command line interface user's guide - adaptec...
TRANSCRIPT
COPYRIGHT
Copyright © 2007, Adaptec, Inc. All rights reserved worldwide.
Information in this document is subject to change without notice and does not represent a commitment on the part of Adaptec or any of its subsidiaries. The software described in this document is furnished under a license agreement. The software may be used only in accordance with the terms of the license agreement. It is against the law to copy the software on any medium. No part of this manual may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose without the express written permission of Adaptec, Inc.
TRADEMARKS
Adaptec, the Adaptec logo, Adaptec OnTarget, Storage Manager, Snap Server, the Snap Server logo, GuardianOS, SnapOS, and Snap Disk are trademarks or registered trademarks of Adaptec, Inc. in the U.S.A. and other countries.
Products mentioned herein are for identification purposes only and may be registered trademarks or trademarks of their respective companies. Microsoft, Windows, Windows Vista, Internet Explorer, and Active Directory are registered trademarks of Microsoft Corporation. Java and Solaris, are registered trademarks of Sun Microsystems, Inc. Netscape is a registered trademark of Netscape Communications Corp. AppleShare, AppleTalk, Macintosh, and MacOS are registered trademarks of Apple Computer. BakBone and NetVault are trademarks of BakBone Software. AIX is a registered trademark of IBM Corporation. OpenView and HP-UX are trademarks or registered trademarks of Hewlett-Packard Company. BrightStor, Unicenter TNG, ARCserve, eTrust, and Unicenter are trademarks or registered trademarks of Computer Associates, Inc. Smart UPS and APC are registered trademarks of American Power Conversion Corporation. UNIX is a registered trademark of The Open Group. XFS is a trademark of Silicon Graphics, Inc. Backup Exec, VERITAS NetBackup BusinessServer, and VERITAS NetBackup DataCenter are trademarks or registered trademarks of VERITAS Software Corporation. Legato NetWorker is a trademark of Legato Systems, Inc. Linux is a registered trademark of Linus Torvalds. SCO Open Server and UnixWare are trademarks of the SCO Group. StorAssure is a registered trademark of Adaptec, Inc. All other brand names or trademarks are the property of their respective owners.
REVISIONS
Adaptec, Inc. provides this publication “as is” without warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability or fitness for a particular purpose. Adaptec and its subsidiaries reserve the right to revise this publication and to make changes in the content hereof without the obligation of Adaptec to notify any person of such revision or changes.
ADAPTEC, INC. SOFTWARE LICENSE AGREEMENTCAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS. BY YOUR USE OF THE SOFTWARE INCLUDED WITH THIS PRODUCT, YOU AGREE TO BE BOUND BY THESE TERMS, CONDITIONS, AND REQUIREMENTS. IF YOU DO NOT AGREE TO THE LICENSE TERMS, CONDITIONS, AND REQUIREMENTS APPLICABLE TO THE SOFTWARE, YOU ARE NOT PERMITTED TO USE THE SOFTWARE AND MAY RETURN THE ENTIRE UNUSED HARDWARE PRODUCT FOR A FULL REFUND. THESE TERMS, CONDITIONS, AND REQUIREMENTS DO NOT APPLY TO ANY OPENSOURCE SOFTWARE, WHICH MAY BE DELIVERED TOGETHER WITH THE ADAPTEC PRODUCTS, EXCEPT FOR THE PROVISIONS SET FORTH IN SECTION 7 AND 9 BELOW.In return for acquiring a license to use the Adaptec software ("Software") and the related documentation, you agree to the following terms and conditions:1. License. This Agreement grants you, the Licensee, a license to:
• Use the Software on a single computer system or on multiple workstations, systems and servers which incorporate an Adaptec Hardware product and may be accessed by multiple users from multiple locations. You may make as many installations of the Software as needed, but must restrict such installation only to systems, workstations or servers using an Adaptec hardware product.
• Make one copy of the Software in machine readable form solely for back-up purposes provided you repro-duce Adaptec’s copyright notice and any proprietary legends.
2. Restrictions. You may not distribute copies of the Software to others. You may not post or otherwise make available the Software, or any portion thereof, in any form, on the Internet. You may not use the software in a computer service business, including in time sharing applications. The Software contains trade secrets and in order to protect them you may not decompile, reverse engineer, disassemble, or otherwise reduce the Software to a human perceivable form. YOU MAY NOT MODIFY, ADAPT, TRANSLATE, RENT, LEASE, LOAN, RESELL FOR PROFIT, DISTRIBUTE OR CREATE DERIVATIVE WORKS BASED UPON THE SOFTWARE OR ANY PART THEREOF.
3. Ownership. As Licensee, You own the media upon which the Software is recorded or fixed, but Adaptec and its licensors retain title, ownership and intellectual property rights of the Software recorded on the original media and all subsequent copies of the Software, regardless of the form or media in which or on which the original and other copies may exist. This license is not a sale of the Software or any copy. The Software is copyrighted by, proprietary to and a trade secret of Adaptec or its licensors. The Software is protected by the copyright laws of the United States and international copyright treaties.
4. Termination. This license is effective until terminated. This license will terminate automatically without notice if you fail to comply with any of the provisions. You may terminate the license at any time by destroying the Software (including the related documentation) together with all copies or modifications in any form. Upon termination you shall destroy all copies of the Software (including the related documentation), together with any partial copies.
5. Limited Warranty. Adaptec and its Licensors warrant only that the media upon which the Software is furnished will be free from defects in material or workmanship under normal use and service for a period of thirty (30) days from the date of delivery to you. THE FOREGOING WARRANTY EXPRESSLY EXCLUDES ANY OPEN SOURCE SOFTWARE PROVIDED TO YOU WITH THE ADAPTEC SOFTWARE. ADAPTEC AND ITS LICENSORS DO NOT AND CANNOT WARRANT THE PERFORMANCE OR RESULTS YOU MAY OBTAIN BY USING THE SOFTWARE, OPEN SOURCE SOFTWARE OR DOCUMENTATION. EXCEPT FOR THE FOREGOING LIMITED WARRANTY, ADAPTEC AND ITS LICENSORS MAKE NO WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED, AS TO NON-INFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow the exclusion of implied warranties or limitations on how long an implied warranty may last, so the
above limitations may not apply to you. This warranty gives you specific legal rights and you may also have other rights which vary from state to state.The entire liability of Adaptec and its licensors, and your exclusive remedy for a breach of this warranty, shall be the replacement of any media not meeting the above limited warranty which is returned to Adaptec; or if Adaptec or its distributor is unable to deliver replacement media which is free from defects in materials or workmanship, you may terminate this Agreement by returning the Software and your money will be refunded.THE FOREGOING STATES THE SOLE AND EXCLUSIVE REMEDIES ADAPTEC AND ITS LICENSORS WILL PROVIDE FOR BREACH OF WARRANTY.
6. Limitation of Liability. IN NO EVENT WILL ADAPTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY INCIDENTAL, CONSEQUENTIAL OR INDIRECT DAMAGES, INCLUDING ANY LOST PROFITS, LOST SAVINGS, OR LOSS OF DATA, EVEN IF ADAPTEC OR A LICENSOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM BY ANY OTHER PARTY. IN NO EVENT WILL ADAPTEC BE LIABLE UNDER THIS AGREEMENT FOR ANY AMOUNT IN EXCESS OF THE LICENSE FEES YOU PAID FOR THE SOFTWARE OR, IF THE SOFTWARE WAS FREE, IN AN AMOUNT IN EXCESS OF THE AMOUNT PAID BY YOU FOR THE HARDWARE SOLD IN CONJUNCTION WITH THE SOFTWARE. Some states do not allow the exclusion or limitation of special, incidental, or consequential damages, so the above limitation or exclusion may not apply to you.
7. Export. You acknowledge that the laws and regulations of the United States restrict the export and re-export of the Software and/or the Open Source Software. Further, you agree that you will not export or re-export the Software and/or the Open Source Software or media in any form without the appropriate United States and foreign government approval.
8. U.S. Government Restricted Rights. If the Software is acquired under the terms of a GSA contract, use, reproduction or disclosure is subject to the restrictions set forth in the applicable ADP Schedule contract. If the Software is acquired under the terms of a DoD or civilian agency contract, use, duplication or disclosure by the Government is subject to the restrictions of this license in accordance with 48 C.F.R. 12.212 of the Federal Acquisition Regulations and its successors and 48 C.F.R. 227.7202-1 of the DoD FAR Supplement and its successors.
9. Open Source Software. Certain programs distributed in conjunction with the Software may be distributed subject to third party licensing terms, including without limitation, the GNU General Public (“GPL”) License available at: http://www.gnu.org/licenses/gpl.txt or by writing to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. The source code for the programs licensed under the GPL is available to You, for a period of three (3) years from the date of first commercial distribution of the Software, upon request by contacting Adaptec in writing at 691 South Milpitas Boulevard, Milpitas, California 95035, ATTN: Legal Department, Open Source Request. Adaptec will only charge you the actual cost of the medium used to distribute the source code for these programs and the cost of shipping. More details regarding the open source software and the applicable open source licenses are available in the README files.
10.Export Compliance. Each party agrees that the Software is subject to the U.S. Export Administration Act and Export Administration Regulations, as well as applicable import and export regulations of the countries in which each party transacts business. Each party shall comply with such laws and regulations, as well as all other laws and regulations applicable to the Software. Each party agrees that it will not export, re-export, transfer or divert any of the Software to any country for which United States' laws or regulations require an export license or other governmental approval, without first obtaining such license or approval, nor will each party export, re-export, transfer or divert any of the Software to any restricted place or party in accordance with U.S. export regulations.
11.General. You agree this is the complete agreement concerning this license. In order to amend this license, a writing executed by both parties is required. You assume full responsibility for the legal and responsible use of the Software. This license shall be governed by California law as such law applies to agreements between California residents entered into and to be performed within California, except as governed by Federal law. Should any provision of this license be declared unenforceable in any jurisdiction, then such provision shall be deemed to be severable from this license and shall not affect the remainder hereof. All rights in the Software not specifically granted in this license are reserved by Adaptec.
