy email. Role required:
admin, limited-admin.
support notification method show {email | connectemc}
Display which EMC notification method is selected. Role required: admin, limited-
admin, security, user, backup-operator, or none.
support notification show {autosupport | alerts | all}
Show the notification configuration for the autosupport option, the alerts option, or
both. Role required: admin, limited-admin, security, user, backup-operator, or none.
384 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 42
system
system 385
system
Now indicates whether the package is signed and, if so, whether the signature is
valid.
system availability
system availability reset
Reset the system availability information. Role required: admin, limited-admin.
system availability show
Show the system availability information. Role required: admin, limited-admin, user,
backup-operator, or none.
system headswap
system headswap
Restore the configuration to a system after replacing the head unit. For additional
instructions, see the Chassis Replacement FRU document for the system mode and
the EMC Data Domain System Controller Upgrade Guide. Role required: admin, limited-
admin.
386 EMC Data Domain Operating System 6.0 Command Reference Guide
system
Note
After you enter this command, the system displays a message that reminds you that
you need the passphrase for the old system if encryption was enabled on that system.
You must type yes to continue.
system option
system option reset {login-banner}
Delete the configuration for the login banner, so that no login banner is displayed. Role
required: admin, limited-admin.
system option set console {serial | lan | monitor}
Set the active console option to one of the following.
l For a Serial Over LAN (SOL) connection, enter system option set console
lan.
l For a console connection through the serial port, enter system option set
console serial.
l For a console connection through the monitor port (which is not available on all
systems), enter system option set console monitor.
Role required: admin, limited-admin.
system option set login-banner file
Set the login banner file. Role required: admin, limited-admin.
Example 221
To create a banner message for your system, mount the Data Domain system
directory, /ddvar, from another system, create a text file with your login message
in /ddvar, and then enter the command to use the system banner. The following
command selects a file named banner in /ddvar:
system package
system package del file
Deletes the specified package file. Role required: admin, limited-admin.
system package list [file]
If the file attribute is omitted, this command lists all files in the /ddvar/releases
directory, which is where package files are stored. If the file attribute is specified, this
command lists information about the specified package file. In either case, this
command indicates whether the package is signed and if so, whether the signature is
valid. Role required: admin, limited-admin, security, user, backup-operator, or none.
system package show installed
Lists the packages that are installed on the system. The listing includes three pieces of
information: the package name, the package version, and whether or not the package
Example 222
The following example shows the output if there are add-on packages:
sysadmin@koala39: system package show installed
Package Version
------------ -------------------
ddr 0.6000.12.2-497289
upgrade* 6.0.0.0-000000
------------ -------------------
(*) Upgraded package
Example 223
The following example shows the output if there are no add-on packages:
sysadmin@koala39: system package show installed
Package Version
------------ -------------------
ddr 0.6000.12.2-497289
upgrade 6.0.0.0-000000
------------ -------------------
system passphrase
system passphrase change
Change the passphrase used to access the system. You must disable the file system
before using this command, and the new passphrase must contain the minimum
number of characters configured with the system passphrase option set
min-length command. Role required: admin, limited-admin. This command requires
security officer authorization.
Example 224
Example 225
The passphrase change fails in the following example because the new passphrase
does not conform to the configured minimum length.
388 EMC Data Domain Operating System 6.0 Command Reference Guide
system
**** New passphrase does not meet the minimum length policy.
Example 226
Example 227
Example 228
If you set a passphrase minimum length that is longer then the current passphrase
length, DD OS displays a message to remind you to change the current passphrase.
Example 229
Example 230
system poweroff
system poweroff
Shut down the Data Domain system. The command performs an orderly shutdown of
file system processes. This command does not power off external storage. Role
required: admin, limited-admin.
390 EMC Data Domain Operating System 6.0 Command Reference Guide
system
system reboot
system reboot
Shut down and reboot a Data Domain system. The command automatically performs
an orderly shutdown of file system processes. Role required: admin, limited-admin.
system retention-lock
system retention-lock compliance configure
Configure Retention Lock Compliance on the Data Domain system. Role required:
admin, limited-admin. This command option requires security officer authorization.
Note
system sanitize
system sanitize abort
Stop the system sanitization process. Role required: admin, limited-admin.
system sanitize start
Start the system sanitization process. Note that prior to running sanitization,
snapshots created during a previous replication process by another user may continue
to hold deleted data. To ensure data is removed from replication snapshots during
system sanitization, synchronize all replication contexts prior to beginning the
procedure. Role required: admin, limited-admin.
Note
When the system sanitize start command is run on a Cloud Tier enabled
system, an incorrect status message is displayed saying that sanitization has started.
The message should indicate that the command failed.
system set
system set date MMDDhhmm[[CC]YY]
Set the system date and time. Do not use this command if Network Time Protocol
(NTP) is enabled. This command option requires security officer authorization if the
system is enabled for Retention Lock Compliance.
The data and time format uses the following elements.
l Two digits for the month, MM (01 through 12).
l Two digits for the day of the month, DD (01 through 31).
l Two digits for the hour, hh (00 through 23).
l Two digits for minutes, mm (00 through 59).
l Optional: Two digits for the century CC and two digits for the year YY.
The hour hh and minute mm variables are entered in 24-hour format with no colon
between the hours and minutes. 2400 is an invalid entry. The entry 0000 equals
midnight. Role required: admin, limited-admin.
Example 231
You can use either of the following commands (two- or four-digit year) to set the date
and time to April 23, 2013, at 3:24 p.m.
system show
system show all
Show all system information. Note that newer systems, such as DD4500 and DD7200,
display the product serial number in the Serial number row and the chassis serial
number in the Chassis serial number row. On legacy systems, such as DD990 and
earlier, the Serial number row displays the chassis serial number and the Service tag
row displays the product serial number. The product serial number remains the same
during many maintenance events, including chassis upgrades. Role required: admin,
limited-admin, security, user, backup-operator, or none.
system show date
Display the system clock. Role required: admin, limited-admin, tenant-admin, security,
user, tenant-user, backup-operator, or none.
system show detailed-version
Show the version number and release information. Role required: admin, limited-
admin, security, user, backup-operator, or none.
system show eula
View the End User License Agreement (EULA). Note if the user is not present during
system installation, the Data Domain Technical Consultant can temporarily bypass
license acceptance and continue with the installation by pressing Ctrl-C. Otherwise,
the user must press Enter to accept the license, which is displayed the first time he or
she logs in to the system. See the EMC Data Domain Operating System Initial
Configuration Guide for details. Role required: admin, limited-admin, security, user,
backup-operator, or none.
system show hardware
392 EMC Data Domain Operating System 6.0 Command Reference Guide
system
Display information about slots and vendors and other hardware in a Data Domain
system. Role required: admin, limited-admin, security, user, backup-operator, or none.
system show managing-system
Identify on which Data Domain Management Console the Data Domain system was
added. Also display details about the Data Domain Management Console, such as the
outbound proxy host and port, the date for which the system became managed, and
the date of last contact. Role required: admin, limited-admin, security, user, backup-
operator, or none.
system show meminfo
Display summary of system memory usage. Output differs between newer systems,
such as DD4500 and DD7200, and legacy systems, such as DD990 and earlier. Role
required: admin, limited-admin, security, user, backup-operator, or none.
system show modelno
Display the hardware model number of a Data Domain system. Role required: admin,
limited-admin, security, user, backup-operator, or none.
system show nvram
Display information about NVRAM cards. If output indicates one or more component
errors, an alert notification is sent to the designated group and the Daily Alert
Summary email includes an entry citing details of problem.
The normal charge level for batteries is 100 percent, and the normal charging status is
enabled. Exceptions occur when the system is new or the card is replaced. In both
cases the charge may be less than100 percent initially; however, if it does not reach
100 percent within three days, or if a battery is not enabled, the card must be
replaced. Role required: admin, limited-admin, security, user, backup-operator, or
none.
system show oemid [name | value]
Show the system OEM IDs for the system controller and any shelves. The OEM ID
consists of a name and a value. Omit the options to display both the name and value,
or specify one option to display only that data. On systems with head units and
shelves, the OEM identifier of the head unit is displayed first. The output includes IDs
for connected enclosures only. Role required: admin, limited-admin, security, user,
backup-operator, or none.
system show performance [raw | fsop | view {legacy | default}
custom-view {state | throughput | protocol | compression |
streams |utilization | mtree-active},...] [duration duration
{hr | min} [interval interval {hr | min}]]
Display system performance statistics for a designated interval. If you enter this
command without the custom-view argument, the standard performance report
appears. Role required: admin, limited-admin, security, user, backup-operator, or
none.
