EMC Data Domain Operating System Version 5.5

Total Page:16

File Type:pdf, Size:1020Kb

EMC Data Domain Operating System Version 5.5 EMC Data Domain Operating System Version 5.5 Administration Guide 302-000-474 REV. 06 Copyright © 2010-2016 EMC Corporation All rights reserved. Published April 2017 Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA. EMC Corporation Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.EMC.com 2 EMC Data Domain Operating System 5.5 Administration Guide CONTENTS Preface 13 Chapter 1 Introducing the EMC Data Domain System 17 Revision History.......................................................................................... 18 About EMC Data Domain Systems.............................................................. 19 EMC Data Domain System Features...........................................................20 Data Integrity................................................................................ 20 Data Compression......................................................................... 20 Restore Operations........................................................................ 21 EMC Data Domain Replicator......................................................... 21 Multipath and Load Balancing........................................................ 21 System Access...............................................................................21 Licensed Features..........................................................................22 How EMC Data Domain Systems Integrate into the Storage Environment.... 23 Chapter 2 Getting Started 25 About DD System Manager........................................................................ 26 Using DD System Manager.........................................................................26 Logging In and Out of DD System Manager................................... 26 About the DD System Manager Interface...................................... 27 Configuring the System with the Configuration Wizard..............................29 View Installed Licenses.................................................................. 30 Add License Key Options............................................................... 30 General Network Settings............................................................. 30 Interface Network Settings............................................................ 31 DNS Network Settings...................................................................31 Administrator System Settings...................................................... 32 Email System Settings...................................................................33 CIFS Protocol Authentication........................................................ 33 CIFS Protocol Share...................................................................... 34 NFS Protocol Export..................................................................... 34 DD Boost Protocol - Storage Unit..................................................34 DD Boost Protocol - Fibre Channel................................................35 VTL Protocol - Library................................................................... 36 VTL Protocol - Access Group.........................................................37 Using the CLI..............................................................................................37 Logging into the System Using the CLI..........................................37 Finding Online Help for CLI Commands..........................................38 Chapter 3 Managing Data Domain Systems 39 About Managing Data Domain Systems......................................................40 Managing System Availability......................................................................41 Adding a system to DD System Manager........................................41 Removing a System from DD System Manager............................. 42 Rebooting a System.......................................................................42 Powering a Data Domain System On or Off .................................. 42 Managing System Upgrades....................................................................... 43 EMC Data Domain Operating System 5.5 Administration Guide 3 CONTENTS Viewing Upgrade Packages on the System.................................... 43 Obtaining and Verifying Upgrade Packages................................... 43 Upgrading a Data Domain System................................................. 45 Removing an Upgrade Package..................................................... 46 Managing System Licenses........................................................................ 46 Managing System Storage..........................................................................47 Viewing System Storage Information.............................................47 Physically Locating a Disk.............................................................. 51 Configuring Storage.......................................................................51 Managing Network Connections.................................................................52 Configuring Network Interfaces ....................................................52 Configuring Network Settings....................................................... 69 Configuring Routes........................................................................ 72 Managing Access to the System.................................................................75 Managing Administrator Access.....................................................75 Managing Local User Access to the System.................................. 84 Managing Active Directory, Kerberos, Workgroup, and NIS Authentication............................................................................... 92 Managing the System Passphrase................................................. 98 Managing General Configuration Settings.................................................. 