Restorer Operating System User Guide
Transcription
Restorer Operating System User Guide
Restorer Operating System User Guide Software Version 4.1.0 Disclaimer The information contained in this publication is subject to change without notice. Data Domain, Incorporated makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Data Domain, Incorporated shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual. Notices NOTE: Data Domain hardware has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. This Class A digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe A est conforme à la norme NMB-0003 du Canada. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense. Changes or modifications not expressly approved by Data Domain can void the user's authority to operate the equipment. Data Domain Patents Data Domain products are covered by one or more of the following patents issued to Data Domain. U.S. Patents: 6928526, 7007141, 7065619. Data Domain has other patents pending. Copyright Copyright © 2005 - 2007 Data Domain, Incorporated. All rights reserved. Data Domain, the Data Domain logo, Restorer Operating System, Data Domain OS, Global Compression, Data Invulnerability Architecture, and all other Data Domain product names and slogans are trademarks or registered trademarks of Data Domain, Incorporated in the USA and/or other countries. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Portions of this product are software covered by the GNU General Public License Copyright © 1989, 1991 by Free Software Foundation, Inc. Portions of this product are software covered by the GNU Library General Public License Copyright © 1991 by Free Software Foundation, Inc. Portions of this product are software covered by the GNU Lesser General Public License Copyright © 1991, 1999 by Free Software Foundation, Inc. Portions of this product are software covered by the GNU Free Documentation License Copyright © 2000, 2001, 2002, by Free Software Foundation, Inc. Portions of this product are software covered by the GNU Free Documentation License Copyright © 2000, 2001, 2002 by Free Software Foundation, Inc. Portions of this product aresoftware Copyright © 1999 - 2003, by The OpenLDAP Foundation. Portions of this product are software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/), Copyright © 1998-2005 The OpenSSL Project, all rights reserved. Portions Copyright © 1999-2003 Apple Computer, Inc. All rights Reserved. Portions of this product are Copyright © 1995 - 1998 Eric Young ([email protected]) All rights reserved. Portions of this product are Copyright © Ian F. Darwin 1986-1995. All rights reserved. Portions of this product are Copyright © Mark Lord 1994-2004. All rights reserved. Portions of this product are Copyright © 1989-1997 Larry Wall All rights reserved. Portions of this product are Copyright © Mike Glover 1995, 1996, 1997, 1998, 1999. All rights reserved. Portions of this product are Copyright © 1992 by Panagiotis Tsirigotis. All rights reserved. Portions of this product are Copyright © 2000-2002 Japan Network Information Center. All rights reserved. Portions of this product are Copyright © 1988-2003 by Bram Moolenaar. All rights reserved. Portions of this product are Copyright © 1994-2006 Lua.org, PUC-Rio. Portions of this product are Copyright © 1990-2005 Info-ZIP. All rights reserved. Portions of this product are under the Boost Software License - Version 1.0 - August 17th, 2003. All rights reserved. Portions of this product are Copyright © 1994 Purdue Research Foundation. All rights reserved. This product includes cryptographic software written by Eric Young ([email protected]). Portions of this product are Berkeley Software Distribution software, Copyright © 1988 - 2004 by the Regents of the University of California, University of California, Berkeley. Portions of this product are software Copyright © 1990 - 1999 by Sleepycat Software. Portions of this product are software Copyright © 1985-2004 by the Massachusetts Institute of Technology. All rights reserved. Portions of this product are Copyright © 1999, 2000, 2001, 2002 The Board of Trustees of the University of Illinois. All rights reserved. Portions of this product are LILO program code, Copyright © 1992 1998 Werner Almesberger. All rights reserved. Portions of this product are software Copyright © 1999 - 2004 The Apache Software Foundation, licensed under the Apache License, Version 2.0 (http://www.apache.org/licenses /LICENSE-2.0). Portions of this product are derived from software Copyright © 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring Harbor Laboratory. Funded under Grant P41-RR02188 by the National Institutes of Health. Portions of this product are derived from software Copyright © 1996, 1997, 1998, 1999, 2000, 2001, 2002 byBoutell.Com, Inc. Portions of this product relating to GD2 format are derived from software Copyright © 1999, 2000, 2001, 2002 Philip Warner. Portions of this product relating to PNG are derived from software Copyright © 1999, 2000, 2001, 2002 Greg Roelofs. Portions of this product relating to gdttf.c are derived from software Copyright © 1999, 2000, 2001, 2002 John Ellson ([email protected]). Portions of this product relating to gdft.c are derived from software Copyright © 2001, 2002 John Ellson ([email protected]). Portions of this product relating to JPEG and to color quantization are derived from software Copyright © 2000,2001, 2002, Doug Becker and copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, Thomas G. Lane. This software is based in part on the work of the Independent JPEG Group. Portions of this product relating to WBMP are derived from software Copyright © 2000, 2001, 2002 Maurice Szmurlo and Johan Van den Brande. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Data Domain, Incorporated 2300 Central Expressway Santa Clara, CA 95050 USA Phone 408-980-4800 Direct 866-933-3837 Toll-free Fax 408-980-8620 www.datadomain.com Data Domain Software Release 4.1.0.1 December 20, 2006 Part number: 760-0401-0001 Rev. B Contents About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiv Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv Contacting Data Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv Safety Warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi Product Disposal Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi Qualified Personnel Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii Circuit Breaker (15A) Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxviii Grounded Equipment Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxix Ground Conductor Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxi Wrist Strap Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxii Faceplates and Cover Panel Requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxiii Jewelry Removal Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxv Class 1 Laser Product Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxvii Invisible Laser Radiation Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxviii Regulatory Standards Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxix Safety . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxix EMC Environmental Conditions for Product to be Installed in the European Union . . xxxix (FCC) Class A Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xl Canada Class A Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xl Japan (VCCI) Class A Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xl Taiwan (BSMI) Class A Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xli Hazardous Substance Regulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xli v Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Restorer Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Applications that Send Data to a Restorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Data Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Data Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Restore Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Data Domain Replicator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Restorer Hardware Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 User Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Related Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Initial System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Graphical User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Hardware System-Level Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Power Supply LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Hardware Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 System Card Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Chapter 2: Disk Space and System Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Space Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Estimate Use of Disk Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Manage File System Use of Disk Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Display the Space Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Monitor Multiple Restorers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Reclaim Data Storage Disk Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Maximum Number of Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 vi Restorer Operating System User Guide Chapter 3: Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Restorer Site Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Expansion Shelf Site Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Restorer Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Backup Software Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 CIFS Backup Server Timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Login and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Additional Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Administering a Restorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Data Domain Enterprise Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Chapter 4: ES20 Expansion Shelf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 RAID groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Disk Failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Add a First Shelf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Add a Second Shelf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Disk Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Look for New Disks, LUNs, and Expansion Shelves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Add an Expansion Shelf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Display Disk Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Shelf (enclosure) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 List Enclosures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Identify an Enclosure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Display Fan Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Display Component Temperatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Display Port Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Display All Hardware Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Display Power Supply Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Volume Expansion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Contents vii Chapter 5: Gateway Restorers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Command Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Procedure: Adding a LUN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Chapter 6: Virtual Tape Library (VTL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Compatibility Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Data Domain VTL with a SAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Enable VTLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Disable VTLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Create a VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Create New Tapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Import Tapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Export Tapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Remove Tapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Insert a Tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Eject a Tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Delete a VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Set a Private-Loop Hard Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Reset a Private-Loop Hard Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Display the Private-Loop Hard Address Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Display VTL Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Display VTL Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Display All Tapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Display a Summary of All Tapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Display Tapes by VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Display All Tapes in the Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Display Tapes by Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Display VTL Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Procedure: Retrieve a Replicated Tape from a Destination . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 viii Restorer Operating System User Guide LUN Masking (for VTL Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 The vtl initiator Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Add an Initiator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Delete an Initiator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Display Initiators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 The vtl lunmask Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Add a LUN Mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Delete a LUN Mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Display LUN Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Procedure: Create a LUN Mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Add a Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Delete a Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Display Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Chapter 7: Configuration Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 The config Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Change Configuration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Save and Return a Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Reset the Location Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Reset the Mail Server to a Null Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Reset the Time Zone to the Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Set an Administrative Email Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Set an Administrative Host Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Change the System Location Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Change the Mail Server Hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Set a Time Zone for the System Clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Display the Administrative Email Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Display the Administrative Host Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Display the System Location Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Contents ix Display the Mail Server Hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Display the Time Zone for the System Clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 The license Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Add a License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Remove All Feature Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Remove a License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Display Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Set Up the Migration Destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Start Migration from the Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Create an End Point for Data Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Display Migration Progress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Stop the Migration Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Display Migration Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Display Migration Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Procedure: Migrate between Source and Destination . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Procedure: Migrate with Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Chapter 8: Access Control for Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Add a Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Remove a Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Enable a Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Disable a Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Reset System Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Add an Authorized SSH Public Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Remove an SSH Key File Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Remove the SSH Key File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Create a New HTTPS Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Display the SSH Key File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Display Hosts and Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Procedure: Return Command Output to a Remote machine . . . . . . . . . . . . . . . . . . . . . . . . . 107 x Restorer Operating System User Guide Chapter 9: User Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Add a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Remove a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Change a Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Reset to the Default User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Change a Privilege Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Display Current Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Display All Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Chapter 10: Alerts and System Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Add to the Email List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Test the Email List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Remove from the Email List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Reset the Email List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Display Current Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Display the Alerts History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Display the Email List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Display Current Alerts and Recent History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Display the Email List and Administrator Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Autosupport Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Add to the Email List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Test the Autosupport Report Email List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Send an Autosupport Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Remove from the Email List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Reset the Email List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Run the Autosupport Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Email Command Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Set the Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Reset the Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Reset the Schedule and the List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Contents xi Display all Autosupport Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Display the Autosupport Email List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Display the Autosupport Report Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Display the Autosupport History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Hourly System Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Collect and Send Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Chapter 11: File System Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Statistics and Basic Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Start the Restorer File System Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Stop the Restorer File System Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Stop and Start the Restorer File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Delete All Data in the File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Display File System Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Display File System Uptime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Display File System Space Utilization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Display Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 Clean Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Start Cleaning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Stop Cleaning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Change the Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Set the Schedule or Throttle to the Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Set Network Bandwidth Used . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Update Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Display All Clean Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Display the Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Display the Throttle Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Display the Clean Operation Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Monitor the Clean Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 xii Restorer Operating System User Guide Compression Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Local Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Set Local Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Reset Local Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Display the Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Global Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Set Global Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Reset Global Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Display the Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Replicator Destination Read/Write Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Report as Read/Write . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Report as Read-Only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Return to the Default Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Display the Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Tape Marker Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Set a Marker Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Reset to the Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Display the Marker Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Chapter 12: Disk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Add a LUN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Fail a Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Unfail a Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Check All Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Look for New Disks, LUNs, and Expansion Shelves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Identify a Physical Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Add an Expansion Shelf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Reset Disk Performance Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Display Disk Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Display Disk Type and Capacity Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 Display RAID Status for Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Contents xiii Display the History of Disk Failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 Display Detailed RAID Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Display Disk Performance Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Display Disk Reliability Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Chapter 13: System Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 The system Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Shut down the Restorer Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Reboot the Restorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Upgrade the Restorer Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 To upgrade using HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 To upgrade using FTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Set the Date and Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Create a Login Banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Reset the Login Banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Display the Login Banner Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Display the Restorer Serial Number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Display System Uptime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Display System Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Display Detailed System Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Display System Statistics Graphically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Display System Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 Display the Restorer Model Number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 Display Data Transfer Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 Display the Date and Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 Display NVRAM Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Display Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Display the Data Domain OS Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Display All System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 xiv Restorer Operating System User Guide The alias Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Add an Alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Remove an Alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Reset Aliases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Display Aliases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Time Servers and the NTP Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Enable NTP Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Disable NTP Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Add a Time Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Delete a Time Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Reset the List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Reset All NTP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Display NTP Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Display NTP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Chapter 14: Network Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 The net Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Enable an Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Disable an Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Enable DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 Disable DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 Change an Interface Netmask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 Change an Interface Transfer Unit Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Add or Change DNS servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Ping a Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Change the Restorer Hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Change an Interface IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Change the Domain Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Add a Hostname/IP Address to the /etc/hosts File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Reset Network Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Set Interface Duplex Line Use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Contents xv Set Interface Line Speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Set Autonegotiate for an Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Delete a Hostname/IP address from the /etc/hosts File . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Delete all Hostname/IP addresses from the /etc/hosts File . . . . . . . . . . . . . . . . . . . . . . . 172 Display Hostname/IP addresses from the /etc/hosts File . . . . . . . . . . . . . . . . . . . . . . . . . 172 Display an Ethernet Interface Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Display Interface Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Display Ethernet Hardware Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Display the Restorer Hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Display the Domain Name Used for Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Display DNS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Display Network Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Display All Networking Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 The route Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Add a Routing Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Remove a Routing Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Change the Routing Default Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Reset the Default Routing Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Display a Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Display the Configured Static Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 Display the Kernel IP Routing Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 Display the Default Routing Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Chapter 15: NFS Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Add NFS Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Remove Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Enable Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Disable Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Reset Clients to the Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Clear the NFS Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Display Active Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 xvi Restorer Operating System User Guide Display Allowed Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Display Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Display Detailed Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Display Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Display Timing for NFS Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Chapter 16: CIFS Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 CIFS Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Add a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 Add a Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 CIFS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Enable Client Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Disable Client Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Add a Backup Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Add an Administrative Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Remove a Backup Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Remove an Administrative Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Remove All CIFS Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Set a NetBIOS Hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Remove the NetBIOS Hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Set the Authentication Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Remove All IP Address/NetBIOS hostname Mappings . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Add an IP Address/NetBIOS hostname Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Remove an IP Address/NetBIOS hostname Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Resolve a NetBIOS Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Identify a WINS server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Remove the WINS server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Set CIFS Logging Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Increase Memory to Allow More User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Reset CIFS Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Display CIFS Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Contents xvii Display Active Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Display All Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 Display the CIFS Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 Display CIFS Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Display Detailed CIFS Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Display CIFS Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Display All IP Address/NetBIOS hostname Mappings . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Procedure: Time Servers and Active Directory Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Synchronizing from an NTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Synchronizing from a Windows Domain Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Chapter 17: Replicator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Using “Context” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Configure Replicator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 VTL Pools Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Start Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Suspend Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Resume Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Remove Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Reset Authentication between the Restorers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Move Data to a New Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Change a Source or Destination Hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Connect with a Network Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Change the Port on a Destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Add a Scheduled Throttle Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Set a Temporary Throttle Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Delete a Scheduled Throttle Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Set an Override Throttle Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Reset Throttle Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Set Replication Bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Set Replication Network Delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 xviii Restorer Operating System User Guide Reset Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Repair a Broken Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Display Throttle settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Display Bandwidth and Delay Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Display Replicator Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Display Replication for Current Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 Display Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Display Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 Hostname Shorthand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 Procedure: Set Up and Start Directory Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 Procedure: Set Up and Start Collection Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Procedure: Set Up and Start Bidirectional Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Procedure: Set Up and Start Many-to-One Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 Procedure: Replace a Directory Source - New Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 Procedure: Replace a Collection Source - Same Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Procedure: Convert from Collection to Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 Procedure: Seeding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 One-to-One . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 Bidirectional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Many-to-One . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 Chapter 18: Backup/Restore Using NDMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Add a Filer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Remove a Filer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Backup from a Filer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Restore to a Filer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Remove Filer Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Stop an NDMP Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Stop All NDMP Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Check for a Filer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Contents xix Display Known Filers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Display NDMP Process Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Chapter 19: SNMP Management and Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Enable SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Disable SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Set the System Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Reset the System Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Set a System Contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Reset a System Contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Add a Trap Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Delete a Trap Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Delete All Trap Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Add a Community String . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Delete a Community String . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Delete All Community Strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Reset All SNMP Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Display SNMP Agent status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Display Trap Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Display All Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Display the System Contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Display the System Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Display Community Strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Display the MIB and Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Chapter 20: Log File Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 Scroll New Log Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 Send Log Messages to Another System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 Add a Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Remove a Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Enable Sending Log Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 xx Restorer Operating System User Guide Disable Sending Log Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Reset to Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Display the List and State . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 Display a Log File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 List Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Procedure: Archive Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Chapter 21: Hardware Servicing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Customer Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Replace Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Replace Power Units . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Trained Service Personnel Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Remove/Replace the Top Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Replace Fans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 Replace Disk Fans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Replace Back Panel Fans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Replace the Motherboard Battery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Appendix A Time Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 Contents xxi xxii Restorer Operating System User Guide About This Guide This guide explains the use of Data Domain® DD400/DD500 backup and recovery restorers. • The “Introduction” chapter explains what the Data Domain restorers are and how they work, details features, lists hardware and software requirements, and gives overviews of installation and configuration tasks, the default configuration, and user interface commands. • The “Disk Space and System Monitoring” chapter gives guidelines for managing disk space on Data Domain restorers and for setting up backup servers to get the best performance. • The “Installation” chapter gives all installation steps and information for setting up backup software to use a restorer. The next set of chapters detail the use of all user interface commands and operations. Each chapter has headings that are a task-oriented list of the operations detailed in that chapter. For any task that you want to perform, look in the table of contents for the heading that describes the task. • The “Gateway Restorers” chapter gives installation steps and other information specific to restorers that use outside disk arrays instead of internal disks or external shelves. • The “Virtual Tape Library (VTL)” chapter explains the use of the virtual tape library feature. • The “Configuration Management” chapter describes how to examine and modify configuration parameters. • The “Access Control for Administration” chapter describes how to give HTTP, FTP, TELNET, and SSH access from remote hosts. • The “User Administration” chapter explains how to deal with users and passwords. • The “Alerts and System Reports” chapter details messages that the Data Domain Operating System (DDOS) sends when monitoring components and details the daily system report. • The “File System Management” chapter gives details about file system statistics and capacity. • The “Disk Management” chapter explains how to monitor and manage disks on a restorer. • The “System Maintenance” chapter describes how to manage the background maintenance task that continually checks the integrity of backup images, how to connect to time servers, and how to set up alias commands. • The “Network Management” chapter describes how to manage network tasks such as routing rules, the use of DHCP and DNS, and the setting IP addresses. xxiii Conventions • The “NFS Management” chapter describes how to deal with NFS clients and status. • The “CIFS Management” chapter details the use of Windows backup servers with a restorer. • The “Replicator” chapter details use of the Data Domain Replicator product for replication of data from one restorer to another. • The “Backup/Restore Using NDMP” chapter explains how to do direct backup and restore operations between a restorer and an NDMP-type filer. • The “SNMP Management and Monitoring” chapter details the use of SNMP operations between a restorer and remote machines. • The “Log File Management” chapter explains how to view, archive, and clear the log file. The final chapter, “Hardware Servicing,” explains how to replace disks, fans, power supply units, and other hardware. The appendix lists all time zones from around the world. Conventions The following table describes the typographic conventions used in this guide. xxiv Typeface Usage Examples Monospace Commands, computer output, file contents, files, directories, software elements such as command options, and parameters Find the log file under /var/log. Italic New terms, book titles, variables, and labels of boxes and windows as seen on a monitor The name is a path for the device... Monospace bold User input; the “#” symbol indicates a command prompt. # config setup Symbol Usage Examples # Administrative user prompt [] In a command synopsis, brackets indicate an optional argument log view [filename] | In a command synopsis, a vertical bar separates mutually exclusive arguments net dhcp [true | false] {} In a command synopsis, curly brackets indicate that one of the exclusive arguments is required. adminhost add {ftp | telnet | ssh} See the net help page for more information. Restorer Operating System User Guide Audience Audience This guide is for system administrators who are familiar with standard backup software packages and with general backup administration. Contacting Data Domain For comments or problems with Data Domain products, contact Data Domain Technical Support: • 24 hours a day, 7 days a week at 877-207-DATA (3282) (toll free) or 408-980-4900 (direct) • email: [email protected] For sales and license information: • 877-622-2587 • email: [email protected] • Fax: 408-980-8620 Data Domain, Incorporated 2300 Central Expressway Santa Clara, CA 95050 USA Phone 408-980-4800 Direct 866-933-3837 Toll-free Fax 408-980-8620 About This Guide xxv Safety Warnings Safety Warnings Product Disposal Warning Warning Ultimate disposal of this product should be handled according to all national laws and regulations. Waarschuwing Het uiteindelijke wegruimen van dit product dient te geschieden in overeenstemming met alle nationale wetten en reglementen. Varoitus Tämä tuote on hävitettävä kansallisten lakien ja määräysten mukaisesti. Attention La mise au rebut ou le recyclage de ce produit sont généralement soumis à des lois et/ou directives de respect de l'environnement. Renseignez-vous auprès de l'organisme compétent. Warnung Die Entsorgung dieses Produkts sollte gemäß allen Bestimmungen und Gesetzen des Landes erfolgen. Lo smaltimento di questo prodotto deve essere eseguito secondo le leggi e regolazioni locali. Avvertenza Advarsel Aviso Endelig kassering av dette produktet skal være i henhold til alle relevante nasjonale lover og bestemmelser. Deitar fora este produto em conformidade com todas as leis e regulamentos nacionais. ¡Advertencia! xxvi Al deshacerse por completo de este producto debe seguir todas las leyes y reglamentos nacionales. Restorer Operating System User Guide Safety Warnings Vid deponering hanteras produkten enligt gällande lagar och bestämmelser. Varning! Qualified Personnel Warning Warning Only trained and qualified personnel should be allowed to install or replace this equipment. Waarschuwing Ainoastaan koulutettu ja pätevä henkilökunta saa asentaa tai vaihtaa tämän laitteen. Varoitus Avertissement Avvertenza Aviso About This Guide Tout installation ou remplacement de l'appareil doit être réalisé par du personnel qualifié et compétent. Gerät nur von geschultem, qualifiziertem Personal installieren oder auswechseln lassen. Achtung Advarsel Installatie en reparaties mogen uitsluitend door getraind en bevoegd personeel uitgevoerd worden. Solo personale addestrato e qualificato deve essere autorizzato ad installare o sostituire questo apparecchio. Kun kvalifisert personell med riktig opplæring bør montere eller bytte ut dette utstyret. Este equipamento deverá ser instalado ou substituído apenas por pessoal devidamente treinado e qualificado. xxvii Safety Warnings ¡Atención! Varning Estos equipos deben ser instalados y reemplazados exclusivamente por personal técnico adecuadamente preparado y capacitado. Denna utrustning ska endast installeras och bytas ut av utbildad och kvalificerad personal. Circuit Breaker (15A) Warning Warning This product relies on the building's installation for short-circuit (overcurrent) protection. Ensure that a fuse or circuit breaker no larger than 120 VAC, 15A U.S. (240 VAC, 10A international) is used on the phase conductors (all current-carrying conductors). Waarschuwing Dit produkt is afhankelijk van de installatie van het gebouw voor kortsluit(overstroom) beveiliging. Controleer of er een zekering of stroomverbreker van niet meer dan 120 Volt wisselstroom, 15 A voor de V.S. (240 Volt wisselstroom, 10 A internationaal) gebruikt wordt op de fasegeleiders (alle geleiders die stroom voeren). Varoitus Tämä tuote on riippuvainen rakennukseen asennetusta oikosulkusuojauksesta (ylivirtasuojauksesta). Varmista, että vaihevirtajohtimissa (kaikissa virroitetuissa johtimissa) käytetään Yhdysvalloissa alle 120 voltin, 15 ampeerin ja monissa muissa maissa 240 voltin, 10 ampeerin sulaketta tai suojakytkintä. Attention Pour ce qui est de la protection contre les courts-circuits (surtension), ce produit dépend de l'installation électrique du local. Vérifier qu'un fusible ou qu'un disjoncteur de 120 V alt., 15 A U.S. maximum (240 V alt., 10 A international) est utilisé sur les conducteurs de phase (conducteurs de charge). Warnung Dieses Produkt ist darauf angewiesen, daß im Gebäude ein Kurzschluß- bzw. Überstromschutz installiert ist. Stellen Sie sicher, daß eine Sicherung oder ein Unterbrecher von nicht mehr als 240 V Wechselstrom, 10 A (bzw. in den USA 120 V Wechselstrom, 15 A) an den Phasenleitern (allen stromführenden Leitern) verwendet wird. xxviii Restorer Operating System User Guide Safety Warnings Questo prodotto dipende dall'installazione dell'edificio per quanto riguarda la protezione contro cortocircuiti (sovracorrente). Verificare che un fusibile o interruttore automatico, non superiore a 120 VCA, 15 A U.S. (240 VCA, 10 A internazionale) sia stato usato nei fili di fase (tutti i conduttori portatori di corrente). Avvertenza Advarsel Aviso Dette produktet er avhengig av bygningens installasjoner av kortslutningsbeskyttelse (overstrøm). Kontroller at det brukes en sikring eller strømbryter som ikke er større enn 120 VAC, 15 A (USA) (240 VAC, 10 A internasjonalt) på faselederne (alle strømførende ledere). Este produto depende das instalações existentes para protecção contra curto-circuito (sobrecarga). Assegure-se de que um fusível ou disjuntor não superior a 240 VAC, 10A é utilizado nos condutores de fase (todos os condutores de transporte de corrente). ¡Advertencia! Varning! Este equipo utiliza el sistema de protección contra cortocircuitos (o sobrecorrientes) deló propio edificio. Asegurarse de que se utiliza un fusible o interruptor automático de no más de 240 voltios en corriente alterna (VAC), 10 amperios del estándar internacional (120 VAC, 15 amperios del estándar USA) en los hilos de fase (todos aquéllos portadores de corriente). Denna produkt är beroende av i byggnaden installerat kortslutningsskydd (överströmsskydd). Kontrollera att säkring eller överspänningsskydd används på fasledarna (samtliga strömförande ledare) för internationellt bruk max. 240 V växelström, 10 A (i USA max. 120 V växelström, 15 A). Grounded Equipment Warning Warning This equipment is intended to be grounded. Ensure that the host is connected to earth ground during normal use. About This Guide xxix Safety Warnings Waarschuwing Tämä laitteisto on tarkoitettu maadoitettavaksi. Varmista, että isäntälaite on yhdistetty maahan normaalikäytön aikana. Varoitus Attention Warnung Cet équipement doit être relié à la terre. S'assurer que l'appareil hôte est relié à la terre lors de l'utilisation normale. Dieses Gerät muß geerdet werden. Stellen Sie sicher, daß das Host-Gerät während des normalen Betriebs an Erde gelegt ist. Questa apparecchiatura deve essere collegata a massa. Accertarsi che il dispositivo host sia collegato alla massa di terra durante il normale utilizzo. Avvertenza Advarsel Aviso Dette utstyret skal jordes. Forviss deg om vertsterminalen er jordet ved normalt bruk. Este equipamento deverá estar ligado à terra. Certifique-se que o host se encontra ligado à terra durante a sua utilização normal. ¡Advertencia! Varning! xxx Deze apparatuur hoort geaard te worden Zorg dat de host-computer tijdens normaal gebruik met aarde is verbonden. Este equipo debe conectarse a tierra. Asegurarse de que el equipo principal esté conectado a tierra durante el uso normal. Denna utrustning är avsedd att jordas. Se till att värdenheten är jordad vid normal användning. Restorer Operating System User Guide Safety Warnings Ground Conductor Warning Warning Never defeat the ground conductor or operate the equipment in the absence of a suitably installed ground conductor. Contact the appropriate electrical inspection authority or an electrician if you are uncertain that suitable grounding is available. Waarschuwing De aardingsleiding mag nooit buiten werking gesteld worden en de apparatuur mag nooit bediend worden zonder dat er een op de juiste wijze geïnstalleerde aardingsleiding aanwezig is. Neem contact op met de bevoegde instantie voor elektrische inspecties of met een elektricien als u er niet zeker van bent dat er voor passende aarding gezorgd is. Varoitus Älä koskaan ohita maajohdinta tai käytä laitteita ilman oikein asennettua maajohdinta. Ota yhteyttä asianmukaiseen sähkötarkastusviranomaiseen tai sähköasentajaan, jos olet epävarma maadoituksen sopivuudesta. Attention Ne jamais rendre inopérant le conducteur de masse ni utiliser l'équipement sans un conducteur de masse adéquatement installé. En cas de doute sur la mise à la masse appropriée disponible, s'adresser à l'organisme responsable de la sécurité électrique ou à un électricien. Warnung Auf keinen Fall den Erdungsleiter unwirksam machen oder das Gerät ohne einen sachgerecht installierten Erdungsleiter verwenden. Wenn Sie sich nicht sicher sind, ob eine sachgerechte Erdung vorhanden ist, wenden Sie sich an den zuständigen elektrischen Fachmann oder einen Elektriker. Avvertenza Advarsel About This Guide Non escludere mai il conduttore di protezione né usare l'apparecchiatura in assenza di un conduttore di protezione installato in modo corretto. Se non si sa con certezza che è disponibile un collegamento di messa a terra adeguato, esaminare le Norme CEI pertinenti o rivolgersi a un elettricista qualificato. Omgå aldri jordingslederen og bruk aldri utstyret uten riktig montert jordingsleder. Ta kontakt med det riktige organet for elektrisk inspeksjon eller en elektriker hvis du er usikker på om det finnes velegnet jording. xxxi Safety Warnings Aviso Nunca anule o condutor à terra nem opere o equipamento sem ter um condutor à terra adequadamente instalado. Em caso de dúvida em relação ao sistema de ligação à terra, contacte os serviços locais de inspecção eléctrica ou um electricista qualificado. ¡Advertencia! Varning! No inhabilitar nunca el conductor de tierra ni hacer funcionar el equipo si no existe un conductor de tierra instalado correctamente. Póngase en contacto con una autoridad apropiada de inspección eléctrica o con un electricista competente si no está seguro de que hay una conexión a tierra adecuada. Koppla aldrig från jordledningen och använd aldrig utrustningen utan en på lämpligt sätt installerad jordledning. Om det föreligger osäkerhet huruvida lämplig jordning finns skall elektrisk besiktningsauktoritet eller elektriker kontaktas. Wrist Strap Warning Warning During this procedure, wear grounding wrist straps to avoid ESD damage to the card. Do not directly touch the backplane with your hand or any metal tool, or you could shock yourself. Waarschuwing Varoitus Attention xxxii Draag tijdens deze procedure aardingspolsbanden om te vermijden dat de kaart beschadigd wordt door elektrostatische ontlading. Raak het achterbord niet rechtstreeks aan met uw hand of met een metalen werktuig, omdat u anders een elektrische schok zou kunnen oplopen. Käytä tämän toimenpiteen aikana maadoitettuja rannesuojia estääksesi kortin vaurioitumisen sähköstaattisen purkauksen vuoksi. Älä kosketa taustalevyä suoraan kädelläsi tai metallisella työkalulla sähköiskuvaaran takia. Lors de cette procédure, toujours porter des bracelets antistatiques pour éviter que des décharges électriques n'endommagent la carte. Pour éviter l'électrocution, ne pas toucher le fond de panier directement avec la main ni avec un outil métallique. Restorer Operating System User Guide Safety Warnings Warnung Zur Vermeidung einer Beschädigung der Karte durch elektrostatische Entladung während dieses Verfahrens ein Erdungsband am Handgelenk tragen. Bei Berührung der Rückwand mit der Hand oder einem metallenen Werkzeug besteht Elektroschockgefahr. Durante questa procedura, indossare bracciali antistatici per evitare danni alla scheda causati da un'eventuale scarica elettrostatica. Non toccare direttamente il pannello delle connessioni, né con le mani né con un qualsiasi utensile metallico, perché esiste il pericolo di folgorazione. Avvertenza Advarsel Aviso Bruk jordingsarmbånd under prosedyren for å unngå ESD-skader på kortet. Unngå direkte berøring av bakplanet med hånden eller metallverktøy, slik at di ikke får elektrisk støt. Durante este procedimento e para evitar danos ESD causados à placa, use fitas de ligação à terra para os pulsos. Para evitar o risco de choque eléctrico, não toque directamente na parte posterior com a mão ou com qualquer ferramenta metálica. ¡Advertencia! Varning! Usartiras conectadas a tierra en las muñecas durante este procedimiento para evitar daños en la tarjeta causados por descargas electrostáticas. No tocar el plano posterior con las manos ni con ninguna herramienta metálica, ya que podría producir un choque eléctrico. Använd jordade armbandsremmar under denna procedur för att förhindra elektrostatisk skada på kortet. Rör inte vid baksidan med handen eller metallverktyg då detta kan orsaka elektrisk stöt. Faceplates and Cover Panel Requirement Warning Blank faceplates and cover panels serve three important functions: they prevent exposure to hazardous voltages and currents inside the chassis; they contain electromagnetic interference (EMI) that might disrupt other equipment; and they direct the flow of cooling air through the chassis. Do not operate the system unless all cards, faceplates, front covers, and rear covers are in place. About This Guide xxxiii Safety Warnings Waarschuwing Varoitus Lege vlakplaten en afdekpanelen vervullen drie belangrijke functies: ze voorkomen blootstelling aan gevaarlijke voltages en stroom binnenin het frame, ze bevatten elektromagnetische storing (EMI) hetgeen andere apparaten kan verstoren en ze leiden de stroom van koellucht door het frame. Het systeem niet bedienen tenzij alle kaarten, vlakplaten en afdekkingen aan de voor- en achterkant zich op hun plaats bevinden. Tyhjillä tasolaikoilla ja suojapaneeleilla on kolme tärkeää käyttötarkoitusta: Ne suojaavat asennuspohjan sisäisille vaarallisille jännitteille ja sähkövirralle altistumiselta; ne pitävät sisällään elektromagneettisen häiriön (EMI), joka voi häiritä muita laitteita; ja ne suuntaavat tuuletusilman asennuspohjan läpi. Järjestelmää ei saa käyttää, elleivät kaikki tasolaikat, etukannet ja takakannet ole kunnolla paikoillaan. Attention Ne jamais faire fonctionner le système sans que l'intégralité des cartes, des plaques métalliques et des panneaux avant et arrière ne soient fixés à leur emplacement. Ceux-ci remplissent trois fonctions essentielles : ils évitent tout risque de contact avec des tensions et des courants dangereux à l'intérieur du châssis, ils évitent toute diffusion d'interférences électromagnétiques qui pourraient perturber le fonctionnement des autres équipements, et ils canalisent le flux d'air de refroidissement dans le châssis. Warnung Blanke Faceplates und Abdeckungen haben drei wichtigen Funktionen: (1) Sie schützen vor gefährlichen Spannungen und Strom innerhalb des Chassis; (2) sie halten elektromagnetische Interferenzen (EMI) zurück, die andere Geräte stören könnten; (3) sie lenken den kühlenden Luftstrom durch das Chassis. Das System darf nur betrieben werden, wenn alle Karten, Faceplates, Voder- und Rückabdeckungen an Ort und Stelle sind. Avvertenza xxxiv Le piattaforme bianche e i panelli di protezione hanno tre funzioni importanti: Evitano l'esposizione a voltaggi e correnti elettriche pericolose nello chassis, trattengono le interferenze elettromagnetiche (EMI) che potrebbero scombussolare altri apparati e dirigono il flusso di aria per il raffreddamento attraverso lo chassis. Non mettete in funzione il sistema se le schede, le piattaforme, i panelli frontali e posteriori non sono in posizione. Restorer Operating System User Guide Safety Warnings Advarsel Aviso Blanke ytterplater og deksler sørger for tre viktige funksjoner: de forhindrer utsettelse for farlig spenning og strøm inni kabinettet; de inneholder elektromagnetisk forstyrrelse (EMI) som kan avbryte annet utstyr, og de dirigerer luftavkjølingsstrømmen gjennom kabinettet. Betjen ikke systemet med mindre alle kort, ytterplater, frontdeksler og bakdeksler sitter på plass. As faces furadas e os painéis de protecção desempenham três importantes funções: previnem contra uma exposição perigosa a voltagens e correntes existentes no interior do chassis; previnem contra interferência electromagnética (EMI) que poderá danificar outro equipamento; e canalizam o fluxo do ar de refrigeração através do chassis. Não deverá operar o sistema sem que todas as placas, faces, protecções anteriores e posteriores estejam nos seus lugares. ¡Advertencia! Varning! Las placas frontales y los paneles de relleno cumplen tres funciones importantes: evitan la exposición a niveles peligrosos de voltaje y corriente dentro del chasis; reducen la interferencia electromagnética (EMI) que podría perturbar la operación de otros equipos y dirigen el flujo de aire de enfriamiento a través del chasis. No haga funcionar el sistema a menos que todas las tarjetas, placas frontales, cubiertas frontales y cubiertas traseras estén en su lugar. Tomma framplattor och skyddspaneler har tre viktiga funktioner: de förhindrar att personer utsätts för farlig spänning och ström som finns inuti chassit; de innehåller elektromagnetisk interferens (EMI) som kan störa annan utrustning; och de styr riktningen på kylluftsflödet genom chassit. Använd inte systemet om inte alla kort, framplattor, fram- och bakskydd är på plats. Jewelry Removal Warning Warning Before working on equipment that is connected to power lines, remove jewelry (including rings, necklaces, and watches). Metal objects will heat up when connected to power and ground and can cause serious burns or weld the metal object to the terminals. About This Guide xxxv Safety Warnings Waarschuwing Alvorens aan apparatuur te werken die met elektrische leidingen is verbonden, sieraden (inclusief ringen, kettingen en horloges) verwijderen. Metalen voorwerpen worden warm wanneer ze met stroom en aarde zijn verbonden, en kunnen ernstige brandwonden veroorzaken of het metalen voorwerp aan de aansluitklemmen lassen. Ennen kuin työskentelet voimavirtajohtoihin kytkettyjen laitteiden parissa, ota pois kaikki korut (sormukset, kaulakorut ja kellot mukaan lukien). Metalliesineet kuumenevat, kun ne ovat yhteydessä sähkövirran ja maan kanssa, ja ne voivat aiheuttaa vakavia palovammoja tai hitsata metalliesineet kiinni liitäntänapoihin. Varoitus Attention Avant d'accéder à cet équipement connecté aux lignes électriques, ôter tout bijou (anneaux, colliers et montres compris). Lorsqu'ils sont branchés à l'alimentation et reliés à la terre, les objets métalliques chauffent, ce qui peut provoquer des blessures graves ou souder l'objet métallique aux bornes. Warnung Vor der Arbeit an Geräten, die an das Netz angeschlossen sind, jeglichen Schmuck (einschließlich Ringe, Ketten und Uhren) abnehmen. Metallgegenstände erhitzen sich, wenn sie an das Netz und die Erde angeschlossen werden, und können schwere Verbrennungen verursachen oder an die Anschlußklemmen angeschweißt werden. Avvertenza Advarsel Aviso xxxvi Prima di intervenire su apparecchiature collegate alle linee di alimentazione, togliersi qualsiasi monile (inclusi anelli, collane, braccialetti ed orologi). Gli oggetti metallici si riscaldano quando sono collegati tra punti di alimentazione e massa: possono causare ustioni gravi oppure il metallo può saldarsi ai terminali. Fjern alle smykker (inkludert ringer, halskjeder og klokker) før du skal arbeide på utstyr som er koblet til kraftledninger. Metallgjenstander som er koblet til kraftledninger og jord blir svært varme og kan forårsake alvorlige brannskader eller smelte fast til polene. Antes de trabalhar em equipamento que esteja ligado a linhas de corrente, retire todas as jóias que estiver a usar (incluindo anéis, fios e relógios). Os objectos metálicos aquecerão em contacto com a corrente e em contacto com a ligação à terra, podendo causar queimaduras graves ou ficarem soldados aos terminais. Restorer Operating System User Guide Safety Warnings ¡Advertencia! Varning! Antes de operar sobre equipos conectados a líneas de alimentación, quitarse las joyas (incluidos anillos, collares y relojes). Los objetos de metal se calientan cuando se conectan a la alimentación y a tierra, lo que puede ocasionar quemaduras graves o que los objetos metálicos queden soldados a los bornes. Tag av alla smycken (inklusive ringar, halsband och armbandsur) innan du arbetar på utrustning som är kopplad till kraftledningar. Metallobjekt hettas upp när de kopplas ihop med ström och jord och kan förorsaka allvarliga brännskador; metallobjekt kan också sammansvetsas med kontakterna. Class 1 Laser Product Warning Warning Class 1 laser product. Waarschuwing Varoitus Luokan 1 lasertuote. Attention Produit laser de classe 1. Warnung Laserprodukt der Klasse 1. Avvertenza Advarsel About This Guide Klasse-1 laser produkt. Prodotto laser di Classe 1. Laserprodukt av klasse 1. xxxvii Safety Warnings Produto laser de classe 1. Aviso ¡Advertencia! Varning! Producto láser Clase I. Laserprodukt av klass 1. Invisible Laser Radiation Warning Warning Because invisible laser radiation may be emitted from the aperture of the port when no cable is connected, avoid exposure to laser radiation and do not stare into open apertures. Waarschuwing Varoitus Omdat er onzichtbare laserstraling uit de opening van de poort geëmitteerd kan worden wanneer er geen kabel aangesloten is, dient men om blootstelling aan laserstraling te vermijden niet in de open openingen te kijken. Kun porttiin ei ole kytketty kaapelia, portin aukosta voi vuotaa näkymätöntä lasersäteilyä. Älä katso avoimiin aukkoihin, jotta et altistu säteilylle. Attention Etant donné qu'un rayonnement laser invisible peut être émis par l'ouverture du port quand aucun câble n'est connecté, ne pas regarder dans les ouvertures béantes afin d'éviter tout risque d'exposition au rayonnement laser. Warnung Aus der Öffnung des Ports kann unsichtbare Laserstrahlung austreten, wenn kein Kabel angeschlossen ist. Kontakt mit Laserstrahlung vermeiden und nicht in offene Öffnungen blicken. xxxviii Restorer Operating System User Guide Regulatory Standards Compliance Poiché quando nessun cavo è collegato alla porta, da quest'ultima potrebbe essere emessa radiazione laser invisibile, evitare l'esposizione a tale radiazione e non fissare con gli occhi porte a cui non siano collegati cavi. Avvertenza Usynlige laserstråler kan sendes ut fra åpningen på utgangen når ingen kabel er tilkoblet. Unngå utsettelse for laserstråling og se ikke inn i åpninger som ikke er tildekket. Advarsel Evite uma exposição à radiação laser e não olhe através de aberturas expostas, porque poderá ocorrer emissão de radiação laser invisível a partir da abertura da porta, quando não estiver qualquer cabo conectado. Aviso ¡Advertencia! Varning! Cuando no esté conectado ningún cable, pueden emitirse radiaciones láser invisibles por el orificio del puerto. Evitar la exposición a radiaciones láser y no mirar fijamente los orificios abiertos. Osynliga laserstrålar kan sändas ut från öppningen i porten när ingen kabel är ansluten. Undvik exponering för laserstrålning och titta inte in i ej täckta öppningar. Regulatory Standards Compliance Safety IEC60950, UL/CSA60950, EN60950 EMC Environmental Conditions for Product to be Installed in the European Union This equipment is intended to operate under the following environmental conditions with respect to EMC: 1. A separate defined location under user's control. 