- No category
advertisement
DD200 Restorer
User Guide
Disclaimer
The information contained in this publication is subject to change without notice. Data Domain,
Incorporated makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Data Domain,
Incorporated shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual.
Notices
NOTE: Data Domain hardware has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.
Changes or modifications not expressly approved by Data Domain can void the user's authority to operate the equipment.
Copyright
Copyright © 2004 Data Domain, Incorporated. All rights reserved. Data Domain, the Data Domain logo, DD200 Restorer, Global Compression, Data Invulnerability Architecture, and all other Data
Domain product names and slogans are trademarks or registered trademarks of Data Domain,
Incorporated in the USA and/or other countries. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Portions of this product are software covered by the GNU General Public License Copyright ©
1989, 1991 by Free Software Foundation, Inc. Portions of this product are software covered by the
GNU Lesser General Public License Copyright © 1991, 1999 by Free Software Foundation, Inc.
Portions of this product are software covered by the GNU Free Documentation License Copyright
© 2000, 2001, 2002, by Free Software Foundation, Inc. Portions of this product are software
Copyright © 1999 - 2003, by The OpenLDAP Foundation. Portions of this product are software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/),
Copyright © 1998-2004 The OpenSSL Project, all rights reserved. Portions of this product are
Berkeley Software Distribution software, Copyright © 1988 - 2004 by the Regents of the
University of California, University of California, Berkeley. Portions of this product are software
Copyright © 1990 - 1999 by Sleepycat Software. Portions of this product are software Copyright ©
1985-2004 by the Massachusetts Institute of Technology. All rights reserved. Portions of this product are LILO program code, Copyright © 1992 - 1998 Werner Almesberger. All rights reserved. Portions of this product are software Copyright © 1999 - 2004 The Apache Software
Foundation, licensed under the Apache License, Version 2.0 (http://www.apache.org/licenses
/LICENSE-2.0). Portions of this product are derived from software Copyright © 1994, 1995, 1996,
1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring Harbor Laboratory. Funded under Grant
P41-RR02188 by the National Institutes of Health. Portions of this product are derived from software Copyright © 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc. Portions of
this product relating to GD2 format are derived from software Copyright © 1999, 2000, 2001, 2002
Philip Warner. Portions of this product relating to PNG are derived from software Copyright ©
1999, 2000, 2001, 2002 Greg Roelofs. Portions of this product relating to gdttf.c are derived from software Copyright © 1999, 2000, 2001, 2002 John Ellson ([email protected]). Portions of this product relating to gdft.c are derived from software Copyright © 2001, 2002 John Ellson
([email protected]). Portions of this product relating to JPEG and to color quantization are derived from software Copyright © 2000,2001, 2002, Doug Becker and copyright (C) 1994, 1995,
1996, 1997, 1998, 1999, 2000, 2001, 2002, Thomas G. Lane. This software is based in part on the work of the Independent JPEG Group. Portions of this product relating to WBMP are derived from software Copyright © 2000, 2001, 2002 Maurice Szmurlo and Johan Van den Brande. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.
Data Domain, Incorporated
3400 Hillview Ave.
Bldg.3, 2nd Floor
Palo Alto, CA 94304
USA
Phone 650–565-7300
Fax 650–424-1057 www.datadomain.com
Restore Protection Manager 2.0.5.0
March 4, 2005
Part number: 760-0200-0500
Contents
v
vi
DD200 Restorer User Guide
Contents
vii
viii
DD200 Restorer User Guide
Contents
ix
x
DD200 Restorer User Guide
Contents
xi
xii
DD200 Restorer User Guide
Contents
xiii
xiv
DD200 Restorer User Guide
Contents
xv
xvi
DD200 Restorer User Guide
About This Guide
This guide explains how to use the Data Domain® DD200 restorer with Restore Protection
Manager (RPM) software.
•
The “ Introduction ” chapter explains what the DD200 restorer is and how it works, details
features, lists hardware and software requirements, and gives overviews of installation and configuration tasks, the default configuration, and user interface commands.
•
•
The “ Disk Space Management ” chapter gives guidelines for managing disk space on a DD200
restorer and for setting up backup servers to get the best performance.
The “ Installation ” chapter gives all installation steps for hardware and software and for setting
up backup software to use a restorer.
The next set of chapters detail the use of all user interface commands and operations. Each chapter is set up with headings that are actually a task-oriented list of the operations detailed in that chapter.
For any task that you want to perform, simply look in the table of contents at the beginning of this guide for the heading that describes the task.
•
•
•
•
•
•
•
•
The “ Configuration Management ” chapter describes how to examine and modify configuration
parameters.
The “ Access Control for Administration ” chapter describes how to give FTP, TELNET, and
SSH access to remote hosts.
The “ User Administration ” chapter explains how to add and delete users and change
passwords.
The “ Alerts and System Reports ” chapter details messages that software sends from its
monitoring of components and details the weekly system report.
The “ File System Management ” chapter gives details on displaying file system statistics and
capacity, and managing file system cleaning operations.
The “ Disk Management ” chapter explains how to monitor and manage disks on a restorer.
The “ System Management ” chapter gives details about mailservers, the system clock and time
zones, time servers, system upgrades, and command aliases.
The “ Network Management ” chapter describes how to manage network tasks such as routing
rules, the use of DHCP, DNS, and setting IP addresses.
xvii
Conventions
•
•
•
•
•
The “ NFS Management ” chapter describes how to deal with NFS clients and status.
The “ CIFS Management ” chapter details the use of Windows backup servers with a DD200
Restorer.
The “ Replicator ” chapter details replication of data from one restorer to another.
The “ Backup/Restore Using NDMP ” chapter explains how to do direct backup and restore
operations between a restorer and Network Appliance filer.
The “ Log File Management ” chapter explains how to view, archive, and clear the log file.
The final chapter, “ Hardware Servicing ,” explains how to replace disks, fans, power supply units,
and other hardware. The first appendix lists all time zones from around the world. The second appendix is a collection of help pages for user interface commands.
Conventions
The following table describes the typographic conventions used in this guide.
Typeface
Monospace
Italic
Monospace bold
Usage
Commands, computer output, file contents, files, directories, software elements such as command options, function names, and parameters
New terms, book titles, emphasis, variables to be replaced by a name or value
User input; the “#” symbol indicates a command prompt.
Examples
Find the log file under /var/log.
See the net help page for more information.
The name is a path for the device...
# config setup first
|
[ ]
\
Symbol
#
{ }
Usage
Administrative user prompt
Continued input on the following line
Examples
In a command synopsis, brackets indicate an optional argument
In a command synopsis, a vertical bar separates mutually exclusive arguments
In a command synopsis, curly brackets indicate that one of the exclusive arguments is required.
# autosupport set \ schedule log view [filename] net dhcp [true | false] adminhost add \
{ftp | telnet | ssh} xviii DD200 Restorer User Guide
Audience
Audience
This guide is for system administrators who are familiar with general backup administration and one or more backup software packages that Data Domain lists as compatible with a Data Domain restorer. See the Data Domain Support web site, Technical Notes link for the current list of compatible backup packages: https://support.datadomain.com
Contacting Data Domain
For comments or problems with Data Domain products, contact Data Domain support:
• 24 hours a day, 7 days a week at 877-207-DATA (3282)
• email: [email protected]
For sales and license information:
• 877-207-DATA (3282)
•
• email: [email protected]
Fax: 650-424-1057
Data Domain, Incorporated
3400 Hillview Ave.
Bldg. 3, 2nd Floor
Palo Alto, CA 94304
USA
Phone: 650-565-7300
Fax: 650-424-1057
About This Guide xix
Contacting Data Domain xx DD200 Restorer User Guide
Introduction
1
A Data Domain DD200 restorer with Restore Protection Manager (RPM) software is a disk-based recovery appliance. The restorer makes backup data available with the performance and reliability of disks at a cost competitive with tape-based storage. Data integrity is assured with multiple levels of data checking and repair.
A restorer works seamlessly with your existing backup software. To a backup server, the restorer appears as a file server supporting NFS or CIFS over Gigabit Ethernet. Add a restorer to your site as a Disk Storage Unit for VERITAS NetBackup, a Backup-to-disk device for VERITAS Backup
Exec, or as a Filesystem Device for Legato NetWorker. Multiple backup servers can share one restorer, and one restorer can handle multiple simultaneous backup and restore operations. For additional throughput and capacity, you can attach multiple restorers to one or more backup servers.
Figure 1 shows a restorer in a basic backup configuration.
Backup
Server
SCSI/
Fiber Channel
Ethernet from primary storage
Gigabit
Ethernet
Tape
System
NFS/CIFS
Data Verification
RPM File System
Global Compression
RAID
Restorer
Figure 1: A restorer as a file server
1
2
Applications that Send Data to a Restorer
Referring to
Figure 1 , data flows to a restorer through an Ethernet connection. Immediately, data
verification processes begin that follow the data for as long as it is on the restorer. In the file system, Data Domain Global Compression™ algorithms prepare the data for storage. Data is then sent to the disk RAID subsystem. The algorithms constantly adjust the use of storage as the restorer receives new data from backup servers. Restore operations flow back from storage, through decompression algorithms and verification consistency checks, and then through the Ethernet connection to the backup servers.
Applications that Send Data to a Restorer
Restorer software is designed specifically for storing relatively large streams of sequential data from backup software and is optimized for high throughput, continuous data verification, and high compression. A restorer makes optimum use of its disk space and compression algorithms when it backs up file systems from 100 MB to 1 TB in size.
Restorer performance when storing data from applications that are not backup software is best when:
•
•
•
•
Data is sent to the restorer as sequential writes (no overwrites).
Files are larger than 1 MB.
Smaller files are prepackaged with tar (on UNIX-based systems) into units of at least 1 MB in size.
No compression is used before sending the data to the restorer.
Data Integrity
The Data Domain Data Invulnerability Architecture™ protects against data loss from hardware and software failures.
•
•
When writing to disk, restorer software creates and stores self-describing metadata for all data received. After writing the data to disk, the restorer then creates metadata from the data on the disk and compares it to the original metadata.
A strict append-only write policy guards against overwriting valid data.
•
•
After a backup completes, a validation process looks at what was written to disk to see that all file segments are logically correct within the file system and that the data is the same on the disk as it was before being written to disk.
In the background, the Online Verify operation continuously checks that data on the disks is still correct and that nothing has changed since the earlier validation process.
DD200 Restorer User Guide
Data Compression
•
•
•
The storage disks in a restorer are set up in a mirrored configuration (RAID1+ 0) with hot spares and fast mirror resynchronization. In the case of differences between the mirrors or when the online verify operation finds changed data, the restorer uses the metadata (created when writing data) to determine which mirror has the correct data. The restorer constantly checks for differences and repairs the mirror that has incorrect data.
To keep data synchronized during a hardware or power failure, the restorer uses NVRAM
(non-volatile RAM) to track outstanding I/O operations.
When reading data back for a restore operation, the restorer uses multiple layers of consistency checks to verify that restored data is correct.
Data Compression
The Data Domain compression algorithms:
•
•
Store only unique data. Through Global Compression, the restorer pools redundant data from each backup image. Any duplicated data or repeated patterns from multiple backups are stored only once. The storage of unique data is invisible to backup software, which sees the entire virtual file system.
Are independent of data format. Data can be structured, such as databases, or unstructured, such as text files. Data can be from file systems or raw volumes. All forms are compressed.
Typical compression ratios are 20:1 over 20 weeks assuming weekly full and daily incremental backups. A backup that includes many duplicate or similar files (files copied several times with minor changes) benefits the most from compression.
Depending on backup volume, size, retention period, and rate of change, the amount of compression can vary. The best compression happens with backup volume sizes from 100 MB to
1TB. See “ Display File System Space Utilization ” on page 56 for details on displaying the amount
of user data stored and the amount of space available.
Global Compression functions within a single restorer. To take full advantage of multiple restorers, a site that has more than one restorer should consistently backup the same system or set of data to the same restorer. For example, if a full backup of all sales data goes to restorerA, the incremental backups and future full backups for sales data should also go to restorerA.
Restore Operations
With disk backup through the restorer, incremental backups are always reliable and access time for files is measured in milliseconds. Furthermore, with a restorer, you can perform full backups more frequently without the penalty of storing redundant data. With tape backups, a restore operation
Chapter 1: Introduction 3
4
Licensing may rely on multiple tapes holding incremental backups. Unfortunately, the more incremental backups a site has on multiple tapes, the more time-consuming and risky the restore process. One bad tape can kill the restore.
From a restorer, file restores go quickly and create little contention with backup or other restore operations. Unlike tape drives, multiple processes can access a restorer simultaneously. A restorer allows your site to offer safe, user-driven, single-file restore operations.
Licensing
The licensed features on a restorer are:
• NFS access for backup, restore, and administrative operations from UNIX-based systems.
•
•
CIFS (Common Internet File System) access for backup and restore operations from Windows systems.
Replication of backup images from one restorer to another.
• Half-size or full-size use of disk storage space. A half-size system has disk space available for half as much data storage as a full system. A restorer with a half-size license can move to full capacity with a license upgrade. No hardware upgrade is necessary.
The license command allows you to add new licenses, delete current licenses, or display current
licenses. See “ The License Command ” on page 34 for command details. Contact your Data
Domain representative to purchase licensed features.
Restorer Interfaces
All hardware interfaces are on the back panel of the restorer.
• The DB9 “Console Port” is for an RS232 connection to a serial console. See
Figure 4 on page 19. You can use a serial console for administration and configuration tasks.
•
•
•
•
One (or optionally three) Gigabit Ethernet ports are for communication with either backup servers or administrative and standard users from remote machines. See
One 10/100 Ethernet port is for communication with either backup servers or administrative
and standard users from remote machines. See Figure 3 on page 18.
One VGA port is for a monitor. See
One port is for a keyboard. Look for the keyboard icon. See
DD200 Restorer User Guide
Related Documentation
Related Documentation
•
•
For technical details about how a restorer functions, ask your Data Domain representative for the Data Domain publication, DD200 Restorer, An Online Backup and Recovery Storage
Appliance.
See the DD200 Restorer Quick Start folder for a simplified list of installation tasks and the
DD200 Restorer Command Reference for restorer command summaries.
Initial System Settings
A restorer as delivered and installed needs very little configuration. When you first log in as
sysadmin, the restorer automatically starts the config setup command. After configuration, the following parameters are set in the restorer:
•
•
If using DNS, one to three DNS servers are identified for IP address resolution.
DHCP is active or not active for each Ethernet interface, as you choose during installation.
•
•
•
•
•
•
Each active interface has an IP address.
The restorer hostname is known to the network.
The restorer knows the addresses to use for the backup servers, SMTP server, and administrative hosts.
An SMTP (mail) server is identified.
For NFS clients, the restorer is set up to export the /backup and /ddvar directories using
NFSv3 over TCP. For CIFS clients, the restorer has shares set up for /backup and /ddvar.
One or more backup servers are identified as restorer NFS or CIFS clients.
•
•
•
•
•
•
A host is identified for restorer administration. Administrative users have access to the partition /ddvar, which holds log files core files, and software release updates. The partition is small and data in the partition is not compressed.
The system clock uses the time zone you select.
The only user for the system is sysadmin with the password that you give during setup. The user command allows you to later add administrative and non-administrative users.
The SSH service is enabled and the FTP and TELNET services are disabled. Use the adminaccess command to enable and disable services.
The user lists for TELNET and FTP are empty and the protocols are disabled, meaning that no users can connect through TELNET or FTP.
A weekly system report runs automatically every Sunday at 3 a.m. The report goes to a Data
Domain email address and an address that you give during set up. You can add addresses to the email list using the autosupport command.
Chapter 1: Introduction 5
6
Command Line Interface
•
•
•
An email list for system alerts that are automatically generated has a Data Domain email address and an address that you give during set up. You can add addresses to the email list using the alerts command
The clean operation is scheduled for Monday at 1 p.m. To change the schedule, use the filesys clean commands.
The background verification operation that continuously checks backup images is enabled.
Command Line Interface
A restorer is administered entirely through a command line interface. Use the SSH or TELNET (if enabled) utilities to access the command prompt. The majority of this manual gives details for using the commands to accomplish specific administration tasks. Each command also has a help page that gives the complete command syntax. Help pages are available through the restorer help command and in an appendix at the back of this manual.
•
•
•
To list restorer commands, enter a question mark (?) or the help command at the prompt.
To list the options for a particular command, enter the command with no options at the prompt.
To find a keyword used in a command option when you do not remember which command to use, enter a question mark (?) or the help command followed by the keyword. For example, the question mark followed by the keyword password displays all restorer command options that include password. If the keyword matches a command, such as net, then the command explanation appears.
•
•
To display a detailed explanation of a particular command, enter a question mark (?) or the help command followed by a command name.
Use the up and down arrow keys to move through a displayed command. Use the q key to exit.
Enter a slash character (/) and a pattern to search for and highlight lines of particular interest.
•
•
•
The Tab key completes a command entry when that entry is unique. Tab completion works for the first three levels of command components. For example, entering sy(tab) sh(tab) st(tab) displays the command system show stats.
Any restorer command that accepts a list, such as a list of IP addresses, accepts entries as comma-separated, space-separated, or both.
Commands that display the use of disk space or the amount of data on disks compute amounts using the following definitions:
1 KB = 2
1 MB = 2
10 bytes
20
1 GB = 2
1 TB = 2 40
30
bytes
bytes
bytes
DD200 Restorer User Guide
Command Line Interface
The commands are:
adminaccess Manages the FTP, TELNET, and SSH services. See “ Access Control for
alerts Creates alerts for system problems. Alerts are emailed to Data Domain and to a
user-configurable list. See “ Alerts ” on page 46.
alias Creates aliases for restorer commands See “ The Alias Command ” on page 87.
autosupport Generates a system status and health report. Reports are emailed to Data Domain
and to a user-configurable list. See “ Autosupport Reports ” on page 49.
cifs Manages Common Internet File System backups and restores and displays CIFS status and
statistics. See “ CIFS Management ” on page 109.
config Shows, resets, copies, and saves restorer configuration settings. See “ Configuration
disk Displays disk statistics, status, usage, reliability indicators, and RAID layout and usage.
See “ Disk Management ” on page 65.
data. See “ Clean Operations ” on page 59 for details.
help Displays a list of all restorer commands and detailed explanations for each command.
license Displays current licensed features and allows adding or deleting licenses.
log Displays and administers the restorer log file. See “ Log File Management ” on page 133.
ndmp Manages direct backup and restore operations between a Network Appliance™ filer and
net Displays network status and set up information. See “ Network Management ” on page 91.
nfs Displays NFS status and statistics. See “ NFS Management ” on page 103 for details.
route Manages restorer network routing rules. See “ The Route Command ” on page 100.
system Displays restorer status, faults, and statistics, enables, disables, halts, and reboots the
restorer. See “ The System Command ” on page 73. Also sets and displays the system clock and
Chapter 1: Introduction 7
Command Line Interface
user Administers user accounts for the restorer. See “ User Administration ” on page 41 for
details.
8 DD200 Restorer User Guide
Disk Space Management
2
This chapter:
• Gives general guidelines for predicting how much disk space your site may use over time.
•
•
Explains how to deal with restorer components that run out of disk space.
Describes the use of the Data Domain Space Management Tool.
Note Data Domain offers guidance on setting up third-party backup software and backup servers for use with a restorer. Because such information tends to change often, the information is available on the Data Domain Support web site (http://support.datadomain
.com/). See the Technical Notes section.
Space Management
The restorer is designed as a very reliable online cache for backups. As new backups are added to the system, old backups are removed. Such removals are normally done under the control of backup software (on the backup server) based on the configured retention period. The process with a restorer is very similar to tape policies where older backups are retired and the tapes are reused for new backups.
When backup software removes an old backup from a restorer, the space on the restorer becomes available only after the weekly clean function reclaims disk space. A good way to manage space on a restorer is to retain as many online backups as possible with some headroom (about 20% of total space available) to allow for data growth over time.
Data growth on a restorer is primarily affected by:
• The size and compressibility of the primary storage that you are backing up.
• The retention period that you specify with the backup software.
If you backup volumes of over 1 TB in size or the retention time for volumes that do not compress well is greater than four months, backups may use space on a restorer more quickly than expected.
9
Estimate Use of Disk Space
Estimate Use of Disk Space
The restorer’s use of compression when storing data means that you can look at the use of disk
space in two ways: physical and virtual. (See “ Data Compression ” on page 3 for details about
compression.) Physical space is the actual disk space used on the restorer. Virtual space is the amount of space needed if all data and multiple backup images were uncompressed.
• Through the restorer, the filesys show space command (or the aliased df) shows both
physical and virtual space. See “ Manage File System Use of Disk Space ” on page 12.
• From NFS clients:
Use df -k /<mountpoint> to display the physical space used for data storage and the space available in kilobytes.
Use du -s /<mountpoint> to display the amount of virtual (uncompressed) data, in
512 byte blocks, that the backup server sees on the restorer (divide by 2 to get kilobytes).
The ls(1m) command also shows the amount of virtual data.
The restorer generates log messages as the file system approaches its maximum size. The following information about data compression gives guidelines for disk use over time.
The amount of disk space used over time by a restorer depends on:
• The size of the initial full backup.
•
•
The number of backups (incremental and full) over time.
The rate of growth for data in the backups.
For data sets with average rates of change and growth, data compression generally matches the following guidelines:
•
•
For the first full backup to a restorer, the compression factor is about 3:1. Disk space used on the restorer is about one-third the size of the data before the backup.
Each incremental backup to the initial full backup has a compression factor of about 6:1.
•
•
The next full backup has a compression factor of about 60:1. All data that was new or changed in the incremental backups is already in storage.
Over time, the aggregate compression factor for all the data is about 20:1.
when no data is expired and deleted. The actual retention time for a given site varies according to the dependencies detailed above.
10 DD200 Restorer User Guide
Reclaim Data Storage Disk Space
The table assumes a three percent change in the data set for each backup with one full backup and five incremental backups every week. For example, the restorer can retain a one TB data set with no expiration of data for about 22 weeks before running out of disk space. The Virtual TB column is the amount of uncompressed data that the backup server sees. The Compression Factor column shows the efficiency of compression over the retention period for each data set size.
Table 1: Data set size and retention time
Data Set Size in TB
Weeks of
Retention
Virtual TB Compression
Factor
1.0
1.2
1.4
1.6
0.5
0.6
0.8
1.8
2.0
2.2
2.4
2.5
22
17
14
11
50
41
29
6
5
9
7
5
25
23
22
20
29
28
26
18
16
15
13
14
21
20
19
17
24
24
22
15
13
13
11
12
For an estimate of space needed for your unique data sets, contact Data Domain.
Reclaim Data Storage Disk Space
When either NetBackup or NetWorker expires data, the data is marked by the restorer for deletion.
However, the data is not deleted immediately. The restorer clean operation deletes expired data from the restorer disks. During the clean operation, the restorer file system is available for backup
(write) and restore (read) operations.
A default schedule runs the clean operation every Monday at 3 p.m. for approximately six hours.
You can change the schedule or you can run the operation manually with the filesys clean commands. If you want to increase file system availability and if the restorer is not short on disk
space, consider changing the schedule to once a month. See “ Clean Operations ” on page 59 for
details on changing the schedule.
You can have the clean operation run for a set number of hours or until a set number of gigabytes are available on the restorer. The default is six hours. When the operation finishes, it sends a message to the system log giving the percentage of storage space that was cleaned.
Chapter 2: Disk Space Management 11
Manage File System Use of Disk Space
Manage File System Use of Disk Space
The restorer command filesys show space (or the alias command df) displays the amount of disk space used for data storage and for restorer components.
•
•
•
•
•
# filesys show space
Resource Size GB Used GB Avail GB Use%
------------------------------------------------------
/ddvar 18.3 10.2 8.1 59%
/backup (compressed data collection)
Pre-compression - 219.3 - -
Compressed
Data 670.6 22.1 648.5 3%
If 100% cleaned* 670.6 22.1 648.5 3%
Meta Data 92.0 1.5 90.6 2%
Index 10.8 0.5 10.3 5%
Estimated compression factor*: 9.1x = 219.3/(22.1+1.5+0.5)
* Estimate based on 2004/06/16 cleaning
The /ddvar line gives a rough idea of the amount of space used by and available to the log and core files. Remove old logs and core files to free space in this area.
The Pre-compression line shows the amount of virtual data stored on the restorer. Virtual data is the amount of data sent to the restorer from backup servers.
The Compressed section, Data line shows the actual physical space used by and available for data storage. Warning messages go to the system log and an email alert is generated when the
Use% figure reaches 90%, 95%, and 100%. At 100%, the restorer accepts no more data from backup servers. You must run a filesys clean operation to reclaim disk space. If Use% is always high, use the filesys clean show-schedule command to see how often the operation runs automatically, then use filesys clean schedule to run the operation more often.
Also consider reducing the data retention period or splitting off a portion of the backup to another restorer.
The If 100% cleaned line is an estimate of actual physical space used, and physical space available for data storage if you run the filesys clean start all operation to clean
100% of the file system. The estimate is based on the most recent clean operation.
The Meta Data line tracks space used for the internal file descriptions that the restorer creates for all stored files. Warning messages go to the system log and an email alert is generated when the Use% figure reaches 90%, 95%, and 100%. At 100%, the restorer accepts no more data from backup servers. From the backup server, you must expire or purge backup images to create free space for meta data.
12 DD200 Restorer User Guide
Display the Space Usage Graph
•
•
The Index line tracks space used for internal restorer operations. Warning messages go to the system log and an email alert is generated when the Use% figure reaches 90%, 95%, and
100%. At 100%, the restorer accepts no more data from backup servers. To create free space for the index:
From the backup server, expire or purge backup images.
On the restorer, run the filesys clean start operation.
The Estimated compression ratio line gives a rough idea of data compression efficiency. The estimate is based on the most recent clean operation and changes if the compressibility of data sent to the restorer changes. Note that the compression algorithm includes the metadata and index space as part of the total storage space.
Display the Space Usage Graph
The Data Domain Support web site includes graphs of disk space usage and compression for every restorer that sends autosupport reports to Data Domain. The graphs display a history of disk space usage, a compression ratio, and the total amount of data sent to the restorer. Use the graphs to see how disk space is used on a restorer with your current data retention policies. Vertical drops in each line show when one or more clean processes remove expired data. From the Support web site, select Space Usage Plots.
The plots on the graph are:
• Cumulative Physical The total amount of physical storage in use on the restorer. Look at the left vertical axis of the graph for the total number of gigabytes used for storage.
•
•
Compression Ratio The amount of compression the restorer has done with all of the data received. Look at the right vertical axis of the graph for the compression ratio.
Cumulative Virtual The total amount of data sent to the restorer by backup servers. Virtual data on a restorer is what a backup server sees as the total un-compressed data held by a restorer-as-storage-unit. Look at the left vertical axis of the graph for the total number of gigabytes of data sent to the restorer.
Chapter 2: Disk Space Management 13
Display the Space Usage Graph
Figure 2 shows an example of the display.
Cumulative
Virtual
Compression
Ratio
Cumulative
Physical
Figure 2: Space usage graph
14 DD200 Restorer User Guide
Installation
3
Installation and site configuration for the DD200 restorer consist of the tasks listed below. After configuration, the restorer is fully functional and ready for backups. For site hardware and backup
software requirements, see “ Restorer Interfaces ” on page 4.
• Check the site and backup software requirements.
•
•
•
To use DHCP with Ethernet interfaces, configure the DHCP server with the appropriate restorer information. To configure a restorer using an Ethernet interface, DHCP information is required for at least one interface. The alternative is to use a serial console or a keyboard and monitor.
Set up the restorer hardware.
Set up a serial console or a monitor and keyboard if you are not using an Ethernet interface for configuration.
•
•
Login to the restorer as sysadmin using a serial console, or monitor and keyboard, or SSH and an Ethernet interface.
Answer questions asked by the configuration process that starts automatically when sysadmin first logs in. The process requests all of the basic information needed to use the restorer.
•
•
Optionally, after completing the initial configuration, follow the steps in “ Additional
Configuration ” on page 29 to add to the configuration.
Configure the backup software and servers. See the Data Domain Support web site
(https://support.datadomain.com), Technical Notes section for details about configuring a restorer with specific backup servers and software.
For upgrading restorer software to a new release, see “ Upgrade Restorer Software ” on page 74.
Note Software is pre-installed on the restorer. You do not need to install software. The Install and
Rescue CD attached to the back cover of this manual is for emergency situations, such as when a restorer fails to boot up by itself. In such a situation, please call Data Domain
Technical Support for step-by-step instructions.
15
Site Requirements
Site Requirements
To install a restorer at your site, you need:
• A 4U space in a standard 19 inch rack. A restorer in a rack has the following requirements:
Air conditioning that can cope with the system’s maximum thermal rating of 1,000 BTUs an hour.
The ambient air temperature range is 5° C to 35° C at the front panel of the chassis.
Ventilation and air flow through the front and back panels of the restorer is critical. The restorer requires six inches of unobstructed clearance for both the front panel and the back panel. Do not block or cover the openings in the front and back panels.
In a closed or multi-unit rack, ensure that the unit has adequate airflow and that the ambient air temperature requirements are met.
•
•
•
For configuration and administrative tasks, either a serial console, an Ethernet connection, or a keyboard and monitor.
An Ethernet connection to a restorer interface for data transfer to and from backup servers.
Jumbo frames are supported for the Gigabit Ethernet interfaces.
If the restorer uses Fiber Gigabit Ethernet interfaces, the cables and connecting ports on the other end must be SX compatible.
The restorer is shipped with grounding type (three wire) power cords. To reduce the risk of electric shock, always use the cords with grounded power outlets.
•
•
Single phase AC power systems with a grounded neutral conductor. To reduce the risk of electric shock, do not power the restorer from any other type of power system. Input characteristics:
Voltage: 100 to 240 VAC Full Range.
Frequency: 50 to 60 Hz.
Power required during the first six seconds after power-on: 650W.
Power required during normal operation: 300W. Measurements on typical systems indicate a power requirement of 250 to 300 watts.
Input Current: 9.0 / 5.0 A for 115 / 230 VAC.
Inrush Current: 80A / 100A max. for 115 / 230 VAC for each power module.
Ensure that the circuit used for the restorer is not overloaded. Look for the power ratings on the nameplates of all equipment on the circuit. The total load on the circuit should not exceed the maximum circuit rating. Note that the restorer requires about 650W during the first six seconds after power-on and about 300W during normal operation.
16 DD200 Restorer User Guide
Backup Software Requirements
Backup Software Requirements
A restorer accepts data from many combinations of backup software and servers. See the Data
Domain Support web site (https://support.datadomain.com), Compatibility Matrix section for the latest updates on supported backup software and server combinations.
Note See the Data Domain Support web site, Technical Notes section for configuration details for using specific backup software and server types with a restorer.
CIFS Backup Server Timeout
Internal activities on a Data Domain restorer can take longer than a default CIFS timeout, leading to an error message from the media server. The message is similar to: Network name no longer existed. On all CIFs backup servers using a restorer, change the SESSTIMEOUT value from the default of 45 (seconds) to 300 (five minutes).
•
•
If you want detailed background information, see the following web page: http://support.microsoft.com/default.aspx?scid=http://support.mocrosoft.com:80/support/kb/ articles/Q102/0/67.asp&NoWebContent=1
Open REGEDT32 and navigate to:
HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\SERVICES\
LANMANWORKSTATION\PARAMTERS
•
•
If the SESSTIMEOUT key does not exist, click in the right panel and select New and DWORD
value. Create a new key, SESSTIMEOUT. Note that the registry is case sensitive. Use all caps for the new key name.
Double click on the new (or existing) key and set the value to 300.
DHCP Server
If one or more of the restorer Ethernet interfaces are to use DHCP, the DHCP server needs MAC addresses for the interfaces and a hostname for the restorer. Data Domain recommends configuring infinite lease IP addresses for the restorer interfaces. All of the interfaces do not need to use DHCP.
If you set an interface to use DHCP and DHCP is not yet available to the interface, the restorer attempts to set up the interface without DHCP until DHCP is available. Use the net show settings command to display which interfaces are configured for DHCP.
Chapter 3: Installation 17
Hardware Installation
Each Ethernet interface on the back of the restorer is labeled with its MAC address. See
Eth0 is a 10/100 Base-T interface. Eth1 is a copper 1000 Base-T gigabit interface. The optional eth2 and eth3 are for additional Fiber or copper Ethernet interfaces. The MAC addresses for eth0 and eth1 are vertical labels just to the right of each port. The MAC addresses for eth2 and eth3 are vertical labels just above eth2. The label on the left is for eth2 and the label on the right is for eth3.
Figure 3: Ethernet interfaces eth0 eth1 eth2 eth3
Hardware Installation
Caution The two side brackets on the restorer’s front faceplate (see
support the weight of the restorer. In a rack, support the restorer with slide rails.
•
•
Mount the restorer in a 4U space in a 19-inch, four-post rack using the slide rails provided by
Data Domain. Any other means of mounting the restorer must be rated for at least 100 pounds
(45 kilograms).
Open the slide rails package that ships with the restorer.
Using the instruction sheet included with the slide rails, mount the slide rail guides onto the restorer. Make sure that the front and back rail mounting faces are parallel with each other and with the front panel of the rack. Make sure that both rails are horizontal.
Mount the slide rails onto the rack.
Slide the restorer into the rack.
Determine whether your configuration and ongoing administration access for the restorer is to be through an Ethernet connection, a serial console, or a monitor and keyboard.
For a serial console, attach an RS232 cable to the DB9 port (labeled “Console Port”) on the back panel. See
Figure 4 . Use the console communication settings of: 9600 baud, 8
data bits, no parity, 1 stop bit.
18 DD200 Restorer User Guide
Hardware Installation
For an Ethernet connection, attach an Ethernet cable to one of the Ethernet interfaces, eth0, eth1, eth2, or eth3 on the back panel. See
Figure 3 for Ethernet interface locations.
For a monitor and keyboard, attach the monitor to the port labeled VGA and the keyboard to the port nearest the keyboard icon. See
•
•
Keyboard port
Figure 4: Access points
Console port Monitor (VGA) port
Attach at least one Ethernet cable to an Ethernet interface on the back panel for backup and restore communications between the restorer and your backup servers. See
Figure 3 on page 18 for Ethernet interface locations.
Attach the power cords to the three power supplies. See
Power Supply Alarm Reset
Power cord slots
Figure 5: Power cord plug-in slots
• Plug in the three power cords to a power source.
Chapter 3: Installation 19
Login and Configuration
• Push, but do not hold in, the power button (the button on the left) on the front panel to turn on the restorer. See
Figure 6 on page 20 for the location. If the restorer does not start, you may
have held in the power button for too long. Try again with a quick push-in and release of the power button.
Note If the restorer attempts a startup as soon as power is available to one power supply, the attempt fails and the power supply alarm begins to emit a buzzing sound. To complete the startup:
Plug in the other two power cords so that all three power supply units have power.
Push the and hold the Power Supply Alarm Reset button for a few seconds. See Figure 5 .
Send email to [email protected] alerting Data Domain to the unexpected startup attempt.
• After the restorer starts, the right LED on each disk should show a steady green light. The LED glows red on a failed disk. The left LED on each disk flickers green when software accesses the disk.
Side bracket
Power button
Figure 6: Power button
Login and Configuration
After the hardware is installed and running, the config setup command automatically starts at the first time sysadmin logs in. The command reappears at each login until configuration is complete. If you earlier set up DHCP for one or more restorer Ethernet interfaces, a number of the config setup prompts display the values given to the restorer from a DHCP server.
20 DD200 Restorer User Guide
Login and Configuration
DHCP servers normally supply values for a number of networking parameters. Press Return during the installation to accept DHCP values. If you do not use DHCP for an interface, determine what you will use for the following values before starting the configuration:
•
•
Interface IP addresses.
Interface netmasks.
•
•
•
•
Routing gateway.
DNS server list (if using DNS).
A site domain name, such as yourcompany.com.
A fully-qualified hostname for the restorer, such as dd01.yourcompany.com.
When configuring restorer software:
• At any prompt, enter a question mark (?) for detailed information about the prompt.
•
•
Press Return to accept a displayed value.
Enter either hostnames or IP addresses where ever a prompt mentions a host. Hostnames must be fully qualified, such as srvr22.yourcompany.com.
• For any entry that accepts a list, the entries in the list can be comma-separated, space- separated, or both.
• When configuration is complete, the system is ready to accept backup data. For NFS clients, the restorer is set up to export the /backup and /ddvar directories using NFSv3 over TCP.
For CIFS clients, the restorer has shares set up for /backup and /ddvar.
The configuration utility has five sections. You can configure or skip over any section.
To begin the configuration:
1.
The first login to the restorer can be from a serial console, keyboard and monitor, or through an
Ethernet connection. Log in as user sysadmin. The default password is the serial number that
appears on the rear panel of the restorer. See Figure 7 for the location. You can change the
password as explained in
From a serial console or keyboard and monitor, log in to the restorer at the login prompt.
From a remote machine over an Ethernet connection, give the following command (with the hostname you chose for the restorer) and then give the default password.
# ssh -l sysadmin host-name sysadmin@host-name’s password:
Chapter 3: Installation 21
Login and Configuration
22
Serial number
Figure 7: Serial number location
2.
The restorer command config setup starts automatically.
3.
The first configuration section is for licensing. Licenses that you ordered with the restorer are already installed. At the first prompt, enter yes to configure or view licenses.
Enter the license characters, including dashes, for each license category.
Make no entry and press Enter for categories that you want to leave as is.
LICENSES Configuration
Configure LICENSES at this time (yes|no) [no]: yes
NFS License Code
Enter your NFS license code []:
CIFS License Code
Enter your CIFS license code []:
CAPACITY License Code
Enter your CAPACITY license code []:
REPLICATION License Code
Enter your REPLICATION license code[]:
A listing of your choices appears. You can accept the settings (Save), reject the settings and leave the setup process (Abort), or return to the beginning of the current section and change settings (Retry). A Retry shows your previous choice for each prompt. Press
Return to accept the displayed value or enter a new value.
Here is a recap of the LICENSE settings.
