Networker Jukebox Control Command Nsrjb

Total Page:16

File Type:pdf, Size:1020Kb

Networker Jukebox Control Command Nsrjb Maintenance Procedures NSRJB ( 8 ) NAME nsrjb − NetWorker jukebox control command SYNOPSIS nsrjb [ −C ][−j name ][−s server ][−v ][−f device ][−S slots | −T Ta gs | volume names ] nsrjb −L [ −j name ][−s server ][−gimnqvG ][−Y | −N ][−R | −B ][−b pool ][−f device | −J hostname ][−e forev er ][−c capacity ][−o mode ][−S slots | −T tags | volume names ] nsrjb −l [ −j name ][−s server ][−nvqrG ][−R [ −b pool ]][−f device | −J hostname ][−S slot | −T tags | volume names ] nsrjb −u [ −j name ][−s server ][−qv ][−f device ][−S slot | −T tags | volume names ] nsrjb −I [ −j name ][−s server ][−Evpq ][−I | −f device ][−S slots | −T tags | volume_names ] nsrjb −p [ −j name ][−s server ][−vq ][−f device ][−S slot | −T tag | volume name ] nsrjb −o mode [ −j name ][−s server ][−Y ][−S slots | −T tags | volume names ] nsrjb −H [ −j name ][−s server ][−EHvp ] nsrjb −h [ −j name ][−s server ][−v ] nsrjb −U uses [ −j name ][−s server ][−S slots | −T tags ] nsrjb −V [ −j name ][−s server ] nsrjb −d [ −j name ][−s server ][−v ][−N ][−Y ][−P ports ][−S slots ][−T tags ][volume names ] nsrjb −w [ −j name ][−s server ][−v ][−N ][−Y ][−P ports ][−S slots | −T tags | volume names ] nsrjb −a [ −j name ][−s server ][−vd ][−T tags |[−T tags ] volume names ] nsrjb −x [ −j name ][−s server ][−vwX ][−T tags | −S slots ] nsrjb −F [ −j name ][−s server ][−v ] −f device DESCRIPTION The nsrjb program manages resources in two broad classes of jukeboxes, remotely managed jukeboxes and locally managed jukeboxes. Remotely managed jukeboxes are controlled through an external agent. nsrjb communicates with this agent to gain access to jukebox resources. The agent allows multiple appli- cations, including multiple NetWorker servers, to share resources in the jukebox. Examples of agents are AlphaStor and StorageTek’s ACSLS . nsrjb communicates directly with a locally managed jukebox, there is no intervening agent. Resources in a locally managed jukebox can be used by only one NetWorker server. NetWorker 7.3 Last change: Dec 02, 05 1 Maintenance Procedures NSRJB ( 8 ) For a locally managed jukebox, the jukebox resource is used to track the state of the entire jukebox. The resource records the number of drives and slots in the jukebox. It is also used to track whether devices are loaded, whether there is media residing in the slots, the name of any volume on the media, as well as other information. See nsr_jukebox(5). The jukebox resource for a remotely managed jukebox does not reflect the current state of the entire juke- box, only NetWorker’s view. Media in remotely managed jukeboxes must be allocated before NetWorker may access it. For more details, see the description of the −a option. The number of slots in a remote juke- box resource increases as media is allocated for NetWorker’s use and decreases as media is deallocated after NetWorker has no further use for the media. The order in which media is listed in the jukebox resource does not necessarily reflect physical location within the jukebox. The number of drives in a remote jukebox is an upper bound on the number of volumes in the jukebox that NetWorker may access simultaneously. The nsrjb command is used to manage all jukeboxes for a NetWorker server. Use this command, rather than nsrmm(1m), to label, load, and unload the volumes contained within a jukebox. Multiple nsrjb com- mands may access a jukebox at any giv entime. A nsrjb command which requires use of jukebox resources does not directly perform the requested opera- tion. Instead the command makes a request of the NetWorker server process, nsrd, which forwards the request to nsrmmgd for processing. Since nsrjb does not perform the operation directly, killing nsrjb will not cause the operation to be aborted. Provision for operation cancellation is built into nsrjb via an interrupt handler that is tied to SIGINT. This means that if you have a nsrjb command running, and you want the operation to be cancelled, then you may do it either by means of Control-C against the nsrjb process, or using the UNIX ’kill’ command to send a SIGINT signal. A single Control-C or SIGINT will cause the operation to be cancelled, with nsrjb still monitoring the sta- tus of the appropriate NSR jukebox operation status resource until it is clear that the operation has in fact terminated. A second Control-C or SIGINT will tell nsrjb to exit without waiting for confirmation of the operation’s termination. A NSR jukebox operation status resource will be automatically generated and managed by nsrd for each jukebox operation that is created, regardless of whether that operation was initiated automatically by nsrd or is created explicitly by invoking nsrjb This NSR jukebox operation status resource