2. Earthing and bonding shall meet the requirements of ETS 300 253 or CCITT K27. About This Guide xxxix Regulatory Standards Compliance 3. Where applicable, AC power distribution shall be one of the following types: TN-S and TN-C [as defined in IEC 364-3] In addition, if equipment is operated in a domestic environment, interference may occur. (FCC) Class A Warning Modifying the equipment without authorization from Data Domain may result in the equipment no longer complying with FCC requirements for Class A or Class B digital devices. In that event, your right to use the equipment may be limited by FCC regulations, and you may be required to correct any interference to radio or television communications at your own expense. Note: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense. Canada Class A Warning This Class 'A' digital apparatus complies with Canadian ICES-003. Cet appareil numerique de la classe 'A' est conforme á la norme NMB-003 de Canada. Japan (VCCI) Class A Warning Translation This is a Class A product based on the standard of the Voluntary Control Council for Interference by Information Technology Equipment (VCCI). If this equipment is used in a domestic environment, radio disturbance may arise. When such trouble occurs, the user may be required to take corrective actions. xl Restorer Operating System User Guide Regulatory Standards Compliance Taiwan (BSMI) Class A Warning Translation This is a class A product. In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures. Hazardous Substance Regulations Complies with the Restriction of Hazardaous Substances (ROHS) directive 2002/95/EC. About This Guide xli Regulatory Standards Compliance xlii Restorer Operating System User Guide 1 Introduction Data Domain restorers are disk-based recovery appliances. A restorer makes backup data available with the performance and reliability of disks at a cost competitive with tape-based storage. Data integrity is assured with multiple levels of data checking and repair. A restorer works seamlessly with your existing backup software. To a backup server, the restorer appears as a file server supporting NFS or CIFS over Gigabit Ethernet, or as a virtual tape library (VTL) over a Fibre Channel connection. Add a restorer to your site as a disk storage device, as defined by your backup software, or as a tape library. Multiple backup servers can share one restorer, and one restorer can handle multiple simultaneous backup and restore operations. For additional throughput and capacity, you can attach multiple restorers to one or more backup servers. Figure 1 shows a restorer in a basic backup configuration. SCSI/ Fibre Channel Backup Server Ethernet from primary storage Gigabit Ethernet or Fibre Channel NFS/CIFS/VTL Tape System Management Data Verification Restorer File System Global Compression RAID Restorer Figure 1: A restorer as a file server 1 Restorer Models Referring to Figure 1 on page 1, data flows to a restorer through an Ethernet or Fibre Channel connection. Immediately, data verification processes begin that follow the data for as long as it is on the restorer. In the file system, DD OS Global Compression™ algorithms prepare the data for storage. Data is then sent to the disk RAID subsystem. The algorithms constantly adjust the use of storage as the restorer receives new data from backup servers. Restore operations flow back from storage, through decompression algorithms and verification consistency checks, and then through the Ethernet connection to the backup servers. Restorer Models From a high-level viewpoint, the differences between Data Domain restorers are the number of disks and the amount of data storage capacity. The gateway systems have no internal disks, instead storing data on outside disk arrays through a fiber channel connection. An expansion shelf increases storage space for and is managed by a restorer. Table 1: Restorer capacities Restorers Disks CPU Raw storage (Base 10 calculation) Data storage space (Base 2 calculation) Data storage space (Base 10 calculation) DD560* 15 by 500 GB 2 by 3.6 GHz 7.5 TB 4.7 TiB 5.15 TB DD460* 15 by 400 GB 2 by 3.2 GHz 6.0 TB 3.9 TiB 4.3 TB DD430 8 by 400 GB 1 by 3.2 GHz 3.2 TB 1.9 TiB 2.1 TB DD410 8 by 160 GB 1 by 3.0 GHz 1.3 TB 0.7 TiB 0.8 TB DD560g* N/A 2 by 3.6 GHz 17.3 TB (external) 14.9 TiB 16.37TB DD460g* N/A 2 by 3.2 GHz N/A 4.2 TiB 4.6 TB 16 by 500 GB N/A 8 TB 5.08 TIB 5.58 TB Gateways Expansion Shelf ES20 * Marked platforms are available as controllers in the DDX array. 2 Restorer Operating System User Guide Applications that Send Data to a Restorer Note All restorer commands that display the use of disk space or the amount of data on disks compute and display amounts using base 2 calculations. For example, a command that displays 1 GB of disk space used is reporting: 230 bytes = 1,073,741,824 bytes. Applications that Send Data to a Restorer The Data Domain operating system (DD OS) is designed specifically for storing relatively large streams of sequential data from backup software and is optimized for high throughput, continuous data verification, and high compression. A restorer makes optimum use of its disk space and compression algorithms when it backs up file systems of at least 10 MB. Restorer performance when storing data from applications that are not specifically backup software is best when: • Data is sent to the restorer as sequential writes (no overwrites). • Small files are prepackaged with tar (on UNIX-based systems) into units of at least 10 MB in size. • No compression or encryption is used before sending the data to the restorer. Data Integrity The DD OS Data Invulnerability Architecture™ protects against data loss from hardware and software failures. • When writing to disk, the DD OS creates and stores self-describing metadata for all data received. After writing the data to disk, the DD OS then creates metadata from the data on the disk and compares it to the original metadata. • An append-only write policy guards against overwriting valid data. • After a backup completes, a validation process looks at what was written to disk to see that all file segments are logically correct within the file system and that the data is the same on the disk as it was before being written to disk. • In the background, the Online Verify operation continuously checks that data on the disks is still correct and that nothing has changed since the earlier validation process. • Storage in a restorer is set up in a double parity RAID 6 configuration (two parity drives) with a hot spare in 15-disk systems. Eight-disk systems have no hot spare. Each parity stripe has block checksums to ensure that data is correct. The checksums are constantly used during the online verify operation and when data is read from the restorer. With double parity, the system can fix simultaneous errors on up to two disks. Chapter 1: Introduction 3 Data Compression • To keep data synchronized during a hardware or power failure, the restorer uses NVRAM (non-volatile RAM) to track outstanding I/O operations. An NVRAM card with fully-charged batteries (the typical state) can retain data for a minimum of 48 hours. • When reading data back for a restore operation, the DD OS uses multiple layers of consistency checks to verify that restored data is correct. Data Compression The DD OS compression algorithms: • store only unique data. Through Global Compression, a restorer pools redundant data from each backup image. Any duplicated data or repeated patterns from multiple backups are stored only once. The storage of unique data is invisible to backup software, which sees the entire virtual file system. • are independent of data format. Data can be structured, such as databases, or unstructured, such as text files. Data can be from file systems or raw volumes. All forms are compressed. Typical compression ratios are 20:1 on average over many weeks assuming weekly full and daily incremental backups. A backup that includes many duplicate or similar files (files copied several times with minor changes) benefits the most from compression. Depending on backup volume, size, retention period, and rate of change, the amount of compression can vary. The best compression happens with backup volume sizes of at least 10 MB. See “Display File System Space Utilization” on page 127 for details on displaying the amount of user data stored and the amount of space available. Global Compression functions within a single restorer. To take full advantage of multiple restorers, a site that has more than one restorer should consistently backup the same client system or set of data to the same restorer. For example, if a full backup of all sales data goes to restorerA, the incremental backups and future full backups for sales data should also go to restorerA. Restore Operations With disk backup through the restorer, incremental backups are always reliable and access time for files is measured in milliseconds. Furthermore, with a restorer, you can perform full backups more frequently without the penalty of storing redundant data. With tape backups, a restore operation may rely on multiple tapes holding incremental backups. Unfortunately, the more incremental backups a site has on multiple tapes, the more time-consuming and risky the restore process. One bad tape can kill the restore. From a restorer, file restores go quickly and create little contention with backup or other restore operations. Unlike tape drives, multiple processes can access a restorer simultaneously. A restorer allows your site to offer safe, user-driven, single-file restore operations. 4 Restorer Operating System User Guide Data Domain Replicator Data Domain Replicator The Data Domain Replicator product sets up and manages the replication of backup data between two restorers. After replication is started, the source restorer automatically sends any new backup data to the destination restorer. A Replicator pair deals with either a complete data set or a directory from a source restorer that is sent to a destination restorer. An individual restorer can be a part of multiple directory pairs and can serve as a source for one or more pairs and a destination for one or more pairs. Restorer Hardware Interfaces You can configure and administer a restorer using a directly-connected serial console, an Ethernet connection from another system, or a monitor and keyboard. All hardware interfaces are on the back panel of the restorer. See Figure 5 on page 13 and Figure 7 on page 15 for interface locations. Licensing The licensed features on a restorer are: • Data Domain Replicator, which sets up and manages the replication of data between two restorers. • Data Domain Virtual Tape Library (VTL), which allows backup software to see a restorer as a tape library. The license command allows you to add new licenses, delete current licenses, or display current licenses. See “The license Command” on page 94 for command details. Contact your Data Domain representative to purchase licensed features. User Interfaces A restorer has a complete command set available to users in a command line interface. Commands allow initial system configuration, changes to individual system settings, and give displays of system states and the state of system operations. The command line interface is available through a serial console or keyboard and monitor attached directly to the restorer, or through Ethernet connections. A web-based graphical user interface, the Data Domain Enterprise Manager, is available through Ethernet connections. Using a Data Domain Enterprise Manager, you can do the initial system configuration, make some configuration updates after initial configuration, and display system states and the state of system operations. Chapter 1: Introduction 5 Related Documentation Related Documentation • See the Data Domain Quick Start folder for a simplified list of installation tasks. • See the Data Domain Command Reference for restorer command summaries. • See the Release Notes for a specific Data Domain software release for late changes and fixes. Initial System Settings A restorer as delivered and installed needs very little configuration. When you first log in through the command line interface, the restorer automatically starts the config setup command. From the Data Domain Enterprise Manager, you can open the Configuration Wizard for initial system configuration. After configuration, the following parameters are set in the restorer: 6 • If using DNS, one to three DNS servers are identified for IP address resolution. • DHCP is enabled or not enabled for each Ethernet interface, as you choose during installation. • Each active interface has an IP address. • The restorer hostname is set (for use by the network). • The IP addresses are set for the backup servers, SMTP server, and administrative hosts. • An SMTP (mail) server is identified. • For NFS clients, the restorer is set up to export the /backup and /ddvar directories using NFSv3 over TCP. For CIFS clients, the restorer has shares set up for /backup and /ddvar. The directories under /ddvar are: - core — The default destination for core files created by the system. - log — The destination for all system log files. See “Log File Management” on page 241 for details. - releases — The default destination for operating system upgrades that are downloaded from the Data Domain Support web site. - snmp — The location of the SNMP MIB (management information base). - traces — The destination for execution traces used in debugging performance issues. • One or more backup servers are identified as restorer NFS or CIFS clients. • A host is identified for restorer administration. Administrative users have access to the partition /ddvar. The partition is small and data in the partition is not compressed. • The time zone you select is set. • The initial user for the system is sysadmin with the password that you give during setup. The user command allows you to later add administrative and non-administrative users later. Restorer Operating System User Guide Command Line Interface • The SSH service is enabled and the HTTP, FTP, TELNET, and SNMP services are disabled. Use the adminaccess command to enable and disable services. • The user lists for TELNET and FTP are empty, SNMP is not configured, and the protocols are disabled, meaning that no users can connect through TELNET, FTP, or SNMP. • A system report runs automatically every day at 3 a.m. The report goes to a Data Domain email address and an address that you give during set up. You can add addresses to the email list using the autosupport command. • An email list for system alerts that are automatically generated has a Data Domain email address and a local address that you enter during set up. You can add addresses to the email list using the alerts command • The clean operation is scheduled for Tuesday at 6:00 a.m. To review or change the schedule, use the filesys clean commands. • The background verification operation that continuously checks backup images is enabled. Command Line Interface A restorer is administered through a command line interface. Use the SSH or TELNET (if enabled) utilities to access the command prompt. The majority of this manual gives details for using the commands to accomplish specific administration tasks. Each command also has a help page that gives the complete command syntax. Help pages are available through the restorer help command and in an appendix at the back of this manual. • To list restorer commands, enter a question mark (?) at the prompt. • To list the options for a particular command, enter the command with no options at the prompt. • To find a keyword used in a command option when you do not remember which command to use, enter a question mark (?) or the help command followed by the keyword. For example, the question mark followed by the keyword password displays all restorer command options that include password. If the keyword matches a command, such as net, then the command explanation appears. • To display a detailed explanation of a particular command, enter the help command followed by a command name. • Use the up and down arrow keys to move through a displayed command. Use the q key to exit. Enter a slash character (/) and a pattern to search for and highlight lines of particular interest. • The Tab key completes a command entry when that entry is unique. Tab completion works for the first three levels of command components. For example, entering syst(tab) sh(tab) st(tab) displays the command system show stats. • Any restorer command that accepts a list, such as a list of IP addresses, accepts entries as comma-separated, space-separated, or both. Chapter 1: Introduction 7 Command Line Interface • Commands that display the use of disk space or the amount of data on disks compute amounts using the following definitions: 1 KB = 210 bytes = 1024 bytes 1 MB = 220 bytes = 1,048,576 bytes 1 GB = 230 bytes = 1,073,741,824 bytes 1 TB = 240 bytes = 1,099,511,627,776 bytes Note The one exception to displays in powers of 2 is the system show performance command, in which the Read, Write, and Replicate values are calculated in powers of 10 (1KB = 1000). The commands are: adminaccess Manages the HTTP, FTP, TELNET, and SSH services. See “Access Control for Administration” on page 103. alerts Creates alerts for system problems. Alerts are emailed to Data Domain and to a user-configurable list. See “Alerts” on page 114. alias Creates aliases for restorer commands See “The alias Command” on page 162. autosupport Generates a system status and health report. Reports are emailed to Data Domain and to a user-configurable list. See “Autosupport Reports” on page 118. cifs Manages Common Internet File System backups and restores on a restorer and displays CIFS status and statistics for a restorer. See “CIFS Management” on page 187. config Shows, resets, copies, and saves restorer configuration settings. See “Configuration Management” on page 89. disk Displays disk statistics, status, usage, reliability indicators, and RAID layout and usage. See “Disk Management” on page 139. filesys Displays filesystem status and statistics. See “Statistics and Basic Operations” on page 125 for details. Manages the clean feature that reclaims physical disk space held by deleted data. See “Clean Operations” on page 130 for details. help Displays a list of all restorer commands and detailed explanations for each command. license Displays current licensed features and allows adding or deleting licenses. log Displays and administers the restorer log file. See “Log File Management” on page 241. ndmp Manages direct backup and restore operations between a Network Appliance™ filer and a restorer using the Network Data Management Protocol Version 2. See “Backup/Restore Using NDMP” on page 231. net Displays network status and set up information. See “Network Management” on page 167. nfs Displays NFS status and statistics. See “NFS Management” on page 181 for details. 8 Restorer Operating System User Guide Graphical User Interface ntp Manages restorer access to one or more time servers. The default setting is multicast. See “Time Servers and the NTP Command” on page 164. replication Manages the Replicator for replication of backup data from one restorer to another. See “Replicator” on page 199. route Manages restorer network routing rules. See “The route Command” on page 177. snmp Enables or disables SNMP access to a restorer, adds community strings, and gives contact and location information. See “SNMP Management and Monitoring” on page 235. support Send log files to Data Domain Technical Support. See “Collect and Send Log Files” on page 122. system Displays restorer status, faults, and statistics, enables, disables, halts, and reboots a restorer. See “The system Command” on page 149. Also sets and displays the system clock and calendar and allows the restorer to synchronize the clock with an external time server. See “Set the Date and Time” on page 152. user Administers user accounts for the restorer. See “User Administration” on page 109. Graphical User Interface Through the browser-based Data Domain Enterprise Manager graphical user interface, you can do the initial system configuration, make a limited set of configuration changes, and display system status, statistics, and settings. The supported browsers for web-based access are Netscape 7 and above, Microsoft® Internet Explorer 6.0 and above, FireFox 0.9.1 and above, Mozilla 1.6 and above, and Safari 1.2.4. The console first asks for a login and then displays the Restorer Summary page (see Figure 2 on page 10). Some of the individual displays on various pages have a Help link to the right of the display title. Click on the link to bring up detailed online help about the display. To bring up the interface: 1. Open a web browser. 2. Enter a path such as http://rstr01/ for restorer rstr01 on a local network. 3. Enter a login name and password. Chapter 1: Introduction 9 Graphical User Interface rstr01.yourcompany.com Figure 2: Summary screen On the Restorer Summary screen: 10 • The bar at the top displays the restorer host name. • The grey bar immediately below the host name displays the file system status, the number of current alerts, and the system uptime. • The Current Status and Space Graph tabs toggle the display. Figure 2 shows Current Status. See “Display the Space Graph” on page 20 for the Space Graph display and explanation. • The left panel lists the pages available in the interface. Click on a link to display a page. • Below the list, find the current login, a logout button, and a link to Data Domain Support. • The main panel shows current alerts and the space used by restorer file system components. • A line at the bottom of the page displays the restorer software release and the current date. Restorer Operating System User Guide Graphical User Interface The page links in the left panel display the output from restorer commands that are detailed throughout this manual. Configuration Wizard gives the same system configuration choices as the config setup command. See “Login and Configuration” on page 36. System Stats Opens a new window and displays continuously updated graphs showing system usage of various resources. See “Display Detailed System Statistics” on page 155. Group Manager Opens a window that allows basic system monitoring for multiple restorers. See “Monitor Multiple Restorers” on page 23. Autosupport shows current alerts, the email lists for alerts and autosupport messages, and a history of alerts. See “Display Current Alerts” on page 115, “Display the Email List” on page 116, “Display the Autosupport Email List” on page 121, and “Display the Alerts History” on page 116. Admin Access lists every access service available on a restorer, whether or not the service is enabled, and lists every hostname allowed access through each service that uses a list. See “Display Hosts and Status” on page 107. CIFS displays CIFS configuration choices and the CIFS client list. Disks shows statistics for disk reliability and performance and lists disk hardware information. See “Display Disk Reliability Details” on page 147, “Display Disk Performance Details” on page 146, and “Display Disk Type and Capacity Information” on page 142. File System displays the amount of space used by restorer file system components. See “Display File System Space Utilization” on page 127. Licenses shows the current licenses active on the restorer. See “Display Licenses” on page 95. Log Files displays information about each system log file. Network displays settings for the restorer Ethernet ports. See “Display Interface Settings” on page 173 and “Display Ethernet Hardware Information” on page 174. NFS lists client machines that can access the restorer. See “Display Allowed Clients” on page 184. SNMP displays the status of the local SNMP client and SNMP configuration information. Support allows you to create a support bundle of log files and lists existing bundles. See “Collect and Send Log Files” on page 122. System shows system hardware information and status. Replication lists configured replication pairs and replication statistics. Users lists the users currently logged in and all users that are allowed access to the system. See “Display Current Users” on page 111 and “Display All Users” on page 112. Chapter 1: Introduction 11 Hardware System-Level Interfaces Hardware System-Level Interfaces The front and back panels of a restorer have a number of LEDs and hardware interfaces. Front Panel The upper right corner of the front panel has all of the front-panel interfaces (except for the disk activity LEDs). See Figure 3. System power on/off Reboot the system Power supply alarm cutoff Power on/off indicator Network activity indicator Rack screw Extreme temperature indicator Power supply failure indicator Figure 3: Front panel operations functions and indicators 12 • At the top is the system power on/off button. Press and hold the button for several seconds to power off the system. • Below the power button is a very small button labelled Reset. The button immediately reboots the system. Do not press the button unless instructed to by Data Domain Technical Support. • The next button down is labelled Mute and turns off the power supply alarm that buzzes when one or more power supplies is not working. • The top LED is the power on/off indicator that glows green when power is on. • The second LED is the network activity indicator that flashes green with network activity through the Ethernet port, eth0. See “Hardware Interface” on page 14 to identify the port. • The third LED indicates extreme high temperature for either CPU inside the chassis. • The last LED glows red when any one or more of the power supplies fails. Restorer Operating System User Guide Hardware System-Level Interfaces • The rack screw is to keep the chassis from sliding forward and back when in a rack with slide rails. Use a 10-32 nut to secure the rack screw to the rack. The rack screws cannot support the weight of the chassis in a rack. Use the rack screws only in combination with the slide rails that are included in the shipping crate with the restorer. Each disk has two LEDs at the bottom of the disk carrier. See Figure 4. The right LED on each disk flashes green whenever the system accesses the disk. The left LED glows red when the disk has failed. Both LEDs are dark on the disk that is available as a spare. Disk LEDs Figure 4: Disk activity LEDs Back Panel The back panel has three major functional areas: the power supply units, a hardware interface panel, and a system card interface area. See Figure 5. Power supply units Hardware interface panel System card interfaces Figure 5: Back panel Chapter 1: Introduction 13 Hardware System-Level Interfaces Power Supply LEDs A restorer has three power supply units. Each power unit has an LED (see Figure 6) that glows green when the unit is functional. The LED glows amber if the unit has failed, but still has power. The LED also glows amber when the restorer is turned off but the unit is still plugged in to a live power source. The LED is dark if the unit has no power. Also, when a unit fails, the power supply failure LED on the front panel of the system glows red (see Figure 3 on page 12). LED locations Figure 6: Power unit LEDs Hardware Interface The hardware interface panel is where you connect to a restorer with a serial console, a monitor and keyboard, or through an Ethernet connection. See Figure 7 on page 15. The Ethernet interfaces eth0 and eth1 are for data transfer to the restorer or for administrative access over a network. Both Ethernet interfaces are 1000 Base-T Gigabit copper ports that can accept 10/100 Base-T or Gigabit connections. Each Ethernet connection has two LEDs, one on each side. When the LED on the left side is dark, the port has no live connection. When the LED on the left is green, the connection speed is 10/100 Base-T. When the LED on the left is amber, the connection speed is 1000 Base-T Gigabit. The LED on the right flashes amber when the connection is active with network traffic. 14 Restorer Operating System User Guide Hardware System-Level Interfaces Keyboard port Console port Monitor (VGA) port eth0 eth1 Figure 7: Hardware interface panel System Card Interface The system card interface area has the NVRAM card LEDs and gives access to an optional Ethernet card, with ports eth2 and eth3, or an optional single-channel Fibre Channel HBA card for the VTL feature. The Ethernet ports are either 1000 Base-T copper or Gigabit fiber depending on the option chosen. Figure 8 shows copper ports. Ethernet fiber ports are installed in the same vertical slot, but are somewhat higher in the slot than the copper ports shown. A system can have either an Ethernet card or a VTL Fibre Channel HBA card, but not both as both cards use the same slot. Remove indicator Fault - bad NVRAM card battery indicator Power on/off indicator Test LED switch eth2 (or the VTL Fibre Channel port) eth3 Figure 8: System card interfaces Chapter 1: Introduction 15 Hardware System-Level Interfaces The fiber Ethernet ports each have an LED that glows steadily when the connection is live. The copper Ethernet ports each have an upper LED that flashes green when the connection is active and a lower LED that glows green when the connection is 10/100 Base-T or amber when the connection is Gigabit. The NVRAM interfaces from the bottom to the top are: • A Test LED switch that lights the three NVRAM LEDs to test their functionality. • A power on/off indicator that glows green when powered on. • A fault indicator for the two batteries on the NVRAM card. If either battery is below specifications or not working, the indicator glows amber. • The LED labeled Remove is not used at this time. Caution Do not remove the NVRAM card from the system. Only a trained service person should replace the card. The NVRAM card contains two lithium batteries which can cause fire or explosion if handled incorrectly. Do not remove either battery from the NVRAM card. Do not place the NVRAM card on a metal surface. Do not dispose of the NVRAM card in fire as the batteries explode. 16 Restorer Operating System User Guide Disk Space and System Monitoring 2 This chapter: • Gives general guidelines for predicting how much disk space your site may use over time. • Explains how to deal with restorer components that run out of disk space. • Describes Data Domain Space Usage graphs. • Gives background information on how to reclaim restorer disk space. Note Data Domain offers guidance on setting up backup software and backup servers for use with a restorer. Because such information tends to change often, it is available on the Data Domain Support web site (http://support.datadomain.com/). See the Technical Notes section on the web site. Space Management A restorer is designed as a very reliable online cache for backups. As new backups are added to the system, old backups are removed. Such removals are normally done under the control of backup software (on the backup server) based on the configured retention period. The process with a restorer is very similar to tape policies where older backups are retired and the tapes are reused for new backups. When backup software removes an old backup from a restorer, the space on the restorer becomes available only after the restorer internal clean function reclaims disk space. A good way to manage space on a restorer is to retain as many online backups as possible with some empty space (about 20% of total space available) to allow for data growth over time. Data growth on a restorer is primarily affected by: • The size and compressibility of the primary storage that you are backing up. • The retention period that you specify with the backup software. If you backup volumes that in total size are near the space available for data storage on a restorer (for example 4 TB on a model DD460, which has 3.9 TB space available, see the table on page 2) or the retention time for volumes that do not compress well is greater than four months, backups may fill space on a restorer more quickly than expected. 17 Estimate Use of Disk Space Also, bypassing backup software by copying files directly to a restorer (using xcopy, for example) leads to poor compression and is not supported by Data Domain. A file system cleaning operation can restore normal compression ratios for such data. Estimate Use of Disk Space The restorer’s use of compression when storing data means that you can look at the use of disk space in two ways: physical and virtual. (See “Data Compression” on page 4 for details about compression.) Physical space is the actual disk space used on the restorer. Virtual space is the amount of space needed if all data and multiple backup images were uncompressed. • Through the restorer, the filesys show space command (or the alias of df) shows both physical and virtual space. See “Manage File System Use of Disk Space” on page 19. • Directly from clients that mount a restorer, use your usual tools for displaying a file system’s physical use of space. The restorer generates log messages as the file system approaches its maximum size. The following information about data compression gives guidelines for disk use over time. The amount of disk space used over time by a restorer depends on: • The size of the initial full backup. • The number of additional backups (incremental and full) over time. • The rate of growth for data in the backups. For data sets with average rates of change and growth, data compression generally matches the following guidelines: 18 • For the first full backup to a restorer, the compression factor is about 3:1. Disk space used on the restorer is about one-third the size of the data before the backup. • Each incremental backup to the initial full backup has a compression factor of about 6:1. • The next full backup has a compression factor of about 60:1. All data that was new or changed in the incremental backups is already in storage. • Over time, with a schedule of weekly full and daily incremental backups, the aggregate compression factor for all the data is about 20:1. The compression factor is lower for incremental-only data or for backups without much duplicate data. Compression is higher with only full backups. Restorer Operating System User Guide Manage File System Use of Disk Space Manage File System Use of Disk Space The restorer command filesys show space (or the alias command df) displays the amount of disk space used for data storage and for restorer components. # filesys show space Resource Size GB Used GB Avail GB Use% ----------------------------------------/ddvar 29.5 16.7 12.8 57% Pre-compression 6146.3 Data 2870.6 881.5 1989.0 31% If 100% cleaned* Meta-data 19.7 0.1 19.6 0% Index 120.0 8.7 111.2 7% ----------------------------------------Estimated compression factor: 6.9x = 6146.3/(881.5+0.1+8.7 Estimate based on 2004/11/22 cleaning • The /ddvar line gives a rough idea of the amount of space used by and available to the log and core files. Remove old logs and core files to free space in this area. • The Pre-compression line shows the amount of virtual data stored on the restorer. Virtual data is the amount of data sent to the restorer from backup servers. • The Data line shows the actual physical space used by and available for data storage. Warning messages go to the system log and an email alert is generated when the Use% figure reaches 90%, 95%, and 100%. At 100%, the restorer accepts no more data from backup servers. You must run a filesys clean operation to reclaim disk space. If Use% is always high, use the filesys clean show-schedule command to see how often the operation runs automatically, then use filesys clean schedule to run the operation more often. Also consider reducing the data retention period or splitting off a portion of the backup data to another restorer. The Avail GB and Use% columns change when the Index line Use% column reaches 80% and the index is expanded. • The If 100% cleaned line is an estimate of actual physical space used, and physical space available for data storage if you run the filesys clean start operation multiple times to clean 100% of the file system. The estimate is based on the most recent clean operation. On a destination, no estimate appears. • The Meta Data line tracks space used for the internal file descriptions that the restorer creates for all stored files. The space for Meta Data allows for the storage of about 5 million files on a restorer. Warning messages go to the system log and an email alert is generated when the Use% figure reaches 90%, 95%, and 100%. At 100%, the restorer accepts no more data from backup servers. From the backup server, you must expire or purge backup images (backup server files, not user files) to create free space for meta data. Chapter 2: Disk Space and System Monitoring 19 Display the Space Graph • The Index line tracks space used for internal restorer operations. When the Use% column reaches approximately 80%, the space allocated for the index automatically increases by a set amount and the Use% column adjusts to the new size. At the same time, the Data line Avail GB and Use% columns also change to reflect the space taken for the index. • The Estimated compression factor line gives a rough idea of data compression efficiency. The estimate is based on the most recent clean operation and changes if the compressibility of data sent to the restorer changes. Note that the compression algorithm includes the metadata and index space as part of the total storage space. On a destination, no estimate appears. The value may be different on a replication destination than on a replication source. Multiple replications of a file do not send all of the file data to the destination every time, but do increase the number of bytes of pre-compression data used in the compression calculation. • The Estimate based on line displays the date for the most recent clean operation. The date is in the format YYYY/MM/DD. Display the Space Graph The Data Domain Enterprise Manager displays a graph of data from the spacelog file. • Data Collection The total amount of disk storage in use on the restorer. Look at the left vertical axis of the graph. • Data Collection Limit The total amount of disk storage available for data on the restorer. Look at the left vertical axis of the graph. • Pre-compression The total amount of data sent to the restorer by backup servers. Pre-compressed data on a restorer is what a backup server sees as the total un-compressed data held by a restorer-as-storage-unit. Look at the left vertical axis of the graph. • Compression factor The amount of compression the restorer has done with all of the data received. Look at the right vertical axis of the graph for the compression ratio. Two activity boxes below the graph allow you to change the data displayed on the graph. The vertical axis and horizontal axis change as you change the data set. 20 • The activity box on the left below the graph allows you to choose which data shows on the graph. Click the check boxes for Data Collection, Data Collection Limit, Pre-compression, or Compression factor to remove or add data. • The activity box on the right below the graph allows you to change the number of days of data shown on the graph. Restorer Operating System User Guide Display the Space Graph Display When first logging in to the Data Domain Enterprise Manager or when you click on the Home link in the left panel of the Data Domain Enterprise Manager, the Space Graph tab is on the far right of the right panel. Click the words Space Graph to display the graph. Figure 9 shows an example of the display with all four types of data included. In the example, the Data Collection and Data Collection Limit values show as constants because of the relatively large scale needed for Pre-compression on the left axis. Pre-compression Compression Factor Data Collection and Data Collection Limit rstr001.yourcompany.com DD5601234567890 Figure 9: Space graph Chapter 2: Disk Space and System Monitoring 21 Display the Space Graph Removing one or more types of data can give useful information as the axis scales change. For example, Figure 10 shows the graph for the same restorer and the same data collection as in Figure 9 on page 21. The difference is that the Pre-compression check box in the left-side activity box at the bottom of the display was clicked to remove pre-compression data from the graph. Data Collection Limit Data Collection Compression factor rstr001.yourcompany.com DD5601234567890 Figure 10: Graph without pre-compression data 22 Restorer Operating System User Guide Monitor Multiple Restorers The left axis scale in Figure 10 on page 22 is such that the Data Collection and Data Collection Limit give useful information. Also, comparing each of the three lines with the other two lines gives information. Data Collection (the amount of disk space used) at one point goes nearly to the Data Collection Limit, which means that the system was running out of disk space. A file system cleaning operation on about May 30 (see the scale along the bottom of the graph) cleared enough disk space for operations to continue. The Data Collection line rises with new data written to the restorer and falls steeply with every file system clean operation. Note that the Compression factor line falls with new data and rises with clean operations. The graph also displays a vertical grey bar for each time the system runs a file system cleaning process. The minimum width of the bar on the X axis is six hours. If the cleaning process runs for more than six hours, the width increases to show the total time used by the process. Monitor Multiple Restorers The Group Manager feature of the Data Domain Enterprise Manager displays information for multiple restorers. In the left panel of the Data Domain Enterprise Manager, click on Group Manager. See Figure 11. Link Figure 11: Group Manager link The Group Manager display gives information about multiple restorers. Figure 12 on page 24 is an example. See Figure 13 on page 25 for adding systems to the display. Chapter 2: Disk Space and System Monitoring 23 Monitor Multiple Restorers rstr01.company.com rstr02.company.com rstr03.company.com rstr04.company.com rstr05.company.com Figure 12: Multi-monitor window 24 • Manage Hosts Click to bring up a screen that allows adding restorers to or deleting restorers from the display. See Figure 13 on page 25 for details. • The Total Pre-compression and Total Data amounts are the combined amounts of data for all displayed systems (five restorers in the example). • Update Now Click to update the main table of information and the status for each restorer displayed. • Status Displays OK in green or the number of alerts in red for each restorer. • Restorer Displays the name of each restorer monitored. Click on a name to see more information about a restorer. See Figure 14 on page 26 for an example. • Pre-compression GB The amount of data sent to the restorer by backup software. • Data GB The amount of disk space used on the restorer. • % Used A bar graph of the amount of disk space used for compressed data. • Compression The amount of compression achieved for all data on the restorer. Restorer Operating System User Guide Monitor Multiple Restorers Figure 13 shows the Manage Hosts window for adding and deleting systems from the main display. Enter either hostnames or IP addresses for the restorers that you want to monitor. • Click the Save button to save changes. • Click the Cancel button to return to the main display with no changes. Figure 13: Add to or delete from the display Chapter 2: Disk Space and System Monitoring 25 Reclaim Data Storage Disk Space Figure 14 shows the display after clicking on a name in the Restorer column. Connect to GUI brings up the login screen for the monitored system if the GUI is enabled on the monitored system. Whichever protocol the current GUI (the one hosting the display) is using, HTTP or HTTPS, is also used to connect to the GUI on the monitored system. rstr01.company.com rstr02.company.com rstr03.company.com rstr04.company.com rstr05.company.com Figure 14: System details Reclaim Data Storage Disk Space When your backup application (such as NetBackup or NetWorker) expires data, the data is marked by the restorer for deletion. However, the data is not deleted immediately. The restorer clean operation deletes expired data from the restorer disks. • During the clean operation, the restorer file system is available for backup (write) and restore (read) operations. • Although cleaning uses a noticeable amount of system resources, cleaning is self-throttling and gives up system resources in the presence of user traffic. • Data Domain recommends running a clean operation after the first full backup to a restorer. The initial local compression on a full backup is generally a factor of 1.5 to 2.5. An immediate clean operation gives additional compression by another factor of 1.15 to 1.2 and reclaims a corresponding amount of disk space. A default schedule runs the clean operation every Tuesday at 6 a.m. (tue 0600). The operation can clean a maximum of about 34% of the total space available for data on a DD460 or DD560, about 65% of the total space on a DD430, and 100% on a DD410. You can change the schedule or you can run the operation manually with the filesys clean commands. If you want to increase file system availability and if the restorer is not short on disk space, consider changing the schedule to clean less often. See “Clean Operations” on page 130 for details on changing the schedule. 26 Restorer Operating System User Guide Maximum Number of Files You can have the clean operation run for a set number of hours or until a set number of gigabytes are available on the restorer. The default (and maximum allowed in one operation) is 34% of total space available for data (on a DD460 or DD560), which takes from three to four hours on a system that is at least 34% full and that is not otherwise busy. When the operation finishes, it sends a message to the system log giving the percentage of storage space that was cleaned. A full DD560 or DD460 restorer would need three clean operations to clean 100% of the file system (about 34% for each operation). Depending on the type of data stored, such as when using markers for specific backup software (filesys option set marker-type ... ), the file system may never report 100% cleaned. The total space cleaned may always be a few percentage points less than 100. Maximum Number of Files The disk space set aside for the meta data that describes each file on a restorer allows for the storage of about 5 million files. However, the number of files in a single directory under /backup, such as /backup/dir2, can affect performance of commands such as ls -l from a system that mounts the restorer file system. Data Domain recommends a maximum of 5,000 files under one directory if you have performance considerations. A maximum of 2,000 files under one directory gives uniform performance across all directories. Displays from commands such as ls -l become noticeably slower when directories have between 2,000 files and 5,000 files. The number of files that can be under a single directory is limited only by the space set aside for meta data (5 million files). Chapter 2: Disk Space and System Monitoring 27 Maximum Number of Files 28 Restorer Operating System User Guide Installation 3 Installation and site configuration for a restorer consist of the tasks listed below. After configuration, the restorer is fully functional and ready for backups. For site hardware and backup software requirements, see “Restorer Hardware Interfaces” on page 5. Note Installation and configuration for a Gateway restorer (using outside storage systems) is explained in the chapter “Gateway Restorers.” • Check the site and backup software requirements. • To use DHCP with Ethernet interfaces, configure the DHCP server with the appropriate restorer information. To configure a restorer using an Ethernet interface, DHCP information is required for at least one interface. The alternative is to use a serial console or a keyboard and monitor. • Set up the restorer hardware. • Set up a serial console or a monitor and keyboard if you are not using an Ethernet interface for configuration. • Login to the restorer as sysadmin using a serial console, monitor and keyboard, SSH and an Ethernet interface, or the Data Domain Enterprise Manager through a web browser. • Answer questions asked by the configuration process. The process starts automatically when sysadmin first logs in through the command line interface. To start configuration in the Data Domain Enterprise Manager, click on Configuration Wizard. The process requests all of the basic information needed to use the restorer. • Optionally, after completing the initial configuration, follow the steps in “Additional Configuration” on page 46 to add to the configuration. • Configure the backup software and servers. See the Data Domain Support web site (https://support.datadomain.com), Technical Notes section for details about configuring a restorer with specific backup servers and software. To upgrade Data Domain OS software to a new release, see “Upgrade the Restorer Software” on page 150. 29 Restorer Site Requirements Note The Data Domain OS is pre-installed on the restorer. You do not need to install software. In emergency situations, such as when a restorer fails to boot up by itself, call Data Domain Technical Support for step-by-step instructions. Restorer Site Requirements To install a restorer at your site, you need: • 30 A 3U space in a standard 19 inch rack. A restorer in a rack has the following requirements: - Air conditioning that can cope with a maximum thermal rating of 1570 BTUs an hour for DD460 and DD560 systems and 1370 BTUs an hour for DD430 and DD410 systems. - Ambient air temperature range of from 5° C to 35° C at the front panel of the chassis. - Adequate temperature control with a gradient (change) not to exceed 20° C in an hour. - Ventilation and air flow through the front and back panels of the restorer is critical. The restorer requires six inches (16 cm.) of unobstructed clearance for both the front panel and the back panel. Do not block or cover the openings in the front and back panels. - In a closed or multi-unit rack, ensure that the unit has adequate airflow and that the ambient air temperature requirements are met. • For configuration and administrative tasks, either a serial console, an Ethernet connection, or a keyboard and monitor. • An Ethernet connection to a restorer interface for data transfer to and from backup servers. - You can configure different network interfaces on a restorer to different subnets. However, multiple interfaces must not be linked to the same LAN or VLAN in the network. - If the restorer uses Fiber Gigabit Ethernet interfaces, the cables and connecting ports on the other end must be SX compatible. • Three grounded power outlets. The restorer is shipped with grounding type (three wire) power cords. To reduce the risk of electric shock, always use the cords with grounded power outlets. • Three single phase AC power outlets with an earth ground conductor (safety ground). A safe electrical earth connection must be provided to each power cord. - Frequency: 50 to 60 Hz. - Normal operating current 115VAC/230VAC DD410/DD430: 3.0/1.5A DD460/DD560: 3.5/1.8A - Maximum current at power up 115VAC/230VAC DD410/DD430: 4.5/2.3A DD460/DD560: 5.0/2.5A Restorer Operating System User Guide Expansion Shelf Site Requirements • Ensure that the circuit used for the restorer is not overloaded. Look for the power ratings on the nameplates of all equipment on the circuit. The total load on the circuit should not exceed the maximum circuit rating. Note that the restorer requires about 650W during the first six seconds after power-on and about 300W during normal operation. • If a restorer is installed in a rack with limited space above the restorer, use cables that are long enough to allow sliding the restorer out on the slide rails for servicing. Expansion Shelf Site Requirements A fully-populated expansion shelf weighs 77 lbs/35 kg. See the slide rail and installation documentation in the external shelf packaging for installing the shelf in a rack. Each installed expansion shelf needs: • A 3U space in a standard 19 inch rack. • A shelf requires: • - One inch (2.54 cm.) of unobstructed clearance for the front panel/bezel. - Five inches (12.7 cm.) of unobstructed clearance for the back panel. - Back pressure by rack doors and obstacles not to exceed 5 pascals (0.5 mm. water gauge pressure or 0.9997 psi). Two single phase AC power outlets with an earth ground conductor (safety ground). A safe electrical earth connection must be provided to each power cord. - Voltage: 100-120 VAC or 200-240 VAC. - Frequency: 50 to 60 Hz. - Power consumption: 420 watts. - Input current: 3.5 / 2.0 @ 120 / 230 VAC • Ambient temperature range: 41F/5C to 104F/40C • Air conditioning that can cope with a maximum thermal rating of 2800 BTUs an hour. • Humidity: 20% to 80% non-condensing • Height: 130mm / 5.12 inches, width: 482.6mm / 19.0 inches, depth: 551mm / 21.7 inches. • Acoustic noise: Maximum 58 dB LpA average measured at the bystander positions. Chapter 3: Installation 31 Restorer Installation Restorer Installation Caution The two side brackets on the restorer’s front faceplate (see Figure 18 on page 34) cannot support the weight of the restorer in a rack. Support the system with the slide rails that are delivered with the restorer. • Mount the restorer in a 3U space in a 19-inch, four-post rack using the slide rails provided by Data Domain. Any other means of mounting the restorer must be rated for at least 100 pounds (45 kilograms). - Open the slide rails package that ships with the restorer. - Using the slide rail instruction and rack template documents that are included with other system documentation, mount the inner rails onto the restorer. Note The slide rails can accommodate a front-to-back rail depth of 28 inches (710 mm) to 33.67 inches (855 mm). • - Mount the outer rails onto the rack. - Slide the restorer into the rails that are in the rack. - Remove the thin, clear plastic wrap that covers the top panel of the system and the clear plastic tape that covers the top and bottom surfaces of the trim around the front of the chassis. - Slide the restorer all the way into the rack. Determine whether your configuration and ongoing administration access for the restorer is to be through an Ethernet connection, a serial console, or a monitor and keyboard. - For an Ethernet connection, attach an Ethernet cable to one of the Ethernet interfaces, eth0, eth1, eth2, or eth3 on the back panel. See Figure 19 on page 36 for Ethernet interface locations. Eth0 and eth1 each have two leds, one on each side of the port. When the LED on the left side is dark, the port has no active connection. When the LED on the left is green, the connection speed is 10/100 Base-T. When the LED on the left is amber, the connection speed is 1000 Base-T gigabit. The LED on the right flashes amber when the connection is active with network traffic. 