Argument Definitions
custom-view
Specifies a custom report that includes only those performance statistics that
you specify. To display multiple performance statistics, enter multiple labels in the
order in which you want the statistics to appear. For example, system show
performance custom-view state streams.
fsop
Display the number of each filesystem operation performed per minute.
raw
Show unformatted statistics.
Example 232
Example 233
meta
Percent of metadata segment lookups that miss in the cache. For each data
access, first perform a metadata lookup followed by a data lookup. A high percent
indicates poor metadata prefetching.
ovhd
Percent of a compression unit cache block that is unused. Compression regions
are stored in fixed size (128 KB) blocks. A high ovhd relative to unus indicates
space is being wasted due to cache block fragmentation. In the ideal case, ovhd
exactly equals unus.
thra
Percent of compression units that were read and discarded without being used. A
high percent indicates cache thrashing.
unus
Percent of compression unit data that is unused. Because a compression unit
contains multiple segments, not all segments in a compression region may be
used. A high percent indicates poor data locality.
394 EMC Data Domain Operating System 6.0 Command Reference Guide
system
lcomp
Local compression rate.
read seq/rand
Sequential and random read operations per second.
write seq/rand
Sequential and random write operations per second.
read seq/rand
The response time for sequential and random reads.
write seq/rand
The response time for sequential and random writes.
stream avg/sdev
The average number of open streams and the standard deviation.
rd
The number of read requests.
rd
Read processes.
tot
The total number of requests.
SS Load Balance (gc)
Denotes type and number of expunge (gc) processes.
wr
The number of write requests.
wr
Write processes.
tot
The total number of gc processes.
wr
The number of active write streams.
load
Load percentage (pending ops/total RPC ops *100).
ops/s
Operations per second.
Note
Protocol data includes NFS, CIFS, DD Boost over IP, and DD Boost-managed
replication and optimized duplication. Data does not include Replication, VTL over
Fibre Channel, or DD Boost over Fibre Channel.
D
Disk reconstruction
F
Archive data movement
I
Container verification (scrubbing)
M
Fingerprint merge
P
Physical space measurement
396 EMC Data Domain Operating System 6.0 Command Reference Guide
system
R
Archive space reclamation
S
Summary vector checkpoint
t
Storage migration in progress.
V
File verification running
write seq/rand
The number of sequential and random write streams.
r+
The number of reopened read file streams in the past 30 seconds.
rd
The number of active read streams.
Repl in
The number of incoming replication streams.
Repl out
The number of outgoing replication streams.
w+
The number of reopened write file streams in the past 30 seconds.
wr
The number of active write streams.
Write
The write throughput data to the Data Domain system.
Note
Throughput Read and Write data includes NFS, CIFS, DD Boost over IP and Fibre
Channel, VTL, Replication, DD Boost-managed replication and optimized duplication.
Time
The time system performance is being viewed.
Disk max %
The maximum percentage of disk utilization.
Firmware
The Data Domain system HBA firmware version.
Hardware Address
A MAC address or WWN. An address followed by an Ethernet port number is a
MAC address. WWN is the world-wide name of the Data Domain system SAS
HBA on a system with expansion shelves.
Link Speed
The speed in Gbps (Gigabits per second).
Port
The port number. See the model‑specific installation and setup guide to match a
slot to a port number.
Example 234
The following example is from a newer system that displays the product serial number
as the system serial number as well as support for data encryption:
398 EMC Data Domain Operating System 6.0 Command Reference Guide
system
count count
Specifies how many times to display the results. The default count is one. If
interval is specified and count is omitted, the count is set to infinite, or until the
user presses Ctrl-C.
custom-view view-spec,...
Specifies a custom report that includes only those statistics that you specify.
Valid entries include any column section label in the standard reports: cpu, state,
nfs, cifs, net (for network), disk, nvram, and repl (for replication). To display
multiple column sections, enter the column labels in the order in which you want
the sections to appear.
interval nsecs
When specifying intervals for collecting statistics, the first report is for current
activity. Subsequent reports show activity performed during [interval nsecs].
The default interval is five seconds.
row
Output for each node is in row format, displayed as a single line for each interval.
Example 235
aggr max %
Amount of data sent through all interfaces.
State
Indicates system state. See the description of the show system performance
command for details on what each letter represents.
Protocal Aggr
total
Operations per second.
load %
Load percentage (pending ops/total RPC ops *100).x.)
data in % MB/s
Protocol throughput. Amount of data the filesystem can read from and write to
the kernel socket buffer.
CIFS
ops/s
I/O and metadata operations per second.
ops/s
I/O and metadata operations per second.
ops/s
I/O and metadata operations per second.
in MB/s
Write throughput.
out MB/s
Read throughput.
NFS
ops/s
I/O operations.
load %
Load percentage (pending ops/total RPC ops *100).x.)
data in % MB/s
Protocol throughput. Amount of data the filesystem can read from and write to
the kernel socket buffer.
400 EMC Data Domain Operating System 6.0 Command Reference Guide
system
wait in ms/MB
Average amount of time spent in ms to receive the amount of data.
Net
aggr in MB/s
Amount of data received through all interfaces.
Example 236
system status
system status
Display status of fans, internal temperatures, and power supplies. Information is
grouped separately for the Data Domain system and each expansion shelf connected
to the system. See the EMC Data Domain Operating System Administration Guide for
details. Role required: admin, limited-admin, security, user, backup-operator, or none.
system upgrade
system upgrade [precheck] file
Note
This command is deprecated and will be removed from a future release. Use system
upgrade start or system upgrade precheck.
Example 237
Note
You must specify an upgrade file for a newer version of DD OS. DD OS does not
support downgrades to previous versions.
Note
402 EMC Data Domain Operating System 6.0 Command Reference Guide
system
If the precheck is successful, the upgrade begins and the console displays the upgrade
status. Other users can monitor the upgrade by entering system upgrade watch.
To stop the upgrade status display, press Ctrl-C. Terminating the upgrade status
display does not stop the upgrade. Once started, the upgrade continues to
completion.
When the upgrade is nearly complete, the system shuts down the filesystem and
reboots. The upgrade may require over an hour, depending on the amount of data on
the system. During a system upgrade, a banner appears to warn all logged-in users and
any new logged-in users that an upgrade is in progress and that not all DD OS
operations are available. See the EMC Data Domain Operating System Release Notes for
instructions on upgrading Data Domain systems. Role required: admin, limited-admin.
Note
You must specify an upgrade file for a newer version of DD OS. DD OS does not
support downgrades to previous versions.
Note
The RPM can be a system RPM, a bundle RPM, a component RPM, or an add-on
RPM.
If the upgrade request succeeds, the command polls the status of the upgrade until
the current node reboots; the operation finishes with a success status or until an error
is reported. The CLI is rejected on the passive node in an HA system unless the local
parameter is specified. Yes/no confirmation is required in interactive mode.
system upgrade status
When an upgrade is in progress, this command displays the current upgrade status
and upgrade procedure phase, and then the command terminates. This command does
not continually display the upgrade progress.
If no upgrade is in progress, the system displays the completion time and status of the
last upgrade. The status shown is not affected or updated in response to any
corrective measures or configuration changes made after the completion time. Role
required: admin, limited-admin.
Example 238
Example 239
404 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 43
user
The user command adds and deletes users, manages password aging and strength
policies, and displays user roles. A role determines the type of operations a user can
perform on the Data Domain system. See the EMC Data Domain Operating System
Administration Guide for details.
The default administrative account is sysadmin. You can change the sysadmin
password but cannot delete the account.
This chapter contains the following topics:
user 405
user
406 EMC Data Domain Operating System 6.0 Command Reference Guide
user
user add
user add user [role {admin | limited-admin | security | user |
backup-operator | none}] [min-days-between-change days] [max-
days-between-change days] [warn-days-before-expire days]
[disable-days-after-expire days] [disable-date date] [force-
password-change {yes | no}]
Add a new locally defined user. A user name must start with a number or a letter.
Special characters cannot be used. The user names root and admin are default names
on each Data Domain system and are not available for general use.
The following list describes the roles that can add new users, and the level of users
that they can add:
l sysadmin: Can add admin, limited-admin, backup-operator, user, none.
l admin: Can add limited-admin, backup-operator, user, none.
l limited-admin: Can add backup-operator, user, none.
Admin users can create the first security officer role. After the first security-role user
is created, only security-role users can add or delete other security-role users. After
creating a security role, you must enable security authorization using the
authorization policy command. See the EMC Data Domain Operating System
Administration Guide for details on user roles.