NFS License: ABCD-ABCD-ABCD-ABCD
CIFS License: ABCD-ABCD-ABCD-ABCD
CAPACITY License: ABCD-ABCD-ABCD-ABCD
Do you want to save these settings (Save|Abort|Retry):
DD200 Restorer User Guide
Login and Configuration
4.
The second section is for network configuration. At the first prompt, enter yes to configure network parameters.
Note After configuring the restorer to use DNS, the restorer must be rebooted. Also, if DHCP is disabled for all interfaces and then later enabled for one or more interfaces, the restorer must be rebooted.
NETWORK Configuration
Configure NETWORK parameters at this time (yes|no) [no]: a.
The first prompt is for a restorer machine name. Enter a fully-qualified name that includes the domain name. For example: dd01.yourcompany.com.
Hostname
Enter the hostname for this system (fully-qualified domain name)[]: b.
Supply a domain name, such as yourcompany.com, for use by restorer utilities, or accept the display of the domain name used in the hostname.
Domainname
Enter your DNS domainname []: c.
Configure each Ethernet interface that has an active Ethernet connection. If you earlier set up DHCP for an interface, the IP address and netmask prompts do not appear. You can accept or not accept DHCP for each interface.
If you enter yes for DHCP and DHCP is not yet available to the interface, the restorer attempts to set up the interface with DHCP until DHCP is available. Use the net show settings command to display which interfaces are configured for DHCP.
If you are on an Ethernet interface and you choose to not use DHCP for the interface, the connection is lost when you complete the configuration.
At the last prompt, entering an a (Abort) exits the configuration utility.
The first interface (eth0) is a 10/100 Base-T Ethernet connection. The other three interfaces (eth1, eth2, and eth3) are Gigabit Ethernet connections. The same set of prompts appears for each interface.
Ethernet port eth0:
Enable this port (yes|no) [ ]:
Use DHCP on this port (yes|no) [ ]:
IP Address []:
Netmask [ ]:
When not using DHCP on any Ethernet port, you must specify an IP address for a default routing gateway.
Chapter 3: Installation 23
Login and Configuration
Default Gateway
Enter the default gateway IP address[]:
When not using DHCP on any Ethernet port, you can enter up to three DNS servers for a restorer to use for resolving hostnames into IP addresses. Use a comma- separated or space-separated list. Enter a space for no DNS servers. With no DNS servers, you can use the net hosts commands to inform the restorer of IP addresses for relevant hostnames.
DNS Servers
Enter the DNS Server list (zero, one, two or three IP addresses)[]: d.
A listing of your choices appears. You can accept the settings (Save), reject the settings and leave the setup process (Abort), or return to the beginning of the current section and change settings (Retry). A Retry shows your previous choice for each prompt.
Here is a recap of the NETWORK settings.
Hostname: srvr26.yourcompany.com
Domainname: yourcompany.com
Ethernet settings: port enabled DHCP IP address netmask
-------------------------- --------------- eth0: yes eth1: no eth2: yes eth3: no yes n/a no n/a dhcp-supplied) (dhcp-supplied) n/a
192.168.1.5
n/a n/a
255.255.255.0 n/a
Default Gateway: 192.168.1.1
DNS Server List: 192.168.1.34, 192.168.1.35
Do you want to save these settings (Save|Abort|Retry):
Note An information box also appears in the recap if any interface is set up to use DHCP, but does not have a live Ethernet connection. After troubleshooting and completing the Ethernet connection, wait for up to two minutes for the restorer to update the interface. The Cable column of the net show hardware command displays whether or not the Ethernet connection is live for each interface.
5.
The third section is for CIFS (Common Internet File System) configuration and appears only if the restorer has a CIFS license. At the first prompt, enter yes to configure CIFS parameters.
24 DD200 Restorer User Guide
Login and Configuration
Note Every user account from outside a restorer that needs access to a restorer must have a local account on the restorer, even when using Active Directory as the access mode. After the installation, give access to restorer shares using the command line interface on the restorer.
Use the user add command to add users and the cifs add command to add client machines from which users access the restorer.
CIFS Configuration
Configure CIFS at this time (yes|no) [no]: yes a.
Select a user-authentication method for the CIFS user accounts that connect to the
/backup and /ddvar shares on the restorer.
CIFS Authentication
Which authentication method will this system use
(Workgroup|Domain|Active-Directory) [ ]:
The Workgroup method has the following prompts. Enter a workgroup, the name of a
CIFS backup account and password, a WINS server name, and backup server names.
Workgroup Name
Enter the workgroup name for this system
[ ]:
Do you want to add a backup user yes|no) [no]:
Backup User
Enter backup user name:
Backup User Password
Enter backup user password:
Enter the WINS server for the restorer to use:
WINS Server
Enter the IP address for the WINS server for this system
[]:
Enter one or more backup servers as restorer clients.
Backup Servers
Enter the Backup Server list (CIFS clients of /backup)
[]:
The Domain method brings the following prompts. Enter a domain name, the name of a
CIFS backup account, one or more domain controller IP addresses, a WINS server name, and backup server names. Press Enter with no entry to break out of the prompts for domain controllers.
Chapter 3: Installation 25
Login and Configuration
26
Domain Name
Enter the name of the Windows domain for this system
[ ]:
Do you want to add a backup user? (yes|no) [no]:
Backup user
Enter backup user name:
Domain Controller
Enter the IP address of domain controller 1 for this system
[ ]:
Enter the WINS server for the restorer to use:
WINS Server
Enter the IP address for the WINS server for this system
[]:
Enter one or more backup servers as restorer clients.
Backup Servers
Enter the Backup Server list (CIFS clients of /backup)
[]:
The Active-Directory method brings the following prompts. Enter a fully-qualfied realm name, the name of a CIFS backup account, a WINS server name, and backup server names. Data Domain recommends not specifying a domain controller. When not using a domain controller, be sure to specify a WINS server. The restorer must meet all active-directory requirments, such as a clock time that is no more than five minutes different than the domain controller. Press Enter with no entry to break out of the prompts for domain controllers.
Active-Directory Realm
Enter the name of the Active-Directory Realm for this system
[ ]:
Do you want to add a backup user? (yes|no) [no]:
Backup user
Enter backup user name:
Domain Controller
Enter the IP address of domain controller 1 for this system [ ]:
Enter the WINS server for the restorer to use:
WINS Server
Enter the IP address for the WINS server for this system
[]:
DD200 Restorer User Guide
Login and Configuration
Enter one or more backup servers as restorer clients.
Backup Servers
Enter the Backup Server list (CIFS clients of /backup)
[]: b.
A listing of your choices appears. You can accept the settings (Save), reject the settings and leave the setup process (Abort), or return to the beginning of the current section and change settings (Retry). A Retry shows your previous choice for each prompt. Press
Return to accept the displayed value or enter a new value. The following example is with an authentication mode of Active-Directory.
Here is a recap of the CIFS settings.
Auth Method:
Domain:
Active-Directory domain1
Realm: domain1.local
Domain Controller 1: dc1.yourcompany.com
WINS Server:
Backup Server List: *
192.168.1.10
Do you want to save these settings (Save|Abort|Retry):
6.
The fourth section is for NFS configuration and appears only if the restorer has an NFS license.
At the first prompt, enter yes to configure NFS parameters.
NFS Configuration
Configure NFS at this time (yes|no) [no]: yes a.
Add backup servers that will access the restorer through NFS. You can enter a list that is comma-separated, space-separated, or both. An asterisk (*) opens the list to all clients.
The default NFS options are: rw, no_root_squash, no_all_squash, and secure. You can later use adminaccess add and nfs add /backup to add backup servers.
Backup Servers
Enter the Backup Server list (NFS clients of /backup)[]: b.
A listing of your choices appears. You can accept the settings (Save), reject the settings and leave the setup process (Abort), or return to the beginning of the current section and change settings (Retry). A Retry shows your previous choice for each prompt.
Here is a recap of the NFS settings.
Backup Server List:
Do you want to save these settings (Save|Abort|Retry):
Chapter 3: Installation 27
Login and Configuration
7.
The fifth section is for system parameters. At the first prompt, enter yes to configure system parameters.
SYSTEM Configuration
Configure SYSTEM Parameters at this time (yes|no) [no]: a.
You can change the sysadmin password. Re-enter the password for verification:
Sysadmin Password
Do you want to change the sysadmin password? (yes|no)
[no]:
Enter new password:
Re-enter new password: b.
Add a client host from which you will administer the restorer. The default NFS options are: rw, no_root_squash, no_all_squash, and secure. You can later use the commands adminaccess add and nfs add /ddvar to add other administrative hosts.
Admin host
Enter a hostname for administrative access to the restorer []: c.
You can add an email address so that someone at your site receives email for system alerts and autosupport reports. For example, [email protected]. By default, the restorer email lists include an address for the Data Domain support group. You can later use the restorer commands alerts and autosupport to add more addresses.
Admin email
Enter an email address or group alias that will receive email from the restorer. The address is also used as the
‘From’ address in all email sent by the restorer []: d.
You can enter a location description for ease of identifying the physical machine. For example, Bldg4-rack10. The alerts and autosupport reports display the location.
System Location
Enter a physical location, to better identify this system []: e.
Enter the name of a local SMTP (mail) server for restorer emails. If the server is an
Exchange server, be sure that SMTP is enabled.
SMTP Server
Enter the hostname of a mail server to relay email alerts []:
28 DD200 Restorer User Guide
Additional Configuration f.
The default time zone for each restorer is the factory time zone. For a complete list of time
zones, see “ Time Zones ” on page 167.
Timezone Name
Enter your timezone name [US/Pacific]: g.
A listing of your choices appears. You can accept the settings (Save), reject the settings and leave the setup process (Abort), or return to the beginning of the current section and change settings (Retry). A Retry shows your previous choice for each prompt. Press
Return to accept the displayed value or enter a new value.
Here is a recap of the SYSTEM settings.
Admin email: [email protected]
System Location: Server Room 52327
SMTP Server: mail.yourcompany.com
Timezone name: US/Pacific
Do you want to save these settings (Save|Abort|Retry):
Note For Tivoli Storage Manager on an AIX backup server to access a restorer, you must re-add the backup server to the restorer after completing the original configuration setup. On the restorer, run the following command with the server-name of the AIX backup server:
# nfs add /backup server-name insecure h.
Configure the backup servers. For the most up-to-date information about setting up backup servers for use with a restorer, go to the Data Domain Support web site
(http://support.datadomain.com/). See the Technical Notes section.
Additional Configuration
The following are common changes to the restorer configuration that users make after the initial configuration. Each change describes the general task and the command used to accomplish the task.
•
• alerts add addr1[,addr2,...]
Give access to additional backup servers. See “ NFS Management ” on page 103 for details.
nfs add /backup srvr1[,srvr2,...]
Chapter 3: Installation 29
Administering a Restorer
•
•
•
•
•
From a remote machine, add an authorized SSH public key to the restorer. See “ Add an
Authorized SSH Public Key ” on page 38 for details.
ssh-keygen -d ssh -l sysadmin rstr01 “adminaccess add ssh-keys” \
< ~/.ssh/id_dsa.pub
Add remote hosts that can use FTP or TELNET on the restorer. See “ Add a Host ” on page 37
for details.
adminaccess add {ftp | telnet}{all | host1[,host2,...]}
adminaccess enable {ftp | telnet | ssh | all}
Add a standard user. See “ User Administration ” on page 41 for details.
user add username
Change a user password. See “ User Administration ” on page 41 for details.
user change password username
Administering a Restorer
The remaining chapters in this book detail the use of all restorer commands and operations. The headings in each chapter are a task-oriented list of operations performed by the featured commands.
To find the command for any task that you want to perform, do either of the following:
• Look in the table of contents at the beginning of this guide for the heading that describes the task.
• List the restorer commands and operations. To see a list of commands, log in to the restorer using SSH (or TELNET if that is enabled) and enter a question mark (?) at the prompt. To see a list of operations available for a particular command, enter the command name. To display a detailed help page for a command, use the help command with the name of the target command. Use the up and down arrow keys to move through a displayed command. Use the q key to exit. Enter a slash character (/) and a pattern to search for and highlight lines of particular interest.
30 DD200 Restorer User Guide
Configuration Management
4
The restorer config command allows you to examine and modify all of the configuration
parameters that are set in the initial system configuration. See “ config ” on page 186 for the
complete command syntax. The license command allows you to add, delete, and display feature
licenses. See “ license ” on page 201 for the complete command syntax.
The Config Command
The config setup command brings up the same prompts as the initial system configuration.
You can change any of the configuration parameters as detailed in the section “ Login and
Configuration ” on page 20. All of the config operations are available only to administrative
users.
You can also use other restorer commands to change individual configuration settings. Most of the remaining chapters of this manual detail using individual commands. An example of an individual command that sets only one of the config possibilities is nfs add to add NFS clients.
Change Configuration Settings
To change multiple configuration settings with one command, use the config setup operation.
The operation displays the current value for each setting. Press the Enter key to retain the current value for a setting. Administrative users only.
config setup
See “ Login and Configuration ” on page 20 for details about using config setup. Enter the
command from a command prompt to change values after the initial setup.
Many other restorer commands change configuration settings. For example, the user add command adds another user account each time a user is added.
31
The Config Command
Display Configuration Keys and Settings
To display the configuration settings, use the dump operation.
config dump
The following example displays selected lines from a config dump operation:
# config dump config.admin_email = '[email protected]' config.admin_host = 'td.yourcompany.com' config.alerts.email_list = '[email protected]' config.alerts.email_list = '[email protected]' config.aliases.default_set.sysadmin = '1' config.aliases.sysadmin.date = 'system set date' config.aliases.sysadmin.df = 'filesys show space' config.expunge.schedule.days = 'Mon' config.expunge.schedule.time = '1300' config.hosts.allow.ssh = 'ALL:js.yourcompany.com' config.location = 'Bldg 12 rm 122 rack 8' config.net.default_gateway = '192.168.1.1' config.net.domainname = 'yourcompany.com' config.net.eth0.enabled = 'true' config.net.eth0.use_dhcp = 'true' config.net.eth2.enabled = 'true' config.net.eth2.ip_address = '192.168.1.2' config.net.eth2.use_dhcp = 'false' config.net.hostname = 'dd24.yourcompany.com' config.net.ntp_server = 'multicast' config.net.smtp_server = 'mail.yourcompany.com' config.net.uses_ntp = 'true' config.nfs.client./backup.* ='(rw,no_root_squash, no_all_squash,secure)' config.timezone = 'America/Los_Angeles' config.user.accounts.sysadmin = 'admin' config.user.accounts.jsmith = 'user'
Display a Single Configuration Setting
To display a single setting from the configuration, use the show key or show nokey key operations. All valid keys for the configuration are displayed with the config dump command.
config show [nokey] key
32 DD200 Restorer User Guide
The Config Command
The show key display includes the key name and the key value as in the following example:
# config show config.hosts.allow.cli config.hosts.allow.cli=sysadmin:sys24
The show nokey key display returns only the key value as in the following example. The command is useful for returning values to scripts.
# config show nokey config.hosts.allow.cli sysadmin:sys24
A truncated key description displays all keys that begin with the shortened description. For example, the following command displays all entries that begin with config.user:
# config show config.user config.user.accounts.sysadmin = admin config.user.accounts.jsmith = user
Return to the Default Configuration
To return all restorer settings to the default factory settings, use the reset operation.
config reset
Any configuration setting that you have given to a restorer and that is not in the following list is lost during a reset. For example, the command nfs add /backup client24 adds a host that can access the restorer /backup directory. After a reset, no host has access to /backup. To save a
configuration before using the reset operation, see “ Save and Return a Configuration ” on page 34.
Only the sysadmin user can run this command.
•
•
•
•
•
The Ethernet interfaces are all enabled and set to use DHCP.
The use of an NTP time server is enabled with the multicast mode.
The autosupport report runs on Sunday at 3 a.m. (sun 0300).
The clean operation runs on Monday at 1 p.m. (mon 1300).
The background verify operation is running.
•
•
•
•
•
The SSH administrative protocol is enabled and open for ALL.
The FTP and TELNET administrative protocols are disabled and are closed to all users.
The only user is sysadmin.
The sysadmin password is the system serial number.
The email lists for alerts and autosupport operations contain only the Data Domain addresses.
Chapter 4: Configuration Management 33
The License Command
Save and Return a Configuration
Using SSH, you can direct output from the restorer config dump command, which returns all restorer configuration settings, into a file on a remote host from which you do restorer administration. You can later use SSH to return the file to the restorer, which immediately recognizes the settings as a configuration and accepts the settings as the current configuration.
For example, the following command connects with the restorer dd10 as user sysadmin, asks for the password, returns output from the command config dump that is run on the restorer, and stores the output in the local file (remote from the restorer) /tmp/config12:
# ssh -l sysadmin dd10 config dump > /tmp/config12 sysadmin@dd10’s password: config.aliases.default_set.root = '1' config.aliases.default_set.sysadmin = '1' config.aliases.sysadmin.df = 'filesys show space' config.aliases.sysadmin.halt = 'system poweroff'
The following command returns the configuration settings from the file /tmp/config12 to the restorer. The settings immediately become the current configuration for the restorer.
# ssh -l sysadmin dd10 < /tmp/config12 sysadmin@dd10’s password:
Reloading configuration: (CHECKED)
Security access lists (from adminaccess) updated
Bringing up DHCP client daemon for eth0...
Bringing up DHCP client daemon for eth2...
The License Command
The license command manages licensed features on a restorer.
Add a License
To add a feature license, use the add operation. The code for each license is a string of 16 letters with dashes. Include the dashes when entering the license code. Administrative users only.
The licensed features are:
•
•
•
CAPACITY-FULLSIZE Use all the disk space on a restorer. When upgrading from HALF to
FULL, simply add the FULL license. The HALF license is automatically replaced and the increased disk space is immediately available.
CAPACITY-HALFSIZE Use only half the disk space on a restorer.
NFS Do backups, restores, and administration from NFS clients.
34 DD200 Restorer User Guide
•
•
CIFS Do backups, restores, and administration from CIFS clients.
REPLICATION Allow replication of data from one restorer to another.
license add license-code
For example:
# license add ABCD-BCDA-CDAB-DABC
License “ABCE-BCDA-CDAB-DABC” added.
The License Command
Remove a License
To remove a current license, use the del operation. Enter the license feature name or code (as shown with the license show command). Deleting an NFS or CIFs license immediately stops all new NFS or CIFS operations. NFS or CIFs are not disabled, but new operations are blocked.
Administrative users only.
license del {license-feature | license-code}
For example:
# license del capacity-fullsize
The CAPACITY-FULLSIZE license is removed.
Reset Licenses
To return the system to the single default license of CAPACITY-HALFSIZE, use the reset operation. Administrative users only.
license reset
Display Licenses
To display current licenses, use the show operation. Each line gives the license code and the name of the licensed feature. Administrative users only.
license show
For example:
# license show
1 ABCD-BCDA-CDAB-DABC NFS
2 BCDE-CDEB-DEBC-EBCD CIFS
3 CDEF-DEFC-EFCD-FCDE CAPACITY-FULLSIZE
4 DEFA-EFCD-FCDE-CDEF REPLICATION
There are 4 licenses
Chapter 4: Configuration Management 35
The License Command
36 DD200 Restorer User Guide
Access Control for Administration
5
The restorer adminaccess command allows remote hosts to use the FTP, TELNET, and SSH administrative protocols on the restorer. The command is available only to restorer administrative
users. See “ adminaccess ” on page 173 for the complete command syntax.
The FTP and TELNET protocols have host-machine access lists that limit access. The SSH protocol is open to the default user sysadmin and to all restorer users added with the user add command. By default, only the SSH protocol is enabled.
Add a Host
To add a host (IP address or hostname) to the FTP or TELNET protocol access lists, use the add operation. For the FTP list, use an IP address for each host or a class-C network address that includes the hosts. You can enter a list that is comma-separated, space-separated, or both. To give access to all hosts, the host-list can be an asterisk (*). Administrative users only.
adminaccess add {ftp | telnet} host-list
For example, to add hosts to the list of hosts that can use TELNET on the restorer:
# adminaccess add telnet srvr24,srvr25
To allow an entire local subnet to use TELNET on the restorer:
# adminaccess add telnet 192.123.45.
Remove a Host
To remove hosts (IP addresses, hostnames, or asterisk (*)) from the FTP or TELNET access lists, use the del operation. You can enter a list that is comma-separated, space-separated, or both.
Administrative users only.
adminaccess del {ftp | telnet} host-list
For example, to remove a host named srvr24 from the list of hosts that can use TELNET on the restorer:
# adminaccess del telnet srvr24
37
Reset a List
Reset a List
By default, FTP and TELNET are disabled and have no entries in their access lists. SSH is enabled.
No one is able to use FTP or TELNET unless the appropriate access list has one or more host entries. The reset operation returns the FTP and TELNET protocols to the default state of
disabled with no entries and sets SSH to enabled. Administrative users only.
adminaccess reset {ftp | telnet | ssh | all}
For example, to reset the FTP list to an empty list and reset FTP to disabled:
# adminaccess reset ftp
Enable a Protocol
By default, only the SSH service is enabled. FTP and TELNET are disabled. The enable operation enables a protocol on the restorer. Note that to use FTP and TELNET, you must also add host machines to the access lists. Administrative users only.
adminaccess enable {ftp | telnet | ssh | all}
For example, to enable the FTP service:
# adminaccess enable ftp
Disable a Protocol
To disable a service on the restorer, use the disable operation. Disabling FTP or TELNET does not affect entries in the access lists. If all services are disabled, the restorer is accessible only through a serial console or keyboard and monitor. Administrative users only.
adminaccess disable {ftp | telnet | ssh | all}
For example, to disable the FTP service:
# adminaccess disable ftp
Add an Authorized SSH Public Key
Adding an authorized SSH public key to the SSH key file on a restorer is done from a machine that will access the restorer. Adding a key allows a user to log in from the remote machine to the restorer without entering a password. Available only to the user sysadmin. After creating a key on the remote machine, use the add ssh-keys operation. Administrative users only.
adminaccess add ssh-keys
38 DD200 Restorer User Guide
Remove an SSH Key File Entry
For example, the following steps create a key and then write the key to a restorer:
1.
On the remote machine, create the public and private SSH keys.
jsmith > ssh-keygen -d
Generating public/private dsa key pair.
Enter file in which to save the key (/home/jsmith/.ssh/id_dsa):
.
.
2.
Press Enter to accept the file location and other defaults. The public key created under
/home/jsmith/.ssh (in this example) is id_dsa.pub.
3.
On the remote machine, write the public key to the restorer, dd10 in this example. The restorer asks for the sysadmin password before accepting the key: jsmith > ssh -l sysadmin dd10 “adminaccess add ssh-keys” \
< ~/.ssh/id_dsa.pub
Remove an SSH Key File Entry
To remove one entry from the SSH key file, use the del ssh_keys lineno operation. The
lineno variable is the line number as displayed by the adminaccess show ssh-keys command. Available only to administrative users.
adminaccess del ssh-keys lineno
For example, to remove the third entry in the SSH key file:
# adminaccess del ssh-keys 3
Remove the SSH Key File
To remove the entire SSH key file, use the reset ssh-keys operation. Available only to administrative users.
adminaccess reset ssh-keys
Display the SSH Key File
To display all entries in the SSH key file, use the show ssh-keys operation. The output gives a line number to each entry. Available only to administrative users.
adminaccess show ssh-keys
Chapter 5: Access Control for Administration 39
Display Hosts and Status
Display Hosts and Status
To display protocol access lists and status, use the show operation. Administrative users only.
adminaccess show [ftp | telnet | ssh | all]
For example, to show the FTP list and status:
# adminaccess show ftp
FTP access: enabled
The FTP trusted hosts list is: admin12.yourcompany.com, admin14.yourcompany.com
Return Command Output to a Remote machine
Using SSH, you can have output from restorer commands return to a remote machine at login and then automatically log out. Available only to the user sysadmin. For example, the following command connects with the machine dd10 as user sysadmin, asks for the password, and returns output from the command filesys status.
# ssh -l sysadmin dd10 filesys status sysadmin@dd10’s password:
The filesystem is enabled
You can create a file with a number of restorer commands, with one command on a line, and then use the file as input to the login. Output from all the commands is returned. For example, a file named cmds11 could contain the following commands: filesys status system show uptime nfs show status
The login and the returned data look similar to the following:
# ssh -l sysadmin dd10 < cmds11 sysadmin@dd10’s password:
The filesystem is enabled
3:00 pm up 14 days 10 hours 15 minutes 1 user, load average:
0.00, 0.00, 0.00
The NFS system is currently active and running
Total number of NFS requests handled = 314576
40 DD200 Restorer User Guide
User Administration
6
The restorer command user adds, removes, and displays users and changes user passwords. A restorer has two classes of user accounts. The user class is for standard users who have access to a limited number of commands. Most of the user commands display information. The admin class is administrative users who have access to all restorer commands. The default administrative account is sysadmin. You can change the sysadmin password, but cannot delete the account.
Throughout this manual, command explanations include text similar to the following for commands or operations that standard users cannot access: Available to administrative users only.
See “ user ” on page 245 for the complete command syntax.
Add a User
To add a restorer user, use the add user-name operation. The operation asks for a password and confirmation or you can include the password as part of the command. Each user has a privilege level of either admin or user. User is the default. The only way to change a user’s privilege level is to delete the user and then add the user with the other privilege level. Available to administrative users only.
user add user-name [password password][priv {admin | user}]
For example, to add a user with a login name of jsmith, a password of usr256, and administrative privilege:
# user add jsmith password usr256 priv admin
Remove a User
To remove a user from a restorer, use the del user-name operation. Available to administrative users only.
user del user-name
For example, to remove a user with a login name of jsmith:
# user del jsmith user jsmith removed
41
Change a Password
Change a Password
To change a user password, including the password for the sysadmin user, use the change password user-name operation. The operation asks for the new password and then asks you to re-enter the password as a confirmation. Without the user-name component, the command changes the password for the current user. Available to sysadmin to change any user password and available to all users to change only their own password.
user change password [user-name]
For example, to change the password for a user with a login name of jsmith:
# user change password jsmith
Enter new password:
Re-enter new password:
Passwords matched
Reset to the Default User
To reset the user list to the one factory default user, sysadmin, use the reset operation. Available to administrative users only.
user reset
The response looks similar to the following, which lists all removed users:
# user reset
Removing user jsmith
Removing user bjones
Can not remove user sysadmin
Display Current Users
To display a list of users currently logged in to a restorer, use the show active operation.
user show active
The display looks similar to the following and shows the user name, the time and date of the login, and the machine through which the user logged in.
# user show active sysadmin pts/0 Jun 9 13:33 (srvr12.yourcompany.com) jsmith pts/1 Jun 9 13:41 (srvr24.yourcompany.com)
42 DD200 Restorer User Guide
Display All Users
Display All Users
To display a list of all the restorer users, use the show list operation. Available to administrative users only.
user show list
The display looks similar to the following. Last login from shows the machine from which the user logged in. Latest gives the time of the most recent login.
# user show list
Login name
--------sysadmin
Class Last login from
----- ---------------
Latest
------- admin user24.yourcompany.com
Mon Jun 9 14:55:47
2004 bjones
2004 user user25.yourcompany.com
Mon Jun 8 12:36:30 jsmith
3 users found.
user user26.yourcompany.com
(never)
Chapter 6: User Administration 43
Display All Users
44 DD200 Restorer User Guide
Alerts and System Reports
7
A restorer uses multiple methods to inform administrators about the status of software and hardware. The restorer alerts, autosupport, and AM email features send messages and reports to user-configurable lists of email addresses. The lists include an email address for Data Domain support staff who monitor the status of all restorers and contact your company when problems are reported. The messages also go to the system log.
• The alerts feature sends an email whenever a critical component in the system fails or is known, through monitoring, to be out of an acceptable range. Consider adding pager email addresses to the alerts email list so that someone is informed immediately about system problems. For example, a single fan failure is not critical and does not generate an alert as the system can continue normal operations; however, multiple fan failures can cause a system to begin overheating, which generates an alerts email.
•
•
•
•
Each disk, fan, and CPU in the restorer is monitored. Temperature extremes are also
monitored. See “ Display Hardware Status ” on page 78 for details about hardware monitoring.
See “ alerts ” on page 176 for the complete command syntax.
The autosupport feature sends a daily report that shows system identification information and
consolidates the output from a number of restorer commands. See “ Run the Autosupport
Report ” on page 51 for details. Data Domain support staff use the report for troubleshooting.
See “ autosupport ” on page 180 for the complete command syntax.
Every morning at 8:00 a.m., the restorer sends an AM email to the autosupport email list. The purpose is to highlight hardware or other failures that are not critical, but that should be dealt with soon. An example would be a fan failure. A failed fan should be replaced as soon as is reasonably possible, but the system can continue operations.
The AM email is a copy of output from alerts show current (see “ Display Current
numbers.
Non-critical hardware problems generate email messages to the autosupport list. An example is a failed power supply when the other two power supplies are still fine. If the situation is not fixed, the message also appears in the AM email.
45
Alerts
Alerts
Use the alerts command to administer system alerts.
Add to the Email List
To add an email address to the alerts list, use the add operation. By default, the list includes an address for Data Domain support staff. The email-list is a list of addresses that are comma- separated or space-separated or both. After adding to the list, always use the alerts test operation to test for mailer problems. The operation is for administrative users only.
alerts add email-list
For example, to add an email address to the alerts list:
# alerts add [email protected]
Test the Email List
To test the alerts list, use the test ”reason” operation, which sends an email with the reason to each address on the list or to a specific address. Use double quotes around the reason. After adding addresses to the list, always use this operation to test for mailer problems.
alerts test “reason” [email-addr]
For example, to test the list with a reason of Testing the alerts email list:
# alerts test “Testing the alerts email list”
Remove from the Email List
To remove an email address from the alerts list, use the del operation. The operation is for administrative users only. The email-list is a list of addresses that are comma-separated or space-separated or both. Administrative users only.
alerts del email-list
For example, to remove an email address from the alerts list:
# alerts del [email protected]
46 DD200 Restorer User Guide
Reset the Email List
By default, the alerts list includes an address for Data Domain support personnel. The reset operation returns the list to the default address. Available only to administrative users.
alerts reset
Alerts
Display Current Alerts
To display current alerts, use the show current operation. An alert is removed from the display when the underlying situation is corrected. For example, Event 1 in the sample display below would be removed when Crossbar fan #5 is replaced with a working unit. Each type of alert maintains only one message in the current alerts list. For example, the display reports the most recent date of a system reboot, not every reboot. Look in the system log file for current and previous messages.
alerts show current
The command returns entries similar to the following:
# alerts show current
Alert Time Description
------------------------
Mon May 25 18:54:48 2004
------------------------------------
Rear fan #1 failure: Current RPM is
0, nominal is 8000
Mon May 24 16:22:58 2004
Mon May 24 16:22:58 2004 process died; restarting.
------------------------
There are 3 active alerts.
Reboot reported. System rebooted
Software Crash reported. DDFS
------------------------------------
Display the Email List
To display all email addresses in the alerts list, use the show alerts-list operation.
alerts show alerts-list
The display is similar to the following. All addresses added to the list by you appear in the display:
# alerts show alerts-list
The Alerts email list is: [email protected], [email protected]
Chapter 7: Alerts and System Reports 47
Alerts
Display the Alerts History
To display the history of alerts messages, use the show history operation. The operation displays alerts messages from all of the existing messages system log files, which hold messages for up to ten weeks. Use the up and down arrow keys to move through the display. Use the q key to exit. Enter a slash character (/) and a pattern to search for and highlight lines of particular interest.
alerts show history
The command returns entries similar to the following:
# alerts show history
Alert Time Description
---------------
May 24 18:54:51
---------------------------------------------
Rear fan #1 failure: Current RPM is 0, nominal is 8000
May 24 18:54:53
May 24 18:54:58 nominal is 8000
---------------
System rebooted
Rear fan #2 failure: Current RPM is 0,
---------------------------------------------
Display Current Alerts and Recent History
To display the current alerts and the alerts history over the last 24 hours, use the show daily operation.
alerts show daily
The display is similar to the following:
# alerts show daily
Current Alert
-------------
Mon May 25 18:54:48 2004
0, nominal is 8000
There is 1 active alert.
Rear fan #1 failure: Current RPM is
Recent Alerts and Log Messages
------------------------------
Jan 25 20:56:43 localhost sysmon: EMS: Crossbar fan #2 failure:
Current RPM is 960, nominal is 4500
48 DD200 Restorer User Guide
Autosupport Reports
Display the Email List and Administrator Email
To display all email addresses in the alerts list and the system administrator email address, use the show all operation.
alerts show all
The display is similar to the following. The administrator address appears twice:
# alerts show all
The Admin email is: [email protected]
The Alerts email list is: [email protected], [email protected]
Autosupport Reports
Use the autosupport command to administer the autosupport reports feature.
Add to the Email List
To add an email address to the autosupport report list, use the add operation. By default, the list includes an address for Data Domain support staff. The email-list is a list of addresses that are comma-separated or space-separated or both. After adding to the list, always use the autosupport send operation to test for mailer problems. Administrative users only.
autosupport add email-list
For example, to add a an email address to the list:
# autosupport add [email protected]
Remove from the Email List
To remove an email address from the autosupport report list, use the del operation. The operation is available only to administrative users. The email-list is a list of addresses that are comma-separated or space-separated or both. Administrative users only.
autosupport del email-list
For example, to remove an email address from the list:
# autosupport del [email protected]
Chapter 7: Alerts and System Reports 49
Autosupport Reports
Reset the Email List
By default, the list includes an address for Data Domain support personnel. The reset operation returns the list to the default address. The operation is available only to administrative users.
autosupport reset support-list
50
Test the Autosupport Report Email List
To create an autosupport report and send it to all addresses in the email list or to a specific address, use the send operation. After adding addresses to the list, always use this operation to test for mailer problems. Each display level gives differing amounts of system information. The default level is normal, which gives information, including log file entries, used by Data Domain support staff.
autosupport send [brief | normal | verbose][email-addr]
For example, after adding the email address [email protected] to the list, the test for that address could be:
# autosupport send brief [email protected]
Set the Schedule
To change the date and time when a restorer automatically runs a verbose autosupport report, use the set schedule operation. The default time is Sunday at 3 a.m. (sun 0300). The operation is available only to administrative users.
•
•
A day is required with the weekly and monthly options. Day is one or two numerals from
1 to 31 when used with the monthly option. Day is the first three letters of a day (for example, tue for Tuesday) with the weekly option.
A time is required. 2400 is not a valid time. An entry of 0000 is midnight at the beginning of a day.
•
•
The weekly option with day and time or the day and time options without weekly run the report once a week.
The never option turns off the report. Set a schedule using any of the other options to turn on the report.
autosupport set schedule [daily | weekly | monthly | never]
[day1[,day2,...]] time
For example, to run the report automatically every Tuesday at 4 a.m, use either of the following two commands.:
# autosupport set schedule tue 0400
# autosupport set schedule weekly tue 0400
DD200 Restorer User Guide
Autosupport Reports
The most recent invocation of the scheduling operation cancels the previous setting. To run the report more than once in time period, set multiple days in one command. For example, to run the report on the first and fifteenth of the month at 4 a.m.:
# autosupport set schedule monthly 1,15 0400
Reset the Schedule
To reset the autosupport report to run at the default time, use the reset schedule operation.
The default time is Sunday at 3 a.m. The operation is available only to administrative users.
autosupport reset schedule
Reset the Schedule and the List
To reset the autosupport schedule and email list to defaults, use the reset all operation.
The operation is available only to administrative users.
autosupport reset all
Run the Autosupport Report
To manually run and immediately display the autosupport report, use the display operation. The
brief display level gives status for hardware, software, the restorer file system, and NFS. Verbose gives information, including log file entries, used by Data Domain support personnel. With no level, the command defaults to normal. Use the up and down arrow keys to move through the display. Use the q key to exit. Enter a slash character (/) and a pattern to search for and highlight lines of particular interest.
autosupport display [brief | normal | verbose]
The display is similar to the following. The first section gives system identification and uptime information:
# autosupport display normal
========== GENERAL INFO ==========
GENERATED_ON=Wed Mar 5 13:17:48 UTC 2003
VERSION=Data Domain Restore Protection Manager 1.0.10.0-6768
SYSTEM_ID=Serial number: 22BM030026
HOSTNAME=dd10.yourcompany.com
LOCATION=Bldg12 room221 rack6
UPTIME= 1:17pm up 124 days, 14:31, 2 users, load average:
0.00, 0.00, 0.00
Chapter 7: Alerts and System Reports 51
Autosupport Reports
The next sections of the display at the normal level are output from the following restorer commands. See each individual command in this manual for details. At the end of the report, an extensive PCI section appears that is used by Data Domain for debugging. (If NFS is licensed.)
•
•
•
•
•
• filesys show space alerts show current net show hardware disk show summary filesys clean status
(The status of the file system verification process)
•
•
•
•
•
•
•
•
• nfs status (If NFS is licensed.) cifs show active (If CIFS is licensed.) cifs show config (If CIFS is licensed.) cifs show clients (If CIFS is licensed.) system status license show net show config net show settings disk show configuration
Send Disk Debug Information
To send the output from the disk show debug command to the autosupport list or to an email address, use the send debug operation. The display is extremely detailed information about disk operations and status used by Data Domain support staff for problem solving.
autosupport send debug [email-addr]
Display all Autosupport Parameters
To display all autosupport parameters, use the show all operation.
autosupport show all
52 DD200 Restorer User Guide
Autosupport Reports
The display is similar to the following. The default display includes only the Data Domain support address and the system administrator address (as given in the initial system configuration). Any additional addresses that you add to the list also appear.