32 - For a serial console, attach an RS232 null modem cable to the DB9 port (labeled “Console Port”) on the back panel. See Figure 15. Use the console communication settings of: 9600 baud, 8 data bits, no parity, 1 stop bit. - For a monitor and keyboard, attach the monitor to the port labeled VGA and the keyboard to the port nearest the keyboard icon. See Figure 15 for locations. Restorer Operating System User Guide Restorer Installation Keyboard port Console port Monitor (VGA) port Figure 15: Access points • Attach at least one Ethernet cable to an Ethernet interface on the back panel for backup and restore communications between the restorer and your backup servers. See for Ethernet interface locations. • Attach the power cords to the three power supplies. See Figure 16. eth0 Power cord slots eth1 eth2 eth3 Figure 16: Power cord plug-in slots • For each power cord, slide a power cord retainer bracket over the cord. Chapter 3: Installation 33 Restorer Installation • Pinch the two “wings” on the bracket and slide the bracket down over the power cord plug and flush with the back of the power unit so that the wings secure the plug by clicking into the power unit handle brackets. See Figure 17. Power unit handle brackets Retainer bracket wings Figure 17: Power cord retainer bracket • Plug in the three power cords to a power source. • Start the Restorer. Push the power button (the top button) on the right-side control panel on the front of the system. See Figure 18 for the location. Power button Power-on LED Power unit failure indicator Side bracket Figure 18: Restorer front panel • 34 After the restorer starts, the power-on LED glows green. See Figure 18 for the location. Restorer Operating System User Guide Backup Software Requirements Backup Software Requirements A restorer accepts data from many combinations of backup software and servers. See the Data Domain Support web site (https://support.datadomain.com), Compatibility Matrix section for the latest updates on supported backup software and server combinations. Note See the Data Domain Support web site, Technical Notes section for configuration details for using specific backup software and server types with a restorer. CIFS Backup Server Timeout Internal activities on a Data Domain restorer can take longer than a default CIFS timeout, leading to an error message from the media server. The message is similar to: Network name no longer existed. On all CIFS backup servers using a restorer, change the SESSTIMEOUT value from the default of 45 (seconds) to decimal 3600 (five minutes). • If you want detailed background information, see the following web page: http://support.microsoft.com/default.aspx?scid=http://support.m icrosoft.com:80/support/kb/articles/Q102/0/67.asp&NoWebContent= 1 • Open REGEDT32 and navigate to: HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\SERVICES\ LANMANWORKSTATION\PARAMTERS • If the SESSTIMEOUT key does not exist, click in the right panel and select New and DWORD value. Create a new key, SESSTIMEOUT. Note that the registry is case sensitive. Use all caps for the new key name. • Double click on the new (or existing) key and set to the decimal value of 3600. DHCP Server If one or more of the restorer Ethernet interfaces are to use DHCP, the DHCP server needs MAC addresses for the interfaces and a hostname for the restorer. Data Domain recommends configuring infinite lease IP addresses for the restorer interfaces. All of the interfaces do not need to use DHCP. If you set an interface to use DHCP and DHCP is not yet available to the interface, the restorer attempts to set up the interface without DHCP until DHCP is available. Use the net show settings command to display which interfaces are configured for DHCP. Chapter 3: Installation 35 Login and Configuration Each Ethernet interface on the back of the restorer is labeled with its MAC address. See Figure 19. Eth0 and eth1 are copper 1000 Base-T gigabit interfaces. The optional eth2 and eth3 are for additional Fiber or copper Ethernet interfaces. The MAC addresses for eth0 and eth1 are vertical labels just to the right of each port. The MAC addresses for eth2 and eth3 are vertical labels just above eth2. The label on the left is for eth2 and the label on the right is for eth3. eth0 eth1 eth2 eth3 Figure 19: Ethernet interfaces Login and Configuration After the hardware is installed and running, configure the system with the config setup command through the command line interface or use the Data Domain Enterprise Manager. The config setup command starts automatically the first time sysadmin logs in through the command line interface. The command reappears at each login until configuration is complete. To bring up the Data Domain Enterprise Manager and start the configuration: 1. Open a web browser. 2. Enter a path to the restorer. For example: http://rstr01/ for a restorer named rstr01 on a local network. 3. Enter a login name and password. The default password for the sysadmin login is the serial number that appears on the rear panel of the restorer. Note that all characters in a serial number are numeric except for the third and fourth characters. Other than the third and fourth characters, all “0” characters are zeros. See Figure 22 on page 38 for the location. The Restorer Summary screen appears. 4. Click on the Configuration Wizard link as shown in Figure 20 on page 37. 36 Restorer Operating System User Guide Login and Configuration Configuration link Figure 20: Configuration Wizard link Note Most of the installation procedure in this chapter uses the command line interface as an example. However, the Configuration Wizard of the Data Domain Enterprise Manager has the same configuration groups and sets the same configuration parameters. With the Data Domain Enterprise Manager, click on links and fill in boxes that correspond to the command line examples that follow. To return to the list of configuration sections from within one of the sections, click on the Wizard List link in the top left corner of the Configuration Wizard screen. If you earlier set up DHCP for one or more restorer Ethernet interfaces, a number of the config setup prompts display the values given to the restorer from a DHCP server. DHCP servers normally supply values for a number of networking parameters. Press Return during the installation to accept DHCP values. If you do not use DHCP for an interface, determine what you will use for the following values before starting the configuration: • Interface IP addresses. • Interface netmasks. • Routing gateway. • DNS server list (if using DNS). • A site domain name, such as yourcompany.com. • A fully-qualified hostname for the restorer, such as rstr01.yourcompany.com. You can configure different network interfaces on a restorer to different subnets. However, multiple interfaces must not be linked to the same LAN or VLAN in the network. When configuring restorer software: • At any prompt, enter a question mark (?) for detailed information about the prompt. • Press Return to accept a displayed value. • Enter either hostnames or IP addresses where ever a prompt mentions a host. Hostnames must be fully qualified, such as srvr22.yourcompany.com. Chapter 3: Installation 37 Login and Configuration • For any entry that accepts a list, the entries in the list can be comma-separated, spaceseparated, or both. • When configuration is complete, the system is ready to accept backup data. For NFS clients, the restorer is set up to export the /backup and /ddvar directories using NFSv3 over TCP. For CIFS clients, the restorer has shares set up for /backup and /ddvar. The configuration utility has five sections: Licenses, Network, NFS, CIFS, and System. You can configure or skip any section. The command line interface automatically moves from one section to the next. With the Data Domain Enterprise Manager, click on the sections as shown in Figure 21. Configuration sections (wizards) Figure 21: Configuration sections 1. The first login to the restorer can be from a serial console, keyboard and monitor, through an Ethernet connection, or through a web browser. Log in as user sysadmin. The default password is the serial number from the rear panel of the restorer. See Figure 22 for the location. Serial number Figure 22: Serial number location 38 Restorer Operating System User Guide Login and Configuration - From a serial console or keyboard and monitor, log in to the restorer at the login prompt. - From a remote machine over an Ethernet connection, give the following command (with the hostname you chose for the restorer) and then give the default password. # ssh -l sysadmin host-name sysadmin@host-name’s password: - From a web browser, enter a path to the restorer. For example: http://rstr01/ for a restorer named rstr01 on a local network. 2. When using the command line interface, the first prompt after login gives the opportunity to change the sysadmin password. The prompt appears only once, at the first login to a new system. You can change the sysadmin password immediately at the prompt or later with the user change password command. To improve security, Data Domain recommends that you change the 'sysadmin' password before continuing with the system configuration. Change the 'sysadmin' password at this time? (yes|no) [yes]: 3. When using the command line interface, the restorer command config setup starts next. 4. The first configuration section is for licensing. Licenses that you ordered with the restorer are already installed. At the first prompt, enter yes to configure or view licenses. - Enter the license characters, including dashes, for each license category. - Make no entry and press Enter for categories that you have not licensed. LICENSES Configuration Configure LICENSES at this time (yes|no) [no]: yes VTL License Code Enter your VTL license code []: REPLICATION License Code Enter your REPLICATION license code []: - A listing of your choices appears. You can accept the settings (Save), reject the settings and go to the next section (Cancel), or return to the beginning of the current section and change settings (Retry). A Retry shows your previous choice for each prompt. Press Return to accept the displayed value or enter a new value. Pending License Settings. NFS License: ABCD-ABCD-ABCD-ABCD CIFS License: ABCD-ABCD-ABCD-ABCD REPLICATION License: ABCD-ABCD-ABCD-ABCD VTL License: ABCD-ABCD-ABCD-ABCD Do you want to save these settings (Save|Cancel|Retry): Chapter 3: Installation 39 Login and Configuration 5. The second section is for network configuration. At the first prompt, enter yes to configure network parameters. NETWORK Configuration Configure NETWORK parameters at this time (yes|no) [no]: Note After configuring the restorer to use DNS, the restorer must be rebooted. Also, if DHCP is disabled for all interfaces and then later enabled for one or more interfaces, the restorer must be rebooted. a. The first prompt is for a restorer machine name. Enter a fully-qualified name that includes the domain name. For example: rstr01.yourcompany.com. Note: With CIFS using domain mode authentication, the first component of the name is also used as the netBIOS name, which cannot be over 15 characters. If you use domain mode and the hostname is over 15 characters, use the cifs set nb-hostname command for a shorter netBIOS name. Hostname Enter the hostname for this system (fully-qualified domain name)[]: b. Supply a domain name, such as yourcompany.com, for use by restorer utilities, or accept the display of the domain name used in the hostname. Domainname Enter your DNS domainname []: c. Configure each Ethernet interface that has an active Ethernet connection. If you earlier set up DHCP for an interface, the IP address and netmask prompts do not appear. You can accept or not accept DHCP for each interface. - If you enter yes for DHCP and DHCP is not yet available to the interface, the restorer attempts to set up the interface with DHCP until DHCP is available. Use the net show settings command to display which interfaces are configured for DHCP. - If you are on an Ethernet interface and you choose to not use DHCP for the interface, the connection is lost when you complete the configuration. - At the last prompt, entering Cancel deletes all new values and goes to the next section. - Each interface is a Gigabit Ethernet connection. The same set of prompts appears for each interface. Ethernet port eth0: Enable Ethernet port (yes|no) [ ]: Use DHCP on Ethernet port eth0 (yes|no) [ ]: Enter the IP address for eth0 [ ]: Enter the netmask for eth0 [ ]: 40 Restorer Operating System User Guide Login and Configuration - When not using DHCP on any Ethernet port, you must specify an IP address for a default routing gateway. Default Gateway Enter the default gateway IP address[]: - When not using DHCP on any Ethernet port, you can enter up to three DNS servers for a restorer to use for resolving hostnames into IP addresses. Use a commaseparated or space-separated list. Enter a space for no DNS servers. With no DNS servers, you can use the net hosts commands to inform the restorer of IP addresses for relevant hostnames. DNS Servers Enter the DNS Server list (zero, one, two or three IP addresses)[]: d. A listing of your choices appears. You can accept the settings (Save), reject the settings and go to the next section (Cancel), or return to the beginning of the current section and change settings (Retry). A Retry shows your previous choice for each prompt. Press Return to accept the displayed value or enter a new value. Pending Network Settings. ------------------------------------Hostname: srvr26.yourcompany.com Domainname: yourcompany.com Default Gateway DNS Server List DNS Server List ------------------Cable Port Enabled DHCP IP Address Netmask ----- ---- ------- ---- ---------------------------eth0 yes yes (dhcp-supplied) (dhcp-supplied) eth1 yes yes (dhcp-supplied) (dhcp-supplied) eth2 no n/a n/a n/a *** eth3 yes yes (dhcp-supplied) (dhcp-supplied) ----- ---- ------- ---- ---------------------------*** No connection on indicated Ethernet port Do you want to save these settings (Save|Cancel|Retry): Note An information box also appears in the recap if any interface is set up to use DHCP, but does not have a live Ethernet connection. After troubleshooting and completing the Ethernet connection, wait for up to two minutes for the restorer to update the interface. The Cable column of the net show hardware command displays whether or not the Ethernet connection is live for each interface. 6. The third section is for CIFS (Common Internet File System) configuration. At the first prompt, enter yes to configure CIFS parameters. The default authentication mode is Active Directory. Chapter 3: Installation 41 Login and Configuration Note When configuring a destination restorer as part of a Replicator pair, configure the authentication mode, WINS server (if needed) and other entries as with the originator in the pair. The exceptions are that a destination does not need a backup user and will probably have a different backup server list (all machines that can access data that is on the destination). CIFS Configuration Configure CIFS at this time (yes|no) [no]: yes a. Select a user-authentication method for the CIFS user accounts that connect to the /backup and /ddvar shares on the restorer. CIFS Authentication Which authentication method will this system use (Workgroup|Domain|Active-Directory) [Active Directory]: The Workgroup method has the following prompts. Enter a workgroup, the name of a CIFS workgroup account that will send backups to the restorer, a password for the workgroup account, a WINS server name, and backup server names. Workgroup Name Enter the workgroup name for this system [ ]: Do you want to add a backup user yes|no) [no]: Backup User Enter backup user name: Backup User Password Enter backup user password: Enter the WINS server for the restorer to use: WINS Server Enter the IP address for the WINS server for this system []: Enter one or more backup servers as restorer clients. Backup Servers Enter the Backup Server list (CIFS clients of /backup) []: 42 Restorer Operating System User Guide Login and Configuration The Domain method brings the following prompts. Enter a domain name, the name of a CIFS domain account that will send backups to the restorer and optionally, one or more domain controller IP addresses, a WINS server name, and backup server names. Press Enter with no entry to break out of the prompts for domain controllers. Domain Name Enter the name of the Windows domain for this system [ ]: Do you want to add a backup user? (yes|no) [no]: Backup user Enter backup user name: Domain Controller Enter the IP address of domain controller 1 for this system [ ]: Enter the WINS server for the restorer to use: WINS Server Enter the IP address for the WINS server for this system []: Enter one or more backup servers as restorer clients. Backup Servers Enter the Backup Server list (CIFS clients of /backup) []: The Active-Directory method brings the following prompts. Enter a fully-qualified realm name, the name of a CIFS backup account, a WINS server name, and backup server names. Data Domain recommends not specifying a domain controller. When not specifying a domain controller, be sure to specify a WINS server. The restorer must meet all active-directory requirements, such as a clock time that is no more than five minutes different than the domain controller. Press Enter with no entry to break out of the prompts for domain controllers. Active-Directory Realm Enter the name of the Active-Directory Realm for this system [ ]: Do you want to add a backup user? (yes|no) [no]: Backup user Enter backup user name: Domain Controllers Enter list of domain controllers for this system [ ]: Chapter 3: Installation 43 Login and Configuration Enter the WINS server for the restorer to use: WINS Server Enter the IP address for the WINS server for this system []: Enter one or more backup servers as restorer clients. An asterisk (*) is allowed as a wild card only when used alone to mean “all.” Backup Server List Enter the Backup Server list (CIFS clients of /backup) []: b. A listing of your choices appears. You can accept the settings (Save), reject the settings and go to the next section (Cancel), or return to the beginning of the current section and change settings (Retry). A Retry shows your previous choice for each prompt. Press Return to accept the displayed value or enter a new value. The following example is with an authentication mode of Active-Directory. Pending CIFS Settings --------------------- ----------------- Auth Method Active-Directory Domain domain1 Realm domain1.local Backup User dsmith Domain Controllers WINS Server 192.168.1.10 Backup Server List * -------------------------------------Do you want to save these settings (Save|Cancel|Retry): 7. The fourth section is for NFS configuration. At the first prompt, enter yes to configure NFS parameters. NFS Configuration Configure NFS at this time (yes|no) [no]: yes a. Add backup servers that will access the restorer through NFS. You can enter a list that is comma-separated, space-separated, or both. An asterisk (*) opens the list to all clients. The default NFS options are: rw, no_root_squash, no_all_squash, and secure. You can later use adminaccess add and nfs add /backup to add backup servers. Backup Servers Enter the Backup Server list (NFS clients of /backup)[]: 44 Restorer Operating System User Guide Login and Configuration b. A listing of your choices appears. You can accept the settings (Save), reject the settings and go to the next section (Cancel), or return to the beginning of the current section and change settings (Retry). A Retry shows your previous choice for each prompt. Press Return to accept the displayed value or enter a new value. Pending NFS Settings. Backup Server List: Do you want to save these settings (Save|Cancel|Retry): 8. The fifth section is for system parameters. At the first prompt, enter yes to configure system parameters. SYSTEM Configuration Configure SYSTEM Parameters at this time (yes|no) [no]: a. Add a client host from which you will administer the restorer. The default NFS options are: rw, no_root_squash, no_all_squash, and secure. You can later use the commands adminaccess add and nfs add /ddvar to add other administrative hosts. Admin host Enter the administrative host []: b. You can add an email address so that someone at your site receives email for system alerts and autosupport reports. For example, [email protected]. By default, the restorer email lists include an address for the Data Domain support group. You can later use the restorer commands alerts and autosupport to add more addresses. Admin email Enter an email address for alerts and support emails[]: c. You can enter a location description for ease of identifying the physical machine. For example, Bldg4-rack10. The alerts and autosupport reports display the location. System Location Enter a physical location, to better identify this system[]: d. Enter the name of a local SMTP (mail) server for restorer emails. If the server is an Exchange server, be sure that SMTP is enabled. SMTP Server Enter the hostname of a mail server to relay email alerts[]: e. The default time zone for each restorer is the factory time zone. For a complete list of time zones, see “Time Zones” on page 265. Timezone Name Enter your timezone name:[US/Pacific]: Chapter 3: Installation 45 Additional Configuration f. To allow the restorer to use one or more Network Time Service (NTP) servers, you can enter IP addresses or server names. The default is to enable NTP and to use multicast. Configure NTP Enable Network Time Service? (yes|no)|? [yes]: Use multicast for NTP? (yes|no|?) [no]: Enter the NTP Server list [ ]: g. A listing of your choices appears. Accept the settings (Save), reject the settings and go to the next section (Cancel), or return to the beginning of the current section and change settings (Retry). A Retry shows your previous choice for each prompt. Press Return to accept the displayed value or enter a new value. Pending System Settings ------------------------------Admin host [email protected] System Location Server Room 52327 SMTP Server mail.yourcompany.com Timezone name US/Pacific NTP Servers 123.456.789.33 ---------------------------------Do you want to save these settings (Save|Cancel|Retry): Note For Tivoli Storage Manager on an AIX backup server to access a restorer, you must re-add the backup server to the restorer after completing the original configuration setup. On the restorer, run the following command with the server-name of the AIX backup server: # nfs add /backup server-name insecure h. Configure the backup servers. For the most up-to-date information about setting up backup servers for use with a restorer, go to the Data Domain Support web site (http://support.datadomain.com/). See the Technical Notes section. Additional Configuration The following are common changes to the restorer configuration that users make after the installation. Changes to the initial configuration settings are all made through the command line interface. Each change describes the general task and the command used to accomplish the task. • Add email addresses to the alerts list and the autosupport list. See “Add to the Email List” on page 118 for details. alerts add addr1[,addr2,...] 46 Restorer Operating System User Guide Administering a Restorer • Give access to additional backup servers. See “NFS Management” on page 181 for details. nfs add /backup srvr1[,srvr2,...] • From a remote machine, add an authorized SSH public key to the restorer. See “Add an Authorized SSH Public Key” on page 105 for details. ssh-keygen -d ssh -l sysadmin rstr01 “adminaccess add ssh-keys” \ < ~/.ssh/id_dsa.pub • Add remote hosts that can use FTP or TELNET on the restorer. See “Add a Host” on page 103 for details. adminaccess add {ftp | telnet}{all | host1[,host2,...]} • Enable HTTP, HTTPS, FTP or TELNET. The SSH, HTTP, and HTTPS services are enabled by default. See “Enable a Protocol” on page 104 for details. adminaccess enable {http | https | ftp | telnet | ssh | all} • Add a standard user. See “User Administration” on page 109 for details. user add username • Change a user password. See “User Administration” on page 109 for details. user change password username Administering a Restorer To administer a restorer, use either the command line interface or the Data Domain Enterprise Manager graphical user interface. Command Line Interface The command line interface gives complete access to a restorer for the initial system configuration, for making changes to individual system settings, and to display of system states and the state of system operations. The remaining chapters in this book detail the use of all restorer commands and operations. The headings in each chapter are a task-oriented list of operations performed by the featured commands. To find the command for any task that you want to perform, do either of the following: • Look in the table of contents at the beginning of this guide for the heading that describes the task. • List the restorer commands and operations. To see a list of commands, log in to the restorer using SSH (or TELNET if that is enabled) and enter a question mark (?) at the prompt. To see a list of operations available for a particular command, enter the command name. To display a Chapter 3: Installation 47 Administering a Restorer detailed help page for a command, use the help command with the name of the target command. Use the up and down arrow keys to move through a displayed command. Use the q key to exit. Enter a slash character (/) and a pattern to search for and highlight lines of particular interest. Data Domain Enterprise Manager The web-based graphical user interface, the Data Domain Enterprise Manager, is available through Ethernet connections to a restorer. With the Data Domain Enterprise Manager, you can do the initial system configuration, make some configuration updates after initial configuration, and display system states and the state of system operations. From the left panel of the Data Domain Enterprise Manager, select the Configuration Wizard to change configuration values or select an area such as File System to display system information. See Figure 23. rstr01.company.com Selections on the left panel Figure 23: Data Domain Enterprise Manager selections For a complete explanation of the default Data Domain Enterprise Manager screen, see “Graphical User Interface” on page 9. 48 Restorer Operating System User Guide ES20 Expansion Shelf 4 A Data Domain ES20 expansion shelf is a 3U chassis that has 16 disks for increasing the storage capacity of a Data Domain restorer. The Data Domain OS Data Invulnerability Architecture™ and all other restorer data integrity features that protect against data loss from hardware and software failures also apply to the ES20 expansion shelf. All restorer data compression technology also applies as does the Data Domain Replicator feature that sets up and manages replication of backup data between two restorers. The Replicator sees data on an expansion shelf as part of the volume that resides on the managing restorer. • In related restorer commands, the restorer and each expansion shelf is called an enclosure. • A restorer sees all data storage (restorer and attached shelves) as part of a single volume. • A new restorer installed along with one or two expansion shelves finds the shelves when booted up. Follow the instructions in this chapter to add shelves to the volume and create RAID groups. • After adding a shelf to a restorer with an existing, active file system, a percentage of new data is sent to the new shelf. An algorithm takes into account the amount of space available in the restorer file system, in the file system on a previously installed shelf (if one exists), and the probable impact of location on read/write times. Over time, data is spread evenly over all enclosures. Warning After adding a shelf to a volume, the volume must always include the shelf to maintain file system integrity. Do not add a shelf and then later remove it, unless you are prepared to lose all data in the volume. If a shelf is disconnected, the volume’s file system is immediately disabled. Re-connect the shelf or transfer the shelf disks to another shelf chassis and connect the new chassis to re-enable the file system. If the data on a shelf is not available to the volume, the volume cannot be recovered. All administrative access to an ES20 shelf is done through the controlling restorer command line interface and graphical user interface. Initial configuration tasks, changes to the configuration, and displaying disk usage in a shelf are all done with standard restorer commands as explained in this chapter. 49 RAID groups RAID groups The single volume that includes all disks in a restorer and one or two shelves also includes multiple RAID 6 groups. Each shelf is one RAID group and the restorer is one RAID group for a maximum of three RAID groups. • The restorer has a RAID group of 12 data disks, two parity disks, and one spare. • Each shelf has a RAID group with 12 data disks, two parity disks, and two spares. • A RAID group is created on a new shelf with the disk add enclosure command. Disk Failures A restorer and two expansion shelves (three enclosures) have a total of five spare disks. If the number of spare disks needed by an enclosure exceeds the number of spares in that enclosure, the RAID group for that enclosure takes an available spare disk from another enclosure. Warning If no spare disks are available from any enclosure, a shelf can have up to two more failed disks and still maintain the RAID group of 12 data disks. However, if one more disk in a shelf fails (leaving only 11 data disks), the data volume (made up of all the enclosures) fails and cannot be recovered. Always replace any failed disk in any enclosure as soon as possible. Add a First Shelf Physically install the first shelf by following the installation instructions received with the shelf. After installing the shelf and starting the restorer: 1. On the restorer, use the enclosure show summary command to verify that the shelf is recognized. # enclosure show summary 2. Enter the disk rescan command to make the disks in the new shelf visible to other disk commands. If existing RAID groups need spare disks and have none of their own, the disk rescan command immediately makes disks in the new shelf available as spares for the other RAID groups. See “Volume Expansion” on page 58 for details. Data Domain recommends replacing all failed disks in a restorer and in an existing shelf before adding a new shelf. # disk rescan 50 DD500 Series Restorer User Guide Add a First Shelf 3. The new disks are not yet part of a RAID group or part of the restorer volume. Use the disk add enclosure command to add the disks to the volume: # disk add enclosure 2 4. Use the disk show raid-info command to display the RAID groups. The shelf should show two disks with a State of spare. If two disks are labeled as unused and none are labeled spare, use the disk unfail command for each unused disk. For example, if the two disks are 2.15 and 2.16, use the following two commands: # disk unfail 2.15 # disk unfail 2.16 5. Shutdown the restorer. 6. Shut down the shelf. 7. Power-up the shelf and wait for the SAS state LEDs to go off. See Figure 24 for the SAS state LED locations on the back of the shelf. HOST SAS state LEDs (8) EXP’N Figure 24: SAS state LEDs on the disk controller module 8. Power-up the restorer. 9. Check the file system status: # filesys status The filesystem is enabled and running Chapter 4: ES20 Expansion Shelf 51 Add a Second Shelf Add a Second Shelf Physically install the second shelf by following the installation instructions received with the shelf. After installing the shelf and starting the restorer: 1. On the restorer, use the enclosure show summary command to verify that the shelf is recognized. 2. On the restorer, enter the disk rescan command to make the disks in the new shelf visible to other disk commands. If existing RAID groups need spare disks and have none of their own, the disk rescan command immediately makes disks in the new shelf available as spares. See “Volume Expansion” on page 58 for details. Data Domain recommends replacing all failed disks in a restorer and in an existing shelf before adding a new shelf. 3. The new disks are not yet part of a RAID group or part of the restorer volume. Use the disk add enclosure command to add the disks to the volume. # disk add enclosure 3 4. Use the disk show raid-info command to display the RAID groups. The shelf should show two disks with a State of spare. If two disks are labeled as unused and none are labeled spare, use the disk unfail command for each unused disk. For example, if the two disks are 2.15 and 2.16, use the following two commands: # disk unfail 2.15 # disk unfail 2.16 5. Shutdown the restorer. 6. Shut down the shelf. 7. Power-up the shelf and wait for the SAS state LEDs to go off. See Figure 24 on page 51 for the SAS state LED locations on the back of the shelf. 8. Power-up the restorer. 9. Check the file system status: # filesys status The filesystem is enabled and running 52 DD500 Series Restorer User Guide Disk Commands Disk Commands With DD OS 4.1.0.0 and later releases, all disk commands that take a disk-id variable must use the format enclosure-id.disk-id to identify a single disk. Both parts of the ID are a decimal number. A restorer with no shelves must also use the same format for disks on the restorer. A restorer always has the enclosure-id of 1 (one). For example, to check that disk 12 in a restorer (with or without shelves) is recognized by the DD OS and hardware, use the following command: # disk beacon 1.12 In DD OS releases previous to 4.1.0.0, output from disk commands listed individual disks with the word disk and a number. For example: # disk Disk -----disk1 disk2 show hardware Manufacturer/Model ------------------HDS725050KLA360 HDS725050KLA360 Firmware Serial No. -------- -------------K2A0A51A KRFS06RAG9VYGC K2AOA51A KRFS06RAG9TYYC Capacity --------465.76 GB 465.76 GB Output now shows the enclosure (Enc) number, a dot, and the disk (Slot) number: # disk show hardware Disk Manufacturer/Model (Enc.Slot) --------- ------------------1.1 HDS725050KLA360 1.2 HDS725050KLA360 Firmware Serial No. Capacity -------- -------------- -------K2AOA51A KRFS06RAG9VYGC 465.76 GB K2AOA51A KRFS06RAG9TYYC 465.76 GB Command output for a restorer that has one or more expansion shelves includes entries for all enclosures, disk slots, and RAID Groups. Note All restorer commands that display the use of disk space or the amount of data on disks compute and display amounts using base 2 calculations. For example, a command that displays 1 GB of disk space as used is reporting: 230 bytes = 1,073,741,824 bytes. 1 KB = 210 bytes = 1024 bytes 1 MB = 220 bytes = 1,048,576 bytes 1 GB = 230 bytes = 1,073,741,824 bytes 1 TB = 240 bytes = 1,099,511,627,776 bytes Look for New Disks, LUNs, and Expansion Shelves To check for new disks or LUNs with gateway systems or when adding an expansion shelf, use the disk rescan operation. Administrative users only. disk rescan Chapter 4: ES20 Expansion Shelf 53 Disk Commands Add an Expansion Shelf To add an expansion shelft, use the disk add enclosure command. The enclosure-id is always 2 for the first added shelf and 3 for the second. The restorer always has the enclosure-id of 1 (one). disk add enclosure enclosure-id For example, to add a first enclosure: # disk add enclosure 2 Display Disk Status The disk status operation displays the number of disks in use and failed, the number of spare disks available, and whether a RAID disk group reconstruction is underway. Note that the RAID portion of the display could show one or more disks as “failed” while the Operational portion of the display could show all drives as “operating normally.” A disk can be physically functional and available, but not currently in use by RAID, possibly because of operator intervention. disk status The display for a restorer with two expansion shelves is similar to the following. Note that the disks in a new expansion shelf recognized with the disk rescan command show a status of “unknown.” Use the disk add enclosure command to change the status to “in use.” # disk status Configuration: RAID: RAID: RAID: RAID: RAID: RAID: RAID: RAID: RAID: Operational: Performance: 54 47 drives present. 47 drives are "in use" 0 drives are undergoing "reconstruction" 0 drives are undergoing "resynch" 5 drives are "spare" 0 drives are "absent" 0 drives have "failed" 0 drives are "foreign" 0 drives are "unknown" 0 drives are "not in use" 47 drives operating normally.. Cumulative 114.954 MB/s, 7 % busy DD500 Series Restorer User Guide Shelf (enclosure) Commands Shelf (enclosure) Commands Use the restorer enclosure command to identify and display information about expansion shelves. List Enclosures To list known enclosures, model numbers, serial numbers, and capacity (number of disks in the enclosure), use the enclosure show summary command. The serial number displayed for an expansion shelf is actually the enclosure’s world-wide name (WWN). See Figure 25 for the WWN label’s physical location on the back panel of the shelf. enclosure show summary For example: # enclosure show summary Enclosure Model No. --------- --------------------1 Data Domain DD560 2 Data Domain ES20 3 Data Domain ES20 --------- --------------------3 enclosures present. Serial No. ----------------00:00:18:76:72:c8 50050CC100123456 50050CC100123457 ----------------- Capacity -------15 Slots 16 Slots 16 Slots -------- World-wide name label Figure 25: World-wide name location Chapter 4: ES20 Expansion Shelf 55 Shelf (enclosure) Commands Identify an Enclosure To check that the Data Domain OS and hardware recognize an enclosure, use the enclosure beacon operation. The operation causes the green (activity) LED on each disk in an enclosure to flash green. Use the (Control) c key sequence to turn off the operation. Administrative users only. enclosure beacon enclosure-id Display Fan Status To display the current status of fans in all enclosures or in a specific enclosure, use the enclosure show fans command: enclosure show fans [enclosure-id] To show the status of all fans for a restorer with one expansion shelf: # enclosure Enclosure --------1 2 --------- show fans Description ------------------Crossbar fan #1 Crossbar fan #2 Crossbar fan #3 Crossbar fan #4 Rear fan #1 Rear fan #2 Power module #1 fan Power module #2 fan ------------------- Level ------High High Medium Medium Medium Medium Low Low ------- Status -----OK OK OK OK OK OK OK OK ------ Enclosure starts with the restorer as enclosure 1 (one). Description for a shelf lists one fan for each power/cooling unit. Level is the fan speed and depends on the internal temperature and amount of cooling needed. Status is either OK or Failed. Display Component Temperatures To display the internal and CPU temperatures for a restorer and the internal temperature for expansion shelves, use the enclosure show temperature-sensors command. enclosure show temperature-sensors [enclosure-id] 56 DD500 Series Restorer User Guide Shelf (enclosure) Commands For example: # enclosure Enclosure --------1 2 --------- show temperature-sensors Description C/F Status --------------------Chassis 45/113 OK CPU 0 51/124 OK CPU 1 50/122 OK Internal 45/113 OK ---------------------- Display Port Connections To list the order of shelves connected to a restorer, use the enclosure show ports command. enclosure show ports For example: # enclosure show ports Port Connection Connected Type Enclosures ---- ---------- ------------1 SAS 2, 3 ---- ---------- ------------- Status -----online ------ Port refers to the SAS HBA expansion port on the restorer. Connected Enclosures shows each shelf by number that is recognized by the restorer. The order in which shelf numbers are shown is not important. Status can be either online or offline. Offline means that the connection between shelves and the restorer is not functional. Display All Hardware Status To display temperatures and the status of all fans and power supplies, use the enclosure show all command: enclosure show all [enclosure-id] Display Power Supply Status To display the status of power supplies in all enclosures or in a specific enclosure, use the enclosure show powersupply command: enclosure show powersupply [enclosure-id] Chapter 4: ES20 Expansion Shelf 57 Volume Expansion For example: # enclosure Enclosure --------1 2 --------- show powersupply Description --------------Power Module #1 Power Module #2 Power Module #3 Power Module #1 Power Module #2 --------------- Status -----OK OK OK OK OK ------ Volume Expansion Creating a RAID group on a new shelf automatically expands a restorer’s existing volume. In most cases, creating a RAID group is simple: run the following command on the restorer with an enclosure-id of 2 for the first shelf or 3 for the second shelf. disk add enclosure enclosure-id The unusual case is when the restorer or a previously installed shelf or both need spare disks and have none available. Disks from the new shelf are automatically allocated after a disk rescan command makes the disks visible to the RAID processes. If three disks are allocated from the new shelf to existing RAID groups, a RAID group cannot be created on the new shelf and the disk add enclosure command fails. The procedure below allows a recovery from such a situation. Note The most efficient strategy is to replace all failed disks in existing enclosures before adding a new shelf. To create a RAID group on a new shelf that has lost three or more disks to existing RAID groups: 1. Use the disk show raid-info command to identify which RAID group is using disks in the new shelf. Also note which disk(s) a RAID group is using 2. In the enclosure for the RAID group that is using one or more disks in the new shelf, replace the bad disks that created the need for a spare outside of the enclosure. 3. In the new shelf, fail a disk used by the enclosure that now has a replacement spare disk. The RAID group should immediately start to rebuild using the new spare in its own enclosure. After the rebuild, fail other disks in the new shelf as needed to move data to other replacement spares in other enclosures. 4. Unfail the disk or disks in the new shelf that were used by the other RAID group(s). 5. Run disk add enclosure for the new shelf. 58 DD500 Series Restorer User Guide Gateway Restorers 5 Gateway restorers store data in and restore data from outside mounted disk arrays through Fibre Channel connections. Currently, the gateway restorers support the following types of connectivity: • Fibre Channel direct-attached connectivity to a storage array using a 1 or 2 Gb/sec Fibre Channel interface. The FC-AL loop mode is required. • Fibre Channel SAN-attached connectivity to a storage array using a 1 or 2 Gb/sec Fibre Channel interface. See the Gateway Compatibility Matrix on the Data Domain Support web site for the latest updates of certified storage arrays, storage firmware, and SAN topology. A gateway system has the same chassis and CPUs as a DD460 or DD560 restorer, but no disks. Other points to be aware of with a gateway system are: • The system supports a single volume with a single data collection. A data collection is all the files stored in a single restorer. • When using a SAN-attached gateway restorer, the SAN must be zoned before the restorer is booted. • The storage array can have single or multiple controllers and each controller can have multiple ports. • A single storage controller port is needed for direct connect to the gateway. Multiple storage controller ports (with different LUNs) can be used for a SAN attached gateway. Port and controller failover on the storage array must be disabled. • The storage array port used for gateway connectivity cannot be shared with other SAN-connected hosts that access the array. • Multiple gateway systems can access storage on a single storage array. • The outside physical disks that provide storage to the gateway should be dedicated to the gateway an not shared with other hosts. • Outside storage is configured into one or more LUNs that are exported to the gateway. • All LUNs presented to the gateway are used automatically when the gateway is booted. Use the restorer commands disk rescan and disk add to see newly added LUNs. 59 60 • A volume may use any of the disk types supported on the disk array. However, only one disk type can be used for all LUNs in the volume to assure equal performance for all LUNs. • All disks in the LUNs must be like drives in identical RAID configurations. • Multiple storage array RAID configurations can be used; however, you should select RAID configurations that provide the fastest possible sequential data access for the type of disks used. • A gateway restorer supports one volume composed of 1 to 16 LUNs. LUN numbers must start at 0 (zero) and be contiguous. • The total amount of storage in a volume can be no more than 17.3 TB/15.8 TiB for the DD560g and 4.2 TiB for the DD460g. A smaller volume can be expanded by adding additional LUNs. • LUNs should be provisioned across the maximum number of spindles available. Vendorspecific provisioning best practices should be used and, if available, vendor-specific tools should be used to create a virtual- or meta-LUN that spans multiple LUNs. If virtual- or meta-LUNs are used, they must follow the configuration parameters defined in this chapter. • For replication between a gateway restorer and other model Data Domain restorers, the total amount of storage on the originator must not exceed the total amount of storage on the destination. • Replication between gateway restorers must use storage arrays with similar performance characteristics. The size of destination storage must be equal to or greater than the size of source storage. Configurations do not need to be identical. • Power supplies are the only hardware in a gateway restorer that a customer would replace. • A restorer does not support temporary Fibre Channel disconnection while the restorer is active. Removing the fiber cable that connects the restorer and the storage array can lead to unrecoverable errors at any time that the restorer has I/O activity. Data Domain recommends shutting down the restorer before removing the cable. • A restorer does not support Fibre Channel multipathing (also known as failover) Be sure that the storage array is not configured as if multipathing is enabled. • The maximum data size for a LUN that a gateway restorer can access is 2 TiB. • The minimum data size for a LUN that a gateway restorer can access is 400 GiB. To use the maximum amount of space on a restorer, create multiple LUNs and adjust the LUN sizes so that the smallest is at least 400 GiB. • The maximum total size of all LUNs accessed by a DD460g restorer is 4.2 TiB. The maximum for a DD560g is 15.3 TiB. A smaller volume can be expanded by adding LUNs. Restorer Operating System User Guide Command Changes • A Fibre Channel host bus adapter card (QLogic 2 gigabit class) in the restorer communicates with the outside disk array. See Figure 26 for a schematic of the peripheral cards in a gateway restorer. Back panel Restorer front panel Figure 26: Peripheral card slots Command Changes The following disk commands are not valid for a gateway restorer using outside storage. All other commands in the Data Domain command set are available. disk disk disk disk disk beacon fail unfail show failure-history show reliability-data The following additional commands are available only with the gateway restorer. See “Procedure: Adding a LUN” on page 67 for details about using the commands. disk add disk-id Expand the outside storage seen by the restorer to include a new LUN. disk rescan Search outside storage for new or removed LUNs. Chapter 5: Gateway Restorers 61 Command Changes The following disk commands report activity and information only at the LUN level, not for individual disks in a LUN. Each disk entry represents a LUN in output from the following commands. • disk show raid-info The following example shows two LUNs available to the restorer. After the drives are “in use” line, the remainder of the drives lines are not valid. system12# disk show raid-info Disk State Additional Status -------------------------------disk1 in use (dg0) disk2 in use (dg0) -------------------------------2 drives are "in use" 0 drives have "failed" 0 drives are "hot spare(s)" 0 drives are undergoing "reconstruction" 0 drives are undergoing "resynch" 0 drives are "not in use" 0 drives are "missing/absent" • disk show performance Displays information similar to the following for each LUN. system12# disk show performance Disk Read Write Cumul. sects/s sects/s MBytes/s -----------------------disk1 46 109 0.075 disk2 0 0 0.000 -----------------------Cumulative 0.075 MB/s, 7 % busy • Busy ---14 % 0 % ---- disk show detailed-raid-info Displays information similar to the following for each LUN: system12# disk show detailed-raid-info Disk Group (dg0) - Status: normal Raid Group (ext3):(raid-0)(61.01 GB) - Status: normal Raid Group (ext3_1):(raid-100)(68.64 GB) - Status: normal Slot Disk State Additional Status ----------------------------------1 disk1 in use (dg0) ----------------------------------- 62 Restorer Operating System User Guide Command Changes Raid Group (ppart):(raid-0)(3.04 TB) - Status: normal Raid Group (ppart_1):(raid-100)(3.04 TB) - Status: normal Slot Disk State Additional Status ----------------------------------1 disk1 in use (dg0) 2 disk2 in use (dg0) ----------------------------------Spare Disks None Unused Disks None • disk show hardware Displays information similar to the following for each LUN. - LUN is the LUN number used by the outside storage system. - Port WWN is the world-wide number of the port on the outside storage system through which data is sent to the restorer. - Manufacturer/Model includes a label that identifies the manufacturer. The display may include a model ID or RAID type or other information depending on the vendor string sent by the outside storage system. - Firmware is the firmware level used by the outside storage controller. - Serial No. is the serial number of the outside storage system. - Capacity is the amount of data in a volume sent to the restorer. system12# disk show hardware Disk LUN Port WWN ----------------------------disk1 0 50:06:01:60:30:20:e2:12 disk2 4 50:06:01:60:30:20:e2:12 ----------------------------Firmware Serial No. --------------------0216 APM00045001866 0216 APM00045001866 --------------------2 drives present. Chapter 5: Gateway Restorers Manufacturer/Model -----------------DGC RAID 3 DGC RAID 3 ------------------ Capacity -------1.56 TB 1.56 TB -------- 63 Installation • disk status Displays information similar to the following. After drives are “in use”, the remainder of the drives lines are not valid. system12# disk Configuration: RAID: RAID: RAID: RAID: RAID: RAID: RAID: Performance: status 2 drives present. 2 drives are "in use" 0 drives have "failed" 0 drives are "hot spare(s)" 0 drives are undergoing "reconstruction" 0 drives are undergoing "resynch" 0 drives are "not in use" 0 drives are "missing/absent" Cumulative 0.075 MB/s, 7 % busy Installation A restorer using outside storage must first connect with the outside storage and then configure the use of the storage. 1. For hardware setup (setting up the restorer chassis), see “Restorer Installation” on page 32. 2. On the outside disk array system, create the LUNs for use by the restorer. 3. On the outside disk array system, configure LUN masking so that the restorer can see only those LUNs that should be available to the restorer. The restorer writes to every LUN that is available. 4. Connect the Fiber Channel cable from the Fiber-Channel Arbitrated Loop (FC-AL) to the Fiber Channel HBA card ports on the back of the restorer. The cable and the outside storage must also be connected to the FC-AL. 5. Connect a serial terminal to the restorer. A VGA console does not display the menu mentioned in the next step of this procedure. 64 Restorer Operating System User Guide Installation 6. Press the Power button on the front of the restorer. During the initial system start, the restorer does not know of the available LUNs. The following menu appears with the Do a New Install entry selected: New Install 1. Do a New Install 2. Show Configuration 3. Reboot 7. Check that the LUNs available from the connected array system are correct. Use the down-arrow key, select Show Configuration, and press Enter. The configuration menu appears with Show Storage Information selected: System Configuration (Before Installation) 1. 2. 3. 4. 5. Show Storage Information Show Head Information Go to Previous Menu Go to Rescue Menu Reboot 8. Press Enter to display storage information. Each LUN that is available from the array system appears as a one line entry in the List of SCSI Disks/LUNs. The Valid RAID DiskGroup UUID List section shows no disk groups until after installation. Use the arrow keys to move up and down in the display. Storage Details Software Version: 3.1.0.0-19112 Valid RAID DiskGroup UUID List: ID DiskGroup UUID Last Attached Serialno ------------------------------------------------- No diskgroup uuids were found -List of SCSI Disks/LUNs: (Press ctrl+m for disk size information) ID UUID tgt lun loop wwpn comments --------------------------------------------------------------1 No UUID 0 0 0 500601603020e212 2 No UUID 0 4 0 500601603020e212 Number of Flash disks: 1 ---------------------------------------Errors Encountered: ----------------------------------------- No errors to report Chapter 5: Gateway Restorers 65 Troubleshooting 9. Press Enter to return to the New Install menu. 10. Use the up-arrow key to select Do a New Install. 11. Press Enter to start the installation. The system automatically configures the use of all LUNs available from the array. 12. Press Enter to accept the Yes selection in the New Install? Are you sure? display. No other user input is required. A number of displays appear during the reboot. Each one automatically times-out with the displayed information and the reboot continues. 13. When the reboot completes, the login prompt appears. Login and configure the restorer as explained in the Installation chapter of this manual beginning with step 2 on page 39. Troubleshooting Problems during installation or loss of access to a configured LUN causes the following menu to appear. Use the arrow keys to navigate the menu and press Enter to display the next level of information. System Misconfigured (The system has 0 disks/LUNs!) 1. 2. 3. 4. 5. 6. • 66 Show Storage Information Show Head Information Show Head Swap Menu Show New Install Menu Go to Rescue Menu Reboot Show Storage Information displays the LUNs that are currently available to the restorer. If the Comments column of the List of SCSI Disks/LUNs section includes an Incomplete, one or more LUNs configured for the restorer is not available. Restorer Operating System User Guide Procedure: Adding a LUN • Show Head Information displays informative error messages in the Errors Encountered section. For example, the version number of the software on the restorer is also stored in a file on the outside storage. If the version number on the restorer does not match the version number stored on outside storage, an error message appears. Head Details Software Version: 4.0.0.0-26902 Model Type: DD500G Serial Number xxxx Has Flash: YES Previously Saved RAID DiskGroup UUID List: ID DiskGroup UUID --------------------------------------------1 1302c2433dec8025 --------------------------------------------Errors Encountered: ----------------------------------------------Version numbers do not match • Go to Rescue Menu allows you to display the system log. Rescue Options 1. View Log 2. Go to Previous Menu 3. Reboot Procedure: Adding a LUN After installing a gateway restorer to use LUNs on outside storage, you can expand the volume by adding LUNs (all LUNs are seen as a single volume by the restorer). Caution Once a LUN is added to the volume used by the restorer, you cannot remove the LUN. The only way to reduce the volume size is to re-install the restorer operating system and reconfigure the restorer. If a LUN used by a restorer is removed from the outside storage, the restorer file system is immediately compromised and returns an error condition. 1. On the outside storage, create the new LUN. Make sure that masking for the new LUN allows the restorer to see the LUN. Chapter 5: Gateway Restorers 67 Procedure: Adding a LUN 2. On the restorer, enter the disk rescan command to find the new LUN. # disk rescan NEW: Host: scsi0 Channel: 00 Id: 00 Lun: 03 Vendor: NEXSAN Model: ATAbea(C0A80B0C) Rev: 8035 Type: Direct-Access ANSI SCSI revision: 04 1 new device(s) found. The disk show raid-info command then shows all of the previously configured LUNs (as disk1, disk2, and so on) and the new LUN as not in use - foreign. Also, the new LUN is referenced in the line 1 drive is “not in use”. # disk show raid-info Disk State Additional Status ---------------------------------------disk1 in use (dg0) disk2 in use (dg0) disk3 not in use - foreign ---------------------------------------2 drives are "in use" 0 drives have "failed" 0 drives are "hot spare(s)" 0 drives are undergoing "reconstruction" 0 drives are undergoing "resynch" 1 drive is "not in use" 0 drives are "missing/absent" Note At this point, the new LUN can be removed from outside storage with no damage to the restorer file system. The disk rescan command then shows the LUN as removed. After using the disk add command (the next step), you cannot safely remove the LUN. 3. Use the disk add disk-id command to add the new LUN to the restorer volume. The disk-id is given in the output from the disk show raid-info command. # disk add disk3 The 'disk add' command adds a disk to the filesystem. Once the disk is added, it cannot be removed from the filesystem without re-installing the restorer. Are you sure? (yes|no|?) [no]: yes Output from the disk show raid-info command should now show the new disk (LUN) as in use. Output from the filesys show space command should include the new space in the Data section. 68 Restorer Operating System User Guide Virtual Tape Library (VTL) 6 The Data Domain VTL feature allows backup applications to connect to and manage a restorer as if the restorer is a stand-alone tape library. All of the functionality supported with tape is available with a restorer. Also, as with a physical stand-alone tape library, the movement of data from a restorer VTL to a physical tape must be managed by backup software, not by the restorer. Virtual tape drives are accessible to backup software in the same fashion as physical tape devices. Devices appear to backup software as SCSI tape drives. A virtual tape library appears to software as a SCSI robotic device accessed through standard driver interfaces. The VTL feature: • Communicates between a backup server and a restorer through a Fibre Channel interface. The restorer must have a Fibre Channel interface card in the PCI card array. • Is compatible with all Data Domain DD400 and DD500 series restorers. • Supports the tape drive model IBM LTO-1. • Supports the tape library personalities StorageTek L180 and RESTORER-L180. Data Domain recommends using RESTORER-L180 with NetBackup. Note Use tape and library drivers that are supplied by your backup software vendor and that support the IBM LTO-1 drive and StorageTek L180 library. The RESTORER-L180 works with the same drivers as the StorageTek L180. • Allows 16 virtual tape drive instances to be active concurrently. • Supports 8 tape library instances.Access to VTLs and tape drives can be managed with the LUN masking feature. See “LUN Masking (for VTL Only)” on page 82. • Supports up to 100,000 tapes (cartridges) of up to 800 GB for an individual tape. • Includes a pool feature for replication of tapes by defined pools. See “Pools” on page 86 and the VTL command output examples in this chapter. See “VTL Pools Replication” on page 201 for replication details. • Includes internal restorer data structures for each virtual data cartridge. The structures have a fixed amount of space that is optimized for records of 16KB or larger. Smaller records use the space at the same rate per record as larger records, leading to a virtual cartridge marked as full when the amount of data is less than the defined size of the cartridge. 