Argument Definitions
disable-date
Account is disabled on this date. If not specified, account never expires.
disable-days-after-expire
Account is disabled if inactive for the specified number of days past expiration.
force-password-change
Require that the user change the password during the first login when connecting
using SSH or Telnet or through DD System Manager. The default value is no, do
not force a password change.
max-days-between-change
Maximum number of days before password expires.
min-days-between-change
Minimum number of days allowed before the password can be changed again.
role
The type of user permissions allowed. The default role is none. For SMT
configurations, the only user role that can be assigned to SU under tenant-units is
none. See the EMC Data Domain Operating System Administration Guide for details.
warn-days-before-expire
Number of days of warning before a password expires.
user change
user change password [user]
Change the password of a locally defined user. Admin-role users can change the
password for any user, and security-role users can change the passwords for other
security role users. Users in all other management roles can change only their own
passwords. Passwords must comply with the password strength policy, which you can
check with the command option user password strength show. To display a list
of all locally defined users, enter user show list.
The following list describes the roles that can change passwords and the level of users
that they can change passwords for:
l sysadmin: Can change password for itself, admin, limited-admin, backup-operator,
user, none.
l admin: Can change password for itself, limited-admin, backup-operator, user,
none.
l limited-admin: Can change password for itself, backup-operator, user, none.
l security officer: Can change its own password only.
Role required: admin, tenant-admin, security, user, tenant-user, backup-operator, or
none.
user change role user {admin | limited-admin | user | backup-
operator | none}
Change the role of a user.
The following list describes the roles that can change the roles of other users, and the
level of users that they can act upon:
l sysadmin: Can change admin, limited-admin, backup-operator, user, none.
l admin: Can change limited-admin, backup-operator, user, none.
l limited-admin: Can change backup-operator, user, none.
Users cannot promote other users to greater or equal roles. For example, an admin
user cannot promote a limited-admin user to admin or sysadmin.
No management role is permitted to change the role of a security-role user. If SMT is
enabled and a role change is requested from none to any other role, the change is
408 EMC Data Domain Operating System 6.0 Command Reference Guide
user
user del
user del user
Remove any locally defined user except sysadmin and DD Boost users. The sysadmin
user cannot be deleted. To delete a user name in use by DD Boost, delete the DD
Boost user first, then use this command to delete the user name. To display a list of all
locally defined users, enter user show list.
The following list describes the roles that can delete users, and the level of users that
they can delete:
l sysadmin: Can delete admin, limited-admin, backup-operator, user, none.
l admin: Can delete limited-admin, backup-operator, user, none.
l limited-admin: Can delete backup-operator, user, none.
Security-role users can delete only security-role users.
Example 240
user disable
user disable user
Disable the specified locally defined user account so that the user cannot log on to the
Data Domain system. To display a list of all locally defined users, enter user show
list.
The following list describes the roles that can disable users, and the level of users that
they can disable:
l sysadmin: Can disable admin, limited-admin, backup-operator, user, none.
l admin: Can disable limited-admin, backup-operator, user, none.
l limited-admin: Can disable backup-operator, user, none.
Security-role users can only disable security-role users.
user enable
user enable user [disable-date date]
Enable the specified locally defined user account so that the user can log on to the
Data Domain system. To display a list of all locally defined users, enter user show
list. Admin-role users can enable users in all management roles except the security
role.
The following list describes the roles that can enable users, and the level of users that
they can enable:
user password
user password aging option reset {all | [min-days-between-
change] [max-days-between-change] [warn-days-before-expire]
[disable-days-after-expire]}
Reset one or more rules in the default password aging policy to the current default
values. New accounts inherit the policy in effect at the time they are created, unless
you set different aging options with the user add command. The argument
definitions are the same as for user password aging option set. Role
required: admin.
Example 241
max-days-between-change days
The maximum number of days between password changes that you allow a user.
The minimum value is 1. The default setting is 90.
warn-days-before-expire days
The number of days to warn the users before their password expires. This value
must be less than the max-days-between-change value minus the min-
days-between-change value. The default setting is 7.
disable-days-after-expire days
The system disables a user account after password expiration according to the
number of days specified with this argument. Enter never or a number equal to
or greater than zero. The default setting is never.
Example 242
410 EMC Data Domain Operating System 6.0 Command Reference Guide
user
Example 243
max-days-between-change days
The maximum number of days between password changes that you allow a user.
The minimum value is 1. The default setting is 90 and may be changed using the
user password aging option set command.
warn-days-before-expire days
The number of days to warn the users before their password expires. This value
must be less than the max-days-between-change value minus the min-
days-between-change value. The default setting is 7 and may be changed
using the user password aging option set command.
disable-days-after-expire days
The system disables a user account after password expiration according to the
number of days specified with this argument. Enter never or a number equal to
or greater than zero. The default setting is never and may be changed using the
user password aging option set command.
Example 244
Show the password aging policy for all locally defined users, or for a specified user.
Only admin-role and security-role users can display the policy for other users. User-
role, backup-operator-role, and none-role users can check the policy for their own
account.
Example 245
min-length
Reset the minimum number of characters in the password to 6.
min-char-classes
Reset the minimum number of character classes to 1.
min-one-lowercase
Reset the requirement for at least one lowercase character to disabled.
min-one-uppercase
Reset the requirement for at least one uppercase character to disabled.
min-one-digit
Reset the requirement for at least one numerical character to disabled.
min-one-special
Reset the requirement for at least one special character to disabled.
max-three-repeat
Reset the requirement for a maximum of three repeated characters to disabled.
passwords-remembered
Reset the number of remembered passwords to 1.
Example 246
412 EMC Data Domain Operating System 6.0 Command Reference Guide
user
min-char-classes
The minimum number of character classes. Specify 1, 2, 3, or 4. Valid passwords
must contain at least one character from the specified number of classes. The
four character classes are lowercase letters, uppercase letters, digits, and special
characters.
When DD OS counts the number of character classes, an uppercase letter at the
beginning of the password does not count as an uppercase letter. Similarly, a digit
at the end of the password does not count as a digit.
min-one-lowercase
Enable the requirement for at least one lowercase character. The default setting
is disabled.
min-one-uppercase
Enable the requirement for at least one uppercase character. The default setting
is disabled.
min-one-digit
Enable the requirement for at least one numerical character. The default setting is
disabled.
min-one-special
Enable the requirement for at least one special character. The default setting is
disabled.
max-three-repeat
Enable the requirement for a maximum of three repeated characters. The default
setting is disabled.
passwords-remembered
Specify the number of remembered passwords. The range is 0 to 24. The default
settings is 1.
Note
Example 247
Example 248
user reset
user reset
This command deletes all locally defined user accounts except sysadmin and user
accounts for security, DD Boost (role = none), and VDISK. This command also resets
the password strength and password aging options to the factory default values. Role
required: admin.
Note
user show
user show active
Display a list of users currently logged in. The tty column displays the access method
for the user.
l Console access appears as tty#, where # represents a session number for that
user.
l SSH, Telnet, and FTP access appears as pts#, where # represents a session
number for that user.
l DD SM access appears as GUI.
l REST service access appears as WEB_SVC.
l Vdisk access appears as API.
Role required: admin, tenant-admin, security, user, tenant-user, backup-operator, or
none.
414 EMC Data Domain Operating System 6.0 Command Reference Guide
user
Example 249
Example 250
416 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 44
vdisk
The vdisk command creates and manages virtual disk devices that can be exported
as a block-level disk device to an initiator over a Fibre Channel link. These block-level
devices can be accessed by an application host, backup host, or a disk sub-system for
block-level backup and recovery.
This chapter contains the following topics:
vdisk 417
vdisk
418 EMC Data Domain Operating System 6.0 Command Reference Guide
vdisk
l The output of filesys show space may also be misleading for virtual disks.
When you create a virtual disk, the entire amount of space allocated for that
virtual disk gets added to the pre-comp statistic for the file system. Likewise,
when you delete a virtual disk, only the amount of space actually used for data
gets added to the Cleanable statistic. This behavior is expected.
l Deleting the vdisk device that is assigned to LUN 0 from a vdisk device group is
not supported, and will cause the other devices in the group to not be visible on
the initiator.
l LUN 0 must be visible to all endpoints.
l Vdisk Fibre Channel operation is expected to continue without user intervention
when the Fibre Channel endpoints failover.
l If a ProtectPoint backup description is longer than 1024 characters, the vdisk
static-image show detailed command truncates the description to 1024
characters.
l If a vdisk static-image property is longer than the UI column width, the vdisk
static-image show detailed command adds two blank spaces between
each property name.
l The maximum values displayed by the vdisk show config are system-wide
limits inherited from the MTree limit. The maximum number of pools supported
ranges from 100 to 256, depending on the specific model of Data Domain system.
l The vdisk device create command creates a device of at least, but not
necessarily the exact size specified. The only time a device of the exact size
specified is created is specified is when the capacity is specified in sectors with
the capacity n sectors option.
vdisk config
Virtual disk clone configuration.
