se command reference guide · se commands overview se commands are available only to authorized...

52
Dell EMC Data Domain Operating System Version 6.2 SE Command Reference Guide 302-005-409 REV 01 DELL EMC CONFIDENTIAL

Upload: others

Post on 17-May-2020

46 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Dell EMC Data Domain Operating SystemVersion 6.2

SE Command Reference Guide302-005-409

REV 01

DELL EMC CONFIDENTIAL

Page 2: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Copyright © 2014-2018 EMC Corporation All rights reserved.

Published December 2018

Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.

THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND

WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF

MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED

IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.

Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property

of their respective owners. Published in the USA.

Dell EMCHopkinton, Massachusetts 01748-91031-508-435-1000 In North America 1-866-464-7381www.DellEMC.com

DELL EMC CONFIDENTIAL

2 Data Domain Operating System 6.2 SE Command Reference Guide

Page 3: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

5

Preface 7

Revision history 11

SE Commands 13SE commands overview.............................................................................. 14Logging in as SE..........................................................................................14archive........................................................................................................ 14authentication............................................................................................. 14cloud........................................................................................................... 15ddboost.......................................................................................................15disk............................................................................................................. 15filesys..........................................................................................................15license.........................................................................................................16log............................................................................................................... 17mdtag..........................................................................................................17mtree.......................................................................................................... 17net...............................................................................................................17nfs...............................................................................................................18priv..............................................................................................................18reg.............................................................................................................. 18replication................................................................................................... 19scsitarget.................................................................................................... 19se............................................................................................................... 20session....................................................................................................... 26shell............................................................................................................ 27smnp_debug............................................................................................... 27system........................................................................................................27vdisk...........................................................................................................28vtl...............................................................................................................29

Hidden Sysadmin Commands 31Hidden sysadmin commands overview........................................................32Logging in as sysadmin............................................................................... 32adminaccess............................................................................................... 32autosupport................................................................................................32config......................................................................................................... 33filesys......................................................................................................... 33license........................................................................................................ 33replication...................................................................................................33snmp...........................................................................................................34system........................................................................................................34user............................................................................................................ 35

Undocumented Public Commands 37

Tables

Chapter 1

Chapter 2

Chapter 3

CONTENTS

DELL EMC CONFIDENTIAL

Data Domain Operating System 6.2 SE Command Reference Guide 3

Page 4: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Undocumented public commands overview................................................ 38Logging in as sysadmin............................................................................... 38perf............................................................................................................ 38

Public Commands with Hidden Arguments 39Public commands with hidden arguments overview....................................40Logging in as sysadmin............................................................................... 40adminaccess...............................................................................................40alerts.......................................................................................................... 40archive....................................................................................................... 40ddboost.......................................................................................................41filesys..........................................................................................................41ipmi.............................................................................................................42license........................................................................................................ 43log.............................................................................................................. 43ndmpd........................................................................................................ 43scsitarget................................................................................................... 43support.......................................................................................................43system........................................................................................................44user............................................................................................................ 45vdisk...........................................................................................................45vtl...............................................................................................................45

Data Domain Virtual Edition (DD VE) and Data DomainManagement Center (DDMC) Commands 47system........................................................................................................48

vdisk Static-Image-Replication Steps 49vdisk static-image-replication steps........................................................... 50

NFS Security Registry Keys 51NFS security registry keys......................................................................... 52

Chapter 4

Chapter 5

Appendix A

Appendix B

CONTENTS

DELL EMC CONFIDENTIAL

4 Data Domain Operating System 6.2 SE Command Reference Guide

Page 5: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Document revision history........................................................................................... 11NFS security registry keys..........................................................................................52

12

TABLES

DELL EMC CONFIDENTIAL

Data Domain Operating System 6.2 SE Command Reference Guide 5

Page 6: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

TABLES

DELL EMC CONFIDENTIAL

6 Data Domain Operating System 6.2 SE Command Reference Guide

Page 7: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Preface

As part of an effort to improve its product lines, Data Domain periodically releasesrevisions of its software and hardware. Therefore, some functions described in thisdocument might not be supported by all versions of the software or hardwarecurrently in use. The product release notes provide the most up-to-date informationon product features, software updates, software compatibility guides, and informationabout Data Domain products, licensing, and service.

Contact your technical support professional if a product does not function properly ordoes not function as described in this document.

Note

This document was accurate at publication time. Go to the Online Support website(https://support.emc.com) to ensure that you are using the latest version of thisdocument.

PurposeThis guide provides the complete list of up-to-date "SE" commands and arguments.Distribution of this guide is highly restricted. To request role-based access to thecommands, see "Contacting Technical Support" for information on how we can bereached.

AudienceThis document is for Technical Support personnel and technically trained vendors andpartners who require access to commands not generally exposed to end-users.Commands in this guide are typically used for advanced diagnosis and troubleshooting.Many would cause irreparable damage if mishandled, and are therefore consideredhigh-risk to users unfamiliar with certain operations.

Related documentationThe following Data Domain publications provide additional information:

l Data Domain Operating System Administration Guide

l Data Domain Operating System Command Reference Guide

l Data Domain Operating System Release Notes

Special notice conventions used in this documentData Domain uses the following conventions for special notices:

DANGER

Indicates a hazardous situation which, if not avoided, will result in death orserious injury.

WARNING

Indicates a hazardous situation which, if not avoided, could result in death orserious injury.

DELL EMC CONFIDENTIAL

Preface 7

Page 8: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

CAUTION

Indicates a hazardous situation which, if not avoided, could result in minor ormoderate injury.

NOTICE

Addresses practices not related to personal injury.

Note

Presents information that is important, but not hazard-related.

Typographical conventionsData Domain uses the following type style conventions in this document:

Bold Used for names of interface elements, such as names of windows,dialog boxes, buttons, fields, tab names, key names, and menu paths(what the user specifically selects or clicks)

Italic Used for full titles of publications referenced in text

Monospace Used for:

l System code

l System output, such as an error message or script

l Pathnames, filenames, prompts, and syntax

l Commands and options

Monospace italic Used for variables

Monospace bold Used for user input

[ ] Square brackets enclose optional values

| Vertical bar indicates alternate selections - the bar means “or”

{ } Braces enclose content that the user must specify, such as x or y orz

... Ellipses indicate nonessential information omitted from the example

Where to get helpData Domain support, product, and licensing information can be obtained as follows:

Product information

For documentation, release notes, software updates, or information about DataDomain products, go to the Online Support website at https://support.emc.com.

Technical support

Go to the Online Support website and click Service Center. You will see severaloptions for contacting Technical Support. Note that to open a service request,you must have a valid support agreement. Contact your sales representative fordetails about obtaining a valid support agreement or with questions about youraccount.

Preface

DELL EMC CONFIDENTIAL

8 Data Domain Operating System 6.2 SE Command Reference Guide

Page 9: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Your commentsYour suggestions will help us continue to improve the accuracy, organization, andoverall quality of the user publications. Send your opinions of this document to [email protected].

Preface

DELL EMC CONFIDENTIAL

9

Page 10: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Preface

DELL EMC CONFIDENTIAL

10 Data Domain Operating System 6.2 SE Command Reference Guide

Page 11: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Revision history

Table 1 Document revision history

Revision Date Description

01 (6.2.0) December 2018 l Added two new mdtag commands.

l Added the public command support bundlecreate mini with the hidden [tag <ID>] option.