99 Configuring Mail Server Settings...................................................99 Working with Time and Date Settings............................................99 Working with System Properties..................................................100 Working with SNMP..................................................................... 101 Managing Reporting and Logging..............................................................109 Managing Alert Reporting............................................................ 109 Managing Autosupport Reporting................................................. 114 Managing Support Bundles........................................................... 115 Managing Log Files....................................................................... 116 Managing Remote System Power with IPMI............................................. 120 IPMI and SOL limitations...............................................................121 IPMI and SOL Terminology...........................................................122 Adding and Deleting IPMI Users with DD System Manager.......... 123 Changing an IPMI User Password.................................................123 Configuring an IPMI Port on a Managed System.......................... 124 Preparing for Remote Power Management and Console Monitoring with the CLI................................................................................. 125 Managing Power with DD System Manager................................. 126 Managing Power with the CLI...................................................... 128 Chapter 4 Monitoring Data Domain Systems 129 About Monitoring Data Domain Systems...................................................130 Monitoring Using the DD Network Summary.............................................130 Viewing the DD Network Status...................................................130 Monitoring a Single System.......................................................................132 Viewing the System Status Summary...........................................132 Viewing System Details................................................................ 133 About the Fibre Channel View................................................................... 133 About the Physical Resources View..............................................133 About the Access Groups View.................................................... 134 Monitoring Chassis Status........................................................................ 134 Fans ............................................................................................ 135 Temperature................................................................................ 135 Power Supply............................................................................... 136 PCI Slots...................................................................................... 136 4 EMC Data Domain Operating System 5.5 Administration Guide
Recommended publications
  • Installation Guide
    install_guide.book Page i Monday, May 11, 2015 8:48 PM Installation Guide Installation Guide Schrödinger Software Release 2015-2 Schrödinger Press install_guide.book Page ii Monday, May 11, 2015 8:48 PM Installation Guide Copyright © 2015 Schrödinger, LLC. All rights reserved. While care has been taken in the preparation of this publication, Schrödinger assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Canvas, CombiGlide, ConfGen, Epik, Glide, Impact, Jaguar, Liaison, LigPrep, Maestro, Phase, Prime, PrimeX, QikProp, QikFit, QikSim, QSite, SiteMap, Strike, and WaterMap are trademarks of Schrödinger, LLC. Schrödinger, BioLuminate, and MacroModel are registered trademarks of Schrödinger, LLC. MCPRO is a trademark of William L. Jorgensen. DESMOND is a trademark of D. E. Shaw Research, LLC. Desmond is used with the permission of D. E. Shaw Research. All rights reserved. This publication may contain the trademarks of other companies. Schrödinger software includes software and libraries provided by third parties. For details of the copyrights, and terms and conditions associated with such included third party software, use your browser to open third_party_legal.html, which is in the docs folder of your Schrödinger software installation. This publication may refer to other third party software not included in or with Schrödinger software ("such other third party software"), and provide links to third party Web sites ("linked sites"). References to such other third party software or linked sites do not constitute an endorsement by Schrödinger, LLC or its affiliates. Use of such other third party software and linked sites may be subject to third party license agreements and fees.
    [Show full text]
  • Tortoisemerge a Diff/Merge Tool for Windows Version 1.11
    TortoiseMerge A diff/merge tool for Windows Version 1.11 Stefan Küng Lübbe Onken Simon Large TortoiseMerge: A diff/merge tool for Windows: Version 1.11 by Stefan Küng, Lübbe Onken, and Simon Large Publication date 2018/09/22 18:28:22 (r28377) Table of Contents Preface ........................................................................................................................................ vi 1. TortoiseMerge is free! ....................................................................................................... vi 2. Acknowledgments ............................................................................................................. vi 1. Introduction .............................................................................................................................. 1 1.1. Overview ....................................................................................................................... 1 1.2. TortoiseMerge's History .................................................................................................... 1 2. Basic Concepts .......................................................................................................................... 3 2.1. Viewing and Merging Differences ...................................................................................... 3 2.2. Editing Conflicts ............................................................................................................. 3 2.3. Applying Patches ...........................................................................................................
