background image

Chapter 18: Log File Management

169

 

Scroll New Log Entries

Scroll New Log Entries

To display a view of the 

messages

 file that adds new entries as they occur, use the 

watch

 

operation. Use the key combination 

<Control> c 

to break out of the 

watch

 operation. With no 

filename

, the command displays the current 

messages

 file.

log watch [

filename

]

Archive Log Files

To archive log files, use FTP to copy the files to another machine. 

1.

On the restorer, use the 

adminaccess show ftp

 command to see that the FTP service is 

enabled. If the service is not enabled, use the command 

adminaccess enable ftp

2.

On the restorer, use the 

adminaccess show ftp

 command to see that the FTP access list 

has the IP address of your remote machine or a class-C address that includes your remote 
machine. If the address is not in the list, use the command 

adminaccess add ftp 

<

ipaddr

>

.

3.

On the remote machine, open a web browser.

4.

In the 

Address

 box at the top of the web browser, use FTP to access the restorer. For example:

ftp://restorer_name.yourcompany.com

/

Note

Some web browsers do not automatically ask for a login if a machine does not accept 
anonymous logins. In that case, add a user name and password to the FTP line. For example:

 

 

ftp://sysadmin:your-pw@restorer_name.yourcompany.com/

5.

At the login popup, log into the restorer as user 

sysadmin

.

6.

On the restorer, you are in the directory just above the 

log

 directory. Open the 

log

 directory 

to list the 

messages

 files.

7.

Copy the file that you want to save. Right-click on the file icon and select 

Copy To Folder

 

from the menu. Choose a location for the file copy.

8.

If you want the FTP service disabled on the restorer, use SSH to log into the restorer as 

sysadmin

 and give the command 

adminaccess disable ftp

.

Summary of Contents for DD400 Series

Page 1: ...Software Version 3 1 2 DD400 Series Restorer User Guide ...

Page 2: ... Domain OS Global Compression Data Invulnerability Architecture and all other Data Domain product names and slogans are trademarks or registered trademarks of Data Domain Incorporated in the USA and or other countries Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and or other countries Portions of this product are software covere...

Page 3: ... product relating to gdft c are derived from software Copyright 2001 2002 John Ellson ellson lucent com Portions of this product relating to JPEG and to color quantization are derived from software Copyright 2000 2001 2002 Doug Becker and copyright C 1994 1995 1996 1997 1998 1999 2000 2001 2002 Thomas G Lane This software is based in part on the work of the Independent JPEG Group Portions of this ...

Page 4: ......

Page 5: ...Conductor Warning xxvii Wrist Strap Warning xxviii Faceplates and Cover Panel Requirement xxix Jewelry Removal Warning xxxi Class 1 Laser Product Warning xxxiii Invisible Laser Radiation Warning xxxiv Regulatory Standards Compliance xxxv EMC Environmental Conditions for Product to be Installed in the European Union xxxv FCC Class A Warning xxxvi Canada Class A Warning xxxvi Japan VCCI Class A Warn...

Page 6: ...Initial System Settings 5 Command Line Interface 7 Graphical User Interface 9 Hardware System Level Interfaces 11 Front Panel 11 Back Panel 12 Power Supply LEDs 13 Hardware Interface 13 System Card Interface 14 Chapter 2 Disk Space and Backup Software 17 Space Management 17 Estimate Use of Disk Space 18 Reclaim Data Storage Disk Space 19 Manage File System Use of Disk Space 19 Display the Space Us...

Page 7: ...iguration Settings 51 Save and Return a Configuration 52 Reset the Location Description 52 Reset the Mail Server to a Null Entry 52 Reset the Time Zone to the Default 53 Set an Administrative Email Address 53 Set an Administrative Host Name 53 Change the System Location Description 53 Change the Mail Server Hostname 54 Set a Time Zone for the System Clock 54 Display the Administrative Email Addres...

Page 8: ... 60 Add an Authorized SSH Public Key 60 Remove an SSH Key File Entry 61 Remove the SSH Key File 61 Create a New HTTPS Certificate 61 Display the SSH Key File 62 Display Hosts and Status 62 Return Command Output to a Remote machine 62 Chapter 7 User Administration 65 Add a User 65 Remove a User 65 Change a Password 66 Reset to the Default User 66 Display Current Users 66 Display All Users 67 Chapte...

Page 9: ...e Schedule 75 Reset the Schedule 75 Reset the Schedule and the List 76 Run the Autosupport Report 76 Display all Autosupport Parameters 76 Display the Autosupport Report Schedule 77 Display the Autosupport Email List 77 Display the Autosupport History 78 Hourly System Status 78 Chapter 9 File System Management 79 Statistics and Basic Operations 79 Start the Restorer File System Process 79 Stop the...

Page 10: ...ay the Throttle Setting 88 Display the Clean Operation Status 88 Display Recommended Cleaning Times 89 Chapter 10 Disk Management 91 Fail a Disk 91 Unfail a Disk 92 Check All Disks 92 Identify a Physical Disk in the Chassis 92 Display Disk Status 92 Display Disk Type and Capacity Information 93 Display RAID Status for Disks 94 Display Detailed RAID Information 95 Display Disk Performance Details 9...

Page 11: ...istics 105 Display System Uptime 105 Display Detailed System Statistics 106 Display the Restorer Model Number 107 Display System Status 108 Display Data Transfer Performance 109 Display the Data Domain OS Version 110 Display the Date and Time 110 Display All System Information 111 The Alias Command 111 Add an Alias 111 Remove an Alias 111 Reset Aliases 111 Display Aliases 112 Time Servers and the ...

Page 12: ... IP Address 118 Change the Domain Name 118 Add a Hostname IP Address to the etc hosts File 118 Reset Network Parameters 119 Set Interface Duplex Line Use 119 Set Interface Line Speed 119 Set Autonegotiate for an Interface 120 Delete a Hostname IP address from the etc hosts File 120 Delete all Hostname IP addresses from the etc hosts File 120 Display Hostname IP addresses from the etc hosts File 12...

Page 13: ... Kernel IP Routing Table 127 Display the Default Routing Gateway 128 Chapter 13 NFS Management 129 Add NFS Clients 129 Remove Clients 130 Enable Clients 130 Disable Clients 130 Reset Clients to the Default 131 Clear the NFS Statistics 131 Display Active Clients 131 Display Allowed Clients 131 Display Statistics 132 Display Detailed Statistics 133 Display Status 133 Display Timing for NFS Operation...

Page 14: ...NetBIOS hostname Mappings 138 Add an IP Address NetBIOS hostname Mapping 139 Remove an IP Address NetBIOS hostname Mapping 139 Resolve a NetBIOS Name 139 Identify a WINS server 139 Remove the WINS server 140 Set CIFS Options 140 Reset CIFS Options 140 Display CIFS Options 140 Display CIFS Statistics 141 Display Active Clients 141 Display All Clients 142 Display the CIFS Configuration 142 Display D...

Page 15: ... an Override Throttle Rate 150 Reset Throttle Settings 151 Display Statistics 151 Display Status 152 Display Replicator Configuration 153 Display Throttle settings 153 Procedure Set Up and Start Replication 154 Procedure Replace an Originator 154 Procedure Replace a Replica 155 Chapter 16 Backup Restore Using NDMP 157 Add a Filer 157 Remove a Filer 157 Backup from a Filer 158 Restore to a Filer 15...

Page 16: ...lete a Community String 164 Delete All Community Strings 164 Display SNMP Agent status 164 Display the System Contact 164 Display Trap Hosts 165 Display All Parameters 165 Display the System Location 166 Display Community Strings 166 Display the MIB and Traps 166 Chapter 18 Log File Management 167 Display Log Files 167 List Log Files 168 Scroll New Log Entries 169 Archive Log Files 169 Send Log me...

Page 17: ... Trained Service Personnel 180 Remove Replace the Top Panel 180 Replace Fans 182 Replace Disk Fans 183 Replace Back Panel Fans 185 Replace the Motherboard Battery 187 Appendix A Time Zones 191 Appendix B Restorer Commands 197 adminaccess 197 alerts 199 alias 201 autosupport 203 cifs 206 config 210 disk 213 filesys 216 help 221 license 222 log 223 ndmp 226 net 228 nfs 232 ntp 235 ...

Page 18: ...xviii DD400 Series Restorer User Guide replication 237 route 245 snmp 247 system 250 user 256 Index 257 ...

Page 19: ...escribes the task The DD400g Gateway chapter gives installation steps and other information specific to restorers that use external storage systems instead of internal disks The Configuration Management chapter describes how to examine and modify configuration parameters The Access Control for Administration chapter describes how to give HTTP FTP TELNET and SSH access from remote hosts The User Ad...

Page 20: ...t appendix lists all time zones from around the world The second appendix is a collection of help pages for user interface commands Conventions The following table describes the typographic conventions used in this guide Typeface Usage Examples Monospace Commands computer output file contents files directories software elements such as command options and parameters Find the log file under var log...

Page 21: ...nistration Contacting Data Domain For comments or problems with Data Domain products contact Data Domain Technical Support 24 hours a day 7 days a week at 877 207 DATA 3282 email support datadomain com For sales and license information 877 622 2587 email sales datadomain com Fax 650 424 1057 Data Domain Incorporated 3400 Hillview Ave Bldg 3 2nd Floor Palo Alto CA 94304 USA Phone 650 565 7300 Fax 6...

Page 22: ... ce produit sont généralement soumis à des lois et ou directives de respect de l environnement Renseignez vous auprès de l organisme compétent Warnung Die Entsorgung dieses Produkts sollte gemäß allen Bestimmungen und Gesetzen des Landes erfolgen Avvertenza Lo smaltimento di questo prodotto deve essere eseguito secondo le leggi e regolazioni locali Advarsel Endelig kassering av dette produktet ska...

Page 23: ...ä henkilökunta saa asentaa tai vaihtaa tämän laitteen Avertissement Tout installation ou remplacement de l appareil doit être réalisé par du personnel qualifié et compétent Achtung Gerät nur von geschultem qualifiziertem Personal installieren oder auswechseln lassen Avvertenza Solo personale addestrato e qualificato deve essere autorizzato ad installare o sostituire questo apparecchio Advarsel Kun...

Page 24: ... 10 A internationaal gebruikt wordt op de fasegeleiders alle geleiders die stroom voeren Varoitus Tämä tuote on riippuvainen rakennukseen asennetusta oikosulkusuojauksesta ylivirtasuojauksesta Varmista että vaihevirtajohtimissa kaikissa virroitetuissa johtimissa käytetään Yhdysvalloissa alle 120 voltin 15 ampeerin ja monissa muissa maissa 240 voltin 10 ampeerin sulaketta tai suojakytkintä Attentio...

Page 25: ... circuito sobrecarga Assegure se de que um fusível ou disjuntor não superior a 240 VAC 10A é utilizado nos condutores de fase todos os condutores de transporte de corrente Advertencia Este equipo utiliza el sistema de protección contra cortocircuitos o sobrecorrientes deló propio edificio Asegurarse de que se utiliza un fusible o interruptor automático de no más de 240 voltios en corriente alterna...

Page 26: ...er daß das Host Gerät während des normalen Betriebs an Erde gelegt ist Avvertenza Questa apparecchiatura deve essere collegata a massa Accertarsi che il dispositivo host sia collegato alla massa di terra durante il normale utilizzo Advarsel Dette utstyret skal jordes Forviss deg om vertsterminalen er jordet ved normalt bruk Aviso Este equipamento deverá estar ligado à terra Certifique se que o hos...

Page 27: ... Ne jamais rendre inopérant le conducteur de masse ni utiliser l équipement sans un conducteur de masse adéquatement installé En cas de doute sur la mise à la masse appropriée disponible s adresser à l organisme responsable de la sécurité électrique ou à un électricien Warnung Auf keinen Fall den Erdungsleiter unwirksam machen oder das Gerät ohne einen sachgerecht installierten Erdungsleiter verwe...

Page 28: ...finns skall elektrisk besiktningsauktoritet eller elektriker kontaktas Warning During this procedure wear grounding wrist straps to avoid ESD damage to the card Do not directly touch the backplane with your hand or any metal tool or you could shock yourself Waarschuwing Draag tijdens deze procedure aardingspolsbanden om te vermijden dat de kaart beschadigd wordt door elektrostatische ontlading Raa...