Should you have any questions concerning this license, contact: Adaptec, Inc.Legal Department691 South Milpitas Boulevard Milpitas, California 95035(408) 957-1718
Contents
Preface ..................................................................................... 1
About this Guide....................................................................................1
The CLI and Adaptec Storage Manager ...................................................1
Finding More Information ......................................................................2
Service and Technical Support ................................................................2
Chapter 1 Accessing the CLI ................................................................................ 3
Using a Terminal Emulation Program.......................................................3
Using Telnet...........................................................................................3
Access Levels and Passwords ..................................................................4
Chapter 2 Working in the CLI .............................................................................. 7
About the Main Mode and Functional Contexts ........................................7
Getting Help..........................................................................................8
About Case-sensitivity and Spaces ..........................................................8
Viewing Long Lists or Reports..................................................................8
Using the Tab Key to Complete Commands..............................................9
Abbreviating Commands........................................................................9
Command Line Editing ...........................................................................9
Leaving a Context and Exiting the CLI ....................................................10
Chapter 3 Commands and Parameters .............................................................. 11
Terminology Used in This Chapter .........................................................11
How this Chapter is Organized.............................................................11
About the Command Format in This Chapter..........................................12
Administrator Command ......................................................................13
Snap Server 700i User’s Guide 1
Clone Commands ................................................................................13
Device Commands ...............................................................................15
Diagnostics Commands ........................................................................17
Events Commands................................................................................19
Help Command ...................................................................................23
Image Commands................................................................................24
Initiator Commands..............................................................................26
Interface Commands ............................................................................29
iSNS Commands .................................................................................35
License Commands ..............................................................................35
Logical (Device) Commands..................................................................36
Network Commands ............................................................................44
Operator Command ............................................................................46
Password Command ............................................................................46
Pool Commands ..................................................................................47
Quit Command....................................................................................56
Route Commands.................................................................................56
Service Info Command .........................................................................58
Setup Command..................................................................................58
Show Command ..................................................................................59
Snapshot Commands ...........................................................................59
System Commands...............................................................................63
UPS Commands...................................................................................67
Appendix A Using the Wizard to Configure Your iSCSI Storage Appliance .......... 71
Before You Begin .................................................................................71
Working in the Setup Wizard ...............................................................72
Configuring Your iSCSI Storage Appliance ............................................72
2 Snap Server 700i User’s Guide
Appendix B Updating the Adaptec OnTarget Operating System ..........................75
Uploading a New Image...................................................................... 75
Checking the Current Image ................................................................. 76
Reverting to the Previous Image ............................................................ 77
Chapter C Command Tree..................................................................................79
3
Preface
The Command Line Interface (CLI) software is a terminal-based command line interface that allows you to monitor and manage your Snap Server 700i Series iSCSI Storage Appliance.Note If you are a novice command line user, Adaptec highly recommends that you manage your iSCSI Storage Appliance with the Adaptec Storage Manager software (included with the appliance) instead of the CLI. For more information, or to download the latest version of Adaptec Storage Manager, refer to the Adaptec Web site at www.adaptec.com.
About this GuideThis User’s Guide introduces the CLI, provides instructions for navigating the CLI and structuring commands, and describes the commands and parameters available. It also provides example commands when they’re helpful for clarity.Additionally, this Guide provides a top-level list of all commands for easy reference. See “Command Tree” on page 79.The appendices of this Guide provide step-by-step instructions for completing the initial set-up of your iSCSI Storage Appliance and for updating the Adaptec OnTarget operating system.
Notes and CautionsThis Guide uses these conventions to call out useful or important information:Note A note presents time-saving shortcuts and other information related to the main topic.
Caution A caution alerts you to potential hardware or software issues or hazards in the configuration or operation of your iSCSI Storage Appliance. Consider cautions carefully before proceeding with any operation.
The CLI and Adaptec Storage ManagerThe CLI and Adaptec Storage Manager (the storage management software that was included with your iSCSI Storage Appliance) occasionally differ in terminology and other types of information.• Adaptec Storage Manager uses a disk drive’s World Wide Name (WWN), the CLI
uses the disk drive's device ID for drive numbering.
• Separate status PDU (Adaptec Storage Manager) and Piggybacking of SCSI status (CLI) both refer to the same advanced iSCSI initiator setting.
Command Line Interface User’s Guide 1
Finding More Information
Finding More Information Product documentation related to the Adaptec OnTarget-powered Snap Server 700i Series is listed below. The current versions of all these documents are always available from http://www.snapserver.com/support.
Service and Technical SupportFor an immediate response to a service inquiry, use our Expert Knowledge Base System at http://www.snapserver.com/kb. Simply type in your question to view a list of possible resolutions to known issues. However, if none of the listed topics resolves your inquiry, you can forward the question to our Technical Support department who will then e-mail you with a response. To obtain additional service or technical support for your Snap Server 700i Series, call +1 408-934-7274.
Source and Location Content
700i Series Quick Start Guide Product Packaging and Web
Details package contents, identifies server hardware components, and provides complete instructions for installing the server to a rack, connecting the server to the network, and configuring the iSCSI Storage Appliance. Also contains the EULA and warranty.
SANbloc S50 Quick Install Guide Product Package and Web
Details package contents, identifies expansion array hardware components, and provides complete instructions for installing the SANbloc S50 to a rack and connecting it to a Snap Server.
Snap Server 700i Series User GuideUser CD and Web
Adaptec Storage Manager Online Help
Provides an overview of the configuration and maintenance of the Snap Server 700i Series, gives detailed instructions on using Adaptec Storage Manager to configure and manage your iSCSI storage, and provides hardware specifications for the Snap Server 700i Series and the SANbloc S50 expansion array.
Readme.txtUser CD
Contains late-breaking information, corrections, and known issues concerning the Snap Server 700i Series.
Field Service DocumentationService CD and Web
Provides detailed instructions for the replacement of disk drives, adapter cards, power assemblies, slide rails, and other hardware components.
2 Command Line Interface User’s Guide
Chapter 1
Accessing the CLIThis chapter explains how to access the CLI and describes the access levels.You can access the CLI two ways—using a terminal emulation program, or using Telnet. Each method presents the CLI automatically.
Using a Terminal Emulation ProgramAttach a null modem cable to the COM 1 port of the iSCSI Storage Appliance and use a VT100 terminal emulation program (for example, Hyperterminal™). Use these terminal emulation program settings:• Null Modem Cable
• Baud Rate: 115,200
• Data Bits: 8
• Parity: None
• Stop Bits: 1
• Flow Control: Off
Note Flow control must be set to Off. Otherwise, the system will appear to hang.
Using TelnetOnce the initial network values have been set (in either the CLI or Adaptec Storage Manager), you can connect to the iSCSI Storage Appliance through a Telnet session.Telnet to the IP address that is assigned to the management port on the iSCSI Storage Appliance.For example:P:\>telnet 10.20.30.400
Command Line Interface User’s Guide 3
Access Levels and Passwords
Access Levels and PasswordsThe CLI has two access levels: Operator and Administrator. You can set separate passwords for each level. This section describes both levels.
Administrator LevelAdministrators have full access to your IP SAN, and can manage and modify iSCSI storage as required.
Operator LevelOperators have restricted access to your IP SAN, as described in this table.
Changing from One Access Level to the OtherBy default, the CLI opens in the Operator access level. To switch to Administrator level, enter:administratoradministrator_password Note The default password is admin.
When you are logged in as Administrator, the CLI prompt displays a #. (When you are logged in as Operator, the # does not display.)To switch from Administrator level to Operator level, enter:operator
Operators can... Operators can’t...
Blink a hardware component, such as a disk drive or iSCSI Storage Appliance
Provision storage to an iSCSI Storage Host
View Properties window of all storage components of your IP SAN
Create, modify, or delete a pool, volume, or logical device
Verify a pool Mirror a volume or modify or break a mirrored volume
Create a hot spare Create or delete a snapshot
View event logs
Save a support archive
Change Adaptec Storage Manager preferences
View online Help
4 Command Line Interface User’s Guide
Access Levels and Passwords
Changing Access Level PasswordsThe default password for both the Administrator and Operator levels is admin.You can set separate passwords for each level, or remove the password requirement for one or both levels. You can change the passwords in the CLI during set-up (see page 71) or at any time after set-up is complete (see “Password Command” on page 46.) You can also change the passwords in the Adaptec Storage Manager wizard (refer to the Snap Server 700i Series User’s Guide).
Chapter 1 Accessing the CLI 5
Chapter 2
Working in the CLIThis section provides basic CLI orientation information as well as directions, tips, and shortcuts for working in the CLI.
About the Main Mode and Functional ContextsThe CLI opens in the main mode, where the top-level commands are available. The top-level commands are areas of functionality, or functional contexts, in which you can perform related tasks on a particular part of your iSCSI Storage Appliance or IP SAN. These commands are available in the main mode:
Within each functional context are action commands. For example, these commands are available in the initiator context:
Some action commands, such as the manage commands, open a second layer of functional context—a separate area of functionality within a top-level area of functionality, with its own set of action commands. For example, these commands are available in the initiator context’s manage context:
Note Some action commands, like list and info, are available in multiple functional contexts. How they behave depends on what context they’re in.
• administrator • interface • route
• clone • isns • service
• controller • license • set
• device • logical • show
• diagnostics • network • snapshot
• events • operator • system
• image • password • ups
• initiator • pool
• create • info • local
• destroy • list • manage
• alias • disco • piggyback
• align • info • ping
Command Line Interface User’s Guide 7
Getting Help
Getting HelpYou can request help at any time by entering help or ? anywhere in a line. The type of help provided depends on where you are in the CLI. For instance, typing help may generate a list of valid commands or parameters, or a list of all available commands. To request help completing a command, press Tab (see page 9).
About Case-sensitivity and SpacesIn general, the CLI is not case-sensitive. Commands and parameters can be typed using upper or lower case letters, except where noted. However, all EUIs, IQNs, iSCSI aliases, and initiator names must be entered in lower-case letters.Place a single space between a command and its parameters, and between parameters. For example:
cache read enable.
If a space has to be entered as part of a parameter, enclose the parameter in a pair of double-quotes (“ ”). Everything between the quotes, including spaces, is used as the parameter. For example:
delete “logical group1”
Viewing Long Lists or ReportsWhen a command generates a report (including help messages) that is too long to fit onto your screen, use these keystrokes to move through the pages of the report. Keyboard shortcuts are not case-sensitive.
Press... To...
N or F or the spacebar Move down to the next full page of the report
D or J or Enter Move down to next line of the report
B Move up to the previous full page of the report
U or K Move up to previous line of the report
P or < or Home Go to the beginning of the report
E or > or End Go to the end of the report
R or F5 Refresh the current page
Q Exit the report
H or ? or F1 Display this list of keyboard shortcuts
8 Command Line Interface User’s Guide
Using the Tab Key to Complete Commands
Using the Tab Key to Complete CommandsIf you have typed part of a command and require help to finish it, press Tab. If the partial command you’ve typed can be completed only one possible way, pressing Tab completes the line automatically.If the partial command requires more information, press Tab again to display a list of options. The command line prompt automatically redisplays the partial command so that you can finish it.
Abbreviating CommandsMost commands can be abbreviated to their shortest unique abbreviation. For example, if you are in the Operator level and wish to change to the Administrator level, you only have to enter ad.
Command Line EditingYou can edit commands and parameters by using these keystrokes:
Keystroke Function
Ctrl+A Jump to the start of the line
Ctrl+B Move the cursor back (left) one character
Ctrl+C Escape and terminate a lengthy job
Ctrl+D Delete the character at, or in front of, the cursor
Ctrl+E Jump to the end of the current line
Ctrl+F Move the cursor forward (right) one character
Ctrl+H; or Backspace Erase a mistake when entering a command
Ctrl+K Delete from the cursor forward (right) to the end of the line
Ctrl+N; or down arrow Display the next command in the command history
Ctrl+P; or up arrow Display the previous command in the command history
Ctrl+S Search for a command in the command history
Ctrl+T Transpose two characters
Ctrl+U Delete a complete line
Esc B Move the cursor back (left) one word
Esc D Delete from the cursor to end of the word
Esc F Move the cursor forward (right) one word
Chapter 2 Working in the CLI 9
Leaving a Context and Exiting the CLI
Leaving a Context and Exiting the CLITo leave a context, such as interface, enter end.To exit the CLI, enter quit.
10 Command Line Interface User’s Guide
Chapter 3
Commands and ParametersThis chapter describes the commands available in the CLI and provides examples when useful for clarification.
Terminology Used in This ChapterIn the context of a command, “enter” means to type the command, then press Enter. These terms are used to describe the three main parts of a command: • Functional context—The area of functionality, such as pool, device, or snapshot.
• Command—An action, such as create, list, or remove.