# autosupport show all
The Admin email is: [email protected]
The Autosupport email list is : [email protected], [email protected]
Autosupport is scheduled to run “Sun” at “0300”
Display the Autosupport Email List
To display all email addresses in the autosupport report list, use the show support-list operation. The default list includes the Data Domain support address and the system administrator address.
autosupport show support-list
The default display is similar to the following:
# autosupport show support-list
The Autosupport email list is : [email protected], [email protected]
Display the Autosupport History
To display all autosupport messages, use the show history operation. Use the J key to scroll down through the file, the K key to scroll up, and the Q key to exit. The operation displays autosupport messages from all of the existing messages system log files, which hold messages for up to ten weeks.
autosupport show history
The command returns entries similar to the following:
# autosupport show history
May 30 03:00:46 scheduled autosupport
May 31 03:00:42 scheduled autosupport
Jun 1 03:00:45 scheduled autosupport
Chapter 7: Alerts and System Reports 53
Hourly System Status
Display the Autosupport Report Schedule
Display the date and time when the autosupport report runs with the show schedule operation.
autosupport show schedule
The display is similar to the following:
# autosupport show schedule
Autosupport is scheduled to run “Sun” at “0300”
Hourly System Status
The restorer automatically generates a brief system status message every hour. The message is sent to the system log and to a serial console if one is attached. To see the hourly message, use the log view command. The message reports system uptime, the amount of data stored, the number of
NFS operations, and the amount of disk space used for data storage (as a percentage). For example:
# log view
Jun 27 13:00:00 localhost logger: at 1:00pm up 3 days, 3:42, 52324 NFS ops, 84763 GB data col. (1%)
Jun 27 14:00:00 localhost logger: at 2:00pm up 3 days, 4:42, 59411 NFS ops, 84840 GB data col. (1%)
54 DD200 Restorer User Guide
File System Management
8
The filesys command allows you to display statistics, capacity, status, and utilization of the restorer file system. The command also allows you to clear the statistics file and to start and stop
the file system processes. See “ filesys ” on page 191 for the complete command syntax.The clean
operations of the filesys command reclaim physical storage within the restorer file system.
Statistics and Basic Operations
The following operations manage file system statistics and status displays and start and stop file system processes.
Start the Restorer File System Process
To start the restorer file system, allowing restorer operations to begin, use the enable operation.
Administrative users only.
filesys enable
Stop the Restorer File System Process
To stop the restorer file system, which stops restorer operations, use the disable operation. The operation is available to administrative users only.
filesys disable
Delete All Data in the File System
To delete all data in the restorer file system and re-initialize the file system, use the destroy operation. Deleted data is not recoverable. The and-zero option writes zeros to all disks, which can take many hours. Administrative users only.
filesys destroy [and-zero]
55
Statistics and Basic Operations
The display includes a warning similar to the following:
# filesys destroy
This command irrevocably destroys all data in the ‘/backup’ data collection and creates a newly initialized (empty) file system. The ‘filesys destroy’ operation will take about 15 minutes. File access is disabled during this process.
Are you sure? (yes|no|?) [no]:
Display File System Status
To display the state of the file system process, use the status operation. The display gives a basic status of enabled or disabled with more detailed information for each basic status. If the clean process is running, the status of that process is included.
filesys status
The display is similar to the following:
# filesys status
The filesystem is enabled and running
If the file system was shut down with a restorer command, such as filesys disable, the display includes the command. For example:
# filesys status
The filesystem is disabled and shutdown. [filesys disable]
Display File System Uptime
To display the amount of time that has passed since the file system was last enabled, use the show uptime operation. The display is in days and hours and minutes.
filesys show uptime
The display is similar to the following:
# filesys show uptime
Filesys has been up 47 days, 23:28
Display File System Space Utilization
To display the space used by and available to file system components, use the show space operation. Values are in gigabytes to one decimal place.
filesys show space
56 DD200 Restorer User Guide
Statistics and Basic Operations
The display is similar to the following:
•
•
•
•
•
# filesys show space
Resource Size GB Used GB Avail GB Use%
------------------------------------------------------
/ddvar 18 0 17 1%
/backup (compressed data collection)
Pre-compression - 944 - -
Compressed
Data 1226 7 1219 1%
If 100% cleaned* 1226 6 1220 1%
Meta Data 13 4 8 33%
Index 1 0 1 11%
Estimated compression factor*: 94x =944/(6+4+0)
* Estimate based on 2004/07/28 cleaning
The /ddvar line gives a rough idea of the amount of space used by and available to the log files.
Remove old logs to free space in this area.
The Pre-compression line shows the amount of virtual data stored on the restorer. Virtual data is the amount of data sent to the restorer from backup servers.
The Compressed section, Data line shows the actual physical space used and physical space available for data storage. Warning messages go to the system log and an email alert is generated when the Use% figure reaches 90%, 95%, and 100%. At 100%, the restorer accepts no more data from backup servers. You must run a filesys clean operation to reclaim disk space. If Use% is always high, use the filesys clean show-schedule command to see how often the operation runs automatically, then use filesys clean schedule to set a schedule that runs the operation more often.
The If 100% cleaned line is an estimate of actual physical space used and available for data storage if you were to run the filesys clean start all operation to clean 100% of the file system. The estimate is based on the most recent completed clean operation. If the most recent clean operation was stopped or interrupted, use the filesys clean update-stats command for an updated estimate. The update operation can take up to four hours.
The Meta Data line tracks space used for the internal file descriptions that the restorer creates for all stored files. Warning messages go to the system log and an email alert is generated when the Use% figure reaches 90%, 95%, and 100%. At 100%, the restorer accepts no more data from backup servers. From the backup server, you must expire or purge backup images to create free space for meta data.
Chapter 8: File System Management 57
Statistics and Basic Operations
•
•
The Index line tracks space used for internal restorer operations. Warning messages go to the system log and an email alert is generated when the Use% figure reaches 90%, 95%, and
100%. At 100%, the restorer accepts no more data from backup servers. To create free space for the index:
From the backup server, expire or purge backup images.
On the restorer, run the filesys clean operation.
The Estimated compression ratio line gives a rough idea of data compression efficiency. The estimate is based on the most recent clean operation and changes if the compressibility of data sent to the restorer changes. Note that the compression algorithm includes the metadata and index space as part of the total storage space.
Display Compression
To display the amount of compression for a single file, multiple files, or a file system, use the show compression command. In general, the more often a backup is done for a particular file or file system, the higher the compression. Note that compression for a file or file system that is just rewritten may not display for up to ten minutes. If needed, check again after ten minutes to display the true compression. Other factors may also influence the display. Call Data Domain Technical
Support to analyze displays that seem incorrect.
filesys show compression [path]
In the display, the figure for bytes/storage_used is the compression ratio after all compression of data (global and then local) plus the overhead space needed for meta data. The display is similar to the following for a single file and for a file system:
# filesys show compression /backup/var.tar
Total files: 1, bytes/storage_used: 2.4
Original Bytes: 2,733,137,920
Globally Compressed: 1,941,043,800
Locally Compressed: 1,103,938,251
Meta-data: 31,147,968
# filesys show compression /backup/usr
Total files: 2,266, bytes/storage_used: 3.8
Original Bytes: 178,542,514
Globally Compressed: 13,236,159
Locally Compressed: 8,859,166
Meta-data: 37,612,856
58 DD200 Restorer User Guide
Clean Operations
Using a wild card character to display compression for more than one file returns the same information as above for each file, but in a single line for each file. The g_comp and l_comp in each line is short for global and local compression. The display ends with a summary that has the same format for total figures as with a file system. For example:
# filesys show compression /backup/*.tar
/ddr/col1/segfs/usr.tar: bytes: 3,930,583,040, g_comp:
53,484,389, l_comp: 29,214,049, meta-data: 27,439,680, bytes/storage_used: 69.4
/ddr/col1/segfs/var.tar: bytes: 2,733,137,920, g_comp:
1,941,043,800, l_comp: 1,103,938,251, meta-data: 31,147,968, bytes/storage_used: 2.4
Total files: 2, bytes/storage_used: 5.6
Original Bytes: 6,663,720,960
Globally Compressed (g_comp): 1,994,528,189
Locally Compressed (l_comp): 1,133,152,300
Meta-data: 58,587,648
Clean Operations
The clean operation reclaims physical storage used by deleted objects in the Data Domain file system. Use the clean operations of the filesys command to manually start a clean operation, change the schedule that automatically runs the operation, or check the status of the operation. The default scheduled run time for the operation is Monday at 1 p.m. (mon 1300).
Note The operation can take up to 10 hours on a restorer that is fully loaded with data. During that time, the speed of backup and restore operations may be affected.
You can run the clean operation for a set number of hours, until a set percentage of the file system is cleaned, or until a set number of gigabytes are available on the restorer. The only default setting is for 15% of the file system cleaned. When the operation finishes, it sends a message to the system log giving the percentage of storage space that was cleaned and the amount of free space available.
Note Any operation that shuts down the restorer file system, such as the filesys disable command, or that shuts down the restorer, such as a system poweroff or reboot, stops the clean operation. The clean does not restart when the system and file system restart.
Either manually restart the clean operation or wait until the next scheduled start.
The operation has five phases:
• Phase one makes a list of all files in the file system and sorts them for further processing. Phase one takes about 10 minutes.
Chapter 8: File System Management 59
Clean Operations
•
•
•
•
Phase two goes through all of the sorted files and determines which hold live data and which hold data that is no longer valid. Phase two can take three or more hours.
Phase three removes any duplicate data segments that may be left behind when a clean process is interrupted. Phase three can take up to an hour.
Phase four makes clean copies of all files that hold live data and creates new indexes. Phase four can take three or more hours.
Phase five regenerates internal restorer data structures. Phase five can take two or more hours.
60
Start Cleaning
To manually start the clean process, use the clean start operation. With no options, the operation uses the current setting for the scheduled automatic clean operation. The default setting is 15%. Administrative users only. The options are:
• Run the operation for a given number of hours.
•
•
•
Recover disk space until a given number of gigabytes (a total of newly cleaned and previously unused space) is available for data storage.
Recover disk space until a given percentage of the file system is cleaned.
Clean the entire file system.
• Begin the cleaning with no warning messages (the nowait option).
Note that cleaning an entire full file system can take ten hours or more. Using a clean start option for hours, percentage, or gigabytes free does not change the setting for the scheduled automatic clean operation.
You can set one, two, or three of the hrs, percent, and GB-free options in one command.
With two or three options set:
•
•
•
Whichever option limit the operation reaches first stops the operation.
The number of free GB always includes the space available on disk before starting a clean operation. For example, a clean operation for 100 GBs on a system that already has 50 GB available on disk will clean only another 50 GB.
A clean operation asking for GB-free that equals or is near the current amount of unused gigabytes runs for a short time.
filesys clean start [n hrs | n GB-free | n percent | all | nowait]
For example, the following command runs the clean operation until 100 gigabytes are available for data storage. The display includes a warning. Administrative users only.
# filesys clean start 100 GB-free
Are you sure? (yes|no|?) [no]:
DD200 Restorer User Guide
Clean Operations
Stop Cleaning
To stop the clean process, use the clean stop operation. Stopping the process during the first three phases means that all work done so far is lost. Starting the process again means starting over at the beginning. If the clean process is slowing down the rest of the system, consider using the filesys clean set throttle operation to reset the amount of system resources used by the clean process. The change in the use of system resources takes place immediately.
Administrative users only.
filesys clean stop
Change the Schedule
To change the date and time when clean runs automatically, use the clean set schedule operation. The default time is Monday at 1 p.m. (mon 1300). The operation is available only to administrative users.
•
•
A day is required with the weekly and monthly options. Day is one or two numerals from
1 to 31 when used with the monthly option. Day is the first three letters of a day (for example, tue for Tuesday) with the weekly option.
A time is required, except with the never option. 2400 is not a valid time. An entry of 0000 is midnight at the beginning of a day.
•
•
The weekly option with day and time or the day and time options without weekly run the clean operation once a week.
The never option turns off the clean process. Set a schedule using any of the other options to turn on the clean process.
filesys clean set schedule [weekly | monthly | never]
[day1[,day2,...]][time]
For example, to run the operation automatically every Tuesday at 4 p.m, use either of the following two commands.:
# filesys clean set schedule tue 1600
# filesys clean set schedule weekly tue 1600
The most recent invocation of the scheduling operation cancels the previous setting. To run the operation more than once in a time period, set multiple days in one command. For example, to run the operation on the first and fifteenth of the month at 4 p.m.:
# filesys clean set schedule monthly 1,15 1600
Chapter 8: File System Management 61
Clean Operations
Set the Schedule or Amount to the Default
To set the clean schedule to the default of Monday at 1 p.m. (mon 1300), or the default amount or throttle of 15%, or to reset all clean parameters, use the clean reset operation. The operation is available only to administrative users.
filesys clean reset {amount | schedule | throttle | all}
Set the Run Time, Gigabytes, or Percent Cleaned
To set the scheduled clean operation to run for a given time, until a given percentage of the stored data is cleaned, until a given number of gigabytes are available for data storage, or until the entire file system is cleaned, use the clean set amount operation. By default, the scheduled clean operation cleans 15% of data in the file system. Note that cleaning an entire full file system can take longer than ten hours. Administrative users only.
Data Domain recommends setting a percentage instead of a number of hours. With a percentage, scripts that start cleaning do not need changing when the amount of data in the file system increases. Setting hours to the amount displayed as recommended time for cleaning now with the filesys clean show recommended command returns a warning that when the file system is full, the time needed for cleaning increases.
You can set the hrs, percent, and GB-free options in one command. With two or three options set, whichever limit the operation reaches first stops the operation. filesys clean set amount {[[n hrs][n GB-free][n percent]] | all}
For example, to set the clean operation to run until 100 gigabytes are available for data:
# filesys clean set amount 100 GB-free
Set System Resources Used
To set clean operations to use a given level of system resources when the restorer is busy, use the set throttle operation. At a percentage of 0 (zero), cleaning runs very slowly or not at all when the system is busy. A percentage of 100 allows cleaning to take as much in the way of system resources as needed, even when the system is busy. The default is 100. When the restorer is not busy with backup or restore operations, cleaning runs at 100%. Administrative users only.
filesys clean set throttle percent
For example, to set the clean operation to run at 30% of its possible speed:
# filesys clean set throttle 30
62 DD200 Restorer User Guide
Clean Operations
Update Statistics
To update the “If 100% cleaned” numbers that show in the output from filesys show space, use the clean update-stats operation. During the update, the speed of backup and restore operations may be affected. With a full file system, the update operation can take up to four hours.
Administrative users only.
filesys clean update-stats
Display the Schedule
To display the current date and time for the clean operation, use clean show schedule.
filesys clean show schedule
The display is similar to the following.:
# filesys clean show schedule
Filesystem cleaning is scheduled to run “Mon” at “1300”
Display the Amount Parameters
To display the hours and GB settings for the clean operation, use the clean show amount operation.
filesys clean show amount
The display is similar to the following.:
# filesys clean show amount
The current cleaning settings are:
6 Hours
0 GBs (unlimited)
Display the Throttle Setting
To display the throttle setting for cleaning operations, use the clean show throttle operation.
filesys clean show throttle
The display is similar to the following.:
# filesys clean show throttle
Current cleaning throttle = 50
Chapter 8: File System Management 63
Clean Operations
Display the Clean Operation Status
To display the active/inactive status of the clean operation, use the clean status operation.
When the clean operation is running, the command displays progress.
filesys clean status
The display is similar to the following.:
# filesys clean status
Cleaning is active. cleaning progress: phase 1 of 5
Display Recommended Cleaning Times
To display system estimates of time needed for cleaning, use the clean show recommended operation. The display shows time estimates for running the filesys clean update-stats and filesys clean start all commands, and gives recommended times for cleaning the amount of data that is currently in the file system and for cleaning a full file system. For example:
# filesys clean show recommended
Estimated and recommended cleaning times. estimated time to update-stats only: 2hrs 26min estimated time to ‘clean all’: 6hrs 42 min recommended time for cleaning now: 3hrs recommended time for completely full system: >=10hrs
64 DD200 Restorer User Guide
Disk Management
9
The restorer disk command manages disks and displays disk locations, logical (RAID) layout,
usage, and reliability statistics. See “ disk ” on page 189 for the complete command syntax.
Each disk has two LEDs that are visible through the cutouts in the restorer front panel. The LED on the right glows a steady green when the disk has power and is functioning normally. The same LED glows a steady red if the disk has failed, or flashes green when the disk is a target of the beacon operation. The LED on the left flashes green whenever the disk is accessed.
Fail a Disk
To set a disk to the failed state, use the fail disk-ID operation. To physically remove a failed
disk, see “ Replace Disks ” on page 138. A failed disk is removed from RAID mirroring and is
before carrying out the operation. Available to administrative users only.
disk fail disk-ID
If a disk is the only disk left in its mirror, the disk cannot be failed. To match a disk with the other half of its mirror, use the disk show logical-layout command. For example, disk0 may have the tag md20. The disk that is the other half of the mirror has the same tag, md20. In the
example shown in the section “ Display the RAID Use of Disks ” on page 67, the other half of the
disk1 md20 mirror is disk9.
When a spare disk is available, the restorer file system automatically replaces a failed disk with a spare and begins the reconstruction process to integrate the spare into the RAID mirror. The disk use changes from spare to in use and the status becomes reconstructing.
Note The system BIOS boots from disk 16. If disk 16 is failed or was replaced with a disk that does not have a valid boot block, the system cannot boot. All disks in the system have a valid boot block unless they are failed or damaged. Be sure that a bootable disk is in slot 16 when rebooting the system.
65
Identify a Physical Disk in the Chassis
Identify a Physical Disk in the Chassis
The beacon disk-id operation causes the LED on the right for the target disk to flash green.
Use the (Control) c key sequence to turn off the operation. Administrative users only.
disk beacon disk-id
To show a schematic of physical disk locations and their IDs and to then flash the LED for disk3:
# disk show physical-layout
(the disk display appears)
# disk beacon disk3
Check All Disks
To check that the restorer software and hardware recognize all the disks, use the beacon all operation. The operation causes the LED on the right for all disks to flash green. Use the
(Control) c key sequence to turn off the operation. Administrative users only.
disk beacon all
Display Disk Locations
To display where disks are located by name as you look at the front panel of the restorer chassis, use the show physical-layout operation. disk show physical-layout
The display is similar to the following:
# disk show physical-layout
____________________ ____________________ ____________________ ______
| disk1 (sdi) | | disk6 (sdn) | | disk11 (sdc) | | |
|__________________| |__________________| |__________________| | d |
____________________ ____________________ ____________________ | i |
| disk2 (sdj) | | disk7 (sdo) | | disk12 (sdd) | | s |
|__________________| |__________________| |__________________| | k |
____________________ ____________________ ____________________ | 16 |
| disk3 (sdk) | | disk8 (sdp) | | disk13 (sde) | | |
|__________________| |__________________| |__________________| | s |
____________________ ____________________ ____________________ | d |
| disk4 (sdl) | | disk9 (sda) | | disk14 (sdf) | | h |
|__________________| |__________________| |__________________| | |
____________________ ____________________ ____________________ |____|
| disk5 (sdm) | | disk10(sdb) | | disk15 (sdg) |
|__________________| |__________________| |__________________|
66 DD200 Restorer User Guide
Display Disk Type and Capacity Information
Display Disk Type and Capacity Information
To display the disk ID, manufacturer, model, serial number, and capacity of each disk in the restorer, use the show config operation. The Data Domain convention for computing disk space defines one gigabyte as 2
30
bytes, giving a different disk capacity than the manufacturer’s rating.
disk show config
The display is similar to the following:
# disk show config
Disk Manufacturer/Model
-----disk1
------------------
Maxtor 4A250j0 disk2 disk3 disk4 disk5
Maxtor 4A250j0
Maxtor 4A250j0
Maxtor 4A250j0
Maxtor 4A250j0 disk6 disk7 disk8 disk9 disk10 disk11 disk12 disk13
Maxtor 4A250j0
Maxtor 4A250j0
Maxtor 4A250j0
Maxtor 4A250j0
Maxtor 4A250j0
Maxtor 4A250j0
Maxtor 4A250j0
Maxtor 4A250j0 disk14 disk15 disk16
------
Maxtor 4A250j0
Maxtor 4A250j0
Maxtor 4A250j0
------------------
16 drives present.
Firmware
--------
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
RAMB1TU0
--------
Serial No.
Capacity
---------------
A806ZF0E
A806ZG1E
233G
233G
A806ZG1F
A806ZERE
A806ZATE
A806ZFZE
A806ZAPE
A806ZFVE
A806ZDGE
A806ZGDE
A806ZFME
A806ZEWE
A806ZF6E
A806ZEZE
A806ZA2E
A806ZA3F
---------
233G
233G
233G
233G
233G
233G
233G
233G
233G
233G
233G
233G
233G
233G
--------
Display the RAID Use of Disks
To display a schematic of the disks as seen from the restorer front panel with their RAID designations, use the show logical-layout operation.
disk show logical-layout
Chapter 9: Disk Management 67
Display Disk Status
The display is similar to the following:
# disk show logical-layout
____________________ ____________________ ____________________ ______
| disk1 md20 | | disk6 md25 | | disk11 md22 | | |
|__________________| |__________________| |__________________| | d |
____________________ ____________________ ____________________ | i |
| disk2 md21 | | disk7 md26 | | disk12 md23 | | s |
|__________________| |__________________| |__________________| | k |
____________________ ____________________ ____________________ | 16 |
| disk3 md22 | | disk8 md27 | | disk13 md24 | | |
|__________________| |__________________| |__________________| |md27|
____________________ ____________________ ____________________ | |
| disk4 md23 | | disk9 md20 | | disk14 md25 | | |
|__________________| |__________________| |__________________| | |
____________________ ____________________ ____________________ |____|
| disk5 md24 | | disk10 md21 | | disk15 md26 |
|__________________| |__________________| |__________________|
Display Disk Status
The show summary operation displays the number of disks in use and failed, the number of spare disks available, and whether a RAID mirror reconstruction is underway. Note that the RAID portion of the display could show one or more disks as failed while the Operational portion of the display could show all drives as “operating nominally.” A disk can be physically functional and available, but not currently in use by RAID, possibly because of operator intervention.
disk show summary
The display is similar to the following:
# disk show summary
Configuration: 16 drives present
RAID:
RAID:
13 drives are “in use”
1 drives has "failed"
RAID:
RAID:
RAID:
RAID:
2 drives are “hot spare(s)”
0 drives undergoing “reconstruction”
1 drives are “not in use”
0 drives are “missing/absent”
Operational:
Operational:
Operational:
Performance:
15 drives operating normally.
0 drives absent/missing.
1 drives report excessive temperature
Cumulative 1.338 MB/s, 0% busy
68 DD200 Restorer User Guide
Display RAID Status for Disks
Display RAID Status for Disks
To display the RAID status and use of disks, which disks have failed from a RAID point of view, spare disks available for RAID, and the progress of a mirror reconstruction operation, use the show raid-info operation. disk show raid-info
When a spare disk is available, the restorer file system automatically replaces a failed disk with a spare and begins the reconstruction process to integrate the spare into the RAID mirror. The disk use changes from spare to in use and the status becomes reconstructing. In the sample display below, disk 16 is a spare disk.
The display in a system with a recently failed disk is similar to the following:
# disk show raid-info
Disk
------
State Additional Status
--------------------------------------- disk1 disk2 failed in use (md21) disk3 disk4 disk5 disk6 in use (md22) in use (md23) in use (md24) in use (md25) disk7 disk8 disk9 disk10 disk11 disk12 disk13 disk14 in use (md26) in use (md20) in use (md20) in use (md21) in use (md22) in use (md23) in use (md24) in use (md25) reconstructing (3%, done in 94 mins.) degraded disk15 disk16 in use (md26) hot spare
--------------------------------------------
13 drives are “in use”
1 drive has "failed"
1 drives is “hot spare(s)”
1 drives are undergoing “reconstruction” - 3% complete
0 drives are “not in use”
0 drives are “missing/absent”
Chapter 9: Disk Management 69
Display Performance Details
Display Performance Details
The show performance operation displays the following statistics. Each column displays
statistics averaged over time since the last disk reset performance command. See “ Reset
Disk Performance Statistics ” on page 70 for reset details.
•
•
The average number of sectors per second read from each disk.
The average number of sectors per second written to each disk.
•
•
The average number of megabytes per second written to each disk.
The average percent of time that each disk has at least one command queued.
disk show performance
The display is similar to the following:
# disk show performance
Disk
-----disk1 disk2 disk3 disk4 disk5 disk6 disk7 disk8 disk9 disk10 disk11 disk12 disk13 disk14 disk15 disk16
------
Read Write sects/s sects/s
-------- --------
86
79
81
80
81
78
76
0
76
79
82
77
75
78
80
0
57
55
54
54
53
53
53
0
54
53
52
52
52
52
52
0
-------- --------
Cumul.
MBytes/s
--------
0.069
0.065
0.065
0.065
0.065
0.063
0.062
0.000
0.063
0.064
0.065
0.062
0.061
0.063
0.064
0.000
--------
Cumulative 0.338 MB/s, 0 % busy
Busy %
------
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
------
Reset Disk Performance Statistics
To reset disk performance statistics to zero, use the reset performance operation. See
“ Display Performance Details ” on page 70 for displaying disk statistics.
disk reset performance
70 DD200 Restorer User Guide
Display Disk Reliability Details
Display Disk Reliability Details
To display the hardware state of each disk, use the show reliability data operation. The command is generally for the use of Data Domain support staff when troubleshooting.
•
•
• disk show reliability-data
The ATA Bus Soft Err column shows the bus soft error rate.
The Command Timeouts and Command Faults columns show problems with disk driver commands. The Command Faults columns are for reads, writes, and other disk command failures.
The Drive Soft Err columns show the number of errors corrected by the disk’s software error correction control. The Soft column is the number of off track errors. The Err column is the number of soft ECC errors.
•
•
The Awaiting Realloc column shows the number of sectors on a drive that have returned at least one error, but that are not yet confirmed as bad.
The Already Realloc column shows the number of sectors marked as bad and reallocated.
• The Temp column shows the current temperature of each disk in degrees centigrade. The allowable temperature range for disks is from 5 degrees centigrade to 55 degrees centigrade.
The display is similar to the following:
# disk show reliability-data
Disk ATA Bus Command Command Drive Awaiting Already Temp
Soft Err Timeouts Faults Soft Err Realloc Realloc
------ -------- -------- ------- -------- ------- ------- ----- disk1 0 0 0/ 0/ 0 6/ 0 0 0 28 C disk2 0 0 0/ 0/ 0 0/ 0 0 0 35 C disk3 0 0 0/ 0/ 0 10/ 0 0 0 30 C disk4 0 0 0/ 0/ 0 1/ 0 0 0 27 C disk5 0 0 0/ 0/ 0 9/ 0 0 0 29 C disk6 0 0 0/ 0/ 0 18/ 0 0 0 32 C disk7 0 0 0/ 0/ 0 0/ 0 0 0 30 C disk8 0 0 0/ 0/ 0 0/ 0 0 0 26 C disk9 0 0 0/ 0/ 0 21/ 0 0 0 28 C disk10 0 0 0/ 0/ 0 1/ 0 0 0 29 C disk11 0 0 0/ 0/ 0 0/ 0 0 0 34 C disk12 0 0 0/ 0/ 0 5/ 0 0 0 31 C disk13 0 0 0/ 0/ 0 0/ 0 0 0 28 C disk14 0 0 0/ 0/ 0 42/ 0 0 0 33 C disk15 0 0 0/ 0/ 0 3/ 0 0 0 56 C disk16 0 0 0/ 0/ 0 24/ 0 0 0 38 C
------ -------- -------- ------- -------- ------- ------- -----
15 drives operating normally.
1 drive reporting excessive temperatures.
Chapter 9: Disk Management 71
Display Disk Debug Information
Display Disk Debug Information
The show debug operation displays extremely detailed information about disk operations and status. The to-file option sends command output to /ddr/log/disk-show-debug.out.
See “ Send Disk Debug Information ” on page 52 for sending the output to the autosupport email list
or to an individual email address. Administrative users only.
disk show debug [to-file]
72 DD200 Restorer User Guide
System Management
10
The restorer system and alias commands allow you to take system-level actions. Examples for the system command are shutting down or restarting the restorer, displaying system problems and
status, and setting the system date and time. See “ system ” on page 231 for the complete command
syntax.
The System Command
The system command manages system-level actions on the restorer.
Shut down the Restorer Hardware
To shut down power to the restorer, use the poweroff operation. The operation automatically does an orderly shut down of the file system process. The operation is available to administrative users only. system poweroff
The display includes a warning similar to the following:
# system poweroff
The ‘system poweroff’ command shuts down the system and turns off the power.
Continue? (yes|no|?) [no]:
Reboot the Restorer
To have the restorer shutdown and then reboot, use the reboot operation. The operation is available to administrative users only. The operation automatically does an orderly shutdown of the file system process.
system reboot
73
The System Command
The display includes a warning similar to the following:
# system reboot
The ‘system reboot’ command reboots the system. File access is interrupted during the reboot.
Are you sure? (yes|no|?) [no]:
Note The system BIOS boots from disk 16. If disk 16 is failed or was replaced with a disk that does not have a valid boot block, the system cannot boot. The first four disks in the system are bootable: disks 16, 11, 12, and 13. Be sure that a bootable disk is in slot 16 when rebooting the system.
Upgrade Restorer Software
You can upgrade restorer software either from the Data Domain Support web site, using FTP, or from a Data Domain CD.
Note The upgrade operation shuts down the restorer file system and reboots the restorer.
The upgrade operation may take over an hour, depending on the amount of data on your system. After the upgrade completes and the system reboots, the /backup file system is disabled for up to an hour for upgrade processing.
To upgrade from the Data Domain web site
1.
Log in to a restorer administrative host that mounts /ddvar from the restorer.
2.
On the administrative host, open a browser and go to the Data Domain Support web site
(support.datadomain.com). Use either HTTP or FTP to connect to the web site. For example: http://support.datadomain.com
3.
Log in with the Data Domain login name and password that you use for access to the support web page or FTP site.
Note Some web browsers do not automatically ask for a login if a machine does not accept all logins. In that case, add your user name and password. For example:
http://your-name:[email protected]
4.
Click on Downloads. (If the web site has updated instructions, follow those instructions.)
5.
Click on the Download button for the latest release.
74 DD200 Restorer User Guide
The System Command
6.
Download the new release file to the restorer directory /ddvar/releases.
7.
To start the upgrade, log in to the restorer as sysadmin and enter a command similar to the following. Use the file name (not a path) received from Data Domain. For example:
# system upgrade 1.0.10.8-9881.rpm
To upgrade from a CD
1.
Log in to the restorer as sysadmin.
2.
Insert the Data Domain CD into the restorer CD drive.
3.
Enter a command similar to the following. Use the file name (with no path) that is on the CD:
# system upgrade 1.0.10.8-9881.rpm
To upgrade using FTP
1.
Log in to a restorer administrative host that mounts /ddvar from the restorer.
2.
On the administrative host, use FTP to connect to the Data Domain support site:
# ftp://support.datadomain.com
3.
Log in with the Data Domain login name and password that you use for access to the support web page.
4.
Download the release recommended by your Data Domain field representative. The file should go to /ddvar/releases on the restorer.
5.
To start the upgrade, log in to restorer as sysadmin and enter a command similar to the following. Use the file name (not a path) received from Data Domain. For example:
# system upgrade 1.0.10.8-9881.rpm
Change the Mail Server Hostname
To change the SMTP mail server used by the restorer, use the set mailserver host operation. Administrative users only.
system set mailserver host
Chapter 10: System Management 75
The System Command
For example, to set the mail server to mail.yourcompany.com:
# system set mailserver mail.yourcompany.com
To check the operation, use the system show mailserver command.
Change the Administrative Email Address
To change the administrative email address used by the restorer for messages from the alerts and autosupport utilities, use the set admin-email email-addr operation. The system needs one and only one administrative email address. To add other addresses to the alerts or autosupport email lists, use the alerts and autosupport commands. Administrative users only.
system set admin-email email-addr
For example, to set the administrative address to rjones.yourcompany.com:
# system set admin-email rjones.yourcompany.com
To check the operation, use the system show admin-email command.
Change the Administrative Host
To change the machine from which you can log into the restorer to see system logs and use system commands, use the set admin-host host operation. The host name can be a simple host name, a host name with a fully-qualified domain name, or an IP address. Administrative users only.
system set admin-host host
For example, to set the administrative host to admin12.yourcompany.com:
# system set admin-host admin12.yourcompany.com
To check the operation, use the system show admin-host command.
Change the System Location Description
To change the description of a restorer location, use the set location “location” operation. A description of a physical location helps identify the machine when viewing alerts and autosupport emails. The description must be in double quotes. Administrative users only.
system set location “location”
For example, to set the location description to row2-num4-room221:
# system set location “row2-num4-room221”
To check the operation, use the system show location command.
76 DD200 Restorer User Guide
The System Command
Set the Date and Time
To set the system date and time, use the set date operation. The entry is two places for month
(01 through 12), two places for day of the month (01 through 31), two places for hour (00 through
23), two places for minutes (00 through 59), and optionally, two places for century and two places for year. The hour (hh) and minute (mm) entries are 24-hour military time with no colon between hours and minutes. 2400 is not a valid entry. An entry of 0000 is midnight at the beginning of a day.
The operation is available to administrative users only.
system set date MMDDhhmm[[cc]yy]
For example, use either of the following commands to set the date and time to October 22 at 9:24 a.m. in the year 2003:
# system set date 1022092403
# system set date 102209242003
Set a Time Zone for the System Clock
To set the system clock to a specific time zone, use the set timezone operation. The default
setting is US/Pacific. See the appendix: “ Time Zones ” on page 167 for a complete list of time
zones. For the change to take effect for all currently running processes, you must reboot the restorer. The operation is available to administrative users only.
system set timezone zone
For example, to set the system clock to the time zone that includes Los Angeles, California, USA:
# system set timezone Los_Angeles
To display time zones, enter a category or a partial zone name. The categories are: Africa, America,
Asia, Atlantic, Australia, Brazil, Canada, Chile, Europe, Indian, Mexico, Mideast, Pacific, and US.
The following examples show the use of a category and the use of a partial zone name:
# system set timezone us
US/Alaska US/Aleutian
US/Eastern US/East-Indiana
US/Michigan US/Mountain
US/Arizona US/Central
US/Hawaii US/Indiana-Starke
US/Pacific US/Samoa
# system set timezone new
Ambiguous timezone name, matching ...
America/New_York Canada/Newfoundland
Chapter 10: System Management 77
The System Command
Reset Location, Mailserver, Timezone
To set the system location, mail server, or time zone to the default value, use the reset operation.
The defaults for location and mail server are null entries. The default for time zone is Universal
(GMT). The command requires at least one parameter and accepts multiple parameters.
Administrative users only.
system reset {[location][mailserver][timezone]}
Display Hardware Status
To display the monitored status of restorer hardware, use the show faults operation. A restorer automatically monitors:
•
•
Each disk for standard functionality.
Each cooling fan for the correct speed.
•
•
Each power supply for the correct voltage output.
Air temperature across the motherboard.
• Temperature of the CPU chips on the motherboard.
To display the status of disks, see the chapter “ Disk Management ” on page 65.
The command syntax is: system show faults
The display is similar to the following:
# system show faults
Hardware Fault Summary
----------------------
Disk Failure Summary:
No disk failures detected.
Power Supply Voltage Error Summary:
No power supply errors detected.
Temperature Extremes Summary:
No temperature extremes detected.
Fan Failure Summary:
Fan failue: Current RPM is 0, Avg RPM is 4500, Crossbar fan #5
78 DD200 Restorer User Guide
The System Command
Display System Uptime
To display the time that has passed since the last reboot and the file system uptime, use the show uptime operation.
system show uptime
The system display includes the current time, time since the last reboot (in days and hours), the current number of users, and the average load for file system operations, disk operations, and the idle time. The file system line displays the time that has passed since the file system was last started. For example:
# system show uptime
12:57pm up 9 days, 18:55, 3 users, load average: 0.51, 0.42,
0.47
Filesystem has been up 9 days, 16:26
Display Fan Status
To display the speed and status of each of the eight system fans, use the show fans operation.
The AvgRPM column gives the normal operating speed for each type of fan. If the value in the
CurRPM column goes below 60% of the normal operating speed, the fan should be replaced. See
“ Replace Fans ” on page 147 to identify fans in the chassis by name and number.
system show fans
The display is similar to the following:
# system show fans
Fan Description CurRPM Nominal Delta Status
--- --------------- ------ ------- ----- ------
1 Crossbar fan #1 4500 4500 0 ok
2 Crossbar fan #2 4500 4500 0 ok
3 Crossbar fan #3 4500 4500 0 ok
4 Crossbar fan #4 0 4500 -4500 FAIL
5 CPU fan #1 6200 6000 200 ok
6 CPU fan #2 6000 6000 0 ok
7 Rear fan #1 8000 8000 0 ok
8 Rear fan #2 8000 8000 0 ok
--- --------------- ------ ------ ----- ------
Chapter 10: System Management 79
The System Command
Display the System Configuration
To display the system’s current configuration, use the show config operation.
system show config
The display includes:
• The current operating system, the type and capacity of the CPUs, and memory size.
•
•
•
Output from the disk show config command.
Network interface information and transfer rates.
PCI information that is useful for Data Domain support staff.
Display Memory Usage
To display how the restorer is using memory, use the show meminfo operation.
system show meminfo
The display is similar to the following:
# system show meminfo
Memory Information
------------------ total: used: free: shared: buffers: cached:
Mem: 3163451392 1780092928 1383358464 0 23707648 24096768
Swap: 51983556608 0 51983556608
MemTotal: 3090388 kB
MemFree: 135096 kB
MemShared: 0 kB
Display System Statistics
To display system statistics for CPUs, disks, Ethernet ports, and NFS, use the show stats operation. The time period covered is from the last reboot, except with interval and count.
An interval, in seconds, runs the command every number of seconds (nsecs) for the number of times in count. The first report covers the time period since the last reboot. Each subsequent report is for activity in the last interval. The default interval is five seconds.
The interval and count labels are optional when giving both an interval and a count. To give only an interval, you can enter a number for nsecs without the interval label. To give only a count, you must enter the count label and a number for count.