Page 29: ...s ESD causados à placa use fitas de ligação à terra para os pulsos Para evitar o risco de choque eléctrico não toque directamente na parte posterior com a mão ou com qualquer ferramenta metálica Advertencia Usartiras conectadas a tierra en las muñecas durante este procedimiento para evitar daños en la tarjeta causados por descargas electrostáticas No tocar el plano posterior con las manos ni con n...

Page 30: ... soient fixés à leur emplacement Ceux ci remplissent trois fonctions essentielles ils évitent tout risque de contact avec des tensions et des courants dangereux à l intérieur du châssis ils évitent toute diffusion d interférences électromagnétiques qui pourraient perturber le fonctionnement des autres équipements et ils canalisent le flux d air de refroidissement dans le châssis Warnung Blanke Fac...

Page 31: ...rtencia Las placas frontales y los paneles de relleno cumplen tres funciones importantes evitan la exposición a niveles peligrosos de voltaje y corriente dentro del chasis reducen la interferencia electromagnética EMI que podría perturbar la operación de otros equipos y dirigen el flujo de aire de enfriamiento a través del chasis No haga funcionar el sistema a menos que todas las tarjetas placas f...

Page 32: ...der Arbeit an Geräten die an das Netz angeschlossen sind jeglichen Schmuck einschließlich Ringe Ketten und Uhren abnehmen Metallgegenstände erhitzen sich wenn sie an das Netz und die Erde angeschlossen werden und können schwere Verbrennungen verursachen oder an die Anschlußklemmen angeschweißt werden Avvertenza Prima di intervenire su apparecchiature collegate alle linee di alimentazione togliersi...

Page 33: ...queden soldados a los bornes Varning Tag av alla smycken inklusive ringar halsband och armbandsur innan du arbetar på utrustning som är kopplad till kraftledningar Metallobjekt hettas upp när de kopplas ihop med ström och jord och kan förorsaka allvarliga brännskador metallobjekt kan också sammansvetsas med kontakterna Warning Class 1 laser product Waarschuwing Klasse 1 laser produkt Varoitus Luok...

Page 34: ... kabel aangesloten is dient men om blootstelling aan laserstraling te vermijden niet in de open openingen te kijken Varoitus Kun porttiin ei ole kytketty kaapelia portin aukosta voi vuotaa näkymätöntä lasersäteilyä Älä katso avoimiin aukkoihin jotta et altistu säteilylle Attention Etant donné qu un rayonnement laser invisible peut être émis par l ouverture du port quand aucun câble n est connecté ...

Page 35: ...zione laser invisibile evitare l esposizione a tale radiazione e non fissare con gli occhi porte a cui non siano collegati cavi Advarsel Usynlige laserstråler kan sendes ut fra åpningen på utgangen når ingen kabel er tilkoblet Unngå utsettelse for laserstråling og se ikke inn i åpninger som ikke er tildekket Aviso Evite uma exposição à radiação laser e não olhe através de aberturas expostas porque...

Page 36: ...ated in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instruction manual may cause harmful interference to radio communications Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own ex...

Page 37: ...gulatory Standards Compliance Taiwan BSMI Class A Warning Translation This is a class A product In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures ...

Page 38: ...Regulatory Standards Compliance xxxviii DD400 Series Restorer User Guide ...

Page 39: ... restorer to your site as a Disk Storage Unit for VERITAS NetBackup a Backup to disk device for VERITAS Backup Exec or as a Filesystem Device for Legato NetWorker Multiple backup servers can share one restorer and one restorer can handle multiple simultaneous backup and restore operations For additional throughput and capacity you can attach multiple restorers to one or more backup servers Figure ...

Page 40: ...e capacity The fourth platform the DD400g Gateway has no internal disks instead storing data on external disk arrays through a fiber channel connection The platforms and their differences are Applications that Send Data to a Restorer The Data Domain OS operating system is designed specifically for storing relatively large streams of sequential data from backup software and is optimized for high th...

Page 41: ...on process The storage disks in a restorer are set up in a double parity RAID 6 configuration two parity drives with a hot spare in 15 disk systems Eight disk systems have no hot spare Each parity stripe has block checksums to ensure that data is correct The checksums are constantly used during the online verify operation and when data is read from the restorer With double parity the system can fi...

Page 42: ...of storing redundant data With tape backups a restore operation may rely on multiple tapes holding incremental backups Unfortunately the more incremental backups a site has on multiple tapes the more time consuming and risky the restore process One bad tape can kill the restore From a restorer file restores go quickly and create little contention with backup or other restore operations Unlike tape...

Page 43: ... monitor attached directly to the restorer or through Ethernet connections A web based graphical user interface the DDR Manager is available through Ethernet connections Using a DDR Manager you can do the initial system configuration make some configuration updates after initial configuration and display system states and the state of system operations Related Documentation For technical details a...

Page 44: ...estorer administration Administrative users have access to the partition ddvar The partition is small and data in the partition is not compressed The time zone you select is set The initial user for the system is sysadmin with the password that you give during setup The user command allows you to later add administrative and non administrative users later The SSH service is enabled and the HTTP FT...

Page 45: ...d by a command name Use the up and down arrow keys to move through a displayed command Use the q key to exit Enter a slash character and a pattern to search for and highlight lines of particular interest The Tab key completes a command entry when that entry is unique Tab completion works for the first three levels of command components For example entering syst tab sh tab st tab displays the comma...

Page 46: ...a Network Appliance filer and a restorer using the Network Data Management Protocol Version 2 See Backup Restore Using NDMP on page 157 net Displays network status and set up information See Network Management on page 115 nfs Displays NFS status and statistics See NFS Management on page 129 for details ntp Manages restorer access to one or more time servers The default setting is multicast See Tim...

Page 47: ...osoft Internet Explorer 6 0 and above FireFox 0 9 1 and above Mozilla 1 6 and above and Safari 1 2 4 The console first asks for a login and then displays the Restorer Summary page see Figure 2 on page 9 Some of the individual displays on various pages have a Help link to the right of the display title Click on the link to bring up detailed online help about the display To bring up the interface 1 ...

Page 48: ...e Autosupport Email List on page 77 and Display the Alerts History on page 72 Admin Access lists available access services whether or not a service is enabled and every listed hostname allowed access through each service See Display Hosts and Status on page 62 CIFS displays CIFS configuration choices and the CIFS client list Disks shows statistics for disk reliability and performance and lists dis...

Page 49: ...wn is labelled Mute and turns off the power supply alarm that buzzes when one or more power supplies is not working The top LED is the power on off indicator that glows green when power is on The second LED is the network activity indicator that flashes green with network activity through the Ethernet port eth0 See Hardware Interface on page 13 to identify the port The third LED indicates extreme ...

Page 50: ...ipping crate with the restorer Each disk has two LEDs at the bottom of the disk carrier See Figure 4 The right LED on each disk flashes green whenever the system accesses the disk The left LED glows red when the disk has failed Both LEDs are dark on the disk that is available as a spare Back Panel The back panel has three major functional areas the power supply units a hardware interface panel and...

Page 51: ...e panel is where you connect to a restorer with a serial console a monitor and keyboard or through an Ethernet connection See Figure 7 on page 14 The Ethernet interfaces eth0 and eth1 are for data transfer to the restorer or for administrative access over a network Both Ethernet interfaces are 1000 Base T Gigabit copper ports that can accept 10 100 Base T or Gigabit connections Each Ethernet conne...

Page 52: ... glows steadily when the connection is live The copper Ethernet ports each have an upper LED that flashes green when the connection is active and a lower LED that glows green when the connection is 10 100 Base T or amber when the connection is Gigabit The NVRAM interfaces from the bottom to the top are A Test LED switch that lights the three NVRAM LEDs to test their functionality A power on off in...

Page 53: ...Chapter 1 Introduction 15 Hardware System Level Interfaces eth2 eth3 Test LED switch Remove indicator Fault bad NVRAM card battery Power on off indicator indicator Figure 8 System card interfaces ...

Page 54: ...Hardware System Level Interfaces 16 DD400 Series Restorer User Guide ...

Page 55: ... software on the backup server based on the configured retention period The process with a restorer is very similar to tape policies where older backups are retired and the tapes are reused for new backups When backup software removes an old backup from a restorer the space on the restorer becomes available only after the restorer internal weekly clean function reclaims disk space A good way to ma...

Page 56: ...mpression gives guidelines for disk use over time The amount of disk space used over time by a restorer depends on The size of the initial full backup The number of additional backups incremental and full over time The rate of growth for data in the backups For data sets with average rates of change and growth data compression generally matches the following guidelines For the first full backup to...

Page 57: ...e for data You can change the schedule or you can run the operation manually with the filesys clean commands If you want to increase file system availability and if the restorer is not short on disk space consider changing the schedule to clean less often See Clean Operations on page 83 for details on changing the schedule You can have the clean operation run for a set number of hours or until a s...

Page 58: ...most recent clean operation On a replica no estimate appears The Meta Data line tracks space used for the internal file descriptions that the restorer creates for all stored files The space for Meta Data allows for the storage of about 5 million files on a restorer Warning messages go to the system log and an email alert is generated when the Use figure reaches 90 95 and 100 At 100 the restorer ac...

Page 59: ...Space Usage Plots Figure 9 shows an example of the display Cumulative Physical The total amount of physical storage in use on the restorer Look at the left vertical axis of the graph for the total number of gigabytes used for storage Compression Ratio The amount of compression the restorer has done with all of the data received Look at the right vertical axis of the graph for the compression ratio...

Page 60: ...Display the Space Usage Graphs 22 DD400 Series Restorer User Guide ...

Page 61: ...le or a monitor and keyboard if you are not using an Ethernet interface for configuration Login to the restorer as sysadmin using a serial console monitor and keyboard SSH and an Ethernet interface or the DDR Manager through a web browser Answer questions asked by the configuration process The process starts automatically when sysadmin first logs in through the command line interface To start conf...

Page 62: ...has adequate airflow and that the ambient air temperature requirements are met For configuration and administrative tasks either a serial console an Ethernet connection or a keyboard and monitor An Ethernet connection to a restorer interface for data transfer to and from backup servers You can configure different network interfaces on a restorer to different subnets However multiple interfaces mus...

Page 63: ...cluded with other system documentation mount the inner rails onto the restorer Mount the outer rails onto the rack Slide the restorer into the rails that are in the rack Remove the thin clear plastic wrap that covers the top panel of the system and the clear plastic tape that covers the top and bottom surfaces of the trim around the front of the chassis Slide the restorer all the way into the rack...

Page 64: ...tions Attach at least one Ethernet cable to an Ethernet interface on the back panel for backup and restore communications between the restorer and your backup servers See Figure 11 for Ethernet interface locations Attach the power cords to the three power supplies See Figure 11 Figure 10 Access points Console port Monitor VGA port Keyboard port Figure 11 Power cord plug in slots Power cord slots e...

Page 65: ...nit handle brackets See Figure 12 Plug in the three power cords to a power source Start the Restorer Push the power button the top button on the right side control panel on the front of the system See Figure 13 on page 27 for the location After the restorer starts the power on LED glows green See Figure 13 for the location Figure 12 Power cord retainer bracket Power unit handle brackets Retainer b...

Page 66: ...ormation see the following web page http support microsoft com default aspx scid http support mocrosoft com 80 support kb articles Q102 0 67 asp NoWebContent 1 Open REGEDT32 and navigate to HKEY_LOCAL_MACHINE SYSTEM CURRENTCONTROLSET SERVICES LANMANWORKSTATION PARAMTERS If the SESSTIMEOUT key does not exist click in the right panel and select New and DWORD value Create a new key SESSTIMEOUT Note t...

Page 67: ... command line interface or use the DDR Manager The config setup command starts automatically the first time sysadmin logs in through the command line interface The command reappears at each login until configuration is complete To bring up the DDR Manager and start the configuration 1 Open a web browser 2 Enter a path to the restorer For example http rstr01 for a restorer named rstr01 on a local n...