DELL EMC CONFIDENTIAL

Revision history 11

Page 12: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Revision history

DELL EMC CONFIDENTIAL

12 Data Domain Operating System 6.2 SE Command Reference Guide

Page 13: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

CHAPTER 1

SE Commands

SE commands are hidden commands that are only available to authorized Data Domainand partner support personnel.

This chapter contains the following topics:

l SE commands overview...................................................................................... 14l Logging in as SE................................................................................................. 14l archive................................................................................................................14l authentication.....................................................................................................14l cloud...................................................................................................................15l ddboost.............................................................................................................. 15l disk..................................................................................................................... 15l filesys................................................................................................................. 15l license................................................................................................................ 16l log.......................................................................................................................17l mdtag................................................................................................................. 17l mtree.................................................................................................................. 17l net...................................................................................................................... 17l nfs...................................................................................................................... 18l priv..................................................................................................................... 18l reg...................................................................................................................... 18l replication...........................................................................................................19l scsitarget............................................................................................................19l se....................................................................................................................... 20l session............................................................................................................... 26l shell....................................................................................................................27l smnp_debug.......................................................................................................27l system............................................................................................................... 27l vdisk...................................................................................................................28l vtl.......................................................................................................................29

DELL EMC CONFIDENTIAL

SE Commands 13

Page 14: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

SE commands overviewSE commands are available only to authorized Data Domain and partner supportpersonnel. These commands are not available or visible to sysadmin users. Thesecommands are not documented for customers because improper use of thesecommands can result in system downtime, data unavailability, or data loss. Do notprovide any listing of the SE commands for a customer to see.

Note

Autocomplete is not available for hidden commands or arguments.

Logging in as SEComplete the following steps to log in as SE:

Procedure

1. Open an SSH session to the Data Domain system.

2. At the login as prompt, type sysadmin.

3. At the Password prompt, type the current sysadmin password.

4. Run the system show serialno command.

Record the system serial number.

5. Run the priv set se command.

6. At the Enter system password prompt, type the system serial number.

archivearchive option reset data-movement-packingReset the data movement packing option to its default setting (enabled).

archive option set data-movement-packing {enabled | disabled}Set the data movement packing option to enabled or disabled. Disabling this optionmay increase data movement speed, but could also result in a higher percentage ofduplicated data.

authenticationauthentication ldap config add <string>Add a string to the /etc/nslcd.conf configuration file LDAP nameservice daemon.

authentication ldap config remove <string>Remove a string from the /etc/nslcd.conf configuration file LDAP nameservicedaemon.

authentication ldap config showDisplay the contents of the /etc/nslcd.conf configuration file LDAP nameservicedaemon.

SE Commands

DELL EMC CONFIDENTIAL

14 Data Domain Operating System 6.2 SE Command Reference Guide

Page 15: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

cloudcloud provider benchmark showDisplay the current status of the cloud benchmark operation.

cloud provider benchmark startInitiate the cloud benchmark operation. The benchmark consists of six steps:

1. Create a test cloud profile and bucket.

2. Perform sequential write, read, and delete operations to measure the performanceof each one and estimate the maximum performance for each operation.

3. Prepare the benchmark test for concurrent operations.

4. Perform concurrent write, read, and delete operations to measure theperformance.

5. Delete all test data.

6. Delete test profile and bucket.

cloud provider benchmark stopAbort an in-progress cloud benchmark operation.

cloud provider benchmark watchDisplay the progress of the cloud benchmark operation while the operation is inprogress.

ddboostddboost event destroy <local-storage-unit> <event-id>Destroy an event on a specified storage unit.

ddboost fc virtual-connection assign vcid <id> vcengine-num<num>Assign a virtual circuit ID to a specified FC virtual connection.

ddboost fc virtual-connection migrate vcid <id> path-index<index>Migrate a virtual circuit ID to a new path.

ddboost fc virtual-connection terminate vcid <id>Remove a specified virtual circuit ID.

diskdisk clear reservation <enclosure-id>.<disk-id>Clear all registrations and reservations on the specified disk.

disk port disable <port-id>Disable the specified HBA initiator port.

disk port upgrade <port-id>Upgrade the firmware on the HBA where the specified initiator port resides. Halt allI/O, or disable the port before upgrading the HBA firmware.

filesysfilesys archive unit disable <archive-unit>Disable a specified archive unit when using Extended Retention.

SE Commands

DELL EMC CONFIDENTIAL

cloud 15

Page 16: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

filesys archive unit enable <archive-unit>Enable a specified archive unit when using Extended Retention.

filesys encryption embedded-key-manager keys create_by_seCreate a new encryption key without a requirement for security officer authorization.

filesys encryption keys import [<filename>]Hidden argument:passphrase <passphrase>Import an encryption key. Optionally specify the name of the file to import.

filesys encryption keys show detailedDisplay detailed information about all the encryption keys on the Data Domain system.

filesys flushFlush internal caches.

filesys index mergeHidden argument:reclaimForce fingerprint index merge.

filesys option set marker-type {auto | nw1 | cv1 | tsm1 | tsm2| eti1 | hpdp1 | besr1 | ssrt1 | ism1 | bti1 | none}Set marker-type to one of the preceding options.

filesys reset statsReset all file system statistics to zero.

filesys seal startSeal the file system for long-term retention by setting it to read-only and preventingany modification of the data.

filesys show detailed-statsHidden argument:<n>where <n> is a number corresponding to a specific statistic.

Display statistics from clean operations, health monitor statistics, and various filesystem operations.

filesys show statsDisplay basic file system statistics such as reads, writes, and lookups.

filesys test-point reset [<test_point>]Remove test-points from the Data Domain system. Optionally specify a single test-point to remove.

filesys test-point set <N:test_point>Create a test-point on the file system for debugging purposes.

filesys test-point showDisplay the current file system test-points.

licenselicense verify <license-code> | allVerify the specified license code without installing it on the system.

SE Commands

DELL EMC CONFIDENTIAL

16 Data Domain Operating System 6.2 SE Command Reference Guide

Page 17: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

loglog view root-historyView the audit log for the root user account.

mdtagmdtag disableDisable generic metadata tagging.

mdtag enableEnable generic metadata tagging.

mtreemtree alias create <alias-name> mtree <mtree-path>Create an alias on the specified MTree.

mtree alias delete <alias-name>Delete a specified alias.

mtree alias show <alias-name>Display the MTree to which the specified alias points.

mtree option reset anchoring-algorithm mtree <mtree-path>Reset the anchoring algorithm of the specified MTree to its default value.

mtree option set anchoring-algorithm {variable | fixed-8K}mtree <mtree-path>Set the anchoring algorithm of the specified MTree to variable segmenting, or fixed8K segmenting.

mtree option reset randomio mtree <mtree-path>Reset the random I/O handling on the specified MTree to its default value.

mtree option set randomio {enabled | disabled} mtree <mtree-path>Enable or disable random I/O handling on the specified MTree.

netnet check-connection <host> [inbound-proxy <proxy-host>[inbound-proxy-port <proxy-port>]] [outbound-proxy <proxy-host>[outbound-proxy-port <proxy-port>]]l The default inbound-proxy address is local Data Domain system address.l The default outbound-proxy address is the specified host address.l The default inbound-proxy-port and outbound-proxy-port is 3009

Check the network connection between the Data Domain system and the specifiedhost. Optionally specify inbound and outbound proxy hosts and ports to check specificnetwork routes.

net filter stopUnload the iptables module and delete all filter rules.

net option reset <name>Reset the specified network option to its default value.