80 DD200 Restorer User Guide
The System Command
The start and stop options return averages per second of statistics over the time between the commands.
system show stats [start | stop | ([interval nsecs] [count
count])]
The display is similar to the following:
# system show stats
09/30/ 16:23:10
CPU FS busy ops/s
FS Net kB/s proc in out
--------
9% 624
------- ----
0 0 0
NVRAM kB/s read write
----- -----
0 0
Repl kB/s
----
0
Disk kB/s read write
----- -----
40834 37245
Disk busy
-----
10%
Display Detailed System Statistics
To display more detailed system statistics, use the show detailed-stats operation. The time period covered is from the last reboot, except when using interval and count.
An interval, in seconds, runs the command every number of seconds (nsecs) for the number of times in count. The first report covers the time period since the last reboot. Each subsequent report is for activity in the last interval. The default interval is five seconds.
The interval and count labels are optional when giving both an interval and a count. To give only an interval, you can enter a number for nsecs without the interval label. To give only a count, you must enter the count label and a number for count.
The start and stop options return averages per second of statistics over the time between the commands.
system show detailed-stats [start | stop | ([interval
int][count count])]
The columns in the display are:
CPUx busy The percentage of time that each CPU is busy.
State 'CDVMS' A single character shows whether any of the five following events is occuring. Each event can affect performance.
C cleaning
D disk reconstruction (repair of a failed disk)
Chapter 10: System Management 81
The System Command
V verify data (a background process that checks for data consistency)
M merging of the internal fingerprint index
S summary vector internal checkpoint process
NFS ops/s The number of NFS operations per second.
NFS proc The fraction of time that the file server is busy servicing requests.
NFS recv The proportion of NFS-busy time spent waiting for data on the NFS socket.
NFS send The proportion of NFS-busy time spent sending data out on the socket.
NFS idle The percentage of NFS idle time.
CIFS ops/s The number of CIFS (Common Internet File System) operations per second.
ethx kB/s The amount of data in kilobytes per second passing through each Ethernet connection. One column appears for each Ethernet connection.
Disk kB/s The amount of data in kilobytes per second going to and from all disks in the restorer.
Disk busy The percentage of time that all disks in the restorer are busy.
NVRAM kB/s The amount of data in kilobytes per second going through non-volatile random-access memory from reads and writes.
Repl kB/s The amount of data in kilobytes per second being replicated between one restorer and another.
The display is similar to the following:
# system show detailed-stats
CPU0 CPU1 State NFS NFS NFS NFS NFS CIFS busy busy ‘CDVMS’ ops/s proc recv send idle ops/s
---- ---- ---------- ------------------
0 % 0 % 624 0% 0% 0 0 ------ eth0 kB/s in out eth1 kB/s in out eth2 kB/s in out eth3 kB/s in out
Disk kB/s read write
0
----------- ----- ----- ----- ----- ----- ----- -----
0 0 0 0 0 0 0 0 0
Disk NVRAM kB/s busy read write
-----------
0 0 0
Repl kB/s in out
-------
0 0
82 DD200 Restorer User Guide
The System Command
Display the Restorer Serial Number
To display the system serial number, use the show serialno operation.
system show serialno
The display is similar to the following:
# system show serialno
Serial number: 22BM030026
Display System Status
To display the current hardware status, such as processor vital signs, internal temperatures, and power supply output, use the status operation.
system status
The display is similar to the following:
# system status
NVRAM card memory size: window size:
1024 MB
16 MB number batteries: 2 errors: 0 PCI, 0 Memory battery 1: charge = 100% enabled = yes battery 2: charge = 100% enabled = yes
Temperature Measurements:
Ambient: 32.22 C (90.00 F)
Voltage Readings:
CPU : 1.45
1.8 : 1.79
3.3 : 3.29
5.0 : 4.90
12.0 : 12.50
-12.0 : -11.23
2.5 : 2.49
All power supply modules operating normally.
CPU Speed Check:
Speed of CPU0 = 2392.051 Mhz
Speed of CPU1 = 2392.048 Mhz
Speed of CPU2 = 2392.046 Mhz
Speed of CPU3 = 2392.042 Mhz
Chapter 10: System Management 83
The System Command
Display the System Location Description
To display the restorer location description, if you gave one, use the show location operation.
Administrative users only.
system show location
The display is similar to the following:
# system show location
The System Location is: bldg12 rm 120 rack8
Display Data Transfer Performance
To display system performance figures for data transfer for the last X amount of time, use the show performance operation. You can set the duration and the interval of the display.
Duration is the hours, minutes, or seconds for the display to go back in time. Interval is the time between each line in the display. The default is to show the last 24 hours in 10 minute intervals.
You can set duration only, but not interval only. The raw option displays unformatted statistics.
system show performance [raw][duration {hr | min | sec}
[interval {hr | min | sec}]]
The the following example sets a duration of one hour with an interval of 10 minutes:
# system show performance 1 hr 10 min
Date Time Read Write proc recv send idle
---------- -------- ---------- ---------- ---- ---- ---- ----
2004/05/18 10:37:28 0.0 MB/s 0.0 MB/s 0% 0% 0% 99%
2004/05/18 10:47:28 0.0 MB/s 0.0 MB/s 0% 0% 0% 99%
2004/05/18 10:57:28 0.0 MB/s 0.0 MB/s 0% 0% 0% 99%
2004/05/18 11:07:28 0.0 MB/s 0.0 MB/s 0% 0% 0% 99%
2004/05/18 11:17:29 0.0 MB/s 12.2 MB/s 15% 7% 0% 76%
Display the Mail Server Hostname
To display the name of the mail server that the restorer uses to send email, use the show mailserver operation.
system show mailserver
The display is similar to the following:
# system show mailserver
The Mail (SMTP) server is: mail.yourcompany.com
84 DD200 Restorer User Guide
The System Command
Display the Restorer Software Version
To display the version of software on your system, use the show version operation. The display gives the release number and a build identification number.
system show version
The display is similar to the following:
# system show version
Data Domain Restore Protection Manager 2.0.0.0-10112
To display the versions of restorer components on your system, use the show detailed-version operation. The display is useful for Data Domain support staff.
system show detailed-version
The display is similar to the following selected lines:
# system show detailed-version
Data Domain Restore Protection Manager 2.0.0.0-10112
//tools/main/devtools/ddr/...@3027
//tools/main/devtools/toolset.bom@2731
//prod/main/os/lib/...@3035
//prod/main/app/...@3281
//prod/main/ddr_dist/ddr_dist_files/...@3203
Display the Administrative Email Address
To display the administrative email address that the restorer uses for email from the alerts and autosupport utilities, use the show admin-email operation. system show admin-email
The display is similar to the following:
# system show admin-email
The Admin Email is: [email protected]
Display the Administrative Host Name
To display the administrative host from which you can log into the restorer to see system logs and use system commands, use the show admin-host operation.
system show admin-host
The display is similar to the following:
# system show admin-host
The Admin Host is: [email protected]
Chapter 10: System Management 85
The System Command
Display the Date and Time
To display the system date and time, use the show date operation.
system show date
The display is similar to the following:
# system show date
Mon Jun 39 12:06:30 PDT 2004
Display the Time Server for the System Clock
To display the time server that the restorer uses for the system clock, use show timeserver.
system show timeserver
The display is similar to the following:
# system show timeserver
The Timeserver is: 192.168.1.1
Display the Time Zone for the System Clock
To display the time zone used by the system clock, use the show timezone operation.
system show timezone
The display is similar to the following:
# system show timezone
The Timezone name is: US/Pacific
Display All Time, Location, and Mail Settings
To display the system date and time, time server, time zone, system location, and mail server, use the show settings operation.
system show settings
86 DD200 Restorer User Guide
The Alias Command
The display is similar to the following:
# system show settings
Tue Jul 29 10:59:48 PDT 2003
The Timeserver is: multicast
The Timezone name is: US/Pacific
The System Location is: Bldg 24, room 212
The Admin Email is: [email protected]
The Admin Host is: [email protected]
The Mail (SMTP) server is: mail.yourcompany.com
The Alias Command
The alias command allows you to add, delete, or display command aliases and their definitions.
See “ Display Aliases ” on page 88 for the list of default aliases.
Add an Alias
To add an alias, use the add name “command” operation. Use double quotes around the
command. A new alias is available only to the user who creates the alias. A user can not create a working alias for a command that is outside of that user’s permission level.
alias add name “command”
For example, to add an alias named rely for the restorer command that displays reliability statistics:
# alias add rely “disk show reliability-data”
Remove an Alias
To remove an alias, use the del name operation.
alias del name
For example, to remove an alias named rely:
# alias del rely
Reset Aliases
To return to the default alias list, use the reset operation. Administrative users only.
alias reset
Chapter 10: System Management 87
Time Servers and the NTP Command
Display Aliases
To display all aliases and their definitions, use the show operation.
alias show
The following example displays the default aliases:
# alias show date -> system set date df -> filesys show space hostname -> net set hostname ifconfig -> net config iostat -> system show detailed-stats 2 netstat -> net show stats nfsstat -> nfs show statistics passwd -> user change password ping -> net ping poweroff -> system poweroff reboot -> system reboot sysstat -> system show stats traceroute -> route trace uname -> system show version uptime -> system show uptime
You have 15 aliases
The sysstat alias can take an interval value for the number of seconds between each display.
The default interval is 2 seconds. The following example refreshes the display every 10 seconds:
# sysstat 10
Time Servers and the NTP Command
The ntp command allows you to synchronize a restorer with an NTP time server, manage the NTP service, or turn off the local (on the restorer) NTP server. The default system settings for NTP service are enabled and multicast.
Enable NTP Service
To enable NTP service on a restorer, use the ntp enable operation. Available to administrative users only.
ntp enable
88 DD200 Restorer User Guide
Time Servers and the NTP Command
Disable NTP Service
To disable NTP service on a restorer, use the ntp disable operation. Available to administrative users only.
ntp disable
Add a Time Server
To add a remote time server to NTP list, use the ntp add timeserver operation. Available to administrative users only.
ntp add timeserver server_name
For example, to add an NTP time server named srvr26.yourcompany.com to the list:
# ntp add timeserver srvr26.yourcompany.com
Delete a Time Server
To delete a remote time server from the list, use the ntp del timeserver operation.
Available to administrative users only.
ntp del timeserver server_name
For example, to delete an NTP time server named srvr26.yourcompany.com from the list:
# ntp del timeserver srvr26.yourcompany.com
Reset the List to Multicast
To reset the time server list to the multicast mode, use the ntp reset timeserver operation.
Available to administrative users only.
ntp reset timeserver
Reset All NTP Settings
To reset the local NTP server to the defaults of multicast and enabled, use the ntp reset operation. Available to administrative users only.
ntp reset
Chapter 10: System Management 89
Use the Rescue CD
Display NTP Status
To display the local NTP service status, time, and synchronization information, use the ntp status operation.
ntp status
The following example shows the information that is returned:
# ntp status
NTP Service is currently enabled.
Current Clock Time: Fri, Aug 20 2004 16:05:58.777
Clock last synchronized: Fri, Aug 20 2004 16:05:19.983
Clock last synchronized with time server: srvr26.company.com
Display NTP Settings
To display the NTP enabled/disabled setting and the time server list, use ntp show config.
ntp show config
The following example shows the information that is returned:
# ntp show config
NTP Service: enabled
The Remote Time Server List is: srvr26.company.com, srvr28.company.com
Use the Rescue CD
The Install and Rescue CD attached to the back cover of this manual is for emergency situations, such as when a restorer fails to boot up by itself. In such a situation, please call Data Domain
Technical Support for step-by-step instructions.
90 DD200 Restorer User Guide
Network Management
The net command manages the use of DHCP, DNS, and IP addresses, and displays network
11
The Net Command
Use the net command for the following operations.
Enable an Interface
To enable a disabled Ethernet interface on the restorer, use the enable interface operation.
Administrative users only.
net enable interface
For example, to enable the interface eth0:
# net enable eth0
Disable an Interface
To disable an Ethernet interface on the restorer, use the disable interface operation.
Administrative users only.
net disable interface
For example, to disable the interface eth0:
# net disable eth0
91
The Net Command
Enable DHCP
To set up an Ethernet interface to expect DHCP information, use the config interface dhcp yes operation. Changes take effect only after a system reboot. Administrative users only.
Note To activate DHCP for an interface when no other interface is using DHCP, the restorer must be rebooted.
net config interface dhcp yes
For example, to set DHCP for the interface eth0:
# net config eth0 dhcp yes
To check the operation, use the net show configuration command. To check that the
Ethernet connection is live, use the net show hardware command.
Disable DHCP
To set an Ethernet interface to not use DHCP, use the config interface dhcp no operation. After the operation, you must set an IP address for the interface. All other DHCP settings for the interface are retained. Administrative users only.
net config interface dhcp no
For example, to disable DHCP for the interface eth0:
# net config eth0 dhcp no
To check the operation, use the net show configuration command.
Change an Interface Transfer Unit Size
To change the maximum transfer unit size for an Ethernet interface, use the config
interface mtu operation. Supported values are from 256 to 9180. For 100 Base-T networks,
1500 is standard. For gigabit networks, 9180 is standard. The default is 1500. The default option returns the setting to the default value. Administrative users only.
net config interface mtu {size | default}
For example, to set a maximum transfer unit size of 9180 for the interface eth2:
# net config eth2 mtu 9180
92 DD200 Restorer User Guide
The Net Command
Change an Interface Netmask
To change the netmask used by an Ethernet interface, use the config interface netmask mask operation. Administrative users only.
net config interface netmask mask
For example, to set the netmask 255.255.255.0 for the interface eth0:
# net config eth0 netmask 255.255.255.0
Add or Change DNS servers
To add or change DNS servers for the restorer to use in resolving addresses, use the set dns
ipaddr operation to give DNS server IP addresses. The operation writes over the current list of
DNS servers. Only the servers given in the latest command are available to a restorer. The list can be comma-separated, space-separated, or both. Changes take effect only after a system reboot.
Administrative users only.
Note To activate a DNS change, the restorer must be rebooted.
net set dns ipaddr1[,ipaddr2[,ipaddr3]]
For example, to allow a restorer to use a DNS server with an IP address of 123.234.78.92:
# net set dns 123.234.78.92
To check the operation, use the net ping host-name command.
Ping a Host
To check that a restorer can communicate with a remote host, use the ping operation with a hostname or IP address.
net ping hostname
For example, to check that communication is possible with the host srvr24:
# net ping srvr24
Change the Restorer Hostname
To change the name other systems use to access the restorer, use the set hostname host operation. Administrative users only.
net set hostname host
Chapter 11: Network Management 93
The Net Command
For example, to set the restorer name to dd10:
# net set hostname dd10
To check the operation, use the net show hostname command.
Change an Interface IP Address
To change the IP address used by a restorer Ethernet interface, use the config interface
ipaddr operation. If the interface is configured for DHCP, the command returns an error. Use the net config interface dhcp disable command to turn off DHCP for an interface. See
“ Disable DHCP ” on page 92 for details. Administrative users only.
net config interface ipaddr
For example, to set the interface eth0 to the IP address of 192.168.1.1:
# net config eth0 192.168.1.1
Use the net show config command to check the operation.
Change the Domain Name
To change the domain name used by the restorer, use the set domainname dm.name operation. Administrative users only.
net set domainname dm.name
For example, to set the domain name to yourcompany-ny.com:
# net set domainname yourcompany-ny.com
Add a Hostname/IP Address to the /etc/hosts File
To associate an IP address with a hostname, use the hosts add operation. The hostname is a fully-qualified domain name or a hostname. The entry is added to the /etc/hosts file.
Administrative users only.
net hosts add ipaddr {host | “alias host”} ...
For example, to associate both the fully-qualified domain name bkup20.yourcompany.com and the hostname of bkup20 with an IP address of 192.168.3.3:
# net hosts add 192.168.3.3 “bkup20 bkup20.yourcompany.com”
94 DD200 Restorer User Guide
The Net Command
Reset Network Parameters
To reset the hostname, domain name, and DNS parameters to their default values (empty), use the reset operation. The command requires at least one parameter and accepts multiple parameters.
Changes take effect only after a system reboot. Administrative users only.
Note To activate the DNS change that results from the command, the restorer must be rebooted.
net reset {[hostname][domainname][dns]}
For example, to reset the system host name and domain name:
# net reset hostname domainname
Set Interface Duplex Line Use
To manually set the line use for an interface to half-duplex or full-duplex, use the config
interface duplex operation. Half-duplex is not available for any port set for a speed of 1000
(Gigabit). Administrative users only.
net config interface duplex {full | half}
For example, to set the line use to half-duplex for interface eth1:
# net config eth1 duplex half
Set Interface Line Speed
To manually set the line speed for an interface to 10 Base-T, 100 Base-T, or 1000 Base-T (Gigabit), use the config interface speed operation. A line speed of 1000 allows only a duplex setting of half. Setting a port to a speed of 1000 and duplex of half leads to unpredictable results.
Administrative users only.
net config interface speed {10 | 100 | 1000}
For example, to set the line speed to 100 Base-T for interface eth1:
# net config eth1 speed 100
Set Autonegotiate for an Interface
To allow the network interface card to autonegotiate the line speed and duplex setting for an interface, use the config interface autoneg operation. Administrative users only.
net config interface autoneg
Chapter 11: Network Management 95
The Net Command
For example, to set autonegotiation for interface eth1:
# net config eth1 autoneg
Delete a Hostname/IP address from the /etc/hosts File
To delete a hostname/IP address entry from the /etc/hosts file, use the hosts del operation.
Administrative users only.
net hosts del ipaddr
For example, to remove the hosts with an IP address of 192.168.3.3:
# net hosts del 192.168.3.3
Delete all Hostname/IP addresses from the /etc/hosts File
To delete all hostname/IP address entries from the /etc/hosts file, use the hosts reset operation. Administrative users only.
net hosts reset
Display Hostname/IP addresses from the /etc/hosts File
To display hostname/IP addresses from the /etc/hosts file, use the hosts show operation.
Administrative users only.
net hosts show
The display looks similar to the following:
# net hosts show
Hostname Mappings:
192.168.3.3 -> bkup20 bkup20.yourcompany.com
Display an Ethernet Interface Configuration
To display the current network driver settings for an Ethernet interface, use the show config operation. With no ifname, the command returns configuration information for all Ethernet interfaces.
net show config [ifname]
96 DD200 Restorer User Guide
The Net Command
A display for interface eth0 looks similar to the following:
# net show config eth0 eth0 Link encap:Ethernet HWaddr 00:02:B3:B0:8A:D2 inet addr:192.168.240.187 Bcast:123.456.78.255
Mask:255.255.255.0
UP BROADCAST NOTRAILERS RUNNING MULTICAST MTU:1500
Metric:1
RX packets:3081076 errors:0 dropped:0 overruns:0 frame:0
TX packets:1533783 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100
RX bytes:3764464 (3.5 Mb) TX bytes:136647745 (130.3 Mb)
Interrupt:20 Base address:0xc000
Display Interface Settings
To display only the Ethernet interface settings that you have configured, use the show settings operation. With no ifname, the command displays configuration information for all
Ethernet interfaces. If a port is disabled or uses DHCP for configuration values, the display does not have values for that port. The enabled column shows whether or not you have set an interface as enabled; however, the setting may not be the actual status of the interface. For example, if an interface on the restorer does not have a connecting cable, the interface is not actually enabled. To check the actual status of interfaces, use the net show hardware command, which shows a
Cable column entry of yes for a live Ethernet connection.
net show settings [ifname]
The display looks similar to the following:
# net show settings eth0
Ethernet settings: port enabled DHCP
--------
IP address
-------- --------------eth0: yes eth1: no eth2: yes eth3: yes yes n/a no yes
(dhcp-supplied) n/a
192.168.10.187
(dhcp-supplied) netmask
---------------
(dhcp-supplied) n/a
255.255.255.0
(dhcp-supplied)
Display Ethernet Hardware Information
To display information about Ethernet connections for RPM interfaces, use the show hardware operation. The Cable column reports whether or not the interface has a live Ethernet connection.
net show hardware
Chapter 11: Network Management 97
The Net Command
The display looks similar to the following (each line wraps in the example here):
# net show hardware
Port Speed Duplex Supp Speeds Hardware Address
----------- ----------------------------------- eth0 100Mb/s full 10, 100 00:02:b3:b0:8a:d2 eth1 unknown unknown 10, 100, 1000 00:02:b3:b0:80:3f eth2 1000Mb/s full 10, 100, 1000 00:07:e9:0d:5a:1a eth3 unknown unknown 10, 100, 1000 00:07:e9:0d:5a:1b
Physical Cable
-------- -----
Copper yes
Copper no
Copper yes
Copper no
98
Display the Restorer Hostname
To display the current hostname used by the restorer, use the show hostname operation.
net show hostname
The display is similar to the following:
# net show hostname
The Hostname is: dd10.yourcompany.com
Display DNS Servers
To display the DNS servers used by a restorer, use the show dns operation.
net show dns
The display looks similar to the following:
# net show dns
The Name (DNS) server list is:
192.168.1.3
192.168.1.4
Display Network Settings
To display the restorer hostname, email domain name, and DNS servers used by a restorer, use the show all operation.
net show all
DD200 Restorer User Guide
The Net Command
The display is similar to the following:
# net show all
The Hostname is: dd10.yourcompany.com
The Domainname is: yourcompany.com
The Name (DNS) server list is:
192.168.1.3
192.168.1.4
Display the Domain Name Used for Email
To display the domain name used for email sent by a restorer, use the show domainname operation.
net show domainname
The display looks similar to the following:
# net show domainname
The Domainname is: yourcompany.com
Display Network Statistics
To display network statistics, use the show stats operation. The information returned from all the options is used by Data Domain support staff for troubleshooting.
net show stats [all | interfaces | listening | route | statistics]
all Display summaries of the other options.
interfaces Display the kernel interface table and a table of all network interfaces and their activity.
listening Display statistics about active internet connections from servers.
route Display the IP routing tables showing the destination, gateway, netmask, and other information for each route.
statistics Display network statistics for protocols.
The display with no options is similar to the following, with statistics about live client connections.
# net show stats
Active Internet connections (w/o servers)
Proto Recv-Q Send-Q Local Address tcp 0
Foreign Address State
20 123.234.78.90:21 123.234.78.11:512 ESTABLISHED tcp 0 0 123.234.78.90:34 123.234.78.27:673 TIME_WAIT
Chapter 11: Network Management 99
The Route Command
The Route Command
Use the route command to manage routing between a restorer and backup hosts. An added routing rule appears in the Kernel IP routing table and in the restorer Route Config list, a list of static routes that are re-applied at each system boot. Use the route show config command to display the Route Config list. Use the route show table command to display the Kernel IP routing table.
Add a Routing Rule
To add a routing rule, use the add -host or add -net operation. If the target being added is a network, use the -net option. If the target is a host, use the -host option. The gateway can be either an IP address or a hostname that is available to the restorer and that can be resolved to an IP address. Administrative users only.
route add -host host-name gw gw-addr route add -net ip-addr netmask mask gw gw-addr
To add a route for the host user24 with a gateway of srvr12:
# route add -host user24 gw srvr12
To add a route with a route specification of 192.168.1.x, a netmask, and a gateway of srvr12:
# route add -net 192.168.1.0 netmask 255.255.255.0 gw srvr12
The following example gives a default gateway of srvr14 for use when no other route matches:
# route set gateway srvr14
Remove a Routing Rule
To remove a routing rule, use the del -host or del -net operation. Use the same form
(-host or -net) to delete a rule as was used to create the rule. The route show config command shows whether the entry is a host name or a net address. If neither -host or -net is used, any matching lines in the Route Config list are deleted. Administrative users only.
route del -host host-name route del -net ip-addr netmask mask
To remove a route for host user24:
# route del -host user24
To remove a route with a route specification of 192.168.1.x and a gateway of srvr12:
# route del -net 192.168.1.0 netmask 255.255.255.0 gw srvr12
100 DD200 Restorer User Guide
The Route Command
Change the Routing Default Gateway
To change the routing default gateway, use the set gateway ipaddr operation.
Administrative users only.
route set gateway ipaddr
For example, to set the default routing gateway to the IP address of 192.168.1.2:
# route set gateway 192.168.1.2
Reset the Default Routing Gateway
To reset the default routing gateway to the default value (empty), use the reset operation.
Administrative users only.
route reset gateway
Display a Route
To display a route used by a restorer to connect with a particular destination, use the show trace
host operation.
route trace host
For example, to trace the route to srvr24:
# route trace srvr24
Traceroute to srvr24.yourcompany.com (192.168.1.6), 30 hops max, 38 byte packets
1 srvr24 (192.168.1.6) 0.163 ms 0.178 ms 0.147 ms
Display the Configured Static Routes
To display the configured static routes that are in the Route Config list, use the show config operation.
route show config
The display looks similar to the following (each line in the example wraps):
# route show config
The Route Config list is:
-host user24 gw srvr12
-net 192.168.1.0 netmask 255.255.255.0 gw srvr12
Chapter 11: Network Management 101
The Route Command
Display the Default Routing Gateway
To display the default routing gateway used by a restorer, use the show gateway operation.
route show gateway
The display looks similar to the following:
# route show gateway
The Default Gateway is: 192.168.1.2
Display the Kernel IP Routing Table
To display all entries in the Kernel IP routing table, use the show table operation.
route show table
The display looks similar to the following (each line in the example wraps):
# route show table
Kernel IP routing table
Destination
192.168.1.0
Gateway
0.0.0.0
127.0.0.0
0.0.0.0
0.0.0.0
192.168.1.2
Genmask
255.0.0.0
0.0.0.0
Flags Metric Ref
255.255.255.0
U
U
UG
0
0
0
0
0 0
Use Iface
0 eth0
0 lo
0 eth0
102 DD200 Restorer User Guide
NFS Management
12
NFS functionality is a licensed feature. See “ The License Command ” on page 34 for licensing
details.
A restorer exports the directories /ddvar and /backup. /ddvar contains restorer log files and core files. Add clients from which you will administer the restorer to /ddvar.
/backup is the target for data from your backup servers. The data is compressed before being stored. Add backup servers as clients to /backup. If you choose to add a client to /backup and to /ddvar, consider adding the client as read-only to /backup to guard against accidental deletions of data.
Add NFS Clients
To add NFS clients that can access the restorer, use the add export client-list
nfs-options operation. Add clients for administrative access to /ddvar. Add clients for backup operations to /backup. The client-list can have a comma, a space, or both between list entries. To give access to all clients, the client-list can be an asterisk (*).
nfs add {/ddvar | /backup} client-list [nfs-options]
The client-list can contain IP addresses, hostnames, wildcard hostnames, such as
*.yourcompany.com, or a subnet specification.
A subnet specification is either an IP address and a netmask separated by a slash (/), or an IP address and an integer for the number of bits separated by a slash (/). The number of bits is an integer between 8 and 30. Examples for each specification are:
192.168.1.1/255.255.255.0
192.168.1.1/24
103
Remove Clients
The nfs-options list can have a comma, a space, or both between entries. The default NFS options for an NFS client are: rw, no_root_squash, no_all_squash, and secure. The list accepts the following options:
ro Read only permission.
rw Read and write permissions.
root_squash Map requests from uid/gid 0 to the anonymous uid/gid.
no_root_squash Turn off root squashing.
all_squash Map all user requests to the anonymous uid/gid.
no_all_squash Turn off the mapping of all user requests to the anonymous uid/gid.
secure Requires that requests originate on an Internet port that is less than IPPORT_RESERVED
(1024).
insecure Turn off the secure option
anonuid=id Set an explicit uid for the anonymous account. The id is an integer bounded from
-65635 to 65635.
anongid=id Set an explicit gid for the anonymous account. The id is an integer bounded from
-65635 to 65635.
For example, to add an NFS client with an IP address of 192.168.1.02 and read/write access to
/ddvar: with the secure option:
# nfs add /ddvar 192.168.1.02 (rw,secure)
Remove Clients
To remove NFS clients that can access the restorer, use the del export client-list operation. A client can be removed from access to /ddvar and still have access to /backup. The
client-list can contain IP addresses, hostnames, and an asterisk (*) and can be comma-separated, space separated, or both.
nfs del {/ddvar | /backup} client-list
For example, to remove an NFS client with an IP address of 192.168.1.02 from /ddvar access:
# nfs del /ddvar 192.168.1.02
Enable Clients
To allow access for NFS clients to a restorer, use the enable operation.
nfs enable
104 DD200 Restorer User Guide
Disable Clients
To disable all NFS clients from accessing the restorer, use the disable operation.
nfs disable
Disable Clients
Reset Clients to the Default
To return the list of NFS clients that can access the restorer to the factory default, use the reset clients operation. The factory default is an empty list. No NFS clients can access the restorer when the list is empty. The operation is available to administrative users only. nfs reset clients
Clear the NFS Statistics
To clear the NFS statistics counters and reset them to zero, use the reset stats operation.
nfs reset stats
Display Allowed Clients
To display all NFS clients that are allowed to access the restorer, use the show clients operation.
nfs show clients
The display is similar to the following:
# nfs show clients path client
-------- ---------
/ddvar jsmith
/backup djones
-------- --------options)
-----------------
(rw,root_squash,no_all_squash,secure)
(rw,no_root_squash,no_all_squash,secure)
----------------
Chapter 12: NFS Management 105
Display Statistics
Display Statistics
To display NFS statistics for a restorer, use the show stats operation.
nfs show stats
The following example shows relevant entries, but not all possible entries:
# nfs show stats
NFS statistics:
NFSPROC3_NULL :1
NFSPROC3_GETATTR :5
NFSPROC3_SETATTR :2
NFSPROC3_LOOKUP :7
NFSPROC3_ACCESS :4
NFSPROC3_READLINK :0
NFSPROC3_READ :0
NFSPROC3_WRITE :83187
.
.
.
NFSPROC3_COMMIT :1461
Total number of NFS requests handled = 84672
FH statistics:
There are currently (2) mounted filesystems.
Stats for mount point: 1
File System Type = SFS
Number of cached entries = 2
Number of file handle lookups = 84682 (miss = 2)
Max allowed file handle cache size = 200
Number of authentication failures = 0
Number of currently open file streams = 1
Stats for mount point: 2
File System Type = UNIX
Number of cached entries = 0
Number of file handle lookups = 0 (miss = 0)
Max allowed file handle cache size = 200
Number of authentication failures = 0
Number of currently open file streams = 0
106 DD200 Restorer User Guide
Display Detailed Statistics
Display Detailed Statistics
The show detailed- stats operation displays statistics used by Data Domain support staff for troubleshooting.
nfs show detailed-stats
Display Active Clients
To display all NFS clients that have been active on the restorer in the past 15 minutes, use the show active operation.
nfs show active
The display looks similar to the following:
# nfs show active
Active Client List: jsmith.yourcompany.com (/ddvar) djones.yourcompany.com (/backup)
Display Timing for NFS Operations
To display information about the time needed for NFS operations, use the show histogram operation. Administrative users only.
nfs show histogram
The column headers are:
Op The name of the NFS operation.
mean-ms The mathematical mean time for completion of the operations.
stddev The standard deviation for time to complete operations, derived from the mean time.
max-s The maximum time taken for a single operation.
<10ms The number of operations that took less than 10ms.
100ms The number of operations that took between 10ms and 100ms.
1s The number of operations that took between 1 second and 10 seconds.
10s The number of operations that took between 1 second and 10 seconds.
>10s The number of operations that took over 10 seconds.
Chapter 12: NFS Management 107
Display Status
Display Status
To display NFS status for a restorer, use the status operation.
nfs status
The display looks similar to the following:
# nfs status
The NFS system is currently active and running
Total number of NFS requests handled = 314576
108 DD200 Restorer User Guide
CIFS Management
13
The cifs command manages CIFS (Common Internet File System) backups and restores from
and to Windows clients, and displays CIFS statistics and status. See “ cifs ” on page 183 for the
complete command syntax.
CIFS functionality is a licensed feature. See “ The License Command ” on page 34 for licensing
details.
CIFS system messages on the restorer go to a CIFS log directory. The location is:
/ddvar/log/samba
Access from Windows to a Restorer
For access to the restorer command line interface, use the SSH (or TELNET if enabled) utility to log into the restorer. For some administrative tasks, such as looking at or transferring a log file, you can connect directly to the /ddvar share on the restorer. A Windows backup user account on a backup client uses the /backup share on the restorer.
Every user account from outside a restorer that needs access to a restorer must have a local account on the restorer, even when using Active Directory as the access mode. To give user access to restorer shares, use the command line interface on the restorer to add the administrative or backup user and to add the client machines from which users access the restorer.
Add a User
To add a user, use the command user add user-name. The command asks for a password and confirmation or you can include the password as part of the command. CIFS users added to the restorer can have a privilege level of admin or user. The default is user.
Note When a Windows machine connects to a restorer, the user name sent from the Windows machine is all lower case. For the restorer to recognize the user name, the user name added to the restorer must be in lower case.
user add user-name [password password][priv admin | user]
109
CIFS Command
For example, to add a backup user with a name of backup22, a password of usr256, and user privilege:
# user add backup22 password usr256
Add a Client
To add a Windows machine as a client that hosts a user account, use the cifs add /backup command. To add a Windows machine that hosts an administrative user account as a client on the restorer, use the cifs add /ddvar command. List entries can be comma-separated, space-separated, or both.
cifs add /backup client-list cifs add /ddvar client-list
For example, to add a client named srvr24 that will do backups and restores with the restorer:
# cifs add /backup srvr24
CIFS Command
The cifs command enables and disables access, sets the authentication mode, and displays status and statistics. All cifs operations are available only to administrative users.
Enable Client Connections
To allow CIFS clients to connect to a restorer, use the enable operation.
cifs enable
Disable Client Connections
To block CIFS clients from connecting to a restorer, use the disable operation.
cifs disable
Add a Backup Client
Each Windows backup server that will do backup and restore operations with a restorer must be added as a backup client. Use the add /backup operation. List entries can be comma-separated, space-separated, or both.
cifs add /backup client-list
110 DD200 Restorer User Guide
For example, to add a backup server named srvr24 as a backup client for a restorer:
# cifs add /backup srvr24
CIFS Command
Add an Administrative Client
Each Windows machine that will host an administrative user for a restorer must be added as an administrative client. Administrative clients use the /ddvar directory on a restorer. Use the add
/ddvar operation. List entries can be comma-separated, space-separated, or both.
cifs add /ddvar client-list
For example, to add an administrative client named srvr22:
# cifs add /ddvar srvr22
Remove a Backup Client
To remove a Windows backup client, use the del /backup operation. List entries can be comma-separated, space-separated, or both.
cifs del /backup client-list
For example, to remove the backup client srvr24:
# cifs del /backup srvr24
Remove an Administrative Client
To remove a Windows administrative client, use the del /ddvar operation. List entries can be comma-separated, space-separated, or both.
cifs del /ddvar client-list
For example, to remove the administrative client srvr22:
# cifs del /ddvar srvr24
Remove All CIFS Clients
To remove all of the CIFS clients from a restorer, use the reset clients operation.
cifs reset clients
Chapter 13: CIFS Management 111
CIFS Command
Set a NetBIOS Hostname
To change the NetBIOS hostname of the restorer, use the set nb-hostname operation.
cifs set nb-hostname nb-name
For example, to give a restorer the name of rstr12 for NetBIOS use:
# cifs set nb-hostname rstr12
Remove the NetBIOS Hostname
To remove the NetBIOS hostname of the restorer, use the reset nb-hostname operation.
cifs reset nb-hostname
Set the Authentication Mode
The restorer can use the authentication modes of: active-directory, domain, or workgroup. Use the set authentication operations to choose or change a mode. Each mode has a separate syntax.
The active-directory mode joins a restorer to an active-directory-enabled domain. The realm must be a fully-qualified name. Data Domain recommends not specifying a domain controller. When not using a domain controller, first specify a WINS server. The restorer must meet all active-directory requirements, such as a clock time that is no more than five minutes different than the domain controller. Domain conroller entries can be comma-separated, space-separated, or both. Optionally, include multiple domain controllers or all ( * ).
cifs set authentication active-directory realm {[dc1[dc2 ...]]
| *}
The domain mode puts the restorer into an NT4 domain. Include a domain name and a primary domain controller or backup and primary domain controllers or all ( * ).
cifs set authentication domain domain {[pdc [bdc]] | *}
The workgroup mode means that the restorer verifies user passwords.
cifs set authentication workgroup wg-name
Map an IP Address to a NetBIOS hostname
To map an IP address with a NetBIOS hostname, use the hosts add operation. The entry is added to the lmhosts file.
cifs hosts add ipaddr nb-hostname ...
112 DD200 Restorer User Guide
CIFS Command
For example, to map the NetBIOS hostname of srvr24 with an IP address of 192.168.3.3 in the lmhosts file:
# cifs hosts add 192.168.3.3 srvr24
Remove an IP Address/NetBIOS hostname Mapping
To remove an IP address/NetBIOS hostname from the lmhosts file, use the hosts del operation.
cifs hosts del ipaddr
For example, to remove the 192.168.3.3/srvr24 mapping from the lmhosts file:
# cifs hosts del 192.168.3.3
Remove All IP Address/NetBIOS hostname Mappings
To remove all IP address/NetBIOS hostnames from the lmhosts file, use the hosts del reset operation.
cifs hosts del reset
Resolve a NetBIOS Name
To display the IP address used for any NetBIOS name on the WINS server, use the nb-lookup operation. The CIFS feature must already be enabled.
cifs nb-lookup net-bios-name
For example, to display the IP address for the machine srvr22:
# cifs nb-lookup srvr22 querying srvr22 on 192.168.1.255
192.168.1.14 morgan<00>
Identify a WINS server
To identify a WINS server for resolving NetBIOS names to IP addresses, use the set wins-server operation.
cifs set wins-server ipaddr
For example, to use a WINS server with the IP address of 192.168.1.12:
# cifs set wins-server 192.168.1.12
Chapter 13: CIFS Management 113
CIFS Command
Remove the WINS server
To remove the WINS server IP address, use the reset wins-server operation.
cifs reset wins-server
Display All Clients
To display all Windows clients that have access to the restorer, use the show clients operation.
cifs show clients
The display is similar to the following:
# cifs show clients
Clients for share backup: srvr24.yourcompany.com
Clients for share ddvar: srvr22.yourcompany.com
Display Active Clients
To display Windows clients that are currently active, use the show active operation.
cifs show active
The display is similar to the following and shows which shares are accessed from a client machine and what data transfer may be happening (Locked files).