Page 68: ...nfig setup prompts display the values given to the restorer from a DHCP server DHCP servers normally supply values for a number of networking parameters Press Return during the installation to accept DHCP values If you do not use DHCP for an interface determine what you will use for the following values before starting the configuration Interface IP addresses Interface netmasks Routing gateway DNS...

Page 69: ...tem is ready to accept backup data For NFS clients the restorer is set up to export the backup and ddvar directories using NFSv3 over TCP For CIFS clients the restorer has shares set up for backup and ddvar The configuration utility has five sections Licenses Network NFS CIFS and System You can configure or skip over any section The command line interface automatically moves from one section to th...

Page 70: ...d line interface the first prompt after login gives the opportunity to change the sysadmin password The prompt appears only once at the first login to a new system You can change the sysadmin password immediately at the prompt or later with the user change password command To improve security Data Domain recommends that you change the sysadmin password before continuing with the system configurati...

Page 71: ...ond section is for network configuration At the first prompt enter yes to configure network parameters Note After configuring the restorer to use DNS the restorer must be rebooted Also if DHCP is disabled for all interfaces and then later enabled for one or more interfaces the restorer must be rebooted NETWORK Configuration Configure NETWORK parameters at this time yes no no a The first prompt is ...

Page 72: ...s for a default routing gateway Default Gateway Enter the default gateway IP address When not using DHCP on any Ethernet port you can enter up to three DNS servers for a restorer to use for resolving hostnames into IP addresses Use a comma separated or space separated list Enter a space for no DNS servers With no DNS servers you can use the net hosts commands to inform the restorer of IP addresses...

Page 73: ...thentication mode is Active Directory Note When configuring a replica restorer as part of a Replicator pair configure the authentication mode WINS server if needed and other entries as with the originator in the pair The exceptions are that a replica does not need a backup user and will probably have a different backup server list all machines that can access data that is on the replica CIFS Confi...

Page 74: ...o no Backup user Enter backup user name Domain Controller Enter the IP address of domain controller 1 for this system Enter the WINS server for the restorer to use WINS Server Enter the IP address for the WINS server for this system Enter one or more backup servers as restorer clients Backup Servers Enter the Backup Server list CIFS clients of backup The Active Directory method brings the followin...

Page 75: ...sed alone to mean all Backup Server List Enter the Backup Server list CIFS clients of backup b A listing of your choices appears You can accept the settings Save reject the settings and leave the setup process Abort or return to the beginning of the current section and change settings Retry A Retry shows your previous choice for each prompt Press Return to accept the displayed value or enter a new...

Page 76: ...Retry A Retry shows your previous choice for each prompt Press Return to accept the displayed value or enter a new value Pending NFS Settings Backup Server List Do you want to save these settings Save Abort Retry 8 The fifth section is for system parameters At the first prompt enter yes to configure system parameters SYSTEM Configuration Configure SYSTEM Parameters at this time yes no no a Add a c...

Page 77: ...e name US Pacific f To allow the restorer to use one or more Network Time Service NTP servers you can enter IP addresses for NTP servers The default is to enable NTP and to use multicast Configure NTP Enable Network Time Service yes no yes Use multicast for NTP yes no no Enter the NTP Server list IP addresses g A listing of your choices appears You can accept the settings Save reject the settings ...

Page 78: ...bes the general task and the command used to accomplish the task Add email addresses to the alerts list and the autosupport list See Add to the Email List on page 74 for details alerts add addr1 addr2 Give access to additional backup servers See NFS Management on page 129 for details nfs add backup srvr1 srvr2 From a remote machine add an authorized SSH public key to the restorer See Add an Author...

Page 79: ...mands and operations To see a list of commands log in to the restorer using SSH or TELNET if that is enabled and enter a question mark at the prompt To see a list of operations available for a particular command enter the command name To display a detailed help page for a command use the help command with the name of the target command Use the up and down arrow keys to move through a displayed com...

Page 80: ...Administering a Restorer 42 DD400 Series Restorer User Guide Selections on the left panel Figure 18 DDR Manager selections ...

Page 81: ... SAN only data centers are not supported Replication between two DD400g restorers must be between disk arrays that are of the same type and size With replication between a DD400g restorer and other model Data Domain restorers the total amount of storage on the originator must not exceed the total amount of storage on the replica Power supplies are the only hardware in a DD400g that a customer woul...

Page 82: ...Fiber Channel host bus adapter card QLogic 2 gigabit class in the restorer communicates with the external disk array See Figure 19 for a schematic of the peripheral cards in a DD400g Command Changes The following disk commands are not valid for a restorer using external storage All other commands in the Data Domain command set are available disk beacon disk fail disk unfail disk show debug disk sh...

Page 83: ...0 drives are hot spare s 0 drives are undergoing reconstruction 0 drives are undergoing resynch 0 drives are not in use 0 drives are missing absent disk show performance Displays information similar to the following for each LUN system12 disk show performance Disk Read Write Cumul Busy sects s sects s MBytes s disk1 46 109 0 075 14 disk2 0 0 0 000 0 Cumulative 0 075 MB s 7 busy disk show detailed ...

Page 84: ...storer Manufacturer Model includes a label that identifies the manufacturer The display may include a model ID or RAID type or other information depending on the vendor string sent by the external storage system Firmware is the firmware level used by the external storage controller Serial No is the serial number of the external storage system Capacity is the amount of data in a volume sent to the ...

Page 85: ... For hardware setup setting up the restorer chassis see Hardware Installation on page 25 2 On the external disk array system create the LUNs for use by the restorer 3 On the external disk array system configure LUN masking so that the restorer can see only those LUNs that should be available to the restorer The restorer writes to every LUN that is available 4 Connect the Fiber Channel cable from t...

Page 86: ...isks LUNs The Valid RAID DiskGroup UUID List section shows no disk groups until after installation Use the arrow keys to move up and down in the display Storage Details Software Version 3 1 0 0 19112 Valid RAID DiskGroup UUID List ID DiskGroup UUID Last Attached Serialno No diskgroup uuids were found List of SCSI Disks LUNs Press ctrl m for disk size information ID UUID tgt lun loop wwpn comments ...

Page 87: ...nfigured The system has 0 disks LUNs 1 Show Storage Information 2 Show Head Information 3 Show Head Swap Menu 4 Show New Install Menu 5 Go to Rescue Menu 6 Reboot Show Storage Information displays the LUNs that are currently available to the restorer If the Comments column of the List of SCSI Disks LUNs section includes an Incomplete one or more LUNs configured for the restorer is not available Sh...

Page 88: ...ting 50 DD400 Series Restorer User Guide Errors Encountered Version numbers do not match Go to Rescue Menu allows you to display the system log Rescue Options 1 View Log 2 Go to Bash 3 Go to Previous Menu 4 Reboot ...

Page 89: ...f this manual detail using individual commands An example of an individual command that sets only one of the config possibilities is nfs add to add NFS clients Change Configuration Settings To change multiple configuration settings with one command use the config setup operation The operation displays the current value for each setting Press the Return key to retain the current value for a setting...

Page 90: ...et config aliases default_set root 1 reg set config aliases default_set sysadmin 1 reg set config aliases sysadmin df filesys show space reg set config aliases sysadmin halt system poweroff The following command returns the configuration settings from the file tmp config12 to the restorer The settings immediately become the current configuration for the restorer ssh l sysadmin dd10 tmp config12 sy...

Page 91: ...g show admin email command Set an Administrative Host Name To change the machine from which you can log into the restorer to see system logs and use system commands use the config set admin host host operation The host name can be a simple host name a host name with a fully qualified domain name or an IP address Administrative users only config set admin host host For example to set the administra...

Page 92: ... Pacific See the appendix Time Zones on page 191 for a complete list of time zones For the change to take effect for all currently running processes you must reboot the restorer The operation is available to administrative users only config set timezone zone For example to set the system clock to the time zone that includes Los Angeles California USA config set timezone Los_Angeles To display time...

Page 93: ...ds use the config show admin host operation config show admin host The display is similar to the following config show admin host The Admin Host is admin12 yourcompany com Display the System Location Description To display the restorer location description if you gave one use the config show location operation Administrative users only config show location The display is similar to the following c...

Page 94: ...he license code Administrative users only The licensed features are CAPACITY FULLSIZE Use all the disk space on a restorer When upgrading from HALF to FULL simply add the FULL license The HALF license is automatically replaced and the increased disk space is immediately available CAPACITY HALFSIZE Use only half the disk space on a restorer REPLICATION Use the Data Domain Replicator for replication...

Page 95: ...tive users only is the license number of the feature License Key is the characters of a valid license key Feature is the name of the licensed feature Current licensed features are disk space for data of full or half and the Replicator for replication from one restorer to another NFS and CIFS are default features included with no license fee Display To display current licenses and default features ...

Page 96: ...The License Command 58 DD400 Series Restorer User Guide ...

Page 97: ...ress for each host or a class C network address that includes the hosts You can enter a list that is comma separated space separated or both To give access to all hosts the host list can be an asterisk Administrative users only adminaccess add ftp telnet host list For example to add srvr24 and srvr25 to the list of hosts that can use TELNET on the restorer adminaccess add telnet srvr24 srvr25 To a...

Page 98: ...minaccess disable http https ftp telnet ssh all For example to disable the FTP service adminaccess disable ftp Reset System Access By default FTP and TELNET are disabled and have no entries in their access lists SSH is enabled No one is able to use FTP or TELNET unless the appropriate access list has one or more host entries The adminaccess reset operation returns the FTP and TELNET protocols to t...

Page 99: ...ey jsmith ssh l sysadmin dd10 adminaccess add ssh keys ssh id_dsa pub Remove an SSH Key File Entry To remove one entry from the SSH key file use the adminaccess del ssh_keys lineno operation The lineno variable is the line number as displayed by the adminaccess show ssh keys command Available only to administrative users adminaccess del ssh keys lineno For example to remove the third entry in the ...

Page 100: ...in the list Administrative users only Display To display protocol access lists and status use the adminaccess show operation or click Admin Access in the left panel of the DDR Manager adminaccess show For example to show the status and lists for all services adminaccess show Service Enabled Allowed Hosts ssh yes N A telnet no ftp yes admin10 yourcompany com admin22 yourcompany com http yes N A htt...

Page 101: ...nds filesys status system show uptime nfs status The login and the returned data look similar to the following ssh l sysadmin dd10 cmds11 sysadmin dd10 s password The filesystem is enabled 3 00 pm up 14 days 10 hours 15 minutes 1 user load average 0 00 0 00 0 00 Filesystem has been up 14 days 10 13 The NFS system is currently active and running Total number of NFS requests handled 314576 To use sc...

Page 102: ...Return Command Output to a Remote machine 64 DD400 Series Restorer User Guide ...

Page 103: ...6 for the complete command syntax Add a User To add a restorer user use the user add user name operation The operation asks for a password and confirmation or you can include the password as part of the command Each user has a privilege level of either admin or user User is the default The only way to change a user s privilege level is to delete the user and then add the user with the other privil...

Page 104: ...smith Enter new password Re enter new password Passwords matched Reset to the Default User To reset the user list to the one factory default user sysadmin use the user reset operation Available to administrative users only user reset The response looks similar to the following which lists all removed users user reset Removing user jsmith Removing user bjones Can not remove user sysadmin Display Cu...

Page 105: ...ompany com pts 0 Session 3262 26772 Display All Users The display of all users known to the restorer is available to administrative users only The information given is Name is the user s login name Class is the user s access level of an administrator or a user who can see most information displays Last login from shows the address from which the user logged in Last login time is the date and time ...

Page 106: ...display is similar to the following user show list Name Class Last login from Last login time sysadmin admin user24 company com Fri Nov 12 14 55 47 2004 rjones user user25 company com Fri Nov 12 12 36 30 2004 jsmith user user26 company com never 3 users found ...

Page 107: ... command syntax The autosupport feature sends a daily report that shows system identification information and consolidates the output from a number of restorer commands See Run the Autosupport Report on page 76 for details Data Domain support staff use the report for troubleshooting See autosupport on page 203 for the complete command syntax Every morning at 8 00 a m local time for your system the...

Page 108: ... To test the alerts list use the alerts test reason operation which sends an email with the reason to each address on the list or to a specific address Use double quotes around the reason After adding addresses to the list always use this operation to test for mailer problems alerts test reason email addr For example to test the list with a reason of Testing the alerts email list alerts test Testi...