SE Commands

DELL EMC CONFIDENTIAL

log 17

Page 18: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

net option set <name> <value>Set the specified network option to a new value. Use this command with jumboframes, but not all configurations need all values, or the same values. Bugs 10291 and9676 provide more information. Names and values are:

l name net.ipv4.tcp_rmem

n Minimum: 8192

n Default : 524288

n Maximum: 2097152

l name net.ipv4.tcp_wmem

n Minimum: 8192

n Default : 524288

n Maximum: 2097152

l name net.core.rmem_default: 262144

l name net.core.wmem_default: 262144

net option set net.ipv4.tcp_ <stack value>Enable or disable TCP selective stack. Set the value to 1 for enabled, or 0 for disabled.

net rpcinfo [-p <hostname>]Make a Remote Procedure Call (RPC) to an RPC server and report the results.

nfsnfs reset mountd-portReset the NFS mount port to the default value (2052). Reboot the Data Domainsystem to apply the change.

nfs reset server-portReset the NFS server port to the default value (2049). Reboot the Data Domainsystem to apply the change.

nfs set mountd-port <port>Set the NFS mount port to the specified system port. Reboot the Data Domain systemto apply the change.

nfs set server-port <port>Set the NFS server port to the specified system port. Reboot the Data Domain systemto apply the change.

privpriv set adminSet the system privilege level to sysadmin.

regreg check [<namespace-list>]Check the registry files in the specified namespace.

reg removekey <key>Remove the value from a specified registry key.

reg set <key> = <value>

SE Commands

DELL EMC CONFIDENTIAL

18 Data Domain Operating System 6.2 SE Command Reference Guide

Page 19: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Set a registry key to the specified value. Use the config dump command to list allthe registry keys and their associated values. Use a dollar sign ($) and the two-digitASCII hex code for a character to encode the character.

reg set reg-default <key>Set a registry key to the default value.

reg set unset-defaultsReset registry keys that have missing or deleted values to their default values.

reg setraw <key> = <value>Set the value for a registry key that includes encoded characters. All characters otherthan digits, lower and upper case letters, and spaces are stored as encodedcharacters. Use this option to store empty strings, binary objects, and 8-bitcharacters. Use the reg showraw command to display encoded keys.

reg show [node <ID>] [nokey] [exactly] <key>Display the value for the specified registry key.

reg show defaultsDisplay the default registry values.

reg show dynamicDisplay entries from the dynamic registry.

reg show dynamic.eccDisplay the raw ECC error count for the system DIMMs.

reg show obsoleteDisplay obsolete registry keys.

reg show stateDisplay entries from the state registry.

reg show statsDisplay the registry statistics.

reg show systemDisplay entries from the system registry.

reg showraw [node <ID>] [nokey] [exactly] <key>Display values stored in the registry, including encoded characters, which aredisplayed as a dollar sign ($) and a two-digit ASCII hex code. All characters other thandigits, lower and upper case letters, and spaces are stored as encoded.

replicationreplication dumpDump a file system listing, including segment checksums for each file,to /ddr/var/log/filesys_listing. The dump takes a long time, and DDFS isnot available during the dump. The only way to monitor the dump progress is to checkthe file size. When the file stops growing, the dump is complete.

scsitargetscsitarget device add <device-name> service <service-name>address <address>Add a SCSI target device.

scsitarget device del {<device-list> | all} service <service-name>

SE Commands

DELL EMC CONFIDENTIAL

replication 19

Page 20: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Delete one or more SCSI devices listed in device-list or all SCSI devices.

sese arp <args>Run the Unix/Linux arp command to view and flush the arp cache when debuggingnetwork problems. Use standard arp command arguments on the DDSH command line.

se arping <args>Check for other systems at the MAC level.

se check-eccRun the check-ecc utility to check for ECC memory errors.

se chmod <permissions> <filename>Modify the permissions of the specified file.

se chown <ownership> <filename>Modify the ownership of the specified file.

se cifs net <net-args>Run net for CIFS.

se cmc_dump <args>Run the CM (Container Management) container dump program.

se cmck <args>Run the CM (Container Management) layer check program to verify and correct thecontents of a container set.

se cmdb <args>Run the CM (Container Management) layer debug program to debug a container set.

se cmmap <args>Run the CM (Container Management) layer mapping program to create a map of allcontainer sets on the system.

se cmstat <args>Display CM (Container Management) statistics.

se cxgbtool <args>Control the Chelsio 10 GbE driver.

se dd_aclutil [<dd_aclutil-args>]Run the CIFS Access Control List (ACL) Utility.

se dd_raidtool <args>Run the Data Domain RAID tool.

se dd_xcacls [<dd_xcacls-args>]Get or set the CIFS Access Control Lists (ACLs).

se debug-level set <0-99> module smsSet the debug level for SMS logging to the specified value.

se default-emails set dellAdd Dell email addresses to the default email list after a fresh-install.

se default-emails set [alert-notify-list <email-addr-list>][support-notify <email-addr-list>]Modify the default email list at any time.

se disk port reset <hba port name>Reset the HBA port name to the default value.

se dmck <args>

SE Commands

DELL EMC CONFIDENTIAL

20 Data Domain Operating System 6.2 SE Command Reference Guide

Page 21: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Run the Directory Manager check.

se eeprom set {serialno <serialno> | modelno <modelno>}Set the system serial number. The command is hidden from the SE login. If a shortform is entered to get a "usage" response, the command is also hidden. Type the fullcommand to make it available.

se enclosure reset stats <enclosure id> <controller id>Reset the statistics for the specified enclosure controller.

se enclosure show {stats <enclosure id> | detailed-status<enclosure id> | detailed-stats <enclosure id>} [and-reset]Display the statistics, detailed status, or detailed statistics for the specified enclosure.

se ethtool <args>Get network driver configuration and statistics.

se fcportdiags <options> <port_index>Run diagnostics on the specified Fibre Channel (FC) port.

se findfp <args>Find fingerprints.

se firmware show allDisplay the firmware information for all system devices. If the command returns an<error retrieving version> message for any component, there is a fault onthe system. The example below shows a BMC fault.

Device Description Details ------ ----------- ------------------------ BIOS Version Current SKD017 (04/26/2012) Required SKD017 Vendor American Megatrends Inc. BMC Version Current <error retrieving version> Required 1.62 Vendor EMC Corporation CPLD Version Current <error retrieving version> Required 2a Vendor Foxconn Electronics Inc. PSU 0 Version Current <error retrieving version> Required 08.02 Vendor ACBEL POLYTECH INC. PSU 1 Version Current <error retrieving version> Required 08.02 Vendor EMC Corporation IO PCIe Switch Version Current 01.43 Required 01.43 Vendor PLX Technology Inc.. ------ ----------- ------------------------se firmware upgrade enclosure <enclosure id> {reset | [force][noreboot] <file>}Upgrade the firmware on a specified enclosure to an image file in the /ddr/var/releases directory, an absolute path, or the upgrade directory of a USB device.

se fwcheck <hostname | address>Check for firewall interference.

se grep <grep-args>Run the standard Linux grep command.