• Parameter—Specific information related to the command, such as the name of a pool (pool_name), the size of a new logical device (logical_device_size), or a list of interfaces (eth0 eth1).
The next chapter, “Commands and Parameters” on page 11, which describes all CLI commands, is organized alphabetically by area of functionality, then by action.
How this Chapter is OrganizedThis chapter is organized alphabetically by area of functionality (such as device or snapshot) then by command (such as add or list).All commands listed in this chapter are available to users logged in as either Administrator or Operator, except where noted. Administrator-only commands won’t be recognized if you are logged in as an Operator.
Command and Example ContextThe commands and examples shown in this chapter assume that you are working in a functional context of the CLI, such as device or snapshot. To use the commands in the main mode, specify the area of functionality at the beginning of each line. For instance, if the command in the clone context is:
add clone_name
the correct version of this command in the main mode would be:clone add clone_name
Command Line Interface User’s Guide 11
About the Command Format in This Chapter
About the Command Format in This ChapterThis Guide uses these formats are used to express commands and parameters. Note A command or parameter presented in emphasis (pool_name) indicates that you must enter an actual value (pool1).
Basic CommandA basic command with no options:
networkEnter the command as shown. For example:
network
Choice Between Two Commands (Toggle Settings)A command that has two options:
enable_or_disableEnter one of the two options. For example:
disable
Command and ParameterA command that requires specific information to follow it:
rename new_logical_device_nameEnter the command and use an actual value to replace the text in emphasis. For example:
rename logical3
Command and Parameter ListA command that requires or supports a list of specific information:
info logical_device_name_list
Enter the command and use a list of actual values to replace the text in emphasis. Put a single space between each value in the list. For example:
info logical3 logical6 logical7
Command and Choice Between Two Parameters (Toggle Settings)A command that requires a parameter which can be one of two options:
cache read enable_or_disable
Enter one of the two options. For example:cache read enable
12 Command Line Interface User’s Guide
Administrator Command
Multiple ParametersA command that requires multiple parameters on the same line:
create logical_device_name pool_name logical_device_size
Enter the command and use actual values to replace the text in emphasis. Put a single space between each value. For example:
create logical4 pool-A 10GB
Administrator CommandBy default, the CLI opens at the Operator level (see page 4). If an Operator password is set, you will be prompted to enter it before you can begin working in the CLI.To switch to the Administrator level, enter:
administrator
Note Optionally, enter a shorthand version of the command: ad.
If prompted, enter the Administrator password. The default password is admin.
Clone CommandsUse the commands in this section to create and manage clones. A clone is a full copy of a logical device. When you create a clone, the logical device is copied into a new volume created in the pool that you have specified.To enter the clone context, enter:
clone
AbortNote Administrator access only.
This command stops the creation of a clone. You might want to do this if a pool failure occurs while the clone is being created. You must specify the clone by name. Enter:
abort clone_name
Chapter 3 Commands and Parameters 13
Clone Commands
CreateNote Administrator access only.
This command creates a new clone. You must specify a name for the clone and specify the logical device you are cloning. Enter:
create clone_name logical_device_name
For example:create clone1 deviceA
Depending on the size of the original logical device, it can take several hours for a new clone to be created.Note Once a clone is created, you can access and manage the clone (the destination logical device) as a normal logical device. You can’t apply clone commands to the destination logical device.
Info In the clone context, enter this command to display information (such as the source pool, destination pool, size, and status) about all the clones you have created:
info
List In the clone context, enter this command to view a list of all the clones you have created:
list
14 Command Line Interface User’s Guide
Device Commands
Device CommandsUse the commands in this section to manage the disk drives in your iSCSI Storage Appliance.To enter the device context, enter:
device
IdentifyThis command helps you identify specific disk drives by blinking their LEDs. You must specify which disk drives you want to identify by their ID number. (To find a disk drive’s ID, enter list.)Note To identify all the disk drives in a pool, see “Identify” on page 50.
To start blinking disk drive LEDs, enter:identify disk_drive_ID_list start
For example:identify 0 256 start (blinks 2 disk drives, ID# 0 and 256)identify 512 start (blinks 1 disk drive, ID# 512)
The LEDs will stop blinking automatically after 30 seconds. You can stop the blinking sooner by entering:
identify disk_drive_ID_list stop
InfoThis command displays the status, capacity, and other information about a specified disk drive. You must specify the disk drive by its ID number. (To find a disk drive’s ID, enter list.)
info disk_drive_ID_list
Chapter 3 Commands and Parameters 15
Device Commands
InitialiseNote Administrator access only.
This command removes all RAID information from the specified disk drive(s).Caution Do not initialise a disk drive that is part of a logical device or the data on that logical device may become unusable. Back up all data from your disk drive before initialising it.
To initialise a disk drive, enter:initialise disk_drive_ID_list
ListIn the device context, this command lists all disk drives attached to your iSCSI Storage Appliance:
list
To view a list of all devices that are part of foreign pools (pools on another iSCSI Storage Appliance), enter:
list foreign
To view a list of all devices being used as hot spares, enter:list spare
Manage CommandsNote Administrator access only.
At this time, the only available manage commands are identical to the identify and info commands already described in this section. See page 15.
UnusedNote Administrator access only.
This command lists any disk drive attached to your iSCSI Storage Appliance which is not currently part of any pool:
unused
16 Command Line Interface User’s Guide
Diagnostics Commands
Diagnostics CommandsUse the commands in this section to perform diagnostics tests on your iSCSI Storage Appliance and IP SAN.Note This area of functionality is available to users with Administrator access only.
To enter the diagnostics context, enter:diagnostics
CheckThis command performs diagnostic tests of your iSCSI Storage Appliance hardware and its interface configuration. A hardware test lists the appliance’s components (memory configuration, RAID controller, Ethernet interfaces) and tests whether the components form a valid combination.To perform a diagnostic test on your appliance’s hardware, enter:
check hardware
An interface test checks the configuration of each network interface and reports each interface’s status, ping results, link state, and other information. To perform a diagnostic test on your appliance’s network interfaces, enter:
check interface
DumpThis command dumps (copies without formatting) raw data to a specifed location where you can use it to identify problems. You must specify the connection type and location.
Dump Using an FTP ConnectionTo do a diagnostics dump using an FTP connection, you must specify the FTP site’s host name or IP address:
dump ftp FTP_hostname_or_IP_address
For example:dump ftp 10.20.1.100
Chapter 3 Commands and Parameters 17
Diagnostics Commands
Dump Using a Serial ConnectionTo do a diagnostics dump using a serial connection, you must specify the same file transfer protocol (1kxmodem or xmodem) as the serial terminal program you are using:
dump serial file_transfer_protocol
For example:dump serial 1kxmodem
PingThis command tests to see if an iSCSI Storage Host on your IP SAN can be contacted. The results of each ping attempt (successful or failed) appear on their own line in the CLI. You must specify the host by its IP address. You can also specify the number of ping attempts to make (count) and/or the duration of each ping attempt, in seconds (timeout).The full command syntax is:
ping host_IP_address [timeout time] [count number] [source interface_name_or_IP_address]
To ping an iSCSI Storage Host, enter:ping host_IP_address
To ping an iSCSI Storage Host for ten seconds, enter:ping host_IP_address timeout 10
To ping an iSCSI Storage Host five times, enter:ping host_IP_address count 5
To ping an iSCSI Storage Host five times for three seconds each time, enter:ping host_IP_address timeout 3 count 5
To ping an iSCSI Storage Host over a specific network interface, you must specify the interface by either its name or its IP address. For example:
ping host_IP_address source eth0
orping host_IP_address source 10.20.300.401
18 Command Line Interface User’s Guide
Events Commands
TracertThis command traces the route to an iSCSI Storage Host on your IP SAN. It lists all the intermediate gateways between your iSCSI Storage Appliance and the specified destination. You must specify the host by its IP address and interface name.
tracert host_IP_address interface_name
For example:tracert 10.20.300.400 eth0
Note You can terminate a tracert command by pressing Ctrl+C.
Events CommandsUse the commands in this section to view the status of your iSCSI Storage Appliance and monitor and modify its event logs. The event logs contain all event information for the appliance. See page 76 for a list of all the event severity levels.
ClearNote Administrator access only.
This command clears all events from the event log for your iSCSI Storage Appliance. Don’t use this command unless you’re sure that you no longer require the information in the event log—this function can’t be undone. You will be prompted to confirm that you want to clear all events.To clear the event log, enter:
clear
yes
Inactive CommandsNote Administrator access only.
These commands mark a specified group events as inactive in the event log. Inactive events don’t affect overall system status. You might want to use this command to return system status to normal by inactivating a warning event, for instance. (Marking events as inactive is a less drastic step than clearing all events from the event log.)You can use the commands in this section individually or combine them on one line to define the group of events as broadly or as narrowly as required.
Chapter 3 Commands and Parameters 19
Events Commands
Inactivating All EventsTo inactivate all events in the event log, enter:
inactive all
Inactivating All Events of a Specified LevelYou can inactivate all events of the same level. You must specify the level using one of these parameters: info, warning, or error.
inactive level level_of_event
For example:inactive level warning
Inactivating Events in a Specified Date or Time RangeYou can inactivate all events that occurred within a date or time range by using the commands and parameters in the next table.Note For more information about the absolute_date and relative_period parameters, see the "Glossary".
Use these commands in combination to narrow the scope of the inactivation. For instance, to inactivate all events during a specific time period, enter:
inactive from absolute_date to absolute_date
For example:inactive from 25/07/07 to 30/07/07
To inactivate all events that occurred in a period relative to the current time, enter:inactive from relative_period to relative_period
Command Parameter Description
from absolute_date Inactivates all events from the specified date to the current date and time
from relative_period Inactivates all events from the beginning of the relative period (for example, two hours ago) to the current date and time
to absolute_date Inactivates all events that happened before the specified date
to relative_period Inactivates all past events that happened before the beginning of the relative period (for example, up to five minutes ago)
20 Command Line Interface User’s Guide
Events Commands
For example, to inactivate all events that occurred between ninety minutes and three hours ago, enter:
inactive from -3h to -90m
To inactivate all events that occurred from a specific date until the beginning of a period relative to the current time, enter:
inactive from absolute_date to relative_period
For example, to inactivate all events from July 13 to one hour ago, enter:inactive from 13/07/07 to -1h
Inactivating All Events by OriginatorYou can inactivate all events originated by a specific component of the Adaptec OnTarget operating system:
inactive originator name
Note Type inactive originator then press Tab twice to display a list of Adaptec OnTarget operating system components to choose from. The list includes Service Control, Feature Enable Keys, iSCSI Protocol, Flash, and Health Daemon. (Remember that if a parameter includes a space, such as Health Daemon, you must enclose it in a pair of double-quotes—“health daemon”. See page 8 for more information.)
For example:inactive originator “health daemon”
InfoIn the events context, this command displays a summary of event log information, including system status, the current size of the event log, and the number of recorded events:
info
ReportThis command displays event log reports. You can use the commands in this section individually or combine them on one line to define the report you want as broadly or as narrowly as required.
Reporting All EventsTo generate a report of all events in the event log, enter:
report all
Chapter 3 Commands and Parameters 21
Events Commands
Reporting All Active EventsTo generate a report of all active events in the event log, enter:
report active
Reporting All Events by a Specified Operating System ComponentTo generate a report of all events originated by a specific component of the Adaptec OnTarget operating system, enter:
report originator name
Note Type report originator, then press Tab twice to display a list of Adaptec OnTarget operating system components to choose from. The list includes Service Control, Feature Enable Keys, iSCSI Protocol, Flash, and Health Daemon. (Remember that if a parameter includes a space, such as Health Daemon, you must enclose it in a pair of double-quotes—“health daemon”. See page 8 for more information.)