Page 109: ...ved when the fan is replaced with a working unit Each type of alert maintains only one message in the current alerts list For example the display reports the most recent date of a system reboot not every reboot Look in the system log files for current and previous messages Display To display current alerts use the alerts show current operation or click Autosupport in the left panel of the DDR Mana...

Page 110: ...ries similar to the following alerts show history Alert Time Description Nov 11 18 54 51 Rear fan 1 failure Current RPM is 0 nominal is 8000 Nov 11 18 54 53 System rebooted Nov 12 18 54 58 Rear fan 2 failure Current RPM is 0 nominal is 8000 Display the Email List The alerts email list includes an address for Data Domain support Addresses that you add to the list appear as local or fully qualified ...

Page 111: ...l is 8000 There is 1 active alert Recent Alerts and Log Messages Nov 5 20 56 43 localhost sysmon EMS Rear fan 2 failure Current RPM is 960 nominal is 8000 Display the Email List and Administrator Email To display all email addresses in the alerts list and the system administrator email address use the alerts show all operation alerts show all The display is similar to the following The administrat...

Page 112: ...dress from the autosupport report list use the autosupport del operation The operation is available only to administrative users The email list is a list of addresses that are comma separated or space separated or both Administrative users only autosupport del email list For example to remove an email address from the list autosupport del jsmith yourcompany com Reset the Email List By default the ...

Page 113: ...kly option with day and time or the day and time options without weekly run the report once a week The never option turns off the report Set a schedule using any of the other options to turn on the report autosupport set schedule daily weekly monthly never day1 day2 time For example to run the report automatically every Tuesday at 4 a m use either of the following two commands autosupport set sche...

Page 114: ...display is similar to the following The first section gives system identification and uptime information autosupport show report GENERAL INFO GENERATED_ON Wed Sept 7 13 17 48 UTC 2005 VERSION Data Domain OS 3 1 0 0 19019 SYSTEM_ID Serial number 22BM030026 MODEL_NO DD460 HOSTNAME dd10 yourcompany com LOCATION Bldg12 room221 rack6 ADMIN_EMAIL admin yourcompany com UPTIME 1 17pm up 124 days 14 31 2 u...

Page 115: ...runs with the autosupport show schedule operation autosupport show schedule The display is similar to the following autosupport show schedule Autosupport is scheduled to run Sun at 0300 Display the Autosupport Email List The autosupport email list includes an address for Data Domain support Addresses that you add to the list appear as local or fully qualified addresses exactly as you enter them Di...

Page 116: ...y Nov 10 03 00 19 scheduled autosupport Nov 11 03 00 19 scheduled autosupport Hourly System Status The restorer automatically generates a brief system status message every hour The message is sent to the system log and to a serial console if one is attached To see the hourly message use the log view command The message reports system uptime the amount of data stored the number of NFS operations an...

Page 117: ... Restorer File System Process To start the restorer file system allowing restorer operations to begin use the filesys enable operation Administrative users only filesys enable Stop the Restorer File System Process To stop the restorer file system which stops restorer operations use the filesys disable operation Administrative users only filesys disable Delete All Data in the File System To delete ...

Page 118: ...splay gives a basic status of enabled or disabled with more detailed information for each basic status filesys status The display is similar to the following filesys status The filesystem is enabled and running If the file system was shut down with a restorer command such as filesys disable the display includes the command For example filesys status The filesystem is disabled and shutdown filesys ...

Page 119: ...e If 100 cleaned line is an estimate of actual physical space used and physical space available for data storage if you run the filesys clean start all operation to clean 100 of the file system The estimate is based on the most recent clean operation On a replica no estimate appears The Meta Data line tracks space used for the internal file descriptions that the restorer creates for all stored fil...

Page 120: ...r a given number of hours or days In general the more often a backup is done for a particular file or file system the higher the compression Note that the display on a busy system may not return for one to two hours Other factors may also influence the display Call Data Domain Technical Support to analyze displays that seem incorrect filesys show compression path last n hours n days In the display...

Page 121: ...994 528 189 Locally Compressed l_comp 1 133 152 300 Meta data 58 587 648 Clean Operations The filesys clean operation reclaims physical storage used by deleted objects in the Data Domain file system Use the clean operations of the filesys command to manually start a clean operation change the schedule that automatically runs the operation or check the status of the operation The default settings f...

Page 122: ...ake up to three hours Phase three writes any pending index metadata to disk Phase three on average takes two to four minutes Phase four removes any duplicate data segments that may be left behind when a clean process is interrupted Phase four on average takes 15 to 45 minutes Phase five makes clean copies of all files that hold live data and creates new indexes Phase five on average take 40 to 60 ...

Page 123: ...an start 100 GB free Are you sure yes no no Stop Cleaning To stop the clean process use the clean stop operation Stopping the process during the first four phases means that all work done so far is lost Starting the process again means starting over at the beginning If the clean process is slowing down the rest of the system consider using the filesys clean set throttle operation to reset the amou...

Page 124: ...ilable only to administrative users filesys clean reset schedule throttle all Set the Run Time or Gigabytes Cleaned To set the scheduled clean operation to run for a given time until a given number of gigabytes are available for data storage or until the maximum of 25 of space available for data is cleaned use the filesys clean set amount operation By default the scheduled clean operation cleans 2...

Page 125: ...e restorer is not busy with backup or restore operations cleaning always runs at 100 uses resources as would any other process Administrative users only filesys clean set throttle percent For example to set the clean operation to run at 30 of its possible speed filesys clean set throttle 30 Update Statistics To update the If 100 cleaned numbers that show in the output from filesys show space use t...

Page 126: ...for the clean operation use the filesys clean show schedule operation filesys clean show schedule The display is similar to the following filesys clean show schedule Filesystem cleaning is scheduled to run Tue at 0600 Display the Throttle Setting To display the throttle setting for cleaning operations use the filesys clean show throttle operation filesys clean show throttle The display is similar ...

Page 127: ... clean show recommended operation The display shows time estimates for running the filesys clean update stats and filesys clean start all commands and gives recommended times for cleaning the file system with the current amount of data and for cleaning a full file system For example filesys clean show recommended Estimated and recommended cleaning times estimated time to update stats only 1hrs 9mi...

Page 128: ...Clean Operations 90 DD400 Series Restorer User Guide ...

Page 129: ...ng disk command options are not valid disk beacon disk fail disk unfail disk show debug disk show failure history disk show reliability data With external storage output from all other disk commands returns information about the LUNs and volumes accessed by the restorer Fail a Disk To set a disk to the failed state use the disk fail disk ID operation To physically remove a failed disk see Replace ...

Page 130: ... sequence to turn off the operation Administrative users only disk beacon disk id For example to flash the LED for disk3 disk beacon disk3 Display Disk Status The disk show summary operation displays the number of disks in use and failed the number of spare disks available and whether a RAID disk group reconstruction is underway Note that the RAID portion of the display could show one or more disk...

Page 131: ...disk Capacity is the data storage capacity of the disk when used in a restorer The Data Domain convention for computing disk space defines one gigabyte as 230 bytes giving a different disk capacity than the manufacturer s rating The display for a restorer using external storage has the columns Disk displays each LUN accessed by the restorer as a disk LUN is the LUN number given to a LUN on the ext...

Page 132: ...24040KLSA80 KFAOA32A KRFS06RAG9SHRC 372 61 GB disk12 HDS724040KLSA80 KFAOA32A KRFS06RAG9SK2C 372 61 GB disk13 HDS724040KLSA80 KFAOA32A KRFS06RAG9WYVC 372 61 GB disk14 HDS724040KLSA80 KFAOA32A KRFS06RAG9SJDC 372 61 GB disk15 HDS724040KLSA80 KFAOA32A KRFS06RAG9SKBC 372 61 GB 15 drives present Display RAID Status for Disks To display the RAID status and use of disks which disks have failed from a RAI...

Page 133: ...e not in use 0 drives are missing absent Display Detailed RAID Information To display RAID disk groups and the status of disks within each group use the disk show detailed raid info operation disk show detailed raid info The Slot column in the Disk Group section shows the logical slot for each disk in a RAID subgroup In the example below the RAID group name is ext3 with subgroups of ext3_1 through...

Page 134: ...6 GB Status normal Slot Disk State Additional Status 0 disk13 in use dg0 1 disk14 in use dg0 2 disk15 in use dg0 Raid Group ppart raid 6 2 47 TB Status normal Slot Disk State Additional Status 0 disk16 in use dg0 1 disk11 in use dg0 2 disk12 in use dg0 3 disk13 in use dg0 4 disk14 in use dg0 5 disk15 in use dg0 6 disk6 in use dg0 7 disk9 in use dg0 8 disk10 in use dg0 9 disk1 in use dg0 10 disk2 i...

Page 135: ...h disk Cumul MBytes s is the average number of megabytes per second written to each disk Busy is the average percent of time that each disk has at least one command queued Display Use the disk show performance operation or click Disks in the left panel of the DDR Manager to see disk performance statistics disk show performance The display is similar to the following disk show performance Disk Read...

Page 136: ... number of errors corrected by the disk s software error correction control The Soft column is the number of off track errors The Err column is the number of soft ECC errors Awaiting Realloc shows the number of sectors on a drive that have returned at least one error but that are not yet confirmed as bad Already Realloc indicates the end of the useful disk lifetime when the number of reallocated s...

Page 137: ...15 0 0 0 0 0 3 0 0 0 56 C 14 drives operating normally 1 drive reporting excessive temperatures Display Disk Debug Information The disk show debug operation displays extremely detailed information about disk operations and status The to file option sends command output to ddvar log disk show debug out Administrative users only disk show debug to file Display the History of Disk Failures The disk s...

Page 138: ...Display the History of Disk Failures 100 DD400 Series Restorer User Guide ...

Page 139: ... command syntax The ntp command manages access to one or more time servers See ntp on page 235 for the complete command syntax The System Command The system command manages system level actions on the restorer Shut down the Restorer Hardware To shut down power to the restorer use the system poweroff operation The operation automatically does an orderly shut down of file system processes The operat...

Page 140: ... on the amount of data on your system After the upgrade completes and the system reboots the backup file system is disabled for up to an hour for upgrade processing To upgrade from the Data Domain web site 1 Log in to a restorer administrative host that mounts ddvar from the restorer 2 On the administrative host open a browser and go to the Data Domain Support web site Use either HTTP or FTP to co...

Page 141: ...storer 5 To start the upgrade log in to restorer as sysadmin and enter a command similar to the following Use the file name not a path received from Data Domain For example system upgrade 3 0 2 0 15045 rpm Set the Date and Time To set the system date and time use the system set date operation The entry is two places for month 01 through 12 two places for day of the month 01 through 31 two places f...

Page 142: ...standard operating speed for each type of fan If the value in Current RPM goes below 60 of the normal operating speed the fan should be replaced See Replace Fans on page 182 to identify fans in the chassis by name and number Delta is the difference between CurrentRPM and Normal Status is the system view of fan operations Display Use the system show fans operation or click on System Properties in t...

Page 143: ...el To give only a count you must enter the count label and a number for count The start and stop options return averages per second of statistics over the time between the commands system show stats start stop interval nsecs count count The display is similar to the following system show stats 09 30 16 23 10 CPU FS FS Net kB s Disk kB s Disk busy ops s proc in out read write busy 9 624 0 0 0 40834...

Page 144: ... number of NFS operations per second NFS proc The fraction of time that the file server is busy servicing requests NFS rcv The proportion of NFS busy time spent waiting for data on the NFS socket NFS snd The proportion of NFS busy time spent sending data out on the socket NFS idle The percentage of NFS idle time CIFS ops s The number of CIFS Common Internet File System operations per second ethx k...

Page 145: ... only an interval you can enter a number for nsecs without the interval label To give only a count you must enter the count label and a number for count The start and stop options return averages per second of statistics over the time between the commands system show detailed stats start stop interval int count count The display is similar to the following system show detailed stats CPU0 CPU1 Stat...

Page 146: ...ture reaches 50 degrees centigrade the restorer shuts down If a CPU temperature reaches 60 degrees centigrade a warning message is generated If a CPU temperature reaches 74 degrees centigrade the restorer shuts down The message about power supplies informs you that all power supplies are either operating normally or that one or more are not operating normally The message does not identify which po...