69 Compatibility Matrix • Supports replication between Data Domain restorers. A source restorer exports received virtual tapes (each tape is seen as a file) into a virtual vault and leaves the tapes in the vault. On the destination, each tape (file) is always in a virtual vault. • Does not protect virtual tapes from a restorer filesys destroy command. The command deletes all virtual tapes. • Handles data received by a restorer during a power loss so that backup software sees the data in the same way as with tape drives in a power loss situation. The strategy your backup software uses to protect data during a loss of power to tape drives gives the same results with a loss of power to a Data Domain restorer. • Responds to the mtx status command from an outside system in the same way as would a tape library. If the restorer virtual library has registered any change since the last contact from the outside system, the first use of the mtx status command returns incorrect results. Use the command a second time for valid results. • Supports simultaneous use of tape library and file system (NFS/CIFS) interfaces. • VTL is a licensed feature for a Data Domain restorer. Contact your Data Domain representative for licensing details. Compatibility Matrix For specific backup software and hardware configurations tested and supported by Data Domain, see the VTL Certification Summary matrix. Find the matrix at: https://support.datadomain.com/compat_matrix.php Data Domain VTL with a SAN Data Domain recommends single initiator zoning when using the VTL feature in a SAN (storage area network) environment to simplify management and avoid possible host configuration issues. Single initiator zoning puts the Data Domain VTL HBA (host bus adapter) card and a single initiator, such as a backup server host, in a single zone. To allow additional hosts access to restorer VTL devices, use LUN masking and define a new zone for each unique initiator and VTL HBA pair. For example, for backup serverA and backup serverB to access a restorer HBA in a SAN environment, define two zones, one for each server, and create one LUN mask for each server. For LUN masking details, see “LUN Masking (for VTL Only)” on page 82. 70 DD500 Series Restorer User Guide Enable VTLs Enable VTLs To start the VTL process and enable all libraries and drives, use the vtl enable option. vtl enable Disable VTLs To disable all VTL libraries and drives and shutdown the VTL process, use the vtl disable option. vtl disable Create a VTL To create a virtual tape library, use the vtl add operation. The VTL process must be enabled (use the vtl enable command) to create a library. Administrative users only. vtl add vtl_name model model [drives num_drives] [slots num_slots] If incorrect values are entered for any of the command variables, a list of valid values is displayed. • vtl_name A name of your choice. • model Is a tape library model name. The current supported model names are L180 and RESTORER-L180. Data Domain recommends using RESTORER-L180 with NetBackup. • num_drives The number of tape drives in the library. The maximum number of drives for all VTLs on a restorer is 48 minus one for each VTL. A restorer with three VTLs could have a maximum of 45 drives. The default is four drives. • num_slots The number of slots in the library. The number of slots must be equal to or greater than the number of drives. The maximum number of slots for all VTLs on a restorer is 10000. The default is 20 slots. For example, to create a VTL with 5 drives and 25 slots: # vtl add VTL1 model L180 drives 5 slots 25 Chapter 6: Virtual Tape Library (VTL) 71 Create New Tapes Create New Tapes To create new tapes, use the vtl tape add option. All new tapes go into the virtual vault. Note On a destination restorer, manually creating a tape is not permitted. vtl tape add barcode [capacity capacity][count count] [pool pool] • barcode The barcode must begin with six upper-case alpha-numeric characters. Of the six characters, the number of numeric characters reading from the right determines the total possible number of tapes that can be created (the number given for count). The last characters in the barcode are a two-character tag of L1, LA, LB, or LC. L1 represents a tape of 100 GB capacity; LA represents a tape of 50 GB capacity; LB represents a tape of 30 GB capacity; LC represents a tape of 10 GB capacity. For example, a barcode of ABC000L1 creates tapes of 100 GB capacity and can accept a count of up to 1,000 tapes (from 000 to 999). A bar code of AB0000LA creates tapes of 50 GB capacity and can accept a count of up to 100,000 tapes. The numeric characters from the right also set the number for the first tape created. For example, a barcode of ABC100L1 starts numbering the tapes at 100. Data Domain recommends only creating tapes with unique bar codes. Duplicate bar codes in the same tape pool create an error. Although no error is created for duplicate bar codes in different pools, duplicate bar codes may cause unpredictable behavior in backup applications and can lead to operator confusion. • capacity The number of gigabytes of size for each tape (overrides the barcode capacity designation). The upper limit is 800. For the efficient reuse of restorer disk space after data is obsolete, Data Domain recommends setting capacity to 100 or less. • count The number of tapes to create. The default is 1 (one). • pool Put the tapes into a pool. The pool is Default if none is given. A named pool must already exist to use this option. Use the vtl pool add command to create a pool. For example, to create 5 tapes starting with a barcode of TST010L1: # vtl tape add TST010L1 count 5 72 DD500 Series Restorer User Guide Import Tapes Import Tapes To move existing tapes from the vault to a library, use the vtl import option. If a tape is in a pool, you must use the pool option to identify the tape. You can import only as many tapes as the VTL has available slots. Use the vtl tape show vtl-name command to display the currently in-use slots. Use the vtl tape show vault command to display barcodes for all tapes in the vault. Use backup software commands from the backup server to move library tapes into virtual drives. Also, when a tape is in a library, you cannot manually insert the tape into a drive with the vtl tape insert command. vtl import vtl_name barcode barcode [pool pool] [count count] For example, to import 5 tapes starting with a barcode of TST010L1 into the library VTL1: # vtl import VTL1 barcode TST010L1 count 5 Export Tapes Remove tapes from a VTL. Use the vtl tape show vtl-name command to match slots and barcodes. The removed tapes revert to the vault. vtl export vtl_name slot slot [count count] For example, to export 5 tapes starting from slot 11 from the library VTL1: # vtl export VTL1 slot 11 count 5 Remove Tapes To remove one or more tapes from the vault and delete all of the data in the tapes, use the vtl tape del option. The tapes must be in the vault, not in a VTL. Use the vtl tape show vault command to display barcodes. If count is used, remove that number of tapes in sequence starting at barcode. • If a tape is in a pool, you must use the pool option to identify the tape. • If count is used, remove that number of tapes in sequence starting at barcode. • After a tape is removed, the physical disk space used for the tape is not reclaimed until after a file system clean operation. Note On a destination restorer, manually removing a tape is not permitted. vtl tape del barcode [pool pool] [count count] Chapter 6: Virtual Tape Library (VTL) 73 Insert a Tape For example, to remove 5 tapes starting with a barcode of TST010L1: # vtl tape del TST010L1 count 5 Insert a Tape To directly insert a tape into a drive without media changer intervention, use the vtl tape insert option. The option is useful for disaster recovery as configuration information for the media changer must be recovered from tape. Use the vtl tape show vtl-name command to display which drives are available. Drives that already have tapes inserted appear as the first lines in the vtl tape show vtl-name output. • The tape must already exist in the virtual vault and must not be in any drive. • If a tape is already imported into a VTL, the operation fails. • If a tape is in a pool, you must use the pool option to identify the tape. vtl tape insert vtl_name drive drive barcode barcode [pool pool] Eject a Tape To directly remove a tape from a drive without media changer intervention, use the vtl tape eject option. Use the vtl tape show vtl-name command to display which drives are in use. Drives with tapes inserted appear as the first lines in the vtl tape show vtl-name output. A tape that is in a library (and in the drive through backup software commands) cannot be ejected with this command. An ejected tape goes directly into the virtual vault. vtl tape eject vtl_name drive drive For example, to manually eject a tape, the following commands display drives in use for libr01, then eject a tape from a drive: # vtl tape show libr01 Barcode Location -------- -------------ABC100L1 libr01 drive 1 Type ----LTO-1 Size ... ---- ... 100.0 GB # vtl tape eject libr01 drive 1 74 DD500 Series Restorer User Guide Delete a VTL Delete a VTL To remove a previously created virtual tape library, use the vtl del option. If the library name is not valid, a list of valid library names is displayed. vtl del vtl_name Set a Private-Loop Hard Address Some backup software requires all private-loop targets to have a hard address (loop ID) that does not conflict with another node. Use the vtl option set loop-id command to set a hard address for a restorer. The range for value is 0 - 125. For a new value to take effect, disable and enable VTL or reboot the restorer. vtl option set loop-id value For example, to set a value of 5 and have the value take effect: # vtl option set loop-id 5 # vtl disable # vtl enable Reset a Private-Loop Hard Address To reset the private-loop hard address to the restorer default of 1 (One), use the vtl option reset loop-id command. vtl option reset loop-id Display the Private-Loop Hard Address Setting To display the most recent setting of the loop ID value (which may or may not be the current in-use value), use the vtl option show loop-id command. vtl option show loop-id Chapter 6: Virtual Tape Library (VTL) 75 Display VTL Status Display VTL Status To display the status of the VTL process, use the vtl status option. vtl status The display is similar to the following: # vtl status VTL admin_state: enabled, process_state: running VTL admin_state Can be enabled or disabled. process_state Can be: - running The system is enabled and active. - starting The vtl enable command is bringing up the VTL process. - stopping The vtl disable command is shutting down the VTL process. - stopped The VTL process is disabled. - timing out The VTL process crashed and is attempting an automatic restart. - stuck After a number of VTL process automatic restarts failed, the process was not able to shut down normally and attempts to kill the process failed. Display VTL Configurations To display configuration details for all or a single virtual tape library, use the vtl show config option. vtl show config [vtl_name] The display is similar to the following: # vtl show config Library Name Library Model -----------------------VTL1 10001 ------------------------ 76 Drive Model ----------1 ----------- Slots ----120 ----- Drives -----4 ------ DD500 Series Restorer User Guide Display All Tapes Display All Tapes To display information about all tapes created on a restorer, use the vtl tape show all option. The Size and Used columns show the amount of data sent to the tape by the backup client, not the amount of actual disk space used by compressed data. vtl tape show all The display is similar to the following: # vtl tape show all ... processed 6 tapes... Barcode Pool Location -------- ------- -------A00000L1 Default VTL1 A00001L1 Default VTL1 A00002L1 Default vault A00003L1 Default VTL1 A00004L1 Default VTL1 A00005L1 Default vault Type ----LTO-1 LTO-1 LTO-1 LTO-1 LTO-1 LTO-1 Size -------100.0 GB 100.0 GB 100.0 GB 100.0 GB 100.0 GB 100.0 GB Used Compression -------- ----------100.0 GB 10x 100.0 GB 10x 0.0 GB 0x 0.0 GB 0x 0.0 GB 0x 0.0 GB 0x - The Pool column displays which pool holds the tape. The Default pool holds all tapes that are not assigned to a user-created pool. - The Location column displays whether tapes are in a user-created library or in the virtual vault. - The Size column displays the configured data capacity of the tape. - The Used column displays the amount of data sent to the tape (before compression). - The Compression column displays the amount of compression done to the data on a tape. Display a Summary of All Tapes To display a summary of all tapes on a restorer, use the vtl tape show summary option. vtl tape show summary The display for the summary option gives the following types of information with values appropriate for your system: # vtl tape show summary ... processed 6 tapes... VTL Tape Summary ---------------Total number of tapes: Total pools: Chapter 6: Virtual Tape Library (VTL) 6 1 77 Display Tapes by VTL Total size of tapes: 600.0 GB Total space used by tapes: 200.0 GB Average Compression: 15.0x - Total number of tapes is the number of tapes configured on the restorer. - Total pools is the number of default and user-defined tape pools. A restorer always has one default tape pool. - Total size of tapes is the total capacity of all configured tapes. - Total space used by tapes is the amount of data sent to all tapes (before compression). - Average compression is the average of the compression value for all tapes that hold data. If data is stored elsewhere on the restorer and then identical data is stored on tapes, the tape compression value can be very high as the data on the virtual tapes takes up no new disk space. Display Tapes by VTL To display information about all tapes in a VTL, use the vtl tape show vtl_name option. vtl tape show vtl_name The display for the vtl-name option includes a slot number in the Location column. The Size and Used columns show the amount of data sent to the tape by the backup client, not the amount of actual disk space used by compressed data. # vtl tape show VTL1 ... processed 6 tapes... Barcode Pool Location -------- ------- -----------A00000L1 Default VTL1 drive 1 A00004L1 Default VTL1 drive 2 A00001L1 Default VTL1 slot 2 A00003L1 Default VTL1 slot 3 78 Type ----LTO-1 LTO-1 LTO-1 LTO-1 Size -------100.0 GB 100.0 GB 100.0 GB 100.0 GB Used Compression -------- ----------100.0 GB 20x 0.0 GB 0x 100.0 GB 10x 0.0 GB 0x - The Pool column displays which pool holds the tape. The Default pool holds all tapes that are not assigned to a user-created pool. - The Location column displays whether tapes are in a drive or a library slot. A tape is inserted into a drive either by backup software or manually with the vtl tape insert command. Tapes in a drive are moved to the beginning of the command output. - The Size column displays the configured data capacity of the tape. - The Used column displays the amount of data sent to the tape (before compression). - The Compression column displays the amount of compression done to the data on a tape. DD500 Series Restorer User Guide Display All Tapes in the Vault Display All Tapes in the Vault To display all tapes that are in the virtual vault, use the vtl tape show vault option. vtl tape show vault In the following example, only two tapes of the six used in previous examples are still in the vault: # vtl tape show vault Barcode Pool Location -------- ------- -------A00002L1 Default vault A00005L1 Default vault Type ----LTO-1 LTO-1 Size Used Compression -------- -------- ----------100.0 GB 0.0 GB 0x 100.0 GB 0.0 GB 0x - The Pool column displays which pool holds the tape. The Default pool holds all tapes that are not assigned to a user-created pool. - The Location column displays whether tapes are in a user-created library or in the virtual vault. - The Size column displays the configured data capacity of the tape. - The Used column displays the amount of data sent to the tape (before compression). - The Compression column displays the amount of compression done to the data on a tape. Display Tapes by Pools To display information about tapes in pools, use the vtl tape show pool name option. vtl tape show pool name The display is similar to the following: # vtl tape show pool pl22 ... processed 4 tapes... Barcode Pool Location -------- ------- -------A00000L1 pl22 VTL1 A00004L1 pl22 VTL1 A00001L1 pl22 VTL1 A00003L1 pl22 VTL1 Type ----LTO-1 LTO-1 LTO-1 LTO-1 Size -------100.0 GB 100.0 GB 100.0 GB 100.0 GB Used Compression -------- ----------100.0 GB 20x 0.0 GB 0x 100.0 GB 10x 0.0 GB 0x - The Pool column displays which pool holds the tape. - The Location column displays whether tapes are in a drive or a library slot. A tape is inserted into a drive either by backup software or manually with the vtl tape insert command. Tapes in a drive are moved to the beginning of the command output. - The Size column displays the configured data capacity of the tape. Chapter 6: Virtual Tape Library (VTL) 79 Display VTL Statistics - The Used column displays the amount of data sent to the tape (before compression). - The Compression column displays the amount of compression done to the data on a tape. Display VTL Statistics To display statistics for all or a single virtual tape library, use the vtl show stats option. The statistics are updated every two seconds. Use the <Ctrl> c key combination to stop the command. The vtl_name variable is case sensitive. vtl show stats vtl_name The display is similar to the following: # vtl show stats VTL1 Read KB/s Write KB/s --------- ---------80 40 79 42 80 41 Procedure: Retrieve a Replicated Tape from a Destination Replicating tapes from a source to a destination requires a replication license on the both the source and destination restorers. Visualize the retrieving of a replicated tape from a destination restorer as physically removing the tape from the source restorer VTL and moving the tape to the destination restorer VTL. One tape physically cannot be in two places at the same time from the point of view of backup software. Backup application behavior for handling replicated tapes varies. To minimize unexpected behavior or error conditions, virtual tapes should remain imported in the destination libraries only for as long as needed. After importing a replicated tape at the destination, follow your backup application’s procedures to utilize the replicated tape and then export the tape from the destination library. The objective is to ensure that at any time, only one instance of a replicated tape is visible to the backup application. The following generic procedure allows you to configure a VTL for replication and retrieve data from a virtual tape that was replicated to a destination restorer. See “VTL Pools Replication” on page 201 for further replication detail and consult your backup application documentation for specific backup procedures. 1. On the source restorer, create the VTL and tapes. Use the vtl add command. 2. Perform and verify one or more backups to the source restorer. 80 DD500 Series Restorer User Guide Procedure: Retrieve a Replicated Tape from a Destination 3. Configure replication for the pool to be replicated (for example: /backup/vtc/Default or /backup/vtc/pool-name) using the replication add command. 4. Verify that any tapes targeted for replication from the destination reside in the vault and not in a library. Use the vtl tape show command. 5. Initialize replication for the targeted pool using the replication initialize command. Wait for initialization to complete. 6. As required, perform additional backups to the source. Wait for outstanding backups to complete. 7. Identify the tapes that you need to retrieve from the destination restorer and have the list available at the destination location. 8. On the source, enter the command replication sync for the target pool to ensure that the source tape and destination tape are consistent. Wait for the command to complete. 9. If the replicated tapes to be retrieved at the destination are still accessible at the source, export the tapes from the source restorer and, using the backup application, inventory the source VTL. 10. On the destination, create a VTL if one does not already exist. Use the vtl add command. The destination VTL configuration does not have to match the library on the source restorer. 11. Import the tape or tapes to the library using the vtl import command. The replicated tapes should now reside in the destination VTL. From the backup application, inventory the destination VTL. For some configurations or backup application versions, you may need to import the catalog (the backup application database) to use replicated tapes. 12. Read the tapes from the destination restorer VTL in the same way that you would read tapes from a library on the source and perform required backup application operations such as cloning to physical tape. 13. After using the replicated tapes, export the tapes from the destination using the vtl export command. 14. If necessary, import the replicated tapes from the source restorer using the vtl import command. The replicated tapes should now reside in the source restorer VTL. 15. From the backup application, inventory the destination VTL. Chapter 6: Virtual Tape Library (VTL) 81 LUN Masking (for VTL Only) LUN Masking (for VTL Only) The Data Domain VTL LUN masking feature allows clients to access only selected LUNs (devices, which are media changers or virtual tape drives) on a restorer. • All restorer clients are automatically in a VTL access pool named default and can access all VTL devices. • A client that is set up for LUN masking is no longer in the default pool and can access only devices masked for the client. • Clients that are not set up for LUN masking are still in the default pool and can access all devices that are not part of another client’s LUN mask. To use LUN masking: • Create a VTL on the restorer. See “Create a VTL” on page 71. • Enable the VTL with the vtl enable command. • Map a client as a LUN masking initiator (see below). • Create a LUN mask. See the commands in this section and “Procedure: Create a LUN Mask” on page 85. Note Avoid making LUN masking changes on a restorer during active backup or restore jobs. A change may cause an active job to fail. The impact of changes during active jobs depends on a combination of backup software and host configurations. The vtl initiator Command An initiator is any restorer client. Before adding a LUN mask for a client, create an initiator name to map to the client’s world-wide port name (WWPN). 82 • Adding a client as an initiator removes the client from the default access pool. Deleting the initiator mapping from a client returns the client to the default pool. • After mapping a client as an initiator and before adding a LUN mask for the client, the client cannot access any data on the restorer. • After adding a LUN mask for the initiator/client, the client can access only the devices in the LUN mask. A client can have LUN masks for multiple devices. • A maximum of 128 initiators can be configured. DD500 Series Restorer User Guide LUN Masking (for VTL Only) Add an Initiator Use the vtl initiator add command to give a client an initiator name on a restorer. vtl initiator add initiator-name wwpn wwpn • The initiator-name is a name that you create for LUN masking. The name can have up to 256 characters. Data Domain suggests using a simple, meaningful name. • The wwpn is the world-wide port name of the Fibre Channel port on the client system. Use the vtl initiator show command on the restorer to list the restorer’s known clients and WWPNs. • The wwpn must use colons ( : ). For example: # vtl initiator add client22 wwpn 21:00:00:e0:8c:11:33:04 Delete an Initiator Use the vtl initiator del command to delete a client initiator mapping from the restorer. The client returns to the default access pool. All LUN masks for the initiator must be deleted before deleting the initiator. vtl initiator del initiator-name For example: # vtl initiator del client22 Display Initiators Use the vtl initiator show command to list one or all named initiators and their WWPNs. vtl initiator show [initiator-name] For example: # vtl initiator show Initiator WWPN ------------------------------Default 00:00:00:00:00:00:00:00 client22 21:00:00:e0:8c:11:33:04 ------------------------------- Chapter 6: Virtual Tape Library (VTL) 83 LUN Masking (for VTL Only) The vtl lunmask Command When setting up LUN masks on a restorer: • Each restorer device can have a maximum of 1 LUN mask. A device is a media changer or a virtual tape drive. • Each initiator can have multiple LUN masks. Add a LUN Mask Use the vtl lunmask add command to create a LUN mask. Each instance of the command can create a mask for one device. To mask multiple devices for a single initiator, use the command once for each device. vtl lunmask add vtl-name {all | changer | drive drive-name} name initiator [lun lun] The vtl-name is one of the libraries that you have created. Use the vtl show config command to display all library names. The all option adds all devices in the vtl-name. The drive-name is a virtual tape drive as reported to an initiator. Use the vtl lunmask show command on the restorer to list drive names (which include a space between the word drive and the number). A drive that is not masked to any initiator displays default in the Initiator column. The initiator is a restorer client that you have mapped as an initiator on the restorer. Use the vtl initiator show command to list known initiators. The optional lun is the LUN number that the restorer returns to the initiator. - The maximum LUN number accepted when creating a LUN mask is 255. - A LUN number can be used only once for an individual initiator. The same LUN number can be used with multiple initiators. For example, the following two commands add masks for the initiator client22 for drive 3 and drive 4 (note the space in each name) with a LUN number of 22 for drive 4. # vtl lunmask add vtl01 drive drive 3 name client22 # vtl lunmask add vtl01 drive drive 4 name client22 lun 22 Delete a LUN Mask Use the vtl lunmask del command to delete one or all LUN masks for an individual initiator. vtl lunmask del vtl-name {all | changer | drive drive-name} name initiator 84 DD500 Series Restorer User Guide LUN Masking (for VTL Only) The vtl-name is one of the libraries that you have created. Use the vtl show config command to display all library names. The all option deletes all devices in the vtl-name that are masked for the initiator. The drive-name is a virtual tape drive as reported to an initiator. Use the vtl lunmask show command on the restorer to list drive names and the initiators masked to each drive. The initiator is a restorer client that you have mapped as an initiator on the restorer. Use the vtl initiator show command to list known initiators. Display LUN Masks Use the vtl lunmask show command to display configured LUN masks. The optional vtl-name variable limits the display to a single VTL. vtl lunmask show [vtl-name] The following example shows a VTL with client22 masks for drive 3 and drive 4. Multiple masks for the same device appear in the order in which they were configured. # vtl lunmask show vtl02 Device Initiator --------------------vtl02 changer default vtl02 drive 1 default vtl02 drive 2 default vtl02 drive 3 client22 vtl02 drive 4 client22 vtl02 drive 5 default LUN --0 1 2 3 22 5 Procedure: Create a LUN Mask 1. Use the vtl initiator show command to list the restorer’s known clients and world-wide port names (WWPNs). The WWPN is for the Fibre Channel port on the client system. For example: # vtl initiator show Initiator WWPN ------------------------------Default 00:00:00:00:00:00:00:00 client22 21:00:00:e0:8c:11:33:04 ------------------------------- Chapter 6: Virtual Tape Library (VTL) 85 Pools 2. Add a client as an initiator for the VTL feature. Use the client WWPN from the vtl initiator show command. # vtl initiator add client22 wwpn 21:00:00:e0:8c:11:33:04 3. Use the vtl lunmask show command to display VTLs and device numbers. # vtl lunmask show vtl02 Device Initiator --------------------vtl02 changer default vtl02 drive 1 default vtl02 drive 2 default vtl02 drive 3 default vtl02 drive 4 default vtl02 drive 5 default LUN --0 1 2 3 4 5 4. Add a LUN mask. The following example adds a LUN mask that makes drive 3 available to client22. # vtl lunmask add vtl01 drive drive 3 name client22 5. With no LUN number specified, the default LUN number is used. # vtl lunmask show vtl02 Device Initiator --------------------vtl02 changer default vtl02 drive 1 default vtl02 drive 2 default vtl02 drive 3 client22 vtl02 drive 4 default vtl02 drive 5 default LUN --0 1 2 3 4 5 Pools The Data Domain pool feature for VTL allows replication by groups of VTL virtual tapes. The feature also allows for the replication of VTL virtual tapes from multiple replication originators to a single replication destination. For replication details, see “VTL Pools Replication” on page 201. 86 • A pool name can be a maximum of 32 characters. • A pool name with the restricted names Default, all, vault, or summary cannot be created or deleted. • A pool named Default always exists. All tapes not assigned to user-created pools are assigned to Default. DD500 Series Restorer User Guide Pools • A pool can be replicated no matter where individual tapes are located. Tapes can be in the vault, a library, or a drive. • You cannot move a tape from one pool to another. • Two tapes in different pools on one restorer can have the same name. • A pool sent to a replication destination must have a pool name that is unique on the destination. • Restorer pools are not accessible by backup software. • No VTL configuration or license is needed on a replication destination when replicating pools. • Data Domain recommends only creating tapes with unique bar codes. Duplicate bar codes in the same tape pool create an error. Although no error is created for duplicate bar codes in different pools, duplicate bar codes may cause unpredictable behavior in backup applications and can lead to operator confusion. Add a Pool Use the vtl pool add command to create a pool. The pool-name cannot be Default, all, vault, or summary. Max of 32 characters. vtl pool add pool-name Delete a Pool Use the vtl pool del command to delete a pool. The pool must be empty before the deletion. Use the vtl tape del command to empty the pool. vtl pool del pool-name Display Pools Use the vtl pool show command to display pools. vtl pool show {all | pool-name} For example, to display the tapes in pl22: # vtl pool show pl22 ... processed 4 tapes... Barcode Pool Location -------- ------- -------A00000L1 pl22 VTL1 A00004L1 pl22 VTL1 A00001L1 pl22 VTL1 A00003L1 pl22 VTL1 Chapter 6: Virtual Tape Library (VTL) Type ----LTO-1 LTO-1 LTO-1 LTO-1 Size -------100.0 GB 100.0 GB 100.0 GB 100.0 GB Used Compression -------- ----------100.0 GB 20x 0.0 GB 0x 100.0 GB 10x 0.0 GB 0x 87 Pools 88 DD500 Series Restorer User Guide Configuration Management 7 The restorer config command allows you to examine and modify all of the configuration parameters that are set in the initial system configuration. The license command allows you to add, delete, and display feature licenses. The migration command copies all data from one restorer to another. The command is usually used when upgrading from a smaller restorer to a larger restorer. The config Command The config setup command brings up the same prompts as the initial system configuration. You can change any of the configuration parameters as detailed in the section “Login and Configuration” on page 36. All of the config operations are available only to administrative users. You can also use other restorer commands to change individual configuration settings. Most of the remaining chapters of this manual detail using individual commands. An example of an individual command that sets only one of the config possibilities is nfs add to add NFS clients. Change Configuration Settings To change multiple configuration settings with one command, use the config setup operation. The operation displays the current value for each setting. Press the Return key to retain the current value for a setting. Administrative users only. config setup See “Login and Configuration” on page 36 for details about using config setup. Enter the command from a command prompt to change values after the initial setup. Many other restorer commands change configuration settings. For example, the user command adds another user account each time a user is added. 89 The config Command Note You can also use the Data Domain Enterprise Manager graphical user interface to change all of the same parameters that are available through the config setup command. In the Data Domain Enterprise Manager, select Configuration Wizard in the top section of the left panel. Save and Return a Configuration Using SSH, you can direct output from the restorer config dump command, which returns all restorer configuration settings, into a file on a remote host from which you do restorer administration. You can later use SSH to return the file to the restorer, which immediately recognizes the settings as a configuration and accepts the settings as the current configuration. For example, the following command connects with the restorer dd10 as user sysadmin, asks for the password, returns output from the command config dump that is run on the restorer, and stores the output in the local file (remote from the restorer) /tmp/config12: # ssh -l sysadmin dd10 config dump > /tmp/config12 sysadmin@dd10’s password: reg set config.aliases.default_set.root = '1' reg set config.aliases.default_set.sysadmin = '1' reg set config.aliases.sysadmin.df = 'filesys show space' reg set config.aliases.sysadmin.halt = 'system poweroff' . . . The following command returns the configuration settings from the file /tmp/config12 to the restorer. The settings immediately become the current configuration for the restorer. # ssh -l sysadmin dd10 < /tmp/config12 sysadmin@dd10’s password: Reloading configuration: (CHECKED) Security access lists (from adminaccess) updated Bringing up DHCP client daemon for eth0... Bringing up DHCP client daemon for eth2... Reset the Location Description To reset the location description to the system default of a null entry, use the config reset location command. Administrative users only. config reset location 90 Restorer Operating System User Guide The config Command Reset the Mail Server to a Null Entry To reset the mail server used by the restorer to the system default of a null entry, use the config reset mailserver command. Administrative users only. config reset mailserver Reset the Time Zone to the Default To reset the time zone used by the restorer to the system default of US/Pacific, use the config reset timezone command. Administrative users only. config reset timezone Set an Administrative Email Address To give an address to which the restorer sends alerts and autosupport messages, use the config set admin-email command. The system needs only one administrative email address. Use the autosupport and alerts commands to add other email addresses. Administrative users only. config set admin-email email-address For example: # config set admin-email [email protected] The Admin email is: [email protected] To check the operation, use the config show admin-email command. Set an Administrative Host Name To change the machine from which you can log into the restorer to see system logs and use system commands, use the config set admin-host host operation. The host name can be a simple host name, a host name with a fully-qualified domain name, or an IP address. Administrative users only. config set admin-host host For example, to set the administrative host to admin12.yourcompany.com: # config set admin-host admin12.yourcompany.com To check the operation, use the config show admin-host command. Chapter 7: Configuration Management 91 The config Command Change the System Location Description To change the description of a restorer location, use the config set location “location” operation. A description of a physical location helps identify the machine when viewing alerts and autosupport emails. If the description contains one or more spaces, the description must be in double quotes. Administrative users only. config set location ”location” For example, to set the location description to row2-num4-room221: # config set location “row2-num4-room221” To check the operation, use the config show location command. Change the Mail Server Hostname To change the SMTP mail server used by the restorer, use the config set mailserver host operation. Administrative users only. config set mailserver host For example, to set the mail server to mail.yourcompany.com: # config set mailserver mail.yourcompany.com To check the operation, use the config show mailserver command. Set a Time Zone for the System Clock To set the system clock to a specific time zone, use the config set timezone operation. The default setting is US/Pacific. See the appendix: “Time Zones” on page 265 for a complete list of time zones. For the change to take effect for all currently running processes, you must reboot the restorer. The operation is available to administrative users only. config set timezone zone For example, to set the system clock to the time zone that includes Los Angeles, California, USA: # config set timezone Los_Angeles To display time zones, enter a category or a partial zone name. The categories are: Africa, America, Asia, Atlantic, Australia, Brazil, Canada, Chile, Europe, Indian, Mexico, Mideast, Pacific, and US. The following examples show the use of a category and the use of a partial zone name: # config set timezone us US/Alaska US/Aleutian US/Eastern US/East-Indiana US/Michigan US/Mountain 92 US/Arizona US/Hawaii US/Pacific US/Central US/Indiana-Starke US/Samoa Restorer Operating System User Guide The config Command # config set timezone new Ambiguous timezone name, matching ... America/New_York Canada/Newfoundland Display the Administrative Email Address To display the administrative email address that the restorer uses for email from the alerts and autosupport utilities, use the config show admin-email operation. config show admin-email The display is similar to the following: # config show admin-email The Admin Email is: [email protected] Display the Administrative Host Name To display the administrative host from which you can log into the restorer to see system logs and use system commands, use the config show admin-host operation. config show admin-host The display is similar to the following: # config show admin-host The Admin Host is: admin12.yourcompany.com Display the System Location Description To display the restorer location description, if you gave one, use the config show location operation. Administrative users only. config show location The display is similar to the following: # config show location The System Location is: bldg12 rm 120 rack8 Display the Mail Server Hostname To display the name of the mail server that the restorer uses to send email, use the config show mailserver operation. config show mailserver Chapter 7: Configuration Management 93 The license Command The display is similar to the following: # config show mailserver The Mail (SMTP) server is: mail.yourcompany.com Display the Time Zone for the System Clock To display the time zone used by the system clock, use the config show timezone operation. config show timezone The display is similar to the following: # config show timezone The Timezone name is: US/Pacific The license Command The license command manages licensed features on a restorer. Add a License To add a feature license, use the license add operation. The code for each license is a string of 16 letters with dashes. Include the dashes when entering the license code. Administrative users only. The licensed features are: • REPLICATION Use the Data Domain Replicator for replication of data from one restorer to another. • VTL Use a restorer as a virtual tape library. license add license-code For example: # license add ABCD-BCDA-CDAB-DABC License “ABCE-BCDA-CDAB-DABC” added. 94 Restorer Operating System User Guide The license Command Remove All Feature Licenses To remove all licenses use the license reset operation. The system then behave as though it has the single default license of CAPACITY-FULLSIZE. Administrative users only. license reset Remove a License To remove a current license, use the license del operation. Enter the license feature name or code (as shown with the license show command). Administrative users only. license del {license-feature | license-code} For example: # license del replication The REPLICATION license is removed. Display Licenses The license display shows only those features licensed on the restorer. Administrative users only. ## is the license number of the feature. License Key is the characters of a valid license key. Feature is the name of the licensed feature. Current licensed features are Replicator for replication from one restorer to another, and the virtual tape library (VTL) feature. Display To display current licenses and default features, use the license show operation. Each line shows the license code. license show For example: # license show ## License Key -- ------------------1 DEFA-EFCD-FCDE-CDEF 2 EFCD-FCDE-CDEF-DEFA -- ------------------ Chapter 7: Configuration Management Feature ----------------REPLICATION VTL ---------------- 95 Migration Migration The migration command copies all data from one restorer to another and may also copy replication contexts (configurations). Use the command when upgrading to a larger capacity restorer. Migration is usually done in a LAN environment. See the procedures at the end of this section for using migration with a restorer that is part of a replication pair. • All data under /backup is always migrated and exists on both systems after migration. • After migrating replication contexts, the migrated contexts still exist on the migration source. After migrating a context, break replication for that context on the migration source. • Do not run backup operations to a migration source during a migration operation. • A migration destination does not need a replication license unless the system will use replication. • The migration destination must have a capacity that is the same size as or larger than the migration source. • The migration destination must have an empty file system. • Any setting of the system’s replication throttle feature also applies to migration. If the migration source has throttle settings, use the replication throttle set override command to set the throttle to the maximum (unlimited) before starting migration. Set Up the Migration Destination To prepare a restorer to be a migration destination, use the migration receive operation. Administrative users only. Use the operation: • Only on the migration destination. • Before entering the migration send command on the migration source. • Only on a destination system that has no data in the file system. Run a filesys destroy operation first if needed to clear the file system. The command syntax is: migration receive source-host src-hostname For example, to prepare a destination for migration from a migration source named hostA: # migration receive source-host hostA 96 Restorer Operating System User Guide Migration Start Migration from the Source To start migration, use the migration send operation on the migration source. Administrative users only. Use the operation: • Only on the migration source. • Only when no backup data is being sent to the migration source. • After entering the migration receive command on the migration destination. The command syntax is: migration send obj-spec-list destination-host dest-hostname The obj-spec-list is /backup for systems that do not have a replication license. With replication, the obj-spec-list is one or more contexts from the migration source. After migrating a context, all data from the context is still on the source system, but the context configuration is only on the migration destination. A context in the obj-spec-list can be: • The destination string as defined when setting up replication. Examples are: dir://hostB/backup/dir2 col://hostB pool://hostB/pool2 • The context number as shown in output from the replication status command. For example: rctx://2 • The keyword all, which migrates all contexts from the migration source to the destination. Backup jobs to the restorer should be stopped during the first migration phase as write access is blocked during the first phase. Backup jobs can be resumed during the second phase. The first phase takes a maximum of 30 minutes for a restorer with a full /backup file system. Use the migration watch command to track the first migration phase. New data written to the source is marked for migration until you enter the migration commit command. New data written to the source after a migration commit command is not migrated. Note that write access to the source is blocked from the time a migration commit command is given until the migration process finishes. The migration send command stays open until a migration commit command is entered. Chapter 7: Configuration Management 97 Migration In the following examples, remember that all data on the migration source is always migrated, even when a single directory replication context is specified in the command. • To start migration of data only (no replication contexts, even if replication contexts are configured) to a migration destination named hostC, use a command similar to the following: # migration send /backup destination-host hostC • To start a migration that includes a collection replication context (replication destination string) of col://hostB: # migration send col://hostB destination-host hostC • To start migration with a directory replication context of dir://hostB/backup/dir2: # migration send dir://hostB/backup/dir2 destination-host hostC • To start migration with two replication contexts using context numbers 2 and 3: # migration send rctx://2 rctx://3 destination-host hostC • To migrate all replication contexts: # migration send all destination-host hostC Create an End Point for Data Migration The migration commit command limits migration to data received by the source at the time the command is entered. You can enter the command and limit the migration of new data at any time after entering the migration send command. All data on the source restorer at the time of the commit command (including data newly written since the migration started) is migrated to the destination restorer. Data Domain recommends entering the commit command after all backup jobs for the context being migrated are finished. Write access to the source is blocked after entering the migration commit command and during the time needed to complete migration. After the migration process finishes, the source is opened for write access, but new data is no longer migrated to the destination. After the commit, new data for the contexts migrated to the destination should be sent only to the destination. Administrative users only. migration commit Display Migration Progress To track the initial phase of migration (when write access is blocked), use the migration watch operation. The command output shows the percent completed. migration watch 98 Restorer Operating System User Guide Migration Stop the Migration Process To kill a migration that is in progress, use the migration abort operation. The operation stops the migration process and returns the restorer to its previous state. If the migration source restorer is part of a replication pair, replication is re-started. Run the command on the migration source and the migration destination. Administrative users only. migration abort Display Migration Statistics To display migration statistics during the migration process, use the migration show stats operation. migration show stats Migration statistics have the following columns: Bytes Sent The total number of bytes sent from the migration source. The value includes backup data, overhead, and network overhead. On the destination, the value includes overhead and network overhead. Use the value (and the next value, Bytes received) to estimate network traffic generated by migration. Bytes Received The total number of bytes received at the destination. On the destination, the value includes data, overhead, and network overhead. On the source, the value includes overhead and network overhead. Use the value (and the previous value) to estimate network traffic generated by migration. Received Time The date and time of the most recent records received. Processed Time The date and time of the most recent records processed. For example: # migration show stats Destination Bytes Sent ----------hostB ----------- -----------153687473704 ------------ Bytes Received ---------1974621040 ---------- Received Time ---------------Fri Jan 13 09:37 ---------------- Processed Time ---------------Fri Jan 13 09:37 ---------------- Chapter 7: Configuration Management 99 Migration Display Migration Status To display the current status of migration, use the migration status operation. migration status For example: # migration status CTX: Mode: Destination: Enabled: Local file system status Connection State: Error: Destination lag: Current throttle: Contexts under migration: 0 migration source hostB yes enabled connected since Tue Jul 17 15:20:09 migrating 3/3 60% no error 0 unlimited dir://hostA/backup/dir2 Procedure: Migrate between Source and Destination To migrate data from a source, hostA, to a destination, hostB (ignoring replication contexts): 1. On hostB (the migration destination): # migration receive source-host hostA 2. On hostA (the source), run the following command: # migration send /backup destination-host hostB 3. On either host, run the following command to display migration progress: # migration watch 4. At the appropriate time for your site, create a migration end point. The three phases of migration may take many hours. During that time, new data sent to the source is also marked for migration. To allow backups with the least disruption, use the following command after the three migration phases finish. On hostA: # migration commit 100 Restorer Operating System User Guide Migration Procedure: Migrate with Replication To migrate data and a context from a source, hostA, to a destination, hostC, when hostA is also a directory replication source for hostB: 1. On hostC (the migration destination), run the following command. Note that the command also disables the file system. # migration receive source-host hostA 2. On hostA (the migration and replication source), run the following command. Note that the command also disables the file system. # migration send dir://hostB/backup/dir2 destination-host hostC 3. On the source migration host, run the following command to display migration progress: # migration watch 4. First on hostA and then on hostC, run the following command. Note that the command also disables the file system. # migration commit 5. on hostB (the replication destination), run commands similar to the following to change the replication source to hostC: # filesys disable # replication modify dir://hostB/backup/dir2 source-host hostC # filesys enable Chapter 7: Configuration Management 101 Migration 102 Restorer Operating System User Guide 8 Access Control for Administration The restorer adminaccess command allows remote hosts to use the FTP, TELNET, and SSH administrative protocols on the restorer. The command is available only to restorer administrative users. The FTP and TELNET protocols have host-machine access lists that limit access. The SSH protocol is open to the default user sysadmin and to all restorer users added with the user add command. By default, only the SSH protocol is enabled. Add a Host To add a host (IP address or hostname) to the FTP or TELNET protocol access lists, use the adminaccess add operation. You can enter a list that is comma-separated, space-separated, or both. To give access to all hosts, the host-list can be an asterisk (*). Administrative users only. adminaccess add {ftp | telnet} host-list The host-list can contain class-C IP addresses, IP addresses with either netmasks or length, hostnames, or an asterisk (*) followed by a domain name, such as *.yourcompany.com. For example, to add srvr24 and srvr25 to the list of hosts that can use TELNET on the restorer: # adminaccess add telnet srvr24,srvr25 Netmasks, as in the following examples, are supported: # adminaccess add ftp 192.168.1.02/24 # adminaccess add ftp 192.168.1.02/255.255.255.0 103 Remove a Host Remove a Host To remove hosts (IP addresses, hostnames, or asterisk (*)) from the FTP or TELNET access lists, use the adminaccess del operation. You can enter a list that is comma-separated, space-separated, or both. Administrative users only. adminaccess del {ftp | telnet} host-list For example, to remove srvr24 from the list of hosts that can use TELNET on the restorer: # adminaccess del telnet srvr24 Enable a Protocol By default, the SSH, HTTP, and HTTPS services are enabled. FTP and TELNET are disabled. HTTP and HTTPS allow users to log in through the web-based graphical user interface. The adminaccess enable operation enables a protocol on the restorer. Note that to use FTP and TELNET, you must also add host machines to the access lists. Administrative users only. adminaccess enable {http | https | ftp | telnet | ssh | all} For example, to enable the FTP service: # adminaccess enable ftp Disable a Protocol To disable a service on the restorer, use the adminaccess disable operation. Disabling FTP or TELNET does not affect entries in the access lists. If all services are disabled, the restorer is accessible only through a serial console or keyboard and monitor. Administrative users only. adminaccess disable {http | https | ftp | telnet | ssh | all} For example, to disable the FTP service: # adminaccess disable ftp 104 Restorer Operating System User Guide Reset System Access Reset System Access By default, FTP and TELNET are disabled and have no entries in their access lists. SSH is enabled. No one is able to use FTP or TELNET unless the appropriate access list has one or more host entries. The adminaccess reset operation returns the FTP and TELNET protocols to the default state of disabled with no entries and sets SSH to enabled. Administrative users only. adminaccess reset {ftp | telnet | ssh | all} For example, to reset the FTP list to an empty list and reset FTP to disabled: # adminaccess reset ftp Add an Authorized SSH Public Key Adding an authorized SSH public key to the SSH key file on a restorer is done from a machine that will access the restorer. Adding a key allows a user to log in from the remote machine to the restorer without entering a password. After creating a key on the remote machine, use the adminaccess add ssh-keys operation. Administrative users only. adminaccess add ssh-keys For example, the following steps create a key and then write the key to a restorer: 1. On the remote machine, create the public and private SSH keys. jsmith > ssh-keygen -d Generating public/private dsa key pair. Enter file in which to save the key (/home/jsmith/.ssh/id_dsa): . . 2. Press Enter to accept the file location and other defaults. The public key created under /home/jsmith/.ssh (in this example) is id_dsa.pub. 3. On the remote machine, write the public key to the restorer, dd10 in this example. The restorer asks for the sysadmin password before accepting the key: jsmith > ssh -l sysadmin dd10 “adminaccess add ssh-keys” \ < ~/.ssh/id_dsa.pub Chapter 8: Access Control for Administration 105 Remove an SSH Key File Entry Remove an SSH Key File Entry To remove one entry from the SSH key file, use the adminaccess del ssh_keys lineno operation. The lineno variable is the line number as displayed by the adminaccess show ssh-keys command. Available only to administrative users. adminaccess del ssh-keys lineno For example, to remove the third entry in the SSH key file: # adminaccess del ssh-keys 3 Remove the SSH Key File To remove the entire SSH key file, use the adminaccess reset ssh-keys operation. Available only to administrative users. adminaccess reset ssh-keys Create a New HTTPS Certificate To generate a new HTTPS certificate for the restorer, use the adminaccess https generate certificate command. Available only to administrative users. adminaccess https generate certificate Display the SSH Key File To display all entries in the SSH key file, use the adminaccess show ssh-keys operation. The output gives a line number to each entry. Available only to administrative users. adminaccess show ssh-keys 106 Restorer Operating System User Guide Display Hosts and Status Display Hosts and Status The display shows every access service available on a restorer, whether or not the service is enabled, and a list of hostnames that are allowed access through each service that uses a list. An N/A in the Allowed Hosts column means that the service does not use a list. A - (dash) means that the service can have a list, but currently has no hosts in the list. Administrative users only. Display To display protocol access lists and status, use the adminaccess show operation or click Admin Access in the left panel of the Data Domain Enterprise Manager. adminaccess show For example, to show the status and lists for all services: # adminaccess show Service Enabled -------- -------ssh yes telnet no ftp yes http https -------- yes no -------- Allowed Hosts -----------------------N/A admin10.yourcompany.com admin22.yourcompany.com N/A N/A ------------------------ Procedure: Return Command Output to a Remote machine Using SSH, you can have output from restorer commands return to a remote machine at login and then automatically log out. Available only to the user sysadmin. For example, the following command connects with the machine dd10 as user sysadmin, asks for the password, and returns output from the command filesys status. # ssh -l sysadmin dd10 filesys status sysadmin@dd10’s password: The filesystem is enabled You can create a file with a number of restorer commands, with one command on a line, and then use the file as input to the login. Output from all the commands is returned. For example, a file named cmds11 could contain the following commands: filesys status system show uptime nfs status Chapter 8: Access Control for Administration 107 Procedure: Return Command Output to a Remote machine The login and the returned data look similar to the following: # ssh -l sysadmin dd10 < cmds11 sysadmin@dd10’s password: The filesystem is enabled 3:00 pm up 14 days 10 hours 15 minutes 1 user, load average: 0.00, 0.00, 0.00 Filesystem has been up 14 days 10:13 The NFS system is currently active and running Total number of NFS requests handled = 314576 To use scripts that return output from a restorer, see “Add an Authorized SSH Public Key” on page 105 to eliminate the need for a password. 108 Restorer Operating System User Guide User Administration 9 The restorer command user adds, removes, and displays users and changes user passwords. A restorer has two classes of user accounts. The user class is for standard users who have access to a limited number of commands. Most of the user commands display information. The admin class is administrative users who have access to all restorer commands. The default administrative account is sysadmin. You can change the sysadmin password, but cannot delete the account. Throughout this manual, command explanations include text similar to the following for commands or operations that standard users cannot access: Available to administrative users only. Add a User To add a restorer user, use the user add user-name operation. The operation asks for a password and confirmation or you can include the password as part of the command. Each user has a privilege level of either admin or user. Admin is the default. The only way to change a user’s privilege level is to delete the user and then add the user with the other privilege level. Available to administrative users only. A user name must start with an alpha character. user add user-name [password password][priv {admin | user}] Note The user names root and test are default existing names on every restorer and are not available for general use. Use the existing sysadmin user account for administrative tasks. For example, to add a user with a login name of jsmith, a password of usr256, and administrative privilege: # user add jsmith password usr256 priv Remove a User To remove a user from a restorer, use the user del user-name operation. Available to administrative users only. user del user-name 109 Change a Password For example, to remove a user with a login name of jsmith: # user del jsmith user jsmith removed Change a Password To change a user password, including the password for the sysadmin user, use the user change password user-name operation. The operation asks for the new password and then asks you to re-enter the password as a confirmation. Without the user-name component, the command changes the password for the current user. Available to sysadmin to change any user password and available to all users to change only their own password. user change password [user-name] For example, to change the password for a user with a login name of jsmith: # user change password jsmith Enter new password: Re-enter new password: Passwords matched Reset to the Default User To reset the user list to the one factory default user, sysadmin, use the user reset operation. Available to administrative users only. user reset The response looks similar to the following, which lists all removed users: # user reset Removing user jsmith Removing user bjones Can not remove user sysadmin Change a Privilege Level To change a user privilege level, use the user change user-name operation with a key word of admin or user. Available to users who currently have the admin privilege. user change user-name {admin | user} 110 Restorer Operating System User Guide Display Current Users For example, to change the privilege level from admin to user for the login name of jsmith: # user change jsmith user Display Current Users The display of users currently logged in to a restorer shows: Name is the user’s login name. Idle is the amount of time logged in with no actions from the user. Login Time is the date and time when the user logged in. Login From shows the address from which the user logged in. tty is the hardware or network port through which the user is logged in or GUI for the users logged in through the Data Domain Enterprise Manager web-based interface. Session is the user session number. Display Use the user show active operation or click Users in the left panel of the Data Domain Enterprise Manager and look at Logged in Users. user show active The display looks similar to the following: # user show active Name Idle Login Time -------- ---- ---------------jsmith 18h Thu Nov 11 15:46 sysadmin 0s Fri Nov 12 09:44 -------- ---- ---------------- Login From -----------------jsmith.company.com ------------------ tty ----GUI pts/0 ----- Session -----3262 26772 ------ Chapter 9: User Administration 111 Display All Users Display All Users The display of all users known to the restorer is available to administrative users only. The information given is: Name is the user’s login name. Class is the user’s access level of an administrator or a user who can see most information displays. Last login from shows the address from which the user logged in. Last login time is the date and time when the user last logged in. Display Use the user show all operation or click Users in the left panel of the Data Domain Enterprise Manager and look at All Users. user show list The display is similar to the following: # user show list Name Class Last login from -------- ----- -----------------sysadmin admin user24.company.com rjones user user25.company.com jsmith user user26.company.com -------- ----- ---------------------3 users found. 