SE Commands

DELL EMC CONFIDENTIAL

se 21

Page 22: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

se ifstat {-h | -f <k|K|m|M> | -i <list of interfaces in quotesEx:'ethx,ethy,ethz'>} {interval | count}Get Ethernet port statistics.

se indict listList all the persistent indictments on the Data Domain system.

se indict remove <ID>Remove the specified persistent indictment from the Data Domain system.

se ip <args>Run ip.

se iperf <args>Run iperf to analyze the network environment.

se iptables <args>Pass specific operations to the iptables command.

se ipv6 <enable|disable|status>Enable, disable, or display status for the IPv6 addresses on all interfaces.

se lfd showDisplay Latent Fault Detection IP information.

se lldp disable [interface <physical-ifname>]Disable link layer discovery protocol (LLDP) to stop logging LLDP packets. Specify aninterface, or disable LLDP on all interfaces on the Data Domain system.

se lldp enable [interface <physical-ifname>]Enable link layer discovery protocol to start logging LLDP packets. Specify aninterface, or enable LLDP on all interfaces on the Data Domain system.

se lldp log-interval reset interface <physical-ifname>Reset the LLDP log interval for the specified interface to the default value of 3600seconds.

se lldp log-interval set <interval> interface <physical-ifname>Change the LLDP log interval for the specified interface. Specify the new log intervalin seconds.

se lldp show configDisplay the LLDP status and log interval for each physical interface on the DataDomain system.

se lldp show stats [detailed]Display basic or detailed information about LLDP packets from all LLDP-enabledinterfaces on the Data Domain system.

se lldp statusDisplay whether LLDP is enabled or disabled on the Data Domain system. Thiscommand displays the status as enabled if LLDP is enabled on one or moreinterfaces on the Data Domain system.

se ls <ls-args>Run the standard Linux ls command.

se lspci <args>Get information about all PCI buses and the devices connected to them.

se mtr <args>Run mtr, which combines the functionality of traceroute and ping.

se ndisc6 <args>Run ndisc6 to look up an on-link IPv6 node link-layer address.

SE Commands

DELL EMC CONFIDENTIAL

22 Data Domain Operating System 6.2 SE Command Reference Guide

Page 23: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

se net filter add [seq-id <n>] operation {allow | block}[protocol {tcp [ports <port>] [except-ports <port>] [src-ports<port>] [except-src-ports <port>]| udp [ports <port>] [except-ports <port>] [src-ports <port>] [except-src-ports <port>]|iana-protocol}] [clients {<host-list> | <ipaddr-list>}][except-clients {<host-list> | <ipaddr-list>}] [interfaces{<ifname-list> | <ipaddr-list>}] [except-interfaces {<ifname-list> | <ipaddr-list>}] [ipversion {ipv4 | ipv6}]Add a set of rules to the iptables, no restriction on ports.

se net filter reset {default-inbound | default-outbound}Reset the default net filter rules to their initial values of blocking inbound networktraffic and allowing outbound network traffic.

se net filter set {default-inbound {allow | block} | default-outbound {allow | block}}Set the default net filter rules to allow or block inbound and outbound network traffic.

se net firmware upgrade force device <partnum> {bootcode |extphy}Upgrade network device firmware to the specified version in the /ddr/firmware/net/<partnum>/<bootcode|extphy> directory.

se net route show tablesDisplay IP route tables.

se net show resolvconfDisplay DNS information, and search the domain set in /etc/resolv.conf.

se nslookup <args>Query Internet name servers interactively.

se nvsfile <args>Display the current state of the file system and create (reset) the Non-Volatile-Statefile.

se oemid reset [enclosure <enclosure id>]Clear the OEM identifier on the specified enclosure, and set it to NULL.

se oemid set [enclosure <enclosure id>] name <name> value<value>Set the OEM identifier on the specified enclosure. The <name> and <value> entriescannot contain spaces and cannot be longer than 56 characters combined.

se qosstatsRetrieve QoS statistics.

se ps [<ps-args>]Run the standard Linux ps command.

se scan_scsi_err <args>Scan for SCSI errors in the system logs.

se sfs_dump [-v | -h | -e | -c | -C | -q | [-B | -l] dump-file| -M mask | -s secs] <sfs-file>Dump detailed SEGFS file space information. Use the se ls command to display theSEGFS files in the /ddr/col1/segfs directory. Run se view /ddr/help/sfs_dump.txt to view a help page for this command.

se showmount [-adehv] [--all] [--directories] [--exports] [--help] [--version] [<host>]Display mount information for an NFS server:

l -a or -all: List both the client hostname and mounted directory in host:dir format.

SE Commands

DELL EMC CONFIDENTIAL

se 23

Page 24: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

l -d or -directories: List only the directories mounted by some client.

l -e or -exports: Display the NFS server export list.

l -h or -help: Provide a short help summary.

l -v or -version: Report the current version number of the program.

se slcolor <args>Run the Storage Layer color report tool.

se slfsck <args>Run the Storage Layer check program.

se slfsdb <args>Run the Storage Layer file system debug program.

se slls <args>Run the Storage Layer variant of the ls command.

se slmap <args>Run the Storage Layer file mapping program.

se sms configuration-block start command-type {all | set}[timeout <mins>] [scope {local | global}]Block SMS system configuration commands globally or locally, indefinitely or for aspecified period of time.

se sms configuration-block statusDisplay whether an SMS system configuration block is enabled on the Data Domainsystem.

se sms configuration-block stopRemove an SMS system configuration block from the Data Domain system.

se sms remote-access disableDisable SMS remote access by other software.

se sms remote-access enableEnable SMS remote access by other software.

se sms remote-access statusDisplay SMS remote access status.

se sms restartRestart SMS remote access by other software.

se sms show statsDisplay SMS remote access daemon statistics.

se ss_index_scan <args>Run the Seg Store Index (SSI) layer scan program.

se ssh <args>Run the SSH remote login program.

se ssick <args>Run the Seg Store Index (SSI) layer check program to check and repair SSI files.

se ssidb <args>Run the SSI (Seg Store Index) layer debug program.

se sumck <args>Check for Seg Store summary vectors interactively.

se sysparam reset <param_name>Reset the specified system parameter to its default value.

se sysparam set <param_name> = <value>Set the value for the specified system parameter.

SE Commands

DELL EMC CONFIDENTIAL

24 Data Domain Operating System 6.2 SE Command Reference Guide

Page 25: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Note

If you run se sysparam set to change the system parameters on the active node inan HA configuration, you must run the CLI command filesys restart on thestandby node to effect the change.

se sysparam set IFGROUP_REPLICATION_DOMAIN = <domain-name>Set the domain-name of the replication target Data Domain system for ifgroup whenthe short host name is provided as the target Data Domain system. The domain-nameprovided in registry is used instead of the source Data Domain domain-name to resolvethe target Data Domain IP address to control the replication connection.