    [Show full text]
  • Programs, Processes and Attacks Windows Live Response/Analysis
    Live response Programs, processes and attacks Windows Live response/analysis 101 Linux Live response/analysis 101 Live response data analysis Programs • A compiled Windows program - Portable Executable File format (also called the PE/COFF format) When started certain (imported) DLLs are loaded that is needed by the executable PEview Link Libraries and OS relocation 1 • A dynamic link library (or shared library) takes the idea of an ordinary library (also called a statically linked library) one step further • A dynamic/shared link library is a lot like a program, but instead of being run by the user to do one thing it has a lot of functions "exported" so that other programs can call them – This list, called the export table, gives the address inside the DLL file of each of the functions which the DLL allows other programs to access • The calling executable have a list of imports or imported functions from every DLL file it uses • When Windows loads your program it creates a whole new "address space" for the program • When your program contains the instruction "read memory from address 0x40A0F0 (or something like that) the computer hardware actually looks up in a table to figure out where in physical memory that location is – The address 0x40A0F0 in another program would mean a completely different part of the physical memory of the computer Link Libraries and OS relocation 2 • Programs, when they are loaded, are "mapped" into address space. This process basically copies the code and static data of your program from the executable file
    [Show full text]
  • Download Guide
    Profiling and Discovery Sizing Guidelines for Version 10.1 © Copyright Informatica LLC 1993, 2021. Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica LLC. All other company and product names may be trade names or trademarks of their respective owners and/or copyrighted materials of such owners. Abstract The system resource guidelines for profiling and discovery include resource recommendations for the Profiling Service Module, the Data Integration Service, profiling warehouse, and hardware settings for different profile types. This article describes the system resource and performance tuning guidelines for profiling and discovery. Supported Versions • Data Quality 10.1 Table of Contents Profiling Service Module........................................................ 3 Overview................................................................ 3 Functional Architecture of Profiling Service Module..................................... 4 Scaling the Run-time Environment for Profiling Service Module............................. 5 Profiling Service Module Resources............................................... 5 Sizing Guidelines for Profiling.................................................... 7 Overview................................................................ 7 Profile Sizing Process........................................................ 8 Deployment Architecture.....................................................
    [Show full text]
  • 26. Relational Databases and Beyond
    26 Relational databases and beyond M F WORBOYS This chapter introduces the database perspective on geospatial information handling. It begins by summarising the major challenges for database technology. In particular, it notes the need for data models of sufficient complexity, appropriate and flexible human-database interfaces, and satisfactory response times. The most prevalent current database paradigm, the relational model, is introduced and its ability to handle spatial data is considered. The object-oriented approach is described, along with the fusion of relational and object- oriented ideas. The applications of object-oriented constructs to GIS are considered. The chapter concludes with two recent challenges for database technology in this field: uncertainty and spatio-temporal data handling. 1 INTRODUCTION TO DATABASE SYSTEMS variation in their requirements. Data should be retrieved as effectively as possible. It should be 1.1 The database approach possible for users to link pieces of information Database systems provide the engines for GIS. In the together in the database to get the benefit of the database approach, the computer acts as a facilitator added value from making the connections. Many of data storage and sharing. It also allows the data users may wish to use the store, maybe even the to be modified and analysed while in the store. For a same data, at the same time and this needs to be computer system to be an effective data store, it controlled. Data stores may need to be linked to must have the confidence of its users. Data owners other stores for access to pieces of information not and depositors must have confidence that the data in their local holdings.
    [Show full text]
  • RSA Adaptive Authentication (On-Premise) 7.3 Operations Guide
    RSA® Adaptive Authentication (On-Premise) 7.3 Operations Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks RSA, the RSA Logo, eFraudNetwork and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm#rsa. License Agreement This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by EMC. Note on Encryption Technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when using, importing or exporting this product. Distribution Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
    [Show full text]
  • Installing MQ 9.1.0.0 LTS to Coexist with MQ 8.0.0.9 in Windows, Including Applying Fix Packs 8.0.0.14 and 9.1.0.4
    Page 1 of 47 Installing MQ 9.1.0.0 LTS to coexist with MQ 8.0.0.9 in Windows, including applying Fix Packs 8.0.0.14 and 9.1.0.4 https://www.ibm.com/support/pages/node/2800929 Date last updated: 17-Apr-2020 Angel Rivera – [email protected] IBM MQ Support +++ Objective This techdoc shows all the steps to install MQ 9.1.0.0 LTS in Windows, while co-existing ("side-by-side") with MQ 8.0.0.9. Furthermore, the steps include the installation of the Fix Packs 8.0.0.14 and 9.1.0.4. Note: The particular fix packs mentioned in this tutorial were the latest ones at the time the tutorial was written – the overall recommendation is to apply the most recent fix pack level. None of the installations are designated as “Primary”. Therefore, you must use “setmqenv” to setup the MQ environment for the desired installation. NOTE regarding MQ 9.0: The principles discussed in this techdoc apply also to MQ 9.0. Keep in mind that the End Of Support (EOS) for MQ 8.0 is 30-Apr-2020 and for MQ 9.0 is 30-Sep-2021. At the time this tutorial was written, the EOS for MQ 9.1 has not been announced yet. An important aspect of this feature of multiple installations of MQ (multi-install) in the same host, is that this type of installation does not require that the MQ 8.0 queue managers and applications need to be stopped when doing activities with MQ 9.1.