112 Last login time -----------------------Fri Nov 12 14:55:47 2004 Fri Nov 12 12:36:30 2004 (never) ------------------------ Restorer Operating System User Guide Alerts and System Reports 10 A restorer uses multiple methods to inform administrators about the status of the Data Domain OS and hardware. The restorer alerts, autosupport, and AM email features send messages and reports to user-configurable lists of email addresses. The lists include an email address for Data Domain support staff who monitor the status of all restorers and contact your company when problems are reported. The messages also go to the system log. • The alerts feature sends an email whenever a critical component in the system fails or is known, through monitoring, to be out of an acceptable range. Consider adding pager email addresses to the alerts email list so that someone is informed immediately about system problems. For example, a single fan failure is not critical and does not generate an alert as the system can continue normal operations; however, multiple fan failures can cause a system to begin overheating, which generates an alerts email. Each disk, fan, and CPU in the restorer is monitored. Temperature extremes are also monitored. • The autosupport feature sends a daily report that shows system identification information and consolidates the output from a number of restorer commands. See “Run the Autosupport Report” on page 119 for details. Data Domain support staff use the report for troubleshooting. • Every morning at 8:00 a.m. (local time for your system), the restorer sends an AM email to the autosupport email list. The purpose is to highlight hardware or other failures that are not critical, but that should be dealt with soon. An example would be a fan failure. A failed fan should be replaced as soon as is reasonably possible, but the system can continue operations. The AM email is a copy of output from alerts show current (see “Display Current Alerts” on page 115) and alerts show history (see “Display the Alerts History” on page 116) messages about non-critical hardware situations, and some disk space usage numbers. • Non-critical hardware problems generate email messages to the autosupport list. An example is a failed power supply when the other two power supplies are still fine. If the situation is not fixed, the message also appears in the AM email. • Every hour, the restorer logs a short system status message. See “Hourly System Status” on page 122 for details. • The support command sends multiple log files to the Data Domain Support organization. 113 Alerts Alerts Use the alerts command to administer the alerts feature. Add to the Email List To add an email address to the alerts list, use the alerts add operation. By default, the list includes an address for Data Domain support staff. The email-list is a list of addresses that are comma- separated or space-separated or both. After adding to the list, always use the alerts test operation to test for mailer problems. Administrative users only. alerts add email-list For example, to add an email address to the alerts list: # alerts add [email protected] Test the Email List To test the alerts list, use the alerts test operation, which sends an alerts email to each address on the list or to a specific address. After adding addresses to the list, always use this operation to test for mailer problems. alerts test [email-addr] For example, to test for the address [email protected]: # alerts test [email protected] Remove from the Email List To remove an email address from the alerts list, use the alerts del operation. The operation is for administrative users only. The email-list is a list of addresses that are comma-separated or space-separated or both. Administrative users only. alerts del email-list For example, to remove an email address from the alerts list: # alerts del [email protected] 114 Restorer Operating System User Guide Alerts Reset the Email List By default, the alerts list includes an address for Data Domain support personnel. The alerts reset operation returns the list to the default address. Available only to administrative users. alerts reset Display Current Alerts The list of current alerts includes all alerts that are not corrected. An alert is removed from the display when the underlying situation is corrected. For example, an alert about a fan failure is removed when the fan is replaced with a working unit. Each type of alert maintains only one message in the current alerts list. For example, the display reports the most recent date of a system reboot, not every reboot. Look in the system log files for current and previous messages. Display To display current alerts, use the alerts show current operation or click Autosupport in the left panel of the Data Domain Enterprise Manager and look at Current Alerts. alerts show current The command returns entries similar to the following: # alerts show current Alert Time Description ---------------- -------------------------------------Fri Nov 12 18:54 Rear fan #1 failure: Current RPM is 0, nominal is 8000 Fri Nov 12 16:22 Reboot reported. System rebooted ---------------- -------------------------------------There are 2 active alerts. Chapter 10: Alerts and System Reports 115 Alerts Display the Alerts History The alerts history lists alerts messages from all of the existing messages system log files, which hold messages for up to ten weeks. Display To display the history of alerts messages, use the alerts show history operation or click Autosupport in the left panel of the Data Domain Enterprise Manager and look at Alert History. Use the up and down arrow keys to move through the display. Use the q key to exit. Enter a slash character (/) and a pattern to search for and highlight lines of particular interest. alerts show history The command returns entries similar to the following: # alerts show history Alert Time Description ----------------------------------------------------------Nov 11 18:54:51 Rear fan #1 failure: Current RPM is 0, nominal is 8000 Nov 11 18:54:53 System rebooted Nov 12 18:54:58 Rear fan #2 failure: Current RPM is 0, nominal is 8000 ----------------------------------------------------------- Display the Email List The alerts email list includes an address for Data Domain support. Addresses that you add to the list appear as local or fully-qualified addresses exactly as you enter them. Display To display all email addresses in the alerts list, use the alerts show alerts-list operation or click Autosupport in the left panel of the Data Domain Enterprise Manager and look at Mailing Lists, Alert Email List. alerts show alerts-list The display is similar to the following: # alerts show alerts-list Alert email list [email protected] admin12 [email protected] 116 Restorer Operating System User Guide Alerts Display Current Alerts and Recent History To display the current alerts and the alerts history over the last 24 hours, use the alerts show daily operation. alerts show daily The display is similar to the following: # alerts show daily Current Alert ------------Alert Time Description ----------------------------------------------------------Nov 12 18:54 Rear fan #1 failure: Current RPM is 0, nominal is 8000 ----------------------------------------------------------There is 1 active alert. Recent Alerts and Log Messages -----------------------------Nov 5 20:56:43 localhost sysmon: EMS: Rear fan #2 failure: Current RPM is 960, nominal is 8000 Display the Email List and Administrator Email To display all email addresses in the alerts list and the system administrator email address, use the alerts show all operation. alerts show all The display is similar to the following. The administrator address appears twice: # alerts show all The Admin email is: [email protected] Alerts email [email protected] [email protected] admin12 [email protected] Chapter 10: Alerts and System Reports 117 Autosupport Reports Autosupport Reports The autosupport feature automatically generates reports detailing the state of the system. The first section of an autosupport report gives system identification and uptime information. The next sections display output from numerous restorer commands and entries from various log files. At the end of the report, extensive and detailed internal statistics and information are included to aid Data Domain in debugging system problems. Add to the Email List To add an email address to the autosupport report list, use the autosupport add operation. By default, the list includes an address for Data Domain support staff. The email-list is a list of addresses that are comma-separated or space-separated or both. After adding to the list, always use the autosupport test operation to test the address. Administrative users only. autosupport add email-list For example, to add a an email address to the list: # autosupport add [email protected] Test the Autosupport Report Email List To create an autosupport report and send it to all addresses in the email list or to a specific address, use the autosupport send operation. After adding addresses to the list, always use this operation to test the address. autosupport test [email-addr] For example, after adding the email address [email protected] to the list, the test for that address would be: # autosupport test [email protected] Send an Autosupport Report To send an autosupport report to all addresses in the email list or to a specific address, use the autosupport send operation. autosupport send [email-addr] For example, to send an autosupport to [email protected]: # autosupport send [email protected] 118 Restorer Operating System User Guide Autosupport Reports Remove from the Email List To remove an email address from the autosupport report list, use the autosupport del operation. The operation is available only to administrative users. The email-list is a list of addresses that are comma-separated or space-separated or both. Administrative users only. autosupport del email-list For example, to remove an email address from the list: # autosupport del [email protected] Reset the Email List By default, the list includes an address for Data Domain support personnel. The autosupport reset operation returns the list to the default address. The operation is available only to administrative users. autosupport reset support-list Run the Autosupport Report To manually run and immediately display the autosupport report, use the autosupport show report operation. Use the up and down arrow keys to move through the display. Use the q key to exit. Enter a slash character (/) and a pattern to search for and highlight lines of particular interest. autosupport show report The display is similar to the following. The first section gives system identification and uptime information: # autosupport show report ========== GENERAL INFO ========== GENERATED_ON=Wed Sept 7 13:17:48 UTC 2005 VERSION=Data Domain OS 3.1.0.0-19019 SYSTEM_ID=Serial number: 22BM030026 MODEL_NO=DD560 HOSTNAME=dd10.yourcompany.com LOCATION=Bldg12 room221 rack6 [email protected] UPTIME= 1:17pm up 124 days, 14:31, 2 users, 0.00, 0.00, 0.00 load average: The next sections display output from numerous restorer commands and entries from various log files. At the end of the report, extensive and detailed internal statistics and information appear to aid Data Domain in debugging system problems. Chapter 10: Alerts and System Reports 119 Autosupport Reports Email Command Output To send the display output from any restorer command to an email address, use the autosupport send operation. Enclose the command that is to generate output in double quotes. With a command and no address, the output is sent to the autosupport list. autosupport send [email-addr] [cmd "command"] For example, to email the log file messages.1 to Data Domain Support: # autosupport send [email protected] cmd "log view messages.1" Set the Schedule To change the date and time when a restorer automatically runs a verbose autosupport report, use the set schedule operation. The default time is daily at 3 a.m. (daily 0300). The operation is available only to administrative users. • A time is required. 2400 is not a valid time. An entry of 0000 is midnight at the beginning of a day. • The never option turns off the report. Set a schedule using any of the other options to turn on the report. autosupport set schedule [daily | never day1[,day2,...]] time For example, the following command runs the report automatically every Tuesday at 4 a.m.: # autosupport set schedule tue 0400 The most recent invocation of the scheduling operation cancels the previous setting. Reset the Schedule To reset the autosupport report to run at the default time, use the autosupport reset schedule operation. The default time is Sunday at 3 a.m. The operation is available only to administrative users. autosupport reset schedule Reset the Schedule and the List To reset the autosupport schedule and email list to defaults, use the autosupport reset all operation. The operation is available only to administrative users. autosupport reset all 120 Restorer Operating System User Guide Autosupport Reports Display all Autosupport Parameters To display all autosupport parameters, use the autosupport show all operation. autosupport show all The display is similar to the following. The default display includes only the Data Domain support address and the system administrator address (as given in the initial system configuration). Any additional addresses that you add to the list also appear. # autosupport show all The Admin email is: [email protected] The Autosupport email list is : [email protected] [email protected] Autosupport is scheduled to run “Sun” at “0300” Display the Autosupport Email List The autosupport email list includes an address for Data Domain support. Addresses that you add to the list appear as local or fully-qualified addresses exactly as you enter them. Display To display all email addresses in the alerts list, use the autosupport show support-list operation or click Autosupport in the left panel of the Data Domain Enterprise Manager and look at Mailing Lists, Autosupport Email List. autosupport show support-list The default display is similar to the following: # autosupport show support-list Autosupport Email List [email protected] [email protected] Display the Autosupport Report Schedule Display the date and time when the autosupport report runs with the autosupport show schedule operation. autosupport show schedule The display is similar to the following: # autosupport show schedule Autosupport is scheduled to run “Sun” at “0300” Chapter 10: Alerts and System Reports 121 Hourly System Status Display the Autosupport History To display all autosupport messages, use the autosupport show history operation. Use the J key to scroll down through the file, the K key to scroll up, and the Q key to exit. The operation displays entries from all of the messages system logs, which hold messages for up to ten weeks. autosupport show history The command returns entries similar to the following: # autosupport show history Nov 10 03:00:19 scheduled autosupport Nov 11 03:00:19 scheduled autosupport Nov 12 03:00:19 scheduled autosupport Hourly System Status The restorer automatically generates a brief system status message every hour. The message is sent to the system log and to a serial console if one is attached. To see the hourly message, use the log view command. The message reports system uptime, the amount of data stored, the number of NFS operations, and the amount of disk space used for data storage (as a percentage). For example: # log view Nov 12 13:00:00 localhost logger: at 1:00pm up 3 days, 3:42, 52324 NFS ops, 84763 GB data col. (1%) Nov 12 14:00:00 localhost logger: at 2:00pm up 3 days, 4:42, 59411 NFS ops, 84840 GB data col. (1%) Collect and Send Log Files When troubleshooting problems, Data Domain Technical Support may ask for a support bundle, which is a tar-gzipped selection of log files with a README file that includes identifying autosupport headers. To create a support bundle in the Data Domain Enterprise Manager, click on the Support link in the left panel, and then click on the here link under the title Generate a support bundle. The browser opens a dialog window. Select the Save option and save the file on the local system. You can then send the file to Data Domain Technical Support. The new file immediately appears in the Data Domain Enterprise Manager Support bundles list. Left click on the file name to bring up the dialog window if you want to open the zip file or save the file to another location. 122 Restorer Operating System User Guide Collect and Send Log Files Command Line Interface The support upload operations create bundles of log files (with a README file) and automatically send the results to Data Domain Technical Support. support upload {bundle | traces} The bundle operation sends various restorer log files that are often needed by the Support staff. The traces operation sends multiple perf.log (performance log) files. Chapter 10: Alerts and System Reports 123 Collect and Send Log Files 124 Restorer Operating System User Guide File System Management 11 The filesys command allows you to display statistics, capacity, status, and utilization of the restorer file system. The command also allows you to clear the statistics file and to start and stop the file system processes. The clean operations of the filesys command reclaim physical storage within the restorer file system. Statistics and Basic Operations The following operations manage file system statistics and status displays and start and stop file system processes. Start the Restorer File System Process To start the restorer file system, allowing restorer operations to begin, use the filesys enable operation. Administrative users only. filesys enable Stop the Restorer File System Process To stop the restorer file system, which stops restorer operations (including cleaning), use the filesys disable operation. Administrative users only. filesys disable Stop and Start the Restorer File System To disable and enable the restorer file system in one operation, use the filesys restart command. Administrative users only. filesys restart 125 Statistics and Basic Operations Delete All Data in the File System To delete all data in the restorer file system and re-initialize the file system, use the filesys destroy operation. The operation also removes Replicator configuration settings. Deleted data is not recoverable. The basic command takes about one minute. The and-zero option writes zeros to all disks, which can take many hours. Administrative users only. filesys destroy [and-zero] The display includes a warning similar to the following: # filesys destroy The 'filesys destroy' command irrevocably destroys all data in the '/backup' data collection, including all virtual tapes, and creates a newly initialized (empty) file system. The 'filesys destroy' operation will take about a minute. File access is disabled during this process. Are you sure? (yes|no|?) [no]: Display File System Status To display the state of the file system process, use the filesys status operation. The display gives a basic status of enabled or disabled with more detailed information for each basic status. filesys status The display is similar to the following: # filesys status The filesystem is enabled and running If the file system was shut down with a restorer command, such as filesys disable, the display includes the command. For example: # filesys status The filesystem is disabled and shutdown. [filesys disable] Display File System Uptime To display the amount of time that has passed since the file system was last enabled, use the filesys show uptime operation. The display is in days and hours and minutes. filesys show uptime The display is similar to the following: # filesys show uptime Filesys has been up 47 days, 23:28 126 Restorer Operating System User Guide Statistics and Basic Operations Display File System Space Utilization The display shows the amount of space available for and used by restorer file system components. • The /ddvar line gives a rough idea of the amount of space used by and available to the log and core files. Remove old logs and core files to free space in this area. • The Pre-compression line shows the amount of virtual data stored on the restorer. Virtual data is the amount of data sent to the restorer from backup servers. Do not expect the amount shown in the Pre-compression line to be the same as the amount displayed with the filesys show compression command, Original Bytes line, which includes system overhead. • The Data line shows the actual physical space used by and available for data storage. Warning messages go to the system log and an email alert is generated when the Use% figure reaches 90%, 95%, and 100%. At 100%, the restorer accepts no more data from backup servers. You must run a filesys clean operation to reclaim disk space. If Use% is always high, use the filesys clean show-schedule command to see how often the operation runs automatically, then use filesys clean schedule to run the operation more often. Also consider reducing the data retention period or splitting off a portion of the backup data to another restorer. The Avail GB and Use% columns change when the Index line Use% column reaches 80% and the index is expanded. • The If 100% cleaned line is an estimate of actual physical space used, and physical space available for data storage if you run the filesys clean start operation multiple times to clean 100% of the file system. The estimate is based on the most recent clean operation. On a destination, no estimate appears. • The Meta-data line tracks space used for the internal file descriptions that the restorer creates for all stored files. The amount of space used for the descriptions may not be enough to register in the Meta-data line until several thousand files are stored, leaving the Meta-data value at zero. Warning messages go to the system log and an email alert is generated when the Use% figure reaches 90%, 95%, and 100%. At 100%, the restorer accepts no more data from backup servers. From the backup server, you must expire or purge backup images to create free space for meta data. Do not expect the amount shown in the Meta-data line to be the same as the amount displayed with the filesys show compression command, Meta-data line, which includes an estimate of data in the index. • The Index line tracks space used for internal restorer operations. When the Use% column reaches approximately 80%, the space allocated for the index automatically increases by a set amount and the Use% column adjusts to the new size. At the same time, the Data line Avail GB and Use% columns also change to reflect the space taken for the index. • The Estimated compression factor line gives a rough idea of data compression efficiency. The estimate is based on the most recent clean operation and changes if the compressibility of data sent to the restorer changes. Note that the compression calculation includes the metadata and index space as part of the total storage space. Chapter 11: File System Management 127 Statistics and Basic Operations The value may be different on a replication destination than on a replication source. Multiple replications of a file do not send all of the file data to the destination every time, but do increase the number of bytes of pre-compression data used in the compression calculation. • On the destination, internal handling of replicated meta-data and unwritten regions in files causes the difference • The Estimate based on line displays the date for the most recent clean operation. The date is in the format YYYY/MM/DD. Display To display the space available to and used by file system components, use the filesys show space operation or click File System in the left panel of the Data Domain Enterprise Manager. Values are in gigabytes to one decimal place. filesys show space The display is similar to the following: # filesys show space Resource Size GB Used GB Avail GB Use% ----------------------------------------/ddvar 29.5 0.2 29.3 1% Pre-compression 56.9 Data 3982.0 44.5 3937.5 1% If 100% cleaned* 3982.0 41.8 3940.2 1% Meta-data 19.7 0.0 19.7 0% Index 60.0 0.6 59.4 1% ----------------------------------------Estimated compression factor*: 1.3x = 56.9/(41.8+0.0+0.6) * Estimate based on 2004/11/22 cleaning Display Compression To display the amount of compression for a single file, multiple files, or a file system, use the filesys show compression command. Optionally, display compression for a given number of hours or days. In general, the more often a backup is done for a particular file or file system, the higher the compression. Note that the display on a busy system may not return for one to two hours. Other factors may also influence the display. Call Data Domain Technical Support to analyze displays that seem incorrect. filesys show compression [path] [last {n hours | n days}] 128 Restorer Operating System User Guide Statistics and Basic Operations • In the display, the value for bytes/storage_used is the compression ratio after all compression of data (global and then local) plus the overhead space needed for meta data. In the Original bytes line, (which includes system overhead) do not expect the amount shown to be the same as the amount displayed with the filesys show space command, Pre-compression line, which does not include system overhead. • The Original Bytes value may be different on a replication destination than on a replication source for the same files or file system. On the destination, internal handling of replicated meta-data and unwritten regions in files lead to the difference. • The value for Meta-data includes an estimate for data that is in the restorer internal index and is not updated when the amount of data on the restorer decreases after a file system clean operation. Because of the index estimate, the amount shown is not the same as the amount displayed with the filesys show space command, Meta-data line. The display is similar to the following: # filesys show compression /backup/usr Total files: 6,018; bytes/storage_used: 10.7 Original Bytes: 6,599,567,913,746 Globally Compressed: 992,690,774,605 Locally Compressed: 608,225,239,283 Meta-data: 7,329,091,080 Using an asterisk (*) as a wild card to display compression for more than one file returns the same information as above for each file, but in a single line for each file. The g_comp and l_comp in each line is short for global and local compression. The display ends with a summary that has the same format for total figures as with a file system. For example: # filesys show compression /backup/*.tar /backup/usr.tar: mtime: 1127172717, bytes: 3,930,583,040, g_comp: 53,484,389, l_comp: 29,214,049, meta-data: 27,439,680, bytes/storage_used: 69.4 /backup/var.tar: mtime: 1127142658, bytes: 2,733,137,920, g_comp: 1,941,043,800, l_comp: 1,103,938,251, meta-data: 31,147,968, bytes/storage_used: 2.4 Total files: 2, bytes/storage_used: 5.6 Original Bytes: 6,663,720,960 Globally Compressed (g_comp): 1,994,528,189 Locally Compressed (l_comp): 1,133,152,300 Meta-data: 58,587,648 Chapter 11: File System Management 129 Clean Operations Clean Operations The filesys clean operation reclaims physical storage used by deleted objects in the Data Domain file system. Use the clean operations of the filesys command to manually start a clean operation, change the schedule that automatically runs the operation, or check the status of the operation. The default settings for clean operations are: • A run time of Tuesday at 6 a.m. (tue 0600). • 34% of a DD560 or DD460 restorer’s total data capacity, about 65% of total capacity for a DD430, and 100% for a DD410. Note Any operation that shuts down the restorer file system, such as the filesys disable command, or that shuts down the restorer, such as a system power-off or reboot, stops the clean operation. The clean does not restart when the system and file system restart. Either manually restart the clean or wait until the next scheduled start. Note Cleaning 34% of the space available for data on a restorer that is not busy with other tasks generally takes three to four hours when the cleaning throttle is set to 100. Different types of data, a busy system, and throttle settings below 100 all can extend the time needed. During cleaning, the speed of backup and restore operations may be affected. The clean operation does not run on a destination restorer. A full DD560 or DD460 restorer would need three clean operations to clean 100% of the file system (about 34% for each operation). Depending on the type of data stored, such as when using markers for specific backup software, the file system may never report 100% cleaned. The total space cleaned may always be a few percentage points less than 100. The operation has six phases: 130 • Phase one makes a preliminary selection of data. Phase one on average takes 10 to 40 minutes. • Phase two goes through all of the files on the system and determines what should remain and what should be removed. Phase two can take up to three hours. • Phase three writes any pending index-metadata to disk. Phase three on average takes two to four minutes. • Phase four removes any duplicate data segments that may be left behind when a clean process is interrupted. Phase four on average takes 15 to 45 minutes. • Phase five makes clean copies of all files that hold live data and creates new indexes. Phase five on average take 40 to 60 minutes. • Phase six regenerates internal restorer data structures. Phase six on average takes about 90 minutes. Restorer Operating System User Guide Clean Operations Start Cleaning To manually start the clean process, use the filesys clean start operation. The operation uses the current setting for the scheduled automatic clean operation and cleans up to 34% of the total space available for data on a DD560 or DD460 system. If the system is less than 34% full, the operation cleans all data. Administrative users only. filesys clean start For example, the following command runs the clean operation and reminds you of the monitoring command: # filesys clean start Cleaning started. Use ‘filesys clean watch’ to monitor progress. When the operation finishes, a message goes to the system log giving the amount of free space available. Stop Cleaning To stop the clean process, use the clean stop operation. Stopping the process during the first four phases means that all work done so far is lost. Starting the process again means starting over at the beginning. If the clean process is slowing down the rest of the system, consider using the filesys clean set throttle operation to reset the amount of system resources used by the clean process. The change in the use of system resources takes place immediately. Administrative users only. filesys clean stop Change the Schedule To change the date and time when clean runs automatically, use the clean set schedule operation. The default time is Tuesday at 6 a.m. (tue 0600). The operation is available only to administrative users. • Daily runs the operation every day at the given time. • Monthly starts on a given day or days (from 1 to 31) at the given time. • Never turns off the clean process and does not take a qualifier. • With the day-name qualifier, the operation runs on the given day(s) at the given time. A day-name is three letters (such as mon for Monday). Use a dash (-) between days for a range of days. For example: tue-fri. • Time is 24-hour military time. 2400 is not a valid time. mon 0000 is midnight between Sunday night and Monday morning. Chapter 11: File System Management 131 Clean Operations • The most recent invocation of the scheduling operation cancels the previous setting. The command syntax is: filesys clean set schedule daily time filesys clean set schedule monthly day-numeric-1 [,day-numeric-2,...]time filesys clean set schedule never filesys clean set schedule day-name-1[,day-name-2,...]time For example, the following command runs the operation automatically every Tuesday at 4 p.m.: # filesys clean set schedule tue 1600 To run the operation more than once in a month, set multiple days in one command. For example, to run the operation on the first and fifteenth of the month at 4 p.m.: # filesys clean set schedule monthly 1,15 1600 Set the Schedule or Throttle to the Default To set the clean schedule to the default of Tuesday at 6 a.m. (tue 0600), the default throttle of 50%, or both, use the filesys clean reset operation. The operation is available only to administrative users. filesys clean reset {schedule | throttle | all} Set Network Bandwidth Used To set clean operations to use a lower level of system resources when the restorer is busy, use the filesys set throttle operation. At a percentage of 0 (zero), cleaning runs very slowly or not at all when the system is busy. A percentage of 100 allows cleaning to use system resources in the usual way. The default is 50. When the restorer is not busy with backup or restore operations, cleaning always runs at 100% (uses resources as would any other process). Administrative users only. filesys clean set throttle percent For example, to set the clean operation to run at 30% of its possible speed: # filesys clean set throttle 30 132 Restorer Operating System User Guide Clean Operations Update Statistics To update the If 100% cleaned numbers that show in the output from filesys show space, use the filesys clean update-stats operation. With a full file system, the update operation can take up to 12 hours. Administrative users only. filesys clean update-stats Display All Clean Parameters To display all of the settings for the clean operation, use the filesys clean show config operation. filesys clean show config The display is similar to the following.: # filesys clean show config 50 Percent Throttle Filesystem cleaning is scheduled to run "Tue" at "0600". Display the Schedule To display the current date and time for the clean operation, use the filesys clean show schedule operation. filesys clean show schedule The display is similar to the following.: # filesys clean show schedule Filesystem cleaning is scheduled to run “Tue” at “0600” Display the Throttle Setting To display the throttle setting for cleaning operations, use the filesys clean show throttle operation. filesys clean show throttle The display is similar to the following.: # filesys clean show throttle 100 Percent Throttle Chapter 11: File System Management 133 Compression Options Display the Clean Operation Status To display the active/inactive status of the clean operation, use the filesys clean status operation. When the clean operation is running, the command displays progress. filesys clean status The display is similar to the following: # filesys clean status cleaning progress: phase 5 of 6, 64.6% complete, 2496 GB available total time elapsed 8:53:21, remaining 4:15:45 Monitor the Clean Operation To monitor an ongoing clean operation, use the filesys clean watch operation. The output is the same as output from the filesys clean status command, but continuously updates. Enter a <CTRL> C to stop monitoring the progress of a clean operation. The operation continues, but the reporting stops. Use the filesys clean start command to restart monitoring. filesys clean watch Compression Options A restorer compresses data at two levels: global and local. Global compression compares received data to data already stored on disks. Data that is new is then locally compressed before being written to disk. Command options allow changes at both compression levels. Local Compression A restorer uses a local compression algorithm developed specifically to maximize throughput as data is written to disk. The default algorithm allows shorter backup windows for backup jobs, but uses more space. Local compression options allow you to choose slower performance that uses less space, or you can set the system for no local compression. 134 • Changing the algorithm affects only new data and data that is accessed as part of the filesys clean process. Current data remains as is until a clean operation checks the data. • To enable the new setting, use the filesys disable and filesys enable commands. Restorer Operating System User Guide Compression Options Set Local Compression To set the compression algorithm, use the filesys option set local-compressiontype operation. The setting is for all data received by the system. filesys option set local-compression-type {none | lz | gzfast | gz} • lz The default algorithm that gives the best throughput. Data Domain recommends the lz option. • gzfast A zip-style compression that uses less space for compressed data, but more CPU cycles. Gzfast is the recommended alternative for sites that want more comrpession at the cost of lower performance. • gz A zip-style compression that uses the least amount of space for data storage (10% to 20% less than lz), but also uses the most CPU cycles (up to twice as many as lz). • none Do no data compession. Reset Local Compression To reset the compression algorithm to the default of lz, use the filesys option reset local-compression-type operation. filesys option reset local-compression-type Display the Algorithm To display the current algorithm, use the filesys option show local-compressiontype operation. filesys option show local-compression-type Global Compression DD OS 4.0 and later releases use a global compression algorithm called type 9 as the default. Earlier releases use an algorithm called type 1 (one) as the default. • A restorer using type 1 global compression continues to use type 1 when upgraded to a new release. A restorer using type 9 global compression continues to use type 9 when upgraded to a new release. • A DD OS 4.0.3.0 or later restorer can be changed from one type to another if the file system is less than 40% full. • Directory replication pairs must use the same global compression type. Chapter 11: File System Management 135 Replicator Destination Read/Write Option Set Global Compression To change the global compression setting, use the filesys option set globalcompression-type command. filesys option set global-compression-type {1 | 9} To change the setting (to type 1, for example) and activate the change, use the following commands: # filesys option set global-compression-type 1 # filesys disable # filesys enable Reset Global Compression To remove a manually set gobal compression type, use the filesys option reset global-compression-type command. The file system continues to use the current type. Only when a filesys destroy command is entered does the type used change to the default of type 9. filesys option reset global-compression-type Display the Type To display the current global compression type, use the filesys option show global-compression-type command. filesys option show global-compression-type Replicator Destination Read/Write Option The read/write setting of the file system on a Replicator destination restorer is read-only. With some backup software, the file system must be reported as writable for restoring or vaulting data from the destination restorer. The commands in this section change and display the reported setting of the destination file system. The actual state of the file system remains as read-only. 136 • Before changing the reported setting, use the filesys disable command. After changing the setting, use the filesys enable command. • When using CIFS on the restorer, use the cifs disable command before changing the reported state and use the cifs enable command after changing the reported state. Restorer Operating System User Guide Tape Marker Handling Report as Read/Write Use the filesys option enable report-replica-as-writable command on the destination restorer to report the file system as writable. filesys option enable report-replica-as-writable Report as Read-Only Use the filesys option disable report-replica-as-writable command on the destination restorer to report the file system as read-only. filesys option disable report-replica-as-writable Return to the Default Setting Use the filesys option reset report-replica-as-writable command on the destination restorer to reset reporting to the default of the file system as read-only. filesys option reset report-replica-as-writable Display the Setting Use the filesys option show report-replica-as-writable command on the destination restorer to display the current reported setting. filesys option show report-replica-as-writable Tape Marker Handling Backup software from some vendors inserts markers (tape markers, tag headers, or other names are used) in all data streams (both file system and VTL backups) sent to a restorer. Markers can significantly degrade data compression on a restorer. The filesys option ... marker-type commands allow a restorer to handle specific marker types while maintaining compression at expected levels. Chapter 11: File System Management 137 Tape Marker Handling Set a Marker Type Use the filesys option set marker-type command to have a restorer deal with markers inserted into backup data by some backup software. • The setting is system-wide and applies to all data received by a restorer. • If a restorer is set for a marker type and data is received that has no markers, compression and system performance are not affected. • If a restorer is set for a marker type and data is received with markers of a different type, compression is degraded for the data with different markers. filesys option set marker-type {nw1 | cv1 | tsm1 | none} The options are: • nw1 for Legato NetWorker • cv1 for CommVault Galaxy • tsm1 for IBM Tivoli Storage Manager • none for data with no markers (none is also the default setting) After changing the setting, enter the following two commands to enable the new setting: # filesys disable # filesys enable Reset to the Default Use the filesys option reset marker-type command to return the marker setting to the default of none. filesys option reset marker-type Display the Marker Setting Use the filesys option show marker-type command to display the current marker setting. filesys option show marker-type 138 Restorer Operating System User Guide Disk Management 12 The restorer disk command manages disks and displays disk locations, logical (RAID) layout, usage, and reliability statistics. Command output examples in this chapter show systems with 15 disk drives. Each restorer model reports on the number of disks actually in the system. With a DD560 that has one or more Data Domain external disk shelves, commands also include entries for all enclosures, disks, and RAID groups. See the Data Domain publication ES20 Expansion Shelf User Guide for details about disks in external shelves. Each disk in a restorer has two LEDs at the bottom of the disk carrier. The LED on the right is green. The LED glows steadily when the disk has power and is functioning normally and flashes when the disk is accessed or when the disk is the target of a beacon operation. The LED on the left is red and glows steadily when the disk has failed. Each disk in an external shelf has two LEDs at the right edge of the disk carrier. The top LED is green and flashes when the disk is accessed or when the disk is the target of a beacon operation. The bottom LED is amber and glows steadily when the disk has failed. The disk-identifying variable used in disk commands (except gateway-specific commands) is in the format enclosure-id.disk-id. An enclosure is a restorer or an external disk shelf. A restorer is always enclosure 1 (one). For example, disk 12 in a restorer is 1.12. Disk 12 in the first external shelf is 2.12. On gateway restorers (that use outside disk arrays other than Data Domain external disk shelves), the following command options are not valid: disk disk disk disk disk beacon fail unfail show failure-history show reliability-data With gateway storage, output from all other disk commands returns information about the LUNs and volumes accessed by the restorer. 139 Add a LUN Add a LUN For gateway systems only. Add a new LUN to the current volume. To get the disk-ID, use the disk rescan command and then use the disk show raid-info command. The disk-ID format is the word disk and the number as seen in output from the disk show raid-info command. For example: disk2. See “Procedure: Adding a LUN” on page 67 for details. disk add disk-ID Fail a Disk To set a disk to the failed state, use the disk fail enclosure-id.disk-id operation. The command asks for a confirmation before carrying out the operation. Available to administrative users only. disk fail enclosure-id.disk-id A failed disk is automatically removed from a RAID disk group and is replaced by a spare disk (when the spare is available). The disk use changes from spare to in use and the status becomes reconstructing. See “Display RAID Status for Disks” on page 143 to list the available spares. Note A restorer can run with a maximum of two failed disks. Always replace a failed disk as soon as possible. Spare disks are supplied in a carrier for a restorer or a carrier for an expansion shelf. DO NOT move a disk from one carrier to another. Unfail a Disk To change a disk status from failed to available, use the disk unfail enclosure-id.disk-id command. Use the command when replacing a failed disk. The new disk in the “failed” slot is seen as failed until the disk is unfailed. disk unfail enclosure-id.disk-id Check All Disks To check that the Data Domain OS and hardware recognize all disks, use the disk beacon all operation. The operation causes the green LED (that signals normal operation) on all disks to flash green. Use the (Control) c key sequence to turn off the operation. Administrative users only. disk beacon all 140 Restorer Operating System User Guide Look for New Disks, LUNs, and Expansion Shelves Look for New Disks, LUNs, and Expansion Shelves To check for new disks or LUNs with gateway systems or when adding an expansion shelf, use the disk rescan operation. Administrative users only. disk rescan Identify a Physical Disk The disk beacon enclosure-id.disk-id operation causes the green LED (that signals normal operation) on the target disk to flash. Use the (Control) c key sequence to turn off the operation. Administrative users only. disk beacon enclosure-id.disk-id For example, to flash the LED for disk3 in a restorer: # disk beacon 1.3 Add an Expansion Shelf To add a Data Domain expansion shelf disk storage unit, use the disk add enclosure command. The enclosure-id is always 2 for the first added shelf and 3 for the second. The restorer always has the enclosure-id of 1 (one). disk add enclosure enclosure-id Reset Disk Performance Statistics To reset disk performance statistics to zero, use the disk reset performance operation. See “Display Disk Performance Details” on page 146 for displaying disk statistics. disk reset performance Display Disk Status The disk status operation displays the number of disks in use and failed, the number of spare disks available, and whether a RAID disk group reconstruction is underway. Note that the RAID portion of the display could show one or more disks as failed while the Operational portion of the display could show all drives as “operating nominally.” A disk can be physically functional and available, but not currently in use by RAID, possibly because of operator intervention. disk status Chapter 12: Disk Management 141 Display Disk Type and Capacity Information On a gateway restorer, the display shows only the number and state of the LUNs accessed by the restorer. The remainder of the display is not valid for a gateway system. The display for a restorer with two expansion shelves is similar to the following. Note that the disks in a new expansion shelf recognized with the disk rescan command show a status of unknown. Use the disk add enclosure command to change the status to in use. # disk status Configuration: RAID: RAID: RAID: RAID: RAID: RAID: RAID: RAID: RAID: Operational: Performance: 47 drives present. 47 drives are "in use" 0 drives are undergoing "reconstruction" 0 drives are undergoing "resynch" 5 drives are "spare" 0 drives are "absent" 0 drives have "failed" 0 drives are "foreign" 0 drives are "unknown" 0 drives are "not in use" 47 drives operating normally.. Cumulative 114.954 MB/s, 7 % busy Display Disk Type and Capacity Information The display of disk information for a restorer has the columns: • Disk (Enc.Slot) is the enclosure and disk numbers. • Manufacturer/Model shows the manufacturer’s model designation. • Firmware is the firmware revision on each disk. • Serial No. is the manufacturer’s serial number for the disk. • Capacity is the data storage capacity of the disk when used in a restorer. The Data Domain convention for computing disk space defines one gigabyte as 230 bytes, giving a different disk capacity than the manufacturer’s rating. The display for a gateway restorer has the columns: 142 • Disk displays each LUN accessed by the restorer as a disk. • LUN is the LUN number given to a LUN on the outside storage system. • Port WWN is the world-wide number of the port on the storage array through which data is sent to the restorer. • Manufacturer/Model includes a label that identifies the manufacturer. The display may include a model ID or RAID type or other information depending on the vendor string sent by the storage array. Restorer Operating System User Guide Display RAID Status for Disks • Firmware is the firmware level used by the outside storage controller. • Serial No. is the serial number from the outside storage system for a volume that is sent to the restorer. • Capacity is the amount of data in a volume sent to the restorer. Display Use the disk show hardware operation or click Disks in the left panel of the Data Domain Enterprise Manager to display disk information. disk show hardware The display for disks in a restorer is similar to the following: # disk show hardware Disk Manufacturer/Model (Enc.Slot) --------- -----------------1.1 HDS724040KLSA80 1.2 HDS724040KLSA80 1.3 HDS724040KLSA80 1.4 HDS724040KLSA80 1.5 HDS724040KLSA80 1.6 HDS724040KLSA80 1.7 HDS724040KLSA80 1.8 HDS724040KLSA80 1.9 HDS724040KLSA80 1.10 HDS724040KLSA80 1.11 HDS724040KLSA80 1.12 HDS724040KLSA80 1.13 HDS724040KLSA80 1.14 HDS724040KLSA80 1.15 HDS724040KLSA80 --------- -----------------15 drives present. Firmware Serial No. Capacity -------KFAOA32A KFAOA32A KFAOA32A KFAOA32A KFAOA32A KFAOA32A KFAOA32A KFAOA32A KFAOA32A KFAOA32A KFAOA32A KFAOA32A KFAOA32A KFAOA32A KFAOA32A -------- --------372.61 GB 372.61 GB 372.61 GB 372.61 GB 372.61 GB 372.61 GB 372.61 GB 372.61 GB 372.61 GB 372.61 GB 372.61 GB 372.61 GB 372.61 GB 372.61 GB 372.61 GB --------- -------------KRFS06RAG9VYGC KRFS06RAG9TYYC KRFS06RAG99EVC KRFS06RAGA002C KRFS06RAG9SGMC KRFS06RAG9VX7C KRFS06RAG9SEKC KRFS06RAG9U27C KRFS06RAG9SHXC KRFS06RAG9SJWC KRFS06RAG9SHRC KRFS06RAG9SK2C KRFS06RAG9WYVC KRFS06RAG9SJDC KRFS06RAG9SKBC -------------- Display RAID Status for Disks To display the RAID status and use of disks, which disks have failed from a RAID point of view, spare disks available for RAID, and the progress of a disk group reconstruction operation, use the disk show raid-info operation. disk show raid-info Chapter 12: Disk Management 143 Display the History of Disk Failures When a spare disk is available, the restorer file system automatically replaces a failed disk with a spare and begins the reconstruction process to integrate the spare into the RAID disk group. The disk use changes from spare to in use and the status becomes reconstructing. In the sample display below, disk 8 is a spare disk. The display for a gateway restorer shows only as many Disk and drives are “in use” entries as LUNs accessed by the restorer. All other lines in the drives section of the display are always zero for gateway displays. The display for disks in a restorer is similar to the following: # disk show raid-info Disk State Additional Status (Enc.Slot) ---------- ------------- --------------------------1.1 in use (dg0) 1.2 in use (dg0) 1.3 in use (dg0) 1.4 in use (dg0) 1.5 in use (dg0) 1.6 in use (dg0) 1.7 in use (dg0) 1.8 spare 1.9 in use (dg0) 1.10 in use (dg0) 1.11 in use (dg0) 1.12 in use (dg0) 1.13 in use (dg0) 1.14 in use (dg0) 1.15 in use (dg0) ------------------ --------------------------14 drives are “in use” 0 drives have "failed" 1 drive is “spare(s)” 0 drives are undergoing “reconstruction” 0 drives are “not in use” 0 drives are “missing/absent” Display the History of Disk Failures The disk show failure-history operation displays a list of serial numbers for all disks that have ever been failed in the restorer. Use the disk show hardware command to display the serial numbers of current disks. Administrative users only. disk show failure-history 144 Restorer Operating System User Guide Display Detailed RAID Information Display Detailed RAID Information To display RAID disk groups and the status of disks within each group, use the disk show detailed-raid-info operation. disk show detailed-raid-info The Slot column in the Disk Group section shows the logical slot for each disk in a RAID subgroup. In the example below, the RAID group name is ext3 with subgroups of ext3_1 through ext3_4 (only subgroups ext_1 and ext_2 are shown). The number of Gigabytes allocated for the RAID group and for each subgroup is shown just after the group or subgroup name. The Raid Group section shows the logical slot and actual disks for the whole group. On a gateway restorer, the display does not include information about individual disks. # disk show detailed-raid-info Disk Group (dg0) - Status: normal Raid Group (ext3):(raid-0)(61.6 GB) - Status: normal Raid Group (ext3_1):(raid-6)(15.26 GB) - Status: normal Slot Disk State Additional Status -----------------------------------0 1.10 in use (dg0) 1 1.11 in use (dg0) 2 1.12 in use (dg0) -----------------------------------Raid Group (ext3_2):(raid-6)(15.26 GB) - Status: normal Slot Disk State Additional Status -----------------------------------0 1.13 in use (dg0) 1 1.14 in use (dg0) 2 1.15 in use (dg0) -----------------------------------Raid Group (ppart):(raid-6)(2.47 TB) - Status: normal Slot Disk State Additional Status ---------------------------------0 1.16 in use (dg0) 1 1.11 in use (dg0) 2 1.12 in use (dg0) 3 1.13 in use (dg0) 4 1.14 in use (dg0) 5 1.15 in use (dg0) 6 1.6 in use (dg0) 7 1.9 in use (dg0) 8 1.10 in use (dg0) 9 1.1 in use (dg0) 10 1.2 in use (dg0) Chapter 12: Disk Management 145 Display Disk Performance Details 11 1.3 in use (dg0) 12 1.4 in use (dg0) 13 1.5 in use (dg0) 14 1.7 in use (dg0) --------- -----------Spare Disks Disk State (Enc.Slot) -----------------1.8 spare -----------------Unused Disks None ----------------- Display Disk Performance Details The display of disk performance shows statistics for each disk. Each column displays statistics averaged over time since the last disk reset performance command. See “Reset Disk Performance Statistics” on page 141 for reset details. Command output from a gateway restorer lists each LUN accessed by the restorer as a disk. Disk (Enc.Slot) is the enclosure and disk numbers. Read sects/s is the average number of sectors per second read from each disk. Write sect/s is the average number of sectors per second written to each disk. Cumul. MBytes/s is the average number of megabytes per second written to each disk. Busy is the average percent of time that each disk has at least one command queued. Display Use the disk show performance operation or click Disks in the left panel of the Data Domain Enterprise Manager to see disk performance statistics. disk show performance The display is similar to the following: # disk show Disk (Enc.Slot) ---------1.1 1.2 1.3 146 performance Read Write sects/s sects/s -------- -------378 426 0 0 346 432 Cumul. MBytes/s -------0.392 0.000 0.379 Busy -----11 % 0 % 10 % Restorer Operating System User Guide Display Disk Reliability Details 1.4 0 0 1.5 410 439 1.6 397 427 1.7 360 439 1.8 (spare) (spare) 1.9 358 430 1.10 390 429 1.11 412 430 1.12 379 429 1.13 392 426 1.14 373 427 1.15 424 432 ---------------- -------Cumulative 5.583 MB/s, 11 % busy 0.000 0.414 0.402 0.389 (spare) 0.384 0.399 0.411 0.394 0.399 0.390 0.417 -------- 0 % 11 % 11 % 11 % (spare) 10 % 11 % 11 % 11 % 11 % 12 % 12 % ------ Display Disk Reliability Details Disk reliability information details the hardware state of each disk. The information is generally for the use of Data Domain support staff when troubleshooting. Disk is the enclosure.disk-id disk identifier. The ATA Bus CRC Err column shows uncorrected raw UDMA CRC errors. Reallocated Sectors indicates the end of the useful disk lifetime when the number of reallocated sectors approaches the vendor-specific limit. The limit is 2000 for Western digital disks and 2000 for Hitachi disks. Use the disk show hardware command to display the disk vendor. Temperature shows the current temperature of each disk in Celsius and Fahrenheit. The allowable temperature range for disks is from 5 degrees centigrade to 45 degrees centigrade. Display Use the disk show reliability data operation or click Disks in the left panel of the Data Domain Enterprise Manager to see the reliability statistics. disk show reliability-data The display is similar to the following: # disk show reliability-data Disk ATA Bus Reallocated (Encl.Slot) CRC Err ---------- -------- ------1.1 0 0 1.2 0 0 1.3 0 0 Chapter 12: Disk Management Temperature Sectors ----------33 C 91 F 33 C 91 F 32 C 90 F 147 Display Disk Reliability Details 1.4 0 0 33 C 91 F 1.5 0 0 34 C 93 F 1.6 0 0 34 C 93 F 1.7 0 0 33 C 91 F 1.8 0 0 33 C 91 F 1.9 0 0 34 C 93 F 1.10 0 0 34 C 93 F 1.11 0 0 35 C 95 F 1.12 0 0 33 C 91 F 1.13 0 0 34 C 93 F 1.14 0 0 34 C 93 F 1.15 0 0 56 C 133 F ---------- -------- ----------------14 drives operating normally. 1 drive reporting excessive temperatures. 148 Restorer Operating System User Guide System Maintenance 13 The restorer system, ntp, and alias commands allow you to take system-level actions. Examples for the system command are shutting down or restarting the restorer, displaying system problems and status, and setting the system date and time. The alias command allows users to set up aliases for restorer commands. The ntp command manages access to one or more time servers. The support command sends multiple log files to the Data Domain Support organization. Support staff may ask you to use the command when dealing with unusual situations. See “Collect and Send Log Files” on page 122 for details. The system Command The system command manages system-level actions on the restorer. Shut down the Restorer Hardware To shut down power to the restorer, use the system poweroff operation. The operation automatically does an orderly shut down of file system processes; however, always close the Enterprise Manager graphical user interface before a poweroff operation to avoid a series of harmless warning messages when rebooting. The operation is available to administrative users only. system poweroff The display includes a warning similar to the following: # system poweroff The ‘system poweroff’ command shuts down the system and turns off the power. Continue? (yes|no|?) [no]: 149 The system Command Reboot the Restorer To shutdown and reboot a restorer, use the system reboot operation. The operation automatically does an orderly shutdown of the file system process; however, always close the Enterprise Manager graphical user interface before a reboot operation to avoid a series of harmless warning messages when the system reboots. Administrative users only. system reboot The display includes a warning similar to the following: # system reboot The ‘system reboot’ command reboots the system. File access is interrupted during the reboot. Are you sure? (yes|no|?) [no]: Upgrade the Restorer Software You can upgrade restorer software either from the Data Domain Support web site or with FTP. Upgrade points of interest: • The upgrade operation shuts down the restorer file system and reboots the restorer. • The upgrade operation may take over an hour, depending on the amount of data on the system. • After the upgrade completes and the system reboots, the /backup file system is disabled for up to an hour for upgrade processing. • Stop any active CIFS client connections before starting an upgrade. Use the cifs show active command on the restorer to check for CIFS activity. Disconnect any client that is active. On the client, enter the command net use \\dd\backup /delete. • For systems that are already part of a replication pair: • 150 - Both sides of the pair must be upgraded to the same software release. - Do NOT disable replication on either system in the pair. - Upgrade the destination first. - Upgrade the originator after upgrading the destination. Data Domain supports the following upgrades: - For 3.0.x releases, upgrade to version 3.1.2.4. The upgrade includes changes to the index used by the file system. The upgrade can take a number of hours, depending on the amount of data on the system. Do not halt the upgrade after the process starts. - From 3.1.x releases, upgrade to version 3.2.2.6. - From 3.2.x releases, upgrade to version 3.3.2.3 or a 3.3.3.x release. Restorer Operating System User Guide The system Command - From version 3.3.2.3 (and versions of 3.3.3.x) to version 4.0.2 and above, see the 4.0.x Release Notes for instructions that are unique to the upgrade. Note Before starting an upgrade, always read the Release Notes for the new release. DD OS changes in a release may require unusual, one-time operations to perform an upgrade. To upgrade using HTTP 1. Log in to a restorer administrative host that mounts /ddvar from the restorer. 