Virtual disk cloning creates copies of virtual disk objects.
Clone operations are supported on the following virtual disk objects:
l Devices
l Device-groups
l Pools
vdisk config clone device source-device device-name source-pool
pool-name source-device-group device-group-name destination-
pool pool-name destination-device-group device-group-name
Clone a virtual disk device configuration to a specified destination pool and device
group. This command creates a new device in the destination pool and device-group
with the same configuration parameters as the source device. Role required: admin,
limited-admin.
vdisk config clone device-group source-device-group device-
group-name source-pool pool-name destination-pool pool-name
[destination-device-group device-group-name]
Clone a virtual disk device-group to a specified destination. This command creates a
new device-group and devices in the destination pool with the same configuration
parameters as the source device-group and devices. The command fails if the
destination pool or device-group already exists. Role required: admin, limited-admin.
vdisk config clone pool source-pool pool-name destination-pool
pool-name [vdisk-user vdisk-user]
Clone a virtual disk pool to a specified destination pool. This command creates a new
pool, device-group, and devices with the same configuration parameters as the source
pool, device-group, and devices. The command fails if the destination pool. Role
required: admin, limited-admin.
vdisk config export [{pool <pool-name>| pool <pool-name>
device-group <device-group-name>}] output-file <file-name>
Export a vdisk configuration to a file pathname Optionally specify a specific pool or
device-group configuration for export. Role required: admin, limited-admin.
vdisk config import [{pool <pool-name>| pool <pool-name>
device-group <device-group-name>}] [check-only] [skip-
initiators] [retain-serial-numbers] [on-error {continue |
stop}] input-file <filename>
Import a vdisk configuration that was exported to a file for migration to another
location. Role required: admin, limited-admin.
Argument definitions
device-group-name
A virtual disk device group name of up to 32 characters.
device-name
The name of the virtual disk device.
pool-name
A virtual disk pool name of up to 32 characters.
vdisk-user
An authorized virtual disk user who is associated (registered) with a virtual disk
pool. This user may manage all virtual disk objects that are associated with the
pool.
vdisk device
Manage individual virtual disk devices. A virtual disk device is a virtualized hard disk
drive that has the characteristics of a physical hard disk drive: heads, cylinders, and
sectors-per-track.
vdisk device create [count count] capacity n {MiB|GiB|TiB|PiB|
sectors} pool pool-name device-group device-group-name
Creates a device of at least, but not necessarily the exact size specified. The only time
a device of the exact size specified is created is specified is when the capacity is
specified in sectors with the capacity n sectors option.
vdisk device create [count count] heads head-count cylinders
cylinder-count sectors-per-track sector-count pool pool-name
device-group device-group-name
Add one or more new virtual disk devices. You can specify the disk size either by
entering a value n and a unit of size, or by specifying the physical characteristics of
the virtual disk. Not every possible geometry is compatible with VMAX, and not every
device size can be represented as a valid geometry. Role required: admin, limited-
admin.
vdisk device destroy device-name [destroy-static-images {yes|
no}]
Delete a device and optionally delete its static images.
420 EMC Data Domain Operating System 6.0 Command Reference Guide
vdisk
If you do not delete the static images, they become detached from (no longer
associated with) the device. Use the vdisk static-image commands to attach and
detach static images. Role required: admin.
Example 251
count count
The number of vdisk devices to create. The maximum is 2048. The default is 1.
cylinders cylinder-count
The number of cylinders that define the disk geometry, which is used to calculate
the disk capacity.
destroy-static-images {yes|no}
Whether to delete the static images of the specified device.
device-group-name
A virtual disk device group name of up to 32 characters.
device-name
The name of the virtual disk device.
heads head-count
The number of heads that define the disk geometry, which is used to calculate the
disk capacity.
pool-name
A virtual disk pool name of up to 32 characters.
sectors-per-track sector-count
The number of sectors per track that defines the virtual disk device geometry,
which is used to calculate the disk capacity.
static-image-name
The name of a static image.
wwn-name
A case-insensitive 30-byte string containing the hexadecimal values of the WWN.
Delimiting the string with ":" characters is optional.
vdisk device-group
Manage virtual disk device groups.
A virtual disk device-group is a second-level container in a pool. It contains one or
more virtual disk devices. It is represented as a subdirectory in the MTree of a virtual
disk pool. The name space for a device-group name is limited to the MTree of a single
vdisk pool.
Note
422 EMC Data Domain Operating System 6.0 Command Reference Guide
vdisk
device-group-spec
A list of virtual disk device groups that uses wildcards, such as “dg*”.
pool-name
A virtual disk pool name of up to 32 characters.
pool-spec
A list of virtual disk pools that uses a wildcard, such as “vpool*”.
vdisk disable
vdisk disable
Disable the vdisk service. Role required: admin, limited-admin.
vdisk enable
vdisk enable
Enable the vdisk service. Role required: admin, limited-admin.
vdisk group
Manage access between virtual devices and initiators.
Note
Use the scsitarget group commands to create, rename, or destroy virtual disk
groups.
Switch the in-use endpoints list for one or more devices in a virtual disk access group
between the primary port and the secondary endpoints. If you do not want to operate
on all of the devices in the device-group, filter the devices by providing a device-spec.
Role required: admin, limited-admin.
Argument definitions
device-group-name
A virtual disk device group name of up to 32 characters.
device device-spec
A list of devices that uses wildcards, such as “vdisk-dev*”.
group-spec
A list of virtual disk access groups that uses a wildcard, such as “group*”.
endpoint-list
A list of endpoints (logical names for target ports on the EMC Data domain
system).
group-name
Name of an access group.
group-spec
A list of virtual disk access groups that uses a wildcard, such as “group*”.
initiator initiator-spec
A list of initiators attached to the EMC Data Domain system for the virtual disk
service that uses a wildcard, such as “init1*”.
lun lun
A logical unit identified by a number. These are virtual disk devices exported from
the EMC Data Domain system.
pool-name
A virtual disk pool name of up to 32 characters.
vdisk pool
Manage the virtual disk pool.
A virtual disk pool is the highest-level container for virtual disk objects. It corresponds
to a managed tree (MTree) on an EMC Data Domain system.
Pools contain these lower-level objects:
l Device groups
l Devices
l Static images
vdisk pool create pool-name user user-name
Create a pool and its MTree, and assign an existing virtual disk user to the new pool.
Role required: admin, limited-admin.
vdisk pool destroy pool-name
Destroy a pool, including all of its devices and data. This command cannot destroy
pools that are replication destinations. Role required: admin.
vdisk pool modify pool-name user user-name
424 EMC Data Domain Operating System 6.0 Command Reference Guide
vdisk
Assign an existing virtual disk user to an existing pool. Role required: admin, limited-
admin.
vdisk pool register pool-name user vdisk-user
Register an existing pool or replica virtual disk MTree on a Data Domain system
configured as a replication destination to vdisk, and assign an existing virtual disk user
to the pool. Role required: admin, limited-admin.
vdisk pool rename src-pool-name dst-pool-name
Rename a pool from src-pool-name to dst-pool-name. Role required: admin, limited-
admin.
vdisk pool show list [pool-spec]
List all pools or selected pools. All users may run this command option.
vdisk pool show detailed [pool-spec] [user vdisk-user]
Show detailed information about some or all pools. All users may run this command
option.
vdisk pool unregister pool-name user vdisk-user
Unregister an existing pool or MTree from vdisk, making all the data associated with
the pool inaccessible. This command requires the user to enter a password. Role
required: admin, limited-admin.