# cifs show active
PID Username Group Machine
----------------------------------------------------------
568
566 sysadmin sysadmin admin admin srvr24 srvr22
(192.168.1.5)
(192.168.1.6)
Service pid machine Connected at
--------------------------------------------------- ddvar backup
566
568 srvr22 srvr24
Tue Jan 13 12:11:03 2004
Tue Jan 13 12:09:44 2004
IPC$
IPC$ backup
566
568
566
Locked files: srvr22 srvr24 srvr22
Tue Jan 13 12:10:55 2004
Tue Jan 13 12:09:36 2004
Tue Jan 13 12:10:59 2004
Pid DenyMode Access R/W Oplock Name
-------------------------------------------------------------
114 DD200 Restorer User Guide
Jan 13 12:11:53 2004
566 DENY_ALL 0x30196 WRONLY NONE /loopback/RH8/ psyche-i386-disc1.iso Tue Jan 13 12:12:23 2004
CIFS Command
Display the CIFS Configuration
To display CIFS settings for the authentication mode and details, the WINS server, and the
NetBIOS hostname, use the show config operation.
cifs show config
For example:
# cifs show config
Mode: Workgroup
Workgroup: WORKGROUP
WINS Server: 192.168.1.7
NB Hostname: server26
Display CIFS Statistics
To display CIFS statistics for total operations, reads, and writes, use the show stats operation.
cifs show stats
For example:
# cifs show stats
SMB total ops :
SMB reads
SMB writes
:
:
31360
165
62
Display CIFS Status
To display the status of CIFS access to the restorer, use the status operation.
cifs status
For example:
# cifs status
CIFS is enabled and running.
Chapter 13: CIFS Management 115
CIFS Command
Display Local IP address/NetBIOS Hostname Mappings
To display all IP address/NetBIOS hostname mappings in the lmhosts file, use the hosts show operation.
cifs hosts show
For example:
# cifs hosts show
Hostname Mappings 192.168.3.3 -> srvr24. srvr24
116 DD200 Restorer User Guide
Replicator
14
The replication command sets up and manages the Data Domain Replicator for replication of data between two restorers. The Replicator is a licensed product. Contact Data Domain sales or your Data Domain SE for license keys. Use the license add command to add one key to each restorer in the Replicator pair.
A Replicator pair is an originator restorer that receives data from backup servers and a replica restorer that receives data only from the originator. A restorer can be either an originator or a
replica, not both. See “ replication ” on page 221 for the complete command syntax. After
replication initialization, the originator constantly checks the status of the replica.
A replica that is removed (with the “break” option on either the originator or replica) from the
Replicator pair cannot be brought back into the pair or used as a replica for another originator unless the file system on the replica is emptied with the filesys destroy command.
A replica is a read-only machine for any connection except the originator in the Replicator pair.
You can mount a replica as read-only for access from other places; however, after using the “break” option on a replica, the replica itself becomes a read/write machine.
All user information, such as user names, passwords, and permission level (administrative or user), is replicated from the originator to the replica. User information on the replica is overwritten. A change to user information on the originator causes the file to be sent to the replica. A change made on the replica is lost when changes are next made on the originator.
Configure Replicator
To configure two restorers as a Replicator pair, use the replication set source
orig-name destination replica-name operation. Administrative users only.
• The source orig-name on both the replica and originator must be exactly the same as the name returned by the hostname command on the originator.
• On the originator, the destination replica-name must be a name that can be translated to an IP address or be an IP address.
• On the replica, the destination replica-name must be exactly the same as the name returned by the hostname command on the replica.
117
Start Replication
• When using the replication set command, always run the filesys disable command first and the filesys enable command after.
replication set source orig-name destination replica-name
For example, to create a Replicator pair with restorers named rep1-orig and rep1-rep:
# replication set source rep1-orig destination rep1-rep
Start Replication
To start replication between two restorers, use the replication initialize operation on the originator. If the originator holds a lot of data, the initialize operation can take a long time.
Consider putting both restorers in the Replicator pair in the same location with a direct
(non-network) link to cut down on initialization time. Administrative users only.
replication initialize
Suspend Replication
To temporarily halt the replication of data between the restorers, use the replication disable operation on either the originator or the replica. On the originator, the operation stops the sending of data to the replica. On the replica, the operation stops serving the active connection from the originator. If the file system is disabled on either restorer when replication is disabled, replication remains disabled even after the file system is restarted. Administrative users only.
replication disable
Resume Replication
To restart replication that is temporarily halted, use the replication enable operation on the restorer that was temporarily halted. On the originator, the operation resumes the sending of data to the replica. On the replica, the operation resumes serving the active connection from the originator.
If the file system is disabled on either restorer when replication is enabled, replication is enabled when the file system is restarted. Administrative users only.
replication enable
118 DD400 Restorer User Guide
Remove Replication
Remove Replication
To stop all Replicator processes and remove all Replicator configuration from an originator or a replica, use the replication break operation. If the restorer is a replica, it becomes a stand-alone restorer with a standard read/write file system. The break means that the former replica can then be set up as an originator. The replica with its current data can not be used again as a replica. You must run the filesys destroy command on the replica to remove all data in the file system before again using the restorer as a replica.
When using the replication break command, always run the filesys disable command first and the filesys enable command after. Administrative users only.
replication break
Reset Authentication between the Restorers
To reset authentication between restorers, use the replication reauth operation on both the originator and the replica. Messages similar to “Authentication keys out of sync,” or “Key out of sync” signal the need for a reset. Reauthorization is primarily used when replacing an originator
restorer. See “ Procedure: Replace an Originator ” on page 127. Administrative users only.
replication reauth
Move Data to a New Originator
To move data from a surviving replica to a new originator, use the replication recover operation on the new originator. The new originator must have the same hostname as the previous
originator. Make sure that the new originator is an empty, configured restorer. See “ Procedure:
Replace an Originator ” on page 127. Do not use the operation on a replica. If the replication
break command was run earlier, the replica cannot be used to recover an originator.
Administrative users only.
replication recover
Change an Originator Hostname
If an originator requires a new hostname, use the replication set source operation on the replica to give the new hostname to the replica. The source orig-name must be exactly the same as displayed by the hostname command on the originator.
When using the replication set command, always run the filesys disable command first and the filesys enable command after. Administrative users only.
replication set source orig-name
Chapter 14: Replicator 119
Change a Replica Hostname
For example, if the local replica rep1-orig is moved from California to New York:
# replication set source rep1-orig.ny.yourcompany.com
Change a Replica Hostname
To give a replica’s new hostname or IP address to an originator after moving the replica, use the replication set destination operation on the originator. If a replica is seeded from an originator at the same geographic location and then later moved to another location (or the hostname or IP address changes for any reason), the originator must have the new hostname or IP address for the replica restorer in the new location. A destination replica-name that is a name must be a name that can be translated to an IP address.
When using the replication set command, always run the filesys disable command first and the filesys enable command after. Administrative users only.
replication set destination replica-name
For example, if the local replica rep1-rep is moved from California to New York:
# replication set destination rep1-rep.ny.yourcompany.com
Add a Scheduled Throttle Event
To change the rate of network bandwidth used by replication, use the throttle add operation.
The default network bandwidth use is unlimited.
replication throttle add sched-spec rate
The sched-spec must include:
• One or more three-letter days of the week (such as mon, tue, or wed) or the word daily (to set the schedule every day of the week).
A time of day in 24 hour military time.
•
The rate includes a number or the word unlimited. The number can include a tag for bits or bytes per second. Do not use a space between the number and the bits or bytes specification. For example, 2000KB. The default rate is bits per second. In the rate variable:
•
•
•
•
bps or b equals raw bits per second
Kbps, Kb, or K equals 1024 bits per second
Bps or B equals bytes per second
KBps or KB equals 1024 bytes per second
120 DD400 Restorer User Guide
Delete a Scheduled Throttle Event
The rate can also be 0 (the zero character), disable, or disabled. Each stops replication until the next rate change.
For example, the following command limits replication to 20 kilobytes per second starting on
Mondays and Thursdays at 6:00 a.m.
# replication throttle add mon thu 0600 20KB
Replication runs at the given rate until the next scheduled change or until new throttle commands force a change. The default rate with no scheduled changes is to run as fast as possible at all times.
The add operation may change the current rate. For example, if on Monday at Noon, the current rate is 20 KB, and the schedule that set the current rate started on mon 0600, a new schedule change for Monday at 1100 at a rate of 30 KB (mon 1100 30KB) makes the change immediately.
Note The system enforces a minimum rate of 98,304 bits per second (12 KB).
Delete a Scheduled Throttle Event
To remove one or more throttle schedule entries, use the throttle del operation.
replication throttle del sched-spec
The sched-spec must include:
• One or more three-letter days of the week (such as mon, tue, or wed) or the word daily to delete all entries for the given time.
• A time of day in 24 hour military time.
For example, the following command removes an entry for Mondays at 1100:
# replication throttle del mon 1100
The command may change the current rate. For example, assume that on Monday at Noon, the current rate is 30 KB, and the schedule that set the current rate started on mon 1100. If you now delete the scheduled change for Monday at 1100 (mon 1100), the replication rate immediately changes to the next previous scheduled change, such as mon 0600 20KB.
Set a Temporary Throttle Rate
To set a throttle rate until the next scheduled change or until a system reboot, use the throttle set current operation. A temporary rate cannot be set if the replication throttle set override command is in effect.
replication throttle set current rate
Chapter 14: Replicator 121
Set an Override Throttle Rate
The rate includes a number or the word unlimited. The number can include a tag for bits or bytes per second. Do not use a space between the number and the bits or bytes specification. For example, 2000KB. The default rate is bits per second. In the rate variable:
•
•
bps or b equals raw bits per second
Kbps, Kb, or K equals 1024 bits per second
•
•
Bps or B equals bytes per second
KBps or KB equals 1024 bytes per second
The rate can also be 0 (the zero character), disable, or disabled. Each stops replication until the next rate change.
As an example, the following command sets the rate to 2000 kilobytes per second:
# replication throttle set current 2000KB
Note The system enforces a minimum rate of 98,304 bits per second (12 KB).
Set an Override Throttle Rate
To set a throttle rate that overrides scheduled rate changes, use the throttle set override operation. The rate stays at the override level until the system is rebooted or until another override command is entered. An override cannot be set if the replication throttle set current command is in effect.
replication throttle set override rate
The rate includes a number or the word unlimited. The number can include a tag for bits or bytes per second. Do not use a space between the number and the bits or bytes specification. For example, 2000KB. The default rate is bits per second. In the rate variable:
•
•
•
•
bps or b equals raw bits per second
Kbps, Kb, or K equals 1024 bits per second
Bps or B equals bytes per second
KBps or KB equals 1024 bytes per second
The rate can also be 0 (the zero character), disable, or disabled. Each stops replication until the next rate change.
As an example, the following command sets the rate to 2000 kilobytes per second:
# replication throttle set override 2000KB
Note The system enforces a minimum rate of 98,304 bits per second (12 KB).
122 DD400 Restorer User Guide
Reset Throttle Settings
Reset Throttle Settings
To reset any or all of the throttle settings, use the throttle reset operation.
• replication throttle reset {current | override | schedule | all}
A reset of current removes the rate set by the replication throttle set current command. The rate returns to a scheduled rate or to the default if no rate is scheduled.
•
•
•
A reset of override removes the rate set by the replication throttle set override command. The rate returns to a scheduled rate or to the default if no rate is scheduled. The default network bandwidth use is unlimited.
The reset of schedule removes all scheduled change entries. The rate remains at a current or override setting, if either is active, or returns to the default, which is unlimited.
The reset of all removes any current or override settings and removes all scheduled change entries, returning the system to the default, which is unlimited.
Display Replicator Configuration
To display the Replicator role of the current system, the name of the other system in the Replicator pair, and the state of replication, use the show config operation. Administrative users only.
replication show config
The display is similar to the following:
# replication show config
Mode: originator
Partner:
Enabled: rep22.yourcompany.com yes
Chapter 14: Replicator 123
Display Statistics
Display Statistics
To display Replicator statistics, use the replication show stats operation.
replication show stats
The display is similar to the following:
# replication show stats
Bytes sent: 349012554580
Bytes received: 38235336
Virtual bytes replicated: 448155639368
Replica received stamp: Mon Nov 15 15:48:22 2004
Replica processed stamp: Mon Nov 15 15:48:22 2004
Replica records remaining: 0
Originator records remaining: 0
Compressed data remaining: 0
Bytes sent The total number of bytes sent by this side to the other side of the Replicator pair. For the originator, the value includes backup data, replication overhead, and network overhead. For the replica, the value includes replication overhead and network overhead. Use the value (and the next value) to estimate network traffic generated by replication.
Bytes received The total number of bytes received by this side from the other side of the Replicator pair. For the replica, the value includes backup data, replication overhead, and network overhead.
For the originator, the value includes replication overhead and network overhead. Use the value
(and the previous value) to estimate network traffic generated by replication.
Virtual bytes replicated The total number of bytes of backup data (before compression) replicated since the last time the restorer file system was enabled.
Replica received stamp The date and time of the most recent records received.
Replica processed stamp The date and time of the most recent records processed.
Replica records remaining The number of file records received by the replica and not yet processed.
Originator records remaining The number of file records created by the originator and not yet sent to the replica.
Compressed data remaining New data on the originator that is not yet sent to the replica.
124 DD400 Restorer User Guide
Display Status
Display Status
To display Replicator configuration information and the status of replication operations, use the replication status operation.
replication status
The display on an originator is similar to the following:
# replication status
Mode:
Partner:
Enabled:
Connection:
State: originator rep1-rep.company.com yes connected since Tue May 11 15:27:36 2004 initialized
Replica lag:(hh:mm) 3:36
Mode The role of the restorer in the Replicator pair: originator or replica.
Partner The hostname of the other restorer in the Replicator pair.
Enabled The enabled/disabled state of replication on this restorer.
Connection The most recent connection (or disconnect) date and time for the Replicator pair.
State Whether or not replication was started after the initial configuration or the percentage completed by the initialization process if that process is still in progress.
Replica lag The time difference between the state of the file system on the replica and on the originator. A generic message of "Less than 5 minutes" appears if the replica is either nearly caught up with data from the originator or if the replica is caught up and synchronized and the originator is not sending new data.
Display Throttle settings
To display all scheduled throttle entries, rates, and the current rate, use the throttle show operation.
replication throttle show [kb]
Chapter 14: Replicator 125
Procedure: Set Up and Start Replication
The kb option displays the rate in kilobytes per second. Without the option, the rate is displayed in bits per second. The display is similar to the following:
# replication throttle show kb
Time
----
06:00
15:00
18:00
----
Sun
---
-
-
-
---
Mon
---
90
-
-
---
Tue
---
-
200
500
---
Wed
---
-
-
-
---
Thu
---
-
-
-
---
Fri
---
-
-
-
---
Sat
---
-
-
-
---
All units in KBps (1024 bytes (8192 bits) per second).
Active schedule: Mon, 06:00 at 90 KBps.
Procedure: Set Up and Start Replication
To set up and start replication between two restorers:
• Run the following command on both the originator and replica restorers:
•
•
• filesys disable
If the replica holds any data, run the following command on the replica: filesys destroy
Run the following command on both the originator and replica restorers. See “ Configure
Replicator ” on page 117 for the details of using the command:
replication set source orig-name destination replica-name
Run the following command on both the originator and replica restorers:
• filesys enable
Run the following command on the originator. The command checks that both restorers in the pair can communicate and starts all Replicator processes. If a problem appears, such as that communication between the restorers is not possible, you do not need to re-initialize after fixing the problem. Replication should begin as soon as the restorers can communicate.
replication initialize
126 DD400 Restorer User Guide
Procedure: Replace an Originator
Procedure: Replace an Originator
If the originator in a pair is replaced or changed out, use the following commands to integrate a new originator with the existing replica. The new originator must have the same hostname as the previous originator.
• If the new originator has any data in its file system, run the following command to clear all data from the file system:
•
• filesys destroy
Run the following command on both the originator and replica restorers: filesys disable
Run the following command on the replica:
•
•
• replication reauth
Run the following command on the new originator and on the replica to configure the
Replicator. See “ Configure Replicator ” on page 117 for the details of using the command:
replication set source orig-name destination replica-name
Run the following command on both the originator and replica: filesys enable
Run the following command on the new originator to seed the new originator with data from the replica. When the command finishes, the originator is ready to receive new data and replication is enabled. You do not need to do anything else to start replication: replication recover
Procedure: Replace a Replica
If the replica restorer in a pair is replaced or changed out, use the following commands to integrate a new replica with the existing originator:
• If the new replica has any data in its file system, run the following command on the replica to clear all data from the file system:
•
• filesys destroy
Run the following command on both the originator and replica restorers: filesys disable
Run the following command on the originator to remove all configuration information about the previous replica: replication break
Chapter 14: Replicator 127
Procedure: Replace a Replica
•
•
•
Run the following command on the originator and on the new replica to configure the
Replicator. See “ Configure Replicator ” on page 117 for the details of using the command:
replication set source orig-name destination replica-name
Run the following command on both the originator and replica restorers: filesys enable
Run the following command on the originator to seed the new replica with data: replication initialize
128 DD400 Restorer User Guide
Backup/Restore Using NDMP
15
The NDMP (Network Data Management Protocol) feature allows direct backup and restore operations between a Network Appliance™ filer (with the ndmpd daemon turned on), and a restorer. NDMP software on the restorer acts, through the command line interface, to provide Data
Management Application (DMA) and NDMP server functionality for the filer. The ndmp command on the restorer manages NDMP operations.
Add a Filer
To add to the list of filers available to the restorer, use the add filer operation. The user name is a user on the filer and is used by the restorer when contacting the filer. The password is for the user name on the filer. With no password, the command returns a prompt for the password. Note that any add operation for a filer name that already exists replaces the complete entry for that filer name. For example, if a filer10 entry already exits and includes a user name and a password, a new add operation for filer10 that includes no password leaves the filer10 entry with no password. A password can include the characters: $, “, ‘, and \. Administrative users only.
ndmp add filer filer_name user username [password password]
For example, to add a filer named toaster5 using a user name of back2 with a password of pw1212:
# ndmp add filer toaster5 user back2 password pw1212
Remove a Filer
To remove a filer from the list of servers available to the restorer, use the delete filer operation. Administrative users only.
ndmp delete filer filer_name
For example, to delete a filer named toaster5:
# ndmp delete filer toaster5
129
Backup from a Filer
Backup from a Filer
To backup data from a filer to a flat file on a restorer, use the get operation. Administrative users only.
ndmp get [incremental level] filer_name:src_tree dst_tree
filer_name The name of the filer that holds the information for the backup operation.
src_tree The directory to backup from the filer.
dst_tree The destination flat file for the backup data on the restorer.
incremental level The numeric level for an incremental backup using a number between 0
(zero) and 9. Using any level greater than 0 backs up only changes since the latest previous backup of the same src_tree with a lower numbered level. Using the get operation without the incremental option is the same as a level 0, or full, backup.
For example, the following command opens a connection to a filer named toaster5 and returns all data under the directory /vol/vol0. The data is stored in a file located at
/backup/toaster5/week0 on the restorer.
# ndmp get toaster5:/vol/vol0 /backup/toaster5/week0
The following incremental backup backs up changes since the last full backup.
# ndmp get incremental 1 toaster5:/vol/vol0 \
/backup/toaster5/week0.day1
Restore to a Filer
To restore data from a restorer to a filer, use one of the put operations. Note that a filer may report a successful restore even when one or more files failed restoration. For details, always review the
LOG messages sent by the filer. Administrative users only.
ndmp put src_file filer_name:dst_tree ndmp put partial src_file subdir filer_name:dst_tree partial Restore a particular directory or file from within a flat file on the restorer. Give the path to the file or subdirectory.
src_file The flat file on the restorer from which to do a restore to a filer. The src_file argument must always begin with /backup.
filer_name The NDMP server to which to send the restored data.
130 DD200 Restorer User Guide
Remove Filer Passwords
dst_tree The destination for the restored data on the NDMP server. Some filers require that
subdir be relative to the path used during the ndmp get that created the backup. For example, if the get operation ws for everything under the directory /a/b/c in a tree of /a/b/c/d/e, then the put partial subdirectory argument should start with /d. On some filers, dst_tree must end with a subdir.
The following command restores data from the restorer flat file /backup/ toaster5/week0 to /vol/vol0 on the filer toaster5.
# ndmp put /backup/toaster5/week0 toaster5:/vol/vol0
The following command restores the file .../jsmith/foo from the week0 backup.
# ndmp put partial jsmith/foo /backup/toaster5/week0 toaster5:/vol/vol0/jsmith/foo
Remove Filer Passwords
To remove all filer passwords stored on the restorer and to write zeros to the disk areas that held them, use the reset filers operation. Administrative users only.
ndmp reset filers
Stop an NDMP Process
To stop an NDMP process on the restorer, use the stop operation. The pid is the PID (process ID) number shown for the process in the ndmp status display. A stopped process is cancelled. To restart a process, begin the process again with the get or put commands. Administrative users only.
ndmp stop pid
Stop All NDMP Processes
To stop all NDMP processes on a restorer, use the stop all operation. Administrative users only.
ndmp stop all
Chapter 15: Backup/Restore Using NDMP 131
Display Known Filers
Display Known Filers
To display all filers available to the restorer, use the show filers operation. Administrative users only.
ndmp show filers
For example:
# ndmp show filer toaster5 filer name:password
------filer1
------------- root:****** filer2 toaster root:****** root:******
Display NDMP Process Status
To display the status of current NDMP processes on the restorer, use the status operation. The operation labels each process with an identification number. Administrative users only.
ndmp status
The display looks similar to the following and shows the process ID, the command that is currently running, and the total number of megabytes transferred. The following example shows the command entered twice in a row. Note that MB Copied shows the progress of the operation.
# ndmp status
PID MB Copied
--- --------
715 3267
# ndmp status
PID MB Copied
--- ---------
715 4219
Command
------------------------------------------------- get filer1:/vol/vol0/etc /backup/filer1/dumpfile1
Command
------------------------------------------------- get filer1:/vol/vol0/etc /backup/filer1/dumpfile1
132 DD200 Restorer User Guide
Log File Management
16
The log command allows you to view restorer log file entries and to save and clear the log file contents. Messages from the alerts feature, the autosupport reports, and general system messages go to the log directory and into the file messages. A log entry appears for each restorer command given on the system, except for commands using the show action, such as system
show stats. The log directory is /ddvar/log. See “ log ” on page 202 for the complete
command syntax.
Once a week, the restorer automatically opens new log files and renames the previous files with an appended number of 1 (one) through 9, such as messages.1. Each numbered file is rolled to the next number each week. For example, at the second week, the file messages.1 is rolled to messages.2. If a file messages.2 already existed, it would roll to messages.3. An existing
Display Log Files
To view the log files, use the view operation. With no filename, the command displays the current messages file. When viewing the log, use the up and down arrows to scroll through the file; use the q key to quit; enter a slash character (/) and a pattern to search through the file.
log view [filename]
The display of the messages file is similar to the following. The last message in the example is an hourly system status message that the restorer generates automatically. The message reports system uptime, the amount of data stored, NFS operations, and the amount of disk space used for data storage (%). The hourly messages go to the system log and to the serial console if one is attached.
# log view
Jun 27 12:11:33 localhost rpc.mountd: authenticated unmount request from perfsun-g.datadomain.com:668 for /ddr/col1/segfs
(/ddr/col1/segfs)
Jun 27 12:28:54 localhost sshd(pam_unix)[998]: session opened for user jsmith10 by (uid=0)
Jun 27 13:00:00 localhost logger: at 1:00pm up 3 days, 3:42,
52324 NFS ops, 84763 GB data col. (1%)
133
List Log Files
List Log Files
To list all of the files in the log directory, use the list operation.
log list
The list is similar to the following:
# log list boot.log
ddfs.info
messages perf.log
messages.1
secure space.log boot.log Kernel diagnostic messages generated during the booting up process.
ddfs.info Debugging information created by the file system process.
destroy.id_number.log All of the actions taken by an instance of the filesys destroy command. Each instance produces a log with a unique ID number.
messages The system log, which is generated by restorer actions and from general system operations.
perf.log Performance statistics used by Data Domain support staff for system tuning.
secure Messages from successful logins, attempted logins, and attempts to do operations for which a user does not have permission.
space.log Messages about disk space use by restorer components and data storage, and messages from the clean process. A space use message is generated every hour. Each time the clean process runs, it creates about 100 messages. All the messages are in comma-separated- value format with tags that you can use to separate out the disk space or clean messages. You can use third-party software to analyse either set of messages. The tags are:
CLEAN for data lines from clean operations.
CLEAN_HEADER for lines that contain headers for the clean operations data lines.
SPACE for disk space data lines.
SPACE_HEADER for lines that contain headers for the disk space data lines.
Scroll New Log Entries
To display a view of the messages file that adds new entries as they occur, use the watch operation. Use the key combination <Control> c to break out of the watch operation. With no
filename, the command displays the current messages file.
log watch [filename]
134 DD200 Restorer User Guide
Archive Log Files
Archive Log Files
To archive log files, use FTP to copy the files to another machine.
1.
On the restorer, use the adminaccess show ftp command to see that the FTP service is enabled. If the service is not enabled, use the command adminaccess enable ftp.
2.
On the restorer, use the adminaccess show ftp command to see that the FTP access list has the IP address of your remote machine or a class-C address that includes your remote machine. If the address is not in the list, use the command adminaccess add ftp
<ipaddr>.
3.
On the remote machine, open a web browser.
4.
In the Address box at the top of the web browser, use FTP to access the restorer. For example: ftp://restorer_name.yourcompany.com/
Note Some web browsers do not automatically ask for a login if a machine does not accept anonymous logins. In that case, add a user name and password to the FTP line. For example: ftp://sysadmin:your-pw@restorer_name.yourcompany.com
5.
At the login popup, log into the restorer as user sysadmin.
6.
On the restorer, you are in the directory just above the log directory. Open the log directory to list the messages files.
7.
Copy the file that you want to save. Right-click on the file icon and select Copy To Folder from the menu. Choose a location for the file copy.
8.
If you want the FTP service disabled on the restorer, use SSH to log into the restorer as
sysadmin and give the command adminaccess disable ftp.
Chapter 16: Log File Management 135
Archive Log Files
136 DD200 Restorer User Guide
Hardware Servicing
17
In the restorer, you can replace disks, fans, power supplies, the NVRAM card, disk controller cards, and add or replace the Fiber Gigabit Ethernet card. Data Domain recommends timely replacement of components that generate error log messages for failures or are out of normal operating tolerances. Check with Data Domain Support staff for what constitutes excessive error messages and out-of-range operating tolerances. After an error message, a component can continue to degrade, leading to an automatic system shutdown. For example, the restorer generates a warning message if the interior temperature of the machine reaches 47 degrees centigrade. If the temperature reaches 50 degrees centigrade, the machine shuts down.
As an addition to error log messages, you can check components by using the restorer command system show faults, which shows the general health of hardware subsystems. A normal system returns messages similar to the following:
•
•
# system show faults
Hardware Fault Summary
----------------------
Power Supply Voltage Error Summary:
No power supply errors detected.
Temperature Extremes Summary:
No temperature extremes detected.
Fan Failure Summary:
No fan failures detected.
If a power supply unit fails, the Power Supply... entry has the message: A power
supply module has failed. To replace a power supply, see “ Replace Power Units ” on
The Temperature Extremes... summary displays information about CPU temperatures and contains an entry if the overall machine temperature is above an acceptable level.
If the overall temperature for the machine reaches 47 degrees centigrade, a warning message is generated. If the temperature reaches 50 degrees centigrade, the machine shuts down.
137
Replace Disks
•
If a CPU temperature reaches 60 degrees centigrade, a warning message is generated. If a
CPU temperature reaches 74 degrees centigrade, the machine shuts down.
If one or more fans have failed or are running below the minimum required speed, the Fan
Replace Disks
Note Please return the failed/replaced disk to Data Domain. Reuse the packaging from the new disk and use the included prepaid waybill for shipping. Reference the RMA number on the outside of the package. Returns with no RMA number cannot be accepted.
If a disk reaches a temperature of 35 degrees centigrade, a warning message is generated. To display details for disk hardware status, use the disk show reliability-data command.
The display is similar to the following:
# disk show reliability-data
Disk ATA Bus Command Command Drive Awaiting Already Temp
Soft Err Timeouts Faults Soft Err Realloc Realloc
------ -------- -------- ------- -------- ------- ------- ---- disk1 0 0 0/ 0/ 0 6/ 0 0 0 28 C disk2 0 0 0/ 0/ 0 0/ 0 0 0 35 C disk3 0 0 0/ 0/ 0 10/ 0 0 0 30 C
.
.
.
A restorer has 16 disks. Each disk has two LEDs The right LED on each disk glows green when the disk has power and red when the disk has failed. The left LED on each disk glows green when the disk is accessed by software.
Figure 8 shows the disk numbering scheme as seen from the front of
the restorer.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Figure 8: Disk numbering
138 DD200 Restorer User Guide
Replace Disks
The restorer must be shut down and rebooted to recognize a replacement disk, which is seen as a hot spare. A failed disk that is removed and reinserted into the system is recognized as a failed disk.
Note If the disk to be replaced is disk 16, the system cannot boot with a replacement disk in slot
16. Another disk from the same restorer must be swapped into slot 16. If Data Domain
Support staff have not already contacted you and identified the disk to use for the swap, call
Data Domain Support before continuing with the replacement process.
To replace a failed disk:
1.
Turn the locking knob to open the restorer face plate and expose the disks. See
.
Locking knob
Figure 9: Face plate locking knob
2.
Identify the disk. The right LED on a failed disk is red. You can also use the following commands to identify a disk by name and then to display where the disk is located in the chassis:
# disk show raid-info
# disk show physical-layout
To cause a disk’s green LED to blink, use the following command:
# disk beacon disk-id
3.
Using tape or a Post-it ® , mark the disk that is to be replaced.
If the disk to be replaced is disk 16, also mark the disk that will be swapped into slot 16. Use the following command with the disk-id given to you by Data Domain Support to cause the
LED to blink on the disk to be swapped.
# disk beacon disk-id
Chapter 17: Hardware Servicing 139
Replace Disks
4.
Enter the following commands to stop the file system and shut down the restorer:
# filesys disable
# system poweroff
Be sure to follow the instruction near the end of this procedure to enable the file system when the restorer is powered on again.
5.
Wait for the system to completely shut down.
6.
Wait for another 30 seconds for the disks to spin down and the heads to park and lock.
7.
Gently remove the disk. Please treat a failed disk carefully when removing the disk from the system and when shipping the disk back to Data Domain. Each returned disk is evaluated for the cause of the failure. Push down on the narrow end of the disk’s purple locking bar to unhook the bar. Then pull out the bar from the locked position. See
Power button
140
Locking bar pulled out
Figure 10: Locking bar
8.
Using the locking bar, slide the disk out and place it on a flat surface.
9.
The following sub-steps are for replacing a disk. If the disk that you just removed is disk 16, remove the disk identified as the swap disk, use the three sub-steps with the swap disk, then repeat with the replacement disk. The replacement disk goes into the slot vacated by the disk swapped into slot 16.
a.
On the disk being installed (replacement or swap), set the locking bar to about 45 degrees from the locked position. See
b.
With the locking bar remaining in the unlocked position, gently slide the disk into the chassis until it meets resistance. Excessive force may damage the replacement disk.
DD200 Restorer User Guide
Replace Power Units c.
Close the locking bar as you push the disk the rest of the way into the chassis. Be sure that the disk seats securely.
10.
Push the power button on the front panel of the system. See
11.
Log in to the system when the boot up process is complete.
12.
Check that the right LED is glowing green for the replacement disk and use the following command to check that the disk is recognized by the restorer. After about two minutes, the replacement disk should show a State of either hot spare or an Additional Status of
reconstructing. as shown in the example outut below. (If a disk was swapped into slot 16, the disk in that slot should have a State of in use.)
# disk show raid-info
Disk State Additional Status
------ -------------- ------------------------------------ disk1 in use (md23) disk2 in use (md24) disk3 in use (md25) reconstructing (3%, done in 94 mins.) disk4 in use (md26) disk5 hot spare
13.
Enable the restorer file system:
# filesys enable
14.
Return the removed disk in the packaging from the replacement disk. Copy the RMA number onto the packaging.
Replace Power Units
Note Please return the failed/replaced power unit to Data Domain. Reuse the packaging from the new unit and use the included prepaid waybill for shipping. Reference the RMA number on the outside of the package. Returns with no RMA number cannot be accepted.
A restorer has three power supply units that are visible from the back panel of the machine (see
). A restorer needs a minimum of two functional power units to power up. Always replace a failed power unit as soon as possible.
The system show faults command gives the following message if a power unit fails: A
power supply module has failed. The failed unit is not identified in the message. To identify the failed unit, look at the back panel of the machine, and check the LED on each unit.
Chapter 17: Hardware Servicing 141
Replace Power Units
Each power unit has an LED that glows green when the unit is functional. When a unit fails, an alarm sounds and the LED is off. To silence the alarm, push the power supply alarm reset button, the square, red button that is left of center at the top of the back panel. See
location.
Power Supply Alarm Reset
Power units
Figure 11: Power units and alarm button
The only tool needed is a phillips screwdriver. To replace a power unit:
1.
Look at the power unit LEDs to determine which unit failed.
2.
Remove the power cord from the power socket for the failed unit. See
3.
Use the phillips screwdriver to remove the retaining bar screw and pull the top of the retaining
bar out, away from the chassis, and down. See Figure 12 . The bar only needs to be moved (not
necessarily detached) far enough to clear the failed power unit.
142 DD200 Restorer User Guide
Replace Power Units
Retaining screw
Retaining bar
Power socket
Locking clip
Figure 12: Three power supply units
4.
Squeeze together the locking clip arms and slide out the unit as shown in
.
Figure 13: Squeeze the clip and pull out the power unit
5.
Slide in the new unit. Squeeze together the locking clip arms until the unit is seated. Make sure that the unit is seated securely and lines up with the other power units.
Chapter 17: Hardware Servicing 143
System Restart
6.
Swing the retaining bar back into position and replace the retaining bar screw.
7.
Attach the power cord.
8.
Check that the LED glows green.
9.
Return the removed power unit in the packaging from the replacement unit. Each failed unit is evaluated to find the reason for the failure. Copy the RMA number onto the packaging.
System Restart
A system restart from the state of no power may require a few steps. The state of having no power can result from the following situations:
• A number of replacement procedures in this chapter require removal of the power cords from all three power supply units.
•
•
The replacement of multiple power supply units.
A general power failure.
The restart procedure is:
1.
Attach the power cords to all three units.
2.
The system may start as soon as the power cords are attached. If not, press the power button on the front face of the restorer (see
3.
If the system does not start, press and hold (for three to five seconds) the Power Supply Alarm
Reset button (the large red button) on the back of the restorer. Press the Power button on the front face again if needed.
Remove the Top Panel
You must remove the restorer top panel to access all replacement parts other than power supply units and disks. To remove the top panel:
1.
Undo the locking screw that is on the front panel just to the right of center. See
.
2.
Slide the top panel back about two inches and then lift it off completely.
144 DD200 Restorer User Guide
Remove and Re-Install the Crossbar
Top panel
Top panel locking screw
Figure 14: Top panel locking screw
Remove and Re-Install the Crossbar
The crossbar holds plastic guides that stabilize the four PCI cards at the back of the restorer.
Remove the crossbar when replacing any of the four cards, the rear-facing CPU fan, or the two back panel fans.
Note Look closely at the positions of the plastic guides for each card before removing the crossbar
). Each guide must be in the correct position over its card when the crossbar is re-installed. Each guide needs to extend toward the back of the chassis and needs to have the correct card slip into the guide slot.
To remove the crossbar:
1.
Remove the restorer top panel.
2.
Unscrew the cross bar mounting screw. See Figure 15 .
Chapter 17: Hardware Servicing 145
Remove and Re-Install the Crossbar
Mounting screw
Crossbar
Plastic guides
Figure 15: Crossbar
3.
Raise the mounting screw end of the crossbar until you can easily pull out the tab that holds the other end of the crossbar to the chassis. See
146
Figure 16: Raising the crossbar
DD200 Restorer User Guide
Replace Fans
To re-install the crossbar:
1.
Position the crossbar so that the mounting tab end of the crossbar is above the mounting tab slot on the right side of the chassis as viewed from the back of the chassis.
2.
Raise the other end of the crossbar until the mounting tab easily slides into place.
3.
With the mounting tab in place, lower the crossbar.
4.
While lowering the crossbar, make sure that each plastic guide extends toward the back of the chassis and that each card slips into the correct guide slot is in the correct position. See
Figure 17: Plastic guides with cards in slots
5.
Insert and screw down the top bar mounting screw.
Replace Fans
A restorer has three sets of fans. Use the system show faults command or the system show fans command to check on the fans. To see the fans, remove the restorer top panel.
Looking from the front of the restorer, the first fan set is five fans in a rack just behind the disks and across the width of the box. The fans in the rack cool the disks. The fans are numbered from 1 to 5 from left to right as viewed from the front of the machine. See
.
Chapter 17: Hardware Servicing 147
Replace Fans
The second fan set is two fans located one on each system CPU. The fans are numbered from 2 to 1 from left to right as viewed from the front of the restorer. The fan for CPU 2 is on the back of the
CPU, as shown in Figure 18 . The fan for CPU 1 is on the front of the CPU and is not visible in
The third fan set is two fans on the back panel, as shown in
Figure 18 . Back panel fans are
numbered 1 and 2 from left to right as viewed from the front of the restorer.
Back panel fan 1
Back panel fan 2
CPU 2 fan
CPU 1
Disk fan 5
Disk fan 4
Disk fan 3
Disk fan 2
Disk fan 1
148
Figure 18: Fan locations
Replace Disk Fans
Disk fans are numbered 1 through 5 from left to right as viewed from the front of the restorer. You can replace disk fans while the restorer is running. To replace disk fans:
1.