2. On the administrative host, open a browser and go to the Data Domain Support web site. Use HTTP to connect to the web site. For example: http://support.datadomain.com 3. Log in with the Data Domain login name and password that you use for access to the support web page. Note Some web browsers do not automatically ask for a login if a machine does not accept all logins. In that case, add your user name and password. For example: http://your-name:[email protected] 4. Click on Downloads. (If the web site has updated instructions, follow those instructions.) 5. Click on the Download button for the latest release. 6. Download the new release file to the restorer directory /ddvar/releases. Note When using Internet Explorer to download a software upgrade image, the browser may add bracket and numeric characters to the upgrade image name. Remove the added characters before running the system upgrade command. 7. To start the upgrade, log in to the restorer as sysadmin and enter a command similar to the following. Use the file name (not a path) received from Data Domain. (Always close the Enterprise Manager graphical user interface before an upgrade operation to avoid a series of harmless warning messages when rebooting.) For example: # system upgrade 4.0.2.0-30094.rpm Chapter 13: System Maintenance 151 The system Command To upgrade using FTP 1. Log in to a restorer administrative host that mounts /ddvar from the restorer. 2. On the administrative host, use FTP to connect to the Data Domain support site. For example: # ftp://support.datadomain.com/ 3. Log in with the Data Domain login name and password that you use for access to the support web page. 4. Download the release recommended by your Data Domain field representative. The file should go to /ddvar/releases on the restorer. Note When using Internet Explorer to download a software upgrade image, the browser may add bracket and numeric characters to the upgrade image name. Remove the added characters before running the system upgrade command. 5. To start the upgrade, log in to restorer as sysadmin and enter a command similar to the following. Use the file name (not a path) received from Data Domain. (Always close the Enterprise Manager graphical user interface before an upgrade operation to avoid a series of harmless warning messages when rebooting.) For example: # system upgrade 4.0.2.0-30094.rpm Set the Date and Time To set the system date and time, use the system set date operation. The entry is two places for month (01 through 12), two places for day of the month (01 through 31), two places for hour (00 through 23), two places for minutes (00 through 59), and optionally, two places for century and two places for year. The hour (hh) and minute (mm) entries are 24-hour military time with no colon between hours and minutes. 2400 is not a valid entry. An entry of 0000 is midnight at the beginning of a day. The operation is available to administrative users only. system set date MMDDhhmm[[cc]yy] For example, use either of the following commands to set the date and time to October 22 at 9:24 a.m. in the year 2004: # system set date 1022092404 # system set date 102209242004 152 Restorer Operating System User Guide The system Command Create a Login Banner To create a message that appears whenever someone logs in, mount the restorer directory /ddvar from another system. Create a text file with your login message as the text. To have the banner appear, use the system option set login-banner command with the path and file name of the file that you created: system option set login-banner file For example, to use the text from a file named banner: # system option set login-banner /ddvar/banner Reset the Login Banner To reset the login banner to the default of no banner, use the system option reset login-banner command: system option reset login-banner Display the Login Banner Location To display the location of the file that contains the login banner text, use the system option show command: system option show The command output shows the path and file name: # system option show Option Value ----------------------------Login Banner File /ddvar/banner ----------------------------- Display the Restorer Serial Number To display the system serial number, use the system show serialno operation. system show serialno The display is similar to the following: # system show serialno Serial number: 22BM030026 Chapter 13: System Maintenance 153 The system Command Display System Uptime To display the time that has passed since the last reboot and the file system uptime, use the system show uptime operation. system show uptime The system display includes the current time, time since the last reboot (in days and hours), the current number of users, and the average load for file system operations, disk operations, and the idle time. The Filesystem line displays the time that has passed since the file system was last started. For example: # system show uptime 12:57pm up 9 days, 18:55, 3 users, load average: 0.51, 0.42, 0.47 Filesystem has been up 9 days, 16:26 Display System Statistics To display system statistics for CPUs, disks, Ethernet ports, and NFS, use the system show stats operation. The time period covered is from the last reboot, except with interval and count. An interval, in seconds, runs the command every number of seconds (nsecs) for the number of times in count. The first report covers the time period since the last reboot. Each subsequent report is for activity in the last interval. The default interval is five seconds. The interval and count labels are optional when giving both an interval and a count. To give only an interval, you can enter a number for nsecs without the interval label. To give only a count, you must enter the count label and a number for count. The start and stop options return averages per second of statistics over the time between the commands. system show stats [start | stop | ([interval nsecs] [count count])] The display is similar to the following: # system show stats 09/30/ 16:23:10 CPU FS FS busy ops/s proc ---- -------9% 624 0 % 154 Net kB/s in out ---- ---0 0 Disk kB/s read write ----- ----40834 37245 Disk busy ----10% Restorer Operating System User Guide The system Command NVRAM kB/s ----0 Repl kB/s ---0 Display Detailed System Statistics The detailed system statistics cover the time period since the last reboot. The columns in the display are: CPUx busy The percentage of time that each CPU is busy. State 'CDVMS' A single character shows whether any of the five following events is occurring. Each event can affect performance. C cleaning D disk reconstruction (repair of a failed disk), or RAID is resyncing (after an improper system shutdown and a restart), or RAID is degraded (a disk is missing and no reconstruction is in progress) V verify data (a background process that checks for data consistency) M merging of the internal fingerprint index S summary vector internal checkpoint process NFS ops/s The number of NFS operations per second. NFS proc The fraction of time that the file server is busy servicing requests. NFS rcv The proportion of NFS-busy time spent waiting for data on the NFS socket. NFS snd The proportion of NFS-busy time spent sending data out on the socket. NFS idle The percentage of NFS idle time. CIFS ops/s The number of CIFS (Common Internet File System) operations per second. ethx kB/s The amount of data in kilobytes per second passing through each Ethernet connection. One column appears for each Ethernet connection. Disk kB/s The amount of data in kilobytes per second going to and from all disks in the restorer. Disk busy The percentage of time that all disks in the restorer are busy. NVRAM kB/s The amount of data in kilobytes per second that are read from and written to the NVRAM card. Repl kB/s The amount of data in kilobytes per second being replicated between one restorer and another. For directory replication, the value is the sum total of all in and out traffic for all replication contexts. Chapter 13: System Maintenance 155 The system Command Display To display detailed system statistics, use the system show detailed-stats operation or click System Stats in the left panel of the Data Domain Enterprise Manager. The time period covered is from the last reboot, except when using interval and count. An interval, in seconds, runs the command every number of seconds (nsecs) for the number of times in count. The first report covers the time period since the last reboot. Each subsequent report is for activity in the last interval. The default interval is five seconds. The interval and count labels are optional when giving both an interval and a count. To give only an interval, you can enter a number for nsecs without the interval label. To give only a count, you must enter the count label and a number for count. The start and stop options return averages per second of statistics over the time between the commands. system show detailed-stats [start | stop | ([interval int][count count])] The display is similar to the following: # system show detailed-stats CPU0 busy ---0 % CPU1 State busy ‘CDVMS’ ---- -----0 % eth0 kB/s in out ------0 0 Disk busy ---0 156 NFS ops/s ----624 eth1 kB/s in out ----- ----0 0 NVRAM kB/s read write -------0 0 NFS proc ---0% NFS recv ---0% eth2 kB/s in out ----- ----0 0 NFS send ---0 NFS idle ---0 eth3 kB/s in out ----- ----0 0 CIFS ops/s ----------Disk kB/s read write ----- ----0 0 Repl kB/s in out ------0 0 Restorer Operating System User Guide The system Command Display System Statistics Graphically The graphical display of system statistics is taken from the partial output of multiple commands in the command line interface. Six continuously updated graphs form the display. Each graph is labeled in the lower left corner. CPU The percentage of time that each CPU is busy. Network The amount of data in kilobytes per second passing through each Ethernet connection. One line appears for each Ethernet connection. NFS recv % The proportion of NFS-busy time spent waiting for data on the NFS socket. proc % The fraction of time that the file server is busy servicing requests. send % The proportion of NFS-busy time spent sending data out on the socket. Disk The amount of data in kilobytes per second going to and from all disks in the restorer. Replication Displays only if the Replicator feature is licensed. KB/s in The total number of kilobytes received by this side from the other side of the Replicator pair. For the destination, the value includes backup data, replication overhead, and network overhead. For the source, the value includes replication overhead and network overhead. KB/s out The total number of kilobytes sent by this side to the other side of the Replicator pair. For the source, the value includes backup data, replication overhead, and network overhead. For the destination, the value includes replication overhead and network overhead. FS ops File system operations per second. NFS ops/s The number of NFS operations per second. CIFS ops/s The number of CIFS operations per second. Display To display general system statistics, click System Stats in the left panel of the Data Domain Enterprise Manager. Chapter 13: System Maintenance 157 The system Command Figure 27: Graphic display of system statistics Display System Status The system hardware status display includes information about fans, internal temperatures, and the status of power supplies. Information is grouped by enclosure (restorer or expansion shelf). • • Fans displays status for all the fans cooling each enclosure: - Description tells where the fan is located in the chassis. - Level gives the current operating speed range (low, medium, high) for each fan. The operating speed changes depending on the temperature inside the chassis. See “Replace Fans” on page 256 to identify fans in the restorer chassis by name and number. All of the fans in an expansion shelf are located inside the power supply units. - Status is the system view of fan operations. Temperature displays the temperature for each CPU and for the interior of the chassis. The C/F column displays temperature in degrees Celsius and Fahrenheit. The Status column shows whether or not the temperature is acceptable. - 158 If the overall temperature for a restorer reaches 47 degrees centigrade, a warning message is generated. If the temperature reaches 50 degrees centigrade, the restorer shuts down. Restorer Operating System User Guide The system Command - • If a restorer CPU temperature reaches 60 degrees centigrade, a warning message is generated. If a restorer CPU temperature reaches 74 degrees centigrade, the restorer shuts down. Power Supply informs you that all power supplies are either operating normally or that one or more are not operating normally. The message does not identify which power supply or supplies are not functioning (except by enclosure). Look at the back panel of the enclosure and check the LED for each power supply to identify those that need replacement. Display To display the current hardware status, use the system status operation. system status The display is similar to the following: # system status Enclosure 1 Fans Description --------------Crossbar fan #1 Crossbar fan #2 Crossbar fan #3 Crossbar fan #4 Rear fan #1 Rear fan #2 --------------Temperature Description --------------CPU 0 Actual CPU 1 Actual Chassis Ambient --------------Power Supply Status -----OK ------ Chapter 13: System Maintenance Level -----medium medium medium medium medium medium ------ Status -----OK OK OK OK OK OK ------ C/F -----53/127 0/32 31/88 ------ Status -----OK OK OK ------ 159 The system Command Display the Restorer Model Number To display the model number of the restorer, use the system show modelno command. system show modelno For example: # system show modelno Model number DD560 Display Data Transfer Performance To display system performance figures for data transfer for an amount of time, use the system show performance operation. You can set the duration and the interval of the display. Duration is the hours, minutes, or seconds for the display to go back in time. Interval is the time between each line in the display. The default is to show the last 24 hours in 10 minute intervals. You can set duration only, but not interval only. The raw option displays unformatted statistics. The Read, Write, and Replicate values are calculated in powers of 10 (1KB = 1000) instead of powers of 2 (1KB = 1024). system show performance [raw][duration {hr | min | sec} [interval {hr | min | sec}]] The following example sets a duration of 30 minutes with an interval of 10 minutes: # system show performance 30 min Date Time Read ---------- -------- ---------2004/05/18 10:37:28 0.0 MB/s 2004/05/18 10:47:28 0.0 MB/s recv ---0% 0% send ---0% 0% 10 min Write ---------0.0 MB/s 0.0 MB/s Replicate --------0.0 MB/s 0.0 MB/s proc ---0% 0% idle ---99% 99% Display the Date and Time To display the system date and time, use the system show date operation. system show date The display is similar to the following: # system show date Fri Nov 12 12:06:30 PDT 2004 160 Restorer Operating System User Guide The system Command Display NVRAM Status To display information about the NVRAM card, use the system show nvram operation. • The memory size, window size, and number batteries identify the type of NVRAM card. • The errors entry shows the operational state of the card. If the card has one or more PCI or memory errors, an alerts email is sent and the daily AM-email includes an NVRAM entry. • Each battery entry should show 100% charged, enabled. The exceptions are for a new system or for a replacement NVRAM card. In both cases, the charge may initially be below 100%. If the charge does not reach 100% in three days (or if a battery is not enabled), the card should be replaced. Display Hardware To display the PCI cards and other hardware in a restorer, use the system show hardware operation. The display is useful for Data Domain Support when troubleshooting. system show hardware A few sample lines from the display follow: # system show hardware 00:00.0 Host bridge: Intel Corp. E7520 Memory Controller Hub (rev 0c) 00:00.1 Class ff00: Intel Corp. E7525/E7520 Error Reporting Registers (rev 0c) 00:02.0 PCI bridge: Intel Corp. E7525/E7520/E7320 PCI Express Port A (rev 0c) 00:04.0 PCI bridge: Intel Corp. E7525/E7520 PCI Express Port B (rev 0c) 00:1d.0 USB Controller: Intel Corp. 82801EB/ER (ICH5/ICH5R) USB UHCI Controller (rev 02) Display the Data Domain OS Version To display the Data Domain OS version on your system, use the system show version operation. The display gives the release number and a build identification number. system show version The display is similar to the following: # system show version Data Domain Release 3.0.0.0-12864 Chapter 13: System Maintenance 161 The alias Command To display the versions of restorer components on your system, use the show detailed-version operation. The display is useful for Data Domain support staff. system show detailed-version The display is similar to the following: # system show detailed-version Data Domain Release 3.0.0.0-12864 //prod/main/tools/ddr_dist/ddr_dist_files/...@12826 //prod/main/httpd/...@9826 //prod/main/app/...@12858 //tools/main/devtools/ddr/...@11444 //tools/main/devtools/README-DataDomain@10093 //tools/main/devtools/toolset.bom@3909 //prod/main/net-snmp/...@9320 //prod/main/os/lib/...@3799 . . . Display All System Information To display memory usage and the output from the commands: system show detailed-version, system show fans, system show modelno, system show serialno, system show uptime, and system show date, use the system show all operation. system show all The alias Command The alias command allows you to add, delete, or display command aliases and their definitions. See “Display Aliases” on page 163 for the list of default aliases. Add an Alias To add an alias, use the alias add name “command” operation. Use double quotes around the command if it has includes one or more spaces. A new alias is available only to the user who creates the alias. A user can not create a working alias for a command that is outside of that user’s permission level. alias add name command 162 Restorer Operating System User Guide The alias Command For example, to add an alias named rely for the restorer command that displays reliability statistics: # alias add rely “disk show reliability-data” Remove an Alias To remove an alias, use the alias del name operation. alias del name For example, to remove an alias named rely: # alias del rely Reset Aliases To return to the default alias list, use the alias reset operation. Administrative users only. alias reset Display Aliases To display all aliases and their definitions, use the alias show operation. alias show The following example displays the default aliases: # alias show date -> system show date df -> filesys show space hostname -> net show hostname ifconfig -> net config iostat -> system show detailed-stats 2 netstat -> net show stats nfsstat -> nfs show statistics passwd -> user change password ping -> net ping poweroff -> system poweroff reboot -> system reboot sysstat -> system show stats traceroute -> route trace uname -> system show version uptime -> system show uptime who -> user show active You have 16 aliases Chapter 13: System Maintenance 163 Time Servers and the NTP Command The sysstat alias can take an interval value for the number of seconds between each display of statistics. The following example refreshes the display every 10 seconds: # sysstat 10 Time Servers and the NTP Command The ntp command allows you to synchronize a restorer with an NTP time server, manage the NTP service, or turn off the local (on the restorer) NTP server. The default system settings for NTP service are enabled and multicast. A restorer can use a time server supplied through the default multicast operation, received from DHCP, or set manually with the restorer ntp add command. • Time servers set with the ntp add command override time servers from DHCP and from multicast operations. • Time servers from DHCP override time servers from multicast operations. • The restorer ntp del and ntp reset commands act only on manually added time servers, not on DHCP supplied time servers. You cannot delete DHCP time servers or reset to multicast when DHCP time servers are supplied. Enable NTP Service To enable NTP service on a restorer, use the ntp enable operation. Available to administrative users only. ntp enable Disable NTP Service To disable NTP service on a restorer, use the ntp disable operation. Available to administrative users only. ntp disable Add a Time Server To add a remote time server to NTP list, use the ntp add timeserver operation. Available to administrative users only. ntp add timeserver server_name 164 Restorer Operating System User Guide Time Servers and the NTP Command For example, to add an NTP time server named srvr26.yourcompany.com to the list: # ntp add timeserver srvr26.yourcompany.com Delete a Time Server To delete a manually added time server from the list, use the ntp del timeserver operation. Available to administrative users only. ntp del timeserver server_name For example, to delete an NTP time server named srvr26.yourcompany.com from the list: # ntp del timeserver srvr26.yourcompany.com Reset the List To reset the time server list from manually entered time servers to either DHCP time servers (if supplied) or to the multicast mode (if no DHCP time servers supplied), use the ntp reset timeservers operation. Available to administrative users only. ntp reset timeservers Reset All NTP Settings To reset the local NTP server list to either DHCP time servers (if supplied) or to the multicast mode (if no DHCP time servers supplied) and reset the service to enabled, use the ntp reset operation. Available to administrative users only. ntp reset Display NTP Status To display the local NTP service status, time, and synchronization information, use the ntp status operation. ntp status The following example shows the information that is returned: # ntp status NTP Service is currently enabled. Current Clock Time: Fri, Nov 12 2004 16:05:58.777 Clock last synchronized: Fri, Nov 12 2004 16:05:19.983 Clock last synchronized with time server: srvr26.company.com Chapter 13: System Maintenance 165 Time Servers and the NTP Command Display NTP Settings To display the NTP enabled/disabled setting and the time server list, use the ntp show config operation. ntp show config The following example shows the information that is returned: # ntp show config NTP Service: enabled The Remote Time Server List is: srvr26.company.com, srvr28.company.com 166 Restorer Operating System User Guide Network Management 14 The net command manages the use of DHCP, DNS, and IP addresses, and displays network information and status. The route command manages routing rules. Note Changes to the ethernet interfaces made with the net command options flush the routing table. All routing information is lost and any data movement currently using routing is immediately cut off. Data Domain recommends making interface changes only during scheduled maintenance down times. After making interface changes, you must reconfigure any routing rules and gateways. The net Command Use the net command for the following operations. Enable an Interface To enable a disabled Ethernet interface on the restorer, use the net enable interface operation. Administrative users only. net enable interface For example, to enable the interface eth0: # net enable eth0 Disable an Interface To disable an Ethernet interface on the restorer, use the net disable interface operation. Administrative users only. net disable interface For example, to disable the interface eth0: # net disable eth0 167 The net Command Enable DHCP To set up an Ethernet interface to expect DHCP information, use the net config interface dhcp yes operation. Changes take effect only after a system reboot. Administrative users only. Note To activate DHCP for an interface when no other interface is using DHCP, the restorer must be rebooted. net config interface dhcp yes For example, to set DHCP for the interface eth0: # net config eth0 dhcp yes To check the operation, use the net show configuration command. To check that the Ethernet connection is live, use the net show hardware command. Disable DHCP To set an Ethernet interface to not use DHCP, use the net config interface dhcp no operation. After the operation, you must set an IP address for the interface. All other DHCP settings for the interface are retained. Administrative users only. net config interface dhcp no For example, to disable DHCP for the interface eth0: # net config eth0 dhcp no To check the operation, use the net show configuration command. Change an Interface Netmask To change the netmask used by an Ethernet interface, use the net config interface netmask mask operation. Administrative users only. net config interface netmask mask For example, to set the netmask 255.255.255.0 for the interface eth0: # net config eth0 netmask 255.255.255.0 168 Restorer Operating System User Guide The net Command Change an Interface Transfer Unit Size To change the maximum transfer unit size for an Ethernet interface, use the net config interface mtu operation. Supported values are from 256 to 9180. For 100 Base-T and gigabit networks, 1500 is the standard default. The default option returns the setting to the default value. Make sure that all of your network components support the size set with this option. Administrative users only. net config interface mtu {size | default} For example, to set a maximum transfer unit size of 9180 for the interface eth2: # net config eth2 mtu 9180 Add or Change DNS servers To add or change DNS servers for the restorer to use in resolving addresses, use the net set dns ipaddr operation to give DNS server IP addresses. The operation writes over the current list of DNS servers. Only the servers given in the latest command are available to a restorer. The list can be comma-separated, space-separated, or both. Changes take effect only after a system reboot. Administrative users only. Note To activate a DNS change, the restorer must be rebooted. net set dns ipaddr1[,ipaddr2[,ipaddr3]] For example, to allow a restorer to use a DNS server with an IP address of 123.234.78.92: # net set dns 123.234.78.92 To check the operation, use the net ping host-name command. Ping a Host To check that a restorer can communicate with a remote host, use the net ping operation with a hostname or IP address. net ping hostname [broadcast] [count n] [interface ifname] broadcast Allows pinging a broadcast address. count Gives the number of pings to issue. interface Gives the interface to use: eth0 through eth3. For example, to check that communication is possible with the host srvr24: # net ping srvr24 Chapter 14: Network Management 169 The net Command Change the Restorer Hostname To change the name other systems use to access the restorer, use the net set hostname host operation. Administrative users only. net set hostname host For example, to set the restorer name to dd10: # net set hostname dd10 To check the operation, use the net show hostname command. Note If the restorer is using CIFS with active directory authentication, changing the hostname causes the restorer to drop out of the domain. Use the cifs set authentication command to rejoin the active directory domain. Change an Interface IP Address To change the IP address used by a restorer Ethernet interface, use the net config interface ipaddr operation. If the interface is configured for DHCP, the command returns an error. Use the net config interface dhcp disable command to turn off DHCP for an interface. See “Disable DHCP” on page 168 for details. Administrative users only. net config interface ipaddr For example, to set the interface eth0 to the IP address of 192.168.1.1: # net config eth0 192.168.1.1 Use the net show config command to check the operation. Change the Domain Name To change the domain name used by the restorer, use the net set domainname dm.name operation. Administrative users only. net set domainname dm.name For example, to set the domain name to yourcompany-ny.com: # net set domainname yourcompany-ny.com 170 Restorer Operating System User Guide The net Command Add a Hostname/IP Address to the /etc/hosts File To associate an IP address with a hostname, use the net hosts add operation. The hostname is a fully-qualified domain name or a hostname. In a list, separate each entry with a space and enclose the list in double quotes. The entry is added to the /etc/hosts file. Administrative users only. net hosts add ipaddr {host | “alias host”} ... For example, to associate both the fully-qualified domain name bkup20.yourcompany.com and the hostname of bkup20 with an IP address of 192.168.3.3: # net hosts add 192.168.3.3 “bkup20 bkup20.yourcompany.com” Reset Network Parameters To reset the hostname, domain name, and DNS parameters to their default values (empty), use the net reset operation. The command requires at least one parameter and accepts multiple parameters. Changes take effect only after a system reboot. Administrative users only. net reset {hostname | domainname | dns} For example, to reset the system host name: # net reset hostname Set Interface Duplex Line Use To manually set the line use for an interface to half-duplex or full-duplex, use the net config interface duplex operation and set the speed at the same time. Half-duplex is not available for any port set for a speed of 1000 (Gigabit). Administrative users only. net config interface duplex {full|half} speed {10 | 100 | 1000} For example, to set the line use to half-duplex for interface eth1: # net config eth1 duplex half speed 100 Set Interface Line Speed To manually set the line speed for an interface to 10 Base-T, 100 Base-T, or 1000 Base-T (Gigabit), use the net config interface speed operation. A line speed of 1000 allows only a duplex setting of full. Setting a port to a speed of 1000 and duplex of half leads to unpredictable results. Administrative users only. net config interface speed {10 | 100 | 1000} Chapter 14: Network Management 171 The net Command For example, to set the line speed to 100 Base-T for interface eth1: # net config eth1 speed 100 Set Autonegotiate for an Interface To allow the network interface card to autonegotiate the line speed and duplex setting for an interface, use the net config interface autoneg operation. Administrative users only. net config interface autoneg For example, to set autonegotiation for interface eth1: # net config eth1 autoneg Delete a Hostname/IP address from the /etc/hosts File To delete a hostname/IP address entry from the /etc/hosts file, use the net hosts del operation. Administrative users only. net hosts del ipaddr For example, to remove the hosts with an IP address of 192.168.3.3: # net hosts del 192.168.3.3 Delete all Hostname/IP addresses from the /etc/hosts File To delete all hostname/IP address entries from the /etc/hosts file, use the net hosts reset operation. Administrative users only. net hosts reset Display Hostname/IP addresses from the /etc/hosts File To display hostname/IP addresses from the /etc/hosts file, use the net hosts show operation. Administrative users only. net hosts show The display looks similar to the following: # net hosts show Hostname Mappings: 192.168.3.3 -> bkup20 bkup20.yourcompany.com 172 Restorer Operating System User Guide The net Command Display an Ethernet Interface Configuration To display the current network driver settings for an Ethernet interface, use the net show config operation. With no ifname, the command returns configuration information for all Ethernet interfaces. net show config [ifname] A display for interface eth0 looks similar to the following: # net show config eth0 eth0 Link encap:Ethernet HWaddr 00:02:B3:B0:8A:D2 inet addr:192.168.240.187 Bcast:123.456.78.255 Mask:255.255.255.0 UP BROADCAST NOTRAILERS RUNNING MULTICAST MTU:1500 Metric:1 RX packets:3081076 errors:0 dropped:0 overruns:0 frame:0 TX packets:1533783 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:3764464 (3.5 Mb) TX bytes:136647745 (130.3 Mb) Interrupt:20 Base address:0xc000 Display Interface Settings The display of Ethernet interface settings shows what you have configured, not the actual status of each interface. For example, if an interface on the restorer does not have a live Ethernet connection, the interface is not actually enabled. Port lists each Ethernet interface by name. Enabled shows whether or not the port is configured as enabled. To check the actual status of interfaces, use the net show hardware command or see Network Hardware State in the Data Domain Enterprise Manager. Both show a Cable column entry of yes for live Ethernet connections. DHCP shows whether or not port characteristics are supplied by DHCP. If a port uses DHCP for configuration values, the display does not have values for the remaining columns. IP address is the address used by the network to identify the port. Netmask is the standard IP network mask. Chapter 14: Network Management 173 The net Command Display Use the net show settings operation or click Network in the left panel of the Data Domain Enterprise Manager and look at Network Settings. net show settings The display is similar to the following: # net show settings Ethernet settings: port enabled DHCP ---- -----------eth0 yes yes eth1 no n/a eth2 yes no eth3 yes yes ---- ----------- IP address --------------(dhcp-supplied) n/a 192.168.10.187 (dhcp-supplied) --------------- netmask --------------(dhcp-supplied) n/a 255.255.255.0 (dhcp-supplied) --------------- Display Ethernet Hardware Information The display of the actual status of Ethernet connections has the columns: Port is for the four Ethernet interfaces, eth0 through eth3. All Ethernet interfaces use the Gigabit data transmission speed of 1000 Base-T. Speed is the actual speed at which the port currently deals with data. Duplex shows whether the port is using the full or half duplex protocol. Supp. Speeds lists all the speeds that the port is capable of using. Hardware Address is the MAC address. Physical shows whether the port is Copper or Fiber. Cable shows whether or not the port currently has a live Ethernet connection. Display Use the net show hardware operation or click Network in the left panel of the Data Domain Enterprise Manager and look at Network Hardware State. net show hardware 174 Restorer Operating System User Guide The net Command The display looks similar to the following (each line wraps in the example here): # net Port ---eth0 eth1 eth2 eth3 show hardware Speed Duplex -------- ------100Mb/s full unknown unknown 1000Mb/s full unknown unknown Physical -------Copper Copper Copper Copper Supp Speeds ----------10/100/1000 10/100/1000 10/100/1000 10/100/1000 Hardware Address ----------------00:02:b3:b0:8a:d2 00:02:b3:b0:80:3f 00:07:e9:0d:5a:1a 00:07:e9:0d:5a:1b Cable ----yes no yes no Display the Restorer Hostname To display the current hostname used by the restorer, use the net show hostname operation. net show hostname The display is similar to the following: # net show hostname The Hostname is: dd10.yourcompany.com Display the Domain Name Used for Email To display the domain name used for email sent by a restorer, use the net show domainname operation. net show domainname The display looks similar to the following: # net show domainname The Domainname is: yourcompany.com Chapter 14: Network Management 175 The net Command Display DNS Servers To display the DNS servers used by a restorer, use the net show dns operation. net show dns The display looks similar to the following. The last line informs that the servers were configured manually or by DHCP. # net show dns # Server - ----------1 192.168.1.3 2 192.168.1.4 - ----------Showing DNS servers configured manually. Display Network Statistics To display network statistics, use the net show stats operation. The information returned from all the options is used by Data Domain support staff for troubleshooting. net show stats [all | interfaces | listening | route | statistics] all Display summaries of the other options. interfaces Display the kernel interface table and a table of all network interfaces and their activity. listening Display statistics about active internet connections from servers. route Display the IP routing tables showing the destination, gateway, netmask, and other information for each route. statistics Display network statistics for protocols. The display with no options is similar to the following, with statistics about live client connections. # net show stats Active Internet connections (w/o servers) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 20 123.234.78.90:21 123.234.78.11:512 ESTABLISHED tcp 0 0 123.234.78.90:34 123.234.78.27:673 TIME_WAIT 176 Restorer Operating System User Guide The route Command Display All Networking Information To display the output from the commands net show config, net show settings, net show domainname, net show hostname, net show hardware, net show dns, and net show stats, use the net show hostname operation. net show all The route Command Use the route command to manage routing between a restorer and backup hosts. An added routing rule appears in the Kernel IP routing table and in the restorer Route Config list, a list of static routes that are re-applied at each system boot. Use the route show config command to display the Route Config list. Use the route show table command to display the Kernel IP routing table. Note Changes to the ethernet interfaces made with the net command options flush the routing table. All routing information is lost and any data movement currently using routing is immediately cut off. Data Domain recommends making interface changes only during scheduled maintenance down times. After making interface changes, you must reconfigure any routing rules and gateways. Add a Routing Rule To add a routing rule, use the route add -host or add -net operation. If the target being added is a network, use the -net option. If the target is a host, use the -host option. The gateway can be either an IP address or a hostname that is available to the restorer and that can be resolved to an IP address. Administrative users only. route add -host host-name gw gw-addr route add -net ip-addr netmask mask gw gw-addr To add a route for the host user24 with a gateway of srvr12: # route add -host user24 gw srvr12 To add a route with a route specification of 192.168.1.x, a netmask, and a gateway of srvr12: # route add -net 192.168.1.0 netmask 255.255.255.0 gw srvr12 The following example gives a default gateway of srvr14 for use when no other route matches: # route set gateway srvr14 Chapter 14: Network Management 177 The route Command Remove a Routing Rule To remove a routing rule, use the route del -host or del -net operation. Use the same form (-host or -net) to delete a rule as was used to create the rule. The route show config command shows whether the entry is a host name or a net address. If neither -host or -net is used, any matching lines in the Route Config list are deleted. Administrative users only. route del -host host-name route del -net ip-addr netmask mask To remove a route for host user24: # route del -host user24 To remove a route with a route specification of 192.168.1.x and a gateway of srvr12: # route del -net 192.168.1.0 netmask 255.255.255.0 gw srvr12 Change the Routing Default Gateway To change the routing default gateway, use the route set gateway ipaddr operation. Administrative users only. route set gateway ipaddr For example, to set the default routing gateway to the IP address of 192.168.1.2: # route set gateway 192.168.1.2 Reset the Default Routing Gateway To reset the default routing gateway to the default value (empty), use the route reset operation. Administrative users only. route reset gateway Display a Route To display a route used by a restorer to connect with a particular destination, use the route show trace host operation. route trace host 178 Restorer Operating System User Guide The route Command For example, to trace the route to srvr24: # route trace srvr24 Traceroute to srvr24.yourcompany.com (192.168.1.6), 30 hops max, 38 byte packets 1 srvr24 (192.168.1.6) 0.163 ms 0.178 ms 0.147 ms Display the Configured Static Routes To display the configured static routes that are in the Route Config list, use the route show config operation. route show config The display looks similar to the following (each line in the example wraps): # route show config The Route Config list is: -host user24 gw srvr12 -net 192.168.1.0 netmask 255.255.255.0 gw srvr12 Display the Kernel IP Routing Table To display all entries in the Kernel IP routing table, use the route show table operation. route show table The display looks similar to the following (each line in the example wraps): # route show table Kernel IP routing table Destination Gateway 192.168.1.0 0.0.0.0 127.0.0.0 0.0.0.0 0.0.0.0 192.168.1.2 Genmask 255.255.255.0 255.0.0.0 0.0.0.0 Flags U U UG Metric Ref 0 0 0 0 0 0 Use Iface 0 eth0 0 lo 0 eth0 Chapter 14: Network Management 179 The route Command Display the Default Routing Gateway To display the configured or DHCP-supplied routing gateways used by a restorer, use the route show gateway operation. route show gateway The display looks similar to the following: # route show gateway Default Gateways 192.168.1.2 192.168.3.4 180 Restorer Operating System User Guide NFS Management 15 The nfs command manages NFS clients and displays NFS statistics and status. A restorer exports the directories /ddvar and /backup. /ddvar contains restorer log files and core files. Add clients from which you will administer the restorer to /ddvar. /backup is the target for data from your backup servers. The data is compressed before being stored. Add backup servers as clients to /backup. If you choose to add a client to /backup and to /ddvar, consider adding the client as read-only to /backup to guard against accidental deletions of data. Add NFS Clients To add NFS clients that can access the restorer, use the nfs add export client-list nfs-options operation. Add clients for administrative access to /ddvar. Add clients for backup operations to /backup. A client added to a subdirectory under /backup has access only to that subdirectory. The client-list can have a comma, a space, or both between list entries. To give access to all clients, the client-list can be an asterisk (*). nfs add {/ddvar | /backup[/subdir]} client-list [(nfs-options)] The client-list can contain class-C IP addresses, IP addresses with either netmasks or length, hostnames, or an asterisk (*) followed by a domain name, such as *.yourcompany.com. The nfs-options list can have a comma, a space, or both between entries. The default NFS options for an NFS client are: rw, no_root_squash, no_all_squash, and secure. The list accepts the following options: ro Read only permission. rw Read and write permissions. root_squash Map requests from uid/gid 0 to the anonymous uid/gid. no_root_squash Turn off root squashing. all_squash Map all user requests to the anonymous uid/gid. no_all_squash Turn off the mapping of all user requests to the anonymous uid/gid. 181 Remove Clients secure Requires that requests originate on an Internet port that is less than IPPORT_RESERVED (1024). insecure Turn off the secure option anonuid=id Set an explicit user-ID for the anonymous account. The id is an integer bounded from -65635 to 65635. anongid=id Set an explicit group-ID for the anonymous account. The id is an integer bounded from -65635 to 65635. For example, to add an NFS client with an IP address of 192.168.1.02 and read/write access to /ddvar: with the secure option: # nfs add /ddvar 192.168.1.02 (rw,secure) Netmasks, as in the following examples, are supported: # nfs add /ddvar 192.168.1.02/24 (rw,secure) # nfs add /ddvar 192.168.1.02/255.255.255.0 (rw,secure) Remove Clients To remove NFS clients that can access the restorer, use the nfs del export client-list operation. A client can be removed from access to /ddvar and still have access to /backup. The client-list can contain IP addresses, hostnames, and an asterisk (*) and can be comma-separated, space separated, or both. nfs del {/ddvar | /backup[/subdir]} client-list For example, to remove an NFS client with an IP address of 192.168.1.02 from /ddvar access: # nfs del /ddvar 192.168.1.02 Enable Clients To allow access for NFS clients to a restorer, use the nfs enable operation. nfs enable Disable Clients To disable all NFS clients from accessing the restorer, use the nfs disable operation. nfs disable 182 Restorer Operating System User Guide Reset Clients to the Default Reset Clients to the Default To return the list of NFS clients that can access the restorer to the factory default, use the nfs reset clients operation. The factory default is an empty list. No NFS clients can access the restorer when the list is empty. The operation is available to administrative users only. nfs reset clients Clear the NFS Statistics To clear the NFS statistics counters and reset them to zero, use the nfs reset stats operation. nfs reset stats Display Active Clients The list of active clients shows all clients that have been active in the past 15 minutes and the mount path for each client. Display To display active NFS clients, use the nfs show active operation. nfs show active The display is similar to the following: # nfs show active NFS Active Clients path client ------- ---------------------/ddvar jsmith.yourcompany.com /backup djones.yourcompany.com ------- ---------------------- Chapter 15: NFS Management 183 Display Allowed Clients Display Allowed Clients The list of NFS clients allowed to access the restorer shows the mount path and the NFS options for each client. Display To display all NFS clients, use the nfs show clients operation or click NFS in the left panel of the Data Domain Enterprise Manager. nfs show clients The display is similar to the following: # nfs show clients NFS Client List path client -------- --------/ddvar jsmith /backup djones -------- --------- options) ---------------------------------------(rw,root_squash,no_all_squash,secure) (rw,no_root_squash,no_all_squash,secure) ---------------------------------------- Display Statistics To display NFS statistics for a restorer, use the nfs show stats operation. nfs show stats The following example shows relevant entries, but not all possible entries: # nfs show stats NFS statistics: NFSPROC3_NULL NFSPROC3_GETATTR NFSPROC3_SETATTR NFSPROC3_LOOKUP NFSPROC3_ACCESS NFSPROC3_READLINK NFSPROC3_READ NFSPROC3_WRITE NFSPROC3_CREATE NFSPROC3_MKDIR NFSPROC3_SYMLINK NFSPROC3_MKNOD NFSPROC3_REMOVE NFSPROC3_RMDIR 184 : : : : : : : : : : : : : : 0 327 30 66 455 0 0 6080507 10 0 0 0 0 0 [0] [0] [0] [24] [0] [0] [0] [0] [0] [0] [0] [0] [0] [0] Restorer Operating System User Guide Display Detailed Statistics NFSPROC3_RENAME NFSPROC3_LINK NFSPROC3_READDIR NFSPROC3_READDIRPLUS NFSPROC3_FSSTAT NFSPROC3_FSINFO NFSPROC3_PATHCONF NFSPROC3_COMMIT : : : : : : : : 11 0 0 0 0 0 0 0 Total Requests : 6081406 [1] [0] [0] [0] [0] [0] [0] [0] FH statistics: There are currently (2) exported filesystems. Stats for export point [/backup]: File System Type = SFS Number of cached entries = 28 Number of file handle lookups = 6083544 (cache miss = 28) Max allowed file cache size = 200, max streams = 64 Number of authentication failures = 0 Number of currently open file streams = 1 Stats for export point [/ddvar]: File System Type = UNIX Number of cached entries = 0 Number of file handle lookups = 0 (cache miss = 0) Max allowed file cache size = 200, max streams = 64 Number of authentication failures = 0 Number of currently open file streams = 0 Display Detailed Statistics The nfs show detailed-stats operation displays statistics used by Data Domain support staff for troubleshooting. nfs show detailed-stats Chapter 15: NFS Management 185 Display Status Display Status To display NFS status for a restorer, use the nfs status operation. nfs status The display looks similar to the following: # nfs status The NFS system is currently active and running Total number of NFS requests handled = 6160900 Display Timing for NFS Operations To display information about the time needed for NFS operations, use the nfs show histogram operation. Administrative users only. nfs show histogram The column headers are: Op The name of the NFS operation. mean-ms The mathematical mean time for completion of the operations. stddev The standard deviation for time to complete operations, derived from the mean time. max-s The maximum time taken for a single operation. <10ms The number of operations that took less than 10ms. 100ms The number of operations that took between 10ms and 100ms. 1s The number of operations that took between 1 second and 10 seconds. 10s The number of operations that took between 1 second and 10 seconds. >10s The number of operations that took over 10 seconds. 186 Restorer Operating System User Guide CIFS Management 16 The cifs command manages CIFS (Common Internet File System) backups and restores from and to Windows clients, and displays CIFS statistics and status. CIFS system messages on the restorer go to a CIFS log directory. The location is: /ddvar/log/windows Note When configuring a destination restorer as part of a Replicator pair, configure the authentication mode, WINS server (if needed), and other entries as with the originator in the pair. The exceptions are that a destination does not need a backup user and will probably have a different backup server list (all machines that can access data on the destination). CIFS Access A CIFS client can map to two shares on a restorer. Use the cifs add command (see “Add a Client” on page 189) to make a share available to a client. A client is typically a Windows workstation, not a user. • /ddvar is the share for administrative tasks, such as looking at a log file. • /backup is the share used by a Windows backup account for data storage and retrieval. Any user that logs in to a restorer is put into one of two groups. The user group is limited to commands that display statistics and status. The admin group can make configuration changes and use the display commands. • If the restorer and a user account are in the same domain (or in an attached trusted domain), the user can login to the restorer through a client that is known to the restorer. - If the user has no matching local account on the restorer, the user is part of the user group. - If the user has a matching local account on the restorer and the local account is part of the admin group, the user is logged in as part of the admin group. 187 CIFS Access • If the restorer is in a workgroup, a user can login to the restorer through a client that is known to the restorer. - The user must have a matching account (name and password) added to the restorer as a local user account (see “Add a User” below). - The user is logged in as part of the group specified for the local account, user or admin. For access to the restorer command line interface, use the SSH (or TELNET if enabled) utility to log into the restorer or use a web-based browser to connect to the Data Domain Enterprise Manager graphical user interface. Note Permissions changes made to /backup or /ddvar from a CIFS administrative account may cause unexpected limitations in access to the restorer and may not be reversible from the CIFS account. By default, folders are created with permission bits of 755 and files with permission bits of 744. Add a User To add a user, use the command user add user-name. The command asks for a password and confirmation or you can include the password as part of the command. Users added to the restorer can have a privilege level of admin or user. The default is user. user add user-name [password password][priv admin | user] All user accounts on a restorer act as CIFS local (built-in) accounts, which means that the user name can access data in /backup on the restorer, and the user name can log in to the restorer and use the restorer command set for managing the system. See the restorer command adminaccess for the available access protocols. For example, to add a user with a name of backup22, a password of usr256, and user privilege: # user add backup22 password usr256 For a Windows client that needs file access to a restorer, enter a command similar to the following from a command prompt on the Windows client (usually a Windows media server). The example below maps /backup from restorer rstr02 to drive H on the Windows system and gives user backup22 access to /backup: > net use H: \\rstr02\backup /USER:rstr02\backup22 188 Restorer Operating System User Guide CIFS Commands Add a Client To add a Windows machine as a client that hosts a user account, use the cifs add /backup command. To add a Windows machine that hosts an administrative user account as a client on the restorer, use the cifs add /ddvar command. List entries can be comma-separated, space-separated, or both. To give access to all clients, the client-list can be an asterisk (*). cifs add /backup client-list cifs add /ddvar client-list The client-list can contain class-C IP addresses, IP addresses with either netmasks or length, hostnames, or an asterisk (*) followed by a domain name, such as *.yourcompany.com. For example, to add a client named srvr24 that will do backups and restores with the restorer: # cifs add /backup srvr24 Netmasks, as in the following examples, are supported: # cifs add /backup 192.168.1.02/24 # cifs add /backup 192.168.1.02/255.255.255.0 CIFS Commands The cifs command enables and disables access, sets the authentication mode, and displays status and statistics. All cifs operations are available only to administrative users. Enable Client Connections To allow CIFS clients to connect to a restorer, use the cifs enable operation. cifs enable Disable Client Connections To block CIFS clients from connecting to a restorer, use the cifs disable operation. cifs disable Chapter 16: CIFS Management 189 CIFS Commands Add a Backup Client Each Windows backup server that will do backup and restore operations with a restorer must be added as a backup client. Use the cifs add /backup operation. List entries can be comma-separated, space-separated, or both. cifs add /backup client-list For example, to add a backup server named srvr24 as a backup client for a restorer: # cifs add /backup srvr24 Add an Administrative Client Each Windows machine that will host an administrative user for a restorer must be added as an administrative client. Administrative clients use the /ddvar directory on a restorer. Use the cifs add /ddvar operation. List entries can be comma-separated, space-separated, or both. To give access to all clients, the client-list can be an asterisk (*). cifs add /ddvar client-list For example, to add an administrative client named srvr22: # cifs add /ddvar srvr22 Remove a Backup Client To remove a Windows backup client, use the cifs del /backup operation. List entries can be comma-separated, space-separated, or both. cifs del /backup client-list For example, to remove the backup client srvr24: # cifs del /backup srvr24 Remove an Administrative Client To remove a Windows administrative client, use the cifs del /ddvar operation. List entries can be comma-separated, space-separated, or both. cifs del /ddvar client-list For example, to remove the administrative client srvr22: # cifs del /ddvar srvr24 190 Restorer Operating System User Guide CIFS Commands Remove All CIFS Clients To remove all of the CIFS clients from a restorer, use the cifs reset clients operation. cifs reset clients Set a NetBIOS Hostname To change the NetBIOS hostname of the restorer, use the cifs set nb-hostname operation. The default NetBIOS name is the first component of the fully-qualified hostname used by the restorer. If you are using domain authentication, the nb-name cannot be over 15 characters long. Use the cifs show config command to see the current NetBIOS name. cifs set nb-hostname nb-name For example, to give a restorer the name of rstr12 for NetBIOS use: # cifs set nb-hostname rstr12 Remove the NetBIOS Hostname To remove the NetBIOS hostname of the restorer, use the reset nb-hostname operation. cifs reset nb-hostname Set the Authentication Mode The restorer can use the authentication modes of: active-directory, domain, or workgroup. Use the cifs set authentication operations to choose or change a mode. Each mode has a separate syntax. The active-directory mode joins a restorer to an active-directory-enabled domain. The realm must be a fully-qualified name. Data Domain recommends not specifying a domain controller. When not using a domain controller, first specify a WINS server. The restorer must meet all active-directory requirements, such as a clock time that is no more than five minutes different than the domain controller. See “Procedure: Time Servers and Active Directory Mode” on page 197 for information about time servers. Optionally, include multiple domain controllers or all ( * ). The domain controller list entries can be comma-separated, space-separated, or both. cifs set authentication active-directory realm {[dc1[dc2 ...]] | *} The domain mode puts the restorer into an NT4 domain. Include a domain name and optionally, a primary domain controller or backup and primary domain controllers or all ( * ). cifs set authentication domain domain [[pdc [bdc]] | *] Chapter 16: CIFS Management 191 CIFS Commands The workgroup mode means that the restorer verifies user passwords. cifs set authentication workgroup wg-name Remove All IP Address/NetBIOS hostname Mappings To remove all IP address/NetBIOS hostnames from the lmhosts file, use the cifs hosts reset operation. cifs hosts reset Add an IP Address/NetBIOS hostname Mapping To add an IP address/NetBIOS hostname mapping to the lmhosts file, use the cifs hosts add ipaddr host-list operation. One IP address can have multiple host names. cifs hosts add ipaddr host-list For example, to add the IP address for the machine srvr22: # cifs hosts add 192.168.10.25 srvr22 Added "srvr22" -> "192.168.10.25" mapping to hosts list. Remove an IP Address/NetBIOS hostname Mapping To remove an IP address/NetBIOS hostname mapping from the lmhosts file, use the cifs hosts del ipaddr operation. cifs hosts del ipaddr For example, to remove the IP address 192.168.10.25: # cifs hosts del 192.168.10.25 Removed mapping 192.168.10.25 -> srvr22. Resolve a NetBIOS Name To display the IP address used for any NetBIOS name on the WINS server, use the cifs nb-lookup operation. The CIFS feature must already be enabled. cifs nb-lookup net-bios-name For example, to display the IP address for the machine srvr22: # cifs nb-lookup srvr22 querying srvr22 on 192.168.1.255 192.168.1.14 morgan<00> 192 Restorer Operating System User Guide CIFS Commands Identify a WINS server To identify a WINS server for resolving NetBIOS names to IP addresses, use the cifs set wins-server operation. cifs set wins-server ipaddr For example, to use a WINS server with the IP address of 192.168.1.12: # cifs set wins-server 192.168.1.12 Remove the WINS server To remove the WINS server IP address, use the reset wins-server operation. cifs reset wins-server Set CIFS Logging Levels You can set the level of messages that go to the CIFS-related log files under /ddvar/log/windows. Use the cifs option set command. cifs option set loglevel value The value is an integer from 0 (zero) to 10 (ten). Zero is the default system value that sends all CIFS messages to the files. The lower the value, the fewer log messages go to the logs. As an example: # cifs option set loglevel 4 Set "loglevel" to "4" Increase Memory to Allow More User Accounts When using domain or active directory mode authentication on a restorer, adding 30,000 or more user accounts may cause memory allocation errors. Use the cifs option set command to increase memory available for user accounts. cifs option set “dd winbindd mem limit” value The recommended value of 104857600 doubles the available memory. For example: # cifs option set “dd winbindd mem limit” 104857600 Set "dd winbindd mem limit" to "104857600" Chapter 16: CIFS Management 193 CIFS Commands Reset CIFS Options To reset a CIFS option to the default, use the cifs option reset command. cifs option reset name For example: # cifs option reset loglevel Display CIFS Options To display the CIFS options that are available from the cifs command, use the cifs option show command. cifs option show Display Active Clients To display Windows clients that are currently active, use the cifs show active operation. cifs show active The display is similar to the following and shows which shares are accessed from a client machine and what data transfer may be happening (Locked files). # cifs show active PID Username Group Machine ---------------------------------------------------------568 sysadmin admin srvr24 (192.168.1.5) 566 sysadmin admin srvr22 (192.168.1.6) Service pid machine Connected at --------------------------------------------------ddvar 566 srvr22 Tue Jan 13 12:11:03 2004 backup 568 srvr24 Tue Jan 13 12:09:44 2004 IPC$ 566 srvr22 Tue Jan 13 12:10:55 2004 IPC$ 568 srvr24 Tue Jan 13 12:09:36 2004 backup 566 srvr22 Tue Jan 13 12:10:59 2004 Locked files: Pid DenyMode Access R/W Oplock Name ------------------------------------------------------------566 DENY_WRITE 0x20089 RDONLY NONE /loopback/setup.iso Tue Jan 13 12:11:53 2004 566 DENY_ALL 0x30196 WRONLY NONE /loopback/RH8/ psyche-i386-disc1.iso Tue Jan 13 12:12:23 2004 194 Restorer Operating System User Guide CIFS Commands Display All Clients The display of all Windows clients that have access to a restorer lists the access path for each client. Each Windows backup server that will do backup and restore operations has a path starting with /backup. Each Windows client that will host an administrative user has the path of /ddvar. Display Use the cifs show clients operation or click CIFS in the left panel of the Data Domain Enterprise Manager to see all clients. cifs show clients The display is similar to the following: # cifs show clients path client ------- --------/backup all /backup srvr24.yourcompany.com /ddvar srvr24.yourcompany.com ------- --------- Display the CIFS Configuration The CIFS configuration display begins with the authentication mode, gives details unique to each mode, lists a WINS server if one is configured, and lists NetBIOS hostnames. Display Use the cifs show config operation or click CIFS in the left panel of the Data Domain Enterprise Manager to display CIFS configuration details. cifs show config For example: # cifs show config -----------------Mode Workgroup WINS Server NB Hostname ------------------ Chapter 16: CIFS Management ------------Workgroup WORKGROUP 192.168.1.7 server26 ------------- 195 CIFS Commands Display CIFS Statistics To display CIFS statistics for total operations, reads, and writes, use the cifs show stats operation. cifs show stats For example: # cifs show stats SMB total ops : SMB reads : SMB writes : 31360 165 62 Display Detailed CIFS Statistics To display statistics for each individual type of SMB operation, use the cifs show detailed-stats operation. cifs show detailed-stats Display CIFS Status To display the status of CIFS access to the restorer, use the cifs status operation. cifs status For example: # cifs status CIFS is enabled and running. Display All IP Address/NetBIOS hostname Mappings To display all IP address/NetBIOS hostname mappings in the lmhosts file, use the cifs hosts show operation. cifs hosts show The command output is similar to the following: # cifs hosts show Hostname Mappings: 192.168.10.25 -> srvr22 196 Restorer Operating System User Guide Procedure: Time Servers and Active Directory Mode Procedure: Time Servers and Active Directory Mode When using active directory mode for CIFS access, the restorer clock time can be no more than five minutes different than the domain controller. Use the restorer ntp command (see “Time Servers and the NTP Command” on page 164) to synchronize the clock with a time server. Note The ntp command cannot synchronize the restorer with a time server if the time difference is greater than 1000 seconds. Before following either of the procedures below, manually set the clock on the restorer to less than 1000 seconds difference. Synchronizing from an NTP Server When synchronizing directly from a standard NTP server, use the following commands on the restorer. Substitute your ntp-server-name: # ntp add timeserver ntp-server-name # ntp enable Synchronizing from a Windows Domain Controller When synchronizing through a Windows domain controller: • The domain controller must get time from an external source. • NTP must be configured on the domain controller. To configure NTP, see the documentation for the Windows software version and service pack that is running on your domain controller. The following example is for Windows 2003 SP1 (use your ntp-server-name): C:\>w32tm /config /syncfromflags:manual /manualpeerlist: ntp-server-name C:\>w32tm /config /update C:\>w32tm /resync • After NTP is configured on the domain controller, run the following commands on the restorer using your domain-controller-name: # ntp add timeserver domain-controller-name # ntp enable Chapter 16: CIFS Management 197 Procedure: Time Servers and Active Directory Mode 198 Restorer Operating System User Guide Replicator 17 The replication command sets up and manages the Data Domain Replicator for replicating data between restorers. The Replicator is a licensed product. Contact Data Domain for license keys. Use the license add command to add one key to each restorer in the Replicator configuration. Collection replication replicates the complete /backup directory from one restorer (a source that receives data from backup systems) to another restorer (a destination). Each restorer is dedicated as a source or a destination and each can be in only the one replication pair. The destination is a read-only system except for receiving data from the source. With collection replication: • A destination restorer can be mounted as read-only for access from other systems. • A destination restorer must have a storage capacity that is equal to or greater than the source. • A destination restorer removed from a collection pair (with the replication break command) cannot be brought back into the pair or be used as a destination for another source until the file system is emptied with the filesys destroy command. Note that the filesys destroy command erases all Replicator configuration settings. • A destination restorer removed from a collection pair becomes a stand-alone restorer that can be used as a source for replication. • With collection replication, all user accounts and passwords are replicated from the source to the destination. Any changes made manually on the destination are overwritten after the next change is made on the source. Data Domain recommends making changes only on the source. Directory replication provides replication at the level of individual directories. Each restorer can be the source or the destination for multiple directories and can also be a source for some directories and a destination for others. During directory replication, each restorer can also perform normal backup and restore operations. Replication command options with directory replication may target a single replication pair (source and destination directories) or may target all pairs that have a source or destination on the restorer. Each replication pair configured on a restorer is called a context. With directory replication: • The maximum number of contexts allowed on a restorer is twenty. Be sure that the destination restorer has enough network bandwidth and disk space to handle all traffic from the originators. • A destination restorer must have available storage capacity that is at least the size of the expected maximum size of the source directory. The destination must have adequate space. 