Argument definitions
pool-name
A virtual disk pool name of up to 32 characters.
pool-spec
A list of virtual disk pools that uses a wildcard, such as “vpool*”.
user-name
An EMC Data Domain system user name with a specified role, such as backup
operator.
vdisk-user
An authorized virtual disk user who is associated (registered) with a virtual disk
pool. This user may manage all virtual disk objects that are associated with the
pool.
vdisk property
Set or remove properties for pools, device groups, devices, and static images.
vdisk property reset object-name name object-type pool {all |
property-name name}
vdisk property reset object-name name object-type device-group
pool pool-name {all | property-name name}
vdisk property reset object-name name object-type device {all |
property-name name}
vdisk property reset object-name name object-type static-image
{device device-name | device-group device-group-name pool pool-
name}{all | property-name name}
Reset properties for a virtual disk object. Role required: admin, limited-admin.
vdisk property set object-name name object-type pool property-
name name property-value value
vdisk property set object-name name object-type device-group
pool pool-name property-name name property-value value
Example 252
Argument definitions
device-group-name
A virtual disk device group name of up to 32 characters.
device-name
The name of the virtual disk device.
object-name name
A virtual disk object name. Virtual disk objects include pools, device groups,
devices, and static images.
pool-name
A virtual disk pool name of up to 32 characters.
property-name name
A property for a virtual disk object, which can be used to identity the object. For
example, a virtual disk pool named pool-1 might have a property department
with the value HR.
property-value value
A value for a virtual disk object property.
vdisk reset
Reset detailed virtual disk statistics. Role required: admin, limited-admin.
vdisk reset detailed-stats
vdisk show
Display information about virtual disk configuration limits and I/O statistics.
vdisk show config
Show the vdisk configuration limits. The limits displayed scale based on the Data
Domain system model. Role required: admin, limited-admin.
The maximum values are system-wide limits inherited from the MTree limit. The
command adjusts the output based on MTrees used by other protocols. The maximum
number of pools supported ranges from 100 to 256, depending on the specific model
of Data Domain system.
426 EMC Data Domain Operating System 6.0 Command Reference Guide
vdisk
Example 255
Argument definitions
count count
The number of iterations of statistics to display.
device device-spec
A list of devices that uses wildcards, such as “vdisk-dev*”.
device-group devgrp-spec
A collection of virtual disk devices.
endpoint-spec
A list of endpoints that uses a wildcard, such as “endpoint*”.
interval interval
A time window (waiting time) within which to show virtual disk I/O statistics for
virtual disk devices
pool-name
A virtual disk pool name of up to 32 characters.
vdisk static-image
Manage static images for devices.
A static image is a point-in-time copy of data for a vdisk device. Static images are
created within a device group. You can copy (but not move) static images to other
device groups. When you create a static image, it has the same pre-compression size
as the original vdisk device. As you create more static images, the pre-compression
sizes of the static image files adds to the pre-compression size of the containing
428 EMC Data Domain Operating System 6.0 Command Reference Guide
vdisk
Mtree. Likewise, the compression ratio is affected by creating the static image files.
This behavior means that you can set Mtree quotas based on the sizes of the devices
and their associated static images.
A static image contains:
l A point-in-time copy of application data for a vdisk device.
l Additional metadata inserted by the vdisk feature.
vdisk static-image attach source-static-image-name source-pool
pool-name source-device-group device-group-name destination-
device device-name
Attach an existing static image to a specified destination device. This command fails if
a static image is already attached to the specified destination device. Role required:
admin, limited-admin.
The attach and detach command options let you organize static images by associating
them with a specific device, device group, or pool. When a static image becomes
detached, it is still available for use, but it is not visible if you run vdisk static-
image show commands and you filter the output by device.
Attaching a static image to a device does not imply that the device is using the image,
and does not alter the current set of active data. The attach operation only
associates the static image with the device, for purposes of organizing the static
images.
vdisk static-image copy src-static-image-name {source-device
device-name | source-pool pool-name source-device-group device-
group-name} {destination-device device-name | destination-pool
pool-name destination-device-group device-group-name}
Copy an existing static image to a specified destination. Role required: admin, limited-
admin.
vdisk static-image create device src-device-name[destination-
device device-name | destination-pool pool-name destination-
device-group device-group-name]
Create a new static image of a device and attach the static image to the same device,
to a different device, or to a specified device group in a specified pool. Role required:
admin, limited-admin.
vdisk static-image destroy static-image-name [device device-
name | pool pool-name device-group device-group-name]
Delete a static image. Specify the device, pool, or device-group where the static
image resides to delete a single copy if there are multiple copies of the static image.
Role required: admin.
vdisk static-image detach static-image-name device device-name
Detach a static image from a device. Role required: admin, limited-admin.
vdisk static-image show detailed [static-image-spec] [device
device-name | pool pool-name [device-group device-group]
Show detailed information about all or specified static images. All users may run this
command option.
vdisk static-image show list [static-image-spec] [device
device-name | pool pool-name [device-group device-group]]
List all or specified static images. All users may run this command option.
Argument definitions
device-group
A collection of virtual disk devices that you can use to manage the devices as a
group. Device groups exist in virtual disk pools. Device group namespaces are
limited to the virtual disk pool that contains the device group. Device group
names may be up to 32 characters in length. The maximum number of device
groups per pool is 1024. The maximum number of device groups per system is
5120.
device-group-name
A virtual disk device group name of up to 32 characters.
device-name
The name of the virtual disk device.
pool-name
A virtual disk pool name of up to 32 characters.
src-static-image-name
The name of a static image that is the source for a copy operation. The system
generates these names automatically; use vdisk static-image show list
to see the names.
static-image-name
The name of a static image.
static-image-spec
A list of static image names that uses a wildcard (*).
vdisk status
vdisk status
Show the status of the vdisk service. The output shows whether the vdisk service is
enabled or disabled; whether the vdisk process is running; and whether the system has
a license for the vdisk feature. Role required: admin, limited-admin.
vdisk trace
Manage tracing for virtual disk groups, initiators, and other components.
vdisk trace disable [component component-list]
Disable tracing for all or specified components. Role required: admin, limited-admin.
vdisk trace enable [component {all | component-list}] [level
{all | high | medium | low}] [timeout {never | timeout-value-
in-minutes}]
Enable tracing for all or specified components. By default, tracing applies to all
components. If you specify a component, tracing is limited to that component, where
applicable. Role required: admin, limited-admin.
vdisk trace show [component {all |component-list}]
Show tracing for all or specified components. All users may run this command option.
Argument definitions
component-list
Specify all, default, or specific vdisk components from this list: abnormal,
device-io, fs-op, hba, obj_mgmt, procmon, scsi-other, scsi-req,
scsitgt, sms-op, sys-mgmt, threads, and work-item. The default list is
used by default.
430 EMC Data Domain Operating System 6.0 Command Reference Guide
vdisk
timeout-value-in-minutes
Timeout for tracing. The default timeout is 10 minutes.
vdisk user
Manages user privilege to access and perform tasks on virtual disks.
vdisk user assign vdisk-user
Let the specified users work with virtual disks. Separate each user name in user-list
with a comma. Role required: admin, limited-admin.
vdisk user unassign vdisk-user
Revoke the permission for the specified users to work with virtual disks. Role required:
admin, limited-admin.
vdisk user show
List the virtual disk users and the pools to which each user is assigned. All users may
run this command option.
Argument definitions
vdisk-user
An authorized virtual disk user who is associated (registered) with a virtual disk
pool. This user may manage all virtual disk objects that are associated with the
pool.
432 EMC Data Domain Operating System 6.0 Command Reference Guide
CHAPTER 45
vtl
EMC Data Domain Virtual Tape Library (VTL) is a licensed software option that
enables backup applications to connect to and manage a DD system running Extended
Retention as a virtual tape library.
VTL pools are MTree-based (as of DD OS 5.2). Multiple MTrees let you more closely
configure DD OS for data management. MTree-based pools allow MTree replication to
be used instead of directory replication. Existing pools are backward compatible. You
may create additional backward-compatible pools as needed. VTL pool-based
replication is performed using MTree replication for MTree pools, and directory
replication for backward-compatible pools. MTree-specific attributes can be applied to
each VTL pool individually and include snapshots and snapshot schedules,
compression information, and migration policies for Extended Retention.
The recommended number of concurrent virtual tape drive instances is platform-
dependent, as is the recommended number of streams between a DD system and a
backup server. This number is system-wide and includes streams from all sources,
such as VTL, NFS, and CIFS. For details on the recommended number of tape drives
and data streams, see the EMC Data Domain Operating System Administration Guide.
Note
VTL does not protect virtual tapes from a filesys destroy, which will delete all
virtual tapes.
vtl 433
vtl
434 EMC Data Domain Operating System 6.0 Command Reference Guide
vtl
vtl add
vtl add vtl [model model] [slots num-slots] [caps num-caps]
Add a tape library. VTL supports a maximum of 64 libraries per DD system (that is, 64
VTL instances on each DD system). Role required: admin, limited-admin.