For example:report originator flash
orreport originator “service control”
Generating a Long ReportTo generate a report that includes all text associated with each event, enter:
report long
Reporting All Events of a Specified LevelYou can generate a report of all events of the same level. You must specify the level using one of these parameters: info, warning, or error.
report level level_of_event
For example:report level error
22 Command Line Interface User’s Guide
Help Command
Reporting Events in a Specified Date or Time RangeNote For more information about the absolute_date and relative_period parameters, see the "Glossary".
Use these commands in combination to narrow the scope of the report. For instance, to report all events during a specific time period, enter:
report from absolute_date to absolute_date
For example:report from 25/07/07 to 30/07/07
To report all events that occurred in a period relative to the current time, enter:report from relative_period to relative_period
For example, to report all events that occurred between ninety minutes and three hours ago, enter:
report from -3h to -90m
Help CommandEnter help or ? in the main mode or within a functional context to see a list of currently available commands and a brief description of each. If you are viewing a long report in the CLI (such as the list of available commands in the main mode), enter help or ? to display a list of keyboard shortcuts that will help you move through the report. Note Keyboard shortcuts are also listed in this Guide. See “Working in the CLI” on page 7.
Command Parameter Description
from absolute_date Reports all events from the specified date to the current date and time
from relative_period Reports all events from the beginning of the relative period (for example, two hours ago) to the current date and time
to absolute_date Reports all events that happened before the specified date
to relative_period Reports all past events that happened before the beginning of the relative period (for example, up to five minutes ago)
Chapter 3 Commands and Parameters 23
Image Commands
Image CommandsUse the commands in this section to view information about the two Adaptec OnTarget operating system images stored on your iSCSI Storage Appliance, and upload and install new images onto the appliance. For step-by-step instructions on using these commands, see “Updating the Adaptec OnTarget Operating System” on page 75. To enter the image context, enter:
image
BootNote Administrator access only. For step-by-step instructions on using this command, see “Reverting to the Previous Image” on page 77.
This command selects the boot image, the image that you want your appliance to use the next time it is restarted. You must specify the image by its number. (To find the image numbers, enter list. See “List” on page 25 for more information.)
boot image_number
For example, to change the default boot image to image number 2, enter:boot 2
To apply the image, restart your iSCSI Storage Appliance.Caution Do not make any configuration changes before you restart the appliance. Any changes that you make will be lost when the appliance restarts.
24 Command Line Interface User’s Guide
Image Commands
InfoIn the image context, this command shows information about the boot images stored on your iSCSI Storage Appliance:
infoThis information appears:
In the figure above, Image 2 is the image running currently. Image 2 is also the image that will be used the next time the iSCSI Storage Appliance is restarted or powered on.
ListIn the image context, this command lists the number, name, version number, and date of the two boot images stored on your iSCSI Storage Appliance:
list
UploadNote Administrator access only. For step-by-step instructions on using this command, see “Uploading a New Image” on page 75.
This command uploads a new image to your iSCSI Storage Appliance. You will be prompted to confirm the command before the image is uploaded.To upload a new image to your iSCSI Storage Appliance, enter:
upload URL_to_image
yes
Alternatively, to upload the image through your iSCSI Storage Appliance’s serial port, enter:
upload 1kxmodem
yes
The image is uploaded and your iSCSI Storage Appliance is automatically restarted. (This may take a few minutes.)
Image Number
Image Name
Version Date and Time
Version Number
Chapter 3 Commands and Parameters 25
Initiator Commands
Initiator CommandsUse the commands in this section to create, manage, and delete the local and remote iSCSI initiators on your IP SAN.To enter the initiator context, enter:
initiator
CreateNote Administrator access only.
This command adds a new remote iSCSI initiator to list of initiators accessing storage on your iSCSI Storage Appliance. You must specify the name (or alias) and IQN of the iSCSI initiator. By default, the initiator is added with these default settings:• Align disabled—When this setting is enabled, Protocol Data Units (PDUs) are
aligned on Ethernet frames.
• Piggyback enabled—When this setting is enabled, the SCSI Response PDU can be merged with the last Data-In PDU.
• Ping disabled—When this setting is enabled, the iSCSI initiator is pinged regularly to test the connection.
To create a new remote iSCSI initiator, enter:create initiator_name initiator_IQN
For example:create initiator1 iqn.2007-07.com.adaptec:01.b3544e7c24dd
The iSCSI intiator is created with the default settings. To change the default settings, see the “Manage Commands” on page 28.To create a new remote iSCSI initiator with the piggyback and/or ping settings enabled, enter:
create initiator_name initiator_IQN piggyback
orcreate initiator_name initiator_IQN ping
orcreate initiator_name initiator_IQN piggyback ping
To create a new remote iSCSI initiator with the align setting disabled, enter:create initiator_name initiator_IQN noalign
Note Remote iSCSI initiators are also implicitly created by other commands.
26 Command Line Interface User’s Guide
Initiator Commands
DestroyNote Administrator access only.
This command removes all references to specified iSCSI intiators from any iSCSI targets that refer to them. You must specify the iSCSI intiators by name. (To find the name of an initiator, enter list.) You will be prompted to confirm that you want to delete the specified iSCSI initiators.To delete an iSCSI initiator, enter:
destroy initiator_name
yes
To delete more than one iSCSI initiator, add the names of the additional iSCSI intiators to the end of the line, with one space between each name:
destroy initiator_name initiator_name initiator_name
yes
InfoIn the initiator context, this command displays information about all or some iSCSI initiators in the iSCSI initiator list, including their IQNs and settings. (To find the name of a specific initiator, enter list.)To view information about all iSCSI initiators, enter:
info
To view information about a specific iSCSI initiator, enter:info initiator_name
ListIn the initiator context, this command displays the list of all known initiators accessing storage on your iSCSI Storage Appliance:
list
LocalThis command displays the EUI of the local iSCSI initiator:
local
Chapter 3 Commands and Parameters 27
Initiator Commands
Manage CommandsNote Administrator access only.
Use these commands to modify the settings on an individual iSCSI initiator. You must specify the initiator by its name. To enter the manage context, enter:
manage initiator_nameAA
AliasThis command changes the name (or alias) of the iSCSI initiator:
alias new_initiator_name
The name is changed immediately.
AlignThis command enables or disables the align setting of the iSCSI initiator, which determines whether or not PDUs are aligned. The align setting is disabled by default. Note Only advanced users familiar with the function of the align setting should enable it.
To change the align setting, enter:align enable_or_disable
For example:align enable
DiscoThis command enables or disables a permanent discovery session for the iSCSI initiator. The disco setting is disabled by default. To change the permanent discovery session setting, enter:
disco enable_or_disable
For example:disco enable
The permanent discovery session is enabled immediately.
InfoThis command displays information about the iSCSI initiator, including its IQN and settings:
info
28 Command Line Interface User’s Guide
Interface Commands
PiggybackThis command enables or disables the piggyback setting, which determines whether or not the SCSI Response PDU can be merged with the last Data-In PDU. The piggyback setting is enabled by default.Note Only advanced users familiar with the function of the piggyback setting should disable it.
To change the piggyback setting, enter:piggyback enable_or_disable
For example:piggyback disable
PingThis command enables the ping setting, which controls whether or not the iSCSI initiator is pinged regularly to test the connection. The ping setting is disabled by default.To change the ping setting, enter:
ping enable_or_disable
For example:ping enable
Interface CommandsUse the commands in this section to modify and manage your iSCSI Storage Appliance’s network interfaces. To enter the interface context, enter:
interface
InfoIn the interface context, this command displays information about some or all of the network interfaces. This command lists the interface’s status, link state, IP address, speed, and so on.To display information about all the network interfaces, enter:
info
To display information about a specific interface, enter:info interface_name
To display information about more than one specific interface, enter:info interface_name interface_name
Chapter 3 Commands and Parameters 29P
Interface Commands
ListThis command lists the name, IP address, service type (management, iSCSI, or management and iSCSI), status, and link state of all network interfaces on your iSCSI Storage Appliance:
list
Manage CommandsUse these commands to modify the settings on an individual network interface. You must specify the interface by its name. To find the name of the interfaces on your iSCSI Storage Appliance, enter list.To enter the manage context, enter:
manage interface_name
For example:manage eth0
BroadcastNote Administrator access only.
This command sets the broadcast address for the interface:broadcast broadcast_address
For example:broadcast 10.20.255.255
The broadcast address is changed immediately.
DHCPNote Administrator access only.
This command enables or disables Dynamic Host Configuration Protocol (DHCP) on the interface. To change the DHCP setting, enter:
dhcp enable_or_disable
For example:dhcp disable
30 Command Line Interface User’s Guide
Interface Commands
DownNote Administrator access only.
This command brings down (shuts off connection to and from) the interface. You might want to use this command in conjunction with the up command to reset or clear the interface.To take down the interface, enter:
down
The interface is taken down immediately.
InterfacetypeNote Administrator access only. This command is only available for the eth0 interface.
This command sets the service type for the eth0 interface. The interface type setting determines what data is supported by the interface. You can set the interface to support management data only (mgmt) or management and iSCSI data (iscsi_mgmt).To set the service type, enter:
interfacetype service_type
For example:interfacetype iscsi_mgmt
InfoThis command lists the interface’s status, link state, IP address, speed, and so on:
info
Chapter 3 Commands and Parameters 31
Interface Commands
IPNote Administrator access only.
This command sets the interface’s IP address. You can use this command on the same line as the netmask command (see page 33). If you don’t specify a netmask address, the ip command sets a default netmask automatically.To set the interface’s IP address, enter:
ip IP_address
For example:ip 10.20.30.400
The IP address is changed immediately.To set the interface’s IP address and netmask, enter:
ip IP_address netmask netmask_address
For example:ip 10.20.30.400 netmask 10.255.255.255
MTUNote Administrator access only.
This command sets the Maximum Transmission Unit (MTU) size for the interface.To see a list of supported size values (shown in bytes), type mtu, then press Tab. The values will be listed and the command prompt will return to the mtu command. For example:
mtu [Tab]1500 9000 <mtu>
mtu
To change the MTU setting, enter the size value after mtu:mtu size_value
For example:mtu 9000
The setting is changed immediately.
32 Command Line Interface User’s Guide
Interface Commands
NetmaskNote Administrator access only.
This command sets the netmask for the interface. You can use this command on the same line as the ip command (see page 32). If DHCP is enabled, this command changes the stored value that is used if DHCP is ever disabled; otherwise it doesn’t change the actual value of the interface. If DHCP is disabled, this command resets the interface.To set the interface’s netmask, enter:
netmask netmask_address
For example:netmask 10.255.255.255
The netmask is changed immediately.To set the interface’s IP address and netmask, enter:
ip IP_address netmask netmask_address
For example:ip 10.20.30.400 netmask 10.255.255.255
RenameNote Administrator access only.
This command sets a new name for the interface. You might want to do this to make it easier to identify the individual Ethernet ports on your iSCSI Storage Appliance.
rename new_interface_name
The name is changed immediately.
SpeedNote Administrator access only.
This command sets the speed of the devices accessing the interface. If a device supports auto-negotiation, you can use this command to limit its speed. You can set the speed to 10 MB per second, 100 MB per second, or auto-negotiation (if a device supports that setting).To change the speed setting, enter:
speed 10_100_or_auto
For example:speed 100
The setting is changed immediately.