Page 147: ...the system show performance operation You can set the duration and the interval of the display Duration is the hours minutes or seconds for the display to go back in time Interval is the time between each line in the display The default is to show the last 24 hours in 10 minute intervals You can set duration only but not interval only The raw option displays unformatted statistics system show perf...

Page 148: ...led version operation The display is useful for Data Domain support staff system show detailed version The display is similar to the following system show detailed version Data Domain Release 3 0 0 0 12864 prod main tools ddr_dist ddr_dist_files 12826 prod main httpd 9826 prod main app 12858 tools main devtools ddr 11444 tools main devtools README DataDomain 10093 tools main devtools toolset bom 3...

Page 149: ...an alias use the alias add name command operation Use double quotes around the command if it has includes one or more spaces A new alias is available only to the user who creates the alias A user can not create a working alias for a command that is outside of that user s permission level alias add name command For example to add an alias named rely for the restorer command that displays reliabilit...

Page 150: ...sstat system show stats traceroute route trace uname system show version uptime system show uptime who user show active You have 16 aliases The sysstat alias can take an interval value for the number of seconds between each display of statistics The following example refreshes the display every 10 seconds sysstat 10 Time Servers and the NTP Command The ntp command allows you to synchronize a resto...

Page 151: ...vr26 yourcompany com Delete a Time Server To delete a remote time server from the list use the ntp del timeserver operation Available to administrative users only ntp del timeserver server_name For example to delete an NTP time server named srvr26 yourcompany com from the list ntp del timeserver srvr26 yourcompany com Reset the List to Multicast To reset the time server list to the multicast mode ...

Page 152: ...e is currently enabled Current Clock Time Fri Nov 12 2004 16 05 58 777 Clock last synchronized Fri Nov 12 2004 16 05 19 983 Clock last synchronized with time server srvr26 company com Display NTP Settings To display the NTP enabled disabled setting and the time server list use the ntp show config operation ntp show config The following example shows the information that is returned ntp show config...

Page 153: ...mand Use the net command for the following operations Enable an Interface To enable a disabled Ethernet interface on the restorer use the net enable interface operation Administrative users only net enable interface For example to enable the interface eth0 net enable eth0 Disable an Interface To disable an Ethernet interface on the restorer use the net disable interface operation Administrative us...

Page 154: ...is live use the net show hardware command Disable DHCP To set an Ethernet interface to not use DHCP use the net config interface dhcp no operation After the operation you must set an IP address for the interface All other DHCP settings for the interface are retained Administrative users only net config interface dhcp no For example to disable DHCP for the interface eth0 net config eth0 dhcp no To ...

Page 155: ...he operation writes over the current list of DNS servers Only the servers given in the latest command are available to a restorer The list can be comma separated space separated or both Changes take effect only after a system reboot Administrative users only Note To activate a DNS change the restorer must be rebooted net set dns ipaddr1 ipaddr2 ipaddr3 For example to allow a restorer to use a DNS ...

Page 156: ...P on page 116 for details Administrative users only net config interface ipaddr For example to set the interface eth0 to the IP address of 192 168 1 1 net config eth0 192 168 1 1 Use the net show config command to check the operation Change the Domain Name To change the domain name used by the restorer use the net set domainname dm name operation Administrative users only net set domainname dm nam...

Page 157: ...erface Duplex Line Use To manually set the line use for an interface to half duplex or full duplex use the net config interface duplex operation Half duplex is not available for any port set for a speed of 1000 Gigabit Administrative users only net config interface duplex full half For example to set the line use to half duplex for interface eth1 net config eth1 duplex half Set Interface Line Spee...

Page 158: ...ts file use the net hosts del operation Administrative users only net hosts del ipaddr For example to remove the hosts with an IP address of 192 168 3 3 net hosts del 192 168 3 3 Delete all Hostname IP addresses from the etc hosts File To delete all hostname IP address entries from the etc hosts file use the net hosts reset operation Administrative users only net hosts reset Display Hostname IP ad...

Page 159: ...tes 3764464 3 5 Mb TX bytes 136647745 130 3 Mb Interrupt 20 Base address 0xc000 Display Interface Settings The display of Ethernet interface settings shows what you have configured not the actual status of each interface For example if an interface on the restorer does not have a live Ethernet connection the interface is not actually enabled Port lists each Ethernet interface by name Enabled shows...

Page 160: ...e actual status of Ethernet connections has the columns Port is for the four Ethernet interfaces eth0 is 10 100 Base T eth1 is gigabit copper and eth2 and eth3 are gigabit copper or Fiber Speed is the actual speed at which the port currently deals with data Duplex shows whether the port is using the full or half duplex protocol Supp Speeds lists all the speeds that the port is capable of using Har...

Page 161: ...1000 00 07 e9 0d 5a 1b Physical Cable Copper yes Copper no Copper yes Copper no Display the Restorer Hostname To display the current hostname used by the restorer use the net show hostname operation net show hostname The display is similar to the following net show hostname The Hostname is dd10 yourcompany com Display the Domain Name Used for Email To display the domain name used for email sent by...

Page 162: ...et show stats all interfaces listening route statistics all Display summaries of the other options interfaces Display the kernel interface table and a table of all network interfaces and their activity listening Display statistics about active internet connections from servers route Display the IP routing tables showing the destination gateway netmask and other information for each route statistic...

Page 163: ...how table command to display the Kernel IP routing table Add a Routing Rule To add a routing rule use the route add host or add net operation If the target being added is a network use the net option If the target is a host use the host option The gateway can be either an IP address or a hostname that is available to the DD400 and that can be resolved to an IP address Administrative users only rou...

Page 164: ...addr netmask mask To remove a route for host user24 route del host user24 To remove a route with a route specification of 192 168 1 x and a gateway of srvr12 route del net 192 168 1 0 netmask 255 255 255 0 gw srvr12 Change the Routing Default Gateway To change the routing default gateway use the route set gateway ipaddr operation Administrative users only route set gateway ipaddr For example to se...

Page 165: ...onfig list use the route show config operation route show config The display looks similar to the following each line in the example wraps route show config The Route Config list is host user24 gw srvr12 net 192 168 1 0 netmask 255 255 255 0 gw srvr12 Display the Kernel IP Routing Table To display all entries in the Kernel IP routing table use the route show table operation route show table The di...

Page 166: ...the Default Routing Gateway To display the configured or DHCP supplied routing gateways used by a restorer use the route show gateway operation route show gateway The display looks similar to the following route show gateway Default Gateways 192 168 1 2 192 168 3 4 ...

Page 167: ...r administrative access to ddvar Add clients for backup operations to backup A client added to a subdirectory under backup has access only to that subdirectory The client list can have a comma a space or both between list entries To give access to all clients the client list can be an asterisk nfs add ddvar backup subdir client list nfs options The client list can contain IP addresses hostnames or...

Page 168: ...re option nfs add ddvar 192 168 1 02 rw secure Remove Clients To remove NFS clients that can access the restorer use the nfs del export client list operation A client can be removed from access to ddvar and still have access to backup The client list can contain IP addresses hostnames and an asterisk and can be comma separated space separated or both nfs del ddvar backup subdir client list For exa...

Page 169: ...the NFS statistics counters and reset them to zero use the nfs reset stats operation nfs reset stats Display Active Clients The list of active clients shows all clients that have been active in the past 15 minutes and the mount path for each client Display To display active NFS clients use the nfs show active operation nfs show active The display is similar to the following nfs show active NFS Act...

Page 170: ...tatistics To display NFS statistics for a restorer use the nfs show stats operation nfs show stats The following example shows relevant entries but not all possible entries nfs show stats NFS statistics NFSPROC3_NULL 0 0 NFSPROC3_GETATTR 327 0 NFSPROC3_SETATTR 30 0 NFSPROC3_LOOKUP 66 24 NFSPROC3_ACCESS 455 0 NFSPROC3_READLINK 0 0 NFSPROC3_READ 0 0 NFSPROC3_WRITE 6080507 0 NFSPROC3_CREATE 10 0 NFSP...

Page 171: ...s 1 Stats for export point ddvar File System Type UNIX Number of cached entries 0 Number of file handle lookups 0 cache miss 0 Max allowed file cache size 200 max streams 64 Number of authentication failures 0 Number of currently open file streams 0 Display Detailed Statistics The nfs show detailed stats operation displays statistics used by Data Domain support staff for troubleshooting nfs show d...

Page 172: ... The mathematical mean time for completion of the operations stddev The standard deviation for time to complete operations derived from the mean time max s The maximum time taken for a single operation 10ms The number of operations that took less than 10ms 100ms The number of operations that took between 10ms and 100ms 1s The number of operations that took between 1 second and 10 seconds 10s The n...

Page 173: ...ckup client uses the backup share on the restorer Note When configuring a replica restorer as part of a Replicator pair configure the authentication mode WINS server if needed and other entries as with the originator in the pair The exceptions are that a replica does not need a backup user and will probably have a different backup server list all machines that can access data that is on the replic...

Page 174: ...CIFS Command The cifs command enables and disables access sets the authentication mode and displays status and statistics All cifs operations are available only to administrative users Enable Client Connections To allow CIFS clients to connect to a restorer use the cifs enable operation cifs enable Disable Client Connections To block CIFS clients from connecting to a restorer use the cifs disable ...

Page 175: ... Remove a Backup Client To remove a Windows backup client use the cifs del backup operation List entries can be comma separated space separated or both cifs del backup client list For example to remove the backup client srvr24 cifs del backup srvr24 Remove an Administrative Client To remove a Windows administrative client use the cifs del ddvar operation List entries can be comma separated space s...

Page 176: ...name Data Domain recommends not specifying a domain controller When not using a domain controller first specify a WINS server The restorer must meet all active directory requirements such as a clock time that is no more than five minutes different than the domain controller Optionally include multiple domain controllers or all The domain controller list entries can be comma separated space separat...

Page 177: ...del ipaddr operation cifs hosts del ipaddr For example to remove the IP address 192 168 10 25 cifs hosts del 192 168 10 25 Removed mapping 192 168 10 25 srvr22 Resolve a NetBIOS Name To display the IP address used for any NetBIOS name on the WINS server use the cifs nb lookup operation The CIFS feature must already be enabled cifs nb lookup net bios name For example to display the IP address for t...

Page 178: ...fs option set cifs option set name value The current valid name is loglevel that can take a value from 0 zero to 10 ten Zero is the default system value The lower the value the fewer log messages go to the logs As an example cifs loglevel 4 Set loglevel to 4 Reset CIFS Options To reset CIFS options to the default which is 0 zero for the logging level use the cifs reset command cifs option reset na...

Page 179: ...sed from a client machine and what data transfer may be happening Locked files cifs show active PID Username Group Machine 568 sysadmin admin srvr24 192 168 1 5 566 sysadmin admin srvr22 192 168 1 6 Service pid machine Connected at ddvar 566 srvr22 Tue Jan 13 12 11 03 2004 backup 568 srvr24 Tue Jan 13 12 09 44 2004 IPC 566 srvr22 Tue Jan 13 12 10 55 2004 IPC 568 srvr24 Tue Jan 13 12 09 36 2004 bac...

Page 180: ... Manager to see all clients cifs show clients The display is similar to the following cifs show clients path client backup all backup srvr24 yourcompany com ddvar srvr24 yourcompany com Display the CIFS Configuration The CIFS configuration display begins with the authentication mode gives details unique to each mode lists a WINS server if one is configured and lists NetBIOS hostnames Display Use t...

Page 181: ...tatus To display the status of CIFS access to the restorer use the cifs status operation cifs status For example cifs status CIFS is enabled and running Display All IP Address NetBIOS hostname Mappings To display all IP address NetBIOS hostname mappings in the lmhosts file use the cifs hosts show operation cifs hosts show The command output is similar to the following cifs hosts show Hostname Mapp...

Page 182: ...CIFS Command 144 DD400 Series Restorer User Guide ...

Page 183: ...oy command A replica is a read only machine for any connection except the originator in the Replicator pair You can mount a replica as read only for access from other places however after using the break option on a replica the replica itself becomes a read write machine All user information such as user names passwords and permission level administrative or user is replicated from the originator ...