Argument Definitions
caps num-caps
The number of cartridge-access ports. The default is zero (0), and the maximum
is 100 per library or 1000 per system.
model model
The name of the tape library model. See the Data Domain technical note for the
model name that corresponds with your backup software.
slots num-slots
The number of slots in the library. You cannot add more drives than the number of
configured slots. The maximum number of slots for all VTLs on a DD system is
32,000. The default is 20 slots.
vtl
The name of the particular virtual tape library.
vtl cap
vtl cap add vtl [count num-caps]
Add cartridge access ports (CAPs) to a virtual tape library (VTL). The total number of
CAPs cannot exceed 100 per library or 1000 per system. Role required: admin, limited-
admin.
vtl cap del vtl [count num-to-del]
Delete num-to-del CAPs from a VTL. The CAPs are deleted from the end. Role
required: admin, limited-admin.
Example 256
Argument Definitions
count num-caps
The number of cartridge-access ports to add. The default is 1.
count num-to-del
The number of objects to delete. The default is 1.
vtl
The name of the particular virtual tape library.
vtl config
vtl config export [vtl vtl] output-file filename
Export a VTL configuration to a file pathname. Role required: admin, limited-admin.
vtl config import [vtl vtl] [check-only] [skip-initiators]
[retain-serial-numbers] [on-error {continue | stop}] input-file
filename
Import a VTL configuration from a file pathname. Role required: admin, limited-admin.
Argument Definitions
check-only
This option:
l Uses the schema to validate the XML Configuration File.
l Validates the names of the following:
n groups
n initiators
n endpoints
n devices (changers, drives)
l Checks the format of the initiator system name.
l Checks whether the initiator_address_method element value belongs to one
of the following:
n SCSITGTD_INITIATOR_ADDRESS_METHOD_UNKNOWN
n SCSITGTD_INITIATOR_ADDRESS_METHOD_AUTO
n SCSITGTD_INITIATOR_ADDRESS_METHOD_VSA
l Checks whether the initiator_transport and endpoint_transport elements
values belong to one of the following:
n SCSITGTD_TRANSPORT_UNKNOWN
n SCSITGTD_TRANSPORT_FC
n SCSITGTD_TRANSPORT_FCOE
n SCSITGTD_TRANSPORT_ISCSI
n SCSITGTD_TRANSPORT_DUMMY
n SCSITGTD_TRANSPORT_ALL
l Checks that the values of the following elements are BOOLEAN values (0,1
which mean FALSE and TRUE, respectively.)
n endpoint_enabled_status
n endpoint_online_status
n auto_offline_option (global)
n auto_eject_option (global)
436 EMC Data Domain Operating System 6.0 Command Reference Guide
vtl
n vtl_auto_eject_option
n vtl_auto_offline_option
l Validates the drive numbers.
n Checks for repeated occurrences of the drive number.
n Checks to make sure that the drive number does not exceed the maximum
drive number allowed on the Data Domain system.
l Makes sure that the value of the VTL barcode length is appropriate, based on
the model of the library.
l Does not commit the transactions or does not import any of the VTL
configuration.
l When the retain-serial-numbers option is used, checks for the following:
n whether the Data Domain system on which the vtl config import
retain-serial-numbers is being used already has some VTL devices.
If yes, it gives you an error.
n validates the devices serial numbers.
input-file filename
The input file. Note that:
l The filename will be automatically appended with an .xml extension and stored
in the /ddvar/etc/vtl_configuration_files directory.
l An .xml extension can also be provided explicitly. Any other extension will
cause an error.
n Changers
– If an error occurs while creating a changer, the command continues to
configure the next VTL.
– If an error occurs while adding a changer to a group, the command
continues to add the changer to other groups.
n Drives
– If an error occurs while adding a drive, the command continues to add
the next drive.
– If an error occurs while adding a drive to a group, the command
continues to add the drive to other groups.
l Options
n If an error occurs while enabling/disabling a VTL option, the command
continues to configure the next option.
output-file filename
The output file. Note that:
l The filename will be automatically appended with an .xml extension and stored
in the /ddvar/etc/vtl_configuration_files directory.
l An .xml extension can also be provided explicitly. Any other extension will
cause an error.
retain-serial-numbers
Preserves serial numbers while creating devices on a DD system, but only when
there are no pre-existing devices on that DD system. If the serial number of a
device is changed in the XML configuration file, then the vdev_id of that device
should also be changed to an appropriate value, because the serial number of a
device is dependent on the vdev_id.
skip-initiators
Indicates:
l Skip renaming initiators, if initiators with the same system names already
exist.
l Skip setting initiator aliases.
l Skip adding initiators to groups.
vtl
The name of the particular virtual tape library.
vtl debug
vtl debug disable [component {all | user | default | component-
list}]
Disable debug functionality of the specified components. Role required: admin,
limited-admin.
vtl debug enable [component {all | user | default | component-
list}] [level {high | medium | low}] [timeout {never | timeout-
value-in-minutes}]
438 EMC Data Domain Operating System 6.0 Command Reference Guide
vtl
Enable debug functionality for the specified components in persistent mode or for a
specified timeout period (in minutes) at a specified debug level. Role required:
admin, limited-admin.
vtl debug show [component {all | user | default | component-
list}]
Show specified components, or all components, running debug functionality. Role
required: admin, limited-admin, security, user, backup-operator, none.
Argument Definitions
component {all | user | default | component-list}
The VTL debugging components. If you want to list them, you can include one or
more of the following:
vhba
scst
fc
ddcl
vtc
vmc
vtlprocess
group
vscsi
vtlsm
vtc_readahead
info_cache
persistent_reservations
master_client
master_server
worker_client
worker_server
vdev_thread
registry
misc
Note
vtl del
vtl del vtl
Remove an existing VTL. Any tapes loaded into the library when the library is deleted
are not destroyed. Instead, tapes are placed back into the virtual tape vault. Role
required: admin.
Argument Definitions
vtl
The name of the particular virtual tape library.
vtl disable
vtl disable
Close all libraries and shut down the VTL process. Role required: admin, limited-admin.
vtl drive
vtl drive add vtl [count num-drives] [model model]
Add drives to a VTL. Drives are added by starting with drive number 1 and scanning for
logical unit address gaps left by vtl drive del. When the gaps are filled, the drives
are appended to the end of the library. The number of slots within a library cannot be
fewer than the number of drives in the library. If an attempt is made to add more
drives than the current number of slots, the system automatically adds the additional
slots required. Be aware that you cannot mix drive models within the same library.
Role required: admin, limited-admin.
vtl drive del vtl drive drive-number [count num-to-del]
Delete virtual drives from a VTL. Any drive can be deleted, which means there can be
gaps in the drive list. This may cause issues with some applications. Role required:
admin, limited-admin.
vtl drive show {serial-number serial-number | vtl vtl [drive
{drive-list}]}
View details of VTL drives. Role required: admin, limited-admin, security, user, backup-
operator, none.
Output Definitions
Location
Standard format location of library or drive.
Serial #
Drive serial number.
Vendor
Drive vendor identification.
440 EMC Data Domain Operating System 6.0 Command Reference Guide
vtl
Product
Drive product identification.
Product revision
Drive product revision.
Status
Drive status.
Barcode
Barcode of loaded tape.
Pool
Pool of loaded tape.
Previous Slot
Previous slot of loaded tape.
Device
SCSI device ID.
Persistent Reservation
Persistent reservation information.
Access Groups
Fibre Channel access groups for device.
Argument Definitions
count num-drives
The number of drives to add. The default is 1.
count num-to-del
The number of objects to delete. The default is 1.
drive drive-list
The list of drives.
drive drive-number
The number of the VTL drive.
model model
The name of the tape library model. See the Data Domain technical note for the
model name that corresponds with your backup software.
serial-number serial-number
The serial number.
vtl
The name of the particular virtual tape library.
vtl enable
vtl enable
Enable the VTL subsystem. Before VTL can be enabled:
l You must have at least one Fibre Channel (FC) interface card installed on your DD
system. VTL communicates between a backup server and a DD system through an
FC interface.
l You must have previously enabled the file system and scsitarget features.
l You must have set the record (block) size for the backup software on the
application host; the minimum is 64 KiB or larger. Changing the block size after the
initial configuration may render unreadable any data written in the original size.
Note
VTL Fibre Channel operation is expected to be interrupted when VTL Fibre Channel
endpoints failover. You may need to perform discovery (that is, operating system
discovery and configuration of VTL devices) on the initiators using the affected Fibre
Channel endpoint. You should expect to re-start active backup and restore operations.
vtl export
vtl export vtl {slot | drive | cap} address [count count]
Remove tapes from a slot, drive, or cartridge-access port (CAP) and send them to the
vault. Role required: admin, limited-admin, backup-operator.