Note

If you run se sysparam set to change the system parameters on the active node inan HA configuration, you must run the CLI command filesys restart on thestandby node to effect the change.

se sysparam show <param_name | all>Display system parameters.

se tcp_connect_infoDisplay /proc/net/ddr_tcp and /proc/net/ddr_tcp6 external connections.

se tcpdump <args>Print network traffic information.

se tdbdump <args>Run tdbdump to print the contents of a TDB file.

se telnet <args>Run Telnet with the standard Linux telnet command.

se tethereal <args>Run network capture for CIFS translation.

se threshold reset component <component_name>Reset the warning and critical correctable error reporting thresholds for the specifiedsystem component to its default value.

se threshold set component <component_name> {[warning-level<value>] [critical-level <value>] [leak-rate <value>] |[disabled]}Set the warning and critical correctable error reporting thresholds for the specifiedsystem component, or disable reporting for the specified component.

se threshold show [component <component_name>] {setting |status}Show the warning and critical correctable error reporting thresholds or correctableerror counts for a specified system component or all system components.

se tracepath <args>Run tracepath.

se traceroute <args>Run traceroute.

se top <args>Use the standard Linux top command to display CPU processes.

se upgrade honor [version-check | precheck | all]Reset the specified check to its default value.

SE Commands

DELL EMC CONFIDENTIAL

se 25

Page 26: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

se upgrade ignore [version-check | precheck]Ignore the specified check during the next upgrade attempt. The check is still madeand recorded in the log. The ignored values are reset to their defaults after theupgrade is complete.

se upgrade showDisplay the list of update flags showing which are honored and which are ignored.

se view <filename>View a specified file using less. Use the up and down arrow keys to move through thelog. Use the q key to exit. Type a slash character (/) and a pattern to search for andhighlight lines of particular interest.

se vtcck [options] [-p <pool>] <cartridge-name>Check the specified virtual tape for consistency. This command has the followingoptions:

l -d: Debug. Output readable metadata to /ddr/var/log/debug/<cartridge-name>.details.

l -f: Attempt to fix the cartridge (zero filled records).

l -i: Ignore errors and continue the consistency check.

l -m: Check the metadata without checking the data crc.

l -o Attempt to fix the cartridge (header overwrite).

l -r: Rewind the cartridge.

l -s: Silent. Check the exit code.

l -x <n>: Delete the specified duplicate block.

l -F: Perform a quick scan for file mark integrity.

l -p <pool>: Specify a pool of cartridges to check. If no pool is specified, thecommand checks the "Default" pool.

l -h: Help.

Do not use the -m, -i, -d, or -F options with options that modify the tape state (-f, -o,-r, or -x), and do not use multiple options that modify the tape state in a singleinstance of the command.

se wbinfo [<wbinfo-args>]Report CIFS user mappings.

sessionsession delete key <session id> <session key>Delete the key for the specified session.

session delete session <session id>Delete the specified session.

session reset data <session id>Delete all the key/data pairs for the specified session.

session show allDisplay all current sessions.

session show data <session id>Display all the key/data pairs for the specified session.

SE Commands

DELL EMC CONFIDENTIAL

26 Data Domain Operating System 6.2 SE Command Reference Guide

Page 27: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

shellshell escapeEscape from the DDSH level to a BASH prompt.

smnp_debugsnmp debug-level set {none | packet | error | all}Provides debug options for the SNMP component. This command allows debug levelsof none, packet, error, and all. The "none" turns off additional debug information."Packet" provides the input and output packets in a readable format. "Error" is anintermediate level and only shows output errors. All is a verbose level that displays allpossible information.

You can display debug information by using the log watch as shown in the followingexample:

log watch debug/sm/snmpd.log 2015-12-21 10:23:12 NET-SNMP version 5.4.2.1 2015-12-21 10:23:28 Received SNMP packet(s) from UDP: [127.0.0.1]->[127.0.0.1]:47393

Once the required information is retrieved, you should reset the debug level back tothe default ("none"). In addition, you should monitor the size of thefile /ddr/var/log/debug/sm/snmpd.log to ensure it is not too large. If the file istoo large, you can disable the snmp service, delete the file, and then reenable theservice. Role required: admin, limited-admin.

snmp debug-level showShows the current debug status. Role required: admin, limited-admin.

systemsystem erase nvram-flashErase the most recent vaulted copy of the system NVRAM data. The file system mustbe disabled to erase the NVRAM data. A sysadmin password is required to completethis operation.

system firmware prepare-usb <firmware-file>Load firmware from a USB drive on systems that support USB-delivered firmwareupgrades.

system io-card configure <slot>Configure the specified I/O module slot.

system io-card deconfigure <slot>Remove configuration information from the specified I/O module slot.

system io-card power {on | off} <slot>Power on or power off the specified I/O module slot.

system io-card show [all | <slot>]Display the configuration for a specific I/O module slot, or for all I/O module slots onthe Data Domain system.

system show nvramDisplay standard information about the system NVRAM.

SE Commands

DELL EMC CONFIDENTIAL

shell 27

Page 28: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

system show nvram-detailedDisplay detailed information about the system NVRAM.

system upgrade clear status <message>Replaces the Upgrade failed message returned by the upgrade statuscommand for instances where manual intervention was required to complete theupgrade. Optionally specify addition details that the system specifies in the formatUpgrade cleared manually : <message> .

system upgrade option disable support-softwarePrevent the Data Domain system from allowing the installation of support software.

system upgrade option enable support-softwareAllow the Data Domain system to install support software.

vdiskvdisk static-image-replication steps provides more details about the complete staticimage replication process.

vdisk property show object-type device [<device-spec>] [pool<pool-name> | pool <pool-name> device-group <device-group-name>] [property-name <name> | [property-name <name> property-value <regex-value>]Display the properties for the specified vdisk device, or all vdisk devices. If propertiesare not found, the system returns one of the following error messages:

l If no filtering options are specified, the system returns: No properties found.

l If filtering options are specified, the system returns: No matching propertiesfound.

vdisk property show object-type device-group [<device-group-spec>] [pool <pool-name>] [property-name <name> | [property-name <name> property-value <regex-value>]Display the properties for the specified vdisk device-group, or all vdisk device-groups.If properties are not found, the system returns one of the following error messages:

l If no filtering options are specified, the system returns: No properties found.

l If filtering options are specified, the system returns: No matching propertiesfound.

vdisk property show object-type pool [<pool-spec>] [property-name <name> | [property-name <name> property-value <regex-value>]Display the properties for the specified vdisk pool, or all vdisk pools. If properties arenot found, the system returns one of the following error messages:

l If no filtering options are specified, the system returns: No properties found.

l If filtering options are specified, the system returns: No matching propertiesfound.

vdisk property show object-type static-image [<image-spec>][pool <pool-name> | pool <pool-name> device-group <device-group-name> | device <device-name>] [property-name <name> |[property-name <name> property-value <regex-value>]Display the properties for the specified vdisk static-image, or all vdisk static-images. Ifproperties are not found, the system returns one of the following error messages:

l If no filtering options are specified, the system returns: No properties found.