tracks the current state of the operation, holds all messages (error, informational, or verbose) related to the operation, and generally acts as a communication path between the nsrjb process that invoked the operation, and the various Networker programs that carry the operation out. See the nsr_op man page for more details on this resource. A volume resides on a side of a physical piece of media. Examples of piece of media are tape cartridges or optical disks. Tape cartridges have one side and therefore have one volume residing on each cartridge. Optical media may have two sides with a volume residing on each side of the media. Each volume within a jukebox and each jukebox has a name recognized by NetWorker. A volume name is specified when the vol- ume is first labeled by NetWorker. You can change the volume name when a volume is relabeled. Net- Worker refers to volumes by their volume names. For example, when requesting the mount of a volume, NetWorker asks for it by volume name. Before using nsrjb, the jukebox and its device resources must be added to the NetWorker server. Use jbconfig to add the jukebox resource and its device resources to the NetWorker server. The jukebox resource is described in nsr_jukebox(5). NetWorker 7.3 Last change: Dec 02, 05 2 Maintenance Procedures NSRJB ( 8 ) When a NetWorker server requires a volume for backup or recovery and an appropriate volume is not already mounted, the server checks the media database to verify whether a jukebox contains a volume that satisfies the media request. If so, nsrd sends a request to nsrmmgd to load the media into an idle device. The Available Slots attribute specifies the slots containing volumes available to automatically satisfy Net- Worker requests for writable volumes. When automatically selecting a writable volume for backup, Net- Worker only considers volumes from the list of available slots. It is important to note that the Available Slots attribute does not limit what slots the user running nsrjb can operate on. nsrjb attempts to determine which jukebox to use based on the options −j , −f , or a volume name . If one or more of these options do not uniquely identify a jukebox and one must be selected, the nsrjb program prompts you to select a jukebox. You can set the NSR_JUKEBOX environment variable to the name of the jukebox you want the nsrjb program to use by default. OPTIONS Options are separated into two groups. The first are the options which specify the operation to be per- formed, e.g. label or load media. The second group list the additional options which provide arguments for the operation, e.g. specifying the media to be labeled or loaded. Note that option arguments that have spaces, for example, pool name, must be enclosed in double quotes. OPERATION OPTIONS −a This option is used in conjunction with the −T tags option, to allocate volumes in a remotely man- aged jukebox. A volume must be allocated before it can be labeled and used by a NetWorker server. For STL silos a −d option can be added for silos that support depositing (also known as importing or entering) tapes from their I/O ports. The −d must appear after the −a on the command line. This function is usually handled by the silo management software, but is added here for ease of use. This option may not be supported on all silos supported by NetWorker. There are two types of volumes which may be allocated or added to an AlphaStor jukebox resource: scratch or in-use. The term scratch is used to indicate volumes currently not being used by NetWorker. An in-use volume is one that was already used by NetWorker before being imported into AlphaStor. Use −a in conjunction with −T tags option to allocate volumes for NetWorker’s use. Both scratch and in-use volumes can be allocated this way. By specifying the barcode or physical cartridge label with this option, volumes from specific media cartridges may be allocated. In-use volumes will be discovered by the jukebox inventory operation. Use −a in conjunction with −T tags and volume names to directly add in-use volumes to an AlphaStor jukebox resource. The tag is the name given to the volume when it was imported into AlphaStor. The volume name is the volume name recorded in NetWorker’s media database. See −x for a description of how volumes are removed from a remote jukebox’s list of volumes available for use by a NetWorker server. −C Displays the current volumes in the jukebox and the devices associated with the jukebox. This is the default command option, used if no other command options are specified. It displays a list of slot numbers, volume names, media pools, optional bar code information, volume ids and volume modes. If the jukebox attribute Bar Code Reader is enabled and there are bar code labels on the media volumes, then the bar code label is included in the list.