199 Using “Context” • Do not have a single destination restorer receive backups from both CIFS clients and NFS clients. Data corruption may result. Set up separate destination restorers for CIFS clients and for NFS clients. • Source or destination directories may not overlap. • A destination directory that does not already exist is created automatically when replication is initialized. • After replication is initialized, ownership and permissions of the destination directory are always identical to those of the source directory. • In the replication command options, a specific replication pair is always identified by the destination. Throttle options for limiting the bandwidth used by replication: • Apply to all replication pairs and all network interfaces on a system. Each throttle setting affects all replication pairs and network interfaces equally. • Affect only outbound network traffic. • Govern the total replication bandwidth available for a given network interface. Using “Context” Except for the replication add operation, all replication commands that can use a destination variable can take either the complete destination specification or a context number. Context numbers appear in the output from a number of commands, such as replication status. Look for the number in a command output’s first column that has the heading CTX. To use the context number, preface the number with rctx://. For example, to display statistics for the destination labeled as context 2, use the following command: # replication show stats rctx://2 Configure Replicator To configure a Replicator pair, use the replication add operation on both the source and destination restorers. Administrative users only. replication add source source destination destination • 200 The source and destination host names must be exactly the same as the names returned by the hostname command on the source and destination restorers. Restorer Operating System User Guide VTL Pools Replication • For collection replication: - Enter the filesys disable command on both the source and destination. - Start the source and destination variables with col://. For example, enter a command similar to the following on the source and destination restorers: replication add source col://hostA destination col://hostB • Enter the filesys enable command on both the source and destination. For directory replication: - The restorer file system must be enabled. - The source directory must exist. - The destination directory should be empty. - Start the source and destination variables with dir:// and include the directory that is the replication target. For example, enter a command similar to the following on the source and destination restorers: replication add source dir://hostA/backup/dir2 destination dir://hostB/backup/hostA/dir2 • When the host name for a source or destination does not correspond to the network name through which the restorers will communicate, use the replication modify command with the connection-host option on the other system to direct communications to the correct network name. • After including a source directory in a replication add command, you cannot add new sub-directories under the source directory or change sub-directory names. VTL Pools Replication • Start the source and destination variables with pool:// and include the pool that is the replication target. For example, enter a command similar to the following on the source and destination restorers: replication add source pool://hostA/pool2 destination pool://hostB/pool2 • The pool name must be unique on the destination and the destination cannot include levels of directories between the destination hostname and the pool name. For example, a destination of pool://hostB/hostA/pool2 is not allowed. • Pool replication and directory replication are the same (except for the destination name limitation above) when configuring replication and when using the replication command set. Examples in this chapter that use dir:// are also valid for pool://. Chapter 17: Replicator 201 Start Replication • Pool replication does not require the VTL license on the destination restorer. Start Replication To start replication between a source and destination, use the replication initialize operation on the source. The command checks that the configuration and connections are correct and returns error messages if any problems appear. If the source holds a lot of data, the initialize operation can take many hours. Consider putting both restorers in the Replicator pair in the same location with a direct link to cut down on initialization time. A destination variable is required. Administrative users only. replication initialize destination For a successful initialization: • The source directory must exist. • The destination directory must be empty. Suspend Replication To temporarily halt the replication of data between source and destination, use the replication disable operation on either the source or the destination. On the source, the operation stops the sending of data to the destination. On the destination, the operation stops serving the active connection from the source. If the file system is disabled on either restorer when replication is disabled, replication remains disabled even after the file system is restarted. Administrative users only. replication disable {destination | all} Resume Replication To restart replication that is temporarily halted, use the replication enable operation on the restorer that was temporarily halted. On the source, the operation resumes the sending of data to the destination. On the destination, the operation resumes serving the active connection from the source. If the file system is disabled on either restorer when replication is enabled, replication is enabled when the file system is restarted. Administrative users only. replication enable {destination | all} 202 Restorer Operating System User Guide Remove Replication Remove Replication To remove either the source or destination restorer from a Replicator pair or to remove all Replicator configurations from a restorer, use the replication break operation. A destination variable or all is required. • Always run the filesys disable command before the break operation and the filesys enable command after. • With collection replication, a destination is left as a stand-alone read/write restorer that can then be used as a source. • With collection replication, a destination cannot be brought back into the replication pair or used as a destination for another source until the file system is emptied with the filesys destroy command. • With directory replication, a destination directory must be empty to be used again with the original source or with a different source. replication break {destination | all} Reset Authentication between the Restorers To reset authentication between a source and destination, use the replication reauth operation on both the source and the destination. Messages similar to “Authentication keys out of sync,” or “Key out of sync” signal the need for a reset. Reauthorization is primarily used when replacing a source restorer. See “Procedure: Replace a Directory Source - New Name” on page 216. A destination variable is required. Administrative users only. replication reauth destination Move Data to a New Source To move data from a surviving destination to a new source, use the replication recover operation on the new source. With collection replication, first use the filesys destroy operation on the source. With directory replication, the target directory on the source must be empty. See “Procedure: Set Up and Start Many-to-One Replication” on page 216. Do not use the operation on a destination. If the replication break command was run earlier, the destination cannot be used to recover a source. A destination variable is required. Also see “Procedure: Replace a Directory Source - New Name” on page 216 for an example of using the recover option when replacing a source restorer. Administrative users only. replication recover destination Chapter 17: Replicator 203 Change a Source or Destination Hostname Change a Source or Destination Hostname When replacing a system and using a new name for the replacement system, use the replication modify operation on the other side of the replication pair. The new-host-name must be exactly the same as displayed by the hostname command on the system with the new hostname. If the replication pair has a throttle setting, the setting applies with the new destination. If you are changing the hostname on an existing source restorer, use the replication modify operation on the destination. Do not use the command if you want to change the hostname on an existing destination. Call Data Domain Technical Support before changing the hostname on an existing destination. When using the replication modify command, always run the filesys disable command first and the filesys enable command after. Administrative users only. replication modify destination {source-host | destination-host} new-host-name For example, if the local destination dest-orig.ca.company.com is moved from California to New York, run a command similar to the following on both the source and destination: # replication modify dir://ca.company.com/backup/dir2 destination-host dir://ny.company.com Connect with a Network Name A source restorer connects to the destination restorer using the destination name as returned by the hostname command on the destination. If the destination host name does not resolve to the correct IP address for the connection, use the modify connection-host option to give the correct name to use for the connection. The connection-host name can also be a numeric IP address. When specifying a connection-host, an optional port number can also be used. The connection-host option may be required when connecting to an alternate interface on the destination or when a connection passes through a firewall. The option may be needed after adding a new source/destination pair or after renaming either a source or a destination. The port option is valid only when used on a source and must match the listen-port used by the destination. The default port is 2051. replication modify destination connection-host new-host-name [port port] The following example is run on the source to inform the source that the destination host dest-orig.ny.company.com has a network name of dest-orig-2.ny.company.com. Note that the destination variable for the pair does not change and is still dest-orig.ny.company.com. # replication modify dir://ny.company.com/backup/dir2 connection-host dir://ny2.company.com 204 Restorer Operating System User Guide Change the Port on a Destination Change the Port on a Destination To change the port from which the destination receives data from sources, use the replication option set listen-port operation on the destination system. The default port is 2051. The connection-host port used by the source must match the listen-port used by the destination. replication option set listen-port port Add a Scheduled Throttle Event To change the rate of network bandwidth used by replication, use the throttle add operation. The default network bandwidth use is unlimited. replication throttle add sched-spec rate The sched-spec must include: • One or more three-letter days of the week (such as mon, tue, or wed) or the word daily (to set the schedule every day of the week). • A time of day in 24 hour military time. The rate includes a number or the word unlimited. The number can include a tag for bits or bytes per second. Do not use a space between the number and the bits or bytes specification. For example, 2000KB. The default rate is bits per second. In the rate variable: • bps or b equals raw bits per second • Kbps, Kb, or K equals 1024 bits per second • Bps or B equals bytes per second • KBps or KB equals 1024 bytes per second The rate can also be 0 (the zero character), disable, or disabled. Each stops replication until the next rate change. For example, the following command limits replication to 20 kilobytes per second starting on Mondays and Thursdays at 6:00 a.m. # replication throttle add mon thu 0600 20KB Replication runs at the given rate until the next scheduled change or until new throttle commands force a change. The default rate with no scheduled changes is to run as fast as possible at all times. The add operation may change the current rate. For example, if on Monday at Noon, the current rate is 20 KB, and the schedule that set the current rate started on mon 0600, a new schedule change for Monday at 1100 at a rate of 30 KB (mon 1100 30KB) makes the change immediately. Note The system enforces a minimum rate of 98,304 bits per second (12 KB). Chapter 17: Replicator 205 Set a Temporary Throttle Rate Set a Temporary Throttle Rate To set a throttle rate until the next scheduled change or until a system reboot, use the throttle set current operation. A temporary rate cannot be set if the replication throttle set override command is in effect. replication throttle set current rate The rate includes a number or the word unlimited. The number can include a tag for bits or bytes per second. Do not use a space between the number and the bits or bytes specification. For example, for 2000 kilobytes, use 2000KB. The default rate is bits per second. In the rate variable: • bps or b equals raw bits per second • Kbps, Kb, or K equals 1024 bits per second • Bps or B equals bytes per second • KBps or KB equals 1024 bytes per second The rate can also be 0 (the zero character), disable, or disabled. Each stops replication until the next rate change. As an example, the following command sets the rate to 2000 kilobytes per second: # replication throttle set current 2000KB Note The system enforces a minimum rate of 98,304 bits per second (12 KB). Delete a Scheduled Throttle Event To remove one or more throttle schedule entries, use the throttle del operation. replication throttle del sched-spec The sched-spec must include: • One or more three-letter days of the week (such as mon, tue, or wed) or the word daily to delete all entries for the given time. • A time of day in 24 hour military time. For example, the following command removes an entry for Mondays at 1100: # replication throttle del mon 1100 The command may change the current rate. For example, assume that on Monday at Noon, the current rate is 30 KB, and the schedule that set the current rate started on mon 1100. If you now delete the scheduled change for Monday at 1100 (mon 1100), the replication rate immediately changes to the next previous scheduled change, such as mon 0600 20KB. 206 Restorer Operating System User Guide Set an Override Throttle Rate Set an Override Throttle Rate To set a throttle rate that overrides scheduled rate changes, use the throttle set override operation. The rate stays at the override level until another override command is entered. replication throttle set override rate The rate includes a number or the word unlimited. The number can include a tag for bits or bytes per second. Do not use a space between the number and the bits or bytes specification. For example, 2000KB. The default rate is bits per second. In the rate variable: • bps or b equals raw bits per second • Kbps, Kb, or K equals 1024 bits per second • Bps or B equals bytes per second • KBps or KB equals 1024 bytes per second The rate can also be 0 (the zero character), disable, or disabled. Each stops replication until the next rate change. As an example, the following command sets the rate to 2000 kilobytes per second: # replication throttle set override 2000KB Note The system enforces a minimum rate of 98,304 bits per second (12 KB). Reset Throttle Settings To reset any or all of the throttle settings, use the throttle reset operation. replication throttle reset {current | override | schedule | all} • A reset of current removes the rate set by the replication throttle set current command. The rate returns to a scheduled rate or to the default if no rate is scheduled. • A reset of override removes the rate set by the replication throttle set override command. The rate returns to a scheduled rate or to the default if no rate is scheduled. The default network bandwidth use is unlimited. • The reset of schedule removes all scheduled change entries. The rate remains at a current or override setting, if either is active, or returns to the default of unlimited. • The reset of all removes any current or override settings and removes all scheduled change entries, returning the system to the default, which is unlimited. Chapter 17: Replicator 207 Set Replication Bandwidth Set Replication Bandwidth To limit the bandwidth used by a system, use the replication option set bandwidth operation. replication option set bandwidth rate • The rate is an integer of bytes/second. • Use the replication disable command before changing the rate and use the replication enable command after changing the rate. Set Replication Network Delay To set a network delay value for the system, use the replication option set delay operation. replication option set delay value • The value is an integer of milliseconds. • Use the replication disable command before changing the delay and use the replication enable command after changing the delay. Reset Options To reset system bandwidth to the default of unlimited and delay or listen-port to the default of none, use the replication option reset operation. Use the replication disable command before making changes and use the replication enable command after making changes. replication option reset {bandwidth | delay | listen-port} Repair a Broken Recovery To re-synchronize source and destination restorers after a recovery operation is destroyed, use the replication abort recover command. Enter the command on the destination to synchronize the restorers and to restart the recovery operation. Running a filesys destroy command on the source during a recovery operation is an example of destroying a recovery. A break, such as a network connection down, does not destroy a recovery, which continues as expected when the break is repaired. replication abort recover destination 208 Restorer Operating System User Guide Display Throttle settings Display Throttle settings To display all scheduled throttle entries, rates, and the current rate, use the replication throttle show operation. replication throttle show [kb] The kb option displays the rate in kilobytes per second. Without the option, the rate is displayed in bits per second. The display is similar to the following: # replication throttle show kb Time Sun Mon Tue Wed Thu Fri Sat -----------------06:00 90 15:00 200 18:00 500 -----------------All units in KBps (1024 bytes (8192 bits) per second). Active schedule: Mon, 06:00 at 90 KBps. Display Bandwidth and Delay Settings To display the current bandwidth and delay settings, use the replication option show operation. If the current setting is the default of none, the operation returns to a command prompt with no setting information. replication option show {destination | all} Display Replicator Configuration To display the source and destination, the name of the other system in the Replicator pair, and the state of replication, use the show config operation. replication show config [destination | all] The display with no destination variable or all option is similar to the following: # replication show config CTX Source --- ----------------------------------1 dir://host2.company.com/backup/dir2 2 dir://host3.company.com/backup/dir3 --- ----------------------------------- Chapter 17: Replicator 209 Display Replication for Current Data Destination ----------------------------------dir://host3.company.com/backup/dir3 dir://host2.company.com/backup/dir2 ----------------------------------- Connection Host ----------------host3.company.com host3.company.com ----------------- Enabled ------Yes Yes ------The display with a destination variable is similar to the following. The all option returns a similar display for each context. # replication show Source: Destination: Connection Host: Enabled: config dir://host3.company.com/backup/dir2 dir://host2.company.com/backup/host2 dir://host3.company.com/backup/host2 ccm34.datadomain.com yes Display Replication for Current Data To display when data currently available for replication is completely replicated, use the replication sync option on the source restorer. replication sync The output’s current value represents data on the source that is yet to be replicated to the destination. The value represents only data available at the time the command is given. Data received after the command begins is not added to the output. When the current value is equal to or greater than the output’s sync_target value, replication is complete for all of the data that was available for replication at the time the command began. For example: # replication sync 0 files flushed. current=2832642 sync_target=2941532 head=2841234 210 Restorer Operating System User Guide Display Status Display Status To display Replicator configuration information and the status of replication operations, use the replication status operation. replication status [destination | all] With no option, the display is similar to the following: # replication status CTX Destination --- ----------------------------------1 dir://host2.company.com/backup/dir2 2 dir://host3.company.com/backup/dir3 --- ----------------------------------Connected ----------------Thu Jan 12 17:06 disconnected ----------------- Enabled ------yes yes ------- Lag -----00:00 698:32 ------ Enabled The enabled state (yes or no) of replication for each replication pair. Connected The most recent connection date and time or connection state for a replication pair. Lag The difference between the timestamp on the most recently executed record and the system clock time on the destination. Lag is not the time needed to complete replication. Lag can immediately drop from a high number to zero when the last record is processed. A generic message of "Less than 5 minutes" appears if the destination is either nearly caught up with data from the source or if the destination is caught up and synchronized and the source is not sending new data. Output from the replication show stats command shows whether or not any data remains to be sent from the source. With a destination variable, the display is similar to the following. The all option returns a similar display for each context. The displays include the information above plus: # replication status dir://host2.company.com/backup/dir2 Mode: source Destination: dir://ccm34.datadomain.com/backup/dir2 Enabled: yes Local filesystem status: enabled Connection: connected since Thu Jan 12 17:06:41 State: normal Error: no error Lag: less than 5 minutes Current throttle: unlimited Mode The role of the local system: source or destination. Chapter 17: Replicator 211 Display Statistics Local Filesystem Status The enabled/disabled status of he local file system. Connected Includes both the state and the date and time of the last change in the connection state. State The state of the replication process. Error A listing of any errors in the replication process. Current Throttle The current throttle setting. Display Statistics Replication statistics have the following columns: Bytes Sent The total number of bytes sent by this side to the other side of the Replicator pair. For the source, the value includes backup data, replication overhead, and network overhead. For the destination, the value includes replication overhead and network overhead. Use the value (and the next value, Bytes received) to estimate network traffic generated by replication. Bytes Received The total number of bytes received by this side from the other side of the Replicator pair. For the destination, the value includes backup data, replication overhead, and network overhead. For the source, the value includes replication overhead and network overhead. Use the value (and the previous value) to estimate network traffic generated by replication. Virtual Bytes The total number of bytes of backup data (before compression) replicated since the last time the restorer file system was enabled. Received Time The date and time of the most recent records received. Processed Time The date and time of the most recent records processed. Source Records Remaining The number of file operations (such as open, close, delete) that have happened on the source and that have not yet been sent to the destination. If a lot of content is being sent for one file, a number of file operations (for deleted files, for example) may accrue while waiting. As the operations are a relatively small amount of data, the number in this column can fall quickly when the operations are sent to the destination. Dest Records Remaining The number of file operations received by the destination and not yet processed. With directory replication, the value is always 0 (zero). Compressed data remaining New data on the source that is not yet sent to the destination. Display To display Replicator statistics for all replication pairs or for a specific destination pair, use the replication show stats operation. replication show stats [destination | all] 212 Restorer Operating System User Guide Display Statistics The display with no destination or all option is similar to the following: # replication show stats CTX Destination ------------------------------------1 dir://host2.company.com/backup/dir2 2 dir://host3.company.com/backup/dir3 ------------------------------------Bytes Received ---------1974621040 0 ---------- Virtual Bytes -------------11115121593320 0 -------------- Source Records Remaining -------------0 0 -------------- Bytes Sent -----------153687473704 0 ------------ Received Time ---------------Fri Jan 13 09:37 Wed Dec 31 16:00 ---------------- Dest Records Remaining -----------0 0 ------------ Processed Time ---------------Fri Jan 13 09:37 Wed Dec 31 16:00 ---------------- Compressed Data Remaining -------------0 0 -------------- With a destination variable, the display is similar to the following. The all option returns a similar display for each context: # replication show stats rctx://1 CTX: 1 Destination: dir://host2.company.com/backup/dir2 Bytes sent: 153687473704 Bytes received: 1974621040 Virtual bytes replicated: 11115121593320 Destination records remaining: 0 Source records remaining: 0 Compressed data remaining: 0 Chapter 17: Replicator 213 Hostname Shorthand Hostname Shorthand With all Replicator commands that use a hostname to identify the source or destination, the hostname can be left out if the hostname refers to the local system. Use the same three slashes ( /// ) that would bracket the hostname if the hostname was included. For example, the replication add command when given on the source restorer could be entered in either of the following ways: replication add source dir://hostA/backup/dir2 destination dir://hostB/backup/dir2 replication add source dir:///backup/dir2 destination dir://hostB/backup/dir2 The same command given on the destination restorer could be done in either of the following ways: replication add source dir://hostA/backup/dir2 destination dir://hostB/backup/dir2 replication add source dir://hostA/backup/dir2 destination dir:///backup/dir2 Use the same format with collection replication. Add a third slash, even though a third slash is not otherwise used with collection replication. For example, the replication add command for collection replication entered on the source could be done in either of the following ways: replication add source col://hostA destination col://hostB replication add source col:/// destination col://hostB Procedure: Set Up and Start Directory Replication To set up directory replication using restorers hostA and hostB for a directory named dir2: • Run the following command on both the source and destination restorers: replication add source dir://hostA/backup/dir2 destination dir://hostB/backup/dir2 • Run the following command on the source. The command checks that both restorers in the pair can communicate and starts all Replicator processes. If a problem appears, such as that communication between the restorers is not possible, you do not need to re-initialize after fixing the problem. Replication should begin as soon as the restorers can communicate. replication initialize 214 Restorer Operating System User Guide Procedure: Set Up and Start Collection Replication Procedure: Set Up and Start Collection Replication To set up and start collection replication between two restorers, hostA and hostB: • Run the following command on both the source and destination restorers: filesys disable • If the destination holds any data, run the following command on the destination: filesys destroy • Run the following command on both the source and destination restorers. See “Configure Replicator” on page 200 for the details of using the command: replication add source col://hostA destination col://hostB • Run the following command on both the source and destination restorers: filesys enable • Run the following command on the source. The command checks that both restorers in the pair can communicate and starts all Replicator processes. If a problem appears, such as that communication between the restorers is not possible, you do not need to re-initialize after fixing the problem. Replication should begin as soon as the restorers can communicate. replication initialize Procedure: Set Up and Start Bidirectional Replication To set up and start directory replication for dir2 from hostA to hostB and for dir1 from hostB to hostA: • Run both of the following commands on hostA and hostB: replication add source dir://hostA/backup/dir2 destination dir://hostB/backup/dir2 replication add source dir://hostB/backup/dir1 destination dir://hostA/backup/dir1 • Run the following command on hostA. replication initialize dir://hostB/backup/dir2 • Run the following command on hostB. replication initialize dir://hostA/backup/dir1 Chapter 17: Replicator 215 Procedure: Set Up and Start Many-to-One Replication Procedure: Set Up and Start Many-to-One Replication To set up and start directory replication for directories from hostA and hostB to hostC: • Run the following command on hostA and hostC: replication add source dir://hostA/backup/dir2 destination dir://hostC/backup/dir2 • Run the following command on hostB and hostC: replication add source dir://hostB/backup/dir1 destination dir://hostC/backup/dir1 • Run the following command on hostA. replication initialize dir://hostC/backup/dir2 • Run the following command on hostB. replication initialize dir://hostC/backup/dir1 Procedure: Replace a Directory Source - New Name If the source (hostA) for directory replication is replaced or changed out, use the following commands to integrate (with hostB) a new source that uses a new name (hostC). • If the new source has any data in the target directories, delete all data from the directories: • Run the following commands on the destination: filesys disable replication modify dir://hostB/backup/dir2 source-host hostC replication reauth dir://hostB/backup/dir2 filesys enable • Run the following commands on the new source: replication add source dir://hostC/backup/dir2 destination dir://hostB/backup/dir2 replication recover dir://hostB/backup/dir2 • 216 Use the following command to see when the recovery is complete. Note the State entry in the output. State is normal when recovery is done and recovering while recovery is in progress. Also, a messages log file entry, replication recovery completed is sent when the process is complete. The byte count may be equal on both sides, but the recovery is not complete until data integrity is verified. The recovering directory is read-only until recovery finishes. Restorer Operating System User Guide Procedure: Replace a Collection Source - Same Name # replication status dir://hostC/backup/dir2 CTX: 2 Mode: source Destination: dir://hostC/backup/dir2 Enabled: yes Local filesystem status: enabled Connection: connected since Sat Apr State: recovering Error: no error Destination lag: less than 5 minutes Current throttle: unlimited 8 23:38:11 Procedure: Replace a Collection Source - Same Name If the source (hostA) for collection replication is replaced or changed out, use the following commands to integrate (with hostB) a new source that uses the same name as the previous source. • If the new source was using the VTL feature, use the following command on the source: vtl disable • If the new source has any data in its file system, run the following command on the source to clear all data from the file system: filesys destroy • Run the following commands on the destination: filesys disable replication reauth filesys enable • Run the following commands on the new source: replication add source col://hostA destination col://hostB replication recover • See the last bullet in the previous procedure for checking the progress of the recovery. Chapter 17: Replicator 217 Procedure: Convert from Collection to Directory Procedure: Convert from Collection to Directory Convert a collection replication pair (source is hostA, destination is hostB) to directory replication: • Run the following commands on both of the collection replication systems: filesys disable replication break col://hostB filesys enable • On the destination, hostB, move everything that is under /backup to /backup/old. • Run the following command on both systems: replication add source dir://hostA/backup destination dir://hostB/backup/hostA • Run the following command on the source system: replication initialize dir://hostB/backup/hostA • After the initialization completes, remove /backup/old. Procedure: Seeding A restorer that already holds data in its file system can be used as a source restorer for replication. Part of setting up replication with such a restorer is to transfer the current data on the source restorer to the destination restorer. The procedure for the transfer is called seeding. As seeding over a WAN may need large amounts of bandwidth and time, Data Domain provides alternate seeding procedures for the following replication configurations: 218 • One-to-one One source restorer replicates data to one destination restorer. Replication can be collection or directory type. • Bidirectional A source restorer, such as ddr01, replicates data to the destination ddr02. At the same time, ddr02 is a source for replication to ddr01. Each restorer is a source for its own data and a destination for the other restorer’s data. Bidirectional replication can be directory replication only. • Many-to-one More than one source restorer replicates data to a single destination restorer. Many-to-one replication can be directory replication only. Restorer Operating System User Guide Procedure: Seeding One-to-One For collection replication, the destination restorer file system must be empty. In the following example, ddr01 is the source restorer and ddr02 is the destination. 1. Ship the destination restorer (ddr02) to the source restorer (ddr01) site. 2. Follow the standard Data Domain installation process to install the destination restorer. 3. Connect the restorers with a direct link to cut down on initialization time. 4. Boot up the destination restorer. (The source restorer should already be in service.) 5. Enter the following command on both restorers: # filesys disable 6. Enter a command similar to the following on both restorers: # replication add source col://ddr01.company.com destination col://ddr02.company.com 7. Enter the following command on both restorers: # filesys enable 8. On the source, enter a command similar to the following. If the source holds a lot of data, the initialize operation can take many hours. # replication initialize col://ddr02.company.com 9. Wait for initialization to complete. Output from the replication initialize command details initialization progress. 10. On the destination, enter the following command: # system poweroff 11. Move the destination restorer to its permanent location, company2.com in this example. 12. Boot up the destination restorer. 13. On the destination restorer, run the config setup command and make any needed changes. For example, the system hostname is a fully-qualified domain name that may be different in the new location. Chapter 17: Replicator 219 Procedure: Seeding 14. On ddr02, enter commands similar to the following to change the replication destination host to the new hostname: # filesys disable # replication modify col://ddr02.company.com destination-host ddr02.company2.com # filesys enable 15. :On ddr01, enter commands similar to the following to change the destination host to the new hostname: # filesys disable # replication modify col://ddr02.company.com destination-host ddr02.company2.com # filesys enable For directory replication, the source directory must exist and the destination directory must be empty. In the following example, ddr01 is the source restorer and ddr02 is the destination. 1. Ship the destination restorer (ddr02) to the source restorer (ddr01) site, company.com in this example. 2. Follow the standard Data Domain installation process to physically install ddr02. 3. Connect the restorers with a direct link to cut down on initialization time. 4. Boot up ddr02. (The source restorer should already be in service.) 5. Configure ddr02 using the standard Data Domain process. 6. Enter a command similar to the following on both restorers: # replication add source dir://ddr01.company.com/backup/data01 destination dir://ddr02.company.com/backup/data01 7. On ddr01, enter a command similar to the following. If the source holds a lot of data, the initialize operation can take many hours. # replication initialize dir://ddr02.company.com/backup/data01 8. Wait for initialization to complete. Output from the replication initialize command details initialization progress. 220 Restorer Operating System User Guide Procedure: Seeding 9. On ddr02, enter the following command: # system poweroff 10. Move ddr02 to its permanent location, company2.com in this example. 11. Boot up the destination restorer. 12. On ddr02, run the config setup command and make any needed changes, such as hostname, which is a fully-qualified domain name that may be different in the new location. 13. On ddr02, enter commands similar to the following to change the replication destination host to the new hostname: # filesys disable # replication modify dir://ddr02.company.com/backup/data01 destination-host ddr02.company2.com # filesys enable 14. On ddr01, enter commands similar to the following to change the destination host to the new hostname: # filesys disable # replication modify dir://ddr02.company.com/backup/data01 destination-host ddr02.company2.com # filesys enable Bidirectional With bidirectional replication, the seeding process uses three restorers: one permanent restorer at each customer site and one temporary restorer that is physically moved from one site to another. Bidirectional replication must use directory-type replication. For directory replication, the source directory must exist and the destination directory must be empty. The instructions below use the name ddr01 for the first permanent restorer that is replicated, ddr02 for the second permanent restorer that is replicated, and ddr-temp for the restorer that is moved from one site to another. Bidirectional replication is done in eight phases: • Copy source data from the first permanent restorer (ddr01) to the temporary restorer (ddr-temp). • Move ddr-temp to the site of the second permanent restorer (ddr02). • Transfer the ddr01 source data from ddr-temp to ddr02. Chapter 17: Replicator 221 Procedure: Seeding • Setup and start replication between ddr01 and ddr02 for ddr01 source data. • Copy the ddr02 source data to ddr-temp • Move ddr-temp back to the ddr01 site. • Transfer the ddr02 source data to ddr01. • Setup and start replication between ddr02 and ddr01 for ddr02 source data. Copy source data from the first restorer (ddr01): 1. Ship the temporary restorer (ddr-temp) to the ddr01 site, company.com in this example. 2. Follow the standard Data Domain hardware installation process to physically setup ddr-temp. 3. Connect ddr01 and ddr-temp with a direct link to cut down on initialization time. 4. Boot up ddr-temp. (Ddr01 should already be in service.) 5. Configure ddr-temp using the standard Data Domain command config setup. 6. Enter a command similar to the following on both restorers. Note the use of an added temp directory for the destination. # replication add source dir://ddr01.company.com/backup/data01 destination dir://ddr-temp.company.com/backup/temp/data01 7. On ddr01, enter a command similar to the following. # replication initialize dir://ddr-temp.company.com/backup/temp/data01 8. Wait for initialization to finish. If ddr01 holds a lot of data, the initialize operation can take many hours. Output from the replication initialize command details initialization progress. 9. On ddr01 and ddr-temp, enter commands similar to the following to break replication: # filesys disable # replication break dir://ddr-temp.company.com/backup/temp/data01 # filesys enable 10. On ddr-temp, enter the following command: # system poweroff 222 Restorer Operating System User Guide Procedure: Seeding Move the temporary restorer. 1. Move ddr-temp to the ddr02 site, company2.com in this example. 2. Follow the standard Data Domain hardware installation process to physically set up ddr-temp. 3. Connect ddr02 and ddr-temp with a direct link to cut down on initialization time. 4. Boot up ddr-temp. (Ddr02 should already be in service.) 5. On ddr-temp, run the config setup command and make any needed changes, such as hostname, which is a fully-qualified domain name that may be different in the new location. Transfer the ddr01 source data from ddr-temp to ddr02. 1. Set up replication with ddr-temp as the source and ddr02 as the destination. Enter a command similar to the following on both ddr-temp and ddr02. Note that the added temp directory is used for both source and destination. # replication add source dir://ddr-temp.company2.com/backup/temp/data01 destination dir://ddr02.company2.com/backup/temp/data01 2. On ddr-temp, enter a command similar to the following to transfer data to ddr02: # replication initialize dir://ddr02.company2.com/backup/temp/data01 3. Wait for initialization to finish. If ddr-temp holds a lot of data, the initialize operation can take many hours. Output from the replication initialize command details initialization progress. 4. On ddr-temp and ddr02, enter commands similar to the following to break replication: # filesys disable # replication break dir://ddr02.company2.com/backup/temp/data01 # filesys enable Chapter 17: Replicator 223 Procedure: Seeding Setup and start replication between ddr01 and ddr02 for data from ddr01. Note that the temp directory is NOT used for either the source or the destination. 1. Enter a command similar to the following on both ddr01 and ddr02 to set up replication: # replication add source dir://ddr01.company.com/backup/data01 destination dir://ddr02.company2.com/backup/data01 2. On ddr01, enter a command similar to the following to initialize replication. The initialization process should take a short time as the process transfers only metadata and backup application data that is new since data was transferred to ddr-temp. The metadata goes to the specified location on ddr02, in this example: /backup/data01. Backup application data that was transferred from ddr-temp to ddr02 remains on ddr02 and is not replicated again. # replication initialize dir://ddr02.company2.com/backup/data01 3. Wait for initialization to finish. Output from the replication initialize command details initialization progress. 4. If ddr-temp has space for the current ddr01 data and space for the ddr02 data, leave ddr-temp as is. Take into account that any common data between the two data sets gets compressed on ddr-temp, using less space. If ddr-temp does not have enough space for both sets of data, mount or map the ddr-temp directory /backup from another system and delete /temp. Copy the ddr02 source data to ddr-temp. ddr-temp should still be installed at the ddr02 site and communicating with ddr02. 1. Enter a command similar to the following on both restorers. Note the use of the added temp directory for both the source and the destination. # replication add source dir://ddr02.company2.com/backup/temp/data02 destination dir://ddr-temp.company2.com/backup/temp/data02 2. On ddr02, enter a command similar to the following. # replication initialize dir://ddr-temp.company2.com/backup/temp/data02 3. Wait for initialization to finish. If ddr02 holds a lot of source data, the initialize operation can take many hours. Output from the replication initialize command details initialization progress. 224 Restorer Operating System User Guide Procedure: Seeding 4. On ddr01 and ddr-temp, enter commands similar to the following to break replication: # filesys disable # replication break dir://ddr-temp.company2.com/backup/temp/data02 # filesys enable 5. On ddr-temp, enter the following command: # system poweroff Move the temporary restorer. 1. Move ddr-temp back to the ddr01 site. 2. Follow the standard Data Domain hardware installation process to physically setup ddr-temp. 3. Connect ddr01 and ddr-temp with a direct link to cut down on initialization time. 4. Boot up ddr-temp. (Ddr01 should already be in service.) 5. On ddr-temp, run the config setup command and make any needed changes, such as hostname, which is a fully-qualified domain name that may be different in the current location. Transfer the ddr01 source data from ddr-temp to ddr02. 1. Set up replication with ddr-temp as the source and ddr01 as the destination. Enter a command similar to the following on both ddr-temp and ddr01. Note that the added temp directory is used for both source and destination. # replication add source dir://ddr-temp.company.com/backup/temp/data02 destination dir://ddr01.company.com/backup/temp/data02 2. On ddr-temp, enter a command similar to the following to transfer the ddr02 source data to ddr01: # replication initialize dir://ddr01.company.com/backup/temp/data02 3. Wait for initialization to finish. If ddr-temp holds a lot of data, the initialize operation can take many hours. Output from the replication initialize command details initialization progress. Chapter 17: Replicator 225 Procedure: Seeding 4. On ddr01 and ddr-temp, enter commands similar to the following to break replication: # filesys disable # replication break dir://ddr01.company.com/backup/temp/data02 # filesys enable Setup and start replication between ddr02 and ddr01 for data from ddr02. Note that the temp directory is NOT used for either the source or the destination. 1. Enter a command similar to the following on both ddr02 and ddr01 to set up replication: # replication add source dir://ddr02.company2.com/backup/data02 destination dir://ddr01.company.com/backup/data02 2. On ddr02, enter a command similar to the following to initialize replication. The initialization process should take a short time as the process transfers only metadata and backup application data that is new since data was transferred to ddr-temp. The metadata goes to the specified location on ddr01, in this example: /backup/data02. Backup application data that was transferred from ddr-temp to ddr01 remains on ddr01 and is not replicated again. # replication initialize dir://ddr01.company.com/backup/data02 3. Wait for initialization to finish. Output from the replication initialize command details initialization progress. 4. On ddr02, mount or map the directory /backup from another system and delete /temp. 5. On ddr01, mount or map the directory /backup from another system and delete /temp. Many-to-One With many-to-one replication, the seeding process uses a temporary restorer to receive data from each source restorer site. The temporary restorer is physically moved from one source site to another and then moved to the destination restorer site. Many-to-one replication must use directory-type replication. For directory replication, the source directory must exist and the destination directory must be empty. The instructions below use the name ddr01 for the first restorer that is replicated, ddr02 for the second restorer that is replicated, ddr-dest for the single destination restorer, and ddr-temp for the restorer that is moved from site to site. 226 Restorer Operating System User Guide Procedure: Seeding Many-to-one replication is done in six phases for the example in this section: • Copy source data from the first source restorer (ddr01) to the temporary restorer (ddr-temp). • Move ddr-temp to the second source restorer (ddr02) site. • Copy source data from ddr02 to ddr-temp. • Move ddr-temp to the site of the destination restorer (ddr-dest). • Transfer the ddr01 and ddr02 source data from ddr-temp to ddr-dest. • Setup and start replication between ddr01 and ddr-dest and between ddr02 and ddr-dest. Copy source data from the first restorer (ddr01): 1. Ship the temporary restorer (ddr-temp) to the ddr01 site, company.com in this example. 2. Follow the standard Data Domain hardware installation process to physically setup ddr-temp. 3. Connect ddr01 and ddr-temp with a direct link to cut down on initialization time. 4. Boot up ddr-temp. (Ddr01 should already be in service.) 5. Configure ddr-temp using the standard Data Domain command config setup. 6. Enter a command similar to the following on both restorers. Note the use of an added temp directory for the destination. # replication add source dir://ddr01.company.com/backup/data01 destination dir://ddr-temp.company.com/backup/temp/data01 7. On ddr01, enter a command similar to the following. # replication initialize dir://ddr-temp.company.com/backup/temp/data01 8. Wait for initialization to finish. If ddr01 holds a lot of data, the initialize operation can take many hours. Output from the replication initialize command details initialization progress. 9. On ddr01 and ddr-temp, enter commands similar to the following to break replication: # filesys disable # replication break dir://ddr-temp.company.com/backup/temp/data01 # filesys enable Chapter 17: Replicator 227 Procedure: Seeding 10. On ddr-temp, enter the following command: # system poweroff Move the temporary restorer to the second (ddr02) source site. 1. Move ddr-temp to the ddr02 site, company2.com in this example. 2. Follow the standard Data Domain hardware installation process to physically set up ddr-temp. 3. Connect ddr02 and ddr-temp with a direct link to cut down on initialization time. 4. Boot up ddr-temp. (Ddr02 should already be in service.) 5. On ddr-temp, run the config setup command and make any needed changes, such as hostname, which is a fully-qualified domain name that may be different in the new location. Copy source data from the second source restorer (ddr02): 1. Enter a command similar to the following on ddr-temp and ddr02. Note the use of an added temp directory for the destination. # replication add source dir://ddr02.company2.com/backup/data02 destination dir://ddr-temp.company2.com/backup/temp/data02 2. On ddr02, enter a command similar to the following. # replication initialize dir://ddr-temp.company2.com/backup/temp/data02 3. Wait for initialization to finish. If ddr02 holds a lot of data, the initialize operation can take many hours. Output from the replication initialize command details initialization progress. 4. On ddr02 and ddr-temp, enter commands similar to the following to break replication: # filesys disable # replication break dir://ddr-temp.company2.com/backup/temp/data02 # filesys enable 5. On ddr-temp, enter the following command: # system poweroff 228 Restorer Operating System User Guide Procedure: Seeding Move the temporary restorer to the destination (ddr-dest) site. 1. Move ddr-temp to the ddr-dest site, company3.com in this example. 2. Follow the standard Data Domain hardware installation process to physically set up ddr-temp. 3. Connect ddr-dest and ddr-temp with a direct link to cut down on initialization time. 4. Boot up ddr-temp. (Ddr-dest should already be in service.) 5. On ddr-temp, run the config setup command and make any needed changes, such as hostname, which is a fully-qualified domain name that may be different in the new location. Transfer the ddr01 and ddr02 source data from ddr-temp to ddr-dest. 1. Set up a replication context with ddr-temp as the source and ddr-dest as the destination. Enter a command similar to the following on both ddr-temp and ddr-dest. Note that the added temp directory is used for both sources and destinations. # replication add source dir://ddr-temp.company3.com/backup/temp destination dir://ddr-dest.company3.com/backup/temp 2. On ddr-temp, enter a command similar to the following to transfer the ddr01 and ddr02 source data to ddr-dest: # replication initialize dir://ddr-dest.company3.com/backup/temp 3. Wait for initialization to finish. If ddr-temp holds a lot of data, the initialize operation can take many hours. Output from the replication initialize command details initialization progress. 