SE Commands

DELL EMC CONFIDENTIAL

28 Data Domain Operating System 6.2 SE Command Reference Guide

Page 29: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

l If filtering options are specified, the system returns: No matching propertiesfound.

vdisk static-image-replication abort <replication-id>Abort the specified static-image-replication session.

vdisk static-image-replication finalize <replication-id>Finalize VDISK static-image-replication on the destination Data Domain system for thespecified replication session.

vdisk static-image-replication prepare source <hostname>destination-pool <pool-name> destination-device-group <device-group>Set the destination pool and destination device group for a static-image-replicationsession originating on the specified host.

vdisk static-image-replication prepare source <hostname>destination-device <device-name>Set the destination device for a static-image-replication session originating on thespecified host.

vdisk static-image-replication show active [<replication-id>]Display information about the specified static-image-replication session.

vdisk static-image-replication start source-static-image<static-image-name> source-pool <pool-name> source-device-group<device-group-name> destination-ddr <ddr-name> remote-replication-id <replication-id> destination-copy-phase-seed<destination-copy-phase-seed>Start a VDISK static-image-replication session from the source Data Domain systemwith the following parameters:

l source-static-image

l source-pool

l source-device-group

l destination Data Domain system

l remote-replication-id

l destination-copy-phase-seed

vdisk static-image-replication start source-static-image<static-image-name> source-device <device-name> destination-ddr<ddr-name> remote-replication-id <replication-id> destination-copy-phase-seed <destination-copy-phase-seed>Start a VDISK static-image-replication session from the source Data Domain systemwith the following parameters:

l source-static-image

l source-device

l destination Data Domain system

l remote-replication-id

l destination-copy-phase-seed

vtlvtl tape history option reset maximum-events-per-tapeReset the maximum-events-per-tape option for tape history to the default value.

vtl tape history option set maximum-events-per-tape <count>

SE Commands

DELL EMC CONFIDENTIAL

vtl 29

Page 30: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Set the maximum-events-per-tape for tape history from 1 to 100.

vtl tape history option showDisplay tape history options.

SE Commands

DELL EMC CONFIDENTIAL

30 Data Domain Operating System 6.2 SE Command Reference Guide

Page 31: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

CHAPTER 2

Hidden Sysadmin Commands

Hidden sysadmin commands are commands that are available, but not visible to,sysadmin users.

This chapter contains the following topics:

l Hidden sysadmin commands overview............................................................... 32l Logging in as sysadmin.......................................................................................32l adminaccess.......................................................................................................32l autosupport........................................................................................................32l config.................................................................................................................33l filesys.................................................................................................................33l license................................................................................................................33l replication.......................................................................................................... 33l snmp.................................................................................................................. 34l system............................................................................................................... 34l user....................................................................................................................35

DELL EMC CONFIDENTIAL

Hidden Sysadmin Commands 31

Page 32: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Hidden sysadmin commands overviewHidden sysadmin commands are commands that are available, but not visible to,sysadmin users. The commands are hidden because they are either in the process ofbeing deprecated, or to prevent widespread usage. Evaluate the customer's need toknow about the hidden commands before disclosing information about them.

Note

Autocomplete is not available for hidden commands or arguments.

Logging in as sysadminComplete the following steps to log in as sysadmin:

Procedure

1. Open an SSH session to the Data Domain system.

2. At the login as prompt, type sysadmin.

3. At the Password prompt, type the current sysadmin password.

adminaccessadminaccess add ftp <host-list>Add an FTP host.

adminaccess add http <host-list>Add an HTTP or HTTPS host.

adminaccess add ssh <host-list>Add an SSH host.

adminaccess add telnet <host-list>Add a Telnet host.

adminaccess del ftp <host-list>Remove an FTP host.

adminaccess del http <host-list>Remove an HTTP or HTTPS host.

adminaccess del ssh <host-list>Remove an SSH host.

adminaccess del telnet <host-list>Remove a telnet host.

autosupportautosupport disable support-notifyDisable automatic support notification.

autosupport enable support-notifyEnable automatic support notification.

autosupport reset support-notifyReset automatic support notification settings to their default values.

Hidden Sysadmin Commands

DELL EMC CONFIDENTIAL

32 Data Domain Operating System 6.2 SE Command Reference Guide

Page 33: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

autosupport set format {html | plain | xml}Set the format of the automatic support notification emails.

autosupport show support-notifyDisplay the automatic support notification settings.

configconfig reset allReset all values controlled by the config command to their default values.

filesysfilesys sample start <directory>Estimate physical storage utilization on a per directory basis. Use the following formatto sample multiple directories at one time: filesys sample start /backup/a /backup/b /backup/c.

filesys sample stopCancel in-progress directory capacity usage estimations.

filesys verify resumeResume the online verify operation. (Hidden as of release 2.0.2.0.)

filesys verify statusDisplay the online verify operation status. (Hidden as of release 2.0.2.0.)

filesys verify suspend [all]With no option specified, suspend the nonessential online verify operations. The alloption suspends essential and nonessential verify operations to improve performance.Essential verify operations include verifying new containers, compacting and verifyingnew files, and tracking the replica lag time when data is not actively replicating.(Hidden as of release 2.0.2.0.)

licenselicense activateHidden arguments:activation-file <filename>activation codes <activation-codes>Activate the VDP license.

license oem get attribute [application {vdp}]Get the license attributes from the VDP application.

license oem register <encrypted-challenge-text> [application{vdp}] [capacity <TiB>]Register the VDP license and confirm the capacity allocated for VDP. Authenticate theregistration with the encrypted challenge text.

replicationreplication show compression {<obj-spec-list> | all}Display replication compression statistics. The Size (KiB) column is the amount of databefore compression.

Hidden Sysadmin Commands

DELL EMC CONFIDENTIAL

config 33

Page 34: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

replication signalReload and clean up the replicated configuration on the Data Domain File System(DDFS).

replication sync start [<destination>]Commence a synchronization between the Data Domain system and a specifieddestination Data Domain system.

replication sync status [<destination>]Display the status of an in-progress synchronization between the Data Domain systemand a specified destination Data Domain system.

replication throttle check-reconnectForce the Data Domain File System (DDFS) to restart the replication context. TOErequires a connection restart to use the new throttle value.

replication troubleshooting <destination> [filename <output-file-name>]Generates a collection replication report to the specified output file that providestroubleshooting information for Data Domain support. The file is savedto /ddr/var/log/debug/replication/<output-file-name>.

Note

The replication troubleshooting command will fail if no autosupport files areavailable.

snmpsnmp trapd disableDisable SNMP traps.

snmp trapd enableEnable SNMP traps.

snmp trapd resetReset SNMP settings to the default values.

snmp trapd statusDisplay SNMP status.

systemsystem passphrase option reset store-on-diskReset the option to store the system passphrase on disk to its default value of yes.Changing this setting requires an immediate file system restart.

system passphrase option set store-on-disk {yes | no}Specify whether to store the system passphrase on disk. Changing this settingrequires an immediate file system restart.

Setting this option to no will lock the file system on reboot. Run the filesysencryption unlock command and enter the passphrase to unlock the file system.Failure to provide the correct passphrase can cause the file system to becomeinaccessible.

system passphrase option show store-on-diskDisplay whether the system passphrase is stored on disk.

system reset ecc-counters

Hidden Sysadmin Commands

DELL EMC CONFIDENTIAL

34 Data Domain Operating System 6.2 SE Command Reference Guide

Page 35: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Reset the counters that keep track of memory ECC Errors to zero. Use this afterreplacing DIMMs to check for the possibility of new errors. Without a reset, theoriginal ECC error count remains at its previous value.

system show hourly-statusDisplay system statistics for the past hour.

useruser password validate <user> <password>Validate the password for the specified user.