Argument Definitions
address
The address.
count count
The number of tapes.
vtl
The name of the particular virtual tape library.
vtl group
vtl group add group-name initiator initiator-alias-or -WWPN
Add an initiator alias or world-wide port name to the specified VTL access group. Role
required: admin, limited-admin.
vtl group add group-name vtl vtl-name {all | changer | drive
drive-list} [lun lun] [primary-port {all | none | port-list}]
[secondary-port {all | none | port-list}]
Add a changer or drives to the specified VTL access group. You can add a changer or
drive, optionally starting at a given logical unit number (LUN). You can optionally
specify primary and secondary DD system VTL port lists. By default, the port lists
contain all DD system VTL ports. Role required: admin, limited-admin.
vtl group create group-name
Create a VTL access group with the specified name. After the group is created, VTL
devices (changer or drive) and initiators may then be added to the group. Role
required: admin, limited-admin.
vtl group del group-name initiator initiator-alias-or-WWPN
Remove an initiator alias or world-wide port name from the specified VTL access
group. Role required: admin, limited-admin.
442 EMC Data Domain Operating System 6.0 Command Reference Guide
vtl
dst-group-name
The name of the destination group.
group-name
The VTL group name, which must follow these rules:
l It must be unique
l It can contain only the characters 0-9, a-z, A-Z, underscore, and hyphen.
l It cannot exceed 256 characters.
l It cannot be a reserved name: TapeServer, default, all, and summary.
l A maximum of 2,048 groups is allowed.
initiator initiator-alias-or-WWPN
The initiator alias or world-wide port name.
lun lun
The device address to pass to the initiator. The maximum logical unit number
(LUN) is 16383. A LUN must be unique within a group, but does not have to be
unique across the system. LUNs for VTL devices within a group must start with
zero (0) and be contiguous numbers.
port port-list
Includes a comma-separated list of DD system VTL ports. You can specify port
names as a range separated by a hyphen (-). The ports must already exist. For
multiple ports, separate each name with a comma, and enclose the list with
double quotes.
primary-port
The primary VTL ports on which the devices are visible. By default, or if you
specify all, the VTL devices are visible on all ports. Specify none if the devices
should not be visible on any ports.
secondary-port
The secondary VTL ports on which devices are visible to vtl group use
secondary. By default, the devices are visible on all ports. The secondary port
list supports path redundancy.
src-group-name
The name of the source group.
vtl
The name of the particular virtual tape library.
vtl import
vtl import vtl barcode barcode [count count] [pool pool]
[element {drive | cap | slot}] [address addr]
Move tapes from the vault into a slot, drive, or CAP (cartridge access port). Use vtl
tape show to display the total number of slots for a VTL and to view which slots are
currently used. Use commands from the backup server to move VTL tapes to and from
drives. Although vtl import can move tapes into tape drives, backup software
commands from the backup server are more frequently used to move VTL tapes to
and from drives. The default address is 1, the default element is slot, and the default
pool is Default. If no address is specified, the first free slot available is used. For
example if slots 1 through 4 are occupied or reserved, the address used will be 5. If the
address you specify is already in use, the first free slot that is larger than the address
specified is used.
The number of tapes that can be imported at one time is limited by:
l The number of empty slots. You cannot import more tapes than the number of
currently empty slots.
l The number of slots that are empty and not reserved for a tape currently in a
drive.
l If a tape is in a drive and the tape origin is known to be a slot, the slot is reserved.
l If a tape is in a drive and the tape origin is unknown (slot or CAP), a slot is
reserved.
444 EMC Data Domain Operating System 6.0 Command Reference Guide
vtl
l A tape that is known to have come from a CAP and that is in a drive does not get a
reserved slot. (The tape returns to the CAP when removed from the drive.)
The number of tapes that can be imported equals:
l The number of empty slots.
l The number of tapes that came from slots.
l The number of tapes of unknown origin.
Role required: admin, limited-admin, backup-operator.
Argument Definitions
address
The address.
barcode barcode
An eight-character virtual tape identifier. The first six characters are numbers or
uppercase letters (0-9, A-Z). The last two characters are the tape code for the
supported tape type: L1 (LTO-1, 100 GiB, the default capacity), LA (LTO-1, 50
GiB), LB (LTO-1, 30 GiB), LC (LTO-1, 10 GiB), L2 (LTO-2, default capacity of 200
GiB), L3 (LTO-3, default capacity of 400 GiB), L4 (LTO-4, default capacity of
800 GiB), L5 (LTO-5, default capacity of 1.5 TiB).
The default capacities are used if you do not specify the capacity argument when
creating the tape cartridge. If you do specify a capacity, it will override the two-
character tag.
When using count and barcode together, use a wild card character in the
barcode to make the count valid. An asterisk matches any character in that
position and all other positions. A question mark matches any character in that
position.
Note
L1, LA, LB and LC tapes cannot be written on LTO-3 tape drives. L2 and L3 tapes
cannot be read on LTO-1 tape drives. Also, LTO-4 will not read L2 tapes (in
addition to the LA-L1 tapes).
count count
The number of tapes.
element
The destination element.
pool pool
The name of the pool. This argument is required if tapes are in a pool.
vtl
The name of the particular virtual tape library.
vtl initiator
vtl initiator reset address-method initiator initiator-alias-
or-WWPN
This command is deprecated. Use scsitarget initiator modify instead.
vtl initiator reset alias alias-name
This command is deprecated. Use scsitarget initiator rename instead.
vtl initiator set address-method {auto | vsa} initiator
initiator-alias-or-WWPN
This command is deprecated. Use scsitarget initiator modify instead.
vtl initiator set alias alias-name wwpn wwpn
This command is deprecated. Use scsitarget initiator add instead.
vtl initiator show [initiator initiator-alias-or-WWPN | port
port-list]
This command is deprecated. Use scsitarget initiator show detailed or
scsitarget initiator show list instead.
vtl option
vtl option disable option name [vtl vtl ]
Disable a VTL option. Optionally, you can do this only for the specified VTL. Role
required: admin, limited-admin.
vtl option enable option name [vtl vtl ]
Enable a VTL option. Optionally, you can do this only for the specified VTL. Role
required: admin, limited-admin.
vtl option reset option name [vtl vtl ]
Reset a VTL option to its default value. Optionally, you can do this only for the
specified VTL. Role required: admin, limited-admin.
vtl option set option name value [vtl vtl ]
Set an option and value. Optionally, you can do this only for the specified VTL. Role
required: admin, limited-admin.
vtl option show {option name | all} [vtl vtl]
Show settings for a specific option, all VTL options, or only for the specified VTL. Also,
lists any serial-number-prefixes that are different from the default values. Role
required: admin, limited-admin, security, user, backup-operator, none.
446 EMC Data Domain Operating System 6.0 Command Reference Guide
vtl
serial-number-prefix 6A5690
-------------------- -----
Argument Definitions
Values for option name are:
auto-eject
If enabled, tapes placed into CAPs are automatically ejected to the vault.
auto-offline
If enabled, tapes being moved from a drive causes the drive to be automatically
taken offline and unloaded unless the prevent bit is set for the drive.
barcode-length
Allows you to explicitly set the length – to either 6 or 8 – of the tape barcode that
the library will report to the initiator/client.
By default (when barcode-length is not set), the library reports the length of the
barcode depending on the type of library. For example, if tape AAA001L3 is put in
an L180, DDVTL, or RESTORER-L180 library, the library will report this tape to
the initiator/client as AAA001. If the same tape is placed in a TS3500, I2000, or
I6000 library, the library will report this tape to the initiator/client as AAA001L3.
However, if you do specify the barcode-length, for example, vtl option set
barcode-length 6 vtl my_ts3500_library on a TS3500 library, then the
barcode will be reported to the initiator/client as AAA001, which is the same
length as for an L180 library.
loop-id - deprecated
The Fibre Channel loop ID: 1-26. This value has been deprecated and will be
removed in future releases. To set the loop ID on a Data Domain system, enter a
number between 1 and 26 in the value field of scsitarget transport
option set.
serial-number-prefix
The prefix of the serial number, which can be modified globally or per library.
vtl pool
vtl pool add pool [backwards-compatibility-mode]
Create a VTL pool. If backwards-compatibility-mode is used, a pool with
backwards compatibility is created in the default directory (/backup). It is
recommended that you create backwards-compatibility pools only if you have specific
requirements, for example, replication with a pre-5.2 DD OS system. Replication of
backwards-compatibility-mode pools is done using directory-based replication, as in
previous releases. Role required: admin, limited-admin.
vtl pool del pool
Delete a VTL pool. You must run vtl tape del to remove all tapes from a pool, or
use vtl tape move to move all tapes to another pool. Role required: admin.
vtl pool rename src-pool dst-pool
Rename a VTL pool. A pool can be renamed only if none of its tapes is in a library. Role
required: admin, limited-admin.
vtl pool show {all | pool}
List all tape pools or the contents of a specific pool. If all is used, a summary of all
tape pools is provided, including the state of each pool, the number of tapes, the total
usage and compression for each pool, whether a pool is a replication destination, the
Retention Lock status of the pool, read/write properties, and the number of tapes in
the pool. Role required: admin, limited-admin, security, user, backup-operator, none.