4. On ddr-dest and ddr-temp, enter commands similar to the following to break replication: # filesys disable # replication break dir://ddr-dest.company3.com/backup/temp # filesys enable Chapter 17: Replicator 229 Procedure: Seeding Setup and start replication between ddr01 and ddr-dest and between ddr02 and ddr-dest. Note that the temp directory is NOT used for either the sources or the destinations. 1. Enter a command similar to the following on both ddr01 and ddr-dest to set up ddr01 replication: # replication add source dir://ddr01.company.com/backup/data01 destination dir://ddr-dest.company3.com/backup/data01 2. Enter a command similar to the following on both ddr02 and ddr-dest to set up ddr02 replication: # replication add source dir://ddr02.company2.com/backup/data02 destination dir://ddr-dest.company3.com/backup/data02 3. On ddr01, enter a command similar to the following to initialize replication. The initialization process should take a short time as the process transfers only metadata and backup application data that is new since data was transferred to ddr-temp. The metadata goes to the specified location on ddr-dest, in this example: /backup/data01. Backup application data that was transferred from ddr-temp to ddr-dest remains on ddr-dest and is not replicated again. # replication initialize dir://ddr-dest.company3.com/backup/data01 4. On ddr02, enter a command similar to the following to initialize replication. The initialization process should take a short time as the process transfers only metadata and backup application data that is new since data was transferred to ddr-temp. The metadata goes to the specified location on ddr-dest, in this example: /backup/data02. Backup application data that was transferred from ddr-temp to ddr-dest remains on ddr-dest and is not replicated again. # replication initialize dir://ddr-dest.company3.com/backup/data02 5. Wait for initialization to finish. Output from the replication initialize command details initialization progress. 6. On ddr-dest, mount or map the directory /backup from another system and delete the temporary directory. 230 Restorer Operating System User Guide Backup/Restore Using NDMP 18 The NDMP (Network Data Management Protocol) feature allows direct backup and restore operations between an NDMP Version 2 data server (such as a Network Appliance™ filer with the ndmpd daemon turned on), and a restorer. NDMP software on the restorer acts, through the command line interface, to provide Data Management Application (DMA) and NDMP server functionality for the filer. The ndmp command on the restorer manages NDMP operations. Add a Filer To add to the list of filers available to the restorer, use the ndmp add operation. The user name is a user on the filer and is used by the restorer when contacting the filer. The password is for the user name on the filer. With no password, the command returns a prompt for the password. Note that any add operation for a filer name that already exists replaces the complete entry for that filer name. A password can include any printable character. Administrative users only. ndmp add filer_name user username [password password] For example, to add a filer named toaster5 using a user name of back2 with a password of pw1212: # ndmp add toaster5 user back2 password pw1212 Remove a Filer To remove a filer from the list of servers available to the restorer, use the ndmp delete operation. Administrative users only. ndmp delete filer_name For example, to delete a filer named toaster5: # ndmp delete toaster5 231 Backup from a Filer Backup from a Filer To backup data from a filer to a file on a restorer, use the ndmp get operation. Administrative users only. ndmp get [incremental level] filer_name:src_path dst_path filer_name The name of the filer that holds the information for the backup operation. src_path The directory to backup from the filer. dst_path The destination file for the backup data on the restorer. incremental level The numeric level for an incremental backup using a number between 0 (zero) and 9. Using any level greater than 0 backs up only changes since the latest previous backup of the same src_path with a lower numbered level. Using the get operation without the incremental option is the same as a level 0, or full, backup. For example, the following command opens a connection to a filer named toaster5 and returns all data under the directory /vol/vol0. The data is stored in a file located at /backup/toaster5/week0 on the restorer. # ndmp get toaster5:/vol/vol0 /backup/toaster5/week0 The following incremental backup backs up changes since the last full backup. # ndmp get incremental 1 toaster5:/vol/vol0 \ /backup/toaster5/week0.day1 Restore to a Filer To restore data from a restorer to a filer, use one of the ndmp put operations. Note that a filer may report a successful restore even when one or more files failed restoration. For details, always review the LOG messages sent by the filer. Administrative users only. ndmp put src_file filer_name:dst_path ndmp put partial src_file subdir filer_name:dst_path partial Restore a particular directory or file from within a backup file on the restorer. Give the path to the file or subdirectory. src_file The file on the restorer from which to do a restore to a filer. The src_file argument must always begin with /backup. filer_name The NDMP server to which to send the restored data. 232 Restorer Operating System User Guide Remove Filer Passwords dst_path The destination for the restored data on the NDMP server. Some filers require that subdir be relative to the path used during the ndmp get that created the backup. For example, if the get operation was for everything under the directory /a/b/c in a tree of /a/b/c/d/e, then the put partial subdirectory argument should start with /d. On some filers, dst_path must end with subdir. The following command restores data from the restorer file /backup/toaster5/week0 to /vol/vol0 on the filer toaster5. # ndmp put /backup/toaster5/week0 toaster5:/vol/vol0 The following command restores the file .../jsmith/foo from the week0 backup. # ndmp put partial jsmith/foo /backup/toaster5/week0 toaster5:/vol/vol0/jsmith/foo Remove Filer Passwords To remove all filer entries, including the associated user names and passwords stored on the restorer, and to write zeros to the disk areas that held them, use the ndmp reset filers operation. Administrative users only. ndmp reset filers Stop an NDMP Process To stop an NDMP process on the restorer, use the ndmp stop operation. The pid is the PID (process ID) number shown for the process in the ndmp status display. A stopped process is cancelled. To restart a process, begin the process again with the get or put commands. Administrative users only. ndmp stop pid Stop All NDMP Processes To stop all NDMP processes on a restorer, use the ndmp stop all operation. Administrative users only. ndmp stop all Chapter 18: Backup/Restore Using NDMP 233 Check for a Filer Check for a Filer To check that a filer is known, use the ndmp test operation to display a filer authentication token. ndmp test filer Display Known Filers To display all filers available to the restorer, use the show filers operation. Administrative users only. ndmp show filers For example: # ndmp show filer filer name:password ------------------filer1 root:****** filer2 root:****** toaster root:****** Display NDMP Process Status To display the status of current NDMP processes on the restorer, use the ndmp status operation. The operation labels each process with an identification number. Administrative users only. ndmp status The display looks similar to the following and shows the process ID, the command that is currently running, and the total number of megabytes transferred. The following example shows the command entered twice in a row. Note that MB Copied shows the progress of the operation. # ndmp status PID MB Copied --- -------715 3267 Command ------------------------------------------------get filer1:/vol/vol0/etc /backup/filer1/dumpfile1 # ndmp status PID MB Copied --- --------715 4219 234 Command ------------------------------------------------get filer1:/vol/vol0/etc /backup/filer1/dumpfile1 Restorer Operating System User Guide SNMP Management and Monitoring 19 The SNMP (Simple Network Management Protocol) feature allows a restorer to respond to a set of SNMP “get” operations from a remote machine. From an SNMP perspective, a restorer is a read-only device with the following exceptions: A remote machine can set the SNMP location, contact, and system name on a restorer. To configure community strings, hosts, and other SNMP variables on the restorer, use the snmp command. With one or more trap hosts defined, a restorer takes the additional action of sending alerts messages as SNMP traps, even when the SNMP agent is disabled. Note The SNMP sysLocation and sysContact variables are not the same as those set with the config set location and config set admin-email commands. However, if the SNMP variables are not set with the SNMP commands, the variables default to the system values given with the config set commands. Enable SNMP To enable the SNMP agent on a restorer, use the snmp enable operation. The default port that is opened when SNMP is enabled is port 161. Traps are sent to port 162. Administrative users only. snmp enable Disable SNMP To disable the SNMP agent on a restorer, use the snmp disable operation. Ports 161 and 162 are closed. Administrative users only. snmp disable 235 Set the System Location Set the System Location To set the system location as used in the SNMP MIB II System variable sysLocation, use the snmp set sysLocation operation. Administrative users only. snmp set sysLocation location For example, to give a location of bldg3-rm222: # snmp set sysLocation bldg3-rm222 Reset the System Location To reset the system location to the system value displayed by the command system show location or an empty string if the system value is empty, use the snmp reset sysLocation operation. Administrative users only. snmp reset sysLocation Set a System Contact To set the system contact as used in the SNMP MIB II System variable sysContact, use the snmp set sysContact operation. Administrative users only. snmp set sysContact contact For example, to give a contact of bob-smith: # snmp set sysContact bob-smith Reset a System Contact To reset the system contact to the system value displayed by the command system show admin-email or an empty string if the system value is empty, use the snmp reset sysContact operation. Administrative users only. snmp reset sysContact 236 Restorer Operating System User Guide Add a Trap Host Add a Trap Host To add a trap host to the list of machines that receive SNMP traps generated by the restorer, use the snmp add trap-host operation. With one or more trap hosts defined, alerts messages are also sent as traps, even when the SNMP agent is disabled. Administrative users only. snmp add trap-host hostname For example, to add a trap host admin12: # snmp add trap-host admin12 Delete a Trap Host To delete one or more trap hosts from the list of machines that receive SNMP traps generated by the restorer, use the snmp del trap-host operation. Administrative users only. snmp del trap-host hostname For example, to delete a trap host admin12: # snmp del trap-host admin12 Delete All Trap Hosts To return the trap hosts list to the default of empty, use the snmp reset trap-host operation. Administrative users only. snmp reset trap-hosts Add a Community String To add one or more community strings that enable access to a restorer, use one of the snmp add community operations. One operation gives read/write permissions and one gives read-only permission. A common string for read/write access is private. A common string for read-only access is public. Administrative users only. snmp add rw-community community-string snmp add ro-community community-string For example, to add a community string of private with read/write permissions: # snmp add rw-community private Chapter 19: SNMP Management and Monitoring 237 Delete a Community String Delete a Community String To delete one or more community strings that enable access to a restorer, use one of the snmp del community operations. One operation deletes community strings that have read/write permissions and one deletes those that have read-only permission. Administrative users only. snmp del rw-community community-string snmp del ro-community community-string For example, to delete the community string private that gives read/write permissions: # snmp del rw-community private Delete All Community Strings To return the community strings lists to the defaults of empty, use one of the snmp reset community operations. One operation resets the read/write permissions list and one resets the read-only permissions list. Administrative users only. snmp reset rw-community snmp reset ro-community Reset All SNMP Values To return all SNMP values to the defaults, use the snmp reset operation. Administrative users only. snmp reset Display SNMP Agent status The status of the SNMP agent on the restorer is either enabled or disabled. Display To display the status of the SNMP agent on a restorer (enabled or disabled), use the snmp status operation o click SNMP in the left panel of the Data Domain Enterprise Manager. snmp status 238 Restorer Operating System User Guide Display Trap Hosts Display Trap Hosts To display the trap host list on a restorer, use the snmp show trap-hosts operation. snmp show trap-hosts The output is similar to the following: # snmp show trap-hosts Trap Hosts: admin10 admin11 Display All Parameters The SNMP configuration entries set by an administrator are: • sysLocation The system location as used in the SNMP MIB II System variable sysLocation. • sysContact The system contact as used in the SNMP MIB II System variable sysContact. • Trap Hosts The list of machines that receive SNMP traps generated by the restorer. • Read-only Communities One or more read-only community strings that enable access to the restorer • Read-write Communities One or more read-write community strings that enable access to the restorer. Display To display all of the SNMP parameters, use the snmp show config operation. Administrative users only. snmp show config The output is similar to the following: # snmp show config ---------------------SNMP sysLocation SNMP sysContact Trap Hosts Read-only Communities Read-write Communities ---------------------- Chapter 19: SNMP Management and Monitoring ------------------bldg3-rm222 [email protected] admin10 admin11 public snmpadmin23 private snmpadmin1 ------------------- 239 Display the System Contact Display the System Contact To display the system contact on a restorer, use the snmp show sysContact operation. snmp show sysContact Display the System Location To display the system location on a restorer, use the snmp show syslocation operation. snmp show sysLocation Display Community Strings To display the community strings on a restorer, use one of the snmp show communities operations. Administrative users only. snmp show rw-communities snmp show ro-communities The output is similar to the following: # snmp show rw-communities RW Community Strings: private snmpadmin1 Display the MIB and Traps The MIB display formats the complete management information base and SNMP traps. The traps are listed at the end of the file under the tag Common Notifications. You can download the MIB is by mounting the restorer /ddvar directory from another system. Use any SNMP MIB browser to view the downloaded MIB. The MIB location and name are: /ddvar/snmp/mibs/DATA_DOMAIN.mib Data Domain Enterprise Manager To view the MIB in the Data Domain Enterprise Manager graphical user interface, select SNMP from the left panel and find the SNMP MIB files section. Click on the DATA DOMAIN.mib link. 240 Restorer Operating System User Guide Log File Management 20 The log command allows you to view restorer log file entries and to save and clear the log file contents. Messages from the alerts feature, the autosupport reports, and general system messages go to the log directory and into the file messages. A log entry appears for each restorer command given on the system. The log directory is /ddvar/log. Every Sunday at 3 a.m., the restorer automatically opens new log files and renames the previous files with an appended number of 1 (one) through 9, such as messages.1. Each numbered file is rolled to the next number each week. For example, at the second week, the file messages.1 is rolled to messages.2. If a file messages.2 already existed, it would roll to messages.3. An existing messages.9 is deleted when messages.8 is rolled to messages.9. See “Procedure: Archive Log Files” on page 245 for instructions on saving log files. Scroll New Log Entries To display a view of the messages file that adds new entries as they occur, use the watch operation. Use the key combination <Control> c to break out of the watch operation. With no filename, the command displays the current messages file. log watch [filename] Send Log Messages to Another System Some log messages can be sent outside of a restorer to other systems. A restorer exports the following facility.priority selectors for log files. For managing the selectors and receiving messages on a third-party system, see your vendor-supplied documentation for the receiving system. • *.notice Sends all messages at the notice priority and higher. • *.alert Sends all messages at the alert priority and higher (alerts are included in *.notice). • kern.* Sends all kernel messages (kern.info log files). • local7.* Sends all messages from system startups (boot.log files). The log host commands manage the process of sending log messages to another system: 241 Send Log Messages to Another System Add a Host To add a system to the list that receives restorer log messages, use the log host add command. log host add host-name For example, the following command adds the system log-server to the hosts that receive log messages: # log host add log-server Remove a Host To remove a system from the list that receives restorer log messages, use the log host del command. log host del host-name For example, the following command removes the system log-server from the hosts that receive log messages: # log host del log-server Enable Sending Log Messages To enable sending log messages to other systems, use the log host enable command. log host enable Disable Sending Log Messages To disable sending log messages to other systems, use the log host disable command. log host disable Reset to Default To reset the log sending feature to the defaults of an empty list and disabled, use the log host reset command. log host reset 242 Restorer Operating System User Guide Display a Log File Display the List and State To display the list of systems that receive log messages and the state of enabled or disabled, use he log host show command. log host show The output is similar to the following: # log host show Remote logging is enabled. Remote logging hosts log-server Display a Log File To view the log files, use the log view operation. With no filename, the command displays the current messages file. When viewing the log, use the up and down arrows to scroll through the file; use the q key to quit; enter a slash character (/) and a pattern to search through the file. log view [filename] The display of the messages file is similar to the following. The last message in the example is an hourly system status message that the restorer generates automatically. The message reports system uptime, the amount of data stored, NFS operations, and the amount of disk space used for data storage (%). The hourly messages go to the system log and to the serial console if one is attached. # log view Jun 27 12:11:33 localhost rpc.mountd: authenticated unmount request from perfsun-g.datadomain.com:668 for /ddr/col1/segfs (/ddr/col1/segfs) Jun 27 12:28:54 localhost sshd(pam_unix)[998]: session opened for user jsmith10 by (uid=0) Jun 27 13:00:00 localhost logger: at 1:00pm up 3 days, 3:42, 52324 NFS ops, 84763 GB data col. (1%) Chapter 20: Log File Management 243 List Log Files List Log Files The basic log files are: access Tracks users of the Data Domain Enterprise Manager graphical user interface. boot.log Kernel diagnostic messages generated during the booting up process. ddfs.info Debugging information created by the file system processes. ddfs.memstat Memory debugging information for file system processes. destroy.id_number.log All of the actions taken by an instance of the filesys destroy command. Each instance produces a log with a unique ID number. disk-error-log Disk error messages. error Lists errors generated by the Data Domain Enterprise Manager operations. kern.error Kernel error messages. kern.info Kernel information messages. messages The system log, generated from restorer actions and general system operations. network Messages from network connection requests and operations. perf.log Performance statistics used by Data Domain support staff for system tuning. secure Messages from unsuccessful logins and changes to user accounts. (Not shown in the graphical user interface.) space.log Messages about disk space use by restorer components and data storage, and messages from the clean process. A space use message is generated every hour. Each time the clean process runs, it creates about 100 messages. All the messages are in comma-separatedvalue format with tags that you can use to separate out the disk space or clean messages. You can use third-party software to analyze either set of messages. The tags are: CLEAN for data lines from clean operations. CLEAN_HEADER for lines that contain headers for the clean operations data lines. SPACE for disk space data lines. SPACE_HEADER for lines that contain headers for the disk space data lines. ssi_request Messages from the Data Domain Enterprise Manager when users connect with HTTPS. windows Messages about CIFS-related activity from CIFS clients attempting to connect to the restorer. 244 Restorer Operating System User Guide Procedure: Archive Log Files Display To list all of the files in the log directory, use the log list operation or click Log Files in the left panel of the Data Domain Enterprise Manager. log list The list is similar to the following: # log list Last modified ----------------------Tue May 24 12:15:01 2005 Wed May 25 00:28:27 2005 Wed May 25 08:43:03 2005 Sun May 22 03:00:01 2005 Sun May 15 03:00:00 2005 Size ----3 KB 933 KB 42 KB 70 KB 111 KB File ------------boot.log ddfs.info messages messages.1 messages.2 Procedure: Archive Log Files To archive log files, use FTP to copy the files to another machine. 1. On the restorer, use the adminaccess show ftp command to see that the FTP service is enabled. If the service is not enabled, use the command adminaccess enable ftp. 2. On the restorer, use the adminaccess show ftp command to see that the FTP access list has the IP address of your remote machine or a class-C address that includes your remote machine. If the address is not in the list, use the command adminaccess add ftp <ipaddr>. 3. On the remote machine, open a web browser. 4. In the Address box at the top of the web browser, use FTP to access the restorer. For example: ftp://restorer_name.yourcompany.com/ Note Some web browsers do not automatically ask for a login if a machine does not accept anonymous logins. In that case, add a user name and password to the FTP line. For example: ftp://sysadmin:your-pw@restorer_name.yourcompany.com/ 5. At the login popup, log into the restorer as user sysadmin. 6. On the restorer, you are in the directory just above the log directory. Open the log directory to list the messages files. Chapter 20: Log File Management 245 Procedure: Archive Log Files 7. Copy the file that you want to save. Right-click on the file icon and select Copy To Folder from the menu. Choose a location for the file copy. 8. If you want the FTP service disabled on the restorer, use SSH to log into the restorer as sysadmin and give the command adminaccess disable ftp. 246 Restorer Operating System User Guide Hardware Servicing 21 Replacement of components in a restorer falls into two categories: general customer operations and trained service personnel operations. Replacing parts in the second category requires an awareness of electrical shock hazards and, in the case of cooling fans, possible mechanical hazards from rotating fan blades. Caution If the internal batteries on the adapter cards fail or internal fuses in the system fail, return the equipment to the manufacturer. The components are not to be serviced in the field. Customer Operations Customers can replace disks and power supplies in a restorer. Data Domain recommends timely replacement of components that generate error log messages for failures or are out of normal operating tolerances. Check with Data Domain Support staff for what constitutes excessive error messages and out-of-range operating tolerances. After an error message, a component can continue to degrade, leading to an automatic system shutdown. For example, the restorer generates a warning message if the interior temperature of the machine reaches 47 degrees centigrade. If the temperature reaches 50 degrees centigrade, the machine shuts down. As an addition to error log messages, you can check components by using the restorer command alerts show current, which includes messages about power supplies, disks, temperature extremes, and fans if anything is not within system specifications. Note If you see messages for components that are not replaced as a customer operation, contact the Data Domain field or Support staff. • The Temperature Extremes... summary displays information about CPU temperatures and contains an entry if the overall machine temperature is above an acceptable level. - If the overall temperature for the machine reaches 47 degrees centigrade, a warning message is generated. If the temperature reaches 50 degrees centigrade, the machine shuts down. 247 Customer Operations • If a CPU temperature reaches 60 degrees centigrade, a warning message is generated. If a CPU temperature reaches 74 degrees centigrade, the machine shuts down. If one or more fans have failed or are running below the minimum required speed, the Fan Failure ... summary lists the failed or failing fans. To replace a fan, see “Replace Fans” on page 256. Replace Disks Note Use only Data Domain Field Replaceable Units. Do not use disks from other sources. Spare disks are supplied in a carrier for a restorer or a carrier for an expansion shelf. DO NOT move a disk from one carrier to another. Data Domain recommends timely replacement of components that generate excessive error log messages or that are out of normal operating tolerances. To display details for disk hardware status, use the disk show reliability-data command. The display is similar to the following: # disk show reliability-data Disk ATA Bus Command Command Drive Soft Err Timeouts Faults Soft Err ------ -------- -------- ------- -------disk1 0 0 0/ 0/ 0 0/ 0 disk2 0 0 0/ 0/ 0 0/ 0 disk3 0 0 0/ 0/ 0 0/ 0 disk4 0 0 0/ 0/ 0 1/ 0 . . . Awaiting Realloc ------0 0 0 0 Already Realloc ------0 1 0 0 Temp ----28 C 35 C 30 C 27 C The Already Realloc column indicates the end of the useful disk lifetime when the value approaches the vendor-specific limit. The limit is 2000 for Maxtor Western Digital disks. Use the disk show hardware command to display the disk vendor. A restorer has either 8 or 15 disks, depending on the model. Each disk has two LEDs at the bottom of the disk carrier. The right LED on each disk flashes green whenever the system accesses the disk. The left LED glows red when the disk has failed. Both LEDs are dark on the disk that is available as a spare. A system maintains data integrity of all data in the file system with a maximum of two failed disks. 248 Restorer Operating System User Guide Customer Operations Figure 28 shows disk numbering as seen from the front of the restorer: 1 through 15, left to right. The numbering for models with 8 disks also starts with disk 1 at the left of the front of the restorer. Models with 8 disks include a blank faceplate that covers the area shown as disks 9 through 15 in Figure 28. Power button 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Figure 28: Disk numbering Note Return the failed/replaced disk to Data Domain. Reuse the packaging from the new disk and use the included prepaid waybill for shipping. Reference the RMA number on the outside of the package. Returns with no RMA number cannot be accepted. The system assigns a disk state to a replacement disk depending on the history of the disk. Use the disk show raid-info to display the state of all disks. • A Data Domain Field Replaceable Unit disk is labeled as Spare. • A failed disk that is removed and reinserted into the system is recognized as a failed disk and is labeled as Failed. • A disk that was on another restorer as a spare retains the state of Spare. • A disk that was on another restorer and that contained data is seen as Foreign. Use the disk unfail command to move the disk to the state of Spare. To replace a failed disk: 1. If a disk is not marked as Failed in output from the disk show raid-info command, use the following command (with the correct disk-id) to fail the disk. # disk fail disk-id 2. Identify the physical disk. The left LED on a failed disk is red. You can also use the following commands to identify a disk by name and then to flash the LED on the disk: # disk show raid-info # disk beacon disk-id 3. Remove the replacement disk from the packaging and remove the antistatic bag from the disk. Chapter 21: Hardware Servicing 249 Customer Operations 4. Put the antistatic bag on a flat surface and set down the replacement disk on the antistatic bag. 5. On the failed disk, push down on the disk’s locking tab to unhook the handle. See Figure 29. Handle Locking tab Figure 29: Locking tab 6. Pull on the handle to slide the disk out about an inch, until it unseats from the harness. 7. Wait for about 30 seconds for the disk to spin down and the heads to park and lock. Treat a failed disk carefully when removing the disk from the system and when shipping the disk back to Data Domain. 8. Gently remove the failed disk. 9. On the replacement disk, make sure that the handle is unlocked. Push down the locking tab if needed. See Figure 29. 10. With the handle remaining in the unlocked position, gently slide the replacement disk into the chassis until it stops short of being fully installed. Excessive force may damage the replacement disk. 11. The disk stops short because a lip on the bottom of the disk carrier meets a ridge near the back of the slot. Tilt the disk carrier so that the back of the carrier is tilted up to clear the ridge and slide the disk into the slot until you feel resistance. 12. Close the handle as you push the disk the rest of the way into the chassis. Be sure that the disk seats securely. 13. Use the following command (with the proper disk ID for the replaced disk) to move the disk to a known state: # disk unfail disk-id 250 Restorer Operating System User Guide Customer Operations 14. Use the following command to check that the disk is recognized by the restorer. In the command display, the disk State should be hot spare or the Additional Status should be reconstructing. # disk show raid-info 15. Return the removed disk in the antistatic bag and other packaging from the replacement disk. Copy the RMA number onto the packaging. Replace Power Units A restorer has three power supply units that are accessible from the back panel of the chassis (see Figure 30). A restorer needs a minimum of two functional power units to power up and to run. Always replace a failed power unit as soon as possible. The alerts show current command includes a message if a power unit fails. The system status command includes a line that gives the status of power supplies. To identify the failed unit, look at the back panel of the machine, and check the LED on each unit. Power units Figure 30: Power units Each power unit has an LED that glows green when the unit is functional. The LED glows orange if the unit has failed, but still has power. The LED is completely off if the unit has no power. In Figure 30, the pointers to the power units end at the LEDs near the top of each unit. Also, when a unit fails, the power unit failure LED on the front panel of the system glows red. See Figure 31 on page 252. Chapter 21: Hardware Servicing 251 Customer Operations Power unit failure indicator Figure 31: Power unit failure indicator on the front panel Note Return the failed/replaced power unit to Data Domain. Reuse the packaging from the new unit and use the included prepaid waybill for shipping. Reference the RMA number on the outside of the package. Returns with no RMA number cannot be accepted. Power units can be replaced while the system is running. As long as two power units are functional, you do not have to power-down the system. To replace a power unit: 1. Look at the power unit LEDs to determine which unit failed. 2. If your system has the power cord retainer brackets, pinch the two “wings” on the power cord retainer bracket and slide the bracket back off of the power cord plug. See Figure 32. Note To receive the optional power cord retainer kit, contact your Data Domain representative. Retainer bracket wings Figure 32: Power cord retainer bracket 252 Restorer Operating System User Guide Customer Operations 3. Remove the power cord. Push the locking lever to the right, pull on the power unit handle, and slide out the unit as shown in Figure 33. Locking lever Handle Figure 33: Remove a power unit 4. Slide in the new unit. When the unit is nearly completely in the slot, grasp the handle and push in the unit with enough force to seat the unit into the frame. Make sure that the unit is seated securely and that it lines up with the other power units. 5. Attach the power cord. 6. Slide the power cord retainer bracket over the cord. 7. If your system has the power cord retainer brackets, pinch the two “wings” on the bracket and slide the bracket down over the power cord plug until the bracket is flush with the back of the power unit. The wings secure the plug by clicking into the power unit handle brackets. See Figure 34 on page 254. Chapter 21: Hardware Servicing 253 Trained Service Personnel Operations Power unit handle brackets Retainer bracket wings Figure 34: Replace a power cord retainer bracket 8. Check that the LED glows green. 9. Enter the system show status command. Look for the following line in the output: All power supply modules operating normally. 10. Return the removed power unit in the packaging from the replacement unit. Each failed unit is evaluated to find the reason for the failure. Copy the RMA number onto the packaging. Trained Service Personnel Operations Caution Only trained and qualified personnel should install or replace equipment in this section. Replacement procedures in this section require an awareness of electrical shock hazards and, in the case of cooling fans, possible mechanical hazards from rotating fan blades. Remove/Replace the Top Panel You must remove the restorer top panel to access all replacement parts other than power supply units and disks. If the restorer is in a rack with another box directly above, the restorer may need to be removed from the rack to remove the top panel. Always use two people when moving a restorer, as the system weighs 88 pounds (40 kilograms). The only tool needed to remove and replace a top panel is a Phillips #2 screwdriver. 254 Restorer Operating System User Guide Trained Service Personnel Operations To remove the top panel: 1. Remove the two screws that lock to top panel onto the chassis. The screws are located in the top-panel lip that folds over the sides of the chassis, 6 inches (about 15 cm.) from the front of the chassis. See Figure 35. 2. Push down on and hold in the two release buttons that secure the top panel to the chassis. Top panel release buttons Top panel Screw Screw Figure 35: Top panel screws and release buttons 3. From the back of the system, slide back the top panel by pulling on the rolled edge of the top panel that hangs over the back panel. See Figure 36. The top panel slides back about an inch. Rolled edge Figure 36: Top panel rolled edge Chapter 21: Hardware Servicing 255 Trained Service Personnel Operations 4. Pull up the top panel. When another box is directly above, firmly grasp the rolled edge at the back of the top panel and lift the panel up about two inches to clear internal stops. To replace the top panel: 1. Keep the top panel about two inches above the restorer while positioning the panel above the restorer and back about an inch from where the top panel will be when completely replaced. 2. Lower the top panel and push it forward until the two release buttons at the front catch. 3. Secure the top panel with the two screws that you removed to allow removal of the panel. Replace Fans Note Shut down the system before replacing a fan. If a fan does not slide smoothly out of the chassis, the resulting sharp movement may damage disks. A restorer has two sets of fans. Use the system show fans command to check on the fans. To see the fans, remove the restorer top panel. Looking from the front of the restorer, the first fan set is four fans in a rack just behind the disks and across the width of the box. The fans in the rack cool the disks. The fans are numbered from 1 to 4 from left to right as viewed from the front of the machine. See Figure 37 on page 257. The second fan set is two fans on the back panel, as shown in Figure 37 on page 257. Back panel fans are numbered 1 and 2 from left to right as viewed from the front of the restorer. 256 Restorer Operating System User Guide Trained Service Personnel Operations Back panel fan 2 Back panel fan 1 Disk fan 4 Disk fan 3 Disk fan 2 Disk fan 1 Figure 37: Fan locations Replace Disk Fans Disk fans are numbered 1 through 4 from left to right as viewed from the front of the restorer. You can replace disk fans while the restorer is running. To replace disk fans: 1. Check the system show fans command output to determine which fan failed. # system show fans Fan Description ----------------1 Crossbar fan #1 2 Crossbar fan #2 3 Crossbar fan #3 4 Crossbar fan #4 Current RPM ----------4967 0 4913 4825 Normal -----4500 4500 4500 4500 Delta ----467 4500 413 325 Status -----ok Failed ok ok 2. Remove the restorer top panel. 3. On the failed fan, find the locking tab on the left side of the fan frame. Push the locking tab to the right and pull up on the frame tab on the top of the fan frame. See Figure 38 on page 258. Chapter 21: Hardware Servicing 257 Trained Service Personnel Operations Locking tab Frame tab Figure 38: Tabs on a disk fan 4. Pull the fan out of the rack as shown in Figure 39. Figure 39: Disk fan pulled out of the rack 5. Note the power plug at the bottom of the fan rack. 258 Restorer Operating System User Guide Trained Service Personnel Operations 6. Position the replacement fan with the plastic grill facing toward the front of the machine and the power plug facing down. 7. Slide the fan into the rack making sure that the power plug seats securely. The fan frame should line up with the other frames in the rack. 8. Replace the top panel. 9. Restart the system if you shut down the system for the replacement procedure. 10. Use the system show fans command to check the fan speed, which confirms that the replacement is working. Replace Back Panel Fans Back panel fans are numbered 5 and 6 from left to right as viewed from the front of the restorer. To remove a fan: 1. Check the system show fans command output to determine which fan failed. # system show fans Fan Description ----------------1 Crossbar fan #1 2 Crossbar fan #2 3 Crossbar fan #3 4 Crossbar fan #4 5 Rear fan #1 6 Rear fan #2 ----------------- Current RPM ----------4967 4913 4791 4825 0 5060 ----------- Normal -----4500 4500 4500 4500 4500 4500 ------ Delta ----467 413 291 325 4500 560 ----- Status -----ok ok ok ok Failed ok ------ 2. Remove the restorer top panel. 3. On the failed fan, find the locking tab on the right side of the fan frame. Push the locking tab to the left and pull up on the frame tab on the top of the fan frame. See Figure 40 on page 260. Chapter 21: Hardware Servicing 259 Trained Service Personnel Operations Locking tab Frame tab Figure 40: Tabs on a back panel fan 4. Note the power plug on the side of the fan rack. 5. Position the replacement fan with the plastic grill facing toward the front of the system and the power plug facing down. See Figure 41. Figure 41: Back panel fan lined up for replacement 260 Restorer Operating System User Guide Trained Service Personnel Operations 6. Slide the fan into the rack making sure that the power plug seats securely. The fan frame should line up with the frame of the other fan. 7. Replace the top panel. 8. Restart the system if you shut down the system for the replacement procedure. 9. Use the system show fans command to check the fan speed, which confirms that the replacement is working. Replace the Motherboard Battery The lithium battery on the motherboard should not need replacement. In the unusual case of a battery failure, the disk controller in peripheral card slot two and optional gigabit Ethernet NIC in slot three must be removed to reach the battery. Figure 42 shows the battery location in the back left corner of the system. The figure does not show the peripheral cards that are usually in place over the battery. Battery Figure 42: Motherboard battery 1. Shut down the system with the system poweroff command. 2. Remove all three power cords. 3. Remove the system top panel. Caution Make sure that all three power cords are removed from the system. Chapter 21: Hardware Servicing 261 Trained Service Personnel Operations 4. Remove the peripheral cards that block access to the battery. Use an ESD cable to protect the cards from static electricity. - Each card has a mounting bracket that folds over the top edge of the back panel. Each mounting bracket is held onto the back panel with a screw. - Carefully note which card is installed in which slot. - Remove the screw from the bracket for each card that needs to be removed and gently pull out the card. Figure 43 is a schematic showing the numbers and locations of the peripheral card slots. Note that in slot 3, a restorer can have either an HBA card for the VTL feature or the optional gigabit Ethernet card, but not both Back Front Figure 43: Peripheral card slots. 5. Push back the battery locking tab (the small tab facing the front of the system.) to release the battery. Remove the battery. 6. Press the replacement battery into the battery frame so that the locking tab clicks into place. 7. Replace the application cards. 262 - Match each card with the proper slot. - Line up each card’s mounting bracket facing the rear of the chassis and line up the bottom edge of the card over the slot. - Firmly push the each card into its slot. Restorer Operating System User Guide Trained Service Personnel Operations - Confirm that all cards are seated. Check the mounting bracket positions and heights. - Using the bracket mounting screws, secure the brackets to the chassis. 8. Replace the top panel. 9. Re-install the three power cords. 10. Restart the system. Caution A risk of explosion exists if the battery is replaced by an incorrect type. Dispose of used batteries according to the manufacturer’s instructions. Chapter 21: Hardware Servicing 263 Trained Service Personnel Operations 264 Restorer Operating System User Guide Appendix A: Time Zones Africa Africa/Abidjan Africa/Accra Africa/Addis_Ababa Africa/Algiers Africa/Asmera Africa/Bamako Africa/Bangui Africa/Banjul Africa/Bissau Africa/Blantyre Africa/Brazzaville Africa/Bujumbura Africa/Cairo Africa/Casablanca Africa/Conakry Africa/Dakar Africa/Dar_es_Salaam Africa/Djibouti Africa/Douala Africa/Freetown Africa/Gaborone Africa/Harare Africa/Johannesburg Africa/Kampala Africa/Khartoum Africa/Kigali Africa/Kinshasa Africa/Lagos Africa/Libreville Africa/Lome Africa/Luanda Africa/Lumumbashi Africa/Lusaka Africa/Malabo Africa/Maputo Africa/Maseru Africa/Mbabane Africa/Mogadishu Africa/Monrovia Africa/Nairobi Africa/Ndjamena Africa/Niamey Africa/Nouakchott Africa/Ouagadougou Africa/Porto-Novo Africa/Sao_Tome Africa/Timbuktu Africa/Tripoli Africa/Tunis Africa/Windhoek America America/Adak America/Anchorage America/Anguilla America/Antigua America/Aruba America/Asuncion America/Atka America/Barbados America/Belize America/Bogota America/Boise America/Buenos_Aires America/Caracas America/Catamarca America/Cayenne America/Cayman America/Chicago America/Cordoba America/Costa_Rica America/Cuiaba America/Curacao America/Dawson America/Dawson_Creek America/Denver America/Detroit America/Dominica America/Edmonton America/El_Salvador America/Ensenada America/Fort_Wayne America/Fortaleza America/Glace_Bay America/Godthab America/Goose_Bay America/Grand_Turk 265 America/Grenada America/Guadeloupe America/Guatemala America/Guayaquil America/Guyana America/Halifax America/Havana America/Indiana America/Indianapolis America/Inuvik America/Iqaluit America/Jamaica America/Jujuy America/Juneau America/Knox_IN America/La_Paz America/Lima America/Los_Angeles America/Louisville America/Maceio America/Managua America/Manaus America/Martinique America/Mazatlan America/Mendoza America/Menominee America/Mexico_City America/Miquelon America/Montevideo America/Montreal America/Montserrat America/Nassau America/New_York America/Nipigon America/Nome America/Noronha America/Panama America/Pangnirtung America/Paramaribo America/Phoenix America/Port_of_Spain America/Port-au-Prince America/Porto_Acre America/Puerto_Rico America/Rainy_River America/Rankin_Inlet America/Regina America/Rosario America/Santiago America/Santo_Domingo America/Sao_Paulo America/Scoresbysund America/Shiprock America/St_Johns America/St_Kitts America/St_Lucia America/St_Thomas America/St_Vincent America/Swift_Current America/Tegucigalpa America/Thule America/Thunder_Bay America/Tijuana America/Tortola America/Vancouver America/Virgin America/Whitehorse America/Winnipeg America/Yakutat America/Yellowknife Antarctica Antarctica/Casey Antarctica/DumontDUrville Antarctica/Mawson Antarctica/Palmer Antarctica/South_Pole Antarctica/McMurdo Asia Asia/Aden Asia/Alma-Ata Asia/Amman Asia/Anadyr Asia/Aqtau Asia/Aqtobe Asia/Ashkhabad Asia/Baghdad Asia/Bahrain Asia/Baku Asia/Bangkok Asia/Beirut Asia/Bishkek Asia/Brunei Asia/Calcutta Asia/Chungking Asia/Colombo Asia/Dacca Asia/Damascus Asia/Dubai Asia/Dushanbe Asia/Gaza Asia/Harbin Asia/Hong_Kong Asia/Irkutsk Asia/Ishigaki Asia/Istanbul Asia/Jakarta Asia/Jayapura Asia/Jerusalem 266 Restorer Operating System User Guide Asia/Kabul Asia/Kamchatka Asia/Karachi Asia/Kashgar Asia/Katmandu Asia/Krasnoyarsk Asia/Kuala_Lumpur Asia/Kuching Asia/Kuwait Asia/Macao Asia/Magadan Asia/Manila Asia/Muscat Asia/Nicosia Asia/Novosibirsk Asia/Omsk Asia/Phnom_Penh Asia/Pyongyang Asia/Qatar Asia/Rangoon Asia/Riyadh Asia/Saigon Asia/Seoul Asia/Shanghai Asia/Singapore Asia/Taipei Asia/Tashkent Asia/Tbilisi Asia/Tehran Asia/Tel_Aviv Asia/Thimbu Asia/Tokyo Asia/Ujung_Pandang Asia/Ulan_Bator Asia/Urumqi Asia/Vientiane Asia/Vladivostok Asia/Yakutsk Asia/Yekaterinburg Asia/Yerevan Atlantic Atlantic/Azores Atlantic/Bermuda Atlantic/Canary Atlantic/Cape_Verde Atlantic/Faeroe Atlantic/Jan_Mayen Atlantic/Madeira Atlantic/Reykjavik Atlantic/South_Georgia Atlantic/St_Helena Atlantic/Stanley Australia Australia/ACT Australia/Adelaide Australia/Brisbane Australia/Broken_Hill Australia/Canberra Australia/Darwin Australia/Hobart Australia/LHI Australia/Lindeman Australia/Lord Howe Australia/Melbourne Australia/NSW Australia/North Australia/Perth Australia/Queensland Australia/South Australia/Sydney Australia/Tasmania Australia/Victoria Australia/West Australia/Yancowinna Brazil Brazil/Acre Brazil/DeNoronha Brazil/East Brazil/West 267 Canada Canada/Atlantic Canada/Central Canada/East-Saskatchewan Canada/Eastern Canada/Mountain Canada/Newfoundland Canada/Pacific Canada/Saskatchewan Canada/Yukon Chile Chile/Continental Chile/EasterIsland Etc Etc/GMT Etc/GMT+0 Etc/GMT+1 Etc/GMT+2 Etc/GMT+3 Etc/GMT+4 Etc/GMT+5 Etc/GMT+6 Etc/GMT+7 Etc/GMT+8 Etc/GMT+9 Etc/GMT+10 Etc/GMT+11 Etc/GMT+12 Etc/GMT0 Etc/GMT-0 Etc/GMT-1 Etc/GMT-2 Etc/GMT-3 Etc/GMT-4 Etc/GMT-5 Etc/GMT-6 Etc/GMT-7 Etc/GMT-8 Etc/GMT-9 Etc/GMT-10 Etc/GMT-11 Etc/GMT-12 Etc/GMT-13 Etc/GMT-14 Etc/Greenwich Etc/UCT Etc/Universal Etc/UTC Etc/Zulu Europe/Amsterdam Europe/Andorra Europe/Athens Europe/Belfast Europe/Belgrade Europe/Berlin Europe/Bratislava Europe/Brussels Europe/Bucharest Europe/Budapest Europe/Chisinau Europe/Copenhagen Europe/Dublin Europe/Gibraltar Europe/Helsinki Europe/Istanbul Europe/Kiev Europe/Kuybyshev Europe/Lisbon Europe/Ljubljana Europe/London Europe/Luxembourg Europe/Madrid Europe/Malta Europe/Minsk Europe/Monaco Europe/Moscow Europe/Oslo Europe/Paris Europe/Prague Europe/Riga Europe/Rome Europe/San_Marino Europe/Sarajevo Europe/Simferopol Europe/Skopje Europe/Sofia Europe/Stockholm Europe/Tallinn Europe/Tirane Europe 268 Restorer Operating System User Guide Europe/Vaduz Europe/Vatican Europe/Zagreb Europe/Zurich Europe/Vienna Europe/Vilnius Europe/Warsaw GMT GMT GMT+1 GMT+2 GMT+3 GMT+4 GMT+5 GMT+6 GMT+7 GMT+8 GMT+9 GMT+10 GMT+11 GMT+12 GMT+13 GMT-1 GMT-2 GMT-3 GMT-4 GMT-5 GMT-6 GMT-7 GMT-8 GMT-9 GMT-10 GMT-11 GMT-12 Indian (Indian Ocean) Indian/Antananarivo Indian/Chagos Indian/Christmas Indian/Cocos Indian/Comoro Indian/Kerguelen Indian/Mahe Indian/Maldives Indian/Mauritius Indian/Mayotte Indian/Reunion Mexico Mexico/BajaNorte Mexico/BajaSur Mexico/General Miscellaneous Arctic/Longyearbyen CET CST6CDT Cuba EET Egypt Eire EST EST5EDT Factory GB GB-Eire Greenwich Hongkong HST Iceland Iran Israel Jamaica Japan Kwajalein Libya MET MST MST7MDT Navajo NZ NZ-CHAT Poland Portugal 269 PRC PST8PDT ROC ROK Singapore Turkey UCT Universal UTC WET W-SU Zulu Pacific Pacific/Apia Pacific/Auckland Pacific/Chatham Pacific/Easter Pacific/Efate Pacific/Enderbury Pacific/Fakaofo Pacific/Fiji Pacific/Funafuti Pacific/Galapagos Pacific/Gambier Pacific/Guadalcanal Pacific/Guam Pacific/Honolulu Pacific/Johnston Pacific/Kiritimati Pacific/Kosrae Pacific/Kwajalein Pacific/Majuro Pacific/Marquesas Pacific/Midway Pacific/Nauru Pacific/Niue Pacific/Norfolk Pacific/Noumea Pacific/Pago_Pago Pacific/Palau Pacific/Pitcairn Pacific/Ponape Pacific/Port_Moresby Pacific/Rarotonga Pacific/Saipan Pacific/Samoa Pacific/Tahiti Pacific/Tarawa Pacific/Tongatapu Pacific/Truk Pacific/Wake Pacific/Wallis Pacific/Yap SystemV/AST4 SystemV/AST4ADT SystemV/CST6 SystemV/CST6CDT SystemV/EST5 SystemV/EST5EDT SystemV/HST10 SystemV/MST7 SystemV/MST7MDT SystemV/PST8 SystemV/PST8PDT SystemV/YST9 SystemV/YST9YDT System V US (United States) US/Alaska US/Aleutian US/Arizona US/Central US/East-Indiana US/Eastern US/Hawaii US/Indiana-Starke US/Michigan US/Mountain US/Pacific US/Pacific-New US/Samoa Aliases GMT=Greenwich, UCT, UTC, Universal, Zulu CET=MET (Middle European Time) US/Eastern=Jamaica US/Mountain=Navajo 270 Restorer Operating System User Guide Index A add a new shelf to a volume 58 adminaccess command 103 administrative email, display address 93 administrative host, display host name 93 AIX 46 alerts add an email address 114 command 114 display current 115 display current and history 117 display the email list 116 display the history 116 remove an address from the email list 114 set the email list to the default 115 test the list 114 alias add 162 command 162 defaults 163 display 163 remove 163 authentication mode for CIFS 191 autonegotiate, set 172 autosupport command 118 display all parameters 121 display history file 122 display list 121 display schedule 121 remove an email address 119 run the report 119 send a report 118 send command output 120 B set all parameters to default 120 set list to the default 119 set the schedule 120 set the schedule to the default 120 test report 118 backup, recommendations for full C 4 CIFS add a backup client 190 add a client 189 add a user 188 add an administrative client 190 Add IP address/hostname mappings 192 configuration set up 41 disable client connections 189 display active clients 194 display clients 195 display configuration 195 Display IP address/hostname mappings 196 display statistics 196 display status 196 display valid CIFS options that can be set 194 enable client connections 189 hostname change effects 170 identify a WINS server 193 Increase memory for more user accounts 193 remove a client 190 remove all clients 191 remove all IP address/hostname mappings 192 remove an administrative client 190 Remove one IP address/hostname mapping 192 remove the NetBIOS hostname 191 remove the WINS server 193 reset CIFS options 194 271 resolve NetBIOS name 192 set a NetBIOS hostname 191 set the authentication mode 191 set the logging level 193 user access 187 clean change schedule 131 display amount parameters 133 display schedule 133 display status 134 display throttle 133 monitor operations 134 set schedule to the default 132 set throttle 132 set throttle to the default 132 start 131 stop 131 system defaults 130 command output, remote with SSH 107 send output using autosupport command commands listed 7 compression algorithms 134 set for none 134 config command 89 command details 89 configuration basic additions 46 change settings 89 defaults 6 first time 36 context 200 CPU display load 154, 155 temperature extremes 248 D data 272 compression 4 integrity checks migration 96 3 120 Data Domain Enterprise Manager at system installation 29 introduction 5 system administration with 48 system configuration 36, 90 date display 160 set 152, 160 DDR Manager monitor multiple systems 23 opening and use 9 default gateway change 178 display 180 reset 178 DHCP disable 168 enable 168 server installation tasks 35 disk add disks and LUNs 53, 141 add enclosure command 54 beacon 140 command 139 command format 53 display performance statistics 146 display RAID status 143 display type and capacity 142 estimate use of space 18 failures and spares 50 flash the running light 141 manage use of space 19 reclaim space 26 reliability statistics 147 replacing 248 rescan 53, 141 set statistics to zero 141 set to failed 140 show status 54, 141 spare when add an expansion shelf 58 unfail a disk 140 DNS add server 169 display servers 175, 176 Restorer Operating System User Guide domain name display 170 duplex, set line use 171 E enclosure beacon 56 display hardware status 57 fans, display status 56 port connections, display 57 power supply status 57 temperature, display 56 enclosures, list 55 Enterprise Manager 23 Ethernet, display interface settings 173 expansion shelf add first 50 add second 52 disk add enclosure command 141 look for new 53 site requirements 31 F fans display status 158 replacing for disks 257 replacing on back panel 259 view sets 256 fans, display status 56 file system compression algorithms 134 delete all data 126 disable 125 display compression 128 display status 126 display uptime 126 display utilization 127 enable 125 restart 125 filesys command 125 FTP add a host 103 display user list 107 remove a host 104 set user list to empty 105 G gateway system add a LUN 67, 140 command differences installation 64 points of interest 59 troubleshooting 66 GB defined 8 GUI, see DDR Manager H halt See poweroff hard address, private loop 75 hardware display status 57 hardware, replacing components 247 host name add 171 delete 172 display 172 hourly status message 122 HTTPS, generate a new certificate 106 I I/O, display load 154, 155 installation DD460g 64 default directories under /ddvar 6 DHCP server tasks 35 hardware 32 login and configuration 36 site requirements 30 interface autonegotiate 172 change IP address 170 change transfer unit size 169 disable 167 display Ethernet configuration 173 display settings 173 enable 167 overview 5 set line speed 171 IP address, change for an interface 170 K KB defined Index 61 8 273 L license add 94 configuration setup 39 display 95 remove 95 remove feature licenses 95 location display 93 set 92 log archive the log 245 command 241 create file bundles 122 list file names 244 remote logging 241 scroll new entries 241 set the CIFS logging level 193 support upload command 122 view all current entries 243 login, first time 36 LUN masking 82 add a client 82 add a LUN mask 84 procedure 85 vtl initiator command 82 M mail change server 92 display server 175 display server name 93 maximum transfer unit size, change MB defined 8 migration set up 96 with replication 101 monitor multiple systems 23 MTU, change size 169 N name change 170 display 175 274 169 ndmp add a filer 231 backup operation 232 display known filers 234 display process status 234 remove a filer 231 remove passwords 233 restore operation 232 stop a process 233 stop all processes 233 test for a filer 234 net command 167 net, display Ethernet hardware settings netmask, change 168 network configuration set up 40 display statistics 176 network parameters, reset 171 NFS add client, read/write 181 clear statistics 183 command 181 configuration set up 44 detailed statistics 185 disable client 182 display active clients 183 display allowed clients 184 display statistics 184 display status 186 enable client 182 remove client 182 set client list to default 183 ntp add a time server 164 delete a time server 165 disable service 164 display settings 166 display status 165 enable service 164 reset to defaults 165 NTP, display server 175 P password, change ping a host 169 174 110 Restorer Operating System User Guide seeding 218 bidirectional 221 many-to-one 226 one-to-one 219 set bandwidth 208 set delay 208 setup and start bidirectional 215 setup and start collection 215 setup and start directory 214 setup and start many-to-one 216 start 202 statistics 212 suspend 202 throttle override 207 throttle rate 206 throttle reset 207 throttle, add an event 205 throttle, delete an event 206 throttle, display settings 209 use a network name 204 route add a rule 177 change default gateway 178 command 177 display a route 178 display default gateway 180 display Kernel IP routing table 179 display static routes 179 remove a rule 178 reset default gateway 178 pools add 87 and replication 201 delete 87 display 87 using 86 port connections display 57 power supply display status 57, 159 replacing 251 poweroff 149 private loop, hard address 75 privilege level, change 110 R RAID and a failed disk 140 create a new group 58 display detailed information 145 display status 54, 141, 143 groups 50 type in a restorer 3 with gateway restorers 60 reboot hardware 150 remote command output 107 replication change a destination port 205 change a source port 204 change originator name 204 configure 200 context 200 convert to directory from collection display status 211 introduced 199 move data to originator 203 pools 201 remove configuration 203 repair a broken recovery 208 replace collection source 217 replace directory source 216 reset authorization 203 reset bandwidth 208 reset delay 208 resume 202 Index 218 S serial number, display 153 shutdown See poweroff site install requirements 30 SNMP add community strings 237 add trap hosts 237 delete a community string 238 delete a trap host 237 delete all community strings 238 delete all trap hosts 237 disable 235 display all 239 display community strings 240 275 display status 238 display the system contact 240 display the system location 240 display trap hosts 239 enable 235 reset all SNMP values 238 reset location 236 reset system location 236 system contact 236 system location 236 software display version 161 site requirements 35 space management 17 space.log, format 244 SSH add a public key 105 display the key file 106 display user list 107 remove a key file entry 106 remove the key file 106 set user list to empty 105 statistics clear NFS 183 disk performance 146 disk reliability 147 display for the network 176 display NFS 184 graphic display 157 NFS detailed 185 set disk to zero 141 status, hourly message 122 support log file bundles 122 upload command 122 system change name 170 command 149 display status 158 display uptime 154 display version 161 location 92 location display 93 serial number 153 276 T TB defined 8 TELNET add a host 103 display user list 107 remove a host 104 set user list to empty 105 temperature extremes 247 temperature, display 56, 158 time display 160 display zone 94 set 152, 160 set zone 92 Tivoli Storage Manager 46 traceroute 178 U upgrade software 150 uptime, display 154 users add 109 change a password 110 change a privilege level 110 display all 111, 112 regular 109 remove 109 set list to default 110 sysadmin 109 V verify process explanation 3 see when the process is running 155 Virtual Tape Library See VTL volume expansion 58 VTL create a VTL 71 create tapes 72 delete a VTL 75 disable 71 display a tape summary 77, 79 display all tapes 77 display configurations 76 display statistics 80 Restorer Operating System User Guide W display status 76 display tapes in the vault 79 enable 71 export tapes 73 features and limitations 69 import tape 73 insert tape manually 74 LUN masking 82 private loop hard address 75 remove tape manually 74 remove tapes 73 retrieve a tape from a destination 80 tape information by VTL 78, 79 WINS server for CIFS 193 WINS server for CIFS, remove 193 Index 277 278 Restorer Operating System User Guide © 2011 - 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United State and other countries. All other trademarks used herein are the property of their respective owners.