Hidden Sysadmin Commands

DELL EMC CONFIDENTIAL

user 35

Page 36: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Hidden Sysadmin Commands

DELL EMC CONFIDENTIAL

36 Data Domain Operating System 6.2 SE Command Reference Guide

Page 37: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

CHAPTER 3

Undocumented Public Commands

Undocumented public are commands that are available and visible to sysadmin users,but not included in the Data Domain Operating System Command Reference Guide.

This chapter contains the following topics:

l Undocumented public commands overview........................................................38l Logging in as sysadmin.......................................................................................38l perf.................................................................................................................... 38

DELL EMC CONFIDENTIAL

Undocumented Public Commands 37

Page 38: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Undocumented public commands overviewUndocumented public are commands that are available and visible to sysadmin userson the Data Domain system, but are not included in the Data Domain Operating SystemCommand Reference Guide.

Logging in as sysadminComplete the following steps to log in as sysadmin:

Procedure

1. Open an SSH session to the Data Domain system.

2. At the login as prompt, type sysadmin.

3. At the Password prompt, type the current sysadmin password.

perfperf disable trace <event-regexp> [module {default | ddfs |vtl}]Disable tracing of the event with the specified registry key.

perf enable trace <event-regexp> [module {default | ddfs |vtl}]Enable tracing of the event with the specified registry key.

perf start histogram [module {default | ddfs | vtl}]Start collecting performance histograms. This may impact system performance.

perf start statsStart printing performance statistics. This may impact system performance.

perf start trace [allow-wrap] [module {default | ddfs | vtl}]Start tracing events. This may impact system performance.

perf status trace <event-regexp> [module {default | ddfs |vtl}]Display the trace status, enabled or disabled of the event with the specified registrykey.

perf stop histogram <histogram_filename> [module {default |ddfs | vtl}]Stop collecting performance histograms, and dump the collected histograms to thespecified file.

perf stop statsStop printing performance statistics.

perf stop <trace_filename> [module {default | ddfs | vtl}]Stop tracing events and dump the collected trace information to the specified file. Thefile location is always /ddvar/log/traces.

Undocumented Public Commands

DELL EMC CONFIDENTIAL

38 Data Domain Operating System 6.2 SE Command Reference Guide

Page 39: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

CHAPTER 4

Public Commands with Hidden Arguments

Public commands with hidden arguments are commands that are available and visibleto sysadmin users, but include specific arguments and options that are only visible toSE users.

This chapter contains the following topics:

l Public commands with hidden arguments overview........................................... 40l Logging in as sysadmin.......................................................................................40l adminaccess...................................................................................................... 40l alerts..................................................................................................................40l archive............................................................................................................... 40l ddboost.............................................................................................................. 41l filesys................................................................................................................. 41l ipmi.................................................................................................................... 42l license................................................................................................................43l log......................................................................................................................43l ndmpd................................................................................................................43l scsitarget........................................................................................................... 43l support.............................................................................................................. 43l system............................................................................................................... 44l user....................................................................................................................45l vdisk.................................................................................................................. 45l vtl...................................................................................................................... 45

DELL EMC CONFIDENTIAL

Public Commands with Hidden Arguments 39

Page 40: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Public commands with hidden arguments overviewPublic commands with hidden arguments are commands that are available and visibleto sysadmin users, but include specific arguments and options that are only visible toSE users. These arguments allow SE users to move faster through system prompts,view system details at a more granular level, and force the start of operations that thesystem would otherwise not allow.

Note

Autocomplete is not available for hidden commands or arguments.

Logging in as sysadminComplete the following steps to log in as sysadmin:

Procedure

1. Open an SSH session to the Data Domain system.

2. At the login as prompt, type sysadmin.

3. At the Password prompt, type the current sysadmin password.

adminaccessadminaccess certificate import {host application {all | ddboost| https | rkm | <application-list>} | ca application {all |ddboost | rkm | <application-list>}} [file <filename>]Hidden argument:password <password>adminaccess trust add host <hostname> [type mutual]Hidden argument:password <password>adminaccess trust del host <hostname> [type mutual]Hidden argument:password <password>

alertsalerts test events alert-id-list [prompt-for-input]Hidden arguments:[simulated]

archivearchive data-movement startHidden argument:scheduled

Public Commands with Hidden Arguments

DELL EMC CONFIDENTIAL

40 Data Domain Operating System 6.2 SE Command Reference Guide

Page 41: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

ddboostddboost destroyHidden argument:password <password>ddboost fc show detailed-statsHidden arguments:summaryendpointinitiatorvcvceclientfilterddboost storage-unit delete storage-unitHidden argument:password <password>ddboost storage-unit show [compression] [<storage-unit>][tenant-unit <tenant-unit>]Hidden argument:type {boostfs}Show whether a storage unit is used by BoostFS.

filesysfilesys archive unit addHidden arguments:enclosures <enclosures>size <size>filesys archive unit delHidden argument:password <password>filesys archive unit expandHidden arguments:enclosures <enclosures>size <size>filesys createHidden argument:forcefilesys disableHidden argument:localfilesys encryption enableHidden argument:passphrase <passphrase>filesys encryption keys exportHidden argument:passphrase <passphrase>filesys encryption keys show

Public Commands with Hidden Arguments

DELL EMC CONFIDENTIAL

ddboost 41

Page 42: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Hidden argument:detailedfilesys fastcopy source <src> destination <dest>Hidden arguments:force|updatesynthetic-optimfilesys option resetHidden arguments:compute-segfeatures {0 | 1}Reset feature computation during Global Compression (GC) to the default value of 0.low-bw-optim {enabled | auto}Reset low bandwidth optimization to the default where it is automatically enabledbased on replication context configuration.staging-clean <percent>Reset the staging clean percentage to the default value of 0.staging-delete-suspend <percent>Reset the staging delete suspend percentage to the default value of 0.

filesys option setHidden arguments:compute-segfeatures {0 | 1}Enable feature computation during Global Compression (GC).low-bw-optim {enabled | auto}Set low bandwidth optimization to be either always enabled or automatically enabledbased on replication context configuration.staging-clean <percent>Set the staging clean percentage from 0 to 200.staging-delete-suspend <percent>Set the staging delete suspend percentage from 0 to 400.

filesys option showHidden arguments:compute-segfeatures {0 | 1}Display the current value for feature computation during Global Compression (GC).low-bw-optim {enabled | auto}Display the current value for low bandwidth optimization.staging-clean <percent>Display the current value for the staging clean percentage.staging-delete-suspend <percent>Display the current value for the staging delete suspend percentage.

filesys show space [tier {active | archive | total} | archive-unit {all | <unit-name>}]Hidden argument:

<n> where <n> is a number corresponding to a specific value.

filesys statusHidden argument:terse

ipmiipmi remote console ipmi-target <ipaddr | hostname> user <user>Hidden argument:password <password>