    [Show full text]
  • Matthew Kendall
    Stellaris Toolchain - Matthew Kendall http://www.matthewkendall.com/freesoftware/stellaris-to... Matthew Kendall Search this site Navigation Free Software > Home Stellaris Toolchain Contact Electronics Free Software Notes on how to set up the toolchain for development in C on Luminary Micro's Stellaris ARM Cortex M3 microcontrollers. Photos StellarisWare StellarisWare is Luminary Micro's name for the useful set of libraries that they supply. DriverLib is the Peripheral Driver Library for the on-chip peripherals (and appears to have previously been used as the name of the package as a whole). GrLib is the Graphics Library that provides a set of graphics primitives and a widget set for creating graphical user interfaces on boards that have a graphical display. There is also a bootloader, some (target) utilities and (host) tools. StellarisWare is supplied with evaluation kits and also downloadable from Luminary Micro. Download the version associated with the target board you have to get appropriate example programs. GCC, binutils, et al CodeSourcery says "CodeSourcery, in partnership with ARM, Ltd., develops improvements to the GNU Toolchain for ARM processors and provides regular, validated releases of the GNU Toolchain". CodeSourcery also develops proprietary software, principally startup code and various libraries for use on the target, and a debug "sprite" for use on the development host. This is all bundled together in a package named Sourcery G++ which is available in Personal and Professional editions. Ignore this and download the Lite edition which contains just the 1 de 5 14/05/13 20:45 Stellaris Toolchain - Matthew Kendall http://www.matthewkendall.com/freesoftware/stellaris-to..
    [Show full text]
  • File Naming Conventions / Folder Structures
    All presentations from the emerging researcher series will be available from: http://www.eresearch.uct.ac.za/eresearch-training Research data lifecycle Access Dataset transfer Databases Collaborate Web-based file sharing Automated ingest Collaborative sites and management Acquire Analyse HPC Cloud Virtual labs Technical advice Costing Grant assistance Comprehend Plan Visualisation facilities Publish Manage Institutional repository Reuse Archive RDM support Gathering Data Gathering Data 11 August 2016 Gathering Data Emerging Researcher Series Thursday, 11th August 2016 Ashley Rustin - Senior eResearch Technical Specialist Niklas Zimmer – Head: Digital Library Services Data (File) Storage UCT Research data storage Gathering Data Gathering Data 11 August 2016 Research data storage • Almost 400 TB allocated to date • +- 700 Users accessing our Research Data Storage • Current rate 40 TB/m provisioned • 90 TB fast parallel storage on HPC (fhgfs) Storage Provisioned arceibo 400 Uptake Rate (74 TB) 350 Astronomy 300 250 TB 200 CASA 150 (74 TB) 100 50 0 9/18/2014 12/27/2014 4/6/2015 7/15/2015 10/23/2015 SATVI (70 TB) Gathering Data Gathering Data 11 August 2016 Research data storage allocation: Storage allocation in Terabytes (TB) 80 73 73 70 70 70 60 48 50 40 Storage in TB 30 25 20 20 10 10 8 10 6 4 5 5 5 5 5 3 2 0.5 1 1 1 1 1 1 0 All Departments & Units Gathering Data 11 August 2016 Accessing your Research data storage • A mapped network drive on your Windows, Linux or Apple computer • Web browser using NextCloud to access all your external storage, eg.