Chapter 3 Commands and Parameters 33
Interface Commands
StatisticsThis command displays these statistics about the interface:• Number of collisions
• Number of transmitted packets with a breakdown of errors (dropped, overrun, and framing)
• Number of received packets with a breakdown of errors (dropped, overrun, and framing)
To view the interfaces statistics, enter:statistics
UpNote Administrator access only.
This command brings up (opens connection to and from) the interface. You might want to use this command in conjunction with the down command to reset or clear the interface.To bring up the interface, enter:
up
StatisticsThis command produces the same information as the statistics command in the manage context (see page 34). You can choose to view statistics for all the interfaces on your iSCSI Storage Appliance, or you can specify a particular interface in the command line.To view statistics for all interfaces, enter:
statistics
To view statistics for a specific interface only, enter:statistics interface_name
For example:statistics eth0
34 Command Line Interface User’s Guide
iSNS Commands
iSNS CommandsUse these commands to manage and modify the Internet Storage Name Service (iSNS) server on your IP SAN.To enter the iSNS context, enter:
isns
InfoIn the iSNS context, this command displays information about the iSNS server on your IP SAN:
info
serverNote Administrator access only.
This command sets or clears an iSNS server. You must specify the server by its hostname or IP address.To set an iSNS server, enter:
server server_hostname_or_IP_address
For example:server 10.20.300.400
To clear an iSNS server, enter:server server_hostname_or_IP_address clear
For example:server iSNSserver clear
License CommandsUse the commands in this section to view the list of features supported by your current license or update your iSCSI Storage Appliance to a new license code (or key).To enter the license context, enter:
license
InfoThis command lists the features that are supported by your current license key:
info
Chapter 3 Commands and Parameters 35
Logical (Device) Commands
KeyNote Administrator access only.
This command enters a new license key for your iSCSI Storage Appliance. License keys are 20 characters long.To enter a new license key, enter:
key
When prompted, enter the license key. For example:ABCD-CDEF-FGHJ-KLMN-MNOP
Logical (Device) CommandsUse the commands in this section to create, delete, and modify logical devices on your iSCSI Storage Appliance.To enter the logical context, enter:
logical
Note If the logical device you want to modify is a snapshot, you can use these commands in the snapshot context. For more information about snapshots, see page 59.
CHAP CommandsUse the commands in this section to set up Challenge Handshake Authentication Protocol (CHAP) user names and passwords for the logical devices on your iSCSI Storage Appliance.Changes made using these commands take effect immediately.To enter the chap context, enter:
chap
InfoThis command displays all CHAP user names that have been set:
info
36 Command Line Interface User’s Guide
Logical (Device) Commands
PasswordNote Administrator access only.
This command sets the CHAP secret. You will be prompted to enter the password twice and then confirm the password. Enter:
password
When prompted, enter the password twice. When prompted, confirm the password.Notes 1) If your password doesn’t meet the minimum iSCSI RFC 3720 protocol, you are prompted to create a different password; enter either yes or no, as desired. 2) If you are using CHAP with the Microsoft iSCSI initiator, the CHAP secret must be 12–16 characters long or it will be rejected by the iSCSI initiator.
UserThis command sets the CHAP user name:
user user_name
CreateNote Administrator access only.
This command creates a new logical device. The complete command syntax is:create logical_device_name pool_name logical_device_size
Where:• logical_device_name is a unique name for the logical device
• pool_name is the name of the pool from which to build the logical device
• logical_device_size is either:
• the size of the logical device (for example, 10GB), or
• available (the logical device will use all available pool space)
When the logical device is created, the IQN that the iSCSI initiator uses to access the logical device is generated automatically.To create a new logical device of a specific size, enter:
create logical_device_name pool_name logical_device_size
For example:create device-1 pool-A 50.00GB
To create a new logical device that uses all available pool space, enter:create device-1 pool-A available
Chapter 3 Commands and Parameters 37
Logical (Device) Commands
DestroyNote Administrator access only.
This command deletes a specified logical device. You must specify the logical device by its name. (To find the name of a logical device, enter list.) You will be prompted to confirm that you want to delete the specified logical device.To delete a logical device, enter:
destroy logical_device_name
yes
To delete multiple logical devices simultaneously, enter:down logical_device_name_list
yes
DownNote Administrator access only.This command takes down a specified logical device. You must specify the logical device by its name. (To find the name of a logical device, enter list.) You will be prompted to confirm that you want to take down the specified logical device.To take down a logical device, enter:
down logical_device_nameyes
To take down multiple logical devices simultaneously, enter:down logical_device_name_listyes
InfoIn the logical context, this command displays information about one or more logical devices, including status, the amount of space used, and auto-discovery control lists. You must specify each logical device by its name. (To find the name of a logical device, enter list.)To display information about all logical devices associated with your iSCSI Storage Appliance, enter:
info
To display information about a specific logical device, enter:info logical_device_name
To display information about multiple logical devices simultaneously, enter:info logical_device_name_list
38 Command Line Interface User’s Guide
Logical (Device) Commands
ListIn the logical context, this command lists all known logical devices associated with your iSCSI Storage Appliance:
list
Manage CommandsNote Administrator access only, except for the info command.
Use these commands to modify a specified logical device. For instance, you can control access to the logical device, increase the size of a logical device, and manage authentication settings. You must specify each logical device by its name. (To find the name of a logical device, enter list.) To enter the manage context for a logical device, enter:
manage logical_device_name
AllowThis command adds specified iSCSI initiators to the logical device’s auto-discovery control list. You must specify each iSCSI initiator by its name. (To find the name of an iSCSI initiator, see “List” on page 27.) If you specify read-only (readonly), the iSCSI initiator will have read-only access to the logical device.To add specified iSCSI initiators to the logical device’s auto-discovery control list, enter:
allow iSCSI_initiator_name_list
To give specified iSCSI initiators read-only access to the logical device, enter:allow readonly iSCSI_initiator_name_list
AuthenticationThis command sets authentication for the logical device. You can choose between CHAP, SRP, and none. (These commands are not case-sensitive.)To change the authentication setting for the logical device, enter:
authentication authentication_setting
Chapter 3 Commands and Parameters 39
Logical (Device) Commands
Chapusers CommandsUse these commands to manage CHAP authentication settings on the logical device. To enter the chapusers context, enter:
chapusers
• List
In the chapusers context, this command lists all CHAP users of the logical device:list
• Password
This command sets a new CHAP secret:password new_CHAP_secret
• Remove
This command removes one or more specified CHAP users from the list of those allowed to access the logical device. You must specify each CHAP user by name. (To find the name of a CHAP user, see “Info” on page 36.)
To remove one or more CHAP users, enter:remove chap_user_name_list
Note For more CHAP commands, see page 36.
DenyThis command removes specified iSCSI initiators from the logical device’s auto-discovery control list. You must specify each iSCSI initiator by its name. (To find the name of an iSCSI initiator, see “List” on page 27.) To complete the removal of the iSCSI initiator, you will be prompted to enter a CHAP user name and secret for that initiator.To remove specified iSCSI initiators from the logical device’s auto-discovery control list, enter:
allow iSCSI_initiator_name_list
CHAP_user_name
CHAP_password
CHAP_password
40 Command Line Interface User’s Guide
Logical (Device) Commands
GrowbyThis command grows (or expands) a logical device by a specified size or by a percentage of the available pool space. If you specify the percentage, you can choose any whole percentage between 1 and 99; partial percentages (for instance, .5) are not supported.To expand a logical device, enter:
growby size_or_percentage
For example:growby 10GB
orgrowby 25%
GrowtoThis command grows (or expands) a logical device to a specific size:
growto new_logical_drive_size
For example:growto 50GB
InfoIn the manage context, this command displays information about the logical device, including its status, the amount of space used, and its auto-discovery control list:
info
InterfaceThis command specifies the iSCSI interface(s) through which the logical device can be accessed. You can specify a single iSCSI interface, multiple interfaces, or all interfaces.To allow access to the logical device through one or more iSCSI interfaces, enter:
interface iSCSI_interface_list
To allow access to the logical device through all iSCSI interfaces, enter:interface all
RenameThis command sets a new name for the logical device:
rename new_logical_device_name
Chapter 3 Commands and Parameters 41
Logical (Device) Commands
SessionsThese commands are identical to those listed in the following section (“Sessions Commands”).
Sessions CommandsUse these commands to end or view information about current iSCSI sessions on your iSCSI Storage Appliance. To enter the sessions context, enter:
sessions
InfoIn the sessions context, this command displays information about current iSCSI sessions. You can view iSCSI session information about all logical devices, or you can view iSCSI session information about specified logical devices. You must specify each logical device by its name. (To find the name of a logical device, enter list.)To view iSCSI session information about all logical devices, enter:
info
To view iSCSI session information about a specific logical device, enter:info logical_device_name
To view iSCSI session information about multiple logical devices simultaneously, enter:
info logical_device_name_list
ListIn the sessions context, this command lists all current iSCSI sessions:
list
42 Command Line Interface User’s Guide
Logical (Device) Commands
ResetNote Administrator access only.
This command ends all current iSCSI sessions on a specified logical device. You must specify the logical device by its name. (To find the name of a logical device, enter list.) You will be prompted to confirm that you want to stop the iSCSI sessions on the specified logical device.Caution After you enter and confirm this command, all current iSCSI sessions on the logical device stop. Stop all active applications before you begin.
To end all current iSCSI sessions on a specified logical device, enter:reset logical_device_name
yes
UpNote Administrator access only.
This command brings up a specified logical device. You must specify the logical device by its name. (To find the name of a logical device, enter list.) You will be prompted to confirm that you want to bring up the specified logical device.To bring up a logical device, enter:
up logical_device_name
yes
To bring up multiple logical devices simultaneously, enter:up logical_device_name_list
yes
Chapter 3 Commands and Parameters 43
Network Commands
Network CommandsUse the commands in this section to modify your network settings, including server and iSCSI Storage Appliance settings.To enter the network context, enter:
network
DNSNote Administrator access only.
This command sets up a Domain Name System (DNS) server. You can also use this command to remove a DNS server from your IP SAN. You must specify each server by its IP address. You can have up to three DNS servers on your IP SAN (primary, secondary, and tertiary). You can add them all simultaneously on the same command line.To set up a DNS server, enter:
dns server_IP_address
You can enter up to three IP addresses, leaving one space between each. For example:dns 10.20.30.400 10.20.30.401 10.20.30.402
To remove a DNS server, enter:dns server_IP_address clear
DomainNote Administrator access only.
This command sets a new domain name for your iSCSI Storage Appliance. You can use this command on the same line as the SANname command (see page 46) and hostname command (see page 45), to configure the network details in one command.
domain new_domain_name
The name is changed immediately.To set a new domain name, host name, and IP SAN name, enter:
domain new_domain_name sanname new_IPSAN_name hostname new_host_name
Note The commands can be entered in any order.
44 Command Line Interface User’s Guide
Network Commands
GatewayNote Administrator access only.
This command sets a new gateway server for your IP SAN. You can also use this command to remove a gateway server from your IP SAN. You must specify the server by its IP address.
gateway server_IP_address
The gateway server is changed immediately.To remove a DNS server, enter:
gateway server_IP_address clear
HostnameNote Administrator access only.