Public Commands with Hidden Arguments

DELL EMC CONFIDENTIAL

42 Data Domain Operating System 6.2 SE Command Reference Guide

Page 43: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

licenselicense add license-code [license-code...]Hidden arguments:activation-file <filename>activation-codes <activation-codes>license show [local]Hidden argument:activation-attr

loglog view audit-info [authorization-errors | all-errors] [user<user-name>] | user-role {admin | security | user | backup-operator | none}] [tenant-unit <tenant-unit>] [host <host>][application {CLI | REST | GUI | VDISK}] [string <str>] [last<n> {hours | days | weeks | months} | start <MMDDhhmm[[CC]YY]>[end <MMDDhhmm[[CC]YY]>]]Hidden arguments:user-role SE

ndmpdndmpd user add <username>Hidden argument:password <password>ndmpd user modify <username>Hidden argument:password <password>

scsitargetscsitarget disableHidden argument:localscsitarget show detailed-statsHidden argument:<n>where <n> is a number corresponding to a specific statistic.

supportsupport bundle create {files-only <file-list> | traces-only}[and-upload [transport {http|https}]]Hidden arguments:localuser <user>password <password>

Public Commands with Hidden Arguments

DELL EMC CONFIDENTIAL

license 43

Page 44: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

support bundle create default [with-files <file-list>] [and-upload [transport {http|https}]]Hidden arguments:localuser <user>password <password>support bundle create mini [with-files <file-list>]Hidden arguments:tag <ID>support bundle resume <bundle-name> [transport {http|https}]Hidden arguments:localuser <user>password <password>support bundle upload <bundle-name> [transport {http | https}]Hidden arguments:localuser <user>password <password>

systemsystem passphrase setHidden argument:passphrase <passphrase>system upgrade precheck <rpm>Hidden argument:localRequest an upgrade precheck. The local argument causes the upgrade precheck torun only on the local Data Domain system in HA environments.

system upgrade start <rpm>Hidden arguments:forcelocalUpgrade or downgrade within a major software release series, such as from 3.0.3.0 to3.0.2.0. The target rpm file must be on the system in the /ddvar/releasesdirectory. This command does not support downgrading between software series suchas from a 3.x release to a 2.x release.

The se upgrade ignore version-check command must be run beforeattempting a downgrade.

Downgrades may not be successful for all releases and can cause unpredictableresults. Do not attempt to downgrade the Data Domain Operating System softwarewithout the support of Data Domain Engineering.

The force argument allows a software upgrade to the same software version alreadyinstalled on the Data Domain system for repair operations.

The local argument causes the upgrade precheck to run only on the local DataDomain system in HA environments.

Public Commands with Hidden Arguments

DELL EMC CONFIDENTIAL

44 Data Domain Operating System 6.2 SE Command Reference Guide

Page 45: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

useruser add <user> [role {admin | security | user | backup-operator | none}] [min-days-between-change <days>] [max-days-between-change <days>] [warn-days-before-expire <days>][disable-days-after-expire <days>] [disable-date <date>]Hidden argument:password <password>user change password <user>Hidden argument:password <password>

vdiskvdisk disableHidden argument:localvdisk pool destroy <pool-name>Hidden argument:password <password>vdisk show detailed-statsHidden argument:<n>where <n> is a number corresponding to a specific statistic.

vdisk pool unregister <pool-name> user <vdisk-user>Hidden argument:password <password>

vtlvtl disableHidden argument:localvtl drive add vtl [count <num-drives>] [model <model>]Hidden argument:node <name>vtl show detailed-statsHidden argument:<n>where <n> is a number corresponding to a specific statistic.

Public Commands with Hidden Arguments

DELL EMC CONFIDENTIAL

user 45

Page 46: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

Public Commands with Hidden Arguments

DELL EMC CONFIDENTIAL

46 Data Domain Operating System 6.2 SE Command Reference Guide

Page 47: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

CHAPTER 5

Data Domain Virtual Edition (DD VE) and DataDomain Management Center (DDMC)Commands

DD VE commands are only available on DD VE and DDMC instances, and do not applyto physical Data Domain systems.

This chapter contains the following topics:

l system............................................................................................................... 48

DELL EMC CONFIDENTIAL

Data Domain Virtual Edition (DD VE) and Data Domain Management Center (DDMC) Commands 47

Page 48: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

systemsystem set serialno <serialno>Set the system serial number for the DD VE or DDMC instance to the specified value.

Data Domain Virtual Edition (DD VE) and Data Domain Management Center (DDMC) Commands

DELL EMC CONFIDENTIAL

48 Data Domain Operating System 6.2 SE Command Reference Guide

Page 49: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

APPENDIX A

vdisk Static-Image-Replication Steps

Replicating a vdisk static image is a multistep process that requires actions on boththe source and destination Data Domain systems. This appendix covers those steps inmore detail.

l vdisk static-image-replication steps...................................................................50

DELL EMC CONFIDENTIAL

vdisk Static-Image-Replication Steps 49

Page 50: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

vdisk static-image-replication stepsvdisk provides more detail about the vdisk static-image commands. Completethe following steps to execute a complete static image replication session:

Procedure

1. On the source Data Domain system, run the vdisk device createcommand to create a vdisk device.

2. On the source Data Domain system, run the vdisk static-image createcommand to create a static image of the new vdisk device.

3. On the destination Data Domain system, run the vdisk static-image-replication prepare source command to prepare the static image forreplication.

Record the vdisk replication id and vdisk destinationreplication copy-phase-seed values.

4. On the source Data Domain system, run the vdisk static-image-replication start command, with the values generated in step 3.

5. On the source Data Domain system, run the vdisk static-image-replication show status command.

The system displays Static-image-replication completedsuccessfully for the remote-replication id: <replication-id> when the replication is complete.

Note

Do not run this command on the destination Data Domain system. It will fail withthe error Failed to get status: Operation handle not found.

6. On the destination Data Domain System, run the vdisk static-image-replication finalize command to finalize the static image replication.

7. On the source Data Domain system, run the vdisk static-image-replication show status command.

The finalized replication system should not appear in the list of active sessions.The vdisk static-image-replication show status command clearsall completed static image replication sessions from the list of active sessions.

vdisk Static-Image-Replication Steps

DELL EMC CONFIDENTIAL

50 Data Domain Operating System 6.2 SE Command Reference Guide

Page 51: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

APPENDIX B

NFS Security Registry Keys

The ability to change certain NFS security settings by editing the associated registrykeys is available with the reg set command. This appendix covers those options inmore detail.

l NFS security registry keys................................................................................. 52

DELL EMC CONFIDENTIAL

NFS Security Registry Keys 51

Page 52: SE Command Reference Guide · SE commands overview SE commands are available only to authorized Data Domain and partner support personnel. These commands are not available or visible

NFS security registry keysTable 2 on page 52 lists the NFS security options that can be edited in the registrywith the reg set command.

Table 2 NFS security registry keys

Registry key Description Values

system.NFS_SHOWMOUNT_ISOLATION

Filters the output of the Linuxshowmount {-e | -a | -d} command according to the

access control list (ACL) inuse on the Data Domainsystem. This option is set toTRUE by default.

l TRUE

l FALSE

system.NFS_MAP_UNKNOWN_USER_TO_NOBODY

Allows NFS requests toproceed when Kerberosprincipal-ID mapping fails bymapping unknown or non-existent users to nobody. Thisoption is set to FALSE bydefault.

Run the following command to change a registry setting:reg set <key>=<value>

NFS Security Registry Keys

DELL EMC CONFIDENTIAL

52 Data Domain Operating System 6.2 SE Command Reference Guide