Output Definitions
RW
Pool has normal read/write properties.
RD
Pool is a replication destination.
RO
Pool is read-only.
RLCE
Pool is Retention Lock Compliance Enabled.
RLGE
Pool is Retention Lock Governance Enabled.
RLGD
Pool is Retention Lock Governance Disabled.
BCM
Pool is in backwards-compatibility mode.
448 EMC Data Domain Operating System 6.0 Command Reference Guide
vtl
See the EMC Data Domain Operating System Administration Guide for more information
about upgrading directory pools to MTree pools. Role required: admin, limited-admin.
Example 257
Example 258
Argument Definitions
dst-pool
The name of the new VTL pool.
source src-pool
The name of the current VTL pool.
vtl port
vtl port disable {all | port-list}
This command is deprecated. Use scsitarget endpoint disable or
scsitarget port disable instead.
vtl port enable {all | port-list}
This command is deprecated. Use scsitarget endpoint enable or
scsitarget port enable instead.
vtl port option reset [{fcp2-retry | topology} [port {port-list
| all}]]
This command is deprecated. Use scsitarget endpoint modify or
scsitarget port modify instead.
vtl port option set fcp2-retry {disable | enable} [port {port-
list | all}]
This command is deprecated. Use scsitarget endpoint modify or
scsitarget port modify instead.
vtl port option set topology {loop-preferred | loop-only |
point-to-point} [port {port-list | all}]
This command is deprecated. Use scsitarget endpoint modify or
scsitarget port modify instead.
vtl port option show [{fcp2-retry | topology} [port {port-list
| all}]]
This command is deprecated. Use scsitarget endpoint modify or
scsitarget port modify instead.
vtl port show detailed-stats
This command is deprecated. Use scsitarget port show detailed-stats
instead.
vtl port show hardware
This command is deprecated. Use scsitarget port show list or scsitarget
port show detailed instead.
vtl readahead
vtl readahead reset {stats | summary}
Reset VTL readahead information. When VTL reads a tape file, it improves
performance by reading ahead information from tape files and caching the information
until needed. Role required: admin, limited-admin.
vtl readahead show {stats | detailed-stats | summary}
Display readahead information about each open tape file that has been read. Role
required: admin, limited-admin, security, user, backup-operator, none.
Argument Definitions
detailed-stats
Provides detailed statistics.
stats
Displays statistics.
summary
Shows a summary of all tapes and tape usage.
vtl rename
vtl rename src-vtl dst-vtl
Rename a virtual tape library. The source name and the destination name must differ.
Role required: admin, limited-admin.
vtl reset
vtl reset hba - deprecated
This command is deprecated. Use scsitarget endpoint connection-reset
all instead. Role required: admin.
vtl reset detailed-stats
Reset the VTL detailed statistics. Role required: admin, limited-admin.
vtl show
vtl show config [vtl]
Show the library name and model and tape drive model for a single VTL or all VTLs.
Role required: admin, limited-admin, security, user, backup-operator, none.
vtl show detailed-stats
Show a large quantity of detailed VTL statistics and information. Role required: admin,
limited-admin, security, user, backup-operator, none.
450 EMC Data Domain Operating System 6.0 Command Reference Guide
vtl
detailed-stats
Provides detailed statistics.
interval secs
The time interval in seconds.
vtl
The name of the particular virtual tape library.
vtl slot
vtl slot add vtl [count num-slots]
Add slots to a VTL. Additional slots are added to the end of the list of slots in the
specified VTL. The maximum is 32,000 slots per library and 64,000 slots per system.
Role required: admin, limited-admin.
vtl slot del vtl [count num-to-del]
Delete one or more slots from a VTL. Role required: admin, limited-admin.
Argument Definitions
count num-slots
The number of slots to add to the library. You cannot add more drives than the
number of configured slots. The default is 20 slots.
count num-to-del
The number of slots to delete from the library.
vtl
The name of the particular virtual tape library.
vtl status
vtl status
Show the state of the VTL process. Role required: admin, limited-admin, security,
user, backup-operator, none.
vtl tape
vtl tape add barcode [capacity capacity] [count count] [pool
pool]
Add one or more virtual tapes and insert them into the vault. Optionally, add the tapes
to the specified pool. Role required: admin, limited-admin.
vtl tape copy barcode barcode [count count] source src-pool
[snapshot src-snapshot] destination dst-pool
Copy tapes between VTL pools. An opened writable tape in a tape drive may not be
copied. Additionally, source and destination pools cannot be the same unless copying
from a snapshot. If the snapshot argument is specified, tapes are copied from the
snapshot of the source pool. In this case, the destination pool can be the same as the
source pool. A tape in the vault or library slot/cap, or opened read-only in a tape drive,
can be copied. A tape that is opened writable in a tape drive may not be copied. Role
required: admin, limited-admin, backup-operator.
452 EMC Data Domain Operating System 6.0 Command Reference Guide
vtl
NOTICE
barcode barcode
An eight-character virtual tape identifier. The first six characters are numbers or
uppercase letters (0-9, A-Z). The last two characters are the tape code for the
supported tape type: L1 (LTO-1, 100 GiB, the default capacity), LA (LTO-1, 50
GiB), LB (LTO-1, 30 GiB), LC (LTO-1, 10 GiB), L2 (LTO-2, default capacity of 200
GiB), L3 (LTO-3, default capacity of 400 GiB), L4 (LTO-4, default capacity of
800 GiB), L5 (LTO-5, default capacity of 1.5 TiB).
The default capacities are used if you do not specify the capacity argument when
creating the tape cartridge. If you do specify a capacity, it will override the two-
character tag.
When using count and barcode together, use a wild card character in the
barcode to make the count valid. An asterisk matches any character in that
position and all other positions. A question mark matches any character in that
position.
Note
L1, LA, LB and LC tapes cannot be written on LTO-3 tape drives. L2 and L3 tapes
cannot be read on LTO-1 tape drives. Also, LTO-4 will not read L2 tapes (in
addition to the LA-L1 tapes).
capacity capacity
The number of gibibytes (GiB) for each tape created. This value overrides default
barcode capacities. The upper limit is 4,000 GiB. For best results, when data
becomes obsolete (and the DD system cleaning process marks data for removal),
set capacity to 100 or less for efficient reuse of DD system disk space.
GiBs equal the base-2 value of Gigabytes (GB).
count count
The number of tapes.
pool pool
The name of the pool. This argument is required if tapes are in a pool.
snapshot src-snapshot
A specific snapshot within a source pool.
source src-pool
The name of the current VTL pool.
454 EMC Data Domain Operating System 6.0 Command Reference Guide
vtl
456 EMC Data Domain Operating System 6.0 Command Reference Guide
APPENDIX A
Time Zones
Africa
Table 3 African time zones
458 EMC Data Domain Operating System 6.0 Command Reference Guide
Time Zones
America
Table 4 American time zones
America 459
Time Zones
Antarctica
Table 5 Antarctic time zones
Troll Vostok
Asia
Table 6 Asian time zones
460 EMC Data Domain Operating System 6.0 Command Reference Guide
Time Zones
Atlantic
Table 7 Atlantic time zones
St_Helena Stanley
Australia
Table 8 Australian time zones
Brazil
Table 9 Brazilian time zones
Atlantic 461
Time Zones
Canada
Table 10 Canadian time zones
Yukon
Chile
Table 11 Chilean time zone
Continental EasterIsland
Etc
Table 12 Etc time zones
Europe
Table 13 European time zones
462 EMC Data Domain Operating System 6.0 Command Reference Guide
Time Zones
GMT
Table 14 GMT time zones
GMT-12
Reunion
Mexico
Table 16 Mexican time zones
Miscellaneous
Table 17 Miscellaneous time zones
GMT 463
Time Zones
W-SU Zulu
Pacific
Table 18 Pacific time zones
Wallis Yap
US (United States)
Table 19 US (United States) time zones
Aliases
GMT=Greenwich, UCT, UTC, Universal, Zulu CET=MET (Middle European Time)
Eastern=Jamaica Mountain=Navajo
464 EMC Data Domain Operating System 6.0 Command Reference Guide