This command sets a new host name of your iSCSI Storage Appliance. You can use this command on the same line as the domain command (see page 44) and SANname command (see page 46), to configure the network details in one command.
hostname new_host_name
The name is changed immediately.To set a new domain name, host name, and IP SAN name, enter:
domain new_domain_name sanname new_IPSAN_name hostname new_host_name
Note The commands can be entered in any order.
InfoThis command displays information about your network, including server and Ethernet port details.
info
NTPNote Administrator access only.
This command sets a Network Time Protocol (NTP) server for your IP SAN. You can also use this command to remove an NTP server from your IP SAN. You must specify the server by its IP address.
ntp server_IP_addressThe NTP server is changed immediately.To remove an NTP server, enter:
ntp server_IP_address clear
Chapter 3 Commands and Parameters 45
Operator Command
SANnameNote Administrator access only.
This command sets a new name for your IP SAN. You can use this command on the same line as the domain command (see page 44) and hostname command (see page 45), to configure the network details in one command. To set a new name for your IP SAN, enter:
sanname new_IPSAN_name
The name is changed immediately.To set a new domain name, host name, and IP SAN name, enter:
domain new_domain_name sanname new_IPSAN_name hostname new_host_name
Note The commands can be entered in any order.
Operator CommandBy default, the CLI opens at the Operator level (see page 4). If an Operator password is set, you will be prompted to enter it before you can begin working in the CLI.To switch back to the Operator level from the Administrator level, enter:
operator
Note Optionally, enter a shorthand version of the command: op.
Password CommandNote Administrator access only.
Use this command to set a new password for Operator- or Administrator-level access, or remove the requirement for a password at either level.
Setting a New Administrator PasswordTo change the Administrator password, enter:
passwordWhen prompted, enter the current password. (The default password for both levels is admin.) When prompted, enter the new password, then enter it again. For example:
passwordadmin [current password]adaptecadaptec
Note Press Ctrl+C at either password prompt to exit without changing the existing password.
46 Command Line Interface User’s Guide
Pool Commands
Removing a Password RequirementTo remove the requirement for an Administrator password, press Enter at each password prompt instead of entering a new password.
Setting a New Operator PasswordTo change the Operator password, enter:
password operator
When prompted, enter the new password, then enter it again. For example:adaptec
adaptec
Note Press Ctrl+C at either password prompt to leave the existing password unchanged.
Removing a Password RequirementTo remove the requirement for an Operator password, press Enter at each password prompt instead of entering a new password.
Pool CommandsUse the commands in this section to manage the storage pools on your iSCSI Storage Appliance. To enter the pool context, enter:
pool
AlarmThis command manages the alarm on your iSCSI Storage Appliance. You can use this command to view the current alarm settings, and you can enable or disable the alarm, test it, and silence a sounding alarm.To view current alarm settings, enter:
alarm info
To enable or disable the alarm, enter:alarm enable_or_disable
To test the alarm, enter:alarm sound
To silence a sounding alarm, enter:alarm silence
Chapter 3 Commands and Parameters 47
Pool Commands
CreateNote Administrator access only.
This command creates a new pool. Up to 20 pools are supported on a single iSCSI Storage Appliance. The complete command syntax is:
create pool_name RAID_level stripe_depth disk_drive_list
Where:• pool_name is a unique name for the pool
• RAID_level is the RAID level you want to apply to the pool (if any)
Note Ensure that you have enough available disk drives to support the RAID level you want.
• stripe_depth is the stripe depth for the pool
• disk_drive_ID_list is the ID number of the disk drive(s) to be included in the pool
Note To find a disk drive’s ID, exit the pool context then enter device list.
To create a pool with no RAID level, enter:create poolA 0
To create a pool with RAID 5, enter:create poolB raid5 256 0 512 768
Note Ensure that you list the minimum number of disk drives required to support the RAID level you want.
Creating a Pool with RAID 50 or RAID 60To create a pool with RAID 50 or RAID 60, you must specify six or eight disk drives (respectively) and arrange them into groups. You must also specify the number of groups you want.To create a pool with RAID 50 or RAID 60, enter:
create pool_name RAID_50_or_60 stripe_depth disk_drive_list group number_of_groups
For example:create poolA raid50 256 0 256 512 768 1024 1280 group 2
48 Command Line Interface User’s Guide
Pool Commands
DestroyNote Administrator access only.
This command deletes a specified pool or pools. After a pool is deleted, the disk drives that comprised it become available for use.You must specify each pool by its name. Enter destroy then press Tab twice, to see the names of pools that can be deleted. You can’t delete a pool that includes logical devices. (To delete a logical device, see “Destroy” on page 38.)Foreign pools must be imported before they can be deleted. See “Import” on page 50 for more information.Caution Before you begin, ensure that you have backed up any data you want to save. When the pool is deleted, any data or programs stored on that pool are also deleted.
You will be prompted to confirm the deletion before the task completes.To delete a pool or pools, enter:
destroy pool_name_list
yes
The pool is deleted immediately.
Note Depending on your OS, the drive-letter assignments of any remaining drives may change after a pool is deleted and the system is rebooted.
ExportNote Administrator access only. This command is used in conjunction with the import command. See “Import” on page 50 for more information.
This command exports one or more pools so that it can be moved to a different iSCSI Storage Appliance. You must specify each pool by its name. (To find the name of a pool, enter list.) You will be prompted to confirm the export before the task is completed.
Notes 1) Ensure that no iSCSI initiators are accessing a pool before you attempt to export it. Pools being accessed can’t be exported. 2) Adaptec recommends that you not export a pool while it is building, rebuilding, or synchronizing. If you do, it appears as an alien pool when you import it to a new iSCSI Storage Appliance. (An alien pool is a partially completed pool whose creation was interrupted; it contains no iSCSI Storage Appliance information. Alien pools can’t be imported or used to store data, and should be deleted.)To export a pool or pools, enter:
export pool_name_listyes
Exported pools are called foreign pools. Only one foreign pool at a time appears in the CLI.
Chapter 3 Commands and Parameters 49
Pool Commands
Next StepsAfter the pool has been exported, shut down both iSCSI Storage Appliances—the appliance you are exporting from and the appliance you are importing to. (For instructions refer to the Snap Server 700i Series User’s Guide on the User CD.) Move the disk drives that comprise the pool to the new iSCSI Storage Appliance, following the manufacturer’s instructions, power on the new iSCSI Storage Appliance, then import the foreign pools using the import command (see page 50). Only one foreign pool at a time appears in the CLI; after you import the first foreign pool, the next foreign pool appears in the CLI, and so on.
IdentifyNote Administrator access only.
This command helps you identify disk drives included in a pool or pools by blinking their LEDs. You must specify each pool by its name. (To find the name of a pool, enter list.)To start blinking disk drive LEDs, enter:
identify pool_name_list start
For example:identify pool-1 pool-2 start (blinks the disk drives in pool-1 and pool-2)identify pool-3 start (blinks the disk drives in pool-3)
The LEDs will stop blinking automatically after 30 seconds. You can stop the blinking sooner by entering:
identify pool_name_list stop
ImportNote Administrator access only. This command is used in conjunction with the export command. See “Export” on page 49 for more information.
This command imports foreign pools to your iSCSI Storage Appliance. You will be prompted to confirm the export before the task is completed.To import a pool, enter:
import pool_name_list
yes
The pool is imported. This may take a few minutes.
50 Command Line Interface User’s Guide
Pool Commands
InfoIn the pool context, this command displays information about one or more pools, including status, cache settings, and the disk drives that comprise each pool. You must specify each pool by its name. (To find the name of a pool, enter list.)To display information about all pools associated with your iSCSI Storage Appliance, enter:
info
To display information about a specific pool, enter:info pool_name
To display information about multiple pools simultaneously, enter:info pool_name_list
ListIn the pool context, this command lists all known pools associated with your iSCSI Storage Appliance:
list
Manage CommandsNote Administrator access only.
Use these commands to modify the settings for a specified pool. You must specify the pool by its name. (To find the name of a pool, enter list.) To enter a pool’s manage context, enter:
manage pool_name
CacheThis command enables or disables the cache settings for the pool. You can set the read cache and write cache settings separately.To change the cache settings for the pool, enter:
cache read_or_write enable_or_disable
For example:cache read enable
The setting is changed immediately.
Chapter 3 Commands and Parameters 51
Pool Commands
IdentifyThis command helps you identify the disk drives included in the pool by blinking its LEDs:
identify
The LEDs will stop blinking automatically after 30 seconds. You can stop the blinking sooner by entering:
identify stop
InfoIn a pool’s manage context, this command displays information about the pool, including its status, cache settings, and disk drives that comprise the pool:
info
RenameThis command changes the name of the pool:
rename
Spare CommandsIn a pool’s manage context, these commands create and remove designated hot spares for the pool. You can also use this command to view a list of the pool’s existing hot spares. To enter the pool’s spare context, enter:
spare
• Add—This command designates a specified disk drive as a dedicated hot spare. Only disk drives that are available (not used in any existing pools) can be designated as hot spares. You must specify the disk drive by its ID number. (To find a disk drive’s ID number, exit the pool context and enter device list.)
add disk_drive_ID
The disk drive is immediately designated as a dedicated hot spare.
• List—This command lists the disk drives in your iSCSI Storage Appliance that are designated as dedicated hot spares for the pool:
list
• Remove—This command removes the dedicated hot spare designation from a disk drive. You must specify the disk drive by its ID number. (To find a disk drive’s ID number, exit the pool context and enter device list.)
remove disk_drive_ID
52 Command Line Interface User’s Guide
Pool Commands
Task RateThis command sets the speed of whatever job is currently running on the pool (building, rebuilding, synchronizing, or verifying). You can change this setting to high, medium, or low.To change a job’s speed, enter:
task rate speed
VerifyThis command begins a background verification on the pool:
verify
To stop all running background verifcation jobs, see “Verify Commands” on page 55.
MigrateNote Administrator access only.
This command modifies a specified pool by changing its RAID level, stripe depth, and/or list of disk drives that comprise the pool.
This table lists supported RAID-level migrations. Ensure that you have enough available disk drives to support the new RAID level.
Note You can also migrate from RAID 1 or RAID 5 to RAID 0. If the pool has a spare drive associated with it, the RAID 0 pool retains the spare drive.
You must specify the pool by its name. (To find a pool’s name, enter list. To view a pool’s other settings, enter info.) You must specify disk drives by their ID number. (To find a disk drive’s ID, exit the pool context and enter device list.) You will be prompted to confirm the migration before the task completes.
From RAID Level To RAID Level
Simple Volume RAID 1
RAID 0 RAID 5 or RAID 10
RAID 1 Simple Volume, RAID 5, or RAID 10
RAID 5 RAID 0, RAID 10, or RAID 6
RAID 6 RAID 5
RAID 10 RAID 0 or RAID 5
Chapter 3 Commands and Parameters 53
Pool Commands
The complete command syntax is:migrate pool_name RAID_level stripe_depth disk_drive_ID_list
Where:• pool_name is the name of the pool
• RAID_level is either the existing RAID level or a new RAID level for the pool
• stripe_depth is either the existing stripe depth or a new stripe depth for the pool
• disk_drive_ID_list is either the existing or a new list of disk drives (by disk drive IDs) comprising the pool
For example, to migrate an existing pool with RAID 1, a stripe depth of 128, and two disk drives (ID 0 and 256), to a RAID 5 pool with the same stripe depth, enter:
migrate pool-1 raid5 128 0 256 512
yes
Spare CommandsUse these commands to designate a global hot spare for your iSCSI Storage Appliance. You can also use this command to remove a hot spare designation, or to view a list of existing hot spares on your iSCSI Storage Appliance. To enter the spare context, enter:
spare
AddNote Administrator access only.