Recommended publications
  • Command Control Interface Command Reference
    Command Control Interface Command Reference Hitachi Virtual Storage Platform G1000 Hitachi Unified Storage VM Hitachi Virtual Storage Platform Hitachi Universal Storage Platform V/VM FASTFIND LINKS Contents Product Version Getting Help MK-90RD7009-19 © 2010-2014 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. Hitachi, Ltd., reserves the right to make changes to this document at any time without notice and assumes no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Data Systems Corporation at https://portal.hds.com. Notice: Hitachi, Ltd., products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems Corporation agreements. The use of Hitachi, Ltd., products is governed by the terms of your agreements with Hitachi Data Systems Corporation. Notice on Export Controls. The technical data and technology inherent in this Document may be subject to U.S. export control laws, including the U.S. Export Administration Act and its associated regulations, and may be subject to export or import regulations in other countries.
    [Show full text]
  • U.S. EPA, Pesticide Product Label, COMMAND 4E HERBICIDE, 09/02
    Don carlson, Ph.D. FMC corporation Agricultural Chemical Group 1735 Market street Philadelphia, PA 1910 3 Dear Dr. Carlson: Subject: Camand 4 EC Herbi,lde EPA Reg. No. 279-30~1 RE: Amended Labeling (tillage/nQ-tillage directions) Your Submission Dated August 13, 1992 ~he labeling refprred to above, submitted in connection with registration under the Federal Insecticide, Fungicide, and Rodenticide Act, as amended, is acceptable. A stamped copy is enclosed for your records. Sincerely yours, Robert J. Taylor Product I'anager (25) Fungicide-Herbicide Branch Registration Division (H7505C) CONCURRENCES SYMBOL;: l/7.)~.$P" ............... ... .................. ................. ................. ................................................... ::N£AM~, '%f:1; .... ........................................................................................................................ OFFICIAL FILE COPY _ i2 a a all a an a. .a $A 4SQS4 4t P ) ) Code 1139 Net Contents Command®4 E Herbicide For Agricultural or Commercial Use Only NOT FOR SALE OR USE IN CAUFORNIA EPA Reg. No. 279-3071 EPA Est. 279- Active Ingredient: By Wt. Clomazone: 2-(2-Chlorophenyl)methyl-4. 4-dimethyl-3-isoxazolidinone •...........••••..... 44.4% Inert Ingredients: .........•..............•......... 55.6% 100.0% Contains 4 pounds 01 active ingredient per gallon U.S. Patent No. 4.405,357 KEEP OUT OF REACH OF CHILDREN CAUTION FIRST AID " In SyH: Flush with plenty 0/ water. Get medical attention as AtlL.C OF CONTENTS 'Ossible. ' aI inlormations an pages 1-4 belore referring 10 specific ; swallowed: Drink prompUy large quatltities 01 crop use. alcohol. Do nol ind~'C8 vomiting. cau a physician, " Inh8led: Remove to fresh air. " Page lion. prelerably mouth·to-mouth.·. possible. ~~.::::::::::::::::::::::::::::::::::::::::::::: 1 Precautionary Statements ............................ ... 1 " on akin: Wash Skin Diredions lor Use ....................................... 1 allention. ~ and ~ ...............•.......•.......•... 2 For Emergency f!prayer CIeanuo ......................................
    [Show full text]
  • Weed Control Guide for Ohio, Indiana and Illinois
    Pub# WS16 / Bulletin 789 / IL15 OHIO STATE UNIVERSITY EXTENSION Tables Table 1. Weed Response to “Burndown” Herbicides .............................................................................................19 Table 2. Application Intervals for Early Preplant Herbicides ............................................................................... 20 Table 3. Weed Response to Preplant/Preemergence Herbicides in Corn—Grasses ....................................30 WEED Table 4. Weed Response to Preplant/Preemergence Herbicides in Corn—Broadleaf Weeds ....................31 Table 5. Weed Response to Postemergence Herbicides in Corn—Grasses ...................................................32 Table 6. Weed Response to Postemergence Herbicides in Corn—Broadleaf Weeds ..................................33 2015 CONTROL Table 7. Grazing and Forage (Silage, Hay, etc.) Intervals for Herbicide-Treated Corn ................................. 66 OHIO, INDIANA Table 8. Rainfast Intervals, Spray Additives, and Maximum Crop Size for Postemergence Corn Herbicides .........................................................................................................................................................68 AND ILLINOIS Table 9. Herbicides Labeled for Use on Field Corn, Seed Corn, Popcorn, and Sweet Corn ..................... 69 GUIDE Table 10. Herbicide and Soil Insecticide Use Precautions ......................................................................................71 Table 11. Weed Response to Herbicides in Popcorn and Sweet Corn—Grasses
    [Show full text]
  • Cheatsheet V2.4.Pdf
    ! ! 2.4!Edition! Cross!reference!processes!with!various!lists:! Scan!a!block!of!code!in!process!or!kernel!memory! psxview! for!imported!APIs:! ! impscan!! Show!processes!in!parent/child!tree:! !!!!Hp/HHpid=PID!!!!!!!!!Process!ID!! pstree! !!!!Hb/HHbase=BASE!!!Base!address!to!scan! & !!!!Hs/HHsize=SIZE!!!!!!!Size!to!scan!from!start!of!base! Process&Information& ! ! Logs&/&Histories& Specify!–o/HHoffset=OFFSET!or!Hp/HHpid=1,2,3!! ! ! Recover!event!logs!(XP/2003):! Display!DLLs:! evtlogs!! ! ! dlllist! !!!!HS/HHsaveHevt!!!!!!!!!!!!!!!!!!!!Save!raw!event!logs! Development!build!and!wiki:! ! !!!!HD/HHdumpHdir=PATH!!!Write!to!this!directory! github.com/volatilityfoundation!! Show!command!line!arguments:! ! ! cmdline! Recover!command!history:! Download!a!stable!release:! ! cmdscan!and!consoles!! volatilityfoundation.org!! Display!details!on!VAD!allocations:! ! ! vadinfo![HHaddr]! Recover!IE!cache/Internet!history:! Read!the!book:! ! iehistory!! artofmemoryforensics.com! Dump!allocations!to!individual!files:! ! ! vaddump!HHdumpHdir=PATH![HHbase]! Show!running!services:! Development!Team!Blog:! ! svcscan!! http://volatilityHlabs.blogspot.com!! Dump!all!valid!pages!to!a!single!file:! !!!!Hv/HHverbose!!!!Show!ServiceDll!from!registry! ! memdump!HHdumpHdir=PATH! ! (Official)!Training!Contact:! ! Networking&Information& Display!open!handles:! [email protected]!! ! handles!! ! Active!info!(XP/2003):! !!!!Ht/HHobjectHtype=TYPE!!!Mutant,!File,!Key,!etc…! Follow:!@volatility! connections!and!sockets!! !!!!Hs/HHsilent!!!!!!!!!!!!!!!!!!!!!!!!!!!Hide!unnamed!handles!
    [Show full text]
  • [D:]Path[...] Data Files
    Command Syntax Comments APPEND APPEND ; Displays or sets the search path for APPEND [d:]path[;][d:]path[...] data files. DOS will search the specified APPEND [/X:on|off][/path:on|off] [/E] path(s) if the file is not found in the current path. ASSIGN ASSIGN x=y [...] /sta Redirects disk drive requests to a different drive. ATTRIB ATTRIB [d:][path]filename [/S] Sets or displays the read-only, archive, ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename [/S] system, and hidden attributes of a file or directory. BACKUP BACKUP d:[path][filename] d:[/S][/M][/A][/F:(size)] [/P][/D:date] [/T:time] Makes a backup copy of one or more [/L:[path]filename] files. (In DOS Version 6, this program is stored on the DOS supplemental disk.) BREAK BREAK =on|off Used from the DOS prompt or in a batch file or in the CONFIG.SYS file to set (or display) whether or not DOS should check for a Ctrl + Break key combination. BUFFERS BUFFERS=(number),(read-ahead number) Used in the CONFIG.SYS file to set the number of disk buffers (number) that will be available for use during data input. Also used to set a value for the number of sectors to be read in advance (read-ahead) during data input operations. CALL CALL [d:][path]batchfilename [options] Calls another batch file and then returns to current batch file to continue. CHCP CHCP (codepage) Displays the current code page or changes the code page that DOS will use. CHDIR CHDIR (CD) [d:]path Displays working (current) directory CHDIR (CD)[..] and/or changes to a different directory.
    [Show full text]
  • Command Control Interface Command Reference Error Codes
    Command Control Interface 01-43-03-01 Command Reference This document describes and provides instructions for using the Command Control Interface (CCI) software to configure and perform operations on the Hitachi RAID storage systems. Hitachi Virtual Storage Platform G series and F series Hitachi Virtual Storage Platform Hitachi Unified Storage VM Hitachi Universal Platform V/VM MK-90RD7009-33 October 2017 © 2010, 2017 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Vantara Corporation (collectively, “Hitachi”). Licensee may make copies of the Materials provided that any such copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the Materials. "Materials" mean text, data, photographs, graphics, audio, video and documents. Hitachi reserves the right to make changes to this Material at any time without notice and assumes no responsibility for its use. The Materials contain the most current information available at the time of publication. Some of the features described in the Materials might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Vantara Corporation at https://support.HitachiVantara.com/ en_us/contact-us.html. Notice: Hitachi products and services can be ordered only under the terms and conditions of the applicable Hitachi agreements.
    [Show full text]
  • LECTURE SCHEDULE 5 Operating System – Some Fundamental DOS
    LECTURE SCHEDULE 5 Operating System – Some Fundamental DOS Commands,Rules for naming files in DOS and Types of files Operating System Operating system is a set of software that controls and manages hardware and basic system operations for a computer. The operating system loads programs into the computer's memory, runs these programs, and manages peripherals like disks and printers. Example: Disk Operating System (DOS) Windows LINUX Mac UNIX Disk Operating System (DOS) • In the 1980s or early 1990s, the operating system that shipped with most PCs was a version of the Disk Operating System (DOS) created by Microsoft: MS-DOS. • MS-DOS is a disk-based, single-user, single-task and character based user interface (CUI) operating system. Goto MSDOS from Windows Operating System: Click Start Button Choose Program Choose Accessories Click Command Prompt as shown below: Or Click Start Button Choose Run Type cmd in the Open tab as shown below: Command Prompt will get displayed as shown: The DOS commands can be entered in the command prompt and executed. Some Examples of DOS commands DIR Command The dir command allows you to see the available files in the current and/or parent directories. Examples: 1. DIR Lists all files and directories in the directory that you are currently in. 2. dir /w If information on the date / time and other information on the files are not needed, then this command can be used to list just the files and directories going horizontally, taking as little as space needed. 3. dir /on List the files in alphabetical order by the names of the files.
    [Show full text]
  • Introduction: DOS (Disk Operating System) Is an Oldest Type of Operating System
    DOS (Disk Operating System) 1 Introduction: DOS (Disk Operating System) is an oldest type of Operating System. Disk Operating System is abbreviated as DOS. DOS is a CUI type of Operating System. In computer science, a generic term describing any operating system is system software which is loaded from disk devices when the system is started or rebooted. DOS is a single-tasking, single-user operating system with a command-line interface. DOS acts on commands. Because DOS is ready to perform when given proper command hence, it is also known as Command Prompt. Commands are certain words of English language or short form of English words. The meaning of these word or short form is already known to DOS. Since, DOS recognized these words and hence acts accordingly. These words and short forms of the English words are better known as commands. Internal Command:-Those commands which are already stored in the “Command.Com” file of DOS are known as internal commands. For example, CLS, VOL, TIME, DATE, COPY etc External Command:-Those commands which are not included in the command.com file of DOS rather included in other files of DOS are known as external commands. It is formatted according to programme. For example, TREE, FORMAT, MODE etc Some Internal Commands:- 1. CLS To clear the screen. \>cls 2. DIR To view the directory and files C:\>Dir 3. DATE To View and change the date C:\>Date Current date is: 01-01-2008 Enter new date (mm/dd/yy):21-03-2009 4. TIME To view and change the time.
    [Show full text]
  • Compute Blade Built-In LAN Switch Module Software Manual Operation Commands, Vol
    Compute Blade Built-in LAN Switch Module Software Manual Operation Commands, Vol. 1 Ver.10.5 and 10.7 and 11.6 compatible BSLANSW-S003X-50 MK-99COM094-01 HITACHI Applicable product This manual describes model Compute Blade Built in LAN Switch Module. It also describes Built in LAN Switch Module software Ver.10.5 and Ver.10.7 and 11.6 functions. Software functions supported by software OS-L3A and OS-L3SA is also described. ------------------------------------------------------------------- The BladeSymphony server name has been changed to Hitachi Compute Blade. If you are using BladeSymphony based server products, substitute references to Hitachi Compute Blade with BladeSymphony. This manual describes as substitution product code GV-BE2LSW1X1-Y for GV-BE2LSW1XR-Y and GV-BE2LSW2X1-Y for GV-BE2LSW2XR-Y. If you use OS-L3SA, please add the prefix of ‘0/’ to the interface number of gigabitethernet to be specified by some commands. ------------------------------------------------------------------- Caution when exporting The necessary procedures are to be adopted when exporting this product after first confirming the regulations of the Foreign Exchange and Foreign Trade Law, U.S. export control related regulations, etc. If any questions remains, please consult with our sales department. Trademarks Cisco is a registered trademark of U.S. Cisco Systems, Inc. in the U.S. and other countries. Ethernet is a product name of the Xerox Corp. IPX is a trademark of Novell,Inc. Microsoft is a registered trademark of the Microsoft Corp. in the U.S. and other countries. Octpower is a trademark of NEC Corporation. UNIX is a registered trademark in the U.S. and other countries exclusively licensed by X/Open Company Limited.
    [Show full text]
  • SVC and Storwize V7000 Replication Family Services Chapter 4
    Front cover IBM System Storage SAN Volume Controller and Storwize V7000 Replication Family Services Describes new Replication Family Services functionality Provides server integration examples Includes scripting examples Jon Tate Rafael Vilela Dias Ivaylo Dikanarov Jim Kelly Peter Mescher ibm.com/redbooks International Technical Support Organization IBM System Storage SAN Volume Controller and Storwize V7000 Replication Family Services March 2013 SG24-7574-02 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Third Edition (March 2013) This edition applies to IBM System Storage SAN Volume Controller and IBM System Storage Storwize V7000 Replication Family Services at an SVC Version6.4 code level. © Copyright International Business Machines Corporation 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Summary of changes. xiii March 2013, Third Edition . xiii Preface . .xv The team who wrote this book . .xv Now you can become a published author, too! . xvii Comments welcome. xviii Stay connected to IBM Redbooks . xviii Chapter 1. Introduction to Replication Family Services . 1 1.1 FlashCopy . 2 1.2 Metro Mirror and Global Mirror . 2 1.2.1 Global Mirror with Change Volumes . 2 1.3 Volume Mirroring function . 2 1.3.1 Stretched Cluster Volume Mirroring . 3 Chapter 2. Planning for Replication Family Services . 5 2.1 High-level design. 6 2.1.1 Defining your project . 6 2.1.2 Functional requirements . 6 2.1.3 Non-functional requirements. 7 2.1.4 Prior to implementation .
    [Show full text]
  • Santricity 11.30 Maintaining a Storage Array Using the Command
    SANtricity® 11.30 Maintaining a Storage Array using the Command Line Interface August 2016 | 215-11215_A0 [email protected] Table of Contents | 3 Contents Deciding whether to use this guide ............................................................. 5 About the command line interface .............................................................. 6 Structure of a CLI command ....................................................................................... 6 Interactive mode .............................................................................................. 7 Command line parameters ............................................................................... 8 CLI command wrapper syntax ...................................................................... 12 Naming conventions .................................................................................................. 14 Formatting CLI commands ....................................................................................... 15 Formatting rules for script commands ...................................................................... 15 Formatting CLI commands in Windows PowerShell ................................................ 17 Usage examples ......................................................................................................... 17 Exit status .................................................................................................................. 19 Using curl commands with the E2800 storage array ................................................
    [Show full text]
  • Getting Started Tutorial
    Getting Started Tutorial Getting Started Tutorial Lantern Bracket Problem • This tutorial will walk you through a simple topology optimization problem where we will design a bracket for mounting a lantern to a wall. • The design domain is shown in the bottom image. The two holes at the top are where the bracket will mount to the wall and the hole where the red arrow is pointing is where the load from the weight of the lantern will be applied. Getting Started Tutorial Create a New Model • Choose File->New->Model in the menu • Choose New Model then Next • Choose Create From Template then Next • Enter Lantern as the Model Name • Choose the Sierra SD Templates-> Structural Dynamics-> Topology Optimization template and then Finish Getting Started Tutorial Create the Design Domain (1) • At the CUBIT> command prompt copy and paste the following (see Hint on next slide): • brick x 5.5 y 5.5 z 5 • webcut volume all with plane zplane offset .5 • webcut volume all with plane zplane offset -.5 • brick x 1 y 5 z 1 • vol 4 move -2.25 .25 0 • subtract vol 4 from vol 2 • brick x 5.5 y 1.5 z 1 • vol 5 move -.5 2 0 • sub 5 from 2 • webcut volume 2 with sheet extended from surface 48 • webcut volume 6 with sheet extended from surface 45 • cylinder radius .125 height 10 • vol 8 copy rotate 90 about x • vol 9 move -2.25 0 0 • sub 9 from Volume 2 • vol 8 rotate 90 about y • vol 8 move 0 2.375 0 • vol 8 copy move 0 -.75 0 • sub 10 8 from 6 • These are CUBIT commands that create the cad model representation of the design domain in which the optimized design can exist.
    [Show full text]