Page 184: ...ent backup server list all machines that can access data that is on the replica Start Replication To start replication between two restorers use the replication initialize operation on the originator If the originator holds a lot of data the initialize operation can take a long time Consider putting both restorers in the Replicator pair in the same location with a direct non network link to cut do...

Page 185: ...ca to remove all data in the file system before again using the restorer as a replica When using the replication break command always run the filesys disable command first and the filesys enable command after Administrative users only replication break Reset Authentication between the Restorers To reset authentication between restorers use the replication reauth operation on both the originator an...

Page 186: ...originator at the same geographic location and then later moved to another location or the hostname or IP address changes for any reason the originator must have the new hostname or IP address for the replica restorer in the new location A destination replica name that is a name must be a name that can be translated to an IP address When using the replication set command always run the filesys dis...

Page 187: ... all times The add operation may change the current rate For example if on Monday at Noon the current rate is 20 KB and the schedule that set the current rate started on mon 0600 a new schedule change for Monday at 1100 at a rate of 30 KB mon 1100 30KB makes the change immediately Note The system enforces a minimum rate of 98 304 bits per second 12 KB Delete a Scheduled Throttle Event To remove on...

Page 188: ...ate change As an example the following command sets the rate to 2000 kilobytes per second replication throttle set current 2000KB Note The system enforces a minimum rate of 98 304 bits per second 12 KB Set an Override Throttle Rate To set a throttle rate that overrides scheduled rate changes use the throttle set override operation The rate stays at the override level until another override command...

Page 189: ...o a scheduled rate or to the default if no rate is scheduled The default network bandwidth use is unlimited The reset of schedule removes all scheduled change entries The rate remains at a current or override setting if either is active or returns to the default of unlimited The reset of all removes any current or override settings and removes all scheduled change entries returning the system to t...

Page 190: ...eceived stamp The date and time of the most recent records received Replica processed stamp The date and time of the most recent records processed Replica records remaining The number of file records received by the replica and not yet processed Originator records remaining The number of file records created by the originator and not yet sent to the replica Compressed data remaining New data on th...

Page 191: ...ator role of the current system the name of the other system in the Replicator pair and the state of replication use the show config operation Administrative users only replication show config The display is similar to the following replication show config Mode originator Partner rep22 yourcompany com Enabled yes Display Throttle settings To display all scheduled throttle entries rates and the cur...

Page 192: ... a problem appears such as that communication between the restorers is not possible you do not need to re initialize after fixing the problem Replication should begin as soon as the restorers can communicate replication initialize Procedure Replace an Originator If the originator in a pair is replaced or changed out use the following commands to integrate a new originator with the existing replica...

Page 193: ...r If the new replica has any data in its file system run the following command on the replica to clear all data from the file system filesys destroy Run the following command on both the originator and replica restorers filesys disable Run the following command on the originator to remove all configuration information about the previous replica replication break Run the following command on the or...

Page 194: ...Procedure Replace a Replica 156 DD400 Series Restorer User Guide ...

Page 195: ... the filer and is used by the restorer when contacting the filer The password is for the user name on the filer With no password the command returns a prompt for the password Note that any add operation for a filer name that already exists replaces the complete entry for that filer name A password can include any printable character Administrative users only ndmp add filer_name user username passw...

Page 196: ...er named toaster5 and returns all data under the directory vol vol0 The data is stored in a file located at backup toaster5 week0 on the restorer ndmp get toaster5 vol vol0 backup toaster5 week0 The following incremental backup backs up changes since the last full backup ndmp get incremental 1 toaster5 vol vol0 backup toaster5 week0 day1 Restore to a Filer To restore data from a restorer to a file...

Page 197: ...res the file jsmith foo from the week0 backup ndmp put partial jsmith foo backup toaster5 week0 toaster5 vol vol0 jsmith foo Remove Filer Passwords To remove all filer entries including the associated user names and passwords stored on the restorer and to write zeros to the disk areas that held them use the ndmp reset filers operation Administrative users only ndmp reset filers Stop an NDMP Proces...

Page 198: ... the ndmp status operation The operation labels each process with an identification number Administrative users only ndmp status The display looks similar to the following and shows the process ID the command that is currently running and the total number of megabytes transferred The following example shows the command entered twice in a row Note that MB Copied shows the progress of the operation ...

Page 199: ...ding alerts messages as SNMP traps even when the SNMP agent is disabled Note The SNMP sysLocation and sysContact variables are not the same as those set with the config set location and config set admin email commands However if the SNMP variables are not set with the SNMP commands the variables default to the system values given with the config set commands Enable SNMP To enable the SNMP agent on...

Page 200: ...n or an empty string if the system value is empty use the snmp reset sysLocation operation Administrative users only snmp reset sysLocation Set a System Contact To set the system contact as used in the SNMP MIB II System variable sysContact use the snmp set sysContact operation Administrative users only snmp set sysContact contact For example to give a contact of bob smith snmp set sysContact bob ...

Page 201: ...dministrative users only snmp del trap host hostname For example to delete a trap host admin12 snmp del trap host admin12 Delete All Trap Hosts To return the trap hosts list to the default of empty use the snmp reset trap host operation Administrative users only snmp reset trap hosts Add a Community String To add one or more community strings that enable access to a restorer use one of the snmp ad...

Page 202: ...community private Delete All Community Strings To return the community strings lists to the defaults of empty use one of the snmp reset community operations One operation resets the read write permissions list and one resets the read only permissions list Administrative users only snmp reset rw community snmp reset ro community Display SNMP Agent status The status of the SNMP agent on the restorer...

Page 203: ...sed in the SNMP MIB II System variable sysContact Trap Hosts The list of machines that receive SNMP traps generated by the restorer Read only Communities One or more read only community strings that enable access to the restorer Read write Communities One or more read write community strings that enable access to the restorer Display To display all of the SNMP parameters use the snmp show config o...

Page 204: ...y snmp show rw communities snmp show ro communities The output is similar to the following snmp show rw communities RW Community Strings private snmpadmin1 Display the MIB and Traps The SNMP MIB management information base used by a restorer is accessible by mounting from another system the restorer ddr directory The MIB location and name are ddr var snmp mibs DATA_DOMAIN mib Use any SNMP MIB brow...

Page 205: ...tions on saving log files The operation takes place every Sunday at 3 a m Display Log Files To view the log files use the log view operation With no filename the command displays the current messages file When viewing the log use the up and down arrows to scroll through the file use the q key to quit enter a slash character and a pattern to search through the file log view filename The display of ...

Page 206: ...ry hour Each time the clean process runs it creates about 100 messages All the messages are in comma separated value format with tags that you can use to separate out the disk space or clean messages You can use third party software to analyze either set of messages The tags are CLEAN for data lines from clean operations CLEAN_HEADER for lines that contain headers for the clean operations data lin...

Page 207: ...te machine If the address is not in the list use the command adminaccess add ftp ipaddr 3 On the remote machine open a web browser 4 In the Address box at the top of the web browser use FTP to access the restorer For example ftp restorer_name yourcompany com Note Some web browsers do not automatically ask for a login if a machine does not accept anonymous logins In that case add a user name and pa...

Page 208: ...stem log server to the hosts that receive log messages log host add log server Remove a Host To remove a system from the list that receives restorer log messages use the log host del command log host del host name For example the following command removes the system log server from the hosts that receive log messages log host del log server Enable Sending Log Messages To enable sending log message...

Page 209: ...empty list and disabled use the log host reset command log host reset Display the List and State To display the list of systems that receive log messages and the state of enabled or disabled use he log host show command log host show The output is similar to the following log host show Remote logging is enabled Remote logging hosts log server ...

Page 210: ...Send Log messages to Another System 172 DD400 Series Restorer User Guide ...

Page 211: ...and out of range operating tolerances After an error message a component can continue to degrade leading to an automatic system shutdown For example the restorer generates a warning message if the interior temperature of the machine reaches 47 degrees centigrade If the temperature reaches 50 degrees centigrade the machine shuts down As an addition to error log messages you can check components by ...

Page 212: ...ealloc Realloc disk1 0 0 0 0 0 0 0 0 0 28 C disk2 0 0 0 0 0 0 0 0 1 35 C disk3 0 0 0 0 0 0 0 0 0 30 C disk4 0 0 0 0 0 1 0 0 0 27 C The Already Realloc column indicates the end of the useful disk lifetime when the value approaches the vendor specific limit The limit is 2000 for Maxtor Western Digital disks Use the disk show config command to display the disk vendor A restorer has either 8 or 15 dis...

Page 213: ...orer as a spare retains the state of Spare A disk that was on another restorer and that contained data is seen as Foreign Use the disk unfail command to move the disk to the state of Spare To replace a failed disk 1 If a disk is not marked as Failed in output from the disk show raid info command use the following command with the correct disk id to fail the disk disk fail disk id 2 Identify the ph...

Page 214: ...if needed See Figure 21 10 With the handle remaining in the unlocked position gently slide the replacement disk into the chassis until it stops short of being fully installed Excessive force may damage the replacement disk 11 The disk stops short because a lip on the bottom of the disk carrier meets a ridge near the back of the slot Tilt the disk carrier so that the back of the carrier is tilted u...

Page 215: ...al power units to power up and to run Always replace a failed power unit as soon as possible The alerts show current command includes a message if a power unit fails The system status command includes a line that gives the status of power supplies To identify the failed unit look at the back panel of the machine and check the LED on each unit Each power unit has an LED that glows green when the un...

Page 216: ... long as two power units are functional you do not have to power down the system To replace a power unit 1 Look at the power unit LEDs to determine which unit failed 2 If your system has the power cord retainer brackets pinch the two wings on each bracket and slide the bracket back off of the power cord plug See Figure 24 Note To receive the optional power cord retainer kit contact your Data Domai...

Page 217: ... into the frame Make sure that the unit is seated securely and that it lines up with the other power units 6 Attach the power cord 7 Slide the power cord retainer bracket over the cord 8 If your system has the power cord retainer brackets pinch the two wings on the bracket and slide the bracket down over the power cord plug until the bracket is flush with the back of the power unit The wings secur...

Page 218: ...ent in this section Replacement procedures in this section require an awareness of electrical shock hazards and in the case of cooling fans possible mechanical hazards from rotating fan blades Remove Replace the Top Panel You must remove the restorer top panel to access all replacement parts other than power supply units and disks If the restorer is in a rack with another box directly above the re...

Page 219: ...m from the front of the chassis See Figure 27 on page 181 2 Push down on and hold in the two release buttons that secure the top panel to the chassis See Figure 27 on page 181 3 From the back of the system slide back the top panel by pulling on the rolled edge of the top panel that hangs over the back panel See Figure 28 on page 182 The top panel slides back about an inch Figure 27 Top panel screw...

Page 220: ...recommends shutting down the system before replacing a fan If a fan does not slide smoothly out of the chassis the resulting sharp movement of releasing the fan may damage disks Remove fans very carefully if the system is still running A restorer has two sets of fans Use the system show fans command to check on the fans To see the fans remove the restorer top panel Looking from the front of the re...

Page 221: ...ailed system show fans Fan Description Current RPM Normal Delta Status 1 Crossbar fan 1 4967 4500 467 ok 2 Crossbar fan 2 0 4500 4500 Failed 3 Crossbar fan 3 4913 4500 413 ok 4 Crossbar fan 4 4825 4500 325 ok 2 Remove the restorer top panel 3 On the failed fan find the locking tab on the left side of the fan frame Push the locking tab to the right and pull up on the frame tab on the top of the fan...

Page 222: ...nel 184 DD400 Series Restorer User Guide 4 Pull the fan out of the rack as shown in Figure 31 5 Note the power plug at the bottom of the fan rack Figure 30 Tabs on a disk fan Locking tab Frame tab Figure 31 Disk fan pulled out of the rack ...

Page 223: ...he replacement is working Replace Back Panel Fans Back panel fans are numbered 5 and 6 from left to right as viewed from the front of the restorer To remove a fan 1 Check the system show fans command output to determine which fan failed system show fans Fan Description Current RPM Normal Delta Status 1 Crossbar fan 1 4967 4500 467 ok 2 Crossbar fan 2 4913 4500 413 ok 3 Crossbar fan 3 4791 4500 291...