This command designates a specified disk drive as a global hot spare. Only disk drives that are available (not used in any existing pools) can be designated as hot spares. You must specify the disk drive by its ID number. (To find a disk drive’s ID number, exit the pool context and enter device list.)
add disk_drive_ID
The disk drive is immediately designated as a global hot spare.
ListThis command lists the disk drives in your iSCSI Storage Appliance that are designated as global hot spares:
list
54 Command Line Interface User’s Guide
Pool Commands
RemoveNote Administrator access only.
This command removes the global hot spare designation from a disk drive. You must specify the disk drive by its ID number. (To find a disk drive’s ID number, exit the pool context and enter device list.)To remove the global hot spare designation from a disk drive, enter:
remove disk_drive_ID
UnusedNote Administrator access only.
This command lists any pool that contains no logical devices:unused
Verify CommandsNote Administrator access only.
These commands change the background verification settings for all the pools on your iSCSI Storage Appliance. To enter the verify context, enter:
verify
RateThis command sets the speed of all background verification jobs. You can change this setting to high, medium, or low.To set the speed of all background verification jobs, enter:
rate speed
StartThis command begins a background verification job. All pools are checked.
start
StatusThis command displays the current status of any running background verification jobs, including its speed:
status
StopThis command stops a running background verification job:
start
Chapter 3 Commands and Parameters 55
Quit Command
Quit CommandUse this command to exit the CLI:
quit
Note Optionally, enter a shorthand version of the command: q.
Route CommandsUse the commands in this section to control static routes on your IP SAN. To enter the route context, enter:
route
Add Note Administrator access only.
This command adds a new static route for your iSCSI Storage Appliance. You must specify this information in the command:• Destination—The IP address or host name of the destination system and the
netmask bits of the destination system, in this format: IP address/netmask bits
• Gateway—The IP address (and interface name, if required) of the gateway server on your IP SAN.
To add a new static route, enter:add destination gateway interface_name
For example:add 123.456.789.0/12 10.20.300.402 eth3
or add 123.456.789.0/12 10.20.300.409
56 Command Line Interface User’s Guide
Route Commands
DeleteNote Administrator access only.
This command removes an existing static route. You must specify the destination, netmask, and gateway of the destination system in the command. (See the previous section for definitions of these values.)To delete a static route, enter:
delete destination gateway interface_name
For example:delete 123.456.789.0/12 10.20.300.402 eth3
or delete 123.456.789.0/12 10.20.300.409
InfoIn the route context, this command displays all static routes by destination. The netmask, gateway, and Ethernet port information for each route is also included.
info
ListIn the route context, this command lists all static routes, including the destination, netmask, and gateway:
list
Chapter 3 Commands and Parameters 57
Service Info Command
Service Info CommandThis command displays the status of all services running on the iSCSI Storage Appliance:
service info
The services listed include:• dvtd—The event logging service
• inetd—Basic networking support (Linux)
• snmpd—SNMP service (Linux)
• datapathd—The core iSCSI storage service
• hdmd—The system health and monitoring service
• nadd—The Service Location Protocol (SLP) configuration change service
• evmd—The support service for datapathd
• mfsad—The storage array configuration service
• mgmtagent—The SAN management agent (for example, WinAgent on Windows hosts)
• slpd—The SLP service (iSCSI target discovery)
• isnsd—The iSNS service (iSCSI target discovery)
• rhrdd—The storage array monitoring service
Setup CommandThis command opens the Setup Wizard, which helps you enter the information required to connect your iSCSI Storage Appliance to a local network.For step-by-step instructions for using the Setup Wizard, see “Using the Wizard to Configure Your iSCSI Storage Appliance” on page 71.
58 Command Line Interface User’s Guide
Show Command
Show CommandThis command displays information about functional areas of your iSCSI Storage Appliance. The information that displays is identical to the information that displays when you use either the info or list command within a functional context.To display information about a functional area, enter:
show functional_area
For example:show initiator
orshow device
To display information about all functional areas, enter:show all
Snapshot CommandsUse the commands in this section to create, delete, and modify snapshots on your iSCSI Storage Appliance.Snapshots created on systems running Windows 2003 are application-consistent; snapshots created on systems running Windows XP, Windows Vista, Linux, or VMware are file-consistent only. For more information about snapshots, refer to the Snap Server 700i Series User’s Guide on the User CD.To enter the snapshot context, enter:
snapshot
Note Snapshots are special logical devices. Many of the commands in this section are identical to the commands in “Logical (Device) Commands” on page 36.
AbortNote Administrator access only. For more information about rolling back a snapshot, see “Rollback” on page 62.
This command stops a rollback in process. You must specify the name of the snapshot that is being rolled back.
abort snapshot_name
Chapter 3 Commands and Parameters 59
Snapshot Commands
CreateNote Administrator access only.
This command creates a snapshot of a logical device. You must specify a name for the snapshot; you must also specify the logical device by its name. (To find the name of a logical device, exit the snapshot context, then enter device list.)To create a snapshot, enter:
create snapshot_name device_name
DestroyNote Administrator access only.
This command deletes a snapshot. You must specify the snapshot by its name. To find the name of a snapshot, enter list.) You will be prompted to confirm the deletion before the task is completed.To delete a snapshot, enter:
destroy snapshot_name
yes
The snapshot is deleted immediately.
DownNote Administrator access only.
This command takes a snapshot offline. You might want to do this to temporarily disallow login to that snapshot. You must specify the snapshot by its name. To find the name of a snapshot, enter list.) You will be prompted to confirm the command before the task is completed.To take down a snapshot, enter:
down snapshot_name
yes
The snapshot is taken offline immediately. Bringing down a snapshot does not make it inconsistent in any way.
60 Command Line Interface User’s Guide
Snapshot Commands
InfoIn the snapshot context, this command displays information about one or more snapshots, including status, the amount of space used, and auto-discovery control lists. You must specify each snapshot by its name. (To find the name of a snapshot, enter list.)To display information about all snapshots associated with your iSCSI Storage Appliance, enter:
info
To display information about a specific snapshot, enter:info snapshot_name
To display information about multiple snapshots simultaneously, enter:info snapshot_name_list
ListIn the snapshot context, this command lists all known snapshots associated with your iSCSI Storage Appliance:
list
Manage CommandsNote Administrator access only, except for the info command.
Use these commands to modify a specified snapshot. You must specify the snapshot by its name. (To find the name of a snapshot, enter list.) To enter the manage context for a snapshot, enter:
manage snapshot_name
AllowFor more information, see “Allow” on page 39.
AuthenticationFor more information, see “Authentication” on page 39.
Chapusers CommandsFor more information, see “Chapusers Commands” on page 40.
DenyFor more information, see “Deny” on page 40.
Chapter 3 Commands and Parameters 61
Snapshot Commands
InfoIn the manage context, this command displays information about the snapshot, including its status, the amount of space used, and its auto-discovery control list:
info
InterfaceFor more information, see “Interface” on page 41.
RenameThis command sets a new name for the snapshot:
rename new_snapshot_name
Sessions CommandsFor more information, see “Sessions Commands” on page 42.
RollbackNote Administrator access only.
This command rolls back a snapshot. You must specify the snapshot by its name. (To find the name of a snapshot, enter list.)
rollback snapshot_name
UpNote Administrator access only.
This snapshot returns a ‘downed’ (offline) snapshot to normal, online status. You must specify the snapshot by its name. (To find the name of a snapshot, enter list.)
up snapshot_name
62 Command Line Interface User’s Guide
System Commands
System CommandsUse the commands in this section to change the settings of your iSCSI Storage Appliance.To enter the system context, enter:
system
DateThis command sets a new date or time on your iSCSI Storage Appliance. You can also use this command to view the current date and time setting.
Note 1) Your iSCSI Storage Appliance appliance uses the time setting for event timestamps only. 2) The Adaptec OnTarget operating system does not automatically adjust the time setting on your iSCSI Storage Appliance to accommodate Daylight Saving Time. 3) Only users with Administrator access can change the date and time setting.
Notes
To view the current date and time on your iSCSI Storage Appliance, enter:date
To set a new date or time on your iSCSI Storage Appliance, enter:date absolute_date
or date relative_period
For example, to change the date and time to 6:00 am July 25, 2007, enter:date 06:00:00@07/25/07
or , to move the time ahead by three hours, enter:date +3h
Note For more information about the absolute_date and relative_period parameters used with the date command, see the "Glossary".
Chapter 3 Commands and Parameters 63
System Commands
DefaultsNote Administrator access only.
This command returns your iSCSI Storage Appliance to its factory default settings. You will be prompted to confirm the command before the appliance is reset.Caution After you enter and confirm this command, your iSCSI Storage Appliance is restarted automatically. Stop all active applications before you begin.
To return your iSCSI Storage Appliance to its factory default settings, enter:defaults
yes
The appliance is returned to its factory default settings and is restarted automatically.
HaltNote Administrator access only.
This command shuts down your iSCSI Storage Appliance. You will be prompted to confirm the command before the appliance is shut down.Caution After you enter and confirm this command, your iSCSI Storage Appliance is powered down. Stop all active applications before you begin.
To shut down your iSCSI Storage Appliance, enter:halt
yes
The appliance is powered down.
InfoIn the system context, this command displays information about your iSCSI Storage Appliance and the Adaptec OnTarget operating system, including uptime status and firmware image version:
info
64 Command Line Interface User’s Guide
System Commands
KeyboardNote Administrator access only.
This command changes the configuration of the keyboard you are using with your iSCSI Storage Appliance. The default setting is US (American English). You can choose from these configuration codes:• de—German (QWERTZ configuration)
• es—Spanish (QWERTY configuration)
• fr—French (AZERTY configuration)
• it—Italian (QWERTY configuration)
• uk—British English (QWERTY configuration)
• us—American English (QWERTY configuration)
To change the keyboard configuration, enter:keyboard configuration_code
For example:keyboard uk
RebootNote Administrator access only.
This command shuts down and restarts your iSCSI Storage Appliance. You will be prompted to confirm the command before the appliance is shut down and restarted.Caution After you enter and confirm this command, your iSCSI Storage Appliance is powered down and then restarted. Stop all active applications before you begin.
To shut down and restart your iSCSI Storage Appliance, enter:reboot
yes
The appliance is powered down and restarted.
StatusThis command displays the current status of your iSCSI Storage Appliance:
status
Note To clear existing warning or error events and return the appliance status to normal, use the “Events Commands” on page 19.
Chapter 3 Commands and Parameters 65
System Commands
TimezoneThis command sets the time zone for your iSCSI Storage Appliance. You can also use this command to view the current time zone setting.Note Only users with Administrator access can change the time zone setting.
To change the time zone setting, enter a positive (+) number to indicate the number of hours ahead of Greenwich Mean Time (GMT) or a negative (-) number to indicate the number of hours behind GMT. To view the current time zone setting, enter:
timezone
To change the time zone setting, enter:timezone hours_+/-_GMT
For example:timezone -5
TSID CommandsUse these commands to view or set your iSCSI Storage Appliance’s Technical Support Identification (TSID) number.
InfoThis command displays your iSCSI Storage Appliance’s TSID number:
tsid info
SetIDNote Administrator access only.