    [Show full text]
  • Microsoft Richcopy
    Sign in United States (English) HomeWindows 8Windows 7Windows VistaWindows XPMDOPWindows IntuneLibraryForums Ask a question Quick access Search related threads Asked by: Microsoft Richcopy Windows 7 IT Pro > Windows 7 Performance General discussion • 15 Sign in to vote Hi One of the Microsoft tools that was being used by Microsoft programmers to copy or move files in faster speed. This tool was developed in 1996 but it was being used internally by Microsoft and was not made available for public usages. However, at a later stage they made it available for free public download and now you can also experience faster file copying and moving with this small Windows utility, called RichCopy. RichCopy can copy multiple files. at a time with up to 8 times faster speed than the normal file copy and moving process. Surprisingly it copies and moves files even faster than RoboCopy tool and XCOPY command. Since the tool was being used by the developers, they made it pretty effective and stable . download Microsoft Rich copy 4.0 Key Features of RichCopy 1. More powerful, faster and stable than than any other file copying tool. 2. Create several profiles to assign special settings with a specific profile. 3. Copy files from multiple and different locations and save in a single destination. 4. Filter the files based on the date, time and choose to either copy or opt those files. 5. Being on GUI, supports command lines. 6. Suspend and resume file copy at any time. Reference : Technet Magazine Hope it Helps Nikhil o Edited by Nikhil Deshpande Monday, December 07, 2009 3:17 AM changed to Noel's Link o Edited by Ronnie VernonMVP, Moderator Tuesday, March 16, 2010 9:48 PM edit Sunday, December 06, 2009 4:26 AM Reply | Quote All replies • 0 Sign in to vote Sounds Good-:) Sunday, December 06, 2009 12:14 PM Reply | Quote • 0 Sign in to vote Yeah Nice Share we can move with more files ah! Sunday, December 06, 2009 12:22 PM Reply | Quote • 5 Sign in to vote Great find, Nikhil! Thank you.
    [Show full text]
  • Hdclone 4.2 Manual
    HDClone HDClone Copy | Backup | Migration | Rescue Miray Software AG Gaissacher Str. 18 81371 Muenchen Manual Germany Copyright © 2002-2012 by Miray Software. All rights reserved. www.miray.de HDClone User’s Manual Table of Contents 3 Table of Contents 1 Introduction . 9 1.1 Chapter overview ........................................... 9 1.2 Character conventions....................................... 10 1.3 Features.................................................... 10 1.4 Edition overview ............................................ 10 2 Fields of application . 13 2.1 Upgrading hard disks & migrating an OS ........................ 13 2.1.1 Unused disk space ................................... 13 2.1.2 Smaller target medium................................ 14 2.2 Data rescue ................................................ 14 2.3 Installation backup........................................... 14 2.4 Mass copying ............................................... 15 2.5 Master installations .......................................... 15 2.5.1 Duplicating system installations ........................ 15 2.5.2 Handling several master installations .................... 15 2.6 Proprietary hard disk formats ................................. 16 2.7 Forensic data securing ....................................... 16 2.8 Image files.................................................. 16 2.9 HotCopy & LiveImage ....................................... 17 3 Supported hardware . 18 3.1 Overview .................................................. 18 3.1.1 Hardware
    [Show full text]
  • EMC® Data Domain® Operating System 5.7 Administration Guide
    EMC® Data Domain® Operating System Version 5.7 Administration Guide 302-002-091 REV. 02 Copyright © 2010-2016 EMC Corporation. All rights reserved. Published in the USA. Published March, 2016 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC², EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. For the most up-to-date regulatory document for your product line, go to EMC Online Support (https://support.emc.com). EMC Corporation Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.EMC.com 2 EMC Data Domain Operating System 5.7 Administration Guide CONTENTS Preface 13 Chapter 1 EMC Data Domain System Features and Integration 17 Revision history.............................................................................................18 EMC Data Domain system overview............................................................... 19 EMC Data Domain system features...............................................................
    [Show full text]