Page 224: ...the power plug on the side of the fan rack 5 Position the replacement fan with the plastic grill facing toward the front of the system and the power plug facing down See Figure 33 Figure 32 Tabs on a back panel fan Locking tab Frame tab Figure 33 Back panel fan lined up for replacement ...

Page 225: ...rd Battery The lithium battery on the motherboard should not need replacement In the unusual case of a battery failure the disk controller in peripheral card slot two and optional gigabit Ethernet NIC in slot three must be removed to reach the battery Figure 34 shows the battery location in the back left corner of the system The figure does not show the peripheral cards that are usually in place o...

Page 226: ...schematic showing the numbers and locations of the peripheral card slots 5 Push back the battery locking tab the small tab facing the front of the system to release the battery Remove the battery 6 Press the replacement battery into the battery frame so that the locking tab clicks into place 7 Replace the application cards Match each card with the proper slot Line up each card s mounting bracket f...

Page 227: ...ed Service Personnel 8 Replace the top panel 9 Re install the three power cords 10 Restart the system Caution A risk of explosion exists if the battery is replaced by an incorrect type Dispose of used batteries according to the manufacturer s instructions ...

Page 228: ...Operations for Trained Service Personnel 190 DD400 Series Restorer User Guide ...

Page 229: ... Mbabane Africa Mogadishu Africa Monrovia Africa Nairobi Africa Ndjamena Africa Niamey Africa Nouakchott Africa Ouagadougou Africa Porto Novo Africa Sao_Tome Africa Timbuktu Africa Tripoli Africa Tunis Africa Windhoek America Adak America Anchorage America Anguilla America Antigua America Aruba America Asuncion America Atka America Barbados America Belize America Bogota America Boise America Bueno...

Page 230: ...erica Puerto_Rico America Rainy_River America Rankin_Inlet America Regina America Rosario America Santiago America Santo_Domingo America Sao_Paulo America Scoresbysund America Shiprock America St_Johns America St_Kitts America St_Lucia America St_Thomas America St_Vincent America Swift_Current America Tegucigalpa America Thule America Thunder_Bay America Tijuana America Tortola America Vancouver A...

Page 231: ...sia Vientiane Asia Vladivostok Asia Yakutsk Asia Yekaterinburg Asia Yerevan Atlantic Azores Atlantic Bermuda Atlantic Canary Atlantic Cape_Verde Atlantic Faeroe Atlantic Jan_Mayen Atlantic Madeira Atlantic Reykjavik Atlantic South_Georgia Atlantic St_Helena Atlantic Stanley Australia ACT Australia Adelaide Australia Brisbane Australia Broken_Hill Australia Canberra Australia Darwin Australia Hobar...

Page 232: ... GMT 10 Etc GMT 11 Etc GMT 12 Etc GMT 13 Etc GMT 14 Etc Greenwich Etc UCT Etc Universal Etc UTC Etc Zulu Europe Amsterdam Europe Andorra Europe Athens Europe Belfast Europe Belgrade Europe Berlin Europe Bratislava Europe Brussels Europe Bucharest Europe Budapest Europe Chisinau Europe Copenhagen Europe Dublin Europe Gibraltar Europe Helsinki Europe Istanbul Europe Kiev Europe Kuybyshev Europe Lisb...

Page 233: ...MT 6 GMT 7 GMT 8 GMT 9 GMT 10 GMT 11 GMT 12 Indian Antananarivo Indian Chagos Indian Christmas Indian Cocos Indian Comoro Indian Kerguelen Indian Mahe Indian Maldives Indian Mauritius Indian Mayotte Indian Reunion Mexico BajaNorte Mexico BajaSur Mexico General Arctic Longyearbyen CET CST6CDT Cuba EET Egypt Eire EST EST5EDT Factory GB GB Eire Greenwich Hongkong HST Iceland Iran Israel Jamaica Japan...

Page 234: ...cific Kosrae Pacific Kwajalein Pacific Majuro Pacific Marquesas Pacific Midway Pacific Nauru Pacific Niue Pacific Norfolk Pacific Noumea Pacific Pago_Pago Pacific Palau Pacific Pitcairn Pacific Ponape Pacific Port_Moresby Pacific Rarotonga Pacific Saipan Pacific Samoa Pacific Tahiti Pacific Tarawa Pacific Tongatapu Pacific Truk Pacific Wake Pacific Wallis Pacific Yap SystemV AST4 SystemV AST4ADT S...

Page 235: ...ssh keys adminaccess show adminaccess show ssh keys DESCRIPTION The adminaccess command creates access control lists for the use of HTTP FTP TELNET and SSH administrative protocols on the restorer Adminaccess operations are available to administrative users only OPERATIONS add Add hosts to a protocol For multiple hosts enter a list using commas or spaces or both A host is a fully qualified domain ...

Page 236: ... HTTPS certificate for the restorer reset Set the given access list to the factory defaults reset ssh keys Remove the authorized SSH keys file from the restorer After removing the file every SSH connection needs password authentication Available to the sysadmin user only show Display hosts and status from the all the service access lists show ssh keys Display the SSH key file with a line number fo...

Page 237: ... receives system alert emails The email list is a list of email addresses that are comma separated or space separated or both Administrative users only del Delete email addresses from the list The email list is a list of email addresses that are comma separated or space separated or both Administrative users only reset Set the email list to the factory default of autosupport internal datadomain co...

Page 238: ...hrough the log Use the q key to exit Enter a slash character and a pattern to search for and highlight lines of particular interest test reason Send an email with a message reason to all addresses on the alerts list or to one specified address The reason is bracketed by double quotes After adding addresses to the email list always use this operation to test for any mailer problems EXAMPLE To add t...

Page 239: ...etstat net show stats nfsstat nfs show stats passwd user change password ping net ping host name poweroff system poweroff reboot system reboot sysstat nsecs system show stats traceroute route trace host name uname system show version uptime system show uptime who user show active OPERATIONS add Add a command alias Give the name for the alias and then give the complete restorer command bracketed by...

Page 240: ...400 Series Restorer User Guide EXAMPLE The following command adds an alias named rely for the restorer command that displays disk reliability statistics alias rely disk show reliability data 7 Semptember 2005 ...

Page 241: ...cation The system report gives complete system status and statistics on system use and enters a line in the events history log file that the report was run OPERATIONS add Add email addresses to the list that receives system reports The email list is a list of email address that is comma separated or space separated or both Administrative users only del Delete email addresses from the list The emai...

Page 242: ...ly The daily and never periods do not take a day qualifier The weekly period with a day qualifier or the day qualifier without weekly both run the command once a week The never period turns off the system report The day qualifier is three letters such as mon for Monday when used with the weekly period and when used alone with the required time entry Use a dash between days for a range of days For ...

Page 243: ...he following commands autosupport set schedule tue 1500 autosupport set schedule weekly tue 1500 To schedule the system report for 2 p m every Monday and Friday autosupport set schedule mon fri 1400 To schedule the system report for 2 p m on the first and fifteenth of every month autosupport set schedule monthly 1 15 1400 6 September 2005 ...

Page 244: ...del ipaddr cifs hosts reset cifs hosts set cifs option reset name cifs option set name value cifs option show cifs nb lookup nb hostname cifs reset clients cifs reset nb hostname cifs reset wins server cifs set authentication active directory realm dc1 dc2 cifs set authentication domain domain pdc bdc cifs set authentication workgroup wg name cifs set nb hostname nb hostname cifs set wins server i...

Page 245: ...e IP addresses or machine names Wild cards are allowed For each user account that needs administrative access use the user add command to add the account to the restorer del backup Remove access for CIFS backup accounts through clients The client list can be IP addresses or machine names Wild cards are allowed del ddvar Remove administrative access for users through CIFS clients The client list ca...

Page 246: ...ecifying a domain controller When not using a domain controller first specify a WINS server The restorer must meet all active directory requirements such as a clock time that is no more than five minutes different than the domain controller The domain controllers can be a list of email addresses that are comma separated or space separated or both set authentication domain Set authentication to the...

Page 247: ...IFS configuration show detailed stats Display statistics for every individual type of SMB operation show stats Display statistics for SMB reads writes and total operations status Display whether or not CIFS is enabled 14 July 2005 ...

Page 248: ...tion is available to administrative users only OPERATIONS dump Display the configuration settings reset location Set the location description to the default of empty reset mailserver Set the mailserver to the default of mail reset timezone Set the timezone to the default of US Pacific set admin email Set the From address for alerts and autosupport email messages The system needs one and only one a...

Page 249: ...ke effect with all currently running processes you must reboot the machine Administrative users only setup Enter essential configuration parameters using an interactive script At any prompt enter a question mark for details about answering the prompt After the first setup or when using DHCP each prompt that has a current value displays the value Press Return to accept Enter either fully qualified ...

Page 250: ...our host machine and then logs out of the restorer ssh l sysadmin restorer10 config dump mylocalcopy To restore the saved configuration to a restorer and have it immediately become the current configuration use a command similar to the following and then reboot the system ssh l sysadmin restorer10 mylocalcopy To set the time zone for the Pacific coast of the U S A system set timezone Los_Angeles T...

Page 251: ...ation and status usage and reliability statistics OPERATIONS beacon Flash the LEDs on physical disks Use the disk id parameter to identify a specific disk The all parameter flashes the LEDs on all the disks Use Control c to end the command Not valid for external storage fail Disable the given disk If a spare disk is available the spare takes the place of the failed disk and a RAID reconstruction s...

Page 252: ...e average percent of time that each disk has at least one command queued show raid info Display the state of each disk or LUN for external storage from a RAID point of view as an available disk as a spare or in the RAID reconstruction process show reliability data Display the hardware state for each disk Not valid for external storage ATA Bus Soft Err shows uncorrected raw UDMA CRC errors Command ...

Page 253: ...mal range is from 5 degrees to 45 degrees show summary Displays the number of disks in use and failed the spare disks available and whether a RAID reconstruction is underway For external storage display the number of LUNs available and in use unfail Change a disk status from failed to available Not valid for external storage 16 August 2005 ...

Page 254: ...tats filesys destroy and zero filesys disable enable filesys show compression path last n hours n days filesys show space filesys show uptime filesys status DESCRIPTION The filesys command displays the status statistics capacity and utilization of the restorer file system The clean operations clear disk space held by data that is deleted or no longer current for any valid backup During a clean ope...

Page 255: ... for Monday when used with the weekly period and when used alone with the required time entry Use a dash between days for a range of days For example tue fri The day qualifier is a day of the month from 1 to 31 when used with monthly time is 24 hour military time 2400 is not a valid time mon 0000 is midnight between Sunday night and Monday morning clean set throttle Set clean to run using a given ...

Page 256: ...operation that shuts down the restorer file system such as the filesys disable command or that shuts down the restorer such as a system poweroff or reboot also stops the clean operation The clean does not restart when the system and file system restart Either manually restart the clean or wait until the next scheduled start clean status Displays the status active or not active and progress of the ...

Page 257: ...5 8 1 If 100 cleaned Meta data 19 7 0 0 19 7 0 Index 60 0 0 8 59 2 1 Estimated compression ratio 2x Estimate based on 11 28 04 cleaning The ddvar line gives a rough idea of the amount of space used by and available to the log files The Pre compression line shows the amount of data data sent to the restorer from backup servers stored on the restorer The Compressed section Data line shows the size o...

Page 258: ...the RPM changes Note that the compression algorithm includes the metadata and index space as part of the total storage space show uptime Display the time that has passed since the file system was last enabled status Display the status of the file system Some of the possible status messages are enabled and started or running or disabled and halting or halted or cleaning If the clean process is runn...

Page 259: ...f the keyword is the same as a command name the complete help page for the command displays Use the up and down arrow keys to move through a displayed command Use the q key to exit Enter a slash character and a pattern to search for and highlight lines of particular interest EXAMPLE To list all of the restorer commands by name help To show the syntax for the command adminaccess help adminaccess To...

Page 260: ...er A restorer with no licensed features always automatically boots up into the config setup command An add or delete of a feature takes effect immediately Deleting a Full license on a system that is over half full immediately causes the system to report that the file system is full and can take no new data OPERATIONS add Add a feature license del Delete a feature license reset Reset delete all lic...