This command sets a TSID number for your iSCSI Storage Appliance. To set the TSID number, enter:
tsid setid
When prompted, enter the 12-character TSID. For example:
123234345456
66 Command Line Interface User’s Guide
UPS Commands
UPS CommandsUse the commands in this section to modify the settings of your Uninterruptible Power Supply (UPS).To enter the ups context, enter:
ups
InfoIn the ups context, this command displays the current settings for the UPS:
ups
Monitor CommandsNote Administrator access only.
Use these commands to add, modify, and delete UPS monitors. Changes made using these commands are implemented immediately.
DisableTo disable the existing UPS monitor, enter:
monitor disable
LocalTo define the local system as the UPS monitor, enter:
monitor local
RemoteTo define a remote system as the UPS monitor, enter:
monitor remote remote_monitor_IP_address
For example:monitor remote 10.20.300.400
SNMPTo specify that the UPS will be monitored using SNMP, enter:
monitor snmp UPS_IP_address
For example:monitor snmp 10.20.300.401
Chapter 3 Commands and Parameters 67
UPS Commands
Permit CommandsUse these commands to specify which remote host systems are permitted to monitor the UPS. You must specify the host systems by their IP addresses. Note You must have a local UPS defined before you can add remote systems to the permit list.
Changes made using permit commands are implemented immediately. To enter the permit context, enter:
permit
AddNote Administrator access only.
This command adds a host system to the permit list:add host_system_IP_address
ListThis command displays the permit list, which includes the IP addresses of all host systems that are permitted to monitor the UPS:
list
RemoveNote Administrator access only.
This command removes a host system from the permit list:remove host_system_IP_address
StatusThis command displays basic information about which UPS is being monitored (local or remote), if any. If a remote UPS is being monitored, its IP address is also listed.
status
68 Command Line Interface User’s Guide
UPS Commands
Threshold UnitNote Administrator access only.
This command sets the halt unit threshold, the level at which the iSCSI Storage Appliance is shut down gracefully to protect your data from a failing battery. The default setting is 2 minutes. You can set the halt unit threshold to any value from 2 to 50 minutes.To set the halt unit threshold to 5 minutes, enter:
threshold unit 5
The setting is changed immediately.
Chapter 3 Commands and Parameters 69
Appendix A
Using the Wizard to Configure Your iSCSI Storage ApplianceThe CLI includes a Setup Wizard, which helps you enter the information required to connect your iSCSI Storage Appliance to a local network.The Setup Wizard opens automatically if your iSCSI Storage Appliance is in the factory default state when you start the CLI. You can also run the Setup Wizard at any time by using the setup command.Note You must be logged in as Administrator to access the setup command.
Before You BeginPrepare these values for the iSCSI Storage Appliance, as required:• A name for the iSCSI Storage Appliance (the host name); the name can be any
combination of alphabetical and/or numerical characters
• The network domain to which the iSCSI Storage Appliance belongs; the name can be any combination of alphabetical and/or numerical characters
• A password for Administrator-level (full) access to the CLI, if required
• A password for Operator-level (limited) access to the CLI, if required
Note The Administrator- and Operator-level passwords both default to admin if you don’t customize them.
• IP addresses for each Ethernet Port on the iSCSI Storage Appliance
• The netmask of the iSCSI Storage Appliance
• The IP address to be used for broadcasts
• Optional:
• Default gateway address—The name or IP address of a router where packets are sent if their destinations are not defined
• DNS server IP addresses—IP addresses of up to 3 systems that will act as DNS servers
Note Adaptec highly recommends that you record the values you enter during this task and store them for future reference.
Command Line Interface User’s Guide 71
Working in the Setup Wizard
Working in the Setup WizardWhen the Wizard opens, it prompts you to enter the values you prepared in “Before You Begin” on page 71. You can also use these three commands in the Wizard, if required:
If a question has a predefined or default answer, the answer appears beside the prompt in square brackets [ ].
Configuring Your iSCSI Storage ApplianceTo configure the iSCSI Storage Appliance:
1 Connect to the appliance, following the instructions in “Accessing the CLI” on page 3, then power it on.
If the appliance is in the factory default state, the Setup wizard opens automatically. Skip to Step 3.
2 Enter the Administrator password, then enter:setup
The Setup Wizard opens.
Enter a number to select the keyboard configuration you are using. The default is 6, the American (US) English configuration.
3 At the Hostname prompt, enter a name for the iSCSI Storage Appliance. Use alphanumeric characters. For example:
Hostname or Hostname1
4 Enter the network domain to which the iSCSI Storage Appliance belongs. Use alphanumeric characters. For example:
Domain or Domain1
5 Press Enter to accept the current system date, or enter a new date. Use this format: [hh:mm:ss@mm/dd/yy]
Command Function
*abort Quit the Setup Wizard without saving any new settings
*back Go to re-enter the previous value
help or ? Describe the current options
72 Command Line Interface User’s Guide
Configuring Your iSCSI Storage Appliance
6 Press Enter to accept the current time zone, or enter a new time zone. Use this format:
GMT+12 to GMT-12
7 Enter yes (the whole word, not just “y”) to create a new Administrator password. Enter the new password, then enter it again as confirmation.
If you don’t enter a new Administrator password, the password defaults to admin.
8 Enter a new Operator password, then enter it again as confirmation.
9 Press Enter to accept the DHCP default setting (No).
10 Enter a default gateway address (the name or IP number of a router to which packets for destinations that do not have routes defined for them in the system should be sent).
If you are not using a gateway address, press Enter to skip to the next prompt.
11 Enter the IP addresses of your DNS servers (up to three are supported).
If you are not using DNS servers, press Enter to skip to the next prompt.
12 Enter the IP address for the iSCSI Storage Appliance. Use this format:
xxx.yyy.zzz.aaa
13 Enter the netmask of the iSCSI Storage Appliance. Use this format:
xxx.yyy.zzz.aaa
14 Enter the IP address to be used for broadcasts. Use this format:
xxx.yyy.zzz.aaa
When the configuration is complete, the host name given to the iSCSI Storage Appliance displays. For example:
myhostname#
15 Enter quit to log out of the CLI, or any other command to continue working in the CLI.
Caution To avoid permanent data loss, do not modify the default BIOS settings of the RAID controller in your iSCSI Storage Appliance. To safely configure or modify the appliance, use either the CLI or Adaptec Storage Manager only.
73
Appendix B
Updating the Adaptec OnTarget Operating SystemAs newer versions of the Adaptec OnTarget operating system become available, you can update your iSCSI Storage Appliance. Your iSCSI Storage Appliance stores two versions (or images) at a time, so that if you experience problems with a newly downloaded one, you can revert to the previous image (see page 77).This appendix explains how to update to a new image using the CLI. You can also update to a new image using Adaptec Storage Manager. Refer to the Snap Server 700i Series User’s Guide on the Adaptec OnTarget User CD for instructions.Note This task is recommended for advanced users only. If you are also updating to a newer version of Adaptec Storage Manager, complete that update before updating the Adaptec OnTarget operating system image. Refer to the Snap Server 700i Series User’s Guide on the Adaptec OnTarget User CD for instructions.
Uploading a New ImageNote Administrator access only.
New images for your iSCSI Storage Appliance are posted on the Adaptec Web site at www.adaptec.com. Image files have a .upgrade file extension and can be uploaded using http, ftp or ikxmodem. Once you have downloaded a new image, follow these instructions to update your iSCSI Storage Appliance.Caution Because all updated iSCSI Storage Appliances will be automatically rebooted after the image has been updated, stop all active applications before you begin.
To upload a new image to your iSCSI Storage Appliance, enter:image upload URL
For example:image upload http://imageserver/x86.1345.upgrade
orimage upload ftp://10.20.300.400/images/x86.1345.upgrade
Command Line Interface User’s Guide 75
Checking the Current Image
Alternatively, use this command to upload the image through your iSCSI Storage Appliance’s serial port:
image upload ikxmodem
When prompted to confirm the upload, enter:yes
The image is uploaded and your iSCSI Storage Appliance is automatically restarted. (This may take a few minutes.)
Checking the Current ImageTo see what image is currently running, enter:
image info
This information appears:
In the figure above, Image 2 is the image running currently. Image 2 is also the image that will be used the next time the iSCSI Storage Appliance is restarted or powered on.
Image Number
Image Name
Version Date and Time
Version Number
76 Command Line Interface User’s Guide
Reverting to the Previous Image
Reverting to the Previous ImageNote Administrator access only.
Your iSCSI Storage Appliance stores two versions (or images) of Adaptec OnTarget at a time. If you experience problems with a newly downloaded image, you can revert to the previous one. You can also return from the previous image to the new one, if required.Note Reverting to a previous image is not always supported, as some upgrades are not backward-compatible. If upgrading to a new image will make it impossible to revert to a previous image, without the loss of configuration data, you will receive a warning when you download the new image.
To see which images are available, enter:image info
To choose the image to use the next time the iSCSI Storage Appliance is restarted or powered on:1 Enter this command, specifying the image by its number:
boot image_number
For example, to change the default boot image to image number 2, enter:
boot 2
The CLI confirms that the image you specified is now the default boot image.
2 To apply the image, restart your iSCSI Storage Appliance.
Caution Do not make any configuration changes before you restart the appliance. Any changes that you make will be lost when the appliance restarts.
3 To check that the image you selected is running, enter:
image info
then check that Current Image is the image you selected.
Updating the Adaptec OnTarget Operating System 77
Appendix C
Command TreeThis section provides a map to the commands available in the CLI. For detailed information about each command and its optional parameters, see “Commands and Parameters” on page 11.
Administrator Command
Clone CommandsAbortCreateInfoList
Device CommandsIdentifyInfoInitialiseListManage CommandsUnused
Diagnostics CommandsCheckDumpPingTracert
Command Line Interface User’s Guide 79
Events CommandsClearInactive CommandsInfoReport
Help Command
Image CommandsBootInfoListUpload
Initiator CommandsCreateDestroyInfoListLocalManage Commands
AliasAlignDiscoInfoPiggybackPing
Interface CommandsInfoListManage Commands
BroadcastDHCP
80 Command Line Interface User’s Guide
DownInterfacetypeInfoIPMTUNetmaskRenameSpeedStatisticsUp
Statistics
iSNS CommandsInfoserver
License CommandsInfoKey
Logical (Device) CommandsCHAP Commands
InfoPasswordUser
CreateDestroyDownInfoListManage Commands
AllowAuthentication
Command Tree 81
Chapusers CommandsDenyGrowbyGrowtoInfoInterfaceRenameSessions
Sessions CommandsInfoListReset
Up
Network CommandsDNSDomainGatewayHostnameInfoNTPSANname
Operator Command
Password Command
Pool CommandsAlarmCreateDestroyExportIdentifyImport
82 Command Line Interface User’s Guide
InfoListManage Commands
CacheIdentifyInfoRenameSpare CommandsTask RateVerify
MigrateSpare Commands
AddListRemove
UnusedVerify Commands
RateStartStatusStop
Quit Command
Route CommandsAddDeleteInfoList
Service Info Command
Setup Command
Command Tree 83
Show Command
Snapshot CommandsAbortCreateDestroyDownInfoListManage Commands
AllowAuthenticationChapusers CommandsDenyInfoInterfaceRenameSessions Commands
RollbackUp
System CommandsDateDefaultsHaltInfoKeyboardRebootStatusTimezone
84 Command Line Interface User’s Guide
TSID CommandsInfoSetID
UPS CommandsInfoMonitor Commands
DisableLocalRemoteSNMP
Permit CommandsAddListRemove
StatusThreshold Unit
Command Tree 85