Check the system show faults command or the system show fans command output to determine that a fan is failed.
2.
Remove the restorer top panel.
3.
For the failed fan, undo the fan retaining screw at the top of the fan frame. The screw releases the fan and frame, but remains in the frame. See
.
DD200 Restorer User Guide
Replace Fans
Fan retaining screws
Figure 19: Fan retaining screws
4.
Grasp the fan frame and pull the fan out of the rack as shown in Figure 20 .
Figure 20: Fan and frame pulled out of the rack
5.
Note the power plug at the bottom of the fan rack.
6.
Position the replacement fan with the retaining screw facing toward the front of the machine and the power plug facing down.
7.
Slide the fan into the rack making sure that the power plug seats securely. The fan frame should line up with the other frames in the rack.
8.
Tighten the retaining screw.
9.
Replace the top panel.
10.
Use the command system show fans to confirm that the replacement fan is running.
Chapter 17: Hardware Servicing 149
Replace Fans
Replace CPU Fans
See
for the location of the CPU fans. The fans are numbered 2 and 1 from left to right as viewed from the front of the restorer. The fan for CPU 2 is on the back of the CPU. To replace a
CPU fan:
1.
Check the system show faults command output to determine which fan is failed.
2.
Shutdown the restorer with the command system poweroff.
3.
Remove all three power cords from the power supplies at the back of the restorer.
4.
Remove the restorer top panel.
5.
Unplug the power header (see
Figure 21 in which the front of the restorer is to the right as you
view the figure). Be sure to note which color wire in the header faces to the back. Also note that one fan mounting frame faces forward in the chassis and one faces back, but both fans direct air toward the back of the machine.
Figure 21 shows the airflow arrows that point to the
back of the machine on both fans.
Airflow arrows
CPU1 fan power header
CPU1 fan
Front
CPU2 fan
CPU2 fan power header
Figure 21: CPU fans
6.
Push back the two plastic retaining clips that hold the CPU shroud, fan mounting frame, and fan and remove the shroud, frame, and fan as a unit. See
. Move the unit from side to side to loosen it.
150 DD200 Restorer User Guide
Replace Fans
Figure 22: Remove the CPU shroud
7.
Push back the plastic retaining clips that hold the fan, and pull the fan from the frame. See
Figure 23: Remove the fan from the shroud (Note airflow arrow on this fan for CPU 2.)
8.
Slide the replacement fan into the two retaining clips.
Note Each CPU fan must direct airflow to the back of the restorer. Each fan frame has an arrow that shows airflow direction. Be sure that the arrow points to the back of the restorer. See
Figure 21 . The arrow for the fan on the CPU 1 shroud should point back toward the shroud.
The arrow for the fan on the CPU 2 shroud should point away from the shroud.
9.
Replace the unit of shroud, fan mounting frame, and fan.
Chapter 17: Hardware Servicing 151
Replace Fans
10.
Attach the power connector to the power header on the motherboard at the location shown in
Figure 21 . Be sure to have the correct color wire in the connector facing to the back of the
machine.
11.
Replace the restorer top panel.
12.
Replace the power cords and restart the restorer. See “ System Restart ” on page 144 for restart
tips.
13.
Use the command system show fans to confirm that the replacement fan is running.
Replace Back Panel Fans
Back panel fans are numbered 1 and 2 from left to right as viewed from the front of the restorer.
The two fans are replaced as one unit. If one fan in the unit fails, both fans are replaced. The only tool needed is a phillips screwdriver. To remove the unit:
1.
Check the system show faults command output to determine which fan is failed.
2.
Shutdown the restorer with the command system poweroff.
3.
Remove all three power cords from the power supplies at the back of the restorer.
4.
Remove the restorer top panel.
5.
Unplug both monitor headers. See
. Be sure to note which color wire faces toward the back of the machine.
152 DD200 Restorer User Guide
6.
Unhook the power harness that services both fans. See Figure 24
Power harness
Replace Fans
Monitor headers
Figure 24: Back panel fans
7.
Using a phillips screwdriver, remove the four screws that hold each fan on the chassis back panel. See
.
Fan 2 mounting screws
Figure 25: Fan mounting screws
Fan 1 mounting screws
8.
From inside the chassis, pull out the fans and wiring harness. See
harness has two power connectors. The four-pin male connector is used for power to the fans; the other connector is not used.
Chapter 17: Hardware Servicing 153
Replace Fans
154
Figure 26: Remove the fans
9.
Position the replacement fans and harness. The printed product label on each fan faces the back panel of the machine.
10.
Slide the replacement fans into their final position along the chassis.
11.
Secure the replacement fans with the retaining screws.
Note The retaining screws go directly into the plastic fan frames. Do not over-torque the screws or they will strip the mounting threads. Torque the screws only as much as is needed to hold the fans firmly to the chassis.
12.
Plug in the four-pin male power connector to the power harness. See
13.
Plug in the monitor headers to the fan headers on the motherboard. See Figure 27 for the
location. Be sure that the correct color wire is facing toward the back of the machine.
DD200 Restorer User Guide
Power harness connector
Replace Fans
Fan monitor headers
Figure 27: Back panel monitor headers and power harness
14.
Replace the top panel.
15.
Replace the power cords and restart the restorer. See “ System Restart ” on page 144 for restart
tips.
16.
After the system boots, check that the fans are pushing air out from the back of the restorer chassis.
17.
Use the command system show fans to confirm that the replacement fans are running..
Chapter 17: Hardware Servicing 155
Replace Cards
Replace Cards
The restorer has four cards that you can replace (and add in one case): the half-height Gigabit
Ethernet card, two disk controller cards, and the NVRAM card. Figure 28 shows the four cards in
the back left corner of the restorer as viewed from the front of the machine.
Mounting bracket screws
NVRAM
Disk controller Host 0
Disk controller Host 1
Gigabit Ethernet
Figure 28: Replaceable boards
•
•
•
•
The half-height Gigabit Ethernet card is on the far left in the first motherboard slot from the left side of the chassis.
The next card to the right is disk controller host 1 in motherboard slot number three. Slot number two is not used. The card has eight ribbon cables attached.
The next card to the right is disk controller host 0 in motherboard slot number four. The card has eight ribbon cables attached.
The next card is the NVRAM card.
156 DD200 Restorer User Guide
Replace Cards
Add or Replace a Gigabit Ethernet Card
The optional half-height Gigabit Ethernet card adds two Gigabit Ethernet Fiber or copper ports to the restorer. A restorer with the card has a total of four Ethernet ports, including the copper Gigabit
Ethernet port and copper 10/100 Base-T port on the motherboard.
Figure 29 shows the four ports.
10/100 Base-T
Copper
Gigabit
Figure 29: Ethernet interfaces
Fiber
Gigabit
Fiber
Gigabit
Chapter 17: Hardware Servicing 157
Replace Cards
Figure 30 , looking from the back of the restorer, shows the location of an installed card with the
crossbar and plastic guide in place. The correct slot in the motherboard is the slot closest to the right side of the chassis when looking from the back of the restorer.
Plastic guide
Fiber
Gigabit
Ethernet card
Figure 30: Gigabit Ethernet card location
To install a Gigabit Ethernet card:
1.
Shutdown the system with the system poweroff command.
2.
Remove the power cords.
3.
Remove the restorer top panel.
4.
Remove the crossbar. Be sure to note the positions of the plastic guides for each card secured by the crossbar.
5.
To remove a Gigabit Ethernet card, unscrew the mounting bracket screw that holds the card to
the chassis (see Figure 28 ) and then remove the card from the slot. See
158 DD200 Restorer User Guide
Replace Cards
Figure 31: Remove the Gigabit Ethernet card
6.
To install a Gigabit Ethernet card, line up the mounting bracket facing the rear of the chassis and line up the bottom edge of the card over the slot that is farthest to the left of the chassis when looking from the front of the restorer.
7.
Firmly push the card into the slot.
8.
Using the bracket mounting screw, secure the bracket to the chassis.
9.
Replace the crossbar. Be sure that the plastic guide for each card extends toward the back of the chassis and that each guide secures the correct card.
10.
Replace the restorer top panel.
11.
Replace the power cords and restart the restorer. See “ System Restart ” on page 144 for restart
tips.
12.
Use the net show hardware command to display that the system recognizes the ports.
The Hardware Address column should have an address for each port and the Physical column should show the type for each port, Copper or Fiber.
Chapter 17: Hardware Servicing 159
Replace Cards
Replace a Disk Controller Card
The restorer has two disk controller cards.
shows the location of the disk controller cards with the crossbar and plastic guides as seen from the back of the restorer. The correct slots in the motherboard are the third and fourth slots from the right side of the chassis when looking from the back of the restorer. The spare slot (slot number two) that is between the Gigabit Ethernet card slot and the first disk controller slot is not used. Do not attempt to install anything in the spare slot.
The card in slot three is called host 1. The card in slot four is called host 0. Determining the need for a disk controller replacement and identifying which card to replace is done by the Data Domain support staff after analysis of system logs.
Plastic guides
Disk controller cards
160
Figure 32: Disk controller card locations
The tools needed are a #2 Phillips screwdriver and a pair of diagonal wire cutters to cut tie wraps.
To replace a disk controller card:
1.
Shut down the restorer and remove the power cords.
2.
Remove the restorer top panel.
3.
Remove the crossbar. Be sure to note the positions of the plastic guides for each card secured by the crossbar.
4.
To remove a disk controller card, unscrew the mounting bracket screw that holds the card to
the chassis (see Figure 28 ) and then carefully remove the card from the slot. See
DD200 Restorer User Guide
Replace Cards
Ribbon cable connector removed
Figure 33: Remove a disk controller card
5.
Remove each of the eight ribbon-cable connectors that attach to the card.Note that each connector matches its port by the length of the ribbon cable. Set aside the connectors in such a way that you can easily match them to the correct port on the new card. See
needed, cut one or more of the tie wraps that bundle the ribbon cables.
6.
Attach all eight ribbon-cable connectors to the replacement card. Be sure that each connector goes to the correct port (by the length of the ribbon cable). Use the supplied tie wraps to bundle the ribbon cables if the original tie wraps were cut when removing the old card.
7.
Line up the mounting bracket facing the back of the chassis and line up the bottom edge of the replacement card over either the third or fourth slot from the left of the chassis when looking from the front of the restorer.
8.
Firmly push the card into the slot.
9.
Using the bracket mounting screw, secure the bracket to the chassis.
10.
Replace the crossbar. Be sure that the plastic guide for each card extends toward the back of the chassis and that each guide secures the correct card.
11.
Replace the restorer top panel.
Chapter 17: Hardware Servicing 161
Replace Cards
12.
Replace the power cords and restart the restorer. See “ System Restart ” on page 144 for restart
tips.
13.
After the system starts, log in and use the disk show summary command to check on the new card. Depending on the state of the system when halted, as many as eight disks may show as failed. The disks marked as failed are actually still good, but remain in the failed state through the system restart.
14.
Use the disk unfail command to return all the failed disks to useful states.
Replace an NVRAM Card
A restorer has one NVRAM card.
Figure 34 shows the location with the crossbar and plastic guide
that holds the card. The NVRAM card slot in the motherboard is the fifth slot from the right side of the chassis when looking from the back of the restorer. The NVRAM card should be in slot five, next to the disk controller card that is in slot four.
Plastic guide
Power Supply Alarm
Reset button
NVRAM card
162
Figure 34: NVRAM card location
Replacing a card requires removing the top panel of the restorer. If the restorer is in a rack with another box directly above, the restorer may need to be removed from the rack to remove the top panel. Be careful when moving a restorer, as the system weighs 88 pounds (40 kilograms).
The tools needed to replace the card are:
• A Phillips #2 screwdriver.
• An ESD strap.
DD200 Restorer User Guide
Replace Cards
To replace the NVRAM card:
1.
Disable the restorer file system with the following command: sysadmin# filesys disable
2.
Shut down the restorer using the command system poweroff.
3.
Attach the ESD strap.
4.
Remove the three power cords.
5.
Remove the restorer top panel.
6.
Remove the crossbar. Be sure to note the positions of the plastic guides for each card secured by the crossbar.
7.
To remove the NVRAM card, unscrew the mounting bracket screw (see
) that holds the card to the chassis and then remove the card from the slot.
Mounting bracket screw
Jumper location E4
Jumper location E3
Figure 35: Remove the NVRAM card
8.
On the new card, a jumper for each battery is disabled for shipping. The batteries must be
enabled before installing the card. One jumper is at the location labeled E3 and one at the location labeled E4 on the card. See
Figure 35 . Each jumper is on a single pin of a two-pin set.
For each jumper, remove the jumper from the one pin and push the jumper down with one slot over each pin.
Chapter 17: Hardware Servicing 163
Replace Cards
9.
To install the card, line up the mounting bracket facing the rear of the chassis and line up the bottom edge of the card over fifth slot from the left of the chassis when looking from the front of the restorer.
10.
Firmly push the card into the slot.
11.
Using the bracket mounting screw, secure the bracket to the chassis.
12.
Replace the crossbar. Be sure that the plastic guide for each card extends toward the back of the chassis and that each guide secures the correct card.
13.
Replace the restorer top panel.
14.
Attach the power cords to all three power units.
15.
The system may start as soon as the power cords are attached. If not, press the power button on the front face of the restorer. See
16.
If the system does not start, press and hold (for three to five seconds) the Power Supply Alarm
Reset button (the large red button on the back panel of the restorer, see
Press the Power button on the front face again if needed.
Power button
164
Figure 36: Power button
17.
Log into the system as user sysadmin and enter the following command to enable the restorer file system: sysadmin# filesys enable
DD200 Restorer User Guide
Replace the Motherboard Battery
Replace the Motherboard Battery
The lithium battery on the motherboard should not need replacement. In the unusual case of a battery failure, push back the battery locking tab to release the battery. See
replacement battery into the battery frame so that the locking tab secures the replacement.
Battery
Locking tab
Figure 37: Battery and locking tab
Caution A risk of explosion exists if the battery is replaced by an incorrect type. Dispose of used batteries according to the manufacturer’s instructions.
Chapter 17: Hardware Servicing 165
Replace the Motherboard Battery
166 DD200 Restorer User Guide
Appendix A: Time Zones
Africa
Africa/Abidjan
Africa/Bamako
Africa/Brazzaville
Africa/Dakar
Africa/Gaborone
Africa/Kigali
Africa/Luanda
Africa/Maseru
Africa/Ndjamena
Africa/Sao_Tome
Africa/Accra
Africa/Bangui
Africa/Addis_Ababa Africa/Algiers
Africa/Banjul Africa/Bissau
Africa/Bujumbura Africa/Cairo
Africa/Dar_es_Salaam Africa/Djibouti
Africa/Casablanca
Africa/Douala
Africa/Harare
Africa/Kinshasa
Africa/Johannesburg Africa/Kampala
Africa/Lagos Africa/Libreville
Africa/Lumumbashi Africa/Lusaka
Africa/Mbabane Africa/Mogadishu
Africa/Malabo
Africa/Monrovia
Africa/Niamey
Africa/Timbuktu
Africa/Nouakchott
Africa/Tripoli
Africa/Asmera
Africa/Blantyre
Africa/Conakry
Africa/Freetown
Africa/Khartoum
Africa/Lome
Africa/Maputo
Africa/Nairobi
Africa/Ouagadougou Africa/Porto-Novo
Africa/Tunis Africa/Windhoek
America
America/Adak
America/Asuncion
America/Boise
America/Cayman
America/Curacao
America/Dominica
America/Fortaleza
America/Anchorage America/Anguilla
America/Atka America/Barbados
America/Buenos_Aires America/Caracas
America/Chicago
America/Dawson
America/Edmonton
America/Glace_Bay
America/Cordoba
America/Antigua
America/Belize
America/Catamarca
America/Costa_Rica
America/Dawson_Creek America/Denver
America/El_Salvador America/Ensenada
America/Godthab America/Goose_Bay
America/Aruba
America/Bogota
America/Cayenne
America/Cuiaba
America/Detroit
America/Fort_Wayne
America/Grand_Turk
167
America/Grenada
America/Halifax
America/Iqaluit
America/La_Paz
America/Managua
America/Menominee
America/Montserrat
America/Guadeloupe
America/Havana
America/Jamaica
America/Guatemala
America/Indiana
America/Jujuy
America/Guayaquil America/Guyana
America/Indianapolis America/Inuvik
America/Juneau America/Knox_IN
America/Lima
America/Manaus
America/Los_Angeles America/Louisville
America/Martinique America/Mazatlan
America/Mexico_City America/Miquelon
America/Nassau America/New_York
America/Montevideo
America/Nipigon
America/Maceio
America/Mendoza
America/Montreal
America/Nome
America/Noronha America/Panama America/Pangnirtung America/Paramaribo
America/Port_of_Spain America/Port-au-Prince America/Porto_Acre America/Puerto_Rico
America/Phoenix
America/Rainy_River
America/Rankin_Inlet America/Regina
America/Sao_Paulo America/Scoresbysund
America/Rosario
America/Shiprock
America/Santiago
America/St_Johns
America/Santo_Domingo
America/St_Kitts
America/St_Lucia
America/Thule
America/Virgin
America/St_Thomas
America/Thunder_Bay
America/Whitehorse
America/St_Vincent
America/Tijuana
America/Winnipeg
America/Swift_Current America/Tegucigalpa
America/Tortola
America/Yakutat
America/Vancouver
America/Yellowknife
Antarctica
Antarctica/Casey
Antarctica/Palmer
Antarctica/DumontDUrville Antarctica/Mawson
Antarctica/South_Pole
Antarctica/McMurdo
Asia
Asia/Aden
Asia/Aqtobe
Asia/Bangkok
Asia/Chungking
Asia/Dushanbe
Asia/Ishigaki
168
Asia/Alma-Ata
Asia/Ashkhabad
Asia/Beirut
Asia/Colombo
Asia/Gaza
Asia/Istanbul
Asia/Amman
Asia/Baghdad
Asia/Bishkek
Asia/Dacca
Asia/Harbin
Asia/Jakarta
Asia/Anadyr
Asia/Bahrain
Asia/Brunei
Asia/Damascus
Asia/Hong_Kong
Asia/Jayapura
Asia/Aqtau
Asia/Baku
Asia/Calcutta
Asia/Dubai
Asia/Irkutsk
Asia/Jerusalem
DD200 Restorer User Guide
Asia/Kabul
Asia/Krasnoyarsk
Asia/Magadan
Asia/Omsk
Asia/Riyadh
Asia/Taipei
Asia/Thimbu
Asia/Vientiane
Asia/Kamchatka Asia/Karachi
Asia/Kuala_Lumpur Asia/Kuching
Asia/Manila Asia/Muscat
Asia/Phnom_Penh
Asia/Saigon
Asia/Tashkent
Asia/Tokyo
Asia/Vladivostok
Asia/Pyongyang
Asia/Seoul
Asia/Kashgar
Asia/Kuwait
Asia/Nicosia
Asia/Qatar
Asia/Shanghai
Asia/Tbilisi Asia/Tehran
Asia/Ujung_Pandang Asia/Ulan_Bator
Asia/Yakutsk Asia/Yekaterinburg
Asia/Katmandu
Asia/Macao
Asia/Novosibirsk
Asia/Rangoon
Asia/Singapore
Asia/Tel_Aviv
Asia/Urumqi
Asia/Yerevan
Atlantic/Azores
Atlantic/Jan_Mayen
Atlantic/Stanley
Atlantic
Atlantic/Bermuda
Atlantic/Madeira
Atlantic/Canary
Atlantic/Reykjavik
Brazil/DeNoronha Brazil/East
Atlantic/Cape_Verde Atlantic/Faeroe
Atlantic/South_Georgia Atlantic/St_Helena
Australia
Australia/ACT
Australia/Darwin
Australia/Melbourne Australia/NSW
Australia/South Australia/Sydney
Australia/Yancowinna
Australia/Adelaide
Australia/Hobart
Australia/Brisbane
Australia/LHI
Australia/Broken_Hill Australia/Canberra
Australia/Lindeman Australia/Lord Howe
Australia/North Australia/Perth
Australia/Tasmania Australia/Victoria
Australia/Queensland
Australia/West
Brazil
Brazil/Acre Brazil/West
169
Canada
Canada/Atlantic
Canada/Mountain
Canada/Yukon
Canada/Central
Canada/Newfoundland
Canada/East-Saskatchewan Canada/Eastern
Canada/Pacific Canada/Saskatchewan
Chile
Chile/Continental Chile/EasterIsland
Etc
Etc/GMT
Etc/GMT+4
Etc/GMT+9
Etc/GMT-0
Etc/GMT-5
Etc/GMT-10
Etc/Greenwich
Etc/GMT+0
Etc/GMT+5
Etc/GMT+10
Etc/GMT-1
Etc/GMT-6
Etc/GMT-11
Etc/UCT
Etc/GMT+1
Etc/GMT+6
Etc/GMT+11
Etc/GMT-2
Etc/GMT-7
Etc/GMT-12
Etc/Universal
Etc/GMT+2
Etc/GMT+7
Etc/GMT+12
Etc/GMT-3
Etc/GMT-8
Etc/GMT-13
Etc/UTC
Etc/GMT+3
Etc/GMT+8
Etc/GMT0
Etc/GMT-4
Etc/GMT-9
Etc/GMT-14
Etc/Zulu
Europe
Europe/Amsterdam Europe/Andorra
Europe/Berlin Europe/Bratislava
Europe/Chisinau
Europe/Istanbul
Europe/Copenhagen
Europe/Kiev
Europe/Athens
Europe/Brussels
Europe/Dublin
Europe/Kuybyshev
Europe/London
Europe/Monaco
Europe/Riga
Europe/Skopje
Europe/Luxembourg Europe/Madrid
Europe/Moscow
Europe/Rome
Europe/Sofia
Europe/Oslo
Europe/San_Marino
Europe/Stockholm
Europe/Belfast
Europe/Bucharest
Europe/Gibraltar
Europe/Lisbon
Europe/Malta
Europe/Paris
Europe/Sarajevo
Europe/Tallinn
Europe/Belgrade
Europe/Budapest
Europe/Helsinki
Europe/Ljubljana
Europe/Minsk
Europe/Prague
Europe/Simferopol
Europe/Tirane
170 DD200 Restorer User Guide
Europe/Vaduz
Europe/Zagreb
GMT
GMT
GMT+5
GMT+10
GMT-2
GMT-7
GMT-12
Europe/Vatican
Europe/Zurich
GMT+1
GMT+6
GMT+11
GMT-3
GMT-8
Indian (Indian Ocean)
Indian/Antananarivo Indian/Chagos
Indian/Kerguelen
Indian/Reunion
Indian/Mahe
Europe/Vienna
GMT+2
GMT+7
GMT+12
GMT-4
GMT-9
Indian/Christmas
Indian/Maldives
Europe/Vilnius
GMT+3
GMT+8
GMT+13
GMT-5
GMT-10
Indian/Cocos
Indian/Mauritius
Mexico
Mexico/BajaNorte Mexico/BajaSur
Miscellaneous
Arctic/Longyearbyen CET
Egypt Eire
GB
Iceland
GB-Eire
Iran
Kwajalein
Navajo
Libya
NZ
CST6CDT
EST
Greenwich
Israel
MET
NZ-CHAT
Mexico/General
Cuba
EST5EDT
Hongkong
Jamaica
MST
Poland
Europe/Warsaw
GMT+4
GMT+9
GMT-1
GMT-6
GMT-11
Indian/Comoro
Indian/Mayotte
EET
Factory
HST
Japan
MST7MDT
Portugal
171
PRC
Turkey
W-SU
172
PST8PDT
UCT
Zulu
ROC
Universal
ROK
UTC
Singapore
WET
Pacific
Pacific/Apia
Pacific/Enderbury
Pacific/Gambier
Pacific/Kiritimati
Pacific/Midway
Pacific/Pago_Pago
Pacific/Rarotonga
Pacific/Tongatapu
Pacific/Auckland Pacific/Chatham
Pacific/Fakaofo Pacific/Fiji
Pacific/Guadalcanal Pacific/Guam
Pacific/Kosrae
Pacific/Nauru
Pacific/Palau
Pacific/Saipan
Pacific/Truk
Pacific/Kwajalein
Pacific/Niue
Pacific/Pitcairn
Pacific/Samoa
Pacific/Wake
Pacific/Easter
Pacific/Funafuti
Pacific/Honolulu
Pacific/Majuro
Pacific/Norfolk
Pacific/Ponape
Pacific/Tahiti
Pacific/Wallis
Pacific/Efate
Pacific/Galapagos
Pacific/Johnston
Pacific/Marquesas
Pacific/Noumea
Pacific/Port_Moresby
Pacific/Tarawa
Pacific/Yap
System V
SystemV/AST4 SystemV/AST4ADT SystemV/CST6
SystemV/EST5EDT SystemV/HST10 SystemV/MST7
SystemV/PST8PDT SystemV/YST9 SystemV/YST9YDT
SystemV/CST6CDT SystemV/EST5
SystemV/MST7MDT SystemV/PST8
US/Alaska
US/Eastern
US/Pacific
US (United States)
US/Aleutian
US/Hawaii
US/Pacific-New
US/Arizona
US/Indiana-Starke
US/Samoa
US/Central
US/Michigan
US/East-Indiana
US/Mountain
Aliases
GMT=Greenwich, UCT, UTC, Universal, Zulu CET=MET (Middle European Time)
US/Eastern=Jamaica US/Mountain=Navajo
DD200 Restorer User Guide
Appendix B: Restorer Commands
adminaccess
NAME
adminaccess - Allow remote hosts to use FTP, TELNET, or SSH.
SYNOPSIS
adminaccess add {ftp | telnet} host-list
adminaccess add ssh-keys
adminaccess del {ftp | telnet} host-list
adminaccess del ssh-keys lineno
adminaccess disable {ftp | telnet | ssh | all}
adminaccess enable {ftp | telnet | ssh | all}
adminaccess reset {ftp | telnet | ssh | all}
adminaccess reset ssh-keys
adminaccess show [ftp | telnet | ssh | all]
adminaccess show ssh-keys
DESCRIPTION
The adminaccess command creates access control lists for the use of
HTTP, FTP, TELNET, and SSH administrative protocols on the restorer.
Every adminaccess operation is available to administrative users only.
OPERATIONS
add Add hosts to a protocol. For multiple hosts, enter a list using
commas or spaces or both. A host is a fully-qualified domain
hostname, an IP address, an IP address subnet specification, or
a wildcard hostname, such as *.yourcompany.com. An asterisk
(*) means no restrictions.
A subnet specification is a subnet IP address, an IP address and
netmask separated by a slash (/), or an IP address and number of
bits separated by a slash (/). The number of bits is an integer
between 8 and 30. An example of each specification is:
173
174
192.168.1.0/255.255.255.0
192.169.1.0/24
add ssh-keys
Add an SSH public key, created on a remote machine, to the SSH
authorized keys file on the restorer. Available to the sysadmin user
only, the operation allows sysadmin to log in without giving a
password. On the remote machine, create a public key using the
ssh-keygen command. Use the key ~/.ssh/id_dsa.pub as
generated on the remote machine by ssh-keygen as input to the
add ssh-keys option. See the "EXAMPLES" section below for an
example of the add ssh-keys option.
del Delete hosts from a protocol.
del ssh-keys
Delete an SSH key from the key file. The lineno is a line number
as displayed by the command adminaccess show ssh-keys.
disable
Disable a service.
enable
Enable a service.
reset
Set the given access list to the factory defaults.
reset ssh-keys
Remove the authorized SSH keys file from the restorer. After removing
the file, every SSH connection needs password authentication.
Available to the sysadmin user only.
show Display hosts from the given access list and status for the service.
show ssh-keys
Display the SSH key file with a line number for each entry.
EXAMPLES
To add the host srvr24 to the TELNET access list:
adminaccess add telnet srvr24.yourcompany.com
To add all hosts in a domain to the TELNET access list:
adminaccess add telnet *.yourcompany.com
To add an entire local subnet to the TELNET access list:
adminaccess add telnet 192.168.1.0/24
To add an SSH public key, create the public key on a remote machine,
then from the remote machine, use a command similar to the following:
DD200 Restorer User Guide
ssh -l sysadmin rstr01 "adminaccess add \
ssh-keys < ~/.ssh/id_dsa.pub"
Restore Protection Manager
7 December 2004
175
176
alerts
NAME
alerts - Manage the alerts history file and email list.
SYNOPSIS
alerts add email-list
alerts del email-list
alerts reset
alerts show alerts-list
alerts show all
alerts show {current | history | daily}
alerts test "reason" [email-addr]
DESCRIPTION
The alerts command manages the alerts history file and who receives
email notification for system alerts. Alerts happen whenever Restore
Protection Manager discovers a problem with software or a monitored
component.
OPERATIONS
add Add email addresses to the list that receives system alert emails.
The email-list is a list of email address that is comma-separated or
space-separated or both. Administrative users only.
del Delete email addresses from the list. The email-list is a list of
email address that is comma-separated or space-separated or
both. Administrative users only.
reset
Set the email list to the factory default of
[email protected]. Administrative users only.
show alerts-list
Display the alerts email list.
show all
Display the alerts email list and the administrator email address.
show current
Display alerts for all situations that have not been dealt with.
For example, a message about a problem fan displays until the
fan is replaced with a functional unit.
DD200 Restorer User Guide
show daily
Display current alerts and the alerts events history for the last 24
hours. Use the up and down arrow keys to move through the log.
Use the q key to exit. Enter a slash character (/) and a pattern to
search for and highlight lines of particular interest.
show history
Display the alerts events history file. The event history file
includes one line (date and reason) for every system alert. Use the
up and down arrow keys to move through the log. Use the q key to
exit. Enter a slash character (/) and a pattern to search for and
highlight lines of particular interest.
test "reason"
Send an email with a message (reason) to all addresses on the alerts
list or to one specified address. The reason is bracketed by double
quotes. After adding addresses to the email list, always use this
operation to test for any mailer problems.
EXAMPLE
To add the email addresses [email protected] and
[email protected] to the alerts email list:
alerts add [email protected], [email protected]
To test the alerts email list with the message Added a user test message:
alerts test "Added a user test message"
Restore Protection Manager
7 December 2004
177
178
alias
NAME
alias - Create and display command aliases.
SYNOPSIS
alias add name "command"
alias del name
alias reset
alias show
DESCRIPTION
The alias command allows you to add, delete, and display command
aliases for the Restore Protection Manager (restorer) command set. Each
user can view and use only aliases for commands that are available at
that user's permissions level. The default aliases and their corresponding
restorer commands are:
date - system set date
df - filesys show space
hostname - net set hostname
ifconfig - net config
iostat - system show detailed-stats 2
netstat - net show stats
nfsstat - nfs show stats
passwd - user change password
ping - net ping host-name
poweroff - system poweroff
reboot - system reboot
sysstat [interval nsecs] - system show stats
traceroute - route trace host-name
uname - system show version
uptime - system show uptime
OPERATIONS
add Add a command alias. Give the name for the alias and then give the
complete restorer command bracketed by double quotes ("..."). The
new alias is available only for the user that adds the alias.
del Delete an alias by name.
reset
Return to the default alias list, removing all user-added aliases.
DD200 Restorer User Guide
show Display all aliases and their command definitions. Note that the
sysstat alias can include an interval option and value for the
number of seconds between each display. The default interval is
2 seconds.
EXAMPLE
The following command adds an alias named rely for the restorer command
that displays disk reliability statistics
alias rely "disk show reliability-data"
Restore Protection Manager
9 July 2004
179
180
autosupport
NAME
autosupport - Manage the weekly system report.
SYNOPSIS
autosupport add email-list
autosupport del email-list
autosupport display [brief | normal | verbose]
autosupport reset all
autosupport reset schedule
autosupport reset support-list
autosupport send [brief | normal | verbose][email-addr]
autosupport send debug [email-addr]
autosupport set schedule [daily | weekly | monthly | never]
[day1[,day2,...]] time
autosupport show all
autosupport show history
autosupport show schedule
autosupport show support-list
DESCRIPTION
The autosupport command manages when and at what frequency the
system report is generated and who receives email notification. The
system report gives complete system status and statistics on system use,
and enters a line in the events history log file that the report was run.
OPERATIONS
add Add email addresses to the list that receives system reports. The
email-list is a list of email address that is comma-separated or
space-separated or both. Administrative users only.
del Delete email addresses from the list. The email-list is a list of
email address that is comma-separated or space-separated or both.
Administrative users only.
display
Runs and displays the normal system report, but does not send
email. Each display level gives differing amounts of system
information. Verbose gives the most information, including log
file entries, used by Data Domain support personnel. Use the up
DD200 Restorer User Guide
and down arrow keys to move through the log. Use the q key to
exit. Enter a slash character (/) and a pattern to search for and
highlight lines of particular interest.
reset all
Sets all autosupport parameters to the factory defaults.
Administrative users only.
reset schedule
Sets the weekly system report schedule to the default (sun 0300).
Administrative users only.
reset support-list
Sets the email list to the factory defaults. Administrative users
only.
send Test-run the system report and email the results to all addresses on
the autosupport list or to one specified address. After adding
addresses to the email list, always use this operation to test for
any mailer problems. Use brief for a smaller test email.
send debug
Send output from the disk show debug command to the mailing
list or to a given email address. Administrative users only.
set schedule
Set the verbose system report to run at a given frequency and a
given time. The schedule operation can specify a day (one or
two numerals) or on a day of the week (three letters) at a specific
time (0000). Administrative users only.
The daily and never periods do not take a day qualifier. The
weekly period with a day qualifier or the day qualifier without
weekly both run the command once a week. The never period
turns off the system report.
The day qualifier is three letters (such as "mon" for Monday)
when used with the weekly period and when used alone with
the required time entry. The day qualifier is a day-of-the-
month, from 1 to 31, when used with monthly.
time is 24-hour military time. 2400 is not a valid time.
"mon 0000" is midnight between Sunday night and Monday
morning.
show all
Display all autosupport parameters.
181
182
show history
Display the event history file, which includes the date for each
autosupport report. Use the up and down arrow keys to move
through the log. Use the q key to exit. Enter a slash character (/)
and a pattern to search for and highlight lines of particular
interest.
show schedule
Displays the system report schedule.
show support-list
Display the autosupport email list.
EXAMPLES
To schedule the system report for every Tuesday at 3 p.m., use either of
the following commands:
autosupport set schedule tue 1500
autosupport set schedule weekly tue 1500
To schedule the system report for 2 p.m. every Monday and Friday:
autosupport set schedule mon,fri 1400
To schedule the system report for 2 p.m. on the first and fifteenth of
every month:
autosupport set schedule monthly 1,15 1400
Restore Protection Manager
13 October 2004
DD200 Restorer User Guide
cifs
NAME
cifs - Manage Common Internet File System access.
SYNOPSIS
cifs add /backup client-list
cifs add /ddvar client-list
cifs del /backup client-list
cifs del /ddvar client-list
cifs disable
cifs enable
cifs hosts [add ipaddr nb-hostname | del ipaddr | show | reset]
cifs nb-lookup nb-hostname
cifs reset clients
cifs reset nb-hostname
cifs reset wins-server
cifs set authentication active-directory realm {[ dc1 [dc2 ...]]
| * }
cifs set authentication domain domain {[ pdc [bdc ]] | * }
cifs set authentication workgroup wg-name
cifs set nb-hostname nb-hostname
cifs set wins-server ipaddr
cifs show active
cifs show clients
cifs show config
cifs show stats
cifs status
DESCRIPTION
The cifs command enables and disables Common Internet File System
access, sets the authentication mode, and displays status and statistics.
All CIFS operations are for administrative users only.
183
184
OPERATIONS
add /backup
Give CIFS backup accounts access to the backup file system through
CIFS clients. The client list can be IP addresses or machine names.
Wild cards are allowed. For each backup account, use the user add
command to add the account to the DD200.
add /ddvar
Give users administrative access through CIFS clients. The client
list can be IP addresses or machine names. Wild cards are allowed.
For each user account that needs administrative access, use the user
add command to add the account to the DD200.
del /backup
Remove access for CIFS backup accounts through clients. The client
list can be IP addresses or machine names. Wild cards are allowed.
del /ddvar
Remove administrative access for users through CIFS clients. The
client list can be IP addresses or machine names. Wild cards are
allowed.
disable
Block CIFS clients from connecting to the DD200.
enable
Allow CIFS clients to connect to the DD200.
hosts add
Associate an IP address with a host name. The host name can be
a fully-qualified domain name, or an alias and a fully-qualified
domain name enclosed in double quotes. The entry is added to
the lmhosts file.
hosts del
Delete an IP address/host name entry from the lmhosts file.
hosts reset
Remove IP address/host name entries from lmhosts.
hosts show
Display IP address/host name entries from the lmhosts file.
nb-lookup
Display the IP address for a given NetBIOS name. The CIFS
feature must already be enabled.
reset clients
Set the CIFS client list to the default, which is none.
DD200 Restorer User Guide
reset nb-hostname
Set the NetBIOS hostname to the default, which is none.
reset wins-server
Set the WINS server IP address to the default, which is none.
set authentication active-directory
Set authentication to the active-directory mode. The realm must
be a fully-qualified name. Data Domain recommends not specifying
a domain controller. When not using a domain controller, first
specify a WINS server. The DD200 must meet all active-directory
requirments, such as a clock time that is no more than five minutes
different than the domain controller. The domain controllers can be a
list of email addresses that are comma-separated or space-separated
or both.
set authentication domain
Set authentication to the NT4 domain mode with a primary or
primary and backup domain controller or all.
set authentication workgroup
Set authentication to the workgroup mode.
set nb-hostname
Set a NetBIOS host name for the DD200.
set wins-server
Set the IP address for the WINS server that the DD200 uses to
resolve NetBIOS names to IP addresses.
show active
Display active CIFS clients.
show clients
Display all allowed CIFS clients.
show config
Display the CIFS configuration.
show stats
Display CIFS statistics.
status
Display whether or not CIFS is enabled.
Restore Protection Manager
17 December 2004
185
186
config
NAME
config - Manage the Restore Protection Manager (restorer) configuration
settings.
SYNOPSIS
config dump
config reset all
config reset { location | mailserver | timezone }
config set admin-email email-addr
config set admin-host host
config set location location
config set mailserver host
config set timezone zonename
config setup
config show { admin-email | admin-host | location | mailserver | timezone }
DESCRIPTION
The config command allows a user to examine and modify
configuration settings. Every config operation is available to
administrative users only.
OPERATIONS
dump Display the configuration settings.
reset all
Set the configuration to the factory defaults.
reset location
Set the location description to the default of empty.
reset mailserver
Set the mailserver to the defaults of multicast.
reset timezone
Set the timezone to the default of US/Pacific.
set admin-email
Set an email address for alerts and autosupport emails.
set admin-host
Set a system from which to administer the restorer.
DD200 Restorer User Guide
set location
Set the system location description.
set mailserver
Set the mail (SMTP) server.
set timezone
Set the system timezone. Timezone names begin with Africa,
America, Antarctica, Asia, Atlantic, Australia, Brazil, Canada, Chile,
Europe, Indian, Mexico, Mideast, Pacific, and US.
setup
Enter essential configuration parameters using an interactive script.
At any prompt, enter a question mark (?) for details about anwering
the prompt. After the first setup, or when using DHCP, each prompt
that has a current value displays the value. Press Return to accept.
Enter either host names or IP addresses where ever a prompt mentions
a host. For any prompt that accepts a list, the list can be comma- or
space-separated or both. At the end of the setup, you can save the
configuration, leave the setup and erase any values, or go back to
the beginning of the setup, in which case the values entered
previously appear as the default at each prompt.
show admin-email
Display the adminstrator email address.
show admin-host
Display the names of the host systems from which one can administer
the restorer.
show location
Display the location description.
show mailserver
Display the name of the mail (SMTP) server.
show timezone
Display the system timezone.
EXAMPLE
To save a copy of the configuration on a host machine from which you
administer a restorer, use a command similar to the following. The command
logs into restorer10, asks for a password, creates a file on your host
machine, and then logs out of the restorer.
ssh -l sysadmin restorer10 config dump > mylocalcopy
To restore the saved configuration to a restorer and have it immediately
become the current configuration, use a command similar to the
following:
187
ssh -l sysadmin restorer10 < mylocalcopy
Restore Protection Manager
13 October 2004
188 DD200 Restorer User Guide
disk
NAME
disk - Display disk status, usage, and RAID and reliability data.
SYNOPSIS
disk beacon {disk-id | all}
disk fail disk-id
disk reset performance
disk show config
disk show debug [to-file]
disk show logical-layout
disk show performance
disk show physical-layout
disk show raid-info
disk show reliability-data
disk show summary
DESCRIPTION
The disk command enables and disables disks and displays configuration
and status, physical and logical layouts, usage, and reliability
statistics.
OPERATIONS
beacon
Flash the LEDs on physical disks. Use the disk-id parameter to
identify a specific disk. The all parameter flashes the LEDs on
all the disks. Use Control c to end the command.
fail Disable the given disk. If a spare disk is available, the spare takes
the place of the failed disk and a RAID mirror reconstruction starts.
reset performance
Reset the disk performance statistics to zero.
show config
Display the disk ID, manufacturer, model, serial number, and
capacity of each restorer disk.
show debug
Display detailed information about disk operations and status. The
to-file option sends ouput to /ddvar/log/disk-show-debug.out.
189
190
show logical-layout
Display the RAID disk layout.
show performance
Displays the number of sectors read from and written to each disk,
the cumulative MegaBytes per second written to each disk, and the
average percent of time that each disk has at least one command
queued.
show physical-layout
Display where disks, by name, are located as you look at the front
of the restorer chassis.
show raid-info
Display which disks are in the RAID array, which disks have failed
from a RAID point of view, spare disks available for RAID, and
any disks that are in the RAID reconstruction process to complete
a mirror.
show reliability-data
Display the hardware state for each disk:
ATA Bus Soft Err shows the bus soft error rate.
Command Timeouts and Command Faults show problems with disk
driver commands. Command Faults columns are for reads, writes,
and other disk command failures.
Drive Soft Err shows the number of errors corrected by disk software
error correction control. Soft is the number of off track errors. Err
is the number of soft ECC errors.
Awaiting Realloc is the number of sectors on a drive that have
returned at least one error, but that are not yet confirmed as bad.
Already Realloc is the number of sectors marked as bad and
reallocated.
Temp is the current temperature in degrees centigrade. The normal
range is from 5 degrees to 55 degrees.
show summary
Displays the number of disks in use and failed, the spare disks
available, and whether a RAID mirror reconstruction is underway.
Restore Protection Manager 1.0
10 November 2003
DD200 Restorer User Guide
filesys
NAME
filesys - Display file system status and statistics and reclaim disk
space.
SYNOPSIS
filesys clean reset {amount | schedule | all}
filesys clean set amount {n hrs | n GB-free | n percent | all}
filesys clean set schedule [weekly | monthly | never]
[day1[,day2,...]] time
filesys clean set throttle percent
filesys clean show {amount| schedule | recommended}
filesys clean show throttle
filesys clean start [n hrs | n GB-free | n percent | all | nowait]
filesys clean status
filesys clean stop
filesys clean update-stats
filesys destroy [and-zero]
filesys {disable | enable}
filesys show compression [path]
filesys show space
filesys show uptime
filesys status
DESCRIPTION
The filesys command displays the status, statistics, capacity, and
utilization of the Restore Protection Manager (restorer) file system. The
clean operations clear disk space held by data that is deleted or no
longer current for any valid backup. During a clean operation, the
RPM file system is available for restore (read) and backup (write)
operations.
OPERATIONS
clean reset
Set the file system cleaning amount or schedule, or both to the
default. The amount default is 15%. The schedule default is
Monday at 1 p.m. (mon 1300). Administrative users only.
191
192
clean set amount
Set the default clean parameters to run the operation for n
number of hours, until n percent of the file system is cleaned,
to recover disk space until n number of gigabytes is available,
or to clean the entire file system. The system default is 15%.
Note that cleaning an entire full file system can take longer
than ten hours. Administrative users only.
The clean operation can run for a given number of hours (hrs),
until a given number of total gigabytes are free on the system
(GB-free), or until a percentage of current data is cleaned
(percent). You can set one, two, or all three options in one
command. Whichever limit the operation reaches first stops the
operation.
clean set schedule
Set clean to run within a specified period on a given day (one or
two numerals) or on a given day of the week (three letters) at a
specific time (0000). Administrative users only.
The never period turns off the clean operation and does not
take a day or time qualifier. The weekly period with a day
qualifier or the day qualifier without weekly both run the
command once a week.
The day qualifier is three letters (such as "mon" for Monday)
when used with the weekly period and when used alone with
the required time entry. The day qualifier is a day-of-the-
month, from 1 to 31, when used with monthly.
time is 24-hour military time. 2400 is not a valid time.
"mon 0000" is midnight between Sunday night and Monday
morning.
clean set throttle
Set clean to run using a given level of system resources when
the restorer is busy. At a percentage of 0 (zero), cleaning runs
very slowly or not at all. A percentage of 100 allows cleaning to
take as much in the way of system resources as needed. The
default is 100. When the restorer is not busy with backup or
restore operations, cleaning runs at 100%. Administrative users
only.
clean show {amount | schedule | recommended}
Display the clean schedule or amount parameters or the
estimated time needed for cleaning.
DD200 Restorer User Guide
clean show throttle
Displays time estimates for running the filesys clean
update-stats and filesys clean start all commands,
and gives recommended times for a partial cleaning and for
a full system cleaning.
clean start
Start the clean operation. With no options, the operation uses
the current parameters for the scheduled automatic cleaning.
Note that cleaning an entire full file system can take longer
than ten hours. Administrative users only.
The clean operation can run for a given number of hours (hrs),
until a given number of total gigabytes are free on the system
(GB-free), or until a percentage of current data is cleaned
(percent). You can set one, two, or all three options in one
command. Whichever limit the operation reaches first stops the
operation.
The nowait option starts a clean operation with no warning
prompts. Use the option carefully.
Note that any operation that shuts down the restorer file system,
such as the filesys disable command, or that shuts down the
restorer, such as a system poweroff or reboot, stops the clean
operation. The clean does not restart when the system and file
system restart. Either manually restart the clean or wait until the
next scheduled start.
clean status
Displays the status (active or not active) and progress of the
clean operation.
clean stop
Stop the clean operation. Administrative users only.
clean update-stats
Updates the "If 100% cleaned" numbers in the output from the
filesys show space command by running most sections
of a full clean command. The update operation can take up to
four hours. Administrative users only.
destroy
Irrevocably deletes all data from and reinitializes the file system.
Data is not recoverable after a destroy operation. The and-zero
option writes zeros to the whole disk, which can take many hours.
Administrative users only.
193
194
disable
Turn off the restorer file system operations. Administrative users
only.
enable
Turn on the restorer file system operations. Administrative users
only.
show compression
Display the space used by and compression achieved for files,
directories, and file systems. In general, the more often a backup
is done for a particular file or file system, the higher the
compression. Note that compression for a file or file system that is
just rewritten may not display for up to ten minutes. If needed, use
the command again after ten minutes to display the true compression.
Other factors may influence the display. Call Data Domain
Technical Support to analyse displays that seem incorrect.
show space
Display the space used by and available to file system components.
Values are in gigabytes to one decimal place. For example:
Resource Size GB Used GB Avail GB Use%
------------------------------------------------------
/ddvar 18 0 17 1%
/backup (compressed data collection)
Pre-compression - 944 - -
Compressed
Data 1226 7 1219 1%
If 100% cleaned* 1226 6 1220 1%
Meta Data 13 4 8 33%
Index 1 0 1 11%
Estimated compression ratio*: 94x
* Estimate based on 07/28/03 cleaning
The /ddvar line gives a rough idea of the amount of space used by
and available to the log files.
The Pre-compression line shows the amount of data (data sent to
the restorer from backup servers) stored on the restorer.
DD200 Restorer User Guide
The Compressed section, Data line shows the size of total disk
space available for data, actual physical space used, and physical
space available for data storage. Warning messages go to the system
log when the Use% figure reaches 90%, 95%, and 100%. At 100%,
the restorer accepts no more data from backup servers.
The If 100% cleaned line is an estimate of actual physical space used
and physical space available for data storage if you run the filesys
clean operation to clean 100% of the file system. The estimate is
based on the most recent clean operation.
The Meta Data line tracks space used for the internal file
descriptions that the RPM creates for all stored files. Warning
messages go to the system log when the Use% figure reaches 90%,
95%, and 100%. At 100%, the restorer accepts no more data from
backup servers.
The Index line tracks space used for internal restorer operations.
Warning messages go to the system log when the Use% figure
reaches 90%, 95%, and 100%. At 100%, the restorer accepts no
more data from backup servers.
The Estimated compression ratio line gives a rough idea of data
compression efficiency. The estimate is based on the most recent
clean operation and changes if the compressibility of data sent to
the RPM changes. Note that the compression algorithm includes
the metadata and index space as part of the total storage space.
show uptime
Display the time that has passed since the file system was last
enabled.
status
Display the status of the file system. Some of the possible status
messages are enabled and started or running, or disabled and
halting or halted, or cleaning. If the clean process is running, the
status of that process is included.
EXAMPLES
To schedule the clean process for every Tuesday at 3 p.m., use either of
the following commands:
filesys clean set schedule tue 1500
filesys clean set schedule weekly tue 1500
To schedule the clean process for 2 p.m. on the first and fifteenth of
every month:
filesys set clean schedule monthly 1,15 1400
195
To manually run the clean operation until 100 gigabytes of space are
available for data storage:
filesys clean start 100 GB-free
Restore Protection Manager
17 December 2004
196 DD200 Restorer User Guide
filesys clean
NAME
filesys clean - Manage the file system process that recovers disk space
held by expired data.
SYNOPSIS
filesys clean reset {amount | schedule | all}
filesys clean set amount {n hrs | n GB-free | n percent | all}
filesys clean set schedule [weekly | monthly | never]
[day1[,day2,...]] time
filesys clean set throttle percent
filesys clean show {amount | schedule| recommended}
filesys clean show throttle
filesys clean start [n hrs | n GB-free | n percent | all | nowait]
filesys clean status
filesys clean stop
filesys clean update-stats
DESCRIPTION
The filesys clean operations clear disk space held by data that is deleted
or no longer current for any valid backup. Use the filesys status
command to check on the progress of clean operations.
OPERATIONS
clean reset
Set the file system cleaning amount or schedule, or both to the
default. The amount default is 15%. The schedule default is
Monday at 1 p.m. (mon 1300). Administrative users only.
clean set amount
Set the default clean parameters to run the operation for n
number of hours, until n percent of the file system is cleaned,
to recover disk space until n number of gigabytes is available,
or to clean the entire file system. The system default is 15%.
Note that cleaning an entire full file system can take longer
than ten hours. Administrative users only.
The clean operation can run for a given number of hours (hrs),
until a given number of total gigabytes are free on the system
(GB-free), or until a percentage of current data is cleaned
197
198
(percent). You can set one, two, or all three options in one
command. Whichever limit the operation reaches first stops the
operation.
clean set schedule
Set clean to run within a specified period on a given day (one or
two numerals) or on a given day of the week (three letters) at a
specific time (0000). Administrative users only.
The never period turns off the clean operation and does not
take a day or time qualifier. The weekly period with a day
qualifier or the day qualifier without weekly both run the
command once a week.
The day qualifier is three letters (such as "mon" for Monday)
when used with the weekly period and when used alone with
the required time entry. The day qualifier is a day-of-the-
month, from 1 to 31, when used with monthly.
time is 24-hour military time. 2400 is not a valid time.
"mon 0000" is midnight between Sunday night and Monday
morning.
clean set throttle
Set clean to run using a given level of system resources when
the restorer is busy. At a percentage of 0 (zero), cleaning runs
very slowly or not at all. A percentage of 100 allows cleaning to
take as much in the way of system resources as needed. The
default is 100. When the restorer is not busy with backup or
restore operations, cleaning runs at 100%. Administrative users
only.
clean show {amount | schedule| recommended}
Display the clean schedule or amount parameters or the
estimated time for cleaning.
clean show throttle
Displays time estimates for running the filesys clean
update-stats and filesys clean start all commands,
and gives recommended times for a partial cleaning and for
a full system cleaning.
clean start
Start the clean operation. With no options, the operation uses
the current parameters for the scheduled automatic cleaning.
Note that cleaning an entire full file system can take longer
than ten hours. Administrative users only.
DD200 Restorer User Guide
The clean operation can run for a given number of hours (hrs),
until a given number of total gigabytes are free on the system
(GB-free), or until a percentage of current data is cleaned
(percent). You can set one, two, or all three options in one
command. Whichever limit the operation reaches first stops the
operation.
The nowait option starts a clean operation with no warning
prompts. Use the option carefully.
Note that any operation that shuts down the restorer file system,
such as the filesys disable command, or that shuts down the
restorer, such as a system poweroff or reboot, stops the clean
operation. The clean does not restart when the system and file
system restart. Either manually restart the clean or wait until the
next scheduled start.
clean status
Displays the status (active or not active) and progress of the
clean operation.
clean stop
Stop the clean operation. Administrative users only.
clean update-stats
Updates the "If 100% cleaned" numbers in the output from the
filesys show space command by running most sections
of a full clean command. The update operation can take up to
four hours. Administrative users only.
EXAMPLES
To schedule the clean process for every Tuesday at 3 p.m., use either of
the following commands:
filesys set clean schedule tue 1500
filesys set clean schedule weekly tue 1500
To schedule the clean process for 2 p.m. on the first and fifteenth of
every month:
filesys set clean schedule monthly 1,15 1400
Restore Protection Manager
17 December 2004
199
200
help
NAME
help - Display help files for Restore Protection Manager (restorer)
commands.
SYNOPSIS
help [command-name] | [keyword]
DESCRIPTION
The help command with no object displays a list of all restorer commands
by name. For details about the syntax of a command, use help with a
command name as the object. All restorer commands accept the tab key for
completion of a unique entry.
The search feature displays every one-line command option from every
command in the restorer command set that includes a match of a keyword. If
the keyword is the same as a command name, the complete help page for the
command displays.
Use the up and down arrow keys to move through a displayed command. Use
the q key to exit. Enter a slash character (/) and a pattern to search for
and highlight lines of particular interest.
EXAMPLE
To list all of the restorer commands by name:
help
To show the syntax for the command adminaccess:
help adminaccess
To find all command options that include the keyword password:
help password
ndmp add filer <filer> [ user <username> ][ password
<password> ]
Add or update auth token for <filer>
user add <user> [ password <password> ] [ priv
{admin|user} ]
Add a new user
user change password [<user>]
Change the password for a user
Restore Protection Manager
24 September 2004
DD200 Restorer User Guide
license
NAME
license - Display and manage licenses.
SYNOPSIS
license add license-key
license del license-key
license reset
license show
DESCRIPTION
The license command lists current licenses on the DD200 and adds or
deletes licenses. The licensed features are:
Full for using all disk space on a DD200.
Half for using half the disk space on a DD200.
NFS for administration and backups from UNIX-based systems.
CIFS for administration and backups from Windows systems.
REPLICATION for replicating data from one restorer to another.
A DD200 with no licensed features always automatically boots up into the
config setup command.
An add or delete of a feature takes effect immediately.
OPERATIONS
add Add a feature license.
del Delete a feature license.
reset
Reset (delete) all licenses.
show Display the current licenses and features.
EXAMPLES
To add a license:
license add XEEC-EXDB-UJFF-BADF
To display current licenses:
license show
1 XEBD-EXDB-AXEE-FFDA NFS
2 XEEC-EXDB-UJFF-BADF CAPACITY-FULLSIZE
You have 2 licenses
Restore Protection Manager
16 June 2004
201
202
log
NAME
log - Display and manage the log file.
SYNOPSIS
log list
log view [filename]
log watch
DESCRIPTION
The log command lists Restore Protection Manager (restorer) log file names
and displays log file contents. The log file directory is: /ddvar/log. The
current system log file is messages. Once a week, the RPM
automatically opens a new log file and renames the previous file with an
appended number of 1 (one) through 9, such as messages.1. Each numbered
file is rolled to the next number each week. For example, at the second
week, the file messages.1 is rolled to messages.2. If a file messages.2
already existed, it would roll to messages.3. An existing messages.9 is
deleted when messages.8 is rolled to messages.9.
OPERATIONS
list List all of the files in the log directory. The files are:
boot.log
Kernel diagnostic messages generated during the
booting up process.
ddfs.info
Debugging information created by the file system
process.
messages
The system log, which is generated by restorer actions and
from general system operations.
perf.log
Performance statistics used by Data Domain support
personnel for system tuning.
secure
Messages from successful logins, attempted logins, and
attempts to do operations for which a user does not have
permission.
space.log
Messages about disk space usage by restorer components and data
storage, and messages from the clean process. A space usage
DD200 Restorer User Guide
message is generated every hour. Each clean instance creates
about 100 messages. The messages are in comma-separated-
value format with tags that you can use to separate out the disk
space or clean messages. You can use third-party software to
analyse either set of messages. The tags are:
CLEAN for data lines from clean operations.
CLEAN_HEADER for lines that contain headers for the
clean operations data lines.
SPACE for disk space data lines.
SPACE_HEADER for lines that contain headers for the
disk space data lines.
view Display one screen of the most recent log entries. With no
filename, the command displays entries from the current messages
file. Use the up and down arrow keys to move through the log.
Use the q key to exit. Enter a slash character (/) and a pattern to
search for and highlight lines of particular interest.
watch
Display the most recent log entries and see new entries as they are
reported by the system. Use Control c to exit.
Restore Protection Manager
29 September 2003
203
204
ndmp
NAME
ndmp - Manages direct backup and restore operations between a filer and a
restorer using the Network Data Management Protocol.
SYNOPSIS
ndmp add filer filer_name user username [passwd password]
ndmp delete filer filer_name
ndmp get [incremental level_number] filer_name:src_tree dst_tree
ndmp put [partial subdir] src_file filer_name:dst_tree
ndmp reset filers
ndmp show filers
ndmp status
ndmp stop id-number
ndmp stop all
DESCRIPTION
The ndmp command allows direct backup and restore operations between
a Network Appliance filer (with the ndmpd daemon turned on) and a
restorer. NDMP software on the restorer acts to provide Data Management
Application functionality for the filer.
OPERATIONS
add filer
Make a filer available to the restorer. The username and password are
for a user that can log in to the filer.
delete filer
Remove a filer from the list available to the restorer.
get Backup data from a filer to a flat file on the restorer. The level_
number is an integer between 0 (zero) and 9. Using the command
with no level is the same as level 0, which produces a full backup.
Using any level greater than 0 backs up only changes since the
latest backup of the same src_tree with a lower numbered level. The
dst_tree argument must always begin with /backup.
put Restore data from within a flat backup file on a restorer to a filer.
The partial option restores a particular directory or file. The
src_file argument must always begin with /backup. For partial
restores on some filers, dst_tree must end with subdir. For example:
ndmp put partial myfile /backup/lv10 filer1:
/vol/0/rest/myfile.
DD200 Restorer User Guide
Some filers require that subdir be relative to the path used during
the ndmp get that created the backup. The filer may report a
successful restore even when one or more files failed restoration.
For details, always review the LOG messages sent by the filer.
reset filers
Remove all filer passwords stored on the restorer and write zeroes to
the memory that held the passwords.
show filers
Display all filers available to the restorer.
status
Display the status of current NDMP proccesses on the restorer. The
operation labels each process with an identification number.
stop Stop an NDMP process on the restorer. The id-number is the number
shown for the process in the status display. A stopped process is
cancelled. To restart, begin the process again with the get or put
operations.
stop all
Stop all NDMP processes on a restorer.
EXAMPLES
The following command goes to a filer named toaster5 and returns all data
under the directory /vol/vol0. The data goes to a file located at
/backup/toaster5/week0 on the restorer.
ndmp get toaster5:/vol/vol0 /backup/toaster5/week0
The following incremental backup backs up changes since the last full
backup:
ndmp get incremental 1 toaster5:/vol/vol0 \
/backup/toaster5/week0.day1
Restore Protection Manager
28 June 2004
205
206
net
NAME
net - Set up and display network parameters and display network status.
SYNOPSIS
net config ifname [ipaddr][netmask mask][up | down]
[dhcp {yes | no}][mtu {size | default}][autoneg][duplex {full | half}]
[speed {10 | 100 | 1000}]
net disable ifname
net enable ifname
net hosts add ipaddr {host | "alias host"}
net hosts del ipaddr
net hosts reset
net hosts show
net ping host
net reset {[dns][domainname][hostname]}
net set dns ipaddr1[, ipaddr2[, ipaddr3]]
net set domainname name
net set hostname host
net show config [ifname]
net show {domainname | hostname | dns | all}
net show hardware
net show settings [ifname]
net show stats [all | interfaces | listening | route | statistics]
DESCRIPTION
The net command sets up network parameters and Ethernet interface
addresses and displays network information. The Ethernet interfaces on a
restorer are: eth0 and eth1 with data transmission speeds of 10/100
Base-T, and eth2 and eth3 with a data transmission speed of 1000 Base-T
(Gigabit).
OPERATIONS
config
Set network parameters for the Ethernet interface given as ifname.
Administrative users only.
DD200 Restorer User Guide
ipaddr
Set the IP address for the interface. If the interface already
uses DHCP, the IP address for the interface changes, but all
other parameters received through DHCP remain the same.
netmask
Set the netmask for the interface. Use the standard form of IP
address.
up Enable the interface.
down Disable the interface.
mtu Set the maximum transfer unit size. Supported values are from
256 to 9180. The standard size for 10 Base-T and 100 Base-T
networks is 1500. The standard size for gigabit networks is
9180. The default is 1500.
dhcp yes
Enable the use of a DHCP server for the interface. Enabling DHCP
for an interface momentarily brings down the interface while
DHCP allocates a dynamic IP address. DHCP-supplied parameters
for an interface are: IP address, netmask, DNS server list,
gateway, domainname, and host name (if the interface does not
already have a hostname).
dhcp no
Disable the use of a DHCP server for the interface.
autoneg
Let the network interface card autonegotiate line speed and
duplex setting.
duplex
Set the line use to either full or half duplex.
speed
Set the line speed to 10 Base-T, 100 Base-T, or 1000 Base-T
(Gigabit).
disable
Disable an Ethernet interface. Administrative users only.
enable
Enable an Ethernet interface. Administrative users only.
hosts add
Associate an IP address with a host name. The host name can be
a fully-qualified domain name, or an alias and a fully-qualified
domain name enclosed in double quotes. The entry is added to
the /etc/hosts file. Administrative users only.
207
208
hosts del
Delete an IP address/host name entry from the /etc/hosts file.
Administrative users only.
hosts reset
Remove IP address/host name entries from /etc/hosts.
Administrative users only.
hosts show
Display IP address/host name entries from the /etc/hosts file.
ping Confirm a connection between the restorer and a host.
reset
Reset network parameters to the default of empty entries.
Administrative users only.
set dns
Set IP addresses for up to three DNS servers for use by the
restorer. Administrative users only.
set domainname
Set a domain name for the restorer to use for the DNS, NTP, and mail
servers. Administrative users only.
set hostname
Set the name used for the restorer. Administrative users only.
show all
Display the hostname, domain name, and DNS servers.
show config
Display the configuration for the Ethernet interface (ifname),
which includes all status and configuration from the driver level.
When ifname is omitted, the configuration for all interfaces is
displayed.
show dns
Display the DNS servers used by the restorer.
show domainname
Display the domain name used for email from the restorer.
show hardware
Display Ethernet port information.
show hostname
Display the restorer machine name.
show settings
Display the settings for the Ethernet interface (ifname). When
ifname is omitted, the settings for all interfaces are displayed.
DD200 Restorer User Guide
show stats
Display the following network statistics:
all Display active domain sockets and statistics of active Internet
connections from servers.
interfaces
Show the kernel interface table of transmission and error
statistics for Ethernet interfaces.
listening
Display statistics of active Internet connections from servers.
route
Display the IP routing table.
statistics
Display counters from layers of the network stack.
EXAMPLES
To enable the use of a DHCP server for Ethernet interface eth0:
net config dhcp eth0 true
To set an IP address of 192.168.2.2 for the Ethernet interface eth1:
net config ipaddr eth1 192.168.2.2
To associate a host name of bkup20.yourcompany.com and an alias of
bkup20 with an IP address of 192.168.3.3:
net hosts add 192.168.3.3 "bkup20 \
backup20.yourcompany.com"
Restore Protection Manager 1.0
5 November 2003
209
210
net config
NAME
net config - Configure network parameters.
SYNOPSIS
net config ifname [ipaddr][netmask mask][up | down]
[dhcp {yes | no}][mtu size][autoneg][duplex {full | half}]
[speed {10 | 100 | 1000}]
DESCRIPTION
The net config operation sets up network parameters and Ethernet
interface addresses. The Ethernet interfaces on a restorer are: eth0 with
a data transmission speed of 10/100 Base-T, and eth1, eth2, and eth3
with a data transmission speed of 1000 Base-T (Gigabit).
OPERATIONS
ifname
Identifies the target interface: eth0, eth1, eth2, or eth3.
ipaddr
Set the IP address for the interface. If the interface already uses
DHCP, the IP address for the interface changes, but all other
parameters received through DHCP remain the same.
netmask
Set the netmask for the interface. Use the standard form of IP
address.
up Enable the interface.
down Disable the interface.
dhcp Enable or disable DHCP for an interface. Enabling DHCP for an active
interface momentarily brings down the interface while DHCP allocates
a dynamic IP address. DHCP-supplied parameters for an interface are:
IP address, netmask, DNS server list, gateway, domainname, and host
name (if the interface does not already have a hostname).
mtu Set the maximum transfer unit size. Supported values are from 256 to
9180. The standard size for 10 Base-T and 100 Base-T networks is
1500. The standard size for gigabit networks is 9180.
autoneg
Let the network interface card autonegotiate line speed and duplex
settings.
duplex
Set the line use to either full or half duplex.
speed
Set the line speed to 10 Base-T, 100 Base-T, or 1000 Base-T
DD200 Restorer User Guide
(Gigabit).
EXAMPLES
To enable the use of a DHCP server for Ethernet interface eth0:
net config dhcp eth0 true
To set an IP address of 192.168.1.1 for the Ethernet interface eth1:
net config ipaddr eth1 192.168.1.1
Restore Protection Manager
5 November 2003
211
212
net set
NAME
net set - Set Remote Protection Manager (restorer) DNS servers, domain
name, and host name.
SYNOPSIS
net set dns ipaddr1[,ipaddr2[,ipaddr3]]
net set domainname name
net set hostname host
DESCRIPTION
The net set operation sets DNS servers, domain name, and host name
for use by a restorer.
OPERATIONS
dns Set IP addresses for up to three DNS servers used by a restorer.
The addresses can be separated by commas, spaces, or both.
domainname
Set a domain name for the restorer to use for the DNS, NTP,
and mail servers.
hostname
Set the name used for the restorer.
EXAMPLES
To give a restorer the domain name for the domain yourcompany.com:
net set domainname yourcompany.com
To set IP addresses of 192.168.1.1 and 192.168.1.1 for DNS servers:
net set dns 192.168.1.1, 192.168.1.1
Restore Protection Manager 1.0
5 November 2003
DD200 Restorer User Guide
net show
NAME
net show - Display network parameters and status.
SYNOPSIS
net show config [ifname]
net show {domainname | hostname | dns | all}
net show hardware
net show settings [ifname]
net show stats [all | interfaces | listening | route | statistics]
DESCRIPTION
The net show operation displays network information.
OPERATIONS
all Display the Restore Protection Manager (restorer) DNS server, domain
name for email, and machine name.
config
Display the configuration for the Ethernet interface (ifname),
which includes all status and settings from the driver level. When
ifname is omitted, the configuration for all Ethernet interfaces is
displayed.
dns Display the DNS servers used by a restorer.
domainname
Display the domain name used for email from a restorer.
hardware
Display Ethernet port information.
hostname
Display the restorer machine name.
settings
Display the settings for the Ethernet interface (ifname). When
ifname is omitted, the settings for all Ethernet interfaces are
displayed.
stats
Display the following network statistics:
all Display active domain sockets and statistics of active
Internet connections from servers.
213
interfaces
Show the kernel interface table of transmission and error
statistics for Ethernet interfaces.
listening
Display statistics of active Internet connections from
servers
route
Display the IP routing table.
statistics
Display counters from layers of the network stack.
Restore Protection Manager 1.0
5 November 2003
214 DD200 Restorer User Guide
nfs
NAME
nfs - Set up NFS parameters and show status and statistics.
SYNOPSIS
nfs add {/ddvar | /backup} client-list [(nfs-options)]
nfs del {/ddvar | /backup} client-list
nfs disable
nfs enable
nfs reset clients
nfs reset stats
nfs show active
nfs show clients
nfs show detailed-stats
nfs show histogram
nfs show stats
nfs status
DESCRIPTION
The nfs command sets NFS parameters for exported file systems and
displays status and information. The /ddvar directory holds log and
core files. The /backup directory holds data from backup servers. Add
administrative clients to /ddvar and backup clients to /backup.
OPERATIONS
add Add NFS clients that can access the restorer. Use a comma- or
space-separated (or both) list for multiple clients. A client can be
a fully-ualified domain hostname, an IP address, an IP address
subnet specification, or an wildcard hostname, such as
*.yourcompany.com,or just an asterisk (*) meaning no restrictions.
A subnet specification is a subnet IP address, an IP address and
netmask separated by a slash (/), or an IP address and number of
bits separated by a slash (/). The number of bits is an integer
between 8 and 30. An example of each specification is:
192.168.1.0/255.255.255.0
192.168.1.0/24
215
216
The nfs-options are a comma-separated or space-separated (or
both) list bounded by parentheses. With no options specified,
the default options are rw, root_squash, no_all_squash, and
secure. The following options are allowed:
ro Read only permission.
rw Read and write permissions.
root_squash
Map requests from uid/gid 0 to the anonymous
uid/gid.
no_root_squash
Turn off root squashing.
all_squash
Map all user requests to the anonymous uid/gid.
no_all_squash
Turn off the mapping of all user requests to
the anonymous uid/gid.
secure
Require that all requests originate on an Internet port
that is less than IPPORT_RESERVED (1024).
insecure
Turns off the secure option.
anonuid=id
Set an explicit uid for the anonymous account. The id is
an integer bounded from -65635 to 65635.
anongid=id
Set an explicit gid for the anonymous account. The id is
an integer bounded from -65635 to 65635.
del Remove client access to the /ddvar or /backup file system.
disable
Do not allow NFS clients to connect.
enable
Allow NFS clients to connect.
reset clients
Set the client list to the default. Available to administrative users
only.
reset stats
Clear the NFS statistics.
DD200 Restorer User Guide
show active
Display active NFS clients.
show clients
Display all allowed NFS clients.
show detailed-stats
Display NFS cache entries and status for troubleshooting.
show histogram
Display NFS operations in a histogram.
show stats
Display NFS stats.
status
Display whether or not NFS is enabled.
EXAMPLES
To add any host on the local network 192.168.1.0 with read/write
access to /ddvar and the secure option:
nfs add /ddvar 192.168.1.0/24 (rw,secure)
To add all hosts to /backup with the default options of rw,
no_root_squash, no_all_squash, and secure:
nfs add /backup *
Restore Protection Manager
5 October 2004
217
218
nfs show
NAME
nfs show - Show NFS status and statistics.
SYNOPSIS
nfs show active
nfs show clients
nfs show detailed-stats
nfs show histogram
nfs show stats
DESCRIPTION
The nfs show operation displays detailed NFS information.
OPERATIONS
active
Display active NFS clients.
clients
Display all allowed NFS clients.
detailed-stats
Display NFS cache entries and status for troubleshooting.
histogram
Display NFS operations in a histogram.
stats
Display NFS stats.
Restore Protection Manager
18 May 2004
DD200 Restorer User Guide
ntp
NAME
ntp - Allows synchronizing a restorer with NTP time servers and
managing the NTP service.
SYNOPSIS
ntp add timeserver server_name
ntp del timeserver server_name
ntp disable
ntp enable
ntp reset
ntp reset timeservers
ntp show config
ntp status
DESCRIPTION
The ntp command allows giving a restorer access to one or more time
servers. The default system settings are that the NTP service on a
restorer is enabled in multicast mode.
OPERATIONS
add timeserver
Add a remote time server to the NTP list.
delete timeserver
Remove a time server from the NTP list.
disable
Stop the NTP service on the restorer.
enable
Start the NTP service on the restorer.
reset
Reset the local NTP service to the defaults of mulitcast and enbled.
reset timeserver
Reset the time server list to the default of multicast mode.
show config
Display the NTP enabled/disabled setting and the time server list.
status
Display the NTP service status, time, and last synchronization time.
219
EXAMPLE
The following command gives the time server srvr26.company.com as a
time server for the restorer to use for synchronization.
ntp add timeserver srvr26.company.com
Restore Protection Manager
24 August 2004
220 DD200 Restorer User Guide
replication
NAME
replication - Manage replication of data from one restorer to another.
SYNOPSIS
replication break
replication disable
replication enable
replication initialize
replication reauth
replication recover
replication set destination replica-hostname
replication set source orig-hostname
replication set source orig-hostname destination replica-hostname
replication show config
replication show stats
replication status
replication throttle add sched-spec rate
replication throttle del sched-spec
replication throttle reset {current | override | schedule | all}
replication throttle set current rate
replication throttle set override rate
replication throttle show [kb]
DESCRIPTION
The replication command manages the replication of data between two
restorers, an originator restorer that receives data from backup servers
and a replica restorer that receives data only from the originator. A
restorer can be either an originator or a replica, not both. A replica
that is removed (with the "break" option on either the originator or
replica) from the replication pair cannot be brought back into the pair
or used as a replica for another originator unless the filesystem on the
replica is emptied with the filesys destroy command. Replication
is a licensed feature. If basic options do not work, check licensing.
221
222
Before running any set or break operation on a restorer with an active
file system, first run the filesys disable command. After the set or break
operation, run the filesys enable command to restart the file system.
OPERATIONS
break
Removes either the originator or replica restorer from the
replication pair. All replication information is removed. If the
restorer is the replica, it becomes a stand-alone restorer with a
standard read/write file system and can then be set up as an
originator. The replica with its current data can be used again as a
replica only when the originator has no data in its file system or is
replaced with a new system that has no data in its file system.
Otherwise, you must run the filesys destroy command on the
replica to remove all data in the file system before again using the
restorer as a replica.
disable
On the originator, suspends the sending of data to the replica.
On the replica, stops the replica from serving the active connection
from the originator. If the filesystem is disabled on either restorer
when replication is disabled, replication remains disabled even
after the file system is restarted.
enable
On the originator, resumes the sending of data to the replica.
On the replica, resumes serving the active connection from the
originator.If the filesystem is disabled on either restorer when
replication is enabled, replication is enabled when the file system
is restarted.
initialize
Use only on the originator to first start replication. (See the
Examples section below.) The command checks that configuration
and connections are correct and sends error messages if any
problems appear. Replication is set as enabled, so after correcting
any reported problems, you do not need to run this command again.
Initialization can take many hours with a full system.
reauth
Resets authorization keys between the restorers. Messages similar
to "Authorization keys out of sync," or "Key out of sync" signal the
need for a reauthorization. Run this command on the originator and
the replica.
DD200 Restorer User Guide
recover
Run only on a new originator that replaces a previous originator.
(See the EXAMPLES section below.) Causes the originator to
retrieve all data from the replica and begin standard replication
processes. The file system on the new originator must be empty.
set destination replica-name
If the replica is moved (after seeding, for instance), use this
command on the originator to give the new hostname or IP address
for the replica. A hostname must be a name that can be translated
into an IP address.
set source orig-name
If the originator gets a new hostname, (after seeding, for
instance), use this command on the replica to give the new
hostname. The hostname must be exactly as displayed by the
hostname command on the originator.
set source orig-name destination replica-name
To configure a replication pair, run the command on both the
originator and the replica.
The orig-name must be exactly the same as the name
returned by the hostname command on the originator.
On the originator, the destination replica-name must be a
name that can be translated to an IP address or be an IP
address.
On the replica, the destination replica-name must be
exactly the same as the name returned by the hostname
command on the replica.
A replica is a read-only machine for any connection other
than the originator in the replication pair.
show config
Displays whether replication is enabled or disabled, whether the
restorer is an originator or replica, and the hostname for this
restorer.
show stats
Displays replication statistics.
Bytes sent
The total number of bytes sent by this side to the other side of the
replication pair. For the originator, the value includes backup data,
replication overhead, and network overhead. For the replica, the
223
224
value includes replication overhead and network overhead. Use the
value (and the next value) to estimate network traffic generated by
replication.
Bytes received
The total number of bytes received by this side from the other side
of the replication pair. For the replica, the value includes backup
data, replication overhead, and network overhead. For the
originator, the value includes replication overhead and network
overhead. Use the value (and the previous value) to estimate
network traffic generated by replication.
Virtual bytes replicated
The total number of bytes of backup data (before compression)
replicated since the last time the restorer file system was enabled.
Replica received stamp
The date and time when the most recent records were received.
Replica processed stamp
The date and time when the most recent records were processed.
Replica records remaining
The number of file records received by the replica and not yet
processed.
Originator records remaining
The number of file records created by the originator and not yet sent
to the replica.
Compressed data remaining
New data on the originator that is not yet processed into file
records for sending to the replica.
status
Displays replication configuration information and the status of
replication operations.
Mode
The role of the restorer in the replication pair: originator or
replica.
Partner
The hostname of the other restorer in the replication pair.
Enabled
The enabled/disabled state of replication on this restorer.
Connection
The most recent connection (or disconnect) date and time for the
replication pair.
DD200 Restorer User Guide
State
Whether or not replication was started afer the initial configuration
or the percentage completed by the initialization process if that
process is still in progress.
Replica lag
Time that the replica needs to become synchronized with the
originator in hours and minutes. A generic message of "Less
than 5 minutes" appears if the replica is either nearly caught up
with data from the originator or if the replica is caught up and
synchronized and the originator is not sending new data.
throttle add sched-spec rate
Add a scheduled time to change the rate of network bandwidth used
by replication. The sched-spec must include one or more three-
letter days of the week (such as mon, tue, or wed) or the word
daily to set the schedule every day of the week, and a time of day
in 24 hour military time. The rate must include a number or the
word unlimited. As an option, the number can include a tag for
bits or bytes per second. With no bits or bytes specified, the default
rate is bits per second. In the rate variable:
bps or b equals raw bits per second
Kbps, Kb, or K equals 1024 bits per second
Bps or B equals bytes per second
KBps or KB equals 1024 bytes per second
For example, the following command limits replication to 20
kilobytes per second starting on Mondays and Thursdays at 6:00 a.m.
replication throttle add mon thu 0600 20KB
Replication runs at the given rate until another scheduled change
or until other replication throttle commands force a change. The
default rate with no scheduled changes is unlimited.
The add command may change the current rate. For example, assume
that on Monday at Noon, the current rate is 20 KB, and the schedule
that set the current rate started on mon 0600. If you now add a
scheduled change for Monday at 100 at a rate of 30 KB (mon 1100
30KB), the change takes place immediately.
throttle del sched-spec
Remove one or more throttle schedule entries. The sched-spec must
include one or more three-letter days of the week (such as mon, tue,
or wed) or the word daily to delete all entries for the given time,
and a time of day in 24 hour military time.
225
226
The del command may change the current rate. For example, assume
that on Monday at Noon, the current rate is 30 KB, and the schedule
that set the current rate started on mon 1100. If you now delete the
scheduled change for Monday at 1100 (mon 1100), the replication
rate immediately changes to the next previous scheduled change,
such as mon 0600 20KB.
throttle reset {current | override | schedule | all}
The reset of current removes the rate set by the replication
throttle set current command. The reset of override removes
the rate set by the replication throttle set override
command. The reset of schedule removes all scheduled change
entries. The reset of all removes any current or override settings
and removes all scheduled change entries, returning the system to
the default.
throttle set current rate
Sets the throttle rate until the next scheduled change or until a
system reboot. See the rate explanation for the replication throttle
add command above. Current cannot be set if the replication
throttle set override command is in effect.
throttle set override rate
Sets the throttle rate until the system is rebooted or until
another override command. See the rate explanation for the
replication throttle add command above. Override cannot
be set if the replication throttle set current command
is in effect.
throttle show [kb]
Display all scheduled throttle entries and rates. The kb option
displays the rate in kilobytes per second. Without the option, the
rate is displayed in bits per second.
EXAMPLES
To set up and start replication between two restorers:
Run the following command on the originator and on the replica
restorers:
filesys disable
Run the following command on both the originator and replica
restorers:
replication set source orig-name destination
replica-name
DD200 Restorer User Guide
Run the following command on the originator and on the
replica:
filesys enable
Run the following command on the originator:
replication initialize
To integrate a new originator that replaces a previous originator.
If the new originator has any data in its file system, run the
following command to clear all data from the file system:
filesys destroy
Run the following command on the new originator and on the
replica:
filesys disable
Run the following command on the replica.
replication reauth
Run the following command on the new originator and on the
replica:
replication set source orig-name destination
replica-name
Run the following command on the new originator and on the
replica:
filesys enable
Run the following command on the new originator to seed the
new originator with data from the replica. After the command
finishes, the originator is ready to receive new data and the
replication is enabled. You do not need to do anything else to
start replication:
replication recover
To integrate a new replica restorer that replaces a previous replica:
If the new replica has any data in its file system, run the following
command to clear all data from the file system:
filesys destroy
Run the following command on the originator and on the new
replica:
filesys disable
Run the following command on the originator to remove all
configuration information about the previous replica:
replication reauth
227
Run the following command on the originator and on the
new replica to configure replication:
replication set source orig-name destination
replica-name
Run the following command on the originator and on the new
replica:
filesys enable
Run the following command on the orginator to seed the
new replica with data:
replication initialize
14 January 2005
228 DD200 Restorer User Guide
route
NAME
route - Manage restorer network routing, routing displays, and
the routing gateway.
SYNOPSIS
route add -host host-name gw gw-addr
route add -net ip-addr netmask mask gw gw-addr
route del -host host-name
route del -net ipaddr netmask mask
route reset gateway
route set gateway ip-addr
route show config
route show gateway
route show table
route trace host
DESCRIPTION
The route command adds and deletes routing rules, shows routing tables,
and traces the route to a host. An added routing rule appears in the
Kernel IP routing table and in the DD200 Route Config list, a list of
static routes that are re-applied at each system boot. Use the route show
config command to display the Route Config list. Use the route show
table command to display the Kernel IP routing table.
OPERATIONS
add Add a routing rule. If the target being added is a network, use the
-net option. If the target is a host, use the -host option. The
gateway can be either an IP address or a hostname. Administrative
users only.
del Remove a routing rule. Use the same form (-host or -net) to delete
an entry as was used to create the entry. The route show config
command shows whether the entry is a host name or a net address.
If neither -host or -net is used, any matching lines in the Route
Config list are deleted. Administrative users only.
reset gateway
Reset the default routing gateway to an empty entry. Administrative
users only.
229
230
set gateway
Set a default gateway. Administrative users only.
show config
Display the Route Config list of configured static routes.
Administrative users only.
show gateway
Display the default routing gateway.
show table
Display the Kernel IP routing table. Administrative users only.
trace
Display a traceroute to the named host.
EXAMPLES
To add a route with a route specification of 192.168.1.x, a netmask, and
a gateway of srvr12:
route add -net 192.168.1.0 netmask 255.255.255.0
gw srvr12
To delete a route with a route specification of 192.168.1.x and a netmask
of 255.255.255.0:
route del -net 192.168.1.0 netmask 255.255.255.0
To add a route for host user24 with a gateway of srvr12:
route add -host user24 gw srvr12
To give a default gateway when no other route matches:
route set gateway 192.168.10.1
Restore Protection Manager 1.0
12 November 2003
DD200 Restorer User Guide
system
NAME
system - Displays Restore Protection Manager (restorer) status, faults,
and statistics, stops and reboots the restorer.
SYNOPSIS
system poweroff
system reboot
system reset {[location][mailserver][timezone]}
system set admin-email email-addr
system set admin-host host-name
system set {date MMDDhhmm[[CC]YY] | timezone zone-name}
system set location "location"
system set mailserver host
system show {admin-email | admin-host | mailserver | location}
system show config
system show {date | timezone}
system show detailed-stats [start | stop | ([interval nsecs] [count
count] )]
system show {detailed-version | fans | faults | meminfo | serialno
| settings | uptime | version}
system show performance [raw] [duration {hr | min | sec} [interval {hr |
min | sec}]]
system show stats [start | stop | ([interval nsecs][count count] )]
system status
system upgrade filename
DESCRIPTION
The system command is the administrative tool for the restorer hardware.
OPERATIONS
poweroff
Shut down the restorer and turn off the power. The operation
automatically does an orderly shutdown of the file system process.
Administrative users only.
reboot
Restart the restorer. Administrative users only.
231
232
reset
Set the system location, mailserver, or timezone to the
default value. The default is a null entry for each parameter
except for timezone, which defaults to Universal (GMT).
Administrative users only.
set admin-email
Set an address for email messages from the alerts and autosupport
utilities. The system needs one and only one admin-email address.
Use the autosupport and alerts commands to add other email
addresses.
set admin-host
Set the machine from which you can log into the DD200 to see
system logs and use system commands. The host name can be a
simple host name, a fully-qualified host name, or an IP address.
set date
Set the system clock and date. Administrative users only. The entry
components are two places for month (MM of 01 through 12), two
places for day of the month (DD 01 through 31), two places for
hours (hh or 00 through 23), two places for minutes (mm of 00
through 59), and optionally, two places for century (CC) and two
places for year (YY). Time is 24-hour military time. 2400 is not a
valid time. A time of "0000" is midnight as the beginning of a day.
set location
Give a description of the restorer's physical location. Encase the
description in double quotes. The location appears in autosupport
and alerts emails to help identify the machine. Administrative users
only.
set mailserver
Set the mail server that a restorer uses when sending email. A host
is a fully qualified hostname (such as smtpsrvr.yourcompany.com)
or an IP address. Administrative users only.
set timezone
Set the time zone for the system clock. See the "Time Zones"
appendix of the "Data Domain Restore Protection Manager 1.0
User Guide" for a complete list of time zones. Enter a category to
display the list of specific zones in the category. The categories
are:
Africa, America, Asia, Atlantic, Australia, Brazil, Canada,
Chile, Europe, Indian, Mexico, Mideast, Pacific, US
Enter a partial or ambiguous zone name to list all matches. See the
EXAMPLES section of this help page.
DD200 Restorer User Guide
For the change to take effect with all currently running processes,
you must reboot the machine. Administrative users only.
show admin-email
Display the administrative address used for emails from the
autosupport and alerts utilities.
show admin-host
Display the administrative host from which you can log into the
DD200 to see system logs and use system commands.
show config
Display the system configuration.
show date
Display the system date and time.
show detailed-stats
Displays detailed statistics by individual CPU and Ethernet port.
The time period covered is from the last reboot, except when
using interval and count.
An interval, in seconds, runs the command every given number
of seconds for the number of times in count. The first report
covers the time period since the last reboot. Each subsequent
report is for activity in the last interval. The default interval is
two seconds.
The start and stop options return averages per second of statistics
over the time between the commands.
The columns in the display are:
CPUx busy
The percentage of time that each CPU is busy. One column
for each CPU.
State 'CDVMS'
A single character shows if an event is occuring. Each event
can affect performance.
C cleaning
D disk reconstruction (repair of a failed disk)
V verify data (a background process that checks for
data consistency)
M merging of the internal fingerprint index
S summary vector internal checkpoint process
NFS ops/s
The number of NFS operations per second.
233
234
NFS proc
The proportion of NFS-busy time spent in doing work on the
data.
NFS rcv
The proportion of NFS-busy time spent waiting for data on the
NFS socket.
NFS snd
The proportion of NFS-busy time spent sending data out on the
socket.
NFS idle
The proportion of NFS time spent idle.
CIFS ops/s
The number of CIFS (Common Internet File System) operations
per second.
ethx kB/s
The amount of data in kilobytes per second passing through each
Ethernet connection. One column for each Ethernet connection.
Disk kB/s
The amount of data in kilobytes per second going to and from all
disks in the DD200.
Disk busy
The percentage of time that all disks in the DD200 are busy.
NVRAM kB/s
The amount of data in kilobytes per second going through non-
volatile random-access memory from reads and writes.
show detailed-version
Display versions of restorer components and the operating system.
show fans
Display the speed and status of all nine system fans. The AvgRPM
column shows the normal operating speed for each type of fan. If
the value in the CurRPM column goes below 60% of the normal
operating speed, replace the fan.
show faults
Display known hardware problems, such as a bad fan.
DD200 Restorer User Guide
show location
Display the location description.
show mailserver
Display the mail server used by a restorer.
show meminfo
Display memory usage.
show performance
Display system performance figures for data transfer for the
last X amount of time. Duration is the hours, minutes, or
seconds for the display to go back in time. Interval is the time
between each line in the display. The default is to show
performance over the last 24 hours in 10 minute intervals. You
can set duration only, but not interval only. The raw display gives
unformatted statistics.
The columns in the display are:
Date
The date of the data transfer.
Time
The time of the data transfer.
Read
The amount of data read from the restorer.
Write
The amount of data written to the restorer.
Replicate
The amount of data sent to a replica restorer.
proc
The proportion of NFS-busy time spent in doing work on the
data.
recv
The proportion of NFS-busy time spent waiting for data on the
NFS socket.
send
The proportion of NFS-busy time spent sending data out on the
socket.
235
236
idle
The proportion of NFS time spent idle.
show serialno
Display the system serial number.
show settings
Display the system date and time, time server, time zone, system
location, and mail server.
show stats
Display system statistics for the use of CPUs, disks, Ethernet
ports, and by NFS operations. The time period covered is from
the last reboot, except when using interval and count.
An interval, in seconds, runs the command every given number
of seconds for the number of times in count. The first report
covers the time period since the last reboot. Each subsequent
report is for activity in the last interval. The default interval is
two seconds.
The start and stop options return averages per second of statistics
over the time between the commands.
show timezone
Display the time zone set on the restorer.
show uptime
Display the amount of time that has passed since the last reboot.
show version
Display the version of restorer system software.
status
Display hardware status, such as processor vital signs, internal
temperatures, and power supply output.
upgrade
Upgrade restorer software from the Data Domain web site or a CD. Note
that the upgrade operation shuts down the restorer file system and
reboots the machine. Administrative users only.
To upgrade from the Data Domain web site:
Log in to a restorer administrative host that mounts
/ddvar from the restorer.
Open a browser and go to the Data Domain Support web
site.
DD200 Restorer User Guide
Download the new release file to the directory
/ddvar/releases.
To start the upgrade, log in to a restorer as sysadmin and enter
the following command:
system upgrade ddr_1.0_rpm
To upgrade from a CD:
Log in to a restorer as sysadmin.
Insert the CD into the restorer CD drive.
Enter a command similar to the following using the file name
from the CD:
system upgrade ddr_1.0_rpm
EXAMPLES
To display I/O statistics every 30 seconds for 10 iterations, use the
following command:
system show stats 30 10
To set the date and time to October 26 at 3:24 p.m. in the year 2003, use
either of the following commands:
system set date 1026152403
system set date 102615242003
To set the time zone for the Pacific coast of the U.S.A.:
system set timezone Los_Angeles
To find all time zones that include a match for "new":
system set timezone new
Ambiguous timezone name, matching ...
America/New_York Canada/Newfoundland
Restore Protection Manager
1 November 2004
237
238
system set
NAME
system set - Sets the date, time, and mail parameters for Restore
Protection Manager (restorer).
SYNOPSIS
system set admin-email email-addr
system set admin-host host-name
system set {date MMDDhhmm[[CC]YY] | timezone zone-name}
system set location location
system set mailserver host
DESCRIPTION
The system set command sets the system date and time, time zone, NDS
server from which to synchronize the system clock, and the server through
which the restorer should send email.
OPERATIONS
set admin-email
Set an address for email messages from the alerts and autosupport
utilities. The system needs one and only one admin-email address.
Use the autosupport and alerts commands to add other email
addresses.
set admin-host
Set the machine from which you can log into the DD200 to see
system logs and use system commands. The host name can be a
simple host name, a fully-qualified host name, or an IP address.
set date
Set the system clock and date. Administrative users only. The entry
components are two places for month (MM of 01 through 12), two
places for day of the month (DD 01 through 31), two places for
hours (hh or 00 through 23), two places for minutes (mm of 00
through 59), and optionally, two places for century (CC) and two
places for year (YY). Time is 24-hour military time. 2400 is not a
valid time. A time of "0000" is midnight as the beginning of a day.
set location
Give a description of the physical location of the restorer. The
location appears in autosupport and alerts emails to help identify
the machine.
DD200 Restorer User Guide
set mailserver
Set the mail server that a restorer uses when sending email. A host
is a fully qualified hostname (such as smtpsrvr.yourcompany.com)
or an IP address. Administrative users only.
set timezone
Set the time zone for the system clock. See the "Time Zones"
appendix of the "Data Domain Restore Protection Manager 1.0
User Guide" for a complete list of time zones. Enter a category to
display the list of specific zones in the category. The categories
are:
Africa, America, Asia, Atlantic, Australia, Brazil, Canada,
Chile, Europe, Indian, Mexico, Mideast, Pacific, US
Enter a partial or ambiguous zone name to list all matches. See the
example below.
For the change to take effect with all currently running processes,
you must reboot the machine. Administrative users only.
EXAMPLES
To set the date and time to October 26 at 3:24 p.m. in the year 2003, use
either of the following commands:
system set date 1026152403
system set date 102615242003
To set the time zone for the Pacific coast of the U.S.A.:
system set timezone Los_Angeles
To find all time zones that include a match for "new":
system set timezone new
Ambiguous timezone name, matching ...
America/New_York Canada/Newfoundland
Restore Protection Manager
14 October 2004
239
240
system show
NAME
system show- Displays Restore Protection Manager (restorer) status,
faults, and statistics.
SYNOPSIS
system show {admin-email | admin-host | mailserver | location}
system show config
system show {date | timezone}
system show detailed-stats [start | stop | ([interval nsecs] [count
count] )]
system show {detailed-version | fans | faults | meminfo | serialno
| settings | uptime | version}
system show performance [raw] [duration {hr | min | sec} [interval {hr |
min | sec}]]
system show stats [start | stop | ([interval nsecs][count count] )]
DESCRIPTION
The system show command displays detailed information about the
restorer.
OPERATIONS
show admin-email
Display the administrative address used for emails from the
autosupport and alerts utilities.
show admin-host
Display the administrative host from which you can log into the
DD200 to see system logs and use system commands.
show config
Display the system configuration.
show date
Display the system date and time.
show detailed-stats
Displays detailed statistics by individual CPU and Ethernet port.
The time period covered is from the last reboot, except when
using interval and count.
DD200 Restorer User Guide
An interval, in seconds, runs the command every given number
of seconds for the number of times in count. The first report
covers the time period since the last reboot. Each subsequent
report is for activity in the last interval. The default interval is
two seconds.
The start and stop options return averages per second of statistics
over the time between the commands.
The columns in the display are:
CPUx busy
The percentage of time that each CPU is busy. One column
for each CPU.
State 'CDVMS'
A single character shows if an event is occuring. Each event
can affect performance.
C cleaning
D disk reconstruction (repair of a failed disk)
V verify data (a background process that checks for
data consistency)
M merging of the internal fingerprint index
S summary vector internal checkpoint process
NFS ops/s
The number of NFS operations per second.
NFS proc
The proportion of NFS-busy time spent in doing work on the
data.
NFS rcv
The proportion of NFS-busy time spent waiting for data on the
NFS socket.
NFS snd
The proportion of NFS-busy time spent sending data out on the
socket.
NFS idle
The proportion of NFS time spent idle.
CIFS ops/s
The number of CIFS (Common Internet File System) operations
per second.
241
242
ethx kB/s
The amount of data in kilobytes per second passing through each
Ethernet connection. One column for each Ethernet connection.
Disk kB/s
The amount of data in kilobytes per second going to and from all
disks in the DD200.
Disk busy
The percentage of time that all disks in the DD200 are busy.
NVRAM kB/s
The amount of data in kilobytes per second going through non-
volatile random-access memory from reads and writes.
show detailed-version
Display versions of restorer components and the operating system.
show fans
Display the speed and status of all nine system fans. The AvgRPM
column shows the normal operating speed for each type of fan. If
the value in the CurRPM column goes below 60% of the normal
operating speed, replace the fan.
show faults
Display known hardware problems, such as a bad fan.
show location
Display the location description.
show mailserver
Display the mail server used by the restorer.
show meminfo
Display memory usage.
show performance
Display system performance figures for data transfer for the
last X amount of time. Duration is the hours, minutes, or
seconds for the display to go back in time. Interval is the time
between each line in the display. The default is to show
performance over the last 24 hours in 10 minute intervals. You
can set duration only, but not interval only. The raw display gives
unformatted statistics.
The columns in the display are:
Date
DD200 Restorer User Guide
The date of the data transfer.
Time
The time of the data transfer.
Read
The amount of data read from the restorer.
Write
The amount of data written to the restorer.
Replicate
The amount of data sent to a replica restorer.
proc
The proportion of NFS-busy time spent in doing work on the
data.
recv
The proportion of NFS-busy time spent waiting for data on the
NFS socket.
send
The proportion of NFS-busy time spent sending data out on the
socket.
idle
The proportion of NFS time spent idle.
show serialno
Display the system serial number.
show settings
Display the system date and time, time server, time zone, system
location, and mail server.
show stats
Display system statistics for the use of CPUs, disks, Ethernet
ports, and by NFS operations. The time period covered is from
the last reboot, except when using interval and count.
An interval, in seconds, runs the command every given number
of seconds for the number of times in count. The first report
covers the time period since the last reboot. Each subsequent
report is for activity in the last interval. The default interval is
two seconds.
243
The start and stop options return averages per second of statistics
over the time between the commands.
show timezone
Display the time zone set on the restorer.
show uptime
Display the amount of time that has passed since the last reboot.
show version
Display the version of the restorer system software.
EXAMPLE
To display I/O statistics every 30 seconds for 10 iterations, use the
following command:
system show stats 30 10
Restore Protection Manager
1 November 2004
244 DD200 Restorer User Guide
user
NAME
user - Administer user accounts.
SYNOPSIS
user add user-name [password password][priv {admin | user}]
user change password [user-name]
user del user-name
user reset
user show {active | list}
DESCRIPTION
The user command adds and deletes users, changes passwords, and displays
user accounts. The user privilege is for standard users who have access to
a limited number of commands. Most of the commands available to the user
level display information. The admin privilege is for administrative users
who have access to all RPM commands.The default administrative
account is sysadmin. You can change the sysadmin password, but cannot
delete the account.
OPERATIONS
add Add a new user. With no password, the command prompts for a
password. The default privilege level is user. Administrative users
only.
change password
Change a user password. Any user can change their own password.
del Remove a user.
reset
Reset user accounts to defaults. Administrative users only.
show active
Display current logged-in users.
show list
Display known users. Administrative users only.
Restore Protection Manager
29 September 2003
245
246 DD200 Restorer User Guide
Index
A
administrative email
display address
administrative host
AIX
alarm, turn off
alerts add an email address
display current
display current and history
display the email list
display the history
remove an address from the email list 46
set the email list to the default 47
test the list
alias
defaults
display
remove
authentication mode for CIFS
autonegotiate, set
autosupport
display all parameters
display history file
display list
remove an email address
set all parameters to default 51
set list to the default
set the schedule
set the schedule to the default
B backup recommendations for full
buzzer, turn off
C
CIFS
add a backup client 110 add a client 110
add a user
add an administrative client
configuration set up
disable client connections
display active clients
display configuration
display statistics
enable client connections identify a WINS server
map IP address to NetBIOS hostname
remove a client
remove all clients
remove all IP address/hostname mappings
remove an administrative client 111
remove an IP address/hostname mapping 113
remove the NetBIOS hostname
remove the WINS server
247
resolve NetBIOS name
set a NetBIOS hostname
set the authentication mode
clean change schedule
display amount parameters
set schedule to the default
start
stop
config
configuration basic additions
change settings
defaults
display
display settings
return to the default
CPU display load
crossbar, remove and replace
D
data compression
integrity checks
date display
set
default gateway
display
reset
DHCP
server installation tasks
248 disk
display location
display performance statistics
display RAID status display RAID use
display type and capacity
estimate use of space
flash the running light
reclaim space
reliability statistics
replacing
set statistics to zero
set to failed
DNS
display servers
domain name display
duplex, set line use
E
Ethernet display interface settings
F fans
replacing for CPUs
replacing on back panel
view sets
file system delete all data
display compression
display uptime
display utilization
filesys command
DD200 Restorer User Guide
FTP
display user list
set user list to empty
G
Gigabit Ethernet card add or replace
H
hardware
replacing components
host name
delete
I display
hourly status message
I/O, display load
installation
DHCP server tasks
hardware
login and configuration
site requirements
interface autonegotiate
display Ethernet configuration
display settings
overview
set line speed
IP address, change for an interface 94
K
L license
display
Index remove
reset
location display
set
log
scroll new entries
login, first time
M view all current entries
mail change server
display server
display server name
maximum transfer unit size, change
MTU, change size
N name
display
ndmp add a filer
backup operation
display known filers
display process status
stop all processes
net display Ethernet hardware settings
netmask, change
network configuration set up
display settings
display statistics
network parameters, reset
249
NFS add client, read/write
configuration set up
detailed statistics
disable client
display active clients
display allowed clients
display statistics
enable client
remove client
set client list to default
ntp add a time server
delete a time server
disable service
display settings
enable service
reset to defaults
set to multicast
NTP, display server
NVRAM, card replacement
P password, change ping a host
power failure and restart
power units
poweroff
R replacing
reboot hardware
remote command output
replication
introduced
move data to originator
250
replace originator
resume
setup and start
start
Rescue CD
restart the system
route
display a route
display default gateway
display Kernel IP routing table
display static routes
remove a rule
reset default gateway
S serial number, display
site install requirements
software display version
site requirements
space management
space.log, format
SSH add a public key
display user list
remove a key file entry
set user list to empty
statistics
disk performance
disk reliability
display for the network display NFS
NFS detailed
DD200 Restorer User Guide
system
display configuration
display hardware status
display uptime
display version
location display
reset parameters
restart
serial number
T
TB defined
TELNET
display user list
set user list to empty
time display
display time server 86 display zone 86
set
traceroute
U upgrade software
uptime, display
user command
users
change a password 42 display all 42, 43
remove
sysadmin
Index
V verify default setting
display when it is running
view status
W
WINS server for CIFS, remove
251
252 DD200 Restorer User Guide
© 2011 - 2013 EMC Corporation. All Rights Reserved.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO
REPRESENTATIONS OR
WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND
SPECIFICALLY
DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC 2 , EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United State and other countries.
All other trademarks used herein are the property of their respective owners.
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 1 DD200 Restorer
- 5 Contents
- 17 About This Guide
- 18 Conventions
- 19 Audience
- 19 Contacting Data Domain
- 21 Introduction
- 22 Applications that Send Data to a Restorer
- 22 Data Integrity
- 23 Data Compression
- 23 Restore Operations
- 24 Licensing
- 24 Restorer Interfaces
- 25 Related Documentation
- 25 Initial System Settings
- 26 Command Line Interface
- 29 Disk Space Management
- 29 Space Management
- 30 Estimate Use of Disk Space
- 31 Reclaim Data Storage Disk Space
- 32 Manage File System Use of Disk Space
- 33 Display the Space Usage Graph
- 35 Installation
- 36 Site Requirements
- 37 Backup Software Requirements
- 37 CIFS Backup Server Timeout
- 37 DHCP Server
- 38 Hardware Installation
- 40 Login and Configuration
- 49 Additional Configuration
- 50 Administering a Restorer
- 51 Configuration Management
- 51 The Config Command
- 51 Change Configuration Settings
- 52 Display Configuration Keys and Settings
- 52 Display a Single Configuration Setting
- 53 Return to the Default Configuration
- 54 Save and Return a Configuration
- 54 The License Command
- 54 Add a License
- 55 Remove a License
- 55 Reset Licenses
- 55 Display Licenses
- 57 Access Control for Administration
- 57 Add a Host
- 57 Remove a Host
- 58 Reset a List
- 58 Enable a Protocol
- 58 Disable a Protocol
- 58 Add an Authorized SSH Public Key
- 59 Remove an SSH Key File Entry
- 59 Remove the SSH Key File
- 59 Display the SSH Key File
- 60 Display Hosts and Status
- 60 Return Command Output to a Remote machine
- 61 User Administration
- 61 Add a User
- 61 Remove a User
- 62 Change a Password
- 62 Reset to the Default User
- 62 Display Current Users
- 63 Display All Users
- 65 Alerts and System Reports
- 66 Alerts
- 66 Add to the Email List
- 66 Test the Email List
- 66 Remove from the Email List
- 67 Reset the Email List
- 67 Display Current Alerts
- 67 Display the Email List
- 68 Display the Alerts History
- 68 Display Current Alerts and Recent History
- 69 Display the Email List and Administrator Email
- 69 Autosupport Reports
- 69 Add to the Email List
- 69 Remove from the Email List
- 70 Reset the Email List
- 70 Test the Autosupport Report Email List
- 70 Set the Schedule
- 71 Reset the Schedule
- 71 Reset the Schedule and the List
- 71 Run the Autosupport Report
- 72 Send Disk Debug Information
- 72 Display all Autosupport Parameters
- 73 Display the Autosupport Email List
- 73 Display the Autosupport History
- 74 Display the Autosupport Report Schedule
- 74 Hourly System Status
- 75 File System Management
- 75 Statistics and Basic Operations
- 75 Start the Restorer File System Process
- 75 Stop the Restorer File System Process
- 75 Delete All Data in the File System
- 76 Display File System Status
- 76 Display File System Uptime
- 76 Display File System Space Utilization
- 78 Display Compression
- 79 Clean Operations
- 80 Start Cleaning
- 81 Stop Cleaning
- 81 Change the Schedule
- 82 Set the Schedule or Amount to the Default
- 82 Set the Run Time, Gigabytes, or Percent Cleaned
- 82 Set System Resources Used
- 83 Update Statistics
- 83 Display the Schedule
- 83 Display the Amount Parameters
- 83 Display the Throttle Setting
- 84 Display the Clean Operation Status
- 84 Display Recommended Cleaning Times
- 85 Disk Management
- 85 Fail a Disk
- 86 Identify a Physical Disk in the Chassis
- 86 Check All Disks
- 86 Display Disk Locations
- 87 Display Disk Type and Capacity Information
- 87 Display the RAID Use of Disks
- 88 Display Disk Status
- 89 Display RAID Status for Disks
- 90 Display Performance Details
- 90 Reset Disk Performance Statistics
- 91 Display Disk Reliability Details
- 92 Display Disk Debug Information
- 93 System Management
- 93 The System Command
- 93 Shut down the Restorer Hardware
- 93 Reboot the Restorer
- 94 Upgrade Restorer Software
- 94 To upgrade from the Data Domain web site
- 95 To upgrade from a CD
- 95 To upgrade using FTP
- 95 Change the Mail Server Hostname
- 96 Change the Administrative Email Address
- 96 Change the Administrative Host
- 96 Change the System Location Description
- 97 Set the Date and Time
- 97 Set a Time Zone for the System Clock
- 98 Reset Location, Mailserver, Timezone
- 98 Display Hardware Status
- 99 Display System Uptime
- 99 Display Fan Status
- 100 Display the System Configuration
- 100 Display Memory Usage
- 100 Display System Statistics
- 101 Display Detailed System Statistics
- 103 Display the Restorer Serial Number
- 103 Display System Status
- 104 Display the System Location Description
- 104 Display Data Transfer Performance
- 104 Display the Mail Server Hostname
- 105 Display the Restorer Software Version
- 105 Display the Administrative Email Address
- 105 Display the Administrative Host Name
- 106 Display the Date and Time
- 106 Display the Time Server for the System Clock
- 106 Display the Time Zone for the System Clock
- 106 Display All Time, Location, and Mail Settings
- 107 The Alias Command
- 107 Add an Alias
- 107 Remove an Alias
- 107 Reset Aliases
- 108 Display Aliases
- 108 Time Servers and the NTP Command
- 108 Enable NTP Service
- 109 Disable NTP Service
- 109 Add a Time Server
- 109 Delete a Time Server
- 109 Reset the List to Multicast
- 109 Reset All NTP Settings
- 110 Display NTP Status
- 110 Display NTP Settings
- 110 Use the Rescue CD
- 111 Network Management
- 111 The Net Command
- 111 Enable an Interface
- 111 Disable an Interface
- 112 Enable DHCP
- 112 Disable DHCP
- 112 Change an Interface Transfer Unit Size
- 113 Change an Interface Netmask
- 113 Add or Change DNS servers
- 113 Ping a Host
- 113 Change the Restorer Hostname
- 114 Change an Interface IP Address
- 114 Change the Domain Name
- 114 Add a Hostname/IP Address to the /etc/hosts File
- 115 Reset Network Parameters
- 115 Set Interface Duplex Line Use
- 115 Set Interface Line Speed
- 115 Set Autonegotiate for an Interface
- 116 Delete a Hostname/IP address from the /etc/hosts File
- 116 Delete all Hostname/IP addresses from the /etc/hosts File
- 116 Display Hostname/IP addresses from the /etc/hosts File
- 116 Display an Ethernet Interface Configuration
- 117 Display Interface Settings
- 117 Display Ethernet Hardware Information
- 118 Display the Restorer Hostname
- 118 Display DNS Servers
- 118 Display Network Settings
- 119 Display the Domain Name Used for Email
- 119 Display Network Statistics
- 120 The Route Command
- 120 Add a Routing Rule
- 120 Remove a Routing Rule
- 121 Change the Routing Default Gateway
- 121 Reset the Default Routing Gateway
- 121 Display a Route
- 121 Display the Configured Static Routes
- 122 Display the Default Routing Gateway
- 122 Display the Kernel IP Routing Table
- 123 NFS Management
- 123 Add NFS Clients
- 124 Remove Clients
- 124 Enable Clients
- 125 Disable Clients
- 125 Reset Clients to the Default
- 125 Clear the NFS Statistics
- 125 Display Allowed Clients
- 126 Display Statistics
- 127 Display Detailed Statistics
- 127 Display Active Clients
- 127 Display Timing for NFS Operations
- 128 Display Status
- 129 CIFS Management
- 129 Access from Windows to a Restorer
- 129 Add a User
- 130 Add a Client
- 130 CIFS Command
- 130 Enable Client Connections
- 130 Disable Client Connections
- 130 Add a Backup Client
- 131 Add an Administrative Client
- 131 Remove a Backup Client
- 131 Remove an Administrative Client
- 131 Remove All CIFS Clients
- 132 Set a NetBIOS Hostname
- 132 Remove the NetBIOS Hostname
- 132 Set the Authentication Mode
- 132 Map an IP Address to a NetBIOS hostname
- 133 Remove an IP Address/NetBIOS hostname Mapping
- 133 Remove All IP Address/NetBIOS hostname Mappings
- 133 Resolve a NetBIOS Name
- 133 Identify a WINS server
- 134 Remove the WINS server
- 134 Display All Clients
- 134 Display Active Clients
- 135 Display the CIFS Configuration
- 135 Display CIFS Statistics
- 135 Display CIFS Status
- 136 Display Local IP address/NetBIOS Hostname Mappings
- 137 Replicator
- 137 Configure Replicator
- 138 Start Replication
- 138 Suspend Replication
- 138 Resume Replication
- 139 Remove Replication
- 139 Reset Authentication between the Restorers
- 139 Move Data to a New Originator
- 139 Change an Originator Hostname
- 140 Change a Replica Hostname
- 140 Add a Scheduled Throttle Event
- 141 Delete a Scheduled Throttle Event
- 141 Set a Temporary Throttle Rate
- 142 Set an Override Throttle Rate
- 143 Reset Throttle Settings
- 143 Display Replicator Configuration
- 144 Display Statistics
- 145 Display Status
- 145 Display Throttle settings
- 146 Procedure: Set Up and Start Replication
- 147 Procedure: Replace an Originator
- 147 Procedure: Replace a Replica
- 149 Backup/Restore Using NDMP
- 149 Add a Filer
- 149 Remove a Filer
- 150 Backup from a Filer
- 150 Restore to a Filer
- 151 Remove Filer Passwords
- 151 Stop an NDMP Process
- 151 Stop All NDMP Processes
- 152 Display Known Filers
- 152 Display NDMP Process Status
- 153 Log File Management
- 153 Display Log Files
- 154 List Log Files
- 154 Scroll New Log Entries
- 155 Archive Log Files
- 157 Hardware Servicing
- 158 Replace Disks
- 161 Replace Power Units
- 164 System Restart
- 164 Remove the Top Panel
- 165 Remove and Re-Install the Crossbar
- 167 Replace Fans
- 168 Replace Disk Fans
- 170 Replace CPU Fans
- 172 Replace Back Panel Fans
- 176 Replace Cards
- 177 Add or Replace a Gigabit Ethernet Card
- 180 Replace a Disk Controller Card
- 182 Replace an NVRAM Card
- 185 Replace the Motherboard Battery
- 187 Appendix A: Time Zones
- 193 Appendix B: Restorer Commands
- 193 adminaccess
- 196 alerts
- 198 alias
- 200 autosupport
- 203 cifs
- 206 config
- 209 disk
- 211 filesys
- 217 filesys clean
- 220 help
- 221 license
- 222 log
- 224 ndmp
- 226 net
- 230 net config
- 232 net set
- 233 net show
- 235 nfs
- 238 nfs show
- 239 ntp
- 241 replication
- 249 route
- 251 system
- 258 system set
- 260 system show
- 265 user
- 267 Index