Page 261: ...mber of 1 one through 9 such as messages 1 Each numbered file is rolled to the next number each week For example at the second week the file messages 1 is rolled to messages 2 If a file messages 2 already existed it would roll to messages 3 An existing messages 9 is deleted when messages 8 is rolled to messages 9 OPERATIONS host add Add a system to the list that receives restorer log messages host...

Page 262: ...successful logins attempted logins and attempts to do operations for which a user does not have permission space log Messages about disk space usage by restorer components and data storage and messages from the clean process A space usage message is generated every hour Each clean instance creates about 100 messages The messages are in comma separated value format with tags that you can use to sep...

Page 263: ...rrow keys to move through the log Use the q key to exit Enter a slash character and a pattern to search for and highlight lines of particular interest watch Display the most recent log entries and see new entries as they are reported by the system With no filename the command displays entries from the current messages file Use Control c to exit 25 May 2005 ...

Page 264: ...Management Application functionality for the filer OPERATIONS add Make a filer available to the restorer The username and password are for a user that can log in to the filer delete Remove a filer from the list available to the restorer get Backup data from a filer to a flat file on the restorer The level_ number is an integer between 0 zero and 9 Using the command with no level is the same as lev...

Page 265: ... The operation labels each process with an identification number stop Stop an NDMP process on the restorer The id number is the number shown for the process in the status display A stopped process is cancelled To restart begin the process again with the get or put operations stop all Stop all NDMP processes on a restorer test Verify the authentication token for a filer EXAMPLES The following comma...

Page 266: ... hostname net set dns ipaddr1 ipaddr2 ipaddr3 net set domainname name net set hostname host net show all net show config ifname net show domainname hostname dns net show hardware net show settings net show stats all interfaces listening route statistics DESCRIPTION The net command sets up network parameters and Ethernet interface addresses and displays network information The Ethernet interfaces o...

Page 267: ...erface while DHCP allocates a dynamic IP address DHCP supplied parameters for an interface are IP address netmask DNS server list gateway domainname and host name if the interface does not already have a hostname dhcp no Disable the use of a DHCP server for the interface autoneg Let the network interface card autonegotiate line speed and duplex setting duplex Set the line use to either full or hal...

Page 268: ...storer to use for the DNS NTP and mail servers Administrative users only set hostname Set the name used for the restorer Administrative users only show all Display the output from the commands net show config net show settings net show domainname net show hostname net show hardware net show dns and net show stats show config Display the configuration for the Ethernet interface ifname which include...

Page 269: ... connections from servers route Display the IP routing table statistics Display counters from layers of the network stack EXAMPLES To enable the use of a DHCP server for Ethernet interface eth0 net config dhcp eth0 true To set an IP address of 192 168 2 2 for the Ethernet interface eth1 net config ipaddr eth1 192 168 2 2 To associate a host name of bkup20 yourcompany com and an alias of bkup20 wit...

Page 270: ...ctory holds data from backup servers Add administrative clients to ddvar and backup clients to backup OPERATIONS add Add NFS clients that can access the restorer Use a comma or space separated or both list for multiple clients A client can be a fully qualified domain hostname an IP address or a wildcard hostname such as yourcompany com or just an asterisk meaning no restrictions A client added to ...

Page 271: ... for the anonymous account The id is an integer bounded from 65635 to 65635 anongid id Set an explicit gid for the anonymous account The id is an integer bounded from 65635 to 65635 del Remove client access to ddvar or backup or a backup sub directory disable Do not allow NFS clients to connect enable Allow NFS clients to connect reset clients Set the client list to the default Available to admini...

Page 272: ...s status Display whether or not NFS is enabled EXAMPLES To add the host on the local network 192 168 1 0 with read write access to ddvar and the secure option nfs add ddvar 192 168 1 0 rw secure To add all hosts to backup with the default options of rw no_root_squash no_all_squash and secure nfs add backup 26 May 2005 ...

Page 273: ...t the NTP service on a restorer is enabled in multicast mode OPERATIONS add timeserver Add a remote time server to the NTP list delete timeserver Remove a time server from the NTP list disable Stop the NTP service on the restorer enable Start the NTP service on the restorer reset Reset the local NTP service to the defaults of multicast and enabled reset timeserver Reset the time server list to the...

Page 274: ... Series Restorer User Guide EXAMPLE The following command gives the time server srvr26 company com as a time server for the restorer to use for synchronization ntp add timeserver srvr26 company com 22 June 2005 ...

Page 275: ...t override schedule all replication throttle set current rate replication throttle set override rate replication throttle show kb DESCRIPTION The replication command manages the replication of data between two restorers an originator restorer that receives data from backup servers and a replica restorer that receives data only from the originator A restorer can be either an originator or a replica...

Page 276: ...ion remains disabled even after the file system is restarted enable On the originator resumes the sending of data to the replica On the replica resumes serving the active connection from the originator If the filesystem is disabled on either restorer when replication is enabled replication is enabled when the file system is restarted initialize Use only on the originator to first start replication...

Page 277: ...ress or be an IP address On the replica the destination replica name must be exactly the same as the name returned by the hostname command on the replica A replica is a read only machine for any connection other than the originator in the replication pair show config Displays whether replication is enabled or disabled whether the restorer is an originator or replica and the hostname for this resto...

Page 278: ...sed Originator records remaining The number of file records created by the originator and not yet sent to the replica Compressed data remaining New data on the originator that is not yet processed into file records for sending to the replica status Displays Replicator configuration information and the status of Replicator operations Mode The role of the restorer in the Replicator pair originator o...

Page 279: ...KBps or KB equals 1024 bytes per second The rate can also be 0 the zero character disable or disabled to stop replication or unlimited to set the rate to the default of no limit For example the following command limits replication to 20 kilobytes per second starting on Mondays and Thursdays at 6 00 a m replication throttle add mon thu 0600 20KB Replication runs at the given rate until another sche...

Page 280: ...nt rate Sets the throttle rate until the next scheduled change or until a system reboot See the rate explanation for the replication throttle add command above Current cannot be set if the replication throttle set override command is in effect throttle set override rate Sets the throttle rate until another override command See the rate explanation for the replication throttle add command above Ove...

Page 281: ...llowing command on the new originator to seed the new originator with data from the replica After the command finishes the originator is ready to receive new data and the replication is enabled You do not need to do anything else to start replication replication recover To integrate a new replica restorer that replaces a previous replica If the new replica has any data in its file system run the f...

Page 282: ...s Restorer User Guide Run the following command on the originator and on the new replica filesys enable Run the following command on the originator to seed the new replica with data replication initialize 26 May 2005 ...

Page 283: ...es that are re applied at each system boot Use the route show config command to display the Route Config list Use the route show table command to display the Kernel IP routing table OPERATIONS add Add a routing rule If the target being added is a network use the net option If the target is a host use the host option The gateway can be either an IP address or a hostname Administrative users only de...

Page 284: ...only trace Display a traceroute to the named host EXAMPLES To add a route with a route specification of 192 168 1 x a netmask and a gateway of srvr12 route add net 192 168 1 0 netmask 255 255 255 0 gw srvr12 To delete a route with a route specification of 192 168 1 x and a netmask of 255 255 255 0 route del net 192 168 1 0 netmask 255 255 255 0 To add a route for host user24 with a gateway of srvr...

Page 285: ...t contact snmp set sysLocation location snmp show config snmp show ro communities snmp show rw communities snmp show sysContact snmp show sysLocation snmp show trap hosts snmp status DESCRIPTION The snmp command allows you to enable or disable SNMP access to a restorer add community strings give contact and location information and display configuration settings The default port that is open when ...

Page 286: ...o the restorer del trap host Delete one or more trap hosts disable Disable the SNMP agent and close port 161 enable Enable the SNMP agent and open port 161 reset ro community Reset the read only community list to empty reset rw community Reset the read write community list to empty reset sysContact Reset the system contact to the system value displayed by the command system show admin email or an ...

Page 287: ...d write community strings and read only community strings show ro communities Display all read only community strings show rw communities Display all read write community strings show sysContact Display the system contact show sysLocation Display the system location show trap hosts Display all trap hosts status Displays whether the restorer SNMP agent is enabled or disabled 21 July 2005 ...

Page 288: ...stem command is the administrative tool for the restorer hardware OPERATIONS poweroff Shut down the restorer and turn off the power The operation automatically does an orderly shutdown of the file system process Administrative users only reboot Restart the restorer Administrative users only set date Set the system clock and date Administrative users only The entry components are two places for mon...

Page 289: ...he last interval The default interval is two seconds The start and stop options return averages per second of statistics over the time between the commands The columns in the display are CPUx busy The percentage of time that each CPU is busy One column for each CPU State CDVMS A single character shows if an event is occurring Each event can affect performance C cleaning D disk reconstruction repai...

Page 290: ...going through non volatile random access memory from reads and writes show detailed version Display versions of restorer components and the operating system show fans Display the speed and status of all six system fans The AvgRPM column shows the normal operating speed for each type of fan If the value in the CurRPM column goes below 60 of the normal operating speed replace the fan show modelno Di...

Page 291: ...doing work on the data recv The proportion of NFS busy time spent waiting for data on the NFS socket send The proportion of NFS busy time spent sending data out on the socket idle The proportion of NFS time spent idle thra Percent of compression units read and discarded without being used A high percent indicates cache thrashing unus Percent of unused data in a compression unit As a compression un...

Page 292: ...read and write traffic xx Active streams for operations other than read or write such as create show serialno Display the system serial number show stats Display system statistics for the use of CPUs disks Ethernet ports and by NFS operations The time period covered is from the last reboot except when using interval and count An interval in seconds runs the command every given number of seconds fo...

Page 293: ...e host that mounts ddvar from the restorer Open a browser and go to the Data Domain Support web site Download the new release file to the directory ddvar releases To start the upgrade log in to a restorer as sysadmin and enter a command similar to the following system upgrade 3 0 1 0 13920 rpm EXAMPLES To display I O statistics every 30 seconds for 10 iterations use the following command system sh...

Page 294: ...ser level display information The admin privilege is for administrative users who have access to all RPM commands The default administrative account is sysadmin You can change the sysadmin password but cannot delete the account OPERATIONS add Add a new user With no password the command prompts for a password The default privilege level is user Administrative users only change password Change a use...

Page 295: ...4 set the schedule 75 set the schedule to the default 75 test report 74 B backup recommendations for full 4 C CIFS add a backup client 136 add a client 136 add a user 135 add an administrative client 137 Add IP address hostname mappings 139 configuration set up 35 disable client connections 136 display active clients 141 display clients 142 display configuration 142 Display IP address hostname map...

Page 296: ...allation 23 introduction 5 opening and use 9 system administration with 41 system configuration 29 51 default gateway change 126 display 128 reset 126 DHCP disable 116 enable 116 server installation tasks 28 disk command 91 debug information display 99 display performance statistics 97 display RAID status 94 display type and capacity 93 estimate use of space 18 flash the running light 92 manage us...

Page 297: ... 121 enable 115 overview 4 set line speed 119 IP address change for an interface 118 K KB defined 7 L license add 56 configuration setup 32 display 57 remove 57 remove feature licenses 56 location display 55 set 53 log archive the log 169 command 167 list file names 168 remote logging 170 scroll new entries 169 set the CIFS logging level 140 view all current entries 167 login first time 29 M mail ...

Page 298: ...change replica name 148 configure 145 display status 152 introduced 145 move data to originator 147 remove configuration 147 replace a replica 155 replace originator 154 reset authorization 147 resume 147 setup and start 154 start 146 statistics 151 suspend 146 route add a rule 125 change default gateway 126 command 125 display a route 127 display default gateway 128 display Kernel IP routing tabl...

Page 299: ...command 101 display status 108 display uptime 105 display version 110 location 53 location display 55 serial number 104 T TB defined 7 TELNET add a host 59 display user list 62 remove a host 59 set user list to empty 60 temperature extremes 173 time display 109 110 display zone 56 set 103 109 110 set zone 54 Tivoli Storage Manager 40 traceroute 127 U upgrade software 102 uptime display 105 user co...

Page 300: ...262 DD400 Series Restorer User Guide ...

Reviews: